Ridwan Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 29

LADOKE AKINTOLA UNIVERSITY OF TECHNOLOGY

OGBOMOSO, OYO STATE, NIGERIA.

TECHNICAL REPORT

ON

STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

AT

OAU ICT CENTER

OBAFEMI AWOLOWO UNIVERSITY ILE - IFE

BY

ADEDEJI RIDWAN OLUWABUKUNMI

MATRIC NO: 181599

SUBMITTED TO

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

FACULTY OF ENGINEERING,

LADOKE AKINTOLA UNIVERSITY OF TECHNOLOGY, OGBOMOSO.

IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE

AWARD OF A BACHELOR OF TECHNOLOGY (B. TECH) IN

COMPUTER SCIENCE AND ENGINEERING.

June, 2023
CERTIFICATION

I certify that this industrial training report was written and submitted by Adedeji Ridwan

Oluwabukunmi, of Matric. No. (181599) to the Department of Computer science and engineering,

Faculty of Engineering, Ladoke Akintola University of Technology, Ogbomoso, Oyo State.

Under the supervision of:

…………………… ……………………
Dr. Ganiyu
Supervisor Date

................................ .……………………
Prof Oladosu
Head of Department Date
DEDICATION

I dedicate this project to the God Almighty, the creator of the universe for sparing my life

throughout the course of this seminar. And also to my Parent Mr and Mrs Adedeji for there

unshaken support, may God bless you continuously and you shall eat the fruit of your labour.
ACKNOWLEDGEMENT
I give thanks to Almighty God for His infinite mercy, love, care, and protection throughout the
course.
I am highly indebted to my Parents for their moral and financial supports always.
I also wish to register my sincere appreciation to the staffs of OAU ICT for their support

during the course of my SIWES program, to the IT Coordinator of ICT in person of Mr Adedoyin

Akinola for his patience and understanding, also to the Director of OAU ICT in person of Prof

Afolabi for his time to time assistance and support, May God bless them more and more.

I also give kudos to the staffs in the faculty of Engineering, Ladoke Akintola University of

Technology, Ogbomoso for their advice and support.

May God bless you all abundantly.


Table of Contents
CHAPTER 1....................................................................................................................................1
1.0 INTRODUCTION.................................................................................................................1
1.1 BACKGROUND OF SIWES................................................................................................1
1.2 OBJECTIVES OF SIWES.................................................................................................2
CHAPTER 2....................................................................................................................................3
2.1 HISTORICAL BACKGROUND OF LAUTECH ICT.........................................................3
2.2 THE ORGANOGRAM OF LAUTECH UNIVERSITY ICT OGBOMOSO.......................5
CHAPTER 3....................................................................................................................................6
3.1 NETWORKING...........................................................................................................6
3.2 TYPES OF NETWORK...................................................................................................8
3.3 Internetwork....................................................................................................................11
3.4 DEVICES AND TOOLS WE USED IN NETWORKING............................................14
3.4.3 CRIMPING TOOL..................................................................................................15
3.4.5 MODULAR JACK..................................................................................................16
3.4.6 CABLE TESTER....................................................................................................17
3.5 TERMINATION OF CABLE.........................................................................................17
3.5.1 Straight through cable..............................................................................................18
3.5.2 The Crossover Cables..............................................................................................19
3.5.3 PROCESS OF TERMINATING CABLE...............................................................19
CHAPTER 4..................................................................................................................................21
4.1 COMPUTER BASED TEST (CBT)...............................................................................21
4.1.1 Classification of computer based testing (CBT)......................................................21
4.1.2 Impact of computer based testing in institution............................................................21
CHAPTER 5..................................................................................................................................27
5.0 Summary of my SIWES in LAUTECH ICT, Ogbomoso...............................................27
5.1 CONCLUSION...............................................................................................................28
5.1.1 Problems I encounter during my SIWES................................................................28
5.2 RECOMMENDATIONS................................................................................................29
CHAPTER 1
1.0 INTRODUCTION
1.1 BACKGROUND OF SIWES
Student Industrial Work Experience Scheme (SIWES) was established by Industrial Training

Fund (ITF) in 1973 to solve the problem of lack of adequate practical skills preparatory for

employment in industries by Nigerian graduates of tertiary institutions.

The Scheme exposes students to industry based skills necessary for a smooth transition from the

classroom to the labour world. It affords students of tertiary institutions the opportunity of being

familiarized and exposed to the needed experience in handling machinery and equipment which

are usually not available in the educational institutions.

Participation in SIWES has become a necessary pre-condition for the award of Diploma and

Degree certificates in specific disciplines in most institutions of higher learning in the country, in

accordance with the education policy of government.

The major background behind the embankment of students in SIWES was to expose them to the

industrial environment and enable them develop occupational competencies so that they can

readily contribute their quota to national economic and technological development after

graduation.

The major benefits acquired by students who participate conscientiously in Students Industrial

Work Experience Scheme (SIWES) are the skills and competencies they acquire. The relevant

production skills remain a part of the recipients of industrial training as life-long assets which

cannot be taken away from them. This is because the knowledge and skills acquired through

training are internalized and become relevant when required to perform jobs. The Industrial
Training Fund’s policy Document No. 1 of 1973 which established SIWES outlined the objectives

of the scheme.

1.2 OBJECTIVES OF SIWES


Provide an avenue for students in higher institutions of higher learning to acquire industrial

skills and experiences during their course of study

Prepare students for industrial work situations that they are likely to meet after graduation.

Expose students to work methods and techniques in handling equipment and machinery

that may not be available in their institutions.

Make the transition from school to the world of work easier and enhance students’ contact

for later job placements.

Provide students with the opportunities to apply their educational knowledge in real work

situations, thereby bridging the gap between theory and practice.

Enlist and strengthen employers’ involvement in the entire educational process through

Student Industrial Work Experience Scheme (SIWES).


CHAPTER 2
2.1 HISTORICAL BACKGROUND OF OAU ICT
Obafemi Awolowo University, Ile-Ife is one of three Universities established in Nigeria between
1961 and 1962 as a result of the report submitted to the Federal Government in September, 1960,
by a Commission it appointed in April 1959 under the Chairmanship of Sir Eric Ashby, Master of
Clare College, Cambridge, to survey the needs of post-secondary and higher education in Nigeria
over the next twenty years. On 8th June, 1961 the Law providing for the establishment of the
Provisional Council of the University was formally inaugurated under the Chairmanship of Chief
Rotimi Williams.

On 11th June, 1970, an Edict known as the University of Ife edict, 1970 was promulgated by the
Government of the Western State to replace the Provisional Council Law of 8th June, 1961. This
Edict has since been amended by the Obafemi Awolowo University, Ile-Ife (Amended) Edict No.
112 of 1975 (Transitional Provisions) Decree No.23 of 1975. This new Decree effected a takeover
of the Obafemi Awolowo University by the Federal Military Government and established a
Provisional Council as an interim governing body of the University which shall subject to the
general direction of the Head of the Federal Government, control the policies and finances of the
University and manage its affairs. This Provisional Council has since been replaced by a
Governing Council.

The University started with five Faculties – Agriculture, Arts, Economics and Social studies (now
Social Sciences), Law and Science. Six new Faculties have since been added, namely the Faculty
of Education (established on 1st October, 1967), the Faculty of Pharmacy (established on 1st
October, 1969), the Faculties Technology and Health Sciences (now College of Health Sciences)
(both established on 1st October, 1960), Faculty of Administration with effect from 1st October
1979) and Faculty of Environmental Design and Management (established on April 6, 1982). 
In 1992, the University established a collegiate system with five Colleges. The system did not
function effectively and was abandoned after two years. However, the Postgraduate College and
the College of Health Sciences were retained. The College of Health Sciences now comprises of
the Faculties of Basic Medical Sciences, Clinical Sciences and Dentistry.
2.2 THE ORGANOGRAM OF OBAFEMI AWOLOWO UNIVERSITY ICT

ICT DIRECTOR

ADMINISTRATIVE UNITS TECHNICAL UNIT

SECRETARY RESIDENT RESIDENT DATA CLERICAL OFFICE


ACCOUNTA OFFICER 1 OFFICER ASSISTANT
NT AUDITOR

HOD NETWORK UNIT HOD WEB UNIT HOD TRAINING UNIT

SERVER SYSTEM IP SOFT CBT HARDWA


DEVELOPMENT SOFTAWARE UNIT WARE UNIT RE UNIT
AND
MAINTAINANCE

ID CARD PORTAL MANAGEMENT CBT

SOFTWARE DEPLOYMENT TRAINING

POWER HOUSE
CHAPTER 3

EXPERIENCE GAINED

3.1 NETWORKING
I learned about networking using network cable. There are many types of network cable that are

used in networking work, example are cat5, cat6, fiber cable and so on. We used EJ45 connector,

which was used to terminate the wire for the wire to become a cable, it was used for Ethernet

network. When terminating a cable there is arrangement of colours of the strand wire depending on

the purpose or function you want to used it for, there is straight and cross cable for different

purpose. Cross cable is used to connect system to system for transferring of data from one

computer to another

In the world of computers, networking is the practice of linking two or more computing devices

together for the purpose of sharing data. Networks are built with a mix of computer hardware and

computer software.

I was introduced to a type of networking cable [cat 5] which is an Ethernet network cable standard

defined by the electronic industries association and telecommunications industry association, is the

fifth generation of twisted pair Ethernet technology and the most popular of all twisted pair cables

in use today. It contains four pairs of copper wire. It supports fast Ethernet speeds (up to

100Mbps), it runs are limited to maximum recommended run length of 100m and one type of

connector [EJ-45]. I learned how to terminate a cable when terminating a cable it can either be

straight cable or cross cable.

Advantages of Network
Speed: Sharing and transferring files within networks are very rapid, thus saving time, while

maintaining the integrity of the file.

Cost: Individually licensed copies of many popular software programs can be costly. Networkable

versions are available at considerable savings. Shared programs on a network allow for easier

upgrading of the program on one single file server, instead of upgrading on individual workstation.

Security: Sensitive files and programs on a network are usually passwords protected to restrict

access or designated as “copy inhibit” to prevent worrying about illegal copying of programs.

Centralized Software Management: Software can be loaded on one computer (the file server),

thereby eliminating the need to spend time and energy installing updates and tracking files on

independent computers throughout the building.

Resource Sharing: Resources such as printers, scanners, fax machines and modems can be shared.

Electronic Mail: Electronic mail on a Local Area Network can enable staff of an organization to

communicate within the building, without leaving their desks.

Flexible Access: People can access their files from computers throughout the organization.

Disadvantages of Network

Cost: The initial cost of setting up a network can be substantial, although it saves money over time.

The services of a technician could also be required at initial setup.

Time: To properly maintain a network, a considerable time and expertise is required.


Server Failure: When the file server on a network goes down, the entire network may come to a

halt, making users loose access to necessary programs and files, thereby making applications

unavailable.

Network Failure: Disconnects users from the network and causes loss of data.

Unauthorized Access: Lack of proper security on a network makes important information and files

open to hackers.

Location: Resources in a network could be located too far from users.

3.2 TYPES OF NETWORK


Computer networks can be classified according to a wide variety of characteristics. They come in

a variety of types and designs, depending on the size and needs of an organization. Organizations

of different sizes, structures and budgets need different types of networks.

Network can also be characterized using of one or more technical or operational attributes such as

type of technology or number of connected users and devices. One common attribute used to

categorize networks is geographical area or span, where a network is labeled on the basis of the

physical area it covers.

The major network types include Local Area Network (LAN) and Wide Area Network (WAN).

3.2.1 Local Area Network (LAN)

A LAN is a network with two or more computers connected to each other in a single location.

This type of networks cover areas generally associated with some or all of the space within a

building. In most cases, multiple workspace devices are connected to share devices to form a LAN.

LAN transmits data with a speed of several megabits per second. People working in LAN get more
capabilities in data processing and other information exchange compared to stand-alone

computers. Information and resources can be shared in a LAN without the network being

connected to the Internet. If a LAN comprises of computers communicating wirelessly, it is

referred to as a wireless local area network or WLAN. LANs are the most common form of

networks found in most small businesses and schools. A LAN is often created for several

computers to share an intermittently used resource such as printer. The defining characteristics of

LANs, in contrast to WANs (wide area networks), include their higher data transfer rates, smaller

geographic range, and lack of a need for leased telecommunication lines. Most LAN operates at a

data rate of 10Mbit/s and 100Mbits/s.

Below are some advantages and disadvantage of LAN:

Easy physical connection of computers in a network

Inexpensive medium of data transmission

High data transmission rate

Addition of new computers to network is easy

The entire network breaks down when the communication line fails.

Characteristics of LAN

Small network, short distance

A room, a floor, a building


Limited by numbers of computers and distance covered

Usually one kind of technology throughout the LAN

Serve a department within an organization

Types of LAN

Wired LAN

Wireless LAN

Wired Local Area Network

It is the simplest type of network in which computers are connected to each other by cables.

Wireless Local Area Network

The term wireless networking refers to technology that enables two or more computers to

communicate using standard network protocols, but without network cabling. Peer-to-peer wireless

network consists of a number of computers each equipped with a wireless networking interface

card.
3.2.2 Wide Area Networks (WANs)
These types of networks are created by linking the networks located at two or more sites over

geographical distances that extend beyond the span of a single metropolitan area. This includes

links between cities, countries and in the case of global WANs, continents. An example is a large

company with the headquarters at Abuja and regional branches in Lagos, Port Harcourt, Sokoto or

even South Africa. Here regional centers are connected to headquarters through WAN.

Transmission medium used is normally fiber cabling, microwaves and satellite links.

Telecommunication circuits link each building to facilities operated by a telecommunication

provider as MANs.

3.3 Internetwork
Two or more networks or network segments connected using devices that operate at layer 3 (the

'network' layer) of the OSI Basic Reference Model, such as a router, or any interconnection among

or between public, private, commercial, industrial, or governmental networks may also be defined

as an internetwork.

In modern practice, the interconnected networks use the Internet Protocol. There are at least three

variants of internetwork, depending on who administers and who participates in them:

Intranet

Extranet

Internet

The need to access corporate websites has created two classifications, known as intranets and

extranets. Intranets and extranets may or may not have connections to the Internet. If connected to

the Internet, the intranet or extranet is normally protected from being accessed from the Internet
without proper authorization. The Internet is not considered to be a part of the intranet or extranet,

although it may serve as a portal for access to portions of an extranet.

Intranet

An intranet is a set of interconnected networks, using IP-based tools such as web browsers and ftp

tools that are under the control of a single administrative entity, communicating with each other

internally. That administrative entity closes the intranet to the rest of the world, and allows only

specific users such as employees of the company. It uses the same Web server software that gives

the public access to Web sites over the Internet. Most commonly, an intranet is the internal

network of a company or other enterprise. A large intranet will typically have its own web server

to provide users with browse able information.

Simply put, a company’s internal version of the Internet is known as intranet.

Extranet

An extranet is a network or internetwork that is limited in scope to a single organization or entity

but which also has limited connections to the networks of one or more other usually, but not

necessarily, trusted organizations or entities (e.g. a company's customers may be given access to

some part of its intranet creating in this way an extranet). An extranet is created when a company

extends its intranet out to selected business partners or customers. Technically, an extranet may

also be categorized as a CAN, MAN, WAN, or other type of network, although, by definition, an

extranet cannot consist of a single LAN; it must have at least one connection with an external

network.

Internet
A specific internetwork, consisting of a worldwide interconnection of governmental, academic,

public, and private networks based upon the Advanced Research Projects Agency Network

(ARPANET) developed by DARPA of the U.S. Department of Defense – also home to the World

Wide Web (WWW) and referred to as the 'Internet' with a capital 'I' to distinguish it from other

generic internetworks.

In order to make information available to everyone in the world, Internet –type application is used.

An Internet-type application uses Internet protocols such as HTTP, FTP or SMTP and is available

to persons anywhere on the Internet.

3.3.1 Key difference between Internet and Ethernet


ETHERNET is a local area network (LAN) used to connect computers near one another i.e. it

connects computers in a local location. It is a group of technologies that allows computers to

transmit data between each other. The computers connected over the Ethernet are usually within

the same building or within close proximity of each other. It is usually safe compared to internet as

it is closed network i.e people from the outside have limited or not access to the network.

WHILE

INTERNET is a massive wide area network (WAN) that computers far away can connect to in

order to access information. Internet is what we use to access web pages, send e-mails, listening to

music or watch videos online. It hosts an intensive range of information, one that we generally take

for granted today. Internet has open access i.e everyone can access the data and information online;

it opens a way for people to hack your computer.


3.4 DEVICES AND TOOLS WE USED IN NETWORKING

3.4.1 ROUTER
A router is an Intermediate System (IS) which operates at the network layer of the OSI reference

model. Routers may be used to connect two or more IP networks, or an IP network to an internet

connection.

Router

Functions of a router

It is used for part selection and packet switching

It breaks broadcast and collision domain

It also provides packet filtering by using access list

It is used for WAN connectivity/internet

3.4.2 SWITCH

This is a layer 2 device and is a multi-port bridge. The switch is a networking device that breaks up

collision domain and multiplex a single IP in a given network.


Switch

Functions of a switch

It is used for LAN connectivity.

It breaks collision domain.

It filters frame based on MAC (medium access control) address.

3.4.3 CRIMPING TOOL

This is the major tool with which cables can be trimmed, terminated or cut. It comes in so many

forms depending on the manufacturer and use. Some are used for terminating Cat5 and Cat6 cables

while some are suited for terminating coaxial cables.

RJ45/RJ11 crimping tool


3.4.4 EIGHT PIN MODULAR CONNECTOR
This serves as the connection adapter for the Cat5/Cat6 and provides a means with which
Cat5/cat6 cables can be made use of. It is also known as the RJ45 connector

Modular connector

3.4.5 MODULAR JACK


The modular jack comes handy when setting up corporate network. It is often used in conjunction
with the phase plate to terminate a horizontal cable to the user workplace. Horizontal cable is that
cable (cat5/Cat6) that runs from the equipment room to the user work area.

Cat5/Cat6 Modular jack


3.4.6 CABLE TESTER
After terminating a cable, it may be necessary to verify the workability of the cable. In this case,
the cable tester becomes very useful. It is used in testing end to end continuity of every wire

in the Cat5/Cat6 cables ensuring that each pin on the modular connector is well connected to the
wire stands.

3.5 TERMINATION OF CABLE


This is the process of arranging colored wire pairs in a twisted pair cable (in such a way that it

suits a particular configuration) before using the crimping tool to consolidate the whole

arrangement into a cable connector.

The twisted pair cable has eight wires of different colors namely: orange, striped white and orange,

green, striped white and blue, blue, striped white and green, brown, striped white and brown

numbered 1-8 respectively (standard arrangement). The configuration found in Ethernet

networking cables are: Roll-over cable, straight through cable, and Cross–over cable.
3.5.1 Straight through cable: In this cable configuration, the same arrangement is maintained at

the receiver and transmitter ends i.e. positions 1-8 of the transmitter end is connected to positions

1-8 of the receiving end. They are used to connect dissimilar devices like switch to host, router to

switch, hub to host e.t.c

Transmitting end Receiving end

Orange(1) Orange(1)

White and orange(2) White and orange(2)

Green(3) Green(3)

White and blue(4) White and blue(4)

Blue(5) Blue(5)

White and green(6) White and green(6)

Brown(7) Brown(7)

White and brown(8) White and brown(8)

Straight through cable

Usage: A straight cable is usefully when connecting

A computer to a hub or switch

A router to a switch or hub

Whichever scheme you use, T568A or T568B, you must also use the same scheme for your

modular jack patch panels and throughout your installation. Consistency is the key to successful

installation.
3.5.2 The Crossover Cables
A crossover cable is one of the most common cables used during and after installation. It can be

terminated using the following color-code.

Side One Pins Wire Color Side Two Pins

1 White/green 8

2 Green 7

3 White/orange 6

4 Blue 5

5 White/blue 4

6 Orange 3

7 White/brown 2

8 Brown 1

Usage: A cross cable is usefully when connecting

A switch to switch

A hub to hub

A computer to computer

A hub to a switch

3.5.3 PROCESS OF TERMINATING CABLE


Step 1: determine the type of termination and get all the tools needed ready.
Step 2: remove only as much of the sheath as necessary to terminate the cable pairs and

ensure that the twist of the pairs is maintained.

Step 3: Arrange it in order according to the color code the determined type of termination.

Now you are ready to fix the arranged pins to a connector.

Step 4: When termination onto connector, such as RJ-45, you simply feed the twisted pair

wires into the connector while keeping each wire parallel to the next avoiding overlap. Using a

crimping tool with the proper crimp die, you simply squeeze the handle unit you have made a

secure crimp.
CHAPTER 4
4.1 COMPUTER BASED TEST (CBT)
Computer-based test is a simple and better way to offer a test or examination; it allows
testing center to offer a more consistent test delivery, faster scoring, reporting and enhances test
security.

Testing is done in person on a computer at a programmed batch time. Testing center can
use desktop computer or laptop computers as long as maximum required are met.

Computer based testing is the standard for many other test delivery programs and as
technology continues to advance, it is also becoming the standard format of the key assessment
programs (test and examination)

It can be offered anywhere that has internet access, computers and a security package.

4.1.1 Classification of computer based testing (CBT)


Offline mode: with this mode, computer based assessment is delivered without the use of
internet thus the question banks are provided locally through a server which served client
computer in a networked system.
Online mode: in this mode, computer based assessment is delivered with the use of
internet. The end users are being served with questions from a remote server. The full
administration and management is done at the remote server. Example of an online mode
CBT is OAU CBT (http://cbt.oau.edu.ng)
4.1.2 Impact of computer based testing in institution
Significant cost reduction
Reduce price in logistics and transportation of papers and charges for securing examination papers.

Secure examination
No question leak or any forms of partial treatment as question are randomly selected irrespective
of race on relationship or social status.

Impartial marking and grading of examination


Record keeping
Time management
It increases report delivery time as most examination software provides instantaneous result print-
out.

It reduces the time of conducting an examination.


CHAPTER 5
SUMMARY, CONCLUSION AND RECOMMENDATION

5.0 Summary of my SIWES in OAU ICT.


I started my Industrial Training in the Network unit where I was introduced to various tools
and devices used in networking. I later moved to the programming unit and was taught various
programming languages.

I later proceeded to the CBT unit (non administrative) of OAU ICT Center, where I
organized above one hundred laptops in a different halls which are to be used for CBT test and
examination by connecting it to the examination uniform resource locator (URL) and make sure it
is ready for usage before the examination start time on daily bases. I was also in charge of
biometric caption verification of students in the same examination halls and attended to all
problems that student may encounter during the examination.
5.1 CONCLUSION
This SIWES programme has been a source of great exposure to activities that take place in
the real world. It gave me a big opportunity to have a great deal of practical experience as regards
my field of study in its real sense i.e. real life application of my field of study. It has also helped
me realize how and where my field of study is applied. During this training, I have been able to get
a good knowledge of networking, project implementation, survey of companies for project
implementation, support (for projects or installations and configurations in different
establishment).

This training has helped to psychologically prepare me for work situation to be met after
graduation. It has also helped me to focus better giving me a better perspective of what aspect of
my field of study.

5.1.1 Problems I encounter during my SIWES


1. No allowance

2. Transportation challenges

3. Limited Power Supply


5.2 RECOMMENDATIONS
Having successfully undergone the SIWES programme, the following are my
recommendations

Industrial training coordinators should be provided at various aspects of Computer Science


to ensure rapid gaining of knowledge by the students.

Regular checking of student’s report should be encouraged by the coordinators to ensure


the rate of assimilation of the students.

Financial assistance should be given to the Industrial Training Students by the industries to
motivate them during the course of their training.

Considering the importance of the SIWES, and it advantages to the student, I recommend

that the duration SIWES, shouldn’t be interrupted by the institution irrespective of the

academic calendar of the institution.


REFERENCES

Todd Lammle, 2007, Cisco Certified Network Associate, vol 6, Wiley Publishing Inc. Canada

David D. Coleman, David A. WestCott, 2006, Certified Wireless Network Administrator, Wiley

Publishing Inc. Canada

OAU-ICT training manual

My SIWES training jottings and logbook

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy