The initial milestone is to identify and diagnose the active directory issues. This assists the technicians in verifying the connectivity issues and identifies network connectivity and the ways to solve the issues. There are several areas that show a network problem which includes the event viewer. It assists the end user in identifying the problem as well as proposing for the resolution, directory and other various services. It categorizes and analyzes the error code for easier identification and analysis. If there are numerous event columns for error coding, net helpmsg command can be of paramount assistance. For example, if the initial digits of the network error code are 8007, it indicates a network error or a Microsoft® Win32® API. This network connectivity issue can be solved by using helpmsg commands (Mwangi, 2002). Decoding of such errors translates the initial four hexadecimal figures into decimal numbers. Type the following at the command prompt: net helpmsg message in decimal. The helpmsg command will give a description concerning the error.
If such error codes like bad password and access denial appears, this concerns security associated issues. It does not concern network connectivity rather than network security. No logon servers’ error code usually indicates the inability to access a domain controller for that domain. It has a source description of Net Logon. Access Denied and can have a source description of SAM. If there is a message of "Unable to resolve target system name ..." it indicates that, Domain Name Server (DNS) is not working.
Tools, Diagnostics and Preventions Implemented Based on the Analysis of the Network
When the end user cannot connect to another computer over the internet, the tracert can be of great assistance. Trace routeis a network diagnostic tool used to identify the network problems location. In identifying just bring up the "Run" dialog box and click “run”. Inside the open edit box, type "cmd" without quotes and then hit enter. This opens the DOS window command. When starting, type "tracert www.google.com” and hit enter.
The result from tracert comes in 4 columns. The initial column is the "hop" number. Each "hop" represents a device which your network traffic acquires a route through to travel from your computer to the destination. The next 3 columns represent ping times. These are the times it spends to send a network packet from your computer to another network device. The Ping moments are assessed in milliseconds. The fifth column represents the name of the device network where the traffic passes through and where it stops.
Observe the first item in the fifth column. In a typical home network, this hop represents your router. If the tracert makes it this far it then shows the connection between your computer and the router, and both are working. Analyze the lines which are based on the fifth column. The initial hops that precede the router are ISP's of your network, starting either from cable or DSL modem; it forms a separate device from the router. The calculations of hops that belong to your network ISP differ according the ISP and the traffic of the network router. If there lay problems in the hops, it has to be Verizon's problem (Mwangi, 2002).
Get into the fifth column last line. If everything is in good condition, the following makes the destination line (www.google.com in our case). If the condition is upset, this above line is the main source of network issues. If the address is outside ISP's network, there is little or nothing you can do, unless you are patient for whomever responsible for the configuration of the network device to fix it. If the problem in the destination host persists, you could then contact them. Assess columns 2-4. This makes our area of analysis whether there are problems. Ping times should increase gradually just as hop count rises. If one hop has a rapid ping time increase (lets say, 100 ms to 700 ms) or even has an asterisk (*) that replaces time it must be having problems. In some worst cases, entire three columns will feature asterisks, and you will start receiving request timed out messages. You have to remember that in some situations things might be functioning accordingly but tracert will feature request timed out messages. Settings concerning network devices can be configured to assume ping requests notifications, and as they do, you just receive timeout error messages though some other network traffic will still be working. In this situation, the final successful ping is named DEMAND-MEDI. This is why Demand Media has e-How we can deduce that there are no network connectivity problems between the end users computer and the e-How site.
You also could download the WhatsUp Gold Engineer's Toolkit. This is a predictive network monitoring tool that is flexible, high-performance, comprehensive and automated. With this Toolkit, working with too many tools gets over. Every function you require is in one application. The WhatsUp Gold Engineer’s Toolkit is a one installation, one intuitive interface and one credentials library. You just need to enter in your device settings once and get started. They are grouped and organized depending on the common tasks to be done. In addition, one may print or even export the output to share it with the other team or even with the management (Mwangi, 2002).
How to Migrate from IPv4 to IPv6
Soon and very soon, your customers, your partners and the whole environment will move to IPv6. This will happen in the effort of avoiding suffering from compatibility problems between IPv4 and IPv6 technologies. It is important to be prepared for the integration of IPv6 in the computer now. Being in the IPv6 already assumes that: you have ensured your company to remain competitive, preserve the communication and SLA with your partners and customers, being visible on the world with an IPv6 compliant website as well as guaranteeing your company is in a position of sustaining development and growth (Mwangi, 2002).
Moving to IPv6 from IPv4 is a costly and long process. However, this helps an individual to anticipate his plan, requirements and execute the exodus while cutting the operational costs. Efficient computer offers solutions assist you to succeed in this main network transition and lower the risks and costs of moving and maintaining an IPv4/IPv6 network.
Advantages and Disadvantages of Migrating from IPv4 to IPv6
You will face dual major difficulties when moving from IPv4 to IPv6:
- Long addresses: IPv6 address format expands to 128 bits. It cannot be administered within a spreadsheet. Settings the network configuration becomes complex and more prone to errors.
- IPv4 and IPv6 cohabitation: moving to IPv6-only takes a long period. This indicates that, for a moment, the network will have to use both addresses of IPv4 and IPv6. IPv6 is not rearward matching with IPv4 and, IPv4 and IPv6 are not interoperable. Your equipment and services will require maintaining Dual Stack configurations that ensures compatibility between devices using IPv4 and IPv6 in order to maintain the services (Mwangi, 2002).
One of the main advantages is safety. There are various authentication and encryption options in Ipv6. These safety measures ensure that networks are secure and cannot be compromised or hacked. The newer version processing is simple. Ipv6 routers do not perform fragmentation. However, it is the job host’s to operate PMTU detection of end fragmentation. The inclusive packet dispensation by the routers is efficient more than in Ipv4. There lie disadvantages and in the current IPv6 networks there are overhead. This is mainly rooted on the means IPv6 is encapsulated over IPv4. The http speeds up over this IPv6 up to 130-140KB/sec within a 1.5mbit adsl. By the use of IPv4, http to a similar server performed at 160K/sec. Conducting ipv6 file exodus between the two servers over a LAN yields similar results to that of IPv4 if it is not less. However, not anything is noticeably different. If your desktop contains an IPv6 address only and no longer have IPv4 address, it cannot be available to systems that run IP4 and not IPv6.