Muhammad Muhammad Kabir.docx

  • Uploaded by: Muhammad Kabir
  • 0
  • 0
  • July 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Muhammad Muhammad Kabir.docx as PDF for free.

More details

  • Words: 4,264
  • Pages: 36
STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

BY MUHAMMAD MUHAMMAD KABIR UG15/SCCS/1062

HELD AT NATIONAL INSTITUTE OF INFORMATION TECHNOLOGY (NIIT), ABUJA

A REPORT SUBMITTED TO THE DEPARTMENT OF MATHEMATICS, FACULTY OF SCIENCE, GOMBE STATE UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENT OF THE COMPLETION OF INDUSTRIAL TRAINING.

MARCH, 2019

i

DECLARATION I hereby declared that this work/experience is the product of my Industrial training effort, undertaken under the supervision of Malam Adamu Husaini and has not been presented and will not be presented elsewhere for the fulfillment of my Industrial Training requirement.

MUHAMMAD MUHAMMAD KABIR

________________

Name of Student

Signature

i

_______________ Date

CERTIFICATION/APPROVAL This is to certify that the report was carried out under my supervision.

Malam Adadmu Husaini Departmental Based Supervisor

___________________

___________________

Signature

Date

ii

DEDICATION This report is dedicated to the Almighty Allah for the strength and opportunity, my entire family for their support and encouragement.

iii

ACKNOWLEDGEMENT All Praise be to Allah the lord of the world, is with His favour, blessings and countless bounties upon us, that have spared my life from the beginning and to the end of my industrial training and may peace and blessing of Allah be upon my beloved noble prophet Muhammad (S.A.W), With a deep sense of appreciation, respect and gratitude, I want to say a big thank you to the Gombe State University SIWES Director for his relentless support toward the SIWES. I also like to thank my departmental SIWES Coordinator Malam Muhammed Kabir Ahmed as well as departmental based Supervisor Malam Adamu Husaini for their intellectual support, Institution based supervisor Dr. Nsir Charles. A of Biological sciences, Mr. Shola Oshilaja Managing Director NIIT Abuja, Mrs. Evans Amaka Ibezimako Center Head NIIT Abuja, Mr. Abel Bitrus my industrial based supervisor and all NIIT staffs that have made my stay a fruitful one. Nobody has been more important to me during my industrial training than my family members. I would like to thank my parents, whose love and guidance are with me in whatever I pursue. They are my ultimate role models.

iv

TABLE OF CONTENTS

DECLARATION ........................................................................................................................... i CERTIFICATION/APPROVAL ................................................................................................... ii DEDICATION ............................................................................................................................ iii ACKNOWLEDGEMENT ............................................................................................................ iv TABLE OF CONTENTS ............................................................................................................. v LIST OF TABLES ..................................................................................................................... viii LIST OF FIGURES .................................................................................................................... ix LIST OF ABBREVIATIONS ........................................................................................................ x CHAPTER ONE ......................................................................................................................... 1 INTRODUCTION .................................................................................................................... 1 1.0 INTRODUCTION TO SIWES ............................................................................................ 1 1.1 AIM AND OBJECTIVES OF SIWES ............................................................................. 2 1.2 BRIEF HISTORY OF MY INDUSTRIAL TRAINING PLACE ............................................. 3 1.2.1 ORGANIZATIONAL CHART OF NIIT ABUJA .......................................................... 4 1.2.2 SERVICES OFFERED ............................................................................................... 4 CHAPTER TWO ......................................................................................................................... 5 KNOWLEDGE ACQUIRED .................................................................................................... 5 2.0 WORK EXPERIENCE GAINED AT NIIT ABUJA ............................................................. 5 2.1 COMPUTER SUPPORT AND MAINTENANCE (COMPTIA A+) ................................... 5 2.1.1 SYSTEM UTILITIES AND TOOLS ......................................................................... 5 2.2 NETWORK SUPPORT AND MAINTENANCE (COMPTIA N+) ..................................... 8 2.2.1 DEFINITION OF NETWORKING ............................................................................ 8 2.2.2 NETWORK TYPES ................................................................................................ 9 2.2.4 CONNECTIVITY DEVICES .................................................................................. 11 2.2.5 NETWORK MODELS ........................................................................................... 12 2.2.6 IPV4 ADDRESSING SCHEME ............................................................................. 12 2.3 NETWORK SECURITY (COMPTIA S+)...................................................................... 14 v

2.3.1 INFORMATION SECURITY CYCLE .................................................................... 14 2.3.2 AUTHENTICATION METHODS ........................................................................... 16 2.3.3 CRYPTOGRAPHY ............................................................................................... 17 2.3.4

SECURITY POLICIES ....................................................................................... 18

CHAPTER THREE ................................................................................................................... 19 3.0 APPLICATION OF KNOWLEDGE ACQUIRED .............................................................. 19 3.1 SYSTEM ANALYSIS ................................................................................................... 19 3.1.1 REQUIREMENTS OF THE NETWORK ............................................................... 19 3.2 NETWORK DESIGN ................................................................................................... 19 CHAPTER FOUR ..................................................................................................................... 22 4.0 SUMMARY, CONCLUSION AND RECOMMENDATIONS ............................................. 22 4.1 SUMMARY .................................................................................................................. 22 4.2 CONCLUSION ............................................................................................................ 22 4.3 RECOMMENDATIONS ............................................................................................... 22

vi

vii

LIST OF TABLES Table 1:IPV4 Address Classes ......................................................................................14 Table 2: Information Security Assets .............................................................................15 Table 3: Building Segments and their Respective Network ID .......................................20 Table 4: IP Address Allocation for Ground Floor ............................................................21 Table 5: IP Address Allocation for First Floor.................................................................21

viii

LIST OF FIGURES Figure 1: Organizational Chart of NIIT Abuja ...................................................................4 Figure 2: Remote Desktop Connection ............................................................................7 Figure 3: Peer to Peer Network .......................................................................................9 Figure 4: Wide Area Network .........................................................................................10 Figure 5: Layers of the TCP/IP Model ............................................................................12 Figure 6: NIIT Network Diagram ....................................................................................20

ix

LIST OF ABBREVIATIONS 3DES:Triple Data Encryption Algorithm ................................................................................... 17 AES:Advanced Encryption Algorithm ....................................................................................... 17 Afrinic: African Network Information Center ............................................................................. 12 APNIC: Asia-Pacific Network Information Center ..................................................................... 12 ARIN: American Registry for Internet Numbers ........................................................................ 12 CAN: Controller Area Network ................................................................................................... 9 CD-ROMs:Compact Disc Read Only Memory ............................................................................ 8 CompTIA N+:CompTIA Network Plus ..................................................................................... 8 CompTIA S+:CompTIA Security Plus ................................................................................... 14 DES:Data Encryption Algorithm ............................................................................................... 17 GPS:Geographic Information System ...................................................................................... 17 IANA:Internet Assigned Number Authority ............................................................................... 13 IPV4:Internet Protocol Address version 4 ........................................................................... 12, 16 ITF: Industrial Training Fund ...................................................................................................... 1 LAN: Local Area Network ........................................................................................................... 9 MAC:Media Access Control ..................................................................................................... 17 MAN: Metropolitan Area Network ............................................................................................... 9 MMS:Master Mind Series ........................................................................................................... 4 NBTE: National Board for Technical Education .......................................................................... 1 NICs: Network Interface Cards ................................................................................................... 8 NUC: National Universities Commission .................................................................................... 1 PIN:Personal Identification Number ......................................................................................... 16 x

RC:Rivest Cypher..................................................................................................................... 17 RFID:Radio Frequency Identification........................................................................................ 17 RIR:Regional Internet Registry ................................................................................................. 12 SIWES:Student Work Experiance Scheme ................................................................................ 5 USB: Universal Serial Bus .......................................................................................................... 8 WAN: Wide Area Network .......................................................................................................... 9 DH:Diffie Hellman ............................................................................................................... 17, 23 OSI:Open Systems Interconnection ............................................................................. 12, 22, 23 RSA:Rivest Shamir Adleman ................................................................................................... 17

xi

CHAPTER ONE INTRODUCTION 1.0 INTRODUCTION TO SIWES The Students Industrial Work Scheme (SIWES) was initiated by the industrial training fund (ITF) in 1973, to serve as a medium through which theoretical and practical experience could be combined to better the Nigerian educational system. It is a tripartite programme involving the students, the Universities and Industries. It is funded by the Federal Government of Nigeria and jointly coordinated by the ITF and the National Universities Commission (NUC). It is a skill training programme designed to expose and prepare students of tertiary Institutions for the industrial work situation they are likely to meet after graduation. The scheme also affords the students the opportunity of familiarizing and exposing themselves to the needed experience in handling equipment and machinery. SIWES started in 1974 with 748 students from 11 institutions of higher learning. It increased to about 5,000 students from 32 institutions by 1978. The ITF, however, withdrew from the management of the scheme in 1979 due to logistic problems in the organization coupled with increased financial burden associated with the rapid expansion of SIWES. Consequently, the federal government funded the scheme through National University Commission (NUC) and National Board for Technical Education (NBTE) who managed SIWES for five years (19791984). The supervising agencies (NUC & NBTE) operated the scheme in conjunctions with their respective institution during this period.

1

1.1 AIM AND OBJECTIVES OF SIWES The aims and objectives of SIWES include the following:  To prepare students for the work situation they may likely meet after graduation.  To expose students to work methods and techniques in handling equipment, tools and machinery that is not available in their University.  To provide students an opportunity to apply theoretical knowledge in a real situation there by bridging between the Universities work and the actual practice.  To provide an avenue for student in Nigeria University to acquire industrial skill experience in their area of study.  To make the transition from the University to the world of work easier and thus enhancing students for later job placement after graduation.  To strengthen the involvement of employers of labour in the educational process by preparing university students for employment in industry.  To expose students to the right and proper altitude and the disciplinary measures to work.  To minimize the bewilderment experienced by students, particularly those from a nontechnological background, pursuing courses in science, engineering and technology with regard to different equipment, processes tools etc. available in industry.  To enable science, engineering and technical students appreciate work methods and gain experience in handling equipment and machinery which may not be available in their institutions.

2

 To prepare students to contribute to the productivity of their employers and national development immediately after graduation.  To provide an enabling environment where students can develop and enhance personal attribute such as critical thinking, creativity, initiative, resourcefulness, leadership, time management, presentation skills and interpersonal skills, amongst others.  To enhance student contact with potential employers while on training.  To enable Students Bridge the gap between the knowledge acquired in institutions and the relevant production skills required in work organizations.

1.2 BRIEF HISTORY OF MY INDUSTRIAL TRAINING PLACE NIIT was established in 1981, NIIT Limited, a global leader in Skills and Talent Development, offers multi-disciplinary learning management and training, delivering solutions to corporations, institutions, and individuals in over 40 countries. NIIT has three main lines of business across the globe- Corporate Learning Group, Skills and Careers Group, and School Learning Group. N I I T established its presence in N igeria by setting up an education centre in Ikeja, Lagos in 1999 and since then its affirmed support to prepare the youth in the country for lucrative IT careers. The scholarship has reached out to nearly 1.9 million students in the past 19 years. Since1999 N I I T has been involved in creation of skilled ICT workforce and has launched several initiatives in the country . NIIT Abuja is managed by Campus Technologies limited, it was established on August,2016 under Mr. Shola Oshilaja(Managing director).NIIT Abuja is a licensee of NIIT limited.

3

1.2.1 ORGANIZATIONAL CHART OF NIIT ABUJA

Managing Director

Centre Head

Counselor

Academic

Non Academic

Faculties/Teacher

Industrial Training Unit

Students

I.T Students

Security

Cleaners

Facility Monitor

Figure 1: Organizational Chart of NIIT Abuja 1.2.2 SERVICES OFFERED Some of the courses offered at NIIT Abuja are:MMS-Software Engineer,MMSInfrastructure

management,

Management,certificate

in

Diploma Network

in

Python,Diploma

Support

and

in

Server

Maintenance,Diploma

Infrasture in

Web

Development,Certificate in System Support and Maintenance and Diploma in Java among others.

4

CHAPTER TWO KNOWLEDGE ACQUIRED 2.0 WORK EXPERIENCE GAINED AT NIIT ABUJA Most of the aims and objectives of the student industrial work scheme (SIWES) were achieved to a great extend during the period of my industrial training although there is still more to learn regarding the practical aspect of my profession. It is an experience that one may look forward to have in the future. 2.1 COMPUTER SUPPORT AND MAINTENANCE (COMPTIA A+) A+ certification represents entry-level competency as a computer technician and is a vendor neutral certification that covers various technologies and operating systems. 2.1.1 SYSTEM UTILITIES AND TOOLS Windows contains a large number of tools and utilities that span across different categories. Each of these tools and utilities is designed to help users maintain and optimize the Windows OS. Tools and utilities in Windows span across multiple categories, such as: 2.1.1.1 DISK MANAGEMENT TOOLS I. II.

Defrag: The Defrag is a utility that arranges the data stored on a hard drive into contiguous blocks. Chkdsk: The ChkDsk tool helps to recover lost allocation units, caused by unexpected terminations of applications, such as in the event of sudden power disruption.

5

III.

Diskmgmt: When you plug in a hard drive into a computer, you need to perform certain disk management operations to make it work. Some of the tasks that can be performed using the Disk Management tool are: Create and delete partitions, Change the type of disk, Format partitions/volumes, Extend or shrink partitions etc.

2.1.1.2 DEVICE MANAGEMENT TOOLS 

Device Manager: Allows you to configure and control the devices that are part of your computer. You can either enable or disable the device



Print Management: Allows you to centrally administer for sharing printers on a network and managing print server and network printer tasks

2.1.1.3 SYSTEM MONITORING TOOLS o

Performance Monitor Is used to indicate the status of resources in a computer.

o Event Viewer: contains a set of different logs with information about the events that have occurred on your computer. This information helps to monitor the health of the system and diagnose issues. o Task Manager: is a handy utility used to perform many tasks in Windows, can be used to view: Process list, Resource usage of each process, Network status, Services

6

2.1.1.4 SYSTEM MANAGEMENT TOOLS Computer Management: Is used to run a number of Windows tools, such as: Task Scheduler, Event Viewer, Shared Folders, Local Users and Groups, Performance Monitor, Device Manager, Disk Management, Services 

Services: Displays the set of services that are present on a Windows system. Can be used to manage your services.



System Information Is used to provide detailed information about the system configuration. Can be used to view the following information: Hardware resources, Component, Software environment.



Remote Desktop Is a tool that allows a remote connection to be established between two computers

Figure 2: Remote Desktop Connection



Task Scheduler: Helps you to schedule tasks in the windows environment. You can either customize these tasks or schedule your own tasks. Using Task Scheduler, you can add, modify, import, disable, or delete a task

7

2.2 NETWORK SUPPORT AND MAINTENANCE (COMPTIA N+) Network+ is an entry-level certification that is used to measure skill as a network technician. During this Course I learnt the concept of networking including network connectivity devices, signal transmission methods, network models, networking Standards and network management. At the end of the course am able to design, set up, manage and troubleshoot networks. 2.2.1 DEFINITION OF NETWORKING A network is a collection of computing devices. These devices communicate by exchanging data over a wired or wireless medium. In a networked environment, you can share the following components: Data, applications, and services Devices such as modems, printers, Universal Serial Bus (USB) drives, and CDROMs To create a network, you require: at least two computing devices, Network Interface Cards (NICs) in each connected device, a network medium, either wired or wireless, and a network operating system.

8

Figure 3: Peer to Peer Network

2.2.2 NETWORK TYPES A computer network is classified into four types on the basis of its size: Local Area Network (LAN) Is a collection of computers and associated devices that share a common network medium. Occupies a very small area and can be set up at a low cost and contains minimum two computers. It is useful for sharing files and printers among users connected to a network. Metropolitan Area Network (MAN) Is a large computer network that extends to a campus such as that of a university or covers an entire city, it incorporates a number of LANs to form the network. It spreads to geographical areas smaller than that of a WAN. Controller Area Network (CAN) Is a network designed for the automotive industry, it connects devices, sensors, and embedded devices by using a serial bus. The devices in a CAN do not have addresses. Instead, nodes broadcast short messages by attaching identifiers unique to the network and is also popularly known as a Campus Area Network 9

Wide Area Network (WAN) Is a large computer network made up of smaller networks such as two or more LANs. The world’s most famous and largest WAN is the Internet. They are costly to set up. The smallest WAN can be formed by combining two LANs.A WAN formed by combining multiple LANs is shown in the given figure.

Figure 4: Wide Area Network

2.2.3 TRANSMISSION MEDIA A transmission medium is the means by which data can be exchanged and resources can be shared among the devices on a network. Each type of transmission medium has specific characteristics and advantages that make it suitable for specific networking requirements. There are two types of transmission media:

10

Wired (or guided): Wired media is the use of cables to connect the devices on a network. The cables transfer data and information among the network devices. Cables may use Metal wires that carry data in the form of electrical signals and Glass or plastic wires that use light pulses to carry data. Wired media are also called guided media. The two types of wired media used most commonly are: Copper media and Fiber optic cables. Wireless (or unguided): Wireless media: Uses radio waves, microwaves, or light pulses to carry data. Enables users in networks using wireless media to move around while they remain connected to the network. Are also called unguided media. In wireless media, data transfer is in the form of waves or pulses that do not travel in a closed, guided direction. 2.2.4 CONNECTIVITY DEVICES A hub: Works at Layer 1 of the OSI Model. Is used to connect multiple network devices and provide sharing of network resources and to extend the range of the Ethernet cable in networks A repeater: Regenerates a signal to improve the signal strength over long transmission distances. Can be used to exceed the limitations of various networking technologies regarding the segment length for signal transmission. A switch: Is a network connectivity device that connects nodes or different network devices so that they can form a network. Has a few ports (connectors), which connect different nodes and devices to the switch. It has a MAC address and it contains memory where it stores the MAC address of all the devices and computers connected to it. A router: is a networking device that connects multiple networks by using the same protocol. Sends data between networks by identifying the network addresses contained in the packets being sent

11

2.2.5 NETWORK MODELS The OSI Model: It was developed by ISO, it defines communication in an open system network. Divides the entire communication process into seven tasks. Each task is grouped into seven different layers.

Figure 5: Layers of the TCP/IP Model

TCP/IP model: Is a protocol stack used in networking, it supports two very popular protocols—TCP and IP. It contains four layers. The protocols and services included in the TCP/IP model are more practical to implement than those in the OSI Model. 2.2.6 IPV4 ADDRESSING SCHEME An IP address is a unique number that identifies a resource in a network. It allows nodes to connect and communicate over a network. Internet Assigned Numbers Authority manages, distributes, and ensures that every node on the Internet has a unique IP address. IP address allocation has been divided into sub registries, known as RIRs, for various geographical regions. Some of the RIRs currently in use are: Asia12

Pacific Network Information Center (APNIC), African Network Information Center (Afrinic), American Registry for Internet Numbers (ARIN) etc.

Reserved IPV4 Addresses Reserved on the basis of their usability in a network. Networks are categorized as private and public. IANA provides: The following three sets of blocks for assigning private network addresses: 10.0.0.0 to 10.255.255.255 for Class A 172.16.0.0 to 172.31.255.255 for Class B 192.168.0.0 to 192.168.255.255 for Class C The following IPv4 address ranges are reserved for public networks: 1.0.0.0 to 9.255.255.255 and 11.0.0.0 to 126.255.255.255 for Class A 128.0.0.0 to 172.15.255.255 and 172.32.0.0 to 191.255.255.255 for Class B 192.0.0.0 to 192.167.255.255 and 192.169.0.0 to 223.255.255.255 for Class C

13

Class

Range

Number of Networks Number of Hosts on each Network

A

1-127

127

16,777,214

B

128-191

16,384

65,534

C

192-223

2,097,152

254

D

224-239

Multicast

E

240-255

Reserved

Table 1:IPV4 Address Classes

2.3 NETWORK SECURITY (COMPTIA S+) Security+ is an entry-level vendor-neutral security certification that builds off of the network security knowledge covered by the Network+ certification. CompTIA Security + is all about Securing network devices and resources from unauthorized access, damage, loss or modification of information. 2.3.1 INFORMATION SECURITY CYCLE •

Information security refers to the protection of available information or information resources from: Unauthorized access, Attacks,Thefts,Data damage What to Protect?



The following table describes the information that needs to be secured in an organization and what protection is required by information security assets.

14

Information Security Assets

Protection Requirement

Data

From getting corrupt or from being accessed without authorization.

Resources

From being accessed without authorization.

Table 2: Information Security Assets

Goals of Security •

The primary goals or functions involved in the practice of information security include: –

Prevention: Preventing users from gaining unauthorized access to confidential information.



Detection: Detection occurs when a user is discovered trying to access unauthorized data or after information has been lost.



Recovery: A process to recover vital data from a crashed system or data storage devices.

Risks Risk is a concept that indicates exposure to the chance of damage or loss. Signifies the likelihood of a hazard or dangerous threat occurring. Is often associated with the loss of a system, power, or network, and other physical losses. Affects people, practices, and processes. Threats

15

A threat is any event or action that could potentially cause damage to an asset. Often in violation of a security requirement, policy, or procedure. Potential threats to computer and network security include: Unintentional or unauthorized access or changes to data, the interruption of services, and the interruption of access to assets, Damage to hardware, unauthorized access or damage to facilities. Vulnerabilities: A vulnerability is any condition that leaves a system open to harm. Vulnerabilities can be: Improperly configured or installed hardware or software, untested software and firmware patches, Bugs in software or operating systems, the misuse of software or communication protocols, poorly designed networks Intrusions An intrusion occurs: When an attacker accesses a computer system. When the system is vulnerable to attacks. An intrusion may include: Physical intrusions, Host-based intrusions, Network-based intrusions Attacks An attack is a technique used to exploit a vulnerability in any application or computer system without the authorization to do so 2.3.2 AUTHENTICATION METHODS Tokens A token is a physical or virtual object. A token can store Personal Identification Numbers (PINs), Smart Cards 16

A smart card is an example of token-based authentication. It is a plastic card containing an embedded computer chip and it require a smart card reader. Biometrics Biometrics are authentication schemes based on the identification of individuals by their physical characteristics, Examples may include: A fingerprint scanner, a retinal scanner, a hand geometry scanner, Voice-recognition, Facial-recognition software Geolocation Geolocation provides an extra level for authentication. It determines physical location from an IP address, MAC address, RFID, GPS coordinates, etc. In this type of authentication method, authentication requests from approved locations are granted 2.3.3 CRYPTOGRAPHY Cryptography it is a science of hiding information. It protects sensitive information and Symmetric encryption communications from unauthorized access Encryption and Decryption •

Encryption: Converts data from plaintext form to ciphertext form.



Decryption: Converts data from ciphertext form to plaintext form.

Type of Encryption Symmetric Encryption: is a two-way encryption scheme. It uses same key to perform encryption and decryption. It is vulnerable if the key is lost or compromised. Some of the common algorithms used for symmetric encryption include: DES, 3DES, AES, Rivest Cipher (RC)

17

Asymmetric encryption: Uses public and private keys to perform encryption and decryption. It is more secure than the symmetric encryption and slower than symmetric algorithms. Some of the common algorithms used for asymmetric encryption include: RSA, DH etc.

2.3.4 SECURITY POLICIES •

A security policy: Defines how security will be implemented within a particular organization. Describes the means the organization will take to protect the confidentiality, availability, and integrity of sensitive data and resources. Provides functions similar to a government's foreign policy. Some of the common security policy include: Acceptable use policy, Privacy policy, Audit policy, Extranet policy, Password policy

18

CHAPTER THREE 3.0 APPLICATION OF KNOWLEDGE ACQUIRED With the knowledge acquired am able to design and implement a network for an organization. 3.1 SYSTEM ANALYSIS NIIT Abuja is an IT training institute that needs to set up the desired IT infrastructure in its center. To achieve this, a network has been designed to robust, scalable and to be delivered on time. 3.1.1 REQUIREMENTS OF THE NETWORK For the envisioned network the following are required User Desktops: 90 desktops with core i3 processors, 2GB RAM, 500GB hard drives and NIC Switch: Ten (10) NETGEAR Intelligent Edge M4100 Series Cable Connectors: RJ-45 connectors Cable: CAT 5e cable for the required length Access Point: 2 access point 3.2 NETWORK DESIGN

19

Network Design

Figure 6: NIIT Network Diagram

Network Addressing Segment

Network ID

Subnet Mask

Ground Floor

192.168.1.128

255.255.255.192

First Floor

192.168.1.0

255.255.255.128

Table 3: Building Segments and their Respective Network ID

IP ADDRESS ALLOCATION FOR GROUND FLOOR Parameter

Value

IP Address of Router

192.168.1.129

Reserved IP Address

192.168.1.130 – 192.168.1.140

Class A1

192.168.1.141-192.168.1.155

Class A2

192.168.1.156 -192.168.1.171

20

Network Laboratory

192.168.1.172 -192.168.1.187

Table 4: IP Address Allocation for Ground Floor

IP ADDRESS ALLOCATION FOR FIRST FLOOR Parameter

Value

IP Address of Router

192.168.1.1

Reserved IP Address

192.168.1.1– 192.168.1.10

Class B1

192.168.1.11-192.168.1.26

Class B2

192.168.1.27 -192.168.1.42

Class C1

192.168.1.43 -192.168.1.58

Class C2

192.168.1.59 -192.168.1.74

Class C3

192.168.1.75 -192.168.1.90

Table 5: IP Address Allocation for First Floor

21

CHAPTER FOUR 4.0 SUMMARY, CONCLUSION AND RECOMMENDATIONS 4.1 SUMMARY During my stay at NIIT Abuja I enrolled into three courses: hardware maintenance (CompTIA A+), networking (CompTIA N+) and network security (CompTIA S+) which I was able to complete all the three courses and sat for their exams and I passed the exams, for which I will be given certificates. 4.2 CONCLUSION This industrial training has awarded me the opportunity of coming in contact with the practical aspects of different relevant aspects of computer science and information Technology in general, by integrating both the practical and theoretical knowledge. It tends to broaden the scope of understanding. 4.3 RECOMMENDATIONS 

The siwes supervision of students at their respective placement areas should be more frequent, to serve as motivation to the students and also a way to track the progress of the students during the training.



The industry should attach students to the functional and relevance sections of the industry



Department can also make provision of manual guide to its industrial training students



The department can recommend specific industries after due consultation to its students.

22

23

24

Related Documents

Muhammad
December 2019 71
Muhammad
December 2019 89
Muhammad
May 2020 54
Muhammad
June 2020 43
Muhammad
May 2020 43
Muhammad
July 2020 31

More Documents from ""