Professional Documents
Culture Documents
BY
AHMAD USMAN ALIYU
19/03CMP035
CHAPTER ONE
INTRODUCTION
1.1 BRIEF HISTORY OF STUDENT INDUSTRIAL WORK EXPERIENCE
SCHEME (SIWES)
The early phase of science and technology in Nigeria was characterized
by the theoretical lectures in polytechnics and universities which have proven to
be an ill method of teaching. Students in Universities and Polytechnics graduate
with little or no technical experience in their course of study. In the same vein,
students’ inability to contribute to the society is hampering the growth and
development of our country. It was in this view that SIWES was introduced to the
Industrial and Educational sector.
SIWES is an acronym for Student’s Industrial Work Experience Scheme. SIWES
was established in the year 1973 in order to improve the standard of education in
Nigeria in order to achieve the needed technological advancement. Economists
being able to evaluate the role technology plays in a country’s economy
concluded that for an economy to grow and develop there be advancement in the
technology sector of the country.
SIWES was solely funded by ITF (Industrial Training Funds) during it early
stage not until it was difficult to continue for economic stress, then the
responsibility was shared between Industrial Training Funds (ITF) and the Federal
Government. The Federal Government took over the funding of the scheme and
Industrial Training Funds took over the managerial position by managing the
funds given to them by the Federal Government in order to sustain the scheme.
The effective management of Student’s Industrial Work Experience Scheme
(SIWES) has been as a result of the cooperation and well played roles of the
Federal Government, ITF, Supervising agencies.
There are basically two types of computer programming languages given below:
The programming languages that are very close to machine code (0s and 1s) are called
low-level programming languages.
machine language
assembly language
Machine Language
The instructions in binary form, which can be directly understood by the computer
(CPU) without translating them, is called a machine language or machine code.
The only advantage of machine language is that the program of machine language runs
very fast because no translation program is required for the CPU.
Assembly Language
It is another low-level programming language because the program instructions
written in this language are close to machine language.
Assembly language is also known as second generation of programming language.
With assembly language, a programmer writes instructions using symbolic
instruction code instead of binary codes.
Symbolic codes are meaningful abbreviations such as SUB is used for substation
operation, MUL for multiply operation and so on. Therefore this language is also
called the low-level symbolic language.
The set of program instructions written in assembly language are also called as
mnemonic code.
TYPES OF NETWORKS
1. LAN (Local Area Network):
A local area network (LAN) is a collection of devices connected together
in one physical location, such as a building, office, or home. A LAN can be small or
large, ranging from a home network with one user to an enterprise network with
thousands of users and devices in an office or school. A LAN comprises cables,
access points, switches, routers, and other components that enable devices to
connect to internal servers, web servers, and other LANs via wide area networks.
The rise of virtualization has also fueled the development of virtual LANs, which
enable network administrators to logically group network nodes and partition
their networks without a need for major infrastructure changes. For example, in
an office with multiple departments, such as accounting, IT support, and
administration, each department's computers could be logically connected to the
same switch but segmented to behave as if they are separate. E.g school, offices
etc.
CHAPTER FOUR
4.1 NETWORK COMPONENTS
1. End devices:
A source or destination device in a networked system. For example,
a user's PC is an end device, and so is a server. Network switches,
routers and other equipment work in between to enable messages to
Network media refers to the communication channels used to
interconnect nodes on a computer network. E.g Tablets, laptops,
smartphones, desktop, smart TV etc.
2. Intermediary devices:
Intermediary devices connect the individual hosts to the network
and can connect multiple individual networks to form an internetwork.
Examples of intermediary network devices are: switches and wireless
access points (network access) routers (internetworking) You connect
your end devices to your intermediary device.
3. Media (Channel):
Network media refers to the communication channels used to
interconnect nodes on a computer network. Typical examples of
network media include copper coaxial cable, copper twisted pair cables
and optical fiber cables used in wired networks, and radio waves used in
wireless data communications networks. E.g copper wire, fibre optics
and wireless
4.2 NETWORK MODELS
1. Client-server model:
Client-server model is a distributed application structure that
partitions tasks or workloads between the providers of a resource or
service, called servers, and service requesters, called clients. The client
relies on sending a request to another program in order to access a
service made available by a server. The server runs one or more
programs that share resources with and distribute work among clients.
The client server relationship communicates in a request–response
messaging pattern and must adhere to a common communications
protocol, which formally defines the rules, language, and dialog patterns
to be used. Client-server communication typically adheres to the TCP/IP
protocol suite.
2. Peer-to-peer model:
The peer-to-peer model (P2P model) is a non-hierarchical system of
exchange, transfer or transmission. P2P is commonly spoken of in
relation to networks. Peer-to-peer networking is a decentralized
communications model in which each party has the same capabilities. It
is a distributed application architecture that partitions tasks or
workloads between peers. Peers are equally privileged, equipotent
participants in the application. They are said to form a peer-to-peer
network of nodes.
Subnet mask identifies the network in which the host is connected. It is a 32-
bit number created by setting host bits to all 0s and setting network bits to all 1s.
In this way, the subnet mask separates the IP address into the network and host
addresses. The phrase “mask” is applied because the subnet mask essentially uses
its own 32-bit number to mask the IP address.
This is a basic network topology and there are network addresses assigned to
each of the router and each of the switch and after configuring this topology, the
whole pc in this topology will be assigned an Ip address, subnet mask, default
gateway and dns server.
CHAPTER FIVE
5.1 SUMMARY
A network is a system, or collection of systems, that facilitates the
exchange of resources from one point to another. This is a fancy way of saying
that a network is the sum of the parts connecting two or more points. Examples
of networks include the subway, the highway system, the telephone system, and
the Internet.
A network is made up of physical and logical components. The physical
components are the cables and network hardware devices, such as switches. The
logical components of a network are the frames and data carried by and across
the network.
Networks have two points which are: The source and destination, also known as
the origination and termination points (respectively).
There are three modes of transmission between origination and termination
points: simplex (one-way) mode, half-duplex mode (two-way, but not at the same
time), and full-duplex mode (two-way, at same time).
There are three major types of networks. The distinguishing characteristic of each
network types is the geographic range covered by the network:
LANs cover a small geographic range which is the area within an office
building, for instance.
MANs cover a broader geographic range than LANs which is the area of a
city, for instance.
WANs cover a broad geographic range which is an expanse across several
states or countries, for instance.
The design, engineering, and implementation of a network are based on the
application of network models and standards. A network model is a guiding
principle in network communications, whereas a network standard is a network
communications law. A vendor's special use of a standard is called a proprietary
feature or proprietary implementation. Another example of proprietary feature is
a product a vendor implements that is not based on a standard at all.
5.2 REFERENCE
www.wikipedia.com
www.geeksforgeeks.com
www.cisco.com
www.techtarget.com
www.flylib.com
www.beginnersbook.com
www.studytonight.com
www.webeduclick.com
www.tutorialspoint.com
www.guru99.com