Professional Documents
Culture Documents
A
TECHNICAL REPORT
ON
STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME
(SIWES)
UNDERTAKEN AT:
APTECH COMPUTER EDUCATION
BY:
OGBONNA CHINWENDU CONFIDENCE
20161945273
SUBMITTED TO:
THE DEPARTMENT OF ELECTRICAL AND ELECTRONIC
ENGINEERING, SCHOOLOF ENGINERING AND ENGINEERING
TECHNOLOGY
AUGUST 2021
DEDICATION
This report is dedicated first and foremost to the lord God Almighty who has made it possible
for me to have such an experience, to my parents for their painstaking efforts, resources and for
not giving up on me and also to my course adviser Engr. Dr. Ezema Longinus for his advice on
our goals for our internship, to my faculty heads in Aptech computer education, Mr. Chibuike
and Mr. Delight, my colleagues, my course mates, friends and every other person that plays an
important role in my life.
ACKNOWLEDGEMENT
This goes to the Lord God Almighty who has been leading me through it all and to Aptech
Computer Education for giving me this opportunity even within such short time to intern in your
company and also to the management of the school for such a program as this.
i
TABLE OF CONTENTS
COVER PAGE……………………………………………………………………….…i
DEDICATION ………………………………………………………………………....ii
ACKNOWLEDGEMENT…………………………………………………………….iii
TABLE OF CONTENTS………………………………………………………………v
CHAPTER ONE:
1.0 INTRODUCTION TO SIWES ...................................................................................5
1.1 IMPORTANCE OF SIWES .......................................................................................6
1.2 THE ROLES OF DEPARTMENTS…………………………………………………7
CHAPTER TWO:
2.0 INTRODUCTION TO INTERNETWORKING…………………………………….8
2.1 DEVICES USED IN NETWORKING ………………………..…………………….9
CHAPTER THREE:
3.0 MODELS USED IN CISCO NETWORKING ……………………………………..9
3.1 OSI AND DOD MODEL……………………….………………………………….. 10
3.2 CISCO 3-LAYER HIERACHICHAL MODEL….…………………………………11
3.3 PROTOCOLS IN THE OSI AND DOD MODEL…………………………………..13
CHAPTER FOUR:
4.0 IP ADDRESSING…………………………………………………………………...14
4.1 CLASSIFICATION OF IP ADDRESSING…………………………………….…...15
4.2 SUBNETTING IN IP ADDRESSING ……………………………………………....16
CHAPTER FIVE:
5.0 IP ROUTING………………………………………………………
5.1 METHODS USED IN IP ROUTING…………………………..
CHAPTER ONE
Prepare students for the work situation they are likely to meet after
graduation.
Provide an avenue for students in the Nigerian Universities to acquire
industrial skills and experience in their course of study.
Make the transition from the university to the world of work easier,
and thus enhance student’s contacts for later job placements.
Enlist and strengthen employers' involvement in the entire educational
process of preparing university graduates for employment in
industries.
1.2 IMPORTANCE OF SIWES
INTRODUCTION TO INTERNETWORKING
BASICS OF INTERNETWORKING
An internetwork is created when two or more LANs or WANs are connected via a
router and configure a logical network addressing scheme with a protocol such as
IP.
Network segmentation is the breaking up of really large networks into a number of
smaller ones, this can be done by using devices such as switches, routers and
bridges.
ROUTER
Routers are used to connect networks together and route packets of data from
one network to another. Routers by default break up a broadcast domain- the set of
all devices on network segment that hear all the broadcast sent on that segment.
Routers can also provide packet filtering by using access lists. When routers
connect two or more networks together and use logical addressing (IP or IPv6),
this is called an internetwork. Routers use a routing table (map of the
internetwork) to make path selections and to forward packets to remote networks.
SWITCHES
Switches are not used to create internetwork (do not break up broadcast domains
by default). They are employed to add functionality to a network. The main
purpose of a switch is to make a LAN work better, to optimize its performance and
providing bandwidth for LAN users. Switches don’t forward packets to other
networks instead they only switch frames from one port to another within the
switched network. Switches by default break up collision domains.
Switches can also be referred to as bridges because they both basically perform the
same function and are made using bridging technologies so CISCO calls them
multiport bridges. Hence, switches perform more than bridges with more brain-
power.
BRIDGES
Bridges are used in a network to reduce collisions within broadcast domains and
increase the number of collision domains in your network. Hubs in your network
can contribute to congestion on your Ethernet network.
CHAPTER THREE
INTERNETWORKING MODELS
In the late 1970s, the Open Systems Interconnection (OSI) reference model
was created by the International Organization for Standardization (ISO) to break
the barrier of communication.
The OSI model was meant to help vendors create interoperable network devices
and software in the form of protocols so that different vendor networks could work
with each other. Like world peace, it will probably never happen completely, but it
is still a great goal.
The OSI model is the primary architectural model for networks. It describes how
data and network information are communicated from an application on one
computer through the network media to an application on another computer.
CONNECTION-ORIENTED COMMUNICATION
This comprises of a 3-way handshake or setup. Data is then transferred, when
the transfer is finished, a call termination takes place to tear down the virtual
circuit.
The 3-way handshake is stated as follows;
1. Synchronization (sender to receiver)
2. Synchronization (receiver to sender)
3. Acknowledgement (connection established, data transferred)
Protocols used in the internet layer include; internet protocol (IP), internet
control message protocol (ICMP),ARP, RARP, Proxy ARP.
The two main reasons for the internet layer’s existence are routing and providing a
single network interface to the upper layers.
Internet protocol (IP): is the internet layer. It sees all meaning said to be aware of
all the interconnected networks because all machines on the network have a
software, or logical address called IP address. It looks at each packet’s address and
by using a routing table, decides where a packet is to be sent next, choosing the
best path.
Internet control message protocol (ICMP): is used by the IP4 for many different
services. It is a management protocol and messaging service providers for IP. Its
messages are carried as IP datagrams.
Address resolution protocol (ARP): finds the hardware address of a host from a
known IP address. As IPs detective, ARP interrogates the local network by sending
out a broadcast asking the machine with the specified IP address to reply with its
hardware address.
Protocols in the network access layer include; Ethernet, fast Ethernet, token
ring, FDDI.
2. Distribution layer: is the communication point between the access layer and
the core. Provides routing, filtering and WAN access and determines how
packets can access the core. Determines the fastest way that network service
requests are handled.
CLASSES OF IP ADDRESSING
CLASSES IP ADDRESSING SCHEME RANGE
Class A NHHH 0-127
Class B NNHH 128-191
Class C NNNH 192-223
Class D Multicast 224-239
Class E Research and scientific purposes 240-255
Private IP addresses: are used on a private network, but they are not routable
through the internet. They include;
Class A: 10.0.0.0 – 10.255.255.255
Class B: 172.16.0.0 – 172.31.255.255
Class C: 192.168.0.0 – 192.168.255.255
IP VERSION SIX (IPv6)
It is a 128 bit IP address. Here, we deal with hexadecimal. It is written in nibble
format into eight places with a semi-colon separating each of them.
Interface identifier in IPv6 is same in IPv4.
64 bits contain the network
64 bits contain the interface identifier (IID)[48 bits belong to the MAC address the
remaining 16 bits belong to FFFE]
Shortening an IPv6 address
Rules
1. Note which word starts with zero.
2. Note which word has a larger amount of zero before the number.
Classes of IPv6
1. Link local address: FE80:/10. This is used to link or connect network in a
particular address/storage. It is not routable and is only used within a
network.
2. Global Unicast address (public IPv6): it is routable and can be used in the
internet. 2001:/3.
3. Unique local address(private IPv6): it starts with FC00:/7.
4. Multicast: starts with FF00:/8. It is sent from one to many.
5. Anycast : from many to one. Many computers share one IP address.
ADVANTAGES OF IPv6
1. It has a feature IPsec that provides end-to-end security.
2. Mobility: ability to allow devices to roam from one network to another
without dropping connections.
SUBNETTING
Subnetting is the process of breaking down larger networks into a bunch of
smaller networks.
Advantages of subnetting
1. Reduced network traffic.
2. Optimized network performance as a result of reduced network traffic.
3. Simplified management.
4. Facilitated spanning of large geographical distances.
CONFIGURING IP ROUTING
The first step is to correctly configure each router with an IP address on each
interface.
The following steps are used to configure a router:
1. Click on the router.
2. Type in “no” to enter the “user exec mode”
3. To enter the “privilege mode” key in the command “en” and click enter.
4. To enter the configuration mode type in “config t”
The following commands are then used to perform different functions;
Hostname : to assign name to the router.
Banner motd: to assign a text to the router
Int gig0/0, intse0/0/0: to assign an IP address to the interface.
No shutdown: to save settings and commands made on the router
Do copy run start: to save all settings done on a router and more.
TYPES OF ROUTING
Static routing:
This occurs when you manually add router’s routing table.
Benefits of static routing
1. There is no overhead on the router CPU, which means you could possibly
buy a cheaper router than you would use if you were using dynamic routing.
2. There is no bandwidth usage between routers, which means you could
possibly save money on WAN links.
3. It adds security because the administrator can chose to allow routing access
to certain networks only.
To configure using this method all you need to do is to key in the following
command: ip route (destination address) (subnet mask) (destination ip address),
and it is done.
Default routing:
This is used to send packet with a remote destination network not in the routing
tale to the next-hop router. You should use default routing on stub networks- those
with only one exist path out of the network.
Default protocols are assigned on a single router connected to a default router.
To configure this, the following command is used.
Ip route 0.0.0.0 0.0.0.0 (destination ip address).
Dynamic routing:
This occurs when protocols are used to find networks and update routing tables
on routers. True, this is easier than using static and default, but it’ll cost you in
terms of router CPU processes and bandwidth on the network links. They consist
of the following;
Routing information protocol 9RIP) versions 1 and 2.
Interior gateway routing protocol (IGRP)
Exterior gateway protocols (EGPs).