What Is Topp's Internet Connection?

Decent Essays
Benson Topp owner of Topp Land Surveyors in Columbia, South Carolina is having internet connection problems. Mr.Topp uses a broadband digital subscriber line for his internet access. I am going to research the problem and share the possible causes of his internet connection problems. I am going to use Window’s help and support. According to www.sockets.com/winsock2.html Winsock has been a standard since January 1993 that is a powerful and flexible for creating universal TCP/IP applications. Mr. Topp internet connection could be unplugged I always check the physical connection first before troubleshooting anything else. If the cables are plug in the next thing I would use the find and fix internet connection and networking problems program

Related Documents

  • Decent Essays

    Nt1330 Unit 5 Test Paper

    • 597 Words
    • 3 Pages

    Student Name: Caroline machinjili THIRD YEAR DEGREE IN COMPUTING AT CCT DUBLIN SUBJECT: ADVANCED SWITHCING AND ROUTING PORTFAST AND ETHERCHANNEL October 2015 PORTFAST in my network I have setup portfast on all the 18 access switches connected to the workstations and also on the core switches connected to the servers. on both switches I have used ports fa0/1 to fa0/2. portfast on these ports will reduce the time the devices spend to connect to other devices on the network since these ports will not go through the spanning tree process of blocking, listening , learning and then forwarding which cause a delay of about 45 -50 seconds instead the ports will go straight to forwarding stage there by speeding up communication between devices in a network. for example in a company that have servers which provide services to clients. I have observed this process in my network and I will strongly recommend for the use of portfast.…

    • 597 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    CS320 Assignment 1 Andrew McConnon 13349871 You want to connect different computers, at different locations, so that they can exchange data with each other. What are the different challenges that you need to overcome? Host Identification on small networks isn’t a problem as it can be set up with manual ways of addressing, but will be exponentially harder the larger a network becomes. Protocols, DHCP servers and addressing are a huge need if you want to create and sustain a large, expanding network.…

    • 399 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    Configuring DirectAccess Understanding How DirectAccess Works The following steps, taken from the Microsoft white papers, shows how DirectAccess operates. 1) The Windows 7 DirectAccess client determines whether the machine is connected to a network or to the Internet. 2) The Windows 7 DirectAccess computer tries to connect to the web server specified during the DirectAccess setup configuration. 3) The Windows 7 DirectAccess client computer connects to the Windows Server 2008 R2 DirectAccess server using IPv6 and IPsec. 4)…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 5 Case Study

    • 405 Words
    • 2 Pages

    Each totaltraffic graph in the method section shows the server or the client with the above RTT and Window Size as incoming and outgoing traffic. The horizontal axis represents the time in seconds and the vertical axis represents the measured traffic in bytes. The graphs presents the increase of traffic once the experiments starts and ends. Case 3. In comparing the window size and RTT staying the same, the traffic decrease once the window size increase.…

    • 405 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    NS-2 offers a poor graphical support, no Graphical User Interface (GUI), the subscribers have to directly face to text commands of the electronic devices. Because of the continuing modifying the code base, the result may not be consistent and consist bugs. NS-2 cannot simulate issues of the power consumption, bandwidth or energy saving in WSN. NS-2 has a scalability issue no. of nodes cannot be greater than 100.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    At last, there are different workplaces in the building. Each of these workplaces will have one PC for staff use, except for the confirmations office, which will have five PCs. There will be two server rooms, one on the first floor and one on the second floor. The main requirements for designing the network are: • Student-got to PCs ought to be on separate network from the staff systems. PCs for open utilization ought to be on a different system.…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    The amount of data that must be transmitted through the Internet increases exponential, new applications such as RealAudio, Real Video, Internet Phone software and videoconferencing systems need a lot more bandwidth than the applications that were used in the early years of the Internet, this means that without any bandwidth control, the quality of these real-time streams depends on the bandwidth that is just available. Low bandwidth or better unstable bandwidth causes bad quality in real-time transmissions, for instance dropouts and hangs [9]. The quality of a service (QoS) is a vague term and can encompass a number of attributes. To some people a good service is one with a low end-to-end delay and high bandwidth, to some people a good service is an extremely reliable one with very few packet drops, while others would enjoy a predictable service regardless of the bandwidth or the end-to-end delay [10]. Various QoS characteristics are divided in two groups, technology- and user-based QoS parameters.…

    • 493 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Problem Statement Communication is key, regardless of where you work. Communication can be between people or a computer communicating data to a person. When obtaining data from a computer, people want to be able to trust the data that they are receiving and that none of the packets got lost somewhere along the way. Packets are units of data that are routed between an origin and a destination on the Internet. Networks use Ethernet cables, called Category (more commonly referred to as CAT) cables to send packets to one another.…

    • 460 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The essay, “Growing Up Tethered” by Sherry Turkle, seeks to address how the current generation is “tethered” or extremely connected to their cellphones and technology. Sherry Turkle is a professor in the Program in Science, Technology, and Society at MIT (Massachusetts Institute of Technology). Turkle uses evidence from testimonials and quotes provided by students’ to help the topic become understandable as well as relatable. Since Turkle provided necessary points throughout, the essay was very informative. The essay does not need much correction since Turkle made her argument convincing by using examples and explanations, making the overall concept relatable.…

    • 870 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Internet was originally called the ARPANET, and in order to enhance the ARPANET to be enable may different types of computer networks to all communicate with each other, an open source protocol needed to be created, hence the development of TCP/IP. TCP/IP improved communications throughout the network and allowed all computers to easily communicate with one another. Another technology that helped expand the ARPANET to more users in a specific location was the development of the Ethernet. Ethernet is a coaxial cable that is still used today in many local area networks. Ethernet is highly effective in moving data from one computer to another at high speeds.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Internet is global network that allows you to connect to the world. In 2006, Dr. Leonard Kleinrock had given speech on Internet at Infocom. It includes – the situation before Internet was invented, how internet was invented, brief overview on Arpanet (beginning and growth), what all barriers had been removed after using internet, early pioneers, implementers contributions, some good and some dark sides of Internet, his future vision about internet and five golden guidelines to research. He has defined Internet by using example of Larry Garwood and his father.…

    • 1354 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    1-What factors will help you decide if the existing internetwork is in good enough shape to support new enhancements? keeping a track of round trip response time, regular checkups of major routers, firewalls and switches, identifying sources and destinations of network traffic, analyzing its direction and balancing the data travel between source and destination are the some important factors. Documentation should be done for Data stores and traffic flows, the number of stations, average time a station is idle between sending frames and the time required to transmit a message once the medium access is granted, along with traffic behavior are essential factors to determine whether the existing internetwork is in good shape to support new enhancements. 2-When considering protocol…

    • 670 Words
    • 3 Pages
    Improved Essays