My sincere gratitude goes to the Lord Almighty, who has spared my life, kept and grants me sound health throughout the duration of this programme. Am also very thankful to my parents in person of Mr. and Mrs. Adio who sponsored and cared for all my needs throughout this programme, May God in his infinite mercy bless them abundantly and grant them long life to eat the fruit of their labour. I Will also appreciate the effort of some staffs of Gannetcity consulting limited for their time and immense assistance. In this regard, I acknowledge the help and assistance of Engr. Akeredolu, Engr. Daramola, Mr. wole and Mrs jacob just to mention few.


This report work is dedicated to God, Mr and Mrs Adio my parent and My mentor Mrs obagbuwa , who has helped me all through. Also to my lovely and wonderful family and lecturers, I love you all.


.....4 COMPUTER REPAIRING/ON-BENCH TEST………………………… 2...3 CONFIGURATIONS OF CMOS………………………………………… 2....... ACKNOWLEDGEMENT.......................1 INTRODUCTION TO PC FONDAMENTAL………………………………… 2........3.........3.......2.....5 CLEANING OF COMPUTER…………………………………………… 3...3. 1.....................5 INSTALATION OF APPLICATION SOFTWARE……………………… 2. TABLE OF CONTENT.............2.....3 RECOMMENDATION………………………………………………………… 1 2 3 4-5 3-7 3 4 5 5 5 6-7 8-14 15 15 16 16 17-18 18-19 19-20 20 21 21-22 22-23 23-24 24 25 25 26 2 ........6 INSTALLATION OF WINDOW XP……………………………………… 2......3 CONCLUSION………………………………………………………………… 3...........2................3........4 DELITING TEMPORARY FILES………………………………………… 2..............................1DATA BACKUP……………………………………………………………… 2..1 ADDING AND REMOVING OF SYSTEM COMPONENTS…………… 2..2.... 1.1 INTRODUCTION.......2 FORMATTING……………………………………………………………… 2..7 WINDOWS UTILITY……………………………………………………… 2.......1 SUMMARY…………………………………………………………………… 3.2......................2.TITLE PAGE.......... DEDICATION.....1MAIN ACTIVITIES AND ACHEIVEMENT OF THE COMPANY ………… 2..................................2 COMPUTER MAINTENANCE……………………………………………… 2..........................3 ASSEMBLING AND DISASSEMBLING A PC………………………… 2...2 ABOUT SIWES……………………………………………………………… 1......2.....5 APPLICATION AND POSTING……………………………………………… 1........2................6 BACKGROUND OF THE COMPANY……………………………………… 1.....................3.........4 ABOUT ITF…………………………………………………………………… 1.........3 AIMS AND OBJECTIVES OF SIWES……………………………………… 1..................................................................................2 RESETING THE COMPUTER…………………………………………… 2........

CHAPTER ONE 1.0 INTRODUCTION WHAT IS INDUSTRIAL TRAINING? Industrial Training refers to the exposure of students in formal educational institutions to real work situation within their chosen discipline.0: 1. It was in this view that students undergoing science and technology related 2 . or only contemplated in abstractions. Due to this.1 BACKGROUND In the earlier stage of science and technology education in Nigeria. not where work is imagined. with a view to systematically enhancing the acquisition of related experiences.1.1. students were graduating from their respective institution without any technical knowledge or working experience. practical dexterity and general know-how. the exposure must take place where work is real. 1. The training must be in one’s own chosen academic discipline.

The relevant production skills remain a part of the recipients of industrial training as life-long assets which cannot be taken away from them. Provide an avenue for students in higher institutions of higher learning to acquire industrial skills and experiences during their courses of study. This is because the knowledge and skills acquired through training are internalized and become relevant when required to perform jobs or functions 1. Prepare students for industrial work situations that they are likely to meet after graduation.1. The student industrial Work Experience Scheme (SIWES) was established by the industrial Training Fund in (ITF) 1973 to enable students of tertiary institution have basic technical knowledge of industrial works base on their course of study before the completion of their program in their respective institutions. 1 of 1973 which established SIWES outlined the objectives of the were mandated for students in different institution in the view of widening their horizons so as to enable them have technical knowledge or working experience before graduating from their various institutions. The major benefit accruing to students who participate conscientiously in Students Industrial Work Experience Scheme (SIWES) are the skills and competencies they acquire. 2 . 2. The scheme was designed to expose students to industrial environment and enable them develop occupational competencies so that they can readily contribute their quota to national economic and technological development after graduation. The objectives are to: 1. The major background behind the embarkment of students in SIWES was to expose them to the industrial environment and enable them develop occupational competencies so that they can readily contribute their quota to national economic and technological development after graduation. The Industrial Training Fund’s policy Document No.2 AIMS/OBJECTIVES OF INDUSTRIAL TRAINING.

Enlist and strengthen employers’ involvement in the entire educational process through SIWES 1. 2 .3. thereby bridging the gap between theory and practice. Provide students with the opportunities to apply their educational knowledge in real work situations. Ojo. 4. Expose students to work methods and techniques in handling equipment and machinery that may not be available in their institutions.3 INTRODUCTION OF COMPUTER SCIENCE DEPARTMENT The Department of Computer Science was established as a full time course of study in 2007/2008 as one of the nine departments in the Faculty of Science. (FOS) of Lagos State University. 5. Make the transition from school to the world of work easier and enhance students’ contact for later job placements.1.

1. Sc.Sc. runs the B. S/N 1. 4.B.0 Company’s Background 2 .5 MISSION OF THE DEPARTMENT To create a unique Department that is technologically and professionally sound as a model centre of excellence committed to the pursuit of academic innovation. skill-based training in Information and Communication Technology and a tradition of excellence in teaching. 3. Akerele Mr Toyin Enikhuomehin Mr Idowu Gbolahan Mr Patrick Owate Areas of Specialization Head of Department Lecturer Lecturer Lecturer Lecturer 1.The Department presently. 1.It is our hope that this will engender the production of entrepreneurial graduates in information technology disciplines.2.) degree programme in Computer Science with a strong desire to provide a broad and balanced foundation in computer science knowledge and practical skills in preparation for a successive career and to provide a solid academic base upon which to build more advance degrees (M. and PhD) if so desired.1. 1. Names of Lecturers Mrs Obagbuwa Mrs . The Department enjoys modern communication and information technology facilities available in the institution which are utilized to train students and equip them with academic and professional IT knowledge. (Hon.1.6 MEMBERS OF STAFF The academic members of staff of the Department of Computer Science are listed in the table below. 5. capable of impacting positively on their environment while being globally competitive.4 VISION OF THE DEPARTMENT To be a centre of excellence providing high quality teaching and learning experiences in Computer Science. research and community service. 1. 2.

we shall be willing to provide ad-hoc services to meet your peculiar needs. Toner Cartridges. bookshop house 50/52 broad street lagos state which deals in info. Ribbons. The Company has proven itself not only in the area of Sales and efficient Maintenance Back Up Service. etc. skill and proficiency such as Local Area Network (LAN) PC. INVERTER). As a matter of routine. Inks. ISP provider. HITV. CHAMS CITY. DIGITALS and ANALOG MULTIMETERS. WOLE AKEREDOLU while we have experienced Engineers that can work extensively on Multi-User Systems. Binding machines. Desktops.GANNETCITY CONSULTING LIMITED is a private home Company suitated at 9th floor. Workstations. Storage devices. etc.1 SALES Main activities and achievement of the company We market at Manufacturer’s competitive price. Printers. Epson. Networking and Micro-Mainframe Communication. Our Managing Director. Scanners. We sell at very competitive price. etc) and office equipment such as Note counting machines. high quality computer consumables such as Computer Papers. local and wide area network. Systems Appraisal and Development. We have at the helm of affairs experienced professionals who have been in Office Automation Industry for years. Shredding machines. a wide range of Computer Hardware (Servers. OTC. 1. Power systems. and Panasonic. We are Partners to KKONS.academic and technology service such as computer hardware. HP. In addition. but also in specialized area that require in-depth knowledge. TECHNICAL DEPARTMENT Amongst various tools and equipment available are OSCILLOSCOPE. SOLDERING / DISOLDERING WORK STATION. We market various brand of printers such as Tally Genicom. router configuration. MAINTENANCE SERVICES With an ultra modern workshop and a crop of experienced Engineers. we provide regular check-up services and repairs on all equipment supplied to optimize consumers’ satisfaction.2. We also market Uninterrupted Power Supply (APC. MR. EPROM 2 . the Company stands to meet all your back-up maintenance needs. Photocopiers.

TECHNICAL DEPARTMENT: This department is in charge of the overall deployment of the company's solutions (products and services).WRITERS. I worked closely with the department at a point in my industrial training. we shall train your staff to carry out efficiently first-aid repairs on your equipment to further minimize downtime 1. 1. 3. 2. The head of the department is Engr. lectures being given on daily basis CHAPTER TWO 2. VACUUM CLEANERS.. Also. INTRODUCTION OF VARIOUS DEPARTMENTS OF GANNETCITY CONSULTING LTD I was assigned to work in the following department routinely and was introduced to these various department. 3 ADMINISTRATIVE AND ICT TRAINNING DEPARTMENT: This is the department that is in charge of the administation and day-to-day activities of the company. Technical support Department Reception and Customer Service Department Administrative and ICT Training Department 1. LOGIC and CAPACITANCE METERS AND OTHER EQUIPMENT FOR THE INSTALLATION AND MAINTENANCE OF QMS. This can be arranged in-house for your convenience or at our workshop.0 OVERVIEW OF WORK DONE/ACTIVITIES AT GANNETCITY CONSULTING 2 . TRAINING We provide training facilities to enable our Clients obtain the best use of their valued purchases. Daramola who works and supervise other members and IT students on project work. FLOPPY DISK DRIVE TESTER. We guarantee prompt attention and minimum downtime on your Systems.also involve in program planning marketing and follow up.2. power electronic inverter. ULTRAVIOLET EPROM ERASERS. PC repair and also offers support to the user’s 2 RECEPTION AND CUSTOMER SERVICE DEPARTMENT: This department was headed by Mrs Jacob other member of the department were Miss Esther . The department prospects and follows-up potential customers.2. troubleshooting.

ring and mesh. Although my activities were not limited to these. Web pages. .1 WHAT IS A NETWORK? A network is a means whereby intelligent end-user PCs can share common resources. The two types of high-level network design are called client-server and peer-to-peer. files and or applications. whereas in a star network. Common types of network topologies include bus. star. Network topologies are categorized into the following basic types: • • • • • bus ring star tree mesh More complex networks can be built as hybrids of two or more of the above basic topologies. • General Networking and installations in the technical department.g cloning) carried out on systems were done properly. all of the computers share and communicate across one common conduit. conversely. I was involved in . all computers tend to support the same functions. In so-called bus networks. all data flows through one centralized device. Client-server networks are much more common in business and peer-to-peer networks much more common in homes. Client-server networks feature centralized server computers that store email. During the training.LIMITED. Computer networks also differ in their design. Bus Topology 2 . I was also opportuned to be tasked with ensuring that repairs(e. NETWORK TOPOLOGY A network topology represents its layout or structure from the point of view of data flow. I was opportune to delve into various fields of the IT world. 2. for example. On a peer-to-peer network.

the backbone functions as a shared communication medium that devices attach or tap into with an interface connector. or Token Ring technology. one typically uses FDDI. and each hub functions as the "root" of a tree of devices. However. only hub devices connect directly to the tree bus. A single cable. To implement a ring network. if the backbone cable fails. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). If more than a few dozen computers are added to a network bus. switch or router. Star Topology Many home networks use the star topology. but only the intended recipient actually accepts and processes the message. In its simplest form. a star network generally requires more cable. Ethernet bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. SONET. the entire network effectively becomes unusable.Bus networks (not to be confused with the system bus of a computer) use a common backbone to connect all devices. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years ago for bus topologies. however. performance problems will likely result. (If the hub fails. bus networks work best with a limited number of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the 2 . Compared to the bus topology. Ring Topology In a ring network. every device has exactly two neighbors for communication purposes. the entire network also fails.) Tree Topology Tree topologies integrate multiple star topologies together onto a bus. In addition. A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see. Ring topologies are found in some office buildings or school campuses. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. A failure in any cable or device breaks the loop and can take down the entire network. A star network features a central connection point called a "hub" that may be a hub. but a failure in any star network cable will only take down one computer's network access and not the entire LAN.

messages sent on a mesh network can take any of several possible paths from source to destination. Mesh Topology Mesh topologies involve the concept of routes. most notably the Internet. (Recall that even in a ring. the communication language used by computer devices is called the protocol. Yet another way to classify computer networks is by the set of protocols they support. Network Protocols In networking.2 TYPES OF NETWORK LAN . Unlike each of the previous topologies. Popular protocols include TCP/IP. Recently. although two cable paths exist. employ mesh routing.) Some WANs. the most common protocol found on the Internet and in home networks. Wired And Wireless Networking Many of the same network protocols. wireless networking alternatives have emerged as the premier technology for building new computer 2. however. work in both wired and wireless networks. Networks with Ethernet cables predominated in businesses.broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.Local Area Network 2 . As shown in the illustration below. A mesh network in which every device connects to every other is called a full mesh. like TCP/IP. Networks often implement multiple protocols to support specific applications. and homes for several decades. schools. partial mesh networks also exist in which some devices connect only indirectly to others. messages can only travel in one direction.

A WAN is a geographically-dispersed collection of LANs.Wide Area Network As the term implies. spanning the Earth. They also tend to use certain connectivity technologies. The ISP provides a WAN IP address to the modem. the router maintains both a LAN address and a WAN address. typically a broadband router. a WAN spans a large physical distance.a LAN based on WiFi wireless network technology 2 . to reach the ISP. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WAN and Home Networking Residences typically employ one LAN and connect to the Internet WAN via an Internet Service Provider (ISP) using a broadband modem. Frame Relay and X. and all of the computers on the home network use LAN (so-called private) IP addresses. A network device called a router connects LANs to a WAN. school. though sometimes one building will contain a few small LANs (perhaps one per room). All computers on the home LAN can communicate directly with each other but must go through a central gateway.25 for connectivity over the longer distances. In TCP/IP networking. and occasionally a LAN will span a group of nearby buildings. In IP networking. you may also commonly see references to these others: • Wireless Local Area Network . a LAN is often but not always implemented as a single IP subnet.A LAN connects network devices over a relatively short distance. LAN. and managed by a single person or organization. In addition to operating in a limited space. primarily Ethernet and Token Ring. WAN . Other Types of Area Networks While LAN and WAN are by far the most popular network types mentioned. A networked office building. LANs are also typically owned. controlled. A WAN differs from a LAN in several important ways. The Internet is the largest WAN. or home usually contains a single LAN. WANs tend to use technology like ATM.

a network spanning a physical area larger than a LAN but smaller than a WAN. Crossover cables are useful for temporary networking of devices when a network router. Storage Area Network . 2 . Network patch cables are typically CAT5 or CAT5e Ethernet cables linking a computer to a nearby hub. A MAN is typically owned an operated by a single entity such as a government body or large corporation.links high-performance computers with high-speed connections in a cluster configuration. Null modem cables enable data transfer between two computers with a minimum of setup required. 2. 1. Fiber Optic Cable Fiber optic cables carry information using pulses of light. such as on a university or local business campus. switch or router. Ethernet Crossover Cables A crossover cable directly connects two network devices of the same type to each other over Ethernet.• • • • Metropolitan Area Network . such as a city.3 Network Cables and Cabling While wireless may be the wave of the future. System Area Network . most computer networks today still utilize cables. Direct Cable Connection CAT5 and CAT6 Cables (6) Patch Cables A patch cable connects two network devices.connects servers to data storage devices through a technology like Fibre Channel. RJ45 connectors feature eight pins to which cables interface electrically.a network spanning multiple LANs but smaller than a MAN. RJ-45 Connectors and Cables RJ45 is a standard type of connector for network cables such as those used in Ethernet networks. 2. These cables are designed for long distance network communications. Also known as Cluster Area Network. although fiber to the home installations are becoming more common. Null Modem Cables A null modem cable connects two standard serial ports for the purpose of computer-tocomputer networking. switch or hub is not present. Campus Area Network .

OSI Model Area Networks Cisco Networking Information Technology Network Protocols Network Certifications Network Software Network Storage Overview of the OSI Model The OSI model defines internetworking in terms of a vertical stack of seven layers. Leased lines most commonly are rented by businesses to connect branch offices. The OSI model provides a good conceptual framework for understanding the implementation of network protocol and services design. This page briefly explains the basic structure of the OSI model. RS-232 Pinouts These pinout diagrams illustrate the 9-pin and 25-pin serial line RS-232 standard network cables. 6. 7.4 Network Design Design considerations for computer networks cover a wide range of topics including layout. 8. As presented in this in-depth 2 .What Are T1 Lines and T3 Lines? T1 and T3 lines are reserved circuits typically used by organizations to connect two geographically separated offices for private voice and/or data telecommunication service. 3. Leased Line A leased line is a cable connecting two specific locations for voice and/or data network service. and security. capacity planning. Network Cable and Connection Technologies Practice Exam This interactive test presents questions and answers on common cabling technologies for home networks. 1. 5. 2. 2. 4.

• • Position Your Router / Access Point for Best Performance How Can the Range of a Wi-Fi Network Be Boosted? 2. the design of many modern network technologies follows the OSI model to some extent.5 PROBLEM AND SOLUTION IN NETWORKING I was able to learn to learn and observe problems and solution to networks 1. This can cause the interference and range problems described above. This includes operating system patches. in this scenario your computers will lose connection whenever the neighbor network is turned off. Upgrading (overinstalling) newer versions of these things can sometimes fix network connection problems. even if your preferred one remains functional. your devices may connect to the wrong network without your knowledge. Keep records of each time you install or upgrade software on your computers. Upgrade Router / Access Point Firmware 4. 2 . • Improve Wireless Network Security 3. Incompatible Software Packages Installed Wi-Fi network connections may start failing on a computer due to incompatible software installed and running there. 2. operating system services. consider antenna upgrades and other techniques to improve wireless signal transmission and reception. Network routers contain related technology called firmware. Insufficient Wi-Fi Network Range and Power Even without interference from other equipment. and other software that modifies the networking capabilities of the operating system. Wi-Fi links generally become more unstable with distance. Unknowingly Connecting to the Wrong Wi-Fi Network If two neighboring locations run unsecured Wi-Fi networks with the same name (SSID). The Wi-Fi network device driver controls various functions of the Wi-Fi hardware. Otherwise. and be prepared to uninstall any incompatible software you've added recently. Take proper security measures to ensure your computers connect to the right network. Relocating your computer or other gear is a simple but not always practical solution. Additionally. Network Driver or Firmware Upgrade Required Each computer connected to a Wi-Fi network utilizes a small piece of software called the device driver. Wi-Fi connections can drop occasionally on devices located near the edge of the network's wireless signal range. Network drivers and firmware can both become obsolete over time.tutorial.

this does not guarantee success with the next new feature that comes along. is a common problem when first installing a home network. Special Devices Won't Join the Network Many home networks have a "problem child. It could be a lone wireless computer trying to join a wired network. But even with wireless networks. No error messages are being displayed. P2P file sharing. Whatever the situation. Overloading / Overheating the Wireless Access Point Owners of some wireless routers (and other types of wireless access points) have reported dropped connections during times of heavy network utilization. Or it could be a computer running an old version of Microsoft Windows or running Linux. networks won't conveniently reach all of the areas a person needs. Relax. of course. If a router's temperature increases too much. Stringing network cables to some rooms can prove impractical. None of the devices can "see" each other or "talk" to the printer. and your network will be up and running soon. online gaming or while copying large files. You're developing a sneaking suspicion that your network is laughing at you. or a porch are also common. Install routers (access points) in places with good airflow. 7. it may also fail until cooled. The device could be a specialized piece of hardware like a game console. After a simple check of the key network components. "cold spots" where Wi-Fi radio signals won't reach corner bedrooms. any such problems can be solved.5. Network Can’t Reach Certain Areas In many homes. extra care and feeding may be required to get your problem child to behave. too. However. 8. Given time and effort. Routers can in theory become overloaded with too much data and fail temporarily. This can occur during. Take a step-by-step approach to this problem. they may still fail to reach Web sites on the Internet. 5. but nothing works. and online games are typical problematic applications on home networks. Computers Can't See Each Other on the Network You've finished connecting all your network gear to the best of your ability. This. 6. solutions often require specific knowledge of how these applications work. This fact surprises many folks. you'll be surfing again in no time. Exchange the router for a different unit if the current one doesn't support your usage patterns. Be ready to make a few concessions in your network installation plan." one computer or device that simply will not cooperate with the others. 2 . Instant messaging." or they may sit there like zombies and not do anything. Certain Network Applications Won't Function While other aspects of a home network may work reliably. for example. a study. 6. Computers Can't Get on the Internet Even when all of the devices in a home can communicate with each other. These apps may fail to connect to a "server" or "peer.

or playing a networked game at home. a week or a month. sluggish or unplayable network games. swapping files on a P2P network. Network Connections Drop Unexpectedly A home network may operate flawlessly for a day. in the sense of data privacy. They may experience very slow Web page downloads. 8. Network is (Too) Insecure No. 10. though. Many home networks are insecure. a home network won't become overly self-conscious and suffer from a lack of confidence. and miss out on a major gain in their personal productivity. By carefully establishing home and work network settings (often called "profiles") on the devices. home/office network mobility can be a reality for you. and other symptoms of a bad network performance problem. Some folks see it as a big hassle. at the most inopportune time. You may have been happily listening to an Internet radio station. Don't let them happen to yours! 2. interminable delays in online chatting/IM applications.7. Office Computer Won't Join Home Network Those who use laptop computers or PDAs at their workplace naturally might want to use those same devices at home. Network is Too Slow For several reasons. give up. but suddenly. they happen every day and affect real families. Too many homeowners fail to take a few essential steps to protect their network from attacks by outsiders. Network attacks and "hacks" are real threats.6 SWITCHES AND ROUTERS 2 . 9. something breaks. Then… boom! What happened? There are several possibilities. a home network might not run fast enough to keep up with a family's needs. Technical limitations make this form of network mobility more difficult than it should be. Know what to watch for to avoid this frustrating situation. Don't be surprised if this happens to you.

switches. Each has two or more connectors called ports into which you plug in the cables to make the connection. if it sees traffic from machine A coming in on port 2. it can "learn" where particular addresses are. and least complicated of the three. least intelligent. it now knows that machine A is connected to that port and that traffic to machine A needs to only be sent to that port and not any of the others. The hub itself is blissfully ignorant of the data being transmitted. and routers are all devices that let you connect one or more computers to other computers. I often see the terms misused so let's clarify what each one really means. • A hub is typically the least expensive. A router is the smartest and most complicated of the bunch. For example. Its job is very simple: anything that comes in one port is sent out to the others. For years. Every computer connected to the hub "sees" everything that every other computer on the hub sees. The net result of using a switch over a hub is that most of the network traffic only goes where it needs to rather than to every port. A switch does essentially what a hub does but more efficiently. That's it. networked devices. or to other networks. and therein lies the difference. On busy networks this can make the network significantly faster. Varying degrees of magic happen inside the device. simple hubs have been quick and easy ways to connect computers in small networks. Routers come in all shapes and sizes from the small four-port broadband routers that are very popular right 2 .Hubs. By paying attention to the traffic that comes across it.

3. Open the router's administration tool. broadband routers include the ability to "hide" computers behind a type of firewall which involves slightly modifying the packets of network traffic as they traverse the device.7 How To Set Up a Network Router I learnt how to setup / connect router and switches together in connection with coupled system given by some instructions I put in practice as. The really large routers include the equivalent of a full-blown programming language to describe how they should operate as well as the ability to communicate with other routers to describe or determine the best way to get network traffic from point A to pointB. Even if the router is a wireless model. A simple way to think of a router is as a computer that can be programmed to understand. Then enter the router's address for network 2 . the computer can be changed over to a wireless connection if desired. This does not need to be the permanent location of the device. From the computer connected to the router. you may find it necessary to re-position the unit after installing it as the cables / signals may not reach all areas needed. Using a cable during router installation ensures the maximum reliability of the equipment. All routers include some kind of user interface for configuring how the router will treat traffic. be sure to power cycle (turn off and turn back on) the modem to ensure the router recognizes it. connect this first computer to the router via a network cable. and route the data its being asked to handle. 4. 2. Once a wireless router installation is complete. then turn on the router by pushing the power button. 1. For example. 2. Particularly for wireless routers. Most network modems connect via an Ethernet cable but USB connections are becoming increasingly common. possibly manipulate. At the beginning. Plug in the router's electrical power to the large industrial strength devices that drive the internet itself." After connecting the cable. Choose a convenient location to begin installing your router such as an open floor space or table. 5. (Optional) Connect your Internet modem to the router. first open your Web browser. Connect one computer to the router. its better to choose a location where it's easiest to work with the router and worry about final placement later. The cable plugs into the router jack named "WAN" or "uplink" or "Internet. These WiFi Home Network Security Tips offer a good checklist to follow. Finally. 11. 6. 7. If connecting wirelessly. If you want your router to connect to the Internet. Read How to Change a MAC Address for a detailed description of this process. your provider may require you to update the MAC address of the router with the MAC address of the device you were using previously. visit a few Internet sites such as 12. configure additional network security features as desired to guard your systems against Internet attackers. 8. To do this. 13. Log in to the router. 10. If using DSL Internet. Verify the network connection is working between your one computer and the router. Read How to Change the Router SSID for detailed instructions. the static IP fields (including network mask and gateway) given to you by the provider must also must be set in the router. If this is a wireless router. you may need to enter the PPPoE username and password. The router's home page will ask you for a username and password. you must confirmed that the computer has received IP address information from the router. change the network name (often called SSID). you will never want to use this name on your network. you must enter Internet connection information into that section of the router's configuration (exact location varies). You should change the router's password for security reasons. (If applicable) Verify your one computer can connect to the Internet properly. 2 . ensure the network name (SSID) of each is computer matches that of the router.administration in the Web address field and hit return to reach the router's home page. Connect additional computers to the router as needed. While the router comes to you with a network name set at the factory. but do this after the installation is complete to avoid unnecessary complications during the basic setup. Likewise. Open your Web browser and http://compnetworking. Both are provided in the router's documentation. See How to Find IP Addresses for a description of this process. If you were using a primary computer or an older network router to connect to the Internet. 9. if you have been issued a static IP address by your provider (you would need to have requested it).

Many business applications being written today use the client–server model. central server. database servers. web access and database access are built on the client–server model. print servers. Specific types of servers include web servers. mail servers. Most web services are also types of servers. Hence. The client–server characteristic describes the relationship of cooperating programs in an application. which initiate requests for such services. So do the Internet's main application protocols. The balance is returned to the bank database client. and terminal servers. ftp servers. The client–server model has become one of the central ideas of network computing. I was opportuned to go to various sites. The server component provides a function or service to one or many clients. where with the engineers. The file server on a client-server network is a high capacity. Functions such as email exchange. TYPES OF CLIENT AND SERVER Specific types of clients include web browsers. name servers. which in turn serves it back to the web browser client displaying the results to the user. That program may in turn forward the request to its own database client program that sends a request to a database server at another bank computer to retrieve the account information. high speed computer with a large hard disk capacity. SMTP. Sequence diagrams are standardized in the Unified Modeling Language. we carry out both preventive and curative maintenance on large systems also known as “Servers”. Telnet.2. Users accessing banking services from their computer use a web browser client to send a request to a web server at a bank. application servers. The interaction between client and server is often described using sequence diagrams. file servers. Comparison to peer-to-peer architecture A client-server network involves multiple clients connecting to a single. email clients. such as HTTP. it is required for this report that we discuss briefly what a server is and the few types around. 2 .8 CLIENT AND SERVER NETWORK While at Gannetcity consulting ltd. and online chat clients. and DNS.

The long-term aspect of administering a clientserver network with applications largely server-hosted surely saves administering effort compared to not administering the application settings per each client. software applications can be installed on the single computer and shared by every computer in the network. In the peer to peer network. Client-server networks with their additional capacities have a higher initial setup cost for networking than peer to peer networks. the client-server model works with any size or physical layout of LAN and doesn't tend to slow down with a heavy use. These shared resources are available to every computer in the network. CD-ROMs and printers[2]. 2 . not controlled and supervised on the network as a whole. the collision of session may be larger than with routing via server nodes. Respective application of the concept is widely published in monographs and periodicals Peer-to-peer networks are typically less secure than a client-server networks because security is handled by the individual computers. The resources of the computers in the network can become congested as they have to support not only the workstation user. while each two of them communicate in a session. On the other hand. However. that is where the term peer-to-peer comes from. peer-to-peer networks involve two or more computers pooling individual resources such as disk drives. but also the requests from network users.In contrast. It may be difficult to provide system wide services when the client operating system typically used in this type of network is incapable of hosting the service. The advantage of peer-to-peer networking is the easier control concept not requiring any additional coordination entity and not delaying transfers by routing via server entities. Each computer acts as both the client and the server which means all the computers on the network are equals. In addition the concentration of functions in performance servers allows for lower grade performance qualification of the clients. They are also cheaper to set up because most desktop operating systems have the software required for the network installed by default.

where its aggregated bandwidth actually increases as nodes are added. However. Then a single server may cause a bottleneck or constraints problem.It is possible to set up a server on a modern desktop computer. It is easier to configure and manage the server hardware and software compared to the distributed administering requirements with a flock of computers. Possible design decision considerations might be: As soon as the total number of simultaneous client requests to a given server increases. Challenges Generally a server may be challenged beyond its capabilities. max. since the P2P network's overall bandwidth can be roughly computed as the sum of the bandwidths of every node in that network. However. Known limitations are • • • max. Aspects of comparison for other architectural concepts today include cloud computing as well. network load. the server can become overloaded. network address volume max. 2 . servers may be cloned and networked to fulfill all known capacity and performance requirements. but it is recommended to consider investment in enterprise-wide server facilities with standardised choice of hardware and software and with a systematic and remotely operable administering strategy. this simple model ends with the bandwidth of the network: Then congestion comes on the network and not with the peers. Contrast that to a P2P network. transaction recovery time etc.

clients’ requests cannot be fulfilled by this very entity. but may be taken by another server. as long as required data is accessible. In P2P networks. Under client–server.Any single entity paradigm lacks the robustness of a redundant configuration. This is a method of running a network with different limitations compared to fully fashioned clients. even if one or more nodes depart and abandon a downloading file.1. resources are usually distributed among many nodes which generate as many locations to fail. If dynamic re-routing is established. A network router (wireless or wired) • • • Network adapters installed on all devices to be connected to the router A working Internet modem (optional) A Web browser installed at least one computer in the ne CHAPTER THREE 3.When connecting devices with network cables. Mainframe networks use dumb terminals. Using intelligent client terminals increases the maintenance and repair effort. the remaining nodes should still have the data needed to complete the download. All processing is completed on few central computers. Loose cables are one of the most common sources of network setup problems. for example. Lesser complete netbook clients allow for reduction of hardware entities that have limited life cycles. And what I Need are. I ensure that each end of the cable connects tightly.0 CONCLUSION 2 . should a critical server fail.

2 . Project supervisors should encouraged students to pick their project topics in relation to the experience they had in their respective work places. I believe they can spend small portion of their time to plan more comprehensive. there are many things that I have experienced and learned during the course of industrial training at GANNETCITY CONSULTING Ltd relative to my field of study.In overall. The completion of the six month placement also has provided me the opportunities to develop and improve my hardware and functional skills. • In arranging and assigning the training task. superiors. It’s also the best way to prepare students in facing the real working life. structured and organized training for the practical student. I am sure that the Industrial training program have achieved its entire primary objective. As a result of the program now I am confident to enter the employment world and build my future career. Through this training I was able to gain new insight and more comprehensive understanding about the real industry and working conditions and practice.1 RECOMMENDATION I recommend the company to create more structured training program. The supervisor in charge should do the following: • • Arrange and list out the list of task to be carried out by the trainee. and other third party persons. School supervisors should also visit students at work to make sure their participation in their various post is hundred percent. the supervisor also should try to fill the training period with task that is significant in developing the trainee’s knowledge. interaction with other colleagues. encouraging and challenging. All of this valuable experience and knowledge that I have gained were not only acquired through the direct involvement in the task given but also through other aspect such as work observation. From what I have undergone.The whole training period was very instructive. However. A training schedule also should be made in order to optimize the training period. there were some part that has to be improved: • • • There must be consistent follow up on the part of the school to detect any lapses or inadequacy in what the students are learning. 3.1.In conclusion. However. am quite impress and satisfied with the school’s effort in making the program smooth and successful. skills and experience for its future carrier.

Sign up to vote on this title
UsefulNot useful