You are on page 1of 25

FEDERAL UNIVERSITY OF TECHNOLOGY, OWERRI

P.M.B 1526, OWERRI, IMO STATE.

A
TECHNICAL REPORT
ON
STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME
(SIWES)

UNDERTAKEN AT:
APTECH COMPUTER EDUCATION

BY:
OGBONNA CHINWENDU CONFIDENCE
20161945273

SUBMITTED TO:
THE DEPARTMENT OF ELECTRICAL AND ELECTRONIC
ENGINEERING, SCHOOLOF ENGINERING AND ENGINEERING
TECHNOLOGY

IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE


AWARD OF BACHELOR OF ENGINEERING (B.ENG) IN ELECTRICAL
AND ELETRONIC ENGINEERING.

AUGUST 2021
DEDICATION
This report is dedicated first and foremost to the lord God Almighty who has made it possible
for me to have such an experience, to my parents for their painstaking efforts, resources and for
not giving up on me and also to my course adviser Engr. Dr. Ezema Longinus for his advice on
our goals for our internship, to my faculty heads in Aptech computer education, Mr. Chibuike
and Mr. Delight, my colleagues, my course mates, friends and every other person that plays an
important role in my life.
ACKNOWLEDGEMENT
This goes to the Lord God Almighty who has been leading me through it all and to Aptech
Computer Education for giving me this opportunity even within such short time to intern in your
company and also to the management of the school for such a program as this.

i
TABLE OF CONTENTS
COVER PAGE……………………………………………………………………….…i
DEDICATION ………………………………………………………………………....ii
ACKNOWLEDGEMENT…………………………………………………………….iii
TABLE OF CONTENTS………………………………………………………………v

CHAPTER ONE:
1.0 INTRODUCTION TO SIWES ...................................................................................5
1.1 IMPORTANCE OF SIWES .......................................................................................6
1.2 THE ROLES OF DEPARTMENTS…………………………………………………7

CHAPTER TWO:
2.0 INTRODUCTION TO INTERNETWORKING…………………………………….8
2.1 DEVICES USED IN NETWORKING ………………………..…………………….9

CHAPTER THREE:
3.0 MODELS USED IN CISCO NETWORKING ……………………………………..9
3.1 OSI AND DOD MODEL……………………….………………………………….. 10
3.2 CISCO 3-LAYER HIERACHICHAL MODEL….…………………………………11
3.3 PROTOCOLS IN THE OSI AND DOD MODEL…………………………………..13

CHAPTER FOUR:
4.0 IP ADDRESSING…………………………………………………………………...14
4.1 CLASSIFICATION OF IP ADDRESSING…………………………………….…...15
4.2 SUBNETTING IN IP ADDRESSING ……………………………………………....16

CHAPTER FIVE:
5.0 IP ROUTING………………………………………………………
5.1 METHODS USED IN IP ROUTING…………………………..
CHAPTER ONE

1.0 INTRODUCTION TO SIWES


The Students Industrial Work Experience Scheme (SIWES) is the
accepted skills training program that forms part of the approved minimum
academic standards in the various degree program for all the Nigerian
universities. It is an effort to bridge the gap existing between theory and
practice of engineering and technology, science, agriculture, medical,
management and other professional educational program in the Nigerian
tertiary institutions. It’s aimed at exposing students to equipment, machines
and professional work methods and ways of safe- guarding the work areas
and workers in industries and other organization.
The scheme is a tripartite program, involving the students, the
universities and the industry (employers of labor). It is funded by the Federal
government of Nigeria and jointly coordinated by the industrial Training
Fund (ITF) and the National Universities commission (NUC).

1.1 OBJECTIVES OF SIWES


The Students Industrial Work Experience Scheme (SIWES), was
established by the government to carry out the following objectives;

 Prepare students for the work situation they are likely to meet after
graduation.
 Provide an avenue for students in the Nigerian Universities to acquire
industrial skills and experience in their course of study.
 Make the transition from the university to the world of work easier,
and thus enhance student’s contacts for later job placements.
 Enlist and strengthen employers' involvement in the entire educational
process of preparing university graduates for employment in
industries.
1.2 IMPORTANCE OF SIWES

 It provides students with an opportunity to apply their theoretical


knowledge in real life situations.
 It exposes students to more practical work methods and techniques.
 It strengthens links between the employers, universities and industrial
training fund (ITF)
 It also prepares the students for the labor market after graduation.

1.3 THE ROLES OF PARTICIPATING BODIES

ROLES OF THE FEDERAL GOVERNMENT

 Make it mandatory for all ministries, companies and government


agencies, to offer attachment places to students.
 Make it a policy to include a clause in every major contract lasting
over six to nine months awarded to contractors to take student on
attachment.
 Make adequate funds available to the federal ministry of industry
to fund the scheme.

ROLE OF THE CO-ORDINATING AGENCY (NUC)

 In collaboration with ITF, compile lists of employers for


institution's placement lists.
 Establish SIWES coordinating units.
 Evolve a minimum national guide programme for supervised
industrial training activities for approved SIWES courses.
ROLE OF THE INDUSTRIAL TRAINING FUND (ITF)

 Organize biennial conference and seminars on SIWES.


 Provide logistic material needed to administer the scheme.
 Compile lists of employers and available training places for
industrial.
ROLE OF EMPLOYERS

 Control and discipline students like permanent staff.


 Accept students and assign them to the relevant on—the-job training
 Provide medical care for students within the limits of the employer’s
service.

ROLES OF THE DEPARTMENT

 To ensure that the students participate in the internship program.


 To follow up the experiences of their students in the training process.
 To ensure the utmost comfort and security of their students.
CHAPTER TWO

INTRODUCTION TO INTERNETWORKING

Networking is the interconnectivity of devices, where resources are shared and


also be interpreted.

Computer networking is the interconnection of computer devices for data and


information sharing and interpretation.

Classification of computer networks

 Classification by Topology: This has to do with the connectivity of the


computers or devices in a network. They include;
 Mesh topology
 Ring topology
 Star topology
 Bus topology
 Classification by Area: this has to do with the proximity and closeness of
devices in a network. They include;
 Local area network (LAN):connection within a short distance or
network.
 Metropolitan area network (MAN): connections between various
buildings in an area.
 Wide area network (WAN):a typical example is the internet and
satellite.
 Classification by size

BASICS OF INTERNETWORKING

An internetwork is created when two or more LANs or WANs are connected via a
router and configure a logical network addressing scheme with a protocol such as
IP.
Network segmentation is the breaking up of really large networks into a number of
smaller ones, this can be done by using devices such as switches, routers and
bridges.

Causes of LAN traffic congestion

 Too many host in a broadcast domain


 Broadcast storms
 Multicasting
 Low bandwidth
 Adding hubs for connectivity to the network

DEVICES USED IN A NETWORK

ROUTER

Routers are used to connect networks together and route packets of data from
one network to another. Routers by default break up a broadcast domain- the set of
all devices on network segment that hear all the broadcast sent on that segment.
Routers can also provide packet filtering by using access lists. When routers
connect two or more networks together and use logical addressing (IP or IPv6),
this is called an internetwork. Routers use a routing table (map of the
internetwork) to make path selections and to forward packets to remote networks.

SWITCHES

Switches are not used to create internetwork (do not break up broadcast domains
by default). They are employed to add functionality to a network. The main
purpose of a switch is to make a LAN work better, to optimize its performance and
providing bandwidth for LAN users. Switches don’t forward packets to other
networks instead they only switch frames from one port to another within the
switched network. Switches by default break up collision domains.

Switches can also be referred to as bridges because they both basically perform the
same function and are made using bridging technologies so CISCO calls them
multiport bridges. Hence, switches perform more than bridges with more brain-
power.
BRIDGES

Bridges are used in a network to reduce collisions within broadcast domains and
increase the number of collision domains in your network. Hubs in your network
can contribute to congestion on your Ethernet network.
CHAPTER THREE
INTERNETWORKING MODELS
In the late 1970s, the Open Systems Interconnection (OSI) reference model
was created by the International Organization for Standardization (ISO) to break
the barrier of communication.
The OSI model was meant to help vendors create interoperable network devices
and software in the form of protocols so that different vendor networks could work
with each other. Like world peace, it will probably never happen completely, but it
is still a great goal.
The OSI model is the primary architectural model for networks. It describes how
data and network information are communicated from an application on one
computer through the network media to an application on another computer.

The Layered Approach


A reference model is a conceptual blueprint of how communications should take
place. It addresses all the processes required for effective communication and
divides these processes into logical groupings called layers. When a
communication system is designed in this manner, it’s known as layered
architecture.

ADVANTAGES OF OSI MODEL


 Allow different vendor networks to interoperate.
 Aids component development, design and trouble-shooting.
 Allows multiple vendor development through standardization of network
component.
 Promotes industry standardization by defining what functions occur at each
layer of the model.
 Prevents changes in one layer from affecting another layer.

OPEN SYSTEMS INTERCONNECTION (OSI) MODEL


It is a set of guidelines that application developers can use to create and implement
applications. It is a framework for creating and implementing networking s
standards, devices and internetworking schemes. It is made up of seven layers
divided into two groups.
The first 3 layers define how applications within the end stations will
communicate with each other and with users. Responsible for application
communication between hosts. Bottom four layers describe how data is transmitted
end to end communication between hosts. Responsible for networking. They
include;
 Layer 7-Application layer: provides a user interface. Responsible for file,
print, message, database and app services. It also responsible for identifying
and establishing the availability of the intended communication partner and
determine whether sufficient resources for the intended communication
exist.
 Layer 6-Presentation layer: presents data. Handles processing such as
encryption. Responsible for code formatting and data translation.
 Layer 5-Session layer: keeps different app separate. Responsible for dialog
control. Responsible for setting up, managing and then tearing down
sessions between presentation layer entities. It coordinates communication
between system and serves to organize their communication by offering
three different modes: simplex, half duplex and full duplex.
 Layer 4-Transport layer: provides reliable and unreliable delivery.
Performs error correction before retransmit. Responsible for end to end
connection, segments and reassembles data into a data stream. It can
connectionless or connection-oriented.
 Layer 3-Network layer: provides logical addressing which routers use for
path determination. Responsible for routing. Manages device addressing,
tracks the location of devices on the network, and determines the best way to
move data, which means that the network layer must transport traffic
between devices that aren’t locally attached.
 Layer 2-Data-link layer: performs error detection not correction. Provides
access to media using Mac address. Responsible for framing. Provides
physical transmission of the data and handles error notification, network
topology and flow control.
 Layer 1- Physical layer: moves bits between devices. It specifies voltage,
wire speed and pin-out of cables. Responsible for physical topology.
The following network devices operate at all 7 layers;
 Network management stations
 Web and app servers
 Gateways (not default gateways)
 Network hosts

CONNECTION-ORIENTED COMMUNICATION
This comprises of a 3-way handshake or setup. Data is then transferred, when
the transfer is finished, a call termination takes place to tear down the virtual
circuit.
The 3-way handshake is stated as follows;
1. Synchronization (sender to receiver)
2. Synchronization (receiver to sender)
3. Acknowledgement (connection established, data transferred)

DEPARTMENT OF DEFENSE (DOD) MODEL


Transmission Control Protocol /Internet Protocol was created by DOD-
Department of Defense to ensure and preserve data integrity, as well as to maintain
communications in the event of a catastrophic war.
The DOD model is a condensed version of the OSI model. It is composed of
four layers.
 Process/Application Layer (comprises of the Application, Presentation and
Session layer in the OSI model)
 Host-to-Host layer (Transport layer)
 Internet layer (Network layer)
 Network Access layer (Data-link and Physical layer)
Process/Application layer:
Defines protocols for node-to-node application communication and also controls
user interface specifications.
Host-to-Host layer:
Defines the protocols for setting up the level of transmission service for
applications. Tackles issues such as creating reliable end-to-end communications
and ensuring the error-free delivery of data. Handles packet sequencing.
Internet layer:
Designates the protocols relating to the logical transmission of packets over the
entire network. Takes care of the addressing of hosts by giving them an IP address
and it handles the routing of packets among multiple networks.
Network access layer
This layer monitors data exchange between the host and the network.

PROTOCOLS IN THE DIFFERENT LAYERS OF THE DOD MODEL


Protocols in the process layers include: Telnet, FTP, LPD, SNWP, TFTP,
SMTP, NFS, X-Windows.
Telnet: is the chameleon of protocols-its specialty is terminal emulation. Allows a
user on a remote client machine called the Telnet client, to access resources of
another machine, the Telnet server.
File Transfer Protocol (FTP): is the protocol that lets us transfer files, and it can
accomplish this between any two machines using it. As a protocol, FTP is use by
applications, as a program, it’s employed by users to perform file task by hand.
Network File System (NFS): is a jewel of protocol specializing in file sharing. It
allows two different types of file systems to interoperate.
Protocols in the Host-to-Host layer include; TCP and UDP.
Transmission control protocol (TCP): takes large block of information from an
application and breaks them into segments. Numbers and sequences are found in
each segment so that the destination’s TCP stack can put the segment into the order
of the application intended. TCP is a full duplex, connection-oriented, reliable and
accurate protocol.
UDP: does a fabulous job of transporting information that does not require
reliable-delivery and it does so using far fewer network resources. It is a thin
protocol as compared to TCP.

Protocols used in the internet layer include; internet protocol (IP), internet
control message protocol (ICMP),ARP, RARP, Proxy ARP.
The two main reasons for the internet layer’s existence are routing and providing a
single network interface to the upper layers.
Internet protocol (IP): is the internet layer. It sees all meaning said to be aware of
all the interconnected networks because all machines on the network have a
software, or logical address called IP address. It looks at each packet’s address and
by using a routing table, decides where a packet is to be sent next, choosing the
best path.
Internet control message protocol (ICMP): is used by the IP4 for many different
services. It is a management protocol and messaging service providers for IP. Its
messages are carried as IP datagrams.
Address resolution protocol (ARP): finds the hardware address of a host from a
known IP address. As IPs detective, ARP interrogates the local network by sending
out a broadcast asking the machine with the specified IP address to reply with its
hardware address.
Protocols in the network access layer include; Ethernet, fast Ethernet, token
ring, FDDI.

THE CISCO 3-LAYER HIERARCHICAL MODEL


This model helps you design, implement and maintain a scalable, reliable, cost-
effective hierarchical internetwork. They include;
1. The core-layer (backbone): is the core of the network. It is responsible for
transporting large amounts of traffic both reliably and quickly. If there is a
failure in the core, every single user can be affected. Hence, fault tolerance
at this layer is an issue.

2. Distribution layer: is the communication point between the access layer and
the core. Provides routing, filtering and WAN access and determines how
packets can access the core. Determines the fastest way that network service
requests are handled.

3. Access layer: controls user and workgroup access to internetwork resources.


Also known as desktop layer.
CHAPTER FOUR
IP ADDRESSING
IP addressing is the acts of giving different IP addresses to different host in a
network. An IP address is a software address and unique numeric identifier
assigned to each machine that designates the location of a device on a network.
IP terminologies include:
Bit, byte, octet
Network address: is the first address in a network that tells us or defines a host in a
network. An address where all host bits are turned off.
Host address: is the last address in a network used by apps and hosts to send
information to all nodes on a network.. An address where all host bits are turned
on.
Hierarchical IP addressing scheme; include network address and host address.
1. Dotted decimal: 172.161.30.56
2. Binary: 10101010.11111111.01010101.11110000
3. Hexadecimal: AC.10.1E.38

CLASSES OF IP ADDRESSING
CLASSES IP ADDRESSING SCHEME RANGE
Class A NHHH 0-127
Class B NNHH 128-191
Class C NNNH 192-223
Class D Multicast 224-239
Class E Research and scientific purposes 240-255

Private IP addresses: are used on a private network, but they are not routable
through the internet. They include;
Class A: 10.0.0.0 – 10.255.255.255
Class B: 172.16.0.0 – 172.31.255.255
Class C: 192.168.0.0 – 192.168.255.255
IP VERSION SIX (IPv6)
It is a 128 bit IP address. Here, we deal with hexadecimal. It is written in nibble
format into eight places with a semi-colon separating each of them.
Interface identifier in IPv6 is same in IPv4.
64 bits contain the network
64 bits contain the interface identifier (IID)[48 bits belong to the MAC address the
remaining 16 bits belong to FFFE]
Shortening an IPv6 address
Rules
1. Note which word starts with zero.
2. Note which word has a larger amount of zero before the number.

Classes of IPv6
1. Link local address: FE80:/10. This is used to link or connect network in a
particular address/storage. It is not routable and is only used within a
network.
2. Global Unicast address (public IPv6): it is routable and can be used in the
internet. 2001:/3.
3. Unique local address(private IPv6): it starts with FC00:/7.
4. Multicast: starts with FF00:/8. It is sent from one to many.
5. Anycast : from many to one. Many computers share one IP address.

Ways of configuring IPv6


1. Dynamically by using DHCP
2. Statically by assigning it manually
3. Stateless address automatic configuration (SLAAC)

ADVANTAGES OF IPv6
1. It has a feature IPsec that provides end-to-end security.
2. Mobility: ability to allow devices to roam from one network to another
without dropping connections.

Supernetting/ summarization provides route updates in the most efficient


way possible by advertising many routes in one advertisement instead of
individually.
Summarization also called route aggregation, allows routing protocols to
advertise many networks as one address.

SUBNETTING
Subnetting is the process of breaking down larger networks into a bunch of
smaller networks.
Advantages of subnetting
1. Reduced network traffic.
2. Optimized network performance as a result of reduced network traffic.
3. Simplified management.
4. Facilitated spanning of large geographical distances.

A subnet mask is a 32-bit value that allows the recipient of IP address to


distinguish the network ID portion of the IP address from the host ID portion of the
IP address.
Classless inter-domain routing (CIDR), is basically the method internet service
providers use to allocate a number of addresses to a company, home or customer.
They provide addresses in a certain block size.
Slash notation indicates the number of bits turned on. The maximum is 32-bits but
the largest subnet mask available is a /30 because two bits are kept for the host bits.

Classes Default subnet mask Slash notation IP scheme


A 255.0.0.0 /8 NHHH
B 255.255.0.0 /16 NNHH
C 255.255.255.0 /24 NNNH
CHAPTER FIVE
IP ROUTING
IP routing is the process of moving packets from one network to another using
routers [CISCO routers].
A routing protocol is used by routers to dynamically find all the networks in the
internetwork and to ensure that all routers have the same routing tables. It
determines the path of a packet through an internetwork.
A routed protocol is used to send user data (packets) through the established
enterprise e.g IP and IPv6. Routing is used for taking a packet from one device and
sending it through the network to another device on a different network.
To be able to route packets, a router must know at minimum, the following:
1. Destination address
2. Neighbor routers from which it can learn about remote networks.
3. Possible routes to all remote networks.
4. The best route to each remote network.
5. How to maintain and verify routing information.

CONFIGURING IP ROUTING
The first step is to correctly configure each router with an IP address on each
interface.
The following steps are used to configure a router:
1. Click on the router.
2. Type in “no” to enter the “user exec mode”
3. To enter the “privilege mode” key in the command “en” and click enter.
4. To enter the configuration mode type in “config t”
The following commands are then used to perform different functions;
 Hostname : to assign name to the router.
 Banner motd: to assign a text to the router
 Int gig0/0, intse0/0/0: to assign an IP address to the interface.
 No shutdown: to save settings and commands made on the router
 Do copy run start: to save all settings done on a router and more.
TYPES OF ROUTING
Static routing:
This occurs when you manually add router’s routing table.
Benefits of static routing
1. There is no overhead on the router CPU, which means you could possibly
buy a cheaper router than you would use if you were using dynamic routing.
2. There is no bandwidth usage between routers, which means you could
possibly save money on WAN links.
3. It adds security because the administrator can chose to allow routing access
to certain networks only.

To configure using this method all you need to do is to key in the following
command: ip route (destination address) (subnet mask) (destination ip address),
and it is done.

Default routing:
This is used to send packet with a remote destination network not in the routing
tale to the next-hop router. You should use default routing on stub networks- those
with only one exist path out of the network.
Default protocols are assigned on a single router connected to a default router.
To configure this, the following command is used.
Ip route 0.0.0.0 0.0.0.0 (destination ip address).

Dynamic routing:
This occurs when protocols are used to find networks and update routing tables
on routers. True, this is easier than using static and default, but it’ll cost you in
terms of router CPU processes and bandwidth on the network links. They consist
of the following;
 Routing information protocol 9RIP) versions 1 and 2.
 Interior gateway routing protocol (IGRP)
 Exterior gateway protocols (EGPs).

Routing protocol basics


Administrative distance is used to rate the trustworthiness of routing information
received on a router from a neighbor router.
Classes of routing protocols
Distance vector: finds the best path to a remote network by judging distance.
Each time a packet goes through a router that’s called a “hop”.
Link state: also called shortest-path-first-protocols, the routers each create three
separate tables. One of these tables keeps track of directly attached neighbors, one
determines the topology of the entire internetwork, and one is used as the routing
table.
Hybrid: use aspects of both distance vector and link states- for example EIGRP.

RIP is a true distance-vector routing protocol. To configure it on a router the


following commands are used;
Using RIP version 2; key in router rip, version 2, network and then all the network
addresses in a network.
The above is a network connection consisting of four different LAN networks
connected to routers, which have already been configured by incorporating two
methods default and static routing.
REFERENCES

You might also like