You are on page 1of 26

ACKNOWLEDGEMENT

My sincere gratitude goes to the Lord Almighty, who has spared my life, kept and grants me sound health throughout the duration of this programme. Am also very thankful to my parents in person of Mr. and Mrs. Adio who sponsored and cared for all my needs throughout this programme, May God in his infinite mercy bless them abundantly and grant them long life to eat the fruit of their labour. I Will also appreciate the effort of some staffs of Gannetcity consulting limited for their time and immense assistance. In this regard, I acknowledge the help and assistance of Engr. Akeredolu, Engr. Daramola, Mr. wole and Mrs jacob just to mention few.

DEDICATION
2

This report work is dedicated to God, Mr and Mrs Adio my parent and My mentor Mrs obagbuwa , who has helped me all through. Also to my lovely and wonderful family and lecturers, I love you all.

TABLE OF CONTENT
2

TITLE PAGE............................................................................................... ACKNOWLEDGEMENT................................................................................ DEDICATION.................................................................................................. TABLE OF CONTENT.................................................................................... 1.1 INTRODUCTION...................................................................................... 1.2 ABOUT SIWES 1.3 AIMS AND OBJECTIVES OF SIWES 1.4 ABOUT ITF 1.5 APPLICATION AND POSTING 1.6 BACKGROUND OF THE COMPANY 1.2.1MAIN ACTIVITIES AND ACHEIVEMENT OF THE COMPANY 2.1 INTRODUCTION TO PC FONDAMENTAL 2.2 COMPUTER MAINTENANCE 2.2.1DATA BACKUP 2.2.2 FORMATTING 2.2.3 ASSEMBLING AND DISASSEMBLING A PC 2.2.4 COMPUTER REPAIRING/ON-BENCH TEST 2.2.5 INSTALATION OF APPLICATION SOFTWARE 2.2.6 INSTALLATION OF WINDOW XP 2.2.7 WINDOWS UTILITY 2.3.1 ADDING AND REMOVING OF SYSTEM COMPONENTS 2.3.2 RESETING THE COMPUTER 2.3.3 CONFIGURATIONS OF CMOS 2.3.4 DELITING TEMPORARY FILES 2.3.5 CLEANING OF COMPUTER 3.1 SUMMARY 3.3 CONCLUSION 3.3 RECOMMENDATION

1 2 3 4-5 3-7 3 4 5 5 5 6-7 8-14 15 15 16 16 17-18 18-19 19-20 20 21 21-22 22-23 23-24 24 25 25 26

CHAPTER ONE
1.0: 1.1.0 INTRODUCTION WHAT IS INDUSTRIAL TRAINING?

Industrial Training refers to the exposure of students in formal educational institutions to real work situation within their chosen discipline, with a view to systematically enhancing the acquisition of related experiences, practical dexterity and general know-how. Due to this, the exposure must take place where work is real, not where work is imagined, or only contemplated in abstractions. The training must be in ones own chosen academic discipline. 1.1.1 BACKGROUND In the earlier stage of science and technology education in Nigeria, students were graduating from their respective institution without any technical knowledge or working experience. It was in this view that students undergoing science and technology related
2

courses were mandated for students in different institution in the view of widening their horizons so as to enable them have technical knowledge or working experience before graduating from their various institutions.

The student industrial Work Experience Scheme (SIWES) was established by the industrial Training Fund in (ITF) 1973 to enable students of tertiary institution have basic technical knowledge of industrial works base on their course of study before the completion of their program in their respective institutions.

The scheme was designed to expose students to industrial environment and enable them develop occupational competencies so that they can readily contribute their quota to national economic and technological development after graduation.

The major background behind the embarkment of students in SIWES was to expose them to the industrial environment and enable them develop occupational competencies so that they can readily contribute their quota to national economic and technological development after graduation.

The major benefit accruing to students who participate conscientiously in Students Industrial Work Experience Scheme (SIWES) are the skills and competencies they acquire. The relevant production skills remain a part of the recipients of industrial training as life-long assets which cannot be taken away from them. This is because the knowledge and skills acquired through training are internalized and become relevant when required to perform jobs or functions

1.1.2 AIMS/OBJECTIVES OF INDUSTRIAL TRAINING. The Industrial Training Funds policy Document No. 1 of 1973 which established SIWES outlined the objectives of the scheme. The objectives are to: 1. Provide an avenue for students in higher institutions of higher learning to acquire industrial skills and experiences during their courses of study.

2. Prepare students for industrial work situations that they are likely to meet after graduation.
2

3. Expose students to work methods and techniques in handling equipment and machinery that may not be available in their institutions.

4. Make the transition from school to the world of work easier and enhance students contact for later job placements.

5. Provide students with the opportunities to apply their educational knowledge in real work situations, thereby bridging the gap between theory and practice. Enlist and strengthen employers involvement in the entire educational process through SIWES

1.1.3 INTRODUCTION OF COMPUTER SCIENCE DEPARTMENT The Department of Computer Science was established as a full time course of study in 2007/2008 as one of the nine departments in the Faculty of Science, (FOS) of Lagos State University, Ojo.

The Department presently, runs the B. Sc. (Hon.) degree programme in Computer Science with a strong desire to provide a broad and balanced foundation in computer science knowledge and practical skills in preparation for a successive career and to provide a solid academic base upon which to build more advance degrees (M.Sc. and PhD) if so desired. The Department enjoys modern communication and information technology facilities available in the institution which are utilized to train students and equip them with academic and professional IT knowledge. 1.1.4 VISION OF THE DEPARTMENT To be a centre of excellence providing high quality teaching and learning experiences in Computer Science.It is our hope that this will engender the production of entrepreneurial graduates in information technology disciplines, capable of impacting positively on their environment while being globally competitive. 1.1.5 MISSION OF THE DEPARTMENT To create a unique Department that is technologically and professionally sound as a model centre of excellence committed to the pursuit of academic innovation, skill-based training in Information and Communication Technology and a tradition of excellence in teaching, research and community service. 1.1.6 MEMBERS OF STAFF The academic members of staff of the Department of Computer Science are listed in the table below.

S/N 1. 2. 3. 4. 5.

Names of Lecturers Mrs Obagbuwa Mrs .B. Akerele Mr Toyin Enikhuomehin Mr Idowu Gbolahan Mr Patrick Owate

Areas of Specialization Head of Department Lecturer Lecturer Lecturer Lecturer

1.2.0

Companys Background
2

GANNETCITY CONSULTING LIMITED is a private home Company suitated at 9th floor, bookshop house 50/52 broad street lagos state which deals in info- academic and technology service such as computer hardware, router configuration, ISP provider, local and wide area network.

We have at the helm of affairs experienced professionals who have been in Office Automation Industry for years. Our Managing Director, MR. WOLE AKEREDOLU while we have experienced Engineers that can work extensively on Multi-User Systems, Networking and Micro-Mainframe Communication.

The Company has proven itself not only in the area of Sales and efficient Maintenance Back Up Service, but also in specialized area that require in-depth knowledge, skill and proficiency such as Local Area Network (LAN) PC, Power systems, Systems Appraisal and Development.

1.2.1
SALES

Main activities and achievement of the company

We market at Manufacturers competitive price, a wide range of Computer Hardware (Servers, Desktops, Workstations, Scanners, Printers, etc) and office equipment such as Note counting machines, Shredding machines, Photocopiers, Binding machines, etc. We market various brand of printers such as Tally Genicom, Epson, HP, OTC, and Panasonic. We also market Uninterrupted Power Supply (APC, INVERTER). We sell at very competitive price, high quality computer consumables such as Computer Papers, Toner Cartridges, Storage devices, Ribbons, Inks, etc. We are Partners to KKONS, CHAMS CITY, HITV. MAINTENANCE SERVICES With an ultra modern workshop and a crop of experienced Engineers, the Company stands to meet all your back-up maintenance needs. As a matter of routine, we provide regular check-up services and repairs on all equipment supplied to optimize consumers satisfaction. In addition, we shall be willing to provide ad-hoc services to meet your peculiar needs. TECHNICAL DEPARTMENT Amongst various tools and equipment available are OSCILLOSCOPE, DIGITALS and ANALOG MULTIMETERS, SOLDERING / DISOLDERING WORK STATION, EPROM
2

WRITERS, ULTRAVIOLET EPROM ERASERS, FLOPPY DISK DRIVE TESTER, VACUUM CLEANERS, LOGIC and CAPACITANCE METERS AND OTHER EQUIPMENT FOR THE INSTALLATION AND MAINTENANCE OF QMS. We guarantee prompt attention and minimum downtime on your Systems. TRAINING We provide training facilities to enable our Clients obtain the best use of their valued purchases. This can be arranged in-house for your convenience or at our workshop. Also, we shall train your staff to carry out efficiently first-aid repairs on your equipment to further minimize downtime 1.2.2. INTRODUCTION OF VARIOUS DEPARTMENTS OF GANNETCITY CONSULTING LTD I was assigned to work in the following department routinely and was introduced to these various department; 1. 2.. 3. Technical support Department Reception and Customer Service Department Administrative and ICT Training Department

1. TECHNICAL DEPARTMENT: This department is in charge of the overall deployment of the company's solutions (products and services). The head of the department is Engr. Daramola who works and supervise other members and IT students on project work, troubleshooting, power electronic inverter, PC repair and also offers support to the users 2 RECEPTION AND CUSTOMER SERVICE DEPARTMENT: This department was headed by Mrs Jacob other member of the department were Miss Esther . The department prospects and follows-up potential customers. I worked closely with the department at a point in my industrial training. 3 ADMINISTRATIVE AND ICT TRAINNING DEPARTMENT: This is the department that is in charge of the administation and day-to-day activities of the company,also involve in program planning marketing and follow up, lectures being given on daily basis

CHAPTER TWO
2.0 OVERVIEW OF WORK DONE/ACTIVITIES AT GANNETCITY CONSULTING
2

LIMITED. During the training, I was involved in ; General Networking and installations in the technical department,

Although my activities were not limited to these, I was also opportuned to be tasked with ensuring that repairs(e.g cloning) carried out on systems were done properly, I was opportune to delve into various fields of the IT world; ,

2.1

WHAT IS A NETWORK?

A network is a means whereby intelligent end-user PCs can share common resources. Computer networks also differ in their design. The two types of high-level network design are called client-server and peer-to-peer. Client-server networks feature centralized server computers that store email, Web pages, files and or applications. On a peer-to-peer network, conversely, all computers tend to support the same functions. Client-server networks are much more common in business and peer-to-peer networks much more common in homes. NETWORK TOPOLOGY A network topology represents its layout or structure from the point of view of data flow. In so-called bus networks, for example, all of the computers share and communicate across one common conduit, whereas in a star network, all data flows through one centralized device. Common types of network topologies include bus, star, ring and mesh. Network topologies are categorized into the following basic types:

bus ring star tree mesh

More complex networks can be built as hybrids of two or more of the above basic topologies. Bus Topology
2

Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. A single cable, the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message. Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. However, bus networks work best with a limited number of devices. If more than a few dozen computers are added to a network bus, performance problems will likely result. In addition, if the backbone cable fails, the entire network effectively becomes unusable.

Ring Topology In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses. Star Topology Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)

Tree Topology Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the
2

broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.

Mesh Topology Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing. A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.

Network Protocols In networking, the communication language used by computer devices is called the protocol. Yet another way to classify computer networks is by the set of protocols they support. Networks often implement multiple protocols to support specific applications. Popular protocols include TCP/IP, the most common protocol found on the Internet and in home networks.

Wired And Wireless Networking Many of the same network protocols, like TCP/IP, work in both wired and wireless networks. Networks with Ethernet cables predominated in businesses, schools, and homes for several decades. Recently, however, wireless networking alternatives have emerged as the premier technology for building new computer

2.2

TYPES OF NETWORK

LAN - Local Area Network

A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet. In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.

WAN - Wide Area Network As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances. LAN, WAN and Home Networking Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider (ISP) using a broadband modem. The ISP provides a WAN IP address to the modem, and all of the computers on the home network use LAN (so-called private) IP addresses. All computers on the home LAN can communicate directly with each other but must go through a central gateway, typically a broadband router, to reach the ISP.

Other Types of Area Networks While LAN and WAN are by far the most popular network types mentioned, you may also commonly see references to these others:

Wireless Local Area Network - a LAN based on WiFi wireless network technology
2

Metropolitan Area Network - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. A MAN is typically owned an operated by a single entity such as a government body or large corporation. Campus Area Network - a network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus. Storage Area Network - connects servers to data storage devices through a technology like Fibre Channel. System Area Network - links high-performance computers with high-speed connections in a cluster configuration. Also known as Cluster Area Network.

2.3

Network Cables and Cabling

While wireless may be the wave of the future, most computer networks today still utilize cables. 1. 2. Direct Cable Connection CAT5 and CAT6 Cables (6)

Patch Cables A patch cable connects two network devices. Network patch cables are typically CAT5 or CAT5e Ethernet cables linking a computer to a nearby hub, switch or router. Ethernet Crossover Cables A crossover cable directly connects two network devices of the same type to each other over Ethernet. Crossover cables are useful for temporary networking of devices when a network router, switch or hub is not present. Null Modem Cables A null modem cable connects two standard serial ports for the purpose of computer-tocomputer networking. Null modem cables enable data transfer between two computers with a minimum of setup required. RJ-45 Connectors and Cables RJ45 is a standard type of connector for network cables such as those used in Ethernet networks. RJ45 connectors feature eight pins to which cables interface electrically. Fiber Optic Cable Fiber optic cables carry information using pulses of light. These cables are designed for long distance network communications, although fiber to the home installations are becoming more common.
2

What Are T1 Lines and T3 Lines? T1 and T3 lines are reserved circuits typically used by organizations to connect two geographically separated offices for private voice and/or data telecommunication service. Network Cable and Connection Technologies Practice Exam This interactive test presents questions and answers on common cabling technologies for home networks. Leased Line A leased line is a cable connecting two specific locations for voice and/or data network service. Leased lines most commonly are rented by businesses to connect branch offices. RS-232 Pinouts These pinout diagrams illustrate the 9-pin and 25-pin serial line RS-232 standard network cables.

2.4

Network Design

Design considerations for computer networks cover a wide range of topics including layout, capacity planning, and security.
1. 2. 3. 4. 5. 6. 7. 8.

OSI Model Area Networks Cisco Networking Information Technology Network Protocols Network Certifications Network Software Network Storage

Overview of the OSI Model The OSI model defines internetworking in terms of a vertical stack of seven layers. This page briefly explains the basic structure of the OSI model. The OSI model provides a good conceptual framework for understanding the implementation of network protocol and services design. As presented in this in-depth
2

tutorial, the design of many modern network technologies follows the OSI model to some extent.

2.5

PROBLEM AND SOLUTION IN NETWORKING

I was able to learn to learn and observe problems and solution to networks 1. Insufficient Wi-Fi Network Range and Power Even without interference from other equipment, Wi-Fi connections can drop occasionally on devices located near the edge of the network's wireless signal range. Wi-Fi links generally become more unstable with distance. Relocating your computer or other gear is a simple but not always practical solution. Otherwise, consider antenna upgrades and other techniques to improve wireless signal transmission and reception.

Position Your Router / Access Point for Best Performance How Can the Range of a Wi-Fi Network Be Boosted?

2. Unknowingly Connecting to the Wrong Wi-Fi Network If two neighboring locations run unsecured Wi-Fi networks with the same name (SSID), your devices may connect to the wrong network without your knowledge. This can cause the interference and range problems described above. Additionally, in this scenario your computers will lose connection whenever the neighbor network is turned off, even if your preferred one remains functional. Take proper security measures to ensure your computers connect to the right network.

Improve Wireless Network Security

3. Network Driver or Firmware Upgrade Required Each computer connected to a Wi-Fi network utilizes a small piece of software called the device driver. The Wi-Fi network device driver controls various functions of the Wi-Fi hardware. Network routers contain related technology called firmware. Network drivers and firmware can both become obsolete over time. Upgrading (overinstalling) newer versions of these things can sometimes fix network connection problems. Upgrade Router / Access Point Firmware 4. Incompatible Software Packages Installed Wi-Fi network connections may start failing on a computer due to incompatible software installed and running there. This includes operating system patches, operating system services, and other software that modifies the networking capabilities of the operating system. Keep records of each time you install or upgrade software on your computers, and be prepared to uninstall any incompatible software you've added recently.
2

5. Overloading / Overheating the Wireless Access Point Owners of some wireless routers (and other types of wireless access points) have reported dropped connections during times of heavy network utilization. This can occur during, for example, online gaming or while copying large files. Routers can in theory become overloaded with too much data and fail temporarily. If a router's temperature increases too much, it may also fail until cooled. Install routers (access points) in places with good airflow. Exchange the router for a different unit if the current one doesn't support your usage patterns. 6. Network Cant Reach Certain Areas In many homes, networks won't conveniently reach all of the areas a person needs. This fact surprises many folks. Stringing network cables to some rooms can prove impractical, of course. But even with wireless networks, "cold spots" where Wi-Fi radio signals won't reach corner bedrooms, a study, or a porch are also common. Be ready to make a few concessions in your network installation plan. 7. Computers Can't See Each Other on the Network You've finished connecting all your network gear to the best of your ability, but nothing works. None of the devices can "see" each other or "talk" to the printer. No error messages are being displayed. You're developing a sneaking suspicion that your network is laughing at you. Relax. Take a step-by-step approach to this problem, and your network will be up and running soon. 8. Computers Can't Get on the Internet Even when all of the devices in a home can communicate with each other, they may still fail to reach Web sites on the Internet. This, too, is a common problem when first installing a home network. After a simple check of the key network components, you'll be surfing again in no time. 5. Special Devices Won't Join the Network Many home networks have a "problem child," one computer or device that simply will not cooperate with the others. The device could be a specialized piece of hardware like a game console. It could be a lone wireless computer trying to join a wired network. Or it could be a computer running an old version of Microsoft Windows or running Linux. Whatever the situation, extra care and feeding may be required to get your problem child to behave. 6. Certain Network Applications Won't Function While other aspects of a home network may work reliably, this does not guarantee success with the next new feature that comes along. Instant messaging, P2P file sharing, and online games are typical problematic applications on home networks. These apps may fail to connect to a "server" or "peer," or they may sit there like zombies and not do anything. Given time and effort, any such problems can be solved. However, solutions often require specific knowledge of how these applications work.
2

7. Network is Too Slow For several reasons, a home network might not run fast enough to keep up with a family's needs. They may experience very slow Web page downloads, sluggish or unplayable network games, interminable delays in online chatting/IM applications, and other symptoms of a bad network performance problem. Know what to watch for to avoid this frustrating situation. 8. Network Connections Drop Unexpectedly A home network may operate flawlessly for a day, a week or a month, but suddenly, at the most inopportune time, something breaks. You may have been happily listening to an Internet radio station, swapping files on a P2P network, or playing a networked game at home. Then boom! What happened? There are several possibilities. Don't be surprised if this happens to you. 9. Office Computer Won't Join Home Network Those who use laptop computers or PDAs at their workplace naturally might want to use those same devices at home. Technical limitations make this form of network mobility more difficult than it should be. Some folks see it as a big hassle, give up, and miss out on a major gain in their personal productivity. By carefully establishing home and work network settings (often called "profiles") on the devices, home/office network mobility can be a reality for you. 10. Network is (Too) Insecure No, a home network won't become overly self-conscious and suffer from a lack of confidence. Many home networks are insecure, though, in the sense of data privacy. Too many homeowners fail to take a few essential steps to protect their network from attacks by outsiders. Network attacks and "hacks" are real threats; they happen every day and affect real families. Don't let them happen to yours!

2.6

SWITCHES AND ROUTERS

Hubs, switches, and routers are all devices that let you connect one or more computers to other computers, networked devices, or to other networks. Each has two or more connectors called ports into which you plug in the cables to make the connection. Varying degrees of magic happen inside the device, and therein lies the difference. I often see the terms misused so let's clarify what each one really means. A hub is typically the least expensive, least intelligent, and least complicated of the three. Its job is very simple: anything that comes in one port is sent out to the others. That's it. Every computer connected to the hub "sees" everything that every other computer on the hub sees. The hub itself is blissfully ignorant of the data being transmitted. For years, simple hubs have been quick and easy ways to connect computers in small networks. A switch does essentially what a hub does but more efficiently. By paying attention to the traffic that comes across it, it can "learn" where particular addresses are. For example, if it sees traffic from machine A coming in on port 2, it now knows that machine A is connected to that port and that traffic to machine A needs to only be sent to that port and not any of the others. The net result of using a switch over a hub is that most of the network traffic only goes where it needs to rather than to every port. On busy networks this can make the network significantly faster. A router is the smartest and most complicated of the bunch. Routers come in all shapes and sizes from the small four-port broadband routers that are very popular right
2

now to the large industrial strength devices that drive the internet itself. A simple way to think of a router is as a computer that can be programmed to understand, possibly manipulate, and route the data its being asked to handle. For example, broadband routers include the ability to "hide" computers behind a type of firewall which involves slightly modifying the packets of network traffic as they traverse the device. All routers include some kind of user interface for configuring how the router will treat traffic. The really large routers include the equivalent of a full-blown programming language to describe how they should operate as well as the ability to communicate with other routers to describe or determine the best way to get network traffic from point A to pointB.

2.7

How To Set Up a Network Router

I learnt how to setup / connect router and switches together in connection with coupled system given by some instructions I put in practice as;
1. Choose a convenient location to begin installing your router such as an open

floor space or table. This does not need to be the permanent location of the device. Particularly for wireless routers, you may find it necessary to re-position the unit after installing it as the cables / signals may not reach all areas needed. At the beginning, its better to choose a location where it's easiest to work with the router and worry about final placement later.
2. Plug in the router's electrical power source, then turn on the router by pushing

the power button.


3. (Optional) Connect your Internet modem to the router. Most network modems

connect via an Ethernet cable but USB connections are becoming increasingly common. The cable plugs into the router jack named "WAN" or "uplink" or "Internet." After connecting the cable, be sure to power cycle (turn off and turn back on) the modem to ensure the router recognizes it.
4. Connect one computer to the router. Even if the router is a wireless model,

connect this first computer to the router via a network cable. Using a cable during router installation ensures the maximum reliability of the equipment. Once a wireless router installation is complete, the computer can be changed over to a wireless connection if desired.
5. Open the router's administration tool. From the computer connected to the

router, first open your Web browser. Then enter the router's address for network
2

administration in the Web address field and hit return to reach the router's home page.

6. Log in to the router. The router's home page will ask you for a username and

password. Both are provided in the router's documentation. You should change the router's password for security reasons, but do this after the installation is complete to avoid unnecessary complications during the basic setup.
7. If you want your router to connect to the Internet, you must enter Internet

connection information into that section of the router's configuration (exact location varies). If using DSL Internet, you may need to enter the PPPoE username and password. Likewise, if you have been issued a static IP address by your provider (you would need to have requested it), the static IP fields (including network mask and gateway) given to you by the provider must also must be set in the router.
8. If you were using a primary computer or an older network router to connect to the

Internet, your provider may require you to update the MAC address of the router with the MAC address of the device you were using previously. Read How to Change a MAC Address for a detailed description of this process.
9. If this is a wireless router, change the network name (often called SSID). While

the router comes to you with a network name set at the factory, you will never want to use this name on your network. Read How to Change the Router SSID for detailed instructions.
10. Verify the network connection is working between your one computer and the

router. To do this, you must confirmed that the computer has received IP address information from the router. See How to Find IP Addresses for a description of this process.
11. (If applicable) Verify your one computer can connect to the Internet properly.

Open your Web browser and http://compnetworking.about.com/.

visit

few

Internet

sites

such

as

12. Connect additional computers to the router as needed. If connecting

wirelessly, ensure the network name (SSID) of each is computer matches that of the router.
13. Finally, configure additional network security features as desired to guard

your systems against Internet attackers. These WiFi Home Network Security Tips offer a good checklist to follow.
2

2.8 CLIENT AND SERVER NETWORK


While at Gannetcity consulting ltd, I was opportuned to go to various sites, where with the engineers, we carry out both preventive and curative maintenance on large systems also known as Servers. Hence, it is required for this report that we discuss briefly what a server is and the few types around. The clientserver characteristic describes the relationship of cooperating programs in an application. The server component provides a function or service to one or many clients, which initiate requests for such services. Functions such as email exchange, web access and database access are built on the clientserver model. Users accessing banking services from their computer use a web browser client to send a request to a web server at a bank. That program may in turn forward the request to its own database client program that sends a request to a database server at another bank computer to retrieve the account information. The balance is returned to the bank database client, which in turn serves it back to the web browser client displaying the results to the user. The clientserver model has become one of the central ideas of network computing. Many business applications being written today use the clientserver model. So do the Internet's main application protocols, such as HTTP, SMTP, Telnet, and DNS. The interaction between client and server is often described using sequence diagrams. Sequence diagrams are standardized in the Unified Modeling Language. TYPES OF CLIENT AND SERVER Specific types of clients include web browsers, email clients, and online chat clients. Specific types of servers include web servers, ftp servers, application servers, database servers, name servers, mail servers, file servers, print servers, and terminal servers. Most web services are also types of servers.

Comparison to peer-to-peer architecture


A client-server network involves multiple clients connecting to a single, central server. The file server on a client-server network is a high capacity, high speed computer with a large hard disk capacity.

In contrast, peer-to-peer networks involve two or more computers pooling individual resources such as disk drives, CD-ROMs and printers[2]. These shared resources are available to every computer in the network, while each two of them communicate in a session. Each computer acts as both the client and the server which means all the computers on the network are equals, that is where the term peer-to-peer comes from. The advantage of peer-to-peer networking is the easier control concept not requiring any additional coordination entity and not delaying transfers by routing via server entities. However, the collision of session may be larger than with routing via server nodes. In the peer to peer network, software applications can be installed on the single computer and shared by every computer in the network. They are also cheaper to set up because most desktop operating systems have the software required for the network installed by default. On the other hand, the client-server model works with any size or physical layout of LAN and doesn't tend to slow down with a heavy use. Respective application of the concept is widely published in monographs and periodicals Peer-to-peer networks are typically less secure than a client-server networks because security is handled by the individual computers, not controlled and supervised on the network as a whole. The resources of the computers in the network can become congested as they have to support not only the workstation user, but also the requests from network users. It may be difficult to provide system wide services when the client operating system typically used in this type of network is incapable of hosting the service. Client-server networks with their additional capacities have a higher initial setup cost for networking than peer to peer networks. The long-term aspect of administering a clientserver network with applications largely server-hosted surely saves administering effort compared to not administering the application settings per each client. In addition the concentration of functions in performance servers allows for lower grade performance qualification of the clients.

It is possible to set up a server on a modern desktop computer, but it is recommended to consider investment in enterprise-wide server facilities with standardised choice of hardware and software and with a systematic and remotely operable administering strategy. It is easier to configure and manage the server hardware and software compared to the distributed administering requirements with a flock of computers. Challenges Generally a server may be challenged beyond its capabilities. Then a single server may cause a bottleneck or constraints problem. However, servers may be cloned and networked to fulfill all known capacity and performance requirements. Known limitations are

max. network load, max. network address volume max. transaction recovery time etc.

Aspects of comparison for other architectural concepts today include cloud computing as well. Possible design decision considerations might be: As soon as the total number of simultaneous client requests to a given server increases, the server can become overloaded. Contrast that to a P2P network, where its aggregated bandwidth actually increases as nodes are added, since the P2P network's overall bandwidth can be roughly computed as the sum of the bandwidths of every node in that network. However, this simple model ends with the bandwidth of the network: Then congestion comes on the network and not with the peers.
2

Any single entity paradigm lacks the robustness of a redundant configuration. Under clientserver, should a critical server fail, clients requests cannot be fulfilled by this very entity, but may be taken by another server, as long as required data is accessible. In P2P networks, resources are usually distributed among many nodes which generate as many locations to fail. If dynamic re-routing is established, even if one or more nodes depart and abandon a downloading file, for example, the remaining nodes should still have the data needed to complete the download. Mainframe networks use dumb terminals. All processing is completed on few central computers. This is a method of running a network with different limitations compared to fully fashioned clients. Using intelligent client terminals increases the maintenance and repair effort. Lesser complete netbook clients allow for reduction of hardware entities that have limited life cycles.When connecting devices with network cables, I ensure that each end of the cable connects tightly. Loose cables are one of the most common sources of network setup problems.

And what I Need are; A network router (wireless or wired)


Network adapters installed on all devices to be connected to the router A working Internet modem (optional) A Web browser installed at least one computer in the ne

CHAPTER THREE
3.1.0 CONCLUSION
2

In conclusion, there are many things that I have experienced and learned during the course of industrial training at GANNETCITY CONSULTING Ltd relative to my field of study.The whole training period was very instructive, encouraging and challenging. Through this training I was able to gain new insight and more comprehensive understanding about the real industry and working conditions and practice. The completion of the six month placement also has provided me the opportunities to develop and improve my hardware and functional skills. All of this valuable experience and knowledge that I have gained were not only acquired through the direct involvement in the task given but also through other aspect such as work observation, interaction with other colleagues, superiors, and other third party persons. From what I have undergone, I am sure that the Industrial training program have achieved its entire primary objective. Its also the best way to prepare students in facing the real working life. As a result of the program now I am confident to enter the employment world and build my future career. 3.1.1 RECOMMENDATION

I recommend the company to create more structured training program. However, I believe they can spend small portion of their time to plan more comprehensive, structured and organized training for the practical student. The supervisor in charge should do the following: Arrange and list out the list of task to be carried out by the trainee. A training schedule also should be made in order to optimize the training period. In arranging and assigning the training task, the supervisor also should try to fill the training period with task that is significant in developing the trainees knowledge, skills and experience for its future carrier.In overall, am quite impress and satisfied with the schools effort in making the program smooth and successful. However, there were some part that has to be improved: There must be consistent follow up on the part of the school to detect any lapses or inadequacy in what the students are learning. School supervisors should also visit students at work to make sure their participation in their various post is hundred percent. Project supervisors should encouraged students to pick their project topics in relation to the experience they had in their respective work places.

You might also like