I.T Report
I.T Report
I.T Report
TECHNICAL REPORT
ON
STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)
UNDERTAKEN AT
APTECH COMPUTER EDUCATION, GRAFIL HOUSE,
AWKA, ANAMBRA STATE.
BY
OKAFOR PROMISE CHIMDINDU
REGISTRATION NUMBER: CE/17/071
SUBMITTED TO
THE DEPARTMENT OF COMPUTER ENGINEERING
FACULTY OF ENGINEERING
MADONNA UNIVERSITY, AKPUGO
IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE
AWARD OF BACHELOR OF SCIENCE IN
COMPUTER ENGINEERING
JANUARY 2022.
1
DEDICATION
This report is dedicated to the almighty God, my beloved parents CHIEF and MRS A. O. Okafor
and my siblings for their unconditional love and support in my life.
2
ACKNOWLEDGEMENT
I wish to express my profound gratitude to God almighty for his guidance,goodness and grace
throughout my life .
I also appreciate the entire staff of aptech computer education, grafil house, awka, anambra state
for making my industrial training a huge success.
My special gratitude to my HOD ,for his effort to see that this work saw the light of
the day. I appreciate all my amazing lecturer in the department. For the knowledge they impacted
in me, to them all I say be blessed. Amen.
My regards to my amazing parents , CHIEF and MRS A. O. OKAFOR , who finanacially
supported my educational pursuit, I say remain blessed and to my beloved siblings , I love you
all, you are the best.
3
TABLE OF CONTENT
TITLE PAGE……………………………………………………………...I
DEDICATION……………………………………………………………..II
ACKNOWLEDGEMENT…………………………………………………III
TABLE OF CONTENT………………………………………………….IV
ABSTRACT……………………………………………………………….VI
4
2.6.4 HARD DISK
2.6.5 FORMATTING AND PARTITIONING HARD DISK
2.6.6 PRINTER
2.6.7 MEMORY
2.6.8 BOOTING A COMPUTER
2.6.9 BASIC TROUBLESHOOTING
5
ABSTRACT
6
CHAPTER ONE: ABOUT SIWES
SIWES was established by Industrial Training Fund (ITF) in 1973 to solve the problem of
lack of adequate practical skills preparatory for employment in industries by Nigerian
graduates of tertiary institutions.
The Scheme exposes students to industry based skills necessary for a smooth transition from
the classroom to the world of work. It affords students of tertiary institutions the opportunity
of being familiarized and exposed to the needed experience in handling machinery and
equipment which are usually not available in the educational institutions.
Before the establishment of the scheme, there was a growing concern among our Industrialists
that graduates of our Institutions of Higher learning lacked adequate practical background
studies preparatory for employment in Industries. Thus, the employers were of the opinion
that the theoretical education going on in higher institutions was not responsive to the needs of
the employers of labour.
The Industrial Training Fund’s Policy Document No.1 of 1973 (ITF, 2002) which established
SIWES outlined the objectives of the scheme as follows; to provide an avenue for students in
institutions of higher learning to acquire industrial skills and experience during their courses of
study and prepare for industrial work situations that they are likely to meet after graduation. It
also aims at exposing students to work methods and techniques in handling equipment and
machinery that may not be available in their institutions. Part of the objectives of SIWES is to
make the transition from school to the world of work easer and enhance students’ contacts for
later job placements and to provide students with the opportunities to apply their educational
knowledge in real work situations, thereby bridging the gap between theory and practice. It is
also to enlist and strengthen employers’ involvement in the entire educational process through
SIWES.
7
It is to provide an avenue for students in institutions of higher learning to acquire industrial
skills and experience during their courses of study; It prepares students for industrial work
situations that they are likely to meet after graduation; It exposes students to work methods and
techniques in handling equipment and machinery that may not be available in their institutions; It
makes the transition from school to the world of work easier and enhance students’ contacts for
later job placements; It also provides students with the opportunities to apply their educational
knowledge in real work situations, thereby bridging the gap between theory and practice; It also
enlists and strengthen employers’ involvement in the entire educational process through SIWES.
The scheme is aimed at bridging the existing gap between theory and practice of Sciences,
Agriculture, Medical Sciences (including Nursing), Engineering and Technology, Management,
and Information and Communication Technology and other professional educational
programmes in the Nigerian tertiary institutions.
Aptech Ltd is a pioneer in the non-formal vocational training business with a significant global
presence. Aptech has over three decades of strong experience in vocational skilling. Ever since
its commencement in 1986 and with a current presence of over 1000 centers globally, Aptech has
effectively ventured into diverse sectors ranging from IT training, media & entertainment, retail
& aviation, beauty & wellness, and pre-school segment amongst others.
A leading global career education company, Aptech has a legacy of over 32 years in I.T. education.
Aptech has a presence in more than 40 countries and has trained over 7 million individuals in more than 1,300
training centers worldwide.
8
Aptech also includes corporate training and assessment solutions for corporates and academic institutions, and
custom content development for overseas and domestic customers.
Aptech courses are designed to impart knowledge in all areas of Information Technology. The Aptech
portfolio consists of a comprehensive range of courses in instructor-led and technology-delivered formats such
as web-based training. Aptech’s international presence offers world-class education programs, methodologies,
technologies, and international qualifications. We enable people across the globe to use I.T. optimally and
efficiently through world-class I.T. training solutions. Today, Aptech students are working all over the world
building knowledge corporations, communities and knowledge societies.
9
CHAPTER TWO: THE HARDWARE
2.1 INTRODUCTION
This report entails everything that happened during my IT (Industrial Attachment) and
also brief information about the organization where I worked. This SIWES was a very
good initiative because it has added a lot of knowledge and technical skills to me.The
term computer has been borrowed from compute that means – to calculate. Whereas, initially
computer were use to perform arithmetic calculation as fast speed, now they are use to nearly
every field. You can use computer for banking application, word processing, desktop publishing,
weather forecasting, railway reservation, control of machines or robot in factories, scientific
research, etc. in brief a computer may be define as a device that receive some kind of data,
analysis it, and than applies a predefine set of instruction to it to produce some kind of output.
For instant evasion in the computer. The computer then analysis the data fed by the operator and
makes a reservation. Then it prints a ticked for you. The ticket is the output generated by the
computer based on the reservation request entered by the operator. It is also said that the
computer is a data processor, because it can receive, store, processes and retrieve any kind of
data. For instant you can store the names and addresses of all employees working in a company
in a computer file. Latter, you can ask the computer to print list of only those employees who
work in the accounts department
A computer system is a device that accepts information (input in form of digital data) and
manipulates it for some results based on a program or sequence of instruction on how the data is
to be processed.
10
SOFTWARE: This is a program or a series of instructions that tells a hardware how to
perform tasks.
I. INPUT
II. STORAGE
III. PROCESSING
IV. OUTPUT
V. CONTROL
For this functions to be executed tasks are assigned to various sections such as:
I. CPU (CENTRAL PROCESSING UNIT)
II. MEMORY
III. BUSES
IV. INPUT DEVICES
11
FIGURE 1: A DESKTOP COMPUTER.
12
FIGURE 2: A WORKSTATION COMPUTER .
13
FIGURE 3: A SEVER COMPUTER.
The system unit box houses the heart and brain of the computer. All electronic circuit, power
Supply, floppy drive(s), and hard drive(s) are housed in this box. The shape and the size of the
box may differ from the computer to computer. However, they all have the same electronic
circuit and parts inside. The storage unit of the memory of the computer is also in the same
box. The primary memory of the PC is housed on the electronic circuit board kept in this box.
These boards are not visible from the outside. The system unit box also houses the floppy disk
14
drive(s) and Hard disk drive(s) that from the secondary memory
2.6.1 MOTHERBOARD
The motherboard is a circuit on which all the electronic components of computer are
connected. This include both internal parts of the system unit like Processor, display card
of the monitor, sound card, memory etc and the connector of external parts like mouse,
keyboard, hard disk, floppy disk etc. The ̳ports‘ and ̳slots‘, which connect these
components, also exist in the motherboard. The circuits in the motherboard help in data
transfer among the components. Bios, RAM slots and Chipset are too mounted on the
15
motherboard.
Motherboard Components:
16
FIGURE 5: A MOTHERBOARD.
2.6.2 PROCESSOR.
One of the most important parts of computer called as heart of computer. The brain of a
computer is it processor. The processor in a modern computer is an Integrated Circuit (IC)
chip.
FIGURE 6: A PROCESSOR.
A chip of millions of transistors and capacitors which can process the data obtained through
input devices and transfer the result to the output units. Processors from different companies are
available today. Intel-PentiumIV, Xenon,Celeron, AMDAthlon, Cyrix M3 etc. are popular.
Arithmetic and Logic Unit & Control Unit (ALU & CPU)
The two main parts of a processor are Arithmetic and Logic Unit (ALU) and Control
Unit (CU).The function of the ALU is to do the processing and mathematical calculations of
the information obtained through input devices.
The control unit sorts this information and sends it to the different parts of the computer
like the manager of an office. The control unit organizes and coordinates various functions of
a computer.The orderly and fast functioning of a computer indicates the efficiencyof the
17
control unit.
1. Age: Every machine has its limits. A computer that is five years old or older is considered to be
in its grace years. They can just give up.
2. Heat: Overheating CPU's lead to a dead CPU. This can happen when the room temperature is
often above 80 degrees Fahrenheit and if the computer has an ineffective cooling mechanism
inside.
3. Overclocking or Stress: Not all CPU's are created equal. Don't make a dual-core do what an
eight-core is intended for. Overclocking has its place, but be careful to be realistic. Also, if a
game says it needs a certain minimum to run, don't run it on an under-clocked CPU. The same
goes for software for video or photo editing. If you want to over-stress your processor this way,
by all means, go for it, but otherwise, upgrade.
4. Electrical Power Surge: Whether it was the power supply going bad or lightning, any high
voltage spike can render a CPU useless. Be sure to have a surge protector and a battery backup
attached to your computer to help prevent this sort of thing from happening.
PROCESSOR HEATSINK
18
activity. This is also known as the processor fan.
Processor Socket: The processor socket is used to fix the processor in a computer. Different
kinds of motherboards are available today, depending upon the size and the number of pins in a
processor,
A computer system becomes complete only when different parts are put together and they
communicate properly. The connection of the parts within and outside the system unit is done
using ports or connectors. These ports are connected directly to the motherboard or through add-
on cards. The internal communication in a motherboard takes place through the tinycircuits
printed on it. we can connect a computer to another computer to an input-output device or to data
storage device. Let us study different kind of ports.
1) IDE Port:
Integrated device electronics (IDE) is used to connect a hardisk, CDROM drive, CD-
Writer or a DVD drive to a motherboard. There are two such ports in a motherboard-primary and
secondary. Two devices can be connected to each port.
19
FIGURE 9: AN IDE PORT.
2) Serial port:
Serial Port is used to connect the mouse & modem. They are called COM1 &
COM2.‘COM‘ is the short form of communication. Usually in a communication port there
are either 9 or 25 pins.
20
3) Parallel Port:
In a parallel port, there are holes to connect pins. Subsidiary gadgets like printer,
scanner etc. are connected through the parallel ports.
4) USB Port:
Universal serial bus (USB) port is a kind of port available in modern computers. Many
devices can be connected in series on the same USB. In comparison with serial and parallel
ports, a large amount of data can be transferred at a very high speed through USB ports.
All peripherals like printer, modem and scanner are now available in versions that can be
connected to the USB port.
A hard disk drive is a device with magnetic storage media that is enclosed on rigid
platters. The platters helps to store, read and write large amounts of data with the
following components
1) CASE
2) DRIVE MOTOR
3) PLATTERS
4) DRIVE HEADS
5) LOGIC BOARD
21
SIGNS OF HDD FAILURES
There are few steps users have to remember before formatting and partitioning a
hard disk s listed bellows:
1. Boot a system with the bootable floppy or CD
2. The Fdisk command in command prompt.
3. Now you got a message : Do you wish to enable large disk support (y/n)?[ ]
4. Press y then press enter
5. You got the screen having four option like:
(1) Create DOS partition or logical DOS drive.
(2) Set the active portion.
(3) Delete the partition or Logical drives
(4) Display the partition information.
(5) Enter your choice: []
6. Press 1 then Enter
7. Now you got the screen with Three option like :
(1) Create Primary Dos Partition
(2) Create Extended Dos Partition
(3) Create Logical Drive(s) in Extended Dos Partitions
22
(4) Enter Your Choice: [ ]
8. Enter 1 then Press Enter Then System asks you how much size you want to specify
for Primary Dos Partition. The user can give value size of Partition in to percentage
or in Numeric Value.
9. After create a Primary Partition make this Partition active using 2 option on main
screen.
10. Then Create Extended Dos Partition and Logical Drives in Extended drive into it.
Enter Volume Label when Necessary.
11. After Creation of Primary and Extended Dos Drives, Format All Drives that you
Created.
12. Then using Esc key goes out Fdisk command area.
13. Then find the volume label of CD – ROM, enter into and find setup path and
write setup, press enter; now installation of OS will start automatically.
2.6.7. PRINTERS
The printer is an output device that is used to print documents on paper. Various kinds of
printers are used with PCs.
The Dot Matrix Printer (DMP) contains a few tiny needles. There art 7 or 8 needles in a
low quality DMP and up to 24 needles in a high quality DMP. At the time of printing, as
the head moves from one end of the paper to other, these needles are fired selectively to
print different character or graphics. Dot Matrix Printers usually have a printing speed of
100 to 500 characters per second.
Inkjet / DeskJet printer are also fast becoming a popular choice for the use with the PCs. These
printer offers good quality and noiseless operation. These are non-impact types of printers that
print character are graphics by spraying very tiny drops on ink directly on to paper. The print
23
quality of these printers is much better as compared to DMPs. The typical print quality of these
printers is from 300 dots per inch (DPI) to 720 DPI. These printers also print color.
Laser printer are also being commonly used with a high – end PCs; particularly those used for
Desk-Top Publishing (DTP). The laser printers provides very high quality printout; typically in
the range of 300 DPI to 2400 DPI. The typical printing speed of laser printers is between 3 to 12
pages per minute.
A printer interface links the printer with the computer. Commands and data from the computer
are sent to the printer the through this interface. The printer produces character on the paper. One
situation in which the printed output ( known as hard copy ) is required when the output
produced at a distance from the user and may be at an undefined or inconvenient time as an off-
line batch processing system. Such the printing required a high-speed printing in a large
quantities and a typically employ a line printer.
24
25
CHAPTER THREE: MEMORY
PRIMARY MEMORY
It is called the main memory or the central memory. It is of two types – RAM and ROM.
RAM is essentially a read / writes memory. Information can be written into and read from
RAM. It is volatile in nature. i.e. It retains the stored information as long as power supply
is not switch off. It is usually sold and installed to the standard adding board called a Single
InLine Memory Module or SIMM. Ram can be bought separately in case you want to
expand the primary memory of your computer. RAM chips may be classified as:
1) Dynamic
2) Static
DDR SDRAM
26
FIGURE 18: DDR MEMORY (HAS 184 PINS AND ONE NOTCH).
With data being transferred 8 bytes at a time DDR RAM gives a transfer rate of (memory
bus clock rate) × 2 (for dual rate) × 8 (number of bytes transferred). Thus with a bus
frequency of 100 MHz DDR – SDRAM gives a max transfer rate of 1600 MB/s.
SDR SDRAM
SDR SDRAM is Single Data Rate synchronous dynamic random access memory, a type of
computer memory. The term is used to contrast with Double Data Rate SDRAM, or DDR
SDRAM, but since single data rate SDRAM was the only sort available when SDRAM was
introduced, is simply called "SDRAM", rather than "SDR SDRAM".
SDRAM has a synchronous interface, meaning that it waits for a clock pulse before
responding to its control inputs- it synchonizes with the computer's system bus, and thus
with the processor.
SDRAM has a synchronous interface, meaning that it waits for a clock pulse before
responding to its control inputs- it synchonizes with the computer's system bus, and thus
with the processor.
27
Currently, 168-pin SDRAM type is not used in new PC systems, and PCs come with DDR
or
DDR2 SDRAM, with DDR2 quickly phasing out DDR.
RAMBUS DRAM
Short for Rambus DRAM, a type of memory (DRAM) developed by Rambus, Inc. Whereas
the fastest current memory technologies used by PCs (SDRAM) can deliver data at a
maximum speed of about 100 MHz, RDRAM transfers data at up to 800 MHz.
RDRAM is already being used in place of VRAM in some graphics accelerator boards. As
of late 1999, Intel has been using RDRAM in its Pentium III Xenon processors and more
recently in its Pentium 4 processors. Intel and Rambus are also working a new version of
RDRAM, called nDRAM that will support data transfer speeds at up to 1,600 MHz.
ROM is permanent type of memory. Its contents are not lost when the power supplied is
not switch off. Data is hard wired on to these chips at the time of manufacture. They cannot
be change by the user.
While both RAM and ROM are storage devices and can be access randomly, they differ in
that data can be written onto RAM while ROM does not permit the user to write onto it.
ROM retains the data in it even the absence of power and is thus non-volatile storage.
Though data is hardwired, the user is able to program the following types of ROM
28
BOOTING A COMPUTER.
When you switch on a computer, it goes through a complex set of the instruction. This it
does to ensure that all its components are working properly and to warn the user if
something goes wrong. This is the first step of very complicated process
called booting. Booting is the term derived from the word bootstrap. Bootstrap is the
process of lifting one self up on its own. The computer also readies it self for you, therefore
this process is called booting. The process of checking itself is called Power On Self Test or
POST.
POST is the first thing the computer does when it switch on. If an error detected during the
POST, it warns the user in the form of some message flashed on the screen accompanied
with the series of beeps.
NOTE: If there is no beeps, it is not guaranteed, that the hardware if fine, because there
may be some error in that even the POST cannot detect.
The following diagram explained the process that the computer goes through before it
comes ready for the user:
Next, the ROM searches for the operating system and loads it tots complete the process of
booting. Take a look at the next schematic.
29
The figure above describe the way the operating system is ‗ searched‘ for the loaded in
the RAM for the computer to be ready to use. After the POST, the ROM searches for
the operating system. First it checks for a disk in the disk drive. If a disk is found in
drive A, ROM searches the operating system on it. If found, they are loaded in the
RAM and the computer gets ready for use. If the operating system files are not found,
the computer flashes an error message across the screen.
After this, the user has to replace the disk and press the ‗ Return ‗ key. If the return key
is press without replacing the disk, the operating system files are searched on the hard
disk, the computer cannot get ready to accept commands form the user. If the files are
not found on the hard disk, they are copied to the RAM and the computer can be used.
30
BASIC TROUBLE SHOOTING
🡪 Press the Ctrl key, the Alt key and the Delete key at the same time
🡪 You may need to repeat this 2 or 3 times before you get a dialog box that asks if you
want to End Task, Shutdown or Cancel. Choose to End Task
🡪 Try to Shutdown your computer again.
🡪 If your computer will still not shutdown, repeat the task again.
⮚ Perhaps a key on the keyboard is stuck. Check to make sure the mouse and
keyboard ⮚ Plugs are properly connected in the back of the computer.
🡪 Make sure the monitor is on by checking for a green light on the bottom, front. Also,
make sure the monitor cable is plugged in correctly on the back of the computer. 🡪
Check that power cord is plugged in.
🡪 Shutdown two computers one with non-working monitor and one with working
monitor.
🡪 Disconnect the monitors and connect them to the opposite
computer. 🡪 Reboot both computers.
🡪 This should help you to determine if the monitor is not working or the video card on
the computer is not working properly.
31
HOW DO I KNOW IF MY COMPUTER HAS
responding‖.
32
carefully remove any lint or dust particles, but use no water or alcohol!
33
CHAPTER THREE: NETWORKING
3.1 INTRODUCTION
Network hardware is a set of physical or network devices that are essential for interaction
and communication between hardware units operational on a computer network.
34
the motherboards, while in some computers, an extra expansion card in the form of
a small circuit board is added externally.
Network cables: Cables connect different devices on a network. Today, most
networks have cables over a wireless connection as they are more secure, i.e., less
prone to attacks, and at the same time carry larger volumes of data per second.
Firewall: A firewall is a hardware or software device between a computer and the
rest of the network open to attackers or hackers. Thus, a LAN can be protected
from hackers by placing a firewall between the LAN and the internet connection. A
firewall allows authorized connections and data-like emails or web pages to pass
through but blocks unauthorized connections made to a computer or LAN.
NETWORK CABLES.
Twisted-Pair wire
Twisted-Pair wire is mostly used in the telephone an Ethernet cabling, and it is divided into
some category such as 1, 2, 3, 4, 5, 5E, 6 and 7. It has two type like as unshielded twisted
pair (UTP) and shielded twisted pair (STP).
Coaxial Cable
Coaxial Cable is same to TV installation cable, and it delivers to high data transmission
speed. So it is more expensive.
There are two type of coaxial cable
Thin (Thinnet)
Thick (Thicknet)
Fiber-optic Cable
Fiber optic cable provides the ultra transmission data speed via light beams in the glass
bound fiber. So its price is higher to other cable.
Wireless Medium
Wireless medium is more popular in small offices and home usage such as WIFI. In WIFI,
radio signals get the transmission in the air, and multiple terminals (computer, laptop,
smart phone, etc) make connection through WIFI signals then can be shared their data
with each other.
35
OSI MODEL
The Open Systems Interconnection (OSI) model describes seven layers that computer
systems use to communicate over a network. It was the first standard model for network
communications, adopted by all major computer and telecommunication companies in the
early 1980s
The modern Internet is not based on OSI, but on the simpler TCP/IP model. However, the
OSI 7-layer model is still widely used, as it helps visualize and communicate how networks
operate, and helps isolate and troubleshoot networking problems.
OSI was introduced in 1983 by representatives of the major computer and telecom
companies, and was adopted by ISO as an international standard in 1984.
1) PHYSICAL LAYER
The physical layer is responsible for the physical cable or wireless connection
between network nodes. It defines the connector, the electrical cable or wireless
technology connecting the devices, and is responsible for transmission of the raw
data, which is simply a series of 0s and 1s, while taking care of bit rate control.
The data link layer establishes and terminates a connection between two physically-
connected nodes on a network. It breaks up packets into frames and sends them
from source to destination. This layer is composed of two parts—Logical Link
Control (LLC), which identifies network protocols, performs error checking and
synchronizes frames, and Media Access Control (MAC) which uses MAC addresses
to connect devices and define permissions to transmit and receive data.
3) Network Layer
The network layer has two main functions. One is breaking up segments into
network packets, and reassembling the packets on the receiving end. The other is
routing packets by discovering the best path across a physical network. The
36
network layer uses network addresses (typically Internet Protocol addresses) to
route packets to a destination node.
4) Transport Layer
The transport layer takes data transferred in the session layer and breaks it into
“segments” on the transmitting end. It is responsible for reassembling the segments
on the receiving end, turning it back into data that can be used by the session layer.
The transport layer carries out flow control, sending data at a rate that matches the
connection speed of the receiving device, and error control, checking if data was
received incorrectly and if not, requesting it again.
5) Session Layer
The session layer creates communication channels, called sessions, between devices.
It is responsible for opening sessions, ensuring they remain open and functional
while data is being transferred, and closing them when communication ends. The
session layer can also set checkpoints during a data transfer—if the session is
interrupted, devices can resume data transfer from the last checkpoint.
6) Presentation Layer
The presentation layer prepares data for the application layer. It defines how two
devices should encode, encrypt, and compress data so it is received correctly on the
other end. The presentation layer takes any data transmitted by the application
layer and prepares it for transmission over the session layer.
7) Application Layer
The application layer is used by end-user software such as web browsers and email
clients. It provides protocols that allow software to send and receive information
and present meaningful data to users. A few examples of application layer protocols
are the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post
Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name
System (DNS).
37
TYPES OF NETWORK
1) LAN: local area network, the component systems are in close proximity, perhaps
within a room or building.
2) MAN: metropolitan area network, is spread out over a larger distance, like a town,
city, or university campus.
3) WAN: wide area network, when the network hardware spreads out over a very
large distance across different cities
3.1 IP ADDRESSING.
TERMS:
Address - The unique number ID assigned to one host or interface in a network.
Subnet - A portion of a network that shares a particular subnet address.
Subnet mask - A 32-bit combination used to describe which portion of an address refers
to the subnet and which part refers to the host.
Interface - A network connection.
IP ADDRESS
An IP address is an address used in order to uniquely identify a device on an IP network.
The address is made up of 32 binary bits, which can be divisible into a network portion and
host portion with the help of a subnet mask. The 32 binary bits are broken into four octets
(1 octet = 8 bits). NB: Its only when it comes to IPV4 the total binary is 32 binary bits but
when it comes to IPV6 its total binary bit is 64 bits, therefore 1 octet is 16 bits.
Each octet is converted to decimal and separated by a period (dot). For this reason, an IP
address is said to be expressed in dotted decimal format (for example, 172.16.81.100). The
value in each octet ranges from 0 to 255 decimal, or 00000000 - 11111111 binary.
128 64 32 16 8 4 2 1
38
Now for you to convert an octet in an IP address you will first check how many numbers
you can add in the numbers above and replace them with 1 and the rest will be replaced
with 0.
And this sample shows an IP address represented in both binary and decimal.
10. 1. 23. 19 (decimal)
00001010.00000001.00010111.00010011 (binary)
CLASSES OF IP ADDRESS
There are five different classes of networks, A to E. This document focuses on classes A to
C, since classes D and E are reserved and discussion of them is beyond the scope of this
document.
CLASS A: FROM 1- 126 (127 is a loop back or trouble shoot IP address) this class can
accommodate millions of users that why it’s mostly used.
CLASS B: FROM 128- 191 this class can accommodate only up to 7000 users.
CLASS C: FROM 192 – 223 this class can accommodate up to 250 users.
CLASS D AND E ARE NOT IN USE.
In a Class A address, the first octet is the network portion, so the Class A has a major
network address of 1.0.0.0 - 126.255.255.255. Octets 2, 3, and 4 (the next 24 bits) are for the
network manager to divide into subnets and hosts as he/she sees fit. Class A addresses are
used for networks that have more than 65,536 hosts (actually, up to 16777214 hosts!).
In a Class B address, the first two octets are the network portion, so the class B has a major
network address of 128.0.0.0 - 191.255.255.255. Octets 3 and 4 (16 bits) are for local subnets
and hosts. Class B addresses are used for networks that have between 256 and 65534 hosts.
In a Class C address, the first three octets are the network portion. The Class C has a
major network address of 192.0.0.0 - 223.255.255.255. Octet 4 (8 bits) is for local subnets
and hosts - perfect for networks with less than 250 hosts.
NETWORK MASKS
A network mask helps you know which portion of the address identifies the network and
which portion of the address identifies the node. Class A, B, and C networks have default
masks, also known as natural masks, as shown here:
Class A: 255.0.0.0
39
Class B: 255.255.0.0
Class C: 255.255.255.0
An IP address on a Class A network that has not been subnetted would have an
address/mask pair similar to: 8.20.15.1 255.0.0.0. In order to see how the mask helps you
identify the network and node parts of the address, convert the address and mask to binary
numbers.
8.20.15.1 = 00001000.00010100.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000
Once you have the address and the mask represented in binary, then identification of the
network and host ID is easier. Any address bits which have corresponding mask bits set to
1 represent the network ID. Any address bits that have corresponding mask bits set to 0
represent the node ID.
8.20.15.1 = 00001000.00010100.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000
-----------------------------------
net id | host id
netid = 00001000 = 8
hostid = 00010100.00001111.00000001 = 20.15.1
SUBNETTING
Subnetting allows you to create multiple logical networks that exist within a single Class A,
B, or C network. If you do not subnet, you are only able to use one network from your
Class A, B, or C network, which is unrealistic.
Each data link on a network must have a unique network ID, with every node on that link
being a member of the same network. If you break a major network (Class A, B, or C) into
smaller subnetworks, it allows you to create a network of interconnecting subnetworks.
Each data link on this network would then have a unique network/subnetwork ID. Any
device, or gateway, that connects n networks/subnetworks has n distinct IP addresses, one
for each network / subnetwork that it interconnects.
40
In order to subnet a network, extend the natural mask with some of the bits from the host
ID portion of the address in order to create a subnetwork ID. For example, given a Class C
network of 204.17.5.0 which has a natural mask of 255.255.255.0, you can create subnets in
this manner:
204.17.5.0 - 11001100.00010001.00000101.00000000
255.255.255.224 - 11111111.11111111.11111111.11100000
--------------------------|sub|----
41
CHAPTER FOUR
• The institution didn’t provide internet source so everything checked and
downloaded for the training was with my subscription
IV.2 RECOMMENDATION
• I recommend that SIWES provide places for industrial attachment for
students
• I also recommend that Industrial Training Fund pays some kind of monthly
allowances to students.
42