You are on page 1of 21

ABSTRACT

The Cloning of Computer System is necessary in an ICT working environment This project
focuses more on how computer system could be coupled and maintained effectively and efficiently
without any fault during assembling of the system.
Throughout this project we shall focus on each and every component needed for assembling and
also their functions. The main reason why people go for assembling of system instead of buying a
new system is to allow them to have good and satisfactory quality of what they want. Buying a
new computer system might not solve the problem of some people but coupling it themselves ease
their wounds when it comes to satisfaction. The main important of coupling a computer system is
to have access to all those components and to know how to couple and disassemble it when the
system is faulty.
This research has managed to purchase the Sub-Assembly computer components and couple it to
make a computer system that could rival the performance of the branded version.
CHAPTER ONE

INTRODUCTION

Building and assembling a computer system, gives maximum satisfaction to the user and a very
rewarding experience. To Assembles Desktop PC (Personal Computer) the users/builders of such
systems are probably contemplating building or assembling a computer instead of purchasing one
pre-built or pre-assembled. This project is to enlighten us on how a computer student can build a
computer and peer to peer network with less stress and less amount of money, and how the
computer built can meet up with the processing requirement of the school Laboratory. This
research has managed to purchase the Sub-Assembly computer components and couple it to make
a computer system that could rival the performance of the branded version.

1.1 BACKGROUND FOR THE STUDY

Building the computer system on this research embarks on gathering different


components/devices of computer system together in other to make a well-functioning computer
system available to the computer laboratory and to enable students to be more familiar to each
components of the computer system. Thus, this project will cover all the process of purchasing
components, coupling, and the process of installing the OS (operating system) into the computer
system. Building or assembling corei3 computer brings significant benefits which is identified
below.

i. Know about computer components and how they fit and work together.

ii. Understanding the internal and hardware workings of a computer.

iii. Learning computer hardware terminology

iv. Ability to customize a computer according to specialized specifications.

v. Building and assembling computer system from components.

vi. The satisfaction of a job well-done.

vii. Technical problem-solving ability.


1.2 MOTIVATION

I am persuaded that the computer-built manufacturers in the economic only fit in to general
purpose computing which is quite different from the most required and needed specification most
time e.g. using the computer as a server for database of students.

1.3 OBJECTIVE OF THE STUDY

The main objective is to build well-functioning computer with purpose of:

i. Identifying computer components and how they fit and work together.

ii. Understanding the internal and hardware workings of a computer.

iii. Learning computer hardware terminology and geek-speak

iv. Ability to customize a computer according to specialized specifications.

v. Building and assembling computer system from components,

vi. The satisfaction of a job well-done

vii. Gathering technical problem-solving ability.

viii. Reduce the cost of buying new computer system

1.4 SCOPE OF THE STUDY

The scope of this research is to show how computer system could be purchased in parts,
assembled and installed with required software to match a given configuration for the use in the
laboratory.

1.5 EXPECTED CONTRIBUTION TO KNOWLEDGE

The study is expected to specify the fact that computer is made up of several components
functioning together as a single unit.

It will enable us to know that hardware cannot work alone to makes a computer without
software being installed.

It gears us up to know the functionality of human to computer system.


1.6 METHODOLOGY

Method used to make complete system are:

i. Know the market price between a whole PC Desktop and Sub-assembly computer.

ii. Choosing the components that make a complete system such as: the system casing,
Motherboard. Hard disk. CDROM. Monitor, Keyboard, Mouse and some internal
components.

iii. Buying tools that will be use to assemble the system these are: Needle Nose Pliers,
Screwdriver, small plastic bin to put your screws and other small parts into, small
flashlight.

iv. Then the procedure for assembly and installation process begins.
CHAPTER TWO

LITERATURE REVIEW

Cloning of computer system primarily specifics the ability of a computer science student to have
the technical know how about and how to choose between buying a whole or sub assembly
computer system. Cloning of a computer system regards as step by step procedure for assembling
computer components for the purpose of achieving a set of configurations required by the users.

2.1 HISTORY OF PEER-TO-PEER NETWORK

In the early days after the Internet had been developed the most popular file sharing was
the FTP (file transfer protocol) because it was anonymous. Since, the file sharing is anonymous
over the FTP server lets users log-in with an anonymous name to receive files or share files on the
Internet. Computers were able to access remote files on other computers.

Usenet was one of the first developed in 1979; the network was initially based for dial-up
connection but has been transferred over to the Internet. Usenet uses a specialized client server
protocol called Network News Transfer Protocol (NNTP). This special server primary purpose is
the exchange of text messages, but attached to these messages is encoded files which are
distributed to subscribers of Usenet. Usenet is one of the largest carries of file sharing and Internet
traffic. Many legal questions have arisen around the use of copyrighted material over file sharing.
Between the developments of Usenet in 1979 to the 1990’s, files sharing was primarily done
through the use of bulletin board-based systems. The computer game Doom grew in popularity
due to the distribution of files through the bulletin board system. Bulletin board systems became
less desirable as the Internet grew and more advanced techniques for file sharing were developed.

About 20 years after Usenet had been developed, a new type of file sharing system was
created called Napster, which uses a centralized server to group all the files shared into v databases.
Since, Napster used a centralized server for file sharing services could not use the transitory
network transmission safe found in the Digital Millennium Copyright Act since they had control
over all functions of their network. The software Napster collected and stored file information
from their users computers to being made available for other people to download. Napster was the
client host, which provided the ability of file sharing between the users once it had been authorized
by Napster. Not long after Napster was created the company was charged with crimes of copyright
infringement, more specifically the case A&M Records, Inc. v. Napster, Inc. will be looked at in
greater depth later in the document.

After the legal concerns facing Napster, in 2000 Gnutella was released in March and was
the first decentralized file sharing network. The decentralized network was connected to all
software and therefore had no immediate point of failure unlike Napster. A year after Gnutella in
2001, Kazaa was developed and its FastTrack network was distributed and was assigned super-
nodes to increase the efficiency of networking between users. This network was encrypted and
made vast attempts to keep other competitors off the FastTrack network. Kazaa was one of the
most popular file sharing systems after Napster until its decline in 2004 due to bundled malware
and legal battles. Since these file sharing programs were getting into lawsuits, many universities
and institutions added file sharing regulations due to the legality concerns. Many others have been
developed for example LimeWire and Pirate Bay, have faced legal penalties. But, networks such
as Bit Torrent have seemed to manage and circumvent these legal ramifications due to its open
source clients. Bit Torrent uses a torrent file to store the metadata. The torrent file contains URL’s
of multiple trackers, which contain specific pieces of the file being downloaded. Simultaneously
your file is being downloaded from multiple sources at one time.
2.1.1 ADVANTAGES OF P2P NETWORK

It’s simple and easy to setup it requires only HUB or switches and RJ45 cables to connect all the
computers together.

File on the computer can be easily access on another computer if it set to shared folders.

It’s cheap than having to use a server. The only cost involved is hardware, cabling and
maintenance.

The architecture of the layout is simple (how it connects)

If one of the computers fails to work the other computers that connected will still be able to work.

It doesn’t need any full-time system administrator. Every user is basically their own administrator
of their computers.
2.2 FUNCTION OF THE COMPUTER SYSTEM

Browsing the internet

To provide basic functionality to a user who just needs web surfing, a little-word processing, and
the occasional game of solitaire, it’s important not to go overboard. Such a user has no need for a
top of the line processor or 3D graphics card. A modestly configured system with an adequate
internet connection will suit this user best and can be assembled quite cheaply. This usage pattern
is not going to stress any particular component, you should be looking at a mid-to low-level
processor historically, and current, enough RAM for the OS (operating system) and a mother board
with built in Ethernet, video and audio. If you have a little extra money, spend it on a better
monitor, mouse/keyboard, and case power supply in that order.
Data processing in the offices

An office computer can be expected to do word processing, spreadsheet and database work,
internet and intranet access (including e-mail) and a little light development of spreadsheets,
databases, and presentations. It might also be called on to do page layout work, some 2D graphic
creation, and/or terminal emulation.

Gaming System

We’re not talking here about the occasional game of solitaire or a secret late-night Zuma obsession.
We’re talking about cutting edge 3D gaming first-person-shooters or real-time strategy games with
thousands of troops on the screen at the same time, specula reflections and a lot of other confusing
terminology that describes visual effects designed to make your system fall down on its knees and
cry like a little girl.

So, you’re going to need a fast processor that’s affordableh9 and plenty of RAM, as well as a
motherboard to match, since the speed of the motherboard buses can limit high-end components.

Video editing

Big and fast hard drives are key, 10000 RPM Raptors in Raid 0 as working space with multiple
750 GB drives or I terabyte drives for storage is a good target. SATA/300 is highly recommended
and SCSI subsystems should also be considered. A large amount of memory (2GB, 3GB, even
4GB) would be beneficial.
Music production

Plenty of disk space is important, but a music production (recording and mixing) workstation is
chiefly distinguished by specialized external components studio reference monitors instead of
speakers, mixing consoles, microphones, etc.

One piece of advice, if you have extra money, get better microphones, even if you have to trade
the Blues mobile.
Entertainment system/media center

This is a computer designed to sit in the living room with the rest of your A/V gear. The idea is
that it will record and serve audio and video files foreplay via your existing television and stereo.

2.3 WHERE TO GET THE PART/COMPONENTS

Once you have decided what you’re going to use your computer for, and have reviewed
which parts are available for reuse, you should make a list of what components you will need to
buy. A few hours of research can save your years of regret, so make sure that the computer builds
will do need it to do.

Computer terminology can be confusing, so if there are terms you don’t understand, be sure to
look them up.

There are several places to buy parts:

Internet retailers generally offer the best price for new parts. If a part needs to be returned, you
may be stuck for the shipping; check return policies before it can be purchase (Computer Village
Ikeja Lagos)

Auction sites like eBay, Amazon and several others offer very good prices for used parts. This is
especially useful for parts which do not wear out. Return scan be problematic or impossible. Some
auctions may not be legitimate. Always check the shipping cost before you bid.

Local PC shops their prices are often higher, but they may make up for this by providing a lot of
expertise. Get opinions from other sources, however, as they may be eager to sell you parts you
don’t need. Big Local retailers often lack technical expertise and higher prices, but can be useful
because they usually handle returns quickly. Also, good if you need something right then.
Trade shows that occur from time to time also provide a good to shop, as the prices are often
significantly reduced. Also, your local town dump may have a special section for computers &
monitors that others have got rid of. These can be more or less brand-new computers with trivial
problems such as a busted power supply or faulty cables.

Of course, if the dump does have such a section, you should ask permission of those in charge.
They’re usually glad to let you go through it, but don’t leave mess. Taking advantage of this can
yield incredible finds, with a price tag of nothing or very little.

OEM vs. retail

Many hardware manufacturers will sell the same components in both OEM and Retail versions.
Retail hardware is intended to be sold to the end-user through retail channels, and will come fully
packaged with manuals. Accessories, software, etc. OEM stands for original equipment
manufacturer; items labeled as such are intended to be sold in bulk for use by firms which integrate
the components into their own products
However, many online stores will offer OEM hardware at cheaper prices than the
corresponding retail versions. You will usually receive such an item by itself in an anti-static bag.
It may or may not come with a manual or a CD containing drivers. Warranties on OEM parts may
often be shorter, and sometimes require you to obtain support through your vendor, rather than the
manufacturer. OEM components are also sometimes specified differently than retail counterparts,
parts may be clocked slower, and ports or features maybe missing. Again, do your research.
2.4 DETERMINING FACTOR IN CHOOSING PARTS OF THE COMPUTER

Price

Today, there are wide arrays of hardware components and peripherals tailored to fit every
home computing need and budget. With all these options to choose from, it can be a bit
overwhelming if you’ve never bought computer parts before. Shop around and remember to factor
in shipping and handling, and taxes. Someplace may be priced a bit higher, but offer perks such as
free shipping, limited warranties, or 24-hour tech wait until the part you want goes down in price.
Unfortunately the reason prices decline is that better/faster parts are coming out all the time, so the
part you want this year that costs #3500 may well be #5000 next year, but by that time you won’t
want it any more, you ‘ill want the new, better part that still costs #3500. At some point you’ve
got to get on the bus and ride, even if the prices are still falling. Usually the best bet is to buy just
behind the bleeding edge, where, typically, you can get 90% of the performance of the top of the
line part for 50% or 60% of the price. That last 10% is very expensive and if you don’t need it,
you can save a lot of money with the second-tier part. It may well pay you think of future
upgradeability when selecting some components. While the computer that you are building today
may be fine for your current needs you will probably need to upgrade it later. So look for
components that support the newest standards and have room for future expansion, like a
motherboard that will allow user/ builder to fit more memory than he’s planning to use, or a case
that has room for extra hard drives. If your current machine is maxed out the only possible upgrade
is often another new machine.

COMPATABILITY WITH OTHER COMPONENTS

While comparing on the type of components you want to go for when assembling a

computer, it is important to know the state of each component if they are compatible with each
other and you’ll want to make sure that all the parts you buy work together without problems. The
CPU, the motherboard, and the RAM in particular must be compatible with each other. Check the

motherboard manufacture’s web site; most will list compatible RAM and processors. Often quality
RAM that is not on the approved list (but is of the proper type) will work anyway, but the
manufacturer list of processors should be rigidly adhered to. Again, you’ll also want to make sure

that your operating systems support the hardware you choose.

2.5 CHALLENGES FACED DURING THE ASSEMBLING OF THE SYSTEM

Various challenges were encountered during the assembling process the are:

i. Time consuming

ii. System specification weren’t exactly what was bought

iii. Take a long period of time to troubleshoot affected components


iv. Technical know-how of doing this thing for the first time
2.6 DEFINITIONS OF TERMS

Computer: is an electronic device that is capable of accepting data and processing data to give a
desired output.

Computer Case: This is the actual case that will house all your other parts. Consider it your
computers house. It will dictate how your machine looks at first glance as well as what and how
many parts you can put into your machine.

Hard Drive/Hard Disk: This is the “long-term memory” of the computer, used for persistent
storage i.e. the things stored on it remains even when the computer is powered down. The operating
system and all your programs and data are stored here. It is also known as mass storage device.

Optical Drive Device: This is used for reading/writing disks. May read CDs, DVDs, or other
optical media, depending on the type. It is essential for installing operating systems and programs.

The Motherboard: is also called a main board, is an electronic circuit board that provide and

attachment for other internal and external components of the computer system to be fixed on.

Examples are RAM slot, PROCESSOR socket etc.

RAM: also known as random access memory is volatile memory storage that computer used to
run programs.

Processor: is the brain of the computer that performs the major operation that is being done inside
of the computer system.

CONTROL UNIT ARITHMETIC AND LOGICAL UNIT

Monitor: This is the device that display all processed data in computer system to the outside
world. Monitor can be inform of LCD/CRT.

Mouse: This is used to point and locate where necessary in the computer system. It can either be
PS2/optical mouse.

Speakers: This the medium that produces sounds made inside the computer such as audio sound,
midi, video sound.
CHAPTER THREE
SYSTEM IMPLEMENTATION IN THE LABORATORY
This phase discusses and enlighten the various parts/components and the require tools which will
be used to coupled it. This will be needed as a result of assembling the components to make it a
whole computer system.
3.1 TOOLS REQUIRED TO SETUP A WHOLE COMPUTER
i. Human effort and composure
ii. A small plastic bin(s) to put your screws and other small parts into. Needle nose pliers,
Screwdriver with a good collection of bits.
iii. A small flashlight. Used to check in to some internal component that is not seen clear.
iv. Antistatic Wrist Bank: Computer components are very sensitive to static electricity.(ESD
glooves)

Figure 3.1 tool/kits


3.2 THE COMPONENTS/PARTS REQUIRED FOR PC ASSEMBLY
The components that make a whole PC cannot be over emphasized because they all have various
functions and tasks they perform; these has made it known to the users that they come one after
the other thereby assembling it in procedural process (step by step). The majorly components that
will must put into consideration are.
3.2.1 Computer Case and Power Pack
This is the actual case that will house all your other parts. Name it computers house. It will dictate
how your machine looks all first glances as well as what and how many parts you can put into your
machine. It also let you know the type of motherboard you be going for. The type of casing going
for hare is ATX casing, it should be noted that most motherboard in this new age also comes up
with ATX power pack. So, you need not to go for a power separately except the voltage of the
power pack is either high or low to supply the motherboard.
3.2.2 Motherboard
A motherboard is also called a main board or just “The Board”. So don’t get confused, this is your
core computer part. It is where all your components will plug into.
It’s the electronic circuit that provides and attachment for other internal components of computer
system to be fixed on it, some of the attachments it provides are: RAM slot.
3.2.3 Hard disk
This is where your computer stores your programs, personal data and operating System. The bigger
the hard drive the more stuff you can fit on it. It’s also known as mass storage which stores
information for other time consultations.
3.2.4 CD/DVD-ROM
This is your optical drive. Optical drives are very handy and nowadays are in more systems than
floppy drives. You use this type of drive to listen to music, watch videos or to backup/move data.
This optical drive can be a CD-Rom/DVD-Rom capable only of reading CD’s/DVD’s or a
CD/DVD-RW that can read, write and re-write CD’s/DVD’s.
3.2.5 RAM (Memory)
Your RAM (Read Only Memory) aka Memory is what the computer uses to run programs. The
more RAM you have on your machine the easier you make it for your computer to perform its
functions. Is the one that first holds the data you inputted for processing; it is volatile in nature.
3.2.6 TYPES OF CARDS (Video card, Sound card, Network card)
These cards mentioned above has different functions they performed on computer, the Video card
deals with visualization and any type of graphical display of the monitor, it is the one that provide
where monitor can be connected to the computer system.
Sound card deals with production of sound either in audio or video format: it provides port where
audio devices can be plug into called sound jack. Network card: as the name implies it deals with
connection of networks (WAN, LAN) where it provides port in which connecting cables can be
plug into.
As the technologies improve these cards are now onboard with the motherboard so there is no need
to shop for it except if the system required being upgrade.
3.3 THE EXTERNAL AND PERIPHERALS COMPONENTS
Monitor: Display processed data made by the computer to the outside word for visualization. It
can be LCD/CRT.
Keyboard: This is used to computer data in to the computer system.
Mouse: It is use to point and click to the desire icon/program that one need to make use of at any
point in time.
Speaker: Produces the sound made by the computer to the outside world.

3.4 PICTURES OF THE ABOVE-MENTIONED COMPONENTS AND DEVICES

Figure 3.4.1 MOTHERBOARD Figure 3.4.2 ATX POWER PACK

Figure 3.4.3 COMPUTER CASING


Figure 3.4.4 HARD DISK DRIVE

Figure 3.4.5 DVD-ROM Figure 3.4.6 Keyboard

Figure 3.4.7 Computer casing Figure 3.4.8 Monitor (LCD Display)

Figure 3.4.9 Network card Figure 3.5. mous


3.5 TYPES OF NETWORK TOPOLOGY
Basically, there are two categories of Network Topologies:

Physical Topology
The physical topology is concerned with the physical cabling, nodes location, layout of the cabling
and in general the physical aspect of the network. However, this is determined by cost, speed of
data transfer and size (Wikipedia 2012.)

Logical Topology

The logical topology deals with the way signals or data interact/travel within the network media
from one device to another without disturbing the physical connection. The logical topologies are
determined by network protocols while physical topologies are determined by physical layout of
cables and network devices (Wikipedia 2018.)

Every physical topology has its own set of rules and standards which determine issues such as
cable length between nodes, segment number including computer per segment and speed of data
transfer (Cisco 2018.) The most common network topologies are:

Peer-Peer Network:

Fig 3.5.1 PEER-PEER Network (adapted from network topology, Winkelman)

This is connection that is very easy to establish and it connects two endpoints within a

network. In Peer-to-peer network operating systems enable users to share resources and files
located on their computers and to access shared resources found on other computers. (Winkelman

1997-2011.)

Star Topology:

Fig 3.5.2 Star Topology (adapted from network topology, Winkelman 2011-2018)
The hosts on this LAN topology (see Graph 3) were all attached to a central hub where
data originates from a sending computer and arrived at the central hub to be copied to all hosts
attached to the hub. In this topology a cable or PC failure on the network will not affect the other
hosts from communicating but if there is a central device failure (hub, router or switch), the entire
segment will be affected (Anand 2010, 12-14.) The two types of star network environments are
broadcast and switched. In a switched network, the central device sends the data to the intended
destination which improves bandwidth utilization and expensive to purchase while in the
broadcast, the central device (hub) copies all the data and send to all devices on the network. The
advantage of a star topology is that it centralizes resources and is easy to troubleshoot but it
requires more cabling because each computer on the network has its own back to the hub. (Anand
2010, 12-14; Winkelman 1997-2011.)
Ring Topology:

Fig 3.5.3 Ring Topology (adapted from network topology, Winkelman 1997-2011)

In a Ring topology (see Graph 4), each computer is connected to the adjacent computer
using a continuous circle of cable, and no central hub or terminated ends are involved. The signal
is sent from one computer sending a data packet called token down the wire and the signal travels
in one direction around the ring. Each computer on the network checks the ring to determine if the
signal was addressed to them and if not, the computer acts as a repeater to boost the signal and
resend it to the next computer. It differs from bus topology in which the computers are passive
recipients. The most common method of transmitting data on a ring network is called token
passing. (Nelson 2003, 69-70; CISCO 2012; Wong 2012.)
Mesh

Fig 3.5.4 Mesh Topology (adapted from network topology, Winkelman 1997
The Mesh Topology is commonly used in Wide Area Network (WAN). In the mesh
topology, the nodes are connected to each node. In this type of topology in which all the nodes are

connected it is much easier to carry data from one point to another even if one cable connecting
one node fails. The topology provides fault tolerance in case a line goes down because the topology
provides alternate route to any destination. The advantage is that it provides high data availability

due to multiple transmission options but it is more expensive to implement since multiple paths
were used. (Nelson 2003, 70-73.)

Bus Topology:

Fig 3.5.5 Linear bus topology (adapted from network topology, Winkelman)

In a Bus Topology (see Graph 6), a cable connects each of the computers and devices to
each other on the network. However, if there is a break in cable anywhere on the network, data
communication will be disrupted on the bus network. (Nelson 2003, 66.) This is synonymous to a
situation where everyone is travelling in a bus and if there is a problem with the bus everyone will
be affected. In bus network, a computer sends data addresses to other computers on the network
and on receiving, the data is check if the packet is meant for them. If it is meant for the computer,
it will be processed else the computer will ignore it. The same situation in a bus conveying
passenger and each passenger has different destinations. In this topology, data is sent one at a time
to avoid collisions which results in data loss. The advantage of this topology is that is the simple
to design and requires lower cable hence reduce cost but difficult to troubleshoot. A single fail
connection in a bus topology will affect the entire segment. (Nelson 2003, 65-67; Winkelman
1997-2011.)
Tree Topology:

Fig 3.5.6 Tree Topology (adapted from network topology, Winkelman 1997-2011)

The Tree Topology is also known as the Expanded Star. Tree topology combines
characteristics of linear bus and star topologies. It is made up of combinations of star configured
workstations together with a linear bus backbone cable. A tree topology allows expansion of an
existing network, and enables the small-medium enterprise to configure a network to meet their
needs. (Winkelman 1997-2011.)
Hybrid

Hybrid Topology is a combination of two or more topologies resulting in a topology that does not
belong to any of the topology standards. A combination of star and tree topology is an example of
Hybrid topology. A combination of linear and Ring topology can also be referred to as Daisy chain.
(Anand 2010, 12-14; Wikipedia 2012.)

You might also like