Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1.0 INTRODUCTION
In the earlier days of science and technology in Nigeria, students were graduating from their
respective institutions without any technical knowledge or work experience. Training is a key
factor in enhancing the efficiency and expertise of the workforce. The Student Industrial Work
Experience Scheme (abbreviated as SIWES) was established by the Industrial Training Fund (ITF)
in 1973 to resolve the problem of inadequate practical skills necessary for employment in
industries by the graduates of tertiary institutions in Nigeria. It has become an innovative
phenomenon in human resources development and training in our country today.
Some of the objectives of the Student Industrial Work Experience Scheme among others include;
a. To prepare students of the various tertiary institutions for the work situation they are likely
to meet after graduation;
b. To provide an avenue for students in the Nigerian universities to acquire industrial skills
and experience during their course of study;
1
c. To allow the tra2nsition phase from school to the world of working environment easier and
facilitate students’ contact for later job placements;
d. To expose the students to work methods and techniques in handling equipment and
machinery that may not be available in their universities;
e. To provide students with an opportunity to apply their theoretical knowledge in real work
situation thereby bridging the gap between theory and practice.
f. Enlist and strengthen employers’ involvement in the entire educational process and prepare
Students for employment in Industry and Commerce.
The scheme covers all science and technological based courses in monotechnics, polytechnics and
universities in Nigeria, resulting in a high population of students which is easily managed because
of the public and private industries that partake in the scheme. SIWES enables students acquire
industrial know-how in their field of study particularly in technological based courses. It also
enables students experience the application of theoretical knowledge in solving real life problems.
The Federal Government, the Industrial Training Fund (ITF), the Supervising Agency, National
Universities Commission (NUC), Employers of labour and Institutions have specific roles to play
in the management of SIWES. The roles are:
2
b. The Industrial Training Fund (ITF). This agency is to:
Formulate policies and guidelines on SIWES for distribution to all the SIWES
participating bodies;
Accept and process Master and Placement lists from institutions and supervising
agencies;
Vet and approve Master and Placement lists of students from participating institution
and forward same to ITF; Fund SIWES Directorate adequately in participating
institutions;
Participate in the Biennial SIWES conferences and seminars in conjunction with ITF.
The student is to partake in the program in such a way that the purpose and objectives of the
program will be achieved at the end. The student is advised to ask questions, be submissive, and
3
adhere to all the rules and regulations of the organization where he is attached. The student is
required to genuinely fill his logbook on a daily basis and get it signed at the end of every week
and month by the industrial based supervisor. He/she must notify ITF at the beginning of the
program and also get the logbook stamped at the end of the program. Identification of placement
opportunities, funding of SIWES supervisors and assessment of the student are some of the roles
played by the institutions to ensure smooth running of the program.
The university's current president, preceded by Dr. David Huwiler, Dr. Michael Smith, and Dr.
Margee Ensign, is Dr. Dawn Dekle. Before joining AUN, Dr. Dekle was president of Orkhon
University in Mongolia, the first university to open after the transition from Communism. Before
joining Orkhon University, Dr. Dekle was president of the American University of Iraq, provost
at the American University of Afghanistan, and dean at the S P Jain School of Management in
Singapore.
1.6 VISION
AUN seeks to become a great center of learning and research for Nigeria and Africa, and a catalyst
for development in the entire world. In the words of its Founder, it sees its role as a "Development
University". Thus, the University will honor the traditional university roles of repository and
4
transmitter of culture and knowledge, and center for the creation of new knowledge. As a
"Development University", it will focus on the practical role that a great university must play in
the development of a great nation.
1.7 MISSION
The University’s mission is to provide quality education to Nigeria and Africa’s future leaders in
order to equip them with the skills needed to solve development issues on the continent, and give
them the knowledge needed to create solutions that will benefit their community, their country
and, ultimately, the world.
1.8 VALUES
Our values define what we hold in common as members of the AUN community, and informs our
vision and mission statements.
a. We believe that tolerance and understanding among national, ethnic, and religious
groups are essential to the success of this or any other nation. The University will
actively work to instill these values in its students and will itself reflect them in its
policies.
b. We believe that the University, in all of its activities, shall demonstrate the highest
standards of integrity, transparency, and academic honesty.
5
1.9 ORGANIZATIONAL CHART
I.T. DEPARTMENT
D.I.T
C.I.O
ASST. DIRECTOR
ADMINISTRATIVE NETWORK
OFFICER
HARDWARE SOFTWARE
NETWORK
UNIT
MANAGER
SENIOR SENIOR NETWORK
I.T. ENGINEER I.T. ENGINEER ENGINEER
NETWORK
I.T. ENGINEER I.T. SENIOR ENGINEER
ENGINEER SAT/TV
TECH.
INTERNS INTERNS
INTERNS
INTERNS
6
1.10 DEPARTMENTS OF INFORMATION TECHNOLOGY
Hardware Unit
User Support Unit/Software Unit
Network Unit/ Metropolitan Area Network Unit
Hardware Unit and User Support Unit/Software Unit: The Hardware Unit (HU) and The User
Support Unit (USU) are both Headed by User Support Ass. Director assisted by Ass. Manager and
IT Engineers. The department is saddled with the responsibilities of providing end user technology
support via telephone, helpdesk, or at walk-in locations across the campus. Our IT engineers can
respond to general information technology issues from the university faculty, staff, students, and
members of the alumni association. We also provide software diagnostics and installation, as well
as other systems support services. Most support is available at no charge to the University
community.
Network Unit/ Metropolitan Area Network Unit: The Network Unit, headed by Network Director
and supported by Network Manager and network Engineers, handles within the campus the
deployment and maintenance of Network infrastructures, configuration of devices, network
security, Satellite TV, Voice over IP (VOIP), emails and Internet. The Metropolitan Area Network
(MAN) headed by MAN Manger supported by Network Engineers, deals with the deployment and
maintenance of network infrastructures in all the residences of AUN and auxiliaries. The
department is headed by the Chief Information Officer (CIO) of the Department of Information
System and Information Technology who manages the administration and the operations of the
department’s daily activities. The CIO is assisted by two Directors, Ass. Director and three
Managers of the units.
7
CHAPTER TWO
INDUSTRIAL EXPERIENCES
Hardware Maintenance and repairs of computer peripherals training was part of the
responsibilities. I was attached along with other industrial training students. We were taught
different components of a computer system such as hard disk, processor, random access memory
(RAM), removing and replacing of these hardware components, installation of various software,
how to connect various devices (printers and scanners) and other computer peripherals.
Every computer system is made up of the same basic components. Here, I just want to point out
what the important components are. These components are:
Processor
Motherboard
The System Case
RAM
Graphics Card
Hard Drive
Optical Drive
Power Supply
The Processor (CPU) is the "brain" of your computer, the thing that carries out the tasks you give
it. Better CPUs can perform more tasks at once, and perform them faster.
8
Figure 1: Processor
The motherboard connects all the other components to one another, and is the physical base upon
which you build everything else. It contains a lot of your machine's core features, like the number
of USB ports, the number of expansion cards you can put in (such as video, sound, and Wi-Fi),
and also determines how big your computer will be.
Figure 2: Motherboard
9
2.1.4 THE RAM
RAM, or Random Access Memory, is your computer's short-term memory. It stores data your
computer needs quick access to help your programs run faster, and help you run more programs at
one time.
Figure 4: RAM
The Graphic card, or GPU, is a processor specifically designed to handle graphics. It's what you
hook your monitor up to, and it's what draws your desktop and your windows on the screen.
The hard drives are what store all of your data, ranging from your operating system to your
documents, music, and movies. If the RAM is your computer's short-term memory, your hard drive
is the long-term memory. It stores the things you want to keep.
10
Figure 6: Hard Disk Drive
An optical drive, more commonly known as a CD or DVD drive is used to access CDs, DVDs,
and even Blu-Ray discs.
The power supply directs electricity to the other components in your machine.
NOTE: PCs are the primary component of a workstation. This means that the PCs are used very
frequently and as such are prone to failure. The usual problems of PCs at the university were:
11
2.1.9 MALFUNCTIONING KEYBOARDS, MOUSE OR MONITORS
The source of such malfunction at most times is lack of proper maintenance by the user.
Malfunction may be due to improper cable. Connection between the Central Processing Unit
(CPU) of the PC and the device or a faulty cable altogether. The solutions for such problem are to
connect the cable properly if it is a bad connection situation or replace the cable in case of faulty
cables.
Computer operating system is that graphical user interface which gives the user an interface to
interact with the computer itself; the computer hardware and software applications. In other words,
Wikipedia defines Operating system as " a collection of software that manages computer hardware
resources and provides common services for computer programs."
In order to install an operating system, simply power on your newly assembled system then eject
the CD-ROM and insert operating system disc of your choice, follow the onscreen instruction by
selecting "I ACCEPT" and the "NEXT"
12
2.2.2 VIRTUAL MACHINE
A virtual machine (VM) is an operating system (OS) or application environment that is installed
on software, which imitates dedicated hardware. The end user has the same experience on a virtual
machine as they would have on dedicated hardware. Specialized software, called
a hypervisor, emulates the PC client or server's CPU, memory, hard disk, network and other
hardware resources completely, enabling virtual machines to share the resources. Virtual machines
more efficiently use hardware, which lowers the quantities of hardware and associated
maintenance costs, and reduces power and cooling demand. They also ease management because
virtual hardware does not fail. Administrators can take advantage of virtual environments to
simplify backups, disaster recovery, new deployments and basic system administration tasks.
The software that creates and manages a virtual machine on a host machine is called the hypervisor,
or Virtual Machine Manager (VMM). A hypervisor can run multiple virtual machines on a single
host computer. Each virtual machine runs its own operating system. The number of virtual
machines that can run at the same time depends on the host machine’s hardware resources. The
hypervisor allocates the physical system resources, such as CPU, RAM, and hard drive, to each
virtual machine as needed. This ensures that the operation of one virtual machine does not interfere
with another.
Figure 10 shows the two types of hypervisors: Type 1 (native) and Type 2 (hosted). A Type 1
hypervisor runs directly on the hardware of a host and manages the allocation of system resources
to virtual operating systems. A Type 2 hypervisor is hosted by an OS. The Windows Hyper-V and
Windows Virtual PC are examples of a Type 2 hypervisor.
13
Figure 10: Types of Hypervisor
Windows Hyper-V
It can reduce the costs of operating and maintaining physical servers by increasing
hardware utilization.
It can increase development and test efficiency by reducing the amount of time it takes to
set up hardware and software.
Windows Hyper-V must be enabled before it can be used. To enable Windows Hyper-V, use the
following path:
Control Panel > Programs and Features > click Turn Windows features on or off > check the
Hyper-V box > click OK.
You may need to restart the host machine before the changes can take effect.
14
Virtual Machine Requirements
Windows 7 (processor of 1GHz 32 or 64 bit processors, at least 2GB system RAM and
finally, at least 15GB per virtual OS).
Windows 8 Pro, Enterprise and Windows 10 (a 64-bit processor with 2nd level address
translation, BIOS-level hardware virtualization support, at least 4GB system RAM and
finally, at least 15GB per virtual OS).
Software problem is a type of problem that affects the operating system as well as other application
problems. This is of problem is usually caused by virus, malware, worms etc attack on the
operating system or other application packages installed on the system. Hardware problem may
sometimes lead to partial or total loss of data on the computer system, so care is to taken when
dealing with such type of faults. It is always advisable to back computer data when you are about
to engage in software trouble shooting. Software problem can sometimes lead start up problem.
Below is a brief summary of how to tackle
This type of situation occurs due to virus, malware, Trojan attack, dump files etc. For this type of
problem to be classified as software related, the system must be performing slower than it was
initially. This type of problem could be temporal or permanent. In the case of temporal system
hanging, a running application or process might be the cause of the problem. This is usually solved
by rebooting the computer system or using the task manager to kill such process. This problem
could also be related to the system registry error. Below is a recommendation for solving this type
of problem.
Solution
15
Perform disk clean up
If after performing the above steps, the problem still persists, the following solution could be
employed. Restore the system to an earlier state using the system restore tool and backup files and
format the computer system. If after performing the above recommendations the problem still
persist, it could be concluded at this stage that it’s a hardware related issue.
Sometimes Windows Update will go wrong in some way, rendering Windows unusable. It can
also happen due to virus attack, when a drive update goes wrong, or if you try to install more than
one version of Windows on the same machine. This can often be fixed with a Startup Repair. To
carry out startup repair, you will need a windows CD or a startup repair disc. Below is a quick
solution to this problem.
Solution
Your PC will restart again. Take the disc out and change the boot order in your BIOS back to
starting from the hard drive first, if necessary. Windows should be working.
Device driver update can cause some errors or abnormality in the operating system. When this
problem occurs, the best option available is to roll back the installation of the drive. This comes in
handy as windows has this tool available built within its operating system. The driver roll back
feature, available within device manager in Windows 7, is used to uninstall the current driver for
16
a hardware device and then automatically install the previously used driver. Below is a step by
step guide to rolling back device driver update.
Computer: A computer is an electronic device that accepts data via input device(s), processes with
the aid of processors, stores it with the aid storage device(s) and gives information via output
device(s).
Network: Is a group of two or more devices that can communicate. In practice, a network is
comprised of a number of different computer systems connected by physical and/or wireless
connections. The scale can range from a single PC sharing out basic peripherals to massive data
centers located around the World, to the Internet itself. Regardless of scope, all networks allow
computers and/or individuals to share information and resources.
17
Computer Network: Is a group of interconnected of devices sharing resources and interacting
using a shared communications link.
In a computer network, devices pass data to each other along network links. The connections are
established using either cable media or wireless media. Certainly the internet is the most
conspicuous example of computer networking, linking millions of computers around the world,
but smaller networks play a role in information access on a daily basis.
Below are some networking components which I worked with during my training:
Network Switch: Like a hub, a switch also works at the layer of LAN (Local Area Network) but
you can say that a switch is more intelligent than a hub. While hub just does the work of data
forwarding, a switch does ‘filter and forwarding’ which is a more intelligent way of dealing with
the data packets.
So, when a packet is received at one of the interfaces of the switch, it filters the packet and sends
only to the interface of the intended receiver. For this purpose, a switch also maintains a CAM
18
(Content Addressable Memory) table and has its own system configuration and memory. CAM
table is also called as forwarding table or forwarding information base (FIB).
Modem: A Modem is somewhat a more interesting network device in our daily life. So if you have
noticed around, you get an internet connection through a wire (there are different types of wires)
to your house. This wire is used to carry our internet data outside to the internet world. However,
our computer generates binary data or digital data in forms of 1s and 0s and on the other hand, a
wire carries an analog signal and that’s where a modem comes in. A modem stands for
(Modulator+Demodulator). That means it modulates and demodulates the signal between the
digital data of a computer and the analog signal of a telephone line.
Network Router: A router is a network device which is responsible for routing traffic from one to
another network. These two networks could be a private company network to a public network.
You can think of a router as a traffic police who directs different network traffic to different
directions.
19
Figure 13: A Router
Network Wireless Access Points: In computer networking, a wireless access point (WAP), or more
generally just access point (AP), is a networking hardware device that allows a Wi-Fi device to
connect to a wired network. The AP usually connects to a router (via a wired network) as a
standalone device, but it can also be an integral component of the router itself. An AP is
differentiated from a hotspot, which is the physical location where Wi-Fi access to a WLAN is
available.
Common topology found in networking includes mesh topology star topology, bus topology, ring
topology, and others. Network topology refers to the layout of the transmission medium and
devices on a network. Topologies use either a point to point or multipoint connection scheme. A
connection scheme indicates how many devices are connected to a transmission media segment or
an individual cable.
20
Star Topology: This is a local area network topology where all the nodes are connected
individually to a central connecting device called a hub or switch. Signals travel from the nodes to
the hub which then sends signals to other nodes on the network. A star topology network is scale
able –i.e. it can be design and redesign easily.
Bus Topology: A LAN topology where each node is connected to a single main bus cable, is
transmits data to all the nodes on the network. The bus is actually a series of cable segments
running from one node to the other. Break or faulty piece of cable anywhere on the segment
prevents all the computers on the segment from being able to communicate.
Mesh Topology: This is a network topology where every node on the network has a separate wire
connecting it to every other node on the network. It provides each device with a point-to-point
connection/ to every other device in the network. This type of network has a high fault tolerance
because failure of one node does not affect data transmission between other nodes.
21
Figure 17: Mesh topology
OSI (Open Systems Interconnection) is a reference model for how applications communicate over
a network. A reference model is a conceptual framework for understanding relationships. The
purpose of the OSI reference model is to guide vendors and developers so the digital
communication products and software programs they create can interoperate, and to facilitate a
clear framework that describes the functions of a networking or telecommunication system. Most
vendors involved in telecommunications make an attempt to describe their products and services
in relation to the OSI model. Developed by representatives of major computer and
telecommunication companies beginning in 1983, OSI was originally intended to be a detailed
specification of actual interfaces. Instead, the committee decided to establish a common reference
model with which others could then develop detailed interfaces, which, in turn, could become
standards governing the transmission of data packets. The OSI architecture was officially adopted
as an international standard by the International Organization for Standardization (ISO). The main
concept of OSI is that the process of communication between two endpoints in a network can be
divided into seven distinct groups of related functions, or layers. The seven Open Systems
Interconnection layers are (from layer seven down-ward):
Session - provides services to the presentation layer to organize its dialogue and to manage
data exchange.
22
Network - provides services to exchange the individual pieces of data over the network
between identified end devices.
Data Link - provides methods for exchanging data frames between devices over a common
media.
The TCP/IP protocol suite is an open standard, meaning these protocols are freely available to the
public, and any vendor is able to implement these protocols on their hardware or in their software.
It consists of four layers as seen in the diagram below;
23
TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication
protocols used to interconnect network devices on the internet. TCP/IP can also be used as a
communications protocol in a private network (an intranet or an extranet). The entire internet
protocol suite -- a set of rules and procedures -- is commonly referred to as TCP/IP, though others
are included in the suite. TCP/IP specifies how data is exchanged over the internet by providing
end-to-end communications that identify how it should be broken into packets, addressed,
transmitted, routed and received at the destination. TCP/IP requires little central management, and
it is designed to make networks reliable, with the ability to recover automatically from the failure
of any device on the network.
Network Media refers to the communication channels used to interconnect nodes on a computer
network. Typical examples of network media include copper coaxial cable, copper twisted pair
cables and optical fiber cables used in wired networks, and radio waves used in wireless data
communications networks.
• Wired media
• Wireless media
24
Coaxial cable
A coaxial cable is an alternative for protecting data from noise. Coaxial cables do not produce
external electric and magnetic fields and are not affected by them. This makes them ideally suited,
although more expensive, for transmitting signals.
In a twisted pair there are eight copper wire that are coated with different colours; the colours are
mix/orange, orange, mix/blue, blue, mix/green, green, mix/brown and brown.
These colours are very important when terminating cables. The two most common ways of
terminating Ethernet cables are:
25
(i) Straight-through method
In straight-through method, in any way you put in your cable, the colour adopted at both
ends must be the same.
In a cross-over method all you need to do is to terminate one end with a straight rule method and
the other end would be that pin ‘1’ goes to pin ‘3’ and vice-versa, the pin ‘2’ then goes to pin ‘6’
and also vice-versa.
I got to know that a cross-over cable is used to connect two similar devices like a PC to a PC while
a straight through cable is used to connect different devices e.g. a PC to a router.
RJ-45 Connectors
RJ45 is a standard type of connector for network cables. RJ45 connectors are most commonly seen
with Ethernet cables and networks. RJ45 connectors feature eight pins to which the wire strands
26
of a cable interface electrically. Standard RJ-45 Pin outs define the arrangement of the individual
wires needed when attaching connectors to a cable.
Crimper
Is a tool used to terminate category cables such as CAT1-CAT6 using an RJ-45 connector; it can
also be used to cut cable to a desired length.
This is used to test if a category cable has been well terminated, or develop a fault.
27
Crimping Guide:
It is made of glass fibers instead of wire; it consists of a center glass core surrounded by several
layers of protective material. The outer insulating jacket is made of Teflon or PVC. The fiber optic
cables transmit light rather than electronic signals, thereby eliminating the problem of electrical
interference.
28
Figure 28:Single-mode fibres
• Multi-mode fibers
Single-mode fibers have small cores while Multi-mode fibers have larger cores. Used for short-
distance communication links.
To fully explore the wireless added dimension, Communication system designers have sought to
use wireless media to reduce infrastructure cost and complexity, when compared to wired
communication systems. There is no need to construct miles of telephone line poles or cable
trenches.
2.4.6 IP ADDRESSING
Functions of IP Addressing
29
Classes of IPv4 Addresses
Class A: This Class address can only be between 0 and 127. All 0’s reserved for default route and
‘127’ is reserved for troubleshooting –loop back, therefore in reality Class A valid address range
that can be assigned to host on a network is 10-126
Class D and E: Class D (224-239) used for multicasting and Class E (240-255) for research
purposes
Broadcast Address
This is the address used to send data to all hosts on a broadcast domain. When all the host bits are
on (‘1’) this is a broadcast address for all hosts 255 are reserved for sending broadcast message.
Not routable
Introduced in mid 1990s due to depletion of IPv4 addresses
Used only in internal networks.
Must be translated to a public IPv4 to be routable.
Defined by RFC 1918
10.0.0.0 /8 10.255.255.255
172.16.0.0 /12 to 172.31.255.255
192.168.0.0/16 to 192.168.255.255
30
2.4.7 SUBNET MASK
A subnet mask is a 32-bit value that allows the recipient of an IP packet to distinguish the network
ID portion of the IP address from the host ID portion of the IP address. Table 3 shows the default
subnet masks for all classes of network.
2.4.8 SUBNETTING
Subnetting is the process of stealing bits from the host part of an IP address in order to divide the
larger network into smaller sub-networks called subnets. After subnetting, network subnet host
fields are created. An IP address is always reserved to identify the subnet and another one to
identify the broadcast address within the subnet. Subnetting can be done in three basic ways, one
of which is subnetting based on the number of subnetworks you wish to obtain from a single block
of IP address; another way is to subnet based on the number of host computers or devices you want
to be connected to that sub-network and finally subnetting by reverse engineering which is a
scenario in which a subnet mask and an IP address block is given and the number of subnetworks
and number of hosts per each subnet are found. For example, if a public IP address block of
192.168.23.1 with a subnet mask of 255.255.255.252 is purchased from our ISP and because this
block has only two valid hosts, this IP address is used to assign to our Router interface so that
traffic can be directed from our network to the ISP and from there to the internet. A private IP
address block is then chosen to carry out IP addressing within our network. Because of the
expected clients on this network, a Class B address is chosen for the internal network and it is
172.168.0.0 with a mask of 255.255.0.0. Based on the power of 2s, there are some equations that
allow us to determine the required details, and these are:
31
Number of subnets = 2x (1)
Cisco Packet Tracer is an innovative network simulation and visualization tool. Packet Tracer
provides an easy way to design and build networks of varying sizes without expensive lab
equipment. Packet Tracer is a tool that allows you to simulate real networks. It provides three main
menus that allow you to:
select, delete, inspect, label, and group components within your network
2.4.10 VLANs
VLAN Implementations
33
2.4.11 TRUNKING
Trunk is also a switching feature that allows a point-to-point connection of mostly switches. It
allows multiple flow of VLANs, i.e. a trunk port carries more than a single VLAN. To configure
a switch port on one end of a trunk link, use the switchport mode trunk command. With this
command, the interface changes to permanent trunking mode. The port enters into a Dynamic
Trunking Protocol (DTP) negotiation to convert the link into a trunk link even if the interface
connecting to it does not agree to the change
Figure 33:Trunking
Use the Cisco IOS switchport trunk allowed vlan vlan-list command to specify the list of VLANs
to be allowed on the trunk link.
In Figure above, VLANs 10, 20, and 30 support the Faculty, Student, and Guest computers (PC1,
PC2, and PC3). The native VLAN should also be changed from VLAN 1 and changed to another
VLAN such as VLAN 99. By default, all VLANs are allowed across a trunk link. The switchport
trunk allowed VLAN command can be used to limit the allowed VLANs.
34
Configuration of Trunk Interfaces
Note: This configuration assumes the use of Cisco Catalyst 2960 switches which automatically
use 802.1Q encapsulation on trunk links. Other switches may require manual configuration of the
encapsulation. Always configure both ends of a trunk link with the same native VLAN. If 802.1Q
trunk configuration is not the same on both ends, Cisco IOS Software reports errors.
DHCPv4 assigns IPv4 addresses and other network configuration information dynamically.
A dedicated DHCPv4 server is scalable and relatively easy to manage. A Cisco router can be
configured to provide DHCPv4 services in a small network.
DHCPv4 Operation
35
DHCP Request (DHCPREQUEST) – the client sends back a broadcast
DHCPREQUEST in response to the servers offer.
DHCP Acknowledgment (DHCPACK) – the server replies with a unicast
DHCPACK message.
Configuring DHCPv4
Verifying DHCPv4
Verify DHCPv4 configuration using the show running-config |section dhcp command.
Verify the operation of DHCPv4 using the show ip dhcp binding command.
Verify that messages are being received or sent by the router using the show ip dhcp
server statistics command.
Troubleshooting is the process of finding problems and solving them. Since this is a troubleshooting
article, we cannot define a specific steps list that will work 100% of the times. However, the following list
is the one that will get you to the problem faster. Moreover, we arranged it to be optimized for switch
troubleshooting.
36
3. Check VLANs configuration
The first step is going to be “Define the problem” every time. However, based on what the problem
really is, later steps may be followed in a different order. We are going to follow these steps for
both tickets, but before we do it we should talk about troubleshooting approaches.
Some people thing troubleshooting is like an art. Instead, troubleshooting is a simple task that can
be written in form of procedure. Troubleshooting can be stressful, and you might end up
performing the same checks again and again. This is frustrating, as you convince yourself that
there is no reason for the problem, and it shouldn’t be happening. Nonetheless, it is happening.
You need to have a plan. We can talk a lot about troubleshooting approaches, but for now we will
give you just a few tips.
First, state the problem clearly, talking with the user if necessary.
Use the divide-and-conquer approach. This mean you start by pinging between the two
devices that cannot communicate. If the ping is successful, check for application problems
at upper OSI layers. Instead, if the ping fails, do a traceroute to find where in the network
the problem is. Then, check data-link layer and physical connections. This approach is
opposed to the bottom-up approach (starting from the cabling) and the top-down approach
(starting from the application). With this approach, you start in the middle of the OSI layer.
Write down everything you do, so you won’t be repeating steps. This is useful for
complex issues or infrastructures.
If you still cannot resolve the issue, don’t panic. Google is your friend, check for users
having similar issues.
37
Define the problem
The first ticket we are going to face is for the PCs in the Sales department that cannot print. This
definition is way far from a punctual problem statement. After calling users, we clarify that they
cannot access printers, servers and file share on the network. Based on that, we know that it is
unlikely to be a print problem. Both users have the same problem, but the two PCs can
communicate with one another. It’s time for you to gather technical details. You ask the users to
open the command prompt (from the Start or with Win+R, then cmd for Windows users) and type
ipconfig /all. We need to gather four items: IP address, default gateway, subnet mask and Physical
address (mac address). The two devices having problem are Laptop0 and Laptop1, so here is an
example of Laptop 0 output.
Since pings are failing, and we are in the same subnet, we need to verify if data-link layer is
working as expected. To verify data-link layer, we start by issuing show ip arp just after those
pings. With this command, we are checking if our switch was able to resolve the IP addresses to
MAC addresses.
38
Figure 37: Show ARP result
The MAC address table on a switch remembers the association between a MAC address and a
physical port of the switch. The switch will populate that table and keep it up-to-date every time it
receives an ethernet frame. In other words, to see the MAC address of these laptops on the Top
switch, laptops must generate traffic and that traffic must reach the Top switch. Even ARP
responses are traffic, but we don’t know if our requests made it to the client. In case they didn’t,
the device won’t have generated any traffic. Just to be sure, jump on Laptop0 and ping the default
gateway, 10.100.2.1.
Even if ping fails, our PC has generated some traffic, so we can check the ARP table on the Top
switch to see if they made it. We do it by typing show mac address-table from the privileged exec
prompt.
39
Figure 39: MAC address table
Checking trunks
This problem involves two devices on the same VLAN, so it could be potentially a problem of that
VLAN. We issue show vlan brief to check if the VLAN exists, and we find that VLAN 102 is the
one for Laptops. Consequently, we need to check if this VLAN goes on the trunk toward
TopSwitchL3. We do that with show interfaces trunk.
This must be the problem. Therefore, all we need to do is enter in configuration mode, go under
the interface GigabitEthernet 0/1 and add the missing VLANs.
40
CHAPTER THREE
The student industrial work experience scheme (SIWES) is aimed at exposing students to the
practical work of what they are taught in the class so as to have better understanding of what they
are taught. And this I have acquired during my SIWES program at American University of Nigeria.
My academic work was very paramount to my experience I gained from both networking and
hardware because it gave me real basics of theories and as a computer scientist, understanding
these theories was really important because it’s what makes the difference between me who read
computer science and someone one who attended a road side computer schools as system
technician.
The industrial experience scheme is an opportunity to work and have the real practical skills
needed. The academic work serves as a platform to know and understand the components, the
41
various aspects, the theories, laws, principles, techniques and diverse areas of computer science
which serves as the basis for understanding what would be done practically as well as selecting
the area of specialization in accordance with the choice of company to work with during the
SIWES training. My Academic work made me to understand what I did well during my IT because
some terms were used during my training of which were not explained in details but my academic
knowledge made me understand what was being taught for example application of CSC401 (Net-
Centric Computing) in configuration of IP Address , installation of wireless internet, CSC101
(Introduction to Computer), CSC307 (Computer Architecture and Organization I) and CSC208
(Computer Hardware Systems and Maintenance) assisted in understanding and troubleshooting
hardware problems
42
CHAPTER FOUR
DISCUSSION
Having gone through the 6-month industrial training, I have the following suggestions to make for
the effectiveness of Student Industrial Work Experience Scheme (SIWES).
43
4.2 ADVICE FOR THE FUTURE PARTICIPANTS
a. Students on SIWES should try by all means and avail themselves to their places of work
no matter what regardless of them been paid their or not as their aim is to acquire
knowledge.
b. Students on SIWES should adhere strictly to rules and regulations designed by the
organization most especially those in companies should adhere strictly to safety
regulations.
c. Students should be good ambassadors of their institutions of learning.
a. SIWES management staff should ensure that SIWES supervisors visit students in their
places of attachment at least twice.
b. Funds allocated to students for the program should be released to them as soon as the
SIWES supervisors pay their first visit or immediately after the program.
c. If possible SIWES body should liaise with the organization on the welfare of students on
attachment such as accommodations.
4.4 CONCLUSION
This industrial training has afforded me the basic practical and theoretical knowledge that I may
not have gotten from the lecture room. It also gave me the opportunity to have a feel of what it
would be like after graduation when I start working
In conclusion, based on my experience during the program, I have learnt and gained a lot such as:
a. I can confidently and effectively educate pupils, parents, students, military, and local
Governments in computer literacy.
b. I can effectively handle the demands of the information system of the university and
consequently, any Organization I find myself in future.
c. I can effectively assist in the administration of a company’s computer network system,
LAN and WLAN inclusive.
d. I can carry out repair works on computer systems and accessories, which includes
printers and scanners.
44
REFERENCES
Albert Jackson; David Day, Popular Mechanics Complete Home How-to (New York: Hearst
Books, 2009), p. 282.
Computer network definition, archived from the original on 2012-01-21, retrieved 2011-11-12
Ugwuanyi Ezema, Challenges of SIWES in Library and Information Science in the ICT
Environment. Retrieved October 18, 2013 from; Understanding VLAN Trunk
Protocol (VTP) at Cisco.
Websites
https://10.2.27.8
https://www.aun.edu.ng
https://www.netacad.com/login/studentresources
https://en.wikipedia.org/wiki/Fiber-optic_communication
http://www.scribd.com/doc/99454182/IT-Technical-Report-Ahmad-Ibitoye
http://www.webpages.uidaho.edu/~mbolin/ugwuanyi-ezema.htm.
45