Vous êtes sur la page 1sur 26

1

DEDICATION
This report is dedicated to the memory of my late father Engr. Nazir
Adekunle Owoyele.May his soul rest in peace.
ACKNOWLEDGEMENT
2
t is with an utmost sense of respect and gratitude that acknowledge the
upholding hands of the Almighty! the ena"ling en#ironment sustained "y the
crop of leaders with which the hardware and networking department of $egit
Technologies $imited has "een "lessed! the moral and %nancial support of
my parents! and the platform created "y the uni#ersity for me to ha#e this
great e&perience.
TABLE OF CONTENTS
'
Dedication
......................................................
..................1
Acknowlede!ent
...."
Ta#le o$
content%
...&
C'a(te)
1((((((.............................................
......................*
1.1O#+ecti,e% o$
Siwe%...................................................................................................
..............*
1.2 -ele,ance o$
Siwe%...................................................................................................
.............*
1.'Leit Tec'noloie%
Li!ited................................................................................................
.......
C'a(te)
"..............................................................................................................
......................./
".1 -e(ai)% and
Maintenance............................................................................................
.........../
".1.1 0a)dwa)e
I%%1e%......................................................................................................
.........../
".1." So$twa)e
I%%1e%......................................................................................................
............2
)
".1.& T)o1#le%'ootin And O(e)atin S3%te!
In%tallation.14
".1.* So$twa)e
In%tallation...............................................................................................
.........1"
"."
Netwo)kin.......
..........................1*
".".1 Cla%%i5cation% O$
Netwo)k%.1.
"."." Netwo)k Media And
0a)dwa)e.....1/
".".& Connecti,it3
De,ice%
.16
".".* Bene5t% O$
Netwo)k
.."1
Concl1%ion and
-eco!!endation ...........................................................................
.......""
-eco!!endation ...........................................................................
..............................."&
A((endice%.....................................................................................
..............................."*
C0A7TE- ONE
INT-OD8CTION
This report is written to re*ect the work carried out during the course of my T
+industrial training, with $E-T Technologies $imited. t also e&plains all the acti#ities
done in the company with their respecti#e department. $egit deals mainly with the
.
in#estment and management of company software applications! system
maintenance and network connecti#ity.
1.1 OBJECTIVES OF SIWES
I. To expose students to work methods and techniques in handling equipment that is not
made available in institutions of higher learning.
II. To introduce to students the working environment and conditions they are likely to face
after graduation.
III. To provide students with an opportunity to apply theory in real work situations.
1." -ELE9ANCE OF SIWES
No dou"t! really gained a lot of e&perience. t was my %rst e&perience in the
Technology %eld %eld
1. As already known! theories are "eing taught in school. This was an
opportunity for me to really settle down and learn which made sure that all
my time was dedicated to my duties.
2. As a /omputer Engineering student! my industrial work e&perience in $egit
has gi#en me an insight into the range of acti#ities true technology %elds.
'. My commitment towards the 0o" ga#e me a "road and sound knowledge of
the practical aspect.
1.3 LEGIT TECHNOLOGIES LIMITED
$E-T Technologies limited was started on 11
th
1une 1223.$egit Technology is
focused on niche technology areas in software de#elopment! hardware and
networking as well as consultancy ser#ices to #arious organizations in order to
le#erage on the technical strength on the group of am"itious technical minds they
4
ha#e. $egit pro#ides all ser#ices of information Technology! computer software AM/!
internetworking! search engine optimization at competiti#e prices. They ha#e a
client "ase of 1.5.
The #ision of $E-T is to "e 6"ecome a centre of e&cellence in the %eld of design!
communication and related areas emerging in areas of education! consultancy and
the genera %eld of technology.
O9E-9IEW OF SE-9ICES -ENDE-ED B: LEGIT TEC0NOLOGIES
LIMITED.
To coordinate the technological acti#ities within the organization and ser#e
as 7uality check for the organizational acti#ities. Their key functions include8
9e#eloping! re#iewing! updating! implementing and monitoring T
:lans! policies! processes and standards for the company.
Ensuring the professional skill de#elopment of the T community and
the "uilding of a continuous learning T en#ironment
Ensuring 7uality management and standards of T ;er#ices! products!
initiati#es and support through determination and appropriate
monitoring of ;er#ices and Operational $e#el Agreements "etween
rele#ant parties e.g. #endors! ser#ice pro#iders! internal customers etc.
Managing the procurement process for the T 9epartment.
C0A7TE- TWO
WO-K E;7E-IENCES
3
worked under the industrial training +T, department of $E-T. This
department was in#ol#ed ma0orly in the general routine check and maintenance of
computer systems which entailed 0o" description of formatting! repair and
installation of operating system and installation of de#ice dri#ers and software e.g.
printer dri#er and Microsoft o<ce. Asides all these are in#ol#ement in the ser#icing
of printers! general maintenance and performance check on scanners! switches!
routers! photocopiers and the network.
9uring my participation at the place! was in#ol#ed in the general repairs of
systems during which encountered a couple of challenges. This in#ol#ed calculated
adherence to some routine procedures. The "asic procedure was to %nd out the
fault of the system pre#enting it from coming up or "ooting. They could either "e
due to hardware or software issues. The items "elow are hardware=s on the
computer system that could cause system "oot failure8
".1 -E7AI-S AND MAINTENANCE
>hen talking a"out repairs and maintenance here! is the way we sol#e and
handle system for sta?s in the organization.
".1.1 0A-DWA-E ISS8ES
@ardware in computer means the physical de#ices or components that we
can see and touch! these are the ma0or components found in a computer
system8
1. T'e 7owe) 7ack8 This is a stepAdown #oltage regulator that is responsi"le
for transferring current to the mother"oard of the computer and other
hardware a#aila"le such as the hard disk and the 9B9ACOMs dri#es. 9amages
occurring on this are ma0orly due to current *uctuation and in the e#ent of
damage! repair can "e carried out "y replacing the transformers and
capacitors! "ut replacement is ad#ised in most cases. f damaged! current will
fail to get to the mother"oard there"y pre#enting the computer system from
"ooting.
D

Eig 2.58 A 9esktop power pack Eig 2.18 The nternal Biew of a desktop power
pack
". T'e )a!< The CAM +Candom Access Memory, is a chip on the computer
system which ser#es as a temporary storage space on a computer and a space for
running se#eral applications and programs on the computer. >ithout this simple
chip! a computer system will fail to "oot or e#en send a display message to the
monitor and this simple chip also plays a large role in enhancing the speed of
systems depending on the size usually #alued in giga"ytes. 9uring the CAM test!
the system will fail to "oot and this is usually accompanied with an alarm noise. This
malfunction may "e due to dust on the CAM slots which can "e easily corrected or
%&ed "y wiping o? the dust with a clean and a"sor"ent cloth. n most cases other
than this! the CAM chip is damaged and would need to "e replaced.
Eig 2.28 A 99C2 CAM /hip
&. T'e 9a o) Di%(la3 Ada(te)< This is another chip that in most cases
accompanies the mother"oard of a computer system. t is responsi"le to sending
display output from the system to the computer screen or monitor. Eor se#eral
reasons which can "e attri"uted ma0orly to dust and *uctuation of current! damage
might occur in the de#ice. n most cases! repair cannot "e carried out on this de#ice
2
owing to the fact that it is on "oard. n the e#ent of damage! replacement of the
chip is carried out with the compati"le slot type.
Eig 2.'8 An AT display Adapter
*. T'e 0a)d Di%k< The hard disk is a permanent storage de#ice situated in the
computer system. t is the information "ank of the system as e#ery program!
software! %les! documents and settings and e#en the operating system are sa#ed on
it. 9ue to improper shutdown and careless handling of the hard disk! damages
may"e incurred. At initial stages! the system may "egin to respond #ery slowly and
may start rendering "elow par performances "ut at the critical or ad#anced stage!
damage is fatal and immediate hard disk replacement would need to "e carried out.
Eig 2.)8 @arddisk
.. T'e 7)oce%%o)< The processor is the "rain of the computer. E#ery operational
task is processed here. ts capa"ility to run applications lays its fre7uency. 9uring its
operation! much heat is generated which is usually cooled with a fan placed on top
of the processor. A possi"le processor fan failure results to o#erheating of the
processor which will end up damaging the processor. f this occurs! it will cause a
system "oot failure.
15
Eig 2..8 :entium ) and Athlon '255F :rocessors
The a"o#e "ulleted items are possi"le causes of system failure emanating from
hardware issues
2.1.2 SOFTWA-E ISS8ES
;ystem "oot failure could also result from #arious software issues. These are
discussed "elow8
1. 7'3%ical Me!o)3 D1!(< This is a #irtual space a#aila"le on the hard disk
that is dedicated to optimizing the speed of the computer system. ;e#eral
issues that can lead to dumping of physical memory are discussed "elow8
Cunning incompati"le software on a particular operating system.
@a#ing too many software applications run at once.
nstalling more than one antiA#irus on a system.
nstalling an incompati"le de#ice dri#er on the computer system.
Cunning an application or program whose optimum performance
re7uires high memory con%guration on a system with a lower
con%guration.
The aftermath of all these is dumping of physical memory space on the hard
dri#e to pre#ent any hardware damage there"y causing the system to
shutdown with an accompanied error message indicating dumping of physical
memory which is always displayed in a "lue screen "ackground.
This can "e corrected "y undoing the change that lead to it or "y making use
of the 6system restoreG program to take the system "ack to an earlier time
when it worked well last.
11

Eig2.48 nterface of the ;ystem Cestore Eig2.38 The dumping physical memory
error
Application Message
&. Contin1o1% -e#ootin= -e%ta)tin< This is characterized with the system
restarting continuously upon startup. /ommon causes of this pro"lem are8
Missing or corrupt operating system %les.
nstallation of incompati"le software on the operating system.
mproper shutting down of the computer.
At the simple stage! this can "e corrected "y making use of the system
restore application "y accessing it from the safe mode from the
advanced boot options menu which can "e accessed "y hitting the
F8 key on the key"oard during system startup! while at the ad#anced
stage! a system repair using the operating system disc is carried out.

Eig 2.D8 The ad#anced "oot options menu Eig 2.28 >indows H: running in safe
mode
*. 9i)1% Attack< A #irus is a computer script or program than aims at altering the
settings of computer system. t is often targeted at damaging the integrity of stored
data. This is also a common cause system "oot failure at its ad#anced stage "ut at
the initial stage! this can "e re#erted with the use of antiA#irus software such as
12
Kaspersky Internet Security, Norton Internet security, Bit Defender, Avast
etc.
.. S(3wa)e Attack< This is also a software or program that is installed on a
system without the user=s consent that discloses user information and internet use
through an internet connection. Manipulations can also "e made on the system
through the sender to disrupt your operating system performance. This can "e well
taken care of with the use of antiAspyware software such as spyare doctor!
".1.& T-O8BLES0OOTING AND O7E-ATING S:STEM INSTALLATION
Asides all these checks that were carried out to ensure that the system is operating
normally! at #ery ad#anced points where the a"o#e pro?ered solutions may not "e
of use. Eormatting the system may "ecome ine#ita"le.
The following are steps taken to format the computer system.
Iackup the user=s %les usually located in c"#documents and settin$s "y
sla#ing the hard disk to another system. Slaving is just the process of
connecting another hard disk to a computer system in order to be able to
access useful information from it.
Ceturn the user=s hard disk to his original system.
;et the %rst boot device from the boot se&uence menu located in
the BI'S interface to (D)'*.
nsert an operating system disc +we mostly made use of windows xp, and get
into the setup interface.
Eollow the guidelines at the "ottom of the screen and select the format
option.
>hen done! assign a user name.
Ceturn the user=s %les #ia the "ackup.
Jse the system information to get the system mode+ in order to aid
search to download rele#ant dri#ers to make other components of the system
work optimally such as the display dri#er! $AN dri#er! sound dri#er! modem
dri#er etc.
To ensure accuracy! the device mana$er under computer
mana$ement can "e used to disco#er hardwares that ha#e no dri#er
installed which is usually indicated with a yellow triangle with an e&clamation
mark in it.
1'
Eig 2.158 The 6IO;G +Iasic nput and Output ;ettings, nterface
Eig 2.118 The 6Ioot ;e7uenceG Menu
Eig 2.128 The >indows H: ;etup page
Eig 2.1'8 Eormatting in :rogress
".1.* SOFTWA-E INSTALLATION
1)
had access to the installation and use of some "asic software in the o<ce
such as8
,! Mic)o%o$t O>ce "44? S1ite8 To meet up with the dayAtoAday o<ce needs
such as documentation of items! typing of spreadsheets! making presentation
on slides! sending mails! etc.
-! Ado#e Ac)o#at 7)o$e%%ional 28 Jsed "asically to #iew :9E +portab+e
document format, %les. t also has added ad#antages that gi#e it an upper
hand o#er adobe reader and other :9E #iewing software such as primo.
The added #alues it possesses lies in its a"ilities to con#ert any document to
:9E! merge multiple %les and :9Es into a single :9E %le! encrypt a :9E
document with password! set some restrictions on a document such as denial
of print! copy etc.
Eig 2.1)8 Ado"e Acro"at 2 :rofessional nterface
.! Win-A-8 This software is ma0orly optimized for handling compressed %les. ts
ma0or essence is its use in compressing %les and folders +shrinking their size
on a #olume to economize space, and also for #iewing compressed %les and
folders. t is also used in e&tracting compressed zip %les and installations to
target folders. ts ma0or %le e&tension names are ma0orly !/ip and !rar!
Eig 2.1.8 >inCAC '.4 nterface
0! -e,o 8nin%talle)8 Jsed essentially for uninstalling programs or software=s.
ts upper hand o#er the windows uninstaller is its a"ility to scan the system
for lefto#er %les and search the registry for fragments and lefto#ers. t is also
used to kill processes and include and e&clude processes from the auto run
menu.
1.
Eig 2.148 nterface of the CEBO Jninstaller
1! -eco,e) M3 File%8 As the name goes! it is used to retrie#e lost %les. The
spectacular thing a"out it is that it can still retrie#e data from a hard disk
after it is formatted although its ina"ility to reco#er the lost %les with the
original or default name make it a herculean task to identify the retrie#ed
%les.
2! Ne)o ?< This software performs many comple& functions. ts "asic function is
to "urn +writing %les to a disc, %les to a /9 K 9B9. ts other features are its
a"ility to create image %les! "urn image %les to disc! create audio /9s! and
make B/9s and 9B9s! play #ideo and audio %les and lots more. >e ma0orly
implored this software to make copies of operating system disc! create image
%les of "oota"le media and "ackup %les on /9s and 9B9s.
3! Fla%' Get< Elash get is a download manager. >e ma0orly made use of this
tool in downloading software updates from the internet. Asides this! we also
made use of this software to download de#ice dri#ers and e7uipment dri#ers
such as printer dri#ers! scanner dri#ers etc. t has a ma0or ad#antage of
pausing! resuming! and sa#ing downloads and also downloading torrent %les
"." NETWO-KING
Network is a way of connecting computers so that they can communicate!
e&change information and pull resources. A computer network links two or more
computers with a direct high speed connection. ;ometimes people think of a
network as a single! local ca"ling system that ena"les any de#ices on the network
to communicate directly with any other de#ices on the same network. A network "y
his de%nition howe#er has no connections to other remote networks. An
internetwork consists of multiple independent networks that are connected and can
share remote resources. The de#ices that connect the independent network
together may need a degree of 6intelligenceG "ecause it may need to determine
when packets will stay on the local network or when they will "e forwarded to a
remote network. A computer network! often simply referred to as a network! is a
14
collection of computers and de#ices interconnected "y communications channels
that facilitate communications and allows sharing of resources and information
among interconnected de#ices.
/omputer networks can "e used for a #ariety of purposes8
Facilitatin co!!1nication%
Jsing a network! people can communicate e<ciently and easily #ia email! instant
messaging! chat rooms! telephone! #ideo telephone calls! and #ideo conferencing.
S'a)in 'a)dwa)e
n a networked en#ironment! each computer on a network may access and use
hardware resources on the network! such as printing a document on a shared
network printer.
S'a)in 5le%@ data@ and in$o)!ation < n a network en#ironment! authorized
user may access data and information stored on other computers on the network.
The capa"ility of pro#iding access to data and information on shared storage
de#ices is an important feature of many networks.
Eig 2.138 Network Topology
NETWO-KALi#)a)3ALAN
13
".".1 CLASSIFICATIONS OF NETWO-KS
9uring the course of my training! learnt a"out the #arious classes of networks.
They include :ersonal Area Network +:AN,! $ocal Area Network +$AN,! /ampus Area
Network +/AN,! Metropolitan Area Network +MAN,! >ide Area Network +>AN,! and
-lo"al Area Network +-AN,. The two most popular classes are the >AN and the
$AN.s
LAN A Local A)ea Netwo)k
A local area network connects network de#ices o#er a relati#ely short distance. The
distance is usually "etween 15m L 1km. A networked o<ce "uilding! school! or
home usually contains a single $AN. n T/:K: networking! a $AN is often "ut not
always implemented as a single : su"net. n addition! $ANs are also owned!
controlled! and managed "y a single person or organization. The mode of
connecti#ity technologies used in a $AN includes Ethernet and Token Cing.
WAN A Wide A)ea Netwo)k
As the term implies! a >AN spans a large physical distance. The distance co#ered
"y a >AN is usually "etween 155km L 1555km.it is a widely known that nternet is
the largest >AN! which spans the Earth.
A >AN is a geographicallyAdispersed collection of $ANs. The router connects $ANs to
a >AN. Bi#id e&amples are the #arious ways in which most remote networks
connect to their ;:s that is their nternet ;er#ice :ro#iders. n : networking! the
router maintains "oth a $AN address and a >AN address. A >AN di?ers from a $AN
in se#eral important ways. Most >ANs +like the nternet, are not owned "y any one
organization "ut rather e&ist under collecti#e or distri"uted ownership and
management. >ANs uses technologies like ATM! Erame Celay and H.2. for
connecti#ity o#er the longer distances.
"."." NETWO-K MEDIA AND 0A-DWA-E
n network communication media refers to the wire! ca"le! and other means
"y which data tra#els from its source to its destination! the most common media
for data communication are
1D
Twisted pair ca"le
/oa&ial ca"le
Ei"erAoptic ca"le
>ireless links that include8 terrestrial microwa#e! satellite transmission! radio
transmission etc
Ca#le C)i!(lin
This is "asically the act of making $AN ca"les for use on a network for %le and
resource sharing and internet access.
The $AN ca"le has eight color com"inations namely! stripped orange! orange!
stripped green! green! stripped "lue! "lue! stripped "rown! "rown. The #arious
com"inations of these colors gi#e di?erent types of ca"les such as the straight
through ca"le! crosso#er ca"le and rollo#er or console ca"le. They are inserted into
an C1A). connector.
St)ai't T')o1' Ca#le
This is used in connecting dissimilar e7uipments. Ma0orly! they are used
when either connecting a switch to a :/ or connecting a router to a switch or
:/ to :/. The color com"ination or coding of the straight through ca"le is
listed "elow.
:in 18 >hiteK orange :in 28 Orange :in '8 >hiteK green :in )8 Ilue :in .8
>hiteK "lue :in 48 -reen :in 38 >hiteK "rown :in D8 Irown
This arrangement carried out on "oth sides of the $AN ca"le gi#es the
straight through arrangement.
Eig 2.1D8 >iring /onnection of a straight through arrangement into C1). prior
to crimping
C)o%%o,e) Ca#le
This connection type is achie#ed "y maintaining straight through
arrangement on one end and swapping pins 1 and '! and pins 2 and 4 at the
other end. The arrangement is shown "elow.
:in 18 Orange :in 28 >hiteK orange :in '8 -reen :in )8 Ilue :in .8 >hiteK "lue
:in 48 >hiteK green :in 38 >hiteK "rown :in D8 Irown
This is used when connecting a router to a router and a switch to a switch.
12
Eig 2.128 >iring /onnection of a /rosso#er arrangement into C1). prior to
crimping
-ollo,e) Ca#le
s a type of nullAmodem ca"le that is most commonly used to connect a computer
terminal to a routerMs console port. This ca"le is typically *at +and has a light "lue
color, to help distinguish it from other types of network ca"ling. t gets the name
rollo#er "ecause the pin outs on one end are re#ersed from the other! as if the wire
had "een rolled o#er and you were #iewing it from the other side.

Eig 2.258 console ca"le
".".& CONNECTI9IT: DE9ICES
>e need de#ices to connect the end user machines! printers etc. Cepeaters!
@u"s! ;w itches! are commonly used in network s for connecti#ity. Each of these
de#ices has uni7ue functionality.
1. 08BS8
@u" can termed as 6multiport repeaterG or a 6wiring concentratorG! all nodes
connected to a hu" are part of the same collision domainG! when a computer on any
of the port transmits data! this is replicated and sent out to the other ports. @u"s
and repeaters are "asically the sameN it=s common today in e#ery network. a
hu""ed Ethernet network "eha#es like a shared medium! that is only one de#ice
can successfully transmit at a time and each host remains responsi"le for collision
detectection and retrasmmission Ethernet is family of frameA"ased computer
networking technologies for local area networks.

Eig 2.218 A 2) :ort 9A$ink.
". SWITC08
25
The switch is layer 2 network de#ice. t "reaks collision domain this implies that
e#ery port of a switch is a separate collision domain. The protocol data unit for the
dataAlink layer is the frame. The switch is often regarded as an intelligent hu". t
acts as a hu" when initially introduced to a network "y *ooding frames out of all its
ports when trying to reach "ack an unknown host that is a host whose address
cannot "e found in the MA/ address ta"le of the switch. A switch is "ased on
Application ;peci%c ntegration /ircuit +A;/,. This is the memory of a switch.
The switch is 0ust like a "ridge "ut it is hardware "ased while a "ridge is software
"ased. A switch also operates on a 155m" full duple& unlike a hu" which operates
on half duple&
Eig 2.228 A /isco 2245 )D :orts
&. -O8TE-8
The router is a layer ' network de#ice and it is always located at the "oundary of
e#ery network. t is a widely known that the router connects local Area Network to
>ide Area Network. t is used to send T/:K: packets )rm one network to another.
The packet is the protocol data unit +:9J, of layer '. The operation of a router
includes learning the hosts attached to its ports and using the collated information
to send packets to the #arious destinations of the hosts. The router is widely
regarded as more intelligent than the switch since it "reaks "oth collision and
"roadcast domain. Each port of a router is a separate "roadcast domain. There are
"asically two types of routers. They are the wired and the wireless router. The wired
router connects to the internet #ia a modem while a wireless router is smaller than
a wired router. t also uses an encryption to disallow ea#esdroppers from accessing
the network. The wireless "road"and router also can "e used to setup as %rewalls
and 9@/: ser#ers. The "asic functions include packet %ltering and internetwork
communication.
Eig 2.2'8 A /isco 3255 Couter
21
A router is a computer! 0ust like any other computer including a :/ The #ery %rst
router! used for the Ad#anced Cesearch :ro0ects Agency Network +A:ACNET,! was
the interface Massage processor +M:,. The M: was a @oneywell '14 minicomputerN
this computer "rought the AC:ANET to life on August '5! 1242. Couters ha#e many
of the same hardware components that are found in other computers including8
/:J
CAM
COM
Operating ;ystem
-O8TE-S A-E AT T0E NETWO-K CENTE-
Couter connect multiple network
t has multiple interfaces that each "elong to a di?erent : network
t is responsi"le for forwarding packets! from networkAtoAnetwork $ANs and
o#er >ANs
The router uses its routing ta"le to determine the "est path to forward the
packet. >hen the router recei#es a packet! it e&amines its destination : address
and searches for the "est mach with a network address in the routerG routing
ta"le. The routing ta"le also includes the interface to "e used to forward the
packet. Once a march is found! the router encapsulates the : packet into the
data link frame of the outgoing or e&it interface! and the packet is then
forwarded towards its destination.
$ike a :/! a router also includes8
/entral :rocessing Jnit +/:J,
CandomAAccess Memory +CAM,
CeadAOnly Memory +COM,
The /:J e&ecutes O; instructions! such as system initialization! routing function!
and switching functions.
CAM stores the instructions and data needed to e&ecute "y the /:J.
COM is a form permanent storage.
Elash memory is non#olatile computer memory that can "e electrically stored
and erased.
;lot for serial and Ethernet interfaces for network /onnecti#ity.
/onsole port for con%guration of router i.e. OutAIand management.
-O8TE-S DETE-MINE T0E BEST 7AT0
:rimary responsi"ility of a router is to direct packet destined for local and
remote networks "y8
- 9etermination the "est path to send packets! Eorwarding packets toward
their destination
;tatic routing and dynamic routing protocols are use "y routers to learn a"out
remote networks and "uild their routing ta"les.
-O8TE- C78 MEMO-:
22
Couter /omponent their Eunctions
- /entral :rocessing Jnit +/:J,
- CandomAAccess Memory +CAM,
- /ompact E$A;@ Memory
- ;lot for serial Ethernet nterfaces
- AJH O /onsole ports
-ANDOM ACCESS MEMO-:
Cam is used to store these components8
- Operating system
- Cunning /on%guration Eile
- : Couting Ta"le
- AC: /ache
- :acket Iu?er
-OM B FLAS0
/isco de#ice use COM to store
- The "ootstrap instructions
- Iasic diagnostic software are
- ;u"set of O;
Elash
- Non#olatile computer memory
- :ermanent storage for the operating system
N9-AM
Non#olatile CAM
;torage for startup con%guration %les +startupAcon%g,.
CunningAcon%g must "e copied to NBCAM +in case of a re"oot or power down,
INTE-NETWO-K O7E-ATING S:STEM
Operating system software used in /isco routers
Manage the
- @ardware and software resources of the router +including memory allocation!
security! and %le systems,
9i?erent O; depending on
- Couter Model
- Eeatures set +9E;!B:N!NAT
.. WI-ELESS ACESS7OINT<
t is use to connect a $AN to >$AN or two >$AN together.
Eig 2.2)8 >ireless Access :oint
/. NETWO-K INTE-FACE CA-D=NETWO-K ADA7TE-<
2'
A printed circuits "oard that pro#ide network communication compati"ility to and
fro computer. >e ha#e wireless and $AN card +C1).or C111,.
Eig 2.2.8 Network adapter
".".* BENEFITS OF NETWO-K
1. Allows simultaneous access to critical programs and data.
2. Allows people to share peripheral de#ices such as printers! scanners e.t.c
'. ;treamlines personal communication through emails.
). Makes "ackup process easier.
CONCL8SION AND -ECOMMENDATION
CONCL8SION
must confess that the aim and o"0ecti#es of the ;tudent ndustrial >ork E&perience
;cheme +;>E;, has "een duly achie#ed "y way of acti#e participation! which has
"roadened my knowledge and e&posed me to the world of industry. >hile it lasted! ;>E;
"ridged the gap "etween theory and practical. t has gi#en me a "etter understanding of my
chosen career and truly appreciate it. The rules and regulations of the company were
strictly adhered to during my stay. >hen 0oined $E-T as industrial training attachment! my
0o" roles were ;ystem Analysis and Trou"leshooting! Network support and maintenance!
2)
applications support and system security. >ork was closely managed which follows speci%c!
outlined! and detailed procedures. >e also periodically recei#ed detailed instructions on
routine work and new pro0ects from the super#isor.
E;7E-IENCE GAINED
learnt how to format a computer system.
had se#eral trou"leshooting sessions on se#eral :/s.
was in#ol#ed in crimpling ca"les! ma0orly straight through ca"les.
got ac7uainted with se#eral hardware and software resources that were made
a#aila"le "y the company such as switches! operating system discs.
learnt how to share resources such as printers and user %les o#er the network.
worked on a large num"er of :/s with issues ranging from software to hardware.
learnt a"out #arious types of networks.
installed #arious operating systems on #arious :/s.
learnt how to install switches on the ser#er racks +)2u racks,.
learnt how to make use of so many software applications which included Nero 3!
Ceco#er my %les! >inCAC! Ce#o uninstaller! ado"e acro"at 2 professional and lots
more.
e7ually learnt how to share resources o#er a wireless network.
was in#ol#ed in the tracing of network ca"le paths during the ser#icing of some
faulty lines.
"ene%ted and learnt a lot from a seminar that was held on health and safety tips
and management.
learnt how to make use of the data e&ecution pre#ention to pre#ent damage from
occurring on a :/ emanating from security threats.
learnt how to use of physical memory to enhance the performance of systems.
was ac7uainted with the system restore and safe mode en#ironments to undo
harmful changes made to a :/ "efore attaining its critical or crucial state.
-ECOMMENDATIONS
The TE should spread their tentacles and go educate se#eral companies! so
as the essence of this attachment would "e incorporated into their system as
most companies don=t know the rele#ance.
9ue to the cosmopolitan nature of $agos! the tra<c is always congested
there"y causing hea#y holdAup. -o#ernment should construct new roads and
reha"ilitate the e&isting ones to ease the *ow of #ehicular mo#ement.
-o#ernment should pro#ide ade7uate security for the safety of sta?s and Ts.
2.
A77ENDICES
A((endiC A
S1((o)tin 'a)dwa)e and %o$twa)e $o) !3 t)ainin%<
0a)dwa)e
9esktop 9ell Opti:le& -H235
/:J8 ntelP :entiumP ) /:J 2.)5-@z
Operating ;ystem8 Microsoft >indows H: :rofessional Bersion 2552 ;:2
/isco routers
/isco switches
Tool% and %o$twa)e<
>indows H: :rofessional
Qaspersky Anti#irus
9aemon tools
nternet E&plorer 3 with ;:2
Microsoft O<ce 2553
Microsoft Notepad
24
Appendix B
Training par!i"ipa!ed in d#ring !$e !raining peri%d&
0%eAM%D0ealt' %a$et3 en,i)on!entA!anae!ent %c'e!eE
O#+ecti,e8 ;afety
Ti!eline8 1 day
Sco(e8 >e were taught on safety measures Ohazards at work and e#erywhere
we %nd oursel#es.
Ka))oC Ce)ti5cateDCi%co ce)ti5ed netwo)k a%%ociate CCNAE
O#+ecti,e8 certi%ed student
Ti!eline8 4 months +weekends,
Sco(e< taught Networking +N F,! con%guration and security.

Vous aimerez peut-être aussi