Siwes Report - Shola
Siwes Report - Shola
TECHNICAL REPORT
OF
HELD AT
WRITTEN BY:
SUBMITTED TO:
FACULTY OF SCIENCES,
EKITI STATE.
---------------------------------------- ----------------------------------------
I dedicate this report to God Almighty who gave me the grace and strength to
finish my SIWES program successfully and also for providing all the necessary
resources
ACKNOWLEDGEMENT
ACKNOWLEDGEMENT
prayed for me. May GOD almighty accept your prayers and encouragement
throughout this process. My special appreciation also goes to those who are not
mentioned here, but God will award you and grant you all your heart desires.
Lastly, I say a big thanks to the Director at the Directorate of ICT, my industrial
base supervisor; other ICT staff, you’ve been a pillar of support during my time
at the ICT. Thank you all and GOD bless you all.
TABLE OF CONTENT
DECLARATION
DEDICATION
ACKNOWLEDGEMENT
CHAPTER ONE
1:0 Introductions
1:1 Background
CHAPTER TWO
CHAPTER THREE
Work Experience
3.0 Networking
3.1 Network Topology
3.4 IP Addressing
CHAPTER FOUR
1.0 INTRODUCTION
1.1 BACKGROUND
was established in the year 1986 as an industrial coordinating unit catering for
foundation staff were four (4) that comprised an industrial coordinator who is
responsible to the Vice Chancellor for the day to day running of the affair of the
office, a secretary/typist and an office assistant. SIWES unit was finally and
(NUC) the unit was formally upgraded to directorate under the leadership of the
Vice Chancellor, Professor Ibrahim Abu-Bakr Njodi. Over the years the
clientele student’s population has increased. The directorate has been doing its
of tertiary institutions.
The scheme exposes students to industry based skills necessary for a smooth
transition from the classroom to the world of work. It affords students of tertiary
experiences in a field related to the student’s academic major and career goals.
The Directorate started off as a small Computer Centre equipped with a couple
of IBM clones in 1984.Initially housed in the Department of Mathematical
Sciences, from 1984 through 1990, the Centre grew steadily in both
infrastructure and staff, ultimately becoming autonomous in 1990.
The Centre gained the status of a Directorate in 2013 and now boasts a staff
strength of over twenty qualified ICT professionals working harmoniously to
attain the lofty ICT ideals of the University.
The Directorate of ICT is poised to aid Ekiti State University in achieving her
strategic goals by aligning Information Technology strategies with the wider
strategic mission of the University, delivering excellent technological services
to support the University’s core educational, administration and research
operations.
WORK EXPERIENCE
3.0 NETWORKING
Star Topology
This is a local area network topology where all the nodes are connected
individually to a central connecting device called a hub or switch. Signals travel
from the nodes to the hub which then sends signals to other nodes on the
network. A star topology network is scale able –i.e. it can be design and
redesign easily.
Bus Topology
A LAN topology where each node is connected to a single main bus cable, is
transmits data to all the nodes on the network. The bus is actually a series of
cable segments running from one node to the other. Break or faulty piece of
cable anywhere on the segment prevents all the computers on the segment from
being able to communicate.
Mesh Topology
This is a network topology where every node on the network has a separate wire
connecting it to every other node on the network. It provides each device with a
point-to-point connection to every other device in the network. This type of
network has a high fault tolerance because failure of one node does not affect
data transmission between other nodes.
• Wired media
• Wireless media
Wired Media
These are media which require the use of wires, lines and cables to transmit
communication signals. During my industrial training at NOC, I encountered
majorly three different types of wired network media namely:
Coaxial cable
A coaxial cable is an alternative for protecting data from noise. Coaxial cables
do not produce external electric and magnetic fields and are not affected by
them. This makes them ideally suited, although more expensive, for
transmitting signals.
In a twisted pair there are eight copper wire that are coated with different
colours; the colours are mix/orange, orange, mix/blue, blue, mix/green, green,
mix/brown and brown.
These colours are very important when terminating cables. The two most
common ways of terminating Ethernet cables are:
In straight-through method, in any way you put in your cable, the colour
adopted at both ends must be the same.
In a cross-over method all you need to do is to terminate one end with a straight
rule method and the other end would be that pin ‘1’ goes to pin ‘3’ and vice-
versa, the pin ‘2’ then goes to pin ‘6’ and also vice-versa.
I got to know that a cross-over cable is used to connect two similar devices like
a PC to a PC while a straight through cable is used to connect different devices
e.g. a PC to a router.
Fibre optic cable
At the ICT the backbone upon which the network is built is fibre optic.
• Multi-mode fibres
During my stay at the ICT I was able to interact with the following devices:
Ethernet Radio
Router Network
Types of Router
There are several types of routers. Some of them are mentioned below:
Broadband Routers: These are one of the important kinds of routers. It is
used to do different types of things. it is used to connect computers or it is
also used to connect to the internet.
Wireless routers: These routers are used to create a wireless signal in your
office or home.
Wired Routers: Wired Router is used to connects multiple wired devices
using a Ethernet cable, It takes the transmission data from the modem and
distribute it to a further network, it is widely used in schools and small
offices.
Edge Routers: As the name indicates, these are located at the edges
usually connected to an Internet Service Provider, and distribute packets
across multiple packets.
Core Routers: Core routers distribute packets within the same network.
The main task is to carry heavy data transfers.
Virtual Router: They are implemented using a software on the virtual
machine , and they are more flexible and scalable.
Portable Routers: They are used to create private Wi-Fi and hence
designed for easy portability.
Functions of Router
The router performs below major functions:
Forwarding: The router receives the packets from its input ports, checks
its header, performs some basic functions like checking checksum, and
then looks up to the routing table to find the appropriate output port to
dump the packets onto, and forwards the packets onto that output port.
Routing: Routing is the process by which the router ascertains what is the
best path for the packet to reach the destination, It maintains a routing
table that is made using different algorithms by the router only.
Network Address Translation (NAT): Routers use NAT to translate
between different IP address ranges. This allows devices on a private
network to access the internet using a single public IP address.
Security: Routers can be configured with firewalls and other security
features to protect the network from unauthorized access, malware, and
other threats.
Quality of Service (QoS): Routers can prioritize network traffic based on
the type of data being transmitted. This ensures that critical applications
and services receive adequate bandwidth and are not affected by lower-
priority traffic.
Virtual Private Network (VPN) connectivity: Routers can be configured to
allow remote users to connect securely to the network using a VPN.
Bandwidth management: Routers can be used to manage network
bandwidth by controlling the amount of data that is allowed to flow
through the network. This can prevent network congestion and ensure that
critical applications and services receive adequate bandwidth.
Monitoring and diagnostics: Routers can be configured to monitor
network traffic and provide diagnostics information in the event of
network failures or other issues. This allows network administrators to
quickly identify and resolve problems.
Advantages of Router
Easier Connection: Sharing a single network connection among numerous
machines is the main advantage of router. This enables numerous people
to connect to the internet, boosting total productivity. In addition, routers
have connections between various media and network designs.
Security: Undoubtedly, installing a router is the first step in securing a
network connection. Because using a modem to connect directly to the
internet exposes your computer to several security risks. So that the
environment is somewhat secure, routers can be utilized as an
intermediary between two networks. While not a firewall or
antivirus replacement.
NAT Usage: Routers use Network Address Translation (NAT) to map
multiple private IP addresses into one public IP address. This allows for a
better Internet connection and information flow between all devices
connected to the network.
Supports Dynamic Routing: The router employs dynamic routing
strategies to aid in network communication. The internet work’s optimum
path is chosen through dynamic routing. Additionally, it creates collision
and broadcast domains. Overall, this can lessen network traffic.
Filtering of Packets: Switching between packets and filtering packets are
two more router services. A collection of filtering rules are used by routers
to filter the network. The packets are either allowed or passed through.
Disadvantages of Router
Slower: Routers analyze multiple layers of information, from the physical
layer to the network layer, which slows down connections. The same
issue can also be encountered when multiple devices are connected to
these network devices, causing “connection waiting”.
High Cost: They are more expensive than some other tools for systems
administration. This includes security, extension, and the focal point. As a
result, routers are typically not the greatest option for issues.
Need for configuration: The router must be properly configured to work
properly. In general, the more complex the intended use, the more
configuration is required. This requires professional installation, which
can add to the cost of buying a router.
Quality Issues: The time transitions are not always accurate. Even yet,
some modern devices use the 2.4GHz band, which is frequently
deactivated. These kinds of separations are frequently possible for those
who live in apartments and condominiums.
Bandwidth shortages: Dynamic routing techniques used by routers to
support connections tend to cause network overhead, consuming a lot of
bandwidth. This leads to a bandwidth shortage that significantly slows
down the internet connection between connected devices.
Switch
The Switch is a network device that is used to segment the networks into
different subnetworks called subnets or LAN segments. It is responsible for
filtering and forwarding the packets between LAN segments based on MAC
address.
Switches have many ports, and when data arrives at any port, the destination
address is examined first and some checks are also done and then it is processed
to the devices. Different types of communication are supported here like uni-
cast, multicast, and broadcast communication.
Switches are one of the most important things for transferring information
between different endpoints. Some of the benefits are mentioned below.
Switches are having full-duplex communication which helps in making
effective use of bandwidth.
Switches help to provide a wired connection to printers, IoT devices, wireless
points, and many more devices.
IoT Devices send data through Network Switches that help in making smarter
surroundings with the help of Artificial Intelligence.
Network Devices are made with the help of Switches that carry a large number
of traffic in telecommunication.
Types of Switches
Switches are mainly classified into the following types that are mentioned
below.
Virtual Switches: Virtual Switches are the switches that are inside Virtual
Machine hosting environments.
Routing Switches: These are the switches that are used to connect LANs.They
also have the work of performing functions in the Network Layer of the OSI
Model.
Unmanaged Switches: Unmanaged Switches are the devices that are used to
enable Ethernet devices that help in automatic data passing. These are generally
used for home networks and small businesses. In case of the requirement of
more switches, we just add more switches by plug and play method.
Managed Switches: Managed Switches are switches having more complex
networks. SNMP (Simple Network Management Protocol) can be used for
configuring managed switches. These types of switches are mostly used in large
networks having complex architecture. They provide better security levels and
precision control but they are more costly than Unmanaged switches.
LAN Switches: LAN (Local Area Network) Switches are also called ethernet
switches or data switches. LAN switches always try to avoid overlapping of
data packets in the network just by allocating bandwidth in such a manner.
PoE Switches: Power over Ethernet(PoE) are the switches used in Gigabit
Ethernets. PoE help in combining data and power transmission over the same
cable so that it helps in receiving data and electricity over the same line.
Smart Switches: Smart Switches are switches having some extra controls on
data transmissions but also have extra limitations over managed Switches. They
are also called partially managed switches.
Stackable Switches: Stackable switches are connected through a backplane to
combine two logical switches into a single switch.
Modular Switches: These types of switches help in accommodating two or more
cards. Modular switches help in providing better flexibility.
Advantages of Switches:
Prevents traffic overloading in a network by segmenting the network into
smaller subnets.
Increases the bandwidth of the network.
Less frame collision as the switch creates the collision domain for each
connection.
Disadvantages of Switches
It can not stop traffic destined for a different LAN segment from traveling to all
other LAN segments.
Switches are more expensive.
Features of Switches
It operates in Data Link Layer in OSI Model.
It performs error checking before forwarding data.
It transfers the data only to the device that has been addressed.
It operates in full duplex mode.
It allocates each LAN segment a limited bandwidth.
It uses Unicast (one-to-one), multicast (one-to-many), and broadcast (one-
to-all) transmission modes.
Packet Switching techniques are used to transfer data packets from source to
destination.
Switches have a more significant number of ports.
Antenna
It’s a device that aid and enhances the signal strength and quality. Antennas are
not used alone; it is always attached to something mostly to an antennas. An
antenna is of two types in terms of direction Directional and Omni-directional.
Directional beams signal in one direction while Omni- directional beams signals
in all direction. Antennas are better propagated horizontally.
Functions of IP Addressing
• For location of a device on the network
• It is assigned to allow hosts on one network to communicate to hosts on
another network
• IPv4 address is 32 bits divided in to four octets or bytes using dot ’.’
3.5 TROUBLESHOOTING SKILLS
Troubleshooting is the process of finding problems and solving them.
Should a client unable to browse or unable to make calls via the IP phone, the
check begins with the cable being used if client is connected via LAN cable,
this is done using the LAN-cable tester, check the face plates to know if it is
working, check the patched panel and switches on the distribution rack where
they are kept. Ping the systems Ethernet port, ping the server etc.
The gains of this exercise are immense; that it was worth the while is grossly an
understatement. Being accorded another opportunity in life to be exposed to the
rudiments of work places outside the class room teaching is an experience of a
life time.
4.2 CONCLUSION