Professional Documents
Culture Documents
Siwes 3
Siwes 3
Siwes 3
net/publication/337331524
CITATIONS READS
0 1,091
1 author:
Morawo Isreal
Ladoke Akintola University of Technology
6 PUBLICATIONS 15 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Morawo Isreal on 18 November 2019.
A TECHNICAL REPORT ON
SCHEME (SIWES)
UNDERTAKEN AT :
BY:
SUBMITTED TO:
STATE
1
SIWES REPORT 2019
DECLARATION
---------------------------------------- ----------------------------------------
2
SIWES REPORT 2019
DEDICATION
I dedicate this report to God who gave me the grace and strength to finish my SIWES
program successfully and also for providing all the necessary resources.
3
SIWES REPORT 2019
ACKNOWLEDGEMENT
I am grateful to GOD Almighty, who granted me the grace, strength and knowledge to go
through my period of Industrial attachment successfully. My sincere appreciation and
heartfelt gratitude goes to my supervisor who had to leave all the way from Ogbomoso to
Osogbo to come not only to supervise me but also to check if the organization is good for
my SIWES. My appreciation also goes to all my departmental lecturers who have been of
help all through.
To my wonderful family and Friends Thank you for your love, support, prayers and
encouragement throughout this process. My special appreciation also goes to those who
are not mentioned here, but have supported, encouraged and prayed for me. May GOD
almighty reward you and grant you all your heart desires.
4
SIWES REPORT 2019
TABLE OF CONTENT
TITLE PAGE-----------------------------------------------------------------------------1
DECLARATION-------------------------------------------------------------------------2
DEDICATION----------------------------------------------------------------------------3
ACKNOWLEDGEMENT---------------------------------------------------------------4
CHAPTER ONE
1.6 Location---------------------------------------------------------------------------------11
1.8 Sections---------------------------------------------------------------------------------13
CHAPTER TWO
5
SIWES REPORT 2019
2.2.6 Subnetting--------------------------------------------------------------------40
2.2.8 VLANs------------------------------------------------------------------------42
CHAPTER THREE
CHAPTER FOUR
CHAPTER FIVE
5.4 Conclusions---------------------------------------------------------------------------------51
REFERENCES--------------------------------------------------------------------------------51
WEBSITES-------------------------------------------------------------------------------------53
7
SIWES REPORT 2019
CHAPTER ONE
1.0 INTRODUCTION
In the earlier days of science and technology in Nigeria, students were graduating from
their respective institutions without any technical knowledge or work experience.
Training is a key factor in enhancing the efficiency and expertise of the workforce. The
Student Industrial Work Experience Scheme (abbreviated as SIWES) was established by
the Industrial Training Fund (ITF) in 1973 to resolve the problem of inadequate practical
skills necessary for employment in industries by the graduates of tertiary institutions in
Nigeria. It has become an innovative phenomenon in human resources development and
training in our country today.
8
SIWES REPORT 2019
Some of the objectives of the Student Industrial Work Experience Scheme among others
include;
a. To prepare students of the various tertiary institutions for the work situation they
are likely to meet after graduation;
c. To allow the tra2nsition phase from school to the world of working environment
easier and facilitate students’ contact for later job placements;
The scheme covers all science and technological based courses in monotechnics,
polytechnics and universities in Nigeria, resulting in a high population of students which
is easily managed because of the public and private industries that partake in the scheme.
SIWES enables students acquire industrial know-how in their field of study particularly
in technological based courses. It also enables students experience the application of
theoretical knowledge in solving real life problems.
9
SIWES REPORT 2019
The Federal Government, the Industrial Training Fund (ITF), the Supervising Agency,
National Universities Commission (NUC), Employers of labour and Institutions have
specific roles to play in the management of SIWES. The roles are:
➢ Formulate policies and guidelines on SIWES for distribution to all the SIWES
participating bodies;
➢ Accept and process Master and Placement lists from institutions and
supervising agencies;
➢ Vet and approve Master and Placement lists of students from participating
institution and forward same to ITF; Fund SIWES Directorate adequately in
participating institutions;
The student is to partake in the program in such a way that the purpose and objectives of
the program will be achieved at the end. The student is advised to ask questions, be
submissive, and adhere to all the rules and regulations of the organization where he is
attached. The student is required to genuinely fill his logbook on a daily basis and get it
signed at the end of every week and month by the industrial based supervisor.
11
SIWES REPORT 2019
I.T. DEPARTMENT
D.I.T
C.I.O
ASST. DIRECTOR
ADMINISTRATIVE NETWORK
OFFICER
HARDWARE SOFTWARE
NETWORK
UNIT
MANAGER
SENIOR SENIOR NETWORK
I.T. ENGINEER I.T. ENGINEER ENGINEER
NETWORK
I.T. ENGINEER I.T. SENIOR ENGINEER
ENGINEER SAT/TV
TECH.
INTERNS INTERNS
INTERNS
INTERNS
12
SIWES REPORT 2019
1.7 SECTIONS
➢ Hardware Unit
➢ User Support Unit/Software Unit
➢ Network Unit/ Metropolitan Area Network Unit
Hardware Unit and User Support Unit/Software Unit: The Hardware Unit (HU) and
The User Support Unit (USU) are both Headed by User Support Ass. Director assisted by
Ass. Manager and IT Engineers. The department is saddled with the responsibilities of
providing end user technology support via telephone, helpdesk, or at walk-in locations
across the campus. Our IT engineers can respond to general information technology
issues from the university faculty, staff, students, and members of the alumni association.
We also provide software diagnostics and installation, as well as other systems support
services. Most support is available at no charge to the University community.
Network Unit/ Metropolitan Area Network Unit: The Network Unit, headed by Network
Director and supported by Network Manager and network Engineers, handles within the
campus the deployment and maintenance of Network infrastructures, configuration of
devices, network security, Satellite TV, Voice over IP (VOIP), emails and Internet. The
Metropolitan Area Network (MAN) headed by MAN Manger supported by Network
Engineers, deals with the deployment and maintenance of network infrastructures in all
the residences of AUN and auxiliaries. The department is headed by the Chief
Information Officer (CIO) of the Department of Information System and Information
Technology who manages the administration and the operations of the department’s daily
activities. The CIO is assisted by two Directors, Ass. Director and three Managers of the
units.
13
SIWES REPORT 2019
CHAPTER TWO
WORK EXPERIENCE
2.0 INTRODUCTION TO CCTV INSTALLATION
Closed-circuit television (CCTV), also known as video surveillance,[1][2] is the use
of video cameras to transmit a signal to a specific place, on a limited set of monitors. It
differs from broadcast television in that the signal is not openly transmitted, though it
may employ point-to-point (P2P), point-to-multipoint (P2MP), or mesh wired or wireless
links. Though almost all video cameras fit this definition, the term is most often applied
to those used for surveillance in areas that may need monitoring such as banks, stores,
and other areas where security is needed. Though videotelephony is seldom called
'CCTV' one exception is the use of video in distance education, where it is an important
tool.
Crime prevention
CCTV can be use for preventing all form of crime including buglar,theft, also found that
CCTV could decrease unruly behaviour in football stadiums and theft in
supermarkets/mass merchant stores.
14
SIWES REPORT 2019
Crime solving
CCTV can also be used to help solve crimes. In London alone, six crimes are solved each
day through CCTV footage.Sometimes, footage from CCTV camera's of citizens can
Body worn
In recent years, the use of body worn video cameras has been introduced for a number of
uses. For example, as a new form of surveillance in law enforcement, with cameras
Traffic monitoring
Many cities and motorway networks have extensive traffic-monitoring systems, using
however, are owned by private companies and transmit data to drivers' GPS systems.
A CCTV system may be installed where any example, on a driver-only operated train
CCTV cameras may allow the driver to confirm that people are clear of doors before
Sporting events
Many sporting events in the World uses CCTV inside the venue for fans to see the action
while they are away from their seats. The cameras send the feed to a central control
center where a producer selects feeds to send to the television monitors that fans can
15
SIWES REPORT 2019
view. CCTV monitors for viewing the event by attendees are often placed in lounges,
hallways, and restrooms. In a trial with CCTV camera's, football club fans no longer
needed to identify themselves manually, but could pass freely after being authorized by
Employee monitoring
Organizations use CCTV to monitor the actions of workers. Every action is recorded as
an information block with subtitles that explain the performed operation. This helps to
track the actions of workers, especially when they are making critical financial
personal information.
cash;
16
SIWES REPORT 2019
of all actions of the operator. Some systems allow the user to search for a specific event
by time of occurrence and text description, and perform statistical evaluation of operator
behaviour. This allows the software to predict deviations from the standard workflow and
(2)IP Camera
(3)Wireless/Tapeless Camera
The following 5 components comprise an IP based camera system that is setup over a
network.
At the heart of the whole network that pumps data between cameras and recorder is the
PoE switch. Powering and transmitting data from IP cameras requires networking
equipment to do so. IP cameras can be powered near the installation point with 12V DC
17
SIWES REPORT 2019
adaptors, or can utilize PoE technology in the PoE switch that provides power and data
It is very important to use PoE equipment that is compliant with 802.3af or 802.3at
standards, which ensures correct power delivery to the cameras. PoE switches and
injectors meant for wireless access points are Passive in their power delivery, meaning
they do not negotiate the correct power required for the camera
The surveillance camera recorder is the brains of a surveillance system if you are looking
for a central location to manage, record, playback, and download recorded video. The
3. IP Security Cameras
Of course you will need IP security cameras as they are the eyes of a camera system. IP
cameras capture video and send it to the NVR as digital data through the PoE switch.
Good quality network cable is crucial for proper power and data transmission between
the cameras, PoE switch, and NVR. As explained in our network cable page there are a
variety of cable grades available. For runs over 150ft we always recommend using a full
A PoE extender borrows a small amount of power to amplify the data signal and send
it down further. Here are a few tips for proper PoE Extender use:
18
SIWES REPORT 2019
1. Use CAT6 full copper cable for all wire runs involved in the use of a PoE extender
2. Do not use PoE extenders for cameras requiring more than 15W of power, which
includes PTZ IP cameras, and long range night vision security cameras.
While not required to setup an IP camera system, the last component is an internet router.
Often times a customer will already have an internet router, modem, or a combination of
the two provided by the Internet Service Provider (ISP). A router ties together the whole
network and routes data between switches, recorders, and computers on the local
network.
A router also enables a camera system to communicate through the internet for
remote viewing. We advise our customers to purchase their own router that is separate
from what an ISP provides. ISPs often sell or lease low-quality routers that are not
designed to handle the large amounts of video data involved in an IP camera system,
19
SIWES REPORT 2019
Preparation
Before you install any cameras it is extremely important to bench test all equipment to
avoid the hassle of troubleshooting after installation. Bench testing is also a good time to
learn how to configure the cameras to record. Many times improper cable crimping can
lead to a lot of confusion. For proper network cable crimping technique, please refer to
For installing an IP cameras system there is no "one size fits all" solution. It is a good
idea to plan the system ahead of time noting where each camera will be installed. Label
each camera and wire so that you do not confuse cameras when connecting them to the
NVR.
Planning
In the section below, we've made it simple to understand the different ways that
other. Please spend some time watching the videos to understand the common methods to
connect a NVR and PoE switch together. The way all components are connected together
20
SIWES REPORT 2019
• Whether a strong router is present on the network that is capable of handling the large
amount of continuous data traffic required for surveillance cameras on the network
• Whether it is more convenient to run a cable directly from the PoE switch to the NVR or
router
Our first method diagram shows how a PoE switch with one uplink should be setup to
connect network cameras to the network. The PoE switch is connected to a router using
its uplink port, and the NVR is connected to the router directly as well. Cameras
communicate through the PoE switch and the router. Since everything is on the same
network, the NVR or DVR recorder is able to communicate with the cameras through the
router.
21
SIWES REPORT 2019
1. First connect the NVR's LAN port to a LAN (numbered port) port on the router.
2. Connect the uplink port of the PoE switch to a different LAN (numbered port) port on the
router.
3. Connect a PoE camera to one of the PoE ports of the PoE switch.
The router "networks" the switch and NVR together, meaning it creates a flow of camera
Method 2: PoE Switch with 2 Uplink Ports to connect Router and NVR
In this section we discuss how to setup an IP system using a PoE switch that has 2 uplink
ports. This approach is advantageous as it allows the NVR to be connected directly to the
switch and fetch data from the cameras without having data bog down the router. The
22
SIWES REPORT 2019
1. First connect the NVR's LAN port to the uplink port on the switch.
2. Connect the second uplink port of the PoE switch to a LAN (numbered port) port on the
router.
3. Connect a PoE camera to one of the PoE ports on the PoE switch.
While we have the NVR located close to the switch in our example, it can be placed up to
This method is applicable if you purchased a PoE NVR and are trying to add IP cameras
over the network. The LAN port on a PoE NVR is the network port that is separate from
the grouped PoE ports on the back of the NVR. Connect the LAN port to an uplink port
23
SIWES REPORT 2019
on the PoE switch as shown below, or you can even connect it directly to the router.
Connect the other uplink port on the PoE switch to the router. The cameras connect to the
PoE switch.
NETWORK.
After physically connecting the security camera recorder to the network, the first thing to
do is to set its IP address that conforms to your network. You'll want to set the recorder to
All of our IP cameras, NVRs and DVRs ship with a default address of 192.168.1.108. A
duplicate IP address conflict is going to happen if you try to connect multiple cameras
24
SIWES REPORT 2019
As a first step it is important to change the IP address on the recorder before attempting
to connect any cameras. The new IP address cannot be used for any other devices or
cameras. The new address must match the existing network scheme or range.
To verify that the NVR is properly configured to communicate on the network run the
After the equipment is physically connected it is easy to configure and start recording
each camera. CCTV Camera World's NVR and DVRs support initializing and
configuring an IP address on a camera from the Camera Registration menu in the user
must initialize and configure the cameras to be on the same network. Conveniently our
network.
Once you have cameras connected and viewable from the NVR you are all set. Repeat the
process for each camera that you plan to deploy. Be sure to set each camera to a different
IP address.
25
SIWES REPORT 2019
Here are some preparation tips you should read before connecting any cameras:
1. It is very important to connect only one camera at a time when initializing and
configuring their IP addresses. Having multiple cameras with the same IP address
causes a conflict on the network and prevents the NVR from successfully modifying
configurations.
2. Ping the network to find an available IP address range. If you are unsure how to check
3. Planning the system out before configuration is a great idea as well. Make a list of IP
addresses for each camera that will be connected to the system. This helps avoid
duplicate IP addresses being assigned. The table below can be used as a good
framework to document each camera and its IP address in your surveillance system.
Computer: A computer is an electronic device that accepts data via input device(s),
processes with the aid of processors, stores it with the aid storage device(s) and gives
information via output device(s).
Network: Is a group of two or more devices that can communicate. In practice, a network
is comprised of a number of different computer systems connected by physical and/or
wireless connections. The scale can range from a single PC sharing out basic peripherals
to massive data centers located around the World, to the Internet itself. Regardless of
scope, all networks allow computers and/or individuals to share information and
resources.
26
SIWES REPORT 2019
In a computer network, devices pass data to each other along network links. The
connections are established using either cable media or wireless media. Certainly the
internet is the most conspicuous example of computer networking, linking millions of
computers around the world, but smaller networks play a role in information access on a
daily basis.
Below are some networking components which I worked with during my training:
27
SIWES REPORT 2019
Network Switch: Like a hub, a switch also works at the layer of LAN (Local Area
Network) but you can say that a switch is more intelligent than a hub. While hub just
does the work of data forwarding, a switch does ‘filter and forwarding’ which is a more
intelligent way of dealing with the data packets.
So, when a packet is received at one of the interfaces of the switch, it filters the packet
and sends only to the interface of the intended receiver. For this purpose, a switch also
maintains a CAM (Content Addressable Memory) table and has its own system
configuration and memory. CAM table is also called as forwarding table or forwarding
information base (FIB).
Modem: A Modem is somewhat a more interesting network device in our daily life. So if
you have noticed around, you get an internet connection through a wire (there are
different types of wires) to your house. This wire is used to carry our internet data outside
to the internet world. However, our computer generates binary data or digital data in
forms of 1s and 0s and on the other hand, a wire carries an analog signal and that’s where
a modem comes in. A modem stands for (Modulator+Demodulator). That means it
modulates and demodulates the signal between the digital data of a computer and the
analog signal of a telephone line.
28
SIWES REPORT 2019
Network Router: A router is a network device which is responsible for routing traffic
from one to another network. These two networks could be a private company network to
a public network. You can think of a router as a traffic police who directs different
network traffic to different directions.
29
SIWES REPORT 2019
Common topology found in networking includes mesh topology star topology, bus
topology, ring topology, and others. Network topology refers to the layout of the
transmission medium and devices on a network. Topologies use either a point to point or
multipoint connection scheme. A connection scheme indicates how many devices are
connected to a transmission media segment or an individual cable.
Star Topology: This is a local area network topology where all the nodes are connected
individually to a central connecting device called a hub or switch. Signals travel from the
nodes to the hub which then sends signals to other nodes on the network. A star topology
network is scale able –i.e. it can be design and redesign easily.
Bus Topology: A LAN topology where each node is connected to a single main bus
cable, is transmits data to all the nodes on the network. The bus is actually a series of
30
SIWES REPORT 2019
cable segments running from one node to the other. Break or faulty piece of cable
anywhere on the segment prevents all the computers on the segment from being able to
communicate.
Mesh Topology: This is a network topology where every node on the network has a
separate wire connecting it to every other node on the network. It provides each device
with a point-to-point connection/ to every other device in the network. This type of
network has a high fault tolerance because failure of one node does not affect data
transmission between other nodes.
31
SIWES REPORT 2019
can interoperate, and to facilitate a clear framework that describes the functions of a
networking or telecommunication system. Most vendors involved in telecommunications
make an attempt to describe their products and services in relation to the OSI model.
Developed by representatives of major computer and telecommunication companies
beginning in 1983, OSI was originally intended to be a detailed specification of actual
interfaces. Instead, the committee decided to establish a common reference model with
which others could then develop detailed interfaces, which, in turn, could become
standards governing the transmission of data packets. The OSI architecture was officially
adopted as an international standard by the International Organization for Standardization
(ISO). The main concept of OSI is that the process of communication between two
endpoints in a network can be divided into seven distinct groups of related functions, or
layers. The seven Open Systems Interconnection layers are (from layer seven down-
ward):
▪ Session - provides services to the presentation layer to organize its dialogue and to
manage data exchange.
▪ Network - provides services to exchange the individual pieces of data over the
network between identified end devices.
▪ Data Link - provides methods for exchanging data frames between devices over a
common media.
32
SIWES REPORT 2019
The TCP/IP protocol suite is an open standard, meaning these protocols are freely
available to the public, and any vendor is able to implement these protocols on their
hardware or in their software. It consists of four layers as seen in the diagram below;
33
SIWES REPORT 2019
• Wired media
• Wireless media
34
SIWES REPORT 2019
Coaxial cable
A coaxial cable is an alternative for protecting data from noise. Coaxial cables do not
produce external electric and magnetic fields and are not affected by them. This makes
them ideally suited, although more expensive, for transmitting signals.
In a twisted pair there are eight copper wire that are coated with different colours; the
colours are mix/orange, orange, mix/blue, blue, mix/green, green, mix/brown and brown.
These colours are very important when terminating cables. The two most common ways
of terminating Ethernet cables are:
35
SIWES REPORT 2019
In straight-through method, in any way you put in your cable, the colour adopted
at both ends must be the same.
In a cross-over method all you need to do is to terminate one end with a straight rule
method and the other end would be that pin ‘1’ goes to pin ‘3’ and vice-versa, the pin ‘2’
then goes to pin ‘6’ and also vice-versa.
I got to know that a cross-over cable is used to connect two similar devices like a PC to a
PC while a straight through cable is used to connect different devices e.g. a PC to a
router.
36
SIWES REPORT 2019
RJ-45 Connectors
RJ45 is a standard type of connector for network cables. RJ45 connectors are most
commonly seen with Ethernet cables and networks. RJ45 connectors feature eight pins to
which the wire strands of a cable interface electrically. Standard RJ-45 Pin outs define
the arrangement of the individual wires needed when attaching connectors to a cable.
Crimper
37
SIWES REPORT 2019
This is used to test if a category cable has been well terminated, or develop a fault.
Crimping Guide:
It is made of glass fibers instead of wire; it consists of a center glass core surrounded by
several layers of protective material. The outer insulating jacket is made of Teflon or
PVC. The fiber optic cables transmit light rather than electronic signals, thereby
eliminating the problem of electrical interference.
38
SIWES REPORT 2019
• Multi-mode fibers
Single-mode fibers have small cores while Multi-mode fibers have larger cores. Used for
short-distance communication links.
To fully explore the wireless added dimension, Communication system designers have
sought to use wireless media to reduce infrastructure cost and complexity, when
compared to wired communication systems. There is no need to construct miles of
telephone line poles or cable trenches.
2.2.5 IP ADDRESSING
Functions of IP Addressing
39
SIWES REPORT 2019
Class A: This Class address can only be between 0 and 127. All 0’s reserved for default
route and ‘127’ is reserved for troubleshooting –loop back, therefore in reality Class A
valid address range that can be assigned to host on a network is 10-126
Class D and E: Class D (224-239) used for multicasting and Class E (240-255) for
research purposes
Broadcast Address
This is the address used to send data to all hosts on a broadcast domain. When all the
host bits are on (‘1’) this is a broadcast address for all hosts 255 are reserved for sending
broadcast message.
• Not routable
• Introduced in mid 1990s due to depletion of IPv4 addresses
• Used only in internal networks.
• Must be translated to a public IPv4 to be routable.
• Defined by RFC 1918
40
SIWES REPORT 2019
• 10.0.0.0 /8 10.255.255.255
• 172.16.0.0 /12 to 172.31.255.255
• 192.168.0.0/16 to 192.168.255.255
A subnet mask is a 32-bit value that allows the recipient of an IP packet to distinguish the
network ID portion of the IP address from the host ID portion of the IP address. Table 3
shows the default subnet masks for all classes of network.
2.2.6 SUBNETTING
Subnetting is the process of stealing bits from the host part of an IP address in order to
divide the larger network into smaller sub-networks called subnets. After subnetting,
41
SIWES REPORT 2019
network subnet host fields are created. An IP address is always reserved to identify the
subnet and another one to identify the broadcast address within the subnet. Subnetting
can be done in three basic ways, one of which is subnetting based on the number of
subnetworks you wish to obtain from a single block of IP address; another way is to
subnet based on the number of host computers or devices you want to be connected to
that sub-network and finally subnetting by reverse engineering which is a scenario in
which a subnet mask and an IP address block is given and the number of subnetworks
and number of hosts per each subnet are found. For example, if a public IP address block
of 192.168.23.1 with a subnet mask of 255.255.255.252 is purchased from our ISP and
because this block has only two valid hosts, this IP address is used to assign to our Router
interface so that traffic can be directed from our network to the ISP and from there to the
internet. A private IP address block is then chosen to carry out IP addressing within our
network. Because of the expected clients on this network, a Class B address is chosen for
the internal network and it is 172.168.0.0 with a mask of 255.255.0.0. Based on the
power of 2s, there are some equations that allow us to determine the required details, and
these are:
Cisco Packet Tracer is an innovative network simulation and visualization tool. Packet
Tracer provides an easy way to design and build networks of varying sizes without
expensive lab equipment. Packet Tracer is a tool that allows you to simulate real
networks. It provides three main menus that allow you to:
42
SIWES REPORT 2019
• select, delete, inspect, label, and group components within your network
2.2.8 VLANs
43
SIWES REPORT 2019
44
SIWES REPORT 2019
CHAPTER THREE
3.0 INTRODUCTION
COMSOL Multiphysics is a cross-platform finite element analysis, solver
and multiphysics simulation software. It allows conventional physics-based user
interfaces and coupled systems of partial differential equations (PDEs). COMSOL
provides an IDE and unified workflow for electrical, mechanical, fluid, acoustics and
chemical applications.
Beside the wide range of classical problems that can be efficiently addressed with the
specific application modules, the core Multiphysics package can be used to solve
Schrödinger-type (PDEs), and has been successfully applied for simulating quantum
effects in low dimensional systems like metallic nanoparticles,carbon nanotubes,quantum
dots, quantum wells,artificial molecules,and monolayer transition metal dicholcagenides.
The following are the basic sections in the mechanical software
45
SIWES REPORT 2019
The Help window, accessed by clicking the Help button in the top right-hand corner of
the software (the blue question mark) or the F1 key on your keyboard, enables you to
promptly access information pertaining to the model tree node or window in which you
are currently working. The text that displays updates automatically as you select items
in the software or add settings to your model. This enables you to instantly get help
right when you need it.
Since this window appears in the COMSOL Desktop® when opened, you can access
the information you need without having to compete for screen space with your
simulation. Instead of having to fit multiple windows on your monitor, you are able to
view the help content and Model Builder together.
Additionally, you can search and navigate the text in the Help window using the
respective buttons.
46
SIWES REPORT 2019
documentation. This includes the user guides and manuals for any modules for which
you have a license. You can find this documentation in the Documentation window,
which you can access either from within COMSOL Multiphysics, by going to File >
Help, or externally from your computer in your COMSOL Multiphysics installation
folder.
The Documentation window enables you to quickly and easily access your entire library
of COMSOL Multiphysics documentation, all within a single window. When open, you
can choose between the PDF or HTML version of any guide, manual, or handbook.
Additionally, the sections of each individual document are hyperlinked and
bookmarked. The sections are displayed on the left side of the window, as shown
above. This enables you to quickly jump between different chapters and documents.
This resource also provides more options when it comes to searching through the
software documentation. This includes the ability to search through the entire library,
only within a specified set of documents you have preselected, or exclusively through
the Application Library Manual for all licensed products. Searching the Application
Library Manual, in particular, enables you to find models and applications that
demonstrate use of some specific physics, software features, and functionality.
47
SIWES REPORT 2019
Whereas the Help window provides quick access to documentation while modeling, the
Documentation window serves as a more comprehensive resource when you need
further clarification and more powerful search tools.
The Application Libraries window, accessed by going to File > Application Libraries,
contains hundreds of models and simulation applications, spanning every module and
engineering discipline. Using the Search field, you can find applications and models
48
SIWES REPORT 2019
that cover some specific physics or feature that you want to see how you can use. Each
entry includes a brief summary of the model; the COMSOL Multiphysics model file;
and a PDF document that provides a comprehensive introduction and detailed, step-by-
step overview of the model-building process. This provides you with the logic behind
how the model is built, why and how boundary conditions are applied, and other useful
information that you can use as insight into the models you create.
By following along with any of the tutorial models available, you can experience
building a model firsthand. In addition, relevant examples from the Application
Libraries can be experimented with and expanded upon, serving as a starting point for
your own designs.
Tip: The tutorial models and demo applications featured in the Application Libraries are
also available online.
49
SIWES REPORT 2019
CHAPTER FOUR
The student industrial work experience scheme (SIWES) is aimed at exposing students to
the practical work of what they are taught in the class so as to have better understanding
of what they are taught. And this I have acquired during my SIWES program at American
University of Nigeria.
My academic work was very paramount to my experience I gained from both networking
and hardware because it gave me real basics of theories and as a computer scientist,
understanding these theories was really important because it’s what makes the difference
50
SIWES REPORT 2019
between me who read computer science and someone one who attended a road side
computer schools as system technician.
The industrial experience scheme is an opportunity to work and have the real practical
skills needed. The academic work serves as a platform to know and understand the
components, the various aspects, the theories, laws, principles, techniques and diverse
areas of computer science which serves as the basis for understanding what would be
done practically as well as selecting the area of specialization in accordance with the
choice of company to work with during the SIWES training. My Academic work made
me to understand what I did well during my IT because some terms were used during my
training of which were not explained in details but my academic knowledge made me
understand what was being taught.
51
SIWES REPORT 2019
CHAPTER FIVE
DISCUSSION
Having gone through the industrial training, I have the following suggestions to make for
the effectiveness of Student Industrial Work Experience Scheme (SIWES).
52
SIWES REPORT 2019
d. Posting of students for SIWES should be done by the scheme to ensure conformity
with course of study.
a. Students on SIWES should try by all means and avail themselves to their places
of work no matter what regardless of them been paid there or not as their aim is
to acquire knowledge.
b. Students on SIWES should adhere strictly to rules and regulations designed by
the organization most especially those in companies should adhere strictly to
safety regulations.
c. Students should be good ambassadors of their institutions of learning.
a. SIWES management staff should ensure that SIWES supervisors visit students in
their places of attachment at least twice.
b. Funds allocated to students for the program should be released to them as soon as
the SIWES supervisors pay their first visit or immediately after the program.
c. If possible SIWES body should liaise with the organization on the welfare of
students on attachment such as accommodations.
5.4 CONCLUSION
This industrial training has afforded me the basic practical and theoretical knowledge that
I may not have gotten from the lecture room. It also gave me the opportunity to have a
feel of what it would be like after graduation when I start working
In conclusion, based on my experience during the program, I have learnt and gained a lot
such as:
a. I can confidently and effectively educate pupils, parents, students, military, and
local Governments in computer literacy.
53
SIWES REPORT 2019
54
SIWES REPORT 2019
REFERENCES
Albert Jackson; David Day, Popular Mechanics Complete Home How-to (New York:
Hearst
Books, 2009), p. 282.
Computer network definition, archived from the original on 2012-01-21, retrieved 2011-
11-12
Ugwuanyi Ezema, Challenges of SIWES in Library and Information Science in the ICT
Environment. Retrieved October 18, 2013 from; Understanding VLAN
Trunk
Protocol (VTP) at Cisco.
WEBSITES
https://10.2.27.8
https://www.netacad.com/login/studentresources
https://en.wikipedia.org/wiki/Fiber-optic_communication
55