The document provides an overview of the student's six-month industrial work experience at Rehoboth ICT Academy in Makurdi, Benue State, Nigeria. It introduces Rehoboth ICT Academy as a computer training organization established in 1996 to provide information technology education across Benue State. The student's training involved website design, Java programming, and computer networking. Challenges included applying programming concepts to practical projects.
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
my It report
1. Chapter one
1.0 Introduction
Student industrial work experience scheme (S.I.W.E.S) is a six-month industrial
work experience as requirement for the award of Bachelor of Science degree in
computer science department of the Benue state university makurdi ,this
report contains major report on some of the things I learnt in the area of work
experience at Rehoboth ICT Academy makurdi Benue state.
1.1 About Rehoboth ICT Academy
The name of the organization is Rehoboth ICT academy location is at no.12
Onitsha street makurdi, Benue state. The company was established in 1996 with
the objective of bringing information technology to the nook and cranny of the
state reaching out to the people from all walks of life especially in our
secondary and tertiary institutions across the state and the country at large.
Rehoboth ICT academy is a computer and software engineering appreciation
organization, its establishment has come to redeem computer education and
information technology problem in the state and country at large.
The establishment is being managed by computer professionals who are really
committed to ensuring a hitch- free, fulfilled and successful program.
Rehoboth’s quest for quality in all her engagement has immensely driven the
company in staff team selection.
Rehoboth ICT academy is getting popular of her dedication to quality service.
1.2 Rehoboth sales and services
The computer industry requires a great deal of experience. Installing new and
servicing existing systems are a significant part of Rehoboth ICT business. The
1|Page
2. organization currently has a total man power of 18 personnel, out of which 8 are
professionals,
Here are some of the services offered by the organization.
* Software Engineering.
* Information and communication technology.
* Networking (internet and intranet).
* Hardware maintenance and repairs.
* Web designing and hosting.
* E-library
* Publications i.e. students journals projects typing and binding etc.
* Diploma certificates on information technology, computer education and other
related courses for groups and individuals.
* Vast and satellite (purchase and installation.
1.3 Facilities at Rehoboth ICT Academy
The organization has a head office at No. 12 Onitsha Street, opposite cool off
park makurdi Benue state, a branch office is at No. 7 old Otukpo Road High
level opposite Mr. Biggs fast foods Makurdi Benue state. Her sitting space for
students is 75 in both centers including her working personnel, a plant capacity
of 7.5KVA and a generator of a 2.7 KVA is installed on ground 24 computers
connected to the net 1 printing machine,1 company vehicle and a motorcycle.
The computers serve as a basis for students learning most especially those on
industrial attachment, where I too had a lot of experiences through hardware and
other basic computer appreciation.
2|Page
3. The name of the chief executive officer is Engineer B.O Animashaun who was
also my internal supervisor.
Areas of industrial training
I had my industrial training in software development and computer networking
I learnt how to design a web site, writing a project using J2EE (java 2 enterprise
edition also in networking how to install, maintain and troubleshoot a computer
network problem for at least a small business establishment.
1.4 Challenges faced as a student on IT
The challenges I had faced on the job as an industrial training students (IT) were
How to apply the theory aspect of software development to practical,
firstly, I could not create a home page of a website.
secondly, I could not create a project in java enterprise edition(J2EE)
Lastly, I could not troubleshoot a small net work connectivity problem
I was able to resolve all these with the aid of my internal supervisor and his
instructors just to mention a few of the challenges.
3|Page
4. 1.5 The Organogram of Rehoboth ICT Academy
MD/CEO
G M
GM
(Accounts)
(Admin & Operations)
Manager(Finance/Acct.)
Manager Manager Manager
Café 2 Manager
Café 1 Computer IT
Training
Manager
Typist Bus. Operations
Ca fé Assistant
.
mp 2
Co uc tor
uc .
str mp
3
p.
tor
om ctor 1 tr
In C o
C u Ins
Typist tr
Ins
Café Assistant
r
opie
i st1 Typ ist2 t3 4 h otoc tor. r
Typ pis Typist P pera cto r
Ty O to r g tru k/HM to rs
t ruc min In s e tw t ruc othe
Ins ram N In s b &
g
Pro We
4|Page
5. CHAPTER TWO
Summary of Experiences Obtained
2.1 Website Design
A website is a set of related WebPages containing content such as texts, images,
videos, audios, etc. A website is hosted on at least one web server, accessible
via a network such as the internet or a private LAN through an internet address
known as a URL (universal resource locator). A publicly accessible websites
collectively constitute the World Wide Web.
Webpage
A webpage is a document, typically written in plain text interspersed with
formatting instructions of hypertext markup language (HTML, XHTML). A
webpage may incorporate elements from other websites with suitable anchors.
WebPages are accessed and transported with the hypertext transfer protocol
(HTTP), which may optionally employ encryption (HTTP secure, HTTPS) to
provide security and privacy for the use of the webpage content. The user’s
application often a web browser renders the page content according to its
HTML markup instructions into a display terminal.
2.2 Types of Website by Purpose
A personal website.
A commercial website.
A government website.
A non-profitable website.
It could be the work of an individual, a business or other organization, and is
typically dedicated to some particular topic or purpose. Any website can contain
5|Page
6. a hyperlink to any other website, so the distinction between individual sites as
perceived by the user may sometimes be blurred.
Websites are written in, or dynamically converted to, HTML and are accessed
using a software interface classified as a user agent. WebPages can be viewed or
otherwise accessed from a range of remote computer-based and internet enabled
devices of various sizes including desktop computers, laptops, PDAs and cell
phones.
A website is hosted on a computer system known as a web server, also called
HTTP (hypertext transfer protocol) server and the terms can also be referred to
the software that runs on those system and retrieves and delivers the WebPages
in response to request from the websites users.
Apache is the most commonly used web server software
2.3 Types of Website by Built
* Static website
* Dynamic website
Static Website
A static website is one that has web pages stored on the server in the format that
is sent to a client web browser. It is primarily coded in hypertext markup
language (HTTM). Simple forms include, marketing websites such as five page
websites or brochure websites are often static
Websites, because they present predefined static information to be used.
This may include information about a company, its products and services
through text, photos, animations, audio/videos, interactive menus and
navigation.
This type of website usually displays the same information to all visitors similar
to handing out a printed brochure to customers or clients. A static
Website will generally provide consistent, standard information for an extended
period of time. Although the website owner may make updates
6|Page
7. Periodically, it is a manual process to edit the text, photos and other content that
may require basic website design skill and software.
A static website may still have dynamic behavior provided that, this is
handled entirely client side (i.e. within the browser). This may include such
features as java script image zoom feature to display photographs.
In a static web site visitors are not able to control information they receive and
instead settle for whatever content the website owner has decided to offer at that
time information’s are edited using
Text editors, such as note pad or text field, where content and HTML
markup are manipulated directly within the editor program.
WYSIWYG(this, I call what you see is what you get) offline editors such
as
Microsoft front page and Adobe dream weaver.etc.
Dynamic Website
A dynamic website is one that changes or customizes itself frequently and
automatically, based on certain criteria.
Dynamic website can have two types of dynamic activity code and content
dynamic code is invisible or fully displayed.
Dynamic code.
A website with dynamic code refers to its construction or how it is built, and
more specifically refers to the code used to create a single web page. A dynamic
web page is generated on the fly by piecing together certain blocks of code,
procedures or routines. A dynamically generated web page would recall various
bits of information from a database and put them together in a pre-defined
format to present the reader with a coherent page. It interacts with users in a
variety of ways including by reading cookies recognizing users' previous
7|Page
8. history, session variables, server side variables etc., or by using direct
interaction (form elements, mouse over’s, etc.). A site can display the current
state of a dialogue between users, monitor a changing situation, or provide
information in some way personalized to the requirements of the individual
user.
Dynamic Content
The second type is a website with dynamic content displayed in plain view.
Variable content is displayed dynamically on the fly based on certain criteria,
usually by retrieving content stored in a database.
A website with dynamic content refers to how its messages, text, images and
other information are displayed on the web page and more specifically how its
content changes at any given moment. The web page content varies based on
certain criteria, either pre-defined rules or variable user input. For example, a
website with a database of news articles can use a pre-defined rule which tells it
to display all news articles for today's date. This type of dynamic website will
automatically show the most current news articles on any given date. Another
example of dynamic content is when a retail website with a database of media
products allows a user to input a search request for the keyword Beatles. In
response, the content of the web page will spontaneously change the way it
looked before, and will then display a list of Beatles products like CDs, DVDs
and books.
2.4 Javas 2 Enterprise Edition (J2EE)
J2EE means Java 2 Enterprise Edition. The functionality of J2EE is developing
multitier web-based applications .The J2EE platform is consists of a set of
services, application programming interfaces (APIs), and protocols.
8|Page
9. These Four Components of are the J2EE application
Application clients’ components.
Servelet and JSP technology are web components.
Business components (JavaBeans).
Resource adapter components
Types of J2EE clients.
Applets
Application clients
Java Web Start-enabled clients, by Java Web Start technology.
Wireless clients, based on MIDP technology.
web component.
Java Servelet and Java Server Pages technology components are web
components. Servelets are Java programming language that dynamically receive
requests and make responses. JSP pages execute as servelets but allow a more
natural approach to creating static content.
Java server faces (JSFs).
Java Server Faces (JSF) is a user interface (UI) designing framework for Java
web applications. JSF provide a set of reusable UI components, standard for
web applications.JSF is based on MVC design pattern. It automatically saves
the form data to server and populates the form date when display at client side.
Java 2 platform Enterprise Edition (J2EE) is a java platform designed for the
mainframe scale computing typical of large enterprises. Sun micro systems
9|Page
10. (together with industry partners such as IBM (international business machine))
design J2EE to simplify application development in a thin client tiered
environment) what is a thin client? A thin client is a program interface to the
application that does not have any operations like query of databases, execute
complex business rules, or connect to legacy applications. J2EE simplifies
application development and decreases the need for programming and
programmer training by creating standard reusable modular components and by
enabling the tier to handle many aspects of programming automatically. J2EE
include many components of the java 2 platform standard edition (J2SE).
The java development kit (JDK) is included as the core language
package.
Write once Run anywhere technology is included to ensure portability.
Support is provided for Common Object Request broker
Architecture(CORBA), a predecessor of Enterprise JavaBeans(EJB)so
that java objects can communicate with CORBA objects both locally and
over a network through its interface broker
Java database connectivity 2.0 (JDBC) the Java equivalent to open
Database
Connectivity (ODBC) is included as the standard interface for Java
databases.
A security model is included to protect data both locally and in web-
based
applications.
J2EE also includes a number of components added to the J2SE model,
such as the following
Full support is included for Enterprise JavaBeans (EJB) which is a server
based technology for the delivery of program components in an
10 | P a g e
11. Enterprise Environment it supports the extensible Markup language
(XML)
And has enhanced deployment and security features.
The java servelet API (application program interface) enhances for
developers without requiring a graphical user interface(GUI)
Java server pages (JSP) is the equivalent to Microsoft’s’ Active server
pages
(ASP) and is used for dynamic web enabled data access and
manipulation.
The J2EE architecture consists of four major elements:
The J2EE Application programming model is used to facilitate the
development of multi- tier thin client applications.
The j2EE platform includes necessary policies and APIs such as the java
servelets and java message service(JMS) which is used for simple
massage
Transfer protocol (SMTP) over a web service.
The J2EE compatibility test suit ensures that J2EE products are
compatible with the platform standard.
The J2EE reference implementation explains J2EE capabilities and
provides its operational definition.
A JNDI name is the name the J2EE server uses to hook enterprise beans
.In your code when you look up an enterprise bean, you supply statements
similar to your code.
2.5 Netwoking.
Computer Network
A computer network, often simply referred to as a network, is a collection of
computers and devices interconnected by communications channels that
11 | P a g e
12. facilitate communications among users and allows users to share resources.
Networks may be classified according to a wide variety of characteristics. A
computer network allows sharing of resources and information among
interconnected devices.
Purpose
Computer networks can be used for a variety of purposes:
* Facilitating communications. Using a network, people can communicate
efficiently and easily via email, instant messaging, chat rooms, telephone, video
telephone calls, and video conferencing.
* Sharing hardware. In a networked environment, each computer on a
network may access and use hardware resources on the network, such as
printing a document on a shared network printer.
* Sharing files, data, and information. In a network environment,
authorized user may access data and information stored on other computers on
the network. The capability of providing access to data and information on
shared storage devices is an important feature of many networks.
* Sharing software. Users connected to a network may run application
programs on remote computers.
* Information preservation.
* Security.
2.6 Network Topology
Computer networks may be classified according to the network topology upon
which the network is based, such as bus network, star network, ring network,
12 | P a g e
13. mesh network. Network topology is the coordination by which devices in the
network are arranged in their logical relations to one another, independent of
physical arrangement. Even if networked computers are physically placed in a
linear arrangement and are connected to a hub, the network has a star topology,
rather than a bus topology. In this regard the visual and operational
characteristics of a network are distinct. Networks may be classified based on
the method of data used to convey the data; these include digital and analogue
networks.
2.7 Types of Computer Networks Based on Physical Scope
Common types of computer networks may be identified by their scale.
Local Area Network
A local area network (LAN) is a network that connects computers and devices
in a limited geographical area such as home, school, computer laboratory, office
building, or closely positioned group of buildings. Each computer or device on
the network is a node. Current wired LANs are most likely to be based on
Ethernet technology, although new standards like ITU-T G.hn also provide a
way to create a wired LAN using existing home wires (coaxial cables, phone
lines and power lines).
All interconnected devices must understand the network layer (layer 3), because
they are handling multiple subnets (the different colours). Those inside the
library, which have only 10/100 Mbit/s Ethernet connections to the user device
and a Gigabit Ethernet connection to the central router, could be called "layer 3
switches" because they only have Ethernet interfaces and must understand IP. It
would be more correct to call them access routers, where the router at the top is
a distribution router that connects to the Internet and academic networks'
customer access routers.
13 | P a g e
14. The defining characteristics of LANs, in contrast to WANs (Wide Area
Networks), include their higher data transfer rates, smaller geographic range,
and no need for leased telecommunication lines. Current Ethernet or other IEEE
802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data
transfer rate. IEEE has projects investigating the standardization of 40 and 100
Gbit/s.
Personal Area Network
A personal area network (PAN) is a computer network used for communication
among computer and different information technological devices close to one
person. Some examples of devices that are used in a PAN are personal
computers, printers, fax machines, telephones, PDAs, scanners, and even video
game consoles. A PAN may include wired and wireless devices. The reach of a
PAN typically extends to 10 meters. A wired PAN is usually constructed with
USB and Firewire connections while technologies such as Bluetooth and
infrared communication typically form a wireless PAN.
Home Area Network
A home area network (HAN) is a residential LAN which is used for
communication between digital devices typically deployed in the home, usually
a small number of personal computers and accessories, such as printers and
mobile computing devices. An important function is the sharing of Internet
access, often a broadband service through a CATV or Digital Subscriber Line
(DSL) provider. It can also be referred to as an office area network (OAN).
Wide Area Network
A wide area network (WAN) is a computer network that covers a large
geographic area such as a city, country, or spans even intercontinental distances,
using a communications channel that combines many types of media such as
14 | P a g e
15. telephone lines, cables, and air waves. A WAN often uses transmission facilities
provided by common carriers, such as telephone companies. WAN technologies
generally function at the lower three layers of the OSI reference model: the
physical layer, the data link layer, and the network layer.
Campus Network
A campus network is a computer network made up of an interconnection of
local area networks (LAN's) within a limited geographical area. The networking
equipments (switches, routers) and transmission media (optical fibre, copper
plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant /
owner: an enterprise, university, government etc.).
In the case of a university campus-based campus network, the network is likely
to link a variety of campus buildings including; academic departments, the
university library and student residence halls.
Metropolitan Area Network
A Metropolitan area network is a large computer network that usually spans a
city or a large campus. Sample EPN made of Frame relay WAN connections
and dialup remote access. Sample VPN used to interconnect 3 offices and
remote users.
Enterprise Private Network
An enterprise private network is a network build by an enterprise to
interconnect various company sites, e.g., production sites, head offices, remote
offices, shops, in order to share computer resources.
Virtual Private Network
A virtual private network (VPN) is a computer network in which some of the
links between nodes are carried by open connections or virtual circuits in some
15 | P a g e
16. larger network (e.g., the Internet) instead of by physical wires. The data link
layer protocols of the virtual network are said to be tunnelled through the larger
network when this is the case. One common application is secure
communications through the public Internet, but a VPN need not have explicit
security features, such as authentication or content encryption. VPNs, for
example, can be used to separate the traffic of different user communities over
an underlying network with strong security features.
VPN may have best-effort performance, or may have a defined service level
agreement (SLA) between the VPN customer and the VPN service provider.
Generally, a VPN has a topology more complex than point-to-point.
Internetwork
An internetwork is the connection of two or more private computer networks
via a common routing technology (OSI Layer 3) using routers. The Internet is
an aggregation of many internetworks; hence its name was shortened to
Internet.
2.8 Computer Network Basic Hardware Components
All networks are made up of basic hardware building blocks to interconnect
network nodes, such as Network Interface Cards (NICs), Bridges, Hubs,
Switches, and Routers. In addition, some method of connecting these building
blocks is required, usually in the form of galvanic cable (most commonly
Category 5 cable). Less common are microwave links (as in IEEE 802.12) or
optical cable ("optical fibre").
Network Interface Cards
16 | P a g e
17. A network card, network adapter, or NIC (network interface card) is a piece of
computer hardware designed to allow computers to communicate over a
computer network. It provides physical access to a networking medium and
often provides a low-level addressing system through the use of MAC
addresses. Each network interface card has its unique id. This is written on a
chip which is mounted on the card.
Repeaters
A repeater is an electronic device that receives a signal, cleans it of unnecessary
noise, regenerates it, and retransmits it at a higher power level, or to the other
side of an obstruction, so that the signal can cover longer distances without
degradation. In most twisted pair Ethernet configurations, repeaters are required
for cable that runs longer than 100 meters. A repeater with multiple ports is
known as a hub. Repeaters work on the Physical Layer of the OSI model.
Repeaters require a small amount of time to regenerate the signal. This can
cause a propagation delay which can affect network communication when there
are several repeaters in a row. Many network architectures limit the number of
repeaters that can be used in a row (e.g. Ethernet's 5-4-3 rule).
Bridges
A network bridge connects multiple network segments at the data link layer
(layer 2) of the OSI model. Bridges broadcast to all ports except the port on
which the broadcast was received. However, bridges do not promiscuously copy
traffic to all ports, as hubs do, but learn which MAC addresses are reachable
through specific ports. Once the bridge associates a port and an address, it will
send traffic for that address to that port only.
Bridges learn the association of ports and addresses by examining the source
address of frames that it sees on various ports. Once a frame arrives through a
port, its source address is stored and the bridge assumes that MAC address is
17 | P a g e
18. associated with that port. The first time that a previously unknown destination
address is seen, the bridge will forward the frame to all ports other than the one
on which the frame arrived.
Bridges come in three basic types:
* Local bridges: Directly connect local area networks (LANs)
* Remote bridges: Can be used to create a wide area network (WAN) link
between LANs. Remote bridges, where the connecting link is slower than
the end networks, largely have been replaced with routers.
* Wireless bridges: Can be used to join LANs or connect remote stations
to LANs.
Switches
A network switch is a device that forwards and filters OSI layer 2 datagram
(chunks of data communication) between ports (connected cables) based on the
MAC addresses in the packets.[9] A switch is distinct from a hub in that it only
forwards the frames to the ports involved in the communication rather than all
ports connected. A switch breaks the collision domain but represents itself as a
broadcast domain. Switches make forwarding decisions of frames on the basis
of MAC addresses. A switch normally has numerous ports, facilitating a star
topology for devices, and cascading additional switches.[10] Some switches are
capable of routing based on Layer 3 addressing or additional logical levels;
these are called multi-layer switches. The term switch is used loosely in
marketing to encompass devices including routers and bridges, as well as
devices that may distribute traffic on load or by application content (e.g., a Web
URL identifier).
Routers
18 | P a g e
19. A router is an internetworking device that forwards packets between networks
by processing information found in the datagram or packet (Internet protocol
information from Layer 3 of the OSI Model). In many situations, this
information is processed in conjunction with the routing table (also known as
forwarding table). Routers use routing tables to determine what interface to
forward packets (this can include the "null" also known as the "black hole"
interface because data can go into it, however, no further processing is done for
said data).
Firewalls
Firewalls are the most important aspect of a network with respect to security. A
firewalled system does not need every interaction or data transfer monitored by
a human, as automated processes can be set up to assist in rejecting access
requests from unsafe sources, and allowing actions from recognized ones. The
vital role firewalls play in network security grows in parallel with the constant
increase in 'cyber' attacks for the purpose of stealing/corrupting data, planting
viruses, etc.
2.9 Difference between Network Hub, Switches and Router
Some technicians have a tendency to use the terms routers, hubs and switches
interchangeably. One minute they're talking about a switch. Two minutes later
they're discussing router settings. Throughout all of this, though, they're still
looking at only the one box. Ever wonder what the difference is among these
boxes? The functions of the three devices are all quite different from one
another, even if at times they are all integrated into a single device.
Hub
A common connection point to devices in a network. Hubs are commonly used
to connect segments of a LAN. A hub contains multiple ports. When a packet
19 | P a g e
20. arrives at one port, it is copied to the other ports so that all segments of the LAN
can see all packets.
Switch
In networks, is a device that filters and forwards packets between LAN
segments. Switches operate at the data link layer (layer 2) and sometimes the
network layer (layer 3) of the OSI Reference Model and therefore support any
packet protocol. LANs that use switches to join segments are called switched
LANs or, in the case of Ethernet networks, switched Ethernet LANs.
Router
A device that forwards data packets along networks. A router is connected to at
least two networks, commonly two LANs or WANs or a LAN and its ISP.s
network. Routers are located at gateways, the places where two or more
networks connect. Routers use headers and forwarding tables to determine the
best path for forwarding the packets, and they use protocols such as ICMP to
communicate with each other and configure the best route between any two
hosts.
The Differences between Hubs, Switches, and Routers on the Network
Today most routers have become something of a Swiss Army knife, combining
the features and functionality of a router and switch/hub into a single unit. So
conversations regarding these devices can be a bit misleading — especially to
someone new to computer networking.
The functions of a router, hub and a switch are all quite different from one
another, even if at times they are all integrated into a single device. Let's start
with the hub and the switch since these two devices have similar roles on the
network. Each serves as a central connection for all of your network equipment
and handles a data type known as frames. Frames carry your data. When a
20 | P a g e
21. frame is received, it is amplified and then transmitted on to the port of the
destination PC. The big difference between these two devices is in the method
in which frames are being delivered.
In a hub, a frame is passed along or "broadcast" to every one of its ports. It
doesn't matter that the frame is only destined for one port. The hub has no way
of distinguishing which port a frame should be sent to. Passing it along to every
port ensures that it will reach its intended destination. This places a lot of traffic
on the network and can lead to poor network response times.
Additionally, a 10/100Mbps hub must share its bandwidth with each and every
one of its ports. So when only one PC is broadcasting, it will have access to the
maximum available bandwidth. If, however, multiple PCs are broadcasting,
then that bandwidth will need to be divided among all of those systems, which
will degrade performance.
A switch, however, keeps a record of the MAC addresses of all the devices
connected to it. With this information, a switch can identify which system is
sitting on which port. So when a frame is received, it knows exactly which port
to send it to, without significantly increasing network response times. And,
unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of
its ports. So regardless of the number of PCs transmitting, users will always
have access to the maximum amount of bandwidth. It's for these reasons why a
switch is considered to be a much better choice than a hub.
Routers are completely different devices. Where a hub or switch is concerned
with transmitting frames, a router's job, as its name implies, is to route packets
to other networks until that packet ultimately reaches its destination. One of the
key features of a packet is that it not only contains data, but the destination
address of where it's going.
21 | P a g e
22. A router is typically connected to at least two networks, commonly two Local
Area Networks (LANs) or Wide Area Networks (WAN) or a LAN and its ISP's
network, for example, your PC or workgroup and EarthLink. Routers are
located at gateways, the places where two or more networks connect. Using
headers and forwarding tables, routers determine the best path for forwarding
the packets. Router use protocols such as ICMP to communicate with each other
and configure the best route between any two hosts.
Today, a wide variety of services are integrated into most broadband routers. A
router will typically include a 4 - 8 port Ethernet switch (or hub) and a Network
Address Translator (NAT). In addition, they usually include a Dynamic Host
Configuration Protocol (DHCP) server, Domain Name Service (DNS) proxy
server and a hardware firewall to protect the LAN from malicious intrusion
from the Internet.
All routers have a WAN Port that connects to a DSL or cable modem for
broadband Internet service and the integrated switch allows users to easily
create a LAN. This allows all the PCs on the LAN to have access to the Internet
and Windows file and printer sharing services.
Some routers have a single WAN port and a single LAN port and are designed
to connect an existing LAN hub or switch to a WAN. Ethernet switches and
hubs can be connected to a router with multiple PC ports to expand a LAN.
Depending on the capabilities (kinds of available ports) of the router and the
switches or hubs, the connection between the router and switches/hubs may
require either straight-thru or crossover (null-modem) cables. Some routers even
have USB ports, and more commonly, wireless access points built into them.
Some of the more high-end or business class routers will also incorporate a
serial port that can be connected to an external dial-up modem, which is useful
22 | P a g e
23. as a backup in the event that the primary broadband connection goes down, as
well as a built in LAN printer server and printer port.
Besides the inherent protection features provided by the NAT, many routers will
also have a built-in, configurable, hardware-based firewall. Firewall capabilities
can range from the very basic to quite sophisticated devices. Among the
capabilities found on leading routers are those that permit configuring
TCP/UDP ports for games, chat services, and the like, on the LAN behind the
firewall. So, in short, a hub glues together an Ethernet network segment, a
switch can connect multiple Ethernet segments more efficiently and a router can
do those functions plus route TCP/IP packets between multiple LANs and/or
WANs; and much more of course.
23 | P a g e
24. CHAPTER THREE
3.0 Projects implemented for the Organisation.
* Website design project.
* Security database (J2EE) project.
* Implementation of a small office network.
3.1 Website design project:
This project was given to me by the organisation singly, specifications were, at
the home page we should include a welcome message, a title and photographs
that could reflect the website purpose the navigation panel were also created.
The aim of this project was to design a website for e-resources the title of the
project was given as or rather website name was Rehoboth e-education
resources with an integral purpose of an e-library. the navigation panel were
made of outline boxes with links, this are some of the panels that were created
with links, Rehoboth ICT Academy, About us, Home, Authors of the year,
Book reviews, contact us, Help, Jobs, project Appraisal, Book reviews, science
research for the next generation, Books downloads and information and
services. Selected navigation panels like project appraisal and science research
for the next generation were loaded to their content and linked to their
navigation panels other navigation panels were to be left unlinked so that my
fellow colleagues work could also be linked. the project was given to me by the
organisation on the 14th of December 2012, I used the Christmas and new year
breaks to execute the project, I used a designer software called CS3(Adobe
dream weaver) to make my work more perfect. Below is the HTML code prove
the validity of the project.
24 | P a g e
25. Fig 3.1.1 Code for website project.
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<!-- DW6 -->
<head>
<!-- Copyright 2005 Macromedia, Inc. All rights reserved. -->
<title>REHOBOTH E-RESOURCES - Home Page</title>
<meta http-equiv="Content-Type" content="text/html;
charset=utf-8" />
<link rel="stylesheet" href="mm_entertainment.css"
type="text/css" />
<style type="text/css">
<!--
.style3 { font-size: 36px;
font-weight: bold;}
.style5 {font-size: 18px; color: #FF0000; font-style: italic;
}
.style6 {font-size: 14px}
-->
</style>
</head>
<body bgcolor="#14285f">
<table width="100%" border="0" cellspacing="0"
cellpadding="0">
25 | P a g e
28. <td width="155" height="40"><a
href="">JOBS</a></td>
</tr> <tr>
<td width="155" height="40"><a
href="file:///c:/users/steve/documents/usongo ict
center/appraisal.html">PROJECT APPRAISAL</a></td>
</tr> <tr>
<td width="155" height="40"><a href=""> BOOKS
DOWNLOADS</a></td>
</tr> <tr>
<td width="155" height="40"><a href="">INFORMATION
& SERVICES</a></td>
</tr> </table></td>
<td width="1" bgcolor="#445DA0"><img src="mm_spacer.gif"
alt="" width="1" height="1" border="0" /></td>
<td width="50"><img src="mm_spacer.gif" alt="" width="50"
height="1" border="0" /></td>
<td width="304" colspan="2" valign="top"><img
src="mm_spacer.gif" alt="" width="304" height="1" border="0"
/><br />
<table border="0" cellspacing="0" cellpadding="0"
width="304">
<tr><td height="41" class="pageName">Welcome Message
Here</td>
</tr> <tr> <td class="bodyText"><span
class="style6">Here at rehoboth e-ducation resources will
provide the best and are determined to be the no 1. in e-
learning so always stay with
28 | P a g e
29. with us for qualiity services and other e-du
materials and downloads.</span>
<p><span class="subHeader">Title
Here</span>. </p>
<span class="style6">e-learning is simply an
internet base source of reading through various research
channel such as e-library, e-research, e-reviews
etc.</span></td>
</tr>
</table>
<p><br />
</p></td>
<td width="50"><img src="mm_spacer.gif" alt="" width="50"
height="1" border="0" /></td>
<td width="200" valign="top"><img src="mm_spacer.gif"
alt="" width="1" height="10" border="0" /><br />
<table border="0" cellspacing="0" cellpadding="0"
width="200">
<tr> <td colspan="3" id="sidebarHeader"
class="sidebarHeader" align="center">SCIENCE THIS WEEK</td>
</tr> <tr>
<td width="45"><img src="mm_spacer.gif" alt=""
width="40" height="1" border="0" /></td>
<td width="110" id="sidebar" class="smallText">
<p><img src="steve.com 012.jpg" width="265"
height="267" /><br />
Science research for new generation<br/>
29 | P a g e
31. 3.2 Security database (J2EE) Java 2 Enterprise Edition
Here the organisation thought much about the experience we had obtained in
Java 2 enterprise edition and wanted to know if we really understood what our
instructor on Software Development Mr. Vitalis Agbers with Phone No.:
08137671244 thought us on J2EE, we were to design a data base for security
online Report, the project had the following modules: Admin, Arrest, Crime,
Complain, Record and Users.
The Admin: is the overall boss as his functions were mainly to view all users,
Add users and Delete or Remove users, update Records etc.
The users were either log in to any of the other modules apart from the Admin
and either View Arrest, Complain about a crime etc.
This project was carried out between December 7th and January 26th. Here are
some codes from the sessionbean and JSP pages to prove the validity of the
project.
This is the Code from one of the JSP pages to be precise the Admin
home page
Fig.3.2.1 code for the security data base, one of the JSP pages mainly the admin
home
<%--
Document : security2Homepage
Created on : Feb 5, 2013, 1:53:43 AM
Author : Steve
--%>
31 | P a g e
35. background-color:#00FFFF
}
.style3 {
font-size: 24px;
font-style: italic;
}
-->
</style>
</head>
<body>
<div id="apDiv1">
<p align="center" class="style1">THIS IS THE BENUE STATE
SECURITY HOME PAGE</p>
</div>
<div id="apDiv2">
<a href="allAdminview.jsp">Alladminview</a>
<a href="addUser.jsp">addUser</a>
<a href="removeuser.jsp">removeuser</a>
<a href="">viewAllArrest</a>
<table width="100%" border="3" cellspacing="3"
cellpadding="2">
<tr>
<td valign="middle" bgcolor="#00FFFF"><div
align="center"><a
35 | P a g e
36. href="secu2Validation.jsp"><strong>ADMINSTRATOR</strong></a></
div></td>
</tr> <tr>
<td bgcolor="#99CC00"><div align="center"><a
href="secu2Validation.jsp"><strong>USERS</strong></a></div></t
d>
</tr> <tr>
<td bgcolor="#FF0000"><div align="center"
class="style2">ABOUT US</div></td>
</tr> <tr>
<td bgcolor="#FF00FF"><div align="center"
class="style2">CONTACT US</div></td>
</tr>
</table>
<div id="apDiv3">
<p align="center" class="style3">PLEASE DO NOT BE ALFRED
TO REPORT SUSPICIOUS MOVEMENT</p>
</div>
</div>
</body>
</html>
3.3 Implementation of small Office Network
Using the following steps, I was able to implement a small office Network at
Rehoboth ICT Academy on the 25th January, 2013 as it is a custom to carry out
36 | P a g e
37. a practical task at the end of every major project work. Materials used were,
computers, internet access and Ethernet cables.
Firstly the Cat 5 (Category 5 network cables were connected to the R J 45
(Register Jack)) which is used for networking between systems. This connection
were done for a cross connection which is normally supported for different
computers while the straight is done for computer to computer.
Step 1: I clicked on the start my Network places under “Network Task” clicked
on set up a “Home or small Office Network” and this took me to the Network
set up wizard. The wizard helps me to set up my computer to run on my
network where I could share and internet connections, share files and folders
and a printer.
Step 2: I clicked next and made sure I had done everything on the “checklist”
i.e. modem installed, computers and printers turned on and above all connection
to the internet. I clicked next and selected the way I had wanted my connections
to the internet to appear, clicking next took me to computer description, with
options and the computer name was already populated.
Step 3: I clicked next, selected a work group name which by default was
steveHome, but I changed it to office, I clicked next again for file and sharing of
printers turned on. I clicked next again, applied Network settings which took me
to where I wanted to save the information which I considered saving to a note
pad.
Step 4: I clicked next and got a “please wait while the wizard configures this
computer for small office Network this process will take a few minutes
message”. The Network setup wizard was run once for each of the computer
that was found on my Network. TIP to run the wizard on computers that are not
window XP OS, you can use the window XP CD or a network set up Disk you
will then be asked “what do you want to do?” at this point, you can create a
37 | P a g e
38. Network set up Disk, use the disk you have, use Windows XP CD, or click
finish. No need to run wizard on other computers Click Finish.
Step 5: A display message appear, that I had successfully set up this computer
for a small office Network. To see other computers on my Network, I clicked
start, and then clicked My Network Places, I clicked finish and I was prompted
with a message restart your computer, I restarted it and saw my Network under
“My Network Places” with an icon/picture of a networking cable below the
folder.
3.4 Working conditions.
The working conditions at Rehoboth ICT Academy included
* Crowdedness: At Rehoboth ICT academy since we were working as a team
most of our general practical work were carried out in crowded environment as
we were always divided into smaller factions of five persons per each group. in
terms of project given to us, it was in a student’s interest to either join a
particular group or carry out his project independent of other groups.
* Paid allowances: allowances were not paid to any of the students that were
on industrial training at Rehoboth ICT Academy either by the chief executive or
by any individual groups.
* Working Days/Hours: the working days at Rehoboth ICT Academy were
generally same as in the normal working days of the week that is Mondays
through Fridays every week we had our normal hours of 9:00 am to 2:00pm.
3.5 Responsibilty given to me
As an IT student at Rehoboth ICT academy I was given the responsibility of
organising my colleagues in conduct and information dissemination.
38 | P a g e
39. I had always handled this responsibility by making sure all and sundry were
carried along throughout our stay at Rehoboth ICT Academy.
3.6 Observed Organisations Deficiencies.
As it is, in every organisation there exist some lapses, Rehoboth ICT academy
too is not left out the organisation too has a major challenge of facilities such as
computer sets ,internet services and power fluctuation as the number of students
had outweigh this facilities on ground.
3.7 Attractions
Attractions at Rehoboth ICT Academy are too numerous to mention as to most
of us that got to be attached to this had a good reason to smile, this is simply
because if not all then almost all facets of the computer must know functions
were touched.
39 | P a g e
40. CHAPTER FOUR
Conclusion
I have learnt so much in the course of my industrial work experience at
REHOBOTH ICT ACADEMY. The experience gathered will help me be self
reliance and above all make me do additional jobs in computer science. The
(S.I.W.E.S) scheme has helped me a lot to be self confident.
40 | P a g e