Madiba Siwes It Report Real

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 36

VERITAS UNIVERSITY ABUJA

(THE CATHOLIC UNIVERSITY OF NIGERIA)

TECHNICAL REPORT

ON

STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

UNDERTAKEN AT

CODE OF CONDUCT BUREAU


&
GALAXY BACKBONE

BY

OKOLO MADIBA PIUS

MATRICULATION NUMBER: VUG/CSC/18/2730

SESSION: 2020/2021 (SECOND SEMESTER)

SUBMITTED TO THE DEPARTMENT OF COMPUTER AND INFORMATION


TECHNOLOGY IN PARTIAL FUFILMENT OF THE REQUIREMENTS FOR THE
AWARD OF BACHELOR OF SCIENCE IN COMPUTER SCIENCE 19ND OF
NOVEMBER, 2021
1|Page
APPROVAL P

AGE

This is to certify that this report represents my industrial work experience at the Office of the
Head of Civil Service of the Federation, Abuja, Nigeria.
I hereby certify that I, OKOLO MADIBA PIUS with the matriculation number
VUG/CSC/18/2730 of the Computer Science department of VERITAS University Abuja,
FCT, wrote this report in partial fulfillment of the requirement of the award of Bachelor of
Science (B.S.C)
This report has not been submitted elsewhere.

HEAD OF DEPARTMENT UNIVERSITY SIWES SUPERVISOR

SIGNATURE & DATE SIGNATURE & DATE

_______________________ ________________________

2|Page
DEDICATION

I dedicate this SIWES report to God Almighty, whose grace has guided me through my
life journey to accomplish a lot and also dedicate my SIWES work to my family and many
friends. A special feeling of gratitude to my loving parents, Anselm and Agatha Okolo, whose
words of encouragement and push for tenacity ring in my ears. My sister, Nneoma and Cousin
Albarka who have never left my side and are very special.

I also dedicate this work to my lecturers who has guided me academically and also my
boss Mr. Mike Echukwube for the privilege to work with her, with my co-workers who helped
and contributed to the completion of the program.

3|Page
CERTIFICATION

This is to certify that this report of Student Industrial Work Experience Scheme (SIWES)
program was carried out by Okolo Madiba Pius with Matric Number VUG/CSC/18/2730, a
Computer Science Student of Veritas University, Abuja at Code of conduct Bureau, Central Area
and Galaxy Backbone for the specified period of 6 months during (April 2021- October 2021).

Fig 1.0 Letter of Acceptance from Code of Conduct

4|Page
ACKNOWLEDGEMENT

This report’s inspiration is as a result of the experience gathered, work done,


professionals encountered and industrial exposure I witnessed through the six (6) months of
Student Industrial Work Experience Scheme (SIWES). The most primary Acknowledgement
goes to Almighty God. The Creator and Originator, Able and Capable, One and Ever Living
God. To Him is my unreserved gratitude and appreciation.

I would like to specially thank and all other Veritas University Staff that contributed to
educating us on how to carry out the Student Industrial Work Experience Scheme (SIWES)
properly and on processes we are likely to encounter during our internship. I would like to thank
the management and programmers working at Code of conduct Bureau with a mighty mention to
Mr. Sebastian Gwimi, who with his everly helpful spirit helped me acquire the opportunity serve
in the establishment and Galaxy Backbone special mention to Mr. Mike Echukwube (Branch
Manager), Mr. Mohammed Abdul-Rashid and Mr. Emmanuel Mafemi for granting my
application my request to carry out my SIWES programme at their company. Their moral,
professional and educational advice really exposed me to various practices that are mandatory in
my field of study.

I Thank You All Very Much!

5|Page
EXECUTIVE SUMMARY

The Student Industrial Work Experience Scheme (SIWES) established by the Federal
Government of Nigeria is aimed at exposing students at tertiary institutions to acquire industrial
skills and practical experiences in their approved course of study and to prepare students to the
industrial work situation which they are likely to face after graduation. This technical report is
based on my experience gained during my 6 months of Industrial Training at Code of Conduct
Bureau in second-ment to Galaxy backbone, the report addresses how an basic Organizations’
Network is. During my time there I was doing both the practical and backend of the
organizations’ network. I was opportune to undergo a brief one-week certification class on
Amazon E-Book Publication.

6|Page
Table of Contents

APPROVAL PAGE.........................................................................................................................2
DEDICATION................................................................................................................................3
CERTIFICATION...........................................................................................................................4
ACKNOWLEDGEMENT...............................................................................................................5
EXECUTIVE SUMMARY.............................................................................................................6
CHAPTER ONE............................................................................................................................9
INTRODUCTION...........................................................................................................................9
1.1 Student Industrial Work Experience Scheme (SIWES)............................................................9
1.1.1 Overview of SIWES...............................................................................................................9
1.1.2 About the Industrial Training Fund (ITF)..............................................................................9
1.1.3 Scope and Importance of SIWES...........................................................................................9
1.1.4 Aims and Objectives of SIWES...........................................................................................10
1.1.5 Managing Bodies of SIWES................................................................................................10
1.2 Brief History of the My SIWES Placement Organization at Code of Conduct Bureau..........11
Vision............................................................................................................................................11
Honesty, Transparency & Accountability.....................................................................................11
1.2.1 Introduction of All the Departments.....................................................................................12
1.3 Brief History of the My SIWES Placement Organization at GALAXY BACKBONE..........13
1.3.1 Introduction of the organization...........................................................................................13
1.3.2 Corporate Goals & Objectives........................................................................................14
1.3.3 OPTICAL FIBRE BACKBONE......................................................................................15
NICTIB1......................................................................................................................................15
CHAPTER TWO.........................................................................................................................18
2.1 JOB DESCRIPTION..........................................................................................................18
2.2 RESPONSIBILITIES.........................................................................................................18
2.3 The Dude.................................................................................................................................23
CHAPTER THREE.....................................................................................................................25
WORK UNDERTAKEN DURING MY INDUSTRIAL ATTACHMENT.................................25
7|Page
3.1 NETWORKING......................................................................................................................25
3.1.1 NETWORK DEVICES AND TOOLS USED DURING ATTACHMENT........................25
3.2 INTERNET/INTRANET
CONNECTIVITY………………………………………………..31
3.3 INTRODUCTION TO IP
ADDRESS……………………………………………………….32
CHAPTER FOUR.......................................................................................................................34
SUMMARY, RECOMMENDATION AND CONCLUSION......................................................34
4.0 SUMMARY............................................................................................................................34
4.2 Skills Gain /Experience Gain..................................................................................................34
4.3 Conclusion...............................................................................................................................34
4.4 Recommendations...................................................................................................................35
References.....................................................................................................................................35

8|Page
CHAPTER ONE
INTRODUCTION
This is a detailed technical report on my Student Industrial Work Experience scheme (SIWES)
with Galaxy Backbone, Central Area. This chapter contains the introduction and explains the
purpose of the report, history of SIWES; its aims and objectives, the managing bodies of SIWES.
Then it explains the history and organization, functions and projects of Code of Conduct Bureau
and Galaxy Backbone.

j1.1 Student Industrial Work Experience Scheme (SIWES)

1.1.1 Overview of SIWES


SIWES stands for Student Industrial Work Experience Scheme. SIWES was established by
ITF (Industrial Training Fund) in the year 1973. SIWES was founded to be a skill training
programme to help expose and prepare students of universities, polytechnics and colleges of
education for the industrial work situation to be met after graduation. It aims to solve the
problem of lack of adequate practical skills preparation for employment in industries by Nigerian
graduates of tertiary Institutions by providing students of tertiary institution the opportunity of
being familiarized and exposed to the needed experience in handling machinery, equipment and
processes which are usually not available in the educational institutions. Onyemauwa, M. (2019).

1.1.2 About the Industrial Training Fund (ITF)


Established in October, 1971, The ITF has operated consistently within the context of its
enabling laws, i.e. Decree 47 of 1971. The ITF has not only raised training consciousness in the
economy, but has also helped in generating a corps of skilled indigenous man-power which has
been manning and managing various sector of the economy. As part of its responsibilities, the
ITF administers the students industrial work experience scheme (SIWES) and disburses
allowances to students. Ideas, B.(2019).

1.1.3 Scope and Importance of SIWES


The scheme covers all science and technological based students in Nigerian Universities,
Polytechnics, Colleges of Education, Colleges of Technology and Colleges of Agriculture, for
the industrial work situation they’re likely to encounter after graduation. SIWES enables students
to acquire industrial knowledge in their field of study particularly in technological based courses.

9|Page
It enables students experience the application of theoretical knowledge gained through their
school work to solving real life problems.

1.1.4 Aims and Objectives of SIWES


1. To provide the avenue for students in institutions of higher learning to acquire industrial
skills and experiences in their course of study.

2. Prepare the students for the industrial work situation they’re likely to meet after
graduation and also easily join the workforce.
3. Create exposure for students to work methods and techniques in handling equipment,
machinery and procedures that may not be available in their institutions.
4. Make the transition from school to the world of work easier and enhance recruitment
process for companies to contact for later job placement.
5. SIWES provides students with an opportunity to apply their knowledge in real work
situations thereby bridging the gap between theory and practice.
6. Enlist and strengthens employer’s involvement in the entire educational process and
prepare students by giving them first-hand work experience.

1.1.5 Managing Bodies of SIWES


The bodies involved in the management are the Federal government of Nigeria, the ITF, the
coordinating agencies include the: Nigerian university commission (NUC), National Board for
Technical Education (NBTE), National Council for Colleges of Education (NCCE). The
functions of the agencies include among others to:

1. Review programmes qualified from SIWES regularly.


2. Supervise students on industrial attachment.
3. Provide logistic material needed to administer the scheme.
4. Establish SIWES and accredit SIWES unit in the approved institutions.
5. Ensure payment of allowances for the students and the supervisors.
6. Formulate policies and guidelines for participating bodies and institutions as well.

Therefore, the growth, success or otherwise of the SIWES depends on the efficiency of the
ministries, ITF, institutions, general public involved in the articulation and management of the
program.

10 | P a g e
1.2 Brief History of the My SIWES Placement Organization at Code of Conduct Bureau

The CCB was established in Nigeria in 1979 during the Second Republic after 13 years of
military rule by the founding fathers of the first post-military constitution.

The 1979 Constitution provided a list of Codes of Conduct for public officers. The military
administration of Murtala /Obasanjo inaugurated a Board before handing over power to the
civilian government in July 1983, which could not make appreciable impact because of the
inability of the National Assembly of the second republic to pass the enabling law. Several years
later in 1989, the Bureau got its legal mandate under the Babangida regime.

The Code of Conduct provision has since then maintained a permanence of some sort, in the 5th
schedule of all constitutions following thereafter; 1989, 1993, 1995,1999 and the current 1999
constitution (as amended).

Mandate
To establish and maintain a high standard of public morality in the conduct of government
business and to ensure that the actions and behavior of public officers conform to the highest
standards of public morality and accountability

Vision
Honesty, Transparency & Accountability.

11 | P a g e
1.2.1 Introduction of All the Departments

 Department Of Education and Advocacy Services


 Department Of Legal Services
 Department Of Intelligence, Investigation and Monitoring (I, I&M)
 Department Of Finance and Accounts
 Department Of Human Resources Management
 Department Of State & Local Government Services
 Department Of Federal Public Service (Fps)
 Department Of Federal Political Office Services

P a g e | 12
1.3 Brief History of the My SIWES Placement Organization at GALAXY BACKBONE

1.3.1 Introduction of the organization


Galaxy Backbone was established by the Federal Government of Nigeria to operate a
nationwide IP-based network that will provide a common platform for connectivity and other
infrastructure services for all Government Ministries, Departments and Agencies (MDAs).
As per the mandate of its parent, the Federal Ministry of Communication , Galaxy Backbone
is responsible for the following:

 Be the provider of shared ICT infrastructure, applications and services to all Federal
Government MDAs and institutions.
 Build and operate a single nation-wide IP broadband network to provide network services to
all Federal Government MDAs and institutions.
 Deploying and maintaining all national database management systems and transversal
applications in government. These include government wide messaging and collaboration,
federal public service personnel and payroll system, Government gateway and national
portal.
 Set standards and guidelines for the support of government MDAs in the acquisition and
acceptable usage of ICT infrastructure, applications and services across different agencies
and government institutions.
 Providing Wide Area Networks(WAN) and Metropolitan Area Networks(MAN) to connect
all government entities.
 Be the provider of technical support to the Ministry of Communication Technology for end
to end Quality Assurance of ICT projects and capacity building for ICT professionals in
government.

P a g e | 13
Fig. 1.3 Company Oraganogram

Corporate Goals & Objectives

Vision: To become the leading enabler of digital inclusion in Africa.


Mission: We provide state of the art Digital Infrastructure and Services for a Digital
Nigeria.
Strategic Goal: To facilitate Nigeria’s e-Governance through Digital Transformation and
broadband penetration.
Values
 Initiative and Innovation
 Passion and commitment to excellence and results
 Accountability and Integrity
 Customer centricity
 Teamwork
(IPACT)

P a g e | 14
OPTICAL FIBRE BACKBONE

Galaxy Backbone built and operates the National Information and Communication
Technology Infrastructure Backbone (NICTIB) a cross-country optical fibre backbone. In its
first phase, which has been completed, commissioned and covers a distance of 1484 km, the
backbone spans 13 states across the South East, South South, North Central and South West
of Nigeria with base stations installed in 17 cities.  

NICTIB1

S/N Cities

1. Abuja

2. Akwanga

3. Lafia

4. Makurdi

5. Ugbokolo

6. Enugu

7. Awka

8. Onitsha

9. Owerri

10. Port Harcourt

11. Eket

12. Uyo

13. Asaba

14. Benin

P a g e | 15
15. Ore

16. Ijebu Ode

17. Lagos

Services On The Infrastructure


1. Internet Bandwidth
2. Clear Channel
3. Dark Fiber
4. Lastmile connectivity
5. Video Conferencing
Availability
The backbone currently has a monthly availability of 98%. Availability is expected to reach
99.9 at the end of phase 2.
Managed Support
We have in place a 24/7 managed support system to provide preventive and corrective
maintenance for the backbone to keep the availability within SLA specifications.
Future Plan
By the end of phase 2 of the NICTIB the backbone would have increased to 3441 km of
optical fiber traversing 41 cities including cities in the North East, North West and South
West of Nigeria. This will close our optical fibre ring for better protection and give an
assured 99.9% availability and better quality of service.

Our Partners

P a g e | 16
Projects

• Data Center Services


• Public sector Services\

• Small and medium Enterprises

• Medium and Large Enterprise

CONTACT US:

Head Office
61, Adetokunbo Ademola Crescent
Wuse 2, Abuja, FCT.
Nigeria.
Google Map: https://goo.gl/maps/fRTCdpwpNCt
Email: ServiceDesk@galaxybackbone.com.ng
Twitter: @galaxybackbone
Facebook: Facebook@Galaxybackbone
Instagram: @galaxybackbone
Youtube: Galaxy Backbone

Network Operating Center Abuja 2 Office


1st Floor,Bank of Industry Building, 
Plot 1243, Kur Mohammed Street, Plot 256, Zone A O,
Off Ahmadu Bello Way, Off Herbert Macaulay Way, Central Business
Central Business District, Abuja, FCT.
Abuja, FCT. Google Map:https://goo.gl/maps/hCmMGvL7C
Google Map:https://goo.gl/maps/YeyZEjHUqGo

Lagos Office Enugu Office


1, Obafemi Awolowo Way 47, Opara Avenue,
Opposite Ikeja City Mall, Former Coal Corporation Complex,
Alausa, Ikeja, Enugu, Enugu State.
Lagos. Google Map:https://goo.gl/maps/SyDNK6S
Google Map:https://goo.gl/maps/yaoMPQGnMeK2

P a g e | 17
CHAPTER TWO

The duration of my internship was from 02-03-2020 to 27-03-2020 at Code of conduct


Bureau and seconded to galaxy backbone. I did my internship mostly under the basic
principles of Networking and was exposed to different networking devices.

2.1 JOB DESCRIPTION

I was accepted as an Intern, so I do serve as the front desk attendant in the


organization, and my role is to be in charge of the organization i.e. connecting a customer to
the internet network, going on field assessment (Troubleshooting) a customers’ system,
monitoring the organizations’ switches, helping customer in any way I can to make sure they
are satisfied etc. In short, making sure that the organization is running smoothly.

I was also permitted from time to time to carry put some side certificates like E-Book publication.

Lastly, I was given the privilege to be among the team to setup the Video conferencing unit
for the Minister of Labor, Employment and Productivity, by name Honorable Minister Dr.
Christopher Ngige, I did this for about 4 (Four) months of my SIWESS programme.

2.2 RESPONSIBILITIES

The first week was the General Orientation for all the Students that the Organization
approved as the IT Students, The Training Coordinator gives the rules and regulations
governing the Organization, given the hint about the Organizations History and their mission
as well as their visions.

Furthermore, within the first week, I was introduced to the Organizations’ Network Topology and
how to monitor it, using the DUDE application. The dude application will be well explained in he
next chapter.

During the second week, CAT 5 and CAT 6 cable crimping. We also tested the crimped
Cable with a cable tester. A LAN port can also be tested with such tester.

P a g e | 18
During the third week, I was introduced to the Switch cabinet and layout with also
troubleshooting basic Errors involved with the switch. Switch Mounting and demounting was
also carried out.

FIG 2.1: A MOUNTED AND WELL

• During the fourth week, stills on the Organizations Network, I was taught on how to
use different troubleshooting methods to fix common errors involving the Network,
methods which include PING. The two common ways to troubleshoot your network is
via PING or TRACEROUTE.

Ping is a computer network administration software utility used to test the reachability


of a host on an internet Protocol (IP) network.

FIG 2.2: A PINGED SWITCH

P a g e | 19
Traceroute is a computer network diagnostic tool for displaying the route (path) and
measuring transit delays of packets across an Internet Protocol (IP) network.

During the fifth week, I was taught on how to setup a LAN port. U was also taught how to
change the port module. I was also taught how to punch the port to meet the required protocol
regarding LAN port punching. I was also able to use a cable tracker to trace a cable to its
position in the switch Patch panel.

P a g e | 20
During the Sixth week, I was taught System Maintenance. That’s system update and
hardware changes. I was also taught on Windows, Antivirus and Microsoft office installation
and also its maintenance and activation.
During the seventh week, I was introduced to Router Configuration. I did so with the
Huawei Router, a CAT 6 Lan cable and my System. This was carried out with the help of my
Industry-based supervisor. Also, while carrying out the task, you will come across activities
such as System IP Change and so on.

Router setup steps


Step 1: Decide where to place the router
Step 2: Connect to the Internet
Step 3: Configure the wireless router gateway
Step 4: Connect gateway to router
Step 5: Use app or web dashboard
Step 6: Create a username and password
Step 7: Update the router's firmware
Step 8: Create a Wi-Fi password
Step 9: Use auto-configuration tools where possible
Step 10: Set up security

P a g e | 21
During the eighth week, I was introduced to IP Phone Technology and Video
Conferencing Equipment, which are all used all around the organization. I was taught on how
to set it up such devices and Equipment and also Troubleshoot them.

AN IP PHONE

TROUBLESHOOTING IP PHONES
Symptom Solution
IP phone not Check connection between phone and network port, and the integrity of
powered on connecting cable. Verify whether switch is powered on. In cases where
POE adaptors are used, ensure adaptors are connected to power source; if
powered, the LED indicate thus. Cables connecting port to adaptor and
adaptor to phone should also be checked. Damaged cables should be
changed.

Log In error This error is because either the extension or password is incorrectly
entered. Check extension and password, enter appropriately.

Discover This error shows phone is not able to communicate with VoIP server.
“10.10.9.121” Check network connection, connect a system to the same port, Ask if

P a g e | 22
other users can reach the internet, change the network connecting cable.
Where POE adaptors are deployed, check cable connecting port to
adaptor.

No Ethernet This simply means bad cable. Change cable connecting phone to network.

No dial tone Make sure both the handset and line cords into the telephone are securely
connected. Power cycle the phone by unplugging and plugging the LAN
cable.

Others A simple phone reboot (power cycle) should rectify any fault not
highlighted above. A new phone should be requested in cases where issues
still persist.

2.3 The Dude

The Dude network monitor is a new application by MikroTik which can dramatically improve the
way you manage your network environment. It will automatically scan all devices within specified
subnets, draw and layout a map of your networks, monitor services of your devices and alert you in
case some service has problems.

Some of its features

 Auto network discovery and layout


 Discovers any type or brand of device
 Device, Link monitoring, and notifications
 Includes SVG icons for devices, and supports custom icons and backgrounds
 Easy installation and usage
 Allows you to draw your own maps and add custom devices

P a g e | 23
 Supports SNMP, ICMP, DNS and TCP monitoring for devices that support it
 Individual Link usage monitoring and graphs
 Direct access to remote control tools for device management
 Supports remote Dude server and local client

FIG. 2.1 THE DUDE INTERFACE

This application is what we used in monitoring all the switches and fiber optic devices around the
whole organization building. It aids in determining the particular switch to ping.

P a g e | 24
CHAPTER THREE
WORK UNDERTAKEN DURING MY INDUSTRIAL
ATTACHMENT

This Chapter details the specification of all work and training I did during my internship.

3.1 NETWORKING

Computer networks are used to connect one computer to another so as to facilitate a transfer of data.
The Internet, of course, is the largest network in the world. There are many different types of
networks. The two basic types are wireless networks and wired networks. Wireless networks use
Wi-Fi routers to connect computers and other devices to the Internet wirelessly.

Even though most homes and organizations use wireless networks and Wi-Fi routers nowadays,
there is still a widespread need for wired networks. Wired networks are known to be much stronger
and faster than wireless ones and they are also less expensive as compared to wireless networks.
Another perk of having a wired network is that you do not need to worry about any interference
from the presence of other users on the same wireless channel.

However, creating and maintaining a wired network requires the use of many components like Cat5
and Cat6 bulk cables, Ethernet cables, phone, USB, and FireWire cables as well as patch panels.
Furthermore, in order to maintain and troubleshoot a wired network, other networking tools and
accessories are also needed.

Both Practical and Theoretical aspects of Networking was carried out. On the Practical aspect,
activities like Router configuration, Switch mounting, Network device troubleshooting. While n the
theoretical aspect, TCP/IP was taught and its different layers and many others.

3.1.1 NETWORK DEVICES AND TOOLS USED DURING ATTACHMENT


The tools I made use of during my siwes programme can range from the common computer system
tools and devices to the strictly networking base deices and tools. All of such tools and devices are
as follows:

P a g e | 25
FIG 3.1: A CRIMPING TOOL FIG 3.2: A PORT MODULE PUNCHING TOOL.

FIG3.3: CAT 6 RJ-45 LAN CABLE


FIG3.4: A NETWORK CABLE TESTER

FIG3.5: PATCH PANEL BREAKDOWN FIG3.6: A LAN PORT MODULE

P a g e | 26
FIG3.7: PATCH PANEL FIG3.8: A VIDEO CONFERENCING EQUIPMENT

FIG3.9: OPTICAL TIME DOMAIN REFLECTOMETER FIG3.10: A USB EXTERNAL WIFI ADAPTER

FIG 3.11: A LASER METER FIG3.12: A FIBER ATTENUATION TERMINAL

P a g e | 27
CRIMPING TOOL
A crimping tool is one of the most crucial networks connecting tools. In order
to connect a connector to the cable, you will need a tool to crimp or connect.
Known as the crimping tool, this tool is used to connect RJ-45, RJ-11 and
other connectors to the end of a cable. Some crimping tools have a built-in
wire cutter near the handle. This wire cutter can be used to cut a phone cable
or a Cat5 cable.
While using a crimping tool, the wires that need to be crimped are first placed
into the connector. Once this is done, the jack with the wires is placed in the
designated slot of the crimping tool and the handles of the tool are squeezed tight. By doing this,
you can ensure that the plastic connector you are using punctures the wires inside and holds them all
in place. This prevents the wires from loosening and coming out. If the wires are crimped securely
in place, data can be easily transmitted by every wire. The cables were crimped using this protocol
(T-568B).

NETWORK CABLE TESTER


One of the problems with wired networks is that when they cease to work, troubleshooting may be a
little more difficult as compared to wireless networks. This is where a network cable tester can help
you. A network cable tester is a useful device that allows you to check the continuity of the cable to
figure out if the signal is strong enough to get through to the network. This helps to eliminate cable
connectivity issues while troubleshooting the problems.
It is important to remember that you should never connect a live wire circuit to a network cable
tester. It should be used only after the cable has been disconnected from the router, modem, and a
computer. Generally, a network cable tester has two parts – the tester and remote. Most testers work
with two or three connectors. In general, they will have an Ethernet RJ-45 connector, telephone
cable RJ-11 connectors and one BNC for the coaxial cable.
The remote has connectors for Ethernet and telephone cable. Using a network cable tester is a
simple affair. All you have to do is connect the cable to the right port on the tester and connect the
remote to the other end. Once you run the network cable tester, you will be able to figure out if the
network problem lies in the connectivity. If it doesn’t, you will have ruled it out and can continue
troubleshooting.
One of the problems with wired networks is that when they cease to work, troubleshooting may be a
little more difficult as compared to wireless networks. This is where a network cable tester can help

P a g e | 28
you. A network cable tester is a useful device that allows you to check the continuity of the cable to
figure out if the signal is strong enough to get through to the network. This helps to eliminate cable
connectivity issues while troubleshooting the problems.
It is important to remember that you should never connect a live wire circuit to a network cable
tester. It should be used only after the cable has been disconnected from the router, modem, and a
computer. Generally, a network cable tester has two parts – the tester and remote. Most testers work
with two or three connectors. In general, they will have an Ethernet RJ-45 connector, telephone
cable RJ-11 connectors and one BNC for the coaxial cable.
The remote has connectors for Ethernet and telephone cable. Using a network cable tester is a
simple affair. All you have to do is connect the cable to the right port on the tester and connect the
remote to the other end. Once you run the network cable tester, you will be able to figure out if the
network problem lies in the connectivity. If it doesn’t, you will have ruled it out and can continue
troubleshooting.

PUNCH DOWN TOOL


The punch down tool is also known as the Krone tool. It is small tool that is used most frequently by
network troubleshooting technicians. The basic purpose of a punch down tool is to insert wires into
various devices like pinch down blocks, patch panels, surface mount boxes, and more with the help
of insulation-displacement connectors.
The impact type of punch down tool is the most popular and commonly used one. The impact punch
down tool consists of a slot for inserting removable blades, an internal spring impact mechanism
and a handle to hold the tool. Other than just inserting the wire, a punch down tool can also be used
to cut off the excess wire. Some punch down tools come with a fixed blade and may even lack an
impact mechanism. Ensure that you are acquiring the right type of punch down tool to suit your
needs. If you need it for a large number of connections, an impact mechanism can make life much
simpler and stave off muscle fatigue.

PATCH PANEL
For those that aren't aware, a patch panel (also known as a patch bay, patch field or jack field) is a
housing that contains jacks used for connecting and routing circuits. They show up in many
different fields, from computer networks and server rooms to recording studios for music, radio and
television.

LAN PORT MODULE

P a g e | 29
A LAN port module is like the main component that make up a LAN port. It is the component that
connects the LAN cable to the switch.

ETHERNET SWITCHES
 An Ethernet switch is different from a KVM switch. It is considered a central hub that is wired to
every single computer and network device in an Ethernet. In places like homes and small offices,
Ethernet switches are usually built directly into the router. Different variations of Ethernet switches
exist, such as the 10/100 and 10/100/1000. These kinds of Ethernet switches are compatible with
slower-speed devices. Unmanaged switched have no user configuration and is placed in the network
with all cables plugged in. When it is switched on there is nothing left to do. Managed switches are
better options for large networks. It can be configured for speed, users can be combined, and traffic
and network activity can be monitored and reported. 

VIDEO CONFERENCING EQUIPMENT


This equipment is used for high end and quality meeting. It was used for the Federal Executive
Council (FEC) meeting.

OPTICAL TIME-DOMAIN REFLECTOMETER (OTDR)


An optical time-domain reflectometer (OTDR) is an optoelectronic instrument used to characterize
an optical fiber. An OTDR is the optical equivalent of an electronic time domain reflectometer. It
injects a series of optical pulses into the fiber under test and extracts, from the same end of the
fiber, light that is scattered (Rayleigh backscatter) or reflected back from points along the fiber. The
scattered or reflected light that is gathered back is used to characterize the optical fiber. This is
equivalent to the way that an electronic time-domain meter measures reflections caused by changes
in the impedance of the cable under test. The strength of the return pulses is measured and
integrated as a function of time, and plotted as a function of length of the fiber. In basic terms, it is
used to measure the range and strength of a network in terms of meters.

USB EXTERNAL WIFI ADAPTER


A USB WiFi adapter overrides the computer's built-in wireless functionality, giving you a faster,
more reliable connection to your available network signals through the USB port instead. Since

P a g e | 30
most computers have at least one USB port, you’ll typically be able to use it on both laptops and
desktops. Plus, the plug-and-play convenience means you can remove the device when it's not
needed to use in another computer.

A LASER METER
A laser distance meter works by use measuring the time it takes a pulse of laser light to be
reflected off a target and returned to the sender. This is known as the "time of flight" principle,
and the method is known either as “time of flight” or “pulse” measurement.

3.2 INTERNET/INTRANET CONNECTIVITY

• What is the Internet?

In the broadest terms, people like to view the Internet as a cloud, you put your data in one
place, it comes out the place you want it to on the other side. In reality the internet is tens of
thousand kilometers of fiber optic cable, hundreds of thousands to millions of kilometers of
copper wire, hardware and software connecting them all together in a redundant, fast, and
self-sufficient network.

• How is this Communication Possible?

This is possible with the help of the TCP/IP Model. TCP/IP model defines a set of rules to
enable computers to communicate over a network. It specifies how data should be formatted,
addressed, shipped, routed and delivered to the right destination.

The TCP/IP Model

There are 5 layers in the TCP/IP Model as explained below;

1. The first layer is called the Physical Layer. This layer is responsible for encoding and
transmitting data over network communications media. It operates with data in the form of
bits which are sent from the Physical layer of the sending source and received at the Physical

P a g e | 31
layer of a destination source. When you hook up a computer using an Ethernet cable you are
connecting that computer on the Physical layer. This Physical layer is the lowest level of the
TCP/IP Model.

2. The next layer is the Data link layer. This layer is used to move packets from the network
layer on two different hosts. The process of transmitting packets on a link layer can be
controlled in the software device driver for the network card and on firmware. Different
protocols are used for different types of networks. Broadband Internet access uses PPPoE as
the protocol. For a local wired network, Ethernet is used. For local wireless network, IEEE
802.11 is used.

3. The next layer is the Network layer. This layer gets data from a source network to the
destination network. This generally involves routing the packets across a network of
networks (also known as internetwork). This is where IP(Internet Protocol) comes in. IP
performs the basic task of getting packets of data from source to destination.

4. The next layer is the Transport layer. The transport layer’s responsibility is end-to-end
message transfer. There are 2 categories of end-to-end message transmission: connection-
oriented (TCP) or connectionless (UDP). The transport layer provides this service of
connecting applications together through the use of ports. This layer offers reliability and
error control.

5. The fifth and final layer is the Application layer. This layer refers to higher-level protocols
used by most applications for network communication. An example of application layer
protocol is FTP (File Transfer Protocol). Data coded according to application layer protocols
are then encapsulated into one or more transport layer protocols which in turn use lower
layer protocols to effect actual data transfer.

3.3 INTRODUCTION TO IP ADDRESS

An IP Address is a number given to any network device (such as a computer, IP Phone or


server). The most commonly used IP address is a 32-bit (4 byte) address usually referred to IPv4.
We also have the IPv6 which is a 128-bit (16 byte).

P a g e | 32
Examples:

 IPv4: 192.168.0.1

 IPv6: 2001:0db8:0000:0000:0000: ff00:0042:8329

PRIVATE IP ADDRESS

A Private IP address is the address used by organizations to create their own private
network. There are three IP blocks (class A, class B and class C) reserved for a private use.
The computers, tablets and smart phones sitting behind your home, and the personal
computers within organizations are usually assigned private IP addresses. 

When a computer is assigned a private IP address, the local devices see this computer via its
private IP address.

However, the devices residing outside of your local network cannot directly communicate
via the private IP address, but uses your router's public IP address to communicate. To allow
direct access to a local device which is assigned a private IP address, a Network Address
Translator (NAT) should be used.

Private IP Address Range;

 10.0.0.1-10.255.255.254 (10.0.0.0/8)
 172.16.0.1-172.31.255.254 (172.16.0.0/12)
 192.168.0.1-192.168.255.254 (192.168.0.0/16)

PUBLIC IP ADDRESS

A Public IP address is an IP address that can be accessed over the Internet. Like postal address used
to deliver a postal mail to your home, a public IP address is the globally unique IP address assigned
to a computing device.

P a g e | 33
CHAPTER FOUR
SUMMARY, RECOMMENDATION AND CONCLUSION

4.0 SUMMARY
The SIWES program undergone at Code of Conduct Bureau and Galaxy Backbone
furnished me with an in-depth exposure to some of the practical industrial aspects of
computer science profession and also exposure to how to run an organization, handle people,
properties and delivering efficient services to people. I picked interest in Networking and the
program was highly enlightened, beneficial and interesting.

4.1 Challenges Encountered

The major Challenge that was encountered during my programme was that the organization
couldn’t attend to the its IT students on a daily basis, so we had to be patient. So, the learning
pace I hoped for wasn’t the case.

4.2 Skills Gain /Experience Gain


• In the aspect of Computer Science profession, I was empowered with the skill of
Networking, practical Networking in general and tools used by successful and senior
Network developers.
• In the aspect of running an organization and the rest, I was empowered with the skill
of being in charge of the front desk division/unit where my role is to make sure the
organization is running smoothly, interact with people, settle new subscribers in,
attend to people’s need et cetera.
• I picked up skills like Communication Teamwork, Ability to work under pressure, IT
skills, problem solving

4.3 Conclusion
This time was a fantastic learning opportunity for me because it allowed me to put what I had
learned in class into practice while also exposing me to new information that would be useful
to me after graduation. It assisted me in identifying areas of concern that will drive my further
education and, most certainly, my career choice. It had a major effect on my professional
knowledge in various technological fields.

P a g e | 34
4.4 Recommendations
I would like to make the following suggestions based on the issues I faced during my industrial
attachment:

1. 1. A student's access to environments, buildings, and sites where he or she can do his or her
IT should not be limited.
2. ITF should pay a monthly stipend to the student rather than wait till the end of the
programme. This would help interns carry out their internships efficiently as transportation
and feeding are challenges faced during internship.
3. Most of us student only get to know of IT report at our respective base, therefore each
department should orientate and outline what is expected by the students before proceeding
for the IT.
4. Each company should recruit interns directly from their respective institutions or an
application should be created to allow students find available places of internship.

P a g e | 35
References

 J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach


Featuring the Internet.
 L.L. Peterson and B. S. Davie, Computer Networks: A System Approach.
 Andrew S.Tanenbaum, Computer Networks
 Douglas E. Comer, Computer Networks and Internets
 D. Bertsekas & R. Gallager, Data Networks.
 S. Keshav, An Engineering Approach to Computer Networking.
 J. Walrand & P. Varaiya, High-Performance Communication Networks.
 TCP/IP Tutorial and Technical Overview (IBM Redbook)

P a g e | 36

You might also like