Sie sind auf Seite 1von 35

STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

TECHNICAL REPORT

SUBMITTED TO:

THE DEPARTMENT OF COMPUTER SCIENCE

YUSIF MAITAMA SULE UNIVERSITY KANO

ILIYASU HASSAN
ILIYASU G16CSC010

SUPERVISED BY

DR SANI DANJUMA HELD AT:

CENTER FOR INFORMATION TECHNOLOGY,

BAYERO UNIVERSITY KANO.

BY:

29th July,2019 To 29th January, 2020.

1
DEDICATION

I dedicate this piece of work to the first and last, the beneficent and merciful, the self-existing
and the supporter of all, the giver and forgiver, the hidden and plain, the king of kings, God
ALLAH (S.T.) almighty, the giver of wisdom and understanding, for his inspiration on the
course of writing this report, and to my caring and loving parents for all their moral support,
advices and courage, and to my entire family their support in every aspect, courage, advice
and financial support. I pray ALLAH to richly bless them all Insha Allah.

2
ACKNOWLEDGEMENT
All praise to almighty Allah for sparing for my life, seeing me through the SIWES and to
witness the successful completion of this SIWES, despite the initial odds and security
challenge. I express my sincere gratitude to my family and remain indebted to my beloved
parents for their financial and parental support. Not forgetting my wonderful supervisor DR
SANI DANJUMA that has always show his fatherly support and making out of his time to
review this work, I pray Allah will continue to increase him in knowledge and make him
prosper in all his endeavor. And to all my friends who have contributed to the success of this
work. Furthermore, this acknowledgement will not be completed without expressing the effort
of my Industrial based Supervisor, Yusuf Tijjani for his kindness and friendly attitude and all
other staff for their maximum support and consideration. This work would not have been
possible without your contribution, May Allah reward all of you abundantly.

3
Contents
TECHNICAL REPORT .......................................................................................................... 1

DEDICATION ........................................................................................................................ 2

ACKNOWLEDGEMENT ....................................................................................................... 3

CHAPTER ONE ...................................................................................................................... 5

1.1 INTRODUCTION ....................................................................................................... 5

1.2 ITF KEY FUNCTION ................................................................................................ 6

1.3 OBJECTIVES OF SIWES.......................................................................................... 6

1.4 BODIES INVOLVED IN THE MANAGEMENT OF SIWES ............................... 7

CHAPTER TWO ............................................................................................................... 8

ABOUT CENTER FOR INFORMATION TECHNOLOGY ....................................... 8

3.1 INTRODUCTION ..................................................................................................... 12

3.9.2 CRIMPING OF ETHERNET NETWORK CABLES .................................... 25

3.9.9 Switch or Hub ..................................................................................................... 29

CHAPTER FOUR ................................................................................................................. 32

4.1 INTRODUCTION: .................................................................................................... 32

4.2 SUMMARY ........................................................................................................... 33

4.3 CONCLUSION ...................................................................................................... 33

4.4 RECOMMENDATION ............................................................................................. 33

4.5 REFRANCES………………………………………………………………………….36

4
CHAPTER ONE
INTRODUCTION

1.1 INTRODUCTION
The Student Industrial Work Experience Scheme is a planned and supervised training
intervention based on stated and specific learning and career objectives, and geared towards
developing the occupational competencies of the participants. It is a program required to be
taken by all students of tertiary institution in Nigeria pursuing courses in “specialized
engineering, technical, business, applied sciences and applied arts”.

Therefore, SIWES is generic, cutting across over 60 programs in the university, over
40 programs in the polytechnics and about 10 programs in the colleges of education. Thus,
SIWES is not specific to any one course of study or discipline.

Consequently, the effectiveness of SIWES cannot be looked at in isolation with


respect to a single discipline; it is better explored in a holistic manner since many of the
attributes, positive outcome and challenges associated with SIWES are common to all
discipline participating in the scheme.

Hence, the approach of this paper is to look at SIWES as a general study programme cutting
across several disciplines. Nevertheless, the paper also pays attention to the peculiarities and
problems associated with effective implementation of SIWES for computer science and its
effectiveness in contributing to the professional development of the computer science student.

The government’s decree No. 47 of 8th Oct; 1971 as amended in 1990, highlighted the
capacity building of human resources in industry, commerce and government through training
and retraining of workers in order to effectively provide the much needed high quality goods
and services in a dynamic economy as ours (jemerigb, 2003). This decree led to the
establishment of Industrial Training Fund (ITF) in 1973/1974.

The growing concern among our industrialists that graduates of our institutions of Higher
learning, lack of adequate practical background studies preparatory for employment in

5
industries, led to the formation of Students Industrial Work Experience Scheme (SIWES) by
ITF in 1993/1994 (Information and guideline for SIWES,2002).
1.2 ITF KEY FUNCTION
To work as cooperative entity with industry and commerce where students in institution of
higher learning can undertake mid-career work experience attachment in industries which are
compatible with student’s area of study (Okorie 2002, in Asikadi 2003). The students
Industrial Work Experience Scheme (SIWES) is a skill Training programme design to expose
and prepare students of Agriculture, Engineering, Technology, Environmental, Sciences,
Medical Sciences and pure applied science for the Industrial work situation which they likely
to meet after graduation. Duration of SIWES is four months in Polytechnics at the end of NDI,
four months in College of Education at the end of NCE II and six months in the University at
the end of 300 or 400 or 500 levels depending on the discipline (okorie, 2002).

1.3 OBJECTIVES OF SIWES


The objectives of SIWES among others includes to: -

i. Provide an avenue for students in institution of higher learning to acquire industrial


skills and experience in their approved course of study.

ii. Prepare students for the industrial works situation which they are likely to meet after
graduation.

iii. Expose students to work methods and techniques in handling equipment and
machinery not available in their institution.

iv. Provide students with an opportunity to apply their knowledge in real work station
thereby bridging the gap theory and practices.

v. Enlist and strengthen employers’ involvement in the entire education process and
prepare students for employment in Industry and Commerce (Information and
Guideline for SIWES, 2002).

6
1.4 BODIES INVOLVED IN THE MANAGEMENT OF SIWES
The bodies involved are: Federal Government, Industrial Training Fund (ITF), Other
Supervising Agencies are: National University Commission (NUC), National Board for
Technical Education (NBTE) & National Council for Colleges of Education (NCCE). The
function of these agencies above include among others to:

i. Ensure adequate funding of the scheme.

ii. Establish SIWES and accredit SIWES unit in the approved institutions.
iii. Formulate policies and guideline for participating bodies and institutions as well
as appointing SIWES coordinators and supporting staff.

iv. Supervise students at their places of attachment and sign their log-book and ITF
forms.

v. Vet and process students’ log-books and forward same to ITF area office

Ensure payment of allowances for the students and supervisors. Therefore, the success or
otherwise of the SIWES depends on the efficiencies of the Ministries, ITF, Institutions,
Employers of labor and the general public involved in articulation and management of the
programme. Thus the evaluation of SIWES in tertiary institution in meeting up with the needs
for the establishment of the programme is necessary (s.w.wodi, 2009).

7
CHAPTER TWO
ABOUT CENTER FOR INFORMATION TECHNOLOGY
PREAMBLE
The center for information technology (CIT)

The center for information technology (Formally known as computer center), was established
over two decades ago, and was charged with the responsibility for providing computer
services and CIT capacity development for the university and its immediate environment. In
previous years, it has several well equipped computer laboratories, such as the NDIC lab with
100 networked computers, the Nura Imam Laboratory with 50 networked computers, the
PTDF twin Laboratory with 50 computers each, and two CISCO Laboratories each with 20
networked computers for teaching of regular and specialized courses.

Academic activities carried out by CIT

1. Cisco certified network associate training (CCNA)

2. Cisco IT essential certification training

Other Activities

These other activities were also carried by the Center in 2009:

1. The implementation of Voice Over Internet Protocol (VOIP) across the campuses of
the University.
2. The introduction of an e-learning platform for teaching and conducting a train the
trainer workshops on how to use the e-learning to all academic staff

3. Rapid expansion of the wireless network in the university with the introduction of lots
of hotspot, resulting in more than 50% network coverage of the two main campuses of the
university.

8
4. Introduction of additional industry certification courses; Oracle Database
Management, java for capacity building for the teeming youth of the host community of the
university.

5. Organizing and hosting of several local national and international seminars and
conference such as the first ever international free and open source Software Conference in
the country, that had in Developer, Kano state Commissioner for Science Information
Technology and host of other distinguished dignitaries in the year 2009.

In the year (2009), the Management Information System (MIS) unit was merged with the CIT.
The MIS was established in 1995 in all federal universities through the directives of the
National Universities Commission (NUC). The main aim of the Unit was to facilitate the
acquisition of information about students and staff of universities through a special data base
that will assist government in decision making, funds allocation, planning, program
implementation, and control. The MIS pursued this task with all the necessary vigor, and was
able to establish a complete database of staff and student personal and academic records. In
addition, it succeeds in the establishment of an electronic financial record, lunch and
successfully conducted the online student application and registration exercise, releasing
students examination result online, the preparation and issuance of graduate and post graduate
transcripts, developed a software for computing GPA/CGPA for departments, faculties and
Senate Business Committee in the year, and it lunched the library information systems in
conjunction with the University library. ( (BAYERO UNIVERDTY, KANO. WEBSITE,
2011).

A recent committee set up by management to review ICT services and facilities in the
university has identified a number of lapses in both the ICT policy and in its implementation.
One of the observations of the committee is in respect of the inefficiency of the Centre for
information Technology (CIT) and lapses and shortcomings of its mandate. Specifically, the
committee recommends that the mandate of the CIT reviewed to be in tune with the new
university ICT policy and to reflect the overall vision and mission of the university. With this,
the committee believes is necessary if the CIT is to be repositioned for effective information
services delivery to staff and students.

9
One of the general plans of the university that is targeted at making Bayero University, Kano
among leaders in the creation and dissemination is the establishment of centers in research in
different fields.

Guided by the report of the ICT services and facilities committee and the general plans
of the university, informed by the need to improve the frontline delivery of IT services in the
university and necessitated by increasing population of the university and the attendance
increased services and support, the mandates and structure of the CIT is reviewed as follows.

Revised mandate
The center shall maintain its name –Centre for information technology, CIT and shall have
the following mandates:

i. Conducting cutting edge research on ICT and pursuing excellent through


innovations, creations and provision of ICT knowledge

ii. Providing computing and it services IT services to the university community


including

a. Provision and maintenance of internet and intranet services

b. Development and management of university websites

c. Development and promotion of software for use by different units

d. Maintenance of ICT infrastructure

e. Provision of IT consultancy services and

f. Other information services to the university community

Structure
The centre shall be headed by a Director and have two main divisions: ICT research Division
and ICT services Division .The Direction is the administration head of the centre .He/She
gives general supervision to the centre and ensures the operations of the centre within the

10
defined mandate .The Director, reporting to the vice-chancellor, shall drive and ensure the
achievement of the goals of the CIT.

The research division shall be responsible for:

i. Defining and projecting the image of the centre as a centre of


Excellence in research on ICT

ii. Conducting research and attraction grants iii. Inviting scholars and
investigators for collaboration and disseminations iv. Organizing
ICT conferences and other academic meetings

v. Any other activities that would assist in projecting the image of Bayero University
Kano as a leader in the ICT activities

The ICT services division shall have three sub divisions:

i. Information service and web development


ii. Network administration and iii.
Maintenance and support

I was assigned to the maintenance unit, it has the following functions:

This unit is responsible for logging the maintenance of every computer being used in
the university, such as blowing, defragging and checking on the functionality anti-viruses and
application software, at agreed intervals .They shall be expected to monitor the performance
of hardware and software and prepare advice to management on future procurement decisions,
acquisition of licensed software and training needs of staff and students. The maintenance unit
is headed by Mallam Auwal Hassan who serves as maintenance officer.

11
CHAPTER THREE
3.1 INTRODUCTION
This chapter contains the activities done in the six months’ duration of my SIWES
program at Center for Information Technology, BUK with the experiences gained.

During the course of the industrial training at Center for Information Technology
(CIT), BUK in the entire six months, the training was in various categories namely Hardware,
Software, Networking and System maintenance. I was taught on how to change power packs,
other CPU parts. I was shown how to format using window 7,8 & 10 software, trouble
shooting of a computer systems and also how to install and maintain a computer.

During the lectures, a computer was defined as an electromechanical device which under the
control of stored program accepts data as input, process it to produce useful information as
output, which it can display as a soft copy, printed as hard copy or stored in a storage medium.
It was also defined as a machine that performs tasks, such as calculations or electronic
communication, under the control of a set of instructions called a program. Programs usually
reside within the computer and are retrieved and processed by the computer’s electronics. The
program results are stored or routed to output devices, such as video display monitors or
printers.

Computer performs a wide variety of activities reliably, accurately, and quickly.

3.2 EXPERIENCES GAINED IN THE SIX MONTHS OF MY SIWES PROGRAMME


1. Computer Maintenance
2. Computer Networking
3. Introduction To Arduino

3.2.1 INTRODUCTION TO COMPUTER MAINTENANCE


I was theoretically and practically introduced to the concept of computer maintenance as the
practice of keeping computer in a good state of repair.

TYPES OF MAINTENANCE
1. Corrective maintenance

12
2. Preventive maintenance

Corrective maintenance: is a maintenance task performed to identify, isolate, and rectify a


fault so that the failed equipment, machine, or system can be restored to an operational
condition within the tolerance or limit established for in-service operation. Corrective
maintenance can be sub divided into

i. Immediate Corrective maintenance (in which work start immediately


after failure) and
ii. Deferred Corrective maintenance (in which work is delayed in
conformance to a giving set of maintenance rules).

Preventive maintenance: Preventive maintenance is the care and servicing by personnel for
the purpose of maintaining equipment and facilities in satisfactory operational condition by
providing systematic inspection, detection, and correction of incipient failure either before
they occur or before they develop into major defect.

Maintenance, including tests, measurements, adjustments and parts replacement, performed


specifically to prevent faults from occurring.

I learnt that the primary goal of maintenance is to avoid or mitigate the consequences of failure
of equipment. This may be by preventing the failure before it actually occurs which planned
maintenance and condition based maintenance help to achieve. It is designed to preserve and
restore equipment reliability by replacing worn components before they actually fail.

3.3 INTRODUCTION TO COMPUTER HARDWARE


During the lectures, I was theoretically and practically introduced to Computer hardware
(usually simply called 'hardware' when a computing context is concerned) which is the
collection of physical elements that constitutes a computer system. Computer hardware is the
physical parts or components of a computer, such as the monitor, mouse, keyboard, computer
data storage such as hard disk drive (HDD), graphic cards, sound cards, memory (RAM),
motherboard, and so on.

13
3.3.1 The monitor
A computer monitor is a display adapter that displays information processed by the computer's
video card. When a video card or graphics card converts binary information from 1s and 0s
into images, these images are displayed onto the directly connected monitor. There are
different types of monitors, this including cathode ray tube (CRT) and liquid crystal displays
(LCD). The Monitors have display functions that include powering it on and off, controlling
brightness, contrast and position.

3.3.2 Peripheral device


Peripheral devices are computer devices that are connected to the computer externally such as
printer, scanner, keyboard, mouse, and external modem. They can be internal such as CD-
ROM or internal modem and Peripheral devices can be classified according to their functions.
3.4 DESCRIPTION OF BASIC SYSTEM UNIT COMPONENTS

When talking about computer hardware, the most important one is the system unit because
it’s the unit that carries out all the processing activities, this is because of the processor and
some basic components present inside it.

System unit is where all your computer peripherals are attached such as mouse, keyboard,
monitor, speakers and etc. It is composed of 6 basic components of system unit, namely;
motherboard, processor, ram, hard drive, video card and power supply. It is often called as
CPU but it is not, the CPU (central processing unit) is the processor itself.

3.4.1 Motherboard
A motherboard is a large circuit board used to connect the electronics and circuitry required
which comprise the computer system. Motherboards contain connectors which allow major
system components such as the CPU and RAM to attach to the board. A motherboard can also
contain connector slots for network, video and sound cards. However, many motherboards
now are equipped with these features as integrated components. The difference between the
two is how they are upgraded. When using connectors on the motherboard, system
components are easily unplugged and changed or upgraded as technology advances. When
upgrading or replacing an on-board feature, it cannot be removed from the motherboard.

14
Therefore, it is often necessary to disable the on-board functionality and add an additional
dedicated card using a connector.

Fig 1.0 Motherboard

3.4.2 Processor
Processor often thought of as the engine of the computer. It is also called the CPU.
Microprocessor is a solid-state central processing unit much like a computer on a chip. An
integrated circuit that accepts coded instructions for execution. For me, processor is the brain
of the system. There are two types of processor; with pins and the pin-less.

Fig 1.1 Processor

3.4.3 RAM
RAM (random access memory) is a type of data storage used in computers. It is used to store
programs and data while being processed by the CPU. Stored data is accessed in any order,
or at random, as needed. All computer programs run from RAM. Besides the CPU, the amount
of RAM is the most important factor in computer performance. Every operating system
requires a minimal amount of RAM in order for the OS to function. Most computers are
capable of running multiple applications simultaneously, or multi-tasking. For example, many
users run email programs, Instant Messenger clients, as well as anti-virus tools or firewall
software. All of these applications require memory. The more applications that need to run
simultaneously, the more RAM required. More RAM is also recommended for computer
systems with multiple processors. Additionally, as the speed of the CPU and the bus increase,

15
so must the speed of the memory it accesses. The amount and type of RAM that can be
installed on a system is dictated by the

motherboard.

Fig 1.2 Random Access Memory

3.4.4 Hard disk drive


Hard disk drive is the primary archival storage memory for the system. It is where we saved
our files and data including our operating system, antivirus and other applications. There are
two types of hard drive, we have PATA (Parallel Attachment Packet Interface) then SATA
(Serial Attachment Packet Interface). Desktop uses the 3.5 inches and the laptop uses the 2.5
inches of hard disk. SATA is the latest and most commonly used.

Fig 1.3 Hard Disk Drive

3.4.5 Optical drive


Optical storage devices use laser beams to record information by creating differences in
optical density. These devices include CDs and DVDs and come in three different formats:

Read only: CD, DVD

Write once: CD-R, DVD-R

Write many: CD-RW, DVD-RW

16
The prices of these devices continue to fall and most computers now incorporate DVD-RW
drives that can store approximately 4.7 GB of data on a single disc. Another form of DVD
drive, called Blu-ray is also available. It uses a different type of laser to read and write data.
The color of the laser used to store this information is blue-violet. For this reason, disks are
called Blu-ray, to distinguish them from conventional DVDs which use a red laser. Blu-ray
disks have storage capacities of 25 GB and more.

Fig 1.4 Optical drive

3.4.6 MEMORY SOCKET


Memory socket or RAM slots are vertical slots, typically numbering three or four, which
usually are located at the upper-right corner of the motherboard. The motherboard is the
primary printed circuit board in the computer that contains various slots, or connection points,
for a number of vital components. RAM slot are used to house RAM (Random Access
Memory).

Fig 2.0 Memory Socket

3.5 INSTALLATION OF RAM


Installing memory is one of the easiest tasks. Take the time to first be sure you have the right
RAM for your computer. After being certain you have the right RAM, you are ready to open
the system unit and begin. But first, you need to remove static electricity.

Steps in slotting in Ram memory

i. Turn off the computer system and unplugged all the cable.

17
ii. Remove the cover of the system unit.

iii. Remove any and all ESD or Electrical Static Charge from your body and clothes
so no damage to the chips can occur by touching the system case.

iv. Locate the memory slot.


v. Hold each corner of the SDRAM placing it on top of the bank 1. You will notice
that the SDRAM has a cut at the bottom side; it is there to prevent the memory
going in the wrong way.

vi. The two white clips will now become straight holding each corner of the memory.
If you have more than one SDRAM perform same steps as above but placing the
SDRAM in memory banks two and so on.

vii. Replace the system unit cover.

3.6 DATA BACKUP


Backing up data is a copy of all the files on the computer. If you have a data backup, you are
protected if, for example you delete files by miskate.it is very important to back up files on to
a different storage device from the computer’s hard drive. If the hard drive gets damaged user
can still restore all the information on the computer and be up and running quickly.

There are basically two types of data that need to be backed up:

The files that user create and update frequently.

The programs, application that make up the ‘system’ that the depends on to run and which are
updated only occasionally.

Follow these steps to back up the computer

i. Press the window button and type in back up in the search box that appear.

Alternatively, Press the window button and click on control pane.

ii. Click on back up your computer on the ‘system and security’ menu iii. Click on
set up backup iv. Select where you want to save your backup. This is where you
will tell the computer to send copies of all the files and program.

v. Click on the drive and then click Next.

18
vi. You will now see ‘What do you want to back up’ and select the option that suit
you and then click Next.

vii. Click Ok.

3.7 INSTALLATION OF HARD DISK DRIVE


1. Turn off the computer, disconnect the power cable, and remove all the cable attached
to it.

2. Remove system unit cover retaining screw.

3. Insert the new hard disk into an empty drive bay in the system unit case. You might
need a small screwdriver to screw the disk into your case. Different cases have different
ways of holding hard disks. Many slide in and out of the case on rails.

4. Connect one cable from the computer’s power supply to the power connector on the
back of the hard disk.

5. Depending on what type of hard disk you have, connect the IDE cable or SATA cable
from the back of the disk to the IDE or SATA connector on the computer’s
motherboard. IDE cables are wide and flat with large connectors, while SATA cables
are thin with small connectors.

6. Replace the system unit cover and attached all the cable.

Hard drive partitioning simply means dividing the hard drive into two or more
segments. Partition of hard drive depends on the user requirement; user may want the hard
drive to act as a single entity or as several smaller logical drives.

Note: Partitioning of hard drive can be done through Disk Management or when installing
operating system on the hard drive and the segment of the hard drive where the operating
system is installed is always greater than the other segments which serves as a backup.

Follow these steps to partitioning hard drive using Disk Management

1. Right click on My computer icon and select Manage.

19
2. Click on Disk Management.

3. Select the hard drive to partition.

4. Right click on selected hard drive and select shrink.

5. Enter the Megabytes and click on shrink.


3.7.1 FORMATTING HARD DISK DRIVE
Formatting of hard drive simply means preparing the hard drive for the operating system, and
acceptance of some application.

Formatting hard drive can also be done due to some technical problems from the system or
virus infection in order to bring the computer system back to a good condition.

3.8 SOFTWARE INSTALLATION


Software Installation (or setup) of a computer program (including device drivers and plugins),
is the act of making the program ready for execution. Because the process varies for each
program and each computer, programs (including operating systems) often come with an
installer, a specialized program responsible for doing whatever is needed for their installation.
Installation may be part of a larger software deployment process.

Installation typically involves code being copied/generated from the installation files to new
files on the local computer for easier access by the operating system. Because code is
generally copied/generated in multiple locations, uninstallation usually involves more than
just erasing the program folder. For example, registry files and other system code may need
to be modified or deleted for a complete uninstallation.

3.8.1 INSTALLING WINDOW 7 OPERATING SYSTEM


1. Boot on the computer system, insert the Windows 7 installation disc and restart the
system or ctrl + alt + del.

2. Press ‘F9’ Continuously to enter boot option.

3. Select CD/DVD. Press any key when prompted to do so and Windows will start
loading its files.

20
4. Now you will get the Windows Setup Window. This is the part to select Language for
your windows. Select ‘English’ and click Next.

5. Also there will be a ‘INSTALL NOW’ button. Click on it and proceed to next step.

6. There will be a license agreement. Check on ‘I ACCEPT’ and proceed to NEXT. After
that there will be an option to install windows. ‘UPGRADE’ and ‘CUSTOM’. Right
now we are installing a clean version so Click on CUSTOM.

7. In this step you will do partitioning of your drive. Be careful, this is the most important
part of the Installation. In this you will allocate spaces to your drive. If you want to

21
create a new drive, simply click on a drive and then click ‘NEW’. A new drive will be
created.

8. When you have created the drives, Simply Select the drive in which you want to install
windows. Click ‘Format’, this will erase all the previous data on you that drive. Click
on ‘NEXT’ to proceed.

9. Now your windows will start installing its files.

10. Now when your files are installed. Your PC will be rebooted and now you will see is
a

‘User Settings’ Screen. Simply add your Name and password and proceed to ‘NEXT’

22
11. In this step you have to activate your windows. Simply look at the back of your
Windows CD/DVD cover there will be a PRODUCT KEY. Add this key into your PC
and Click ‘NEXT’.

12. Now you have Install your windows. Give the desired information the Windows Step
guide will ask, like Time Zone, Update Timing and Your Computers location. There
are three types of location. ‘WORK’, ‘PUBLIC’ and ‘HOME’. Select on anyone of
them according to your location. It only adds sharing security according to your
location.

13. You have installed windows 7. Now you can see is your desktop. It is simple to use,
setup your desktop

23
3.9 COMPUTER NETWORKING
I was learned both the practical and theoretical aspect of computer networking. I was
also part of the SIWES student selected to network the faculty of communication. I was taught
on how to make different networking cables using the straight cable connection.

3.9.1 NETWORK CABLES


Network cables come in four (4) pairs, which all together makes it eight, which has
different colors namely green strip, green-blue-strip, blue-orange strip, orange-brown strip
and brown, those are the colors associated with network cables. There are (2) main ways of
crimping network cables.

i. Straight
cable ii.
Cross over cable

2.12.1.1 Straight Cable


Straight cables are commonly used to connect a host to client. Straight Cable is used
to connect computers, printers and other network client devices to the router switch or hub
(the host device in this instance).

In straight cable connection, the color arrangement of the cables at both end is as follows:

Strip green-green

Strip orange-blue

Strip blue-orange

Strip brown-brown
Straight cable is used when you are connecting different types of devices together.

24
2.12.1.2 Crossover cable
Crossover wired cables (commonly called crossover cables) are very much like
Straight through cables with the exception that TX and RX lines are crossed (they are at
opposite position on either end of the cable). For example, connecting a computer directly to
another computer or connecting a switch directly to another switch, or connecting a router to
a router.

In cross over arrangement, the cables are arranged in different ways at each end. The
arrangement on the first end:

Strip green-green

Strip orange-blue

Strip blue-orange

Strip brown-brown

While on the other end, we have the arrangement as thus:

Strip green-orange

Strip orange-blue

Strip blue-green

Strip brown-brown

These cables are used when connecting the same type of devices together.

3.9.2 CRIMPING OF ETHERNET NETWORK CABLES


In crimping network cables, we need to know the types of cables and the equipment
used: There are two (2) types of network cables namely the cart 4 & cart 6, the cart 4 cable is
mainly used for telephone and intercom while the cart 6 has 2 main type namely Indoor and

25
outdoor cart 6 cables. The indoor cart 6 cable is used to connect 1 system to another system
while the outdoor cart 6 cable is used to connect one building to another building in the
network environment.

Tools used for crimping and testing Ethernet cable;

i. Cable tester
ii. Ethernet Cable
iii. RJ45
Connector iv.
RJ45
crimping tools

v. Cutting plier vi.


Switch/Hub

3.9.3 The Cable Tester


A cable tester is a device that is used to test the strength and connectivity of a particular
type of cable or other wired assemblies. There are a number of different types of cable testers,
each able to test a specific type of cable or wire (some may be able to test several different
types of cables or wires). If the cables is arranged accordingly the signal showing on the
numbers moves up to down without a jump and if it is not arranged it will jump that means
the connection of the one cable is not arranged well in the RJ-45.

26
Fig 3.6 A Cable Tester

For computers, one of the most common types of cable testers used is for testing Cat5, Cat5e,
and Cat6 network cables. Because so many different types of data can be transmitted over a
network cable, it is also important to ensure the signal strength between computers and servers
is adequate for transmitting data and that there is no interference from outside sources that
could cause a loss of data or decrease in signal strength. A cable tester can test for these factors
and help to ensure the network cables connections are correct and will work for the intended
purpose.
3.9.4 The Ethernet Cable
The Ethernet cable are network cables containing eight wires with different colors.
These wires are arranged and “terminated” according to the
type of connection needed.

A network (Ethernet) cable with an RJ-45 connector terminated at the end. We


have the straight ended terminated cable, for connecting devices
that are dissimilar (e.g computer to hub/switch, switch to hub etc). We also have the
cross ended terminated cable, for connecting devices that are the same (e.g computer to
computer, switch to switch, hub to hub etc), the colors of the wires are green, orange, blue
and brown. Four of these wires have these colors in full while the remaining four have the
colors but with stripes of white along it.

For straight ended cables, the color code is:

White/Orange (i.e. orange color striped with white) followed by full orange, white/green-blue,
whit/blue-green, white/brown-brown.

For cross-ended cables, we have:

White/green-green, white/orange-blue, white/blue-orange, white/brown-brown.

27
Fig 2.7 Cart 6 Cable

3.9.5. The RJ 45 Connector


This is a device where all the wires are arranged in line and inserted which is then held
in place (crimped) by a crimping device.

3.9.6 The RJ-45 Crimping tool


The RJ-45 crimping tool is used to crimp the cables which is arranged accordingly in the

RJ-45 connector and also used to crimp the RJ-45 where the cables are inserted.

Fig 2.8 RJ-45 Crimping Tool

3.9.8 The Cutting Plier


The cutting plier is used to cut the edges of an Ethernet cable

Fig 2.9 Cutting Pliers

28
3.9.9 Switch or Hub
A switch performs all of the same basic tasks as a hub, but the switch uses a set of
internal logic circuits to establish a dedicated, logical path between the two PCs. This provides
for more efficient data transfer without collision which occurs in the hub.

A hub is a device that acts as a central connection point for computers on a network.
Every computer plugs into the hub.

They both have ports for RJ-45 connectors which computers use to connect to the
network.

Fig 3.0 Switch

3.10 ARDUINO

Arduino first and foremost is an open-source computer hardware and software


company. The Arduino Community refers to the project and user community that designs and
utilizes microcontroller-based development boards. These development boards are known as
Arduino Modules, which are open-source prototyping platforms. The simplified
microcontroller board comes in a variety of development board packages.

The most common programming approach is to use the Arduino IDE, which utilizes
the C programming language. This gives you access to an enormous Arduino Library that is
constantly growing thanks to open-source community.

Arduino Uno R3

It has input and output pins (of which 6 can be used as PWM outputs), 6 analog inputs,
a 16 MHz crystal oscillator, a USB connection, a power jack, an ICSP header and a reset

29
button. It contains everything needed to support the microcontroller. It is programmed using
the Arduino IDE software.

Figure 1 Arduino Uno R3

Arduino IDE

This is the development environment that is being used to code the micro controller;
it is integrated with the necessary libraries of most of the sensors (components). It is user
friendly, it provides error messages where needed, it saves and uploads the codes to the
board/micro controller. It has a simple interface.

30
Figure 5 Arduino IDE Interface

Syntax

//Declarations

void setup(){

//Setup code, to be run once

void loop(){

//loop code, to be run repeatedly

Example

31
Below is an example of lines of code, which when uploaded to an Arduino board turns an
LED on and off.

int my_led = 13;

void setup() {

pinMode(my_led, OUTPUT);

void loop() { // beginning of loop, do the following things: digitalWrite(my_led,


HIGH); // turn LED On

delay(1000); // wait 1 second

digitalWrite(my_led, LOW); // turn LED Off

delay(1000); // wait 1 second

} // end loop, go back to beginning of loop

CHAPTER FOUR
SUMMARY, CONCLUSION AND RECOMMENDATION
4.1 INTRODUCTION:
This chapter contains the summary of the entire report as well as conclusion and
recommendation.

32
4.2 SUMMARY
From this report work, I have explained and listed the knowledge I acquired during
my Six month SIWES Programme, starting from the foundation of SIWES programme, their
needs and objectives, the history of place of attachment, their goals. This also contains
benefits, the experiences gained in the entire six month of my SIWES programme which are
(networking, computer maintenance etc).

During the course of my SIWES in CIT, I learnt how to crimp network cables, format
a system using window 7,8 & 10 softwares, I was practically shown how to assemble and
reassemble of a computer CPU. I also learn the theoretical aspect of computer science which
includes how to make a good presentation, database management, and some interesting areas
in computer science.

4.3 CONCLUSION
In conclusion, I have gained lots from my place of attachment such as arranging of
network cables, how to pass and labeled them for better understanding, how to format a
system, reassembling and assembling of internal CPU. The industrial training had fostered my
knowledge in my field by enlightening me in some part of computer systems their
applications, troubleshooting if faulty. It gave me a practical approach to support most of the
theoretical knowledge earned in the university.

4.4 RECOMMENDATION
For subsequent trainees being taken up by the company, I strongly recommend a more
stringent supervision of their training program, especially by the ICT Department. This will
go a long way in ensuring that trainees do not lose focus.

Also I suggest ITF should liaise with some companies where they will take up students
for industrial training. This will help students who find it difficult to find attachments or who
end up in companies where they do nothing. I was not able to afford my transportation to my
place of attachment which made everything stressful, and the institution should try and be
paying some stipends monthly so that student can use that for transportation. I am convinced

33
if the organizers of the SIWES program must achieve their aims and objectives; the following
has to be noted:

i. The ITF is good and interesting because students learnt a lot of things, so, I will like to
advise that the ITF should continue. ii. Some students were not punctual to the place of
attachment therefore authorities should restrict in attendance and punctuality.

iii. The organizations need to have a good program for prospective SIWES participants.
iv. Lastly the problem of none payment of stipends for IT students should be
considered.

34
References
BAYERO UNIVERDTY, KANO. WEBSITE. (2011, 9 3). About CIT. Retrieved from
Bayero University website: www.buk.edu.ng

jemerigb. (2003, 3 4). nigerian organizations. Retrieved from federal government


organization : www.nigerianorg.ng

okorie. (2002). information and guidlines for siwes. uwary: national publishing
company . s.w.wodi. (2009). improvement for siwes. inugu: kantep press.

35

Das könnte Ihnen auch gefallen