my it report

57
Chapter one 1.0 Introduction Student industrial work experience scheme (S.I.W.E.S) is a six-month industrial work experience as requirement for the award of Bachelor of Science degree in computer science department of the Benue state university makurdi ,this report contains major report on some of the things I learnt in the area of work experience at Rehoboth ICT Academy makurdi Benue state. 1.1 About Rehoboth ICT Academy The name of the organization is Rehoboth ICT academy location is at no.12 Onitsha street makurdi, Benue state. The company was established in 1996 with the objective of bringing information technology to the nook and cranny of the state reaching out to the people from all walks of life especially in our secondary and tertiary institutions across the state and the country at large. Rehoboth ICT academy is a computer and software engineering appreciation organization, its establishment has come to redeem computer education 1 | Page

Upload: stevotexas

Post on 20-May-2015

1.471 views

Category:

Entertainment & Humor


2 download

TRANSCRIPT

Page 1: my It report

Chapter one

1.0 Introduction

Student industrial work experience scheme (S.I.W.E.S) is a six-month industrial

work experience as requirement for the award of Bachelor of Science degree in

computer science department of the Benue state university makurdi ,this

report contains major report on some of the things I learnt in the area of work

experience at Rehoboth ICT Academy makurdi Benue state.

1.1 About Rehoboth ICT Academy

The name of the organization is Rehoboth ICT academy location is at no.12

Onitsha street makurdi, Benue state. The company was established in 1996 with

the objective of bringing information technology to the nook and cranny of the

state reaching out to the people from all walks of life especially in our

secondary and tertiary institutions across the state and the country at large.

Rehoboth ICT academy is a computer and software engineering appreciation

organization, its establishment has come to redeem computer education and

information technology problem in the state and country at large.

The establishment is being managed by computer professionals who are really

committed to ensuring a hitch- free, fulfilled and successful program.

Rehoboth’s quest for quality in all her engagement has immensely driven the

company in staff team selection.

Rehoboth ICT academy is getting popular of her dedication to quality service.

1.2 Rehoboth sales and services

The computer industry requires a great deal of experience. Installing new and

servicing existing systems are a significant part of Rehoboth ICT business. The

1 | P a g e

Page 2: my It report

organization currently has a total man power of 18 personnel, out of which 8 are

professionals,

Here are some of the services offered by the organization.

* Software Engineering.

* Information and communication technology.

* Networking (internet and intranet).

* Hardware maintenance and repairs.

* Web designing and hosting.

* E-library

* Publications i.e. students journals projects typing and binding etc.

* Diploma certificates on information technology, computer education and other

related courses for groups and individuals.

* Vast and satellite (purchase and installation.

1.3 Facilities at Rehoboth ICT Academy

The organization has a head office at No. 12 Onitsha Street, opposite cool off

park makurdi Benue state, a branch office is at No. 7 old Otukpo Road High

level opposite Mr. Biggs fast foods Makurdi Benue state. Her sitting space for

students is 75 in both centers including her working personnel, a plant capacity

of 7.5KVA and a generator of a 2.7 KVA is installed on ground 24 computers

connected to the net 1 printing machine,1 company vehicle and a motorcycle.

The computers serve as a basis for students learning most especially those on

industrial attachment, where I too had a lot of experiences through hardware

and other basic computer appreciation.

2 | P a g e

Page 3: my It report

The name of the chief executive officer is Engineer B.O Animashaun who was

also my internal supervisor.

Areas of industrial training

I had my industrial training in software development and computer networking

I learnt how to design a web site, writing a project using J2EE (java 2 enterprise

edition also in networking how to install, maintain and troubleshoot a computer

network problem for at least a small business establishment.

1.4 Challenges faced as a student on IT

The challenges I had faced on the job as an industrial training students (IT) were

How to apply the theory aspect of software development to practical,

firstly, I could not create a home page of a website.

secondly, I could not create a project in java enterprise edition(J2EE)

Lastly, I could not troubleshoot a small net work connectivity problem

I was able to resolve all these with the aid of my internal supervisor and his

instructors just to mention a few of the challenges.

3 | P a g e

Page 4: my It report

1.5 The Organogram of Rehoboth ICT Academy

MD/CEO

GM(Admin & Operations)

GM(Accounts)

ManagerCafé 1

ManagerCafé 2

ManagerBus. Operations

ManagerComputerTraining

Manager IT

Man

ager

(Fin

ance

/Acc

t.)Typist

Café

Ass

istan

t

Typist1 Typist2

Typist3Typist4 Photocopier

Operator.

Caf é

As s

is tan

t

Typist Comp.

Instru

ctor1 C

omp.

Instructor2

Com

p.Ins

tructo

r3

Instructo

r

Programming Instructo

r

Netwk/HM

Instr

uctor

Web & ot

hers

4 | P a g e

Page 5: my It report

CHAPTER TWO

Summary of Experiences Obtained

2.1 Website Design

A website is a set of related WebPages containing content such as texts, images,

videos, audios, etc. A website is hosted on at least one web server, accessible

via a network such as the internet or a private LAN through an internet address

known as a URL (universal resource locator). A publicly accessible websites

collectively constitute the World Wide Web.

Webpage

A webpage is a document, typically written in plain text interspersed with

formatting instructions of hypertext markup language (HTML, XHTML). A

webpage may incorporate elements from other websites with suitable anchors.

WebPages are accessed and transported with the hypertext transfer protocol

(HTTP), which may optionally employ encryption (HTTP secure, HTTPS) to

provide security and privacy for the use of the webpage content. The user’s

application often a web browser renders the page content according to its

HTML markup instructions into a display terminal.

2.2 Types of Website by Purpose

A personal website.

A commercial website.

A government website.

A non-profitable website.

It could be the work of an individual, a business or other organization, and is

typically dedicated to some particular topic or purpose. Any website can contain

5 | P a g e

Page 6: my It report

a hyperlink to any other website, so the distinction between individual sites as

perceived by the user may sometimes be blurred.

Websites are written in, or dynamically converted to, HTML and are accessed

using a software interface classified as a user agent. WebPages can be viewed or

otherwise accessed from a range of remote computer-based and internet enabled

devices of various sizes including desktop computers, laptops, PDAs and cell

phones.

A website is hosted on a computer system known as a web server, also called

HTTP (hypertext transfer protocol) server and the terms can also be referred to

the software that runs on those system and retrieves and delivers the WebPages

in response to request from the websites users.

Apache is the most commonly used web server software

2.3 Types of Website by Built

* Static website

* Dynamic website

Static Website

A static website is one that has web pages stored on the server in the format that

is sent to a client web browser. It is primarily coded in hypertext markup

language (HTTM). Simple forms include, marketing websites such as five page

websites or brochure websites are often static

Websites, because they present predefined static information to be used.

This may include information about a company, its products and services

through text, photos, animations, audio/videos, interactive menus and

navigation.

This type of website usually displays the same information to all visitors similar

to handing out a printed brochure to customers or clients. A static

Website will generally provide consistent, standard information for an extended

period of time. Although the website owner may make updates

6 | P a g e

Page 7: my It report

Periodically, it is a manual process to edit the text, photos and other content that

may require basic website design skill and software.

A static website may still have dynamic behavior provided that, this is

handled entirely client side (i.e. within the browser). This may include such

features as java script image zoom feature to display photographs.

In a static web site visitors are not able to control information they receive and

instead settle for whatever content the website owner has decided to offer at that

time information’s are edited using

Text editors, such as note pad or text field, where content and HTML

markup are manipulated directly within the editor program.

WYSIWYG(this, I call what you see is what you get) offline editors such

as

Microsoft front page and Adobe dream weaver.etc.

Dynamic Website

A dynamic website is one that changes or customizes itself frequently and

automatically, based on certain criteria.

Dynamic website can have two types of dynamic activity code and content

dynamic code is invisible or fully displayed.

Dynamic code.

A website with dynamic code refers to its construction or how it is built, and

more specifically refers to the code used to create a single web page. A dynamic

web page is generated on the fly by piecing together certain blocks of code,

procedures or routines. A dynamically generated web page would recall various

bits of information from a database and put them together in a pre-defined

format to present the reader with a coherent page. It interacts with users in a

variety of ways including by reading cookies recognizing users' previous

7 | P a g e

Page 8: my It report

history, session variables, server side variables etc., or by using direct

interaction (form elements, mouse over’s, etc.). A site can display the current

state of a dialogue between users, monitor a changing situation, or provide

information in some way personalized to the requirements of the individual

user.

Dynamic Content

The second type is a website with dynamic content displayed in plain view.

Variable content is displayed dynamically on the fly based on certain criteria,

usually by retrieving content stored in a database.

A website with dynamic content refers to how its messages, text, images and

other information are displayed on the web page and more specifically how its

content changes at any given moment. The web page content varies based on

certain criteria, either pre-defined rules or variable user input. For example, a

website with a database of news articles can use a pre-defined rule which tells it

to display all news articles for today's date. This type of dynamic website will

automatically show the most current news articles on any given date. Another

example of dynamic content is when a retail website with a database of media

products allows a user to input a search request for the keyword Beatles. In

response, the content of the web page will spontaneously change the way it

looked before, and will then display a list of Beatles products like CDs, DVDs

and books.

2.4 Javas 2 Enterprise Edition (J2EE)

J2EE means Java 2 Enterprise Edition. The functionality of J2EE is developing

multitier web-based applications .The J2EE platform is consists of a set of

services, application programming interfaces (APIs), and protocols.

8 | P a g e

Page 9: my It report

These Four Components of are the J2EE application

Application clients’ components.

Servelet and JSP technology are web components.

Business components (JavaBeans).

Resource adapter components

Types of J2EE clients.

Applets

Application clients

Java Web Start-enabled clients, by Java Web Start technology.

Wireless clients, based on MIDP technology.

web component.

Java Servelet and Java Server Pages technology components are web

components. Servelets are Java programming language that dynamically receive

requests and make responses. JSP pages execute as servelets but allow a more

natural approach to creating static content.

Java server faces (JSFs).

Java Server Faces (JSF) is a user interface (UI) designing framework for Java

web applications. JSF provide a set of reusable UI components, standard for

web applications.JSF is based on MVC design pattern. It automatically saves

the form data to server and populates the form date when display at client side.

Java 2 platform Enterprise Edition (J2EE) is a java platform designed for the

mainframe scale computing typical of large enterprises. Sun micro systems

9 | P a g e

Page 10: my It report

(together with industry partners such as IBM (international business machine))

design J2EE to simplify application development in a thin client tiered

environment) what is a thin client? A thin client is a program interface to the

application that does not have any operations like query of databases, execute

complex business rules, or connect to legacy applications. J2EE simplifies

application development and decreases the need for programming and

programmer training by creating standard reusable modular components and by

enabling the tier to handle many aspects of programming automatically. J2EE

include many components of the java 2 platform standard edition (J2SE).

The java development kit (JDK) is included as the core language

package.

Write once Run anywhere technology is included to ensure portability.

Support is provided for Common Object Request broker

Architecture(CORBA), a predecessor of Enterprise JavaBeans(EJB)so

that java objects can communicate with CORBA objects both locally and

over a network through its interface broker

Java database connectivity 2.0 (JDBC) the Java equivalent to open

Database

Connectivity (ODBC) is included as the standard interface for Java

databases.

A security model is included to protect data both locally and in web-

based

applications.

J2EE also includes a number of components added to the J2SE model,

such as the following

Full support is included for Enterprise JavaBeans (EJB) which is a server

based technology for the delivery of program components in an

10 | P a g e

Page 11: my It report

Enterprise Environment it supports the extensible Markup language

(XML)

And has enhanced deployment and security features.

The java servelet API (application program interface) enhances for

developers without requiring a graphical user interface(GUI)

Java server pages (JSP) is the equivalent to Microsoft’s’ Active server

pages

(ASP) and is used for dynamic web enabled data access and

manipulation.

The J2EE architecture consists of four major elements:

The J2EE Application programming model is used to facilitate the

development of multi- tier thin client applications.

The j2EE platform includes necessary policies and APIs such as the java

servelets and java message service(JMS) which is used for simple

massage

Transfer protocol (SMTP) over a web service.

The J2EE compatibility test suit ensures that J2EE products are

compatible with the platform standard.

The J2EE reference implementation explains J2EE capabilities and

provides its operational definition.

A JNDI name is the name the J2EE server uses to hook enterprise

beans .In your code when you look up an enterprise bean, you supply

statements similar to your code.

2.5 Netwoking.

Computer Network

A computer network, often simply referred to as a network, is a collection of

computers and devices interconnected by communications channels that

11 | P a g e

Page 12: my It report

facilitate communications among users and allows users to share resources.

Networks may be classified according to a wide variety of characteristics. A

computer network allows sharing of resources and information among

interconnected devices.

Purpose

Computer networks can be used for a variety of purposes:

* Facilitating communications. Using a network, people can communicate

efficiently and easily via email, instant messaging, chat rooms, telephone, video

telephone calls, and video conferencing.

* Sharing hardware. In a networked environment, each computer on a

network may access and use hardware resources on the network, such as

printing a document on a shared network printer.

* Sharing files, data, and information. In a network environment,

authorized user may access data and information stored on other computers on

the network. The capability of providing access to data and information on

shared storage devices is an important feature of many networks.

* Sharing software. Users connected to a network may run application

programs on remote computers.

* Information preservation.

* Security.

2.6 Network Topology

Computer networks may be classified according to the network topology upon

which the network is based, such as bus network, star network, ring network,

12 | P a g e

Page 13: my It report

mesh network. Network topology is the coordination by which devices in the

network are arranged in their logical relations to one another, independent of

physical arrangement. Even if networked computers are physically placed in a

linear arrangement and are connected to a hub, the network has a star topology,

rather than a bus topology. In this regard the visual and operational

characteristics of a network are distinct. Networks may be classified based on

the method of data used to convey the data; these include digital and analogue

networks.

2.7 Types of Computer Networks Based on Physical Scope

Common types of computer networks may be identified by their scale.

Local Area Network

A local area network (LAN) is a network that connects computers and devices

in a limited geographical area such as home, school, computer laboratory, office

building, or closely positioned group of buildings. Each computer or device on

the network is a node. Current wired LANs are most likely to be based on

Ethernet technology, although new standards like ITU-T G.hn also provide a

way to create a wired LAN using existing home wires (coaxial cables, phone

lines and power lines).

All interconnected devices must understand the network layer (layer 3), because

they are handling multiple subnets (the different colours). Those inside the

library, which have only 10/100 Mbit/s Ethernet connections to the user device

and a Gigabit Ethernet connection to the central router, could be called "layer 3

switches" because they only have Ethernet interfaces and must understand IP. It

would be more correct to call them access routers, where the router at the top is

a distribution router that connects to the Internet and academic networks'

customer access routers.

13 | P a g e

Page 14: my It report

The defining characteristics of LANs, in contrast to WANs (Wide Area

Networks), include their higher data transfer rates, smaller geographic range,

and no need for leased telecommunication lines. Current Ethernet or other IEEE

802.3 LAN technologies operate at speeds up to 10 Gbit/s. This is the data

transfer rate. IEEE has projects investigating the standardization of 40 and 100

Gbit/s.

Personal Area Network

A personal area network (PAN) is a computer network used for communication

among computer and different information technological devices close to one

person. Some examples of devices that are used in a PAN are personal

computers, printers, fax machines, telephones, PDAs, scanners, and even video

game consoles. A PAN may include wired and wireless devices. The reach of a

PAN typically extends to 10 meters. A wired PAN is usually constructed with

USB and Firewire connections while technologies such as Bluetooth and

infrared communication typically form a wireless PAN.

Home Area Network

A home area network (HAN) is a residential LAN which is used for

communication between digital devices typically deployed in the home, usually

a small number of personal computers and accessories, such as printers and

mobile computing devices. An important function is the sharing of Internet

access, often a broadband service through a CATV or Digital Subscriber Line

(DSL) provider. It can also be referred to as an office area network (OAN).

Wide Area Network

A wide area network (WAN) is a computer network that covers a large

geographic area such as a city, country, or spans even intercontinental distances,

using a communications channel that combines many types of media such as

14 | P a g e

Page 15: my It report

telephone lines, cables, and air waves. A WAN often uses transmission facilities

provided by common carriers, such as telephone companies. WAN technologies

generally function at the lower three layers of the OSI reference model: the

physical layer, the data link layer, and the network layer.

Campus Network

A campus network is a computer network made up of an interconnection of

local area networks (LAN's) within a limited geographical area. The networking

equipments (switches, routers) and transmission media (optical fibre, copper

plant, Cat5 cabling etc.) are almost entirely owned (by the campus tenant /

owner: an enterprise, university, government etc.).

In the case of a university campus-based campus network, the network is likely

to link a variety of campus buildings including; academic departments, the

university library and student residence halls.

Metropolitan Area Network

A Metropolitan area network is a large computer network that usually spans a

city or a large campus. Sample EPN made of Frame relay WAN connections

and dialup remote access. Sample VPN used to interconnect 3 offices and

remote users.

Enterprise Private Network

An enterprise private network is a network build by an enterprise to

interconnect various company sites, e.g., production sites, head offices, remote

offices, shops, in order to share computer resources.

Virtual Private Network

A virtual private network (VPN) is a computer network in which some of the

links between nodes are carried by open connections or virtual circuits in some

15 | P a g e

Page 16: my It report

larger network (e.g., the Internet) instead of by physical wires. The data link

layer protocols of the virtual network are said to be tunnelled through the larger

network when this is the case. One common application is secure

communications through the public Internet, but a VPN need not have explicit

security features, such as authentication or content encryption. VPNs, for

example, can be used to separate the traffic of different user communities over

an underlying network with strong security features.

VPN may have best-effort performance, or may have a defined service level

agreement (SLA) between the VPN customer and the VPN service provider.

Generally, a VPN has a topology more complex than point-to-point.

Internetwork

An internetwork is the connection of two or more private computer networks

via a common routing technology (OSI Layer 3) using routers. The Internet is

an aggregation of many internetworks; hence its name was shortened to

Internet.

2.8 Computer Network Basic Hardware Components

All networks are made up of basic hardware building blocks to interconnect

network nodes, such as Network Interface Cards (NICs), Bridges, Hubs,

Switches, and Routers. In addition, some method of connecting these building

blocks is required, usually in the form of galvanic cable (most commonly

Category 5 cable). Less common are microwave links (as in IEEE 802.12) or

optical cable ("optical fibre").

Network Interface Cards

16 | P a g e

Page 17: my It report

A network card, network adapter, or NIC (network interface card) is a piece of

computer hardware designed to allow computers to communicate over a

computer network. It provides physical access to a networking medium and

often provides a low-level addressing system through the use of MAC

addresses. Each network interface card has its unique id. This is written on a

chip which is mounted on the card.

Repeaters

A repeater is an electronic device that receives a signal, cleans it of unnecessary

noise, regenerates it, and retransmits it at a higher power level, or to the other

side of an obstruction, so that the signal can cover longer distances without

degradation. In most twisted pair Ethernet configurations, repeaters are required

for cable that runs longer than 100 meters. A repeater with multiple ports is

known as a hub. Repeaters work on the Physical Layer of the OSI model.

Repeaters require a small amount of time to regenerate the signal. This can

cause a propagation delay which can affect network communication when there

are several repeaters in a row. Many network architectures limit the number of

repeaters that can be used in a row (e.g. Ethernet's 5-4-3 rule).

Bridges

A network bridge connects multiple network segments at the data link layer

(layer 2) of the OSI model. Bridges broadcast to all ports except the port on

which the broadcast was received. However, bridges do not promiscuously copy

traffic to all ports, as hubs do, but learn which MAC addresses are reachable

through specific ports. Once the bridge associates a port and an address, it will

send traffic for that address to that port only.

Bridges learn the association of ports and addresses by examining the source

address of frames that it sees on various ports. Once a frame arrives through a

port, its source address is stored and the bridge assumes that MAC address is

17 | P a g e

Page 18: my It report

associated with that port. The first time that a previously unknown destination

address is seen, the bridge will forward the frame to all ports other than the one

on which the frame arrived.

Bridges come in three basic types:

* Local bridges: Directly connect local area networks (LANs)

* Remote bridges: Can be used to create a wide area network (WAN) link

between LANs. Remote bridges, where the connecting link is slower than

the end networks, largely have been replaced with routers.

* Wireless bridges: Can be used to join LANs or connect remote stations

to LANs.

Switches

A network switch is a device that forwards and filters OSI layer 2 datagram

(chunks of data communication) between ports (connected cables) based on the

MAC addresses in the packets.[9] A switch is distinct from a hub in that it only

forwards the frames to the ports involved in the communication rather than all

ports connected. A switch breaks the collision domain but represents itself as a

broadcast domain. Switches make forwarding decisions of frames on the basis

of MAC addresses. A switch normally has numerous ports, facilitating a star

topology for devices, and cascading additional switches.[10] Some switches are

capable of routing based on Layer 3 addressing or additional logical levels;

these are called multi-layer switches. The term switch is used loosely in

marketing to encompass devices including routers and bridges, as well as

devices that may distribute traffic on load or by application content (e.g., a Web

URL identifier).

Routers

18 | P a g e

Page 19: my It report

A router is an internetworking device that forwards packets between networks

by processing information found in the datagram or packet (Internet protocol

information from Layer 3 of the OSI Model). In many situations, this

information is processed in conjunction with the routing table (also known as

forwarding table). Routers use routing tables to determine what interface to

forward packets (this can include the "null" also known as the "black hole"

interface because data can go into it, however, no further processing is done for

said data).

Firewalls

Firewalls are the most important aspect of a network with respect to security. A

firewalled system does not need every interaction or data transfer monitored by

a human, as automated processes can be set up to assist in rejecting access

requests from unsafe sources, and allowing actions from recognized ones. The

vital role firewalls play in network security grows in parallel with the constant

increase in 'cyber' attacks for the purpose of stealing/corrupting data, planting

viruses, etc.

2.9 Difference between Network Hub, Switches and Router

Some technicians have a tendency to use the terms routers, hubs and switches

interchangeably. One minute they're talking about a switch. Two minutes later

they're discussing router settings. Throughout all of this, though, they're still

looking at only the one box. Ever wonder what the difference is among these

boxes? The functions of the three devices are all quite different from one

another, even if at times they are all integrated into a single device.

Hub

A common connection point to devices in a network. Hubs are commonly used

to connect segments of a LAN. A hub contains multiple ports. When a packet

19 | P a g e

Page 20: my It report

arrives at one port, it is copied to the other ports so that all segments of the LAN

can see all packets.

Switch

In networks, is a device that filters and forwards packets between LAN

segments. Switches operate at the data link layer (layer 2) and sometimes the

network layer (layer 3) of the OSI Reference Model and therefore support any

packet protocol. LANs that use switches to join segments are called switched

LANs or, in the case of Ethernet networks, switched Ethernet LANs.

Router

A device that forwards data packets along networks. A router is connected to at

least two networks, commonly two LANs or WANs or a LAN and its ISP.s

network. Routers are located at gateways, the places where two or more

networks connect. Routers use headers and forwarding tables to determine the

best path for forwarding the packets, and they use protocols such as ICMP to

communicate with each other and configure the best route between any two

hosts.

The Differences between Hubs, Switches, and Routers on the Network

Today most routers have become something of a Swiss Army knife, combining

the features and functionality of a router and switch/hub into a single unit. So

conversations regarding these devices can be a bit misleading — especially to

someone new to computer networking.

The functions of a router, hub and a switch are all quite different from one

another, even if at times they are all integrated into a single device. Let's start

with the hub and the switch since these two devices have similar roles on the

network. Each serves as a central connection for all of your network equipment

and handles a data type known as frames. Frames carry your data. When a

20 | P a g e

Page 21: my It report

frame is received, it is amplified and then transmitted on to the port of the

destination PC. The big difference between these two devices is in the method

in which frames are being delivered.

In a hub, a frame is passed along or "broadcast" to every one of its ports. It

doesn't matter that the frame is only destined for one port. The hub has no way

of distinguishing which port a frame should be sent to. Passing it along to every

port ensures that it will reach its intended destination. This places a lot of traffic

on the network and can lead to poor network response times.

Additionally, a 10/100Mbps hub must share its bandwidth with each and every

one of its ports. So when only one PC is broadcasting, it will have access to the

maximum available bandwidth. If, however, multiple PCs are broadcasting,

then that bandwidth will need to be divided among all of those systems, which

will degrade performance.

A switch, however, keeps a record of the MAC addresses of all the devices

connected to it. With this information, a switch can identify which system is

sitting on which port. So when a frame is received, it knows exactly which port

to send it to, without significantly increasing network response times. And,

unlike a hub, a 10/100Mbps switch will allocate a full 10/100Mbps to each of

its ports. So regardless of the number of PCs transmitting, users will always

have access to the maximum amount of bandwidth. It's for these reasons why a

switch is considered to be a much better choice than a hub.

Routers are completely different devices. Where a hub or switch is concerned

with transmitting frames, a router's job, as its name implies, is to route packets

to other networks until that packet ultimately reaches its destination. One of the

key features of a packet is that it not only contains data, but the destination

address of where it's going.

21 | P a g e

Page 22: my It report

A router is typically connected to at least two networks, commonly two Local

Area Networks (LANs) or Wide Area Networks (WAN) or a LAN and its ISP's

network, for example, your PC or workgroup and EarthLink. Routers are

located at gateways, the places where two or more networks connect. Using

headers and forwarding tables, routers determine the best path for forwarding

the packets. Router use protocols such as ICMP to communicate with each other

and configure the best route between any two hosts.

Today, a wide variety of services are integrated into most broadband routers. A

router will typically include a 4 - 8 port Ethernet switch (or hub) and a Network

Address Translator (NAT). In addition, they usually include a Dynamic Host

Configuration Protocol (DHCP) server, Domain Name Service (DNS) proxy

server and a hardware firewall to protect the LAN from malicious intrusion

from the Internet.

All routers have a WAN Port that connects to a DSL or cable modem for

broadband Internet service and the integrated switch allows users to easily

create a LAN. This allows all the PCs on the LAN to have access to the Internet

and Windows file and printer sharing services.

Some routers have a single WAN port and a single LAN port and are designed

to connect an existing LAN hub or switch to a WAN. Ethernet switches and

hubs can be connected to a router with multiple PC ports to expand a LAN.

Depending on the capabilities (kinds of available ports) of the router and the

switches or hubs, the connection between the router and switches/hubs may

require either straight-thru or crossover (null-modem) cables. Some routers even

have USB ports, and more commonly, wireless access points built into them.

Some of the more high-end or business class routers will also incorporate a

serial port that can be connected to an external dial-up modem, which is useful

22 | P a g e

Page 23: my It report

as a backup in the event that the primary broadband connection goes down, as

well as a built in LAN printer server and printer port.

Besides the inherent protection features provided by the NAT, many routers will

also have a built-in, configurable, hardware-based firewall. Firewall capabilities

can range from the very basic to quite sophisticated devices. Among the

capabilities found on leading routers are those that permit configuring

TCP/UDP ports for games, chat services, and the like, on the LAN behind the

firewall. So, in short, a hub glues together an Ethernet network segment, a

switch can connect multiple Ethernet segments more efficiently and a router can

do those functions plus route TCP/IP packets between multiple LANs and/or

WANs; and much more of course.

23 | P a g e

Page 24: my It report

CHAPTER THREE

3.0 Projects implemented for the Organisation.

* Website design project.

* Security database (J2EE) project.

* Implementation of a small office network.

3.1 Website design project:

This project was given to me by the organisation singly, specifications were, at

the home page we should include a welcome message, a title and photographs

that could reflect the website purpose the navigation panel were also created.

The aim of this project was to design a website for e-resources the title of the

project was given as or rather website name was Rehoboth e-education

resources with an integral purpose of an e-library. the navigation panel were

made of outline boxes with links, this are some of the panels that were created

with links, Rehoboth ICT Academy, About us, Home, Authors of the year,

Book reviews, contact us, Help, Jobs, project Appraisal, Book reviews, science

research for the next generation, Books downloads and information and

services. Selected navigation panels like project appraisal and science research

for the next generation were loaded to their content and linked to their

navigation panels other navigation panels were to be left unlinked so that my

fellow colleagues work could also be linked. the project was given to me by the

organisation on the 14th of December 2012, I used the Christmas and new year

breaks to execute the project, I used a designer software called CS3(Adobe

dream weaver) to make my work more perfect. Below is the HTML code prove

the validity of the project.

24 | P a g e

Page 25: my It report

Fig 3.1.1 Code for website project.

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"

"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<!-- DW6 -->

<head>

<!-- Copyright 2005 Macromedia, Inc. All rights reserved. -->

<title>REHOBOTH E-RESOURCES - Home Page</title>

<meta http-equiv="Content-Type" content="text/html;

charset=utf-8" />

<link rel="stylesheet" href="mm_entertainment.css"

type="text/css" />

<style type="text/css">

<!--

.style3 { font-size: 36px;

font-weight: bold;}

.style5 {font-size: 18px; color: #FF0000; font-style:

italic; }

.style6 {font-size: 14px}

-->

</style>

</head>

<body bgcolor="#14285f">

<table width="100%" border="0" cellspacing="0"

cellpadding="0">

25 | P a g e

Page 26: my It report

<tr bgcolor="02021e">

<td width="400" colspan="4" rowspan="2"

nowrap="nowrap"><p><img width="349" height="232"

src="rehoboth_clip_image002.gif" alt="j0195384" /></p></td>

<td width="360" height="58" colspan="3" valign="bottom"

nowrap="nowrap" class="pageName style3" id="logo">REHOBOTH E-

DUCATION RESOURCES</td>

<td width="100%">&nbsp;</td>

</tr>

<tr bgcolor="02021E">

<td height="57" colspan="3" valign="top" nowrap="nowrap"

class="style5" id="tagline"><marquee direction="left"><font

color="#FFFFFF">we at rehoboth e-edu.resources we keep our

word</font></marquee></td>

<td width="100%">&nbsp;</td>

</tr>

<tr>

<td colspan="8" bgcolor="#cc3300"><img src="mm_spacer.gif"

alt="" width="1" height="2" border="0" /></td>

</tr> <tr>

<td colspan="8"><img src="mm_spacer.gif" alt="" width="1"

height="2" border="0" /></td>

</tr> <tr>

<td colspan="8" bgcolor="#cc3300"><img src="mm_spacer.gif"

alt="" width="1" height="1" border="0" /></td>

</tr> <tr>

<td colspan="8">&nbsp;<br />

26 | P a g e

Page 27: my It report

&nbsp;<br /> </td>

</tr> <tr>

<td width="155" valign="top" height="370">

<table border="0" cellspacing="0" cellpadding="0"

width="155" id="navigation">

<tr> <td width="155" height="40"><a href="">REHOBOTH

ICT ACADEMY</a></td>

</tr> <tr>

<td width="155" height="40"><a href="">ABOUT

US</a></td>

</tr> <tr>

<td width="155" height="40"><a href="">HOME</a></td>

</tr> <tr>

<td width="155" height="40"><a href="">AUTHORS OF

THE YEAR</a></td>

</tr> <tr>

<td width="155" height="40"><a href="">BOOK

REVIEWS</a></td>

</tr> <tr>

<td width="155" height="40"><a href="">CONTACT

US</a></td>

</tr> <tr>

<td width="155" height="40"><a href="">HELP

</a></td>

</tr> <tr>

27 | P a g e

Page 28: my It report

<td width="155" height="40"><a

href="">JOBS</a></td>

</tr> <tr>

<td width="155" height="40"><a

href="file:///c:/users/steve/documents/usongo ict

center/appraisal.html">PROJECT APPRAISAL</a></td>

</tr> <tr>

<td width="155" height="40"><a href=""> BOOKS

DOWNLOADS</a></td>

</tr> <tr>

<td width="155" height="40"><a href="">INFORMATION

& SERVICES</a></td>

</tr> </table></td>

<td width="1" bgcolor="#445DA0"><img src="mm_spacer.gif"

alt="" width="1" height="1" border="0" /></td>

<td width="50"><img src="mm_spacer.gif" alt="" width="50"

height="1" border="0" /></td>

<td width="304" colspan="2" valign="top"><img

src="mm_spacer.gif" alt="" width="304" height="1"

border="0" /><br />

<table border="0" cellspacing="0" cellpadding="0"

width="304">

<tr><td height="41" class="pageName">Welcome Message

Here</td>

</tr> <tr> <td class="bodyText"><span

class="style6">Here at rehoboth e-ducation resources will

provide the best and are determined to be the no 1. in e-

learning so always stay with

28 | P a g e

Page 29: my It report

with us for qualiity services and other e-du

materials and downloads.</span>

<p><span class="subHeader">Title

Here</span>.            </p>

<span class="style6">e-learning is  simply an

internet base source of reading through various research

channel such as e-library, e-research, e-reviews

etc.</span></td>

</tr>

</table>

<p><br />

</p></td>

<td width="50"><img src="mm_spacer.gif" alt="" width="50"

height="1" border="0" /></td>

<td width="200" valign="top"><img src="mm_spacer.gif"

alt="" width="1" height="10" border="0" /><br />

<table border="0" cellspacing="0" cellpadding="0"

width="200">

<tr> <td colspan="3" id="sidebarHeader"

class="sidebarHeader" align="center">SCIENCE THIS WEEK</td>

</tr> <tr>

<td width="45"><img src="mm_spacer.gif" alt=""

width="40" height="1" border="0" /></td>

<td width="110" id="sidebar" class="smallText">

<p><img src="steve.com 012.jpg" width="265"

height="267" /><br />

Science research for new generation<br/>

29 | P a g e

Page 30: my It report

<a href="file:///c:/users/steve/documents/usongo

ict center/SCIENCE RE.html">read more...:</a>

<p><img src="steve.com 001.jpg" alt="TREC"

width="260" height="267" /><br />

LITREATURE REVIEWS AND PROJECT BACKGROUND<br />

<a href="javascript:;">read more

&gt;</a><br /> </p> <br /> <td

width="45">&nbsp;</td>

</tr>

</table>

<br /> </td>

<td width="100%">&nbsp;</td>

</tr> <tr>

<td width="155">&nbsp;</td>

<td width="1"></td>

<td width="50">&nbsp;</td>

<td width="194">&nbsp;</td>

<td width="110">&nbsp;</td>

<td width="50">&nbssp;</td>

<td width="200">&nbsp;</td>

<td width="100%">&nbsp;</td>

</tr>

</table>

</body>

30 | P a g e

Page 31: my It report

</html>

3.2 Security database (J2EE) Java 2 Enterprise Edition

Here the organisation thought much about the experience we had obtained in

Java 2 enterprise edition and wanted to know if we really understood what our

instructor on Software Development Mr. Vitalis Agbers with Phone No.:

08137671244 thought us on J2EE, we were to design a data base for security

online Report, the project had the following modules: Admin, Arrest, Crime,

Complain, Record and Users.

The Admin: is the overall boss as his functions were mainly to view all users,

Add users and Delete or Remove users, update Records etc.

The users were either log in to any of the other modules apart from the Admin

and either View Arrest, Complain about a crime etc.

This project was carried out between December 7th and January 26th. Here are

some codes from the sessionbean and JSP pages to prove the validity of the

project.

This is the Code from one of the JSP pages to be precise the Admin

home page

Fig.3.2.1 code for the security data base, one of the JSP pages mainly the admin

home

<%--

Document : security2Homepage

Created on : Feb 5, 2013, 1:53:43 AM

Author : Steve

--%>

31 | P a g e

Page 32: my It report

<%@page contentType="text/html" pageEncoding="UTF-8"%>

<%@page import =" java.io.IOException"%>

<%@page import =" java.io.PrintWriter"%>

<%@page import ="java.util.logging.Level"%>

<%@page import ="java.util.logging.Logger"%>

<%@page import=" javax.ejb.CreateException"%>

<%@page import=" javax.naming.Context"%>

<%@page import=" javax.naming.InitialContext"%>

<%@page import=" javax.naming.NamingException"%>

<%@page import=" javax.servlet.ServletException"%>

<%@page import=" javax.servlet.http.HttpServlet"%>

<%@page import ="javax.servlet.http.HttpServletRequest"%>

<%@page import ="javax.servlet.http.HttpServletResponse"%>

<%@page import =" security2Session.security2SessionLocal"%>

<%@page import ="

security2Session.security2SessionLocalHome"%>

<%

security2SessionLocal stl = null;

String txt = null;

%>

<%

try {

32 | P a g e

Page 33: my It report

Context c = new InitialContext();

security2SessionLocalHome rv =

(security2SessionLocalHome)

c.lookup("java:comp/env/security2SessionBean");

stl = rv.create();

} catch (NamingException ne) {}

%>

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"

"http://www.w3.org/TR/html4/loose.dtd">

<html>

<head>

<meta http-equiv="Content-Type" content="text/html;

charset=UTF-8">

<title>JSP Page</title>

<style type="text/css">

<!--

#apDiv1 {

position:absolute;

width:100%;

height:85px;

z-index:1;

background-color:#FF0000

}

.style1 {

33 | P a g e

Page 34: my It report

font-size: 36px;

font-weight: bold;

color: #FFFFFF;

}

#apDiv2 {

position:absolute;

width:250px;

height:190px;

z-index:2;

left: 11px;

top: 102px;

background-color:#FFFF00

}

.style2 {

font-family: "Arial Black";

font-style: italic;

}

#apDiv3 {

position:absolute;

width:707px;

height:190px;

z-index:1;

left: 251px;

34 | P a g e

Page 35: my It report

top: 1px;

background-color:#00FFFF

}

.style3 {

font-size: 24px;

font-style: italic;

}

-->

</style>

</head>

<body>

<div id="apDiv1">

<p align="center" class="style1">THIS IS THE BENUE STATE

SECURITY HOME PAGE</p>

</div>

<div id="apDiv2">

<a href="allAdminview.jsp">Alladminview</a>

<a href="addUser.jsp">addUser</a>

<a href="removeuser.jsp">removeuser</a>

<a href="">viewAllArrest</a>

<table width="100%" border="3" cellspacing="3"

cellpadding="2">

<tr>

35 | P a g e

Page 36: my It report

<td valign="middle" bgcolor="#00FFFF"><div

align="center"><a

href="secu2Validation.jsp"><strong>ADMINSTRATOR</strong></a></

div></td>

</tr> <tr>

<td bgcolor="#99CC00"><div align="center"><a

href="secu2Validation.jsp"><strong>USERS</strong></a></div></t

d>

</tr> <tr>

<td bgcolor="#FF0000"><div align="center"

class="style2">ABOUT US</div></td>

</tr> <tr>

<td bgcolor="#FF00FF"><div align="center"

class="style2">CONTACT US</div></td>

</tr>

</table>

<div id="apDiv3">

<p align="center" class="style3">PLEASE DO NOT BE ALFRED

TO REPORT SUSPICIOUS MOVEMENT</p>

</div>

</div>

</body>

</html>

3.3 Implementation of small Office Network

Using the following steps, I was able to implement a small office Network at

Rehoboth ICT Academy on the 25th January, 2013 as it is a custom to carry out

36 | P a g e

Page 37: my It report

a practical task at the end of every major project work. Materials used were,

computers, internet access and Ethernet cables.

Firstly the Cat 5 (Category 5 network cables were connected to the R J 45

(Register Jack)) which is used for networking between systems. This connection

were done for a cross connection which is normally supported for different

computers while the straight is done for computer to computer.

Step 1: I clicked on the start my Network places under “Network Task” clicked

on set up a “Home or small Office Network” and this took me to the Network

set up wizard. The wizard helps me to set up my computer to run on my

network where I could share and internet connections, share files and folders

and a printer.

Step 2: I clicked next and made sure I had done everything on the “checklist”

i.e. modem installed, computers and printers turned on and above all connection

to the internet. I clicked next and selected the way I had wanted my connections

to the internet to appear, clicking next took me to computer description, with

options and the computer name was already populated.

Step 3: I clicked next, selected a work group name which by default was

steveHome, but I changed it to office, I clicked next again for file and sharing of

printers turned on. I clicked next again, applied Network settings which took me

to where I wanted to save the information which I considered saving to a note

pad.

Step 4: I clicked next and got a “please wait while the wizard configures this

computer for small office Network this process will take a few minutes

message”. The Network setup wizard was run once for each of the computer

that was found on my Network. TIP to run the wizard on computers that are not

window XP OS, you can use the window XP CD or a network set up Disk you

will then be asked “what do you want to do?” at this point, you can create a

37 | P a g e

Page 38: my It report

Network set up Disk, use the disk you have, use Windows XP CD, or click

finish. No need to run wizard on other computers Click Finish.

Step 5: A display message appear, that I had successfully set up this computer

for a small office Network. To see other computers on my Network, I clicked

start, and then clicked My Network Places, I clicked finish and I was prompted

with a message restart your computer, I restarted it and saw my Network under

“My Network Places” with an icon/picture of a networking cable below the

folder.

3.4 Working conditions.

The working conditions at Rehoboth ICT Academy included

* Crowdedness: At Rehoboth ICT academy since we were working as a team

most of our general practical work were carried out in crowded environment as

we were always divided into smaller factions of five persons per each group. in

terms of project given to us, it was in a student’s interest to either join a

particular group or carry out his project independent of other groups.

* Paid allowances: allowances were not paid to any of the students that were

on industrial training at Rehoboth ICT Academy either by the chief executive or

by any individual groups.

* Working Days/Hours: the working days at Rehoboth ICT Academy were

generally same as in the normal working days of the week that is Mondays

through Fridays every week we had our normal hours of 9:00 am to 2:00pm.

3.5 Responsibilty given to me

As an IT student at Rehoboth ICT academy I was given the responsibility of

organising my colleagues in conduct and information dissemination.

38 | P a g e

Page 39: my It report

I had always handled this responsibility by making sure all and sundry were

carried along throughout our stay at Rehoboth ICT Academy.

3.6 Observed Organisations Deficiencies.

As it is, in every organisation there exist some lapses, Rehoboth ICT academy

too is not left out the organisation too has a major challenge of facilities such as

computer sets ,internet services and power fluctuation as the number of students

had outweigh this facilities on ground.

3.7 Attractions

Attractions at Rehoboth ICT Academy are too numerous to mention as to most

of us that got to be attached to this had a good reason to smile, this is simply

because if not all then almost all facets of the computer must know functions

were touched.

39 | P a g e

Page 40: my It report

CHAPTER FOUR

Conclusion

I have learnt so much in the course of my industrial work experience at REHOBOTH ICT ACADEMY. The experience gathered will help me be self reliance and above all make me do additional jobs in computer science. The (S.I.W.E.S) scheme has helped me a lot to be self confident.

40 | P a g e