Professional Documents
Culture Documents
BY
UG15/SCCS/1062
HELD AT
INDUSTRIAL TRAINING.
MARCH, 2019
i
DECLARATION
I hereby declared that this work/experience is the product of my Industrial training effort,
undertaken under the supervision of Malam Adamu Husaini and has not been presented and
will not be presented elsewhere for the fulfillment of my Industrial Training requirement.
i
CERTIFICATION/APPROVAL
This is to certify that the report was carried out under my supervision.
ii
DEDICATION
This report is dedicated to the Almighty Allah for the strength and opportunity, my entire family
iii
ACKNOWLEDGEMENT
All Praise be to Allah the lord of the world, is with His favour, blessings and countless bounties
upon us, that have spared my life from the beginning and to the end of my industrial training and
may peace and blessing of Allah be upon my beloved noble prophet Muhammad (S.A.W),
With a deep sense of appreciation, respect and gratitude, I want to say a big thank you to the
Gombe State University SIWES Director for his relentless support toward the SIWES. I also like
departmental based Supervisor Malam Adamu Husaini for their intellectual support, Institution
based supervisor Dr. Nsir Charles. A of Biological sciences, Mr. Shola Oshilaja Managing
Director NIIT Abuja, Mrs. Evans Amaka Ibezimako Center Head NIIT Abuja, Mr. Abel Bitrus my
industrial based supervisor and all NIIT staffs that have made my stay a fruitful one.
Nobody has been more important to me during my industrial training than my family members.
I would like to thank my parents, whose love and guidance are with me in whatever I pursue.
iv
TABLE OF CONTENTS
DECLARATION ........................................................................................................................... i
CERTIFICATION/APPROVAL ................................................................................................... ii
DEDICATION ............................................................................................................................ iii
ACKNOWLEDGEMENT ............................................................................................................ iv
TABLE OF CONTENTS ............................................................................................................. v
LIST OF TABLES ..................................................................................................................... viii
LIST OF FIGURES .................................................................................................................... ix
LIST OF ABBREVIATIONS ........................................................................................................ x
CHAPTER ONE ......................................................................................................................... 1
INTRODUCTION .................................................................................................................... 1
1.0 INTRODUCTION TO SIWES ............................................................................................ 1
1.1 AIM AND OBJECTIVES OF SIWES ............................................................................. 2
1.2 BRIEF HISTORY OF MY INDUSTRIAL TRAINING PLACE ............................................. 3
1.2.1 ORGANIZATIONAL CHART OF NIIT ABUJA .......................................................... 4
1.2.2 SERVICES OFFERED ............................................................................................... 4
CHAPTER TWO ......................................................................................................................... 5
KNOWLEDGE ACQUIRED .................................................................................................... 5
2.0 WORK EXPERIENCE GAINED AT NIIT ABUJA ............................................................. 5
2.1 COMPUTER SUPPORT AND MAINTENANCE (COMPTIA A+) ................................... 5
2.1.1 SYSTEM UTILITIES AND TOOLS ......................................................................... 5
2.2 NETWORK SUPPORT AND MAINTENANCE (COMPTIA N+) ..................................... 8
2.2.1 DEFINITION OF NETWORKING ............................................................................ 8
2.2.2 NETWORK TYPES ................................................................................................ 9
2.2.4 CONNECTIVITY DEVICES .................................................................................. 11
2.2.5 NETWORK MODELS ........................................................................................... 12
2.2.6 IPV4 ADDRESSING SCHEME ............................................................................. 12
2.3 NETWORK SECURITY (COMPTIA S+)...................................................................... 14
v
2.3.1 INFORMATION SECURITY CYCLE .................................................................... 14
2.3.2 AUTHENTICATION METHODS ........................................................................... 16
2.3.3 CRYPTOGRAPHY ............................................................................................... 17
2.3.4 SECURITY POLICIES ....................................................................................... 18
CHAPTER THREE ................................................................................................................... 19
3.0 APPLICATION OF KNOWLEDGE ACQUIRED .............................................................. 19
3.1 SYSTEM ANALYSIS ................................................................................................... 19
3.1.1 REQUIREMENTS OF THE NETWORK ............................................................... 19
3.2 NETWORK DESIGN ................................................................................................... 19
CHAPTER FOUR ..................................................................................................................... 22
4.0 SUMMARY, CONCLUSION AND RECOMMENDATIONS ............................................. 22
4.1 SUMMARY .................................................................................................................. 22
4.2 CONCLUSION ............................................................................................................ 22
4.3 RECOMMENDATIONS ............................................................................................... 22
vi
vii
LIST OF TABLES
viii
LIST OF FIGURES
ix
LIST OF ABBREVIATIONS
x
RC:Rivest Cypher..................................................................................................................... 17
xi
CHAPTER ONE
INTRODUCTION
The Students Industrial Work Scheme (SIWES) was initiated by the industrial training fund
(ITF) in 1973, to serve as a medium through which theoretical and practical experience could
the students, the Universities and Industries. It is funded by the Federal Government of
Nigeria and jointly coordinated by the ITF and the National Universities Commission (NUC). It
is a skill training programme designed to expose and prepare students of tertiary Institutions
for the industrial work situation they are likely to meet after graduation. The scheme also
affords the students the opportunity of familiarizing and exposing themselves to the needed
SIWES started in 1974 with 748 students from 11 institutions of higher learning. It increased
to about 5,000 students from 32 institutions by 1978. The ITF, however, withdrew from the
management of the scheme in 1979 due to logistic problems in the organization coupled with
increased financial burden associated with the rapid expansion of SIWES. Consequently, the
federal government funded the scheme through National University Commission (NUC) and
National Board for Technical Education (NBTE) who managed SIWES for five years (1979-
1984). The supervising agencies (NUC & NBTE) operated the scheme in conjunctions with
1
1.1 AIM AND OBJECTIVES OF SIWES
To prepare students for the work situation they may likely meet after graduation.
To expose students to work methods and techniques in handling equipment, tools and
there by bridging between the Universities work and the actual practice.
To make the transition from the University to the world of work easier and thus
To expose students to the right and proper altitude and the disciplinary measures to
work.
To enable science, engineering and technical students appreciate work methods and
gain experience in handling equipment and machinery which may not be available in
their institutions.
2
To prepare students to contribute to the productivity of their employers and national
others.
To enable Students Bridge the gap between the knowledge acquired in institutions and
NIIT was established in 1981, NIIT Limited, a global leader in Skills and Talent Development,
corporations, institutions, and individuals in over 40 countries. NIIT has three main lines of
business across the globe- Corporate Learning Group, Skills and Careers Group, and School
Learning Group.
Lagos in 1999 and since then its affirmed support to prepare the youth in the country
for lucrative IT careers. The scholarship has reached out to nearly 1.9 million students in
the past 19 years. Since1999 N I I T has been involved in creation of skilled ICT
3
1.2.1 ORGANIZATIONAL CHART OF NIIT ABUJA
Managing Director
Centre Head
Industrial
Faculties/Teacher Security Cleaners Facility Monitor
Training Unit
others.
4
CHAPTER TWO
KNOWLEDGE ACQUIRED
Most of the aims and objectives of the student industrial work scheme (SIWES) were
achieved to a great extend during the period of my industrial training although there is still
more to learn regarding the practical aspect of my profession. It is an experience that one
Windows contains a large number of tools and utilities that span across different categories.
Each of these tools and utilities is designed to help users maintain and optimize the Windows
OS. Tools and utilities in Windows span across multiple categories, such as:
I. Defrag: The Defrag is a utility that arranges the data stored on a hard drive
into contiguous blocks.
II. Chkdsk: The ChkDsk tool helps to recover lost allocation units, caused by
disruption.
5
III. Diskmgmt: When you plug in a hard drive into a computer, you need to perform
certain disk management operations to make it work. Some of the tasks that
can be performed using the Disk Management tool are: Create and delete
partitions etc.
Device Manager: Allows you to configure and control the devices that are part
computer.
o Event Viewer: contains a set of different logs with information about the
6
2.1.1.4 SYSTEM MANAGEMENT TOOLS
Computer Management: Is used to run a number of Windows tools, such as: Task Scheduler,
Event Viewer, Shared Folders, Local Users and Groups, Performance Monitor, Device
Services: Displays the set of services that are present on a Windows system. Can be
two computers
Task Scheduler: Helps you to schedule tasks in the windows environment. You can
either customize these tasks or schedule your own tasks. Using Task Scheduler, you
7
2.2 NETWORK SUPPORT AND MAINTENANCE (COMPTIA N+)
During this Course I learnt the concept of networking including network connectivity
devices, signal transmission methods, network models, networking Standards and network
management. At the end of the course am able to design, set up, manage and troubleshoot
networks.
data over a wired or wireless medium. In a networked environment, you can share the
following components:
Devices such as modems, printers, Universal Serial Bus (USB) drives, and CD-
ROMs
To create a network, you require: at least two computing devices, Network Interface
Cards (NICs) in each connected device, a network medium, either wired or wireless,
8
Figure 3: Peer to Peer Network
A computer network is classified into four types on the basis of its size:
Is a collection of computers and associated devices that share a common network medium.
Occupies a very small area and can be set up at a low cost and contains minimum two
computers. It is useful for sharing files and printers among users connected to a network.
Is a large computer network that extends to a campus such as that of a university or covers
Is a network designed for the automotive industry, it connects devices, sensors, and
embedded devices by using a serial bus. The devices in a CAN do not have addresses.
Instead, nodes broadcast short messages by attaching identifiers unique to the network and
9
Wide Area Network (WAN)
Is a large computer network made up of smaller networks such as two or more LANs. The
world’s most famous and largest WAN is the Internet. They are costly to set up. The smallest
WAN can be formed by combining two LANs.A WAN formed by combining multiple LANs is
A transmission medium is the means by which data can be exchanged and resources can be
shared among the devices on a network. Each type of transmission medium has specific
characteristics and advantages that make it suitable for specific networking requirements.
10
Wired (or guided): Wired media is the use of cables to connect the devices on a network.
The cables transfer data and information among the network devices. Cables may use Metal
wires that carry data in the form of electrical signals and Glass or plastic wires that use light
pulses to carry data. Wired media are also called guided media. The two types of wired media
used most commonly are: Copper media and Fiber optic cables.
Wireless (or unguided): Wireless media: Uses radio waves, microwaves, or light pulses to
carry data. Enables users in networks using wireless media to move around while they remain
connected to the network. Are also called unguided media. In wireless media, data transfer
is in the form of waves or pulses that do not travel in a closed, guided direction.
A hub: Works at Layer 1 of the OSI Model. Is used to connect multiple network devices and
provide sharing of network resources and to extend the range of the Ethernet cable in
networks
A repeater: Regenerates a signal to improve the signal strength over long transmission
A switch: Is a network connectivity device that connects nodes or different network devices
so that they can form a network. Has a few ports (connectors), which connect different nodes
and devices to the switch. It has a MAC address and it contains memory where it stores the
A router: is a networking device that connects multiple networks by using the same protocol.
Sends data between networks by identifying the network addresses contained in the packets
being sent
11
2.2.5 NETWORK MODELS
The OSI Model: It was developed by ISO, it defines communication in an open system
network. Divides the entire communication process into seven tasks. Each task is grouped
TCP/IP model:
Is a protocol stack used in networking, it supports two very popular protocols—TCP and IP.
It contains four layers. The protocols and services included in the TCP/IP model are more
Authority manages, distributes, and ensures that every node on the Internet has a
unique IP address. IP address allocation has been divided into sub registries, known
as RIRs, for various geographical regions. Some of the RIRs currently in use are: Asia-
12
Pacific Network Information Center (APNIC), African Network Information Center
Reserved on the basis of their usability in a network. Networks are categorized as private and
The following three sets of blocks for assigning private network addresses:
The following IPv4 address ranges are reserved for public networks:
13
Class Range Number of Networks Number of Hosts on
each Network
D 224-239 Multicast
E 240-255 Reserved
Security+ is an entry-level vendor-neutral security certification that builds off of the network
security knowledge covered by the Network+ certification. CompTIA Security + is all about
Securing network devices and resources from unauthorized access, damage, loss or
modification of information.
What to Protect?
14
Information Security Assets Protection Requirement
without authorization.
Goals of Security
• The primary goals or functions involved in the practice of information security include:
information.
storage devices.
Risks
Risk is a concept that indicates exposure to the chance of damage or loss. Signifies the
likelihood of a hazard or dangerous threat occurring. Is often associated with the loss of a
system, power, or network, and other physical losses. Affects people, practices, and
processes.
Threats
15
A threat is any event or action that could potentially cause damage to an asset. Often in
Vulnerabilities:
A vulnerability is any condition that leaves a system open to harm. Vulnerabilities can be:
Intrusions
An intrusion occurs: When an attacker accesses a computer system. When the system is
Network-based intrusions
Attacks
Tokens
A token is a physical or virtual object. A token can store Personal Identification Numbers
(PINs),
Smart Cards
16
A smart card is an example of token-based authentication. It is a plastic card containing an
Biometrics
Geolocation
Geolocation provides an extra level for authentication. It determines physical location from
an IP address, MAC address, RFID, GPS coordinates, etc. In this type of authentication
2.3.3 CRYPTOGRAPHY
Type of Encryption
encryption and decryption. It is vulnerable if the key is lost or compromised. Some of the
common algorithms used for symmetric encryption include: DES, 3DES, AES, Rivest Cipher
(RC)
17
Asymmetric encryption: Uses public and private keys to perform encryption and decryption.
It is more secure than the symmetric encryption and slower than symmetric algorithms. Some
of the common algorithms used for asymmetric encryption include: RSA, DH etc.
organization. Describes the means the organization will take to protect the
functions similar to a government's foreign policy. Some of the common security policy
include: Acceptable use policy, Privacy policy, Audit policy, Extranet policy, Password
policy
18
CHAPTER THREE
With the knowledge acquired am able to design and implement a network for an
organization.
NIIT Abuja is an IT training institute that needs to set up the desired IT infrastructure in its
center. To achieve this, a network has been designed to robust, scalable and to be delivered
on time.
User Desktops: 90 desktops with core i3 processors, 2GB RAM, 500GB hard drives and NIC
19
Network Design
Network Addressing
Parameter Value
Class A1 192.168.1.141-192.168.1.155
20
Network Laboratory 192.168.1.172 -192.168.1.187
Parameter Value
Class B1 192.168.1.11-192.168.1.26
21
CHAPTER FOUR
4.1 SUMMARY
During my stay at NIIT Abuja I enrolled into three courses: hardware maintenance (CompTIA
A+), networking (CompTIA N+) and network security (CompTIA S+) which I was able to
complete all the three courses and sat for their exams and I passed the exams, for which I
4.2 CONCLUSION
This industrial training has awarded me the opportunity of coming in contact with the practical
general, by integrating both the practical and theoretical knowledge. It tends to broaden the
scope of understanding.
4.3 RECOMMENDATIONS
The siwes supervision of students at their respective placement areas should be more
frequent, to serve as motivation to the students and also a way to track the progress
The industry should attach students to the functional and relevance sections of the
industry
Department can also make provision of manual guide to its industrial training students
The department can recommend specific industries after due consultation to its
students.
22
23
24