Sunday 11 December 2016

Life changing ICT certifications

  Yeah, add value to yourself by enrolling for any of these ICT certifications and your life would never remain the same again:
1. MCSE(A+) Microsoft Certified System Engineer: Able to use Microsoft 2000, Windows server and other windows server versions to design, implement and administer technology infrastructures.
2. Network(N+): N+ proves a technician's ability in managing, maintaining, troubleshooting, installing and configuring basic network infrastructures. 

3. ITIL(IT Infrastructure Library): expertise in technological management. Public and Private organization use the ITIL as compendium of IT operational best practices.
4. Security+: CompTIA security+ certification demonstrates knowledge of system security, access control 
organizational security. Helps companies to keep their platforms safe from cybersecurity threats.
5. CCNA(Cisco Certified Network Associates): competence in installing, configuring, run and troubleshoot routers and switched networks.Ability to configure wireless network and work on selected protocols is also included.
6. MCSA(Microsoft Certified System Administrator): expertise in system administration and troubleshooting networks that use the windows server operating environment.
 
It gladdens my heart when ever am permitted to share the surface, faint and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.   
 

Friday 9 December 2016

Various file formats

1. TBody files eg appendix, protect able files etc  
2. Executable files eg .exe .com etc  
3. Archived, Packed file eg .zip, .rar .ace, .tar, .jar etc  
4. Media files(movies/music) eg .mpg, .avi, .mp3, 3gp, mp4, VOB    
    etc
5. Document files eg .html, .php, .xml, xls, .ppt .pdf .doc .txt etc  
6. Images and Pictures files eg .jpg, .bmp, .gif, .png .jpeg etc  
7. .apk files for android apps
There is also .dll(dynamic link library) which is found mainly in the root folder of most application.


It gladdens my heart when ever am permitted to share the surface, faint and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.   

 

Power saving system in mobile phones

A Power management section in  mobile phones is designed to handle energy matters that is consumed by mobile phones. There are two main subsections in a phone power system.
1. The power distribution and switching section
2. Charging section
A power distribution section is designed to distribute desired voltages and currents to the other sections of the phone. This section takes power from the battery( which is commonly 3.6V) and converts or steps it down  to various volts like 2.8V, 1.8V, 1.6V, etc. While another steps it up the voltage to like 4.8V. This section is commonly designed around a power IC (Integrated Circuit) which is used to distribute and regulate the voltage used in other components.

It gladdens my heart when ever am permitted to share the surface, faint and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.   

Thursday 8 December 2016

Dynamic Host Configuration Protocol (DHCP)

Dynamic Host Configuration Protocol (DHCP) enables other computers in a home/office network to acquire IP adresses similar to that of the server. Most of the broadband routers have in built DHCP server. The DHCP server will automatically assign an IP address to all the computers in the network.
The DHCP server IP address must first be configure eg 192.168.1.1, 192.168.0.1 or 192.168.2.2. If there are multiple routers in the network, no two routers must must have similar DHCP server IP address or no two routers must be configure in the same network eg router 1 having an IP address of 192.168.1.1 and router 2 having similar IP address of 192.168.1.2. It can never work. The starting and ending IP addresses must be specified. The starting IP address starts from the next number after the DHCP server IP address i.e if the DHCP server IP is 192.168.1.1 then the starting IP will be 192.168.1.2 and the ending IP will be 192.168.1.254.
Also the lease time must be specified according to your requirement. Lease time is the length of time for the IP assigned to the computers. The lease time can be set starting from one 1 day upwards.

It gladdens my heart when ever am permitted to share the surface, faint and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.   

Wednesday 7 December 2016

Wireless G and N router configuration

Wireless routers are small devices plugged into a modem to create a personal password protected wireless network for a home or office computer network. This allows access to the internet from anywhere in a home or office without connecting the modem to the computer directly. A setup disc can be used to configure the router or it can also be configured using any web browser by filtering the correct default IP address.

Steps on how to configure a wireless router using a setup disc(Cisco Router as a Case Study)
Step 1: Plug one end of the internet cable into the yellow internet port on the Cisco router. Plug the other end into the modem
Step 2: Plug the power adapter into the Cisco router. Plug the other end into a nearby electrical outlet. The router lights up.
Step 3: Turn the computer on
Step 4: Insert the setup disc in the computer's Dvd ROM drive. A license agreement window for the router opens. Click "NEXT" and setup wizard will begin to run.
Step 5: Enter the username and password of a DSL network into the appropriate boxes in the setup wizard if prompted. Click "NEXT". The setup wizard completes the process of setting up the router's software and generates a wireless network name and password.
Step 6: Click ok on the congratulations window. Click "CLOSE" to exit the setup wizard and eject the disc.
 
It gladdens my heart when ever am permitted to share the surface, faint and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.   

Tuesday 6 December 2016

E-phoning with automobiles

A lot of people are still in doubt if really the whole idea about Internet of Things (IoT) is possible. Whereby physical objects like cars, houses e.t.c have network connectivity as well as humans.
If you find yourself in this category of the doubting Thomas, then gladly check out newer models cars that are already Internet of Things (IoT) compliant.
The Internet of Things feature of these cars is based on the M2M wireless technology which establishes a wireless communication between the car and mobile phone such that drivers could make and receive calls in and with the car while driving without coming in contact with their phones.
Yes, drivers can now make and receive calls comfortably while driving without fear of losing concentration because the conversation using Internet of Things (IoT) technology powered by M2M wireless configuration would make it seem as though the driver is dialoguing with somebody right beside him.
Isn't it wonderful?

It gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.     

Sunday 4 December 2016

Abnormalities in the electricity system in Nigeria

1. Everybody generating their own electricity through the use of generator sets. This is an abnormal situation that has come to stay in the country. Sometimes, I wonder how visitors i.e people coming into the country for the first time look at us. Immediately, they see a society that is not working in addition to under development, no matter what we have to offer them. This is indeed a shame and a very sad situation that we
all need to frown at. No country can witness any meaningful development without steady power supply. What about the noise and air pollution experienced as a result of using generators? This poses serious health hazard to all and sundry. It is very disheartening!

2. Provision of transformers, poles, electric cables etc by consumers. This is another abnormal situation that has crept into the Nigerian power sector of  today. Customers who want electricity in their communities are expected to provide all of these before they can have light. This is supposed to be the sole responsibility of the electricity agencies in the country be it NEPA, PHCN or EKEDC or what ever they call themselves. It is the in thing but yet, very abnormal.

3. Electricity supply in the country being crippled by weather conditions such as thunder, lightening, storm, rain, or even dryness. Yet another abnormality that ought not be. This is even a thing of pride to the electricity bodies. They give reasons of bad weather conditions as to why there is blackout in the country. In countries with efficient power supply system, no matter the weather conditions, electricity supply remains uninterrupted. I am a witness to this myself.   

4. Billing consumers on the platform estimated bill. Estimated billing would always be in favor of the electricity body. That is why most consumers are presented with crazy bills. They are billed what they did not consume. Even the prepaid meter of a thing has not been distributed evenly to consumers. Some have while some don't have. While some states install this meter for free other states demand for exorbitant sum of money that is beyond the common man outreach. All in the name of corruption.

It is a thing of joy and my pleasure sharing my thoughts, knowledge and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.      

Cross over cable networking of Pcs

Usually when you have just two systems in your office and you need them to share network resources like files, printers and other devices. You need not go through the rigorous task of getting a Lan switch or router. A simple crossover cable will do the magic.Just ensure that both systems have active and working network interface card. Here are the procedures:
Plug in network card into each system and then install network card driver for each of them.
Make a cross over cable using cat 5 and RJ 45 connectors. You can also purchase one if you do not have the know how for one.
Connect the cable to both computers' network card
Proceed to the network configuration. For window XP, go to my network places and click on view network connection in the left hand menu list. For other windows, locate the Lan icon and go to its properties. But this tutorial is basically for window XP users. So let us proceed:
Locate the Lan icon, right click on it and select the property window.
Go to TCP/IP configuration and click on it. The configuration platform will be displayed.
Assign network information to each computer's network card.
For example
Computer A
IP address: 192.168.1.1
Subnet mask: 255.255.255.0
Computer B
IP address: 192.168.1.2
Subnet mask: 255.255.255.0
Since both computers' IP addresses are of the same network hence the systems are network
For window XP setup network wizard to enable file and printer sharing.
For other operating systems, locate the network configuration page and check desired network settings as appropriate.
Then you are done!

It gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.      

Saturday 3 December 2016

MS-DOS is still very relevant

         
 MS-DOS is a command line interface that was created for IBM computers. It was gotten from 86-DOS that was developed by Tim Paterson. Currently, MS-DOS is obsolete but is still very useful in some areas like when difficulty is encountered in formatting a hard disk or memory card using normal windows application. Routers can be configure from DOS and it is a very useful tool for testing network connections through pinging. If the network is replying, then the connection is active while if it timed out, it means connection has not been established. To format a hard disk using DOS, do this:


  • Go to run and type cmd then enter. This takes you to the command prompt interface
  • Type the label of the disk you are about to format i.e d:, e: etc. This will take you to the disk path.
  • Then type format d: then enter as the case may be to start the formatting process. It will ask you if you want the volume dismounted (Y/N). Type Y for yes then enter to continue the process. It starts counting from 1% till it gets to 100% which signifies the completion of the process. Hence the disk is formatted.  
 
It gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.      

Friday 2 December 2016

Computer applications that turn impossibilities to possibilities

Here are some cool Pc applications that make the impossible possible:
1. Geek: It helps to remove or uninstall stubborn applications or programs that have refused to leave your Pc when you try to uninstall them using windows uninstall wizard probably because they are corrupt. Try out Geek today!
2. Bluestacks: It is use for running android apps on Pc. You can play your android games conveniently on your Pc when you install the Bluestacks app.
3. R studio: For recovering data from corrupted memory cards, Hard drives etc. Download and give it a trial.
4. Net monitor: Monitor what your employees are doing during working hours and discover those that are really working and those that are playing. It is an exciting Pc application. Give it a trial. Download now!
5. Photo joy: For exciting photo experience on Pc please give photo joy a trial. It has good picture mixing, superb photo screen savers, nice background, wonderful picture frames, amazing photo templates etc.Download now!
6.Android studio: Do you want to become an android programmer or develop android apps? Android studio gives you that very opportunity to become one. It is simpler and more flexible than eclipse. It makes use of gradle. It has dynamic sdk manager. Android studio AVD loads faster than that of eclipse because it uses Simple Blank Activity template. Try out android studio now!  
7.PHP: Ordinarily PHP means Personal Home Page. Hypertext Pre-processor is the technical name for PHP. PHP is a server based programing language use for website building. You want to become a web designer? Then give PHP a trial today. Download now!
8. File Recuva: It helps to recover permanently deleted file from you computer. With file recuva, recovery of lost files is assured.
9. Filezilla client: For very fast upload of your wordpress files for FTP connection. It performs upload faster and better than any file manager system provided by any hosting site. Give filezilla a trial!
10. Banner Design studio: Develop exciting web banners for your products and services advertisement using Banner Design studio and publish in various format like jpeg, Gif, Swf e.t.c. It is very dynamic and user friendly. Download Banner Design studio today for all your web banner needs. 

It gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.      

Wednesday 30 November 2016

Cabling standards and network connection rules

In Networking, Cat 5e cables which is the standard cable for networking systems is terminated in a manner so that it gives desired result. There are three different standard arrangement for Cat 5e cables namely:
Straight through cabling arrangement: which is otherwise represented by the code T568A + T568A or T568B + T568B i.e terminating both ends of the cable with the same color code arrangement.
                                                  Image result for straight through cable
Crossover cabling arrangement: which is otherwise represented by the code T568A + T568B i.e terminating the ends of the cable with different color code arrangement
                                                      
                                                   Image result for crossover cable
Rollover cabling arrangement: This arrangement has to do with turning or twisting a straight through or crossover cable arrangement sideways or upside down.
                                                     Image result for rollover cable
Ethernet connection rule for various devices can simply be summarized as: For unlike devices use straight through cable arrangement and for like devices use crossover cable arrangement i.e use crossover cable arrangement for:
Switch to Switch
Hub to Hub
Hub to Switch
Host to Host
Router to Router
AND Straight through arrangement for
Host to Hub
Host to Switch
Host to Router
Router to Switch
Router to Hub
It should however be noted that some new devices now have the ability to convert a straight through cable arrangement into crossover cable arrangement and so straight through cable can be used to connect same kinds of these devices. 

It gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.   

Monday 28 November 2016

10 most distinguished download sites

 The internet avails you the opportunity to download latest versions of all  computer and phone applications, games, drivers, music, videos e.t.c. Below are the most distinguished download sites you could try out.

1. www.filehippo.com

2. www.softonic.com

3. www.AllMyApps.com

4. www.goforfiles.com

5. www.cnetdownload.com

6. www.filebuzz.com

7. www.download32.com

8. www.fileguru.com

9. www.sourceforge.com

10.www.appisoft.net 

It gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.     

Sunday 27 November 2016

Automobile bumpers

The beauty of any car lies in its bumpers. Once the bumper is disfigured, the car automatically appears ugly. Automobile manufacturing companies are yet to come out with new innovations as regards to car bumpers that will be very rugged and able to withstand external forces to some extent.
The bumpers of the present day automobile are just too fragile for my likening. Just a small hit from the front or behind pulls out the bumper completely or better still disfigures it. I think bumpers should be designed to have a high level of tolerance to collision. Just an observation!

It is a thing of joy and pleasure for me sharing my knowledge and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.   

Saturday 26 November 2016

Quite alarming: The number of Generator sets needed to power telecoms mast in Nigeria

Why would telecommunications services both voice and data services not be expensive in Nigeria when compared with other parts of the world? When the cost of maintaining a mast or BTS is so alarming.
It is currently on record that the telecommunications operators in Nigeria, MTN, Airtel, Globacom, Etisalat have Base Transceiver Stations(BTS) amounting to 60,000 respectively nationwide. These BTSs are solely powered by generator sets. This means each Global System Mobile operator have at least 60,000 generators each. Can you beat that? Those who adjudged Nigeria as the most expensive country to do business are very correct. This is why voice and data services tariff are still on the high side in Nigeria when compared with what is obtainable in advanced countries. No thanks to Gencos and Discos for their inability to provide uninterrupted electricity supply.
The CDMA operators are also not left out in this plight. Multilinks, Helios Towers and IHS communications have 19,000 BTS respectively nationwide. These are definitely being powered by 19,000 generators for real. It is better imagined what these telecommunications companies go through to fuel these mast 24/7, 365 days. Kudos to those telecommunications operators still thriving despite this situation.

It gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.    

Thursday 24 November 2016

Stages of wireless security

Wireless security has evolved over time. Originally wireless security started with pre-shared key WEP. WEP is a very weak network and hackers can easily break into its encryption. Pre-shared keys is a system of security where you type in a key on the wireless access point and other users also have to type in that same key in order to gain access to the wireless network. From WEP wireless security evolved to:
Evolution 1: Pre-shared key WPA: The first evolution into pre-shared was the WPA security which was referred to as WPA 1. WPA 1 was like an interim solution that improved on the WEP security. It has a lot more better encryption system called TKIP. 
Then Evolution 2: WPA 1 and 802.1x authentication: It was an improvement on WPA 1 security. It uses username and password for encryption.
Finally Evolution 3: WPA 2 802.11i and 802.1x authentication: It became a standard that was widely supported and accepted by all. It uses AES encryption style. To use WPA 2 you must buy the required hardware that enables access to WPA 2 security domain.

It gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.    

Wednesday 23 November 2016

Carrier Sense Multiple Access/Collision Detection(CSMA/CD)

CSMA/CD is a set of rules or standard governing how you talk on an Ethernet network. Each words are explained thus:
Carrier: The network signal i.e there must be a network signal sent on Ethernet.
Sense: The ability to detect i.e the ability of all the Pcs connected to the same Ethernet to detect if there is carrier signal at a time.
Multiple Access: This means that all devices have equal access.
Collision: What happens if two devices are trying to detect the presence of a signal. They will end up sending impulses at the same time. Hence causing collision.
Detection: it has to do with how the computers in the network handle collision i.e how to are able to detect collision and then resend the data across the network.

For me, it gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.   

Monday 21 November 2016

Technical faults encountered by mobile phones

1. Key pad malfunctions or Key pad failure: This occurs when the key pads are no longer sensitive to touch. Common causes include excessive dust accumulation on pads, liquid such as water, oil, kerosene etc on the key pad sensitive area or as a result of  phone ageing.  
2. Insert Sim card or Sim card failure: It may be due to Sim card damage or phone is having RF problem
3. Ear piece or Mouth piece failure: Whenever you notice difficulty in hearing what your caller is saying or your caller cannot hear you clearly, your phone might be having ear piece or mouth piece problem. Changing them accordingly  can solve the problem or better still go for a headset.
4.Charging problem: Either the charging port or phone charger is bad. Replacing them accordingly might fix the problem
5. Signal problem: Signal problem are of three types:
             a. Network
             b. Long searching, No access.
             c. Weak and dropping signal. These problems are generally due to phone antenna fault. Modern phones of today have internal antenna which is quite very fragile and can become faulty at any time.
6. Water damage: Dropping your phone into a pool of water can cause permanent damage to it. This is popularly referred to as deadset phones.
7. Touch screen fault

For me, it gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.  

Leveraging technology to achieve industrialization

Any nation that has refused to make technology advancement a priority, her economy cannot grow and become industrialized.It is only when a nation embraces technology that her economy can move to the next level and thus become industrialized.
In Nigeria today, technology is still in slumber in all its ramifications. How can we become industrialized when every consumable in the country is being imported from china; Soap, tooth pick, pin, torch lights, cars, electronics, textiles e.t.c. Non of the aforementioned are manufactured here in Nigeria.
Most of these products/commodities can actually be manufactured here in Nigeria only if we become more sensitive to our immediate surroundings. Take tooth pick for instance. What does it take to manufacture tooth pick that we have not got in Nigeria? Yet we import tooth pick from China when we have abundant raw materials to channel its production course right here in Nigeria. Tooth pick can actually be manufactured from rafia, coconut or palm tree leaves with very little production principles involved. Insensitivity to things around us has made us remained where we are today.
The Nigerian factor also has not helped matters at all. People preferring imported products/commodities to locally manufactured ones. Local industries are dieing everyday because of lack of patronage. Some of the products/commodities we import from China, we actually had local industries producing them before. These industries are liquidated today because their products/commodities could not compete with their foreign counterparts.
We still have a very long way to go. But as it is said that, the journey of thousandth miles begins with a first step. It is never too late. If we must become industrialized we must begin by encouraging, appreciating and patronizing made in Nigeria products/commodities. We still have a lot of them around. Before we know it, other countries will place orders for them and gradually we are paving our way to earning foreign exchange from that particular product/commodity.
Let every Nigerian begin to look in wards today!

It is a thing of joy and pleasure for me sharing my knowledge and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.   

Sunday 20 November 2016

Computer Hard drive systems

The hard disk of a computer is the largest and permanent storage location of a computer. The operating system of any computer is loaded directly on to the hard disk and all other default files or folders are located in one place or the other in the hard disk.
Hard disk can be partitioned during the process of formatting and operating system installation. Therefore, after partitioning a hard disk the various partition can be categorized into root partition usually drive C:, recovery partition otherwise referred to as drive E: and the back up partition which can take from F:, G:, H:, and continues as the case may be. Drive D: in most cases is left for the CD/DVD ROM. Also created network hard drive usually called map drive network are normally labeled from Z:, Y:, X: and so on. In older computers with floppy disk drive, drive A: is usually set aside for floppy disk technology.
The root hard disk, drive C:, also referred to as the master record boot is where the operating system is loaded. Every other files and folders that make the computer work properly are saved in this drive. All installation of applications and software programs are also done on this drive.
Most contemporary computers have recovery hard disk. The recovery hard disk, drive E:, is the compartment where all default settings, system drivers and restore point are stored for ease of accessibility when needed.
The back up hard disk, drive F: downwards, serves as a supporting and saving grace tool whenever there is root hard disk failure i.e whenever drive C: fails. All files and folders saved in the back up hard drive can easily be retrieved whenever the root hard drive fails and needs to be formatted.
Hard disk technology has witness a lot of advancement. Hard disk technology started with the integrated device electronic (IDE) technology. With this technology, hard disk capacity ranging from 10GB, 20GB, 40GB, 80GB, 160GB and 250GB were developed.
The quest for larger storage capacity due to software advancement which the IDE technology could not withstand, the serial advance technology hard disk (SATA) was developed in order to increase the storage capacity of computers. SATA hard disk has storage capacities ranging from 80GB, 150GB, 250GB, 320GB, 500GB and even 1 terabyte.
Today, the world is talking about cloud storage technology as the new evolution in computer storage system. Cloud storage capacity is very vast and it is very handy, that gives it preference over IDE and SATA technology.  

For me, it gladdens my heart when ever am permitted to share the surface and minute knowledge that have about ICT with the rest of the world. Please endeavor to leave a comment below after reading this post. Also, subscribe to our mailing list so that you will be the first to know what is new on this blog. Scroll down to the bottom of this blog to view our subscriber's form.  

Saturday 19 November 2016

Technology for industrialization

Any nation that has refused to make technology advancement a priority, her economy cannot grow and become industrialized.It is only when a nation embraces technology that her economy can move to the next level and thus become industrialized.
In Nigeria today, technology is still in slumber in all its ramifications. How can we become industrialized when every consumable in the country is being imported from china; Soap, tooth pick, pin, torch lights, cars, electronics, textiles e.t.c. Non of the aforementioned are manufactured here in Nigeria.
Most of these products/commodities can actually be manufactured here in Nigeria only if we become more sensitive to our immediate surroundings. Take tooth pick for instance. What does it take to manufacture tooth pick that we have not got in Nigeria? Yet we import tooth pick from China when we have abundant raw materials to channel its production course right here in Nigeria. Tooth pick can actually be manufactured from rafia, coconut or palm tree leaves with very little production principles involved. Insensitivity to things around us has made us remained where we are today.
The Nigerian factor also has not helped matters at all. People preferring imported products/commodities to locally manufactured ones. Local industries are dieing everyday because of lack of patronage. Some of the products/commodities we import from China, we actually had local industries producing them before. These industries are liquidated today because their products/commodities could not compete with their foreign counterparts.
We still have a very long way to go. But as it is said that, the journey of thousandth miles begins with a first step. It is never too late. If we must become industrialized we must begin by encouraging, appreciating and patronizing made in Nigeria products/commodities. We still have a lot of them around. Before we know it, other countries will place orders for them and gradually we are paving our way to earning foreign exchange from that particular product/commodity.
Let every Nigerian begin to look in wards today!

It is a thing of joy and pleasure for me sharing my knowledge and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.    

Friday 18 November 2016

Address Resolution Protocol (ARP)

Address Resolution Protocol (ARP) is the conversion of IP address to physical address or Mac address. It is usually a broadcast message. Routers talk to each other and their computers using ARP. A router broadcast message to all port until the right port of host gets the message. The computers in a network do not speak directly to IP address but talk directly to Mac address.

It is a thing of joy and pleasure for me sharing my knowledge and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.   

Wednesday 16 November 2016

Internet connection is still very expensive in Nigeria when compared with other parts of the world

Despite the increasing population of Broadband operators in Nigeria, internet subscribers are still paying through their nose to access the internet in the country. In advanced countries like the United States of America, the United Kingdom, Japan e.t.c, internet service is readily available to all homes at cheap and affordable prices with various data plan ranging from limited to unlimited data usage.
This is not the case in Nigeria. Most internet service providers(ISPs)/Telecoms operators provide mainly limited internet data plan. Those ISPs/Telecoms operators that still offer unlimited data plan placed their tariff on a very high side that it is barely affordable by the common man. The most hit by this policy are those that require heavy data usage for their jobs. They end up spending double or triple the amount they ought to have spent for internet service in a month. Why should an ISP/Telecoms operator sell usage cap rather than the period of usage? When you subscribe you are told that your data will last for a period of one month but after one or two weeks, the data is completely exhausted. To continue active internet proceedings, you must subscribe anew.
Downloads and updates have become luxuries you dear not venture into. Viewing and playing online videos and music on youtube or other sites have become a thing of the past in Nigeria. It is a well known fact that most recent applications and operating systems require constant updating for proper operation. What about antivirus softwares? Most installed antivirus softwares need constant updating in order to continue to protect the system from online attackers like virus, worms, trojans and malwares which might eventually cause severe damages to the Pc. Downloads we know is an inevitable process when online. Most packages and applications online require downloading before they can run or be used. You must think twice before you download in Nigeria. After downloading some of these software programs you might need to update them to enjoy there complete features.
People that do internet related businesses are not left out in this ordeal. Using limited internet data plan for a business is not profit oriented at all. Many internet related businesses have died because of lack of unlimited data plan.
We therefore call upon the Nigerian government and the Nigeria Communications Commission (NCC) to come to our aid and license an ISP/Telecoms operator that will provide fast, cheap and affordable unlimited internet service to all and sundry. We cannot continue like this any more.
Information, Educative books, Videos, Music, Pictures, Antivirus software, Applications all require heavy data in order to enjoy them. Excluding all these from the internet makes the internet not worth while and very boring.       

It is my pleasure sharing my thought, knowledge and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the mailing list form and get updates through emails. Not forgetting to leave a comment 

Monday 14 November 2016

Economic recession: Businesses are under pressure

In this time of economic recession, government need to put some basic amenities like constant supply of electricity in place in order to reduce the pressure on most businesses in the country. Many businesses in the country are on the verge of collapsing and down sizing seriously in order to reduce cost, especially those that are power driven 
For businesses that are power driven to thrive in this recession period, there must be provision of steady and constant supply of electricity to sustain the business process. Many businesses in the country today are power dependent. The media, oil and gas sector, telecommunications sector, banking sector, manufacturing industries and even SMEs all need uninterrupted power supply to operate effectively. It was once reported that Nigeria is one of the most expensive countries to do business. I quite agree with that because running a business 24/7, 365 days on generator is not funny at all. It is tasking, sapping and quite demanding. The cost of fueling and maintenance alone can wreck a business completely.
The epileptic supply of electricity has really sent many businesses packing. Foreign investors are scared of investing in the country because of poor electricity supply. The SMEs are the most hit by this situation because it hampers their rapid growth and the owners are left to struggle with the business without breaking even. The cost of the running the business on generator takes the entire profit.
The power supply in Nigeria as of today can only serve for leisure purposes such as watching TV, listening to radio etc but definitely not for business. Many power dependent businesses are procedural in nature. Once you start the process the slightest power failure can take you back to square one and you may have to start the entire process all over again. That hinders efficiency and slows down services or production processes. Since steady supply of electricity cannot be guaranteed, most power driven companies prefer to run on generator in order to achieve smooth running of their services or production processes. The consumers are left to bare the brunt as they have to pay through their nose to enjoy some of these services or end product of production.

 It is my joy and pleasure sharing my knowledge, thoughts and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.       

Sunday 13 November 2016

WAN configuration

This is where you set public IP address provided by your ISP in order to access internet. It can be one of these 3 options: Dynamic IP addressing, Static IP addressing or PPPoE. Taking the first option i.e Dynamic IP addressing:
Dynamic IP address: choose this option to obtain an IP address automatically from your ISP(for most cable modem user). Optionally set up the host name for this router. The default MAC address is set to the WAN'S MAC address on the router.
Don't click clone MAC address unless it is really required. Sometimes this feature is required by cable modem users with service registration via computer network card and MAC address. That means the ISP will authenticate your network card's MAC address whenever you use the connection service. If so, you will need to click clone MAC address in order to clone the computer network card's MAC address to your network router. If you are not sure, check with your ISP technical support.

It is a thing of joy and pleasure for me sharing my knowledge and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.     

Saturday 12 November 2016

Network Architecture

When designing a network for an organization as a network Engineer, you must put into consideration the various network topologies for your network design to become active. Topology describes the way various devices are connected in the network. These topologies are Bus topology, Token Ring topology and Star topology.
Bus Topology: This topology connects switches, routers, hubs, host e.t.c with a cable in a line in the network. This why it is also called linear topology.
                             
                                             Image result for bus topology
Token Ring Topology: All devices in the network are connected in a ring as shown in the diagram below.
 
                                        Image result for token ring topology

Star Topology:This topology is widely accepted as the standard topology for network designs all over the world. Star topology has centralized switch or hub while other devices such as host computers connect to the switch in the network.
                                              Image result for star topology

Thursday 10 November 2016

Step by step approach to Configuring a router as a switch

NOTE: the second router must be on the same network as the first router because the second router will be used for switching only.
1. Connect first router's LAN port to the second router's LAN port by using a cross over cable. If one of the routers supports auto MDI/MDI-X feature, then use either straight or cross over cable because whichever cable type used, it will convert it to the configuration that best suits its purpose. Always remember not to make any connection to the second router's WAN or Internet port.

2. Now set the first router's IP to 192.168.1.1 and a subnet mask of 255.255.255.0 which is eventually going to be the gateway for the whole network including computers that derive their connection via the second router. DHCP settings should be configured only on the first router which will serve as DHCP server for the entire network. DHCP should be disable on the second router. The IP range for the first router should begin from 192.168.1.2-250, subnet mask 255.255.255.0, gateway 192.168.1.1 and DNS server 208.67.222.222 and 208.67.220.220 on the first router.

3. Enter the second router's configuration page, then assign IP and subnet mask to it. The IP and subnet mask must be in line with that of the first router i.e second router IP can be 192.168.1.251, 192.168.1.252 and so on. Subnet mask remain 255.255.255.0.

4. Save all settings and you have succeeded in configuring the second router to act as a switch. Connect computers to the remaining LAN port of the second router. An enabled connection should be noticed immediately in the computers.

It is a thing of joy and pleasure for me sharing my knowledge and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.    

Wednesday 9 November 2016

Insufficient financing from local investors ruined most CDMA companies in Nigeria

Most of the Code Division Multiple Access telecommunications companies in Nigeria are financed by local financiers' and this has not really helped the growth and progress of most of them.
These financiers' many a time run to the Bank for loan assistance but are usually turned down by the Banks. They end up using the little they have got to run the business. In no time, a sharp decline is noticed in the quality of services rendered by these companies. One thing leads to the other and before you know it, these companies are already at verge folding up.
This had been the plight of CDMA operators like Nitel, MTel, Starcomms, Reliance Telecoms(Zoom Mobile), Intercellular, MTS First Communications, Disc Communications, Webcom, Xs Broadband, Rainbownet WiTel, O' Net(Odua Telecoms), Monarch Communications and the most recent of them, Visafone communications limited which shocked everyone. We actually thought they were doing well until the news went viral that South Africa's telecommunications giant had acquired them.
Even the Nigeria Communications Commission (NCC) had decided to declare the operations of these companies as inactive so that it could investigate accurate telecom figures in the country.

It is my joy and pleasure sharing my knowledge, thoughts and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.

   

Monday 7 November 2016

Ways by which Network communications occur

Computers in a network communicate with each other in a variety of ways. They are Unicast communication, Broadcast communication and Multicast communication
Unicast communication: This has to do with one to one communication between computers in a network i.e Pc A can send message to Pc B and vice-verse.
Broadcast communication: Broadcast is the opposite of Unicast. It has to do with sending a message to all the Pc in the network.
Multicast communication: This involves sending a message to a group of computers rather than to all.

It is a thing of joy and pleasure for me sharing my knowledge and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.   

Sunday 6 November 2016

Configuration of WAN

This is where you set public IP address provided by your ISP in order to access internet. It can be one of these 3 options: Dynamic IP addressing, Static IP addressing or PPPoE. Taking the first option i.e Dynamic IP addressing:
Dynamic IP address: choose this option to obtain an IP address automatically from your ISP(for most cable modem user). Optionally set up the host name for this router. The default MAC address is set to the WAN'S MAC address on the router.
Don't click clone MAC address unless it is really required. Sometimes this feature is required by cable modem users with service registration via computer network card and MAC address. That means the ISP will authenticate your network card's MAC address whenever you use the connection service. If so, you will need to click clone MAC address in order to clone the computer network card's MAC address to your network router. If you are not sure, check with your ISP technical support.

 It is my joy and pleasure sharing my knowledge, thoughts and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.  

Saturday 5 November 2016

How to Bridge bluetooth and LAN

1. Open up the "Network connections" panel on your Pc by right clicking on "My Network places" and then select "properties".
2. Hold down the  "Ctrl" key and select the "Local Area Network" icon. (Both icons should be highlighted)
3. Right click on one and select "Bridge connections"
4. A dialog box will appear. Make sure both the LAN and bluetooth networks are selected and select "ok"
5. After a few seconds you should see the network connection panel configure itself and see both the LAN and Bluetooth Network icons move to the new "Network Bridge" section of the panel
6. Right click on the new "Network bridge" icon and select "properties". Verify your DHCP "Server" provided the new adapter with its IP settings

It is my joy and pleasure sharing my knowledge, thoughts and experiences with others. Become a WIZIAN today! Please scroll down to the bottom of this blog and subscribe to the newsletter and get updates through emails. Not forgetting to leave a comment below after reading this post.