Frequently Asked Questions
The speed of internet connection depends not only on the technical characteristics of Gars Telecom services but as well on the actions conducted by third parties, organizations that may affect the speed level and the connection quality. Also, the internet connection is largely dictated by processor power, bandwidth, amount of available memory, and software. The speed of internet connection varies from one situation to another and cannot be guaranteed beyond the company’s network. Nevertheless, we at Gars Telecom are striving to supply our clients with stable and fast internet connection, and are asking to consider some preliminary troubleshooting.
The highest RTT level determines the time for a signal to travel from a specific source to a specific destination and back again. The higher RTT the harder to reach the maximum download speed. For the fastest download, it is recommended to imply multithreading processes.
Unfortunately, such tests cannot guarantee the precise results and are not considered reliable.The received data will be inaccurate.
Firstly, the speed of different browsers (Explorer, Google chrome etc.) and estimations by different hosts (http://2ip. ru/, http://internet. yandex. ru/, http://www. speedtest. net/ etc.) will vary.
Secondly, the wiring diagram used while testing is of high importance, namely inline or by tapping into routing devices that might cut on traffic.
Thirdly, it is necessary to understand that the testing results of a loaded channel shows the residual carrying capacity rather than nominal. In case of 100% network load, the speed issues can be observed.
For more accurate diagnostics, it is advised to take readings directly from the channel port and resources within our network since the quality of speed beyond its limits cannot be guaranteed. Gars Telecom possesses its own server which operates on the same principles as 2ip. ru (http://st. garstelecom. ru).
- Use the firewall while internet connection.
The internet connection firewall acts as a protective boundary for the computer from the third parties. It can indicate malicious hacker attacks, «worms» and some types of viruses before they lead to malfunctions in your computer’s operation. Besides, firewalls protect your computer from involvement in such attacks to other computers without your permission.
- • Use the latest anti-virus programs.
Software producers constantly work on their products’ improvement by releasing new versions and «patches» to programs’ earlier versions. If you are a Windows OS user, it is recommended to periodically update it by installing the latest «patches». Starting from Windows 98 version, there’re automatic Windows Update built-in means deployed. Follow instructions on the screen. Windows Update will examine the system and provide with the preliminary list of crucial updates.
- Use the latest anti-virus programs.
Anti-virus programs detect and quarantine the majority of viruses, «worms», Trojan programs and other malicious software. Many new computers have anti-virus programs pre-installed. At the same time, to maintain the protection level, it is necessary to activate subscription package. Outdated anti-virus programs are ineffective, so they must be updated regularly. If subscription expires, your computer can become vulnerable to attacks of malware which can cause a significant increase in traffic, productivity decrease, internet operation failure, etc.
A simple anti-virus program installing is not enough; it must be set up correctly: real-time virus scanning must be turned on; hard drive scannings are to be scheduled anti-spam protection must be activated.
Internet connection as well as connection to a local network, along with the considerable extension of opportunities of obtaining the most various information, involves as well some inconveniences which, under certain circumstances, can turn into serious issues.
The main reason is that accessing to a huge number of the resources provided by a large number of computers both on Internet and a local area network makes the owned resources available for other users of the same network. Any computer connected to the internet or to a local area network is vulnerable to the following interactions:
- software from unknown publishers (which may contain Active X and Java applets);
- unauthorized access to local disc by other computers of the network;
- placement of extra files (e. g. Cookies) that may carry information about the user, preferences and visits;
- Trojan files and spyware intrusion;
- a threat of DOS-attack..