Top Banner

of 26

Complete IT Report

Jun 02, 2018

Download

Documents

Shukura Shuaib
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/11/2019 Complete IT Report

    1/26

  • 8/11/2019 Complete IT Report

    2/26

    2

    t is with an utmost sense of respect and gratitude that acknowledge the

    upholding hands of the Almighty! the ena"ling en#ironment sustained "y the

    crop of leaders with which the hardware and networking department of $egit

    Technologies $imited has "een "lessed! the moral and %nancial support of

    my parents! and the platform created "y the uni#ersity for me to ha#e this

    great e&perience.

    TABLE OF CONTENTS

  • 8/11/2019 Complete IT Report

    3/26

    '

    Dedication

    ......................................................

    ..................1

    Acknowlede!ent...."

    Ta#le o$

    content%

    ...&

    C'a(te)

    1((((((.............................................

    ......................*

    1.1O#+ecti,e% o$

    Siwe%...................................................................................................

    ..............*

    1.2-ele,ance o$

    Siwe%...................................................................................................

    .............*

    1.'Leit Tec'noloie%Li!ited................................................................................................

    ......

    C'a(te)

    "..............................................................................................................

    ......................./

    ".1 -e(ai)% and

    Maintenance............................................................................................

    .........../

    ".1.1 0a)dwa)e

    I%%e%......................................................................................................

    .........../

    ".1." So$twa)e

    I%%e%......................................................................................................

    ............2

  • 8/11/2019 Complete IT Report

    4/26

    )

    ".1.& T)o#le%'ootin And O(e)atin S3%te!

    In%tallation.14

    ".1.* So$twa)e

    In%tallation...............................................................................................

    .........1"

    "."Netwo)kin.................................1*

    ".".1 Cla%%i5cation% O$Netwo)k%.1

    "."." Netwo)k Media And0a)dwa)e.....1/

    ".".& Connecti,it3De,ice%.16

    ".".* Bene5t% O$Netwo)k.."1

    Concl%ion and-eco!!endation ..................................................................................""

    -eco!!endation .........................................................................................................."&

    A((endice%...................................................................................................................."*

    C0A7TE- ONE

    INT-OD8CTION

    This report is written to re*ect the work carried out during the course of my T

    +industrial training, with $E-T Technologies $imited. t also e&plains all the acti#ities

    done in the company with their respecti#e department. $egit deals mainly with the

  • 8/11/2019 Complete IT Report

    5/26

    in#estment and management of company software applications! system

    maintenance and network connecti#ity.

    1.1 OBJECTIVES OF SIWES

    I. To expose students to work methods and techniques in handling equipment that is not

    made available in institutions of higher learning.

    II. To introduce to students the working environment and conditions they are likely to face

    after graduation.

    III. To provide students with an opportunity to apply theory in real work situations.

    1." -ELE9ANCE OF SIWES No dou"t! really gained a lot of e&perience. t was my %rst e&perience in the

    Technology %eld %eld1. As already known! theories are "eing taught in school. This was an

    opportunity for me to really settle down and learn which made sure that all

    my time was dedicated to my duties.2. As a /omputer Engineering student! my industrial work e&perience in $egit

    has gi#en me an insight into the range of acti#ities true technology %elds.'. My commitment towards the 0o" ga#e me a "road and sound knowledge of

    the practical aspect.

    1.3 LEGIT TECHNOLOGIES LIMITED

    $E-T Technologies limited was started on 11thune 13.$egit Technology is

    focused on niche technology areas in software de#elopment! hardware and

    networking as well as consultancy ser#ices to #arious organizations in order to

    le#erage on the technical strength on the group of am"itious technical minds they

  • 8/11/2019 Complete IT Report

    6/26

    4

    ha#e. $egit pro#ides all ser#ices of information Technology! computer software AM/!

    internetworking! search engine optimization at competiti#e prices. They ha#e a

    client "ase of 15.

    The #ision of $E-T is to "e 6"ecome a centre of e&cellence in the %eld of design!

    communication and related areas emerging in areas of education! consultancy and

    the genera %eld of technology.

    O9E-9IEW OF SE-9ICES -ENDE-ED B: LEGIT TEC0NOLOGIES

    LIMITED.

    To coordinate the technological acti#ities within the organization and ser#e

    as 7uality check for the organizational acti#ities. Their key functions include8

    9e#eloping! re#iewing! updating! implementing and monitoring T

    :lans! policies! processes and standards for the company.

    Ensuring the professional skill de#elopment of the T community and

    the "uilding of a continuous learning T en#ironment

    Ensuring 7uality management and standards of T ;er#ices! products!

    initiati#es and support through determination and appropriate

    monitoring of ;er#ices and Operational $e#el Agreements "etween

    rele#ant parties e.g. #endors! ser#ice pro#iders! internal customers etc.

    Managing the procurement process for the T 9epartment.

    C0A7TE- TWO

    WO-K E;7E-IENCES

  • 8/11/2019 Complete IT Report

    7/26

    3

    worked under the industrial training +T, department of $E-T. This

    department was in#ol#ed ma0orly in the general routine check and maintenance of

    computer systems which entailed 0o" description of formatting! repair and

    installation of operating system and installation of de#ice dri#ers and software e.g.

    printer dri#er and Microsoft ohen talking a"out repairs and maintenance here! is the way we sol#e and

    handle system for sta?s in the organization.

    ".1.1 0A-DWA-E ISS8ES@ardware in computer means the physical de#ices or components that we

    can see and touch! these are the ma0or components found in a computer

    system8

    1. T'e 7owe) 7ack8 This is a stepdown #oltage regulator that is responsi"le

    for transferring current to the mother"oard of the computer and other

    hardware a#aila"le such as the hard disk and the 9B9COMs dri#es. 9amages

    occurring on this are ma0orly due to current *uctuation and in the e#ent of

    damage! repair can "e carried out "y replacing the transformers and

    capacitors! "ut replacement is ad#ised in most cases. f damaged! current will

    fail to get to the mother"oard there"y pre#enting the computer system from

    "ooting.

  • 8/11/2019 Complete IT Report

    8/26

  • 8/11/2019 Complete IT Report

    9/26

    owing to the fact that it is on "oard. n the e#ent of damage! replacement of the

    chip is carried out with the compati"le slot type.

    ig 2.'8 An AT display Adapter

    *. T'e 0a)d Di%k

  • 8/11/2019 Complete IT Report

    10/26

    15

    ig 2.8 :entium ) and Athlon '255F :rocessors

    The a"o#e "ulleted items are possi"le causes of system failure emanating from

    hardware issues

    2.1.2 SOFTWA-E ISS8ES

    ;ystem "oot failure could also result from #arious software issues. These are

    discussed "elow8

    1. 7'3%ical Me!o)3 D!(

  • 8/11/2019 Complete IT Report

    11/26

    11

    ig2.48 nterface of the ;ystemCestore ig2.38The dumping physical memory

    error

    Application Message

    &. Contino% -e#ootin= -e%ta)tin

  • 8/11/2019 Complete IT Report

    12/26

    12

    Kaspersky Internet Security, Norton Internet security, Bit Defender, Avast

    etc. . S(3wa)e Attackhen done! assign a user name.

    Ceturn the user=s %les #ia the "ackup.

    Jse the system informationto get the system mode+in order to aid

    search to download rele#ant dri#ers to make other components of the system

    work optimally such as the display dri#er! $AN dri#er! sound dri#er! modem

    dri#er etc. To ensure accuracy! the device mana$er under computer

    mana$ement can "e used to disco#er hardwares that ha#e no dri#er

    installed which is usually indicated with a yellow triangle with an e&clamation

    mark in it.

  • 8/11/2019 Complete IT Report

    13/26

    1'

    ig 2.158 The 6IO;G +Iasic nput and Output ;ettings, nterface

    ig 2.118 The 6Ioot ;e7uenceG Menu

    ig 2.128 The >indows H: ;etup page

    ig 2.1'8 ormatting in :rogress

    ".1.* SOFTWA-E INSTALLATION

  • 8/11/2019 Complete IT Report

    14/26

    1)

    had access to the installation and use of some "asic software in the oce "44? Site8 To meet up with the daytoday oinCAC '.4 nterface0! -e,o 8nin%talle)8 Jsed essentially for uninstalling programs or software=s.

    ts upper hand o#er the windows uninstaller is its a"ility to scan the system

    for lefto#er %les and search the registry for fragments and lefto#ers. t is also

    used to kill processes and include and e&clude processes from the auto run

    menu.

  • 8/11/2019 Complete IT Report

    15/26

    1

    ig 2.148 nterface of the CEBO Jninstaller

    1! -eco,e) M3 File%8 As the name goes! it is used to retrie#e lost %les. The

    spectacular thing a"out it is that it can still retrie#e data from a hard disk

    after it is formatted although its ina"ility to reco#er the lost %les with the

    original or default name make it a herculean task to identify the retrie#ed

    %les.2! Ne)o ?e ma0orly

    implored this software to make copies of operating system disc! create image

    %les of "oota"le media and "ackup %les on /9s and 9B9s.3! Fla%' Gete ma0orly made use of this

    tool in downloading software updates from the internet. Asides this! we also

    made use of this software to download de#ice dri#ers and e7uipment dri#ers

    such as printer dri#ers! scanner dri#ers etc. t has a ma0or ad#antage of

    pausing! resuming! and sa#ing downloads and also downloading torrent %les

    "." NETWO-KING

    Network is a way of connecting computers so that they can communicate!

    e&change information and pull resources. A computer network links two or more

    computers with a direct high speed connection. ;ometimes people think of a

    network as a single! local ca"ling system that ena"les any de#ices on the network

    to communicate directly with any other de#ices on the same network. A network "y

    his de%nition howe#er has no connections to other remote networks. An

    internetwork consists of multiple independent networks that are connected and can

    share remote resources. The de#ices that connect the independent network

    together may need a degree of 6intelligenceG "ecause it may need to determine

    when packets will stay on the local network or when they will "e forwarded to a

    remote network. A computer network! often simply referred to as a network! is a

  • 8/11/2019 Complete IT Report

    16/26

    14

    collection of computers and de#ices interconnected "y communications channels

    that facilitate communications and allows sharing of resources and information

    among interconnected de#ices.

    /omputer networks can "e used for a #ariety of purposes8

    Facilitatin co!!nication%

    Jsing a network! people can communicate e

  • 8/11/2019 Complete IT Report

    17/26

    13

    ".".1 CLASSIFICATIONS OF NETWO-KS

    9uring the course of my training! learnt a"out the #arious classes of networks.

    They include :ersonal Area Network +:AN,! $ocal Area Network +$AN,! /ampus Area

    Network +/AN,! Metropolitan Area Network +MAN,! >ide Area Network +>AN,! and

    -lo"al AreaNetwork +-AN,. The two most popular classes are the >AN and the

    $AN.s

    LAN Local A)ea Netwo)k

    A local area network connects network de#ices o#er a relati#ely short distance. The

    distance is usually "etween 15m L 1km. A networked oAN spans a large physical distance. The distance co#ered

    "y a >AN is usually "etween 155km L 1555km.it is a widely known that nternet is

    the largest >AN! which spans the Earth.

    A >AN is a geographicallydispersed collection of $ANs. The router connects $ANs to

    a >AN. Bi#id e&amples are the #arious ways in which most remote networks

    connect to their ;:s that is their nternet ;er#ice :ro#iders. n : networking! the

    router maintains "oth a $AN address and a >AN address. A >AN di?ers from a $AN

    in se#eral important ways. Most >ANs +like the nternet, are not owned "y any one

    organization "ut rather e&ist under collecti#e or distri"uted ownership and

    management. >ANs uses technologies like ATM! rame Celay and H.2 for

    connecti#ity o#er the longer distances.

    "."." NETWO-K MEDIA AND 0A-DWA-E

    n network communication media refers to the wire! ca"le! and other means

    "y which data tra#els from its source to its destination! the most common media

    for data communication are

  • 8/11/2019 Complete IT Report

    18/26

    1D

    Twisted pair ca"le

    /oa&ial ca"le

    i"eroptic ca"le

    >ireless links that include8 terrestrial microwa#e! satellite transmission! radio

    transmission etc

    Ca#le C)i!(lin

    This is "asically the act of making $AN ca"les for use on a network for %le and

    resource sharing and internet access.

    The $AN ca"le has eight color com"inations namely! stripped orange! orange!

    stripped green! green! stripped "lue! "lue! stripped "rown! "rown. The #arious

    com"inations of these colors gi#e di?erent types of ca"les such as the straight

    through ca"le! crosso#er ca"le and rollo#er or console ca"le. They are inserted into

    an C) connector.

    St)ai't T')o' Ca#leThis is used in connecting dissimilar e7uipments. Ma0orly! they are used

    when either connecting a switch to a :/ or connecting a router to a switch or

    :/ to :/. The color com"ination or coding of the straight through ca"le is

    listed "elow.:in 18 >hiteK orange :in 28 Orange :in '8 >hiteK green :in )8 Ilue :in 8

    >hiteK "lue :in 48 -reen :in 38 >hiteK "rown :in D8 IrownThis arrangement carried out on "oth sides of the $AN ca"le gi#es the

    straight through arrangement.

    ig 2.1D8 >iring /onnection of a straight through arrangement into C) prior

    to crimping

    C)o%%o,e) Ca#leThis connection type is achie#ed "y maintaining straight through

    arrangement on one end and swapping pins 1 and '! and pins 2 and 4 at the

    other end. The arrangement is shown "elow.:in 18 Orange :in 28 >hiteK orange :in '8 -reen :in )8 Ilue :in 8 >hiteK "lue

    :in 48 >hiteK green :in 38 >hiteK "rown :in D8 IrownThis is used when connecting a router to a router and a switch to a switch.

  • 8/11/2019 Complete IT Report

    19/26

    1

    ig 2.18 >iring /onnection of a /rosso#er arrangement into C) prior to

    crimping

    -ollo,e) Ca#les a type of nullmodemca"le that is most commonly used to connect a computer

    terminal to a routers consoleport. This ca"le is typically *at +and has a light "lue

    color, to help distinguish it from other types of network ca"ling. t gets the name

    rollo#er "ecause the pin outs on one end are re#ersed from the other! as if the wire

    had "een rolled o#er and you were #iewing it from the other side.

    ig 2.258 console ca"le

    ".".& CONNECTI9IT: DE9ICES

    >e need de#ices to connect the end user machines! printers etc. Cepeaters!

    @u"s! ;w itches! are commonly used in network s for connecti#ity. Each of these

    de#ices has uni7ue functionality.

    1. 08BS8 @u" can termed as 6multiport repeaterG or a 6wiring concentratorG! all nodes

    connected to a hu" are part of the same collision domainG! when a computer on any

    of the port transmits data! this is replicated and sent out to the other ports. @u"s

    and repeaters are "asically the same it=s common today in e#ery network. a

    hu""ed Ethernet network "eha#es like a shared medium! that is only one de#ice

    can successfully transmit at a time and each host remains responsi"le for collision

    detectection and retrasmmission Ethernet is family of frame"ased computer

    networking technologies for local area networks.

    ig 2.218 A 2) :ort 9$ink.

    ". SWITC08

    http://en.wikipedia.org/wiki/Null-modemhttp://en.wikipedia.org/wiki/System_consolehttp://en.wikipedia.org/wiki/Null-modemhttp://en.wikipedia.org/wiki/System_console
  • 8/11/2019 Complete IT Report

    20/26

    25

    The switch is layer 2 network de#ice. t "reaks collision domain this implies that

    e#ery port of a switch is a separate collision domain. The protocol data unit for the

    datalink layer is the frame. The switch is often regarded as an intelligent hu". t

    acts as a hu" when initially introduced to a network "y *ooding frames out of all its

    ports when trying to reach "ack an unknown host that is a host whose address

    cannot "e found in the MA/ address ta"le of the switch. A switch is "ased on

    Application ;peci%c ntegration /ircuit +A;/,. This is the memory of a switch.

    The switch is 0ust like a "ridge "ut it is hardware "ased while a "ridge is software

    "ased. A switch also operates on a 155m" full duple& unlike a hu" which operates

    on half duple&

    ig 2.228A /isco 245 )D :orts

    &. -O8TE-8 The router is a layer ' network de#ice and it is always located at the "oundary of

    e#ery network. t is a widely known that the router connects local Area Network to

    >ide Area Network. t is used to send T/:K: packets )rm one network to another.

    The packet is the protocol data unit +:9J, of layer '. The operation of a router

    includes learning the hosts attached to its ports and using the collated information

    to send packets to the #arious destinations of the hosts. The router is widely

    regarded as more intelligent than the switch since it "reaks "oth collision and

    "roadcast domain. Each port of a router is a separate "roadcast domain. There are

    "asically two types of routers. They are the wired and the wireless router. The wired

    router connects to the internet #ia a modem while a wireless router is smaller than

    a wired router. t also uses an encryption to disallow ea#esdroppers from accessing

    the network. The wireless "road"and router also can "e used to setup as %rewalls

    and 9@/: ser#ers. The "asic functions include packet %ltering and internetwork

    communication.

    ig 2.2'8 A /isco 3255 Couter

  • 8/11/2019 Complete IT Report

    21/26

    21

    A router is a computer! 0ust like any other computer including a :/ The #ery %rst

    router! used for the Ad#anced Cesearch :ro0ects Agency Network +A:ACNET,! was

    the interface Massage processor +M:,. The M: was a @oneywell '14 minicomputer

    this computer "rought the AC:ANET to life on August '5! 14. Couters ha#e many

    of the same hardware components that are found in other computers including8

    /:J CAM COM Operating ;ystem-O8TE-S A-E AT T0E NETWO-K CENTE-

    Couter connect multiple network

    t has multiple interfaces that each "elong to a di?erent : network

    t is responsi"le for forwarding packets! from networktonetwork $ANs and

    o#er >ANsThe router uses its routing ta"le to determine the "est path to forward the

    packet. >hen the router recei#es a packet! it e&amines its destination : addressand searches for the "est mach with a network address in the routerG routing

    ta"le. The routing ta"le also includes the interface to "e used to forward the

    packet. Once a march is found! the router encapsulates the : packet into the

    data link frame of the outgoing or e&it interface! and the packet is then

    forwarded towards its destination.

    $ike a :/! a router also includes8

    /entral :rocessing Jnit +/:J,

    CandomAccess Memory +CAM,

    CeadOnly Memory +COM,The /:J e&ecutes O; instructions! such as system initialization! routing function!

    and switching functions.

    CAM stores the instructions and data needed to e&ecute "y the /:J.

    COM is a form permanent storage.

    lash memory is non#olatile computer memory that can "e electrically stored

    and erased.

    ;lot for serial and Ethernet interfaces for network /onnecti#ity.

    /onsole port for con%guration of router i.e. OutIand management.

    -O8TE-S DETE-MINE T0E BEST 7AT0

    :rimary responsi"ility of a router is to direct packet destined for local and

    remote networks "y8- 9etermination the "est path to send packets! orwarding packets toward

    their destination

    ;tatic routing and dynamic routing protocols are use "y routers to learn a"out

    remote networks and "uild their routing ta"les. -O8TE- C78 MEMO-:

  • 8/11/2019 Complete IT Report

    22/26

    22

    Couter /omponent their unctions

    - /entral :rocessing Jnit +/:J,- CandomAccess Memory +CAM,- /ompact $A;@ Memory- ;lot for serial Ethernet nterfaces- AJH /onsole ports

    -ANDOM ACCESS MEMO-:

    Cam is used to store these components8- Operating system- Cunning /on%guration ile- : Couting Ta"le- AC: /ache- :acket Iu?er

    -OM FLAS0

    /isco de#ice use COM to store

    - The "ootstrap instructions- Iasic diagnostic software are- ;u"set of O;

    lash- Non#olatile computer memory- :ermanent storage for the operating system

    N9-AM

    Non#olatile CAM

    ;torage for startup con%guration %les +startupcon%g,.

    Cunningcon%g must "e copied to NBCAM +in case of a re"oot or power down,INTE-NETWO-K O7E-ATING S:STEM

    Operating system software used in /isco routers

    Manage the

    - @ardware and software resources of the router +including memory allocation!security! and %le systems,

    9i?erent O; depending on

    - Couter Model- eatures set +9E;!B:N!NAT

    . WI-ELESS ACESS7OINT$AN or two >$AN together.

    ig 2.2)8 >ireless Access :oint

    /.NETWO-K INTE-FACE CA-D=NETWO-K ADA7TE-

  • 8/11/2019 Complete IT Report

    23/26

    2'

    A printed circuits "oard that pro#ide network communication compati"ility to and

    fro computer. >e ha#e wireless and $AN card +C)or C11,.

    ig 2.28 Network adapter

    ".".* BENEFITS OF NETWO-K

    1. Allows simultaneous access to critical programs and data.2. Allows people to share peripheral de#ices such as printers! scanners e.t.c'. ;treamlines personal communication through emails.). Makes "ackup process easier.

    CONCL8SION AND -ECOMMENDATION

    CONCL8SION

    must confess that the aim and o"0ecti#es of the ;tudent ndustrial >ork E&perience

    ;cheme +;>E;, has "een duly achie#ed "y way of acti#e participation! which has

    "roadened my knowledge and e&posed me to the world of industry. >hile it lasted! ;>E;

    "ridged the gap "etween theory and practical. t has gi#en me a "etter understanding of my

    chosen career and truly appreciate it. The rules and regulations of the company were

    strictly adhered to during my stay. >hen 0oined $E-T as industrial training attachment! my

    0o" roles were ;ystem Analysis and Trou"leshooting! Network support and maintenance!

  • 8/11/2019 Complete IT Report

    24/26

    2)

    applications support and system security. >ork was closely managed which follows speci%c!

    outlined! and detailed procedures. >e also periodically recei#ed detailed instructions on

    routine work and new pro0ects from the super#isor.

    E;7E-IENCE GAINED

    learnt how to format a computer system.

    had se#eral trou"leshooting sessions on se#eral :/s.

    was in#ol#ed in crimpling ca"les! ma0orly straight through ca"les.

    got ac7uainted with se#eral hardware and software resources that were made

    a#aila"le "y the company such as switches! operating system discs. learnt how to share resources such as printers and user %les o#er the network.

    worked on a large num"er of :/s with issues ranging from software to hardware.

    learnt a"out #arious types of networks.

    installed #arious operating systems on #arious :/s.

    learnt how to install switches on the ser#er racks +)2u racks,.

    learnt how to make use of so many software applications which included Nero 3!

    Ceco#er my %les! >inCAC! Ce#o uninstaller! ado"e acro"at professional and lots

    more. e7ually learnt how to share resources o#er a wireless network.

    was in#ol#ed in the tracing of network ca"le paths during the ser#icing of some

    faulty lines. "ene%ted and learnt a lot from a seminar that was held on health and safety tips

    and management. learnt how to make use of the data e&ecution pre#ention to pre#ent damage from

    occurring on a :/ emanating from security threats. learnt how to use of physical memory to enhance the performance of systems.

    was ac7uainted with the system restore and safe mode en#ironments to undo

    harmful changes made to a :/ "efore attaining its critical or crucial state.

    -ECOMMENDATIONS

    The T should spread their tentacles and go educate se#eral companies! so

    as the essence of this attachment would "e incorporated into their system as

    most companies don=t know the rele#ance.

    9ue to the cosmopolitan nature of $agos! the tra

  • 8/11/2019 Complete IT Report

    25/26

    2

    A77ENDICESA((endi A

    S((o)tin 'a)dwa)e and %o$twa)e $o) !3 t)ainin%indows H: :rofessional Bersion 2552 ;:2

    /isco routers

    /isco switches

    Tool% and %o$twa)eindows H: :rofessional

    Qaspersky Anti#irus 9aemon tools

    nternet E&plorer 3 with ;:2

    Microsoft O

  • 8/11/2019 Complete IT Report

    26/26

    24

    Appendix B

    Training par!i"ipa!ed in d#ring !$e !raining peri%d&

    0%eM%0ealt' %a$et3 en,i)on!ent!anae!ent %c'e!e

    O#+ecti,e8 ;afety

    Ti!eline8 1 day

    Sco(e8 >e were taught on safety measures hazards at work and e#erywhere

    we %nd oursel#es.

    Ka))o Ce)ti5cateCi%co ce)ti5ed netwo)k a%%ociate CCNA

    O#+ecti,e8 certi%ed student

    Ti!eline8 4 months +weekends,

    Sco(e< taught Networking +N F,! con%guration and security.