Tuesday, May 18, 2010

Seiwes/I.T Report on Internet & Networking

Student Industrial Work Experience Report


Held in


SKY INFORMATION CENTRE
Opp. Lautech Car Park, Stadium, Ogbomoso, Oyo State.

By

Ojo Joshua Oluwadamilola
(ND/08/COM/FT/***)

Submitted to the department of ******** *******,
K**** S**** Polytechnic, I*****




(September 21-December 21 2009)







ACKNOWLEDGEMENTS

With the deepest gratitude I wish to thank the Almighty God for the grace and enablement he gave me to be able to compile this report, glory be to God.
I would also like to acknowledge and express my gratitude to every person who has come into my life and inspired, touched, and illuminated me through their presence.
I would like to acknowledge and express my gratitude to the following people for their magnificent support and contributions to my journey and to the creation of this I.T report, for generously sharing there love, money, ideas, in lieu of this I pay homage to my parents Engr. & Dns. Rotimi Ojo for giving me a good education right from my childhood.
Also, my family for their magnificent support and contributions, my big uncle Chief J.O. Oladokun, Mr. Temidayo Abayomi Winner (Director Sky Infornation Centre, Ogbomoso), Mr. & Mrs. A. Ajala, Mr. & Mrs. M. Tilewa, Miss. Ojo Esther Oluwatoyin, Mr. Ojo Emmanuel Odunayo, Mr. Oladokun Bolutife, Oladokun Abimbola .O, Mr. Oladokun Enoch .T, Mr. Oladokun Theophilus .K.
Finally, I am grateful to my dear friends for there support in and out of school Mr. Taiwo Yemi Sanuel,Mr. Oyedeji Benjamen Oyedemi and Mr. Agunbiade Peter , and also to my dear classmates Mr. Aselebe Michael Oluwasegun, Mr. Raheem Akeem Ishola, Mr. Mohammad Taiwo, Mr. Ogungbinle Babatunde Sheriff, Miss. .. Olanike and Yetunde etc










CHAPTER ONE

INTRODUCTION AND HISTORY OF THE ORGANIZATION
Sky Information Centre, is an organization that deals with and organizes training for young computer students. The organization was established in February 2006 and since it establishment it has been a training centre for secondary school students and other institutions within it reach.
It has different sectors, that is different fields in areas of Information Communication Technology (I.C.T). It has well equip state of art experienced trainers and officers.
The aim of this organization is to contribute it quota to the development of the nation’s information technology. The organization is divided into five different departments


ORGANIZATIONAL CHART

THE DIRECTOR
THE MANAGER
I
SECRETARY
I
ADMIN - ACADEMICS- PUBLIC RELATION-ENGINEERING-PRODUCTION (Cashiers).
The organization is located along under G road, opposite Lautech car park, stadium area, ogbomoso, oyo state.





CHAPTER TWO

INTERNET DEFINITION
The Internet is a global system of interconnected governmental, academic, corporate, public, and private computer networks. It is based on the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research Projects Agency Network (ARPANET)


INTERNET CAFE
An internet café or cybercafé is a place where one can use a computer with Internet access, most for a fee, usually per hour or minute; sometimes one can have unmetered access with a pass for a day or month, etc also known as Bulk time.

COMPUTER NETWORKS
A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. Networks may be classified according to a wide variety of characteristics. This report provides a general overview of types and categories and also presents the basic components of a simple Local Area Network network.

ADVANTAGES OF A NETWORK
1. Facilitates Communication: By using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, telephony, video telephone calls, and videoconferencing etc.
2. Helps To Share Computer Hardwares Easily: In a networked environment, each computer on a network can access and use hardware on the network. Suppose several personal computers on a network each require the use of a laser printer. If the personal computers and a laser printer are connected to a network, each user can then access the laser printer on the network, as they need it.
3. Sharing files, data, and information: In a networked environment, any authorized user can access data and information stored on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks.
4. Sharing softwares: Users connected to a network can access application programs easily other computers on the network.


DISADVANTAGES OF A NETWORK

1. If a network file server develops a fault, then users may not be able to run application programs
2. A fault on the network can cause users to loose data (if the files being worked upon are not saved)
3. If the network stops operating, then it may not be possible to access various resources
4. It is difficult to make the system secure from hackers, novices or industrial espionage
5. Decisions on resource planning tend to become centralized, for example, what word processor is used, what printers are bought, e.t.c.
6. Networks that have grown with little thought can be inefficient in the long term.
As traffic increases on a network, the performance degrades unless it is designed properly
7. The larger the network becomes, the more difficult it is to manage.

8. If something goes wrong with the file server the whole network is unable to operate.
9. The technical skills needed to manage a network are much higher than working on a stand-alone computer.It would take a long time to install software applications on each computer - one at a time
10. It can be frustrating to print to a printer in another room - and then find after a long trek - that there is no paper in the printer!
11. Users may use up too much of the storage space and this may cause problems on the network
12. Users may use too much bandwidth - for example when listening to music files or watching video clips - preventing others from using the network facilities properly

TYPES OF COMPUTER NETWORKS
Common types of computer networks may be identified by their scale.
Computer network design can range from simple to very complex. Networking can be as simple as connecting two computers, or a computer and a printer, while more complex networks can involve the connection of millions of computers and devices. A brief outline of different computer network types:
1. Personal Area Network (PAN): The smallest type of network, a PAN simply involves connecting one person's computer to a number of devices or peripherals. Usually, all devices, such as printers, PDAs, and telephones, are within a few feet of the computer. A PAN can also refer to a connection to the internet.
2. Local Area Network (LAN): If you have a home network with two or more computers or you are connected to other computers at your workplace, then you are on a LAN. LANs are ideal for networking in a small geographical area and can either work with cables and hubs, or wirelessly. They allow for the speedy transfer of data up to 10Gbit/s. Most LANs are based on Ethernet technology. Wireless Local Area Networks are known as WLANs.
3. Metropolitan Area Network (MAN): A MAN usually consists of a number of interconnected LANs and WANs, but will not extend beyond the boundaries of a town, city, or metropolitan area.
4. Wide Area Network (WAN): The WAN is the next step up from the MAN because it can cross metropolitan or even national boundaries. The best known WAN is the internet and, like all WANs, it uses routers and public communication links to carry data. While the internet is open to all, many WANs are run by private companies and are restricted.
There are more network type, ranging from the Canpus Area Network (CAN), Desktop Area Network (DAN) to the much, much bigger Global Area Network (GAN). etc

NETWORK TOPOLOGY
In Computer Networking “topology” refers to the layout, architecture , shape, structure or design of the connected devices. Network Topologies can be physical or logical.
Computer network topologies can be categorized in the following categories: Bus, Star, Ring , Mesh, Tree etc. Hybrid networks are the complex networks, which can be built of two or more above mentioned topologies.
1. Bus Topology : Bus topology uses a common backbone to connect all the network devices in a network in a linear shape. A single cable functions as the shared communication medium for all the devices attached with this cable with an interface connector. The device, which wants to communicate send the broadcast message to all the devices attached with the shared cable but only the intended recipient actually accepts and process that message.
2. Ring Topology: In ring Network, every computer or devices has two adjacent neighbors for communication. In a ring network, all the communication messages travel in the same directory whether clockwise or anti clockwise. Any damage of the cable of any computer or device can result in the breakdown of the whole network. Ring topology now has become almost obsolete.
3. Star Topology: All the computers in the star topologies are connected to central devices like hub, switch or router. In the computer networking world the most commonly used topology in LAN is the star topology.
As compared to the bus topology, a star network requires more devices & cables to complete a network. The failure of each node or cable in a star network, won’t take down the entire network as compared to the Bus topology. However if the central connecting devices such as hub, switch or router fails due to any reason,then ultimately all the network can come down or collapse.

4. Tree Topology : Tree topology comprises of the multiple star topologies on a bus. Tree topologies integrate multiple star topologies together onto a bus. Only the hub devices can connect directly with the tree bus and each Hub functions as a root of a tree of the network devices. This bus/star/hybrid combination supports future expandability of the computer networks, much better than a bus or star.
Topologies are the important part of the network design theory. A better network can be built if you have the knowledge of these topologies and if you know the difference between each topology.
HOW TO SET UP A COMPUTER NETWORK
A network can be built using cables, wireless technology, or a combination of both. In this section I will like to use the Local Area Network i.e a network within a confine area e.g an office or a room as a case study. A LAN can be configured in a variety of ways as mentioned below:
1. Peer to Peer
2. Client/Server


In the Peer to Peer there is no centralized server and each computer acts as a workstation. Although, this section will be used to explain the Client-Server network configuration alone in order to save time.
In the client/server networking, there is a centralized server, which act as a domain controller and it provides the user authentication and other resources and privileges to the client computers. All the client computers are dependent on the server for the resources and services.
If you have more than one computer and are willing to set up a network connection to enable them share files, a printer, an internet connection, or other computer resources between them all then you just have to follow the steps bellow:
1. You need to determine the location of your computers, printer(s) and other devices to connect as well as network equipment needed.
2. Get a network adapter for each computer that does not already have one.Get Category 5e cables.
3. Get a network router or switch.
4. Plug it in! Now that you have all supplies necessary to create your network, you can begin installing it.
5. Provide unique computer names and same workgroup name to all the computers by:
a. Right click My Computer on your desktop and click Properties.
b. In the Network Identification or in the Computer name provide your unique computer and in the Workgroup provide the same workgroup name and click Ok.
c. You will be prompted to restart the computer.
You’re done.
6. Now you can share your files and folders with the other users in your home or office network


BASIC REQUIREMENTS TO SET UP A COMPUTER NETWORK
Setting up a computer network requires a little technical knowledge and requires some software and hardware tools. All networks are made up of basic hardware building blocks to interconnect network nodes. To set up a computer network, the following are important basic things required which include: Network Interface Cards (NICs), Bridges, Hubs, Switches, Routers and special Network softwares to manage the communication between them. In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable (most commonly Category 5 cable). Less common are microwave links (as in IEEE 802.12) or optical cable ("optical fiber"). An Ethernet card may also be required.

THE ETHERNET
Ethernet uses physical wiring to connect devices which is our case study in this report. Frequently deployed devices include hubs, switches, bridges and or routers. Wireless LAN technology is designed to connect devices without wiring. These devices use radio waves or infrared signals as a transmission medium.

NETWORK CABLE CRIMPING
Network cable crimping is a technical term that refers to the process of making an Ethernet cable used for connection. Materials and tool needed in this process include: RJ45 connectors, Cutter/ diag, RJ45 crimping tool, Ethernet cable/Network cable.

Rj45 Connectors Diag Rj45 Crimping Tool Ethernet Cable
There are basically two types of Network Cable viz: the straight cable and the cross cable.
THE STRAIGHT-THROUGH CABLE
The straight cable is normally used when you want to connect your computer/PC to a hub/switch/router. Now, lets go on with the steps on how to crimp/make your own Ethernet/network cable.
1. Use a diag, a scissor or a knife to cut the end of the cable in order to get a straight cut. 2. Now cut the outer rubber layer or also known as the jacket using the wire stripper and you will see four pairs of wires. Each pair has a solid and stripped color each of orange, green, brown, and blue.
2. After that, separate the wires and you will have eight individual wires.
3. Arrange nicely and to the correct sequence of the standard for understand the most.
4. Use a diag or cutter or scissor to cut the wires neatly in a straight line horizontally.
The color sequence to follow when the wire is facing you like the order below starting from the left, using the T-568B Straight-Through Ethernet Cable Standard as case study.
Both End 1 & 2 of Straight Cable will take this form
Stripped Orange,
Orange,
Stripped Green,
Blue,
Stripped Blue,
Green,
Stripped Brown,
Brown.

5. After you have arranged them properly then get one RJ45 plug with the latch side facing down and guide the wires into the plug.
6. Make sure each wire go in its own channel and push the wires as far as it would go.
7. With the wires pushed into the plug, fit the plug in the crimping slot.
8. Stable the cable with one hand and use the other hand to squeeze the crimping tool hard.
You will hear a click that indicates the plug is fasten onto the cable. And you are done with one side of the cable. Flip the cable around and start on the other end which would be assembled exactly the same for straight cable.
The TIA/EIA 568-A standard which was ratified in 1995, was replaced by the TIA/EIA 568-B standard in 2002 and has been updated since. Both standards define the T-568A and T-568B pin-outs for using Unshielded Twisted Pair cable and RJ-45 connectors for Ethernet connectivity. The standards and pin-out specification appear to be related and interchangeable, but are not the same and should not be used interchangeably.
T-568A Straight-Through Ethernet Cable T-568B Straight-Through Ethernet Cable


Both the T-568A and the T-568B standard Straight-Through cables are used most often as patch cords for your Ethernet connections.

THE CROSSOVER CABLE
If you require a cable to connect two Ethernet devices directly together without a hub or when you connect two hubs together, you will need to use a Crossover cable instead.
RJ-45 Crossover Ethernet Cable

A good way of remembering how to wire a Crossover Ethernet cable is to:
1. Wire one end using the T-568A standard and the other end using the T-568B standard or,
2. Another way of remembering the color coding is to simply switch the Green set of wires in place with the Orange set of wires. Specifically, switch the solid Green (G) with the solid Orange, and switch the green/white with the orange/white.
However, if you have to make a cross cable then you will have to follow the following color sequence.

End 1 of Cross Cable
(from left)
Stripped Orange,
Orange,
Stripped Green,
Blue,
Stripped Blue,
Green,
Stripped Brown,
Brown.

End 2 of Cross Cable
(from left)
Stripped Green,
Green,
Stripped Orange,
Stripped Brown,
Brown,
Orange,
Blue,
Stripped Blue,

After you have arranged the wires at both ends according to the sequence and crimped them, you will have your cross cable Completed.
POINTS TO NOTE ABOUT CRIMPING
1. A straight-thru cable has identical ends.
2. A crossover cable has different ends.
3. A straight-thru is used as a patch cord in Ethernet connections.
4. A crossover is used to connect two Ethernet devices without a hub or for connecting two hubs.
5. A crossover has one end with the Orange set of wires switched with the Green set.
6. Odd numbered pins are always striped, even numbered pins are always solid colored.
7. Looking at the RJ-45 with the clip facing away from you, Brown is always on the right, and pin 1 is on the left.
8. No more than 1/2" of the Ethernet cable should be untwisted otherwise it will be susceptible to crosstalk.
9. Do not deform, do not bend, do not stretch, do not staple, do not run parallel with power cables, and do not run Ethernet cables near noise inducing components.

BASIC THEORY



By looking at a T-568A UTP Ethernet straight-thru cable and an Ethernet crossover cable with a T-568B end, we see that the TX (transmitter) pins are connected to the corresponding RX (receiver) pins, plus to plus and minus to minus. You can also see that both the blue and brown wire pairs on pins 4, 5, 7, and 8 are not used in either standard.
What you may not realize is that, these same pins 4, 5, 7, and 8 are not used or required in 100BASE-TX as well. So why bother using these wires, well for one thing its simply easier to make a connection with all the wires grouped together. Otherwise you'll be spending time trying to fit those tiny little wires into each of the corresponding holes in the RJ-45 connector.
CONNECTION METHOD
Computer networks can be classified according to the hardware and software technology that is used to interconnect the individual devices in the network, such as optical fiber, Ethernet, Wireless LAN, HomePNA, Power line communication or G.hn.


CHAPTER THREE

GETTING CONNECTED TO THE INTERNET

Having known all these details about a computer network i.e how to set up a home or small office network, you need also to know how to connect the local area network to the internet. To do this you need to find an Internet service provider (ISP), and choose a connection type.
The first step in connecting to the Internet is to find an Internet service provider (ISP). The most important services offered by Internet Service Providers should include:
Internet access, instant messaging, online gaming, E-mail service, spam filtering that reduces, but does not eliminate, unwanted messages.

INTERNET CONNECTION TYPES

1. CABLE MODEMS: The best performing and most affordable option available to customers, most cable TV providers offer broadband Internet access.
2. DIGITAL SUSCRIBER LINE: An excellent choice for businesses, DSL typically offers better reliability than cable modems. However, DSL tends to be more expensive than cable modems for similar levels of service.
3. DIAL-UP: The slowest method of connecting to the Internet, dial-up enables you to connect to the Internet using your existing phone lines. Dial-up is convenient because it is available to any location with a phone. However, slow performance makes using the Internet frustrating.
4. SATELLITE: Satellite broadband services provide high-speed Internet access to any location with a clear view of the sky. The cost of satellite services is significantly higher than other services. While you can transfer large files quickly with satellite, browsing the Web or playing online games can seem slower than with dial-up because of the delay caused by sending signals to and from satellites.

INTERNET PROTOCOL
Discussions on computer network or the internet can never be complete without talking about the Internet Protocol.
The Internet Protocol (IP) is a protocol used for communicating data across a packet-switched internetwork using the Internet Protocol Suite, also referred to as TCP/IP.

INTERNET CONNECTION SHARING
To use Internet Connection Sharing to share your Internet connection, the host computer must have one network adapter that is configured to connect to the internal network to be named LAN , and one network adapter or modem that is configured to connect to the Internet to be named WAN.
On the host computer (Server System), follow these steps to share the Internet connection:
1. Log on to the host computer as Administrator or as Owner.
2. Click Start, and then click Control Panel.
3. Click Network and Internet Connections.
4. Click Network Connections.
5. Right-click the connection that you use to connect to the Internet. For example, if you connect to the Internet by using a modem, right-click the connection that you want under Dial-up.
6. Click Properties.
7. Click the Advanced tab.
8. Under Internet Connection Sharing, select the Allow other network users to connect through this computer's Internet connection check box.
9. If you are sharing a dial-up Internet connection, select the Establish a dial-up connection whenever a computer on my network attempts to access the Internet check box if you want to permit your computer to automatically connect to the Internet.
10. Click OK. You receive the following message:
When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address 192.168.0.1. Your computer may lose connectivity with other computers on your network. If these other computers have static IP addresses, it is a good idea to set them to obtain their IP addresses automatically. Are you sure you want to enable Internet Connection Sharing?
11. Click Yes.
The connection to the Internet is shared to other computers on the local area network (LAN). The network adapter that is connected to the LAN is configured with a static IP address of 192.168.0.1 and a subnet mask of 255.255.255.0.
12. Run the Network Setup Wizard on the other computers on the network.

BANDWIDTH
Internet bandwidth (the speed at which your computer can send and receive information) is measured in either Kbps (kilobits per second) or Mbps (megabits per second). If you are lucky enough to have multiple broadband options in your area, compare these factors:
1. DOWNSTREAM BANDWIDTH: This is the speed with which your computer can receive information from the Internet. The higher the downstream bandwidth, the faster your computer can display Web pages, transfer music, and download files.
2. UPDTREAM BANDWIDTH: This is the amount of data your computer can send to the Internet. This isn't important if you just plan to read e-mail and surf the Web, because your computer only needs to send a small request in order to receive a large Web page or e-mail. However, if you're into online gaming or you want to send large

WHAT IS A COMPUTER WORKGROUP
In computer networking, a workgroup is a collection of computers on a local area network (LAN) that share common resources and responsibilities. Workgroups provide easy sharing of files, printers and other network resources. Being a peer-to-peer (P2P) network design, each workgroup computer may both share and access resources if configured to do so.
The Microsoft Windows family of operating systems supports assigning of computers to named workgroups. Macintosh networks offer a similiar capability through the use of AppleTalk zones. The Open Source software package Samba allows Unix and Linux systems to join existing Windows workgroups.
Workgroups are designed for small LANs in homes, schools, and small businesses. A Windows Workgroup, for example, functions best with 15 or fewer computers. As the number of computers in a workgroup grows, workgroup LANs eventually become too difficult to administer and should be replaced with alternative solutions like domains or other client/server approaches
WEB BROWSERS
A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content. Hyperlinks present in resources enable users to easily navigate their browsers to related resources.Although browsers are primarily intended to access the World Wide Web, they can also be used to access information provided by Web servers in private networks or files in file systems. Some browsers can be also used to save information resources to file systems.
Examples of common web browsers are: Internet Explorer, Mozilla Firefox, Opera, Safari, Google Chrome etc.

SECURITY MEASURES IN AN INTERNET CAFE

It is of great importance to have a comprehensive security system measure in place in a cyber cafe to ensure that people do not have access to other people’s personal data and allow people to do business across the internet on any computer in a trusted manner. The following are some of the devices that can be used as a security in a cyber cafe operation.
1. THE USE OF PASSWORD AND USER NAME: The use of users name and passwords will only give access to an authorized customers for a specific period of time. The use of long passwords that will be difficult to guess is recommended in order to maximize security.
2. SPYWARE: Spyware is a general term used to describe software that performs certain behaviors, generally without appropriately obtaining your consent first, such as
Advertising,collection of personal information, changing the configuration of your computer.
Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information. It can be used as personnel supervision on the Internet due to the nature of work performs by some workers.
Spywares can also be used as a tool used by the cyber café operator to monitor people’s activities while browsing on the Internet.

9. EARLYON CAFÉ CENTRA: This is an Internet café software designed to monitor and manage all computers totally or individually on the network in an internet cafe.
CafeCentra’s client-server architecture ensures that billing is central and administered also in real-time. It allows account creation for prospective client users in advance on the server in bulk and the printing of tickets with account information for users. Accounts created on the server can be used on any computer running the client software on the local area network on which the server has been installed.
Server administrators can monitor computers on which the client software is running in real-time and remotely administer such actions as remote PC Rebooting, Shutdown, Active User Logout and Pausing of Client and information about other applications running on the client computers.
5. ANTIVIRUS: Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.
A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware for which no signature exists yet.
DEEPFREEZE DOFTWARE: Deep Freeze, by Faronics, is an application available for the Microsoft Windows, Mac OS X, and SUSE Linux operating systems which allows system administrators to protect the core operating system and configuration files on a workstation or server by restoring a computer back to its original configuration each time the computer restarts.[1]
Deep Freeze is a kernel-level driver that protects hard drive integrity by redirecting information being written to the hard drive or partition, leaving the original data intact. This redirected information is no longer referenced once the computer is restarted, thus restoring the system to its original state at the disk sector level. This allows users to make 'virtual' changes to the system, giving them the appearance that they can modify core files or even delete them, and even make the system unusable to themselves, but upon reboot the originally configured 'frozen' state of the operating system is restored.
To make changes, a system administrator must 'thaw' the protected partition by disabling Deep Freeze, make any needed changes, and then 'freeze' it again by re-enabling Deep Freeze. These changes become part of the protected partition and will be maintained after restarts. 'Freezing' and 'thawing' can be done at the workstation level or remotely via the Deep Freeze Enterprise Console.
Deep Freeze can also protect a computer from harmful malware as it automatically deletes downloaded files when the computer is restarted.
Deep Freeze only protects workstations in a "fresh-booted" state. That is, Deep Freeze prevents permanent tampering with protected hard drives/partitions across reboots, but user activity between restarts is not limited by the program. For example, Deep Freeze does not prevent application installation; a user could install a modified version of a Web browser (but seemingly harmless to the unknowing user) designed to secretly send users' passwords to a server connected to the Internet. As a workaround, Deep Freeze can be configured to restart after user logout, shutdown after a chosen period of inactivity, or restart/shutdown at a scheduled time in an attempt to ensure that no such installations are retained (as rebooting the system returns the system to its original, unmodified state).



TROUBLESHOOTING GENERAL NETWORK CONNECTIVITY PROBLEMS
1. HOW TO RESOLVE “LIMITED OR NO CONNECTIVITY PROBLEM”: When attempting to set up or make network connections on a Windows computer, you may encounter a Limited Or No Connectivity error message similar to the following: Limited or no connectivity; The connection has limited or no connectivity. You might not be unable to access the Internet or some network resources. This message can result from any of several different technical glitches or configuration problems. Follow these steps to resolve Limited Or No Connectivity errors in Windows.
(A.) Determine whether your network access is functioning properly (that you can reach local network resources and the Internet). If you are using a broadband Internet and Windows XP Service Pack 2, this message is often a false error report.

(B.) If your network access is non-functional, then continue to the following steps:
1. If your computer connects to the network through a broadband router , resetting (powering off and on) the router may resolve the issue. If not using a broadband router, or if resetting your router only temporarily resolves the issue and the error message re-appears later, continue to the following steps.
2. If connecting to your network using Wi-Fi and using wireless security, your WEP or other security key may not be set properly. Check the wireless security configuration on your computer's network adapter and update if it necessary.
3. If connecting to your network using an Ethernet cable, your cable might have failed. Temporarily replace your network cable with a new one to determine whether this resolves the issue.
4. If using a broadband router and DHCP on your network, check your computer's IP address to verify it is valid and not a private address that starts with 169.254. An invalid address of the form 169.254.x.x signifies your computer's inability to obtain a usable IP address from your router.

To resolve DHCP configuration problems, proceed to the following steps.
5. Reboot your computer, router (if present) and broadband modem together, then re-test your connection.
6. If your connection remains non-functional, run the Windows Network Repair utility on your computer.
7. If your connection remains non-functional, update your router settings to change from dynamic to static IP address configuration, and set an IP address on the computer appropriately.
8. If your connection remains non-functional, unplug your router and connect the computer directly to your broadband modem. If this configuration is functional, contact the manufacturer of your router for additional support.
9. If your computer is connecting to your network directly through a broadband modem, or if your Internet access remains non-functional after following the instructions above, contact your Internet Service provider for support.
2. HOW TO RESOLVE DUPLICATE NAME EXISTS ON THE NETWORK
After starting up a Microsoft Windows computer connected to a local network, you may see the error message "Duplicate name exists." What does this error message signify, and how can you resolve it?
The "Duplicate name exists" error indicates the (NetBIOS) name of the Windows computer conflicts with some other name on the network. Most commonly, this happens when another Windows computer on the local network uses the same name. This error can also occur when one of the connected Windows workgroups has the same name as the computer.
"Duplicate name exists" errors prevent a Windows computer from joining the network. The computer will start up and function in an offline mode only. To resolve this error, simply change the name of the computer to one that is not used by other local computers (or Windows workgroups), then reboot.
Note that a network administrator should also verify the Windows Internet Naming Service (WINS) is up to date. In rare instances, "Duplicate name exists" is a false error reported when old information is stored in the WINS database.
3. FIXING NETWORK CABLE UMPLUGED ERRORA IN WINDOWS
If your network is not functioning properly, you may see "A Network Cable Is Unplugged" messages appear repeatedly on the Windows desktop. Messages may pop up on the screen once every few days or even once every few minutes depending on the nature of the problem. This can occur even if you are using a Wi-Fi wireless network. How can this problem be fixed?
Several possible causes of "A Network Cable Is Unplugged" messages exist. The error message appears on a computer when an installed Ethernet adapter is seeking to make a network connection.
Try the following tips to resolve your problem:
• Disable the Ethernet network adapter if you are not using it. This applies, for example, when running a WiFi home network with computers that have built-in Ethernet adapters. To disable the adapter, double-click the small Network Cable Unplugged error window and choose the Disable option.
• Check both ends of the Ethernet cable connected to the adapter to ensure they are not loose.
• Replace the Ethernet cable with a different one to verify the cable is not damaged.
• Update the network adapter driver software from the manufacturer's Web site.
• Change the Link Speed and Duplex settings (using Device Manager) to use "100 Mbps Full Duplex" or "10 Mbps Full Duplex" instead of Auto Detect.
• Replace the Ethernet network adapter if it is a removable PCI or PCMCIA card. First remove and re-insert the existing adapter hardware to verify the card is connected properly. If necessary, also replace it with a different card.
• The device your Ethernet adapter is connected to, such as a broadband modem or network router may be malfunctioning. Troubleshoot these devices as needed


3. HOW TO RESOLVE I.P CONFLICT ON A NETWORK
An IP address conflict occurs when two computers on a LAN (local area network) or the Internet have been assigned the same IP address. IP conflicts between two computers normally render either one or both of them unusable for network operations.

This problem, though rare, can occur because of the following reasons:
1. Two computers are assigned the same static IP addresses
2. One computer is assigned a static IP address that falls into the DHCP range for the local network and the same address is assigned to a computer by the DHCP server
3. A laptop is put into sleep mode and then turned on while connected to another network that uses the same IP address
4. If you have multiple network adapters, it is possible for a to have an IP address conflict with itself .
5. Often this occurs when the network or part of a network is not using DHCP to automatically assign IP addresses to computers, and something on the network has been manually assigned the same IP address as you.
6. If your computer has DHCP enabled, often simply rebooting the computer allowing it to get a new address assigned to it will resolve the issue.
7. If you're not sure if you're using DHCP or are using a static IP address, either try to locate the computer or device using the IP address or manually change your IP address to something else. For example, if the address was 192.168.1.105 changing it to 192.168.1.112.

CONCLUTION
DEFINITION OF TERMS