Taiwo Siwes Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 40

A

TECHNICAL REPORT ON

THE INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

UNDERTAKEN AT:

SOFTWIRELEX LIMITED

(FROM JUNE 2024 – AUGUST 2024)

BY:

ALO PETER TAIWO

U22DLCS10369

A SIWES REPORT SUBMITTED TO

THE DEPARTMENT OF COMPUTER SCIENCE,

AHMADU BELLO UNIVERSITY, ZARIA – NIGERIA IN

PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE

AWARD OF THE DEGREE OF BACHELOR OF SCIENCE

(B. Sc. Hons.) IN COMPUTER SCIENCE

i
DECLARATION

I, ALO PETER TAIWO (U22DLCS10369) hereby declare that this SIWES Report has been
carried out by me under the supervision of (state the name of the supervisor). It has not been
presented for award of any degree in any institution. All sources of information are
specifically acknowledged by means of reference.

…..………………………. ………………………
Signature Date Date

ii
CERTIFICATION

This SIWES Report by Alo Peter Taiwo (U22DLCS10369) meets the requirements governing
the award of the degree of Bachelor of Science in Computer Science and is approved for its
contribution to knowledge and literary presentation.

..................................................... …………………….

Dr. Sahabi Ali Yusuf

SIWES Supervisor Date

..................................................... …………………….

Mr. ]

(Departmental SIWES Coordinator) Date

..................................................... …………………….

Prof M.I Sule

Centre Director Date

iii
DEDICATION

This work is dedicated to my esteemed family members, whose unwavering support and
inspiration have been a cornerstone throughout my academic journey. May God bless each
one of them abundantly. Amen.

iv
ACKNOWLEDGEMENT

I express my profound gratitude to the Almighty God for His benevolence and guidance,
which have enabled me to successfully complete this report. I extend my sincere thanks for
His unwavering provision and support throughout my academic journey.

I would like to acknowledge with appreciation the invaluable assistance and guidance
provided by my SIWES supervisor, Dr. Sahabi Ali Yusuf. His insightful suggestions,
constructive criticism, prompt attention, and kindness significantly contributed to the
successful completion of this work. I am truly grateful for his mentorship and expertise, and I
pray that God Almighty rewards him abundantly for his contributions.

I also extend my heartfelt thanks to my beloved sister, Eke Ruth, for her unwavering support
and encouragement. Her presence has been a source of inspiration, and I am grateful for her
constant encouragement.

In conclusion, I express my gratitude to all those who have played a role, directly or
indirectly, in the realization of this report. May God bless and reward each one abundantly.

v
ABSTRACT

This report encapsulates the insights garnered during my three-month participation in the
Students' Industrial Work Experience Scheme (SIWES) at Softwirelex Limited, with a
primary focus on Computer Networking. The document comprises four chapters, commencing
with the first chapter that provides an overview of SIWES and outlines the organizational
background. Chapters two and three delve into the detailed account of the work experience
acquired. Finally, chapter four encapsulates the summary, recommendations, and conclusions
drawn from the industrial attachment.

vi
TABLE OF CONTENTS

Contents

TITLE PAGE i

DECLARATION ii

CERTIFICATION iii

DEDICATION iv

ACKNOWLEDGMENT v

ABSTRACT vi

TABLE OF CONTENTS.............................. vii

CHAPTER ONE 1

INTRODUCTION 1

1.1 Background of ITF 1

1.2 History of SIWES 1

1.3 Objectives of SIWES 2

1.4 History of the Organization (Lenient Computer Technology Ltd.) 3

1.4.1 Mission of Softwirelex Limited 3

1.4.2 Vision of Softwirelex Limited 3

1.4.3 Objectives of Softwirelex Limited 3

1.4.4 Organizational Chart of Softwirelex Limited 4

CHAPTER TWO 5

WORK EXPERIENCE 5

vii
2.0 INTRODUCTION 5

2.1 Networking 5

2.1.1 Networking Criteria 5

2.2 Network topology 6

2.2.1 Star Topology 7

2.2.2 Bus Topology 8

2.2.3 Mesh topology 9

2.3 Transmission media 10

2.3.1 Guided media(Wired) 10

2.3.2 Twisted Pair cable 10

2.3.4 Coaxial cable 10

2.3.5 Fiber-optic cable 11

2.4 Unguided Media (Wireless 12

2.4.1 Radio Wave 12

2.4.2 Microwave 12

2.4.3 Infrared 13

2.5 Network equipment 13

2.5.1 Router 13

2.5.2 Switch 14

2.5.3 Antenna 14

2.5.4 Connector 15

2.5.5 Crimping Tool 15

viii
2.5.6 LAN cable Tester 16

2.6 OSI Model 16

2.6.1 Layer 1 17

2.6.2 Layer 2 17

2.6.3 Layer 3 18

2.6.4 Layer 4 18

2.6.5 18

2.6.6 Layer 6 18

2.6.7 Layer 7 19

2.7 IP Addressing 19

2.7.1 Functions of IP Addressing 19

2.7.2 Classes of IPv4 Addresses 19

2.7.3 Broadcast Address 20

2.8 Subnetting 20

2.8.1 Subnetting 20

2.8.1 Subnet Mask 20

2.8.2 Private IP Address Range 20

2.9 Client-Server vs. Peer-to-Peer Network 20

2.9.1 What is Client Server Network 21

2.9.2 Benefits of a Client Server Network 22

2.9.3 Limits of a Client Server Network 22

2.10 Peer to Peer Network 22

2.10.1 Benefits of Peer to Peer Network 24

2.10.2 Limits of a Peer to Peer Network. 24

2.10.3 Similarities between Client Server and Peer to peer Network 24

ix
2.11 Troubleshooting Skills 25

CHAPTER THREE

APPLICATION OF KNOWLEDGE ACQUIRED

3.0 Introduction 26

3.1 Networking Configuration and Maintenance 26

3.2 Troubleshooting Connectivity Issues 27

3.3 Implementation Security Measures 27

3.4 Understanding Network Topologies 27

3.5 Transmission media selection 27

CHAPTER FOUR

SUMMARY OF ATTACHMENT ACTIVITIES

4.1 Summary 28

4.2 Conclusion 28

4.3 Recommendation 28

REFERENCE 29

x
CHAPTER ONE

INTRODUCTION

1.1 Background of ITF

SIWES, initiated by ITF in 1973, aims to address the issue of Nigerian graduates lacking
practical skills essential for employment in industries. The program exposes tertiary institution
students to industry-specific skills, facilitating a smoother transition from academia to the
professional world. It provides hands-on experience with machinery and equipment not
readily available in educational institutions.

Participating in Industrial Training aligns with the educational strategy of integrating


classroom studies with practical work experiences relevant to the student's academic major
and career aspirations. Successful internships contribute to experiential learning, enhancing
career readiness and cultivating skills for leadership in chosen professions.

SIWES emphasizes the integration of leadership development into experiential learning.


Students are encouraged to learn non-profit leadership skills through mentorship with
innovative non-profit leaders. The goal is to motivate students to actively pursue non-profit
management as a professional career. However, the effectiveness of the SIWES experience
varies based on individual students, work assignments, and supervisor/mentor requirements. It
is crucial to include specific, written learning objectives in each internship position description
to ensure the incorporation of leadership skill development.

1.2 History of SIWES

SIWES, established in 1971 by decree 47, aims to encourage skill acquisition in both private
and public industries. Its importance in the education system is significant, fostering students'
skill development and professionalism in their respective fields. The scheme helps students
grasp the fundamental concepts related to their studies, bridging the gap between theory and
practical application by providing real industrial work experience.

1
In collaboration with university authorities and the industrial sector, SIWES runs for 24 weeks
during the fourth academic year for university students. The Federal Government organizes
the scheme, with joint coordination by the Industrial Training Fund (ITF) and the Nigeria
Universities Commission (NUC). The training scheme serves as a research field, allowing
students to gain in-depth insights into the working culture, practices, and tools specific to their
areas of specialization.

1.3 Objectives of SIWES

The objectives of SIWES include:

 Facilitating the acquisition of industrial skills and experience in their respective fields
of study for students in Nigerian Universities.
 Preparing students for the practical challenges they are likely to encounter in the
workplace upon graduation.
 Exposing students to various work methods and techniques, especially those related to
handling equipment and machinery not readily available in academic institutions.
 Facilitating a smooth transition from university education to the professional world,
enhancing students' networking opportunities for future job placements.
 Providing students with the chance to apply their theoretical knowledge gained in
school to real-life work situations, thereby bridging the gap between academic theory
and practical application.
 Encouraging and strengthening employers' involvement in the overall education
process, preparing university undergraduates for employment in the industry.
 Offering students the opportunity to apply their theoretical knowledge in actual work
scenarios, further narrowing the gap between university coursework and real-world
practices.
 Serving as a platform for self-actualization, enabling students to make positive and
commendable contributions within the scope of their knowledge

2
1.4 History of the Organization (Softwirelex Limited)

Softwirelex, founded in 2009, is a homegrown IT solutions company dedicated to delivering


sales and services featuring a diverse range of products. Specializing in catering to the needs
of small and medium-sized businesses in Nigeria, the company has established itself as a
reliable player in the IT industry. With a focus on indigenous solutions, Softwirelex has been
instrumental in providing cutting-edge technology services to its clientele. Over the years, the
company has consistently adapted to the evolving IT landscape, offering innovative solutions
tailored to meet the unique requirements of businesses in Nigeria. Softwirelex's commitment
to quality and customer satisfaction has solidified its position as a trusted partner in the local
IT sector. Since its inception, the company has played a pivotal role in enhancing the
technological capabilities of businesses, contributing to the growth and development of the
Nigerian business ecosystem.

1.4.1 Mission of Softwirelex Limited.

I. To deliver top-notch digital knowledge and networking solutions to customers, staying


abreast of the expansive and dynamic realm of ICT development.

II. To create employment opportunities that not only sustains our workers and their families
but also empower them to make a meaningful impact in the networking domain.

1.4.2 Objectives of Softwirelex Limited.

Softwirelex Limited is dedicated to achieving the following networking-centric goals:

 Serving as a central hub for management information related to networking.


 Developing in-house networking software solutions.
 Providing essential information for effective management decision-making in the
networking field.
 Offering technical advice on the utilization of networking technologies.
 Negotiating and managing a wide range of networking arrangements.

3
 Contributing to the technological and economic empowerment of learners in the
networking domain

1.4.3 Organizational Chart of Softwirelex Limited.

The Chief Executive Officer (CEO) serves as the leader, steering the overall direction and
vision of the IT firm. The Chief Technology Officer (CTO) oversees technological
development and strategy, ensuring alignment with organizational goals. The IT Manager is
responsible for the day-to-day operations, including software development oversight. The
Sales and Marketing Manager plays a crucial role in business development, crafting marketing
strategies, managing client relationships, and driving sales initiatives. Together, this
hierarchical structure ensures effective leadership, technological advancement, operational
efficiency, and sustained business growth for the IT firm.

Chief Executive Officer (C.E.O)

Chief Tech. Officer Chief Operating Officer (COO)

IT Support Manager Sales & Marketing Manager

Network & System Administrator Finance & Administration Manager

IT Support & Help Desk Quality Assurance (QA) Analyst

Figure 1.1: Organizational Chart of Softwirelex Limited

4
CHAPTER TWO

WORK EXPERIENCE

2.0 Introduction

During my three-month Industrial Training (IT) experience, my primary focus was on


networking. I delved into the complexities of managing and optimizing communication
infrastructures, gaining hands-on experience in various aspects of networking technologies.
Throughout this period, I honed my skills in configuring and maintaining network devices,
troubleshooting connectivity issues, and implementing security measures to ensure the
integrity and confidentiality of data.

2.1 Networking

A network is a set of devices (often referred to as nodes) connected by communication links.


A node can be a computer, printer, or any other device capable of sending and/or receiving
data generated by other nodes on the network. Computer network to mean a collection of
autonomous computers interconnected by a single technology. Two computers are said to be
interconnected if they are able to exchange information. The connection need not be via a
copper wire; fiber optics, microwaves, infrared, and communication satellites can also be
used. Networks come in many sizes, shapes and forms, as we will see later. They are usually
connected together to make larger networks, with the Internet being the most well-known
example of a network of networks. There is considerable confusion in the literature between a
computer network and a distributed system. The key distinction is that in a distributed system,
a collection of independent computers appears to its users as a single coherent system.
Usually, it has a single model or paradigm that it presents to the users. Often a layer of
software on top of the operating system, called middleware, is responsible for implementing
this model. A well-known example of a distributed system is the World Wide

2.1.1 Network Criteria

A network must be able to meet a certain number of criteria. The most important of these are
performance, reliability, and security. Performance; can be measured in many ways, including
transit time and response time. Transit time is the amount of time required for a message to

5
travel from one device to another. In addition to accuracy of delivery, network reliability is
measured by the frequency of failure, the time it takes a link to recover from a failure, and the
network's robustness in a catastrophe. Also, Network security issues include protecting data
from unauthorized access, protecting data from damage and development, and implementing
policies and procedures for recovery from breaches and data losses. This will in turn give rise
to the physical structures and some network attributes as shown in the figure below

Figure 2.1.1 Point to Point

Figure 2.2 Multipoint

2.2 Network Topology

Various topologies are common in networking, including mesh topology, star topology, bus
topology, ring topology, and others. Network topology refers to the arrangement of the
transmission medium and devices on a network, utilizing either a point-to-point or multipoint
connection scheme.

6
Connection schemes determine how devices are linked to a transmission media segment or
individual cable. Examples of point-to-point connection schemes include a modem/printer
connected to a computer or a direct cable connection between two computers. A multipoint
connection scheme is exemplified by a star or bus topology network.

2.2.1 Star Topology

A star network, star topology is one of the most common network setups. In this
configuration, every node connects to a central network device, like a hub, switch, or
computer. The central network device acts as a server and the peripheral devices act as clients.
Depending on the type of network card used in each computer of the star topology, a coaxial
cable or a RJ-45 network cable is used to connect computers together.

Figure 2.2.1 Star Topology

Advantages of star topology

I. Centralized management of the network, through the use of the central computer, hub,
or switch.
II. Easy to add another computer to the network.
III. If one computer on the network fails, the rest of the network continues to function
normally.
IV. The star topology is used in local-area networks (LANs), High-speed LANs often use
a star topology with a central hub.

Disadvantages of star topology


7
I. Can have a higher cost to implement, especially when using a switch or router as the
central network device. The central network device determines the performance and
number of nodes the network can handle. If the central computer, hub, or switch fails,
the entire network goes down and all computers are disconnected from the network

2.2.2 Bus Topology

In this LAN topology, each node connects to a single main bus cable, transmitting data to all
nodes on the network. Any break or fault in the cable segment disrupts communication for all
computers on that segment.

Figure 2.2.2 Bus Topology

Advantages of bus topology

I. It works well when you have a small network.


II. It's the easiest network topology for connecting computers or peripherals in a linear
fashion.
III. It requires less cable length than a star topology.

Disadvantages of bus topology

I. It can be difficult to identify the problems if the whole network goes down.
II. It can be hard to troubleshoot individual device issues.
III. Bus topology is not great for large networks.
IV. Terminators are required for both ends of the main cable.
V. Additional devices slow the network down.

8
VI. If a main cable is damaged, the network fails or splits into two.

2.2.3 Mesh Topology

This network topology features every node connected to every other node through separate
wires. It provides each device with a point-to-point connection to every other device, offering
high fault tolerance as the failure of one node doesn't impact data transmission between others.
The SOFTWIRELEX LIMITED adopts mesh topology.

Figure 2.2.3 Mesh Topology

Advantages of a mesh topology

I. Can handle high amounts of traffic, because multiple devices can transmit data
simultaneously.
II. A failure of one device does not cause a break in the network or transmission of data.
III. Adding additional devices does not disrupt data transmission between other devices.

Disadvantages of a mesh topology

I. The cost to implement is higher than other network topologies, making it a less
desirable option.
II. Building and maintaining the topology is difficult and time consuming.
III. The chance of redundant connections is high, which adds to the high costs and
potential for reduced efficiency.

2.3 Transmission Media


9
In transmission Media, it can be broadly defined as anything that can carry information from a
source to a destination.

Figure 2.3 Transmission media classes

2.3.1 Guided Media

These are those that provide a medium from one device to another, include twisted-
pair cable, coaxial cable, and fiber-optic cable.

2.3.2 Twisted-pair cable

These consists of two conductors (normally copper), each with its own plastic insulation,
twisted together. One of the wires is used to carry signals to the receiver, and the other is
used only as a ground reference.

Figure 2.3.2 Twisted Pair Cable

2.3.4 Coaxial cable

10
This carries signals of higher frequency ranges than those in twisted pair cable. coax has a
central core conductor of solid or stranded wire (usually copper) enclosed in an insulating
sheath, which is, in turn, encased in an outer conductor of metal foil, braid, or a
combination of the two.

Figure 2.3.4 Coaxial Cable

2.3.5 Fiber-optic cable

A fiber-optic cable is made of glass or plastic and transmits signals in the form of light.
Light travels in a straight line as long as it is moving through a single uniform substance.

Figure 2.3.5 Fiber Optic Cable

2.4 Unguided Media: Wireless

11
Unguided media transport electromagnetic waves without using a physical conductor. This
type of communication is often referred to as wireless communication. Radio Waves
microwaves and Infrared.

2.4.1 Radio Waves

Electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are normally called
radio waves. Radio waves are Omni directional. When an antenna transmits radio waves, they
are propagated in all directions. This means that the sending and receiving antennas do not
have to be aligned. A sending antenna sends waves that can be received by any receiving
antenna. The Omni directional property has a disadvantage, too. The radio waves transmit
ed by one antenna are susceptible to interference by another antenna that may send
signals using the same frequency or band.

Figure 2.4.1 Omni directional Antenna

2.4.2 Microwaves

Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves.
Microwaves are unidirectional. The sending and receiving antennas need to be aligned. The
unidirectional property has an obvious advantage. A pair of antennas can be aligned without
interfering with another pair of aligned antennas

12
Figure 2.4.2 Unidirectional Microwave Antenna

2.4.3 Infrared

Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770
nm), can be used for short-range communication. Infrared waves, having high frequencies,
cannot penetrate walls. This advantageous characteristic prevents interference between one
system and another; a shortrange communication system in one room cannot be affected by
another system in the next room. When we use our infrared remote control, we do not
interfere with the use of the remote by our neighbors. Infrared signals useless for long-range
communication. In addition, we cannot use infrared waves outside a building because the sun's
rays contain infrared waves that can interfere with the communication.

2.5 Network Equipment

Various network equipment’s includes router, switch, Antenna, crimping tool, LAN tester and
connectors. The below are been discussed.

2.5.1 Router

A router is a device that directs data packets between computer networks, creating an overlay
internetwork. It connects to two or more data lines from different networks, determining the
ultimate destination of a data packet based on address information and routing policies.

13
Figure 2.5.1 Router

2.5.2 Switch

A network switch is a device that connects network segments or devices, primarily serving for
extension.

Figure 2.5.2 Switch

2.5.3 Antenna

An antenna enhances signal strength and quality and is typically attached to other devices.
Antennas come in two types: Directional beams signal in one direction, while Omni-
directional beams signal in all directions.

14
Figure 2.5.3 Antenna

2.5.4 Connectors

The RJ-45 plug is a common 8P8C modular connector for pinning down wires in a twisted
pair cable.

Figure 2.5.4 RJ-45 Connector

2.5.5 Crimping Tool

A tool used to terminate category cables (CAT1-CAT6) with an RJ-45 connector and cut
cables to a desired length.

Figure 2.5.5 Crimping tool

15
2.5.6 LAN Cable Tester

This tool is used to check if a category cable has been properly terminated or has developed a
fault.

Figure 2.5.6 LAN Cable Tester

2.6 OSI Model

The OSI Model, which stands for Open Systems Interconnect model, outlines the essential
functions necessary for the effective operation of the Internet. The OSI model was created as a
set of seven layers, or levels, each of which houses different protocols within one of several
protocol suites, the most common of which is TCP/IP. The OSI model categorizes how
TCP/IP transactions occur. It is invaluable when it comes to installing, configuring,
maintaining, and, especially, troubleshooting networks

Figure 2.6 a basic illustration of the OSI model

16
Sometimes, a protocol suite such as TCP/IP is referred to as a protocol stack. The OSI model
shows how a protocol stack works on different levels of transmission (that is, how it stacks up
against the model). Because it is the most tangible, let’s start with the Physical layer. Later,
when you view the model, it will be from the seventh layer on top to the first layer on bottom.
As mentioned previously, a LAN requires computers with network adapters. These must be
connected in some way to facilitate the transfer of data. It is important to define how they are
connected, as well as how they transmit the data. The OSI model layers do just that. The
following list gives a brief description of each of the layers:

2.6.1 Layer 1

Physical layer: This is the physical and electrical medium for data transfer. It includes but is
not limited to cables, jacks, patch panels, punch blocks, hubs, and multi station access units
(MAUs). It is also known as the physical plant. Concepts related to the Physical layer include
topologies, analog versus digital/encoding, bit synchronization, baseband versus broadband,
multiplexing, and serial (5-volt logic) data transfer. If you can touch it, it is part of the
Physical layer, making this layer one of the easiest to understand. The unit of measurement
used on this layer is bits.

2.6.2 Layer 2
Data Link layer: This layer establishes, maintains, and decides how transfer is accomplished
over the Physical layer. Devices that exist on the DLL are network interface cards and bridges.
This layer also ensures error-free transmission over the Physical layer under LAN
transmissions. It does this through the use of physical addresses (the hexadecimal address that
is burned into the ROM of the NIC), otherwise known as the MAC address (to be discussed
more later in this lesson). Just about any device that makes a physical connection to the
network and can move data is on the Data Link layer. The unit of measurement used on this
layer is frames.

17
2.6.3 Layer 3

Network Layer: The Network layer is dedicated to routing and switching information between
different networks, LANs, or internetworks. This can be on the LAN or WAN (wide area
network). Devices that exist on the Network layer are routers and IP switches. Now we are
getting into the logical addressing of hosts. Instead of physical addresses, the addressing
system of the computer is stored in the operating system—for example, IP addresses

The unit of measurement used on this layer is packets.

2.6.4 Layer 4

Transport layer: This layer ensures error-free transmission between hosts through logical
addressing. Therefore, it manages the transmission of messages through Layers 1 through 3.
The protocols that are categorized by this layer break up messages, send them through the
subnet, and ensure correct reassembly at the receiving end, making sure there are no
duplicates or lost messages. This layer contains both connection-oriented and connectionless
systems, which are covered later in this lesson, in the Defining the Transport Layer section.
Inbound and outbound ports are controlled by this layer. When you think ports, think the
Transport layer. The unit of measurement used on this layer is sometimes referred to as
segments, or messages. All layers above this use the terms data and messages.

2.6.5 Layer 5

Session layer: This layer governs the establishment, termination, and synchronization of
sessions within the OS over the network and between hosts—for example, when you log on
and log off. It is the layer that controls the name and address database for the OS or NOS.
NetBIOS (Network Basic Input/output System) works on this layer.

2.6.6 Layer 6

Presentation layer: This layer translates the data format from sender to receiver in the various
operating systems that may be used. Concepts include code conversion, data compression, and
file encryption. Redirectors work on this layer, for example, mapped network drives that
enable a computer to access file shares on a remote computer.

18
2.6.7 Layer 7

Application layer: This is where messaging creation—and, therefore, packet creation begins.
DB access is on this level. End-user protocols, such as FTP, SMTP, Telnet, and RAS, work at
this layer. For example, suppose you are using Outlook Express. You type a message and
click Send. This initiates SMTP (Simple Mail Transfer Protocol) and other protocols, which
send the mail message down through the other layers, breaking it down into packets at the
Network layer and so on. This layer is not the application itself, but the protocols that are
initiated by this layer.

2.7 IP ADDRESSING

An IP address is a unique identifier assigned to a host on a network, allowing communication


between hosts on different networks. IPv4 and IPv6 are the two types, with IPv4 being the
most widely used, having 32 bits.

2.7.1 Functions of IP Addressing


 Location of a device on the network
 Allowing hosts on one network to communicate with hosts on another network
 IPv4 addresses are 32 bits, divided into four octets or bytes using dots.

2.7.2 Classes of IPv4 Addresses

 Class A (0-127): Valid addresses range from 1 to 12


 Class B (128-191)
 Class C (192-223)
 Class D (224-239) is used for multicasting
 Class E (240-255) for research purposes

19
2.7.3 Broadcast Address:

This address is used to send data to all hosts on a broadcast domain. When all host bits are set
to '1,' it becomes a broadcast address, with 255 reserved for sending broadcast messages.

2.8 Subnetting

Subnetting defines class boundaries by taking bits from the host portion of the IP address to
reserve them for defining the subnet address.

2.8.1 Subnet Mask

 Class A: 255.0.0.0
 Class B: 255.255.0.0
 Class C: 255.255.255.0

2.8.2 Private IP Address Ranges

 10.0.0.0 - 10.255.255.255 (16,777,216 addresses)


 172.16.0.0 - 172.31.255.255 (1,048,576 addresses)

2.9 Client-Server vs. Peer-to-Peer Networks

In the realm of network architecture, two prevalent terms are "client-server" and "peer-to-
peer." While both types of networks facilitate the connection of computers for resource
sharing, such as data files and applications, they operate distinctively. Continue reading to
delve into their unique features and differences.

20
2.9.1 What is Client-Server Network?

In a client–server network, there is at least one dedicated central server that controls the
network, and a number of clients connect to the server to carry out specific tasks. A client-
server network can have more than one central server, each performing a specific function.
Functions may include user access, data storage, internet connection management, and
network traffic monitoring, among others.

Figure 2.9.1 Client Server Network

Multiple clients connect to one central server. A client is a computer or computer-controlled


device that provides users with access to data on the remote server. Types of clients include
smartphones, desktop computers, and laptops.

This network architecture facilitates efficient communication and resource sharing between
the central server and connected clients, enabling seamless task execution and data access
across various devices.

21
2.9.2 Benefits of a Client-Server Network

The following list shows the key benefits of using a client-server network:

 Centralized Management:
 Scalability
 Enhanced Security

2.9.3 Limits of a Client-Server Network

Here are the limits of using a client-server model:

 Network Traffic Congestion


 High Cost:
 Technical Expertise Requirement:.
 Risk of Network Disruption:
 ..Maintenance Challenges:
 Limited Resource Accessibility:

2.10 Peer-to-Peer Network

Peer to Peer networks, also called workgroups were the first type of network to be used. In
this type of network there is no centralized management or security, and each computer is in
charge of its own local users and file and folder permissions. Since there is no centralized user
management, any user who wants access to resources on another computer will need to have
an account on that specific computer. So, if a user wants access to files on 10 different
computers then that user will need 10 separate user accounts.

22
Figure 2.10 Peer to Peer network work group

So, if Alo Peter is a user on Computer A and he wants to access files on Laptop A and
Computer C then an admin on Laptop A and Computer C will need to make a user account for
her and then assign the permissions she needs to be able to access those resources. You can
imagine how complicated this would get as the number of computers on the network grows.

When the number of computers in a peer to peer network starts to go past 10 then you can run
into problems such as slowdowns from network broadcasts and other traffic because all the
traffic goes to each computer even though only the computer that it was meant to go to will
accept the information. Plus many workgroup configured operating systems can only accept
10 concurrent connections at a time. So if you have a computer acting as a file server and 20
users then only 10 of them can connect to that file server at a time.

Peer to peer networks work fine for home networks or small office networks where there are
not a lot of users and computers to manage. But once you get to a certain limit, that is where
you need to implement something more such as a client-server network.

23
2.10.1 Benefits of a Peer to Peer Network

The following list shows the key benefits of using a peer-to-peer network:

 Streamlined file sharing


o Flexibility and scalability
 Cost-effective setup

2.10.2 Limits of a Peer-to-Peer Network

Here are the limits of using a peer-to-peer model:

 Lack of centralized control


 Increased Network Management Complexity
 Dependency on peer availability
 Security concerns
 Additional costs

2.10.2 Similarities between Client-Server and Peer-to-Peer Networks:

 Communications:
 Network Protocols:
 Network Connectivity:
 Application Support:
 Internet Integration
 Security Considerations:.
 Resource Sharing

24
2.11 TROUBLESHOOTING SKILLS

Troubleshooting involves finding and solving problems. When a client faces browsing or IP
phone call issues, the troubleshooting process includes checking the LAN cable using a LAN-
cable tester, inspecting face plates, verifying the patched panel and switches on the
distribution rack, and pinging the system's Ethernet port and server.

25
CHAPTER THREE

APPLICATION OF KNOWLEDGE ACQUIRED

3.0 Introduction:

During my three-month Industrial Training (IT) experience, I immersed myself in the intricate
world of networking, where I not only garnered theoretical knowledge but also acquired
invaluable hands-on experience in configuring, troubleshooting, and optimizing network
infrastructures. This report encapsulates my journey and highlights how the knowledge and
skills acquired during my SIWES experience can be applied in real-world networking
scenarios.

3.1 Networking Configuration and Maintenance: My experience in configuring and


maintaining network devices equips me to efficiently set up and manage network
infrastructures in real-world scenarios. Whether it's configuring routers, switches, or access
points, I ensure optimal performance and connectivity for seamless operations.

Figure 3.1 Performing Networking configurations

26
3.2 Troubleshooting Connectivity Issues: With my strong troubleshooting skills, I can
swiftly diagnose and resolve connectivity issues within the network. From identifying faulty
devices to diagnosing cable issues, I implement effective solutions to restore connectivity and
minimize downtime.

Figure 3.2 Troubleshooting connectivity issues

3.3 Implementing Security Measures: My understanding of network security principles


allows me to implement robust security measures to safeguard sensitive data and protect
against cyber threats. From access control policies to firewall configurations, I ensure the
integrity and confidentiality of data transmitted over the network.

3.4 Understanding Network Topologies: Leveraging my knowledge of different network


topologies, I design and implement network architectures tailored to specific requirements.
Whether it's deploying a scalable star topology or a fault-tolerant mesh topology, I consider
factors like scalability and resilience to optimize network performance.

3.5 Transmission Media Selection: Drawing upon my expertise in transmission media, I


select the most suitable media for transmitting data based on factors like bandwidth, distance,
and susceptibility to interference. Whether it's coaxial cables for reliable signal transmission
or fiber optic cables for high-speed connectivity, I ensure optimal transmission efficiency.

27
CHAPTER FOUR

SUMMARY OF ATTACHMENT ACTIVITIES

4.1 Summary

The benefits derived from this endeavor are profound; describing it as merely worthwhile
would be a significant understatement. Being granted another opportunity to delve into the
practical aspects of workplace dynamics beyond classroom teachings is an invaluable and
enriching experience.

Moreover, the exposure to practical tools, software, and hardware has fostered a deeper
comprehension of lessons taught in the classroom, paving the way for career development in
the field of networking.

4.2 Conclusion

The Student Industrial Work Experience Scheme (SIWES) plays a pivotal role in human
resource development, enabling students to acquire new skills and providing insights into the
realities of the post-graduation society. It serves as a crucial mechanism for students to adapt
and prepare for their future endeavors.

4.3 Recommendations

I propose the following recommendations:

I. Students should prioritize and demonstrate competency in their IT endeavors,


ensuring they are adequately monitored, taught, and disciplined.
II. The university should actively oversee the internship activities of its students at
their respective workplaces, as some students may struggle to focus on their
Industrial Training without proper supervision.
III. The ITF should provide substantial support to students, particularly those facing
financial challenges, to alleviate difficulties in covering their internship expenses,
despite some being financially stable.

28
REFERENCES

Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer Networks (5th ed.). New York, NY:
Pearson Education. Retrieved from
https://www.pearson.com/us/higher-education/program/Tanenbaum-Computer-Networks-5th-
Edition/PGM103423.html

Chinedu A, (2022). History of SIWES. Mountain Top University, Ogun State. NIGERIA

Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.).
Boston, MA: Pearson Education. Retrieved from https://www.pearson.com/us/higher-
education/program/Kurose-Computer-Networking-A-Top-Down-Approach-7th-Edition/
PGM113038.html

Peterson, L. L., & Davie, B. S. (2007). Computer Networks: A Systems Approach (5th ed.).
San Francisco, CA: Morgan Kaufmann Publishers. Retrieved from
https://www.elsevier.com/books/computer-networks/peterson/978-1-55860-833-1

Stallings, W. (2013). Data and Computer Communications (10th ed.). Upper Saddle River,
NJ: Pearson Education. Retrieved from
https://www.pearson.com/us/higher-education/program/Stallings-Data-and-Computer-
Communications-10th-Edition/PGM335049.html

Comer, D. E. (2014). Computer Networks and Internets (6th ed.). Upper Saddle River, NJ:
Pearson Education. Retrieved from
https://www.pearson.com/us/higher-education/program/Comer-Computer-Networks-and-
Internets-6th-Edition/PGM335093.html

Forouzan, B. A. (2016). Data Communications and Networking (5th ed.). New York, NY:
McGraw-Hill Education. Retrieved from
https://www.mheducation.com/highered/product/data-communications-networking-
forouzan/M9780073376226.html

29
30

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy