You are on page 1of 36

STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

BY

MUHAMMAD MUHAMMAD KABIR

UG15/SCCS/1062

HELD AT

NATIONAL INSTITUTE OF INFORMATION TECHNOLOGY (NIIT), ABUJA

A REPORT SUBMITTED TO THE DEPARTMENT OF MATHEMATICS,

FACULTY OF SCIENCE, GOMBE STATE UNIVERSITY IN PARTIAL

FULFILLMENT OF THE REQUIREMENT OF THE COMPLETION OF

INDUSTRIAL TRAINING.

MARCH, 2019

i
DECLARATION

I hereby declared that this work/experience is the product of my Industrial training effort,

undertaken under the supervision of Malam Adamu Husaini and has not been presented and

will not be presented elsewhere for the fulfillment of my Industrial Training requirement.

MUHAMMAD MUHAMMAD KABIR ________________ _______________

Name of Student Signature Date

i
CERTIFICATION/APPROVAL

This is to certify that the report was carried out under my supervision.

Malam Adadmu Husaini ___________________ ___________________

Departmental Based Supervisor Signature Date

ii
DEDICATION

This report is dedicated to the Almighty Allah for the strength and opportunity, my entire family

for their support and encouragement.

iii
ACKNOWLEDGEMENT

All Praise be to Allah the lord of the world, is with His favour, blessings and countless bounties

upon us, that have spared my life from the beginning and to the end of my industrial training and

may peace and blessing of Allah be upon my beloved noble prophet Muhammad (S.A.W),

With a deep sense of appreciation, respect and gratitude, I want to say a big thank you to the

Gombe State University SIWES Director for his relentless support toward the SIWES. I also like

to thank my departmental SIWES Coordinator Malam Muhammed Kabir Ahmed as well as

departmental based Supervisor Malam Adamu Husaini for their intellectual support, Institution

based supervisor Dr. Nsir Charles. A of Biological sciences, Mr. Shola Oshilaja Managing

Director NIIT Abuja, Mrs. Evans Amaka Ibezimako Center Head NIIT Abuja, Mr. Abel Bitrus my

industrial based supervisor and all NIIT staffs that have made my stay a fruitful one.

Nobody has been more important to me during my industrial training than my family members.

I would like to thank my parents, whose love and guidance are with me in whatever I pursue.

They are my ultimate role models.

iv
TABLE OF CONTENTS

DECLARATION ........................................................................................................................... i
CERTIFICATION/APPROVAL ................................................................................................... ii
DEDICATION ............................................................................................................................ iii
ACKNOWLEDGEMENT ............................................................................................................ iv
TABLE OF CONTENTS ............................................................................................................. v
LIST OF TABLES ..................................................................................................................... viii
LIST OF FIGURES .................................................................................................................... ix
LIST OF ABBREVIATIONS ........................................................................................................ x
CHAPTER ONE ......................................................................................................................... 1
INTRODUCTION .................................................................................................................... 1
1.0 INTRODUCTION TO SIWES ............................................................................................ 1
1.1 AIM AND OBJECTIVES OF SIWES ............................................................................. 2
1.2 BRIEF HISTORY OF MY INDUSTRIAL TRAINING PLACE ............................................. 3
1.2.1 ORGANIZATIONAL CHART OF NIIT ABUJA .......................................................... 4
1.2.2 SERVICES OFFERED ............................................................................................... 4
CHAPTER TWO ......................................................................................................................... 5
KNOWLEDGE ACQUIRED .................................................................................................... 5
2.0 WORK EXPERIENCE GAINED AT NIIT ABUJA ............................................................. 5
2.1 COMPUTER SUPPORT AND MAINTENANCE (COMPTIA A+) ................................... 5
2.1.1 SYSTEM UTILITIES AND TOOLS ......................................................................... 5
2.2 NETWORK SUPPORT AND MAINTENANCE (COMPTIA N+) ..................................... 8
2.2.1 DEFINITION OF NETWORKING ............................................................................ 8
2.2.2 NETWORK TYPES ................................................................................................ 9
2.2.4 CONNECTIVITY DEVICES .................................................................................. 11
2.2.5 NETWORK MODELS ........................................................................................... 12
2.2.6 IPV4 ADDRESSING SCHEME ............................................................................. 12
2.3 NETWORK SECURITY (COMPTIA S+)...................................................................... 14

v
2.3.1 INFORMATION SECURITY CYCLE .................................................................... 14
2.3.2 AUTHENTICATION METHODS ........................................................................... 16
2.3.3 CRYPTOGRAPHY ............................................................................................... 17
2.3.4 SECURITY POLICIES ....................................................................................... 18
CHAPTER THREE ................................................................................................................... 19
3.0 APPLICATION OF KNOWLEDGE ACQUIRED .............................................................. 19
3.1 SYSTEM ANALYSIS ................................................................................................... 19
3.1.1 REQUIREMENTS OF THE NETWORK ............................................................... 19
3.2 NETWORK DESIGN ................................................................................................... 19
CHAPTER FOUR ..................................................................................................................... 22
4.0 SUMMARY, CONCLUSION AND RECOMMENDATIONS ............................................. 22
4.1 SUMMARY .................................................................................................................. 22
4.2 CONCLUSION ............................................................................................................ 22
4.3 RECOMMENDATIONS ............................................................................................... 22

vi
vii
LIST OF TABLES

Table 1:IPV4 Address Classes ......................................................................................14

Table 2: Information Security Assets .............................................................................15

Table 3: Building Segments and their Respective Network ID .......................................20

Table 4: IP Address Allocation for Ground Floor ............................................................21

Table 5: IP Address Allocation for First Floor.................................................................21

viii
LIST OF FIGURES

Figure 1: Organizational Chart of NIIT Abuja ...................................................................4

Figure 2: Remote Desktop Connection ............................................................................7

Figure 3: Peer to Peer Network .......................................................................................9

Figure 4: Wide Area Network .........................................................................................10

Figure 5: Layers of the TCP/IP Model ............................................................................12

Figure 6: NIIT Network Diagram ....................................................................................20

ix
LIST OF ABBREVIATIONS

3DES:Triple Data Encryption Algorithm ................................................................................... 17

AES:Advanced Encryption Algorithm ....................................................................................... 17

Afrinic: African Network Information Center ............................................................................. 12

APNIC: Asia-Pacific Network Information Center ..................................................................... 12

ARIN: American Registry for Internet Numbers ........................................................................ 12

CAN: Controller Area Network ................................................................................................... 9

CD-ROMs:Compact Disc Read Only Memory ............................................................................ 8

CompTIA N+:CompTIA Network Plus ..................................................................................... 8

CompTIA S+:CompTIA Security Plus ................................................................................... 14

DES:Data Encryption Algorithm ............................................................................................... 17

GPS:Geographic Information System ...................................................................................... 17

IANA:Internet Assigned Number Authority ............................................................................... 13

IPV4:Internet Protocol Address version 4 ........................................................................... 12, 16

ITF: Industrial Training Fund ...................................................................................................... 1

LAN: Local Area Network ........................................................................................................... 9

MAC:Media Access Control ..................................................................................................... 17

MAN: Metropolitan Area Network ............................................................................................... 9

MMS:Master Mind Series ........................................................................................................... 4

NBTE: National Board for Technical Education .......................................................................... 1

NICs: Network Interface Cards ................................................................................................... 8

NUC: National Universities Commission .................................................................................... 1

PIN:Personal Identification Number ......................................................................................... 16

x
RC:Rivest Cypher..................................................................................................................... 17

RFID:Radio Frequency Identification........................................................................................ 17

RIR:Regional Internet Registry ................................................................................................. 12

SIWES:Student Work Experiance Scheme ................................................................................ 5

USB: Universal Serial Bus .......................................................................................................... 8

WAN: Wide Area Network .......................................................................................................... 9

DH:Diffie Hellman ............................................................................................................... 17, 23

OSI:Open Systems Interconnection ............................................................................. 12, 22, 23

RSA:Rivest Shamir Adleman ................................................................................................... 17

xi
CHAPTER ONE

INTRODUCTION

1.0 INTRODUCTION TO SIWES

The Students Industrial Work Scheme (SIWES) was initiated by the industrial training fund

(ITF) in 1973, to serve as a medium through which theoretical and practical experience could

be combined to better the Nigerian educational system. It is a tripartite programme involving

the students, the Universities and Industries. It is funded by the Federal Government of

Nigeria and jointly coordinated by the ITF and the National Universities Commission (NUC). It

is a skill training programme designed to expose and prepare students of tertiary Institutions

for the industrial work situation they are likely to meet after graduation. The scheme also

affords the students the opportunity of familiarizing and exposing themselves to the needed

experience in handling equipment and machinery.

SIWES started in 1974 with 748 students from 11 institutions of higher learning. It increased

to about 5,000 students from 32 institutions by 1978. The ITF, however, withdrew from the

management of the scheme in 1979 due to logistic problems in the organization coupled with

increased financial burden associated with the rapid expansion of SIWES. Consequently, the

federal government funded the scheme through National University Commission (NUC) and

National Board for Technical Education (NBTE) who managed SIWES for five years (1979-

1984). The supervising agencies (NUC & NBTE) operated the scheme in conjunctions with

their respective institution during this period.

1
1.1 AIM AND OBJECTIVES OF SIWES

The aims and objectives of SIWES include the following:

 To prepare students for the work situation they may likely meet after graduation.

 To expose students to work methods and techniques in handling equipment, tools and

machinery that is not available in their University.

 To provide students an opportunity to apply theoretical knowledge in a real situation

there by bridging between the Universities work and the actual practice.

 To provide an avenue for student in Nigeria University to acquire industrial skill

experience in their area of study.

 To make the transition from the University to the world of work easier and thus

enhancing students for later job placement after graduation.

 To strengthen the involvement of employers of labour in the educational process by

preparing university students for employment in industry.

 To expose students to the right and proper altitude and the disciplinary measures to

work.

 To minimize the bewilderment experienced by students, particularly those from a non-

technological background, pursuing courses in science, engineering and technology

with regard to different equipment, processes tools etc. available in industry.

 To enable science, engineering and technical students appreciate work methods and

gain experience in handling equipment and machinery which may not be available in

their institutions.

2
 To prepare students to contribute to the productivity of their employers and national

development immediately after graduation.

 To provide an enabling environment where students can develop and enhance

personal attribute such as critical thinking, creativity, initiative, resourcefulness,

leadership, time management, presentation skills and interpersonal skills, amongst

others.

 To enhance student contact with potential employers while on training.

 To enable Students Bridge the gap between the knowledge acquired in institutions and

the relevant production skills required in work organizations.

1.2 BRIEF HISTORY OF MY INDUSTRIAL TRAINING PLACE

NIIT was established in 1981, NIIT Limited, a global leader in Skills and Talent Development,

offers multi-disciplinary learning management and training, delivering solutions to

corporations, institutions, and individuals in over 40 countries. NIIT has three main lines of

business across the globe- Corporate Learning Group, Skills and Careers Group, and School

Learning Group.

N I I T established its presence in N igeria by setting up an education centre in Ikeja,

Lagos in 1999 and since then its affirmed support to prepare the youth in the country

for lucrative IT careers. The scholarship has reached out to nearly 1.9 million students in

the past 19 years. Since1999 N I I T has been involved in creation of skilled ICT

workforce and has launched several initiatives in the country .

NIIT Abuja is managed by Campus Technologies limited, it was established on August,2016

under Mr. Shola Oshilaja(Managing director).NIIT Abuja is a licensee of NIIT limited.

3
1.2.1 ORGANIZATIONAL CHART OF NIIT ABUJA

Managing Director

Centre Head

Counselor Academic Non Academic

Industrial
Faculties/Teacher Security Cleaners Facility Monitor
Training Unit

Students I.T Students

Figure 1: Organizational Chart of NIIT Abuja

1.2.2 SERVICES OFFERED

Some of the courses offered at NIIT Abuja are:MMS-Software Engineer,MMS-

Infrastructure management, Diploma in Python,Diploma in Server Infrasture

Management,certificate in Network Support and Maintenance,Diploma in Web

Development,Certificate in System Support and Maintenance and Diploma in Java among

others.

4
CHAPTER TWO

KNOWLEDGE ACQUIRED

2.0 WORK EXPERIENCE GAINED AT NIIT ABUJA

Most of the aims and objectives of the student industrial work scheme (SIWES) were

achieved to a great extend during the period of my industrial training although there is still

more to learn regarding the practical aspect of my profession. It is an experience that one

may look forward to have in the future.

2.1 COMPUTER SUPPORT AND MAINTENANCE (COMPTIA A+)

A+ certification represents entry-level competency as a computer technician and is a vendor

neutral certification that covers various technologies and operating systems.

2.1.1 SYSTEM UTILITIES AND TOOLS

Windows contains a large number of tools and utilities that span across different categories.

Each of these tools and utilities is designed to help users maintain and optimize the Windows

OS. Tools and utilities in Windows span across multiple categories, such as:

2.1.1.1 DISK MANAGEMENT TOOLS

I. Defrag: The Defrag is a utility that arranges the data stored on a hard drive
into contiguous blocks.
II. Chkdsk: The ChkDsk tool helps to recover lost allocation units, caused by

unexpected terminations of applications, such as in the event of sudden power

disruption.

5
III. Diskmgmt: When you plug in a hard drive into a computer, you need to perform

certain disk management operations to make it work. Some of the tasks that

can be performed using the Disk Management tool are: Create and delete

partitions, Change the type of disk, Format partitions/volumes, Extend or shrink

partitions etc.

2.1.1.2 DEVICE MANAGEMENT TOOLS

 Device Manager: Allows you to configure and control the devices that are part

of your computer. You can either enable or disable the device

 Print Management: Allows you to centrally administer for sharing printers on a

network and managing print server and network printer tasks

2.1.1.3 SYSTEM MONITORING TOOLS

o Performance Monitor Is used to indicate the status of resources in a

computer.

o Event Viewer: contains a set of different logs with information about the

events that have occurred on your computer. This information helps to

monitor the health of the system and diagnose issues.

o Task Manager: is a handy utility used to perform many tasks in Windows,

can be used to view: Process list, Resource usage of each process,

Network status, Services

6
2.1.1.4 SYSTEM MANAGEMENT TOOLS

Computer Management: Is used to run a number of Windows tools, such as: Task Scheduler,

Event Viewer, Shared Folders, Local Users and Groups, Performance Monitor, Device

Manager, Disk Management, Services

 Services: Displays the set of services that are present on a Windows system. Can be

used to manage your services.

 System Information Is used to provide detailed information about the system

configuration. Can be used to view the following information: Hardware resources,

Component, Software environment.

 Remote Desktop Is a tool that allows a remote connection to be established between

two computers

Figure 2: Remote Desktop Connection

 Task Scheduler: Helps you to schedule tasks in the windows environment. You can

either customize these tasks or schedule your own tasks. Using Task Scheduler, you

can add, modify, import, disable, or delete a task

7
2.2 NETWORK SUPPORT AND MAINTENANCE (COMPTIA N+)

Network+ is an entry-level certification that is used to measure skill as a network technician.

During this Course I learnt the concept of networking including network connectivity

devices, signal transmission methods, network models, networking Standards and network

management. At the end of the course am able to design, set up, manage and troubleshoot

networks.

2.2.1 DEFINITION OF NETWORKING

A network is a collection of computing devices. These devices communicate by exchanging

data over a wired or wireless medium. In a networked environment, you can share the

following components:

Data, applications, and services

Devices such as modems, printers, Universal Serial Bus (USB) drives, and CD-

ROMs

To create a network, you require: at least two computing devices, Network Interface

Cards (NICs) in each connected device, a network medium, either wired or wireless,

and a network operating system.

8
Figure 3: Peer to Peer Network

2.2.2 NETWORK TYPES

A computer network is classified into four types on the basis of its size:

Local Area Network (LAN)

Is a collection of computers and associated devices that share a common network medium.

Occupies a very small area and can be set up at a low cost and contains minimum two

computers. It is useful for sharing files and printers among users connected to a network.

Metropolitan Area Network (MAN)

Is a large computer network that extends to a campus such as that of a university or covers

an entire city, it incorporates a number of LANs to form the network. It spreads to

geographical areas smaller than that of a WAN.

Controller Area Network (CAN)

Is a network designed for the automotive industry, it connects devices, sensors, and

embedded devices by using a serial bus. The devices in a CAN do not have addresses.

Instead, nodes broadcast short messages by attaching identifiers unique to the network and

is also popularly known as a Campus Area Network

9
Wide Area Network (WAN)

Is a large computer network made up of smaller networks such as two or more LANs. The

world’s most famous and largest WAN is the Internet. They are costly to set up. The smallest

WAN can be formed by combining two LANs.A WAN formed by combining multiple LANs is

shown in the given figure.

Figure 4: Wide Area Network

2.2.3 TRANSMISSION MEDIA

A transmission medium is the means by which data can be exchanged and resources can be

shared among the devices on a network. Each type of transmission medium has specific

characteristics and advantages that make it suitable for specific networking requirements.

There are two types of transmission media:

10
Wired (or guided): Wired media is the use of cables to connect the devices on a network.

The cables transfer data and information among the network devices. Cables may use Metal

wires that carry data in the form of electrical signals and Glass or plastic wires that use light

pulses to carry data. Wired media are also called guided media. The two types of wired media

used most commonly are: Copper media and Fiber optic cables.

Wireless (or unguided): Wireless media: Uses radio waves, microwaves, or light pulses to

carry data. Enables users in networks using wireless media to move around while they remain

connected to the network. Are also called unguided media. In wireless media, data transfer

is in the form of waves or pulses that do not travel in a closed, guided direction.

2.2.4 CONNECTIVITY DEVICES

A hub: Works at Layer 1 of the OSI Model. Is used to connect multiple network devices and

provide sharing of network resources and to extend the range of the Ethernet cable in

networks

A repeater: Regenerates a signal to improve the signal strength over long transmission

distances. Can be used to exceed the limitations of various networking technologies

regarding the segment length for signal transmission.

A switch: Is a network connectivity device that connects nodes or different network devices

so that they can form a network. Has a few ports (connectors), which connect different nodes

and devices to the switch. It has a MAC address and it contains memory where it stores the

MAC address of all the devices and computers connected to it.

A router: is a networking device that connects multiple networks by using the same protocol.

Sends data between networks by identifying the network addresses contained in the packets

being sent

11
2.2.5 NETWORK MODELS

The OSI Model: It was developed by ISO, it defines communication in an open system

network. Divides the entire communication process into seven tasks. Each task is grouped

into seven different layers.

Figure 5: Layers of the TCP/IP Model

TCP/IP model:

Is a protocol stack used in networking, it supports two very popular protocols—TCP and IP.

It contains four layers. The protocols and services included in the TCP/IP model are more

practical to implement than those in the OSI Model.

2.2.6 IPV4 ADDRESSING SCHEME

An IP address is a unique number that identifies a resource in a network. It allows

nodes to connect and communicate over a network. Internet Assigned Numbers

Authority manages, distributes, and ensures that every node on the Internet has a

unique IP address. IP address allocation has been divided into sub registries, known

as RIRs, for various geographical regions. Some of the RIRs currently in use are: Asia-

12
Pacific Network Information Center (APNIC), African Network Information Center

(Afrinic), American Registry for Internet Numbers (ARIN) etc.

Reserved IPV4 Addresses

Reserved on the basis of their usability in a network. Networks are categorized as private and

public. IANA provides:

The following three sets of blocks for assigning private network addresses:

10.0.0.0 to 10.255.255.255 for Class A

172.16.0.0 to 172.31.255.255 for Class B

192.168.0.0 to 192.168.255.255 for Class C

The following IPv4 address ranges are reserved for public networks:

1.0.0.0 to 9.255.255.255 and 11.0.0.0 to 126.255.255.255 for Class A

128.0.0.0 to 172.15.255.255 and 172.32.0.0 to 191.255.255.255 for Class B

192.0.0.0 to 192.167.255.255 and 192.169.0.0 to 223.255.255.255 for Class C

13
Class Range Number of Networks Number of Hosts on

each Network

A 1-127 127 16,777,214

B 128-191 16,384 65,534

C 192-223 2,097,152 254

D 224-239 Multicast

E 240-255 Reserved

Table 1:IPV4 Address Classes

2.3 NETWORK SECURITY (COMPTIA S+)

Security+ is an entry-level vendor-neutral security certification that builds off of the network

security knowledge covered by the Network+ certification. CompTIA Security + is all about

Securing network devices and resources from unauthorized access, damage, loss or

modification of information.

2.3.1 INFORMATION SECURITY CYCLE

• Information security refers to the protection of available information or information

resources from: Unauthorized access, Attacks,Thefts,Data damage

What to Protect?

• The following table describes the information that needs to be secured in an

organization and what protection is required by information security assets.

14
Information Security Assets Protection Requirement

Data From getting corrupt or from being accessed

without authorization.

Resources From being accessed without authorization.

Table 2: Information Security Assets

Goals of Security

• The primary goals or functions involved in the practice of information security include:

– Prevention: Preventing users from gaining unauthorized access to confidential

information.

– Detection: Detection occurs when a user is discovered trying to access

unauthorized data or after information has been lost.

– Recovery: A process to recover vital data from a crashed system or data

storage devices.

Risks

Risk is a concept that indicates exposure to the chance of damage or loss. Signifies the

likelihood of a hazard or dangerous threat occurring. Is often associated with the loss of a

system, power, or network, and other physical losses. Affects people, practices, and

processes.

Threats

15
A threat is any event or action that could potentially cause damage to an asset. Often in

violation of a security requirement, policy, or procedure. Potential threats to computer and

network security include: Unintentional or unauthorized access or changes to data, the

interruption of services, and the interruption of access to assets, Damage to hardware,

unauthorized access or damage to facilities.

Vulnerabilities:

A vulnerability is any condition that leaves a system open to harm. Vulnerabilities can be:

Improperly configured or installed hardware or software, untested software and firmware

patches, Bugs in software or operating systems, the misuse of software or communication

protocols, poorly designed networks

Intrusions

An intrusion occurs: When an attacker accesses a computer system. When the system is

vulnerable to attacks. An intrusion may include: Physical intrusions, Host-based intrusions,

Network-based intrusions

Attacks

An attack is a technique used to exploit a vulnerability in any application or computer system

without the authorization to do so

2.3.2 AUTHENTICATION METHODS

Tokens

A token is a physical or virtual object. A token can store Personal Identification Numbers

(PINs),

Smart Cards

16
A smart card is an example of token-based authentication. It is a plastic card containing an

embedded computer chip and it require a smart card reader.

Biometrics

Biometrics are authentication schemes based on the identification of individuals by their

physical characteristics, Examples may include: A fingerprint scanner, a retinal scanner, a

hand geometry scanner, Voice-recognition, Facial-recognition software

Geolocation

Geolocation provides an extra level for authentication. It determines physical location from

an IP address, MAC address, RFID, GPS coordinates, etc. In this type of authentication

method, authentication requests from approved locations are granted

2.3.3 CRYPTOGRAPHY

Cryptography it is a science of hiding information. It protects sensitive information and

Symmetric encryption communications from unauthorized access

Encryption and Decryption

• Encryption: Converts data from plaintext form to ciphertext form.

• Decryption: Converts data from ciphertext form to plaintext form.

Type of Encryption

Symmetric Encryption: is a two-way encryption scheme. It uses same key to perform

encryption and decryption. It is vulnerable if the key is lost or compromised. Some of the

common algorithms used for symmetric encryption include: DES, 3DES, AES, Rivest Cipher

(RC)

17
Asymmetric encryption: Uses public and private keys to perform encryption and decryption.

It is more secure than the symmetric encryption and slower than symmetric algorithms. Some

of the common algorithms used for asymmetric encryption include: RSA, DH etc.

2.3.4 SECURITY POLICIES

• A security policy: Defines how security will be implemented within a particular

organization. Describes the means the organization will take to protect the

confidentiality, availability, and integrity of sensitive data and resources. Provides

functions similar to a government's foreign policy. Some of the common security policy

include: Acceptable use policy, Privacy policy, Audit policy, Extranet policy, Password

policy

18
CHAPTER THREE

3.0 APPLICATION OF KNOWLEDGE ACQUIRED

With the knowledge acquired am able to design and implement a network for an

organization.

3.1 SYSTEM ANALYSIS

NIIT Abuja is an IT training institute that needs to set up the desired IT infrastructure in its

center. To achieve this, a network has been designed to robust, scalable and to be delivered

on time.

3.1.1 REQUIREMENTS OF THE NETWORK

For the envisioned network the following are required

User Desktops: 90 desktops with core i3 processors, 2GB RAM, 500GB hard drives and NIC

Switch: Ten (10) NETGEAR Intelligent Edge M4100 Series

Cable Connectors: RJ-45 connectors

Cable: CAT 5e cable for the required length

Access Point: 2 access point

3.2 NETWORK DESIGN

19
Network Design

Figure 6: NIIT Network Diagram

Network Addressing

Segment Network ID Subnet Mask

Ground Floor 192.168.1.128 255.255.255.192

First Floor 192.168.1.0 255.255.255.128

Table 3: Building Segments and their Respective Network ID

IP ADDRESS ALLOCATION FOR GROUND FLOOR

Parameter Value

IP Address of Router 192.168.1.129

Reserved IP Address 192.168.1.130 – 192.168.1.140

Class A1 192.168.1.141-192.168.1.155

Class A2 192.168.1.156 -192.168.1.171

20
Network Laboratory 192.168.1.172 -192.168.1.187

Table 4: IP Address Allocation for Ground Floor

IP ADDRESS ALLOCATION FOR FIRST FLOOR

Parameter Value

IP Address of Router 192.168.1.1

Reserved IP Address 192.168.1.1– 192.168.1.10

Class B1 192.168.1.11-192.168.1.26

Class B2 192.168.1.27 -192.168.1.42

Class C1 192.168.1.43 -192.168.1.58

Class C2 192.168.1.59 -192.168.1.74

Class C3 192.168.1.75 -192.168.1.90

Table 5: IP Address Allocation for First Floor

21
CHAPTER FOUR

4.0 SUMMARY, CONCLUSION AND RECOMMENDATIONS

4.1 SUMMARY

During my stay at NIIT Abuja I enrolled into three courses: hardware maintenance (CompTIA

A+), networking (CompTIA N+) and network security (CompTIA S+) which I was able to

complete all the three courses and sat for their exams and I passed the exams, for which I

will be given certificates.

4.2 CONCLUSION

This industrial training has awarded me the opportunity of coming in contact with the practical

aspects of different relevant aspects of computer science and information Technology in

general, by integrating both the practical and theoretical knowledge. It tends to broaden the

scope of understanding.

4.3 RECOMMENDATIONS

 The siwes supervision of students at their respective placement areas should be more

frequent, to serve as motivation to the students and also a way to track the progress

of the students during the training.

 The industry should attach students to the functional and relevance sections of the

industry

 Department can also make provision of manual guide to its industrial training students

 The department can recommend specific industries after due consultation to its

students.

22
23
24

You might also like