You are on page 1of 16

A TECHNICAL REPORT ON

STUDENT’S INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)


CARRIED OUT AT

FEDERAL MINISTRY OF WORKS AND HOUSING, MABUSHI


(ICT DEPARTMENT)

SUBMITTED TO THE FACULTY OF NATURAL AND APPLIED


SCIENCES, DEPARTMENT OF COMPUTER SCIENCE, AL-HIKMAH
UNIVERSITY, ILORIN, KWARA STATE

BY
AHMAD USMAN ALIYU
19/03CMP035

IN PARTIAL FULFILLMENT FOR THE REQUIREMENT FOR THE


AWARD OF BACHELOR OF SCIENCE (B.Sc.) COMPUTER SCIENCE
DEDICATION
I dedicate my SIWES to the Almighty Allah S.W.T, my parents, my supervisors at
my place of work and also my supervisors from Al-Hikmah University and to all
staff and students of Computer science department.
ACKNOWLEDGEMENT
I thank Allah S.W.T for His love, guidance and protection during and after my
SIWES program. I appreciate the efforts and support of my family and friends for
their words of encouragement, love and assistance as they saw me through the
commencement and completion of my IT program.

My appreciation also goes to my SIWES industry supervisors. Mr. Imole Olakunle


and the entire staff of FMWH for their continuous hard work and support
throughout my stay at FMWH
TABLE OF CONTENTS
CHAPTER ONE
1.1 BRIEF HISTORY OF STUDENT’S INDUSTRIAL WORK EXPERIENCE
SCHEME (SIWES)
1.2 AIMS AND OBJECTIVES OF SIWES
CHAPTER TWO
2.1 DESCRIPTION OF PLACE OF ATTACHMENT NATIONAL INSTITUTE OF
INFORMATION TECHNOLOGY (NIIT)
2.2 AIMS AND OBJECTIVES OF NATIONAL INSTITUTE OF INFORMATION
TECHNOLOGY (NIIT)
2.3 ACTIVITIES DONE IN NATIONAL INSTITUTE OF INFORMATION
TECHNOLOGY (NIIT)
2.4 ORGANOGRAM OF NATIONAL INSTITUTE OF INFORMATION
TECHNOLOGY (NIIT)
CHAPTER THREE
3.1 INTRODUCTION TO NETWORKING
CHAPTER FOUR
4.1 NETWORK COMPONENTS
4.2 NETWORK MODELS
4.3 BUILDING BLOCKS OF A NETWORK
4.4 IP ADDRESSES AND SUBNET MASKS
4.5 CONFIGURATION IN NETWORKING
4.6 ANDING
4.6 VLSM SUBNETTING
CHAPTER FIVE
5.1 SUMMARY
5.2 REFERENCE

CHAPTER ONE
INTRODUCTION
1.1 BRIEF HISTORY OF STUDENT INDUSTRIAL WORK EXPERIENCE
SCHEME (SIWES)
The early phase of science and technology in Nigeria was characterized
by the theoretical lectures in polytechnics and universities which have proven to
be an ill method of teaching. Students in Universities and Polytechnics graduate
with little or no technical experience in their course of study. In the same vein,
students’ inability to contribute to the society is hampering the growth and
development of our country. It was in this view that SIWES was introduced to the
Industrial and Educational sector.
SIWES is an acronym for Student’s Industrial Work Experience Scheme. SIWES
was established in the year 1973 in order to improve the standard of education in
Nigeria in order to achieve the needed technological advancement. Economists
being able to evaluate the role technology plays in a country’s economy
concluded that for an economy to grow and develop there be advancement in the
technology sector of the country.
SIWES was solely funded by ITF (Industrial Training Funds) during it early
stage not until it was difficult to continue for economic stress, then the
responsibility was shared between Industrial Training Funds (ITF) and the Federal
Government. The Federal Government took over the funding of the scheme and
Industrial Training Funds took over the managerial position by managing the
funds given to them by the Federal Government in order to sustain the scheme.
The effective management of Student’s Industrial Work Experience Scheme
(SIWES) has been as a result of the cooperation and well played roles of the
Federal Government, ITF, Supervising agencies.

1.2 AIMS AND OBJECTIVES OF SIWES


1. Provides the avenue for students in institutions of higher learning to
acquire industrial skills and experiences in their course of study.
2. Prepare the students for the industrial work situation they’re likely to
meet after graduation.
3. Expose students to work method and techniques in handling equipment
and machinery that may not be available in their institutions.
4. Make the transition from school to the world of work easier and
enhance students contact for later job placement.
5. Provides students with an opportunity to apply their knowledge in real
work situations thereby bridging the gap between theory and practice.
6. Enlist and strengthens employer’s involvement in the entire educational
process and prepare students for employment after graduation.
A programming language is a computer language programmers use to
develop software programs, scripts, or other sets of instructions for
computers to execute.

Although many languages share similarities, each has its own syntax.


Once a programmer learns the languages rules, syntax, and structure,
they write the source code in a text editor or IDE. Then, the
programmer often compiles the code into machine language that can
be understood by the computer. Scripting languages, which do not
require a compiler, use an interpreter to execute the script.

There are basically two types of computer programming languages given below:

1. Low level language


2. High level language

Low Level Languages

The programming languages that are very close to machine code (0s and 1s) are called
low-level programming languages.

The program instructions written in these languages are in binary form.

The examples of low-level languages are:

 machine language
 assembly language

Machine Language

The instructions in binary form, which can be directly understood by the computer
(CPU) without translating them, is called a machine language or machine code.

Machine language is also known as first generation of programming language. Machine


language is the fundamental language of the computer and the program instructions in
this language is in the binary form (that is 0's and 1's).
This language is different for different computers.

It is not easy to learn the machine language.

Advantage of Machine Language

The only advantage of machine language is that the program of machine language runs
very fast because no translation program is required for the CPU.

Disadvantage of Machine Language


Here are some of the main disadvantages of machine languages:
 Machine Dependent - the internal design of every computer is different
from every other type of computer, machine language also differs from one
computer to another. Hence, after becoming proficient in the machine
language of one type of computer, if a company decides to change to
another type, then its programmer will have to learn a new machine
language and would have to rewrite all existing program.
 Difficult to Modify - it is difficult to correct or modify this language.
Checking machine instructions to locate errors is very difficult and time
consuming.
 Difficult to Program - a computer executes machine language program
directly and efficiently, it is difficult to program in machine language. A
machine language programming must be knowledgeable about the
hardware structure of the computer.

Assembly Language
It is another low-level programming language because the program instructions
written in this language are close to machine language.
Assembly language is also known as second generation of programming language.
With assembly language, a programmer writes instructions using symbolic
instruction code instead of binary codes.

Symbolic codes are meaningful abbreviations such as SUB is used for substation
operation, MUL for multiply operation and so on. Therefore this language is also
called the low-level symbolic language.

The set of program instructions written in assembly language are also called as
mnemonic code.

Assembly language provides facilities for controlling the hardware.


CHAPTER THREE
3.1 INTRODUCTION TO NETWORKING
Computer network is the connection of two or more network devices together in
order to exchange information or resources. The computers use common
communication protocols over digital interconnections to communicate with each
other.

TYPES OF NETWORKS
1. LAN (Local Area Network):
A local area network (LAN) is a collection of devices connected together
in one physical location, such as a building, office, or home. A LAN can be small or
large, ranging from a home network with one user to an enterprise network with
thousands of users and devices in an office or school. A LAN comprises cables,
access points, switches, routers, and other components that enable devices to
connect to internal servers, web servers, and other LANs via wide area networks.
The rise of virtualization has also fueled the development of virtual LANs, which
enable network administrators to logically group network nodes and partition
their networks without a need for major infrastructure changes. For example, in
an office with multiple departments, such as accounting, IT support, and
administration, each department's computers could be logically connected to the
same switch but segmented to behave as if they are separate. E.g school, offices
etc.

2. MAN (Metropolitan Area Network):


MAN or Metropolitan area Network covers a larger area than that of a
LAN and smaller area as compared to WAN. It connects two or more computers
that are apart but reside in the same or different cities. It covers a large
geographical area and may serve as an ISP (Internet Service Provider). MAN is
designed for customers who need high-speed connectivity. Speeds of MAN
range in terms of Mbps. It’s hard to design and maintain a Metropolitan Area
Network. E.g City, communities etc.
3. WAN (Wide Area Network):
A wide area network is a telecommunications network that extends
over a large geographic area for the primary purpose of computer
networking. Wide area networks are often established with leased
telecommunication circuits. WAN includes the technologies to transmit
data, image, audio and video information over long distances and among
different LANs and MANs. E.g WWW, cloud, Internet etc.

CHAPTER FOUR
4.1 NETWORK COMPONENTS
1. End devices:
A source or destination device in a networked system. For example,
a user's PC is an end device, and so is a server. Network switches,
routers and other equipment work in between to enable messages to
Network media refers to the communication channels used to
interconnect nodes on a computer network. E.g Tablets, laptops,
smartphones, desktop, smart TV etc.
2. Intermediary devices:
Intermediary devices connect the individual hosts to the network
and can connect multiple individual networks to form an internetwork.
Examples of intermediary network devices are: switches and wireless
access points (network access) routers (internetworking) You connect
your end devices to your intermediary device.
3. Media (Channel):
Network media refers to the communication channels used to
interconnect nodes on a computer network. Typical examples of
network media include copper coaxial cable, copper twisted pair cables
and optical fiber cables used in wired networks, and radio waves used in
wireless data communications networks. E.g copper wire, fibre optics
and wireless
4.2 NETWORK MODELS
1. Client-server model:
Client-server model is a distributed application structure that
partitions tasks or workloads between the providers of a resource or
service, called servers, and service requesters, called clients. The client
relies on sending a request to another program in order to access a
service made available by a server. The server runs one or more
programs that share resources with and distribute work among clients.
The client server relationship communicates in a request–response
messaging pattern and must adhere to a common communications
protocol, which formally defines the rules, language, and dialog patterns
to be used. Client-server communication typically adheres to the TCP/IP
protocol suite.
2. Peer-to-peer model:
The peer-to-peer model (P2P model) is a non-hierarchical system of
exchange, transfer or transmission. P2P is commonly spoken of in
relation to networks. Peer-to-peer networking is a decentralized
communications model in which each party has the same capabilities. It
is a distributed application architecture that partitions tasks or
workloads between peers. Peers are equally privileged, equipotent
participants in the application. They are said to form a peer-to-peer
network of nodes. 

4.3 BUILDING BLOCKS OF A NETWORK


1. Packet switching:
Packet switching is the transfer of small pieces of data across various
networks. It is a method of grouping data into packets that are transmitted over a
digital network. Packets are made of a header and a payload. These data chunks
or “packets” allow for faster, more efficient data transfer. Often, when a user
sends a file across a network, it gets transferred in smaller data packets, not in
one piece.
2. TCP Protocol:
The Transmission Control Protocol (TCP) is a transport protocol that is
used on top of IP to ensure reliable transmission of packets. TCP includes
mechanisms to solve many of the problems that arise from packet-based
messaging, such as lost packets, out of order packets, duplicate packets, and
corrupted packets. It originated in the initial network implementation in which it
complemented the Internet Protocol. Therefore, the entire suite is commonly
referred to as TCP/IP.
3. Client/server computing:
Client/Server is a term used to describe  a computing model for the
development of computerized systems. This model is based on the distribution of
functions between two types of independent and autonomous processors:
servers and clients. A client is any process that requests specific services from
server processes.

4.4 IP ADDRESSES AND SUBNET MASKS


Ip address:
An IP address is a unique address that identifies a device on the internet or a
local network. IP stands for "Internet Protocol," which is the set of rules governing
the format of data sent via the internet or local network.
Subnet mask:

Subnet mask identifies the network in which the host is connected. It is a 32-
bit number created by setting host bits to all 0s and setting network bits to all 1s.
In this way, the subnet mask separates the IP address into the network and host
addresses. The phrase “mask” is applied because the subnet mask essentially uses
its own 32-bit number to mask the IP address.

4.5 CONFIGURATION IN NETWORKING


Network configuration is the process of setting a network's controls, flow
and operation to support the network communication of an organization and/or
network owner. This broad term incorporates multiple configuration and setup
processes on network hardware, software and other supporting devices and
components. In network configuration, there are different types of connections
but I will be talking on cross-over and copper straight-through connection. Cross-
over connection is used to connect similar devices. For example, router to router
and switch to switch while copper straight-through connection is used to connect
different devices. For example, router to switch and switch to pc.
Router:
A router is a switching device for networks, which is able to route network
packets, based on their addresses, to other networks or devices. Among other
things, they are used for Internet access, for coupling networks or for connecting
branch offices to a central office via VPN (Virtual Private Network).
Switch:
A network switch is networking hardware that connects devices on a
computer network by using packet switching to receive and forward data to the
destination device. A network switch is a multiport network bridge that uses MAC
addresses to forward data at the data link layer of the OSI model.
Below is what a basic network topology looks like

This is a basic network topology and there are network addresses assigned to
each of the router and each of the switch and after configuring this topology, the
whole pc in this topology will be assigned an Ip address, subnet mask, default
gateway and dns server.
CHAPTER FIVE
5.1 SUMMARY
A network is a system, or collection of systems, that facilitates the
exchange of resources from one point to another. This is a fancy way of saying
that a network is the sum of the parts connecting two or more points. Examples
of networks include the subway, the highway system, the telephone system, and
the Internet.
A network is made up of physical and logical components. The physical
components are the cables and network hardware devices, such as switches. The
logical components of a network are the frames and data carried by and across
the network.
Networks have two points which are: The source and destination, also known as
the origination and termination points (respectively).
There are three modes of transmission between origination and termination
points: simplex (one-way) mode, half-duplex mode (two-way, but not at the same
time), and full-duplex mode (two-way, at same time).
There are three major types of networks. The distinguishing characteristic of each
network types is the geographic range covered by the network:
 LANs cover a small geographic range which is the area within an office
building, for instance.
 MANs cover a broader geographic range than LANs which is the area of a
city, for instance.
 WANs cover a broad geographic range which is an expanse across several
states or countries, for instance.
The design, engineering, and implementation of a network are based on the
application of network models and standards. A network model is a guiding
principle in network communications, whereas a network standard is a network
communications law. A vendor's special use of a standard is called a proprietary
feature or proprietary implementation. Another example of proprietary feature is
a product a vendor implements that is not based on a standard at all.

5.2 REFERENCE
www.wikipedia.com
www.geeksforgeeks.com
www.cisco.com
www.techtarget.com
www.flylib.com
www.beginnersbook.com
www.studytonight.com
www.webeduclick.com
www.tutorialspoint.com
www.guru99.com

You might also like