Professional Documents
Culture Documents
The Cloning of Computer System is necessary in an ICT working environment This project
focuses more on how computer system could be coupled and maintained effectively and efficiently
without any fault during assembling of the system.
Throughout this project we shall focus on each and every component needed for assembling and
also their functions. The main reason why people go for assembling of system instead of buying a
new system is to allow them to have good and satisfactory quality of what they want. Buying a
new computer system might not solve the problem of some people but coupling it themselves ease
their wounds when it comes to satisfaction. The main important of coupling a computer system is
to have access to all those components and to know how to couple and disassemble it when the
system is faulty.
This research has managed to purchase the Sub-Assembly computer components and couple it to
make a computer system that could rival the performance of the branded version.
CHAPTER ONE
INTRODUCTION
Building and assembling a computer system, gives maximum satisfaction to the user and a very
rewarding experience. To Assembles Desktop PC (Personal Computer) the users/builders of such
systems are probably contemplating building or assembling a computer instead of purchasing one
pre-built or pre-assembled. This project is to enlighten us on how a computer student can build a
computer and peer to peer network with less stress and less amount of money, and how the
computer built can meet up with the processing requirement of the school Laboratory. This
research has managed to purchase the Sub-Assembly computer components and couple it to make
a computer system that could rival the performance of the branded version.
i. Know about computer components and how they fit and work together.
I am persuaded that the computer-built manufacturers in the economic only fit in to general
purpose computing which is quite different from the most required and needed specification most
time e.g. using the computer as a server for database of students.
i. Identifying computer components and how they fit and work together.
The scope of this research is to show how computer system could be purchased in parts,
assembled and installed with required software to match a given configuration for the use in the
laboratory.
The study is expected to specify the fact that computer is made up of several components
functioning together as a single unit.
It will enable us to know that hardware cannot work alone to makes a computer without
software being installed.
i. Know the market price between a whole PC Desktop and Sub-assembly computer.
ii. Choosing the components that make a complete system such as: the system casing,
Motherboard. Hard disk. CDROM. Monitor, Keyboard, Mouse and some internal
components.
iii. Buying tools that will be use to assemble the system these are: Needle Nose Pliers,
Screwdriver, small plastic bin to put your screws and other small parts into, small
flashlight.
iv. Then the procedure for assembly and installation process begins.
CHAPTER TWO
LITERATURE REVIEW
Cloning of computer system primarily specifics the ability of a computer science student to have
the technical know how about and how to choose between buying a whole or sub assembly
computer system. Cloning of a computer system regards as step by step procedure for assembling
computer components for the purpose of achieving a set of configurations required by the users.
In the early days after the Internet had been developed the most popular file sharing was
the FTP (file transfer protocol) because it was anonymous. Since, the file sharing is anonymous
over the FTP server lets users log-in with an anonymous name to receive files or share files on the
Internet. Computers were able to access remote files on other computers.
Usenet was one of the first developed in 1979; the network was initially based for dial-up
connection but has been transferred over to the Internet. Usenet uses a specialized client server
protocol called Network News Transfer Protocol (NNTP). This special server primary purpose is
the exchange of text messages, but attached to these messages is encoded files which are
distributed to subscribers of Usenet. Usenet is one of the largest carries of file sharing and Internet
traffic. Many legal questions have arisen around the use of copyrighted material over file sharing.
Between the developments of Usenet in 1979 to the 1990’s, files sharing was primarily done
through the use of bulletin board-based systems. The computer game Doom grew in popularity
due to the distribution of files through the bulletin board system. Bulletin board systems became
less desirable as the Internet grew and more advanced techniques for file sharing were developed.
About 20 years after Usenet had been developed, a new type of file sharing system was
created called Napster, which uses a centralized server to group all the files shared into v databases.
Since, Napster used a centralized server for file sharing services could not use the transitory
network transmission safe found in the Digital Millennium Copyright Act since they had control
over all functions of their network. The software Napster collected and stored file information
from their users computers to being made available for other people to download. Napster was the
client host, which provided the ability of file sharing between the users once it had been authorized
by Napster. Not long after Napster was created the company was charged with crimes of copyright
infringement, more specifically the case A&M Records, Inc. v. Napster, Inc. will be looked at in
greater depth later in the document.
After the legal concerns facing Napster, in 2000 Gnutella was released in March and was
the first decentralized file sharing network. The decentralized network was connected to all
software and therefore had no immediate point of failure unlike Napster. A year after Gnutella in
2001, Kazaa was developed and its FastTrack network was distributed and was assigned super-
nodes to increase the efficiency of networking between users. This network was encrypted and
made vast attempts to keep other competitors off the FastTrack network. Kazaa was one of the
most popular file sharing systems after Napster until its decline in 2004 due to bundled malware
and legal battles. Since these file sharing programs were getting into lawsuits, many universities
and institutions added file sharing regulations due to the legality concerns. Many others have been
developed for example LimeWire and Pirate Bay, have faced legal penalties. But, networks such
as Bit Torrent have seemed to manage and circumvent these legal ramifications due to its open
source clients. Bit Torrent uses a torrent file to store the metadata. The torrent file contains URL’s
of multiple trackers, which contain specific pieces of the file being downloaded. Simultaneously
your file is being downloaded from multiple sources at one time.
2.1.1 ADVANTAGES OF P2P NETWORK
It’s simple and easy to setup it requires only HUB or switches and RJ45 cables to connect all the
computers together.
File on the computer can be easily access on another computer if it set to shared folders.
It’s cheap than having to use a server. The only cost involved is hardware, cabling and
maintenance.
If one of the computers fails to work the other computers that connected will still be able to work.
It doesn’t need any full-time system administrator. Every user is basically their own administrator
of their computers.
2.2 FUNCTION OF THE COMPUTER SYSTEM
To provide basic functionality to a user who just needs web surfing, a little-word processing, and
the occasional game of solitaire, it’s important not to go overboard. Such a user has no need for a
top of the line processor or 3D graphics card. A modestly configured system with an adequate
internet connection will suit this user best and can be assembled quite cheaply. This usage pattern
is not going to stress any particular component, you should be looking at a mid-to low-level
processor historically, and current, enough RAM for the OS (operating system) and a mother board
with built in Ethernet, video and audio. If you have a little extra money, spend it on a better
monitor, mouse/keyboard, and case power supply in that order.
Data processing in the offices
An office computer can be expected to do word processing, spreadsheet and database work,
internet and intranet access (including e-mail) and a little light development of spreadsheets,
databases, and presentations. It might also be called on to do page layout work, some 2D graphic
creation, and/or terminal emulation.
Gaming System
We’re not talking here about the occasional game of solitaire or a secret late-night Zuma obsession.
We’re talking about cutting edge 3D gaming first-person-shooters or real-time strategy games with
thousands of troops on the screen at the same time, specula reflections and a lot of other confusing
terminology that describes visual effects designed to make your system fall down on its knees and
cry like a little girl.
So, you’re going to need a fast processor that’s affordableh9 and plenty of RAM, as well as a
motherboard to match, since the speed of the motherboard buses can limit high-end components.
Video editing
Big and fast hard drives are key, 10000 RPM Raptors in Raid 0 as working space with multiple
750 GB drives or I terabyte drives for storage is a good target. SATA/300 is highly recommended
and SCSI subsystems should also be considered. A large amount of memory (2GB, 3GB, even
4GB) would be beneficial.
Music production
Plenty of disk space is important, but a music production (recording and mixing) workstation is
chiefly distinguished by specialized external components studio reference monitors instead of
speakers, mixing consoles, microphones, etc.
One piece of advice, if you have extra money, get better microphones, even if you have to trade
the Blues mobile.
Entertainment system/media center
This is a computer designed to sit in the living room with the rest of your A/V gear. The idea is
that it will record and serve audio and video files foreplay via your existing television and stereo.
Once you have decided what you’re going to use your computer for, and have reviewed
which parts are available for reuse, you should make a list of what components you will need to
buy. A few hours of research can save your years of regret, so make sure that the computer builds
will do need it to do.
Computer terminology can be confusing, so if there are terms you don’t understand, be sure to
look them up.
Internet retailers generally offer the best price for new parts. If a part needs to be returned, you
may be stuck for the shipping; check return policies before it can be purchase (Computer Village
Ikeja Lagos)
Auction sites like eBay, Amazon and several others offer very good prices for used parts. This is
especially useful for parts which do not wear out. Return scan be problematic or impossible. Some
auctions may not be legitimate. Always check the shipping cost before you bid.
Local PC shops their prices are often higher, but they may make up for this by providing a lot of
expertise. Get opinions from other sources, however, as they may be eager to sell you parts you
don’t need. Big Local retailers often lack technical expertise and higher prices, but can be useful
because they usually handle returns quickly. Also, good if you need something right then.
Trade shows that occur from time to time also provide a good to shop, as the prices are often
significantly reduced. Also, your local town dump may have a special section for computers &
monitors that others have got rid of. These can be more or less brand-new computers with trivial
problems such as a busted power supply or faulty cables.
Of course, if the dump does have such a section, you should ask permission of those in charge.
They’re usually glad to let you go through it, but don’t leave mess. Taking advantage of this can
yield incredible finds, with a price tag of nothing or very little.
Many hardware manufacturers will sell the same components in both OEM and Retail versions.
Retail hardware is intended to be sold to the end-user through retail channels, and will come fully
packaged with manuals. Accessories, software, etc. OEM stands for original equipment
manufacturer; items labeled as such are intended to be sold in bulk for use by firms which integrate
the components into their own products
However, many online stores will offer OEM hardware at cheaper prices than the
corresponding retail versions. You will usually receive such an item by itself in an anti-static bag.
It may or may not come with a manual or a CD containing drivers. Warranties on OEM parts may
often be shorter, and sometimes require you to obtain support through your vendor, rather than the
manufacturer. OEM components are also sometimes specified differently than retail counterparts,
parts may be clocked slower, and ports or features maybe missing. Again, do your research.
2.4 DETERMINING FACTOR IN CHOOSING PARTS OF THE COMPUTER
Price
Today, there are wide arrays of hardware components and peripherals tailored to fit every
home computing need and budget. With all these options to choose from, it can be a bit
overwhelming if you’ve never bought computer parts before. Shop around and remember to factor
in shipping and handling, and taxes. Someplace may be priced a bit higher, but offer perks such as
free shipping, limited warranties, or 24-hour tech wait until the part you want goes down in price.
Unfortunately the reason prices decline is that better/faster parts are coming out all the time, so the
part you want this year that costs #3500 may well be #5000 next year, but by that time you won’t
want it any more, you ‘ill want the new, better part that still costs #3500. At some point you’ve
got to get on the bus and ride, even if the prices are still falling. Usually the best bet is to buy just
behind the bleeding edge, where, typically, you can get 90% of the performance of the top of the
line part for 50% or 60% of the price. That last 10% is very expensive and if you don’t need it,
you can save a lot of money with the second-tier part. It may well pay you think of future
upgradeability when selecting some components. While the computer that you are building today
may be fine for your current needs you will probably need to upgrade it later. So look for
components that support the newest standards and have room for future expansion, like a
motherboard that will allow user/ builder to fit more memory than he’s planning to use, or a case
that has room for extra hard drives. If your current machine is maxed out the only possible upgrade
is often another new machine.
While comparing on the type of components you want to go for when assembling a
computer, it is important to know the state of each component if they are compatible with each
other and you’ll want to make sure that all the parts you buy work together without problems. The
CPU, the motherboard, and the RAM in particular must be compatible with each other. Check the
motherboard manufacture’s web site; most will list compatible RAM and processors. Often quality
RAM that is not on the approved list (but is of the proper type) will work anyway, but the
manufacturer list of processors should be rigidly adhered to. Again, you’ll also want to make sure
Various challenges were encountered during the assembling process the are:
i. Time consuming
Computer: is an electronic device that is capable of accepting data and processing data to give a
desired output.
Computer Case: This is the actual case that will house all your other parts. Consider it your
computers house. It will dictate how your machine looks at first glance as well as what and how
many parts you can put into your machine.
Hard Drive/Hard Disk: This is the “long-term memory” of the computer, used for persistent
storage i.e. the things stored on it remains even when the computer is powered down. The operating
system and all your programs and data are stored here. It is also known as mass storage device.
Optical Drive Device: This is used for reading/writing disks. May read CDs, DVDs, or other
optical media, depending on the type. It is essential for installing operating systems and programs.
The Motherboard: is also called a main board, is an electronic circuit board that provide and
attachment for other internal and external components of the computer system to be fixed on.
RAM: also known as random access memory is volatile memory storage that computer used to
run programs.
Processor: is the brain of the computer that performs the major operation that is being done inside
of the computer system.
Monitor: This is the device that display all processed data in computer system to the outside
world. Monitor can be inform of LCD/CRT.
Mouse: This is used to point and locate where necessary in the computer system. It can either be
PS2/optical mouse.
Speakers: This the medium that produces sounds made inside the computer such as audio sound,
midi, video sound.
CHAPTER THREE
SYSTEM IMPLEMENTATION IN THE LABORATORY
This phase discusses and enlighten the various parts/components and the require tools which will
be used to coupled it. This will be needed as a result of assembling the components to make it a
whole computer system.
3.1 TOOLS REQUIRED TO SETUP A WHOLE COMPUTER
i. Human effort and composure
ii. A small plastic bin(s) to put your screws and other small parts into. Needle nose pliers,
Screwdriver with a good collection of bits.
iii. A small flashlight. Used to check in to some internal component that is not seen clear.
iv. Antistatic Wrist Bank: Computer components are very sensitive to static electricity.(ESD
glooves)
Physical Topology
The physical topology is concerned with the physical cabling, nodes location, layout of the cabling
and in general the physical aspect of the network. However, this is determined by cost, speed of
data transfer and size (Wikipedia 2012.)
Logical Topology
The logical topology deals with the way signals or data interact/travel within the network media
from one device to another without disturbing the physical connection. The logical topologies are
determined by network protocols while physical topologies are determined by physical layout of
cables and network devices (Wikipedia 2018.)
Every physical topology has its own set of rules and standards which determine issues such as
cable length between nodes, segment number including computer per segment and speed of data
transfer (Cisco 2018.) The most common network topologies are:
Peer-Peer Network:
This is connection that is very easy to establish and it connects two endpoints within a
network. In Peer-to-peer network operating systems enable users to share resources and files
located on their computers and to access shared resources found on other computers. (Winkelman
1997-2011.)
Star Topology:
Fig 3.5.2 Star Topology (adapted from network topology, Winkelman 2011-2018)
The hosts on this LAN topology (see Graph 3) were all attached to a central hub where
data originates from a sending computer and arrived at the central hub to be copied to all hosts
attached to the hub. In this topology a cable or PC failure on the network will not affect the other
hosts from communicating but if there is a central device failure (hub, router or switch), the entire
segment will be affected (Anand 2010, 12-14.) The two types of star network environments are
broadcast and switched. In a switched network, the central device sends the data to the intended
destination which improves bandwidth utilization and expensive to purchase while in the
broadcast, the central device (hub) copies all the data and send to all devices on the network. The
advantage of a star topology is that it centralizes resources and is easy to troubleshoot but it
requires more cabling because each computer on the network has its own back to the hub. (Anand
2010, 12-14; Winkelman 1997-2011.)
Ring Topology:
Fig 3.5.3 Ring Topology (adapted from network topology, Winkelman 1997-2011)
In a Ring topology (see Graph 4), each computer is connected to the adjacent computer
using a continuous circle of cable, and no central hub or terminated ends are involved. The signal
is sent from one computer sending a data packet called token down the wire and the signal travels
in one direction around the ring. Each computer on the network checks the ring to determine if the
signal was addressed to them and if not, the computer acts as a repeater to boost the signal and
resend it to the next computer. It differs from bus topology in which the computers are passive
recipients. The most common method of transmitting data on a ring network is called token
passing. (Nelson 2003, 69-70; CISCO 2012; Wong 2012.)
Mesh
Fig 3.5.4 Mesh Topology (adapted from network topology, Winkelman 1997
The Mesh Topology is commonly used in Wide Area Network (WAN). In the mesh
topology, the nodes are connected to each node. In this type of topology in which all the nodes are
connected it is much easier to carry data from one point to another even if one cable connecting
one node fails. The topology provides fault tolerance in case a line goes down because the topology
provides alternate route to any destination. The advantage is that it provides high data availability
due to multiple transmission options but it is more expensive to implement since multiple paths
were used. (Nelson 2003, 70-73.)
Bus Topology:
Fig 3.5.5 Linear bus topology (adapted from network topology, Winkelman)
In a Bus Topology (see Graph 6), a cable connects each of the computers and devices to
each other on the network. However, if there is a break in cable anywhere on the network, data
communication will be disrupted on the bus network. (Nelson 2003, 66.) This is synonymous to a
situation where everyone is travelling in a bus and if there is a problem with the bus everyone will
be affected. In bus network, a computer sends data addresses to other computers on the network
and on receiving, the data is check if the packet is meant for them. If it is meant for the computer,
it will be processed else the computer will ignore it. The same situation in a bus conveying
passenger and each passenger has different destinations. In this topology, data is sent one at a time
to avoid collisions which results in data loss. The advantage of this topology is that is the simple
to design and requires lower cable hence reduce cost but difficult to troubleshoot. A single fail
connection in a bus topology will affect the entire segment. (Nelson 2003, 65-67; Winkelman
1997-2011.)
Tree Topology:
Fig 3.5.6 Tree Topology (adapted from network topology, Winkelman 1997-2011)
The Tree Topology is also known as the Expanded Star. Tree topology combines
characteristics of linear bus and star topologies. It is made up of combinations of star configured
workstations together with a linear bus backbone cable. A tree topology allows expansion of an
existing network, and enables the small-medium enterprise to configure a network to meet their
needs. (Winkelman 1997-2011.)
Hybrid
Hybrid Topology is a combination of two or more topologies resulting in a topology that does not
belong to any of the topology standards. A combination of star and tree topology is an example of
Hybrid topology. A combination of linear and Ring topology can also be referred to as Daisy chain.
(Anand 2010, 12-14; Wikipedia 2012.)