Professional Documents
Culture Documents
Madiba Siwes It Report Real
Madiba Siwes It Report Real
Madiba Siwes It Report Real
TECHNICAL REPORT
ON
UNDERTAKEN AT
BY
AGE
This is to certify that this report represents my industrial work experience at the Office of the
Head of Civil Service of the Federation, Abuja, Nigeria.
I hereby certify that I, OKOLO MADIBA PIUS with the matriculation number
VUG/CSC/18/2730 of the Computer Science department of VERITAS University Abuja,
FCT, wrote this report in partial fulfillment of the requirement of the award of Bachelor of
Science (B.S.C)
This report has not been submitted elsewhere.
_______________________ ________________________
2|Page
DEDICATION
I dedicate this SIWES report to God Almighty, whose grace has guided me through my
life journey to accomplish a lot and also dedicate my SIWES work to my family and many
friends. A special feeling of gratitude to my loving parents, Anselm and Agatha Okolo, whose
words of encouragement and push for tenacity ring in my ears. My sister, Nneoma and Cousin
Albarka who have never left my side and are very special.
I also dedicate this work to my lecturers who has guided me academically and also my
boss Mr. Mike Echukwube for the privilege to work with her, with my co-workers who helped
and contributed to the completion of the program.
3|Page
CERTIFICATION
This is to certify that this report of Student Industrial Work Experience Scheme (SIWES)
program was carried out by Okolo Madiba Pius with Matric Number VUG/CSC/18/2730, a
Computer Science Student of Veritas University, Abuja at Code of conduct Bureau, Central Area
and Galaxy Backbone for the specified period of 6 months during (April 2021- October 2021).
4|Page
ACKNOWLEDGEMENT
I would like to specially thank and all other Veritas University Staff that contributed to
educating us on how to carry out the Student Industrial Work Experience Scheme (SIWES)
properly and on processes we are likely to encounter during our internship. I would like to thank
the management and programmers working at Code of conduct Bureau with a mighty mention to
Mr. Sebastian Gwimi, who with his everly helpful spirit helped me acquire the opportunity serve
in the establishment and Galaxy Backbone special mention to Mr. Mike Echukwube (Branch
Manager), Mr. Mohammed Abdul-Rashid and Mr. Emmanuel Mafemi for granting my
application my request to carry out my SIWES programme at their company. Their moral,
professional and educational advice really exposed me to various practices that are mandatory in
my field of study.
5|Page
EXECUTIVE SUMMARY
The Student Industrial Work Experience Scheme (SIWES) established by the Federal
Government of Nigeria is aimed at exposing students at tertiary institutions to acquire industrial
skills and practical experiences in their approved course of study and to prepare students to the
industrial work situation which they are likely to face after graduation. This technical report is
based on my experience gained during my 6 months of Industrial Training at Code of Conduct
Bureau in second-ment to Galaxy backbone, the report addresses how an basic Organizations’
Network is. During my time there I was doing both the practical and backend of the
organizations’ network. I was opportune to undergo a brief one-week certification class on
Amazon E-Book Publication.
6|Page
Table of Contents
APPROVAL PAGE.........................................................................................................................2
DEDICATION................................................................................................................................3
CERTIFICATION...........................................................................................................................4
ACKNOWLEDGEMENT...............................................................................................................5
EXECUTIVE SUMMARY.............................................................................................................6
CHAPTER ONE............................................................................................................................9
INTRODUCTION...........................................................................................................................9
1.1 Student Industrial Work Experience Scheme (SIWES)............................................................9
1.1.1 Overview of SIWES...............................................................................................................9
1.1.2 About the Industrial Training Fund (ITF)..............................................................................9
1.1.3 Scope and Importance of SIWES...........................................................................................9
1.1.4 Aims and Objectives of SIWES...........................................................................................10
1.1.5 Managing Bodies of SIWES................................................................................................10
1.2 Brief History of the My SIWES Placement Organization at Code of Conduct Bureau..........11
Vision............................................................................................................................................11
Honesty, Transparency & Accountability.....................................................................................11
1.2.1 Introduction of All the Departments.....................................................................................12
1.3 Brief History of the My SIWES Placement Organization at GALAXY BACKBONE..........13
1.3.1 Introduction of the organization...........................................................................................13
1.3.2 Corporate Goals & Objectives........................................................................................14
1.3.3 OPTICAL FIBRE BACKBONE......................................................................................15
NICTIB1......................................................................................................................................15
CHAPTER TWO.........................................................................................................................18
2.1 JOB DESCRIPTION..........................................................................................................18
2.2 RESPONSIBILITIES.........................................................................................................18
2.3 The Dude.................................................................................................................................23
CHAPTER THREE.....................................................................................................................25
WORK UNDERTAKEN DURING MY INDUSTRIAL ATTACHMENT.................................25
7|Page
3.1 NETWORKING......................................................................................................................25
3.1.1 NETWORK DEVICES AND TOOLS USED DURING ATTACHMENT........................25
3.2 INTERNET/INTRANET
CONNECTIVITY………………………………………………..31
3.3 INTRODUCTION TO IP
ADDRESS……………………………………………………….32
CHAPTER FOUR.......................................................................................................................34
SUMMARY, RECOMMENDATION AND CONCLUSION......................................................34
4.0 SUMMARY............................................................................................................................34
4.2 Skills Gain /Experience Gain..................................................................................................34
4.3 Conclusion...............................................................................................................................34
4.4 Recommendations...................................................................................................................35
References.....................................................................................................................................35
8|Page
CHAPTER ONE
INTRODUCTION
This is a detailed technical report on my Student Industrial Work Experience scheme (SIWES)
with Galaxy Backbone, Central Area. This chapter contains the introduction and explains the
purpose of the report, history of SIWES; its aims and objectives, the managing bodies of SIWES.
Then it explains the history and organization, functions and projects of Code of Conduct Bureau
and Galaxy Backbone.
9|Page
It enables students experience the application of theoretical knowledge gained through their
school work to solving real life problems.
2. Prepare the students for the industrial work situation they’re likely to meet after
graduation and also easily join the workforce.
3. Create exposure for students to work methods and techniques in handling equipment,
machinery and procedures that may not be available in their institutions.
4. Make the transition from school to the world of work easier and enhance recruitment
process for companies to contact for later job placement.
5. SIWES provides students with an opportunity to apply their knowledge in real work
situations thereby bridging the gap between theory and practice.
6. Enlist and strengthens employer’s involvement in the entire educational process and
prepare students by giving them first-hand work experience.
Therefore, the growth, success or otherwise of the SIWES depends on the efficiency of the
ministries, ITF, institutions, general public involved in the articulation and management of the
program.
10 | P a g e
1.2 Brief History of the My SIWES Placement Organization at Code of Conduct Bureau
The CCB was established in Nigeria in 1979 during the Second Republic after 13 years of
military rule by the founding fathers of the first post-military constitution.
The 1979 Constitution provided a list of Codes of Conduct for public officers. The military
administration of Murtala /Obasanjo inaugurated a Board before handing over power to the
civilian government in July 1983, which could not make appreciable impact because of the
inability of the National Assembly of the second republic to pass the enabling law. Several years
later in 1989, the Bureau got its legal mandate under the Babangida regime.
The Code of Conduct provision has since then maintained a permanence of some sort, in the 5th
schedule of all constitutions following thereafter; 1989, 1993, 1995,1999 and the current 1999
constitution (as amended).
Mandate
To establish and maintain a high standard of public morality in the conduct of government
business and to ensure that the actions and behavior of public officers conform to the highest
standards of public morality and accountability
Vision
Honesty, Transparency & Accountability.
11 | P a g e
1.2.1 Introduction of All the Departments
P a g e | 12
1.3 Brief History of the My SIWES Placement Organization at GALAXY BACKBONE
Be the provider of shared ICT infrastructure, applications and services to all Federal
Government MDAs and institutions.
Build and operate a single nation-wide IP broadband network to provide network services to
all Federal Government MDAs and institutions.
Deploying and maintaining all national database management systems and transversal
applications in government. These include government wide messaging and collaboration,
federal public service personnel and payroll system, Government gateway and national
portal.
Set standards and guidelines for the support of government MDAs in the acquisition and
acceptable usage of ICT infrastructure, applications and services across different agencies
and government institutions.
Providing Wide Area Networks(WAN) and Metropolitan Area Networks(MAN) to connect
all government entities.
Be the provider of technical support to the Ministry of Communication Technology for end
to end Quality Assurance of ICT projects and capacity building for ICT professionals in
government.
P a g e | 13
Fig. 1.3 Company Oraganogram
P a g e | 14
OPTICAL FIBRE BACKBONE
Galaxy Backbone built and operates the National Information and Communication
Technology Infrastructure Backbone (NICTIB) a cross-country optical fibre backbone. In its
first phase, which has been completed, commissioned and covers a distance of 1484 km, the
backbone spans 13 states across the South East, South South, North Central and South West
of Nigeria with base stations installed in 17 cities.
NICTIB1
S/N Cities
1. Abuja
2. Akwanga
3. Lafia
4. Makurdi
5. Ugbokolo
6. Enugu
7. Awka
8. Onitsha
9. Owerri
11. Eket
12. Uyo
13. Asaba
14. Benin
P a g e | 15
15. Ore
17. Lagos
Our Partners
P a g e | 16
Projects
CONTACT US:
Head Office
61, Adetokunbo Ademola Crescent
Wuse 2, Abuja, FCT.
Nigeria.
Google Map: https://goo.gl/maps/fRTCdpwpNCt
Email: ServiceDesk@galaxybackbone.com.ng
Twitter: @galaxybackbone
Facebook: Facebook@Galaxybackbone
Instagram: @galaxybackbone
Youtube: Galaxy Backbone
P a g e | 17
CHAPTER TWO
I was also permitted from time to time to carry put some side certificates like E-Book publication.
Lastly, I was given the privilege to be among the team to setup the Video conferencing unit
for the Minister of Labor, Employment and Productivity, by name Honorable Minister Dr.
Christopher Ngige, I did this for about 4 (Four) months of my SIWESS programme.
2.2 RESPONSIBILITIES
The first week was the General Orientation for all the Students that the Organization
approved as the IT Students, The Training Coordinator gives the rules and regulations
governing the Organization, given the hint about the Organizations History and their mission
as well as their visions.
Furthermore, within the first week, I was introduced to the Organizations’ Network Topology and
how to monitor it, using the DUDE application. The dude application will be well explained in he
next chapter.
During the second week, CAT 5 and CAT 6 cable crimping. We also tested the crimped
Cable with a cable tester. A LAN port can also be tested with such tester.
P a g e | 18
During the third week, I was introduced to the Switch cabinet and layout with also
troubleshooting basic Errors involved with the switch. Switch Mounting and demounting was
also carried out.
• During the fourth week, stills on the Organizations Network, I was taught on how to
use different troubleshooting methods to fix common errors involving the Network,
methods which include PING. The two common ways to troubleshoot your network is
via PING or TRACEROUTE.
P a g e | 19
Traceroute is a computer network diagnostic tool for displaying the route (path) and
measuring transit delays of packets across an Internet Protocol (IP) network.
During the fifth week, I was taught on how to setup a LAN port. U was also taught how to
change the port module. I was also taught how to punch the port to meet the required protocol
regarding LAN port punching. I was also able to use a cable tracker to trace a cable to its
position in the switch Patch panel.
P a g e | 20
During the Sixth week, I was taught System Maintenance. That’s system update and
hardware changes. I was also taught on Windows, Antivirus and Microsoft office installation
and also its maintenance and activation.
During the seventh week, I was introduced to Router Configuration. I did so with the
Huawei Router, a CAT 6 Lan cable and my System. This was carried out with the help of my
Industry-based supervisor. Also, while carrying out the task, you will come across activities
such as System IP Change and so on.
P a g e | 21
During the eighth week, I was introduced to IP Phone Technology and Video
Conferencing Equipment, which are all used all around the organization. I was taught on how
to set it up such devices and Equipment and also Troubleshoot them.
AN IP PHONE
TROUBLESHOOTING IP PHONES
Symptom Solution
IP phone not Check connection between phone and network port, and the integrity of
powered on connecting cable. Verify whether switch is powered on. In cases where
POE adaptors are used, ensure adaptors are connected to power source; if
powered, the LED indicate thus. Cables connecting port to adaptor and
adaptor to phone should also be checked. Damaged cables should be
changed.
Log In error This error is because either the extension or password is incorrectly
entered. Check extension and password, enter appropriately.
Discover This error shows phone is not able to communicate with VoIP server.
“10.10.9.121” Check network connection, connect a system to the same port, Ask if
P a g e | 22
other users can reach the internet, change the network connecting cable.
Where POE adaptors are deployed, check cable connecting port to
adaptor.
No Ethernet This simply means bad cable. Change cable connecting phone to network.
No dial tone Make sure both the handset and line cords into the telephone are securely
connected. Power cycle the phone by unplugging and plugging the LAN
cable.
Others A simple phone reboot (power cycle) should rectify any fault not
highlighted above. A new phone should be requested in cases where issues
still persist.
The Dude network monitor is a new application by MikroTik which can dramatically improve the
way you manage your network environment. It will automatically scan all devices within specified
subnets, draw and layout a map of your networks, monitor services of your devices and alert you in
case some service has problems.
P a g e | 23
Supports SNMP, ICMP, DNS and TCP monitoring for devices that support it
Individual Link usage monitoring and graphs
Direct access to remote control tools for device management
Supports remote Dude server and local client
This application is what we used in monitoring all the switches and fiber optic devices around the
whole organization building. It aids in determining the particular switch to ping.
P a g e | 24
CHAPTER THREE
WORK UNDERTAKEN DURING MY INDUSTRIAL
ATTACHMENT
This Chapter details the specification of all work and training I did during my internship.
3.1 NETWORKING
Computer networks are used to connect one computer to another so as to facilitate a transfer of data.
The Internet, of course, is the largest network in the world. There are many different types of
networks. The two basic types are wireless networks and wired networks. Wireless networks use
Wi-Fi routers to connect computers and other devices to the Internet wirelessly.
Even though most homes and organizations use wireless networks and Wi-Fi routers nowadays,
there is still a widespread need for wired networks. Wired networks are known to be much stronger
and faster than wireless ones and they are also less expensive as compared to wireless networks.
Another perk of having a wired network is that you do not need to worry about any interference
from the presence of other users on the same wireless channel.
However, creating and maintaining a wired network requires the use of many components like Cat5
and Cat6 bulk cables, Ethernet cables, phone, USB, and FireWire cables as well as patch panels.
Furthermore, in order to maintain and troubleshoot a wired network, other networking tools and
accessories are also needed.
Both Practical and Theoretical aspects of Networking was carried out. On the Practical aspect,
activities like Router configuration, Switch mounting, Network device troubleshooting. While n the
theoretical aspect, TCP/IP was taught and its different layers and many others.
P a g e | 25
FIG 3.1: A CRIMPING TOOL FIG 3.2: A PORT MODULE PUNCHING TOOL.
P a g e | 26
FIG3.7: PATCH PANEL FIG3.8: A VIDEO CONFERENCING EQUIPMENT
FIG3.9: OPTICAL TIME DOMAIN REFLECTOMETER FIG3.10: A USB EXTERNAL WIFI ADAPTER
P a g e | 27
CRIMPING TOOL
A crimping tool is one of the most crucial networks connecting tools. In order
to connect a connector to the cable, you will need a tool to crimp or connect.
Known as the crimping tool, this tool is used to connect RJ-45, RJ-11 and
other connectors to the end of a cable. Some crimping tools have a built-in
wire cutter near the handle. This wire cutter can be used to cut a phone cable
or a Cat5 cable.
While using a crimping tool, the wires that need to be crimped are first placed
into the connector. Once this is done, the jack with the wires is placed in the
designated slot of the crimping tool and the handles of the tool are squeezed tight. By doing this,
you can ensure that the plastic connector you are using punctures the wires inside and holds them all
in place. This prevents the wires from loosening and coming out. If the wires are crimped securely
in place, data can be easily transmitted by every wire. The cables were crimped using this protocol
(T-568B).
P a g e | 28
you. A network cable tester is a useful device that allows you to check the continuity of the cable to
figure out if the signal is strong enough to get through to the network. This helps to eliminate cable
connectivity issues while troubleshooting the problems.
It is important to remember that you should never connect a live wire circuit to a network cable
tester. It should be used only after the cable has been disconnected from the router, modem, and a
computer. Generally, a network cable tester has two parts – the tester and remote. Most testers work
with two or three connectors. In general, they will have an Ethernet RJ-45 connector, telephone
cable RJ-11 connectors and one BNC for the coaxial cable.
The remote has connectors for Ethernet and telephone cable. Using a network cable tester is a
simple affair. All you have to do is connect the cable to the right port on the tester and connect the
remote to the other end. Once you run the network cable tester, you will be able to figure out if the
network problem lies in the connectivity. If it doesn’t, you will have ruled it out and can continue
troubleshooting.
PATCH PANEL
For those that aren't aware, a patch panel (also known as a patch bay, patch field or jack field) is a
housing that contains jacks used for connecting and routing circuits. They show up in many
different fields, from computer networks and server rooms to recording studios for music, radio and
television.
P a g e | 29
A LAN port module is like the main component that make up a LAN port. It is the component that
connects the LAN cable to the switch.
ETHERNET SWITCHES
An Ethernet switch is different from a KVM switch. It is considered a central hub that is wired to
every single computer and network device in an Ethernet. In places like homes and small offices,
Ethernet switches are usually built directly into the router. Different variations of Ethernet switches
exist, such as the 10/100 and 10/100/1000. These kinds of Ethernet switches are compatible with
slower-speed devices. Unmanaged switched have no user configuration and is placed in the network
with all cables plugged in. When it is switched on there is nothing left to do. Managed switches are
better options for large networks. It can be configured for speed, users can be combined, and traffic
and network activity can be monitored and reported.
P a g e | 30
most computers have at least one USB port, you’ll typically be able to use it on both laptops and
desktops. Plus, the plug-and-play convenience means you can remove the device when it's not
needed to use in another computer.
A LASER METER
A laser distance meter works by use measuring the time it takes a pulse of laser light to be
reflected off a target and returned to the sender. This is known as the "time of flight" principle,
and the method is known either as “time of flight” or “pulse” measurement.
In the broadest terms, people like to view the Internet as a cloud, you put your data in one
place, it comes out the place you want it to on the other side. In reality the internet is tens of
thousand kilometers of fiber optic cable, hundreds of thousands to millions of kilometers of
copper wire, hardware and software connecting them all together in a redundant, fast, and
self-sufficient network.
This is possible with the help of the TCP/IP Model. TCP/IP model defines a set of rules to
enable computers to communicate over a network. It specifies how data should be formatted,
addressed, shipped, routed and delivered to the right destination.
1. The first layer is called the Physical Layer. This layer is responsible for encoding and
transmitting data over network communications media. It operates with data in the form of
bits which are sent from the Physical layer of the sending source and received at the Physical
P a g e | 31
layer of a destination source. When you hook up a computer using an Ethernet cable you are
connecting that computer on the Physical layer. This Physical layer is the lowest level of the
TCP/IP Model.
2. The next layer is the Data link layer. This layer is used to move packets from the network
layer on two different hosts. The process of transmitting packets on a link layer can be
controlled in the software device driver for the network card and on firmware. Different
protocols are used for different types of networks. Broadband Internet access uses PPPoE as
the protocol. For a local wired network, Ethernet is used. For local wireless network, IEEE
802.11 is used.
3. The next layer is the Network layer. This layer gets data from a source network to the
destination network. This generally involves routing the packets across a network of
networks (also known as internetwork). This is where IP(Internet Protocol) comes in. IP
performs the basic task of getting packets of data from source to destination.
4. The next layer is the Transport layer. The transport layer’s responsibility is end-to-end
message transfer. There are 2 categories of end-to-end message transmission: connection-
oriented (TCP) or connectionless (UDP). The transport layer provides this service of
connecting applications together through the use of ports. This layer offers reliability and
error control.
5. The fifth and final layer is the Application layer. This layer refers to higher-level protocols
used by most applications for network communication. An example of application layer
protocol is FTP (File Transfer Protocol). Data coded according to application layer protocols
are then encapsulated into one or more transport layer protocols which in turn use lower
layer protocols to effect actual data transfer.
P a g e | 32
Examples:
IPv4: 192.168.0.1
PRIVATE IP ADDRESS
A Private IP address is the address used by organizations to create their own private
network. There are three IP blocks (class A, class B and class C) reserved for a private use.
The computers, tablets and smart phones sitting behind your home, and the personal
computers within organizations are usually assigned private IP addresses.
When a computer is assigned a private IP address, the local devices see this computer via its
private IP address.
However, the devices residing outside of your local network cannot directly communicate
via the private IP address, but uses your router's public IP address to communicate. To allow
direct access to a local device which is assigned a private IP address, a Network Address
Translator (NAT) should be used.
10.0.0.1-10.255.255.254 (10.0.0.0/8)
172.16.0.1-172.31.255.254 (172.16.0.0/12)
192.168.0.1-192.168.255.254 (192.168.0.0/16)
PUBLIC IP ADDRESS
A Public IP address is an IP address that can be accessed over the Internet. Like postal address used
to deliver a postal mail to your home, a public IP address is the globally unique IP address assigned
to a computing device.
P a g e | 33
CHAPTER FOUR
SUMMARY, RECOMMENDATION AND CONCLUSION
4.0 SUMMARY
The SIWES program undergone at Code of Conduct Bureau and Galaxy Backbone
furnished me with an in-depth exposure to some of the practical industrial aspects of
computer science profession and also exposure to how to run an organization, handle people,
properties and delivering efficient services to people. I picked interest in Networking and the
program was highly enlightened, beneficial and interesting.
The major Challenge that was encountered during my programme was that the organization
couldn’t attend to the its IT students on a daily basis, so we had to be patient. So, the learning
pace I hoped for wasn’t the case.
4.3 Conclusion
This time was a fantastic learning opportunity for me because it allowed me to put what I had
learned in class into practice while also exposing me to new information that would be useful
to me after graduation. It assisted me in identifying areas of concern that will drive my further
education and, most certainly, my career choice. It had a major effect on my professional
knowledge in various technological fields.
P a g e | 34
4.4 Recommendations
I would like to make the following suggestions based on the issues I faced during my industrial
attachment:
1. 1. A student's access to environments, buildings, and sites where he or she can do his or her
IT should not be limited.
2. ITF should pay a monthly stipend to the student rather than wait till the end of the
programme. This would help interns carry out their internships efficiently as transportation
and feeding are challenges faced during internship.
3. Most of us student only get to know of IT report at our respective base, therefore each
department should orientate and outline what is expected by the students before proceeding
for the IT.
4. Each company should recruit interns directly from their respective institutions or an
application should be created to allow students find available places of internship.
P a g e | 35
References
P a g e | 36