We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Network Troubleshooting Case Study Essay Sample

essay
The whole doc is available only for registered users OPEN DOC
  • Pages:
  • Word count: 851
  • Category: computer

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

Network Troubleshooting Case Study Essay Sample

The following are four troubleshooting scenarios that represent typical networking problems. Read each one carefully. For each question or activity that follows, write a 150-word response. Place your responses into a Microsoft® Word document, including the title of each scenario.

• Part 1: Troubleshooting a Connection Problem

Chris works for a large corporation that has several branch offices in the city. Operating as a certified computer support technician, he must roam among the branch offices, solving computer and network problems as they arise. Chris receives a call that a remote office is having network problems. When he arrives at the remote office, he is told that the network is down. This office consists of seven computers connected to a router, which is connected to a cable modem.

Answer the following question: What are the first three things Chris should check?

Considering that all seven computers are linked to one router which is connected to one cable modem, I would first check the cable modem. The cable modem would show lights for connectivity and power. I would make sure that is plugged in and has internet connection. I would then check the router. This is where all seven computers are connected. I would check to make sure that all cables are connected and that it has power. If those are good I would check the administrative computer or any computer that had administrative rights. I would check firewalls and or allowances were not tampered with.

• Part 2: Troubleshooting Internet Access

Chris solves the problem in the remote office and returns to the corporate office. Upon Chris’s return, a coworker named Brian cannot access the Internet. He tells Chris that the connection was working fine before lunch.

Complete the following activity: Reorder the actions in the appropriate sequence for fixing the problem. Then, provide a brief one-sentence description of the purpose of each action:

o Check whether other computers on the network have a similar problem. You want to make sure that it is not only that computer it is others as well. o Power down the router.
Turn the power off on the router or unplug it so that we can reboot the whole system. o Power down the DSL or cable modem box.
Turn the power off on the router or unplug it so that we can reboot the whole system. o Power up the DSL or cable modem box.
After turning off the system and waiting approximately 30 seconds you want to start connecting and turning on the network starting with the cable modem box. o Power up the router.

After turning off the system and waiting approximately 30 seconds you want to start connecting and turning on the network by starting the router next. o Reboot the user’s PC.
After the system has been rebooted you want to reboot the computer so it accepts the new data from the network. o Release and renew the PC’s IP address.
After the reboot you want to give the other computers the IP address

• Part 3: Network Drive Mapping

Jennifer is using her new laptop computer for the first time and asks you for help. She cannot connect to her local file server. She is accustomed to seeing the file server as Drive K in Windows® Explorer. The file server is named File_Server, and the shared folder is named Shared_Files.

Answer the following question: What menu in Microsoft® Windows® Explorer do you use to access the Map Network Drive window? What entry should appear in the folder drop-down list in this window? Without using a mapped network drive, what can Jennifer enter into the Run dialog box to access this folder?

• Part 4: Port Filtering and Forwarding

Mary tells you she is participating in a demo of third-party video conferencing software the company is considering for purchase. The vendor’s technical support staff needs you to open port 3090 on Mary’s computer so they can access it from the Internet. Even though opening a computer’s port is a security risk, it must only be open for 1 day.

Complete the following activity: List the steps you would use to open port 3090 on Mary’s Windows 7® computer. Explain each step in one brief sentence.

Choose Start then Control Panel. Click the System and Security link and then click Windows Firewall. Must allow the port to open the firewall blocks that because of security risks. This will open it.

On the left, click the Advanced Settings link. Not an everyday thing so must do advanced settings.

On the left, click Inbound Rules. Then, on the right, under Actions, click the New Rule link. This isn’t something the computer allows on its own because of the security risk.

Select the option marked Port and click Next. Must go to port section.

In the Specific Local Ports box, type port 3090 and then click Next. Must specify which port or ports to open,

Choose Allow the Connection and click Next. Then must tell to allow.

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

Computer software programs

To know about the connection of these topics it is must to know about the link between these phrases as well as the basic concept of these two. Firstly, to know what is computer software and wireless Information systems and then secondly to discuss about their affects upon each other. Computer software is basically some programs or events that are written just to achieve certain...

The Turing Test Review

The Turing Test (TT) is used to test whether computers have mentality. The set up of the test is as follows: there are 3 subjects involved. All three subjects are accessible to each other via a chat program and nothing else. The first subject is a real person, a human being. The second subject is a computer. The third subject is an interrogator whose job...

Chic Paints Ltd Essay Sample

1 Chic Paints Limited (CPL) are a large manufacturing company who specialise in producing niche specialist paints such as those used on boats, cars and industrial machinery. As a result of a management buyout from Ashstead Plc 6 years ago, CPL was bought by 5 of Ashstead’s directors who had previously formed the board on Chic Paints when it was a subsidiary of Ashstead Plc....

What is Computer Crime?

It is unfortunate to see that the number of computer crimes is increasing and has been considerably swelling during the last few decades. However, computer and information technology provide many benefits for everyone. Although, they have sometimes used to annoy or harm people. This trend has caused several social issues as public property, unauthorized using password of someone, stealing a billion dollar from bank or...

The use of computer systems in different...

- Accounting is a paramount aspect of all businesses, as every venture has a legal duty to produce correct tax reports, an accountant job would be very difficult without a computer. For example, a human error in cash flow data can critically affect the management of a business and even result in an HMRC tax fine. Biz Brain is one of the most used online...

Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Couldn't Find What You Looking For?

Get access to our huge knowledge base which is continuously updated

Next Update Will Be About:
14 : 59 : 59
Become a Member