I.T Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 42

A

TECHNICAL REPORT
ON
STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)
UNDERTAKEN AT
APTECH COMPUTER EDUCATION, GRAFIL HOUSE,
AWKA, ANAMBRA STATE.
BY
OKAFOR PROMISE CHIMDINDU
REGISTRATION NUMBER: CE/17/071
SUBMITTED TO
THE DEPARTMENT OF COMPUTER ENGINEERING
FACULTY OF ENGINEERING
MADONNA UNIVERSITY, AKPUGO
IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE
AWARD OF BACHELOR OF SCIENCE IN
COMPUTER ENGINEERING
JANUARY 2022.

1
DEDICATION
This report is dedicated to the almighty God, my beloved parents CHIEF and MRS A. O. Okafor
and my siblings for their unconditional love and support in my life.

2
ACKNOWLEDGEMENT
I wish to express my profound gratitude to God almighty for his guidance,goodness and grace
throughout my life .

I also appreciate the entire staff of aptech computer education, grafil house, awka, anambra state
for making my industrial training a huge success.
My special gratitude to my HOD ,for his effort to see that this work saw the light of
the day. I appreciate all my amazing lecturer in the department. For the knowledge they impacted
in me, to them all I say be blessed. Amen.
My regards to my amazing parents , CHIEF and MRS A. O. OKAFOR , who finanacially
supported my educational pursuit, I say remain blessed and to my beloved siblings , I love you
all, you are the best.

3
TABLE OF CONTENT
TITLE PAGE……………………………………………………………...I
DEDICATION……………………………………………………………..II
ACKNOWLEDGEMENT…………………………………………………III
TABLE OF CONTENT………………………………………………….IV
ABSTRACT……………………………………………………………….VI

CHAPTER ONE: ABOUT STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME


(SIWES)
1.1 BRIEF HISTORY OF SIWES………………………………………………………….1

1.2 OBJECTIVES OF SIWES……………..………………………………………………2

1.3 AIM OF SIWES………………………………………………………………….………3

1.4 BRIEF HISTOTY OF APTECH COMPUTER EDUCATION……………………….4

CHAPTER TWO: THE HARDWARE


2.1 INTRODUCTION
2.2 DEFINITION OF A COMPUTER SYSTEM
2.3 ELEMENTS OF A COMPUTER SYSTEM
2.4 MAIN FUNCTIONS OF COMPUTER
2.5 TYPES OF COMPUTERS
2.6 SYSTEM UNIT
2.6.1 MOTHERBOARD
2.6.2 PROCESSOR
2.6.3 PORTS (CONNECTORS)

4
2.6.4 HARD DISK
2.6.5 FORMATTING AND PARTITIONING HARD DISK
2.6.6 PRINTER
2.6.7 MEMORY
2.6.8 BOOTING A COMPUTER
2.6.9 BASIC TROUBLESHOOTING

CHAPTER THREE: NETWORKING


3.1 INTRODUCTION
3.2 IP ADDRESSING

CHAPTER FOUR: CHALLENGES ENCOUNTERED, RECOMMENDATIONS AND


CONCLUSION
4.1 CHALLENGES ENCOUNTERED…………………………………………………….41
4.2 RECOMMENDATION…………………………………………………………………41
4.3 CONCLUSION.

5
ABSTRACT

6
CHAPTER ONE: ABOUT SIWES

1.1 BRIEF HISTORY OF SIWES

SIWES was established by Industrial Training Fund (ITF) in 1973 to solve the problem of
lack of adequate practical skills preparatory for employment in industries by Nigerian
graduates of tertiary institutions.
The Scheme exposes students to industry based skills necessary for a smooth transition from
the classroom to the world of work. It affords students of tertiary institutions the opportunity
of being familiarized and exposed to the needed experience in handling machinery and
equipment which are usually not available in the educational institutions.
Before the establishment of the scheme, there was a growing concern among our Industrialists
that graduates of our Institutions of Higher learning lacked adequate practical background
studies preparatory for employment in Industries. Thus, the employers were of the opinion
that the theoretical education going on in higher institutions was not responsive to the needs of
the employers of labour.

1.2 OBJECTIVES OF SIWES

The Industrial Training Fund’s Policy Document No.1 of 1973 (ITF, 2002) which established
SIWES outlined the objectives of the scheme as follows; to provide an avenue for students in
institutions of higher learning to acquire industrial skills and experience during their courses of
study and prepare for industrial work situations that they are likely to meet after graduation. It
also aims at exposing students to work methods and techniques in handling equipment and
machinery that may not be available in their institutions. Part of the objectives of SIWES is to
make the transition from school to the world of work easer and enhance students’ contacts for
later job placements and to provide students with the opportunities to apply their educational
knowledge in real work situations, thereby bridging the gap between theory and practice. It is
also to enlist and strengthen employers’ involvement in the entire educational process through
SIWES.

7
 It is to provide an avenue for students in institutions of higher learning to acquire industrial
skills and experience during their courses of study; It prepares students for industrial work
situations that they are likely to meet after graduation; It exposes students to work methods and
techniques in handling equipment and machinery that may not be available in their institutions; It
makes the transition from school to the world of work easier and enhance students’ contacts for
later job placements; It also provides students with the opportunities to apply their educational
knowledge in real work situations, thereby bridging the gap between theory and practice; It also
enlists and strengthen employers’ involvement in the entire educational process through SIWES.

1.3 AIM OF SIWES

 The scheme is aimed at bridging the existing gap between theory and practice of Sciences,
Agriculture, Medical Sciences (including Nursing), Engineering and Technology, Management,
and Information and Communication Technology and other professional educational
programmes in the Nigerian tertiary institutions.

1.4 BRIEF HISTORY OF APTECH COMPUTER EDUCATION

Aptech Ltd is a pioneer in the non-formal vocational training business with a significant global
presence. Aptech has over three decades of strong experience in vocational skilling. Ever since
its commencement in 1986 and with a current presence of over 1000 centers globally, Aptech has
effectively ventured into diverse sectors ranging from IT training, media & entertainment, retail
& aviation, beauty & wellness, and pre-school segment amongst others.
A leading global career education company, Aptech has a legacy of over 32 years in I.T. education.
Aptech has a presence in more than 40 countries and has trained over 7 million individuals in more than 1,300
training centers worldwide.

8
Aptech also includes corporate training and assessment solutions for corporates and academic institutions, and
custom content development for overseas and domestic customers.
Aptech courses are designed to impart knowledge in all areas of Information Technology. The Aptech
portfolio consists of a comprehensive range of courses in instructor-led and technology-delivered formats such
as web-based training. Aptech’s international presence offers world-class education programs, methodologies,
technologies, and international qualifications. We enable people across the globe to use I.T. optimally and
efficiently through world-class I.T. training solutions. Today, Aptech students are working all over the world
building knowledge corporations, communities and knowledge societies.

9
CHAPTER TWO: THE HARDWARE

2.1 INTRODUCTION

This report entails everything that happened during my IT (Industrial Attachment) and
also brief information about the organization where I worked. This SIWES was a very
good initiative because it has added a lot of knowledge and technical skills to me.The
term computer has been borrowed from compute that means – to calculate. Whereas, initially
computer were use to perform arithmetic calculation as fast speed, now they are use to nearly
every field. You can use computer for banking application, word processing, desktop publishing,
weather forecasting, railway reservation, control of machines or robot in factories, scientific
research, etc. in brief a computer may be define as a device that receive some kind of data,
analysis it, and than applies a predefine set of instruction to it to produce some kind of output.
For instant evasion in the computer. The computer then analysis the data fed by the operator and
makes a reservation. Then it prints a ticked for you. The ticket is the output generated by the
computer based on the reservation request entered by the operator. It is also said that the
computer is a data processor, because it can receive, store, processes and retrieve any kind of
data. For instant you can store the names and addresses of all employees working in a company
in a computer file. Latter, you can ask the computer to print list of only those employees who
work in the accounts department

2.2 DEFINITION OF A COMPUTER SYSTEM

A computer system is a device that accepts information (input in form of digital data) and
manipulates it for some results based on a program or sequence of instruction on how the data is
to be processed.

2.3 ELEMENT OF COMPUTER SYSTEM

DATA: This is a collection of raw, unprocessed facts, symbols and figures.


HARDWARE: This is the physical component contained in a computer system.

10
SOFTWARE: This is a program or a series of instructions that tells a hardware how to
perform tasks.

COMPUTER PERIPHERIALS: This is any hardware device connected to and controlled


by the cpu. EXAMPLES: modem, harddisk drive , printer, scanner, keyboard and mouse

2.4 MAIN FUNCTIONS OF COMPUTER

I. INPUT
II. STORAGE
III. PROCESSING
IV. OUTPUT
V. CONTROL

For this functions to be executed tasks are assigned to various sections such as:
I. CPU (CENTRAL PROCESSING UNIT)
II. MEMORY
III. BUSES
IV. INPUT DEVICES

2.5 TYPES OF COMPUTERS

DESKTOP COMPUTER: A desktop computer is a computer  that fits on or under a desk.


They utilize peripheral devices for interaction, such as a keyboard and mouse for input, and
display devices like a monitor, projector, or television.The most common configuration has a
case that houses the power supply, motherboard (a printed circuit board with a microprocessor
as the central processing unit, memory, bus, certain peripherals and other electronic
components), disk storage (usually one or more hard disk drives, solid state drives, optical disc
drive, and in early models a floppy disk drive); a keyboard and mouse for input; and a computer
monitor, speakers, and, often, a printer for output. The case may be oriented horizontally or
vertically and placed either underneath, beside, or on top of a desk

11
FIGURE 1: A DESKTOP COMPUTER.

WORK STATION: A workstation is a special computer designed for technical or scientific


applications. Intended primarily to be used by a single user, they are commonly connected to a
local area network and run multi-user operating systems.

12
FIGURE 2: A WORKSTATION COMPUTER .

SERVERS: A server is a computer program or device that provides a service to another


computer program and its user, also known as the client.

13
FIGURE 3: A SEVER COMPUTER.

2.6 SYSTEM UNIT

The system unit box houses the heart and brain of the computer. All electronic circuit, power
Supply, floppy drive(s), and hard drive(s) are housed in this box. The shape and the size of the
box may differ from the computer to computer. However, they all have the same electronic
circuit and parts inside. The storage unit of the memory of the computer is also in the same
box. The primary memory of the PC is housed on the electronic circuit board kept in this box.
These boards are not visible from the outside. The system unit box also houses the floppy disk

14
drive(s) and Hard disk drive(s) that from the secondary memory

FIGURE 4: THE SYSTEM UNIT.

2.6.1 MOTHERBOARD

The motherboard is a circuit on which all the electronic components of computer are
connected. This include both internal parts of the system unit like Processor, display card
of the monitor, sound card, memory etc and the connector of external parts like mouse,
keyboard, hard disk, floppy disk etc. The ̳ports‘ and ̳slots‘, which connect these
components, also exist in the motherboard. The circuits in the motherboard help in data
transfer among the components. Bios, RAM slots and Chipset are too mounted on the

15
motherboard.

Motherboard Components:

1) Microprocessor 11) Decoders, multiplexers, Gates,F/F


2) Interrupt Controller 12) Jumpers and DIP
3) Timer 13) Transistors and Diodes
4) PPI 14) Ports and connectors
5) Clock generator 15) Built in Speakers
6) Bus Controller 16) AGP Slot
7) DMA Controller 17) CMOS battery
8) DRAM 18) External Cache
9) ROM 19) PCI expansion slots.
10) I/O Slots

16
FIGURE 5: A MOTHERBOARD.
2.6.2 PROCESSOR.

One of the most important parts of computer called as heart of computer. The brain of a
computer is it processor. The processor in a modern computer is an Integrated Circuit (IC)
chip.

FIGURE 6: A PROCESSOR.

A chip of millions of transistors and capacitors which can process the data obtained through
input devices and transfer the result to the output units. Processors from different companies are
available today. Intel-PentiumIV, Xenon,Celeron, AMDAthlon, Cyrix M3 etc. are popular.

Arithmetic and Logic Unit & Control Unit (ALU & CPU)

The two main parts of a processor are Arithmetic and Logic Unit (ALU) and Control
Unit (CU).The function of the ALU is to do the processing and mathematical calculations of
the information obtained through input devices.
The control unit sorts this information and sends it to the different parts of the computer
like the manager of an office. The control unit organizes and coordinates various functions of
a computer.The orderly and fast functioning of a computer indicates the efficiencyof the

17
control unit.

REASONS WHY A PROCESSOR GOES BAD

1. Age: Every machine has its limits. A computer that is five years old or older is considered to be
in its grace years. They can just give up.
2. Heat: Overheating CPU's lead to a dead CPU. This can happen when the room temperature is
often above 80 degrees Fahrenheit and if the computer has an ineffective cooling mechanism
inside.
3. Overclocking or Stress: Not all CPU's are created equal. Don't make a dual-core do what an
eight-core is intended for. Overclocking has its place, but be careful to be realistic. Also, if a
game says it needs a certain minimum to run, don't run it on an under-clocked CPU. The same
goes for software for video or photo editing. If you want to over-stress your processor this way,
by all means, go for it, but otherwise, upgrade.
4. Electrical Power Surge: Whether it was the power supply going bad or lightning, any high
voltage spike can render a CPU useless. Be sure to have a surge protector and a battery backup
attached to your computer to help prevent this sort of thing from happening.

COMMON FAILURE SYMPTHOMS


 Computer turns on, no beeps, no screen. Does not POST (Power-On Self Test)
 Computer turns on, fans run at highest speeds, still no POST, and operating system not loading.
 Computer powers on, but turns off immediately.
 In Windows, screen freezes after being on for a few minutes. In some cases, the screen may
freeze during the load screen of the OS.

PROCESSOR HEATSINK

FIGURE 7: PROCESSOR HEATSINK


A heatsink is often fixed on the processor to remove the heat generated by continuous

18
activity. This is also known as the processor fan.
Processor Socket: The processor socket is used to fix the processor in a computer. Different
kinds of motherboards are available today, depending upon the size and the number of pins in a
processor,

FIGURE 8: A PROCESSOR SOCKET.

2.6.3 PORTS (CONNECTORS)

A computer system becomes complete only when different parts are put together and they
communicate properly. The connection of the parts within and outside the system unit is done
using ports or connectors. These ports are connected directly to the motherboard or through add-
on cards. The internal communication in a motherboard takes place through the tinycircuits
printed on it. we can connect a computer to another computer to an input-output device or to data
storage device. Let us study different kind of ports.

1) IDE Port:

Integrated device electronics (IDE) is used to connect a hardisk, CDROM drive, CD-
Writer or a DVD drive to a motherboard. There are two such ports in a motherboard-primary and
secondary. Two devices can be connected to each port.

19
FIGURE 9: AN IDE PORT.

2) Serial port:

Serial Port is used to connect the mouse & modem. They are called COM1 &
COM2.‘COM‘ is the short form of communication. Usually in a communication port there
are either 9 or 25 pins.

FIGURE 10: PORTS ON MOTHERBOARD.

20
3) Parallel Port:

In a parallel port, there are holes to connect pins. Subsidiary gadgets like printer,
scanner etc. are connected through the parallel ports.

4) USB Port:

Universal serial bus (USB) port is a kind of port available in modern computers. Many
devices can be connected in series on the same USB. In comparison with serial and parallel
ports, a large amount of data can be transferred at a very high speed through USB ports.
All peripherals like printer, modem and scanner are now available in versions that can be
connected to the USB port.

2.6.5. HARD DISK DRIVE

A hard disk drive is a device with magnetic storage media that is enclosed on rigid
platters. The platters helps to store, read and write large amounts of data with the
following components

1) CASE
2) DRIVE MOTOR
3) PLATTERS
4) DRIVE HEADS
5) LOGIC BOARD

FIGURE 14: HARD DISK DRIVE

21
SIGNS OF HDD FAILURES

1) Noises of ticking or crushing are heard


2) Most often files get vanished mystifyingly
3) Frequent occurance of interruption in boot process because of hard disk
problems
4) The computer frequently hangs and users are unable to input mouse or
keyboard instructions
5) Slowing down the standard files processes such as save and open
6) Computer gets abnormally hot.

CAUSES OF HDD FAILURES

Hard disk can be affected by both mechanical as well as electronic issues


1) Computer can be jostled or bumped while it is running
2) Due to faults in bearing or other components the electric motor that allows the
platter to spin fails.
3) The filter on air intake is clogged completely or not working properly
4) Electronic circuit board to fail due to extreme heat emitted during running.
5) A sudden power failure can cause failure with harddisk while the disk is
writing.

2.6.6. FORMATTING AND PARTITIONING HARD DISK

There are few steps users have to remember before formatting and partitioning a
hard disk s listed bellows:
1. Boot a system with the bootable floppy or CD
2. The Fdisk command in command prompt.
3. Now you got a message : Do you wish to enable large disk support (y/n)?[ ]
4. Press y then press enter
5. You got the screen having four option like:
(1) Create DOS partition or logical DOS drive.
(2) Set the active portion.
(3) Delete the partition or Logical drives
(4) Display the partition information.
(5) Enter your choice: []
6. Press 1 then Enter
7. Now you got the screen with Three option like :
(1) Create Primary Dos Partition
(2) Create Extended Dos Partition
(3) Create Logical Drive(s) in Extended Dos Partitions

22
(4) Enter Your Choice: [ ]
8. Enter 1 then Press Enter Then System asks you how much size you want to specify
for Primary Dos Partition. The user can give value size of Partition in to percentage
or in Numeric Value.
9. After create a Primary Partition make this Partition active using 2 option on main
screen.
10. Then Create Extended Dos Partition and Logical Drives in Extended drive into it.
Enter Volume Label when Necessary.
11. After Creation of Primary and Extended Dos Drives, Format All Drives that you
Created.
12. Then using Esc key goes out Fdisk command area.
13. Then find the volume label of CD – ROM, enter into and find setup path and
write setup, press enter; now installation of OS will start automatically.

2.6.7. PRINTERS

The printer is an output device that is used to print documents on paper. Various kinds of
printers are used with PCs.
The Dot Matrix Printer (DMP) contains a few tiny needles. There art 7 or 8 needles in a
low quality DMP and up to 24 needles in a high quality DMP. At the time of printing, as
the head moves from one end of the paper to other, these needles are fired selectively to
print different character or graphics. Dot Matrix Printers usually have a printing speed of
100 to 500 characters per second.

FIGURE 15: DOT MATRIX PRINTER.

Inkjet / DeskJet printer are also fast becoming a popular choice for the use with the PCs. These
printer offers good quality and noiseless operation. These are non-impact types of printers that
print character are graphics by spraying very tiny drops on ink directly on to paper. The print

23
quality of these printers is much better as compared to DMPs. The typical print quality of these
printers is from 300 dots per inch (DPI) to 720 DPI. These printers also print color.

FIGURE 16: INKJET PRINTER.

Laser printer are also being commonly used with a high – end PCs; particularly those used for
Desk-Top Publishing (DTP). The laser printers provides very high quality printout; typically in
the range of 300 DPI to 2400 DPI. The typical printing speed of laser printers is between 3 to 12
pages per minute.

FIGURE 17: LASER PRINTER.

A printer interface links the printer with the computer. Commands and data from the computer
are sent to the printer the through this interface. The printer produces character on the paper. One
situation in which the printed output ( known as hard copy ) is required when the output
produced at a distance from the user and may be at an undefined or inconvenient time as an off-
line batch processing system. Such the printing required a high-speed printing in a large
quantities and a typically employ a line printer.

24
25
CHAPTER THREE: MEMORY

Memory is classified into two types:


1) Primary Memory
2) Secondary Memory

PRIMARY MEMORY
It is called the main memory or the central memory. It is of two types – RAM and ROM.

RAM is essentially a read / writes memory. Information can be written into and read from
RAM. It is volatile in nature. i.e. It retains the stored information as long as power supply
is not switch off. It is usually sold and installed to the standard adding board called a Single
InLine Memory Module or SIMM. Ram can be bought separately in case you want to
expand the primary memory of your computer. RAM chips may be classified as:
1) Dynamic
2) Static

DYNAMIC RAM CHIPS


The storage cell circuit contains:
1) A transistor ( Function like mechanical on-off light switch )
2) A capacitor used to store an electric charge
Depending on the switching action of the transistor. The capacitor may have no charge (0
bit) or hold a charge. (1 bit). The change on the capacitor must be periodically refreshed or
charged. In the event of power loss dynamic RAM loses its contents. It is thus called
Volatile Storage.

TYPES OF DIFFERENT RAM CHIPS

DDR SDRAM

DDR SDRAM or Double-data-rate synchronous dynamic random access memory is a type


of memory integrated circuit used in computers. It achieves greater bandwidth than
ordinary SDRAM by transferring data on both the rising and falling edges of the clock
signals (double pumped). This effectively doubles the transfer rate without increasing the
frequency of the front side bus. Thus a 100 MHz DDR system has an effective clock rate of
200 MHz when compared to equivalent SDR SDRAM, the ―SDR‖ being a retrospective
designation.

26
FIGURE 18: DDR MEMORY (HAS 184 PINS AND ONE NOTCH).

With data being transferred 8 bytes at a time DDR RAM gives a transfer rate of (memory
bus clock rate) × 2 (for dual rate) × 8 (number of bytes transferred). Thus with a bus
frequency of 100 MHz DDR – SDRAM gives a max transfer rate of 1600 MB/s.

SDR SDRAM

SDR SDRAM is Single Data Rate synchronous dynamic random access memory, a type of
computer memory. The term is used to contrast with Double Data Rate SDRAM, or DDR
SDRAM, but since single data rate SDRAM was the only sort available when SDRAM was
introduced, is simply called "SDRAM", rather than "SDR SDRAM".
SDRAM has a synchronous interface, meaning that it waits for a clock pulse before
responding to its control inputs- it synchonizes with the computer's system bus, and thus
with the processor.
SDRAM has a synchronous interface, meaning that it waits for a clock pulse before
responding to its control inputs- it synchonizes with the computer's system bus, and thus
with the processor.

FIGURE 19: SDR SDRAM

27
Currently, 168-pin SDRAM type is not used in new PC systems, and PCs come with DDR
or
DDR2 SDRAM, with DDR2 quickly phasing out DDR.

RAMBUS DRAM

Short for Rambus DRAM, a type of memory (DRAM) developed by Rambus, Inc. Whereas
the fastest current memory technologies used by PCs (SDRAM) can deliver data at a
maximum speed of about 100 MHz, RDRAM transfers data at up to 800 MHz.

FIGURE 20: RAMBUS DRAM

RDRAM is already being used in place of VRAM in some graphics accelerator boards. As
of late 1999, Intel has been using RDRAM in its Pentium III Xenon processors and more
recently in its Pentium 4 processors. Intel and Rambus are also working a new version of
RDRAM, called nDRAM that will support data transfer speeds at up to 1,600 MHz.

READ ONLY ACCESS MEMORY

ROM is permanent type of memory. Its contents are not lost when the power supplied is
not switch off. Data is hard wired on to these chips at the time of manufacture. They cannot
be change by the user.

While both RAM and ROM are storage devices and can be access randomly, they differ in
that data can be written onto RAM while ROM does not permit the user to write onto it.

ROM retains the data in it even the absence of power and is thus non-volatile storage.
Though data is hardwired, the user is able to program the following types of ROM

28
BOOTING A COMPUTER.

When you switch on a computer, it goes through a complex set of the instruction. This it
does to ensure that all its components are working properly and to warn the user if
something goes wrong. This is the first step of very complicated process
called booting. Booting is the term derived from the word bootstrap. Bootstrap is the
process of lifting one self up on its own. The computer also readies it self for you, therefore
this process is called booting. The process of checking itself is called Power On Self Test or
POST.

POST is the first thing the computer does when it switch on. If an error detected during the
POST, it warns the user in the form of some message flashed on the screen accompanied
with the series of beeps.
NOTE:  If there is no beeps, it is not guaranteed, that the hardware if fine, because there
may be some error in that even the POST cannot detect.

The following diagram explained the process that the computer goes through before it
comes ready for the user:

Next, the ROM searches for the operating system and loads it tots complete the process of 
booting. Take a look at the next schematic.

29
The figure above describe the way the operating system is ‗ searched‘ for the loaded in
the RAM for the computer to be ready to use. After the POST, the ROM searches for
the  operating system. First it checks for a disk in the disk drive. If a disk is found in
drive A,  ROM searches the operating system on it. If found, they are loaded in the
RAM and the  computer gets ready for use. If the operating system files are not found,
the computer flashes  an error message across the screen. 

After this, the user has to replace the disk and press the ‗ Return ‗ key. If the return key
is  press without replacing the disk, the operating system files are searched on the hard
disk, the  computer cannot get ready to accept commands form the user. If the files are
not found on the  hard disk, they are copied to the RAM and the computer can be used.

30
BASIC TROUBLE SHOOTING  

MY COMPUTER WON’T TURN ON 

🡪 Check the power supply switch on the back of the computer. 


🡪 Check that power cord is properly connected to computer and plugged

MY COMPUTER WON’T TURN OFF 

🡪 Press the Ctrl key, the Alt key and the Delete key at the same time
🡪 You may need to repeat this 2 or 3 times before you get a dialog box that asks if you 
want to End Task, Shutdown or Cancel. Choose to End Task 
🡪 Try to Shutdown your computer again. 

🡪 If your computer will still not shutdown, repeat the task again. 

COMPUTER JUST BEEPS BUT NEVER TURNS ON 

⮚ Perhaps a key on the keyboard is stuck. Check to make sure the mouse and
keyboard ⮚ Plugs are properly connected in the back of the computer. 

THE MONITOR IS BLANK 

🡪 Make sure the monitor is on by checking for a green light on the bottom, front. Also, 
make sure the monitor cable is plugged in correctly on the back of the computer. 🡪
Check that power cord is plugged in. 
🡪 Shutdown two computers one with non-working monitor and one with working 
monitor.  
🡪 Disconnect the monitors and connect them to the opposite
computer. 🡪 Reboot both computers. 
🡪 This should help you to determine if the monitor is not working or the video card on
the  computer is not working properly.

31
HOW DO I KNOW IF MY COMPUTER HAS

CRASHED? CHECK FOR THESE SIGNS: 

🡪 The mouse pointer doesn‘t move. 


🡪 When you move the mouse or type you hear a ―beep‖. 
🡪 Your screen changes to all blue white text that describes an error. Try to follow the 
directions. 
🡪 You get an error dialog box, or you see the words ―not

responding‖.

I KNOW THE PROGRAM HAS BEEN INSTALLED ON MY COMPUTER BUT


I CANNOT FIND IT 

🡪 Left click on Start. 


Select Programs.  
🡪 Find the name of the software program and double click on it. 
🡪 A program is available even if the icon is not found on the computers desktop. 🡪
*NOTE: you may not be able to see programs this way on all computers.  🡪 It may be
necessary for you to go through Explorer or My Computer – then Program  Files before
you can see your program.

MY MOUSE WON’T WORK 

🡪 Remove the ball from the mouse.  


🡪 Clean it with a Q-tip and alcohol (SPIRIT). 
🡪 Inside the mouse, the guide bars may need to be cleaned.  

32
carefully remove any lint or dust particles, but use no water or alcohol!

I CANNOT GET ON THE INTERNET 

CHECK THESE THINGS: 

🡪 An Internet cable is connected to your computer/laptop and is plugged into to the


wall  drop (looks like a phone jack). 
🡪 The Internet cable is free of kinks and the end connector is securely
fastened. 🡪 The icon ―plug‖, located on the bottom left corner of your screen
is connected.  🡪 If not, left click on it to connect to the Internet.

I CANNOT CONNECT TO A WIRELESS NETWORK 

🡪 Check the internet source or provider (if possible restart it)

🡪 Check your pc`s wifi is on, if not put on

🡪 if it still doesn`t connect, restart your pc

MY PRINTER WON’T PRINT FROM MY COMPUTER / LAPTOP 

🡪 Make sure the printer software has been properly installed.  


🡪 To check, go to File, Print, look for the name of the printer in the top
textbox. 🡪 You should see the name of the printer as an available choice.  
🡪 If you do not, then the printer needs to be installed. 
🡪 If you see the name of the printer, click on that printer to place a check mark beside
it. 🡪 Check that the printer cable is properly connected to both the computer and
printer.

33
CHAPTER THREE: NETWORKING

3.1 INTRODUCTION

Network hardware is a set of physical or network devices that are essential for interaction
and communication between hardware units operational on a computer network.

FUNDAMENTAL DEVICES OF COMPUTER NETWORK

Let’s look at the fundamental devices of a computer network.

 Modems: A modem enables a computer to connect to the internet via a telephone


line. The modem at one end converts the computer’s digital signals into analog
signals and sends them through a telephone line. At the other end, it converts the
analog signals to digital signals that are understandable for another computer.
 Routers: A router connects two or more networks. One common use of the router
is to connect a home or office network (LAN) to the internet (WAN). It generally
has a plugged-in internet cable along with cables that connect computers on the
LAN. Alternatively, a LAN connection can also be wireless (Wi-Fi-enabled),
making the network device wireless. These are also referred to as wireless access
points (WAPs).
 Hubs, bridges, and switches: Hubs, bridges, and switches are connecting units
that allow multiple devices to connect to the router and enable data transfer to all
devices on a network. A router is a complex device with the capabilities of hubs,
bridges, and even switches.
         Hubs: A hub broadcasts data to all devices on a network. As a result, it
consumes a lot of bandwidth as many computers might not need to receive the
broadcasted data. The hub could be useful in linking a few gaming consoles in a
local multiplayer game via a wired or wireless LAN.
         Bridges: A bridge connects two separate LAN networks. It scans for the
receiving device before sending a message. This implies that it avoids unnecessary
data transfers if the receiving device is not there. Moreover, it also checks to see
whether the receiving device has already received the message. These practices
improve the overall performance of the network.
         Switches: A switch is more powerful than a hub or a bridge but performs a
similar role. It stores the MAC addresses of network devices and transfers data
packets only to those devices that have requested Thus, when the demand is high, a
switch becomes more efficient as it reduces the amount of latency.
 Network interface cards: A network interface card (NIC) is a hardware unit
installed on a computer, which allows it to connect to a network. It is typically in
the form of a circuit board or chip. In most modern machines, NICs are built into

34
the motherboards, while in some computers, an extra expansion card in the form of
a small circuit board is added externally.
 Network cables: Cables connect different devices on a network. Today, most
networks have cables over a wireless connection as they are more secure, i.e., less
prone to attacks, and at the same time carry larger volumes of data per second.
 Firewall: A firewall is a hardware or software device between a computer and the
rest of the network open to attackers or hackers. Thus, a LAN can be protected
from hackers by placing a firewall between the LAN and the internet connection. A
firewall allows authorized connections and data-like emails or web pages to pass
through but blocks unauthorized connections made to a computer or LAN.

NETWORK CABLES.

Twisted-Pair wire
Twisted-Pair wire is mostly used in the telephone an Ethernet cabling, and it is divided into
some category such as 1, 2, 3, 4, 5, 5E, 6 and 7. It has two type like as unshielded twisted
pair (UTP) and shielded twisted pair (STP).
Coaxial Cable
Coaxial Cable is same to TV installation cable, and it delivers to high data transmission
speed. So it is more expensive.
There are two type of coaxial cable
 Thin (Thinnet)
 Thick (Thicknet)
Fiber-optic Cable
Fiber optic cable provides the ultra transmission data speed via light beams in the glass
bound fiber. So its price is higher to other cable.
Wireless Medium
Wireless medium is more popular in small offices and home usage such as WIFI. In WIFI,
radio signals get the transmission in the air, and multiple terminals (computer, laptop,
smart phone, etc) make connection through WIFI signals then can be shared their data
with each other.

35
OSI MODEL

The Open Systems Interconnection (OSI) model describes seven layers that computer
systems use to communicate over a network. It was the first standard model for network
communications, adopted by all major computer and telecommunication companies in the
early 1980s

The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the
OSI 7-layer model is still widely used, as it helps visualize and communicate how networks
operate, and helps isolate and troubleshoot networking problems.

OSI was introduced in 1983 by representatives of the major computer and telecom
companies, and was adopted by ISO as an international standard in 1984.

7 LAYERS OF THE OSI MODEL

1) PHYSICAL LAYER

The physical layer is responsible for the physical cable or wireless connection
between network nodes. It defines the connector, the electrical cable or wireless
technology connecting the devices, and is responsible for transmission of the raw
data, which is simply a series of 0s and 1s, while taking care of bit rate control.

2) Data Link Layer

The data link layer establishes and terminates a connection between two physically-
connected nodes on a network. It breaks up packets into frames and sends them
from source to destination. This layer is composed of two parts—Logical Link
Control (LLC), which identifies network protocols, performs error checking and
synchronizes frames, and Media Access Control (MAC) which uses MAC addresses
to connect devices and define permissions to transmit and receive data.

3) Network Layer

The network layer has two main functions. One is breaking up segments into
network packets, and reassembling the packets on the receiving end. The other is
routing packets by discovering the best path across a physical network. The

36
network layer uses network addresses (typically Internet Protocol addresses) to
route packets to a destination node.

4) Transport Layer

The transport layer takes data transferred in the session layer and breaks it into
“segments” on the transmitting end. It is responsible for reassembling the segments
on the receiving end, turning it back into data that can be used by the session layer.
The transport layer carries out flow control, sending data at a rate that matches the
connection speed of the receiving device, and error control, checking if data was
received incorrectly and if not, requesting it again.

5) Session Layer

The session layer creates communication channels, called sessions, between devices.
It is responsible for opening sessions, ensuring they remain open and functional
while data is being transferred, and closing them when communication ends. The
session layer can also set checkpoints during a data transfer—if the session is
interrupted, devices can resume data transfer from the last checkpoint.

6) Presentation Layer

The presentation layer prepares data for the application layer. It defines how two
devices should encode, encrypt, and compress data so it is received correctly on the
other end. The presentation layer takes any data transmitted by the application
layer and prepares it for transmission over the session layer.

7) Application Layer

The application layer is used by end-user software such as web browsers and email
clients. It provides protocols that allow software to send and receive information
and present meaningful data to users. A few examples of application layer protocols
are the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post
Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name
System (DNS).

37
TYPES OF NETWORK

1) LAN: local area network, the component systems are in close proximity, perhaps
within a room or building.

2) MAN: metropolitan area network, is spread out over a larger distance, like a town,
city, or university campus.

3) WAN: wide area network, when the network hardware spreads out over a very
large distance across different cities

3.1 IP ADDRESSING.

TERMS:
 Address - The unique number ID assigned to one host or interface in a network.
 Subnet - A portion of a network that shares a particular subnet address.
 Subnet mask - A 32-bit combination used to describe which portion of an address refers
to the subnet and which part refers to the host.
 Interface - A network connection.

IP ADDRESS
An IP address is an address used in order to uniquely identify a device on an IP network.
The address is made up of 32 binary bits, which can be divisible into a network portion and
host portion with the help of a subnet mask. The 32 binary bits are broken into four octets
(1 octet = 8 bits). NB: Its only when it comes to IPV4 the total binary is 32 binary bits but
when it comes to IPV6 its total binary bit is 64 bits, therefore 1 octet is 16 bits.

Each octet is converted to decimal and separated by a period (dot). For this reason, an IP
address is said to be expressed in dotted decimal format (for example, 172.16.81.100). The
value in each octet ranges from 0 to 255 decimal, or 00000000 - 11111111 binary.

Here is how binary octets convert to decimal:

128 64 32 16 8 4 2 1

38
Now for you to convert an octet in an IP address you will first check how many numbers
you can add in the numbers above and replace them with 1 and the rest will be replaced
with 0.

And this sample shows an IP address represented in both binary and decimal.
10. 1. 23. 19 (decimal)
00001010.00000001.00010111.00010011 (binary)

CLASSES OF IP ADDRESS
There are five different classes of networks, A to E. This document focuses on classes A to
C, since classes D and E are reserved and discussion of them is beyond the scope of this
document.
CLASS A: FROM 1- 126 (127 is a loop back or trouble shoot IP address) this class can
accommodate millions of users that why it’s mostly used.
CLASS B: FROM 128- 191 this class can accommodate only up to 7000 users.
CLASS C: FROM 192 – 223 this class can accommodate up to 250 users.
CLASS D AND E ARE NOT IN USE.

In a Class A address, the first octet is the network portion, so the Class A  has a major
network address of 1.0.0.0 - 126.255.255.255. Octets 2, 3, and 4 (the next 24 bits) are for the
network manager to divide into subnets and hosts as he/she sees fit. Class A addresses are
used for networks that have more than 65,536 hosts (actually, up to 16777214 hosts!).
In a Class B address, the first two octets are the network portion, so the class B has a major
network address of 128.0.0.0 - 191.255.255.255. Octets 3 and 4 (16 bits) are for local subnets
and hosts. Class B addresses are used for networks that have between 256 and 65534 hosts.
In a Class C address, the first three octets are the network portion. The Class C has a
major network address of 192.0.0.0 - 223.255.255.255. Octet 4 (8 bits) is for local subnets
and hosts - perfect for networks with less than 250 hosts.

NETWORK MASKS

A network mask helps you know which portion of the address identifies the network and
which portion of the address identifies the node. Class A, B, and C networks have default
masks, also known as natural masks, as shown here:
Class A: 255.0.0.0

39
Class B: 255.255.0.0
Class C: 255.255.255.0

An IP address on a Class A network that has not been subnetted would have an
address/mask pair similar to: 8.20.15.1 255.0.0.0. In order to see how the mask helps you
identify the network and node parts of the address, convert the address and mask to binary
numbers.
8.20.15.1 = 00001000.00010100.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000

Once you have the address and the mask represented in binary, then identification of the
network and host ID is easier. Any address bits which have corresponding mask bits set to
1 represent the network ID. Any address bits that have corresponding mask bits set to 0
represent the node ID.
8.20.15.1 = 00001000.00010100.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000
-----------------------------------
net id | host id

netid = 00001000 = 8
hostid = 00010100.00001111.00000001 = 20.15.1

SUBNETTING
Subnetting allows you to create multiple logical networks that exist within a single Class A,
B, or C network. If you do not subnet, you are only able to use one network from your
Class A, B, or C network, which is unrealistic.
Each data link on a network must have a unique network ID, with every node on that link
being a member of the same network. If you break a major network (Class A, B, or C) into
smaller subnetworks, it allows you to create a network of interconnecting subnetworks.
Each data link on this network would then have a unique network/subnetwork ID. Any
device, or gateway, that connects n networks/subnetworks has n distinct IP addresses, one
for each network / subnetwork that it interconnects.

40
In order to subnet a network, extend the natural mask with some of the bits from the host
ID portion of the address in order to create a subnetwork ID. For example, given a Class C
network of 204.17.5.0 which has a natural mask of 255.255.255.0, you can create subnets in
this manner:
204.17.5.0 - 11001100.00010001.00000101.00000000
255.255.255.224 - 11111111.11111111.11111111.11100000
--------------------------|sub|----

41
CHAPTER FOUR

IV.1 CHALLENGES ENCOUNTERED

•    The institution didn’t provide internet source so everything checked and
downloaded for the training was with my subscription

•   The institution wasn’t well equipped so I wasn’t opportuned to see some


tools and equipment.

IV.2 RECOMMENDATION

•        I recommend that faster network service/routers be provided in the work /


learning environment to ensure little to no disconnection throughout the
training

•        I recommend that standard pieces of equipment and tools be provided

•        I recommend that SIWES provide places for industrial attachment for
students

•        I also recommend that Industrial Training Fund pays some kind of monthly
allowances to students.

42

You might also like