LAN classic fault resolution (essential post) The biggest advantage of LAN is resource sharing, but in actual use, we often encounter such problems: the other party has obviously shared various resources, but they can not access them in the LAN. Since there are many possibilities for this kind of failure, it is difficult for newbies to find out where the failure is within a short period of time. Therefore, a comprehensive analysis of LAN failures is carried out in the form of examples. In addition, after the firewall attached to the system is activated in Windows XP, it will automatically block some commonly used network functions. For example, when the computer on the network uses the ping command to detect the network connection status, you will see the "Request TImed out" error message; but after selecting the "Allow incoming echo request" item under the "ICMP" tab, Run the ping command again to get normal feedback. Use "half search" method to narrow down the network fault Step one half: Determine whether it is a hardware problem or a software problem. First, observe the color of the network card indicator when it is turned on: if it is green, it means the line is clear; if it is yellow, it means that the line is not connected Usually pay attention to observation). If the display fails, use a cable tester to test the network cable and check whether there is any problem with the network card. Under normal circumstances, the probability of network cable failure is high, and the probability of network card damage is small. If the hardware fault is eliminated, go to step two. Windows XP network failure easily check Source: China Computer Education News Editor: ycx [03-10-17 10:21] Author: Swiss Air Step 1 Click "Start → Help and Support" to open the "Help and Support Center" and check "Use tools to view your computer information and analyze problems". Step 2 Select "Network Diagnostics" in the newly opened window. You can see that the right window has "Scan your system" and "Set Scan Options" options. In order to get complete and comprehensive network diagnostic information, we select "Set Scan Options", and select all the check boxes, then "Save Options", and then click "Scan Your System" (pictured). Step 3 After waiting for more than ten seconds, a diagnostic report with various tests and detailed information collected is completed. This includes whether there is a network connection in your system, whether programs and services related to the network are running, and basic information about your computer. How is your network fault found? The author is a webmaster. Recently, our local area network has been reformed, and all the network cables have been re-routed. The original network has 70 points, all of which are star-shaped structures. Now more than 30 users have been added, which means that only one switch needs to be added. The current network structure is like this: the entire network adopts a star topology, the central computer room is equipped with a TCL three-layer switch, and the server mainly provides FTP, file services, Web and other services. Each floor uses TCL switches, all with VLAN technology, and each terminal accesses the network through a 100M Avaya network cable. When the network was first used, all aspects were good, but recently the network has often dropped, and sometimes even simply went on strike. The leader will solve the problem in three days, or say goodbye to him. Ooo, Ooo, Ooo ... Fortunately, Kung Fu pays off, after three days and nights of hard work and meditation, I finally solved the problem. Now, my colleagues call me Huang Gong, and I am afraid that the wages will also rise sharply, ha ha ha ... It is said that there are N users on and off in a certain year and month and day when they reflect the network connection, and sometimes the network neighbors cannot visit each other. Because the faulty users are distributed on multiple floors and the fault points are not concentrated, the impact is particularly bad. At first, I thought that the port of the switch was too large, and the switch and server were restarted N times, but it still didn't work. Yes, we quickly negotiated to start with the software, first remove the virus from the server, and then turn off each switch, to kill each machine, but the fault still exists. When pinging some servers or computers in the network, packets are still lost, and the network is intermittent. God, I'm going crazy! Back home that night, I carefully recalled the failure of the day, and found that when I was disinfecting and disconnecting individual switches, the network returned to normal, and when I plugged it in again, I disconnected again. Thinking of this seems to have a little eyebrow. When I went to work the next day, I disconnected all the switches and plugged them in one by one until I found the one with the problem. After careful observation, I finally found the problem. It turned out that when this network was built at that time, two cascade cables were left between the core switch and the sub-switch, usually only one was inserted, and the other was spare. On the switch, both are plugged in. When a user on the switch sends a message to another user, the data packet will cyclically send the data packet through the core switch along another spare line. When the amount of information is large, the resources of the core switch will be wasted, causing the network speed to drop until disconnection. The failure was mainly due to the existence of loops in the network, which caused each frame to be repeatedly broadcast in the network, causing a broadcast storm. To eliminate the network broadcast storm caused by this network loop connection, you can use the STP protocol. You can consult Cisco and other related books, so I won't say much here. In addition, when we do a relatively large network in the future, we must create detailed files, including network wiring diagrams, IP and MAC correspondence tables, etc., and set up digital tubes on the network line. The failure was verified by a new colleague who was careless. IP and MAC binding problems Q: My computer originally used a fixed IP address on the public network. In order to avoid being misappropriated by others, the "arp -s ip mac" command is used to bind the MAC address and the IP address. Later, for some reason, the "arp -d ip mac" command was used to cancel the binding. However, the strange thing is that after canceling the binding, the IP address cannot be used on other computers, but only on my own computer. It should be noted that my computer is not a proxy server. Answer: Although in the TCP / IP network, the computer often needs to set the IP address to communicate, however, in fact, the communication between computers is not through the IP address, but through the MAC address of the network card. The IP address is only used to query the MAC address of the computer to be communicated with. The ARP protocol is used to notify each other's computers and network equipment of the MAC address corresponding to their IP. The computer's ARP cache contains one or more tables for storing IP addresses and their resolved Ethernet MAC addresses. After a computer communicates with another computer with an IP address, the corresponding MAC address is retained in the ARP cache. Therefore, the next time you communicate with a computer with the same IP address, you will no longer query the MAC address, but directly reference the MAC address in the cache. In addition, it should be noted that items added through the "-s" parameter are static items and will not cause the ARP cache to time out. These items will be deleted only after the TCP / IP protocol is terminated and then started. Therefore, even if you cancel the binding, other computers will still think that you are using the original IP address within a short time. In a switched network, the switch also maintains a MAC address table and sends data to the destination computer based on the MAC address. After binding the IP and MAC addresses, the switch will record the MAC address as long as it has communicated with the switch. In this way, even if someone later uses the same IP address, they will still not be able to communicate with the gateway, and will not be able to connect to the outside unless the switch is restarted, the MAC table is cleared, or the MAC address table exceeds the specified aging time The local area network is a 10Mbps Ethernet connected by HUB. Why does the system prompt that only 800KB ~ 900KB / s is transmitted when transferring files. This is because the rate is measured differently. Apart from the measurement method, the main reasons why the network cannot reach the nominal transmission rate include: Hub limitations. The hub has a shared bandwidth of 10Mbps. If all ports are in communication, the transmission rate available for each port is about 0.625MB per second (calculation method is 10 ÷ 16). If you want to obtain a transmission rate close to the theoretical bandwidth, you must use a switch as a hub device. The reason for the network card. If the quality of the network card is not good, there are often errors in the sent data packets, which cause the data packets to be retransmitted frequently, or more received data packets have errors, which will also reduce the speed of copying files. The reason for the network cable. If the network cable is too long, the signal attenuation is relatively severe, or although the distance of the network cable is short, the quality of the network cable is not good, and it cannot reach the theoretical speed. In addition, when the network is busy, the ideal speed cannot be achieved. 20. Answer: If the ISP binds the IP address and the MAC address of the network card together, it is impossible to share the Internet through the routing function of the ADSL Modem. The reason is simple. Each network card has a unique MAC address, so other computers will be denied access to the Internet connection. The only solution is to connect the ADSL Modem to the computer where the ISP has bound the MAC address, and set the computer as a proxy server, and other computers as clients to achieve Internet connection sharing. 21. Question: How can I use a VPN to enable two LANs to access each other through the Internet? I have tried a dial-up machine with a modem that can be connected to the LAN using a VPN, but I only found the server, but I ca n’t see the other machines. Why? What? Answer: First of all, it needs to be explained that the main function of VPN is for a client to remotely access the VPN server or access the network where the VPN server is located through the VPN server. Two LANs can access computers in each other's network through the Internet and can only do VPN routing. If a remote client accesses the VPN server and its network, the VPN server needs to be configured correctly, mainly because the VPN server assigns an IP address to the remote client. When the VPN server and the DHCP server are not on the same computer, you can use DHCP to assign IP addresses to remote clients; when the VPN server and the DHCP server are on the same computer, you can only use the static address allocation method. Properties → IP tab ". After dialing, the local area network cannot be accessed because there is no IP address assigned to a legitimate local area network. In addition, when using VPN dial-up, the dial-up end must have a legal IP address, otherwise dialing the VPN server is meaningless. When setting up VPN routing to connect two LANs, both parties need to create a "demand dial interface" and create a routing table in the "routing and remote access → routing interface" of the VPN server. If each VPN server has a legal IP address, you can create a static route (added in "IP routing → General routing"), if the VPN server does not have a legal IP address, you can use the RIP protocol to create a dynamic route (in the "IP Add "New Routing Protocol → RIP Version 2 for Internet Protocol" to Routing → General and configure it correctly. When the VPN server does not have a legal IP address, problems will occur when the peer VPN server dials the local VPN server. At this time, you can use dynamic domain name resolution software on the VPN server without a legal IP address and apply for a domain name for this VPN server, and the peer VPN server can dial this domain name. Gateway squeezes 80 ports Q: The operating system of the server I set up is Windows 2000 Server Edition, and it has WWW, DNS, FTP (SERV-U), and E-mail (Web EasyMail) services. Specify the private IP address "172.16.108.a", specify the external network IP "218.106.98.b" through the exchange port, and bind the internal network IP "172.16.108.a", so that pointing to the domain name allows external users Access my server. However, port 80 of the web server is always inaccessible. Later, I added port 81 to the Web, and I can fully access the Web page through the port 81 of the external IP. Is it necessary to set up port mapping (the server adapter is a single RJ45 / 10Mbps LAN interface)? Will there be any problems with the gateway settings? Answer: Judging from your question, it should be that your gateway occupies port 80, and "adding port 81 in the web, you can fully access the web page through port 81 of the external IP" means that you use 80 The port can be forwarded by the gateway, further indicating that the server has no problems. Generally, port mapping is not required. To determine whether the server is faulty, you can use the replacement method: â‘ Find another workstation, install only IIS (default installation), and install a network card (set to 172.16.108.a and correctly set the gateway), use this computer to temporarily replace your server, access 218.106.98.b on the Internet See if it is successful, if it can, it means that the fault is with you, otherwise the fault is at the gateway. â‘¡Disconnect your computer from the network temporarily, install a Modem, dial-up Internet, and then enter ipconfig in the command window to view the external network address you obtained, let others access your dial-up Modem in IE IP address to see if it can be accessed, if it can indicate that your computer is not faulty; if not, it indicates that the fault is in the computer (if your IIS settings specify the address, please modify it to the correct address, that is, the address obtained after Modem dials ). Permission issue of direct connection Q: When two laptops with Windows XP system are directly connected using twisted pair, the connection is unstable, and the other computer often cannot browse, and even the workgroup cannot be opened, prompting "\\ computer name \ ShareDocs can not be accessed You may not have permission to use network resources. Please contact the administrator of this server to find out if you have access rights. You cannot access the network location. "What is the reason? Answer: This must solve the problem of IP address and user permissions, there are several methods: First, you can set a private IP address for each laptop. For example, one is 192.168.1.10, the other is 192.168.1.20, and the subnet mask is 255.255.255.0. Or both use the "automatically obtain IP address" method to make it automatically obtain the IP address of the "169.254.0.1 ~ 169.254.255.254" segment. Second, enable the "Guest" account on each laptop. Run "Computer Management" from "Administrative Tools", select "Local Users and Groups-Users", right-click "Guest" in the right pane, select "Properties", in the "General" tab Cancel "Account is disabled." Third, open "Explorer", select "Folder Properties" from the "Tools" menu, and cancel "Use Simple Folder Sharing (Recommended)" from "Files and Folders" in the "View" tab. Fourth, open "Local Area Connection" and confirm that the Internet Connection Firewall is not enabled in the "Advanced" tab of the "Local Area Connection" property. Fifth, click "Set up a home or small office network" in the "Network Connections" window, run the "Network Installation Wizard", and select "This computer belongs to a network without an Internet connection." Then, open Windows Explorer and set up a shared folder. Analysis of Browsing between NETBIOS and Network Neighborhood Questions about online neighbors have been asked a lot, and misunderstandings in understanding are generally more serious. In view of the fact that Microsoft's NETBIOS documentation is not very detailed, I have collected some relevant materials and added my own practical experience to write this series, I hope it will be helpful to everyone. The plan is divided into three parts, Microsoft Internet browsing process, in-depth analysis of NETBIOS, and network settings details Introduction to the Microsoft Internet Browsing Process In the book "Inside of Windows NT System Management Technology", a very representative problem was mentioned, and I excerpted it: Question: Under what circumstances will the computer be visible but not accessible or accessible but not visible in Network Neighborhood? Please select the best answer: A. There is a physical problem with your network, such as a network cable B. The browsing service of Windows NTserver as the domain master browser is broken C. There is a problem with the Windows NTserver network card D. There is no problem with your network Is normal Microsoft browsing phenomenon correct answer The explanation in the book: Microsoft's web browsing may be "interrupted" in use, but in fact they are not interrupted. This misunderstanding is caused by the user's unfamiliarity with the process of Microsoft web browsing. As students often complain, "Why are other people's online neighbors available, but mine is not?" "Why can sometimes be browsed, but sometimes unable to browse the Internet?" Xingling must also ring the bell, let us go See how Microsoft's web browsing is actually implemented. In view of the fact that you may not yet understand the concept of NT's "domain", most of the 98 machines have browsing failures. I will use 98 "workgroup mode" to explain to you. 1. What is a browsing list (Browsing List) In the Microsoft network, users can see all computers on the entire network (what? Subnet or broadcast domain? You can consider) in the browsing list. When you open the entire network through the Network Neighborhood window, you will see a list of workgroups, and then open a workgroup, you will see the list of computers inside (you can also use the net view / domain: workgroupname command in DOS mode Get), this is what we call Browsing List. Working groups are essentially a group of computers sharing a browse list. All work groups are equal. There is no rule that all computers cannot be in the same work group. 2. Where to browse the list I have seen a controversy on Kapok. Some people say: The computer list in the online neighborhood is obtained by broadcast query. But some people give a counter-example: My classmates are all shut down, but I can still see it in the online neighborhood, it should be obtained from the cache of relatively fixed devices such as HUB or switches. In fact, they are only right in one aspect. Combining the two of them is the correct answer --- Browsing the list is to query the browsing master server through broadcast, provided by the browsing master server. 3. What is the browsing master server? The browsing master server is one of the most important computers in the working group. It is responsible for maintaining the browsing list in this working group and specifying the master server list of other working groups. The other computers and other computers visiting this working group provide browsing services. Each working group selects a browsing master server for each transmission protocol, and the errors we often encounter that cannot browse the network are mostly because of where you are. The working group did not browse the main control server. You can use the NBTSTAT -a computername command in a workgroup to find the browsing master server that uses the NBT protocol. Its logo contains the \\ _ MSBROWSE_name field. 4. How is the browse master server specified? By default, the browse master server in the win98 workgroup is the first computer in the workgroup that enables file and printer sharing. It also allows manual configuration of a win98 computer To browse the main control server (the method will be described in detail later in the network configuration, but because the main control server needs to maintain a dynamic browsing list, performance will be affected), if multiple computers in a workgroup are configured with this option, or When the current browsing master server shuts down the system and no other computer enables the master control settings, the election of the master browser is required. 5. How to generate the election message about the browser by the browser control server through the browser election, it is not easy to capture the package, I have to tell it according to the things in the book. In fact, the process is very simple, first sent by a computer Election critical message, which contains information from the sending computer (operating system, version, and NETBIOS name, etc.), the election message is broadcast to the network, and each computer in the working group will use its own information and election message The priority comparison is mainly because the operating system plays a major role.Remember that it seems to be NT Server> NT WorkstaTIon> Win98> WFWG.Anyway, in the end, the one with the best conditions becomes the new browsing master server. 6. What is the process of browsing the entire network? When a win98 enters the network, if it has a server service (file and printer sharing is enabled), it will announce its existence to the network broadcast, and the browsing master server will get this announcement. And put it into the browse list maintained by itself; the computer that does not bind the file and printer sharing on the corresponding protocol will not be announced, so it will not appear in the network neighbor. When a client computer wants to obtain a list of required network resources, it will first broadcast a browse request. After the browse master server receives the request, if the request is a browse list of this group, it will directly send back the resource list required by the client; If the request is a browse list of other work groups, the browse master server will find the master browser of the corresponding work group according to the records in the Browsing List and return it to the user. The user can get the browse list it wants from there. As for how to share exchange resources with another computer, it is not the issue we are going to discuss here. Understand the principle of web browsing, let me tell you a useful application. Now, for safety reasons, many students do not welcome strangers to visit their machines through online neighbors, but sometimes the lower movies need to be shared with known students. Come out, so file and printer sharing services cannot be deleted yet. How to do? Some people add a $ to the share name to achieve the hidden effect, but this can be seen using net share under DOS; some people add a password to the share, I heard that there are ways to crack it, and it is very It is easy to arouse the curiosity of "comrade hackers". Is there a way to hide my machine in a network neighborhood? For the classmates he knows, let him use \\ IP to visit. Right, the key is to prevent your machine from declaring yourself on the network, and I know that some of us have already made this a reality. As for the method, do n’t ask me. Note: Because there is very little information about the win98 browsing service, and the books involved are mostly introduced in the "domain" model of NT, I can only test according to my own understanding in combination with the practice of netxray. The details are inevitable. Everyone correct me. 7. Why can't some machines be accessed in my Network Neighborhood? If Microsoft Network Neighborhood can really do what you see is what you get, I believe that people who complain about it will not be as many as they do now. You can use the previous introduction to browsing services. It is impossible to know that, because the browse list is not obtained by visiting each of them. Many times, the computers on the network cannot update the browse list correctly. When a computer shuts down normally, it will send a broadcast announcement to the network, so that the browsing master server will delete it from the browsing list in a timely manner; after abnormal shutdown, the browsing list will still keep the entry for a long time ( It is 45 minutes under NT), which is why we can still see it in Network Neighborhood. The stability of 98 is well known-it crashed before it was shut down ^-^ I wrote this first part here. I do n’t know how you feel. I think it ’s quite enjoyable, but I ca n’t solve any problems. For example, what are the necessary conditions for browsing the Internet, NetBEUI? TCP / IP? File and printer sharing or NETBIOS API? What is the principle of browsing remote host with \\ IP? Can I find computers across routers? Students who like hands-on can use Netxray to figure it out for themselves. If you are lazy, be prepared to wait for the next part-in-depth analysis of NETBIOS. In-depth analysis of NETBIOS In this part, I will first give a basic introduction to NETBIOS, and then mainly explain the characteristics of NETBIOS in terms of LANA number, NETBIOS name table, and NBT, so that everyone can understand the principle of NETBIOS interface communication. And master the method of using NETBIOS name table to identify network neighbor browsing faults and how to eliminate them. Which may need to use some network commands, such as net, nbtstat, etc. If there are students who will not use it, please refer to the windows help documentation (it is best to look at NT, 98 is a little scum), and I will not explain it here. Students familiar with network programming know that there are two important network APIs under Windows, WINSOCK and NETBIOS. We usually use IE to browse the web, use FOXMAIL to send and receive emails, and use OICQ to chat all use WINSOCK API. However, some network applications need to use the traditional network interface NETBIOS. Browsing online neighbors and sharing files are typical of them. Although Microsoft has added access to the AF_NETBIOS address family in its latest WINSOCK API, and intends to make support of the NETBIOS API optional from its win2000, the real demise of NETBIOS will still take time. Here I don't want to open up the history of NETBIOS to judge its pros and cons and waste everyone's time. Existence is the truth, and we get to the point. The biggest advantage of the NETBIOS API is that it makes the programming interface "independent of the protocol" --- the application can run through TCP / IP, NetBEUI and IPX / SPX. 举个例åæ¥è¯´ï¼Œå¦‚æžœä½ åœ¨ç½‘ç»œå±žæ€§é‡ŒåŒæ—¶æ·»åŠ 了这三ç§åè®®ï¼Œé‚£å½“ä½ é€šè¿‡ç½‘ä¸Šé‚»å±…æµè§ˆæŸå°æœºå的资æºæ—¶èƒ½ç¡®å®šç”¨çš„是哪ç§å议在和它进行通信å—?ä¸è¿‡ç”±äºŽè¿™ç§â€œä¸Žåè®®æ— å…³â€æ€§æ˜¯é€šè¿‡å¯¹ä¼ 输åè®®æœ¬èº«è¿›è¡Œæ”¹é€ ï¼Œåœ¨ç›¸åº”åè®®ä¸Šæ·»åŠ NETBIOS接å£å®žçŽ°çš„,所以也就产生了一些局é™æ€§ï¼š 一是并éžæ‰€æœ‰çš„å议都支æŒNETBIOS,我们知é“çš„å°±åªæœ‰ä¸Šé¢æ到的那三ç§å议实施了NETBIOS接å£ï¼ˆä¹Ÿè®¸åœ¨å®ƒä»¬å‰é¢åŠ 个Microsoftæ ‡è¯†æ›´æ°å½“些); 二就是我在å‰é¢æ过的LANAç¼–å·çš„问题了,LANAå·çš„æ法在多宿主机环境下å¯èƒ½æ›´å‡†ç¡®äº›ï¼Œå¯¹äºŽæˆ‘们一般åªå®‰è£…有一å—网å¡çš„机åæ¥è¯´å¤§å®¶å°±æŠŠå®ƒç®€å•ç†è§£æˆä¸€ç§é€šè®¯å议的对称性就å¯ä»¥äº†ã€‚ 举个例å,Aåªå®‰è£…了TCP/IP,Båªå®‰è£…了NetBEUI,虽然他们都在å议上绑定了NETBIOS接å£ï¼Œä½†å½¼æ¤åœ¨ç½‘络邻居里是看ä¸åˆ°çš„。这也æ醒我们è¦æƒ³åœ¨ç½‘络邻居里看到最多的机å,就è¦æŠŠä¸‰ä¸ªå议全部安装。为了åŽæ–‡å™è¿°çš„方便,我们把å¯ç”¨äº†NETBIOS的三ç§å议分别用一个åå—æ¥è¡¨ç¤ºï¼šNetBT/NBT(TCP/IP)ã€Nbf(NetBEUI)ã€NwlnkNb(IPX/SPX),它们å„对应一个LANAå·ï¼Œåªæœ‰ç›¸åŒçš„LANAå·ä¹‹é—´æ‰èƒ½å»ºç«‹é€šä¿¡è¿žæŽ¥ã€‚ 接下æ¥è¦è¯´çš„就是最为关键的NETBIOSåå—的问题了。对于BSD系统,æ¯å°æœºå™¨éƒ½æœ‰ä¸€ä¸ªä¸»æœºå,从而也引出了DNS的概念,这也å¯ä»¥è¯´æ˜¯UNIXå’ŒTCP/IP紧密结åˆçš„产物。而Windowså¯æ²¡æœ‰è·ŸæŸç§å议有近亲关系,在它眼里åªæœ‰æœºå™¨å(å³NETBIOSå)æ‰æ˜¯æœ€å…³é”®çš„。 在win32环境ä¸ï¼Œé’ˆå¯¹æ¯ä¸ªå¯ç”¨çš„LANAç¼–å·ï¼Œæ¯ä¸ªè¿›ç¨‹éƒ½ä¼šä¸ºå…¶ç»´æŒä¸€å¼ NETBIOSåå—表。我们å¯ä»¥ç”¨nbtstat -n命令获得本机与NBT相关的åå—è¡¨ï¼ˆä½ è¦æ˜¯è¿žTCP/IP都没安,å¯åˆ«æ¥é—®æˆ‘为什么ä¸èƒ½ç”¨ï¼‰ã€‚NETBIOS åå—分两ç§ç±»åž‹ï¼šå”¯ä¸€å(UNIQUE)和组å(GROUP)。唯一å很好ç†è§£ï¼Œå°±æ˜¯è¯´åœ¨åŒä¸€å网上è¦ç‹¬ä¸€ä¸ºäºŒï¼ˆæ³¨æ„我这里没有用广æ’域,这在我的第三部分里我会结åˆä»¥å‰çš„一些讨论详作说明);而组å的作用是å¯ä»¥å®žçŽ°å¤šæ’æ•°æ®é€šè®¯ã€‚结构上也由两部分组æˆï¼šå—符串和Scope ID。这里的å—符串就是我们给自己的计算机ã€å·¥ä½œç»„èµ·çš„åå—,而且对所能使用的å—符åŠå…¶é•¿åº¦éƒ½æœ‰é™åˆ¶ï¼Œå¤§å®¶è‡ªå·±åŽ»æŸ¥ä¹¦ï¼Œæˆ‘å°±ä¸åœ¨è¿™é‡Œæµªè´¹æ—¶é—´äº†ï¼Œéœ€è¦è¯´æ˜Žçš„是一些åŒå¦ä¸ºäº†â€œéšè—â€è‡ªå·±ï¼ŒæŠŠè‡ªå·±çš„机器å起的象个IPä¸€æ ·ï¼Œå¦‚0.0.0.0(真ä¸çŸ¥æ˜¯é‚£ä½é«˜äººæ•™å¤§å®¶çš„,呵呵)其实å—符“."是ä¸å…许åšæœºå™¨å的,从这个角度讲win98真是太渣渣了(误导群众,怪ä¸å¾—è€æ»æœºï¼Œè¯¥ï¼ï¼‰è€ŒNT在这方é¢åšçš„就好多了。我主è¦è®²è§£çš„是Scope ID域,它å 用NETBIOSå的最åŽä¸€ä¸ªå—节,最大的作用莫过于å¯ä»¥æ ‡è¯†ä¸åŒçš„Microsoft 网络æœåŠ¡äº†ï¼Œå› 为它是NETBIOSåçš„ä¸€éƒ¨åˆ†ï¼Œå› æ¤UNIQUE nameå…许两å°computername 相åŒï¼Œä½†scope IDä¸åŒçš„计算机在åŒä¸€å网上å˜åœ¨ã€‚我ä¸æ‰“算摘抄大段的NETBIOS æ ‡è¯†ç¬¦ç»™å¤§å®¶ï¼Œè¿™é‡Œå°±ä»¥æˆ‘æœºå上的一个NETBIOSåå—表为例给大家讲解一下常用的NETBIOSæ ‡è¯†ç¬¦ç±»åž‹ï¼š C:\>nbtstat -n NetBIOS Remote Machine Name Table Name Type Status --------------------------------------------- MINEGROUP <00> GROUP Registered è¿™æ¡æ²¡ä»€ä¹ˆå¯è¯´çš„,但凡把工作组å设æˆMINEGROUP的机å都会注册这一项,从而åŒä¸€å网上的æŸäº›æœºå间建立一ç§ç‰¹å®šçš„逻辑关è”,使对于MINEGROUP<00>进行的通讯åªè¢«è¿™äº›æœºå接收,这里大家å¯ä»¥è€ƒè™‘ä¸åœ¨MINEGROUP的机å对这些报文的处ç†è¿‡ç¨‹ã€‚虽说这一项是åå—表里最ä¸é‡è¦çš„一项,但大多数åŒå¦æ— 法æµè§ˆç½‘上邻居的故障å´éƒ½å’Œå®ƒæœ‰å…³å“¦ï¼ç‰ä¼šå„¿æˆ‘会说明。还有大家å¯ä»¥æƒ³æƒ³ï¼Œè¦æ˜¯ä½ 的工作组å和别人的机器åèµ·çš„ä¸€æ ·ä¼šå‡ºçŽ°ä»€ä¹ˆäº‹æƒ…å‘¢ï¼Ÿ CJT <03> UNIQUE Registered CJT<03>代表消æ¯æœåŠ¡ï¼Œå°±æ˜¯é‚£ä¸ªåœ¨win2000下çªç„¶å¼¹å‡ºä¸ªçª—å£æ¥è¯´â€œæŸæŸæŸä¾µçŠ¯ç‰ˆæƒâ€ 的东东。其实这是个挺好的æœåŠ¡ï¼Œå¯ä»¥è®©æˆ‘们用win9X下的WINPOPUPå’ŒwinNT下的NET SEND 进行简å•çš„消æ¯ä¼ é€ã€‚ä¸è¿‡åœ¨NT下,CJT<03>åªä»£è¡¨æ¶ˆæ¯çš„接收端,è¦å‘é€æ¶ˆæ¯ï¼Œè¿˜éœ€æ³¨å†Œä¸€ä¸ªCJT<01>,这也是NT第一次用net sendå‘消æ¯è¦ç‰å¾ˆä¹…çš„åŽŸå› ï¼Œå› ä¸ºCJT<01>åªåœ¨ä½ 用到net sendæ—¶æ‰ä¼šåŽ»æ³¨å†Œï¼›è€Œ9X下åªç”¨ä¸€ä¸ªCJT<03>就把收å‘å…¨æžå®šäº†ã€‚ä¸è¿‡é‚£ä¸ªWINPOPUP好象ä¸èƒ½ç»™è‡ªå·±å‘消æ¯è€¶ï¼ŒçœŸä¸çŸ¥å¾®è½¯åœ¨æžå•¥å。 CJT <20> UNIQUE Registered 与CJT<00>相对照,CJT<20>代表æœåŠ¡å™¨æœåŠ¡ï¼Œæˆ‘å‰é¢å·²ç»è¯´è¿‡ï¼Œå‡¡æ˜¯æ供文件åŠæ‰“å°æœºå…±äº«æœåŠ¡çš„机åå°±å«åšSERVER,它会在入网时进行æµè§ˆå™¨å®£å‘Šï¼Œè¿™ä¹Ÿæ˜¯ä¸€å°æœºåå¯é€šè¿‡ç½‘上邻居“被â€è®¿é—®çš„唯一必è¦æ¡ä»¶ã€‚ MINEGROUP <1E> GROUP Registered 还记得我å‰é¢è¯´è¿‡çš„那个æµè§ˆå™¨é€‰ä¸¾å—?我把<1E>æ ‡å¿—ç§°ä¸ºå€™é€‰è€…ï¼Œè¿™æ ·å½“MINEGROUP组里的当å‰æµè§ˆä¸»æŽ§æœåŠ¡å™¨å½“机åŽï¼Œæ‰€æœ‰æ‹¥æœ‰<1E>æ ‡å¿—çš„æœºåéƒ½æœ‰èµ„æ ¼å‚åŠ ç«žé€‰ã€‚è‡³äºŽè¿™ä¸ªæ ‡å¿—æ˜¯æ€Žä¹ˆæ¥çš„,记ä½ä¸€å¥è¯ï¼šSERVER完全åŒæ„作为默认的候选æµè§ˆä¸»æŽ§æœåŠ¡å™¨ã€‚关于这å¥è¯çš„ç†è§£ï¼Œæˆ‘åŽé¢å°†æœ‰ä¸€é“题帮助大家认识它。 XIXI <03> UNIQUE Registered 咦?åˆä¸€ä¸ª<03>,这个XIXI是啥å东西?其实XIXI就是CJT的用户å了,就是那个登录æ示框里的东西。使我们除了通过对方的机器å以外还å¯ä»¥é€šè¿‡ä»–的用户å给对方å‘消æ¯ã€‚ä¸è¿‡è¦æ˜¯å’Œåˆ«äººçš„åå—å‘生了é‡å¤æ€Žä¹ˆåŠžï¼Ÿä¼šæŠ¥å†²çªå—? will not.å› ä¸ºè¿™ä¸ªXIXI<03>是我们在按了回车车键以åŽæ‰è¿›è¡Œæ³¨å†Œçš„。写到这里,ä¸ç¦å¯¹ä»¥å‰é‚£ä¸ªESC键的问题有所领悟, 原æ¥æ‰€è°“的登录网络就是干了这么一件事,那如果...如果...,ä¼ä¸æ˜¯...呵呵,æžä¸ªæµ‹ 试先。 MINEGROUP <1D> UNIQUE Registered 这个<1D>想æ¥å¤§å®¶éƒ½å·²ç»çŒœåˆ°äº†ï¼Œå°±æ˜¯è¡¨æ˜ŽCJT是MINEGROUP里的æµè§ˆä¸»æŽ§æœåŠ¡å™¨äº†ï¼Œå½““领导â€çš„感觉总是这么爽。嘻嘻 ..__MSBROWSE__.<01> GROUP Registered è§è¿‡è¿™ä¸ªæ€ªä¸œè¥¿çš„人肯定ä¸å°‘,但真æ£çŸ¥é“它用途的æ怕ä¸å¤šã€‚这是一个组å,由整个å网上的所有æµè§ˆä¸»æŽ§æœåŠ¡å™¨æž„æˆï¼Œè¿™æ ·å½“MINEGROUP里的机å想è¦æµè§ˆå…¶ä»–组的资æºæ—¶ï¼ŒCJTå°±å‡å€Ÿè¿™ä¸ªæ ‡è¯†ä¸ºå¤§å®¶æŸ¥æ‰¾é‚£ä¸ªç»„çš„æµè§ˆä¸»æŽ§æœåŠ¡å™¨ï¼Œä»Žè€Œä½¿æˆ‘们能获得该组的æµè§ˆåˆ—表。 åŸºæœ¬çš„ä¸€äº›æ ‡è¯†ç¬¦ç±»åž‹å°±ä»‹ç»å®Œäº†ï¼Œåªè¦æŽŒæ¡äº†è¿™äº›ï¼Œè§£å†³å¸¸è§çš„æµè§ˆå™¨æ•…障已是绰 绰有余了,通过åŽé¢çš„一é“ä¹ é¢˜å¤§å®¶å¯ä»¥å®žè·µæŽŒæ¡è¿™ç§æ–¹æ³•ã€‚对于还想进一æ¥äº†è§£æ›´å¤šæ ‡è¯†ç¬¦ç±»åž‹çš„åŒå¦å¯ä»¥ä½¿ç”¨net start命令获知其它的微软æœåŠ¡ï¼Œå¤§å¤šæ•°æœåŠ¡éƒ½æœ‰ä¸€ç§æ ‡è¯†ç¬¦ä¸Žå…¶ç›¸å¯¹åº”。 MAC Address = 00-88-CC-23-15-54 å‰é¢POPO曾说过,使用nbtstat -A IPå¯ä»¥èŽ·çŸ¥è¿œç¨‹ä¸»æœºçš„MAC,至于原ç†ï¼Œå°±æ˜¯æˆ‘们在这里最åŽè¦è¯´çš„NBT了。现在大家已ç»çŸ¥é“,NBT就是建立在TCP/IPä¼ é€å议之上的NETBIOS接å£ï¼Œæˆ‘们先将它与Nbf进行一番对比。Nbf指的是NETBIOS帧å议,以NetBEUI为基础,这å¯æ˜¯çœŸæ£çš„架构在链路层之上的å议哦,ä¸è¿‡ä¹Ÿå› 为它是在LLC上é¢ï¼Œæ‰€ä»¥æ— 法路由。åªæœ‰å€ŸåŠ©ä¸€äº›å¯è·¯ç”±å议(如IP或IPX)æ‰èƒ½å®žçŽ°è·¨å¹¿æ’域æµè§ˆå› 为TCP/IPå‘展最为迅速,最为普åŠï¼ŒNBT也æ‰å—到大家如æ¤çš„关注。 NBTæ供的æœåŠ¡å¯ä»¥åˆ†æˆä¸‰ç±»ï¼šå称æœåŠ¡ï¼ˆUDP137)ã€æ•°æ®æŠ¥æœåŠ¡ï¼ˆUDP138)和会è¯æœåŠ¡ï¼ˆTCP139)。 1)å称æœåŠ¡ä¸»è¦ç”¨äºŽå¹¿æ’解决本å网的NETBIOSåå’ŒIP地å€è½¬æ¢çš„关系,比如我å‰é¢é‚£ä¸ªping CJT的例åã€‚å› ä¸ºNBT是建立在TCP/IP之上,而建立TCP/IP通讯是必须知晓åŒæ–¹IP 地å€çš„,这跟Nbf直接用MAC地å€é€šè®¯å¾ˆä¸ä¸€æ ·ã€‚ä½†ä¹Ÿå› ä¸ºä½¿ç”¨çš„æ˜¯UDP广æ’,所以å称æœåŠ¡æ— 法跨越路由器。(这里我们åªé’ˆå¯¹b-节点,ä¸å¯¹WINSåŠ ä»¥ä»‹ç»ï¼‰ 2)数æ®æŠ¥æœåŠ¡æä¾›äº†æ— è¿žæŽ¥å’Œé¢å‘广æ’的通信方å¼ã€‚它主è¦ç”¨äºŽæµè§ˆåˆ—表通知,我å‰é¢ä¹Ÿè¯´è¿‡æˆ‘们桌é¢ä¸Šçš„那个网上邻居就是它构建的,æ¤å¤–我们用NET SEND *命令给计算机组å‘消æ¯æ—¶ä¹Ÿæ˜¯é 它的UDP广æ’(多æ’)能力。但也æ£å› 为它使用了UDPä¼ è¾“å±‚åè®®ï¼Œå› è€Œåœ¨è·¨è¶Šè·¯ç”±å™¨æ—¶ä¹Ÿä¼šé‡åˆ°ä¸Žå称æœåŠ¡ç›¸åŒçš„问题。 3)使用é¢å‘连接TCPå议的会è¯æœåŠ¡æ‰æ˜¯æˆ‘ä»¬çš„æ•‘æ˜Ÿï¼Œå› ä¸ºå®ƒå¯ä»¥è·¨è¶Šè·¯ç”±å™¨ã€‚网络ä¸äº§ç”Ÿçš„NETBIOS通信主è¦ä¹Ÿæ˜¯å› 为会è¯æœåŠ¡çš„使用,而文件和打å°æœºå…±äº«æœåŠ¡åˆ™æž„æˆäº†ä¼šè¯æœåŠ¡é€šä¿¡çš„主体。 说到这里就ä¸å¾—ä¸æSMB(Server Message Block),ä¸è¿‡è¦è®²æ¸…楚SMB,å¯èƒ½è¦ä»ŽNCBçš„ç”±æ¥è¯´èµ·ï¼Œé‚£å¯å°±åˆæ˜¯ä¸€ä¸ªé•¿ç¯‡äº†ã€‚这里我就教给那些还ä¸å¤ªæ˜Žç™½å®ƒä»¬ä¹‹é—´å…³ç³»çš„åŒå¦ä¸€ä¸ªç®€å•çš„办法,虽ä¸å¤ªå‡†ç¡®ï¼Œä½†æŒºå®žç”¨ï¼Œå¸Œæœ›æ¸…楚的åŒå¦åˆ«ç»™æˆ‘戴上误导群众的高帽哦:-)首先SMB是一ç§å议,一ç§â€œåº”用层â€çš„å议,一ç§åŸºäºŽSERVER/CLIENT架构的应用层å议,大家完全å¯ä»¥æŠŠå®ƒçœ‹æˆæ˜¯ä¸€ç§HTTP,FTP或是TEL NET è€Œæ·»åŠ äº†æ–‡ä»¶åŠæ‰“å°æœºå…±äº«æœåŠ¡çš„机å就是SERVER端,å¯ä»¥è¢«å…¶å®ƒå·¥ä½œç«™å’ŒæœåŠ¡å™¨è®¿é—®å¦‚æžœæ²¡æœ‰æ·»åŠ æ–‡ä»¶åŠæ‰“å°æœºå…±äº«æœåŠ¡ï¼Œåˆ™ä¸èƒ½è¢«å…¶ä»–机å访问。当然,SMB除了æ供文件åŠæ‰“å°æœºæœåŠ¡ä»¥å¤–,还å¯ä»¥è¿›è¡Œä¼šè¯æŽ§åˆ¶å’Œäº¤æ¢æ¶ˆæ¯ï¼Œå¦‚用net send命令å¯ç›´æŽ¥æŠŠä½¿ç”¨æ¶ˆæ¯ç±»åž‹çš„SMB包å‘ç»™ç‰¹å®šè®¡ç®—æœºã€‚è€Œä¸”å› ä¸ºä¼šè¯æœåŠ¡æ˜¯å»ºç«‹åœ¨TCP上的,åªè¦ä½ 能获知远程主机IP,就å¯ä»¥è·¨è¶Šè·¯ç”±å™¨ã€‚ 总算ä¸è´Ÿå¤§å®¶æ‰€æ‰˜ï¼Œåˆå‡‘了一篇,就ä¸çŸ¥å¤§å®¶çœ‹äº†ä»¥åŽæ˜¯ä¸æ˜¯å¤±æœ›å¤§äºŽæœŸæœ›å‘¢ï¼š-)原ç†çš„å¦ä¹ æ¯•ç«Ÿæ˜¯æž¯ç‡¥çš„ï¼Œä½†ä¹Ÿæ˜¯å¿…é¡»çš„ã€‚å› ä¸ºç¯‡å¹…å’Œæ°´å¹³æœ‰é™ï¼Œå¾ˆå¤šåœ°æ–¹çš„介ç»æˆ‘都简略了,å¯èƒ½æœ‰äº›åŒå¦è¯»èµ·æ¥ä¼šç¨æ„Ÿå›°éš¾ï¼Œåœ¨åŽé¢æˆ‘转了一些概念性的文档以帮助大家阅读。其实说å¥å®žè¯ï¼Œä¸Žå…¶çœ‹è¿™äº›ä¸œè¥¿å€’ä¸å¦‚找个netxrayæ¥ï¼Œäº²è‡ªæŠ“åŒ…çœ‹çœ‹åˆ°åº•åœ¨ä½ æ‰“å¼€ç½‘ä¸Šé‚»å±…ï¼Œå¼€å…³æœºï¼Œå…±äº«æ–‡ä»¶ï¼Œè¿›è¡Œåå—解æžï¼Œåå—注册时自己的机器干了些什么,远比我这东一å¥è¥¿ä¸€å¥çš„乱讲è¦å¼ºå¤šäº†ã€‚ 至于那些“æ»é€®ç€æˆ‘ä¸æ”¾â€çš„åŒå¦ï¼Œè¦çœ‹ä¸‹ä¸€ç¯‡ï¼Œåªå¥½å†ç‰ç‰äº†ã€‚ 我新è´çš„网å¡åœ¨ç”µè„‘ä¸Šæ— æ³•å®‰è£…ï¼Œè€Œåœ¨å…¶ä»–ç”µè„‘ä¸Šå´ä½¿ç”¨æ£å¸¸ï¼Œè¿™æ˜¯æ€Žä¹ˆå›žäº‹ï¼Ÿ ç”:如果在电脑ä¸å®‰è£…好网å¡åŽï¼Œç³»ç»Ÿæ²¡æœ‰æç¤ºæ‰¾åˆ°æ–°ç¡¬ä»¶ï¼Œä½ å¯è¿è¡Œâ€œæ·»åŠ 新硬件å‘导â€æ¥è®©ç³»ç»Ÿæœç´¢æ–°ç¡¬ä»¶ã€‚方法是å•å‡»â€œå¼€å§‹â€ï¼ŒæŒ‡å‘“设置â€ï¼Œå•å‡»â€œæŽ§åˆ¶é¢æ¿â€ï¼Œç„¶åŽå†åŒå‡»â€œæ·»åŠ 新硬件â€ã€‚按照å±å¹•æ示æ“ä½œã€‚ä½ å¯é€‰â€œè®©Windowsæœç´¢æ–°ç¡¬ä»¶å—?â€ï¼Œå•å‡»â€œæ˜¯ï¼ˆæŽ¨è)â€ï¼Œç„¶åŽå†å•å‡»â€œä¸‹ä¸€æ¥â€ï¼Œè®©ç³»ç»Ÿæ‰¾åˆ°ç½‘å¡å†å®‰è£…其驱动。 而如果出现以下任何现象,网å¡æˆ–者网å¡æ‰€åœ¨çš„æ’槽æŸå: 1ã€â€œæ·»åŠ 新硬件å‘导â€æ£€æµ‹ä¸åˆ°ç½‘å¡ï¼› 2ã€â€œæ·»åŠ 新硬件å‘导â€èƒ½å¤Ÿæ£€æµ‹åˆ°ç½‘å¡ï¼Œä½†æ— 法æ£å¸¸å·¥ä½œã€‚ 为了确定到底是网å¡è¿˜æ˜¯æ’槽的问题,å¯ä»¥æ£€æŸ¥ç½‘å¡æ˜¯å¦ç‰¢é æ’å…¥æ’槽之ä¸ã€‚如果网å¡å·²ç‰¢é æ’å…¥æ’槽之ä¸ï¼Œè¯·æ”¹æ’到其他æ’槽之ä¸è¯•è¯•ã€‚如果问题ä»æœªè§£å†³ï¼Œåˆ™å¯èƒ½æ˜¯ç½‘å¡æŸåæˆ–ä¸Žä½ çš„ç”µè„‘ä¸å…¼å®¹ï¼Œå¯æ›´æ¢ä¹‹ã€‚ 问:我访问局域网ä¸çš„计算机时,为什么常常被æ示è¦è¾“入用户å和密ç ? ç”:这主è¦æ˜¯ä¸ºäº†å®‰å…¨æ–¹é¢çš„è€ƒè™‘ã€‚è€Œä¸”å½“ä½ é‡æ–°å¯åŠ¨è®¡ç®—机时åˆè¦é‡æ–°è¾“入用户å和密ç ,这一点确实让人会觉得很麻烦。 ä½ åªè¦åœ¨éœ€è¦è¿›è¡Œæ–‡ä»¶å…±äº«çš„计算机上建立一个相åŒçš„用户å,并且使用相åŒçš„密ç ,然åŽå±€åŸŸç½‘ä¸çš„计算机都利用这个用户å和密ç ç™»å½•ï¼Œè¿™æ ·åœ¨ç½‘ä¸Šé‚»å±…ä¸è®¿é—®å¯¹æ–¹è®¡ç®—机时就ä¸éœ€è¦è¾“入用户å和密ç 了。 笑解局域网故障 1ã€å››å°æœºå™¨é€šè¿‡ä¸€å…«å£HUB连到CISCO1900交æ¢æœºï¼Œè¿žç½‘速度严é‡å˜æ…¢ï¼ŒæŸ¥ç½‘线æ£å¸¸ï¼Œåˆ¤æ–å››å—网å¡åŒæ—¶æ•…éšœå¯èƒ½æ€§ä¸å˜åœ¨ï¼Œ HUBç»éªŒè¯ä¹Ÿæ£å¸¸ï¼ŒåŽæ£€æŸ¥äº¤æ¢æœºå‘现连接该HUB的端å£è¢«è®¾ä¸ºåŒå·¥ï¼Œæ”¹ä¸ºå•å·¥åŽç½‘络æ¢å¤æ£å¸¸ã€‚这里应注æ„:连到HUB的端å£ä¸èƒ½è®¾ä¸ºåŒå·¥ï¼ 2ã€ä¸€å°æœºå™¨ï¼Œæ‚牌8139网å¡ï¼Œä»¥60米网线连于集线器,使用ä¸çªç„¶ä¸èƒ½ä¸Šç½‘,集线器指示ç¯äº¦ç†„ç,用网线测试仪测试网线æ£å¸¸ï¼Œæ£€æŸ¥ç³»ç»Ÿï¼Œç½‘å¡ä¹Ÿæ£å¸¸å·¥ä½œï¼Œé‡åšæ°´æ™¶å¤´åŽæ•…éšœä¾æ—§ï¼Œæ€€ç–‘网å¡é©±åŠ¨èƒ½åŠ›ä¸‹é™ï¼Œå‡†å¤‡æ›´æ¢ç½‘å¡ã€‚抱ç€è¯•è¯•çœ‹çš„想法关掉接线æ¿ç”µæºï¼Œé‡æ–°å¼€æœºåŽå´å‘现网络已连通。å¯è§æ•…障是网å¡å·¥ä½œä¸ç¨³å®šé€ æˆã€‚ 3ã€ä¸€å°æœºå™¨ï¼ŒD-LINK530TX网å¡ï¼Œè¿žäºŽ100M交æ¢æœºï¼ŒWINXPæ“ä½œç³»ç»Ÿï¼ŒåŠ å…¥WIN2000域,登录速度éžå¸¸æ…¢ï¼Œç™»å½•åŽç½‘ç»œè®¿é—®é€Ÿåº¦è®©äººæ— æ³•å®¹å¿ï¼Œæµ‹è¯•ç½‘线100M通è”æ£å¸¸ï¼Œæ€€ç–‘ä¸ºè½¯ä»¶åŽŸå› ï¼ŒäºŽæ˜¯é‡è£…网å¡é©±åŠ¨ï¼Œæ— 效,试替æ¢ç½‘å¡ï¼Œç½‘络访问速度立å³æ¢å¤æ£å¸¸ã€‚我们在分æžå±€åŸŸç½‘æ•…éšœåŽŸå› æ—¶ï¼Œä¸èƒ½æƒ³å½“然认为åªè¦èƒ½ä¸Šç½‘,网å¡å°±æ²¡é—®é¢˜ï¼Œæœ¬ä¾‹è¿™ä¸€æ•…障现象笔者已碰到多次,确为网å¡åŽŸå› 。 å¦‚ä½•åˆ©ç”¨ç©ºé—²çš„ç½‘ç»œç«¯å£ é—®:å¦æ ¡çš„教室里有很多空闲的网络端å£ï¼Œè™½ç„¶æˆ‘带ç€ç¬”记本电脑,但是ä¸çŸ¥é“它们是å¦èƒ½å¤Ÿè¿žæŽ¥åˆ°äº¤æ¢æœºï¼Œå¹¶ä¸”ä¸æ¸…楚IP地å€ï¼ˆæˆ‘们使用的是é™æ€IP)ã€å网掩ç ã€é»˜è®¤ç½‘å…³ã€DNSç‰ä¿¡æ¯ã€‚该用什么方法连通网络呢? ç”:å¯ä»¥é€šè¿‡ä»¥ä¸‹æ–¹å¼æµ‹è¯•ç«¯å£ï¼Œä»¥ä¾¿è¿žé€šç½‘络。 1.将笔记本电脑接入空闲端å£ï¼Œå¦‚果笔记本电脑网å¡çš„指示ç¯å¼€å§‹é—ªçƒï¼Œè¯´æ˜Žå·²ç»è¿žæŽ¥åˆ°å±€åŸŸç½‘。如果网å¡çš„ä¿¡å·æŒ‡ç¤ºç¯ä¸äº®ï¼Œè¯´æ˜Žè¯¥ç«¯å£æ²¡æœ‰ä»Žé…线架连接交æ¢æœºï¼Œæ— 法接入网络。 2.如果网络规模较å°ï¼Œå¯èƒ½æ²¡æœ‰åˆ’分VLANã€‚è¿™æ ·ï¼Œç½‘ç»œå†…ä»»ä½•è®¡ç®—æœºçš„IP地å€ä¿¡æ¯å®Œå…¨ç›¸åŒï¼ŒæŸ¥çœ‹ä¸€ä¸‹å…¶ä»–计算机的IP地å€ä¿¡æ¯ï¼Œå†ä¸ºè‡ªå·±çš„计算机进行设置。需è¦æ³¨æ„的是,å网掩ç ã€é»˜è®¤ç½‘å…³ã€DNS应当与其他计算机相åŒï¼Œè€ŒIP地å€åº”当与其他计算机ä¸åŒã€‚å¦å¤–,一些ä¸å¤ªâ€œå‰åˆ©â€çš„IP地å€å¯èƒ½è¢«ç©ºå‡ºä¸ç”¨ï¼Œæ‰€ä»¥ï¼Œä¸å¦¨é€‰å‡ºæ¥è¯•è¯•ã€‚ 3.如果网络规模较大,å¯èƒ½ä¼šåˆ’分VLAN。 VLAN的划分是有规律的,通常是按照部门æ¥åˆ’åˆ†çš„ã€‚å› æ¤ï¼Œå¯ä»¥æ ¹æ®ç«¯å£çš„ä½ç½®åˆ¤æ–其所在的VLAN。åŒä¸€VLAN内的å网掩ç ã€é»˜è®¤ç½‘å…³ã€DNSä¿¡æ¯æ˜¯ç›¸åŒçš„。å¯ä»¥æŸ¥çœ‹ä¸€ä¸‹ç›¸é‚»è®¡ç®—机的IP地å€ä¿¡æ¯ï¼Œç„¶åŽå°è¯•è®¾ç½®ã€‚ 4.如果网络采用动æ€IP地å€åˆ†é…,则åªé¡»å°†è®¡ç®—机设置为“自动获å–IP地å€â€å³å¯ã€‚ æ醒大家:IP地å€ç”±ç½‘络ä¸å¿ƒç»Ÿä¸€ç®¡ç†ï¼Œç§è‡ªè®¾ç½®IP地å€å¾ˆæœ‰å¯èƒ½ä¼šå¯¼è‡´IP地å€å†²çªï¼Œé€ æˆç½‘络通讯和网络æœåŠ¡çš„ä¸æ–。 网段ä¸åŒï¼Œèƒ½äº’访æœåŠ¡å™¨å— 问:一å°æœåŠ¡å™¨å®‰è£…了Windows 2000系统并设置为WebæœåŠ¡å™¨å’ŒFTPæœåŠ¡å™¨ï¼ŒåŒä¸€ç½‘段的计算机就å¯ä»¥è®¿é—®è¿™å°æœåŠ¡å™¨ã€‚是å¦æœ‰æ–¹æ³•å¯ä»¥è®©ä¸åŒç½‘段的计算机也å¯ä»¥è®¿é—®WebæœåŠ¡å™¨å’ŒFTPæœåŠ¡å™¨å‘¢ï¼Ÿ ç”:å¯ä»¥æ ¹æ®ä¸åŒæƒ…况分别处ç†ï¼š 1.如果所有的计算机都ä½äºŽåŒä¸€ç½‘络,仅仅是划分了ä¸åŒçš„IP地å€ï¼Œé‚£ä¹ˆï¼Œä»…为该æœåŠ¡å™¨æŒ‡å®šä¸åŒç½‘段的IP地å€å³å¯ã€‚ 2.如果ä¸åŒç½‘段的计算机ä½äºŽä¸åŒçš„网络(VLAN),那么,åªè¦ä¸åŒç½‘络之间能够相互通讯,就å¯ä»¥å®žçŽ°å¯¹WebæœåŠ¡å™¨å’ŒFTPæœåŠ¡å™¨çš„访问。ä¸åŒç½‘络之间å¯ä»¥å€ŸåŠ©äºŽç½‘桥和三层设备(三层交æ¢æœºæˆ–路由器)实现通讯。 3.如果ä¸åŒç½‘段之间ä¸èƒ½è¿›è¡Œé€šè®¯ï¼Œå¯ä»¥åœ¨æœåŠ¡å™¨ä¸Šå†å®‰è£…å‡ å—网å¡ï¼Œåˆ†åˆ«è¿žæŽ¥è‡³ä¸åŒçš„网络,分别指定相应网络的IP地å€ä¿¡æ¯ï¼Œä½†é»˜è®¤ç½‘å…³åªèƒ½è®¾ç½®ä¸€ä¸ªã€‚ Failure phenomenon: 一日在上网的过程ä¸æˆ‘æŽ¥è¿žæ‰“å¼€äº†å‡ ä¸ªç½‘é¡µï¼Œç”±äºŽç½‘é¡µä¸Šæœ‰å›¾ç‰‡ï¼Œä¸‹è½½çš„é€Ÿåº¦æ¯”è¾ƒæ…¢ï¼Œæˆ‘äºŽæ˜¯åˆåŒæ—¶æ‰“开了Foxmail邮件客户端æ¥æŽ¥æ”¶é‚®ä»¶ï¼Œè¿™æ—¶æˆ‘å‘现网络忽然åœæ»žäº†ä¸‹æ¥ï¼Œä¸ä½†ç»å¸¸è¿žæŽ¥çš„邮件æœåŠ¡å™¨è¿žä¸é€šï¼Œè€Œä¸”所有的网页下载都åŒæ—¶åœæ¢äº†å“应,我的上网主机陷入了瘫痪状æ€ã€‚ Processing process: 二ã€è€ŒåŽæˆ‘怀疑是局域网出了问题。é‡å¯ç³»ç»Ÿä»¥åŽï¼Œä¾æ¬¡ç‚¹å‡»ç³»ç»Ÿèœå•ä¸çš„“开始——è¿è¡Œâ€ï¼Œåœ¨å¼¹å‡ºçš„对è¯æ¡†ä¸è¾“å…¥CMD并回车,进入DOS命令行窗å£ï¼Œæ•²å…¥â€œping 网关IP 地å€â€ï¼Œç³»ç»Ÿå“应“Request TIme Outâ€ï¼Œçœ‹æ¥é—®é¢˜æ˜¯ç”±ç½‘络本身所引起的。通过询问公å¸åŒäº‹èŽ·çŸ¥ï¼Œä»–们的上网一切æ£å¸¸ã€‚于是å¯ä»¥ç¡®å®šé—®é¢˜ä¸åœ¨å±€åŸŸç½‘,而是出在本机自身的网络部分。 三ã€é¦–先考虑到的当然是相对脆弱的网线了。但是当我用“替æ¢æ³•â€å°†æœ¬æœºçš„网线拔下,æ’入到局域网ä¸å¦å¤–一å°åŒæ ·é…置的主机上时,其网络的速度å´è¿ä½œå¦‚飞,于是就å¯ä»¥æŽ’除网线自身质é‡åŽŸå› æ‰€é€ æˆçš„问题。 å››ã€æœ€åŽçš„目光åªèƒ½èšé›†åœ¨è¿™å°ä¸»æœºçš„内置网å¡ä¸Šäº†ã€‚这个集æˆåœ¨ä¸»æ¿ä¸Šçš„网å¡ï¼Œæœ€è¿‘å› ä¸ºç½‘ç»œçš„è°ƒæ•´è€Œç»å¸¸è¿›è¡Œç½‘线的拔æ’,是å¦æ˜¯å› 为接å£éƒ¨åˆ†æŽ¥è§¦ä¸è‰¯æˆ–是网å¡çš„固定部分å‘生了æ¾åŠ¨æ‰€é€ æˆçš„呢?我于是å†æ¬¡å…³é—了主机,打开机箱的é¢æ¿ï¼Œæ‰¾åˆ°å†…置网å¡çš„所在,用手将其é‡æ–°å›ºå®šæ ¡æ£ã€‚而åŽå†æ¬¡å¯åŠ¨ç³»ç»Ÿï¼Œæ‰“å¼€æµè§ˆå™¨ï¼Œå‘µï¼ä¸Šç½‘速度æ¢å¤å¦‚åˆã€‚为了确ä¿ç½‘络故障ä¸å†é‡æ¼”,我åˆé‡å¤äº†ä¸€ä¸‹å¼•å‘网络故障的上述æ“作,网络ä»ç„¶èƒ½å¤Ÿä¿æŒç•…通。这就è¯æ˜Žäº†é—®é¢˜çš„罪é祸首是出在主æ¿çš„内置网å¡ä¸Šäº† 一ã€å½“整个网络都ä¸é€šæ—¶ï¼Œå¯èƒ½æ˜¯äº¤æ¢æœºæˆ–集线器的问题,è¦çœ‹äº¤æ¢æœºæˆ–集线器是å¦åœ¨æ£å¸¸å·¥ä½œã€‚ 二ã€åªæœ‰ä¸€å°ç”µè„‘网络ä¸é€šï¼Œå³æ‰“开这å°ç”µè„‘的“网络邻居â€æ—¶åªèƒ½çœ‹åˆ°æœ¬åœ°è®¡ç®—机,而看ä¸åˆ°å…¶å®ƒè®¡ç®—机,å¯èƒ½æ˜¯ç½‘å¡å’Œäº¤æ¢æœºçš„连接有问题,那么我们首先è¦çœ‹ä¸€ä¸‹RJ-45水晶头是ä¸æ˜¯æŽ¥è§¦ä¸è‰¯ã€‚然åŽå†ç”¨æµ‹çº¿ä»ªï¼Œæµ‹è¯•ä¸€ä¸‹çº¿è·¯æ˜¯å¦æ–裂。最åŽè¦æ£€æŸ¥ä¸€ä¸‹äº¤æ¢æœºä¸Šçš„端å£æ˜¯å¦æ£å¸¸å·¥ä½œã€‚ 三ã€åœ¨â€œç½‘络邻居â€ä¸ä¸èƒ½çœ‹åˆ°æœ¬åœ°è®¡ç®—机,或打开“开始/è¿è¡Œâ€ä¸ç”¨â€œPINGâ€å‘½ä»¤ï¼Œâ€œPINGâ€æœ¬åœ°è®¡ç®—机的IP地å€ä¸é€šæ—¶ï¼Œè¯´æ˜Žä½ 的网络设置有问题,那么首先想到的应该是网å¡ï¼Œæˆ‘们å¯ä»¥æ‰“开“控制é¢æ¿/系统/设备管ç†/网络适é…器â€è®¾ç½®çª—å£ï¼Œåœ¨è¯¥çª—å£ä¸æ£€æŸ¥ä¸€ä¸‹æœ‰æ— ä¸æ–å·åŠI/O地å€å†²çªï¼Œä¸€èˆ¬æƒ…况下NE2000系列的网å¡ä¸ºIRQ3,8029芯片的网å¡ä¸ºIRQ10。如å‘现网å¡æ²¡æœ‰å†²çªï¼Œä¸‹ä¸€æ¥å°±è¦æ£€æŸ¥é©±åŠ¨ç¨‹åºæ˜¯å¦å®Œå¥½ï¼Œç„¶åŽé‡æ–°å®‰è£…网å¡çš„驱动程åºã€‚ å››ã€åœ¨â€œç½‘络邻居â€ä¸èƒ½çœ‹åˆ°ç½‘络ä¸å…¶å®ƒçš„è®¡ç®—æœºï¼Œä½†ä½ ä¸èƒ½å¯¹å®ƒä»¬è¿›è¡Œè®¿é—®ï¼Œé‚£ä¹ˆå¯èƒ½æ˜¯ä½ 的网络åè®®è®¾ç½®æœ‰é—®é¢˜ã€‚æŠŠä½ ä»¥å‰çš„网络åè®®åˆ é™¤åŽï¼Œå†é‡æ–°å®‰è£…,并é‡æ–°è®¾ç½®ã€‚ 问题1:逮æ•ç‰©ç†å±‚的滥用者 问题2:快速以太网比å‡çº§å‰çš„以太网还慢 问题4:åˆèŠé“¾æ•ˆåº”
Fiber Optical Distribution Box(Metal) Fiber Optic Distribution Box is specially designed for FTTH or FTTB for Indoor/Outdoor application. It is can manage single,ribbon & bundle fiber cables. It consists of splicing, distribution and panel with ensures the excess fiber cords and pigtails in good order, no interval and easy for management and operation. It offers mufti-functions of distribution management.
Indoor Fiber Optical Distribution Box(Metal) Indoor Fiber Optical Distribution Box(Metal),Fiber Optic Distribution Cabinet,Metal Electrical Boxes,Metal Equipment Cabinet Sijee Optical Communication Technology Co.,Ltd , https://www.sijee-optical.com
1. Sheep lice appear on the sheep-the network card is not obedient [Fault phenomenon] A PCI network card can automatically install the driver under Windows, and the network protocol and related parameters have been correctly configured, but the network always appears when in use. When the time is bad, this problem still exists after replacing other network cards; and this network card is normal on other computers.
[Analysis and Solution] First, make sure that the driver of the network card is correct. It is best to use the driver provided with the network card, or download the corresponding driver to the driver home (http: //) according to the model of the network card. If there is no driver, you can try the installation according to the manufacturer of the main chip on the network card.
After the network card driver installation is complete, enter the "Control Panel → System" window, then you should see the currently installed network card under the "Device Manager", if there is a circled yellow "!" Icon in front of the network card, it means The network card has been installed in the system, but it conflicts with other hardware. At this time, there are two solutions: one is to delete or temporarily disable another device (such as a sound card) that conflicts with the network card, and then restart to try to solve the problem. If it can be solved, then reinstall the sound card driver or change the interrupt number of the sound card Make the two no longer conflict; another method is to delete the driver of the network card and then reinstall, if necessary, adjust the interrupt number occupied by the network card until the conflict no longer occurs.
If there is a resource conflict, the device that conflicts with the network card and the conflicting interrupt number or input and output address will be given in the "Conflict Device List" on the "Resources" tab, and then the resource allocation must be performed manually. For example, the interrupt address used by some early network cards is "3", which will conflict with the COM2 serial port. If your COM2 serial port is idle, you can turn it off in "Communication Port → Properties"; or in the CMOS settings, set " Onboard UART Port "is set to" Disable "to close the COM2 serial port, thus giving the interrupt address" 3 "to the network card. Some PCI network cards use the interrupt address "10", which conflicts with some graphics cards. You can set "Assign IRQ For VGA" to "Disable" in the BIOS without assigning a fixed interrupt to the graphics card.
[Alternative network card failure] In the device manager, you can see a yellow exclamation mark next to the network card model. Obviously the driver installation was unsuccessful, but the correct driver was installed N times. Guess what? Later it was found that the network card was loose.
2. The big environment is not good [Fault phenomenon] Computer connection and sharing in the local area network are normal. It is also normal to copy a few megabytes or tens of megabytes of files in this network, but once you copy hundreds of megabytes of files, it will The prompt "Insufficient network resources" appears, and then I can no longer find "My Network Places".
[Analysis and Solution] Since the computer connection and sharing are normal, it means that there is no problem with the network connection, network protocol and software settings. However, because a large amount of data needs to be read frequently, this requires a relatively stable transmission environment. If there is interference in the entire network line, this stable environment will be destroyed and a network failure will occur. However, network equipment such as hubs, routers, and switches are not very sensitive to external interference, so the largest interference may occur on the network card or network link.
For the network card, if the structure inside the chassis is relatively compact, installing the network card in the slot next to the graphics card, sound card and other cards may cause the electromagnetic waves between these cards to interfere with each other, resulting in the appearance of large files when copying Error message. The solution is to unplug the network card after turning off the computer and reinsert it in a slot farther away from the graphics card or sound card.
For network cables, it is recommended that you choose shielded cables, because they usually have shielded anti-interference layer protection to prevent external electromagnetic wave interference. Currently, the five types of cables on the market or super five types of cables are basically all It is a shielded cable. In addition, it is recommended that you do not place TVs, stereos, and other electrical appliances near computers, network cables, and hubs.
3. Ping you to Ping for thousands of times-unsuccessful [fault phenomenon] There are two computers in the local area network can be connected to other computers and use the resources of the other computer, but the two computers can not be pinged.
[Analysis and Solution] Since it can be connected to other computers, it means that there is no problem in network connection and network protocol, so it is mainly considered from the aspect of software attribute setting. Because the Ping program uses the ICMP protocol, most of these failures occur when the firewall software is installed on the opposite computer and the ICMP protocol is blocked. So you need to check the computer's firewall software settings to see if the ICMP protocol is blocked.
4. Can't see me and you [Fault Symptom] After opening "My Network Places", I can only view some computers, but I can't see some computers in the LAN, or even my own computer. What's wrong?
ã€Analysis and Solution】 Under the premise that the local area network is unblocked, whether it is not possible to view the machine or other computers on the network, it is due to the failure to install the file and print sharing service in the computer that cannot be viewed.
When installing file and print services, double-click the "Network" icon in the control panel, click the "Add" button in the pop-up window, select the "Services" item, and select "Microsoft Network Files" in the "Network Services" window Share with printer ". After completion, select "File and Print Sharing" in the "Network" property window, and then check the "Allow other users to access my files" check box. After installing the file and print sharing service, you need to restart the computer.
In addition, if the computer workgroup setting in the LAN is wrong, it may not be directly viewable in a workgroup. For example, the workgroup of most computers is set to "office", but the workgroup of several computers is set to "office1", so that when the "office" workgroup is opened, the computers in the "office1" workgroup cannot be viewed, so The name of the working group needs to be unified. When you change the workgroup name, you can click the "Identity" tab in the "Network" property window, and set the computer name and workgroup name respectively. In order to distinguish the computers in the local area network, it is recommended to name each computer according to the user's name.
Step two in half: determine whether the problem with this machine is not Internet access is generally caused by the failure of this machine, sometimes it may be due to a problem with the switching equipment or proxy server on the campus network. The easy way to determine if there is a problem with this machine is to ask the network administrator and other colleagues whether they can go online. If it is judged as a local problem, go to step 3.
Step three in half: determine whether it is a security setting problem or a network card setting problem, execute the "ping" command, and if the data packet sent is answered (the return on the screen is "reply from 10.91.20.1:bytes=32 TIme <10ms ttl = 128" Class information>, the problem should be in the corresponding security settings of the machine. Of course, these security settings are not artificially changed in many cases, but caused by misoperation or viruses. In this case, if it is a Windows 98 system , Just reinstall IE; if it is a Windows 2000 system, you should also take a look at the IP security related settings to determine whether there is a port address shielding, etc. If you can access the Internet, but many websites can not go in, or the e-mail can not log in, you must It is because IE has been modified, and reinstalling IE can solve it. If there is no response after sending the data packet, the problem should be related to the settings of the local network card. If it is determined to be a problem related to the network card, please go to step 4.
Step 4: Determine whether there is a problem with the network card driver installation or the IP-related property settings are incorrect. Run the "ping 127.0.0.1" command to determine whether there is a response packet. If there is, and you can see yourself in the network neighborhood, the network card driver is generally no problem. The focus of the problem should be on the network card's IP attribute settings. If the computer in the LAN is set to "Obtain an IP address automatically", check the WINS configuration tab and note whether the "Use DHCP for WINS resolution" item is selected. If not, select it. If the TCP / IP setting of the computer in the local area network is "specified IP address", the focus of the check is on the IP address, subnet mask, DNS, gateway, and WINS related settings. These contents are related to the LAN configuration of the unit, please be flexible. If ping 127.0.0.1 does not respond, then there must be a problem with the network card driver installation. Reinstall and configure accordingly.
There is also a special case. You can ping yourself with the ping command, but your network neighbors ca n’t see any computers. There is no problem in checking the TCP / IP configuration, but you ca n’t go online. Most of these problems are caused by computer viruses, antivirus and reinstall the network card driver can solve the problem. The author has encountered several cases of this phenomenon, and all methods have been successfully resolved.
Because the specific configuration of different LANs is different, please deal with related issues flexibly.
When the network fails, the first thing you think of is to enter some related commands in the command prompt, such as ping to diagnose? In fact, in Windows XP, you can use "Help and Support" to complete all network diagnosis easily and quickly!
Calm the broadcast storm caused by the loop
One is Bit? Bit ?, and the other is Byte? Byte ?. There are usually 8 Bits in 1 Byte. The network bandwidth is usually measured in bps (nominal bit / s), that is, "Bits-Per-Second (the number of bits per second, which is usually translated into baud rate)", and many of the download tool software measurement units It is Byte / s, so the difference between the two is 8 times.
Question: Seven users are connected through the switch and are ready to use the routing function of the ADSL Modem to achieve Internet connection sharing. ISP provides a fixed IP address, and binds the MAC address of the network card, you can access the Internet after booting, instead of using virtual dialing. Excuse me, how should I configure this ADSL Modem to achieve Internet connection sharing?
I originally wanted to write this series in the form of question and answer in order to increase readability, but I couldn't compile so many questions in my head at the moment. I still gave a brief introduction to Microsoft's browsing service step by step and then analyzed it in depth The specific working mechanism of NETBIOS, if you have any questions, you can ask us to discuss together.
CJT <00> UNIQUE Registered
CJT<00>代表工作站æœåŠ¡ï¼Œæ¯ä¸€å°ä¸Šç½‘çš„è®¡ç®—æœºå¿…é¡»é¦–å…ˆæ³¨å†Œçš„å”¯ä¸€æ ‡è¯†ç¬¦ï¼Œè¿™ä¹Ÿæ˜¯è¿›è¡Œç½‘ç»œé‚»å±…æµè§ˆçš„唯一必è¦æ¡ä»¶ã€‚在åŒä¸€å网上的其它机åå¯ä»¥ç”¨ping CJT得到我的IP,注æ„è¿™å¯è·ŸDNS没有关系,是通过广æ’查询CJT<00>å¾—åˆ°çš„ï¼Œå› ä¸ºTCP/IPå’ŒNETBIOS有绑定。
一ã€æˆ‘的第一å应是主机的病毒å‘作或是ä¸äº†ç½‘页木马。于是立å³å…³é—了所有的应用程åºï¼Œå…³é—了Windows2000æ“作系统,用干净的引导软盘å¯åŠ¨ç³»ç»ŸåŽï¼Œè¿…é€ŸåŠ è½½é˜²ç—…æ¯’é˜²æœ¨é©¬ç¨‹åºå¯¹ç³»ç»Ÿè¿›è¡Œä¸€æ¬¡å…¨é¢çš„清剿。这一过程足足耗时40多分钟,结果å´ä¸€æ— 所获。
网络ç»å¸¸ä¼šå‡ºçŽ°æ•…障,就如人会ç»å¸¸ç”Ÿç—…ä¸€æ ·ï¼Œåœ¨å‡ºçŽ°ç½‘ç»œé—®é¢˜ä¹‹åŽï¼Œæœ€é‡è¦çš„是ä¸è¦ç€æ€¥ï¼Œå¤´è„‘è¦ä¿æŒæ¸…é†’ã€‚æŸ¥æ¸…é—®é¢˜å‡ºåœ¨å“ªé‡Œï¼Œä¸€èˆ¬æœ‰ä»¥ä¸‹å‡ ç§æƒ…况:
-用户抱怨-ä¸èƒ½ç™»é™†æˆ–æ—¶æ–æ—¶ç»
-症状-åªå½±å“一个工作站,而该站原先没有问题
-查找问题:
电缆终端链路太长。用户æ¯å¤©éƒ½ç§»åŠ¨ï¼Œå¼¯æ›²ï¼Œè¿žæŽ¥å’Œåˆ‡æ–网络终端(尤其时è†ä¸Šåž‹ç¬”记本电脑)。廉价的电缆测试仪就能检查这ç§é—®é¢˜ã€‚åœ¨ä½ èƒ½ç¡®åˆ‡åœ°è¯´æ˜¯ç”µç¼†çš„é—®é¢˜ä¹‹å‰ï¼Œé€šå¸¸é¦–先考虑ä¸æ˜¯ç”µç¼†çš„问题。这需è¦ä½¿ç”¨ç½‘络测试工具æ¥è¯æ˜Žæœ¬åœ°ç½‘段的å¥åº·çŠ¶å†µæ˜¯å¦è‰¯å¥½ï¼Œé›†çº¿å™¨ç«¯å£åŠŸèƒ½æ˜¯å¦æ£å¸¸ï¼Œç½‘å¡åŠå…¶é©±åŠ¨ç¨‹åºå·¥ä½œæ˜¯å¦è‰¯å¥½ã€‚最åŽï¼Œæ£€æŸ¥ç½‘络互连设备是å¦æœ‰é—®é¢˜ã€‚åªæœ‰æ¤æ—¶ï¼Œä½ æ‰ä¼šçŸ¥é“为了å¤ç«‹æœ‰é—®é¢˜çš„终端,æ–开的连接器或是接地回路ç‰é—®é¢˜è¯¥ä»Žä½•å¤„ç€æ‰‹æµ‹è¯•ç”µç¼†ã€‚在铜轴线网络ä¸ï¼Œæœå¯»åœ¨åŒè½´â€œT型头â€å’Œç½‘å¡ä¹‹é—´çš„æ–头,在UTP网络ä¸ï¼Œè¿žç»è¿è¡Œä»ªå™¨å›¾æµ‹è¯•åŠŸèƒ½ï¼Œä¸æ–æ‰åŠ¨ç»ˆç«¯ä»¥è¯†åˆ«æŽ¥è§¦ä¸è‰¯æˆ–çŸè·¯ã€‚
-解决问题:
æ›´æ¢å·¥ä½œç«™è¿žæŽ¥ç”µç¼†ï¼Œæ›´æ¢æŸå的连接器,或者必è¦çš„è¯åœæ¢ä½¿ç”¨æ°´å¹³ç”µç¼†ã€‚å†æ¬¡å…¨é¢æ£€æŸ¥å¤„ç†è¿‡çš„电缆。
-用户抱怨-10Mbps的以太网速度慢,å‡çº§ä¸º100Mbps快速以太网åŽç”šè‡³ä¸èƒ½è¿žæŽ¥ä¸Šç½‘。
-症状-å½±å“新工作站或å‡çº§çš„工作站连接上网。
-查找问题:
对于UTP5ç±»éžå±è”½åŒç»žçº¿ï¼Œç”¨ç”µç¼†æµ‹è¯•ä»ªæµ‹è¯•å…¶æ˜¯å¦ç¬¦åˆå¯¹åº”100Mbpsä¼ è¾“é€ŸçŽ‡çš„EIA/TIA-TSB67æ ‡å‡†ã€‚æŸäº›åœ¨10Mbps以太网工作æ£å¸¸çš„ç”µç¼†é“¾è·¯å› ä¸ºè¿‘ç«¯ä¸²æ‰°å¤ªå¤§åœ¨100Mbps以太网就ä¸èƒ½æ£å¸¸å·¥ä½œã€‚ä¿¡å·è€¦åˆåˆ°é‚»è¿‘线对引起高频信å·ä¼ 输失败。将UTP的线对分开甚至会使网络在达到一定æµé‡æ—¶ç˜«ç—ªã€‚
-解决问题:
æ›´æ¢æˆ–åœç”¨ä¸èƒ½è¿žæŽ¥çš„链路,故障清除åŽå†å…¨éƒ¨æµ‹è¯•å¤„置过的链路。
问题3:æ— æ•ˆçš„çœ‹é—¨ç‹—
-用户抱怨-ä¸èƒ½è¿žæŽ¥Novell网络的Netware远程æœåŠ¡å™¨
-症状-å½±å“本网段内与æœåŠ¡å™¨ç›¸è¿žçš„所有工作站ï¼æŸ¥æ‰¾é—®é¢˜ï¼š
检查网段的å¥åº·çŠ¶å†µï¼Œæ³¨æ„观察其利用率,碰撞,错误帧和广æ’帧水平。æ¤æ—¶å¯è§‚察到大é‡çš„碰撞或错误帧,该碰撞或错误帧å¯å¼•èµ·å®¢æˆ·æœºå’ŒæœåŠ¡å™¨ä¹‹é—´â€œHelloâ€å¸§å‡ºçŽ°å»¶è¿Ÿã€‚å†æŸä»ªæŒ‡å®šçš„æœåŠ¡å™¨æ‰€å†çš„远端网段é‡å¤æ¤æµ‹è¯•ã€‚如果两个网段都出现空白,用网络测试仪å‘路由器ä¸çš„SNMP代ç†æŸ¥è¯¢ï¼Œæ£€æŸ¥ä¸¤ä¸ªç½‘段之间的路由表。确定该路径ä¸å˜åœ¨æ‹¥æŒ¤é—®é¢˜ã€‚为了有效地使用资æºï¼Œåœ¨çœ‹é—¨ç‹—å…许地时间内如果客户机对“Helloâ€å¸§æ— å应,则NovellæœåŠ¡å™¨ä¼šå°†è¯¥å®¢æˆ·æœºæ³¨é”€ã€‚
-解决问题:
简便地方法时改å˜çœ‹é—¨ç‹—时延地å‚数,将NovellæœåŠ¡å™¨ä¸çš„该å‚数改大。如果情况有所改善,则å¯ç¡®å®šä¸ºå¼•èµ·å¸§ä¸¢å¤±çš„åŽŸå› ï¼Œçº æ£çœ‹é—¨ç‹—延时帧计时器的å‚数。
-用户抱怨-网络æœåŠ¡å˜æ…¢
-症状-å½±å“æŸä¸ªä»¥å¤ªç½‘段的所有用户。网络æœåŠ¡ï¼ˆè®¿é—®æœåŠ¡å™¨ï¼‰å˜æ…¢ï¼Œä½†ä¸Žæ‰€è¿žæŽ¥çš„æŸçš„æœåŠ¡å™¨æ— 关。
-查找问题:
在高峰时段将网络测试仪连入集线器,è¿è¡Œç½‘络å¥åº·çŠ¶å†µæµ‹è¯•ã€‚æ¤æ—¶å°†ä¼šè§‚察到大é‡é”™è¯¯å¸§ã€‚在10BASE-2网络ä¸ï¼Œé”™è¯¯å¸§çš„类型归类为“延迟碰撞â€ã€‚在10BASE-T网络ä¸å¸§é”™è¯¯çš„ç±»åž‹å½’ç±»ä¸ºå…¸åž‹çš„å¸§æ ¡å¿µåºåˆ—错误(FCS错误),éšç€ç½‘ç»œç”¨æˆ·çš„å¢žé•¿ï¼Œæ–°å¢žåŠ çš„é›†çº¿å™¨é€šå¸¸ä¸ŽåŽŸæ¥çš„集线器形æˆæ•ˆåº”。
-解决问题:
统计一下任æ„两个网络设备之间ç»è¿‡çš„ä¸ç»§å™¨çš„æ•°é‡ã€‚在10Mbps以太网ä¸ä¸åº”超过4个,在100Nbps快速以太网ä¸ä¸åº”超过2个。如果数é‡è¶…æ ‡ï¼Œåˆ™æŒ‰ä»¥å¤ªç½‘çš„æ ‡å‡†ä¿®æ£ç½‘络拓扑结构,然åŽå†é”™è¯¯å¸§æ˜¯å¦è¿˜å‡ºçŽ°ã€‚
问题5:IP网络管ç†è€…的报应
-用户抱怨-一个工作站间隙性出错,ä¸èƒ½ç™»é™†æˆ–者ä¸èƒ½è®¿é—®è¿œç«¯æœåŠ¡å™¨
-症状-åªå½±å“ä¸€ä¸ªå·¥ä½œç«™ï¼Œé€šå¸¸åœ¨å¢žåŠ ã€ç§»åŠ¨ã€å˜æ›´å·¥ä½œç«™åŽå‡ºçŽ°æ¤é—®é¢˜
-查找问题:
先排除用户是å¦æœ‰å¸æˆ·å’Œå®‰å…¨è®¾ç½®æ–¹é¢çš„潜在问题。让用户登陆并且试图从å¦ä¸€ä¸ªå·¥ä½œç«™é‡å¤è¿™ä¸€æ“作。如果æˆåŠŸï¼Œåˆ™å¯ä»¥ç”¨ç½‘络测试仪从用户端到æœåŠ¡å™¨ä¹‹é—´çš„链路状况。然åŽæµ‹è¯•ç½‘å¡