0% found this document useful (0 votes)
57 views

Siwes Report - Shola

Project report on artificial intelligence

Uploaded by

Adewusi Samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Siwes Report - Shola

Project report on artificial intelligence

Uploaded by

Adewusi Samuel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

A

TECHNICAL REPORT

OF

STUDENT INDUSTRIALWORK EXPERIENCESCHEME (SIWES)

HELD AT

DIRECTORATE OF INFORMATION AND TECHNOLOGY,


EKITI STATE UNIVERSITY ADO EKITI, EKITI STATE, NIGERIA

WRITTEN BY:

ADEWUSI SAMUEL OLUSHOLA

(MATRIC NO: 2009003019)

SUBMITTED TO:

DEPARTMENT OF COMPUTER SCIENCE,

FACULTY OF SCIENCES,

EKITI STATE UNIVERSITY, ADO EKITI ,

EKITI STATE.

IN PARTIAL FULFILMENT FOR THE AWARD OF BACHALOR OF


SCIENCE (B.SC COMPUTER SCIENCE)

FROM 31ST JANUARY TO 31TH JULY 2024.


DECLARATION

I, Adewusi Samuel Olushola with matriculation number 2009003019 hereby


declare that I undergo six full months of Industrial Training Programme at
Directorate of Information and Technology University of Ekiti State University,
Ado-Ekiti, Ekiti State and that this report is written by me to the best of the
practical knowledge I gained during the course of the training programme.

---------------------------------------- ----------------------------------------

Student Name/Matric Number Sign.


DEDICATION

I dedicate this report to God Almighty who gave me the grace and strength to

finish my SIWES program successfully and also for providing all the necessary

resources
ACKNOWLEDGEMENT

ACKNOWLEDGEMENT

I am grateful to GOD Almighty, who granted me the grace, strength and

knowledge to go through my period of Industrial attachment successfully.

My sincere appreciation and heartfelt gratitude goes to my supervisor who came


not only to supervise me but also to check if the organization is good for my
SIWES.

My appreciation also goes to all my departmental lecturers who have been of


help all through. To my wonderful family and friends, words cannot quantify
the depth of my gratitude. Thank you for your love, support, ve supported,
encouraged and

prayed for me. May GOD almighty accept your prayers and encouragement
throughout this process. My special appreciation also goes to those who are not
mentioned here, but God will award you and grant you all your heart desires.

Lastly, I say a big thanks to the Director at the Directorate of ICT, my industrial
base supervisor; other ICT staff, you’ve been a pillar of support during my time
at the ICT. Thank you all and GOD bless you all.
TABLE OF CONTENT

DECLARATION

DEDICATION

ACKNOWLEDGEMENT

CHAPTER ONE

1:0 Introductions

1:1 Background

1:2 Objectives of SIWES

CHAPTER TWO

2:0 Description of the establishment of attachment.

2.1 Location and brief history of establishment

2.2 Objectives of establishment

2.3 Organizational structure

2.4 Departments/units in the establishment and their functions

CHAPTER THREE
Work Experience
3.0 Networking
3.1 Network Topology

3.2 Transmission Media


3.3 Network Equipment

3.4 IP Addressing

3.5 Troubleshooting skills

CHAPTER FOUR

5:0 Summary, conclusions and recommendation

5.1 Summary of attachment activities

5.2 Suggestions for improvement of the scheme


CHAPTER ONE

1.0 INTRODUCTION
1.1 BACKGROUND

SIWES Programme is one of the industrial training

fund) (ITF) program. It was created purposely to give

Nigerian students studying occupationally related

courses in higher institutions the experience that would

supplement their theoretical learning. SIWES unit in the University Maiduguri

was established in the year 1986 as an industrial coordinating unit catering for

mostly science and some art-based students on industrial attachment. The

foundation staff were four (4) that comprised an industrial coordinator who is

responsible to the Vice Chancellor for the day to day running of the affair of the

office, a secretary/typist and an office assistant. SIWES unit was finally and

officially commissioned on July, 2006.

As an accreditation requirement by the National Universities Commission

(NUC) the unit was formally upgraded to directorate under the leadership of the

Vice Chancellor, Professor Ibrahim Abu-Bakr Njodi. Over the years the

clientele student’s population has increased. The directorate has been doing its

work with significant impact on students.


SIWES was established by ITF in 1973 to solve the problem of lack of adequate

practical skills preparatory for employment in industries by Nigerian graduates

of tertiary institutions.

The scheme exposes students to industry based skills necessary for a smooth

transition from the classroom to the world of work. It affords students of tertiary

institutions the opportunity of being familiarized and exposed to the needed

experience in handling machinery and equipment which are usually not

available in the educational institutions.

Participation in industrial training is a well-known educational strategy.

Classroom studies are integrated with learning through hands-on work

experiences in a field related to the student’s academic major and career goals.

Successful internships foster an experiential learning process that not only

promotes career preparation but provides opportunities for learners to develop

skills necessary to become leaders in their chosen professions.

One of the primary goals of SIWES is to help students integrate leadership

development into the experiential learning process. By integrating leadership

development activities into the industrial training experience, we hope to

encourage student to actively engage in non profit management as a

professional career objective. Participation in SIWES as becomes a necessary

pre-condition for the award of diploma and degree certificate in specific

discipline in most institutions of higher learning in the country, in accordance to

the education policy of government.


1.2 OBJECTIVES OF SIWES

 To .provide students with relevant practical experience.


 To satisfy accreditation requirements set by the Nigerian Universities
Commission (NUC)
 To familiarize students with typical environments in which they are likely to
function professionally after graduation.
 To provide student an opportunity to see the real world of their discipline
and consequently bridge the gap between the University work and actual
practice.
 To change the orientation of students towards labour market when seeking
for job.
 To help students access area of interest and suitability for their chosen
profession.
 To enhance students contact for future employment
 To provide access to equipment and other facilities that would not normally
be available in the University workshop
 To enlist and enhance industry involvement in university education.
 Summarily the objective of the Student Industrial Work Experience Scheme.
 To solve, the problem of inadequate practical skills, preparatory for
employment in industries by Nigerian graduates of tertiary institution.
 To promote and encourage the acquisition of skills in industry and
commerce, with a view of generating a pool of indigenous trained manpower
sufficient to meet the needs of the economy.
CHAPTER TWO

2.0 DESCRIPTION OF THE ESTABLISHMENT OF ATTACHMENT


2.1 LOCATION AND BRIEF HISTORY OF ESTABLISHMENT
The Directorate of Information and Technology situated in the school campus
beside the teaching facility ETF Ile-Eye

The Directorate started off as a small Computer Centre equipped with a couple
of IBM clones in 1984.Initially housed in the Department of Mathematical
Sciences, from 1984 through 1990, the Centre grew steadily in both
infrastructure and staff, ultimately becoming autonomous in 1990.

The Centre gained the status of a Directorate in 2013 and now boasts a staff
strength of over twenty qualified ICT professionals working harmoniously to
attain the lofty ICT ideals of the University.

The Directorate of ICT is poised to aid Ekiti State University in achieving her
strategic goals by aligning Information Technology strategies with the wider
strategic mission of the University, delivering excellent technological services
to support the University’s core educational, administration and research
operations.

2.2 CORE VALUE AND VISION OF ESTABLISHMENT


Core Values:
Defining IT policies: The Directorate in conjunction with relevant university
bodies will continue to identify and define IT policies that improves IT
experience for users in the university.
Communication: Enable seamless collaboration across various units of the
university and promote free flow of information through organizational levels.
Support: Provide excellent and prompt support for IT services and installations
ensuring rapid resolution of issues and maintaining efficiency of existing IT
infrastructure.
Maximum resources utilization: maximize distribution of available resources
(funds, technology and personnel) to achieve the mission and vision of the
Directorate.
Vision:
The Directorate has a vision to:
1. Drive the university towards being a foremost university not only in Nigeria
but globally.
2. Position the university as a leader in Information Technology and the
deployment of innovative technical services.
3. Provide effective IT services that will improve the knowledge acquisition
process via teaching, learning and research

2.3 OBJECTIVES OF ESTABLISHMENT


The following are the objectives of the establishment:
 To provide quality internet service to both members of staff and students of
the institution.
 To make research easy for members of staff and students.
 To ensure adequate interaction between lecturers and students through online
teaching and forums.
To also provide wireless dimension to ensure location flexibility to all the
university community.

2.4 OFFICIALS OF ESTABLISHMENT

NAME QUALIFICATIONS DESIGNATION


Falemu E. K. HND (Elect. Computer), Coordinator
PGDCS, M.Tech , MNCS,
MCPN
Ogunlusi M. K. B.Sc. Ed (Computer Science) Assistant Chief Operations
MNCS, MCPN Manager
Olatunji O. A. B.Sc. Ed (Computer Science) Operations Manager
MNCS, MCPN
Ogunleye T. T. B.Sc. (Computer Science) MCP, Principal Network
MCSA, MCPN, CITP, MNCS Administrator
Eweje Ayodeji B.Eng (Elect/Elect) Network Administrator I
Anuyah Ejiro B.Eng (Mech. Eng.)Web Programmer I/Webmaster
Developer/Application
Developer
Aroge T. K. B. Tech (Computer Science) Technologist II
Tenibiaje M.O. B. Sc (Computer Science) Programmer I
M.Sc(Computer Systems
Engineering)
Ajileye F.O. B. Sc (Computer Science) Network Administrator II
RHCSA, CEH,ITIL, ITSM
Osesusi S.R B. Sc (Computer Science) Network Administrator II
CCNA
Imohi E. B. Sc (Computer Science) Programmer I
MCSD
Davies Noel B. Eng. (Elect Elect) Principal Technologist
Famodimu C.O HND Sec. Admin,Diploma Principal Personal Secretary
(Comp. Sci.)
Babayemi F. O. B.Sc (Accounting), Cert. in Data Higher Data Processing
Processing, 35&50 WPM Officer
Afolarin S. O. Diploma (Computer Science) Higher Data Processing
Officer
Aladejana A. O. Diploma (Computer Science), Higher Data Processing
HND (BFN), PGD (Financial Officer
Management)
Amodun J. O. ND (Computer Tech.), B.Sc.Ed Computer Technician
(Computer Science)
Usman E. A. NTC, B.Sc.Ed Computer Technician
Idowu J. A. ND (Computer Tech.) Computer Technician
Ojo Y. B.Sc.Ed. (Agric) Clerical Officer I

2.5 UNITS IN THE ESTABLISHMENT AND THEIR FUNCTIONS


Following the Establishment of the ICT, the following are the unit under the
ICT
Network Support and Maintenance (NSM) Unit:
 Provide operational support and management of a campus wide network
 Undertake installation and monitoring of all network equipment
 Evaluate existing configurations and oversee the management of such
systems and designs for future expansion .

Management Information Support (MIS) Unit:

 Provide management with relevant statistics and information critical to


successful management of the University system by maintaining relevant
databases.
 Support management decision making through deployment of efficient
Decision Support Systems.
 Assist in integration of students’ academic and management records into the
ICT automation plan and policy.
 Manage and maintain the University Website and Portal.
 Develop and deploy in-house software packages as may be necessary to aid
management in the efficient performance of administrative functions.

Training And User Support (TUS) Unit:

 To assist in capacity building and personnel development through in-house


training programmes for university staff.
 Manage the cyber cafes established by the Directorate
 Provide operational support for students and members of staff of the
University.
CHAPTER THREE

WORK EXPERIENCE

3.0 NETWORKING

Network are component involve in connecting computer and application across


small and large distance.
Each computer on the network has access to the files and peripheral device
(such as printers or modems) on all the other computers on the network.

3.1 NETWORK TOPOLOGY


Common topology found in networking includes mesh topology star topology,
bus topology, ring topology, and others.
Network topology refers to the layout of the transmission medium and devices
on a network. Topologies use either a point to point or multipoint connection
scheme.

A connection scheme indicates how many devices are connected to a


transmission media segment or an individual cable.
An example of point-to-point connection scheme is a modem/ printer connected
to computer, direct cable connection between two computers.
An example of a multi point connection scheme is a star or bus topology
network.

Star Topology
This is a local area network topology where all the nodes are connected
individually to a central connecting device called a hub or switch. Signals travel
from the nodes to the hub which then sends signals to other nodes on the
network. A star topology network is scale able –i.e. it can be design and
redesign easily.
Bus Topology
A LAN topology where each node is connected to a single main bus cable, is
transmits data to all the nodes on the network. The bus is actually a series of
cable segments running from one node to the other. Break or faulty piece of
cable anywhere on the segment prevents all the computers on the segment from
being able to communicate.

Mesh Topology
This is a network topology where every node on the network has a separate wire
connecting it to every other node on the network. It provides each device with a
point-to-point connection to every other device in the network. This type of
network has a high fault tolerance because failure of one node does not affect
data transmission between other nodes.

At ICT the topology adopted is the mesh topology


3.2 TRANSMISSION MEDIA

• Wired media
• Wireless media

Wired Media
These are media which require the use of wires, lines and cables to transmit
communication signals. During my industrial training at NOC, I encountered
majorly three different types of wired network media namely:

Coaxial cable

A coaxial cable is an alternative for protecting data from noise. Coaxial cables
do not produce external electric and magnetic fields and are not affected by
them. This makes them ideally suited, although more expensive, for
transmitting signals.

Twisted pair cable

In a twisted pair there are eight copper wire that are coated with different
colours; the colours are mix/orange, orange, mix/blue, blue, mix/green, green,
mix/brown and brown.
These colours are very important when terminating cables. The two most
common ways of terminating Ethernet cables are:

(i) Straight-through method

(ii) cross-over method

In straight-through method, in any way you put in your cable, the colour
adopted at both ends must be the same.
In a cross-over method all you need to do is to terminate one end with a straight
rule method and the other end would be that pin ‘1’ goes to pin ‘3’ and vice-
versa, the pin ‘2’ then goes to pin ‘6’ and also vice-versa.
I got to know that a cross-over cable is used to connect two similar devices like
a PC to a PC while a straight through cable is used to connect different devices
e.g. a PC to a router.
Fibre optic cable

At the ICT the backbone upon which the network is built is fibre optic.

It is made of glass fibres instead of wire; it consists of a centre glass core


surrounded by several layers of protective material. The outer insulating jacket
is made of Teflon or PVC. The fibre optic cables transmit light rather than
electronic signals, thereby eliminating the problem of electrical interference.

Optical fibres come in two types:


• Single-mode fibres

• Multi-mode fibres

Single-mode fibres have small cores while


Multi-mode fibres have larger cores. Used for short-distance communication
links.
Wireless Media

To fully explore the wireless added dimension, Communication system


designers have sought to use wireless media to reduce infrastructure cost and
complexity, when compared to wired communication systems. There is no need
to construct miles of telephone line poles or cable trenches.

During my stay at the ICT I was able to interact with the following devices:

3.3 NETWORK EQUIPMENT

Ethernet Radio

Ethernet radio networks offer a new model of seamless scalability, transforming


wireless data communications. Ethernet radio networks route data through
multiple access points spread across large geographical areas. They are
connected through a dispersed network of nodes that ‘talk’ to each other to
share the network connection. Similar to the way packets travel around the
internet; dynamic routing capabilities in each device allow data to hop from
device to device until it reaches the destination..
Router

A Router is a networking device that forwards data packets between computer


networks. One or more packet-switched networks or sub networks can be
connected using a router. By sending data packets to their intended IP
addresses, it manages traffic between different networks and permits several
devices to share an Internet connection. A router has several interfaces by which
it can connect to several host systems. Routers are the devices that are operated
on the Network Layer of the OSI Model, these are the most common devices
used in networking.

How Router Work


A router determines a packet’s future path by examining the destination IP
address of the header and comparing it to the routing database. The list
of routing tables outlines how to send the data to a specific network
location. They use a set of rules to determine the most effective way to
transmit the data to the specified IP address.
To enable communication between other devices and the internet, routers
utilize a modem, such as a cable, fiber, or DSL modem. Most routers
include many ports that can connect a variety of devices to
the internet simultaneously. In order to decide where to deliver data and
where traffic is coming from, it needs routing tables.
A routing table primarily specifies the router’s default path. As a result, it
might not determine the optimum path to forward the data for a particular
packet. For instance, the office router directs all networks to its internet
service provider through a single default channel.
Static and dynamic tables come in two varieties in the router. The dynamic
routing tables are automatically updated by dynamic routers based on
network activity, whereas the static routing tables are configured
manually.

Router Network

Types of Router
There are several types of routers. Some of them are mentioned below:
Broadband Routers: These are one of the important kinds of routers. It is
used to do different types of things. it is used to connect computers or it is
also used to connect to the internet.
Wireless routers: These routers are used to create a wireless signal in your
office or home.
Wired Routers: Wired Router is used to connects multiple wired devices
using a Ethernet cable, It takes the transmission data from the modem and
distribute it to a further network, it is widely used in schools and small
offices.
Edge Routers: As the name indicates, these are located at the edges
usually connected to an Internet Service Provider, and distribute packets
across multiple packets.
Core Routers: Core routers distribute packets within the same network.
The main task is to carry heavy data transfers.
Virtual Router: They are implemented using a software on the virtual
machine , and they are more flexible and scalable.
Portable Routers: They are used to create private Wi-Fi and hence
designed for easy portability.
Functions of Router
The router performs below major functions:
Forwarding: The router receives the packets from its input ports, checks
its header, performs some basic functions like checking checksum, and
then looks up to the routing table to find the appropriate output port to
dump the packets onto, and forwards the packets onto that output port.
Routing: Routing is the process by which the router ascertains what is the
best path for the packet to reach the destination, It maintains a routing
table that is made using different algorithms by the router only.
Network Address Translation (NAT): Routers use NAT to translate
between different IP address ranges. This allows devices on a private
network to access the internet using a single public IP address.
Security: Routers can be configured with firewalls and other security
features to protect the network from unauthorized access, malware, and
other threats.
Quality of Service (QoS): Routers can prioritize network traffic based on
the type of data being transmitted. This ensures that critical applications
and services receive adequate bandwidth and are not affected by lower-
priority traffic.
Virtual Private Network (VPN) connectivity: Routers can be configured to
allow remote users to connect securely to the network using a VPN.
Bandwidth management: Routers can be used to manage network
bandwidth by controlling the amount of data that is allowed to flow
through the network. This can prevent network congestion and ensure that
critical applications and services receive adequate bandwidth.
Monitoring and diagnostics: Routers can be configured to monitor
network traffic and provide diagnostics information in the event of
network failures or other issues. This allows network administrators to
quickly identify and resolve problems.

Advantages of Router
Easier Connection: Sharing a single network connection among numerous
machines is the main advantage of router. This enables numerous people
to connect to the internet, boosting total productivity. In addition, routers
have connections between various media and network designs.
Security: Undoubtedly, installing a router is the first step in securing a
network connection. Because using a modem to connect directly to the
internet exposes your computer to several security risks. So that the
environment is somewhat secure, routers can be utilized as an
intermediary between two networks. While not a firewall or
antivirus replacement.
NAT Usage: Routers use Network Address Translation (NAT) to map
multiple private IP addresses into one public IP address. This allows for a
better Internet connection and information flow between all devices
connected to the network.
Supports Dynamic Routing: The router employs dynamic routing
strategies to aid in network communication. The internet work’s optimum
path is chosen through dynamic routing. Additionally, it creates collision
and broadcast domains. Overall, this can lessen network traffic.
Filtering of Packets: Switching between packets and filtering packets are
two more router services. A collection of filtering rules are used by routers
to filter the network. The packets are either allowed or passed through.

Disadvantages of Router
Slower: Routers analyze multiple layers of information, from the physical
layer to the network layer, which slows down connections. The same
issue can also be encountered when multiple devices are connected to
these network devices, causing “connection waiting”.
High Cost: They are more expensive than some other tools for systems
administration. This includes security, extension, and the focal point. As a
result, routers are typically not the greatest option for issues.
Need for configuration: The router must be properly configured to work
properly. In general, the more complex the intended use, the more
configuration is required. This requires professional installation, which
can add to the cost of buying a router.
Quality Issues: The time transitions are not always accurate. Even yet,
some modern devices use the 2.4GHz band, which is frequently
deactivated. These kinds of separations are frequently possible for those
who live in apartments and condominiums.
Bandwidth shortages: Dynamic routing techniques used by routers to
support connections tend to cause network overhead, consuming a lot of
bandwidth. This leads to a bandwidth shortage that significantly slows
down the internet connection between connected devices.
Switch

The Switch is a network device that is used to segment the networks into
different subnetworks called subnets or LAN segments. It is responsible for
filtering and forwarding the packets between LAN segments based on MAC
address.
Switches have many ports, and when data arrives at any port, the destination
address is examined first and some checks are also done and then it is processed
to the devices. Different types of communication are supported here like uni-
cast, multicast, and broadcast communication.
Switches are one of the most important things for transferring information
between different endpoints. Some of the benefits are mentioned below.
Switches are having full-duplex communication which helps in making
effective use of bandwidth.
Switches help to provide a wired connection to printers, IoT devices, wireless
points, and many more devices.
IoT Devices send data through Network Switches that help in making smarter
surroundings with the help of Artificial Intelligence.
Network Devices are made with the help of Switches that carry a large number
of traffic in telecommunication.
Types of Switches
Switches are mainly classified into the following types that are mentioned
below.
Virtual Switches: Virtual Switches are the switches that are inside Virtual
Machine hosting environments.
Routing Switches: These are the switches that are used to connect LANs.They
also have the work of performing functions in the Network Layer of the OSI
Model.
Unmanaged Switches: Unmanaged Switches are the devices that are used to
enable Ethernet devices that help in automatic data passing. These are generally
used for home networks and small businesses. In case of the requirement of
more switches, we just add more switches by plug and play method.
Managed Switches: Managed Switches are switches having more complex
networks. SNMP (Simple Network Management Protocol) can be used for
configuring managed switches. These types of switches are mostly used in large
networks having complex architecture. They provide better security levels and
precision control but they are more costly than Unmanaged switches.
LAN Switches: LAN (Local Area Network) Switches are also called ethernet
switches or data switches. LAN switches always try to avoid overlapping of
data packets in the network just by allocating bandwidth in such a manner.
PoE Switches: Power over Ethernet(PoE) are the switches used in Gigabit
Ethernets. PoE help in combining data and power transmission over the same
cable so that it helps in receiving data and electricity over the same line.
Smart Switches: Smart Switches are switches having some extra controls on
data transmissions but also have extra limitations over managed Switches. They
are also called partially managed switches.
Stackable Switches: Stackable switches are connected through a backplane to
combine two logical switches into a single switch.
Modular Switches: These types of switches help in accommodating two or more
cards. Modular switches help in providing better flexibility.
Advantages of Switches:
Prevents traffic overloading in a network by segmenting the network into
smaller subnets.
Increases the bandwidth of the network.
Less frame collision as the switch creates the collision domain for each
connection.
Disadvantages of Switches
It can not stop traffic destined for a different LAN segment from traveling to all
other LAN segments.
Switches are more expensive.
Features of Switches
 It operates in Data Link Layer in OSI Model.
 It performs error checking before forwarding data.
 It transfers the data only to the device that has been addressed.
 It operates in full duplex mode.
 It allocates each LAN segment a limited bandwidth.
 It uses Unicast (one-to-one), multicast (one-to-many), and broadcast (one-
to-all) transmission modes.
 Packet Switching techniques are used to transfer data packets from source to
destination.
 Switches have a more significant number of ports.

Antenna
It’s a device that aid and enhances the signal strength and quality. Antennas are
not used alone; it is always attached to something mostly to an antennas. An
antenna is of two types in terms of direction Directional and Omni-directional.
Directional beams signal in one direction while Omni- directional beams signals
in all direction. Antennas are better propagated horizontally.

Unidirectional antenna parabolic grid antenna


3.4 IP ADDRESSING
An IP address represents an Internet Protocol address. A unique address that
identifies the device over the network. It is almost like a set of rules governing
the structure of data sent over the Internet or through a local network. An IP
address helps the Internet to distinguish between different routers, computers,
and websites. It serves as a specific machine identifier in a specific network and
helps to improve visual communication between source and destination.
IP address structure: IP addresses are displayed as a set of four digits- the
default address may be 192.158.1.38. Each number on the set may range from 0
to 255. Therefore, the total IP address range ranges from 0.0.0.0 to
255.255.255.255.
IP address is basically divided into two parts: X1. X2. X3. X4
1. [X1. X2. X3] is the Network ID
2. [X4] is the Host ID
Network ID–
It is the part of the left-hand IP address that identifies the specific network
where the device is located. In the normal home network, where the device has
an IP address 192.168.1.32, the 192.168.1 part of the address will be the
network ID. It is customary to fill in the last part that is not zero, so we can say
that the device’s network ID is 192.168.1.0.
Hosting ID–
The host ID is part of the IP address that was not taken by the network ID.
Identifies a specific device (in the TCP / IP world, we call devices “host”) in
that network. Continuing with our example of the IP address 192.168.1.32, the
host ID will be 32- the unique host ID on the 192.168.1.0 network.
Version of IP address:
Currently there are 2 versions of IP addresses are in use i.e IPV4 and IPV6
IPV4 (Internet Protocol Version 4): It is the first version of Internet Protocol
address. The address size of IPV4 is 32 bit number. In this Internet Protocol
Security (IPSec) with respect to network security is optional. It is having
4,294,967,296 number of address still we are seeing a shortage in network
addresses as the use of network & virtual devices are increasing rapidly.
Classes of IPv4 Addresses
IPv4 which is 32bits has class ranges from class A-E
Class A
This Class address can only be between 0 and 127. All 0’s reserved for default
route and ‘127’ is reserved for trouble shooting –loop back, therefore in reality
Class A valid address range that can be assigned to host on a network is 10-
126
Class B
Class B address can only be between 172 – 191
Class C
Class address can only be between 192 – 223
Class A-C is used for unicast.
Class D and E
Class D (224-239) used for multicasting
Class E (240-255) for research purposes

IPV6 (Internet Protocol Version 6): It is the recent version of Internet


Protocol address. The address size of IPV6 is 128 bit number. In this Internet
Protocol Security (IPSec) with respect to network security is mandatory. It
allows 3.4 x 10^38 unique IP addresses which seems to be more than sufficient
to support trillions of internet devices present now or coming in future.
IP Address Types:
There are 4 types of IP Addresses- Public, Private, Fixed, and Dynamic. Among
them, public and private addresses are derived from their local network
location, which should be used within the network while public IP is used
offline.
Public IP address–
A public IP address is an Internet Protocol address, encrypted by various
servers/devices. That’s when you connect these devices with internet
connection. This is the same IP address we show on our homepage. So why the
second page? Well, not all people speak the IP language. We want to make it as
easy as possible for everyone to get the information they need. Some even call
this their external IP address. A public Internet Protocol address is an Internet
Protocol address accessed over the Internet. Like the postal address used to
deliver mail to your home, the public Internet Protocol address is a different
international Internet Protocol address assigned to a computer device. The web
server, email server, and any server device that has direct access to the Internet
are those who will enter the public Internet Protocol address. Internet Address
Protocol is unique worldwide and is only supplied with a unique device.
Private IP address–
Everything that connects to your Internet network has a private IP address. This
includes computers, smartphones, and tablets but also any Bluetooth-enabled
devices such as speakers, printers, or smart TVs. With the growing internet of
things, the number of private IP addresses you have at home is likely to
increase. Router needs a way to identify these things separately, and most things
need a way to get to know each other. Therefore, router generates private IP
addresses that are unique identifiers for each device that separates the network.
Static IP Address–
A static IP address is an invalid IP address. Conversely, a dynamic IP address
will be provided by the Dynamic Host Configuration Protocol (DHCP) server,
which can change. The Static IP address does not change but can be changed as
part of normal network management.
Static IP addresses are incompatible, given once, remain the same over the
years. This type of IP also helps you get more information about the device.
Dynamic IP address–
It means constant change. A dynamic IP address changes from time to time and
is not always the same. Internet Service Providers provide customers with
dynamic IP addresses because they are too expensive. Instead of one permanent
IP address, IP address is taken out of the address pool and assigned to you.
After a few days, weeks, or sometimes even months, that number is returned to
the lake and given a new number. Most ISPs will not provide a static IP address
to customers who live there and when they do, they are usually more expensive.

Functions of IP Addressing
• For location of a device on the network
• It is assigned to allow hosts on one network to communicate to hosts on
another network
• IPv4 address is 32 bits divided in to four octets or bytes using dot ’.’
3.5 TROUBLESHOOTING SKILLS
Troubleshooting is the process of finding problems and solving them.
Should a client unable to browse or unable to make calls via the IP phone, the
check begins with the cable being used if client is connected via LAN cable,
this is done using the LAN-cable tester, check the face plates to know if it is
working, check the patched panel and switches on the distribution rack where
they are kept. Ping the systems Ethernet port, ping the server etc.

LAN cable tester


This is used to test if a category cable has been well terminated, or develop a
fault.
CHAPTER FOUR

4.0 SUMMARY OF ATTACHMENT ACTIVITIES

The gains of this exercise are immense; that it was worth the while is grossly an
understatement. Being accorded another opportunity in life to be exposed to the
rudiments of work places outside the class room teaching is an experience of a
life time.

Furthermore, the exposure to practical tools, software and hardware had


engendered better understanding of lessons thought in the class room and
charted a course for career development in networking.

4.1 RECOMMENDATIONS & SUGGESTION FOR IMPROVEMENT


OF THE SCHEME

I put forward the following suggestions and recommendations for future


improvement of the scheme;

 Organizing workshops, seminars and symposium for students in various


faculties in other to keep the student abreast of new technologies and
innovations.
 Posting of students for SIWES should be done by the scheme to ensure
conformity with course of study.
 A mass enlightenment campaign should be carried out, to enable industries
and establishments know the importance of SIWES to the future of the
student and the society at large.
 The scheme should also try to enforce the act guiding the establishment of
the scheme, to serve as deterrent to those establishments who reject student
for IT.
 School Curriculum should be organized in such a way that the SIWES
exercise be carried out at a stretch of six months and not the intermittent
arrangement of three months twice.

4.2 CONCLUSION

The Student Industrial Work Experience Scheme (SIWES) plays a significant


role in human resource development, it helps students develop new skills and
enlightens them of what the present society holds for them after graduation and
helps them adapt accordingly.

You might also like