11.01.2013 Views

Workshop

Workshop

Workshop

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• PCAnywhere<br />

• ReachOut<br />

• RemotelyPossible<br />

• Novell Z.E.N. Works Remote Control<br />

• Microsoft SMS Remote Control<br />

These packages will allow you to watch exactly what the person at the other end is doing, which is really,<br />

really helpful. Sometimes you can simply correct what the user is doing. If you can’t, though, at least<br />

you’ll realize whether he or she is reporting the problem correctly.<br />

Of course, a network remote control program does you zero good if a workstation is not talking to the<br />

network, so you might want to brush up on your over-the-phone troubleshooting skills anyway.<br />

Protocol Problems<br />

If you think that the application is installed correctly and on a functional workstation but might possibly<br />

be the victim of a bad bit of network glue, you should perform some basic protocol troubleshooting steps<br />

to gather more data. I basically perform these measures as second nature, just so I don’t assume I have<br />

the entire picture before I get this objective data.<br />

TCP/IP<br />

This discussion is going to be in the context of a Windows PC, but these steps can be taken on any<br />

workstation—you’ll just use slightly different commands.<br />

If you’re using TCP/IP, you’ll follow steps that are similar to the ones in Hour 12, “UNIX Networking<br />

Basics.”<br />

Step 1: Ping the Loopback Address<br />

First, you’ll definitely need to identify your user’s PC as well as the resource he or she is trying to get to<br />

on your network map. You’ll want to get to the user’s workstation and see if you can ping the loopback<br />

address (127.0.0.1).<br />

As you’ve probably figured out by now, the loopback address isn’t just a UNIX feature. Every station that<br />

has TCP/IP on it has a loopback address of 127.0.0.1. It serves the same function as the loopback plug<br />

I discussed in Hour 8, “Hard Basics: Guide to Being a Hardware Geek.” It allows the IP protocol program<br />

to talk to itself without involving any outside influence, such as the network card.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!