Siwes 3

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 56

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/337331524

MAXWELL SIWES finale-converted

Technical Report · November 2019


DOI: 10.13140/RG.2.2.21113.01124

CITATIONS READS
0 1,091

1 author:

Morawo Isreal
Ladoke Akintola University of Technology
6 PUBLICATIONS   15 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Siwes report on Networking and CCTV Installation View project

The proof of Goldbach conjecture View project

All content following this page was uploaded by Morawo Isreal on 18 November 2019.

The user has requested enhancement of the downloaded file.


SIWES REPORT 2019

A TECHNICAL REPORT ON

STUDENT INDUSTRIAL WORK EXPERIENCE

SCHEME (SIWES)

UNDERTAKEN AT :

NETiT SOLUTIONS LIMITED,

OFF LAMECO ROAD OSUN STATE, NIGERIA.

BY:

MORAWO ISREAL IYIOLA

(MATRIC NO: 142211)

SUBMITTED TO:

DEPARTMENT OF MECHANICAL ENGINEERING,

FACULTY OF ENGINEERING AND TECHNOLOGY,

LADOKE AKINTOLA UNIVERSITY OF TECHNOLOGY,OGBOMOSO OYO

STATE

IN PARTIAL FULFILMENT FOR THE AWARD OF BACHALOR OF


TECHNOLOGY (B.TECH MECHANICAL ENGINEERING)

FROM 14TH JUNE TO 24TH OCTOBER, 2019.

1
SIWES REPORT 2019

DECLARATION

I, MORAWO ISREAL I. with matriculation number 142211 hereby declare that I


undergo six full months of Industrial Training Programme at NetIT Solution
Limited,Lameco Road Osogbo, Osun State and that this report is written by me to the
best of the practical knowledge I gained during the course of the training programme.

---------------------------------------- ----------------------------------------

Student Name/Matric Number Sign.

2
SIWES REPORT 2019

DEDICATION

I dedicate this report to God who gave me the grace and strength to finish my SIWES
program successfully and also for providing all the necessary resources.

3
SIWES REPORT 2019

ACKNOWLEDGEMENT
I am grateful to GOD Almighty, who granted me the grace, strength and knowledge to go
through my period of Industrial attachment successfully. My sincere appreciation and
heartfelt gratitude goes to my supervisor who had to leave all the way from Ogbomoso to
Osogbo to come not only to supervise me but also to check if the organization is good for
my SIWES. My appreciation also goes to all my departmental lecturers who have been of
help all through.
To my wonderful family and Friends Thank you for your love, support, prayers and
encouragement throughout this process. My special appreciation also goes to those who
are not mentioned here, but have supported, encouraged and prayed for me. May GOD
almighty reward you and grant you all your heart desires.

4
SIWES REPORT 2019

TABLE OF CONTENT

TITLE PAGE-----------------------------------------------------------------------------1

DECLARATION-------------------------------------------------------------------------2

DEDICATION----------------------------------------------------------------------------3

ACKNOWLEDGEMENT---------------------------------------------------------------4

CHAPTER ONE

1.0 Introduction -------------------------------------------------------------------------- 8

1.1 Objective Of Siwes-------------------------------------------------------------------9

1.2 The Scope Of Siwes------------------------------------------------------------------9

1.3 Organization Involved In Siwes----------------------------------------------------10

1.4 The Role Of Student And Organization--------------------------------------------11

1.5 About The Firm------------------------------------------------------------------------11

1.6 Location---------------------------------------------------------------------------------11

1.7 Organizational Chart------------------------------------------------------------------12

1.8 Sections---------------------------------------------------------------------------------13

CHAPTER TWO

2.0 Introduction To CCTV Installation-------------------------------------------------14

2.1 Application Of CCTV Camera------------------------------------------------------14

2.1.1 Type Of CCTV Camera---------------------------------------------------16

5
SIWES REPORT 2019

2.1.2 How To Install CCTV Camera-------------------------------------------17

2.1.3 How To Connect IP Camera----------------------------------------------19

2.2 Computer Networking----------------------------------------------------------------24

2.2.1 Network Component-------------------------------------------------------26

2.2.1.1 Network Topology-----------------------------------------------27

2.2.2 The OSI Reference Model-------------------------------------------------29

2.2.3 The TCP/IP Model----------------------------------------------------------30

2.2.4 Network Media--------------------------------------------------------------32

2.2.4.1 Wired Media------------------------------------------------------33

2.2.4.2 Crimping Tools---------------------------------------------------33

2.2.4.3 Wireless Media---------------------------------------------------36

2.2.5 Subnet Mask-----------------------------------------------------------------38

2.2.6 Subnetting--------------------------------------------------------------------40

2.2.7 CISCO Packet Trace--------------------------------------------------------41

2.2.8 VLANs------------------------------------------------------------------------42

CHAPTER THREE

3.0 Introduction To Comsol Multiphysics------------------------------------------------43


6
SIWES REPORT 2019

3.1 The Help Window-----------------------------------------------------------------------43

3.2 The Documentation Window----------------------------------------------------------44

3.3 The Application Window---------------------------------------------------------------45

CHAPTER FOUR

4.0 Problem Encountered--------------------------------------------------------------------48

4.1 Relevance Of Siwes Program-----------------------------------------------------------48

CHAPTER FIVE

5.0 General Appraisal Of The Problem-----------------------------------------------------50

5.1 Ways Of Improving The Program-------------------------------------------------------50

5.2 Advice For Future Participation---------------------------------------------------------51

5.3 Advice For The Siwes Manager---------------------------------------------------------51

5.4 Conclusions---------------------------------------------------------------------------------51

REFERENCES--------------------------------------------------------------------------------51

WEBSITES-------------------------------------------------------------------------------------53

7
SIWES REPORT 2019

CHAPTER ONE

1.0 INTRODUCTION

In the earlier days of science and technology in Nigeria, students were graduating from
their respective institutions without any technical knowledge or work experience.
Training is a key factor in enhancing the efficiency and expertise of the workforce. The
Student Industrial Work Experience Scheme (abbreviated as SIWES) was established by
the Industrial Training Fund (ITF) in 1973 to resolve the problem of inadequate practical
skills necessary for employment in industries by the graduates of tertiary institutions in
Nigeria. It has become an innovative phenomenon in human resources development and
training in our country today.

SIWES is a skill development program designed to prepare students of universities,


polytechnics and colleges of education for transition from the college environment to
work (Akerejola 2008). Oyedele (1990) state that work experience is an educational
program in which students participate in work activities while attending school. This
work experience program gives student the opportunity to be part of an actual work
situation outside the lecture room. SIWES is a cooperative industrial internship program
that involves institutions of higher learning, industries, and the federal government of
Nigeria, Industrial Training Fund (ITF), Nigeria Universities Commission (NUC) and
NBTE/NCCE in Nigeria. Students that participate in this work experience program
include those studying Computer Science, Information technology, Engineering,
Vocational, technological and related courses in institutions of higher learning. SIWES
forms part of the approved minimum academic standards in these institutions.

8
SIWES REPORT 2019

1.1 OBJECTIVES OF SIWES

Some of the objectives of the Student Industrial Work Experience Scheme among others
include;

a. To prepare students of the various tertiary institutions for the work situation they
are likely to meet after graduation;

b. To provide an avenue for students in the Nigerian universities to acquire industrial


skills and experience during their course of study;

c. To allow the tra2nsition phase from school to the world of working environment
easier and facilitate students’ contact for later job placements;

d. To expose the students to work methods and techniques in handling equipment


and machinery that may not be available in their universities;

e. To provide students with an opportunity to apply their theoretical knowledge in


real work situation thereby bridging the gap between theory and practice.

f. Enlist and strengthen employers’ involvement in the entire educational process


and prepare Students for employment in Industry and Commerce.

1.2 THE SCOPE AND IMPORTANCE OF SIWES

The scheme covers all science and technological based courses in monotechnics,
polytechnics and universities in Nigeria, resulting in a high population of students which
is easily managed because of the public and private industries that partake in the scheme.
SIWES enables students acquire industrial know-how in their field of study particularly
in technological based courses. It also enables students experience the application of
theoretical knowledge in solving real life problems.

9
SIWES REPORT 2019

1.3 ORGANISATIONS INVOLVED IN THE MANAGEMENT OF SIWES


PROGRAMME AND THEIR ROLES

The Federal Government, the Industrial Training Fund (ITF), the Supervising Agency,
National Universities Commission (NUC), Employers of labour and Institutions have
specific roles to play in the management of SIWES. The roles are:

a. The Federal Government


➢ To provide adequate funds to the ITF through the Federal Ministry of Industry
for the scheme;
➢ To make it mandatory for all ministries, companies and parastatals to offer
places to students in accordance with the provisions of Decree No. 47 of 1971
as amended in 1990.
➢ Formulate policies to guide the running of the scheme nationally.

b. The Industrial Training Fund (ITF). This agency is to:

➢ Formulate policies and guidelines on SIWES for distribution to all the SIWES
participating bodies;

➢ Provide logistic material needed to administer the scheme;

➢ Organise orientation programmes for students prior to attachment;

➢ Provide information on companies for attachment and assist in industrial


placement of students;

➢ Supervise students on Industrial attachment;

➢ Accept and process Master and Placement lists from institutions and
supervising agencies;

➢ Vet and process students’ logbooks and ITF Form 8.


10
SIWES REPORT 2019

c. The Supervisory Agencies (NUC, NABTEB, etc.)

The NUC is to:

➢ Ensure the establishment and accreditation of SIWES unit/Directorate in


institutions under their jurisdiction;

➢ Vet and approve Master and Placement lists of students from participating
institution and forward same to ITF; Fund SIWES Directorate adequately in
participating institutions;

➢ Direct for the appointment of full-time SIWES Coordinator/Director;

➢ Participate in the Biennial SIWES conferences and seminars in conjunction


with ITF.

1.4 THE ROLE OF THE STUDENT AND THE ORGANISATION

The student is to partake in the program in such a way that the purpose and objectives of
the program will be achieved at the end. The student is advised to ask questions, be
submissive, and adhere to all the rules and regulations of the organization where he is
attached. The student is required to genuinely fill his logbook on a daily basis and get it
signed at the end of every week and month by the industrial based supervisor.

1.5 ABOUT THE FIRM


NetIT Solution Limited company is mainly into Computer
Hardware,Electronics,Equipments and offering CCTV Camera,Digital Cctv Camera
1.6 LOCATION
NetIT Solutions Limited is located in South-West Bye-Pass, Ring Road, Osogbo,
Osun State.

11
SIWES REPORT 2019

1.6 ORGANIZATIONAL CHART

I.T. DEPARTMENT

D.I.T
C.I.O
ASST. DIRECTOR
ADMINISTRATIVE NETWORK
OFFICER

NETWORK SENIOR SYS.


MANAGER MANAGER ENGINEER
USER SUPPORT (MAN)

HARDWARE SOFTWARE
NETWORK
UNIT
MANAGER
SENIOR SENIOR NETWORK
I.T. ENGINEER I.T. ENGINEER ENGINEER

NETWORK
I.T. ENGINEER I.T. SENIOR ENGINEER
ENGINEER SAT/TV
TECH.

INTERNS INTERNS
INTERNS
INTERNS

12
SIWES REPORT 2019

1.7 SECTIONS

The department of Information Technology is structured into three units:

➢ Hardware Unit
➢ User Support Unit/Software Unit
➢ Network Unit/ Metropolitan Area Network Unit

Hardware Unit and User Support Unit/Software Unit: The Hardware Unit (HU) and
The User Support Unit (USU) are both Headed by User Support Ass. Director assisted by
Ass. Manager and IT Engineers. The department is saddled with the responsibilities of
providing end user technology support via telephone, helpdesk, or at walk-in locations
across the campus. Our IT engineers can respond to general information technology
issues from the university faculty, staff, students, and members of the alumni association.
We also provide software diagnostics and installation, as well as other systems support
services. Most support is available at no charge to the University community.

Network Unit/ Metropolitan Area Network Unit: The Network Unit, headed by Network
Director and supported by Network Manager and network Engineers, handles within the
campus the deployment and maintenance of Network infrastructures, configuration of
devices, network security, Satellite TV, Voice over IP (VOIP), emails and Internet. The
Metropolitan Area Network (MAN) headed by MAN Manger supported by Network
Engineers, deals with the deployment and maintenance of network infrastructures in all
the residences of AUN and auxiliaries. The department is headed by the Chief
Information Officer (CIO) of the Department of Information System and Information
Technology who manages the administration and the operations of the department’s daily
activities. The CIO is assisted by two Directors, Ass. Director and three Managers of the
units.

13
SIWES REPORT 2019

CHAPTER TWO

WORK EXPERIENCE
2.0 INTRODUCTION TO CCTV INSTALLATION
Closed-circuit television (CCTV), also known as video surveillance,[1][2] is the use
of video cameras to transmit a signal to a specific place, on a limited set of monitors. It
differs from broadcast television in that the signal is not openly transmitted, though it
may employ point-to-point (P2P), point-to-multipoint (P2MP), or mesh wired or wireless
links. Though almost all video cameras fit this definition, the term is most often applied
to those used for surveillance in areas that may need monitoring such as banks, stores,
and other areas where security is needed. Though videotelephony is seldom called
'CCTV' one exception is the use of video in distance education, where it is an important
tool.

2.1.0 USES OF CCTV

Crime prevention
CCTV can be use for preventing all form of crime including buglar,theft, also found that
CCTV could decrease unruly behaviour in football stadiums and theft in
supermarkets/mass merchant stores.

14
SIWES REPORT 2019

Crime solving

CCTV can also be used to help solve crimes. In London alone, six crimes are solved each

day through CCTV footage.Sometimes, footage from CCTV camera's of citizens can

even be used for this purpose.

Body worn

In recent years, the use of body worn video cameras has been introduced for a number of

uses. For example, as a new form of surveillance in law enforcement, with cameras

located on a police officer's chest or head

Traffic monitoring

Many cities and motorway networks have extensive traffic-monitoring systems, using

closed-circuit television to detect congestion and notice accidents.Many of these cameras

however, are owned by private companies and transmit data to drivers' GPS systems.

Increasing safety and security in public transport

A CCTV system may be installed where any example, on a driver-only operated train

CCTV cameras may allow the driver to confirm that people are clear of doors before

closing them and starting the train

Sporting events

Many sporting events in the World uses CCTV inside the venue for fans to see the action

while they are away from their seats. The cameras send the feed to a central control

center where a producer selects feeds to send to the television monitors that fans can

15
SIWES REPORT 2019

view. CCTV monitors for viewing the event by attendees are often placed in lounges,

hallways, and restrooms. In a trial with CCTV camera's, football club fans no longer

needed to identify themselves manually, but could pass freely after being authorized by

the facial recognition system

Employee monitoring

Organizations use CCTV to monitor the actions of workers. Every action is recorded as

an information block with subtitles that explain the performed operation. This helps to

track the actions of workers, especially when they are making critical financial

transactions, such as correcting or cancelling of a sale, withdrawing money or altering

personal information.

Actions which an employer may wish to monitor could include:

• Scanning of goods, selection of goods, introduction of price and quantity;

• Input and output of operators in the system when entering passwords;

• Deleting operations and modifying existing documents;

• Implementation of certain operations, such as financial statements or operations with

cash;

• Moving goods, revaluation scrapping and counting;

• Control in the kitchen of fast food restaurants;

• Change of settings, reports and other official functions.

16
SIWES REPORT 2019

Each of these operations is transmitted with a description, allowing detailed monitoring

of all actions of the operator. Some systems allow the user to search for a specific event

by time of occurrence and text description, and perform statistical evaluation of operator

behaviour. This allows the software to predict deviations from the standard workflow and

record only anomalous behaviour

2.1.1TYPES OF CCTV CAMERAS

(1)Networking CCTV Camera

(2)IP Camera

(3)Wireless/Tapeless Camera

2.1.2 HOW TO INSTALL CCTV CAMERA

What is needed to setup an IP camera system over the network?

The following 5 components comprise an IP based camera system that is setup over a

network.

1. PoE Switch that is 802.3af/at Compliant

At the heart of the whole network that pumps data between cameras and recorder is the

PoE switch. Powering and transmitting data from IP cameras requires networking

equipment to do so. IP cameras can be powered near the installation point with 12V DC

17
SIWES REPORT 2019

adaptors, or can utilize PoE technology in the PoE switch that provides power and data

from one convenient device and over one cable.

It is very important to use PoE equipment that is compliant with 802.3af or 802.3at

standards, which ensures correct power delivery to the cameras. PoE switches and

injectors meant for wireless access points are Passive in their power delivery, meaning

they do not negotiate the correct power required for the camera

2. Security Camera Recorder

The surveillance camera recorder is the brains of a surveillance system if you are looking

for a central location to manage, record, playback, and download recorded video. The

recorder in an IP camera system can be any one of our DVRs or NVRs.

3. IP Security Cameras

Of course you will need IP security cameras as they are the eyes of a camera system. IP

cameras capture video and send it to the NVR as digital data through the PoE switch.

4. CAT5e or CAT6 Network Cable

Good quality network cable is crucial for proper power and data transmission between

the cameras, PoE switch, and NVR. As explained in our network cable page there are a

variety of cable grades available. For runs over 150ft we always recommend using a full

copper CAT5e cable at the least which usually comes in a role.

A PoE extender borrows a small amount of power to amplify the data signal and send

it down further. Here are a few tips for proper PoE Extender use:

18
SIWES REPORT 2019

1. Use CAT6 full copper cable for all wire runs involved in the use of a PoE extender

to provide the best possible power transmission

2. Do not use PoE extenders for cameras requiring more than 15W of power, which

includes PTZ IP cameras, and long range night vision security cameras.

5. Internet Service Provider Modem/Router for Remote Viewing

While not required to setup an IP camera system, the last component is an internet router.

Often times a customer will already have an internet router, modem, or a combination of

the two provided by the Internet Service Provider (ISP). A router ties together the whole

network and routes data between switches, recorders, and computers on the local

network.

A router also enables a camera system to communicate through the internet for

remote viewing. We advise our customers to purchase their own router that is separate

from what an ISP provides. ISPs often sell or lease low-quality routers that are not

designed to handle the large amounts of video data involved in an IP camera system,

which creates a bottleneck for the cameras and recorder to communicate.

19
SIWES REPORT 2019

2.1.3 HOW TO CONNECT AN IP CAMERAS SYSTEM

Preparation

Before you install any cameras it is extremely important to bench test all equipment to

avoid the hassle of troubleshooting after installation. Bench testing is also a good time to

learn how to configure the cameras to record. Many times improper cable crimping can

lead to a lot of confusion. For proper network cable crimping technique, please refer to

the section above.

For installing an IP cameras system there is no "one size fits all" solution. It is a good

idea to plan the system ahead of time noting where each camera will be installed. Label

each camera and wire so that you do not confuse cameras when connecting them to the

NVR.

Planning

In the section below, we've made it simple to understand the different ways that

components of a NVR camera system or IP camera system can be connected to each

other. Please spend some time watching the videos to understand the common methods to

connect a NVR and PoE switch together. The way all components are connected together

depends on the following factors:

• The number of uplink (LAN) ports present on the PoE switch

• The number of LAN ports present on the NVR

20
SIWES REPORT 2019

• Whether a strong router is present on the network that is capable of handling the large

amount of continuous data traffic required for surveillance cameras on the network

• Whether it is more convenient to run a cable directly from the PoE switch to the NVR or

router

Method 1: PoE Switch with 1 Uplink Port to Router

Our first method diagram shows how a PoE switch with one uplink should be setup to

connect network cameras to the network. The PoE switch is connected to a router using

its uplink port, and the NVR is connected to the router directly as well. Cameras

communicate through the PoE switch and the router. Since everything is on the same

network, the NVR or DVR recorder is able to communicate with the cameras through the

router.

21
SIWES REPORT 2019

Birefly, here is a list of simple steps:

1. First connect the NVR's LAN port to a LAN (numbered port) port on the router.

2. Connect the uplink port of the PoE switch to a different LAN (numbered port) port on the

router.

3. Connect a PoE camera to one of the PoE ports of the PoE switch.

The router "networks" the switch and NVR together, meaning it creates a flow of camera

data from the PoE switch to the NVR.

Method 2: PoE Switch with 2 Uplink Ports to connect Router and NVR

In this section we discuss how to setup an IP system using a PoE switch that has 2 uplink

ports. This approach is advantageous as it allows the NVR to be connected directly to the

switch and fetch data from the cameras without having data bog down the router. The

below diagram illustrates this setup.

22
SIWES REPORT 2019

It is also an easy process, involving the following 3 steps:

1. First connect the NVR's LAN port to the uplink port on the switch.

2. Connect the second uplink port of the PoE switch to a LAN (numbered port) port on the

router.

3. Connect a PoE camera to one of the PoE ports on the PoE switch.

While we have the NVR located close to the switch in our example, it can be placed up to

300ft away from a network switch

Method 3: PoE Switch with 2 uplink ports to add Additional cameras

This method is applicable if you purchased a PoE NVR and are trying to add IP cameras

over the network. The LAN port on a PoE NVR is the network port that is separate from

the grouped PoE ports on the back of the NVR. Connect the LAN port to an uplink port

23
SIWES REPORT 2019

on the PoE switch as shown below, or you can even connect it directly to the router.

Connect the other uplink port on the PoE switch to the router. The cameras connect to the

PoE switch.

2.1.4 HOW TO CONFIGURE A SECURITY CAMERA RECORDER ON THE

NETWORK.

After physically connecting the security camera recorder to the network, the first thing to

do is to set its IP address that conforms to your network. You'll want to set the recorder to

a static IP address that matches your network scheme.

1. Change the recorder's IP address to match the network

All of our IP cameras, NVRs and DVRs ship with a default address of 192.168.1.108. A

duplicate IP address conflict is going to happen if you try to connect multiple cameras

and recorder without setting each to a distinct IP address.

24
SIWES REPORT 2019

As a first step it is important to change the IP address on the recorder before attempting

to connect any cameras. The new IP address cannot be used for any other devices or

cameras. The new address must match the existing network scheme or range.

2. Verify the NVR is communicating on the network

To verify that the NVR is properly configured to communicate on the network run the

Ping command on a PC that is connected to the same router as the NVR

3. Initialize and connect an IP Security Camera

Initializing the camera on a 192.168.1.1 network

After the equipment is physically connected it is easy to configure and start recording

each camera. CCTV Camera World's NVR and DVRs support initializing and

configuring an IP address on a camera from the Camera Registration menu in the user

interface of the NVR or DVR.

Initializing the camera on a network other than 192.168.1.1

After the NVR is configured to communicate on the non-192.168.1.xxx network you

must initialize and configure the cameras to be on the same network. Conveniently our

recorders support initialization and configuration even if the camera is on a different

network.

Once you have cameras connected and viewable from the NVR you are all set. Repeat the

process for each camera that you plan to deploy. Be sure to set each camera to a different

IP address.

25
SIWES REPORT 2019

Tips and tricks for adding cameras to an IP security camera system

Here are some preparation tips you should read before connecting any cameras:

1. It is very important to connect only one camera at a time when initializing and

configuring their IP addresses. Having multiple cameras with the same IP address

causes a conflict on the network and prevents the NVR from successfully modifying

configurations.

2. Ping the network to find an available IP address range. If you are unsure how to check

if an IP address is available, please refer to Step 2 above.

3. Planning the system out before configuration is a great idea as well. Make a list of IP

addresses for each camera that will be connected to the system. This helps avoid

duplicate IP addresses being assigned. The table below can be used as a good

framework to document each camera and its IP address in your surveillance system.

2.2 COMPUTER NETWORKING

Computer: A computer is an electronic device that accepts data via input device(s),
processes with the aid of processors, stores it with the aid storage device(s) and gives
information via output device(s).

Network: Is a group of two or more devices that can communicate. In practice, a network
is comprised of a number of different computer systems connected by physical and/or
wireless connections. The scale can range from a single PC sharing out basic peripherals
to massive data centers located around the World, to the Internet itself. Regardless of
scope, all networks allow computers and/or individuals to share information and
resources.

26
SIWES REPORT 2019

Networking: Is the sharing of resources and services between interconnected devices.

Computer Network: Is a group of interconnected of devices sharing resources and


interacting using a shared communications link.

In a computer network, devices pass data to each other along network links. The
connections are established using either cable media or wireless media. Certainly the
internet is the most conspicuous example of computer networking, linking millions of
computers around the world, but smaller networks play a role in information access on a
daily basis.

a. Local Area Network (LAN)


b. Wide Area Network (WAN)
a) Local Area Network (LAN): is a network that is confined to a relatively small

area. It is generally limited to a geographic area such as a writing lab, school, or


building. Local Area Network, generally called LAN, is a private network within a
single building or campus of up to a few kilo-meters in size. They are widely used
to connect personal computers and workstations in company offices and factories
to share resources (e.g. printers) and exchange information. LANs are
distinguished from other kinds of networks by three characteristics- size,
transmission and topology.
b) Wide Area Network (WAN): connect networks in larger geographic areas, such

as Florida, the United States, or the world. Dedicated transoceanic cabling or


satellite uplinks may be used to connect this type of global network. Using a
WAN, schools in Florida can communicate with places like Tokyo in a matter of
seconds, without paying enormous phone bills.

2.2.1 NETWORK COMPONENTS

Below are some networking components which I worked with during my training:

27
SIWES REPORT 2019

Network Switch: Like a hub, a switch also works at the layer of LAN (Local Area
Network) but you can say that a switch is more intelligent than a hub. While hub just
does the work of data forwarding, a switch does ‘filter and forwarding’ which is a more
intelligent way of dealing with the data packets.

So, when a packet is received at one of the interfaces of the switch, it filters the packet
and sends only to the interface of the intended receiver. For this purpose, a switch also
maintains a CAM (Content Addressable Memory) table and has its own system
configuration and memory. CAM table is also called as forwarding table or forwarding
information base (FIB).

Modem: A Modem is somewhat a more interesting network device in our daily life. So if
you have noticed around, you get an internet connection through a wire (there are
different types of wires) to your house. This wire is used to carry our internet data outside
to the internet world. However, our computer generates binary data or digital data in
forms of 1s and 0s and on the other hand, a wire carries an analog signal and that’s where
a modem comes in. A modem stands for (Modulator+Demodulator). That means it
modulates and demodulates the signal between the digital data of a computer and the
analog signal of a telephone line.

28
SIWES REPORT 2019

Network Router: A router is a network device which is responsible for routing traffic
from one to another network. These two networks could be a private company network to
a public network. You can think of a router as a traffic police who directs different
network traffic to different directions.

Network Wireless Access Points: In computer networking, a wireless access point


(WAP), or more generally just access point (AP), is a networking hardware device that
allows a Wi-Fi device to connect to a wired network. The AP usually connects to a router
(via a wired network) as a standalone device, but it can also be an integral component of
the router itself. An AP is differentiated from a hotspot, which is the physical location
where Wi-Fi access to a WLAN is available.

29
SIWES REPORT 2019

2.2.1.1 NETWORK TOPOLOGY

Common topology found in networking includes mesh topology star topology, bus
topology, ring topology, and others. Network topology refers to the layout of the
transmission medium and devices on a network. Topologies use either a point to point or
multipoint connection scheme. A connection scheme indicates how many devices are
connected to a transmission media segment or an individual cable.

Star Topology: This is a local area network topology where all the nodes are connected
individually to a central connecting device called a hub or switch. Signals travel from the
nodes to the hub which then sends signals to other nodes on the network. A star topology
network is scale able –i.e. it can be design and redesign easily.

Bus Topology: A LAN topology where each node is connected to a single main bus
cable, is transmits data to all the nodes on the network. The bus is actually a series of

30
SIWES REPORT 2019

cable segments running from one node to the other. Break or faulty piece of cable
anywhere on the segment prevents all the computers on the segment from being able to
communicate.

Mesh Topology: This is a network topology where every node on the network has a
separate wire connecting it to every other node on the network. It provides each device
with a point-to-point connection/ to every other device in the network. This type of
network has a high fault tolerance because failure of one node does not affect data
transmission between other nodes.

2.2.2 THE OSI REFERENCE MODEL

OSI (Open Systems Interconnection) is a reference model for how applications


communicate over a network. A reference model is a conceptual framework for
understanding relationships. The purpose of the OSI reference model is to guide vendors
and developers so the digital communication products and software programs they create

31
SIWES REPORT 2019

can interoperate, and to facilitate a clear framework that describes the functions of a
networking or telecommunication system. Most vendors involved in telecommunications
make an attempt to describe their products and services in relation to the OSI model.
Developed by representatives of major computer and telecommunication companies
beginning in 1983, OSI was originally intended to be a detailed specification of actual
interfaces. Instead, the committee decided to establish a common reference model with
which others could then develop detailed interfaces, which, in turn, could become
standards governing the transmission of data packets. The OSI architecture was officially
adopted as an international standard by the International Organization for Standardization
(ISO). The main concept of OSI is that the process of communication between two
endpoints in a network can be divided into seven distinct groups of related functions, or
layers. The seven Open Systems Interconnection layers are (from layer seven down-
ward):

▪ Application - contains protocols used for process-to-process communications.

▪ Presentation - provides for common representation of the data.

▪ Session - provides services to the presentation layer to organize its dialogue and to
manage data exchange.

▪ Transport - defines services to segment, transfer, and reassemble the data.

▪ Network - provides services to exchange the individual pieces of data over the
network between identified end devices.

▪ Data Link - provides methods for exchanging data frames between devices over a
common media.

▪ Physical - describes the mechanical, electrical, functional, and procedural means


to transmit bits across physical connections.

32
SIWES REPORT 2019

2.2.3 THE TCP/IP MODEL

The TCP/IP protocol suite is an open standard, meaning these protocols are freely
available to the public, and any vendor is able to implement these protocols on their
hardware or in their software. It consists of four layers as seen in the diagram below;

TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of


communication protocols used to interconnect network devices on the internet. TCP/IP
can also be used as a communications protocol in a private network (an intranet or an
extranet). The entire internet protocol suite -- a set of rules and procedures -- is
commonly referred to as TCP/IP, though others are included in the suite. TCP/IP

33
SIWES REPORT 2019

specifies how data is exchanged over the internet by providing end-to-end


communications that identify how it should be broken into packets, addressed,
transmitted, routed and received at the destination. TCP/IP requires little central
management, and it is designed to make networks reliable, with the ability to recover
automatically from the failure of any device on the network.

2.2.4 NETWORK MEDIA

Network Media refers to the communication channels used to interconnect nodes on a


computer network. Typical examples of network media include copper coaxial cable,
copper twisted pair cables and optical fiber cables used in wired networks, and radio
waves used in wireless data communications networks.

• Wired media
• Wireless media

2.2.4.1 WIRED MEDIA


These are media which require the use of wires, lines and cables to transmit
communication signals.

Table I: IEEE Cabling Standards

Speed Name IEEE Name IEEE Standard


Cable/Length
10Mbps Ethernet 10BASE-T 802. 3 Copper/100 m
100Mbps FastEthernet 100BASE-T 802. 3u Copper/100 m
1000Mbps GigabitEthernet 1000BASE-LX 802. Fiber/5000 m
3z
1000Mbps GigabitEthernet 1000BASE-T 802. 3ab Copper/100 m
10Gbps TenGigabitEthernet 10GBASE-T 802. 3an Copper/100 m

34
SIWES REPORT 2019

Coaxial cable

A coaxial cable is an alternative for protecting data from noise. Coaxial cables do not
produce external electric and magnetic fields and are not affected by them. This makes
them ideally suited, although more expensive, for transmitting signals.

Twisted pair cable

In a twisted pair there are eight copper wire that are coated with different colours; the
colours are mix/orange, orange, mix/blue, blue, mix/green, green, mix/brown and brown.

These colours are very important when terminating cables. The two most common ways
of terminating Ethernet cables are:

(i) Straight-through method

35
SIWES REPORT 2019

In straight-through method, in any way you put in your cable, the colour adopted
at both ends must be the same.

(ii) cross-over method

In a cross-over method all you need to do is to terminate one end with a straight rule
method and the other end would be that pin ‘1’ goes to pin ‘3’ and vice-versa, the pin ‘2’
then goes to pin ‘6’ and also vice-versa.

I got to know that a cross-over cable is used to connect two similar devices like a PC to a
PC while a straight through cable is used to connect different devices e.g. a PC to a
router.

36
SIWES REPORT 2019

2.2.4.2 CRIMPING TOOLS

RJ-45 Connectors

RJ45 is a standard type of connector for network cables. RJ45 connectors are most
commonly seen with Ethernet cables and networks. RJ45 connectors feature eight pins to
which the wire strands of a cable interface electrically. Standard RJ-45 Pin outs define
the arrangement of the individual wires needed when attaching connectors to a cable.

Crimper

Is a tool used to terminate category cables such as CAT1-CAT6 using an RJ-45


connector; it can also be used to cut cable to a desired length.

LAN cable tester

37
SIWES REPORT 2019

This is used to test if a category cable has been well terminated, or develop a fault.

Crimping Guide:

Step1: Outer Sheathe Stripping

Step 2: Wire Untwisting to any of the Arrangement Scheme

Step 3: Wire Preparation for RJ-45 Connector

Step 4: Inserting Wires into RJ-45 Connector

Step 5: Crimp and Test The continuity

Fiber Optic Cable

It is made of glass fibers instead of wire; it consists of a center glass core surrounded by
several layers of protective material. The outer insulating jacket is made of Teflon or
PVC. The fiber optic cables transmit light rather than electronic signals, thereby
eliminating the problem of electrical interference.

Figure 1:Fiber optic cables

38
SIWES REPORT 2019

Optical fibers come in two types:


• Single-mode fibers

• Multi-mode fibers

Single-mode fibers have small cores while Multi-mode fibers have larger cores. Used for
short-distance communication links.

2.2.4.3 WIRELESS MEDIA

To fully explore the wireless added dimension, Communication system designers have
sought to use wireless media to reduce infrastructure cost and complexity, when
compared to wired communication systems. There is no need to construct miles of
telephone line poles or cable trenches.

2.2.5 IP ADDRESSING

An IP address is a unique identifier that is assigned to a host on a network. It is also a


unique identifier for a host or a node on a network. We have IPv4 and IPv6. IPv4 is 32-
bits and IPv6 is 128-bits.

Functions of IP Addressing

• For location of a device on the network

39
SIWES REPORT 2019

• It is assigned to allow hosts on one network to communicate to hosts on another


network
• IPv4 address is 32 bits divided in to four octets or bytes using dots ‘.’

Classes of IPv4 Addresses

IPv4 which is 32bits has class ranges from class A-E

Class A: This Class address can only be between 0 and 127. All 0’s reserved for default
route and ‘127’ is reserved for troubleshooting –loop back, therefore in reality Class A
valid address range that can be assigned to host on a network is 10-126

Class B: Class B address can only be between 172 – 191

Class C: Class address can only be between 192 – 223

NB: Class A-C are used for unicast.

Class D and E: Class D (224-239) used for multicasting and Class E (240-255) for
research purposes

Broadcast Address

This is the address used to send data to all hosts on a broadcast domain. When all the
host bits are on (‘1’) this is a broadcast address for all hosts 255 are reserved for sending
broadcast message.

Private IPv4 Addresses

• Not routable
• Introduced in mid 1990s due to depletion of IPv4 addresses
• Used only in internal networks.
• Must be translated to a public IPv4 to be routable.
• Defined by RFC 1918
40
SIWES REPORT 2019

Private Address Blocks

• 10.0.0.0 /8 10.255.255.255
• 172.16.0.0 /12 to 172.31.255.255
• 192.168.0.0/16 to 192.168.255.255

Public IPv4 Addresses: Are addresses outside the private ones.

2.2.5 SUBNET MASK

A subnet mask is a 32-bit value that allows the recipient of an IP packet to distinguish the
network ID portion of the IP address from the host ID portion of the IP address. Table 3
shows the default subnet masks for all classes of network.

Table II: Subnet Mask for Different Classes of Networks

Class of Format Default Subnet Mask


IP

A Network. node. node. node 255.0.0.0

B Network. network. node. node 255.255.0.0

C Network. network. network. Node 255.255.255.0

2.2.6 SUBNETTING

Subnetting is the process of stealing bits from the host part of an IP address in order to
divide the larger network into smaller sub-networks called subnets. After subnetting,

41
SIWES REPORT 2019

network subnet host fields are created. An IP address is always reserved to identify the
subnet and another one to identify the broadcast address within the subnet. Subnetting
can be done in three basic ways, one of which is subnetting based on the number of
subnetworks you wish to obtain from a single block of IP address; another way is to
subnet based on the number of host computers or devices you want to be connected to
that sub-network and finally subnetting by reverse engineering which is a scenario in
which a subnet mask and an IP address block is given and the number of subnetworks
and number of hosts per each subnet are found. For example, if a public IP address block
of 192.168.23.1 with a subnet mask of 255.255.255.252 is purchased from our ISP and
because this block has only two valid hosts, this IP address is used to assign to our Router
interface so that traffic can be directed from our network to the ISP and from there to the
internet. A private IP address block is then chosen to carry out IP addressing within our
network. Because of the expected clients on this network, a Class B address is chosen for
the internal network and it is 172.168.0.0 with a mask of 255.255.0.0. Based on the
power of 2s, there are some equations that allow us to determine the required details, and
these are:

Number of subnets = 2x (1)

Number of hosts per subnet = 2y - 2 (2)

Block size = Increment = 256 – subnet mask (3)

2.2.7 CISCO PACKET TRACER

Cisco Packet Tracer is an innovative network simulation and visualization tool. Packet
Tracer provides an easy way to design and build networks of varying sizes without
expensive lab equipment. Packet Tracer is a tool that allows you to simulate real
networks. It provides three main menus that allow you to:

• add devices and connect them via cables or wireless

42
SIWES REPORT 2019

• select, delete, inspect, label, and group components within your network

• manage your network

The network management menu allows you to:

• open an existing/sample network

• save your current network

• modify your user profile or your preferences

2.2.8 VLANs

Within a switched internetwork, VLANs provide segmentation and organizational


flexibility. VLANs provide a way to group devices within a LAN. A group of devices
within a VLAN communicate as if they were attached to the same wire. VLANs are
based on logical connections, instead of physical connections. VLANs allow an
administrator to segment networks based on factors such as function, project team, or
application, without regard for the physical location of the user or device. Devices within
a VLAN act as if they are in their own independent network, even if they share a
common infrastructure with other VLANs. Any switch port can belong to a VLAN, and
unicast, broadcast, and multicast packets are forwarded and flooded only to end stations
within the VLAN where the packets are sourced. Each VLAN is considered a separate
logical network, and packets destined for stations that do not belong to the VLAN must
be forwarded through a device that supports routing.

43
SIWES REPORT 2019

44
SIWES REPORT 2019

CHAPTER THREE
3.0 INTRODUCTION
COMSOL Multiphysics is a cross-platform finite element analysis, solver
and multiphysics simulation software. It allows conventional physics-based user
interfaces and coupled systems of partial differential equations (PDEs). COMSOL
provides an IDE and unified workflow for electrical, mechanical, fluid, acoustics and
chemical applications.
Beside the wide range of classical problems that can be efficiently addressed with the
specific application modules, the core Multiphysics package can be used to solve
Schrödinger-type (PDEs), and has been successfully applied for simulating quantum
effects in low dimensional systems like metallic nanoparticles,carbon nanotubes,quantum
dots, quantum wells,artificial molecules,and monolayer transition metal dicholcagenides.
The following are the basic sections in the mechanical software

3.1 THE HELP WINDOW


When setting up a simulation in COMSOL Multiphysics, you may want to seek out
more information on the software as you go. Whether it’s learning about a node in the
model tree, the settings for an operation you’re currently working in, or the differences
between a set of options you are choosing from and what they will mean for your
model, it’s helpful to have guidance available at your fingertips. This is the convenience
that the Help window in COMSOL Multiphysics provides.

45
SIWES REPORT 2019

The Help window, accessed by clicking the Help button in the top right-hand corner of
the software (the blue question mark) or the F1 key on your keyboard, enables you to
promptly access information pertaining to the model tree node or window in which you
are currently working. The text that displays updates automatically as you select items
in the software or add settings to your model. This enables you to instantly get help
right when you need it.

Since this window appears in the COMSOL Desktop® when opened, you can access
the information you need without having to compete for screen space with your
simulation. Instead of having to fit multiple windows on your monitor, you are able to
view the help content and Model Builder together.

Additionally, you can search and navigate the text in the Help window using the
respective buttons.

3.2 THE DOCUMENTATION WINDOW


In addition to receiving topic-based help, there may be times when you want to more
easily access, navigate, and search all of the comprehensive COMSOL Multiphysics

46
SIWES REPORT 2019

documentation. This includes the user guides and manuals for any modules for which
you have a license. You can find this documentation in the Documentation window,
which you can access either from within COMSOL Multiphysics, by going to File >
Help, or externally from your computer in your COMSOL Multiphysics installation
folder.

The Documentation window enables you to quickly and easily access your entire library
of COMSOL Multiphysics documentation, all within a single window. When open, you
can choose between the PDF or HTML version of any guide, manual, or handbook.
Additionally, the sections of each individual document are hyperlinked and
bookmarked. The sections are displayed on the left side of the window, as shown
above. This enables you to quickly jump between different chapters and documents.

This resource also provides more options when it comes to searching through the
software documentation. This includes the ability to search through the entire library,
only within a specified set of documents you have preselected, or exclusively through
the Application Library Manual for all licensed products. Searching the Application
Library Manual, in particular, enables you to find models and applications that
demonstrate use of some specific physics, software features, and functionality.

47
SIWES REPORT 2019

Whereas the Help window provides quick access to documentation while modeling, the
Documentation window serves as a more comprehensive resource when you need
further clarification and more powerful search tools.

3.3 THE APPLICATION LIBRARIES WINDOW


Now you know that you can access information about what you are working on. The
ability to access modeling examples relevant to your work is equally as important.
These examples enable you to learn how to use the software, examine COMSOL
Multiphysics models, and access guidance that you can apply to your own simulations.
In the COMSOL® software, the modeling examples can be found in another valuable
resource, the Application Libraries window.

The Application Libraries window, accessed by going to File > Application Libraries,
contains hundreds of models and simulation applications, spanning every module and
engineering discipline. Using the Search field, you can find applications and models

48
SIWES REPORT 2019

that cover some specific physics or feature that you want to see how you can use. Each
entry includes a brief summary of the model; the COMSOL Multiphysics model file;
and a PDF document that provides a comprehensive introduction and detailed, step-by-
step overview of the model-building process. This provides you with the logic behind
how the model is built, why and how boundary conditions are applied, and other useful
information that you can use as insight into the models you create.

By following along with any of the tutorial models available, you can experience
building a model firsthand. In addition, relevant examples from the Application
Libraries can be experimented with and expanded upon, serving as a starting point for
your own designs.

Tip: The tutorial models and demo applications featured in the Application Libraries are
also available online.

49
SIWES REPORT 2019

CHAPTER FOUR

4.0 PROBLEMS ENCOUNTERED DURING SIWES

During my IT period, I faced challenges such as;

a) Inability of firms, organizations, companies to accept IT students, and to dedicate


quality time towards educating and enlightening them about work etiquette.
b) Inability of the university to provide a more suitable office or workshop for
SIWES students.
c) Lack of trust and confidence on the side of the organizations towards students on
Industrial attachment.
d) There was problem of accommodation within the company which was a serious
challenge for students on attachment leaving them with no option than to rent
apartments in nearby settlements.
e) This was another challenge for students leaving in nearby settlement due to lack of
accommodation within the company. Despite a means transportation provided by
the company to convey workers to and fro, there was either late arrival of the
vehicle or failure to turn up which leave the students with no option than to pay for
transport fair since they are after knowledge.

4.1 RELEVANCE OF SIWES PROGRAMME

The student industrial work experience scheme (SIWES) is aimed at exposing students to
the practical work of what they are taught in the class so as to have better understanding
of what they are taught. And this I have acquired during my SIWES program at American
University of Nigeria.

My academic work was very paramount to my experience I gained from both networking
and hardware because it gave me real basics of theories and as a computer scientist,
understanding these theories was really important because it’s what makes the difference

50
SIWES REPORT 2019

between me who read computer science and someone one who attended a road side
computer schools as system technician.

The industrial experience scheme is an opportunity to work and have the real practical
skills needed. The academic work serves as a platform to know and understand the
components, the various aspects, the theories, laws, principles, techniques and diverse
areas of computer science which serves as the basis for understanding what would be
done practically as well as selecting the area of specialization in accordance with the
choice of company to work with during the SIWES training. My Academic work made
me to understand what I did well during my IT because some terms were used during my
training of which were not explained in details but my academic knowledge made me
understand what was being taught.

51
SIWES REPORT 2019

CHAPTER FIVE

DISCUSSION

5.0 GENERAL APPRAISAL OF THE PROGRAMME

Having gone through the industrial training, I have the following suggestions to make for
the effectiveness of Student Industrial Work Experience Scheme (SIWES).

i. Government should endeavor to improve business relationships with companies


that accommodate SIWES students, as a way of adding importance to the scheme,
in reality.
ii. Students should be paid before or during their period of attachment to assist them
during the training.
iii. The supervisor should be those acquainted with the fields the students are
attached. Also, the students should be asked whether or not they have been given
appropriate training during supervision.
iv. Proper orientation should be given to students expected to go on industrial training
to go and obtain knowledge rather than taking it as a medium to make money.

5.1 WAYS OF IMPROVING THE PROGRAMME

a. Solution to the inability of organizations to accept students; It should be inscribed


in the constitution that companies, organizations are to accept students from the
nations’ higher institute of learning on SIWES, and failure to do that will lead to
some sort of penalty.
b. The fund provided by ITF to students should be paid if possible during the
program as some of the students go financially bankrupt which makes the program
stressful and unconducive or even if it should be paid after the program it should
be done on time to help them in one way or the other.
c. Organizing workshops, seminars and symposium for students in various faculties
in other to keep the student abreast of new technologies and innovations.

52
SIWES REPORT 2019

d. Posting of students for SIWES should be done by the scheme to ensure conformity
with course of study.

5.2 ADVICE FOR THE FUTURE PARTICIPANTS

a. Students on SIWES should try by all means and avail themselves to their places
of work no matter what regardless of them been paid there or not as their aim is
to acquire knowledge.
b. Students on SIWES should adhere strictly to rules and regulations designed by
the organization most especially those in companies should adhere strictly to
safety regulations.
c. Students should be good ambassadors of their institutions of learning.

5.3 ADVICE FOR SIWES MANAGERS

a. SIWES management staff should ensure that SIWES supervisors visit students in
their places of attachment at least twice.
b. Funds allocated to students for the program should be released to them as soon as
the SIWES supervisors pay their first visit or immediately after the program.
c. If possible SIWES body should liaise with the organization on the welfare of
students on attachment such as accommodations.

5.4 CONCLUSION

This industrial training has afforded me the basic practical and theoretical knowledge that
I may not have gotten from the lecture room. It also gave me the opportunity to have a
feel of what it would be like after graduation when I start working

In conclusion, based on my experience during the program, I have learnt and gained a lot
such as:

a. I can confidently and effectively educate pupils, parents, students, military, and
local Governments in computer literacy.

53
SIWES REPORT 2019

b. I can effectively handle the demands of the information system of the


university and consequently, any Organization I find myself in future.
c. I can effectively assist in the administration of any mechanical company’s
computer network system, LAN and WLAN inclusive.
d. I can carry out repair works on computer systems and accessories, which
includes printers and scanners.

54
SIWES REPORT 2019

REFERENCES

Adrian Waygood, An Introduction to Mechanical Science (Milton Park, Abingdon,


Oxon:
Routledge, 2013), p. 40.

Albert Jackson; David Day, Popular Mechanics Complete Home How-to (New York:
Hearst
Books, 2009), p. 282.

Computer network definition, archived from the original on 2012-01-21, retrieved 2011-
11-12

Designing and Building a Campus Wireless Network" (PDF). MCNC. 2012

Posinna, Mariddetta (Apr 1, 2014). "different types of fiber optic cables".


HFCL. Archived from the original on 2016-04-20. Retrieved 2016-04-11.

S. Deering; R. Hinden (December 1995), Internet Protocol, Version 6 (IPv6)


Specification, Internet Engineering Task Force (IETF), RFC 1883

Ugwuanyi Ezema, Challenges of SIWES in Library and Information Science in the ICT
Environment. Retrieved October 18, 2013 from; Understanding VLAN
Trunk
Protocol (VTP) at Cisco.
WEBSITES

https://10.2.27.8
https://www.netacad.com/login/studentresources
https://en.wikipedia.org/wiki/Fiber-optic_communication

55

View publication stats

You might also like