Sei sulla pagina 1di 45

CHAPTER ONE

1.0 INTRODUCTION

In the earlier days of science and technology in Nigeria, students were graduating from their
respective institutions without any technical knowledge or work experience. Training is a key
factor in enhancing the efficiency and expertise of the workforce. The Student Industrial Work
Experience Scheme (abbreviated as SIWES) was established by the Industrial Training Fund (ITF)
in 1973 to resolve the problem of inadequate practical skills necessary for employment in
industries by the graduates of tertiary institutions in Nigeria. It has become an innovative
phenomenon in human resources development and training in our country today.

SIWES is a skill development program designed to prepare students of universities, polytechnics


and colleges of education for transition from the college environment to work (Akerejola 2008).
Oyedele (1990) state that work experience is an educational program in which students participate
in work activities while attending school. This work experience program gives student the
opportunity to be part of an actual work situation outside the lecture room. SIWES is a cooperative
industrial internship program that involves institutions of higher learning, industries, and the
federal government of Nigeria, Industrial Training Fund (ITF), Nigeria Universities Commission
(NUC) and NBTE/NCCE in Nigeria. Students that participate in this work experience program
include those studying Computer Science, Information technology, Engineering, Vocational,
technological and related courses in institutions of higher learning. SIWES forms part of the
approved minimum academic standards in these institutions.

1.1 OBJECTIVES OF SIWES

Some of the objectives of the Student Industrial Work Experience Scheme among others include;

a. To prepare students of the various tertiary institutions for the work situation they are likely
to meet after graduation;

b. To provide an avenue for students in the Nigerian universities to acquire industrial skills
and experience during their course of study;

1
c. To allow the tra2nsition phase from school to the world of working environment easier and
facilitate students’ contact for later job placements;

d. To expose the students to work methods and techniques in handling equipment and
machinery that may not be available in their universities;

e. To provide students with an opportunity to apply their theoretical knowledge in real work
situation thereby bridging the gap between theory and practice.

f. Enlist and strengthen employers’ involvement in the entire educational process and prepare
Students for employment in Industry and Commerce.

1.2 THE SCOPE AND IMPORTANCE OF SIWES

The scheme covers all science and technological based courses in monotechnics, polytechnics and
universities in Nigeria, resulting in a high population of students which is easily managed because
of the public and private industries that partake in the scheme. SIWES enables students acquire
industrial know-how in their field of study particularly in technological based courses. It also
enables students experience the application of theoretical knowledge in solving real life problems.

1.3 ORGANISATIONS INVOLVED IN THE MANAGEMENT OF SIWES PROGRAMME


AND THEIR ROLES

The Federal Government, the Industrial Training Fund (ITF), the Supervising Agency, National
Universities Commission (NUC), Employers of labour and Institutions have specific roles to play
in the management of SIWES. The roles are:

a. The Federal Government


 To provide adequate funds to the ITF through the Federal Ministry of Industry for the
scheme;
 To make it mandatory for all ministries, companies and parastatals to offer places to
students in accordance with the provisions of Decree No. 47 of 1971 as amended in
1990.
 Formulate policies to guide the running of the scheme nationally.

2
b. The Industrial Training Fund (ITF). This agency is to:

 Formulate policies and guidelines on SIWES for distribution to all the SIWES
participating bodies;

 Provide logistic material needed to administer the scheme;

 Organise orientation programmes for students prior to attachment;

 Provide information on companies for attachment and assist in industrial placement of


students;

 Supervise students on Industrial attachment;

 Accept and process Master and Placement lists from institutions and supervising
agencies;

 Vet and process students’ logbooks and ITF Form 8.

c. The Supervisory Agencies (NUC, NABTEB, etc.)

The NUC is to:

 Ensure the establishment and accreditation of SIWES unit/Directorate in institutions


under their jurisdiction;

 Vet and approve Master and Placement lists of students from participating institution
and forward same to ITF; Fund SIWES Directorate adequately in participating
institutions;

 Direct for the appointment of full-time SIWES Coordinator/Director;

 Participate in the Biennial SIWES conferences and seminars in conjunction with ITF.

1.3 THE ROLE OF THE STUDENT AND THE ORGANISATION

The student is to partake in the program in such a way that the purpose and objectives of the
program will be achieved at the end. The student is advised to ask questions, be submissive, and

3
adhere to all the rules and regulations of the organization where he is attached. The student is
required to genuinely fill his logbook on a daily basis and get it signed at the end of every week
and month by the industrial based supervisor. He/she must notify ITF at the beginning of the
program and also get the logbook stamped at the end of the program. Identification of placement
opportunities, funding of SIWES supervisors and assessment of the student are some of the roles
played by the institutions to ensure smooth running of the program.

1.5 HISTORY OF AMERICAN UNIVERSITY OF NIGERIA

American University of Nigeria (AUN) is a private university located in northeastern Nigeria in


Yola, the state capital of Adamawa state. It was founded in 2004 by Atiku Abubakar, Nigeria's
former vice president. The University opened its doors to its first students in 2005.The university
was originally named the ABTI American University of Nigeria (AAUN) before the name was
simplified to American University of Nigeria (AUN). This puts it in conformity with practices of
other American style universities outside of the United States, such as the American University of
Beirut and the American University of Paris. AUN is the only American style institution of higher
learning in sub-Saharan Africa (the only other such university in Africa is the American University
in Cairo in Egypt). AUN is a member of the Association of American International Colleges and
Universities and is accredited by the Nigerian National Universities Commissions. AUN offers a
complete academic string ranging from elementary, through secondary, to undergraduate.

The university's current president, preceded by Dr. David Huwiler, Dr. Michael Smith, and Dr.
Margee Ensign, is Dr. Dawn Dekle. Before joining AUN, Dr. Dekle was president of Orkhon
University in Mongolia, the first university to open after the transition from Communism. Before
joining Orkhon University, Dr. Dekle was president of the American University of Iraq, provost
at the American University of Afghanistan, and dean at the S P Jain School of Management in
Singapore.

1.6 VISION

AUN seeks to become a great center of learning and research for Nigeria and Africa, and a catalyst
for development in the entire world. In the words of its Founder, it sees its role as a "Development
University". Thus, the University will honor the traditional university roles of repository and

4
transmitter of culture and knowledge, and center for the creation of new knowledge. As a
"Development University", it will focus on the practical role that a great university must play in
the development of a great nation.

1.7 MISSION

The University’s mission is to provide quality education to Nigeria and Africa’s future leaders in
order to equip them with the skills needed to solve development issues on the continent, and give
them the knowledge needed to create solutions that will benefit their community, their country
and, ultimately, the world.

1.8 VALUES

Our values define what we hold in common as members of the AUN community, and informs our
vision and mission statements.

a. We believe that tolerance and understanding among national, ethnic, and religious
groups are essential to the success of this or any other nation. The University will
actively work to instill these values in its students and will itself reflect them in its
policies.

b. We believe that the University, in all of its activities, shall demonstrate the highest
standards of integrity, transparency, and academic honesty.

c. We believe that freedom of expression is fundamental to any intellectual community


and affirm that all members of the AUN community will have to express any opinion
without fear of reprisals of any kind.

5
1.9 ORGANIZATIONAL CHART

I.T. DEPARTMENT

D.I.T
C.I.O
ASST. DIRECTOR
ADMINISTRATIVE NETWORK
OFFICER

NETWORK SENIOR SYS.


MANAGER MANAGER ENGINEER
USER SUPPORT (MAN)

HARDWARE SOFTWARE
NETWORK
UNIT
MANAGER
SENIOR SENIOR NETWORK
I.T. ENGINEER I.T. ENGINEER ENGINEER

NETWORK
I.T. ENGINEER I.T. SENIOR ENGINEER
ENGINEER SAT/TV
TECH.

INTERNS INTERNS
INTERNS
INTERNS

6
1.10 DEPARTMENTS OF INFORMATION TECHNOLOGY

The department of Information Technology is structured into three units:

 Hardware Unit
 User Support Unit/Software Unit
 Network Unit/ Metropolitan Area Network Unit

Hardware Unit and User Support Unit/Software Unit: The Hardware Unit (HU) and The User
Support Unit (USU) are both Headed by User Support Ass. Director assisted by Ass. Manager and
IT Engineers. The department is saddled with the responsibilities of providing end user technology
support via telephone, helpdesk, or at walk-in locations across the campus. Our IT engineers can
respond to general information technology issues from the university faculty, staff, students, and
members of the alumni association. We also provide software diagnostics and installation, as well
as other systems support services. Most support is available at no charge to the University
community.

Network Unit/ Metropolitan Area Network Unit: The Network Unit, headed by Network Director
and supported by Network Manager and network Engineers, handles within the campus the
deployment and maintenance of Network infrastructures, configuration of devices, network
security, Satellite TV, Voice over IP (VOIP), emails and Internet. The Metropolitan Area Network
(MAN) headed by MAN Manger supported by Network Engineers, deals with the deployment and
maintenance of network infrastructures in all the residences of AUN and auxiliaries. The
department is headed by the Chief Information Officer (CIO) of the Department of Information
System and Information Technology who manages the administration and the operations of the
department’s daily activities. The CIO is assisted by two Directors, Ass. Director and three
Managers of the units.

7
CHAPTER TWO

INDUSTRIAL EXPERIENCES

2.0 COMPUTER MAINTENANCE


2.1 HARDWARE MAINTENANCE

Hardware Maintenance and repairs of computer peripherals training was part of the
responsibilities. I was attached along with other industrial training students. We were taught
different components of a computer system such as hard disk, processor, random access memory
(RAM), removing and replacing of these hardware components, installation of various software,
how to connect various devices (printers and scanners) and other computer peripherals.

Every computer system is made up of the same basic components. Here, I just want to point out
what the important components are. These components are:

 Processor
 Motherboard
 The System Case
 RAM
 Graphics Card
 Hard Drive
 Optical Drive
 Power Supply

2.1.1 THE PROCESSOR

The Processor (CPU) is the "brain" of your computer, the thing that carries out the tasks you give
it. Better CPUs can perform more tasks at once, and perform them faster.

8
Figure 1: Processor

2.1.2 THE MOTHERBOARD

The motherboard connects all the other components to one another, and is the physical base upon
which you build everything else. It contains a lot of your machine's core features, like the number
of USB ports, the number of expansion cards you can put in (such as video, sound, and Wi-Fi),
and also determines how big your computer will be.

Figure 2: Motherboard

2.1.3 THE CASE

The case holds all of your computer's parts together.

Figure 3: System case

9
2.1.4 THE RAM

RAM, or Random Access Memory, is your computer's short-term memory. It stores data your
computer needs quick access to help your programs run faster, and help you run more programs at
one time.

Figure 4: RAM

2.1.5 THE GRAPHIC CARD

The Graphic card, or GPU, is a processor specifically designed to handle graphics. It's what you
hook your monitor up to, and it's what draws your desktop and your windows on the screen.

Figure 5: Graphic card

2.1.6 THE HARD DRIVE

The hard drives are what store all of your data, ranging from your operating system to your
documents, music, and movies. If the RAM is your computer's short-term memory, your hard drive
is the long-term memory. It stores the things you want to keep.

10
Figure 6: Hard Disk Drive

2.1.7 THE OPTICAL DRIVE

An optical drive, more commonly known as a CD or DVD drive is used to access CDs, DVDs,
and even Blu-Ray discs.

Figure 7: DVD drive

2.1.8 THE POWER SUPPLY UNIT

The power supply directs electricity to the other components in your machine.

Figure 8: Power supply unit

NOTE: PCs are the primary component of a workstation. This means that the PCs are used very
frequently and as such are prone to failure. The usual problems of PCs at the university were:

 Malfunctioning Keyboards, Mouse or Monitors.


 System failure: Mostly a corrupted Hard Disk.
 System failure: At the Operating System (OS) Startup level
 Slow performance.
 Installation and Upgrade of Antivirus and Regular software updates.

11
2.1.9 MALFUNCTIONING KEYBOARDS, MOUSE OR MONITORS

The source of such malfunction at most times is lack of proper maintenance by the user.
Malfunction may be due to improper cable. Connection between the Central Processing Unit
(CPU) of the PC and the device or a faulty cable altogether. The solutions for such problem are to
connect the cable properly if it is a bad connection situation or replace the cable in case of faulty
cables.

2.2 SOFTWARE MAINTENANCE

Software maintenance or program maintenance is the updating of application programs in order to


meet changing information requirements, such as adding new functions and changing data formats.
It also includes fixing bugs and adapting the software to new hardware devices

2.2.1 OPERATING SYSTEM INSTALLATION

Computer operating system is that graphical user interface which gives the user an interface to
interact with the computer itself; the computer hardware and software applications. In other words,
Wikipedia defines Operating system as " a collection of software that manages computer hardware
resources and provides common services for computer programs."

In order to install an operating system, simply power on your newly assembled system then eject
the CD-ROM and insert operating system disc of your choice, follow the onscreen instruction by
selecting "I ACCEPT" and the "NEXT"

Figure 9: Operating System and Hardware

12
2.2.2 VIRTUAL MACHINE

A virtual machine (VM) is an operating system (OS) or application environment that is installed
on software, which imitates dedicated hardware. The end user has the same experience on a virtual
machine as they would have on dedicated hardware. Specialized software, called
a hypervisor, emulates the PC client or server's CPU, memory, hard disk, network and other
hardware resources completely, enabling virtual machines to share the resources. Virtual machines
more efficiently use hardware, which lowers the quantities of hardware and associated
maintenance costs, and reduces power and cooling demand. They also ease management because
virtual hardware does not fail. Administrators can take advantage of virtual environments to
simplify backups, disaster recovery, new deployments and basic system administration tasks.

Hypervisor: Virtual Machine Manager

The software that creates and manages a virtual machine on a host machine is called the hypervisor,
or Virtual Machine Manager (VMM). A hypervisor can run multiple virtual machines on a single
host computer. Each virtual machine runs its own operating system. The number of virtual
machines that can run at the same time depends on the host machine’s hardware resources. The
hypervisor allocates the physical system resources, such as CPU, RAM, and hard drive, to each
virtual machine as needed. This ensures that the operation of one virtual machine does not interfere
with another.

Figure 10 shows the two types of hypervisors: Type 1 (native) and Type 2 (hosted). A Type 1
hypervisor runs directly on the hardware of a host and manages the allocation of system resources
to virtual operating systems. A Type 2 hypervisor is hosted by an OS. The Windows Hyper-V and
Windows Virtual PC are examples of a Type 2 hypervisor.

13
Figure 10: Types of Hypervisor

Windows Hyper-V

Windows Hyper-V is a virtualization platform for Windows 8 or windows later versions. It


provides software infrastructure and basic management tools to create and manage a virtualized
server computing environment. A virtualized server environment has many advantages:

 It can reduce the costs of operating and maintaining physical servers by increasing
hardware utilization.

 It can increase development and test efficiency by reducing the amount of time it takes to
set up hardware and software.

 It can improve server availability without using as many physical computers.

Windows Hyper-V must be enabled before it can be used. To enable Windows Hyper-V, use the
following path:

Control Panel > Programs and Features > click Turn Windows features on or off > check the
Hyper-V box > click OK.

You may need to restart the host machine before the changes can take effect.

14
Virtual Machine Requirements

 Windows 7 (processor of 1GHz 32 or 64 bit processors, at least 2GB system RAM and
finally, at least 15GB per virtual OS).

 Windows 8 Pro, Enterprise and Windows 10 (a 64-bit processor with 2nd level address
translation, BIOS-level hardware virtualization support, at least 4GB system RAM and
finally, at least 15GB per virtual OS).

2.2.3 SOFTWARE TROUBLESHOOTING

Software problem is a type of problem that affects the operating system as well as other application
problems. This is of problem is usually caused by virus, malware, worms etc attack on the
operating system or other application packages installed on the system. Hardware problem may
sometimes lead to partial or total loss of data on the computer system, so care is to taken when
dealing with such type of faults. It is always advisable to back computer data when you are about
to engage in software trouble shooting. Software problem can sometimes lead start up problem.
Below is a brief summary of how to tackle

Freezing or Slow System.

This type of situation occurs due to virus, malware, Trojan attack, dump files etc. For this type of
problem to be classified as software related, the system must be performing slower than it was
initially. This type of problem could be temporal or permanent. In the case of temporal system
hanging, a running application or process might be the cause of the problem. This is usually solved
by rebooting the computer system or using the task manager to kill such process. This problem
could also be related to the system registry error. Below is a recommendation for solving this type
of problem.

Solution

 The following is recommended for solving this problem.


 Reboot the computer system.
 Use an antivirus program to scan the computer system.
 Use a registry cleaning software to clean up the registry.

15
 Perform disk clean up

If after performing the above steps, the problem still persists, the following solution could be
employed. Restore the system to an earlier state using the system restore tool and backup files and
format the computer system. If after performing the above recommendations the problem still
persist, it could be concluded at this stage that it’s a hardware related issue.

“Operating System Missing” Error On Startup

Sometimes Windows Update will go wrong in some way, rendering Windows unusable. It can
also happen due to virus attack, when a drive update goes wrong, or if you try to install more than
one version of Windows on the same machine. This can often be fixed with a Startup Repair. To
carry out startup repair, you will need a windows CD or a startup repair disc. Below is a quick
solution to this problem.

Solution

 insert the Windows disc in the drive


 Restart your PC
 Enter your BIOS and change your boot order to boot from CD/DVD first.
 Choose your language, then click next
 Click Repair Your Computer
 Choose your operating system (there will likely be only one listed), then click next again
 Select use recovery tools that can help fix problems starting windows and click next
 Click startup repair

Your PC will restart again. Take the disc out and change the boot order in your BIOS back to
starting from the hard drive first, if necessary. Windows should be working.

Problem Due to Device Driver Update

Device driver update can cause some errors or abnormality in the operating system. When this
problem occurs, the best option available is to roll back the installation of the drive. This comes in
handy as windows has this tool available built within its operating system. The driver roll back
feature, available within device manager in Windows 7, is used to uninstall the current driver for
16
a hardware device and then automatically install the previously used driver. Below is a step by
step guide to rolling back device driver update.

 Open Device Manager from the Windows 7 Control Panel.


 In Device Manager, locate the device that you want to roll back the driver for.
 After finding the hardware you're rolling back the driver for, right click on the device's
name or icon and click on properties.
 In the Properties window for the device, click the Driver tab.
 On the Driver tab, click the Roll Back Driver button.
 Click the Yes button to the "Are you sure you would like to roll back to the previously
installed driver software?" question. The previously installed driver will now be restored.
You should see the Roll Back Driver button as disabled after the roll back is complete.
 Click the Close button at the bottom of the device properties screen.
 Click yes on the System Settings Change dialog box that says "Your hardware settings
have changed. You must restart your computer for these changes to take effect. Do you
want to restart your computer now?"
 Your computer will now automatically restart.
 When Windows 7 starts again, it will load with the device driver for this hardware you had
previously installed.

2.4 COMPUTER NETWORKING

Computer: A computer is an electronic device that accepts data via input device(s), processes with
the aid of processors, stores it with the aid storage device(s) and gives information via output
device(s).

Network: Is a group of two or more devices that can communicate. In practice, a network is
comprised of a number of different computer systems connected by physical and/or wireless
connections. The scale can range from a single PC sharing out basic peripherals to massive data
centers located around the World, to the Internet itself. Regardless of scope, all networks allow
computers and/or individuals to share information and resources.

Networking: Is the sharing of resources and services between interconnected devices.

17
Computer Network: Is a group of interconnected of devices sharing resources and interacting
using a shared communications link.

In a computer network, devices pass data to each other along network links. The connections are
established using either cable media or wireless media. Certainly the internet is the most
conspicuous example of computer networking, linking millions of computers around the world,
but smaller networks play a role in information access on a daily basis.

a. Local Area Network (LAN)


b. Wide Area Network (WAN)
a) Local Area Network (LAN): is a network that is confined to a relatively small area. It is
generally limited to a geographic area such as a writing lab, school, or building. Local Area
Network, generally called LAN, is a private network within a single building or campus of
up to a few kilo-meters in size. They are widely used to connect personal computers and
workstations in company offices and factories to share resources (e.g. printers) and
exchange information. LANs are distinguished from other kinds of networks by three
characteristics- size, transmission and topology.
b) Wide Area Network (WAN): connect networks in larger geographic areas, such as
Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks
may be used to connect this type of global network. Using a WAN, schools in Florida can
communicate with places like Tokyo in a matter of seconds, without paying enormous
phone bills.

2.4.1 NETWORK COMPONENTS

Below are some networking components which I worked with during my training:

Network Switch: Like a hub, a switch also works at the layer of LAN (Local Area Network) but
you can say that a switch is more intelligent than a hub. While hub just does the work of data
forwarding, a switch does ‘filter and forwarding’ which is a more intelligent way of dealing with
the data packets.

So, when a packet is received at one of the interfaces of the switch, it filters the packet and sends
only to the interface of the intended receiver. For this purpose, a switch also maintains a CAM

18
(Content Addressable Memory) table and has its own system configuration and memory. CAM
table is also called as forwarding table or forwarding information base (FIB).

Figure 11: A Cisco catalyst Switch

Modem: A Modem is somewhat a more interesting network device in our daily life. So if you have
noticed around, you get an internet connection through a wire (there are different types of wires)
to your house. This wire is used to carry our internet data outside to the internet world. However,
our computer generates binary data or digital data in forms of 1s and 0s and on the other hand, a
wire carries an analog signal and that’s where a modem comes in. A modem stands for
(Modulator+Demodulator). That means it modulates and demodulates the signal between the
digital data of a computer and the analog signal of a telephone line.

Figure 12: A Modem

Network Router: A router is a network device which is responsible for routing traffic from one to
another network. These two networks could be a private company network to a public network.
You can think of a router as a traffic police who directs different network traffic to different
directions.

19
Figure 13: A Router

Network Wireless Access Points: In computer networking, a wireless access point (WAP), or more
generally just access point (AP), is a networking hardware device that allows a Wi-Fi device to
connect to a wired network. The AP usually connects to a router (via a wired network) as a
standalone device, but it can also be an integral component of the router itself. An AP is
differentiated from a hotspot, which is the physical location where Wi-Fi access to a WLAN is
available.

Figure 14: Access Point

2.4.2 NETWORK TOPOLOGY

Common topology found in networking includes mesh topology star topology, bus topology, ring
topology, and others. Network topology refers to the layout of the transmission medium and
devices on a network. Topologies use either a point to point or multipoint connection scheme. A
connection scheme indicates how many devices are connected to a transmission media segment or
an individual cable.

20
Star Topology: This is a local area network topology where all the nodes are connected
individually to a central connecting device called a hub or switch. Signals travel from the nodes to
the hub which then sends signals to other nodes on the network. A star topology network is scale
able –i.e. it can be design and redesign easily.

Figure 15: Star topology

Bus Topology: A LAN topology where each node is connected to a single main bus cable, is
transmits data to all the nodes on the network. The bus is actually a series of cable segments
running from one node to the other. Break or faulty piece of cable anywhere on the segment
prevents all the computers on the segment from being able to communicate.

Figure 16: Bus topology

Mesh Topology: This is a network topology where every node on the network has a separate wire
connecting it to every other node on the network. It provides each device with a point-to-point
connection/ to every other device in the network. This type of network has a high fault tolerance
because failure of one node does not affect data transmission between other nodes.

21
Figure 17: Mesh topology

2.4.3 THE OSI REFERENCE MODEL

OSI (Open Systems Interconnection) is a reference model for how applications communicate over
a network. A reference model is a conceptual framework for understanding relationships. The
purpose of the OSI reference model is to guide vendors and developers so the digital
communication products and software programs they create can interoperate, and to facilitate a
clear framework that describes the functions of a networking or telecommunication system. Most
vendors involved in telecommunications make an attempt to describe their products and services
in relation to the OSI model. Developed by representatives of major computer and
telecommunication companies beginning in 1983, OSI was originally intended to be a detailed
specification of actual interfaces. Instead, the committee decided to establish a common reference
model with which others could then develop detailed interfaces, which, in turn, could become
standards governing the transmission of data packets. The OSI architecture was officially adopted
as an international standard by the International Organization for Standardization (ISO). The main
concept of OSI is that the process of communication between two endpoints in a network can be
divided into seven distinct groups of related functions, or layers. The seven Open Systems
Interconnection layers are (from layer seven down-ward):

 Application - contains protocols used for process-to-process communications.

 Presentation - provides for common representation of the data.

 Session - provides services to the presentation layer to organize its dialogue and to manage
data exchange.

 Transport - defines services to segment, transfer, and reassemble the data.

22
 Network - provides services to exchange the individual pieces of data over the network
between identified end devices.

 Data Link - provides methods for exchanging data frames between devices over a common
media.

 Physical - describes the mechanical, electrical, functional, and procedural means to


transmit bits across physical connections.

Figure 18: The OSI Model

2.4.4 THE TCP/IP MODEL

The TCP/IP protocol suite is an open standard, meaning these protocols are freely available to the
public, and any vendor is able to implement these protocols on their hardware or in their software.
It consists of four layers as seen in the diagram below;

Figure 19:TCP/IP Model

23
TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication
protocols used to interconnect network devices on the internet. TCP/IP can also be used as a
communications protocol in a private network (an intranet or an extranet). The entire internet
protocol suite -- a set of rules and procedures -- is commonly referred to as TCP/IP, though others
are included in the suite. TCP/IP specifies how data is exchanged over the internet by providing
end-to-end communications that identify how it should be broken into packets, addressed,
transmitted, routed and received at the destination. TCP/IP requires little central management, and
it is designed to make networks reliable, with the ability to recover automatically from the failure
of any device on the network.

2.4.5 NETWORK MEDIA

Network Media refers to the communication channels used to interconnect nodes on a computer
network. Typical examples of network media include copper coaxial cable, copper twisted pair
cables and optical fiber cables used in wired networks, and radio waves used in wireless data
communications networks.

• Wired media
• Wireless media

2.4.5.1 WIRED MEDIA


These are media which require the use of wires, lines and cables to transmit communication
signals.

Table I: IEEE Cabling Standards

Speed Name IEEE Name IEEE Standard Cable/Length


10Mbps Ethernet 10BASE-T 802. 3 Copper/100 m
100Mbps FastEthernet 100BASE-T 802. 3u Copper/100 m
1000Mbps GigabitEthernet 1000BASE-LX 802. 3z Fiber/5000 m
1000Mbps GigabitEthernet 1000BASE-T 802. 3ab Copper/100 m
10Gbps TenGigabitEthernet 10GBASE-T 802. 3an Copper/100 m

24
Coaxial cable

A coaxial cable is an alternative for protecting data from noise. Coaxial cables do not produce
external electric and magnetic fields and are not affected by them. This makes them ideally suited,
although more expensive, for transmitting signals.

Figure 20: Coaxial cable

Twisted pair cable

In a twisted pair there are eight copper wire that are coated with different colours; the colours are
mix/orange, orange, mix/blue, blue, mix/green, green, mix/brown and brown.

Figure 21: Twisted pair cable

These colours are very important when terminating cables. The two most common ways of
terminating Ethernet cables are:

25
(i) Straight-through method

Figure 22: Straight through cabling

In straight-through method, in any way you put in your cable, the colour adopted at both
ends must be the same.

(ii) cross-over method

Figure 23: Cross-over cabling

In a cross-over method all you need to do is to terminate one end with a straight rule method and
the other end would be that pin ‘1’ goes to pin ‘3’ and vice-versa, the pin ‘2’ then goes to pin ‘6’
and also vice-versa.

I got to know that a cross-over cable is used to connect two similar devices like a PC to a PC while
a straight through cable is used to connect different devices e.g. a PC to a router.

2.4.5.2 CRIMPING TOOLS

RJ-45 Connectors

RJ45 is a standard type of connector for network cables. RJ45 connectors are most commonly seen
with Ethernet cables and networks. RJ45 connectors feature eight pins to which the wire strands

26
of a cable interface electrically. Standard RJ-45 Pin outs define the arrangement of the individual
wires needed when attaching connectors to a cable.

Figure 24: RJ-45 connectors

Crimper

Is a tool used to terminate category cables such as CAT1-CAT6 using an RJ-45 connector; it can
also be used to cut cable to a desired length.

Figure 25: Crrimper

LAN cable tester

This is used to test if a category cable has been well terminated, or develop a fault.

Figure 26: LAN cable tester

27
Crimping Guide:

Step1: Outer Sheathe Stripping

Step 2: Wire Untwisting to any of the Arrangement Scheme

Step 3: Wire Preparation for RJ-45 Connector

Step 4: Inserting Wires into RJ-45 Connector

Step 5: Crimp and Test The continuity

Fiber Optic Cable

It is made of glass fibers instead of wire; it consists of a center glass core surrounded by several
layers of protective material. The outer insulating jacket is made of Teflon or PVC. The fiber optic
cables transmit light rather than electronic signals, thereby eliminating the problem of electrical
interference.

Figure 27:Fiber optic cables

Optical fibers come in two types:


• Single-mode fibers

28
Figure 28:Single-mode fibres

• Multi-mode fibers

Figure 29:Multi-mode fibres

Single-mode fibers have small cores while Multi-mode fibers have larger cores. Used for short-
distance communication links.

2.4.5.3 WIRELESS MEDIA

To fully explore the wireless added dimension, Communication system designers have sought to
use wireless media to reduce infrastructure cost and complexity, when compared to wired
communication systems. There is no need to construct miles of telephone line poles or cable
trenches.

2.4.6 IP ADDRESSING

An IP address is a unique identifier that is assigned to a host on a network. It is also a unique


identifier for a host or a node on a network. We have IPv4 and IPv6. IPv4 is 32-bits and IPv6 is
128-bits.

Functions of IP Addressing

 For location of a device on the network


 It is assigned to allow hosts on one network to communicate to hosts on another network
 IPv4 address is 32 bits divided in to four octets or bytes using dots ‘.’

29
Classes of IPv4 Addresses

IPv4 which is 32bits has class ranges from class A-E

Class A: This Class address can only be between 0 and 127. All 0’s reserved for default route and
‘127’ is reserved for troubleshooting –loop back, therefore in reality Class A valid address range
that can be assigned to host on a network is 10-126

Class B: Class B address can only be between 172 – 191

Class C: Class address can only be between 192 – 223

NB: Class A-C are used for unicast.

Class D and E: Class D (224-239) used for multicasting and Class E (240-255) for research
purposes

Broadcast Address

This is the address used to send data to all hosts on a broadcast domain. When all the host bits are
on (‘1’) this is a broadcast address for all hosts 255 are reserved for sending broadcast message.

Private IPv4 Addresses

 Not routable
 Introduced in mid 1990s due to depletion of IPv4 addresses
 Used only in internal networks.
 Must be translated to a public IPv4 to be routable.
 Defined by RFC 1918

Private Address Blocks

 10.0.0.0 /8 10.255.255.255
 172.16.0.0 /12 to 172.31.255.255
 192.168.0.0/16 to 192.168.255.255

Public IPv4 Addresses: Are addresses outside the private ones.

30
2.4.7 SUBNET MASK

A subnet mask is a 32-bit value that allows the recipient of an IP packet to distinguish the network
ID portion of the IP address from the host ID portion of the IP address. Table 3 shows the default
subnet masks for all classes of network.

Table II: Subnet Mask for Different Classes of Networks

Class of IP Format Default Subnet Mask

A Network. node. node. node 255.0.0.0

B Network. network. node. node 255.255.0.0

C Network. network. network. Node 255.255.255.0

2.4.8 SUBNETTING

Subnetting is the process of stealing bits from the host part of an IP address in order to divide the
larger network into smaller sub-networks called subnets. After subnetting, network subnet host
fields are created. An IP address is always reserved to identify the subnet and another one to
identify the broadcast address within the subnet. Subnetting can be done in three basic ways, one
of which is subnetting based on the number of subnetworks you wish to obtain from a single block
of IP address; another way is to subnet based on the number of host computers or devices you want
to be connected to that sub-network and finally subnetting by reverse engineering which is a
scenario in which a subnet mask and an IP address block is given and the number of subnetworks
and number of hosts per each subnet are found. For example, if a public IP address block of
192.168.23.1 with a subnet mask of 255.255.255.252 is purchased from our ISP and because this
block has only two valid hosts, this IP address is used to assign to our Router interface so that
traffic can be directed from our network to the ISP and from there to the internet. A private IP
address block is then chosen to carry out IP addressing within our network. Because of the
expected clients on this network, a Class B address is chosen for the internal network and it is
172.168.0.0 with a mask of 255.255.0.0. Based on the power of 2s, there are some equations that
allow us to determine the required details, and these are:

31
Number of subnets = 2x (1)

Number of hosts per subnet = 2y - 2 (2)

Block size = Increment = 256 – subnet mask (3)

2.4.9 CISCO PACKET TRACER

Cisco Packet Tracer is an innovative network simulation and visualization tool. Packet Tracer
provides an easy way to design and build networks of varying sizes without expensive lab
equipment. Packet Tracer is a tool that allows you to simulate real networks. It provides three main
menus that allow you to:

 add devices and connect them via cables or wireless

 select, delete, inspect, label, and group components within your network

 manage your network

The network management menu allows you to:

 open an existing/sample network

 save your current network

 modify your user profile or your preferences

2.4.10 VLANs

Within a switched internetwork, VLANs provide segmentation and organizational flexibility.


VLANs provide a way to group devices within a LAN. A group of devices within a VLAN
communicate as if they were attached to the same wire. VLANs are based on logical connections,
instead of physical connections. VLANs allow an administrator to segment networks based on
factors such as function, project team, or application, without regard for the physical location of
the user or device. Devices within a VLAN act as if they are in their own independent network,
even if they share a common infrastructure with other VLANs. Any switch port can belong to a
VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded only to end
32
stations within the VLAN where the packets are sourced. Each VLAN is considered a separate
logical network, and packets destined for stations that do not belong to the VLAN must be
forwarded through a device that supports routing.

Figure 30: VLANs

Configuring and Implementation of VLANs

VLAN Implementations

Figure 31:VLAN configuration

Assigning Ports to VLANs

Figure 32: Ports assigning to VLAN

33
2.4.11 TRUNKING

Trunk is also a switching feature that allows a point-to-point connection of mostly switches. It
allows multiple flow of VLANs, i.e. a trunk port carries more than a single VLAN. To configure
a switch port on one end of a trunk link, use the switchport mode trunk command. With this
command, the interface changes to permanent trunking mode. The port enters into a Dynamic
Trunking Protocol (DTP) negotiation to convert the link into a trunk link even if the interface
connecting to it does not agree to the change

Figure 33:Trunking

Use the Cisco IOS switchport trunk allowed vlan vlan-list command to specify the list of VLANs
to be allowed on the trunk link.

In Figure above, VLANs 10, 20, and 30 support the Faculty, Student, and Guest computers (PC1,
PC2, and PC3). The native VLAN should also be changed from VLAN 1 and changed to another
VLAN such as VLAN 99. By default, all VLANs are allowed across a trunk link. The switchport
trunk allowed VLAN command can be used to limit the allowed VLANs.

34
Configuration of Trunk Interfaces

Figure 34: Trunk configuration

Note: This configuration assumes the use of Cisco Catalyst 2960 switches which automatically
use 802.1Q encapsulation on trunk links. Other switches may require manual configuration of the
encapsulation. Always configure both ends of a trunk link with the same native VLAN. If 802.1Q
trunk configuration is not the same on both ends, Cisco IOS Software reports errors.

2.4.12 DHCPV4 (DYNAMIC HOST CONFIGURATION PROTOCOL FOR IPV4)

DHCPv4 assigns IPv4 addresses and other network configuration information dynamically.

A dedicated DHCPv4 server is scalable and relatively easy to manage. A Cisco router can be
configured to provide DHCPv4 services in a small network.

DHCPv4 Operation

Four step process for a client to obtain a lease:

 DHCP Discover (DHCPDISCOVER) - client uses Layer 2 and Layer 3 broadcast


addresses to find a DHCP server.
 DHCP Offer (DHCPOFFER) - DHCPv4 server sends the binding DHCPOFFER
message to the requesting client as a unicast.

35
 DHCP Request (DHCPREQUEST) – the client sends back a broadcast
DHCPREQUEST in response to the servers offer.
 DHCP Acknowledgment (DHCPACK) – the server replies with a unicast
DHCPACK message.

Configuring DHCPv4

Figure 35: DHCP configuration

Verifying DHCPv4

 Verify DHCPv4 configuration using the show running-config |section dhcp command.

 Verify the operation of DHCPv4 using the show ip dhcp binding command.

 Verify that messages are being received or sent by the router using the show ip dhcp
server statistics command.

2.4.13 TROUBLESHOOTING SKILLS

Troubleshooting is the process of finding problems and solving them. Since this is a troubleshooting
article, we cannot define a specific steps list that will work 100% of the times. However, the following list
is the one that will get you to the problem faster. Moreover, we arranged it to be optimized for switch
troubleshooting.

1. Define the problem

2. Find device(s) having issues

36
3. Check VLANs configuration

4. Verify trunk ports configuration

5. Check access ports configuration

6. Troubleshoot client issues

The first step is going to be “Define the problem” every time. However, based on what the problem
really is, later steps may be followed in a different order. We are going to follow these steps for
both tickets, but before we do it we should talk about troubleshooting approaches.

Troubleshooting approaches and Tips

Some people thing troubleshooting is like an art. Instead, troubleshooting is a simple task that can
be written in form of procedure. Troubleshooting can be stressful, and you might end up
performing the same checks again and again. This is frustrating, as you convince yourself that
there is no reason for the problem, and it shouldn’t be happening. Nonetheless, it is happening.
You need to have a plan. We can talk a lot about troubleshooting approaches, but for now we will
give you just a few tips.

 First, state the problem clearly, talking with the user if necessary.

 Use the divide-and-conquer approach. This mean you start by pinging between the two
devices that cannot communicate. If the ping is successful, check for application problems
at upper OSI layers. Instead, if the ping fails, do a traceroute to find where in the network
the problem is. Then, check data-link layer and physical connections. This approach is
opposed to the bottom-up approach (starting from the cabling) and the top-down approach
(starting from the application). With this approach, you start in the middle of the OSI layer.

 Write down everything you do, so you won’t be repeating steps. This is useful for
complex issues or infrastructures.

 If you still cannot resolve the issue, don’t panic. Google is your friend, check for users
having similar issues.

37
Define the problem

The first ticket we are going to face is for the PCs in the Sales department that cannot print. This
definition is way far from a punctual problem statement. After calling users, we clarify that they
cannot access printers, servers and file share on the network. Based on that, we know that it is
unlikely to be a print problem. Both users have the same problem, but the two PCs can
communicate with one another. It’s time for you to gather technical details. You ask the users to
open the command prompt (from the Start or with Win+R, then cmd for Windows users) and type
ipconfig /all. We need to gather four items: IP address, default gateway, subnet mask and Physical
address (mac address). The two devices having problem are Laptop0 and Laptop1, so here is an
example of Laptop 0 output.

Figure 36: ipconfig /all result

This is the output from Laptptop0

Verify ARP cache

Since pings are failing, and we are in the same subnet, we need to verify if data-link layer is
working as expected. To verify data-link layer, we start by issuing show ip arp just after those
pings. With this command, we are checking if our switch was able to resolve the IP addresses to
MAC addresses.

38
Figure 37: Show ARP result

Verify MAC address table

The MAC address table on a switch remembers the association between a MAC address and a
physical port of the switch. The switch will populate that table and keep it up-to-date every time it
receives an ethernet frame. In other words, to see the MAC address of these laptops on the Top
switch, laptops must generate traffic and that traffic must reach the Top switch. Even ARP
responses are traffic, but we don’t know if our requests made it to the client. In case they didn’t,
the device won’t have generated any traffic. Just to be sure, jump on Laptop0 and ping the default
gateway, 10.100.2.1.

Figure 38: Ping result

Ping fails as expected.

Even if ping fails, our PC has generated some traffic, so we can check the ARP table on the Top
switch to see if they made it. We do it by typing show mac address-table from the privileged exec
prompt.

39
Figure 39: MAC address table

Checking trunks

This problem involves two devices on the same VLAN, so it could be potentially a problem of that
VLAN. We issue show vlan brief to check if the VLAN exists, and we find that VLAN 102 is the
one for Laptops. Consequently, we need to check if this VLAN goes on the trunk toward
TopSwitchL3. We do that with show interfaces trunk.

Figure 40:Trunk interface result

VLAN 102 is missing from the trunk to TopSwitchL3.

This must be the problem. Therefore, all we need to do is enter in configuration mode, go under
the interface GigabitEthernet 0/1 and add the missing VLANs.

40
CHAPTER THREE

3.0 PROBLEMS ENCOUNTERED DURING SIWES

During my IT period, I faced challenges such as;

a) Inability of firms, organizations, companies to accept IT students, and to dedicate quality


time towards educating and enlightening them about work etiquette.
b) Inability of the university to provide a more suitable office or workshop for SIWES
students.
c) Lack of trust and confidence on the side of the organizations towards students on Industrial
attachment.
d) There was problem of accommodation within the company which was a serious challenge
for students on attachment leaving them with no option than to rent apartments in nearby
settlements.
e) This was another challenge for students leaving in nearby settlement due to lack of
accommodation within the company. Despite a means transportation provided by the
company to convey workers to and fro, there was either late arrival of the vehicle or failure
to turn up which leave the students with no option than to pay for transport fair since they
are after knowledge.

3.1 RELEVANCE OF SIWES PROGRAMME

The student industrial work experience scheme (SIWES) is aimed at exposing students to the
practical work of what they are taught in the class so as to have better understanding of what they
are taught. And this I have acquired during my SIWES program at American University of Nigeria.

My academic work was very paramount to my experience I gained from both networking and
hardware because it gave me real basics of theories and as a computer scientist, understanding
these theories was really important because it’s what makes the difference between me who read
computer science and someone one who attended a road side computer schools as system
technician.

The industrial experience scheme is an opportunity to work and have the real practical skills
needed. The academic work serves as a platform to know and understand the components, the

41
various aspects, the theories, laws, principles, techniques and diverse areas of computer science
which serves as the basis for understanding what would be done practically as well as selecting
the area of specialization in accordance with the choice of company to work with during the
SIWES training. My Academic work made me to understand what I did well during my IT because
some terms were used during my training of which were not explained in details but my academic
knowledge made me understand what was being taught for example application of CSC401 (Net-
Centric Computing) in configuration of IP Address , installation of wireless internet, CSC101
(Introduction to Computer), CSC307 (Computer Architecture and Organization I) and CSC208
(Computer Hardware Systems and Maintenance) assisted in understanding and troubleshooting
hardware problems

42
CHAPTER FOUR

DISCUSSION

4.0 GENERAL APPRAISAL OF THE PROGRAMME

Having gone through the 6-month industrial training, I have the following suggestions to make for
the effectiveness of Student Industrial Work Experience Scheme (SIWES).

i. Government should endeavor to improve business relationships with companies that


accommodate SIWES students, as a way of adding importance to the scheme, in reality.
ii. Students should be paid before or during their period of attachment to assist them during
the training.
iii. The supervisor should be those acquainted with the fields the students are attached. Also,
the students should be asked whether or not they have been given appropriate training
during supervision.
iv. Proper orientation should be given to students expected to go on industrial training to go
and obtain knowledge rather than taking it as a medium to make money.

4.1 WAYS OF IMPROVING THE PROGRAMME

a. Solution to the inability of organizations to accept students; It should be inscribed in the


constitution that companies, organizations are to accept students from the nations’ higher
institute of learning on SIWES, and failure to do that will lead to some sort of penalty.
b. The fund provided by ITF to students should be paid if possible during the program as
some of the students go financially bankrupt which makes the program stressful and
unconducive or even if it should be paid after the program it should be done on time to help
them in one way or the other.
c. Organizing workshops, seminars and symposium for students in various faculties in other
to keep the student abreast of new technologies and innovations.
d. Posting of students for SIWES should be done by the scheme to ensure conformity with
course of study.

43
4.2 ADVICE FOR THE FUTURE PARTICIPANTS

a. Students on SIWES should try by all means and avail themselves to their places of work
no matter what regardless of them been paid their or not as their aim is to acquire
knowledge.
b. Students on SIWES should adhere strictly to rules and regulations designed by the
organization most especially those in companies should adhere strictly to safety
regulations.
c. Students should be good ambassadors of their institutions of learning.

4.3 ADVICE FOR SIWES MANAGERS

a. SIWES management staff should ensure that SIWES supervisors visit students in their
places of attachment at least twice.
b. Funds allocated to students for the program should be released to them as soon as the
SIWES supervisors pay their first visit or immediately after the program.
c. If possible SIWES body should liaise with the organization on the welfare of students on
attachment such as accommodations.

4.4 CONCLUSION

This industrial training has afforded me the basic practical and theoretical knowledge that I may
not have gotten from the lecture room. It also gave me the opportunity to have a feel of what it
would be like after graduation when I start working

In conclusion, based on my experience during the program, I have learnt and gained a lot such as:

a. I can confidently and effectively educate pupils, parents, students, military, and local
Governments in computer literacy.
b. I can effectively handle the demands of the information system of the university and
consequently, any Organization I find myself in future.
c. I can effectively assist in the administration of a company’s computer network system,
LAN and WLAN inclusive.
d. I can carry out repair works on computer systems and accessories, which includes
printers and scanners.

44
REFERENCES

Adrian Waygood, An Introduction to Electrical Science (Milton Park, Abingdon, Oxon:


Routledge, 2013), p. 40.

Albert Jackson; David Day, Popular Mechanics Complete Home How-to (New York: Hearst
Books, 2009), p. 282.

Computer network definition, archived from the original on 2012-01-21, retrieved 2011-11-12

Designing and Building a Campus Wireless Network" (PDF). MCNC. 2012

Posinna, Mariddetta (Apr 1, 2014). "different types of fiber optic cables".


HFCL. Archived from the original on 2016-04-20. Retrieved 2016-04-11.

S. Deering; R. Hinden (December 1995), Internet Protocol, Version 6 (IPv6)


Specification, Internet Engineering Task Force (IETF), RFC 1883

Ugwuanyi Ezema, Challenges of SIWES in Library and Information Science in the ICT
Environment. Retrieved October 18, 2013 from; Understanding VLAN Trunk
Protocol (VTP) at Cisco.

Websites

https://10.2.27.8
https://www.aun.edu.ng
https://www.netacad.com/login/studentresources
https://en.wikipedia.org/wiki/Fiber-optic_communication
http://www.scribd.com/doc/99454182/IT-Technical-Report-Ahmad-Ibitoye
http://www.webpages.uidaho.edu/~mbolin/ugwuanyi-ezema.htm.

45

Potrebbero piacerti anche