Tuesday, July 20, 2010

networking

CompTIA A+ Essentials 220-601: Networks

You can print this text-only version of this course for future reference.

If you wish to use the accessible version of our courses, which includes questions in text-only format, click Text Only on the log on page, and then enter your user ID and password from the Accessibility Log On page.

Lesson 1. Course Introduction

In this course, you will learn about basic networking concepts and networking models such as peer-to-peer and client/server. You will become more familiar with such things as Local Area Network (LAN) and Bluetooth as you learn more about network technologies. Finally, you will look at different network architectures, such as Ethernet and Token Ring.



Lesson 2. Network Protocols and Hardware

A network is an interconnection of two or more computers used to share resources such as printers and files. Networks use different architectures, protocols, models, cables, and connectors for interconnections.

After completing this lesson, you should be able to:

  • Identify the fundamental principles of networks


Before we discuss networking protocols and hardware, let's examine a few critical concepts.

Addressing
Addressing is the assignment of IP addresses to hosts on a network. There are two categories of IP addresses: public and private. An Internet Service Provider (ISP) provides public IP addresses used over the Internet. You have to purchase public IP addresses from an ISP. Private IP addresses are available free of charge and are used on a LAN. You cannot use private IP addresses over the Internet.

Bandwidth
Bandwidth is the rate at which information travels from one location to another over a channel. Bandwidth is typically measured in Megabits per second (Mbps), Kilobits per second (Kbps), or bits per second (bps). The amount of information that can be sent at any time depends on the available bandwidth at that time — the higher the bandwidth, the greater the amount of information that can be passed from one location to another.

Status Indicators
Status indicators are used to determine whether a network device such as a Network Interface Card (NIC) or a switch is working properly. You can diagnose network device problems with status indicators. A NIC has two indicator lights: a link indicator and an activity indicator that provide information on the status of the link and on network activity, respectively. A switch has indicator lights that show whether the device is working properly.

Full- and Half-Duplex
A full-duplex connection can send and receive data over two separate circuits at the same time. A half-duplex connection has a single circuit; it can either send data or receive data, but cannot perform both actions at the same time. If an application requires two-way communication, you should use a full-duplex connection. A full-duplex connection will let the application perform more efficiently.


Network Architectures
Network architecture is a collective term that denotes a collection of protocols, topologies, and access methods. Examples of network architectures include the Ethernet and Token Ring topologies. The pages that follow provide more detail about these architectures.


Ethernet
Ethernet is a group of standards used in a LAN. The naming standard is the same for different Ethernet types. The first number of each standard indicates the transmission speed in Mbps, the middle section indicates the signaling type, and the last section indicates the transmission medium.

For example, in a 100BaseTX model, the "100" indicates that the network can transmit data at 100 Mbps. "Base" indicates that the network uses the baseband transmission method — meaning only one signal is sent over the network medium at a time. "TX" indicates that a twisted-pair cable is used as the network medium. T can also indicate twisted-pair cable, and F, FL, FX, LX, and SX indicate fiber optic cable. In the Ethernet standards 10Base2 and 10Base5, the "2" indicates thinnet coaxial cable and "5" indicates thicknet coaxial cable.

Standard Ethernet implementations include 10Base2, 10Base5, 10BaseT, and 10BaseF. Fast Ethernet runs at a maximum of 100 Mbps; its implementations include 100BaseT, 100BaseTX, and 100BaseFX. Gigabit Ethernet runs at a maximum of 1000 Mbps; its implementations include 1000BaseT, 1000BaseCX, and 1000BaseFX.


Token Ring
Token Ring networks can be of Type 1 or Type 3. Type 1 networks normally use STP cables and operate at 4 or 16 Mbps. Type 3 networks use UTP cables; they also operate at 4 or 16 Mbps.


Network Protocols
A network is an interconnection of computers that use the same or different network protocols. A protocol is a set of rules that determine how computers communicate over a network. Protocols are grouped according to their functions.

Some commonly-used protocols include:

  • TCP/IP
  • NWLINK IPX/SPX (Internetwork Packet Exchange/Sequence Packet Exchange)
  • NETBEUI/NetBIOS (NetBIOS Extended User Interface/Network Basic Input/Output System)


TCP/IP
TCP/IP is a standard set of rules used for communication in large networks. TCP/IP is managed through two different hierarchical structures. First is the IP address hierarchy, which uniquely identifies a host such as a computer, printer, or router in a network. Second is the TCP hierarchy, a transport-level protocol responsible for providing reliable data delivery over the network.

TCP/IP is included with Windows 9x, Windows ME, Windows NT, Windows 2000, and Windows XP. Communication over the Internet requires TCP/IP.

Three major fields have to be configured for TCP/IP: the IP address, the subnet mask, and the default gateway. These are described on the pages that follow.


IP Addresses
An IP address is a 32-bit number that is a combination of four 8-bit numbers known as octets. This 32-bit number is in the abc.abc.abc.abc format, where abc is a decimal number in the range of 0 to 255. An example of an IP address is 202.10.100.1.

A network administrator can assign an IP address manually, or a computer can be configured to attain its IP address automatically from a server on the network by using the Dynamic Host Configuration Protocol (DHCP).


The subnet mask divides a large TCP/IP network into smaller networks. A subnet defines all computers that have a common network prefix. IP addresses have a network section that identifies the network to which the computer belongs and a node section that identifies the network address of the computer. A network can be categorized into classes, with each class being allowed to use a defined set of IP addresses.

Class A
Class A uses IP addresses ranging from 1.0.0.0 to 126.255.255.255. The first octet, 1 to 126, identifies the network as a Class A network. The rest of the address identifies the host on the network. Class A networks can have a maximum of 126 networks, and each network can have 16,777,214 hosts, by using the default subnet mask 255.0.0.0.

Class B
Class B uses IP addresses ranging from 128.0.0.0 to 191.255.255.255. The first two octets, 128.0 to 191.255, identify the network as a Class B network. The rest of the address identifies the host on the network. Class B networks can have a maximum of 65,534 networks, and each network can have 65,534 hosts, by using the default subnet mask of 255.255.0.0.

Class C
Class C uses IP addresses ranging from 192.0.0.0 to 223.255.255.255. The first three octets, 192.255.0 to 223.255.255, identify the network as a Class C network. The rest of the address identifies the host on the network. Class C networks can have a maximum of 2,097,152 networks, and each network can have 254 hosts, by using the default subnet mask of 255.255.255.0.


Default Gateways
The default gateway specifies the address of the router to which the host sends all TCP/IP traffic. It also helps send TCP/IP traffic from a source computer to a target computer on a different subnet. Every computer connected in a network has the same default gateway address.

If a network consists of more than one subnet, data can still be sent to a target computer in a different subnet by using a default gateway address. The address of the default gateway is also required if the computer is connected to the Internet.


NWLINK IPX/SPX
IPX/SPX is the protocol used on Novell NetWare networks. To support the IPX/SPX protocol, Microsoft created its own version, known as NWLINK. IPX/SPX requires a network number and a frame type setting if possible.

The network number is an 8-digit alphanumeric number that uniquely identifies a network segment of the IPX/SPX network and enables IPX Internetwork routing.

The frame type is usually autodetected. If not detected, the frame type defaults to IEEE 802.2. IPX/SPX is included with Windows 9x, Windows ME, Windows NT, Windows 2000, and Windows XP.


NetBEUI/NetBIOS
NetBEUI is a modified version of the Network Basic Input/Output System (NetBIOS) developed by Microsoft for Windows networking. The NetBIOS protocol is a name resolution protocol that searches for computers on a LAN by computer name. It is used mostly in Ethernet and token ring networks.

NetBIOS sends a request as a network control block, which contains information such as the request location and the name of the destination host. NetBIOS works in two modes:

  • Session mode allows a connection between two computers, transfer of large messages, and error detection and recovery.
  • Datagram mode allows the broadcast of messages on the entire LAN.
NetBEUI is the default protocol for Windows 9x. It's a simple protocol for creating a small network in a small amount of time, because it requires little configuration. NetBEUI/NetBIOS is included with Windows 9x, Windows ME, Windows NT, Windows 2000, and Windows XP.


Whenever there's a need for connecting two or more computers, you require a network. The selected networking model may differ based on your requirements and the number of computers you want to install on the network. There are two basic networking models: peer-to-peer and client/server.

Peer-to-peer
A network that has no dedicated servers, where individual workstations can share data or services with other workstations, is known as a peer-to-peer network. In a peer-to-peer network each computer can function as a client or a server. All computers are considered equal in functionality, and there is no central server controlling the access of resources. Peer-to-peer networks are effective when the total number of participating workstations doesn't exceed 20. As the network grows beyond this size issues such as security, administration, and data backups tend to become problems. A peer-to-peer network architecture is more suitable for small businesses where security isn't a concern.

Client/server
The client/server model uses a network operating system to manage the network and act as a central authority for network resources. In a client/server network, there's at least one centralized server running the network operating system that allows network administrators to control the network. A client or workstation can make requests to the server for resources, and the server can fulfill or reject those requests. This provides a secure and organized network. Windows NT, Windows 2000, and Windows 2003 networks are client/server networks. Windows 2000 and 2003 use domains to provide centralized control of security.


Network Cables
Cables connect two network devices and transfer information between them. Coaxial, twisted pair, fiber optic, and Plenum/PVC cables connect network devices on a LAN.

You can use an RS-232 serial cable, Universal Serial Bus (USB) cable, or an IEEE 1394/FireWire cable to connect two computers directly. An external modem connects to the serial port of a computer with an RS-232 cable.

USB and IEEE 1394/FireWire cables provide serial data transfers. A USB cable has only one pair of wires for data transfer; it provides half-duplex data transmission. RS-232, USB, and IEEE 1394/FireWire cables allow a serial port on one computer to be connected directly to another computer with a null-modem cable, which is a cable with specific pin contacts reversed.

You'll need an adapter to perform the pin reversal required for a direct connection. When one of these adapters is used, it is possible to connect two computers through their serial ports using a standard serial cable without reversing any pin contacts in the cable.


Coaxial Cable
Coaxial cable was the most commonly used cable type in early computer networks. In modern networks coaxial cable has been replaced by UTP, STP, fiber optic, and wireless media.

Coaxial cable is half-duplex; it supports a transmission rate of 10 Mbps, which is considered slow compared to other cable types.


Unshielded Twisted Pair Cable
Unshielded Twisted Pair (UTP) cables consist of four pairs of wires with no foil shield. Examples of UTP cables are:

  • CAT3 T is used in 10BaseT networks; it supports transmission speeds up to 10 Mbps.
  • CAT5 supports transmission speeds up to 100 Mbps, but it has been phased out in favor of Category 5e. It also provides backward-compatibility to the older and much slower 10 Mbps standards.
  • CAT6 supports transmission speeds up to 1000 Mbps. While Category 5e also supports speeds of up to 1000 Mbps, Category 6 is recommended for best results. It also provides backward-compatibility to the older and much slower 10 Mbps standards.


Shielded Twisted Pair Cable
Shielded Twisted Pair (STP) cables consist of four pairs of insulated wires with a foil shield wrapped around the wires. STP cable is identical to UTP except for the shielding.

The metallic shield protects the cable from interference caused by fluorescent light fixtures, motors, and other electromagnetic interference (EMI) sources. STP cables can be used in any implementation where UTP cables are used, but are more expensive than UTP. STP is generally preferred only when shielding from EMI is required.


Fiber Optic Cable
Fiber optic cable can be used with Ethernet networks. It carries digital data and voice signals in the form of modulated pulses of light. There are two types of fiber optic cable:

  • Single Mode fiber optic cable has a thin core-diameter of 5 or 10 microns. It uses a laser to transmit one signal at a time. Practical transmission distances for single-mode fiber optic range up to 50 km.
  • Multi Mode fiber optic cable has a core-diameter of 50, 62.5, or 100 microns. It transmits multiple signals using a light-emitting diode (LED). Practical transmission distances for multi-mode fiber optic range up to 3,000 km.
Fiber Distributed Data Interface (FDDI) refers to fiber optic cable used in Token Ring networks.


Plenum/Polyvinyl Chloride Cable
Because it does not produce toxic fumes when it burns, Plenum/Polyvinyl Chloride (PVC) cable is used in plenum (air-filled) spaces in buildings, such as ventilation ducts. Non-plenum cables are covered with PVC that produces toxic gas when it burns. Most fire codes require plenum-rated cable in any area that carries breathable air.


Each type of cable requires a specific type of connector for termination.

Standard connectors (SC) and Straight Tip (ST) connectors
Fiber optic NICs usually include an ST or SC connector. ST fiber uses a round-plug style connector, while SC fiber uses a square-block style connector. Fiber optic cable is commercially available either with the same connector at both ends or with an ST connector at one end and an SC connector at the other end.

Lucent Connector (LC) connectors
LC connectors are used with single-mode and multi-mode fiber optic cables. LC connectors use a plastic housing; they provide precise alignment through ceramic ferrules. LC connectors have a locking tab.

Mechanical Transfer-Registered Jack (MT-RJ) connectors
MT-RJ connectors are used with single-mode and multi-mode fiber optic cables. MT-RJ connectors use a plastic housing; they provide precise alignment through metal pins and plastic ferrules. MT-RJ connectors are cheaper than SC and ST connectors, and they support full-duplex communication.

Registered Jack-11 (RJ-11) connectors
RJ-11 connectors are the standard connector for telephone connections. An RJ-11 connector has four wires. It's used to create a connection between telephone-line jacks and analog modems.

Registered Jack-45 (RJ-45) connectors
RJ-45 connectors are similar to RJ-11 connectors but larger. An RJ-45 connector connects both UTP and STP cables to hubs, NICs, and various other twisted-pair networking devices. An RJ-45 connector has eight wires in four pairs. A UTP cable typically has a male RJ-45 connector on each end. These plug into female connectors built into networking devices.

USB and IEEE1394/FireWire connectors
These interfaces support instant networking. Instant networking allows two Windows XP computers to communicate simply by using a FireWire cable and the TCP/IP protocol stack. FireWire supports an end-to-end throughput of over 50 Mbps.


Networking Cables
The important concepts are:
Coaxial
The most commonly used cable type in early computer networks, but has been replaced by other media.
Unshielded Twisted Pair
Consists of four pairs of wires with no foil shield.
Shielded Twisted Pair
Consists of four pairs of insulated wires with a foil shield wrapped around the wires.
Fiber Optic
Is available in two types: Single Mode and Multi Mode
Plenum/ Polyvinyl Chloride
Does not produce toxic fumes when it burns.

summary


In this lesson, you learned about networking concepts such as addressing and bandwidth. You also learned about different network models, the different protocols or set of rules used by networks, and how networks and shared resources are connected to each other.



Lesson 3. Network Technologies

Networks use a wide variety of technologies to establish connections among computers and peripherals. Different types of network technologies, such as LAN/WAN, ISDN, broadband, dial-up, wireless, infrared, Bluetooth, cellular, and VoIP, are used to establish network connectivity.

After completing this lesson, you should be able to:

  • Define various network technologies


LAN/WAN
LAN-based Internet connectivity can be established in various ways. If it is a small organization, you can use a dial-up connection and then distribute the Internet connectivity among multiple computers. When you need to configure Internet connectivity for a LAN, typically a computer or device is configured to act as a gateway.

The primary task of a gateway is to perform routing between networked computers and the Internet. A gateway is simply responsible for sending and receiving data packets. You can also configure dedicated connections such as ISDN, DSL, or cable-based Internet connectivity for WAN connections.


ISDN
ISDN is a digital architecture that defines hardware and call-setup schemes for end-to-end connectivity. This technology can carry video, voice, and data for transmission to the specified destination. ISDN uses two separate channels for in-band and out-of-band signaling.

ISDN lines have a faster call setup than LANs because both channels are separate. A dedicated D channel is used for out-of-band signaling. Compared to normal telephone lines, which use the same channel for in-band and out-of-band signals, ISDN is faster.

The three different types of ISDN services are:

  • Primary Rate Interface (PRI) — Consists of 23 B channels and one D channel (64 Kbps) in North America and Japan for a total bandwidth that is equivalent to one T1 leased line, or 30 B channels and one D channel in Europe, Australia and most of the rest of the world with the slightly higher capacity E1.
  • Basic Rate Interface (BRI) — Consists of two B channels which provide a data transfer speed of 64 Kbps and one D channel which provides the data transfer speed of 16 Kbps.
  • Broadband ISDN — Offers transfer rates of up to 633 Mbps and uses coaxial or fiber-optic cables.


Broadband provides high-speed connectivity over the internet. Technologies such as Digital Subscriber Line (DSL), cable, and satellite provide high-speed Internet connectivity.

DSL
DSL describes the broad category of Internet access technologies that use telephone wire to transmit signals to and from the Internet. There are several variants of DSL available in the market. Asynchronous DSL is capable of downstream transfers of 8 Mbps and upstream transfers of 1 Mbps. The other forms of DSL provide speeds from 144 Kbps to 1.5 Mbps downstream and 128 Kbps to 512 Kbps upstream. DSL connections use standard RJ-11 connectors between the modem and the ISP. An advantage of DSL is that the existing UTP telephone cables can be used to connect the DSL modem to an RJ-11 wall socket.

Cable
Cable modem-based Internet connections always use standard coaxial cable to establish a direct connection to the Internet. A cable modem connects to a computer by using an RJ-45 Ethernet cable or a USB cable.

Satellite
Satellite technology can cover large geographic areas because no cables are required for its implementation. The disadvantage of satellite technology is that it is slower than cable, ISDN, or DSL. The satellites and receiving dishes need to be aligned, or the signal will be noisy and weak. A common problem with satellite communication is delay. Signals take time to reach and then return from the satellite. This delay is known as latency. Bad weather also affects communications using satellite technology. There are two types of satellite-based connections: one-way and two-way. One-way uses a dial-up modem and an ISP. In a one-way connection the computer connects to an Indoor Receive Unit (IRU), which connects through a coaxial cable to the satellite dish. A two-way uses two satellites to send and receive information. In a two-way connection, an Indoor Transmit Unit (ITU) is used along with an IRU. A coaxial cable can be used with the IRU, ITU, and satellite dishes.


Dial-Up Access
Dial-up access uses the telephone system to allow communication between computers. Dial-up networking uses analog modems that convert the parallel digital signals generated by a computer into serial analog signals suitable for transmission over telephone wires. Dial-up connections can transmit data at speeds up to 56.6 Kbps.

For dial-up networking, you can use either an internal or external modem. An internal modem is installed inside the computer's system case in an expansion slot on the motherboard. It's equipped with its own interfacing circuitry. An external modem is installed outside the computer. It connects to a serial port of the computer using an RS-232 cable. An external modem uses the interfacing circuitry of the serial port.


Wireless
Wireless devices connect to the Internet through an access point. Wireless-based Internet connectivity is used in hotels, airports, or restaurants where customers can use the access points to connect to the Internet. This type of Internet connectivity is often a paid service.

There are several wireless specifications:

  • The 802.11a wireless standard supports a maximum speed of 54 Mbps at a frequency of 5 GHz.
  • The 802.11b wireless standard supports a maximum speed of 11 Mbps at a frequency of 2.4 GHz.
  • The 802.11g wireless standard supports a maximum speed of 54 Mbps at a frequency of 2.4 GHz. The 802.11g standard is compatible with the 802.11b standard, ensuring backward compatibility. 802.11g access points can work with 802.11b wireless network adapters and vice-versa.
  • The Bluetooth wireless standard supports a maximum speed of 400 Kbps at a frequency of 2.4 GHz.


Bluetooth
Bluetooth, defined by the IEEE as standard 802.15, is a wireless network protocol intended to provide convergence between wireless-enabled devices such as computers, printers, keyboards, mice, cellular telephones, and PDAs. Bluetooth is the best wireless communication technology to communicate with multiple devices.

Bluetooth wireless range depends on the class of the Bluetooth device:

  • Class I: provides communication with a maximum distance of 100 meters.
  • Class II: provides communication with a maximum distance of 10 meters.
  • Class III: provides communication at short distance and is rarely used today.


Infrared
Infrared technology is a wireless technology used to send and receive information by using electromagnetic radiation in the infrared band. Infrared provides relatively short-range communication up to 12 feet with a data transfer rate of less than 4 Mbps.

Infrared is the cheapest wireless technology. Modern laptops come with built-in support for infrared. The Infrared Data Association (IrDA) is the authority that defines protocol standards and specifications for short-range communication using infrared light.


Cellular
Cellular technology is a radio technology made up of many cells. A transmitter is used to serve these cells, which provide radio coverage over a wide area. Several types of cellular technology can be used, such as Code Division Multiple Access (CDMA) and Time Division Multiple Access (TDMA).

CDMA technology uses wide frequency channels to send messages that are decoded at the receiving end. TDMA technology divides time slots among different users so they can share the same radio frequency.


General Packet Radio Service
General Packet Radio Service (GPRS) is a wireless technology used in mobile devices to transfer data. GPRS technology operates at a speed of 115 Kbps. This technology is useful for sending and receiving e-mail and for browsing the Web.


VoIP
Voice over IP (VoIP) technology is used to carry voice signals over IP telephony. This technology allows you to make voice calls through a broadband Internet connection. VoIP calls costs less than calls made through the Public Switched Telephone Network (PSTN), but VoIP voice quality is reduced.


Networking Technologies
The important concepts are:
VoIP
Allows you to make voice calls through a broadband Internet connection
Infrared
Used to send and receive information by using electromagnetic radiation
Dial-Up Access
Uses the telephone communication system to allow communication between computers
ISDN
Uses two separate channels for in-band and out-of-band signaling
summary

In this lesson, you learned about the different types of network technologies used to establish connectivity.



Lesson 4. Installing and Configuring Networks

To connect a computer to a network, you must install a NIC in the computer. You can use wireless technology to connect a computer to a wireless network. Some wireless devices, such as printers, keyboards, and mice, use Bluetooth or infrared wireless technology to connect to a computer.

After completing this lesson, you should be able to:

  • Install and configure networks


Installing and Configuring a Cable Broadband Connection
A cable broadband connection provides fast Internet access through coaxial cable. A cable broadband connection is relatively cheaper than other broadband connections. It provides faster Internet download speeds than dial-up access.

To configure cable broadband on your computer, you need a cable modem, usually provided by your ISP. A cable modem is pre-configured; you don't need to perform any additional configurations.


Note: When a router has been used to connect two computers to a single broadband connection, you can use the Web browser running on one of the computers to configure the router.


Configuring a NIC with a Static IP Address
To configure a network interface card (NIC) on a Windows XP computer, attach the NIC to any available PCI slot on the motherboard and install appropriate network card drivers with the Device Manager. Let's examine the steps for configuring a NIC in a Windows XP computer that has a static IP address. To begin, right-click My Network Places, and then click Properties.

Next, double-click Local Area Connection.

To configure the host IP addresses manually , double-click Internet Protocol (TCP/IP) in the Local Area Connection Properties dialog box. Double-click Internet Protocol (TCP/IP).

The Internet Protocol (TCP/IP) Properties dialog box opens. You can assign an IP address to the computer by using dynamic IP address assignment, static assignment, or Automatic Private IP Addressing (APIPA). In a Windows network, the IP address, subnet mask, and default gateway must be specified to configure a host on the network. Select the Use the following IP address radio button.

Enter the IP address, subnet mask, and default gateway of the computer. We've completed this step for you. Click OK to save the settings.

Finally, click OK to close the Local Area Connection Properties dialog box.

The NIC has been configured with a static IP address.

Note that a network administrator does not need to configure any settings if a Dynamic Host Configuration Protocol (DHCP) server exists on the network. When you configure a NIC, the client computer is set to dynamically obtain an IP address by default.

Automatic Private IP Addressing
Windows 98, Windows 2000, and Windows XP support Automatic Private IP Addressing (APIPA). If a client can't communicate with a DHCP server at startup, APIPA enables DHCP clients to automatically configure their IP addresses and subnet masks.

A client configured with APIPA will periodically attempt to locate a DHCP server. Once the DHCP server is found, APIPA is not used.

When a computer uses APIPA, Windows determines the IP address in reverse order. APIPA addresses range from 169.254.0.0 through 169.254.255.255, with a subnet mask of 255.255.0.0.


Wireless Access Points
Wireless access points are used in wireless networks for connecting wireless devices. Each access point supports connections up to a specified distance. In a large wireless LAN, you may have to install a number of wireless access points to establish connectivity.

To configure wireless access points, you should provide the IP address and gateway address in wireless access point settings. You can use wireless access points as a router and a DHCP.


Let's examine the terminology and technology involved with configuring wireless access points.

Wireless Application Protocol
The Wireless Application Protocol (WAP) uses Wireless Markup Language (WML) to format data to fit into smaller displays, such as those found in Personal Communication System (PCS) phones and PDAs. Data is sent in compressed binary packets.

Wireless Transport Layer Security
The Wireless Transport Layer Security (WTLS) is based on the Transport Layer Security (TLS) protocol and derived from the Secure Sockets Layer (SSL) protocol. WTLS provides security for WAP applications in the form of data integrity, privacy, authentication, and Denial-of-Service (DoS) protection. WTLS helps address wireless issues such as limited processing power, memory, and bandwidth. Wireless transactions require strict security measures because of their vulnerability to data interception. WTLS provides an optimized handshake mechanism that allows keys to be changed periodically during a wireless session.

Wired Equivalent Privacy
The Wired Equivalent Privacy (WEP) encrypts data as it is transmitted between a wireless client and the access point. WEP can be used to secure transmissions after authentication. WEP does not provide encryption during authentication, and it allows user credentials to be broadcast in clear text. WEP can be effective when used with other security methods, such as passwords, authentication, Virtual Private Networks (VPN), and encryption of all data transmissions.

Service Set Identifier
A Service Set Identifier (SSID) is a network name that is broadcast in clear text. The SSID identifies the presence of a wireless network to any wireless client that is in range. In secure environments wireless clients can be configured with the SSID for their network, thereby eliminating the need to broadcast the identity and availability of the wireless network. When you configure a wireless access point as a router and a DHCP, you should specify the SSID in the user computers. To ensure the security of the network, you should also change the password while configuring a wireless access point.


Wireless Access Point Technologies
The important concepts are:
Wireless Application Protocol
Uses Wireless Markup Language (WML) to format data to fit into smaller displays.
Wireless Transport Layer Security
Provides security for WAP applications in the form of data integrity, privacy, authentication, and Denial-of-Service (DoS) protection.
Wired Equivalent Privacy
Encrypts data as it is transmitted between the wireless client and the access point.
Service Set Identifier
Identifies the presence of a wireless network to any wireless client within range by broadcasting the network name in clear text.

Topic 4.1 Exercises


summary

In this lesson, you learned to install and configure a NIC for network connectivity.

You also examined terminology and technology involved with configuring wireless access points.



Lesson 5. Troubleshooting Networks

There are many techniques to troubleshoot wired and wireless network problems. Connection speed and strength, problems in the NIC, and access problems are a few of the issues you will learn to troubleshoot in this lesson.

After completing this lesson, you should be able to:

  • Identify tools, diagnostic procedures, and techniques for troubleshooting networks


Wireless Connection Speed and Strength
If you are not able to connect to the Internet or network resources on a wireless network, you should verify wireless connection speed and strength. You can check these items from the Wireless NIC Properties dialog box. You can also double-click the Wireless Link icon on the right of the taskbar on a Windows XP computer to perform the same function. Click the Wireless Link icon.FONT>

Troubleshooting a NIC
To configure a NIC on a Windows XP computer, attach the NIC to any available PCI slot on the motherboard and install the appropriate network card drivers using the Device Manager.

You should connect the NIC to a hub or a switch by using a patch cable. A patch cable is a UTP cable used to connect two devices on a network. A patch cable can be a crossed cable or a straight cable. If you're connecting similar devices, such as two computers, you should use a crossed patch cable. If you're connecting dissimilar devices, such as a computer and a hub or switch, you should use a straight patch cable.


To troubleshoot NIC problems, make sure the network patch cable is plugged into the wall socket and the computer's NIC. You can check the cable itself with a LAN tester tool or by replacing the cable.

Use Device Manager to check the status of a NIC. Device Manager is used to install device drivers and verify that a device is functioning properly.

To troubleshoot NIC problems, you should check to see whether the link lights are present on a network card.

To verify that the NIC is working properly on a computer, use a loopback device.


Note: If a user can't access the LAN from a computer configured to obtain IP addresses automatically, you should first verify the IP address of the computer. If you run the IPCONFIG command and observe that the computer is using an IP address in the 169.254.x.x range, the computer is unable to contact the DHCP server. If the problem persists, the DHCP server could be down.


Troubleshooting Internet Access Problems
To troubleshoot Internet access problems you should check whether the NIC is configured properly. You should check the DNS, DHCP, and default gateway settings to troubleshoot Internet access problems.


DNS
DNS is a distributed addressing system that resolves a domain name into its numeric IP address. DNS allows you to use the Internet without the need to remember long lists of cryptic numbers. Each domain is an independent namespace that corresponds to a particular organization, and DNS servers manage requests for information regarding the IP addresses of particular DNS domains.

To configure DNS on a client computer, specify the DNS address provided by your ISP. The procedure involves the following steps:

Step Action
1 Open TCP/IP Properties from the Local Area Connection Properties dialog box.
2 In the General tab of the TCP/IP Properties dialog box, enter the DNS server's IP address in the Preferred DNS Server field.


Note: If you are able to PING to a public IP address but are not able to PING the same IP address by using a Fully Qualified Domain Name (FQDN), you should verify the DNS IP settings.


DHCP
DHCP is a protocol that dynamically delivers IP address configuration information from a central server. DHCP automatically assigns the IP address, subnet mask, and DNS server address to the client computers. A DHCP client performs the following tasks to configure TCP/IP addresses:

Step Action
1 The client starts and enables TCP/IP.
2 The client discovers that configuration of TCP/IP is set to automatic. The TCP/IP stack sends a DHCPDISCOVER packet to request configuration parameters from a DHCP server.
3 Each DHCP server on the network responds with a DHCPOFFER packet, which contains an IP address the client can use.
4 The client accepts the first DHCPOFFER packet it receives and configures itself with that IP address.
5 The client sends a DHCPREQUEST packet to the DHCP server to accept the IP address. Clients that decline DHCPOFFER packets send DHCPDECLINE packets to the appropriate servers.
6 The DHCP server responds with a positive acknowledgement, known as a DHCPACK packet, if the IP address is unique on the network. If the DHCP server discovers an IP address conflict, it responds with a negative acknowledgement, known as a DHCPNACK packet. The DHCPNACK packet revokes the IP address and forces the client to send a new request for an IP address.
7 The client can use the IP address for a limited time, known as the address lease period. When half of the lease time expires, the client will request another address.


Network Devices
There are a number of things you can do to increase the performance of a network. Upgrade slow networks by using faster devices to connect to the network is one of them.

Let's look at some of these devices.


Bridges
In the past, bridges were used to connect two different network segments in a LAN and increase the performance of a network. Bridges operated at the data link layer of the Open System Interconnect (OSI) model. But bridges have become obsolete and are not used today.


Switches
Switches have replaced hubs, because switches provide faster transmission speeds. If you are using hubs your network performance might be slower than it could be, and it's better to use switches. Switches operate at the data link layer of the OSI model.


Router
A router is a networking device used to forward IP packets to a host on a different network. The process is known as routing. Routers operate at the network layer of the OSI model.


MAC Address
A MAC address is the 48-bit physical address of a NIC. This is a unique address assigned to the NIC by the vendor. To determine the MAC address of a computer, you can use the IPCONFIG /ALL command from the command prompt.


Status Indicators
You can check the status of network devices such as NICs or switches by looking at their status indicator lights. A NIC has two indicators: a link indicator and an activity indicator. If the NIC is not properly connected to the network, the link indicator or activity indicator may be off. If the NIC is properly connected to the network, the link status will be green. A blinking activity indicator shows that data is being sent and received over the network. An illuminated indicator light on a NIC card shows that the network cable is connected properly to another Ethernet connection.


Troubleshooting a NIC
The important concepts are:
LAN tester tool
Checks that a patch cable is working
Device Manager
Helps install device drivers and verify that a device is functioning properly
Loopback device
Verifies that a NIC is working properly on a computer
Link indicator
Confirms that a NIC is properly connected to a network
Activity indicator
Shows that data is being sent and received over a network
summary

In this lesson, you have learned techniques to troubleshoot network problems. You examined connection speed and strength, problems in the NIC, and access problems as being potential trouble spots in a network.

Friday, July 16, 2010

Indigenius Aluminum Casting in Nigeria

introduction

general overview of the crafts in Nigeria

In a monolithic society as Nigeria, arts and crafts played an important social, economic, as well as utilitarian role which has helped in the developmental needs of the nation. The crafts industry was one of the major commercials ventures in Nigeria prior to the era of crude-oil. It is worthy of note that Nigerian crafts have continued to grow to perfection in techniques, finishing and packaging.

The indigenous metal casting for the production of household utensils such as metal pots, spoons and bowls of different sizes are increasingly becoming popular in Nigeria. The production method involves the use of a conventional sand casting procedure in which two-part flasks with a split drag are employed in the molding. This metal casting is operated at the cottage level and most of the people involved have qualifications below junior secondary school level with no metallurgical or any other engineering background. This small business has good prospects and can be a basis for the development of indigenous technological capability building in metal casting in Nigeria.

This paper therefore is intended to show the method and the processes of Aluminum pot casting in Saki, Oyo state. According to the geographical map of Nigeria, Saki is a small town located in the northern part of Oyo state. The neighboring town includes: ago-are, ighoho, ipapo, tede, etc. other crafts being practice by the people of Saki are pottery, cloth-weaving, etc.

Historical Background

Casting generally is a process of producing solid objects by pouring molten material into a shaped mold and allowing it to cool. It is used to shape the metals and alloys. The casting of metals has been practiced for more than 6,000 years, using first copper and bronze, then iron, and now alloys of zinc and other metals. The traditional method of casting metal is the sand casting. Using a model of the object to be produced, a hollow mold is made in a damp sand and clay mix. Molten metal is then poured into the mold, taking its shape when it cools and solidifies. The sand mold is broken to release the casting.

Casting aluminum pot (known as the ikoko irin by the Yoruba’s) from the book of history was an imported craft. It was said to have been started by one Mr. Tiyamiyu Aremu in 1968 that learnt the craft techniques from cote de voire. According to my source , it was said that he later went and settle in Oyo not until the people who have also learnt the same craft techniques in other places like Ghana where driven home by Busier, Saki now became the abode of this deportees, all this happened in Ghana in 1969. In 1970, a society of iron importers was launched officially and it flourished till date. I noticed this during my first visit to Saki that the houses owned by the indigenes of Saki are always used for this craft. And moreover almost all the children living in this community are into this craft alongside with their education

materials and tools

MATERIALS

Over the time, there have been developments of the materials and tools used for this craft. The major Materials used are the Aluminum scraps. Aluminum which is a lightweight, silvery metal. The atomic weight of aluminum is 26.9815; the element melts at 660°C (1220°F), boils at 2519°C (4566°F), and has a specific gravity of 2.7. Aluminum is a strongly electropositive metal and extremely reactive. In contact with air, aluminum rapidly becomes covered with a tough, transparent layer of aluminum oxide that resists further corrosive action. For this reason, materials made of aluminum do not tarnish or rust. The metal reduces many other metallic compounds to their base metals. For example, when thermite (a mixture of powdered iron oxide and aluminum) is heated, the aluminum rapidly removes the oxygen from the iron; the heat of the reaction is sufficient to melt the iron. Aluminum is said to be non-toxic and does not release any odour or taint products with which it is in contact. Aluminum which is also the most costly component and pieces of cast iron which are majorly gotten from local sources such as machine spare parts. Aluminum metal cannot be melted in isolation because the end product will be brittle and will withstand external pressure. Some cast iron is added as a flux to strengthen the body. Ababio(1990:p427) described aluminum as a good conductor of heat, it is very light and cheap; therefore it is prescribed as the best metal that can be used for cooking utensils.

Research shows that aluminum is the worlds' most abundant metal and the third most common element comprising eight percent of the earth's crust. And the versatility of aluminum makes it most widely used metal after steel. The recyclables of aluminum is unparalleled. There is no difference between virgin and recycled aluminum in terms of quality as when recycled there is no degradation in properties when compared to virgin one. And recycle aluminum only uses 5 percent of the input energy required to produce virgin material.

The basically make use of the used ones (aluminum scraps), condemned engines of vehicles. Images of these scraps are highlighted below

Another common material that is very important include the deposit of sand used in forming the mould. The preferred sand that is general used by this people is the loamy sand. Loamy sand is a mixture of sand and clay particles with high proportion of organic matter

fine ash used in mould finishing, this material is also commonly known as the soot which is a powdery form of carbon that is being derived from the burning of wood, coal, or oil, which rises up in fine particles with the flames and the smoke.

carbonated manganese oxide is derived from used dry cells which is used in the removal of impurities from the alloy.

charcoal which serves as the energy source for the melting of metals on the furnace and many other uses.

Another material that is needed is the patterns which could either be ( patterns of aliminium pot and the covers). A pattern comprises of a prototype that has been sliced into two halves.

Patterns of the Aluminium pot

  • These pots are in sizes. We have sizes ranging from (1-60), i.e. 1, 2, 3, 4, 5, 6, 8, 10, 12, 15, 20, 30, 40, 50, and 60

Shown above is a pattern of a size 40 aluminium pot

  • There are also the E-pot which can be classified into the E2, E3, E4, E5, E6, E8, E10, E12, E20
  • Part of the pattern of pot use is the BASIA (which could either be the small or the big)
  • There is also the flat 12 pot
  • There is also the AGBADA GARI (which could either be the small or the big size)

Patterns of the covers

  • Its process involved in the production is the same in the production of the pot itself.

TOOLS

The Production of this craft is mainly based on the use of simple tools, scraps and some crude implements.

The following are the common tools used in the production of various cast aluminum products:

Ø Wooden racks – this is a wooden framework usually rectangular in shape, used as supportive guides to the moulds. They exist in different sizes depending on the size of the pot that is intended for. This is a wooden piece that is constructed in a bench-like form to suit the piece that is meant to be produced depending on the size

Ø Club and Sticks – they are used in the preparation of the sand mould.

Ø Shovel and Hoe – they are used for sand filling, loosening lumps of sand after casting and packing loosed materials.

Ø Scale balance – it is used to measure the weight of the raw materials and most times, the finished products.

Ø Metal rings – the metal rings are long strip of metal used to hold the cast iron pot used as mould in sand filling. This is usually applicable to the rounded bottom pots.

Ø Crucible – this is a heating container used in the melting of the metals used in the casting.

Ø Tong – this tool which is about 1.5m in length is used for the molten metal transfer and pouring of the molten metal into the mould. In a nutshell, it is used to carry the molten metal.

Ø Iron wire – it is used for holding and tightening racks together for sand mould.

Ø Spoons – they are used for smoothening and finishing the internal and external walls of the sand model. It is also used in collecting various phases in mould making and casting.

Ø Small pipe – the small iron pipe is used in making a circular opening where the molten metal is poured into the mould.

Ø Air wheel/fan/blower– this is the air supplier or blower that supplies the furnace air of combustion.

Ø Hammer - one of their hand tool consisting of a shaft with a metal head at right angles to it, used for forging and beating metal. They commonly make use of the small hammer.

Ø BALL SPANNER - a wrench with a hook or pin at one or both ends of the engaging corresponding notches or holes on the object to be turned. This spanner varies in diameter of the notches.

Ø Tester - they use it to tests if their machines (fan/blower, generator) or any of their devices is working properly. It helps to no if there is a low or high voltage.

Ø Melting furnacethis is described as an enclosure place where smelting is being carried out. It is basically made of clay. It is known to the Yoruba’s as the ‘OJU-ARO’.

Ø Generator - this is used when there is no light to power on the blower during smelting.

Ø Labels and brands - are used for writing names and logos on their pots.

Ø Belt - are used to tighten the patterns (the two halved prototype) together to get a perfect molding.

Ø Flange - are used for creating a demarcation or boundary between the pattern to derive or yield a separate mode after demolding.

Ø Empty cans - Are basically used for the carrying the smelted aluminum to the place where they are being poured.

Other tools includes the finishing tools

Ø hacksaw

Ø CHISEL

Ø iron Brush

Ø Paint

Ø files

Ø Pliers

PROCESSES OR TECHNIQUES INVOLVED

The processes involved in the production of aluminium pot are: The molding and the casting

MOLDING

The following are the processes involved in MOLDING. This could be grouped into the interior and the exterior aspects.

INTERIOR ASPECTS

This interior processes helps the producer to create the mold of the interior part of the pot. The procedures to this process are highlighted below:

Make available the prototype of the pot to be used depending on the size of pot given to the producers to produce by the customer or at times the size of pot the producers’ wishes to produce for sale. As the one shown below

The next step is to lay the bed. This is done by spreading the sand on an available space on the ground that is convenient for the piece to be done. This step is made with the use of the hoe, the spade, planks to make the bed very smooth and rigid (i.e. well compressed). An image of this is shown below

Laying of the platform

At this stage, the method of using the belt comes in. the belt could be made of metal or leather, whichever suits the producer or manufacturer. The producer uses the belt to tie the two half patterns of pot. After which the sand must be poured inside and compressed in such a way that the sand inside would be as hard as a stone. An image of this procedure is displayed below

Shown above is a worker compressing and exerting pressure on the sand to make them coagulate and form together, after packing in little sand, he pour in another sand and then compresses them again. All this is done because he wants to derive a uniform thickness in mold he is producing. Image of these procedures are displayed below

A worker pouring in more sand a worker compressing the sand and myself

pouring in more Sand to assist him

When the pot is now full with sand and well compressed to make it hard, then the use of a flat wood is introduced to level the sand. An instance are displayed below

When the sand was full during the leveling of the sand to yield a flat surface/platform

The end result of the compressing procedure

After this stage, he then scoops the middle area a little bit for easy-demolding.

The next stage is to carry the piece and invert it (that is turned it upside down on the already prepared bed of sand which the Yoruba usually call the ADA). As displayed below

note:

All this due process that have been mentioned above are necessary/important for the purpose of creating a mold for the interior part of the pot

EXTERIOR ASPECT

This process is very technical, all it requires the technical expertise of the producer. The reason being that it helps the producer to create the exterior part without undergoing any sort of problem. It must also be noted that the outer mold requires two or more layers of the wooden rack depending on the nature of the cast or depending on the size of the pot to be made. The procedures are highlighted above

The first step that comes after the interior aspect is the use of a flange at the intersection between the patterns as shown below

After which the producer is required to place a whole wooden rack which must be proportionate to the size of the model pot around the piece. This will help to create the exterior part. After which they must be tightened firmly with a piece of a rope. An instance is displayed above

After the above mentioned step, sand is being introduced and poured to fill up the first layer of the wooden rack and must be compressed thoroughly to derive the specific shape (circular in shape). In this case, the first rack is for the lower section while the successive racks serve as the upper part. As the rack is filled with sand, it is also compressed with the club and leveled up with a flat stick.

The images are displayed below

After filling the rack, the second rack which exists as a whole piece is placed on top directly on the rim of the first. This layer is filled to cover up the mould. The compacted sand is usually mounted on it like a heap-like pattern. It must be noted that this is at the peak of the heap of the sand that is the part which link directly to the centre of the mould. A tunnel shaped opening is created with a small iron pipe and spoon is been used to create a hole for the pipe. This indicates the point where the molten metal is poured into the mould grains of dry sand usually added in between the layers to create partition.

After which another set of wooden rack is being placed on the first batch in order to create the circular top of the aluminum pot. After which it must be leveled and well compressed. Looking at the processes from the beginning, a novice would be wondering how everything would come out successful.

When the mould blocks are completed, the next thing to do is to withdraw the racks aside to expose the pot model and allow the pot model to be disengaged from the inner block of the sand (core). After the detachment, the inner mould is revealed. Then the inner walls of the mould block are then burnished and smoothen with a flat spoon after investing a layer of fine ash on them. Alongside, other necessary touches are added to get desired result. At this phase, labels and brands can be of an added impression on the internal walls. This will actually emerge as a relief on the body of the ware. The mould of the cover is done in the same way, but it is racked once.

When the mould is made to perfect, its component are restored back and set in the former positions. At this stage, casting can be carried out. It should also be noted that the thickness of the pot will be determined by the cast iron used as the pattern.

CASTING

While the sand mould is been prepared and ready or doing the processes involved, the metals that are meant to be used for casting are being heated in a crucible on the furnace. When the melting is being judged ready, impurities in the mixture of the molten metals are removed with a long and slim metal plate. The metal molten metal is an alloy of aluminum and draughts or scrap of metals. The molten metal is judged ready when the carbonated manganese oxide is being added and all the impurities in the molten alloy metal, there will be a change in the color of the metal to a yellowish-orange when viewed under no light influence.

The images shown above are part of the assistance that was rendered by me to the potters during those moments I spent with them

After all the moulds have been made and the molten metal is ready, it is then carried with the tong and poured through the hole created on the moulds and allowed to cool probably by adding or sprinkling of water heavily on them. The moulds are broken down to reveal the cast ware and the content is emptied by hitting against the ground gently while holding the protrusion at the bottom of pot with the tong. The same process is also repeated for the cover of the pot.

After the cleaning processes have been done correctly, the pots are been collected and taken to where it will be finished. All the protrusion on the body of the pot will be cut-off and are filed smoothly and all defects will be made detected and corrected. After which they are being taken/allocated to different market places for sale

The size 40 pot The cover

The end product of the craft after finishing

The collections of the finished products that are being kept in their store after production

THE FUTURE PROSPECTS

Presently, the practice of this craft is restricted to men nevertheless it creates room for new apprentices to be easily recruited thus ensuring its continuity.

The migration of craftsmen to other towns gives rise to the diffusion of this craft and culture in Nigeria.

With the trends of things, the craft if well promoted and developed through technological ideas, will proffer solution to our economic standard and consequently fit for foreign exchange. In recent times, the government policies made to guide against the use of foreign products, I believe this policy has highly favored the marketability of this local cast aluminum products for quite some times now (to some extent).

In summary, this small business has good prospects and can be a basis for the development of indigenous technological capability building in metal casting in Nigeria if given proper/adequate attention/approach.

CHALLENGES AND PROBLEMS FACED

The fundamental challenge that is being noticed is that after the melting of the aluminiums, the workshop is always hot

Another occurring challenge the producers do face is the problem of financial support. Financial support in the sense that at times, they are unable to buy/purchase the used aluminum materials or the used engines from the mechanics/the market.

sometimes these the raw materials (aluminum scraps) for the production becomes scarce in the market and as a result the producer have to look for an alternative as they sometimes travel to several places mostly long distance journey to purchase the aluminum waste (scraps) which attracts extra cost due to the transportation charges thus leading to an increase in both the production cost and prices of the pot.

Another challenge faced by the potters is when they make mistake(s) in the process of molding whereby the potters is left with no other option than to re-melt the pot for correction which later attracts additional quantity of aluminum to make such correction leading to extra or additional resources wasted. For example if one is to use I kilo for the production of one pot but due to the mistake made in the process of producing that pot, one may end up using 1 ¼ or 1 ½ kilo of the aluminum. And that attracts additional cost of production and at the end it would be sold at the normal price and they (the producer) will be at a loss, instead of making profit.

In summary, the problems faced by the industry are technical, operational, organizational and financial in nature. The strategies for ameliorating the problems are established. It was concluded that improved policies, carefully crafted projects and proper management of technology can drastically solve these problems

possible defects of the product

Fluxing capabilities is reduced when the only way of removing impurities is visual stirring and approval; there is no certainty that all the metals have melted and all the impurities have been removed. Likewise de-molding after the pouring, there is an unpredictable procedure and there might be some deficiencies like; laps, seams, cracks, inclusion and under fill. Visual scanning and inspection determines only the surface defects. Lifting the pot upside down towards the sky reveals the tiniest holes.

marketing and Patronage

Local crafts generally are appreciated in the present day market. Likewise the local cast aluminum pots making is a modern craft whose products are thriving in the markets. The products which include cooking wares and utensils of various sizes as well known and patronized by a good number of buyers especially in the western part of this country. In a nutshell, they are basically used in homes for cooking.

Even with the advent of modern machine made aluminum kitchen utensils that come in different sizes and in attractive designs, the patronage of the locally produced or molded pots are still very high due to it retentive qualities;

Ø These pots are very strong and can be used either on local or kerosene stove".

Ø No leakage

Ø Are cheaper than the modern machine made ones.

So when a customer buys these locally produced ones, one saves a lot of money that he\ she can use for other important purposes

At times several group of association mostly the women associations are always known for the habit of patronizing this people with the sole aim of using it as a present to a celebrity during a celebration or during anniversaries. At times they distribute them to the people who are present during that occasion.

adaptation in contemporary world

Talking on the quality of these pots, the pots can be used everywhere and it has one advantage because when these pots are old or damaged they can be sold as scraps to the producers for recycling or a user can give half of the amount with the old or damaged pot in an exchange for a brand new one (i.e. There is no room for waste of resources)

During my findings, I noticed that travelling to this place to seek for information, this people are usually biased with the little information they have for their product. Thus they prefer to give the information out to the white (Americans), because at least they would have at least some dollars/pounds and whatever at the end of their conversation. Meanwhile, it shouldn’t be done that way. Whereas, my going there is to seek for information on how this wonderful craft is being made is not to harm them. Also I search through the websites to seek for more references but to my surprise, there is no genuine information. The point am driving at is that if this craft is given the chance, at least they should be able to boost the country in terms of basic amenities, add more values to the countries economy and growth of the country. To me, this is a craft a country should be proud of. Only that the people producing this craft are illiterate.

RECCOMMENDATION AND CONCLUSION

Apparently, there is an abundance of easily identifiable enhancement opportunity at the foundry. But when the restraint of capital flow to acquire equipments and supplies from other parts of the nation is considered, the opportunities disappear. But the realities of the existing circumstances indicate that the implementation of these improvements can be of greater problems. To improve on the fluidity of the molten metal and more than double the temperature range between the liquids and solids, a good percentage of silicon can be added.

However, if all these procedures and measures could be implemented, consequently it will improve the quality of the cast aluminum products in this locality, thereby creating arena whereby the taste and the demand of the even high class consumers will be met.

REFERENCES

Ababio o.y, (1990) “General chemistry” Lagos: Longman press

Lewin, Seymour Z. "Aluminum." Microsoft® Encarta® 2009 [DVD].

Redmond, WA: Microsoft Corporation, 2008.

Malyn D.D.Newitt "Casting." Microsoft® Encarta® 2009 [DVD]. Redmond,

WA: Microsoft Corporation, 2008.

Murjanatu Mohammed A. Nigeria: Inside Kaduna's Aluminum Pot Market (9

September 2008).cited from www.Allafrica.com

S. A. Ibitoye and M. O. Ilori ‘Indigenous metal casting in Nigeria: its technology, attendant problems, business prospects and policy implications’ (Volume 18, Issue 11, November 1998, Pages 705-711)