8/11/2019 Complete IT Report
1/26
8/11/2019 Complete IT Report
2/26
2
t is with an utmost sense of respect and gratitude that acknowledge the
upholding hands of the Almighty! the ena"ling en#ironment sustained "y the
crop of leaders with which the hardware and networking department of $egit
Technologies $imited has "een "lessed! the moral and %nancial support of
my parents! and the platform created "y the uni#ersity for me to ha#e this
great e&perience.
TABLE OF CONTENTS
8/11/2019 Complete IT Report
3/26
'
Dedication
......................................................
..................1
Acknowlede!ent...."
Ta#le o$
content%
...&
C'a(te)
1((((((.............................................
......................*
1.1O#+ecti,e% o$
Siwe%...................................................................................................
..............*
1.2-ele,ance o$
Siwe%...................................................................................................
.............*
1.'Leit Tec'noloie%Li!ited................................................................................................
......
C'a(te)
"..............................................................................................................
......................./
".1 -e(ai)% and
Maintenance............................................................................................
.........../
".1.1 0a)dwa)e
I%%e%......................................................................................................
.........../
".1." So$twa)e
I%%e%......................................................................................................
............2
8/11/2019 Complete IT Report
4/26
)
".1.& T)o#le%'ootin And O(e)atin S3%te!
In%tallation.14
".1.* So$twa)e
In%tallation...............................................................................................
.........1"
"."Netwo)kin.................................1*
".".1 Cla%%i5cation% O$Netwo)k%.1
"."." Netwo)k Media And0a)dwa)e.....1/
".".& Connecti,it3De,ice%.16
".".* Bene5t% O$Netwo)k.."1
Concl%ion and-eco!!endation ..................................................................................""
-eco!!endation .........................................................................................................."&
A((endice%...................................................................................................................."*
C0A7TE- ONE
INT-OD8CTION
This report is written to re*ect the work carried out during the course of my T
+industrial training, with $E-T Technologies $imited. t also e&plains all the acti#ities
done in the company with their respecti#e department. $egit deals mainly with the
8/11/2019 Complete IT Report
5/26
in#estment and management of company software applications! system
maintenance and network connecti#ity.
1.1 OBJECTIVES OF SIWES
I. To expose students to work methods and techniques in handling equipment that is not
made available in institutions of higher learning.
II. To introduce to students the working environment and conditions they are likely to face
after graduation.
III. To provide students with an opportunity to apply theory in real work situations.
1." -ELE9ANCE OF SIWES No dou"t! really gained a lot of e&perience. t was my %rst e&perience in the
Technology %eld %eld1. As already known! theories are "eing taught in school. This was an
opportunity for me to really settle down and learn which made sure that all
my time was dedicated to my duties.2. As a /omputer Engineering student! my industrial work e&perience in $egit
has gi#en me an insight into the range of acti#ities true technology %elds.'. My commitment towards the 0o" ga#e me a "road and sound knowledge of
the practical aspect.
1.3 LEGIT TECHNOLOGIES LIMITED
$E-T Technologies limited was started on 11thune 13.$egit Technology is
focused on niche technology areas in software de#elopment! hardware and
networking as well as consultancy ser#ices to #arious organizations in order to
le#erage on the technical strength on the group of am"itious technical minds they
8/11/2019 Complete IT Report
6/26
4
ha#e. $egit pro#ides all ser#ices of information Technology! computer software AM/!
internetworking! search engine optimization at competiti#e prices. They ha#e a
client "ase of 15.
The #ision of $E-T is to "e 6"ecome a centre of e&cellence in the %eld of design!
communication and related areas emerging in areas of education! consultancy and
the genera %eld of technology.
O9E-9IEW OF SE-9ICES -ENDE-ED B: LEGIT TEC0NOLOGIES
LIMITED.
To coordinate the technological acti#ities within the organization and ser#e
as 7uality check for the organizational acti#ities. Their key functions include8
9e#eloping! re#iewing! updating! implementing and monitoring T
:lans! policies! processes and standards for the company.
Ensuring the professional skill de#elopment of the T community and
the "uilding of a continuous learning T en#ironment
Ensuring 7uality management and standards of T ;er#ices! products!
initiati#es and support through determination and appropriate
monitoring of ;er#ices and Operational $e#el Agreements "etween
rele#ant parties e.g. #endors! ser#ice pro#iders! internal customers etc.
Managing the procurement process for the T 9epartment.
C0A7TE- TWO
WO-K E;7E-IENCES
8/11/2019 Complete IT Report
7/26
3
worked under the industrial training +T, department of $E-T. This
department was in#ol#ed ma0orly in the general routine check and maintenance of
computer systems which entailed 0o" description of formatting! repair and
installation of operating system and installation of de#ice dri#ers and software e.g.
printer dri#er and Microsoft ohen talking a"out repairs and maintenance here! is the way we sol#e and
handle system for sta?s in the organization.
".1.1 0A-DWA-E ISS8ES@ardware in computer means the physical de#ices or components that we
can see and touch! these are the ma0or components found in a computer
system8
1. T'e 7owe) 7ack8 This is a stepdown #oltage regulator that is responsi"le
for transferring current to the mother"oard of the computer and other
hardware a#aila"le such as the hard disk and the 9B9COMs dri#es. 9amages
occurring on this are ma0orly due to current *uctuation and in the e#ent of
damage! repair can "e carried out "y replacing the transformers and
capacitors! "ut replacement is ad#ised in most cases. f damaged! current will
fail to get to the mother"oard there"y pre#enting the computer system from
"ooting.
8/11/2019 Complete IT Report
8/26
8/11/2019 Complete IT Report
9/26
owing to the fact that it is on "oard. n the e#ent of damage! replacement of the
chip is carried out with the compati"le slot type.
ig 2.'8 An AT display Adapter
*. T'e 0a)d Di%k
8/11/2019 Complete IT Report
10/26
15
ig 2.8 :entium ) and Athlon '255F :rocessors
The a"o#e "ulleted items are possi"le causes of system failure emanating from
hardware issues
2.1.2 SOFTWA-E ISS8ES
;ystem "oot failure could also result from #arious software issues. These are
discussed "elow8
1. 7'3%ical Me!o)3 D!(
8/11/2019 Complete IT Report
11/26
11
ig2.48 nterface of the ;ystemCestore ig2.38The dumping physical memory
error
Application Message
&. Contino% -e#ootin= -e%ta)tin
8/11/2019 Complete IT Report
12/26
12
Kaspersky Internet Security, Norton Internet security, Bit Defender, Avast
etc. . S(3wa)e Attackhen done! assign a user name.
Ceturn the user=s %les #ia the "ackup.
Jse the system informationto get the system mode+in order to aid
search to download rele#ant dri#ers to make other components of the system
work optimally such as the display dri#er! $AN dri#er! sound dri#er! modem
dri#er etc. To ensure accuracy! the device mana$er under computer
mana$ement can "e used to disco#er hardwares that ha#e no dri#er
installed which is usually indicated with a yellow triangle with an e&clamation
mark in it.
8/11/2019 Complete IT Report
13/26
1'
ig 2.158 The 6IO;G +Iasic nput and Output ;ettings, nterface
ig 2.118 The 6Ioot ;e7uenceG Menu
ig 2.128 The >indows H: ;etup page
ig 2.1'8 ormatting in :rogress
".1.* SOFTWA-E INSTALLATION
8/11/2019 Complete IT Report
14/26
1)
had access to the installation and use of some "asic software in the oce "44? Site8 To meet up with the daytoday oinCAC '.4 nterface0! -e,o 8nin%talle)8 Jsed essentially for uninstalling programs or software=s.
ts upper hand o#er the windows uninstaller is its a"ility to scan the system
for lefto#er %les and search the registry for fragments and lefto#ers. t is also
used to kill processes and include and e&clude processes from the auto run
menu.
8/11/2019 Complete IT Report
15/26
1
ig 2.148 nterface of the CEBO Jninstaller
1! -eco,e) M3 File%8 As the name goes! it is used to retrie#e lost %les. The
spectacular thing a"out it is that it can still retrie#e data from a hard disk
after it is formatted although its ina"ility to reco#er the lost %les with the
original or default name make it a herculean task to identify the retrie#ed
%les.2! Ne)o ?e ma0orly
implored this software to make copies of operating system disc! create image
%les of "oota"le media and "ackup %les on /9s and 9B9s.3! Fla%' Gete ma0orly made use of this
tool in downloading software updates from the internet. Asides this! we also
made use of this software to download de#ice dri#ers and e7uipment dri#ers
such as printer dri#ers! scanner dri#ers etc. t has a ma0or ad#antage of
pausing! resuming! and sa#ing downloads and also downloading torrent %les
"." NETWO-KING
Network is a way of connecting computers so that they can communicate!
e&change information and pull resources. A computer network links two or more
computers with a direct high speed connection. ;ometimes people think of a
network as a single! local ca"ling system that ena"les any de#ices on the network
to communicate directly with any other de#ices on the same network. A network "y
his de%nition howe#er has no connections to other remote networks. An
internetwork consists of multiple independent networks that are connected and can
share remote resources. The de#ices that connect the independent network
together may need a degree of 6intelligenceG "ecause it may need to determine
when packets will stay on the local network or when they will "e forwarded to a
remote network. A computer network! often simply referred to as a network! is a
8/11/2019 Complete IT Report
16/26
14
collection of computers and de#ices interconnected "y communications channels
that facilitate communications and allows sharing of resources and information
among interconnected de#ices.
/omputer networks can "e used for a #ariety of purposes8
Facilitatin co!!nication%
Jsing a network! people can communicate e
8/11/2019 Complete IT Report
17/26
13
".".1 CLASSIFICATIONS OF NETWO-KS
9uring the course of my training! learnt a"out the #arious classes of networks.
They include :ersonal Area Network +:AN,! $ocal Area Network +$AN,! /ampus Area
Network +/AN,! Metropolitan Area Network +MAN,! >ide Area Network +>AN,! and
-lo"al AreaNetwork +-AN,. The two most popular classes are the >AN and the
$AN.s
LAN Local A)ea Netwo)k
A local area network connects network de#ices o#er a relati#ely short distance. The
distance is usually "etween 15m L 1km. A networked oAN spans a large physical distance. The distance co#ered
"y a >AN is usually "etween 155km L 1555km.it is a widely known that nternet is
the largest >AN! which spans the Earth.
A >AN is a geographicallydispersed collection of $ANs. The router connects $ANs to
a >AN. Bi#id e&les are the #arious ways in which most remote networks
connect to their ;:s that is their nternet ;er#ice :ro#iders. n : networking! the
router maintains "oth a $AN address and a >AN address. A >AN di?ers from a $AN
in se#eral important ways. Most >ANs +like the nternet, are not owned "y any one
organization "ut rather e&ist under collecti#e or distri"uted ownership and
management. >ANs uses technologies like ATM! rame Celay and H.2 for
connecti#ity o#er the longer distances.
"."." NETWO-K MEDIA AND 0A-DWA-E
n network communication media refers to the wire! ca"le! and other means
"y which data tra#els from its source to its destination! the most common media
for data communication are
8/11/2019 Complete IT Report
18/26
1D
Twisted pair ca"le
/oa&ial ca"le
i"eroptic ca"le
>ireless links that include8 terrestrial microwa#e! satellite transmission! radio
transmission etc
Ca#le C)i!(lin
This is "asically the act of making $AN ca"les for use on a network for %le and
resource sharing and internet access.
The $AN ca"le has eight color com"inations namely! stripped orange! orange!
stripped green! green! stripped "lue! "lue! stripped "rown! "rown. The #arious
com"inations of these colors gi#e di?erent types of ca"les such as the straight
through ca"le! crosso#er ca"le and rollo#er or console ca"le. They are inserted into
an C) connector.
St)ai't T')o' Ca#leThis is used in connecting dissimilar e7uipments. Ma0orly! they are used
when either connecting a switch to a :/ or connecting a router to a switch or
:/ to :/. The color com"ination or coding of the straight through ca"le is
listed "elow.:in 18 >hiteK orange :in 28 Orange :in '8 >hiteK green :in )8 Ilue :in 8
>hiteK "lue :in 48 -reen :in 38 >hiteK "rown :in D8 IrownThis arrangement carried out on "oth sides of the $AN ca"le gi#es the
straight through arrangement.
ig 2.1D8 >iring /onnection of a straight through arrangement into C) prior
to crimping
C)o%%o,e) Ca#leThis connection type is achie#ed "y maintaining straight through
arrangement on one end and swapping pins 1 and '! and pins 2 and 4 at the
other end. The arrangement is shown "elow.:in 18 Orange :in 28 >hiteK orange :in '8 -reen :in )8 Ilue :in 8 >hiteK "lue
:in 48 >hiteK green :in 38 >hiteK "rown :in D8 IrownThis is used when connecting a router to a router and a switch to a switch.
8/11/2019 Complete IT Report
19/26
1
ig 2.18 >iring /onnection of a /rosso#er arrangement into C) prior to
crimping
-ollo,e) Ca#les a type of nullmodemca"le that is most commonly used to connect a computer
terminal to a routers consoleport. This ca"le is typically *at +and has a light "lue
color, to help distinguish it from other types of network ca"ling. t gets the name
rollo#er "ecause the pin outs on one end are re#ersed from the other! as if the wire
had "een rolled o#er and you were #iewing it from the other side.
ig 2.258 console ca"le
".".& CONNECTI9IT: DE9ICES
>e need de#ices to connect the end user machines! printers etc. Cepeaters!
@u"s! ;w itches! are commonly used in network s for connecti#ity. Each of these
de#ices has uni7ue functionality.
1. 08BS8 @u" can termed as 6multiport repeaterG or a 6wiring concentratorG! all nodes
connected to a hu" are part of the same collision domainG! when a computer on any
of the port transmits data! this is replicated and sent out to the other ports. @u"s
and repeaters are "asically the same it=s common today in e#ery network. a
hu""ed Ethernet network "eha#es like a shared medium! that is only one de#ice
can successfully transmit at a time and each host remains responsi"le for collision
detectection and retrasmmission Ethernet is family of frame"ased computer
networking technologies for local area networks.
ig 2.218 A 2) :ort 9$ink.
". SWITC08
http://en.wikipedia.org/wiki/Null-modemhttp://en.wikipedia.org/wiki/System_consolehttp://en.wikipedia.org/wiki/Null-modemhttp://en.wikipedia.org/wiki/System_console8/11/2019 Complete IT Report
20/26
25
The switch is layer 2 network de#ice. t "reaks collision domain this implies that
e#ery port of a switch is a separate collision domain. The protocol data unit for the
datalink layer is the frame. The switch is often regarded as an intelligent hu". t
acts as a hu" when initially introduced to a network "y *ooding frames out of all its
ports when trying to reach "ack an unknown host that is a host whose address
cannot "e found in the MA/ address ta"le of the switch. A switch is "ased on
Application ;peci%c ntegration /ircuit +A;/,. This is the memory of a switch.
The switch is 0ust like a "ridge "ut it is hardware "ased while a "ridge is software
"ased. A switch also operates on a 155m" full duple& unlike a hu" which operates
on half duple&
ig 2.228A /isco 245 )D :orts
&. -O8TE-8 The router is a layer ' network de#ice and it is always located at the "oundary of
e#ery network. t is a widely known that the router connects local Area Network to
>ide Area Network. t is used to send T/:K: packets )rm one network to another.
The packet is the protocol data unit +:9J, of layer '. The operation of a router
includes learning the hosts attached to its ports and using the collated information
to send packets to the #arious destinations of the hosts. The router is widely
regarded as more intelligent than the switch since it "reaks "oth collision and
"roadcast domain. Each port of a router is a separate "roadcast domain. There are
"asically two types of routers. They are the wired and the wireless router. The wired
router connects to the internet #ia a modem while a wireless router is smaller than
a wired router. t also uses an encryption to disallow ea#esdroppers from accessing
the network. The wireless "road"and router also can "e used to setup as %rewalls
and 9@/: ser#ers. The "asic functions include packet %ltering and internetwork
communication.
ig 2.2'8 A /isco 3255 Couter
8/11/2019 Complete IT Report
21/26
21
A router is a computer! 0ust like any other computer including a :/ The #ery %rst
router! used for the Ad#anced Cesearch :ro0ects Agency Network +A:ACNET,! was
the interface Massage processor +M:,. The M: was a @oneywell '14 minicomputer
this computer "rought the AC:ANET to life on August '5! 14. Couters ha#e many
of the same hardware components that are found in other computers including8
/:J CAM COM Operating ;ystem-O8TE-S A-E AT T0E NETWO-K CENTE-
Couter connect multiple network
t has multiple interfaces that each "elong to a di?erent : network
t is responsi"le for forwarding packets! from networktonetwork $ANs and
o#er >ANsThe router uses its routing ta"le to determine the "est path to forward the
packet. >hen the router recei#es a packet! it e&amines its destination : addressand searches for the "est mach with a network address in the routerG routing
ta"le. The routing ta"le also includes the interface to "e used to forward the
packet. Once a march is found! the router encapsulates the : packet into the
data link frame of the outgoing or e&it interface! and the packet is then
forwarded towards its destination.
$ike a :/! a router also includes8
/entral :rocessing Jnit +/:J,
CandomAccess Memory +CAM,
CeadOnly Memory +COM,The /:J e&ecutes O; instructions! such as system initialization! routing function!
and switching functions.
CAM stores the instructions and data needed to e&ecute "y the /:J.
COM is a form permanent storage.
lash memory is non#olatile computer memory that can "e electrically stored
and erased.
;lot for serial and Ethernet interfaces for network /onnecti#ity.
/onsole port for con%guration of router i.e. OutIand management.
-O8TE-S DETE-MINE T0E BEST 7AT0
:rimary responsi"ility of a router is to direct packet destined for local and
remote networks "y8- 9etermination the "est path to send packets! orwarding packets toward
their destination
;tatic routing and dynamic routing protocols are use "y routers to learn a"out
remote networks and "uild their routing ta"les. -O8TE- C78 MEMO-:
8/11/2019 Complete IT Report
22/26
22
Couter /omponent their unctions
- /entral :rocessing Jnit +/:J,- CandomAccess Memory +CAM,- /ompact $A;@ Memory- ;lot for serial Ethernet nterfaces- AJH /onsole ports
-ANDOM ACCESS MEMO-:
Cam is used to store these components8- Operating system- Cunning /on%guration ile- : Couting Ta"le- AC: /ache- :acket Iu?er
-OM FLAS0
/isco de#ice use COM to store
- The "ootstrap instructions- Iasic diagnostic software are- ;u"set of O;
lash- Non#olatile computer memory- :ermanent storage for the operating system
N9-AM
Non#olatile CAM
;torage for startup con%guration %les +startupcon%g,.
Cunningcon%g must "e copied to NBCAM +in case of a re"oot or power down,INTE-NETWO-K O7E-ATING S:STEM
Operating system software used in /isco routers
Manage the
- @ardware and software resources of the router +including memory allocation!security! and %le systems,
9i?erent O; depending on
- Couter Model- eatures set +9E;!B:N!NAT
. WI-ELESS ACESS7OINT$AN or two >$AN together.
ig 2.2)8 >ireless Access :oint
/.NETWO-K INTE-FACE CA-D=NETWO-K ADA7TE-
8/11/2019 Complete IT Report
23/26
2'
A printed circuits "oard that pro#ide network communication compati"ility to and
fro computer. >e ha#e wireless and $AN card +C)or C11,.
ig 2.28 Network adapter
".".* BENEFITS OF NETWO-K
1. Allows simultaneous access to critical programs and data.2. Allows people to share peripheral de#ices such as printers! scanners e.t.c'. ;treamlines personal communication through emails.). Makes "ackup process easier.
CONCL8SION AND -ECOMMENDATION
CONCL8SION
must confess that the aim and o"0ecti#es of the ;tudent ndustrial >ork E&perience
;cheme +;>E;, has "een duly achie#ed "y way of acti#e participation! which has
"roadened my knowledge and e&posed me to the world of industry. >hile it lasted! ;>E;
"ridged the gap "etween theory and practical. t has gi#en me a "etter understanding of my
chosen career and truly appreciate it. The rules and regulations of the company were
strictly adhered to during my stay. >hen 0oined $E-T as industrial training attachment! my
0o" roles were ;ystem Analysis and Trou"leshooting! Network support and maintenance!
8/11/2019 Complete IT Report
24/26
2)
applications support and system security. >ork was closely managed which follows speci%c!
outlined! and detailed procedures. >e also periodically recei#ed detailed instructions on
routine work and new pro0ects from the super#isor.
E;7E-IENCE GAINED
learnt how to format a computer system.
had se#eral trou"leshooting sessions on se#eral :/s.
was in#ol#ed in crimpling ca"les! ma0orly straight through ca"les.
got ac7uainted with se#eral hardware and software resources that were made
a#aila"le "y the company such as switches! operating system discs. learnt how to share resources such as printers and user %les o#er the network.
worked on a large num"er of :/s with issues ranging from software to hardware.
learnt a"out #arious types of networks.
installed #arious operating systems on #arious :/s.
learnt how to install switches on the ser#er racks +)2u racks,.
learnt how to make use of so many software applications which included Nero 3!
Ceco#er my %les! >inCAC! Ce#o uninstaller! ado"e acro"at professional and lots
more. e7ually learnt how to share resources o#er a wireless network.
was in#ol#ed in the tracing of network ca"le paths during the ser#icing of some
faulty lines. "ene%ted and learnt a lot from a seminar that was held on health and safety tips
and management. learnt how to make use of the data e&ecution pre#ention to pre#ent damage from
occurring on a :/ emanating from security threats. learnt how to use of physical memory to enhance the performance of systems.
was ac7uainted with the system restore and safe mode en#ironments to undo
harmful changes made to a :/ "efore attaining its critical or crucial state.
-ECOMMENDATIONS
The T should spread their tentacles and go educate se#eral companies! so
as the essence of this attachment would "e incorporated into their system as
most companies don=t know the rele#ance.
9ue to the cosmopolitan nature of $agos! the tra
8/11/2019 Complete IT Report
25/26
2
A77ENDICESA((endi A
S((o)tin 'a)dwa)e and %o$twa)e $o) !3 t)ainin%indows H: :rofessional Bersion 2552 ;:2
/isco routers
/isco switches
Tool% and %o$twa)eindows H: :rofessional
Qaspersky Anti#irus 9aemon tools
nternet E&plorer 3 with ;:2
Microsoft O
8/11/2019 Complete IT Report
26/26
24
Appendix B
Training par!i"ipa!ed in d#ring !$e !raining peri%d&
0%eM%0ealt' %a$et3 en,i)on!ent!anae!ent %c'e!e
O#+ecti,e8 ;afety
Ti!eline8 1 day
Sco(e8 >e were taught on safety measures hazards at work and e#erywhere
we %nd oursel#es.
Ka))o Ce)ti5cateCi%co ce)ti5ed netwo)k a%%ociate CCNA
O#+ecti,e8 certi%ed student
Ti!eline8 4 months +weekends,
Sco(e< taught Networking +N F,! con%guration and security.