Solved

30-user network debugging issue

Posted on 2014-01-08
5
180 Views
Last Modified: 2014-01-30
I have a client with 30 PC's and 2 servers. The office broadband is horribly slow, and I need to diagnose it. Does anybody have any suggested strategies about where to start looking on this one?
0
Comment
Question by:Techdivision
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 25

Expert Comment

by:Zephyr ICT
ID: 39764839
Is the broadband up to par for the amount of users using it? As in how much bandwidth does it provide?

Take it step by step:

1. Is the broadband slow when you connect only 1 PC/Laptop?
2. Any software on the network that shouldn't be there (p2p, virus, malware, etc..)
3. How's DNS configured for the network?
4. Any monitoring tools available on the network?
5. Contact the broadband provider to hear if they have any issues.
6. ...

Try to get as much information as possible and use a checklist of things you have checked.
0
 
LVL 11

Accepted Solution

by:
Miftaul earned 500 total points
ID: 39764855
Do some content filtering on the router allowing only type of traffic that the business needs. That might reveal something.
0
 

Author Comment

by:Techdivision
ID: 39764894
Thanks - I'll try those steps out this afternoon.  Does anybody know of any network sniffing tools that will diagnose if there's a certain MAC / IP address on the local network that's spewing out loads of data (i.e. possible infection)?
0
 
LVL 25

Expert Comment

by:Zephyr ICT
ID: 39764898
Best tool is http://www.wireshark.org/ but it will require some learning, it doesn't really have a "this is your problem" interface ... There's loads of tutorials out there though.... You can also upload your scans to http://www.cloudshark.org/ to share with other people/peers.
0
 
LVL 11

Expert Comment

by:Miftaul
ID: 39764913
Packets never lie, Wireshark reveals everything. The placement is very important on where to do the capture.
0

Featured Post

What, When and Where - Security Threats from Q1

Join Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst, on July 26th as they explore their key findings from the first quarter of 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Suggested Courses
Course of the Month8 days, 15 hours left to enroll

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question