Get premium membership and access questions with answers, video lessons as well as revision papers.
Bottom-Up Troubleshooting Method
In bottom-up troubleshooting, you start with the physical components of the network and move up through the layers of the OSI model until the cause of the problem is identified, as shown in Figure 1. Bottom-up troubleshooting is a good approach to use when the problem is suspected to be a physical one. Most networking problems reside at the lower levels, so implementing the bottom-up approach is often effective.
The disadvantage with the bottom-up troubleshooting approach is it requires that you check every device and interface on the network until the possible cause of the problem is found. Remember that each conclusion and possibility must be documented so there can be a lot of paper work associated with this approach. A further challenge is to determine which devices to start examining first.
Top-Down Troubleshooting Method
In Figure 2, top-down troubleshooting starts with the end-user applications and moves down through the layers of the OSI model until the cause of the problem has been identified. End-user applications of an end system are tested before tackling the more specific networking pieces. Use this approach for simpler problems, or when you think the problem is with a piece of software.
The disadvantage with the top-down approach is it requires checking every network application until the possible cause of the problem is found. Each conclusion and possibility must be documented. The challenge is to determine which application to start examining first.
Divide-and-Conquer Troubleshooting Method
In divide-and-conquer troubleshooting, you start by collecting user experiences of the problem, document the symptoms and then, using that information, make an informed guess as to which OSI layer to start your investigation. When a layer is verified to be functioning properly, it can be assumed that the layers below it are functioning. The administrator can work up the OSI layers. If an OSI layer is not functioning properly, the administrator can work down OSI layer model.
Titany answered the question on November 30, 2021 at 11:54
- Describe two categories of communication software(Solved)
Describe two categories of communication software
Date posted: November 30, 2021. Answers (1)
- Outline uses of computer networks in an organization(Solved)
Outline uses of computer networks in an organization
Date posted: November 30, 2021. Answers (1)
- Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection(Solved)
Explain three circumstances that would necessitate the use of PAP authentication in a point to point connection
Date posted: November 30, 2021. Answers (1)
- Virtualization is an emerging technology that is widely used in corporate networks. Explain benefits of this technology(Solved)
Virtualization is an emerging technology that is widely used in corporate networks. Explain benefits of this technology
Date posted: November 30, 2021. Answers (1)
- Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays(Solved)
Distinguish between Switched Virtual Circuits (SVC) and Permanent Virtual Circuits (PVC) as used in frame relays
Date posted: November 30, 2021. Answers (1)
- Outline two weaknesses of CSMA/CD(Solved)
Outline two weaknesses of CSMA/CD
Date posted: November 30, 2021. Answers (1)
- User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP(Solved)
User Datagram Protocol (UDP) is the preferred protocol to several network applications. Explain three types of applications that use UDP
Date posted: November 30, 2021. Answers (1)
- Explain three functions of a data link layer in OSI reference model(Solved)
Explain three functions of a data link layer in OSI reference model
Date posted: November 30, 2021. Answers (1)
- Difference between broadcast and collision domains as used in data transmission(Solved)
Difference between broadcast and collision domains as used in data transmission
Date posted: November 30, 2021. Answers (1)
- Routing information protocol (RIP) is contemporary routing protocol. Explain features of this protocol that influence its adoption(Solved)
Routing information protocol (RIP) is contemporary routing protocol. Explain features of this protocol that influence its adoption
Date posted: November 30, 2021. Answers (1)
- Differentiate between pre-shared key and digital signature
(Solved)
Differentiate between pre-shared key and digital signature
Date posted: November 30, 2021. Answers (1)
- Explain uses of internet in business firms(Solved)
Explain uses of internet in business firms
Date posted: November 30, 2021. Answers (1)
- TCP/IP protocol is widely used in networks due to its strengths. Explain three of these strengths to justify the statement(Solved)
TCP/IP protocol is widely used in networks due to its strengths. Explain three of these strengths to justify the statement
Date posted: November 30, 2021. Answers (1)
- ) Copper cables are prone to cross talk. Explain two measures that could be used to mitigate this impairment(Solved)
) Copper cables are prone to cross talk. Explain two measures that could be used to mitigate this impairment
Date posted: November 30, 2021. Answers (1)
- Dina investigated the disadvantages of time-division multiplexing (TDM) in circuit data connection. Explain two disadvantages that she could have established(Solved)
Dina investigated the disadvantages of time-division multiplexing (TDM) in circuit data connection. Explain two disadvantages that she could have established
Date posted: November 30, 2021. Answers (1)
- Distinguish between multicast and broadcast IP addresses(Solved)
Distinguish between multicast and broadcast IP addresses
Date posted: November 30, 2021. Answers (1)
- Outline two parts of to a point point protocol (PPP)(Solved)
Outline two parts of to a point point protocol (PPP)
Date posted: November 30, 2021. Answers (1)
- Explain two characteristics of a Storage Area Network(Solved)
Explain two characteristics of a Storage Area Network
Date posted: November 30, 2021. Answers (1)
- Access Points (AP) are critical in wireless networks. Describe two types of AP that are likely to be used(Solved)
Access Points (AP) are critical in wireless networks. Describe two types of AP that are likely to be used
Date posted: November 30, 2021. Answers (1)
- Computer networks are vulnerable to various types of physical threats. Outline four types of these threats(Solved)
Computer networks are vulnerable to various types of physical threats. Outline four types of these threats
Date posted: November 30, 2021. Answers (1)