DESIGN AND IMPLEMENTATION OF AN ON-LINE LAN KNOWLEDGE-BASED SYSTEM.
Click here to download our android mobile app to your phone for more materials and others
Note: our case study can be change to suit your desire location . we are here for your success.
ORDER NOW
COMPLETE MATERIAL COST N2,500 Or $10. FRESH PROJECT MATERIAL COST 50,000 NAIRA FOR UNDERGRADUATE, OTHERS 100,000 -200,000 NAIRA.
Account Name : Host Link Global Services Ltd
ACCOUNT NUMBER: 0138924237
Account Name: Chi E-Concept Int’l
Account Name: 3059320631
Foreign Transaction For Dollars Payment :
Bank Name: GTBank
Branch Location: Enugu State,Nigeria.
Account Name: Chi E-Concept Int’l
Account Number: 0117780667.
Swift Code: GTBINGLA
Dollar conversion rate for Naira is 175 per dollar.
Note: We accept bank transfer, ATM cash transfer , Online payment using your ATM , Western union bank transfer. We will respond to you anytime of the day.
OR
PAY ONLINE USING YOUR ATM CARD. IT IS SECURED AND RELIABLE.
CALL OUR CUSTOMERS CARE OKEKE CHIDI C ON : 08074466939,08063386834.
AFTER PAYMENT SEND YOUR PAYMENT DETAILS TO
08074466939 or 08063386834, YOUR PROJECT TITLE YOU WANT US TO SEND TO YOU, AMOUNT PAID, DEPOSITOR NAME, UR EMAIL ADDRESS,PAYMENT DATE. YOU WILL RECEIVE YOUR MATERIAL IN LESS THAN 1 HOURS ONCE WILL CONFIRM YOUR PAYMENT.
WE HAVE SECURITY IN OUR BUSINESS.
MONEY BACK GUARANTEE
ABSTRACT
The project is designed specially for those hardware engineers/computer scientist who are just commerce their carries in the field of installation and maintenance of computer network. While the theories are meant for commercial applicant that are interested in using the programme technique.
Further more, in this project design, the principle of different type of network configuration are been highlighted. And emphasis are made on the installation and maintenance techniques. Finally, appropriate information are been acquired from human experts in the field of network.
ORGANISATION OF THE WORK
This study is organized into chapters. And each chapter handles specific subject area explicitly. The chapter are further broken down into smaller unit (subheading) to enable a better understanding of the study. The further arrangements is shown in the table of content.
TABLE OF CONTENT
CHAPTER ONE: INTRODUCTION
1.1 STATEMENT OF PROBLEM
1.2 PURPOSE OF STUDY
1.3 AIMS AND OBJECTIVES
1.4 SCOPE AND PRELIMITATION
1.5 LIMITATIONS OR CONSTRAINTS
1.6 ASSUMPTIONS
1.7 DEFINITION OF TERMS
CHAPTER TWO
LITERATURE REVIEW
HIERARCHICAL TOPOLOGY
STARTOPOLOGY
BUSTOPOLPGY
RING NETWORK
BNC CONNECTOR
CHAPTER THREE
3.0 DESCRIPTION AND ANALYSIS OF EXISTING SYSTEM
3.1 FACT FINDINGS METHOD USED
3.2 OBJECTIVES OF THE EXISTING SYSTEM
3.3 INOUT ANALYSIS
3.4 PROCESS ANALYSIS
3.5 OUTPUT ANALYSIS
3.6 PROBLEMS OF THE EXISTING SYSTEM
3.7 JUSTIFICATION OF THE NEW SYSTEM
CHAPTER FOUR
4.1 DESIGN OF THE NEW SYSTEM OUTPUT SPECIFICATION AND DESIGN
4.2 FILE DESIGN
4.3 PROCEDURE CHART
4.4 SYSTEM FLOW CHAR
4.5 SYSTEM REQUIREMENT
CHAPTER FIVE
5.1 IMPLEMENTATION
5.2 PROGRAM DESIGN
5.3 PROGRAM FLOW CHART
5.4 PSEUDOCODES
5.5 SOURCE PROGRAM
5.6 TEST RUN
CHAPTER SIX
DOCUMENTATION
CHAPTER SEVEN
7.1 RECOMMENDATION
7.2 CONCLUSION
APPENDICES/REFERENCE
CHAPTER ONE
INTRODUCTION
How is computer and other related devices actually able to send information across data communication lines. The answer to this is the installation and maintenance of computer network. Furthermore, installation and maintenance of computer network is the glue that holds all data in the exact form, the data is to be transfer from one place to another. While the procedures for installation of computer methods are embodies in this project.
STATEMENT OF THE PROBLE
Computer hardware may fail, telephone line may fail and more likely, the computer software may have bugs that make the network stop working. How does the airlines clerk sell tickets when the computer is down? How can the pilot send a message across if the network fails? How do you get your electronic mail, pay bills, get news, if you become dependent on computer networks that sometimes fails. If you put a shaved database, you want to be sure that it will not disappear or be tampered with. It you can use home computer raid your account and toil will your money?
A company that puts all its important data in line runs the risk to go out of business if that information is boss or incorrect.
Furthermore, support the owners of a saved data based want only certain people to use it one way to limit use, is to give a password to those people alone, that will have access to it and before opening the data base, the computer will ask the user to enter a password.
Password protection is not parted, though if someone finds out your password and use it, the computer will not know that such password is been used illegally by such person.
Finally, inability of the computer scientist to observe appropriate procedure in connection during installation poses treat to them, which however may lead to damage of the computer and cards.
PURPOSE OF THE STUDY
The purpose of the study is to design a system which shall render an assistance to the computer scientist during the installation and maintenance of a compute network. Moreover, proper installation of various components of the networks are achieved and the prevention and corrective maintenance are properly added.