Question

In: Computer Science

You have been using your phone and your school's Wi-Fi network to access hosts on the...

You have been using your phone and your school's Wi-Fi network to access hosts on the Internet. Suddenly, you cannot reach Internet hosts. Create a two-column table. a) In the first column, create a list of possible causes. b) In the second column, describe how you would test each one. (You may not be able to test them all.) Create a table list.

Solutions

Expert Solution

Here is the possible causes to not get access to internet hosts even though we are connected to the wireless access point.

Causes Possible Tests/Solutions
Main Router cable broke or removed This may be one of the main cause of not getting internet access. We can solve this by checking the internet i.e mostly DSL cable coming from ISP. If you failed to check that we can contact the Internet Service Provider(ISP)
Out of Range Every Wi-Fi whether its in school or college or even at public there is a wifi range where any network device can connect with credentials. Make sure that you are in wi-fi range but not out of it. Also check the strength of your Wi-Fi. if its low try to move closer to Wi-Fi Access point.
Malware infected in Mobile Sometimes any malware in mobile consume whole internet or even block the internet traffic. Make sure you installed with Antivirus to remove that malware.
Blocked by the firewall Make sure that the firewall installed at edge router didn't blocked your IP address. If blocked try to contact admin to change configurations and make your IP unblocked.
Proxy Server Most of the schools use proxy servers to monitor and provide internet access. Make sure you connected to right proxy and also with right credentials.
Not having DHCP Most of the Wi-Fi will work with DHCP. But it also better to check the Dynamic Host COnfiguration Protocol is working well.
Change of settings in Wi-Fi Try to connect your Access point or tell the admin to connect and tell them to check if any changes happen that stop you to not get internet access

***Still if you have any doubt please feel free to comment...Thank you...Please UPVOTE***


Related Solutions

In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point....
In a Wi-Fi network, data packets are transmitted between a laptop computer and the access point. Since the transmission is wireless, errors can occur that may render the packet useless, so, when received in error, the packet is discarded. As a protection for errors, an acknowledgement is expected, and if the packet is received in error, it is retransmitted, until correctly received. Consider that the probability that a packet is discarded is p=0.6. (a) What is the probability that the...
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a five-person company with a one-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with...
Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Do not just jot down a few notes. Make it a document for people in your firm to read.
Include a webpage link showing a Wi-Fi wireless access point that can mount on the wall...
Include a webpage link showing a Wi-Fi wireless access point that can mount on the wall or ceiling. For one option, select a device that can receive its power by PoE from the network cable run to the device. For the other option, select a device that requires an electrical cable to the device as well as a network cable.
Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee...
Part I: Create a policy for 802.11 Wi-Fi security in a wireless network in a 500-employee company with a 47-access point WLAN. This is not a trivial task. Create the official communication document.   Part II:     18.  a) What is the main problem with IPv4 that IPv6 was created to solve?            b) How does IPv6 solve this problem?    19.  a) What has been holding back the adoption of IPv6?           b) What is pushing IPv6 adoption now?
The SOC has noticed an unusual volume of traffic coming from an open wi-fi guest Network...
The SOC has noticed an unusual volume of traffic coming from an open wi-fi guest Network that appears correlated with a border Network slow down. The network team is unable to capture traffic, but logs from Network Services are available. No users have authenticated recently there was a guest networks captive portal DDoS mitigation systems are not alerting DNS resolver logs show some very long domain names Which of the following is the best step for security analysis to take...
RESEARCH REPORT -How could you prevent an attacker with Aircrack from getting into your Wi-Fi? -What...
RESEARCH REPORT -How could you prevent an attacker with Aircrack from getting into your Wi-Fi? -What is the recommended way to mitigate telnet risk? -What information can you see when someone uses SSH? -How do you create a hidden file in Linux? -What is the /etc/shadow file? -Explain what each part of this command does: sudo tcpdump tcp -i eth1 -s 0 -C 50 -w Cap.txt -During SFTP what version of cryptographic key exchange was used?
On a Class C network, how many hosts per subnet will you get if you have...
On a Class C network, how many hosts per subnet will you get if you have a subnet mask of 255.255.255.240. On how many subnets was divided this class C address? Show your calculations
You have been assigned to report to your network administrators on the use of Teredo
Case Project 4-1: Tunneling IPv6 You have been assigned to report to your network administrators on the use of Teredo. Prepare a two-page memo that outlines why Teredo was developed, how it is implemented in Windows operating systems, for which types of networks it is appropriate, and how long it should be implemented.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT