You are on page 1of 40

1|Page

Ogunbodede Olatomiwa
Ayotunde

EU:200102-2147
2|Page

Chapter One:
 Letter of Submission
 Organogram
 Introduction

Chapter Two: DETAILS OF INDUSTRIAL WORK


EXPERIENCE
 Weekly summary of work experience
 Introduction to Networking
 Importance of Networking, types of Networking, Ethernet
cabling
 Introduction to TCP/IP
 Learn the color code for straight and crossed cable
 Learning the layers of the OSI reference model
 Router and switch Administrative configuration
 Router interfaces
 IP Routing
 Configuring IP routing in a network
 Configuration of IP phone
 Learning about Network Topology
 Introduction to Internet protocol
 Internetworking OS (Operating System) and Security Device
Manager
 Subnetting basics
 Managing a CISCO Internetwork

Chapter three: IMPLICATION OF THE TRAINING


PROGRAMME/EVALUATION OF THE TRAINING
PROGRAMME
 Interplay of University-Taught Courses
 Challenges faced during training period
 Pictures taken during the span of the training period
3|Page

Chapter four: Conclusion

CHAPTER ONE
LETTER OF SUBMISSION
4|Page

Department of Computer Science,


Faculty of Basic and Applied Sciences,
Elizade University, Ilara-Mokin,
Ondo State, Nigeria.
11th of November, 2023.
The coordinator,
Student Industrial Work Experience Scheme,
Elizade University.

Dear Sir,
SUBMISSION OF SIWES REPORT
This is to submit my SIWES II report embarked upon from April to
October 2023, at ICT unit (Elizade University) for your review.
Thank you.
Yours faithfully,

Ogunbodede Olatomiwa Ayotunde.

ORGANOGRAM AND GENERAL BACKGROUND


I am delighted to welcome you to Elizade University, a knowledge citadel striving
to be a globally competitive institution producing entrepreneurial, innovative, and
5|Page

ethical graduates. The University is guided by a strategic development agenda that


is rooted in the Founder's Vision, Chief Michael Ade.Ojo. These include leveraging
the University's infrastructural endowment for excellence, innovativeness, and
creativity, zealousness in academic delivery and research, attainment of world-
class status and primacy in Nigeria, deployment of modern technological tools in
teaching, research, and administration, and entrepreneurial empowerment through
robust skill acquisition programs. This carefully crafted development agenda has
continued to propel the University toward its Vision.
Address: Elizade University, Ilara-Mokin, Ondo State, P.M.B 002 Nigeria.
The University's adoption of the iLearn platform, as well as the development of
lecture notes by lecturers and their uploading to the University's website, have
simplified teaching and learning at the university. Students can read ahead of their
classes thanks to this platform. This is a global practice that has encouraged our
students to read.
Elizade University has also signed Memorandums of Understanding (MoU) with
some of the world's top universities. The ORT Braude College of Engineering in
Israel is prominent among these, where we send our students for a 3-month
intensive practical training in selected programs. The University also has a growing
list of collaborations with relevant professional bodies for knowledge
enhancement.

CHAPTER TWO
DETAILS OF INDUSTRIAL WORK EXPERIENCE
Weekly summary of work experience
6|Page

I learnt about the various departments within the ICT and the operations that
each department oversees. The departments are thus: Networking, systems and
Programming. I was also shown the TC (Telecommunication Closet).
I learnt how to change the IP address of a PC (Personal Computer) manually.
The steps entails:
1. Select Start, then type settings, Select Settings > Network and Internet.
2. Next to IP assignment, select Edit.
3. Under Edit network IP settings or Edit IP settings, select IPv4 settings
Manual.
4. To specify an IP address, I the IP address, Subnet mask, and Gateway boxes,
type the IP address settings.
5. Since you selected manual, you manually set your IP address settings and
DNS server address.
6. When you are done, select Save.
I learnt how to identify network cables, the different types of cables also the
color codes and their functions. Then I was taught hot to crimp network cables and
connect IDC (Insulation-displacement connector).
For a lecture, my boss and I set up a new desktop computer. My boss brought
me out into the field to maintain the optic fiber line for the school. I learned about
fiber optic cassettes, a tool for managing fiber optic cables, and the splicing
technique, which is used to link two fiber optic cables in order to increase their
length. By debugging, my supervisor and I were able to pinpoint the specific issue
and apply a quick repair for the Internet connection issue. Additionally, I upgraded
the batteries in my single uninterruptible power supply (UPS).

I learnt about OSI model. It describes seven layers that computer systems use to
communicate over a network. It was the first standard model for network
communication adopted by all major computer and telecommunication companies
in the early 1980s. The layers are:
1. Physical Layer.
2. Data link Layer.
3. Network Layer.
7|Page

4. Transport Layer.
5. Session Layer.
6. Presentation Layer.
7. Application Layer.
My supervisor and I went to troubleshoot a camera. When we got to the camera
control, we found out the IDC was burnt out and we replaced it and it was working
fine again. We also got a complaint about a WIFI not functioning in the annex
hostel, and I was sent to find out what was wrong with the WIFI there. When I got
there, I found out that water already damaged the IDC that was connected. I was
asked to change it and I started working fine.
I learnt about the administrative configuration like changing the SSID. Unlike
on a router, where we configure the IP address on an interface, on a switch, a layer
2 switch, the management IP address goes on a VLAN interface i.e. A virtual
interface.
I was asked to troubleshoot a lecturer's desktop when she discovered that the
machine was not providing audio feedback. Troubleshooting revealed that the lack
of an audio driver on the computer prevents it from detecting an output device,
thus all I needed to do to get it to function again was to install a new audio driver.
This week, in addition to being asked to demonstrate the UPS battery installation
procedure, I was also asked to install fresh UPS batteries for the dean of the law
faculty.

I learnt how to activate the Windows and applications on a PC. I went to the
engineering faculty to set up new Internet routing; as the engineering faculty lacks
a data center, we had to install a portable Internet router. The girl's hostel
complained that several of their access points weren't working, and we were able to
verify this when my supervisor and I made a call that didn't go through. The access
points that weren't working are currently being fixed.
I learnt how to troubleshoot a PC that was not booting up by configuring files
and transferring corrupted files using command prompt. My supervisor and I
discovered that the nursing lab was not receiving Internet and that one of the
8|Page

Internet radios was not pointing in the proper direction. We had to climb to adjust
the Internet radio's line of sight. On the radio, we also modified the IDC.
I learnt about the limits and permissions that can be set by the administrator on
other user account and could transfer document from the different user account
seamlessly. I was asked to troubleshoot and repair a system that was booting up
correctly on the first day of this week. The ram needed to be readjusted, which I
did after conducting troubleshooting, and the computer then booted normally.
I learnt about radio-networking and their frequencies and why a line of sight is
required. We checked the radio at the nursing department and it looked fine (not
damaged). Then we troubleshooted it and it wasn’t working still. We un-mounted it
and took it for repair.
I was asked to register to Prof. Kehinde Agbele’s course. Where I was taught
about grammar, language and automation regarding computing and the things
concerning it.
I went to the universities computer labs and checked the systems for faults of
any kind. I scanned the system for virus and corrupted files, checked the speed and
network connectivity to the school domain.

I learnt how to fix a window 10 boot loop problem and the steps are:
1. Attempt to boot in safe mode (f8 at startup)
2. Disable the auto-reboot function (TO disable this feature you must edit the
windows registry)
3. Note any crash messages once auto-reboot is disabled (BSOD)
4. Consider swapping hardware if there is no BSOD
5. Attempt an in-place repair or a fresh install

I was taught how to configure a CISCO switch. The steps are thus:
1. Connect the switch to a console
9|Page

2. Create a hostname (EXEC mode) and setup password


3. Configure the default Gateway
4. Configure the static route
5. Configure the interface description
6. Set the duplex mode
7. Save the configuration
My supervisor and I got a call from the E-library that the internet was
unavailable. I went with my supervisor to check on the report, and when we got
there, we found out the switch did not start up properly (The lighting was wrong).
We just had to restart it properly and the network began to work properly and
access to the internet was made available.
I collected new personal computers from the procurement office in the
senate building and did a complete system setup and activation to the windows and
then gave it to the staff(s) which it was assigned to.
We were called at the ICT department that the LAN port at the law faculty
was damaged and some ports were not working. I went there to fix them. I replaced
the IDC and was ony able to make the required ports function, because there was
not enough space on the switch to make all of them work.

 Introduction to Networking
Networking is a fundamental concept in the world of technology that plays a
crucial role in connecting devices and enabling communication between them.
Whether it's the internet, your home Wi-Fi, or the vast networks that power global
corporations, understanding the basics of networking is essential. In this
introduction, I'll walk you through the fundamental principles of networking, its
importance, and some key concepts to get you started.

**What is Networking?**

At its core, networking refers to the practice of connecting computers, devices, or


systems to allow them to communicate and share resources. These connections can
occur within a single room, across the globe, or anywhere in between. Networking
10 | P a g e

enables us to share information, access remote resources, and collaborate


seamlessly.

**Importance of Networking**

Networking is the backbone of the modern world. It underpins the internet, mobile
communications, and nearly every aspect of our digital lives. Without networking,
we wouldn't have social media, email, cloud services, or even this very
conversation. It's an integral part of how we access information, work, and stay
connected in today's interconnected world.

**Key Networking Concepts**

To better understand networking, let's dive into some key concepts:

1. **Protocols**: Networking relies on protocols, which are a set of rules and


conventions that govern how data is transmitted and received. Examples include
TCP/IP, HTTP, and FTP. These protocols ensure that devices can understand and
interpret data correctly.

2. **IP Addresses**: Every device connected to a network is assigned a unique


identifier called an IP (Internet Protocol) address. This address helps route data to
the correct destination. IP addresses come in two flavors: IPv4 and IPv6, with IPv6
being the newer and more scalable version.

3. **Routers and Switches**: Routers and switches are essential devices in


networking. Routers connect different networks and determine how data should be
forwarded between them. Switches connect devices within a local network and
help data travel efficiently within that network.
11 | P a g e

4. **Firewalls**: Firewalls are security devices that filter and monitor incoming
and outgoing network traffic. They play a vital role in protecting networks from
unauthorized access and threats.

5. **Bandwidth**: Bandwidth refers to the capacity of a network to transmit data.


It determines how much data can be sent over the network in a given amount of
time. High bandwidth is essential for fast and smooth communication.

6. **Topologies**: Network topologies describe the physical or logical layout of a


network. Common topologies include star, bus, ring, and mesh. Each has its
advantages and is suitable for different scenarios.

7. **Wireless Networking**: In addition to wired connections, wireless


networking has become prevalent with the advent of Wi-Fi. Wireless networks use
radio signals to connect devices without the need for physical cables.

**Conclusion**

In this introduction to networking, we've scratched the surface of a vast and


intricate world. Networking is an essential foundation for the digital age, enabling
global communication, remote collaboration, and the flow of information. As you
delve deeper into networking, you'll encounter more advanced concepts and
technologies, but this foundation will serve you well. Whether you're setting up a
home network, troubleshooting connectivity issues, or pursuing a career in IT,
understanding the basics of networking is a valuable skill that can open doors to
countless opportunities in the technology landscape.

 Importance of Networking, types of


Networking, Ethernet cabling
12 | P a g e

Let's talk about the importance of networking, the different types of


networking, and Ethernet cabling.

**Importance of Networking:**

Networking is a fundamental concept in the world of information technology. It


plays a crucial role in connecting various devices and systems to enable data and
resource sharing. Here are some key reasons why networking is essential:

1. **Communication:** Networking allows devices, such as computers,


smartphones, and servers, to communicate with each other. It forms the backbone
of the internet and enables us to send emails, browse websites, and access cloud
services.

2. **Resource Sharing:** In a networked environment, resources like printers,


storage devices, and applications can be shared among multiple users or devices,
improving efficiency and reducing costs.

3. **Collaboration:** Networking facilitates collaboration among individuals and


organizations. Team members can work on projects simultaneously, share
documents, and hold virtual meetings no matter where they are located.

4. **Data Transfer:** Networking enables fast and efficient data transfer, making
it possible to move large volumes of information within and between
organizations. This is crucial for data analysis, backups, and data storage.

5. **Security:** Networking also includes security mechanisms that help protect


data and systems from unauthorized access and cyber threats. Without proper
networking security measures, sensitive information can be at risk.
13 | P a g e

Now, let's explore different types of networking:

**Types of Networking:**

1. **Local Area Network (LAN):** LANs are commonly used in homes, offices,
and small businesses. They connect devices within a limited geographical area,
typically a single building. Ethernet is often used to establish LANs.

2. **Wide Area Network (WAN):** WANs cover larger geographical areas and
connect multiple LANs. The internet is a prime example of a global WAN. WAN
technologies include leased lines, satellite links, and VPNs.

3. **Wireless Networks:** Wireless networks use radio waves to connect devices


without physical cables. Wi-Fi is a popular wireless technology for LANs, while
cellular networks like 4G and 5G provide wide-area wireless connectivity.

4. **Cloud Networking:** This type of networking involves connecting to cloud-


based services and resources, which can be accessed from anywhere with an
internet connection. It's an essential component of modern IT infrastructure.

5. **Software-Defined Networking (SDN):** SDN separates the network's control


plane from the data plane, allowing for more flexible and dynamic network
management. It's used to optimize network performance and security.

6. **Virtual Private Networks (VPNs):** VPNs create secure, encrypted


connections over public networks, ensuring privacy and security for data
transmitted between remote locations.

Finally, let's delve into Ethernet cabling:


14 | P a g e

**Ethernet Cabling:**

Ethernet is a widely used technology for connecting devices in a wired LAN. It


involves the use of Ethernet cables to transmit data. There are several types of
Ethernet cables, but the most common ones are:

1. **Cat 5e and Cat 6:** These cables are suitable for most home and business
networking needs. They offer good bandwidth and are capable of carrying data at
high speeds.

2. **Cat 6a and Cat 7:** These cables provide higher bandwidth and are ideal for
applications that require greater data transfer rates, such as 10 Gigabit Ethernet.

3. **Fiber Optic Cables:** Fiber optic Ethernet cables use light to transmit data,
offering extremely high speeds and long-distance connectivity. They are commonly
used in data centers and for long-haul networking.

Ethernet cabling is crucial for building reliable and high-performance wired


networks. It's an integral part of many LANs and is known for its stability and low
latency.

In conclusion, networking is essential for modern communication, collaboration,


and resource sharing. It comes in various forms, from local LANs to global WANs,
and the choice of networking technology depends on the specific requirements of
your organization. Ethernet cabling, in particular, remains a staple for establishing
wired connections and ensuring a dependable network infrastructure.

 Introduction to TCP/IP
15 | P a g e

Introduction to TCP/IP
TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of
communication protocols that govern how data is transmitted over the internet. It is
the underlying protocol suite for the internet and most other computer networks.
TCP/IP is also used in many embedded systems, such as routers and switches.
TCP/IP is a four-layer protocol suite, with each layer performing a specific
function:
 Link layer: The link layer is responsible for transmitting and receiving data
over the physical network medium, such as Ethernet or Wi-Fi.
 Internet layer: The internet layer is responsible for routing packets from the
source device to the destination device.
 Transport layer: The transport layer is responsible for providing reliable end-
to-end communication between devices.
 Application layer: The application layer provides the services that
applications use to communicate over the internet, such as HTTP for web
browsing and FTP for file transfers.
TCP and UDP are the two most important protocols in the TCP/IP suite.
 TCP: TCP is a reliable connection-oriented protocol. This means that TCP
establishes a connection between the source and destination devices before
sending any data. TCP also ensures that all of the data is received in the
correct order and that no data is lost.
 UDP: UDP is an unreliable connectionless protocol. This means that UDP
does not establish a connection between the source and destination devices
before sending any data. UDP also does not guarantee that all of the data
will be received or that it will be received in the correct order.
TCP is typically used for applications that require reliable communication, such as
email and file transfers. UDP is typically used for applications that require fast
communication, even if it is not reliable, such as online gaming and streaming
video.
TCP/IP is a complex topic, but this introduction has given you a basic overview of
how it works.
Applications of TCP/IP
TCP/IP is used in a wide variety of professional applications, including:
 Enterprise networks: TCP/IP is the standard protocol suite for enterprise
networks, which connect computers, servers, and other devices within a
business or organization.
16 | P a g e

 Internet of Things (IoT) devices: TCP/IP is also used in IoT devices, such as
smart thermostats and security cameras, to allow them to communicate with
each other and with the internet.
 Cloud computing: TCP/IP is used to connect users to cloud computing
services, such as Amazon Web Services and Microsoft Azure.
 Telecommunications: TCP/IP is used in telecommunications networks to
provide voice and data services to customers.
Overall, TCP/IP is a critical protocol suite that enables communication and data
transmission over the internet and other computer networks.

Learn the color code for straight and crossed cable


Introduction
Ethernet cables are used to connect devices to each other on a network. There are
two types of Ethernet cables: straight-through cables and crossover cables.
Straight-through cables are used to connect two different types of devices, such as
a computer to a switch, or a switch to a router. Crossover cables are used to
connect two devices of the same type, such as two computers or two switches.
The color code for straight-through and crossover cables is different. The
following table shows the color code for both types of cables:

Pin Color Straight-through cable Crossover cable

1 White/Orange Transmit+ (TX+) Receive+ (RX+)

2 Orange Transmit- (TX-) Receive- (RX-)

3 White/Green Receive+ (RX+) Transmit+ (TX+)

4 Blue Receive- (RX-) Transmit- (TX-)


17 | P a g e

5 White/Blue Unused Unused

6 Green Unused Unused

7 White/Brown Ground Ground

8 Brown Ground Ground

When to use a straight-through cable


A straight-through cable should be used to connect two different types of devices,
such as a computer to a switch, or a switch to a router. For example, you would use
a straight-through cable to connect your computer to your home router.
When to use a crossover cable
A crossover cable should be used to connect two devices of the same type, such as
two computers or two switches. For example, you would use a crossover cable to
connect two computers together if you wanted to share files between them without
using a network.
How to make a straight-through cable
To make a straight-through cable, you will need an RJ-45 connector at each end of
the cable. You will also need a crimping tool to crimp the connectors onto the
cable.
To crimp the connector onto the cable, follow these steps:
1. Strip the outer jacket off of the cable to expose the eight inner wires.
2. Untwist the wires and arrange them in the correct order, according to the
table above.
3. Trim the wires so that they are all the same length.
4. Insert the wires into the RJ-45 connector, making sure that each wire is
inserted into the correct pin.
5. Use the crimping tool to crimp the connector onto the cable.
How to make a crossover cable
To make a crossover cable, follow the same steps as above, but swap the orange
and green pairs of wires at one end of the cable.
Conclusion
Knowing the color code for straight-through and crossover cables is an important
skill for any network administrator or IT professional. By understanding the
18 | P a g e

difference between the two types of cables and how to make them, you can ensure
that your network is properly connected.

 Learning the layers of the OSI reference model


Introduction
The OSI reference model, also known as the seven-layer model, is a conceptual
model that describes how data is transmitted over a network. The model divides
the communication process into seven layers, each of which has a specific
function.
The seven layers of the OSI reference model are:
 Physical layer: The physical layer is responsible for the physical
transmission of data over the network medium. This includes tasks such as
encoding and decoding data, and managing the physical connection between
devices.
 Data link layer: The data link layer is responsible for framing data into
packets and transmitting them over the physical layer. It also handles error
detection and correction.
 Network layer: The network layer is responsible for routing packets from the
source device to the destination device. It also provides services such as
address resolution and fragmentation.
 Transport layer: The transport layer is responsible for providing reliable end-
to-end communication between devices. It does this by segmenting data into
smaller units, and then reassembling them at the destination device.
 Session layer: The session layer establishes, manages, and terminates
sessions between devices. It also provides services such as synchronization
and checkpointing.
 Presentation layer: The presentation layer translates data into a format that
can be understood by the receiving device. It also provides services such as
encryption and data compression.
 Application layer: The application layer provides the services that
applications use to communicate over the network. This includes tasks such
as file transfer, email, and web browsing.
How the layers work together
19 | P a g e

When data is transmitted over a network, it passes through each layer of the OSI
reference model in order. At each layer, the data is processed and modified in some
way.
For example, at the physical layer, the data is encoded into a signal that can be
transmitted over the network medium. At the data link layer, the data is framed
into packets and transmitted to the next device on the network. At the network
layer, the packets are routed to the destination device. At the transport layer, the
packets are reassembled into the original data stream. At the session layer, the
session is managed and terminated. At the presentation layer, the data is translated
into a format that can be understood by the receiving device. And finally, at the
application layer, the data is delivered to the application that requested it.
Benefits of learning the OSI reference model
Learning the OSI reference model has a number of benefits, including:
 Improved troubleshooting skills: By understanding how the different layers
of the OSI reference model work together, you can better troubleshoot
network problems.
 Increased knowledge of networking concepts: The OSI reference model
provides a good foundation for understanding other networking concepts,
such as TCP/IP and subnetting.
 Improved communication skills: The OSI reference model provides a
common language that can be used to communicate about networking with
other people.
Conclusion
The OSI reference model is a valuable tool for anyone who wants to understand
how networks work. By learning the layers of the model and how they work
together, you can improve your troubleshooting skills, increase your knowledge of
networking concepts, and improve your communication skills.

 Router and switch Administrative configuration

Introduction

Routers and switches are essential components of most networks. They provide the
connectivity that allows devices to communicate with each other. In addition to
their basic connectivity functions, routers and switches also offer a number of
20 | P a g e

administrative configuration options. These options allow you to manage and


secure your network more effectively.

Common administrative configuration tasks

Some of the most common administrative configuration tasks for routers and
switches include:

 Setting up a hostname and passwords: This is an important security measure


to help protect your devices from unauthorized access.
 Configuring IP addresses and subnet masks: This is necessary for devices to
be able to communicate with each other on the network.
 Configuring routing and switching tables: This allows routers and switches
to know how to forward packets between devices on the network.
 Configuring access control lists (ACLs): ACLs can be used to restrict traffic
flow on the network and improve security.
 Configuring Quality of Service (QoS): QoS can be used to prioritize certain
types of traffic on the network, such as voice and video traffic.

How to configure routers and switches

The specific steps required to configure a router or switch will vary depending on
the make and model of the device. However, most routers and switches can be
configured using a web-based interface or a command-line interface (CLI).

To configure a router or switch using a web-based interface, you will need to


connect to the device using a web browser. The IP address of the device can
usually be found on the device itself or in the documentation that came with the
device.

To configure a router or switch using a CLI, you will need to connect to the device
using a terminal emulator program. The console port of the device is typically used
for CLI access.

Once you are connected to the device, you can follow the instructions in the
device's documentation to configure the desired settings.
21 | P a g e

Best practices for router and switch configuration

Here are some best practices for configuring routers and switches:

 Use strong passwords and change them regularly. This will help to protect
your devices from unauthorized access.
 Configure IP addresses and subnet masks carefully. Make sure that each
device on the network has a unique IP address and that the subnet masks are
configured correctly.
 Create and implement ACLs. ACLs can help to improve security and restrict
traffic flow on the network.
 Configure QoS. QoS can be used to prioritize certain types of traffic on the
network, such as voice and video traffic.
 Keep your firmware up to date. Router and switch firmware updates often
include security patches and bug fixes.

Conclusion

By following the best practices outlined above, you can ensure that your routers
and switches are configured securely and efficiently. This will help to improve the
performance and reliability of your network.

 Router interfaces

Router interfaces: The essential components of a network

Router interfaces are the ports on a router that allow it to connect to other devices
on a network. They are essential components of any network, and their proper
configuration is critical for network performance and security.

Types of router interfaces

There are three main types of router interfaces:


22 | P a g e

 Ethernet interfaces: Ethernet interfaces are the most common type of router
interface. They are used to connect routers to other devices on a local area
network (LAN), such as computers, printers, and switches.
 Serial interfaces: Serial interfaces are used to connect routers to each other
over long distances, such as over the internet. They can also be used to
connect routers to other devices, such as modems and servers.
 Wireless interfaces: Wireless interfaces allow routers to connect to devices
without using any cables. This makes them ideal for use in homes and
businesses where wired connections are not feasible or desired.

Configuring router interfaces

When configuring router interfaces, it is important to consider the following


factors:

 IP address and subnet mask: Each router interface must be assigned a unique
IP address and subnet mask. This allows the router to identify the devices
connected to each interface and to route traffic between them correctly.
 Routing protocol: Routers use routing protocols to determine how to route
traffic between different networks. The routing protocol that is configured
on a router interface will depend on the topology of the network and the type
of devices that are connected to the interface.
 Security settings: It is important to configure security settings for each router
interface to protect the network from unauthorized access and denial-of-
service attacks. Common security settings for router interfaces include
firewalls, access control lists (ACLs), and intrusion detection systems (IDS).

Best practices for router interface configuration

Here are some best practices for router interface configuration:

 Assign a unique IP address and subnet mask to each router interface.


 Configure a routing protocol that is appropriate for the network topology and
the type of devices that are connected to each interface.
 Configure security settings for each router interface to protect the network
from unauthorized access and denial-of-service attacks.
23 | P a g e

 Monitor router interfaces for errors and performance issues.

By following these best practices, you can ensure that your router interfaces are
configured correctly and securely. This will help to keep your network running
smoothly and efficiently.

Conclusion

Router interfaces are essential components of any network. Their proper


configuration is critical for network performance and security. By understanding
the different types of router interfaces and how to configure them correctly, you
can ensure that your network is running at its best.

 IP Routing

Introduction

IP routing is the process of determining the best path for a packet of data to travel
from its source to its destination on an IP network. This is done by routers, which
are devices that connect different networks together. Routers use routing tables to
determine the next hop for a packet, based on its destination IP address.

How IP routing works

When a device on a network wants to communicate with another device on a


different network, it sends its packet to a router. The router then looks up the
destination IP address in its routing table to determine the next hop for the packet.
The next hop is the router that is closest to the destination network. The router then
forwards the packet to the next hop router.

This process continues until the packet reaches its destination network. The last
router on the path will then forward the packet to the destination device.

Routing protocols
24 | P a g e

Routers use routing protocols to exchange information with each other about the
networks that they are connected to and the paths to those networks. This
information is used to build routing tables.

There are many different routing protocols in use today. Some of the most
common routing protocols include:

 Border Gateway Protocol (BGP)


 Open Shortest Path First (OSPF)
 Routing Information Protocol (RIP)
 Interior Gateway Routing Protocol (IGRP)

Types of IP routing

There are two main types of IP routing:

 Static routing: Static routing is when the routes are manually configured on
the router. This is typically used for small networks where the topology is
unlikely to change.
 Dynamic routing: Dynamic routing is when the routes are automatically
learned by the router using routing protocols. This is typically used for
larger networks where the topology may change frequently.

Benefits of IP routing

IP routing offers a number of benefits, including:

 Scalability: IP routing is scalable to support networks of all sizes, from


small home networks to large enterprise networks.
 Reliability: IP routing is a reliable way to transmit data across
networks. Routers are able to detect and correct errors in packets, and they
can also reroute packets around congestion or outages.
 Efficiency: IP routing is an efficient way to transmit data across
networks. Routers are able to choose the shortest and most efficient path for
packets to travel.
25 | P a g e

 Security: IP routing can be used to improve the security of networks by


filtering traffic and blocking unauthorized access.

Conclusion

IP routing is an essential part of the internet and other networks. It allows devices
to communicate with each other across different networks, regardless of their
physical location. IP routing is also scalable, reliable, efficient, and secure .

 Configuring IP routing in a network

Introduction

IP routing is the process of determining the best path for a packet of data to travel
from its source to its destination on an IP network. This is done by routers, which
are devices that connect different networks together. Routers use routing tables to
determine the next hop for a packet, based on its destination IP address.

To configure IP routing in a network, you will need to do the following:

1. Assign IP addresses and subnet masks to all devices on the network. This
can be done manually or using a dynamic host configuration protocol
(DHCP).
2. Configure the routers on the network with the appropriate routing
information. This can be done manually or using a dynamic routing protocol.
3. Verify that IP routing is working correctly. This can be done by sending
ping packets between different devices on the network.

Configuring static routes

To configure a static route, you will need to specify the following information:

 The destination IP address or subnet mask


 The next hop IP address
26 | P a g e

 The interface on the router that the packet should be forwarded out of

For example, to configure a static route to the subnet 192.168.1.0/24 on the


interface Ethernet0/0, you would use the following command:

ip route 192.168.1.0 255.255.255.0 192.168.0.1 Ethernet0/0

Configuring dynamic routing

Dynamic routing protocols are used to automatically exchange routing information


between routers. This allows the routers to build routing tables that reflect the
current topology of the network.

Some of the most common dynamic routing protocols include:

 Border Gateway Protocol (BGP)


 Open Shortest Path First (OSPF)
 Routing Information Protocol (RIP)
 Interior Gateway Routing Protocol (IGRP)

To configure a dynamic routing protocol, you will need to specify the following
information:

 The routing protocol to use


 The interfaces on the router that the routing protocol should be enabled on

For example, to enable OSPF on the interface Ethernet0/0, you would use the
following command:

router ospf 1
network Ethernet0/0 area 0

Verifying IP routing
27 | P a g e

To verify that IP routing is working correctly, you can send ping packets between
different devices on the network. If the ping packets are successful, then IP routing
is working correctly.

For example, to ping the device with the IP address 192.168.1.1, you would use the
following command:

ping 192.168.1.1

If you are having problems with IP routing, you can use the following commands
to troubleshoot the issue:

show ip route
show ip ospf

These commands will show you the routing table and OSPF information,
respectively. You can use this information to identify the problem and fix it.

Conclusion

Configuring IP routing in a network is an important task for any network


administrator. By following the steps above, you can configure IP routing correctly
and ensure that your network is running smoothly and efficiently.

 Configuration of IP phone

Introduction

An IP phone is a telephone that uses the Internet Protocol (IP) to transmit voice
and data over a network. IP phones are becoming increasingly popular in
businesses and homes, as they offer a number of advantages over traditional
landline phones, such as lower costs, increased flexibility, and access to new
features and services.

To configure an IP phone, you will need to:


28 | P a g e

1. Connect the phone to the network.


2. Configure the phone's IP address and subnet mask.
3. Configure the phone's SIP account information.
4. Verify that the phone is working correctly.

Connecting the phone to the network

IP phones can be connected to the network using a variety of methods, including:

 Ethernet cable
 Wi-Fi
 PoE (Power over Ethernet)

The specific method you use will depend on the type of phone you have and the
network you are connecting to.

Configuring the phone's IP address and subnet mask

The IP address and subnet mask for the phone can be configured manually or using
DHCP. If you are using DHCP, the phone will automatically obtain an IP address
from the DHCP server on the network. If you are configuring the IP address
manually, you will need to enter the IP address, subnet mask, and default gateway
address into the phone's settings.

Configuring the phone's SIP account information

SIP (Session Initiation Protocol) is the protocol used by IP phones to communicate


with each other and with other devices on the network. To configure the phone's
SIP account information, you will need to enter the following information into the
phone's settings:

 SIP username
 SIP password
 SIP server address
29 | P a g e

This information can be obtained from your VoIP provider.

Verifying that the phone is working correctly

Once you have configured the phone's IP address and SIP account information, you
can verify that the phone is working correctly by making a test call. To do this, dial
the phone number of another IP phone on the network. If the call is successful,
then the phone is configured correctly.

Additional configuration options

In addition to the basic configuration options listed above, IP phones also offer a
number of other configuration options. These options may vary depending on the
type of phone you have and the firmware version that is running on the phone.

Some common configuration options include:

 Call forwarding
 Caller ID
 Do Not Disturb
 Voicemail
 Auto-answer
 Call recording
 Conference calling

You can consult the phone's documentation for more information on how to
configure these options.

Conclusion

Configuring an IP phone is a relatively straightforward process. By following the


steps above, you can configure your IP phone correctly and start enjoying the
benefits of VoIP telephony.
30 | P a g e

 Learning about Network Topology

Introduction

Network topology is the physical and logical arrangement of nodes and


connections in a network. It defines how network devices are interconnected and
how data flows between them.

Types of network topology

There are five main types of network topology:

 Bus topology: A bus topology is a linear topology in which all devices are
connected to a single cable. This is the simplest type of topology, but it can
be difficult to troubleshoot and scale.
 Ring topology: A ring topology is a circular topology in which all devices
are connected to each other in a loop. This topology is more reliable than a
bus topology, but it can be difficult to add or remove devices without
disrupting the network.
 Star topology: A star topology is a hierarchical topology in which all devices
are connected to a central hub or switch. This is the most common type of
topology, as it is easy to scale and troubleshoot.
 Tree topology: A tree topology is a hierarchical topology that combines
multiple star topologies. This topology is often used in large networks, as it
is scalable and reliable.
 Mesh topology: A mesh topology is a full-connected topology in which each
device is connected to every other device. This is the most reliable type of
topology, but it is also the most expensive and difficult to implement.

Factors to consider when choosing a network topology

When choosing a network topology, there are a number of factors to consider,


including:

 Network size: The size of the network will dictate which topologies are
feasible. For example, a bus topology is not practical for a large network, as
it would be difficult to scale and troubleshoot.
31 | P a g e

 Network performance: Some topologies, such as mesh topologies, offer


better performance than others. However, these topologies are also more
expensive and difficult to implement.
 Network cost: The cost of implementing and maintaining a network will
vary depending on the topology chosen.
 Network security: Some topologies, such as mesh topologies, offer better
security than others. However, these topologies are also more complex and
difficult to manage.

Conclusion

Network topology is an important consideration when designing and implementing


a network. By choosing the right topology, you can optimize network performance,
reliability, security, and cost.

 Introduction to Internet protocol

Introduction

The Internet Protocol (IP) is the network layer communications protocol in the
Internet protocol suite for relaying datagrams across network boundaries. Its
routing function enables internetworking, and essentially establishes the Internet.
IP has the task of delivering packets from the source host to the destination host
solely based on the IP addresses in the packet headers.

IPv4 and IPv6

There are two versions of IP: IPv4 and IPv6. IPv4 is the older version of IP and is
currently the most widely used version. However, IPv6 is the newer version of IP
and is gradually replacing IPv4. IPv6 offers a number of advantages over IPv4,
including a larger address space, improved security, and better support for mobile
devices.

IP addressing
32 | P a g e

IP addresses are used to identify and locate devices on the Internet. Each device on
the Internet has a unique IP address. IP addresses are either static or dynamic.
Static IP addresses are manually assigned to devices and do not change. Dynamic
IP addresses are automatically assigned to devices by a DHCP server and can
change over time.

IP packets

IP packets are the basic unit of data that is transmitted over the Internet. IP packets
are made up of two parts: a header and a payload. The header contains information
about the packet, such as the source and destination IP addresses, the packet
length, and the protocol type of the payload. The payload contains the actual data
that is being transmitted.

IP routing

IP routing is the process of determining the best path for an IP packet to travel
from its source to its destination. Routers are devices that perform IP routing.
Routers use routing tables to determine the next hop for a packet, based on its
destination IP address.

IP fragmentation

IP packets can be fragmented into smaller packets if they are too large to fit on a
single network link. The fragmentation process is performed by the routers that the
packet passes through. The fragmented packets are reassembled at the destination
device.

IP protocols

IP is used in conjunction with other protocols, such as TCP (Transmission Control


Protocol) and UDP (User Datagram Protocol), to provide reliable and unreliable
communication between devices on the Internet. TCP is used for applications that
require reliable communication, such as email and file transfers. UDP is used for
applications that require fast communication, even if it is not reliable, such as
online gaming and streaming video.

Benefits of IP
33 | P a g e

IP offers a number of benefits, including:

 Scalability: IP can be used to support networks of all sizes, from small home
networks to large enterprise networks.
 Reliability: IP is a reliable way to transmit data across networks. Routers are
able to detect and correct errors in packets, and they can also reroute packets
around congestion or outages.
 Efficiency: IP is an efficient way to transmit data across networks. Routers
are able to choose the shortest and most efficient path for packets to travel.
 Flexibility: IP is a flexible protocol that can be used to support a wide
variety of applications.

Conclusion

IP is the foundation of the Internet. It is a reliable, efficient, and flexible protocol


that can be used to support networks of all sizes and a wide variety of applications.

 Internetworking OS (Operating System) and


Security Device Manager
Introduction
An internetworking operating system (IOS) is a type of operating system that is
designed to run on network devices, such as routers and switches. IOSs are
typically very reliable and efficient, and they offer a wide range of features for
managing and configuring networks.
A security device manager is a software application that is used to manage and
configure security devices, such as firewalls and intrusion detection systems.
Security device managers typically provide a centralized interface for managing all
of the security devices on a network, and they can help to automate many of the
tasks involved in managing network security.
Internetworking operating systems
Some of the most popular internetworking operating systems include:
34 | P a g e

 Cisco IOS: Cisco IOS is the most popular IOS in the world. It is used by a
wide range of organizations, from small businesses to large enterprises.
 Juniper Networks JunOS: JunOS is a popular IOS that is known for its
performance and scalability.

 Cumulus Networks Cumulus Linux: Cumulus Linux is an open-source


IOS that is based on Linux. It is a popular choice for organizations that want
to avoid the licensing costs of proprietary IOSs.
Security device managers
Some of the most popular security device managers include:
 Cisco Firepower Management Center: Cisco Firepower Management
Center is a centralized management platform for Cisco's next-generation
firewalls.
 Palo Alto Networks Panorama: Palo Alto Networks Panorama is a
centralized management platform for Palo Alto Networks' firewalls and
intrusion detection systems.
 Fortinet FortiManager: Fortinet FortiManager is a centralized management
platform for Fortinet's firewalls, intrusion detection systems, and other
security devices.
Benefits of using an internetworking OS and security device manager
There are a number of benefits to using an internetworking OS and security device
manager, including:
 Centralized management: An internetworking OS and security device
manager can provide a centralized interface for managing all of the network
devices and security devices on a network. This can make it easier to
manage the network and to troubleshoot problems.
 Automation: An internetworking OS and security device manager can
automate many of the tasks involved in managing network devices and
security devices. This can free up network administrators to focus on other
tasks.
35 | P a g e

 Security: An internetworking OS and security device manager can help to


improve network security by providing features such as firewalls, intrusion
detection systems, and content filtering.
 Scalability: An internetworking OS and security device manager can help to
scale networks. This is important for organizations that are growing or that
need to support a large number of users and devices.
Conclusion
An internetworking OS and security device manager are essential tools for
managing and securing networks. By using an internetworking OS and security
device manager, organizations can improve the performance, reliability, and
security of their networks.

 Subnetting basics
What is subnetting?
Subnetting is the process of dividing a single IP network into smaller networks,
called subnets. This allows you to more efficiently use your IP address space and to
create logical divisions within your network.
How does subnetting work?
When you subnet an IP network, you borrow bits from the host portion of the IP
address to create the subnet mask. The subnet mask is a 32-bit number that tells
you which bits are used for the subnet address and which bits are used for the host
address.
For example, let's say you have the IP network 192.168.1.0/24. This network has
256 IP addresses, but you only need 100 addresses for your devices. You can
subnet this network into four subnets of 64 addresses each by using the following
subnet mask: 255.255.255.192.
This subnet mask will create the following subnets:
 192.168.1.0/26
 192.168.1.64/26
 192.168.1.128/26
36 | P a g e

 192.168.1.192/26
Each of these subnets has 64 IP addresses, and you can assign these addresses to
your devices.
Why is subnetting important?
Subnetting is important for a number of reasons, including:
 Efficient use of IP address space: Subnetting allows you to more efficiently
use your IP address space. For example, if you have a small network with
only a few devices, you can subnet your IP network into smaller
subnets. This will allow you to use fewer IP addresses and save money on
your IP address allocation.
 Improved network performance: Subnetting can improve network
performance by reducing broadcast traffic. Broadcast traffic is sent to all
devices on a network, and it can slow down network performance. By
subnetting your network, you can reduce the amount of broadcast traffic that
is sent to each device.
 Enhanced network security: Subnetting can enhance network security by
creating logical divisions within your network. This can help to prevent
unauthorized access to your network and to protect your data from attack.
When should I use subnetting?
You should use subnetting if:
 You have a large network with many devices.
 You need to create logical divisions within your network.
 You want to improve network performance.
 You want to enhance network security.
Conclusion
Subnetting is a powerful tool that can be used to improve the efficiency,
performance, and security of your network. If you have a network with more than a
few devices, I recommend that you consider subnetting your network.
37 | P a g e

 Managing a CISCO Internetwork


What is a Cisco internetwork?
A Cisco internetwork is a network that uses Cisco routers and switches to connect
different networks together. Cisco networks are some of the most popular and
reliable networks in the world, and they are used by a wide range of organizations,
from small businesses to large enterprises.
How do you manage a Cisco internetwork?
There are a number of different ways to manage a Cisco internetwork, but the most
common way is to use a network management system (NMS). An NMS is a
software application that allows you to manage all of the devices on your network
from a single location.
Some of the most popular NMS solutions for Cisco networks include:
 Cisco Prime Network Analyst
 SolarWinds Network Performance Monitor
 ManageEngine OpManager
What are the benefits of managing a Cisco internetwork?
There are a number of benefits to managing a Cisco internetwork, including:
 Improved network performance: Managing a Cisco internetwork can help to
improve network performance by reducing broadcast traffic, optimizing
routing, and monitoring network performance.
 Enhanced network security: Managing a Cisco internetwork can help to
enhance network security by implementing security features such as
firewalls, intrusion detection systems, and access control lists.
38 | P a g e

 Reduced troubleshooting time: Managing a Cisco internetwork can help to


reduce troubleshooting time by providing a centralized view of the network
and by providing tools for troubleshooting network problems.
How to get started with managing a Cisco internetwork
If you are new to managing Cisco networks, there are a few things you can do to
get started:
1. Learn about the basics of Cisco networking. This includes learning about
Cisco routers and switches, as well as learning about Cisco IOS, which is the
operating system that runs on Cisco devices.
2. Choose a network management system (NMS). There are a number of
different NMS solutions available, so it is important to choose one that is
right for your needs.
3. Configure the NMS to monitor your network. Once you have chosen an
NMS, you need to configure it to monitor your network. This includes
adding your Cisco devices to the NMS and configuring the NMS to monitor
the specific aspects of your network that you are interested in.
4. Monitor your network and troubleshoot problems. Once the NMS is
configured, you can start monitoring your network and troubleshooting
problems. The NMS will provide you with information about the
performance and health of your network, and it will also provide you with
tools for troubleshooting network problems.
Conclusion
Managing a Cisco internetwork can be a complex task, but it is essential for
ensuring that your network is performing at its best and that it is secure. By
following the tips above, you can get started with managing your Cisco
internetwork.

Chapter three: IMPLICATION OF THE


TRAINING PROGRAMME/EVALUATION OF
THE TRAINING PROGRAMME
39 | P a g e

Interplay of University-Taught Courses


Students can gain a solid foundation in networking technologies, protocols, and
architectures by taking university-level courses on internetworking. These courses
are frequently augmented with real-world, hands-on experience building and
maintaining networks.
Internetworking and university-taught courses interact in a significant way.
Students are given the theoretical grounding necessary to comprehend the ideas
and procedures employed in internetworking in university courses. This could
cover subjects like network architecture, network elements, network protocols,
network security, and network administration. On the other hand, through
internships, co-ops, or other possibilities, individuals frequently acquire actual
expertise in setting up and administering networks.
I can develop a deeper grasp of how networks work in the actual world through
these encounters. Understanding internetworking properly requires both theoretical
understanding and hands-on experience. While practical experience can offer a
better understanding and greater hands-on experience, university courses can lay a
solid basis for learning the principles and comprehending the concepts. Students
can gain a thorough understanding of internetworking that they can use in their
future jobs by integrating the two.

 Challenges faced during training period


40 | P a g e

You might also like