Professional Documents
Culture Documents
Ogunbodede Olatomiwa
Ayotunde
EU:200102-2147
2|Page
Chapter One:
Letter of Submission
Organogram
Introduction
CHAPTER ONE
LETTER OF SUBMISSION
4|Page
Dear Sir,
SUBMISSION OF SIWES REPORT
This is to submit my SIWES II report embarked upon from April to
October 2023, at ICT unit (Elizade University) for your review.
Thank you.
Yours faithfully,
CHAPTER TWO
DETAILS OF INDUSTRIAL WORK EXPERIENCE
Weekly summary of work experience
6|Page
I learnt about the various departments within the ICT and the operations that
each department oversees. The departments are thus: Networking, systems and
Programming. I was also shown the TC (Telecommunication Closet).
I learnt how to change the IP address of a PC (Personal Computer) manually.
The steps entails:
1. Select Start, then type settings, Select Settings > Network and Internet.
2. Next to IP assignment, select Edit.
3. Under Edit network IP settings or Edit IP settings, select IPv4 settings
Manual.
4. To specify an IP address, I the IP address, Subnet mask, and Gateway boxes,
type the IP address settings.
5. Since you selected manual, you manually set your IP address settings and
DNS server address.
6. When you are done, select Save.
I learnt how to identify network cables, the different types of cables also the
color codes and their functions. Then I was taught hot to crimp network cables and
connect IDC (Insulation-displacement connector).
For a lecture, my boss and I set up a new desktop computer. My boss brought
me out into the field to maintain the optic fiber line for the school. I learned about
fiber optic cassettes, a tool for managing fiber optic cables, and the splicing
technique, which is used to link two fiber optic cables in order to increase their
length. By debugging, my supervisor and I were able to pinpoint the specific issue
and apply a quick repair for the Internet connection issue. Additionally, I upgraded
the batteries in my single uninterruptible power supply (UPS).
I learnt about OSI model. It describes seven layers that computer systems use to
communicate over a network. It was the first standard model for network
communication adopted by all major computer and telecommunication companies
in the early 1980s. The layers are:
1. Physical Layer.
2. Data link Layer.
3. Network Layer.
7|Page
4. Transport Layer.
5. Session Layer.
6. Presentation Layer.
7. Application Layer.
My supervisor and I went to troubleshoot a camera. When we got to the camera
control, we found out the IDC was burnt out and we replaced it and it was working
fine again. We also got a complaint about a WIFI not functioning in the annex
hostel, and I was sent to find out what was wrong with the WIFI there. When I got
there, I found out that water already damaged the IDC that was connected. I was
asked to change it and I started working fine.
I learnt about the administrative configuration like changing the SSID. Unlike
on a router, where we configure the IP address on an interface, on a switch, a layer
2 switch, the management IP address goes on a VLAN interface i.e. A virtual
interface.
I was asked to troubleshoot a lecturer's desktop when she discovered that the
machine was not providing audio feedback. Troubleshooting revealed that the lack
of an audio driver on the computer prevents it from detecting an output device,
thus all I needed to do to get it to function again was to install a new audio driver.
This week, in addition to being asked to demonstrate the UPS battery installation
procedure, I was also asked to install fresh UPS batteries for the dean of the law
faculty.
I learnt how to activate the Windows and applications on a PC. I went to the
engineering faculty to set up new Internet routing; as the engineering faculty lacks
a data center, we had to install a portable Internet router. The girl's hostel
complained that several of their access points weren't working, and we were able to
verify this when my supervisor and I made a call that didn't go through. The access
points that weren't working are currently being fixed.
I learnt how to troubleshoot a PC that was not booting up by configuring files
and transferring corrupted files using command prompt. My supervisor and I
discovered that the nursing lab was not receiving Internet and that one of the
8|Page
Internet radios was not pointing in the proper direction. We had to climb to adjust
the Internet radio's line of sight. On the radio, we also modified the IDC.
I learnt about the limits and permissions that can be set by the administrator on
other user account and could transfer document from the different user account
seamlessly. I was asked to troubleshoot and repair a system that was booting up
correctly on the first day of this week. The ram needed to be readjusted, which I
did after conducting troubleshooting, and the computer then booted normally.
I learnt about radio-networking and their frequencies and why a line of sight is
required. We checked the radio at the nursing department and it looked fine (not
damaged). Then we troubleshooted it and it wasn’t working still. We un-mounted it
and took it for repair.
I was asked to register to Prof. Kehinde Agbele’s course. Where I was taught
about grammar, language and automation regarding computing and the things
concerning it.
I went to the universities computer labs and checked the systems for faults of
any kind. I scanned the system for virus and corrupted files, checked the speed and
network connectivity to the school domain.
I learnt how to fix a window 10 boot loop problem and the steps are:
1. Attempt to boot in safe mode (f8 at startup)
2. Disable the auto-reboot function (TO disable this feature you must edit the
windows registry)
3. Note any crash messages once auto-reboot is disabled (BSOD)
4. Consider swapping hardware if there is no BSOD
5. Attempt an in-place repair or a fresh install
I was taught how to configure a CISCO switch. The steps are thus:
1. Connect the switch to a console
9|Page
Introduction to Networking
Networking is a fundamental concept in the world of technology that plays a
crucial role in connecting devices and enabling communication between them.
Whether it's the internet, your home Wi-Fi, or the vast networks that power global
corporations, understanding the basics of networking is essential. In this
introduction, I'll walk you through the fundamental principles of networking, its
importance, and some key concepts to get you started.
**What is Networking?**
**Importance of Networking**
Networking is the backbone of the modern world. It underpins the internet, mobile
communications, and nearly every aspect of our digital lives. Without networking,
we wouldn't have social media, email, cloud services, or even this very
conversation. It's an integral part of how we access information, work, and stay
connected in today's interconnected world.
4. **Firewalls**: Firewalls are security devices that filter and monitor incoming
and outgoing network traffic. They play a vital role in protecting networks from
unauthorized access and threats.
**Conclusion**
**Importance of Networking:**
4. **Data Transfer:** Networking enables fast and efficient data transfer, making
it possible to move large volumes of information within and between
organizations. This is crucial for data analysis, backups, and data storage.
**Types of Networking:**
1. **Local Area Network (LAN):** LANs are commonly used in homes, offices,
and small businesses. They connect devices within a limited geographical area,
typically a single building. Ethernet is often used to establish LANs.
2. **Wide Area Network (WAN):** WANs cover larger geographical areas and
connect multiple LANs. The internet is a prime example of a global WAN. WAN
technologies include leased lines, satellite links, and VPNs.
**Ethernet Cabling:**
1. **Cat 5e and Cat 6:** These cables are suitable for most home and business
networking needs. They offer good bandwidth and are capable of carrying data at
high speeds.
2. **Cat 6a and Cat 7:** These cables provide higher bandwidth and are ideal for
applications that require greater data transfer rates, such as 10 Gigabit Ethernet.
3. **Fiber Optic Cables:** Fiber optic Ethernet cables use light to transmit data,
offering extremely high speeds and long-distance connectivity. They are commonly
used in data centers and for long-haul networking.
Introduction to TCP/IP
15 | P a g e
Introduction to TCP/IP
TCP/IP, or Transmission Control Protocol/Internet Protocol, is a suite of
communication protocols that govern how data is transmitted over the internet. It is
the underlying protocol suite for the internet and most other computer networks.
TCP/IP is also used in many embedded systems, such as routers and switches.
TCP/IP is a four-layer protocol suite, with each layer performing a specific
function:
Link layer: The link layer is responsible for transmitting and receiving data
over the physical network medium, such as Ethernet or Wi-Fi.
Internet layer: The internet layer is responsible for routing packets from the
source device to the destination device.
Transport layer: The transport layer is responsible for providing reliable end-
to-end communication between devices.
Application layer: The application layer provides the services that
applications use to communicate over the internet, such as HTTP for web
browsing and FTP for file transfers.
TCP and UDP are the two most important protocols in the TCP/IP suite.
TCP: TCP is a reliable connection-oriented protocol. This means that TCP
establishes a connection between the source and destination devices before
sending any data. TCP also ensures that all of the data is received in the
correct order and that no data is lost.
UDP: UDP is an unreliable connectionless protocol. This means that UDP
does not establish a connection between the source and destination devices
before sending any data. UDP also does not guarantee that all of the data
will be received or that it will be received in the correct order.
TCP is typically used for applications that require reliable communication, such as
email and file transfers. UDP is typically used for applications that require fast
communication, even if it is not reliable, such as online gaming and streaming
video.
TCP/IP is a complex topic, but this introduction has given you a basic overview of
how it works.
Applications of TCP/IP
TCP/IP is used in a wide variety of professional applications, including:
Enterprise networks: TCP/IP is the standard protocol suite for enterprise
networks, which connect computers, servers, and other devices within a
business or organization.
16 | P a g e
Internet of Things (IoT) devices: TCP/IP is also used in IoT devices, such as
smart thermostats and security cameras, to allow them to communicate with
each other and with the internet.
Cloud computing: TCP/IP is used to connect users to cloud computing
services, such as Amazon Web Services and Microsoft Azure.
Telecommunications: TCP/IP is used in telecommunications networks to
provide voice and data services to customers.
Overall, TCP/IP is a critical protocol suite that enables communication and data
transmission over the internet and other computer networks.
difference between the two types of cables and how to make them, you can ensure
that your network is properly connected.
When data is transmitted over a network, it passes through each layer of the OSI
reference model in order. At each layer, the data is processed and modified in some
way.
For example, at the physical layer, the data is encoded into a signal that can be
transmitted over the network medium. At the data link layer, the data is framed
into packets and transmitted to the next device on the network. At the network
layer, the packets are routed to the destination device. At the transport layer, the
packets are reassembled into the original data stream. At the session layer, the
session is managed and terminated. At the presentation layer, the data is translated
into a format that can be understood by the receiving device. And finally, at the
application layer, the data is delivered to the application that requested it.
Benefits of learning the OSI reference model
Learning the OSI reference model has a number of benefits, including:
Improved troubleshooting skills: By understanding how the different layers
of the OSI reference model work together, you can better troubleshoot
network problems.
Increased knowledge of networking concepts: The OSI reference model
provides a good foundation for understanding other networking concepts,
such as TCP/IP and subnetting.
Improved communication skills: The OSI reference model provides a
common language that can be used to communicate about networking with
other people.
Conclusion
The OSI reference model is a valuable tool for anyone who wants to understand
how networks work. By learning the layers of the model and how they work
together, you can improve your troubleshooting skills, increase your knowledge of
networking concepts, and improve your communication skills.
Introduction
Routers and switches are essential components of most networks. They provide the
connectivity that allows devices to communicate with each other. In addition to
their basic connectivity functions, routers and switches also offer a number of
20 | P a g e
Some of the most common administrative configuration tasks for routers and
switches include:
The specific steps required to configure a router or switch will vary depending on
the make and model of the device. However, most routers and switches can be
configured using a web-based interface or a command-line interface (CLI).
To configure a router or switch using a CLI, you will need to connect to the device
using a terminal emulator program. The console port of the device is typically used
for CLI access.
Once you are connected to the device, you can follow the instructions in the
device's documentation to configure the desired settings.
21 | P a g e
Here are some best practices for configuring routers and switches:
Use strong passwords and change them regularly. This will help to protect
your devices from unauthorized access.
Configure IP addresses and subnet masks carefully. Make sure that each
device on the network has a unique IP address and that the subnet masks are
configured correctly.
Create and implement ACLs. ACLs can help to improve security and restrict
traffic flow on the network.
Configure QoS. QoS can be used to prioritize certain types of traffic on the
network, such as voice and video traffic.
Keep your firmware up to date. Router and switch firmware updates often
include security patches and bug fixes.
Conclusion
By following the best practices outlined above, you can ensure that your routers
and switches are configured securely and efficiently. This will help to improve the
performance and reliability of your network.
Router interfaces
Router interfaces are the ports on a router that allow it to connect to other devices
on a network. They are essential components of any network, and their proper
configuration is critical for network performance and security.
Ethernet interfaces: Ethernet interfaces are the most common type of router
interface. They are used to connect routers to other devices on a local area
network (LAN), such as computers, printers, and switches.
Serial interfaces: Serial interfaces are used to connect routers to each other
over long distances, such as over the internet. They can also be used to
connect routers to other devices, such as modems and servers.
Wireless interfaces: Wireless interfaces allow routers to connect to devices
without using any cables. This makes them ideal for use in homes and
businesses where wired connections are not feasible or desired.
IP address and subnet mask: Each router interface must be assigned a unique
IP address and subnet mask. This allows the router to identify the devices
connected to each interface and to route traffic between them correctly.
Routing protocol: Routers use routing protocols to determine how to route
traffic between different networks. The routing protocol that is configured
on a router interface will depend on the topology of the network and the type
of devices that are connected to the interface.
Security settings: It is important to configure security settings for each router
interface to protect the network from unauthorized access and denial-of-
service attacks. Common security settings for router interfaces include
firewalls, access control lists (ACLs), and intrusion detection systems (IDS).
By following these best practices, you can ensure that your router interfaces are
configured correctly and securely. This will help to keep your network running
smoothly and efficiently.
Conclusion
IP Routing
Introduction
IP routing is the process of determining the best path for a packet of data to travel
from its source to its destination on an IP network. This is done by routers, which
are devices that connect different networks together. Routers use routing tables to
determine the next hop for a packet, based on its destination IP address.
This process continues until the packet reaches its destination network. The last
router on the path will then forward the packet to the destination device.
Routing protocols
24 | P a g e
Routers use routing protocols to exchange information with each other about the
networks that they are connected to and the paths to those networks. This
information is used to build routing tables.
There are many different routing protocols in use today. Some of the most
common routing protocols include:
Types of IP routing
Static routing: Static routing is when the routes are manually configured on
the router. This is typically used for small networks where the topology is
unlikely to change.
Dynamic routing: Dynamic routing is when the routes are automatically
learned by the router using routing protocols. This is typically used for
larger networks where the topology may change frequently.
Benefits of IP routing
Conclusion
IP routing is an essential part of the internet and other networks. It allows devices
to communicate with each other across different networks, regardless of their
physical location. IP routing is also scalable, reliable, efficient, and secure .
Introduction
IP routing is the process of determining the best path for a packet of data to travel
from its source to its destination on an IP network. This is done by routers, which
are devices that connect different networks together. Routers use routing tables to
determine the next hop for a packet, based on its destination IP address.
1. Assign IP addresses and subnet masks to all devices on the network. This
can be done manually or using a dynamic host configuration protocol
(DHCP).
2. Configure the routers on the network with the appropriate routing
information. This can be done manually or using a dynamic routing protocol.
3. Verify that IP routing is working correctly. This can be done by sending
ping packets between different devices on the network.
To configure a static route, you will need to specify the following information:
The interface on the router that the packet should be forwarded out of
To configure a dynamic routing protocol, you will need to specify the following
information:
For example, to enable OSPF on the interface Ethernet0/0, you would use the
following command:
router ospf 1
network Ethernet0/0 area 0
Verifying IP routing
27 | P a g e
To verify that IP routing is working correctly, you can send ping packets between
different devices on the network. If the ping packets are successful, then IP routing
is working correctly.
For example, to ping the device with the IP address 192.168.1.1, you would use the
following command:
ping 192.168.1.1
If you are having problems with IP routing, you can use the following commands
to troubleshoot the issue:
show ip route
show ip ospf
These commands will show you the routing table and OSPF information,
respectively. You can use this information to identify the problem and fix it.
Conclusion
Configuration of IP phone
Introduction
An IP phone is a telephone that uses the Internet Protocol (IP) to transmit voice
and data over a network. IP phones are becoming increasingly popular in
businesses and homes, as they offer a number of advantages over traditional
landline phones, such as lower costs, increased flexibility, and access to new
features and services.
Ethernet cable
Wi-Fi
PoE (Power over Ethernet)
The specific method you use will depend on the type of phone you have and the
network you are connecting to.
The IP address and subnet mask for the phone can be configured manually or using
DHCP. If you are using DHCP, the phone will automatically obtain an IP address
from the DHCP server on the network. If you are configuring the IP address
manually, you will need to enter the IP address, subnet mask, and default gateway
address into the phone's settings.
SIP username
SIP password
SIP server address
29 | P a g e
Once you have configured the phone's IP address and SIP account information, you
can verify that the phone is working correctly by making a test call. To do this, dial
the phone number of another IP phone on the network. If the call is successful,
then the phone is configured correctly.
In addition to the basic configuration options listed above, IP phones also offer a
number of other configuration options. These options may vary depending on the
type of phone you have and the firmware version that is running on the phone.
Call forwarding
Caller ID
Do Not Disturb
Voicemail
Auto-answer
Call recording
Conference calling
You can consult the phone's documentation for more information on how to
configure these options.
Conclusion
Introduction
Bus topology: A bus topology is a linear topology in which all devices are
connected to a single cable. This is the simplest type of topology, but it can
be difficult to troubleshoot and scale.
Ring topology: A ring topology is a circular topology in which all devices
are connected to each other in a loop. This topology is more reliable than a
bus topology, but it can be difficult to add or remove devices without
disrupting the network.
Star topology: A star topology is a hierarchical topology in which all devices
are connected to a central hub or switch. This is the most common type of
topology, as it is easy to scale and troubleshoot.
Tree topology: A tree topology is a hierarchical topology that combines
multiple star topologies. This topology is often used in large networks, as it
is scalable and reliable.
Mesh topology: A mesh topology is a full-connected topology in which each
device is connected to every other device. This is the most reliable type of
topology, but it is also the most expensive and difficult to implement.
Network size: The size of the network will dictate which topologies are
feasible. For example, a bus topology is not practical for a large network, as
it would be difficult to scale and troubleshoot.
31 | P a g e
Conclusion
Introduction
The Internet Protocol (IP) is the network layer communications protocol in the
Internet protocol suite for relaying datagrams across network boundaries. Its
routing function enables internetworking, and essentially establishes the Internet.
IP has the task of delivering packets from the source host to the destination host
solely based on the IP addresses in the packet headers.
There are two versions of IP: IPv4 and IPv6. IPv4 is the older version of IP and is
currently the most widely used version. However, IPv6 is the newer version of IP
and is gradually replacing IPv4. IPv6 offers a number of advantages over IPv4,
including a larger address space, improved security, and better support for mobile
devices.
IP addressing
32 | P a g e
IP addresses are used to identify and locate devices on the Internet. Each device on
the Internet has a unique IP address. IP addresses are either static or dynamic.
Static IP addresses are manually assigned to devices and do not change. Dynamic
IP addresses are automatically assigned to devices by a DHCP server and can
change over time.
IP packets
IP packets are the basic unit of data that is transmitted over the Internet. IP packets
are made up of two parts: a header and a payload. The header contains information
about the packet, such as the source and destination IP addresses, the packet
length, and the protocol type of the payload. The payload contains the actual data
that is being transmitted.
IP routing
IP routing is the process of determining the best path for an IP packet to travel
from its source to its destination. Routers are devices that perform IP routing.
Routers use routing tables to determine the next hop for a packet, based on its
destination IP address.
IP fragmentation
IP packets can be fragmented into smaller packets if they are too large to fit on a
single network link. The fragmentation process is performed by the routers that the
packet passes through. The fragmented packets are reassembled at the destination
device.
IP protocols
Benefits of IP
33 | P a g e
Scalability: IP can be used to support networks of all sizes, from small home
networks to large enterprise networks.
Reliability: IP is a reliable way to transmit data across networks. Routers are
able to detect and correct errors in packets, and they can also reroute packets
around congestion or outages.
Efficiency: IP is an efficient way to transmit data across networks. Routers
are able to choose the shortest and most efficient path for packets to travel.
Flexibility: IP is a flexible protocol that can be used to support a wide
variety of applications.
Conclusion
Cisco IOS: Cisco IOS is the most popular IOS in the world. It is used by a
wide range of organizations, from small businesses to large enterprises.
Juniper Networks JunOS: JunOS is a popular IOS that is known for its
performance and scalability.
Subnetting basics
What is subnetting?
Subnetting is the process of dividing a single IP network into smaller networks,
called subnets. This allows you to more efficiently use your IP address space and to
create logical divisions within your network.
How does subnetting work?
When you subnet an IP network, you borrow bits from the host portion of the IP
address to create the subnet mask. The subnet mask is a 32-bit number that tells
you which bits are used for the subnet address and which bits are used for the host
address.
For example, let's say you have the IP network 192.168.1.0/24. This network has
256 IP addresses, but you only need 100 addresses for your devices. You can
subnet this network into four subnets of 64 addresses each by using the following
subnet mask: 255.255.255.192.
This subnet mask will create the following subnets:
192.168.1.0/26
192.168.1.64/26
192.168.1.128/26
36 | P a g e
192.168.1.192/26
Each of these subnets has 64 IP addresses, and you can assign these addresses to
your devices.
Why is subnetting important?
Subnetting is important for a number of reasons, including:
Efficient use of IP address space: Subnetting allows you to more efficiently
use your IP address space. For example, if you have a small network with
only a few devices, you can subnet your IP network into smaller
subnets. This will allow you to use fewer IP addresses and save money on
your IP address allocation.
Improved network performance: Subnetting can improve network
performance by reducing broadcast traffic. Broadcast traffic is sent to all
devices on a network, and it can slow down network performance. By
subnetting your network, you can reduce the amount of broadcast traffic that
is sent to each device.
Enhanced network security: Subnetting can enhance network security by
creating logical divisions within your network. This can help to prevent
unauthorized access to your network and to protect your data from attack.
When should I use subnetting?
You should use subnetting if:
You have a large network with many devices.
You need to create logical divisions within your network.
You want to improve network performance.
You want to enhance network security.
Conclusion
Subnetting is a powerful tool that can be used to improve the efficiency,
performance, and security of your network. If you have a network with more than a
few devices, I recommend that you consider subnetting your network.
37 | P a g e