SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Chapter one

1.0 Introduction

Student industrial work experience scheme (S.I.W.E.S) is a six-month industrial
work experience as requirement for the award of Bachelor of Science degree in
computer science department of the Benue state university makurdi ,this
report contains major report on some of the things I learnt in the area of work
experience at Rehoboth ICT Academy makurdi Benue state.

1.1 About Rehoboth ICT Academy

The name of the organization is Rehoboth ICT academy location is at no.12
Onitsha street makurdi, Benue state. The company was established in 1996 with
the objective of bringing information technology to the nook and cranny of the
state reaching out to the people from all walks of life especially in our
secondary and tertiary institutions across the state and the country at large.

Rehoboth ICT academy is a computer and software engineering appreciation
organization, its establishment has come to redeem computer education and
information technology problem in the state and country at large.

The establishment is being managed by computer professionals who are really
committed to ensuring a hitch- free, fulfilled and successful program.
Rehoboth’s quest for quality in all her engagement has immensely driven the
company in staff team selection.

Rehoboth ICT academy is getting popular of her dedication to quality service.

1.2 Rehoboth sales and services

The computer industry requires a great deal of experience. Installing new and
servicing existing systems are a significant part of Rehoboth ICT business. The



                                                                           1|Page
organization currently has a total man power of 18 personnel, out of which 8 are
professionals,

Here are some of the services offered by the organization.

* Software Engineering.

* Information and communication technology.

* Networking (internet and intranet).

* Hardware maintenance and repairs.

* Web designing and hosting.

* E-library

* Publications i.e. students journals projects typing and binding etc.

* Diploma certificates on information technology, computer education and other
related courses for groups and individuals.

* Vast and satellite (purchase and installation.

1.3 Facilities at Rehoboth ICT Academy

The organization has a head office at No. 12 Onitsha Street, opposite cool off
park makurdi Benue state, a branch office is at No. 7 old Otukpo Road High
level opposite Mr. Biggs fast foods Makurdi Benue state. Her sitting space for
students is 75 in both centers including her working personnel, a plant capacity
of 7.5KVA and a generator of a 2.7 KVA is installed on ground 24 computers
connected to the net 1 printing machine,1 company vehicle and a motorcycle.

The computers serve as a basis for students learning most especially those on
industrial attachment, where I too had a lot of experiences through hardware and
other basic computer appreciation.


                                                                         2|Page
The name of the chief executive officer is Engineer B.O Animashaun who was
also my internal supervisor.

Areas of industrial training

I had my industrial training in software development and computer networking

I learnt how to design a web site, writing a project using J2EE (java 2 enterprise
edition also in networking how to install, maintain and troubleshoot a computer

network problem for at least a small business establishment.



1.4 Challenges faced as a student on IT

The challenges I had faced on the job as an industrial training students (IT) were

      How to apply the theory aspect of software development to practical,
      firstly, I could not create a home page of a website.
      secondly, I could not create a project in java enterprise edition(J2EE)
      Lastly, I could not troubleshoot a small net work connectivity problem

   I was able to resolve all these with the aid of my internal supervisor and his
   instructors just to mention a few of the challenges.




                                                                         3|Page
1.5 The Organogram of Rehoboth ICT Academy




                                                                 MD/CEO




                                                                                                                        G M
                                                              GM
                                                                                                                      (Accounts)
                                                        (Admin & Operations)




                                                                                                                                    Manager(Finance/Acct.)
                  Manager                      Manager                             Manager
                                               Café 2                                                            Manager
                  Café 1                                                           Computer                        IT
                                                                                   Training




                                                                 Manager
                                Typist                           Bus. Operations
Ca fé Assistant




                                                                                                 .
                                                                                             mp 2
                                                                                          Co uc tor
                                                                                                           uc .
                                                                                                        str mp
                                                                                                                3




                                                                                  p.
                                                                                                             tor




                                                                              om ctor 1       tr
                                                                                                      In C o




                                                                             C u          Ins
                                                   Typist                       tr
                                                                             Ins
                            Café Assistant




                                                                                            r
                                                                                      opie
                                                i st1 Typ ist2         t3     4 h otoc tor.                                   r
                                             Typ                    pis Typist P pera                                      cto                r
                                                                  Ty            O                       to r g          tru k/HM            to rs
                                                                                                   t ruc min        In s e tw          t ruc othe
                                                                                                Ins ram                 N          In s b &
                                                                                                     g
                                                                                                 Pro                                We




                                                                                                                           4|Page
CHAPTER TWO

Summary of Experiences Obtained

   2.1 Website Design

A website is a set of related WebPages containing content such as texts, images,
videos, audios, etc. A website is hosted on at least one web server, accessible
via a network such as the internet or a private LAN through an internet address
known as a URL (universal resource locator). A publicly accessible websites
collectively constitute the World Wide Web.

Webpage

A webpage is a document, typically written in plain text interspersed with
formatting instructions of hypertext markup language (HTML, XHTML). A
webpage may incorporate elements from other websites with suitable anchors.

WebPages are accessed and transported with the hypertext transfer protocol

(HTTP), which may optionally employ encryption (HTTP secure, HTTPS) to
provide security and privacy for the use of the webpage content. The user’s
application often a web browser renders the page content according to its
HTML markup instructions into a display terminal.

2.2 Types of Website by Purpose

      A personal website.
      A commercial website.
      A government website.
      A non-profitable website.
It could be the work of an individual, a business or other organization, and is
typically dedicated to some particular topic or purpose. Any website can contain


                                                                       5|Page
a hyperlink to any other website, so the distinction between individual sites as
perceived by the user may sometimes be blurred.
Websites are written in, or dynamically converted to, HTML and are accessed
using a software interface classified as a user agent. WebPages can be viewed or
otherwise accessed from a range of remote computer-based and internet enabled
devices of various sizes including desktop computers, laptops, PDAs and cell
phones.
A website is hosted on a computer system known as a web server, also called
HTTP (hypertext transfer protocol) server and the terms can also be referred to
the software that runs on those system and retrieves and delivers the WebPages
in response to request from the websites users.
Apache is the most commonly used web server software


2.3 Types of Website by Built
* Static website
* Dynamic website
Static Website
A static website is one that has web pages stored on the server in the format that
is sent to a client web browser. It is primarily coded in hypertext markup
language (HTTM). Simple forms include, marketing websites such as five page
websites or brochure websites are often static
Websites, because they present predefined static information to be used.
This may include information about a company, its products and services
through text, photos, animations, audio/videos, interactive menus and
navigation.
This type of website usually displays the same information to all visitors similar
to handing out a printed brochure to customers or clients. A static
Website will generally provide consistent, standard information for an extended
period of time. Although the website owner may make updates

                                                                         6|Page
Periodically, it is a manual process to edit the text, photos and other content that
may require basic website design skill and software.

     A static website may still have dynamic behavior provided that, this is
handled entirely client side   (i.e. within the browser). This may include such
features as java script image zoom feature to display photographs.

In a static web site visitors are not able to control information they receive and
instead settle for whatever content the website owner has decided to offer at that
time information’s are edited using

        Text editors, such as note pad or text field, where content and HTML
markup are manipulated directly within the editor program.
        WYSIWYG(this, I call what you see is what you get) offline editors such
as
Microsoft front page and Adobe dream weaver.etc.
Dynamic Website
A dynamic website is one that changes or customizes itself frequently and
automatically, based on certain criteria.
Dynamic website can have two types of dynamic activity code and content
dynamic code is invisible or fully displayed.


Dynamic code.
A website with dynamic code refers to its construction or how it is built, and
more specifically refers to the code used to create a single web page. A dynamic
web page is generated on the fly by piecing together certain blocks of code,
procedures or routines. A dynamically generated web page would recall various
bits of information from a database and put them together in a pre-defined
format to present the reader with a coherent page. It interacts with users in a
variety of ways including by reading cookies recognizing users' previous


                                                                          7|Page
history, session variables, server side variables etc., or by using direct
interaction (form elements, mouse over’s, etc.). A site can display the current
state of a dialogue between users, monitor a changing situation, or provide
information in some way personalized to the requirements of the individual
user.



Dynamic Content

The second type is a website with dynamic content displayed in plain view.
Variable content is displayed dynamically on the fly based on certain criteria,
usually by retrieving content stored in a database.

A website with dynamic content refers to how its messages, text, images and
other information are displayed on the web page and more specifically how its
content changes at any given moment. The web page content varies based on
certain criteria, either pre-defined rules or variable user input. For example, a
website with a database of news articles can use a pre-defined rule which tells it
to display all news articles for today's date. This type of dynamic website will
automatically show the most current news articles on any given date. Another
example of dynamic content is when a retail website with a database of media
products allows a user to input a search request for the keyword Beatles. In
response, the content of the web page will spontaneously change the way it
looked before, and will then display a list of Beatles products like CDs, DVDs
and books.

2.4 Javas 2 Enterprise Edition (J2EE)

J2EE means Java 2 Enterprise Edition. The functionality of J2EE is developing
multitier web-based applications .The J2EE platform is consists of a set of
services, application programming interfaces (APIs), and protocols.

                                                                        8|Page
These Four Components of are the J2EE application

      Application clients’ components.
      Servelet and JSP technology are web components.
      Business components (JavaBeans).
      Resource adapter components

      Types of J2EE clients.

      Applets
      Application clients
      Java Web Start-enabled clients, by Java Web Start technology.
      Wireless clients, based on MIDP technology.

web component.

Java Servelet and Java Server Pages technology components are web
components. Servelets are Java programming language that dynamically receive
requests and make responses. JSP pages execute as servelets but allow a more
natural approach to creating static content.




Java server faces (JSFs).

Java Server Faces (JSF) is a user interface (UI) designing framework for Java
web applications. JSF provide a set of reusable UI components, standard for
web applications.JSF is based on MVC design pattern. It automatically saves
the form data to server and populates the form date when display at client side.
Java 2 platform Enterprise Edition (J2EE) is a java platform designed for the
mainframe scale computing typical of large enterprises. Sun micro systems
                                                                       9|Page
(together with industry partners such as IBM (international business machine))
design J2EE to simplify application development in a thin client tiered
environment) what is a thin client? A thin client is a program interface to the
application that does not have any operations like query of databases, execute
complex business rules, or connect to legacy applications. J2EE simplifies
application development and decreases the need for programming and
programmer training by creating standard reusable modular components and by
enabling the tier to handle many aspects of programming automatically. J2EE
include many components of the java 2 platform standard edition (J2SE).

      The java development kit (JDK) is included as the core language
      package.
      Write once Run anywhere technology is included to ensure portability.
      Support      is   provided   for   Common     Object   Request      broker
      Architecture(CORBA), a predecessor of Enterprise JavaBeans(EJB)so
      that java objects can communicate with CORBA objects both locally and
      over a network through its interface broker
      Java database connectivity 2.0 (JDBC) the Java equivalent to open
      Database
      Connectivity (ODBC) is included as the standard interface for Java
      databases.
      A security model is included to protect data both locally and in web-
      based
      applications.
      J2EE also includes a number of components added to the J2SE model,
      such as the following
      Full support is included for Enterprise JavaBeans (EJB) which is a server
      based technology for the delivery of program components in              an



                                                                     10 | P a g e
Enterprise Environment it supports the extensible Markup language
      (XML)
      And has enhanced deployment and security features.
      The java servelet API (application program interface) enhances for
      developers without requiring a graphical user interface(GUI)
      Java server pages (JSP) is the equivalent to Microsoft’s’ Active server
      pages
      (ASP) and is used for dynamic web enabled data access and
      manipulation.
      The J2EE architecture consists of four major elements:
      The J2EE Application programming model is used to facilitate the
      development of multi- tier thin client applications.
      The j2EE platform includes necessary policies and APIs such as the java
      servelets and java message service(JMS) which is used          for simple
      massage
      Transfer protocol (SMTP) over a web service.
      The J2EE compatibility test suit ensures that J2EE products are
      compatible with the platform standard.
      The J2EE reference implementation explains J2EE capabilities and
      provides its operational definition.
      A JNDI name is the name the J2EE server uses to hook enterprise beans
      .In your code when you look up an enterprise bean, you supply statements
      similar to your code.

2.5 Netwoking.

Computer Network

A computer network, often simply referred to as a network, is a collection of
computers and devices interconnected by communications channels that

                                                                     11 | P a g e
facilitate communications among users and allows users to share resources.
Networks may be classified according to a wide variety of characteristics. A
computer network allows sharing of resources and information among
interconnected devices.

Purpose

Computer networks can be used for a variety of purposes:

 *    Facilitating communications. Using a network, people can communicate
efficiently and easily via email, instant messaging, chat rooms, telephone, video
telephone calls, and video conferencing.

 *    Sharing hardware. In a networked environment, each computer on a
network may access and use hardware resources on the network, such as
printing a document on a shared network printer.

 *    Sharing files, data, and information. In a network environment,
authorized user may access data and information stored on other computers on
the network. The capability of providing access to data and information on
shared storage devices is an important feature of many networks.

 *    Sharing software. Users connected to a network may run application
programs on remote computers.

 *    Information preservation.

 *    Security.



2.6 Network Topology

Computer networks may be classified according to the network topology upon
which the network is based, such as bus network, star network, ring network,

                                                                       12 | P a g e
mesh network. Network topology is the coordination by which devices in the
network are arranged in their logical relations to one another, independent of
physical arrangement. Even if networked computers are physically placed in a
linear arrangement and are connected to a hub, the network has a star topology,
rather than a bus topology. In this regard the visual and operational
characteristics of a network are distinct. Networks may be classified based on
the method of data used to convey the data; these include digital and analogue
networks.

2.7 Types of Computer Networks Based on Physical Scope

Common types of computer networks may be identified by their scale.

Local Area Network

A local area network (LAN) is a network that connects computers and devices
in a limited geographical area such as home, school, computer laboratory, office
building, or closely positioned group of buildings. Each computer or device on
the network is a node. Current wired LANs are most likely to be based on
Ethernet technology, although new standards like ITU-T G.hn also provide a
way to create a wired LAN using existing home wires (coaxial cables, phone
lines and power lines).

All interconnected devices must understand the network layer (layer 3), because
they are handling multiple subnets (the different colours). Those inside the
library, which have only 10/100 Mbit/s Ethernet connections to the user device
and a Gigabit Ethernet connection to the central router, could be called "layer 3
switches" because they only have Ethernet interfaces and must understand IP. It
would be more correct to call them access routers, where the router at the top is
a distribution router that connects to the Internet and academic networks'
customer access routers.


                                                                       13 | P a g e
The defining characteristics of LANs, in contrast to WANs (Wide Area
Networks), include their higher data transfer rates, smaller geographic range,
and no need for leased telecommunication lines. Current Ethernet or other IEEE
802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data
transfer rate. IEEE has projects investigating the standardization of 40 and 100
Gbit/s.

Personal Area Network

A personal area network (PAN) is a computer network used for communication
among computer and different information technological devices close to one
person. Some examples of devices that are used in a PAN are personal
computers, printers, fax machines, telephones, PDAs, scanners, and even video
game consoles. A PAN may include wired and wireless devices. The reach of a
PAN typically extends to 10 meters. A wired PAN is usually constructed with
USB and Firewire connections while technologies such as Bluetooth and
infrared communication typically form a wireless PAN.

Home Area Network

A home area network (HAN) is a residential LAN which is used for
communication between digital devices typically deployed in the home, usually
a small number of personal computers and accessories, such as printers and
mobile computing devices. An important function is the sharing of Internet
access, often a broadband service through a CATV or Digital Subscriber Line
(DSL) provider. It can also be referred to as an office area network (OAN).

Wide Area Network

A wide area network (WAN) is a computer network that covers a large
geographic area such as a city, country, or spans even intercontinental distances,
using a communications channel that combines many types of media such as

                                                                       14 | P a g e
telephone lines, cables, and air waves. A WAN often uses transmission facilities
provided by common carriers, such as telephone companies. WAN technologies
generally function at the lower three layers of the OSI reference model: the
physical layer, the data link layer, and the network layer.

Campus Network

A campus network is a computer network made up of an interconnection of
local area networks (LAN's) within a limited geographical area. The networking
equipments (switches, routers) and transmission media (optical fibre, copper
plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant /
owner: an enterprise, university, government etc.).

In the case of a university campus-based campus network, the network is likely
to link a variety of campus buildings including; academic departments, the
university library and student residence halls.

Metropolitan Area Network

A Metropolitan area network is a large computer network that usually spans a
city or a large campus. Sample EPN made of Frame relay WAN connections
and dialup remote access. Sample VPN used to interconnect 3 offices and
remote users.

Enterprise Private Network

An enterprise private network is a network build by an enterprise to
interconnect various company sites, e.g., production sites, head offices, remote
offices, shops, in order to share computer resources.

Virtual Private Network

A virtual private network (VPN) is a computer network in which some of the
links between nodes are carried by open connections or virtual circuits in some

                                                                      15 | P a g e
larger network (e.g., the Internet) instead of by physical wires. The data link
layer protocols of the virtual network are said to be tunnelled through the larger
network when this is the case. One common application is secure
communications through the public Internet, but a VPN need not have explicit
security features, such as authentication or content encryption. VPNs, for
example, can be used to separate the traffic of different user communities over
an underlying network with strong security features.

VPN may have best-effort performance, or may have a defined service level
agreement (SLA) between the VPN customer and the VPN service provider.
Generally, a VPN has a topology more complex than point-to-point.

Internetwork

An internetwork is the connection of two or more private computer networks
via a common routing technology (OSI Layer 3) using routers. The Internet is
an aggregation of many internetworks; hence its name was shortened to
Internet.

2.8 Computer Network Basic Hardware Components

All networks are made up of basic hardware building blocks to interconnect
network nodes, such as Network Interface Cards (NICs), Bridges, Hubs,
Switches, and Routers. In addition, some method of connecting these building
blocks is required, usually in the form of galvanic cable (most commonly
Category 5 cable). Less common are microwave links (as in IEEE 802.12) or
optical cable ("optical fibre").



Network Interface Cards




                                                                       16 | P a g e
A network card, network adapter, or NIC (network interface card) is a piece of
computer hardware designed to allow computers to communicate over a
computer network. It provides physical access to a networking medium and
often provides a low-level addressing system through the use of MAC
addresses. Each network interface card has its unique id. This is written on a
chip which is mounted on the card.

Repeaters

A repeater is an electronic device that receives a signal, cleans it of unnecessary
noise, regenerates it, and retransmits it at a higher power level, or to the other
side of an obstruction, so that the signal can cover longer distances without
degradation. In most twisted pair Ethernet configurations, repeaters are required
for cable that runs longer than 100 meters. A repeater with multiple ports is
known as a hub. Repeaters work on the Physical Layer of the OSI model.
Repeaters require a small amount of time to regenerate the signal. This can
cause a propagation delay which can affect network communication when there
are several repeaters in a row. Many network architectures limit the number of
repeaters that can be used in a row (e.g. Ethernet's 5-4-3 rule).

Bridges

A network bridge connects multiple network segments at the data link layer
(layer 2) of the OSI model. Bridges broadcast to all ports except the port on
which the broadcast was received. However, bridges do not promiscuously copy
traffic to all ports, as hubs do, but learn which MAC addresses are reachable
through specific ports. Once the bridge associates a port and an address, it will
send traffic for that address to that port only.

Bridges learn the association of ports and addresses by examining the source
address of frames that it sees on various ports. Once a frame arrives through a
port, its source address is stored and the bridge assumes that MAC address is
                                                                        17 | P a g e
associated with that port. The first time that a previously unknown destination
address is seen, the bridge will forward the frame to all ports other than the one
on which the frame arrived.

Bridges come in three basic types:

 *    Local bridges: Directly connect local area networks (LANs)

 *    Remote bridges: Can be used to create a wide area network (WAN) link
      between LANs. Remote bridges, where the connecting link is slower than
      the end networks, largely have been replaced with routers.

 *    Wireless bridges: Can be used to join LANs or connect remote stations
to LANs.

Switches

A network switch is a device that forwards and filters OSI layer 2 datagram
(chunks of data communication) between ports (connected cables) based on the
MAC addresses in the packets.[9] A switch is distinct from a hub in that it only
forwards the frames to the ports involved in the communication rather than all
ports connected. A switch breaks the collision domain but represents itself as a
broadcast domain. Switches make forwarding decisions of frames on the basis
of MAC addresses. A switch normally has numerous ports, facilitating a star
topology for devices, and cascading additional switches.[10] Some switches are
capable of routing based on Layer 3 addressing or additional logical levels;
these are called multi-layer switches. The term switch is used loosely in
marketing to encompass devices including routers and bridges, as well as
devices that may distribute traffic on load or by application content (e.g., a Web
URL identifier).

Routers


                                                                       18 | P a g e
A router is an internetworking device that forwards packets between networks
by processing information found in the datagram or packet (Internet protocol
information from Layer 3 of the OSI Model). In many situations, this
information is processed in conjunction with the routing table (also known as
forwarding table). Routers use routing tables to determine what interface to
forward packets (this can include the "null" also known as the "black hole"
interface because data can go into it, however, no further processing is done for
said data).

Firewalls

Firewalls are the most important aspect of a network with respect to security. A
firewalled system does not need every interaction or data transfer monitored by
a human, as automated processes can be set up to assist in rejecting access
requests from unsafe sources, and allowing actions from recognized ones. The
vital role firewalls play in network security grows in parallel with the constant
increase in 'cyber' attacks for the purpose of stealing/corrupting data, planting
viruses, etc.

2.9 Difference between Network Hub, Switches and Router

Some technicians have a tendency to use the terms routers, hubs and switches
interchangeably. One minute they're talking about a switch. Two minutes later
they're discussing router settings. Throughout all of this, though, they're still
looking at only the one box. Ever wonder what the difference is among these
boxes? The functions of the three devices are all quite different from one
another, even if at times they are all integrated into a single device.

Hub

A common connection point to devices in a network. Hubs are commonly used
to connect segments of a LAN. A hub contains multiple ports. When a packet

                                                                          19 | P a g e
arrives at one port, it is copied to the other ports so that all segments of the LAN
can see all packets.

Switch

In networks, is a device that filters and forwards packets between LAN
segments. Switches operate at the data link layer (layer 2) and sometimes the
network layer (layer 3) of the OSI Reference Model and therefore support any
packet protocol. LANs that use switches to join segments are called switched
LANs or, in the case of Ethernet networks, switched Ethernet LANs.

Router

A device that forwards data packets along networks. A router is connected to at
least two networks, commonly two LANs or WANs or a LAN and its ISP.s
network. Routers are located at gateways, the places where two or more
networks connect. Routers use headers and forwarding tables to determine the
best path for forwarding the packets, and they use protocols such as ICMP to
communicate with each other and configure the best route between any two
hosts.

The Differences between Hubs, Switches, and Routers on the Network

Today most routers have become something of a Swiss Army knife, combining
the features and functionality of a router and switch/hub into a single unit. So
conversations regarding these devices can be a bit misleading — especially to
someone new to computer networking.

The functions of a router, hub and a switch are all quite different from one
another, even if at times they are all integrated into a single device. Let's start
with the hub and the switch since these two devices have similar roles on the
network. Each serves as a central connection for all of your network equipment
and handles a data type known as frames. Frames carry your data. When a

                                                                         20 | P a g e
frame is received, it is amplified and then transmitted on to the port of the
destination PC. The big difference between these two devices is in the method
in which frames are being delivered.

In a hub, a frame is passed along or "broadcast" to every one of its ports. It
doesn't matter that the frame is only destined for one port. The hub has no way
of distinguishing which port a frame should be sent to. Passing it along to every
port ensures that it will reach its intended destination. This places a lot of traffic
on the network and can lead to poor network response times.

Additionally, a 10/100Mbps hub must share its bandwidth with each and every
one of its ports. So when only one PC is broadcasting, it will have access to the
maximum available bandwidth. If, however, multiple PCs are broadcasting,
then that bandwidth will need to be divided among all of those systems, which
will degrade performance.

A switch, however, keeps a record of the MAC addresses of all the devices
connected to it. With this information, a switch can identify which system is
sitting on which port. So when a frame is received, it knows exactly which port
to send it to, without significantly increasing network response times. And,
unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of
its ports. So regardless of the number of PCs transmitting, users will always
have access to the maximum amount of bandwidth. It's for these reasons why a
switch is considered to be a much better choice than a hub.



Routers are completely different devices. Where a hub or switch is concerned
with transmitting frames, a router's job, as its name implies, is to route packets
to other networks until that packet ultimately reaches its destination. One of the
key features of a packet is that it not only contains data, but the destination
address of where it's going.
                                                                           21 | P a g e
A router is typically connected to at least two networks, commonly two Local
Area Networks (LANs) or Wide Area Networks (WAN) or a LAN and its ISP's
network, for example, your PC or workgroup and EarthLink. Routers are
located at gateways, the places where two or more networks connect. Using
headers and forwarding tables, routers determine the best path for forwarding
the packets. Router use protocols such as ICMP to communicate with each other
and configure the best route between any two hosts.

Today, a wide variety of services are integrated into most broadband routers. A
router will typically include a 4 - 8 port Ethernet switch (or hub) and a Network
Address Translator (NAT). In addition, they usually include a Dynamic Host
Configuration Protocol (DHCP) server, Domain Name Service (DNS) proxy
server and a hardware firewall to protect the LAN from malicious intrusion
from the Internet.

All routers have a WAN Port that connects to a DSL or cable modem for
broadband Internet service and the integrated switch allows users to easily
create a LAN. This allows all the PCs on the LAN to have access to the Internet
and Windows file and printer sharing services.

Some routers have a single WAN port and a single LAN port and are designed
to connect an existing LAN hub or switch to a WAN. Ethernet switches and
hubs can be connected to a router with multiple PC ports to expand a LAN.
Depending on the capabilities (kinds of available ports) of the router and the
switches or hubs, the connection between the router and switches/hubs may
require either straight-thru or crossover (null-modem) cables. Some routers even
have USB ports, and more commonly, wireless access points built into them.

Some of the more high-end or business class routers will also incorporate a
serial port that can be connected to an external dial-up modem, which is useful



                                                                       22 | P a g e
as a backup in the event that the primary broadband connection goes down, as
well as a built in LAN printer server and printer port.

Besides the inherent protection features provided by the NAT, many routers will
also have a built-in, configurable, hardware-based firewall. Firewall capabilities
can range from the very basic to quite sophisticated devices. Among the
capabilities found on leading routers are those that permit configuring
TCP/UDP ports for games, chat services, and the like, on the LAN behind the
firewall. So, in short, a hub glues together an Ethernet network segment, a
switch can connect multiple Ethernet segments more efficiently and a router can
do those functions plus route TCP/IP packets between multiple LANs and/or
WANs; and much more of course.




                                                                       23 | P a g e
CHAPTER THREE

3.0 Projects implemented for the Organisation.

* Website design project.

* Security database (J2EE) project.

* Implementation of a small office network.

3.1 Website design project:

This project was given to me by the organisation singly, specifications were, at
the home page we should include a welcome message, a title and photographs
that could reflect the website purpose the navigation panel were also created.
The aim of this project was to design a website for e-resources the title of the
project was given as or rather website name was Rehoboth e-education
resources with an integral purpose of an e-library. the navigation panel were
made of outline boxes with links, this are some of the panels that were created
with links, Rehoboth ICT Academy, About us, Home, Authors of the year,
Book reviews, contact us, Help, Jobs, project Appraisal, Book reviews, science
research for the next generation, Books downloads and information and
services. Selected navigation panels like project appraisal and science research
for the next generation were loaded to their content and linked to their
navigation panels other navigation panels were to be left unlinked so that my
fellow colleagues work could also be linked. the project was given to me by the
organisation on the 14th of December 2012, I used the Christmas and new year
breaks to execute the project, I used a designer software called CS3(Adobe
dream weaver) to make my work more perfect. Below is the HTML code prove
the validity of the project.




                                                                      24 | P a g e
Fig 3.1.1 Code for website project.

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<!-- DW6 -->

<head>

<!-- Copyright 2005 Macromedia, Inc. All rights reserved. -->

<title>REHOBOTH E-RESOURCES - Home Page</title>

<meta         http-equiv="Content-Type"            content="text/html;
charset=utf-8" />

<link          rel="stylesheet"           href="mm_entertainment.css"
type="text/css" />

<style type="text/css">

<!--

.style3 { font-size: 36px;

       font-weight: bold;}

.style5 {font-size: 18px; color: #FF0000; font-style: italic;
}

.style6 {font-size: 14px}

-->

</style>

</head>

<body bgcolor="#14285f">

<table         width="100%"           border="0"       cellspacing="0"
cellpadding="0">

                                                              25 | P a g e
<tr bgcolor="02021e">

   <td            width="400"             colspan="4"        rowspan="2"
nowrap="nowrap"><p><img              width="349"            height="232"
src="rehoboth_clip_image002.gif" alt="j0195384" /></p></td>

   <td    width="360"       height="58"    colspan="3"   valign="bottom"
nowrap="nowrap" class="pageName style3" id="logo">REHOBOTH E-
DUCATION RESOURCES</td>

   <td width="100%">&nbsp;</td>

  </tr>

  <tr bgcolor="02021E">

   <td height="57" colspan="3" valign="top" nowrap="nowrap"
class="style5"      id="tagline"><marquee        direction="left"><font
color="#FFFFFF">we     at    rehoboth     e-edu.resources   we   keep    our
word</font></marquee></td>

    <td width="100%">&nbsp;</td>

  </tr>

  <tr>

   <td colspan="8" bgcolor="#cc3300"><img src="mm_spacer.gif"
alt="" width="1" height="2" border="0" /></td>

  </tr>    <tr>

   <td colspan="8"><img src="mm_spacer.gif" alt="" width="1"
height="2" border="0" /></td>

  </tr>   <tr>

   <td colspan="8" bgcolor="#cc3300"><img src="mm_spacer.gif"
alt="" width="1" height="1" border="0" /></td>

  </tr>   <tr>

   <td colspan="8">&nbsp;<br />

                                                                  26 | P a g e
&nbsp;<br />           </td>

  </tr>    <tr>

   <td width="155" valign="top" height="370">

    <table         border="0"      cellspacing="0"      cellpadding="0"
width="155" id="navigation">

          <tr>     <td width="155" height="40"><a href="">REHOBOTH
ICT ACADEMY</a></td>

          </tr>            <tr>

            <td      width="155"      height="40"><a      href="">ABOUT
US</a></td>

          </tr>            <tr>

            <td width="155" height="40"><a href="">HOME</a></td>

          </tr>            <tr>

             <td width="155" height="40"><a href="">AUTHORS OF
THE YEAR</a></td>

          </tr>     <tr>

             <td      width="155"      height="40"><a      href="">BOOK
REVIEWS</a></td>

          </tr>     <tr>

             <td     width="155"     height="40"><a     href="">CONTACT
US</a></td>

          </tr>            <tr>

             <td      width="155"      height="40"><a      href="">HELP
</a></td>

          </tr>            <tr>



                                                               27 | P a g e
<td                  width="155"               height="40"><a
href="">JOBS</a></td>

         </tr>             <tr>

             <td                  width="155"               height="40"><a
href="file:///c:/users/steve/documents/usongo                             ict
center/appraisal.html">PROJECT APPRAISAL</a></td>

         </tr>      <tr>

             <td    width="155"        height="40"><a      href="">    BOOKS
DOWNLOADS</a></td>

         </tr>          <tr>

             <td width="155" height="40"><a href="">INFORMATION
& SERVICES</a></td>

         </tr>         </table></td>

   <td     width="1"   bgcolor="#445DA0"><img        src="mm_spacer.gif"
alt="" width="1" height="1" border="0" /></td>

   <td width="50"><img src="mm_spacer.gif" alt="" width="50"
height="1" border="0" /></td>

   <td         width="304"           colspan="2"          valign="top"><img
src="mm_spacer.gif" alt="" width="304" height="1" border="0"
/><br />

    <table         border="0"        cellspacing="0"       cellpadding="0"
width="304">

         <tr><td    height="41"       class="pageName">Welcome        Message
Here</td>

         </tr>       <tr>                    <td class="bodyText"><span
class="style6">Here        at     rehoboth   e-ducation    resources     will
provide the best and are determined to be the no 1. in e-
learning so always stay with

                                                                   28 | P a g e
with    us    for   qualiity   services    and   other     e-du
materials and downloads.</span>

                 <p><span                         class="subHeader">Title
Here</span>.                     </p>

                 <span    class="style6">e-learning        is      simply      an
internet   base     source      of   reading    through    various    research
channel     such          as     e-library,       e-research,        e-reviews
etc.</span></td>

          </tr>

     </table>

    <p><br />

    </p></td>

   <td width="50"><img src="mm_spacer.gif" alt="" width="50"
height="1" border="0" /></td>

   <td     width="200"          valign="top"><img     src="mm_spacer.gif"
alt="" width="1" height="10" border="0" /><br />

    <table         border="0"           cellspacing="0"     cellpadding="0"
width="200">

          <tr>                       <td colspan="3" id="sidebarHeader"
class="sidebarHeader" align="center">SCIENCE THIS WEEK</td>

          </tr>     <tr>

            <td         width="45"><img      src="mm_spacer.gif"        alt=""
width="40" height="1" border="0" /></td>

            <td width="110" id="sidebar" class="smallText">

                    <p><img      src="steve.com     012.jpg"      width="265"
height="267" /><br />

                    Science research for new generation<br/>

                                                                      29 | P a g e
<a     href="file:///c:/users/steve/documents/usongo
ict center/SCIENCE RE.html">read more...:</a>

                       <p><img   src="steve.com   001.jpg"    alt="TREC"
width="260" height="267" /><br />

                       LITREATURE REVIEWS AND PROJECT BACKGROUND<br />

                         <a href="javascript:;">read more &gt;</a><br
/>     </p>   <br />             <td width="45">&nbsp;</td>

          </tr>

       </table>

       <br /> </td>

     <td width="100%">&nbsp;</td>

  </tr>    <tr>

     <td width="155">&nbsp;</td>

     <td width="1"></td>

     <td width="50">&nbsp;</td>

     <td width="194">&nbsp;</td>

     <td width="110">&nbsp;</td>

     <td width="50">&nbssp;</td>

     <td width="200">&nbsp;</td>

     <td width="100%">&nbsp;</td>

  </tr>

</table>

</body>

</html>


                                                                30 | P a g e
3.2 Security database (J2EE) Java 2 Enterprise Edition

Here the organisation thought much about the experience we had obtained in
Java 2 enterprise edition and wanted to know if we really understood what our
instructor on Software Development Mr. Vitalis Agbers with Phone No.:
08137671244 thought us on J2EE, we were to design a data base for security
online Report, the project had the following modules: Admin, Arrest, Crime,
Complain, Record and Users.

The Admin: is the overall boss as his functions were mainly to view all users,
Add users and Delete or Remove users, update Records etc.

The users were either log in to any of the other modules apart from the Admin
and either View Arrest, Complain about a crime etc.

This project was carried out between December 7th and January 26th. Here are
some codes from the sessionbean and JSP pages to prove the validity of the
project.

This is the Code from one of the JSP pages to be precise the Admin
home page

Fig.3.2.1 code for the security data base, one of the JSP pages mainly the admin
home

<%--

     Document      : security2Homepage

     Created on : Feb 5, 2013, 1:53:43 AM

     Author        : Steve

--%>




                                                                      31 | P a g e
<%@page contentType="text/html" pageEncoding="UTF-8"%>

<%@page import =" java.io.IOException"%>

<%@page import =" java.io.PrintWriter"%>

<%@page import ="java.util.logging.Level"%>

<%@page import ="java.util.logging.Logger"%>

<%@page import=" javax.ejb.CreateException"%>

<%@page import=" javax.naming.Context"%>

<%@page import=" javax.naming.InitialContext"%>

<%@page import=" javax.naming.NamingException"%>

<%@page import=" javax.servlet.ServletException"%>

<%@page import=" javax.servlet.http.HttpServlet"%>

<%@page import ="javax.servlet.http.HttpServletRequest"%>

<%@page import ="javax.servlet.http.HttpServletResponse"%>

<%@page import =" security2Session.security2SessionLocal"%>

<%@page                       import                              ="
security2Session.security2SessionLocalHome"%>

<%

security2SessionLocal stl = null;

String txt = null;

%>

<%

try {

           Context c = new InitialContext();



                                                         32 | P a g e
security2SessionLocalHome             rv                =
(security2SessionLocalHome)
c.lookup("java:comp/env/security2SessionBean");

              stl = rv.create();

          } catch (NamingException ne) {}

%>

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"

     "http://www.w3.org/TR/html4/loose.dtd">

<html>

     <head>

          <meta     http-equiv="Content-Type"   content="text/html;
charset=UTF-8">

          <title>JSP Page</title>

          <style type="text/css">

<!--

#apDiv1 {

       position:absolute;

       width:100%;

       height:85px;

       z-index:1;

       background-color:#FF0000

}

.style1 {

       font-size: 36px;


                                                           33 | P a g e
font-weight: bold;

    color: #FFFFFF;

}

#apDiv2 {

    position:absolute;

    width:250px;

    height:190px;

    z-index:2;

    left: 11px;

    top: 102px;

    background-color:#FFFF00

}

.style2 {

    font-family: "Arial Black";

    font-style: italic;

}

#apDiv3 {

    position:absolute;

    width:707px;

    height:190px;

    z-index:1;

    left: 251px;

    top: 1px;


                                  34 | P a g e
background-color:#00FFFF

}

.style3 {

       font-size: 24px;

       font-style: italic;

}

-->

            </style>

</head>

      <body>

      <div id="apDiv1">

        <p align="center" class="style1">THIS IS THE BENUE STATE
SECURITY HOME PAGE</p>

      </div>

      <div id="apDiv2">

               <a href="allAdminview.jsp">Alladminview</a>

               <a href="addUser.jsp">addUser</a>

               <a href="removeuser.jsp">removeuser</a>

               <a href="">viewAllArrest</a>

        <table         width="100%"      border="3"    cellspacing="3"
cellpadding="2">

            <tr>

      <td              valign="middle"          bgcolor="#00FFFF"><div
align="center"><a


                                                              35 | P a g e
href="secu2Validation.jsp"><strong>ADMINSTRATOR</strong></a></
div></td>

          </tr>         <tr>

              <td     bgcolor="#99CC00"><div            align="center"><a
href="secu2Validation.jsp"><strong>USERS</strong></a></div></t
d>

          </tr>       <tr>

              <td       bgcolor="#FF0000"><div             align="center"
class="style2">ABOUT US</div></td>

          </tr>        <tr>

              <td       bgcolor="#FF00FF"><div             align="center"
class="style2">CONTACT US</div></td>

          </tr>

       </table>

       <div id="apDiv3">

       <p align="center" class="style3">PLEASE DO NOT BE ALFRED
TO REPORT SUSPICIOUS MOVEMENT</p>

       </div>

     </div>

</body>

</html>

3.3 Implementation of small Office Network

Using the following steps, I was able to implement a small office Network at
Rehoboth ICT Academy on the 25th January, 2013 as it is a custom to carry out



                                                                   36 | P a g e
a practical task at the end of every major project work. Materials used were,
computers, internet access and Ethernet cables.

Firstly the Cat 5 (Category 5 network cables were connected to the R J 45
(Register Jack)) which is used for networking between systems. This connection
were done for a cross connection which is normally supported for different
computers while the straight is done for computer to computer.

Step 1: I clicked on the start my Network places under “Network Task” clicked
on set up a “Home or small Office Network” and this took me to the Network
set up wizard. The wizard helps me to set up my computer to run on my
network where I could share and internet connections, share files and folders
and a printer.

Step 2: I clicked next and made sure I had done everything on the “checklist”
i.e. modem installed, computers and printers turned on and above all connection
to the internet. I clicked next and selected the way I had wanted my connections
to the internet to appear, clicking next took me to computer description, with
options and the computer name was already populated.

Step 3: I clicked next, selected a work group name which by default was
steveHome, but I changed it to office, I clicked next again for file and sharing of
printers turned on. I clicked next again, applied Network settings which took me
to where I wanted to save the information which I considered saving to a note
pad.

Step 4: I clicked next and got a “please wait while the wizard configures this
computer for small office Network this process will take a few minutes
message”. The Network setup wizard was run once for each of the computer
that was found on my Network. TIP to run the wizard on computers that are not
window XP OS, you can use the window XP CD or a network set up Disk you
will then be asked “what do you want to do?” at this point, you can create a
                                                                        37 | P a g e
Network set up Disk, use the disk you have, use Windows XP CD, or click
finish. No need to run wizard on other computers Click Finish.

Step 5: A display message appear, that I had successfully set up this computer
for a small office Network. To see other computers on my Network, I clicked
start, and then clicked My Network Places, I clicked finish and I was prompted
with a message restart your computer, I restarted it and saw my Network under
“My Network Places” with an icon/picture of a networking cable below the
folder.

3.4 Working conditions.

The working conditions at Rehoboth ICT Academy included

* Crowdedness: At Rehoboth ICT academy since we were working as a team
most of our general practical work were carried out in crowded environment as
we were always divided into smaller factions of five persons per each group. in
terms of project given to us, it was in a student’s interest to either join a
particular group or carry out his project independent of other groups.

* Paid allowances: allowances were not paid to any of the students that were
on industrial training at Rehoboth ICT Academy either by the chief executive or
by any individual groups.

* Working Days/Hours: the working days at Rehoboth ICT Academy were
generally same as in the normal working days of the week that is Mondays
through Fridays every week we had our normal hours of 9:00 am to 2:00pm.

3.5 Responsibilty given to me

As an IT student at Rehoboth ICT academy I was given the responsibility of
organising my colleagues in conduct and information dissemination.



                                                                         38 | P a g e
I had always handled this responsibility by making sure all and sundry were
carried along throughout our stay at Rehoboth ICT Academy.

3.6 Observed Organisations Deficiencies.

As it is, in every organisation there exist some lapses, Rehoboth ICT academy
too is not left out the organisation too has a major challenge of facilities such as
computer sets ,internet services and power fluctuation as the number of students
had outweigh this facilities on ground.

3.7 Attractions

Attractions at Rehoboth ICT Academy are too numerous to mention as to most
of us that got to be attached to this had a good reason to smile, this is simply
because if not all then almost all facets of the computer must know functions
were touched.




                                                                         39 | P a g e
CHAPTER FOUR

Conclusion

I have learnt so much in the course of my industrial work experience at
REHOBOTH ICT ACADEMY. The experience gathered will help me be self
reliance and above all make me do additional jobs in computer science. The
(S.I.W.E.S) scheme has helped me a lot to be self confident.




                                                                40 | P a g e

Weitere ähnliche Inhalte

Andere mochten auch

Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...
Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...
Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...Olufemi Jeremiah Olubodun
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNEjiro Ndifereke
 
Internship Log
Internship LogInternship Log
Internship LogBlair E
 
Siwes report original
Siwes report originalSiwes report original
Siwes report originalBrightnyt Pun
 
Logbook for industrial supervision and training
Logbook for industrial supervision and trainingLogbook for industrial supervision and training
Logbook for industrial supervision and trainingOlufemi Jeremiah Olubodun
 
Vincent chibueze c. full it report
Vincent chibueze c. full it reportVincent chibueze c. full it report
Vincent chibueze c. full it reportChibueze C. Vincent
 
Industrial training Report
Industrial training ReportIndustrial training Report
Industrial training ReportDavid James
 
Sample of SIWES REPORT
Sample of SIWES REPORTSample of SIWES REPORT
Sample of SIWES REPORTMargaret Itam
 
Maddison - The information literacy challenge in public libraries in Wales (c...
Maddison - The information literacy challenge in public libraries in Wales (c...Maddison - The information literacy challenge in public libraries in Wales (c...
Maddison - The information literacy challenge in public libraries in Wales (c...IL Group (CILIP Information Literacy Group)
 
Getting started with sbt
Getting started with sbtGetting started with sbt
Getting started with sbtikenna4u
 

Andere mochten auch (20)

Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...
Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...
Logbook For Industrial Supervision and Training- A Look at Paper and Digital ...
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 
Internship Log
Internship LogInternship Log
Internship Log
 
MY SIWES REPORT
MY SIWES REPORTMY SIWES REPORT
MY SIWES REPORT
 
Siwes report original
Siwes report originalSiwes report original
Siwes report original
 
Logbook for industrial supervision and training
Logbook for industrial supervision and trainingLogbook for industrial supervision and training
Logbook for industrial supervision and training
 
johnson pdf (3)_2N
johnson pdf (3)_2Njohnson pdf (3)_2N
johnson pdf (3)_2N
 
SIWES PPT
SIWES PPTSIWES PPT
SIWES PPT
 
Vincent chibueze c. full it report
Vincent chibueze c. full it reportVincent chibueze c. full it report
Vincent chibueze c. full it report
 
OPES SIWES
OPES SIWESOPES SIWES
OPES SIWES
 
Report training
Report trainingReport training
Report training
 
Log Book
Log Book Log Book
Log Book
 
Industrial training Report
Industrial training ReportIndustrial training Report
Industrial training Report
 
CCNA training report
CCNA training reportCCNA training report
CCNA training report
 
Sample of SIWES REPORT
Sample of SIWES REPORTSample of SIWES REPORT
Sample of SIWES REPORT
 
Maddison - The information literacy challenge in public libraries in Wales (c...
Maddison - The information literacy challenge in public libraries in Wales (c...Maddison - The information literacy challenge in public libraries in Wales (c...
Maddison - The information literacy challenge in public libraries in Wales (c...
 
PROJECT
PROJECTPROJECT
PROJECT
 
Siwes report
Siwes reportSiwes report
Siwes report
 
Getting started with sbt
Getting started with sbtGetting started with sbt
Getting started with sbt
 
Ccna training report
Ccna training reportCcna training report
Ccna training report
 

Kürzlich hochgeladen

Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...Riya Pathan
 
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service Ajmer
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service AjmerLow Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service Ajmer
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service AjmerRiya Pathan
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...anamikaraghav4
 
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Serviceanamikaraghav4
 
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...ritikasharma
 
VIP Call Girls Sonagachi - 8250192130 Escorts Service 50% Off with Cash ON De...
VIP Call Girls Sonagachi - 8250192130 Escorts Service 50% Off with Cash ON De...VIP Call Girls Sonagachi - 8250192130 Escorts Service 50% Off with Cash ON De...
VIP Call Girls Sonagachi - 8250192130 Escorts Service 50% Off with Cash ON De...anamikaraghav4
 
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEGV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEApsara Of India
 
Call Girls In Goa 9316020077 Goa Call Girl By Indian Call Girls Goa
Call Girls In Goa  9316020077 Goa  Call Girl By Indian Call Girls GoaCall Girls In Goa  9316020077 Goa  Call Girl By Indian Call Girls Goa
Call Girls In Goa 9316020077 Goa Call Girl By Indian Call Girls Goasexy call girls service in goa
 
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur EscortsVIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...noor ahmed
 
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...Riya Pathan
 
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service GulbargaVIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service GulbargaRiya Pathan
 
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...ranjana rawat
 
Call Girl Nashik Amaira 7001305949 Independent Escort Service Nashik
Call Girl Nashik Amaira 7001305949 Independent Escort Service NashikCall Girl Nashik Amaira 7001305949 Independent Escort Service Nashik
Call Girl Nashik Amaira 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur EscortsCall Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...Apsara Of India
 
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...noor ahmed
 
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Kürzlich hochgeladen (20)

Desi Bhabhi Call Girls In Goa 💃 730 02 72 001💃desi Bhabhi Escort Goa
Desi Bhabhi Call Girls  In Goa  💃 730 02 72 001💃desi Bhabhi Escort GoaDesi Bhabhi Call Girls  In Goa  💃 730 02 72 001💃desi Bhabhi Escort Goa
Desi Bhabhi Call Girls In Goa 💃 730 02 72 001💃desi Bhabhi Escort Goa
 
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...
Low Rate Call Girls Gulbarga Anika 8250192130 Independent Escort Service Gulb...
 
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service Ajmer
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service AjmerLow Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service Ajmer
Low Rate Call Girls Ajmer Anika 8250192130 Independent Escort Service Ajmer
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
 
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
Call Girls Service Bantala - Call 8250192130 Rs-3500 with A/C Room Cash on De...
 
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Sonagachi 💫💫7001035870 Model escorts Service
 
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
Behala ( Call Girls ) Kolkata ✔ 6297143586 ✔ Hot Model With Sexy Bhabi Ready ...
 
VIP Call Girls Sonagachi - 8250192130 Escorts Service 50% Off with Cash ON De...
VIP Call Girls Sonagachi - 8250192130 Escorts Service 50% Off with Cash ON De...VIP Call Girls Sonagachi - 8250192130 Escorts Service 50% Off with Cash ON De...
VIP Call Girls Sonagachi - 8250192130 Escorts Service 50% Off with Cash ON De...
 
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICEGV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
GV'S 24 CLUB & BAR CONTACT 09602870969 CALL GIRLS IN UDAIPUR ESCORT SERVICE
 
Call Girls In Goa 9316020077 Goa Call Girl By Indian Call Girls Goa
Call Girls In Goa  9316020077 Goa  Call Girl By Indian Call Girls GoaCall Girls In Goa  9316020077 Goa  Call Girl By Indian Call Girls Goa
Call Girls In Goa 9316020077 Goa Call Girl By Indian Call Girls Goa
 
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur EscortsVIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Nagpur Megha Call 7001035870 Meet With Nagpur Escorts
 
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
 
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
(Dipika) Call Girls in Bangur ! 8250192130 ₹2999 Only and Free Hotel Delivery...
 
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service GulbargaVIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
VIP Call Girls in Gulbarga Aarohi 8250192130 Independent Escort Service Gulbarga
 
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...
(KRITI) Pimpri Chinchwad Call Girls Just Call 7001035870 [ Cash on Delivery ]...
 
Call Girl Nashik Amaira 7001305949 Independent Escort Service Nashik
Call Girl Nashik Amaira 7001305949 Independent Escort Service NashikCall Girl Nashik Amaira 7001305949 Independent Escort Service Nashik
Call Girl Nashik Amaira 7001305949 Independent Escort Service Nashik
 
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur EscortsCall Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
Call Girl Nagpur Roshni Call 7001035870 Meet With Nagpur Escorts
 
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
Contact:- 8860008073 Call Girls in Karnal Escort Service Available at Afforda...
 
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
Independent Joka Escorts ✔ 8250192130 ✔ Full Night With Room Online Booking 2...
 
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service NashikCall Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
Call Girl Nashik Saloni 7001305949 Independent Escort Service Nashik
 

my It report

  • 1. Chapter one 1.0 Introduction Student industrial work experience scheme (S.I.W.E.S) is a six-month industrial work experience as requirement for the award of Bachelor of Science degree in computer science department of the Benue state university makurdi ,this report contains major report on some of the things I learnt in the area of work experience at Rehoboth ICT Academy makurdi Benue state. 1.1 About Rehoboth ICT Academy The name of the organization is Rehoboth ICT academy location is at no.12 Onitsha street makurdi, Benue state. The company was established in 1996 with the objective of bringing information technology to the nook and cranny of the state reaching out to the people from all walks of life especially in our secondary and tertiary institutions across the state and the country at large. Rehoboth ICT academy is a computer and software engineering appreciation organization, its establishment has come to redeem computer education and information technology problem in the state and country at large. The establishment is being managed by computer professionals who are really committed to ensuring a hitch- free, fulfilled and successful program. Rehoboth’s quest for quality in all her engagement has immensely driven the company in staff team selection. Rehoboth ICT academy is getting popular of her dedication to quality service. 1.2 Rehoboth sales and services The computer industry requires a great deal of experience. Installing new and servicing existing systems are a significant part of Rehoboth ICT business. The 1|Page
  • 2. organization currently has a total man power of 18 personnel, out of which 8 are professionals, Here are some of the services offered by the organization. * Software Engineering. * Information and communication technology. * Networking (internet and intranet). * Hardware maintenance and repairs. * Web designing and hosting. * E-library * Publications i.e. students journals projects typing and binding etc. * Diploma certificates on information technology, computer education and other related courses for groups and individuals. * Vast and satellite (purchase and installation. 1.3 Facilities at Rehoboth ICT Academy The organization has a head office at No. 12 Onitsha Street, opposite cool off park makurdi Benue state, a branch office is at No. 7 old Otukpo Road High level opposite Mr. Biggs fast foods Makurdi Benue state. Her sitting space for students is 75 in both centers including her working personnel, a plant capacity of 7.5KVA and a generator of a 2.7 KVA is installed on ground 24 computers connected to the net 1 printing machine,1 company vehicle and a motorcycle. The computers serve as a basis for students learning most especially those on industrial attachment, where I too had a lot of experiences through hardware and other basic computer appreciation. 2|Page
  • 3. The name of the chief executive officer is Engineer B.O Animashaun who was also my internal supervisor. Areas of industrial training I had my industrial training in software development and computer networking I learnt how to design a web site, writing a project using J2EE (java 2 enterprise edition also in networking how to install, maintain and troubleshoot a computer network problem for at least a small business establishment. 1.4 Challenges faced as a student on IT The challenges I had faced on the job as an industrial training students (IT) were How to apply the theory aspect of software development to practical, firstly, I could not create a home page of a website. secondly, I could not create a project in java enterprise edition(J2EE) Lastly, I could not troubleshoot a small net work connectivity problem I was able to resolve all these with the aid of my internal supervisor and his instructors just to mention a few of the challenges. 3|Page
  • 4. 1.5 The Organogram of Rehoboth ICT Academy MD/CEO G M GM (Accounts) (Admin & Operations) Manager(Finance/Acct.) Manager Manager Manager Café 2 Manager Café 1 Computer IT Training Manager Typist Bus. Operations Ca fé Assistant . mp 2 Co uc tor uc . str mp 3 p. tor om ctor 1 tr In C o C u Ins Typist tr Ins Café Assistant r opie i st1 Typ ist2 t3 4 h otoc tor. r Typ pis Typist P pera cto r Ty O to r g tru k/HM to rs t ruc min In s e tw t ruc othe Ins ram N In s b & g Pro We 4|Page
  • 5. CHAPTER TWO Summary of Experiences Obtained 2.1 Website Design A website is a set of related WebPages containing content such as texts, images, videos, audios, etc. A website is hosted on at least one web server, accessible via a network such as the internet or a private LAN through an internet address known as a URL (universal resource locator). A publicly accessible websites collectively constitute the World Wide Web. Webpage A webpage is a document, typically written in plain text interspersed with formatting instructions of hypertext markup language (HTML, XHTML). A webpage may incorporate elements from other websites with suitable anchors. WebPages are accessed and transported with the hypertext transfer protocol (HTTP), which may optionally employ encryption (HTTP secure, HTTPS) to provide security and privacy for the use of the webpage content. The user’s application often a web browser renders the page content according to its HTML markup instructions into a display terminal. 2.2 Types of Website by Purpose A personal website. A commercial website. A government website. A non-profitable website. It could be the work of an individual, a business or other organization, and is typically dedicated to some particular topic or purpose. Any website can contain 5|Page
  • 6. a hyperlink to any other website, so the distinction between individual sites as perceived by the user may sometimes be blurred. Websites are written in, or dynamically converted to, HTML and are accessed using a software interface classified as a user agent. WebPages can be viewed or otherwise accessed from a range of remote computer-based and internet enabled devices of various sizes including desktop computers, laptops, PDAs and cell phones. A website is hosted on a computer system known as a web server, also called HTTP (hypertext transfer protocol) server and the terms can also be referred to the software that runs on those system and retrieves and delivers the WebPages in response to request from the websites users. Apache is the most commonly used web server software 2.3 Types of Website by Built * Static website * Dynamic website Static Website A static website is one that has web pages stored on the server in the format that is sent to a client web browser. It is primarily coded in hypertext markup language (HTTM). Simple forms include, marketing websites such as five page websites or brochure websites are often static Websites, because they present predefined static information to be used. This may include information about a company, its products and services through text, photos, animations, audio/videos, interactive menus and navigation. This type of website usually displays the same information to all visitors similar to handing out a printed brochure to customers or clients. A static Website will generally provide consistent, standard information for an extended period of time. Although the website owner may make updates 6|Page
  • 7. Periodically, it is a manual process to edit the text, photos and other content that may require basic website design skill and software. A static website may still have dynamic behavior provided that, this is handled entirely client side (i.e. within the browser). This may include such features as java script image zoom feature to display photographs. In a static web site visitors are not able to control information they receive and instead settle for whatever content the website owner has decided to offer at that time information’s are edited using Text editors, such as note pad or text field, where content and HTML markup are manipulated directly within the editor program. WYSIWYG(this, I call what you see is what you get) offline editors such as Microsoft front page and Adobe dream weaver.etc. Dynamic Website A dynamic website is one that changes or customizes itself frequently and automatically, based on certain criteria. Dynamic website can have two types of dynamic activity code and content dynamic code is invisible or fully displayed. Dynamic code. A website with dynamic code refers to its construction or how it is built, and more specifically refers to the code used to create a single web page. A dynamic web page is generated on the fly by piecing together certain blocks of code, procedures or routines. A dynamically generated web page would recall various bits of information from a database and put them together in a pre-defined format to present the reader with a coherent page. It interacts with users in a variety of ways including by reading cookies recognizing users' previous 7|Page
  • 8. history, session variables, server side variables etc., or by using direct interaction (form elements, mouse over’s, etc.). A site can display the current state of a dialogue between users, monitor a changing situation, or provide information in some way personalized to the requirements of the individual user. Dynamic Content The second type is a website with dynamic content displayed in plain view. Variable content is displayed dynamically on the fly based on certain criteria, usually by retrieving content stored in a database. A website with dynamic content refers to how its messages, text, images and other information are displayed on the web page and more specifically how its content changes at any given moment. The web page content varies based on certain criteria, either pre-defined rules or variable user input. For example, a website with a database of news articles can use a pre-defined rule which tells it to display all news articles for today's date. This type of dynamic website will automatically show the most current news articles on any given date. Another example of dynamic content is when a retail website with a database of media products allows a user to input a search request for the keyword Beatles. In response, the content of the web page will spontaneously change the way it looked before, and will then display a list of Beatles products like CDs, DVDs and books. 2.4 Javas 2 Enterprise Edition (J2EE) J2EE means Java 2 Enterprise Edition. The functionality of J2EE is developing multitier web-based applications .The J2EE platform is consists of a set of services, application programming interfaces (APIs), and protocols. 8|Page
  • 9. These Four Components of are the J2EE application Application clients’ components. Servelet and JSP technology are web components. Business components (JavaBeans). Resource adapter components Types of J2EE clients. Applets Application clients Java Web Start-enabled clients, by Java Web Start technology. Wireless clients, based on MIDP technology. web component. Java Servelet and Java Server Pages technology components are web components. Servelets are Java programming language that dynamically receive requests and make responses. JSP pages execute as servelets but allow a more natural approach to creating static content. Java server faces (JSFs). Java Server Faces (JSF) is a user interface (UI) designing framework for Java web applications. JSF provide a set of reusable UI components, standard for web applications.JSF is based on MVC design pattern. It automatically saves the form data to server and populates the form date when display at client side. Java 2 platform Enterprise Edition (J2EE) is a java platform designed for the mainframe scale computing typical of large enterprises. Sun micro systems 9|Page
  • 10. (together with industry partners such as IBM (international business machine)) design J2EE to simplify application development in a thin client tiered environment) what is a thin client? A thin client is a program interface to the application that does not have any operations like query of databases, execute complex business rules, or connect to legacy applications. J2EE simplifies application development and decreases the need for programming and programmer training by creating standard reusable modular components and by enabling the tier to handle many aspects of programming automatically. J2EE include many components of the java 2 platform standard edition (J2SE). The java development kit (JDK) is included as the core language package. Write once Run anywhere technology is included to ensure portability. Support is provided for Common Object Request broker Architecture(CORBA), a predecessor of Enterprise JavaBeans(EJB)so that java objects can communicate with CORBA objects both locally and over a network through its interface broker Java database connectivity 2.0 (JDBC) the Java equivalent to open Database Connectivity (ODBC) is included as the standard interface for Java databases. A security model is included to protect data both locally and in web- based applications. J2EE also includes a number of components added to the J2SE model, such as the following Full support is included for Enterprise JavaBeans (EJB) which is a server based technology for the delivery of program components in an 10 | P a g e
  • 11. Enterprise Environment it supports the extensible Markup language (XML) And has enhanced deployment and security features. The java servelet API (application program interface) enhances for developers without requiring a graphical user interface(GUI) Java server pages (JSP) is the equivalent to Microsoft’s’ Active server pages (ASP) and is used for dynamic web enabled data access and manipulation. The J2EE architecture consists of four major elements: The J2EE Application programming model is used to facilitate the development of multi- tier thin client applications. The j2EE platform includes necessary policies and APIs such as the java servelets and java message service(JMS) which is used for simple massage Transfer protocol (SMTP) over a web service. The J2EE compatibility test suit ensures that J2EE products are compatible with the platform standard. The J2EE reference implementation explains J2EE capabilities and provides its operational definition. A JNDI name is the name the J2EE server uses to hook enterprise beans .In your code when you look up an enterprise bean, you supply statements similar to your code. 2.5 Netwoking. Computer Network A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications channels that 11 | P a g e
  • 12. facilitate communications among users and allows users to share resources. Networks may be classified according to a wide variety of characteristics. A computer network allows sharing of resources and information among interconnected devices. Purpose Computer networks can be used for a variety of purposes: * Facilitating communications. Using a network, people can communicate efficiently and easily via email, instant messaging, chat rooms, telephone, video telephone calls, and video conferencing. * Sharing hardware. In a networked environment, each computer on a network may access and use hardware resources on the network, such as printing a document on a shared network printer. * Sharing files, data, and information. In a network environment, authorized user may access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks. * Sharing software. Users connected to a network may run application programs on remote computers. * Information preservation. * Security. 2.6 Network Topology Computer networks may be classified according to the network topology upon which the network is based, such as bus network, star network, ring network, 12 | P a g e
  • 13. mesh network. Network topology is the coordination by which devices in the network are arranged in their logical relations to one another, independent of physical arrangement. Even if networked computers are physically placed in a linear arrangement and are connected to a hub, the network has a star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct. Networks may be classified based on the method of data used to convey the data; these include digital and analogue networks. 2.7 Types of Computer Networks Based on Physical Scope Common types of computer networks may be identified by their scale. Local Area Network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings. Each computer or device on the network is a node. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines). All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colours). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers. 13 | P a g e
  • 14. The defining characteristics of LANs, in contrast to WANs (Wide Area Networks), include their higher data transfer rates, smaller geographic range, and no need for leased telecommunication lines. Current Ethernet or other IEEE 802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data transfer rate. IEEE has projects investigating the standardization of 40 and 100 Gbit/s. Personal Area Network A personal area network (PAN) is a computer network used for communication among computer and different information technological devices close to one person. Some examples of devices that are used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game consoles. A PAN may include wired and wireless devices. The reach of a PAN typically extends to 10 meters. A wired PAN is usually constructed with USB and Firewire connections while technologies such as Bluetooth and infrared communication typically form a wireless PAN. Home Area Network A home area network (HAN) is a residential LAN which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. An important function is the sharing of Internet access, often a broadband service through a CATV or Digital Subscriber Line (DSL) provider. It can also be referred to as an office area network (OAN). Wide Area Network A wide area network (WAN) is a computer network that covers a large geographic area such as a city, country, or spans even intercontinental distances, using a communications channel that combines many types of media such as 14 | P a g e
  • 15. telephone lines, cables, and air waves. A WAN often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer. Campus Network A campus network is a computer network made up of an interconnection of local area networks (LAN's) within a limited geographical area. The networking equipments (switches, routers) and transmission media (optical fibre, copper plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc.). In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. Metropolitan Area Network A Metropolitan area network is a large computer network that usually spans a city or a large campus. Sample EPN made of Frame relay WAN connections and dialup remote access. Sample VPN used to interconnect 3 offices and remote users. Enterprise Private Network An enterprise private network is a network build by an enterprise to interconnect various company sites, e.g., production sites, head offices, remote offices, shops, in order to share computer resources. Virtual Private Network A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some 15 | P a g e
  • 16. larger network (e.g., the Internet) instead of by physical wires. The data link layer protocols of the virtual network are said to be tunnelled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features. VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point. Internetwork An internetwork is the connection of two or more private computer networks via a common routing technology (OSI Layer 3) using routers. The Internet is an aggregation of many internetworks; hence its name was shortened to Internet. 2.8 Computer Network Basic Hardware Components All networks are made up of basic hardware building blocks to interconnect network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable (most commonly Category 5 cable). Less common are microwave links (as in IEEE 802.12) or optical cable ("optical fibre"). Network Interface Cards 16 | P a g e
  • 17. A network card, network adapter, or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a low-level addressing system through the use of MAC addresses. Each network interface card has its unique id. This is written on a chip which is mounted on the card. Repeaters A repeater is an electronic device that receives a signal, cleans it of unnecessary noise, regenerates it, and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable that runs longer than 100 meters. A repeater with multiple ports is known as a hub. Repeaters work on the Physical Layer of the OSI model. Repeaters require a small amount of time to regenerate the signal. This can cause a propagation delay which can affect network communication when there are several repeaters in a row. Many network architectures limit the number of repeaters that can be used in a row (e.g. Ethernet's 5-4-3 rule). Bridges A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges broadcast to all ports except the port on which the broadcast was received. However, bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address to that port only. Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is 17 | P a g e
  • 18. associated with that port. The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived. Bridges come in three basic types: * Local bridges: Directly connect local area networks (LANs) * Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have been replaced with routers. * Wireless bridges: Can be used to join LANs or connect remote stations to LANs. Switches A network switch is a device that forwards and filters OSI layer 2 datagram (chunks of data communication) between ports (connected cables) based on the MAC addresses in the packets.[9] A switch is distinct from a hub in that it only forwards the frames to the ports involved in the communication rather than all ports connected. A switch breaks the collision domain but represents itself as a broadcast domain. Switches make forwarding decisions of frames on the basis of MAC addresses. A switch normally has numerous ports, facilitating a star topology for devices, and cascading additional switches.[10] Some switches are capable of routing based on Layer 3 addressing or additional logical levels; these are called multi-layer switches. The term switch is used loosely in marketing to encompass devices including routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier). Routers 18 | P a g e
  • 19. A router is an internetworking device that forwards packets between networks by processing information found in the datagram or packet (Internet protocol information from Layer 3 of the OSI Model). In many situations, this information is processed in conjunction with the routing table (also known as forwarding table). Routers use routing tables to determine what interface to forward packets (this can include the "null" also known as the "black hole" interface because data can go into it, however, no further processing is done for said data). Firewalls Firewalls are the most important aspect of a network with respect to security. A firewalled system does not need every interaction or data transfer monitored by a human, as automated processes can be set up to assist in rejecting access requests from unsafe sources, and allowing actions from recognized ones. The vital role firewalls play in network security grows in parallel with the constant increase in 'cyber' attacks for the purpose of stealing/corrupting data, planting viruses, etc. 2.9 Difference between Network Hub, Switches and Router Some technicians have a tendency to use the terms routers, hubs and switches interchangeably. One minute they're talking about a switch. Two minutes later they're discussing router settings. Throughout all of this, though, they're still looking at only the one box. Ever wonder what the difference is among these boxes? The functions of the three devices are all quite different from one another, even if at times they are all integrated into a single device. Hub A common connection point to devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet 19 | P a g e
  • 20. arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. Switch In networks, is a device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol. LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs. Router A device that forwards data packets along networks. A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP.s network. Routers are located at gateways, the places where two or more networks connect. Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and configure the best route between any two hosts. The Differences between Hubs, Switches, and Routers on the Network Today most routers have become something of a Swiss Army knife, combining the features and functionality of a router and switch/hub into a single unit. So conversations regarding these devices can be a bit misleading — especially to someone new to computer networking. The functions of a router, hub and a switch are all quite different from one another, even if at times they are all integrated into a single device. Let's start with the hub and the switch since these two devices have similar roles on the network. Each serves as a central connection for all of your network equipment and handles a data type known as frames. Frames carry your data. When a 20 | P a g e
  • 21. frame is received, it is amplified and then transmitted on to the port of the destination PC. The big difference between these two devices is in the method in which frames are being delivered. In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that the frame is only destined for one port. The hub has no way of distinguishing which port a frame should be sent to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of traffic on the network and can lead to poor network response times. Additionally, a 10/100Mbps hub must share its bandwidth with each and every one of its ports. So when only one PC is broadcasting, it will have access to the maximum available bandwidth. If, however, multiple PCs are broadcasting, then that bandwidth will need to be divided among all of those systems, which will degrade performance. A switch, however, keeps a record of the MAC addresses of all the devices connected to it. With this information, a switch can identify which system is sitting on which port. So when a frame is received, it knows exactly which port to send it to, without significantly increasing network response times. And, unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of its ports. So regardless of the number of PCs transmitting, users will always have access to the maximum amount of bandwidth. It's for these reasons why a switch is considered to be a much better choice than a hub. Routers are completely different devices. Where a hub or switch is concerned with transmitting frames, a router's job, as its name implies, is to route packets to other networks until that packet ultimately reaches its destination. One of the key features of a packet is that it not only contains data, but the destination address of where it's going. 21 | P a g e
  • 22. A router is typically connected to at least two networks, commonly two Local Area Networks (LANs) or Wide Area Networks (WAN) or a LAN and its ISP's network, for example, your PC or workgroup and EarthLink. Routers are located at gateways, the places where two or more networks connect. Using headers and forwarding tables, routers determine the best path for forwarding the packets. Router use protocols such as ICMP to communicate with each other and configure the best route between any two hosts. Today, a wide variety of services are integrated into most broadband routers. A router will typically include a 4 - 8 port Ethernet switch (or hub) and a Network Address Translator (NAT). In addition, they usually include a Dynamic Host Configuration Protocol (DHCP) server, Domain Name Service (DNS) proxy server and a hardware firewall to protect the LAN from malicious intrusion from the Internet. All routers have a WAN Port that connects to a DSL or cable modem for broadband Internet service and the integrated switch allows users to easily create a LAN. This allows all the PCs on the LAN to have access to the Internet and Windows file and printer sharing services. Some routers have a single WAN port and a single LAN port and are designed to connect an existing LAN hub or switch to a WAN. Ethernet switches and hubs can be connected to a router with multiple PC ports to expand a LAN. Depending on the capabilities (kinds of available ports) of the router and the switches or hubs, the connection between the router and switches/hubs may require either straight-thru or crossover (null-modem) cables. Some routers even have USB ports, and more commonly, wireless access points built into them. Some of the more high-end or business class routers will also incorporate a serial port that can be connected to an external dial-up modem, which is useful 22 | P a g e
  • 23. as a backup in the event that the primary broadband connection goes down, as well as a built in LAN printer server and printer port. Besides the inherent protection features provided by the NAT, many routers will also have a built-in, configurable, hardware-based firewall. Firewall capabilities can range from the very basic to quite sophisticated devices. Among the capabilities found on leading routers are those that permit configuring TCP/UDP ports for games, chat services, and the like, on the LAN behind the firewall. So, in short, a hub glues together an Ethernet network segment, a switch can connect multiple Ethernet segments more efficiently and a router can do those functions plus route TCP/IP packets between multiple LANs and/or WANs; and much more of course. 23 | P a g e
  • 24. CHAPTER THREE 3.0 Projects implemented for the Organisation. * Website design project. * Security database (J2EE) project. * Implementation of a small office network. 3.1 Website design project: This project was given to me by the organisation singly, specifications were, at the home page we should include a welcome message, a title and photographs that could reflect the website purpose the navigation panel were also created. The aim of this project was to design a website for e-resources the title of the project was given as or rather website name was Rehoboth e-education resources with an integral purpose of an e-library. the navigation panel were made of outline boxes with links, this are some of the panels that were created with links, Rehoboth ICT Academy, About us, Home, Authors of the year, Book reviews, contact us, Help, Jobs, project Appraisal, Book reviews, science research for the next generation, Books downloads and information and services. Selected navigation panels like project appraisal and science research for the next generation were loaded to their content and linked to their navigation panels other navigation panels were to be left unlinked so that my fellow colleagues work could also be linked. the project was given to me by the organisation on the 14th of December 2012, I used the Christmas and new year breaks to execute the project, I used a designer software called CS3(Adobe dream weaver) to make my work more perfect. Below is the HTML code prove the validity of the project. 24 | P a g e
  • 25. Fig 3.1.1 Code for website project. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <!-- DW6 --> <head> <!-- Copyright 2005 Macromedia, Inc. All rights reserved. --> <title>REHOBOTH E-RESOURCES - Home Page</title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <link rel="stylesheet" href="mm_entertainment.css" type="text/css" /> <style type="text/css"> <!-- .style3 { font-size: 36px; font-weight: bold;} .style5 {font-size: 18px; color: #FF0000; font-style: italic; } .style6 {font-size: 14px} --> </style> </head> <body bgcolor="#14285f"> <table width="100%" border="0" cellspacing="0" cellpadding="0"> 25 | P a g e
  • 26. <tr bgcolor="02021e"> <td width="400" colspan="4" rowspan="2" nowrap="nowrap"><p><img width="349" height="232" src="rehoboth_clip_image002.gif" alt="j0195384" /></p></td> <td width="360" height="58" colspan="3" valign="bottom" nowrap="nowrap" class="pageName style3" id="logo">REHOBOTH E- DUCATION RESOURCES</td> <td width="100%">&nbsp;</td> </tr> <tr bgcolor="02021E"> <td height="57" colspan="3" valign="top" nowrap="nowrap" class="style5" id="tagline"><marquee direction="left"><font color="#FFFFFF">we at rehoboth e-edu.resources we keep our word</font></marquee></td> <td width="100%">&nbsp;</td> </tr> <tr> <td colspan="8" bgcolor="#cc3300"><img src="mm_spacer.gif" alt="" width="1" height="2" border="0" /></td> </tr> <tr> <td colspan="8"><img src="mm_spacer.gif" alt="" width="1" height="2" border="0" /></td> </tr> <tr> <td colspan="8" bgcolor="#cc3300"><img src="mm_spacer.gif" alt="" width="1" height="1" border="0" /></td> </tr> <tr> <td colspan="8">&nbsp;<br /> 26 | P a g e
  • 27. &nbsp;<br /> </td> </tr> <tr> <td width="155" valign="top" height="370"> <table border="0" cellspacing="0" cellpadding="0" width="155" id="navigation"> <tr> <td width="155" height="40"><a href="">REHOBOTH ICT ACADEMY</a></td> </tr> <tr> <td width="155" height="40"><a href="">ABOUT US</a></td> </tr> <tr> <td width="155" height="40"><a href="">HOME</a></td> </tr> <tr> <td width="155" height="40"><a href="">AUTHORS OF THE YEAR</a></td> </tr> <tr> <td width="155" height="40"><a href="">BOOK REVIEWS</a></td> </tr> <tr> <td width="155" height="40"><a href="">CONTACT US</a></td> </tr> <tr> <td width="155" height="40"><a href="">HELP </a></td> </tr> <tr> 27 | P a g e
  • 28. <td width="155" height="40"><a href="">JOBS</a></td> </tr> <tr> <td width="155" height="40"><a href="file:///c:/users/steve/documents/usongo ict center/appraisal.html">PROJECT APPRAISAL</a></td> </tr> <tr> <td width="155" height="40"><a href=""> BOOKS DOWNLOADS</a></td> </tr> <tr> <td width="155" height="40"><a href="">INFORMATION & SERVICES</a></td> </tr> </table></td> <td width="1" bgcolor="#445DA0"><img src="mm_spacer.gif" alt="" width="1" height="1" border="0" /></td> <td width="50"><img src="mm_spacer.gif" alt="" width="50" height="1" border="0" /></td> <td width="304" colspan="2" valign="top"><img src="mm_spacer.gif" alt="" width="304" height="1" border="0" /><br /> <table border="0" cellspacing="0" cellpadding="0" width="304"> <tr><td height="41" class="pageName">Welcome Message Here</td> </tr> <tr> <td class="bodyText"><span class="style6">Here at rehoboth e-ducation resources will provide the best and are determined to be the no 1. in e- learning so always stay with 28 | P a g e
  • 29. with us for qualiity services and other e-du materials and downloads.</span> <p><span class="subHeader">Title Here</span>. </p> <span class="style6">e-learning is simply an internet base source of reading through various research channel such as e-library, e-research, e-reviews etc.</span></td> </tr> </table> <p><br /> </p></td> <td width="50"><img src="mm_spacer.gif" alt="" width="50" height="1" border="0" /></td> <td width="200" valign="top"><img src="mm_spacer.gif" alt="" width="1" height="10" border="0" /><br /> <table border="0" cellspacing="0" cellpadding="0" width="200"> <tr> <td colspan="3" id="sidebarHeader" class="sidebarHeader" align="center">SCIENCE THIS WEEK</td> </tr> <tr> <td width="45"><img src="mm_spacer.gif" alt="" width="40" height="1" border="0" /></td> <td width="110" id="sidebar" class="smallText"> <p><img src="steve.com 012.jpg" width="265" height="267" /><br /> Science research for new generation<br/> 29 | P a g e
  • 30. <a href="file:///c:/users/steve/documents/usongo ict center/SCIENCE RE.html">read more...:</a> <p><img src="steve.com 001.jpg" alt="TREC" width="260" height="267" /><br /> LITREATURE REVIEWS AND PROJECT BACKGROUND<br /> <a href="javascript:;">read more &gt;</a><br /> </p> <br /> <td width="45">&nbsp;</td> </tr> </table> <br /> </td> <td width="100%">&nbsp;</td> </tr> <tr> <td width="155">&nbsp;</td> <td width="1"></td> <td width="50">&nbsp;</td> <td width="194">&nbsp;</td> <td width="110">&nbsp;</td> <td width="50">&nbssp;</td> <td width="200">&nbsp;</td> <td width="100%">&nbsp;</td> </tr> </table> </body> </html> 30 | P a g e
  • 31. 3.2 Security database (J2EE) Java 2 Enterprise Edition Here the organisation thought much about the experience we had obtained in Java 2 enterprise edition and wanted to know if we really understood what our instructor on Software Development Mr. Vitalis Agbers with Phone No.: 08137671244 thought us on J2EE, we were to design a data base for security online Report, the project had the following modules: Admin, Arrest, Crime, Complain, Record and Users. The Admin: is the overall boss as his functions were mainly to view all users, Add users and Delete or Remove users, update Records etc. The users were either log in to any of the other modules apart from the Admin and either View Arrest, Complain about a crime etc. This project was carried out between December 7th and January 26th. Here are some codes from the sessionbean and JSP pages to prove the validity of the project. This is the Code from one of the JSP pages to be precise the Admin home page Fig.3.2.1 code for the security data base, one of the JSP pages mainly the admin home <%-- Document : security2Homepage Created on : Feb 5, 2013, 1:53:43 AM Author : Steve --%> 31 | P a g e
  • 32. <%@page contentType="text/html" pageEncoding="UTF-8"%> <%@page import =" java.io.IOException"%> <%@page import =" java.io.PrintWriter"%> <%@page import ="java.util.logging.Level"%> <%@page import ="java.util.logging.Logger"%> <%@page import=" javax.ejb.CreateException"%> <%@page import=" javax.naming.Context"%> <%@page import=" javax.naming.InitialContext"%> <%@page import=" javax.naming.NamingException"%> <%@page import=" javax.servlet.ServletException"%> <%@page import=" javax.servlet.http.HttpServlet"%> <%@page import ="javax.servlet.http.HttpServletRequest"%> <%@page import ="javax.servlet.http.HttpServletResponse"%> <%@page import =" security2Session.security2SessionLocal"%> <%@page import =" security2Session.security2SessionLocalHome"%> <% security2SessionLocal stl = null; String txt = null; %> <% try { Context c = new InitialContext(); 32 | P a g e
  • 33. security2SessionLocalHome rv = (security2SessionLocalHome) c.lookup("java:comp/env/security2SessionBean"); stl = rv.create(); } catch (NamingException ne) {} %> <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <title>JSP Page</title> <style type="text/css"> <!-- #apDiv1 { position:absolute; width:100%; height:85px; z-index:1; background-color:#FF0000 } .style1 { font-size: 36px; 33 | P a g e
  • 34. font-weight: bold; color: #FFFFFF; } #apDiv2 { position:absolute; width:250px; height:190px; z-index:2; left: 11px; top: 102px; background-color:#FFFF00 } .style2 { font-family: "Arial Black"; font-style: italic; } #apDiv3 { position:absolute; width:707px; height:190px; z-index:1; left: 251px; top: 1px; 34 | P a g e
  • 35. background-color:#00FFFF } .style3 { font-size: 24px; font-style: italic; } --> </style> </head> <body> <div id="apDiv1"> <p align="center" class="style1">THIS IS THE BENUE STATE SECURITY HOME PAGE</p> </div> <div id="apDiv2"> <a href="allAdminview.jsp">Alladminview</a> <a href="addUser.jsp">addUser</a> <a href="removeuser.jsp">removeuser</a> <a href="">viewAllArrest</a> <table width="100%" border="3" cellspacing="3" cellpadding="2"> <tr> <td valign="middle" bgcolor="#00FFFF"><div align="center"><a 35 | P a g e
  • 36. href="secu2Validation.jsp"><strong>ADMINSTRATOR</strong></a></ div></td> </tr> <tr> <td bgcolor="#99CC00"><div align="center"><a href="secu2Validation.jsp"><strong>USERS</strong></a></div></t d> </tr> <tr> <td bgcolor="#FF0000"><div align="center" class="style2">ABOUT US</div></td> </tr> <tr> <td bgcolor="#FF00FF"><div align="center" class="style2">CONTACT US</div></td> </tr> </table> <div id="apDiv3"> <p align="center" class="style3">PLEASE DO NOT BE ALFRED TO REPORT SUSPICIOUS MOVEMENT</p> </div> </div> </body> </html> 3.3 Implementation of small Office Network Using the following steps, I was able to implement a small office Network at Rehoboth ICT Academy on the 25th January, 2013 as it is a custom to carry out 36 | P a g e
  • 37. a practical task at the end of every major project work. Materials used were, computers, internet access and Ethernet cables. Firstly the Cat 5 (Category 5 network cables were connected to the R J 45 (Register Jack)) which is used for networking between systems. This connection were done for a cross connection which is normally supported for different computers while the straight is done for computer to computer. Step 1: I clicked on the start my Network places under “Network Task” clicked on set up a “Home or small Office Network” and this took me to the Network set up wizard. The wizard helps me to set up my computer to run on my network where I could share and internet connections, share files and folders and a printer. Step 2: I clicked next and made sure I had done everything on the “checklist” i.e. modem installed, computers and printers turned on and above all connection to the internet. I clicked next and selected the way I had wanted my connections to the internet to appear, clicking next took me to computer description, with options and the computer name was already populated. Step 3: I clicked next, selected a work group name which by default was steveHome, but I changed it to office, I clicked next again for file and sharing of printers turned on. I clicked next again, applied Network settings which took me to where I wanted to save the information which I considered saving to a note pad. Step 4: I clicked next and got a “please wait while the wizard configures this computer for small office Network this process will take a few minutes message”. The Network setup wizard was run once for each of the computer that was found on my Network. TIP to run the wizard on computers that are not window XP OS, you can use the window XP CD or a network set up Disk you will then be asked “what do you want to do?” at this point, you can create a 37 | P a g e
  • 38. Network set up Disk, use the disk you have, use Windows XP CD, or click finish. No need to run wizard on other computers Click Finish. Step 5: A display message appear, that I had successfully set up this computer for a small office Network. To see other computers on my Network, I clicked start, and then clicked My Network Places, I clicked finish and I was prompted with a message restart your computer, I restarted it and saw my Network under “My Network Places” with an icon/picture of a networking cable below the folder. 3.4 Working conditions. The working conditions at Rehoboth ICT Academy included * Crowdedness: At Rehoboth ICT academy since we were working as a team most of our general practical work were carried out in crowded environment as we were always divided into smaller factions of five persons per each group. in terms of project given to us, it was in a student’s interest to either join a particular group or carry out his project independent of other groups. * Paid allowances: allowances were not paid to any of the students that were on industrial training at Rehoboth ICT Academy either by the chief executive or by any individual groups. * Working Days/Hours: the working days at Rehoboth ICT Academy were generally same as in the normal working days of the week that is Mondays through Fridays every week we had our normal hours of 9:00 am to 2:00pm. 3.5 Responsibilty given to me As an IT student at Rehoboth ICT academy I was given the responsibility of organising my colleagues in conduct and information dissemination. 38 | P a g e
  • 39. I had always handled this responsibility by making sure all and sundry were carried along throughout our stay at Rehoboth ICT Academy. 3.6 Observed Organisations Deficiencies. As it is, in every organisation there exist some lapses, Rehoboth ICT academy too is not left out the organisation too has a major challenge of facilities such as computer sets ,internet services and power fluctuation as the number of students had outweigh this facilities on ground. 3.7 Attractions Attractions at Rehoboth ICT Academy are too numerous to mention as to most of us that got to be attached to this had a good reason to smile, this is simply because if not all then almost all facets of the computer must know functions were touched. 39 | P a g e
  • 40. CHAPTER FOUR Conclusion I have learnt so much in the course of my industrial work experience at REHOBOTH ICT ACADEMY. The experience gathered will help me be self reliance and above all make me do additional jobs in computer science. The (S.I.W.E.S) scheme has helped me a lot to be self confident. 40 | P a g e