ABSTRACT
This program is designed specially for those hardware engineers/computer scientists who are just in the field of installation and maintenance of computer network.
While the theories are meant for commercial applicants who are interested in using the programme technique. Furthermore, in this project, the principal of different types of network configuration are being highlighted. And emphasis is being made on the installation and maintenance techniques. Finally appropriate information is being required from human experts in the field of network.
ORGANIZATION OF WORK
This project work is primarily designed to give an insight to Online Local Area Network Knowledge Based System.
Chapter one talks about introduction to Online Local Area Network Knowledge Based System, study of problem and objectives as well as definition of the scope.
Chapter two comprises the literature review. Chapter three gives the detailed information about the existing (old) system, while chapter four and five deals with the design and implantation of new system.
Chapter six document the project work, while chapter seven summaries, conclusion and suggestions were made.
TABLE OF CONTENT
Title page i
Certification ii
Approval iii
Dedication iv
Acknowledgement v
Abstract vi
Organization of work vii
Table of content viii
CHAPTER ONE
1.0 Introduction 1
1.1 Statement of problem 2
1.2 Aims and objectives 2
1.3 Purpose of study 3
1.4 Significant of study 3
1.5 Scope/Delimitations 4
1.6 Limitations/Constraints 4
1.7 Assumption of study 5
1.8 Definition of terms 5
CHAPTER TWO
2.0 Literature review 6
CHAPTER THREE
3.0 Description and analysis of the existing system 9
3.1 Fact-finding method/ methodology 9
3.2 Organisational Structure/Organogram 10
3.3 Objectives of the existing system 10
3.4 Input, Process, and Output Analysis 11
3.4.1 Input Analysis 11
3.4.2 Process Analysis 11
3,4.3 Output Analysis 11
3.5 Information Flow diagram 12
3.6 Problems of the existing system 12
3.7 Justification of the new system 13
CHAPTER FOUR
4.0 Design of the new system 14
4.1 Design Standard 14
4.2 Output specification and design 14
4.3 Input specification and design 14
4.3.1 File design 15
4.4 Procedure chart 16
4.5 Systems flowchart 17
4.6 System requirements 18
4.6.1 Hardware Requirements 18
4.6.2 Software Requirements 18
4.6.3 Operational Requirements 18
4.6.4 Personnel Requirements 18
CHAPTER FIVE
5.0 Implementation 19
5.1 Design Standard 19
5.2 Program design 20
5.2.1 Program Flowchart 20
5.2.2 Pseudo code 24
5.3 Coding 25
5.4 Test Data/Test Run 31
5.5 User Training – An overview 31
5.6 Cutover Process 31
CHAPTER SIX
6.0 Documentation 32
6.1 The user documentation 32
6.2 The programmer documentation 32
CHAPTER SEVEN
7.0 Recommendations, Summary and Conclusion 33
7.1 Recommendation 33
7.2 Summary 34
7.3 Conclusion 34
REFERENCES 35
BIBLIOGRAPHY
APPENDIX 36
SOURCE LISTING 36
LIST OF FIGURES 40
CHAPTER ONE
1.0 INTRODUCTION
How is computer and other related devices able to send information across data communication lines? The answer to this is the installation and maintenance of computer network is the glue that holds data in the exact form. The data is to be transferred from one place to another. While the procedures for installations are embodied in this project.
1.1 STATEMENT OF PROBLEM
Computer hardware may fail, telephone lines may fail and more likely the computer software may have bugs that could cause the network to stop working.
How does the airline clerk sell or work when the computer is down? How can the pilot send a message across when the network fails? How do you get your electronic mail? Pay bills; get news, if you are dependant on computer network that sometimes fails.
If you put a shared data base, you want to be sure that it will not disappear or be tampered with if you can use your home computer to read your account or toil with your money.
         A computer that puts all its important data in line runs the risk of going out of business if that information is lost or incorrect.
Furthermore, suppose the owners of a saved data want certain people to use it, one way to limit use is to give a password across to those people alone that will have access to it and before opening the data base, the computer will ask the user to enter a password pass word protection is not parted though if someone finds out your password and uses it to access your computer the computer will not know that the password has been used illegally by such person. Inability of the computer scientist to observe appropriate procedure in connection during installation poses threat to them which however may lead to damage of the computer and cards
1.2 AIMS AND OBJECTIVES
The aims and objectives of the study are as follows
To minimize cost; with maintenance, there is reduction of cost i.e. instead of spending more money in purchase of new equipment, the money can be used in the maintenance of the faulty equipment.
To reduce staff; with the introduction of computers, there is the possibility that the number of will reduce.to share file and resources at a given time; with computer networks, files and other peripherals can be shared at any given time as printer, scanner, and files to increase output; with computer networks, jobs that are scheduled for ten days can be done in three days and this will increase output the overall objectives of the local area net work is to connect the computer systems and devices in the same geographical area.