Taiwo Siwes Report
Taiwo Siwes Report
Taiwo Siwes Report
TECHNICAL REPORT ON
UNDERTAKEN AT:
SOFTWIRELEX LIMITED
BY:
U22DLCS10369
i
DECLARATION
I, ALO PETER TAIWO (U22DLCS10369) hereby declare that this SIWES Report has been
carried out by me under the supervision of (state the name of the supervisor). It has not been
presented for award of any degree in any institution. All sources of information are
specifically acknowledged by means of reference.
…..………………………. ………………………
Signature Date Date
ii
CERTIFICATION
This SIWES Report by Alo Peter Taiwo (U22DLCS10369) meets the requirements governing
the award of the degree of Bachelor of Science in Computer Science and is approved for its
contribution to knowledge and literary presentation.
..................................................... …………………….
..................................................... …………………….
Mr. ]
..................................................... …………………….
iii
DEDICATION
This work is dedicated to my esteemed family members, whose unwavering support and
inspiration have been a cornerstone throughout my academic journey. May God bless each
one of them abundantly. Amen.
iv
ACKNOWLEDGEMENT
I express my profound gratitude to the Almighty God for His benevolence and guidance,
which have enabled me to successfully complete this report. I extend my sincere thanks for
His unwavering provision and support throughout my academic journey.
I would like to acknowledge with appreciation the invaluable assistance and guidance
provided by my SIWES supervisor, Dr. Sahabi Ali Yusuf. His insightful suggestions,
constructive criticism, prompt attention, and kindness significantly contributed to the
successful completion of this work. I am truly grateful for his mentorship and expertise, and I
pray that God Almighty rewards him abundantly for his contributions.
I also extend my heartfelt thanks to my beloved sister, Eke Ruth, for her unwavering support
and encouragement. Her presence has been a source of inspiration, and I am grateful for her
constant encouragement.
In conclusion, I express my gratitude to all those who have played a role, directly or
indirectly, in the realization of this report. May God bless and reward each one abundantly.
v
ABSTRACT
This report encapsulates the insights garnered during my three-month participation in the
Students' Industrial Work Experience Scheme (SIWES) at Softwirelex Limited, with a
primary focus on Computer Networking. The document comprises four chapters, commencing
with the first chapter that provides an overview of SIWES and outlines the organizational
background. Chapters two and three delve into the detailed account of the work experience
acquired. Finally, chapter four encapsulates the summary, recommendations, and conclusions
drawn from the industrial attachment.
vi
TABLE OF CONTENTS
Contents
TITLE PAGE i
DECLARATION ii
CERTIFICATION iii
DEDICATION iv
ACKNOWLEDGMENT v
ABSTRACT vi
CHAPTER ONE 1
INTRODUCTION 1
CHAPTER TWO 5
WORK EXPERIENCE 5
vii
2.0 INTRODUCTION 5
2.1 Networking 5
2.4.2 Microwave 12
2.4.3 Infrared 13
2.5.1 Router 13
2.5.2 Switch 14
2.5.3 Antenna 14
2.5.4 Connector 15
viii
2.5.6 LAN cable Tester 16
2.6.1 Layer 1 17
2.6.2 Layer 2 17
2.6.3 Layer 3 18
2.6.4 Layer 4 18
2.6.5 18
2.6.6 Layer 6 18
2.6.7 Layer 7 19
2.7 IP Addressing 19
2.8 Subnetting 20
2.8.1 Subnetting 20
ix
2.11 Troubleshooting Skills 25
CHAPTER THREE
3.0 Introduction 26
CHAPTER FOUR
4.1 Summary 28
4.2 Conclusion 28
4.3 Recommendation 28
REFERENCE 29
x
CHAPTER ONE
INTRODUCTION
SIWES, initiated by ITF in 1973, aims to address the issue of Nigerian graduates lacking
practical skills essential for employment in industries. The program exposes tertiary institution
students to industry-specific skills, facilitating a smoother transition from academia to the
professional world. It provides hands-on experience with machinery and equipment not
readily available in educational institutions.
SIWES, established in 1971 by decree 47, aims to encourage skill acquisition in both private
and public industries. Its importance in the education system is significant, fostering students'
skill development and professionalism in their respective fields. The scheme helps students
grasp the fundamental concepts related to their studies, bridging the gap between theory and
practical application by providing real industrial work experience.
1
In collaboration with university authorities and the industrial sector, SIWES runs for 24 weeks
during the fourth academic year for university students. The Federal Government organizes
the scheme, with joint coordination by the Industrial Training Fund (ITF) and the Nigeria
Universities Commission (NUC). The training scheme serves as a research field, allowing
students to gain in-depth insights into the working culture, practices, and tools specific to their
areas of specialization.
Facilitating the acquisition of industrial skills and experience in their respective fields
of study for students in Nigerian Universities.
Preparing students for the practical challenges they are likely to encounter in the
workplace upon graduation.
Exposing students to various work methods and techniques, especially those related to
handling equipment and machinery not readily available in academic institutions.
Facilitating a smooth transition from university education to the professional world,
enhancing students' networking opportunities for future job placements.
Providing students with the chance to apply their theoretical knowledge gained in
school to real-life work situations, thereby bridging the gap between academic theory
and practical application.
Encouraging and strengthening employers' involvement in the overall education
process, preparing university undergraduates for employment in the industry.
Offering students the opportunity to apply their theoretical knowledge in actual work
scenarios, further narrowing the gap between university coursework and real-world
practices.
Serving as a platform for self-actualization, enabling students to make positive and
commendable contributions within the scope of their knowledge
2
1.4 History of the Organization (Softwirelex Limited)
II. To create employment opportunities that not only sustains our workers and their families
but also empower them to make a meaningful impact in the networking domain.
3
Contributing to the technological and economic empowerment of learners in the
networking domain
The Chief Executive Officer (CEO) serves as the leader, steering the overall direction and
vision of the IT firm. The Chief Technology Officer (CTO) oversees technological
development and strategy, ensuring alignment with organizational goals. The IT Manager is
responsible for the day-to-day operations, including software development oversight. The
Sales and Marketing Manager plays a crucial role in business development, crafting marketing
strategies, managing client relationships, and driving sales initiatives. Together, this
hierarchical structure ensures effective leadership, technological advancement, operational
efficiency, and sustained business growth for the IT firm.
4
CHAPTER TWO
WORK EXPERIENCE
2.0 Introduction
2.1 Networking
A network must be able to meet a certain number of criteria. The most important of these are
performance, reliability, and security. Performance; can be measured in many ways, including
transit time and response time. Transit time is the amount of time required for a message to
5
travel from one device to another. In addition to accuracy of delivery, network reliability is
measured by the frequency of failure, the time it takes a link to recover from a failure, and the
network's robustness in a catastrophe. Also, Network security issues include protecting data
from unauthorized access, protecting data from damage and development, and implementing
policies and procedures for recovery from breaches and data losses. This will in turn give rise
to the physical structures and some network attributes as shown in the figure below
Various topologies are common in networking, including mesh topology, star topology, bus
topology, ring topology, and others. Network topology refers to the arrangement of the
transmission medium and devices on a network, utilizing either a point-to-point or multipoint
connection scheme.
6
Connection schemes determine how devices are linked to a transmission media segment or
individual cable. Examples of point-to-point connection schemes include a modem/printer
connected to a computer or a direct cable connection between two computers. A multipoint
connection scheme is exemplified by a star or bus topology network.
A star network, star topology is one of the most common network setups. In this
configuration, every node connects to a central network device, like a hub, switch, or
computer. The central network device acts as a server and the peripheral devices act as clients.
Depending on the type of network card used in each computer of the star topology, a coaxial
cable or a RJ-45 network cable is used to connect computers together.
I. Centralized management of the network, through the use of the central computer, hub,
or switch.
II. Easy to add another computer to the network.
III. If one computer on the network fails, the rest of the network continues to function
normally.
IV. The star topology is used in local-area networks (LANs), High-speed LANs often use
a star topology with a central hub.
In this LAN topology, each node connects to a single main bus cable, transmitting data to all
nodes on the network. Any break or fault in the cable segment disrupts communication for all
computers on that segment.
I. It can be difficult to identify the problems if the whole network goes down.
II. It can be hard to troubleshoot individual device issues.
III. Bus topology is not great for large networks.
IV. Terminators are required for both ends of the main cable.
V. Additional devices slow the network down.
8
VI. If a main cable is damaged, the network fails or splits into two.
This network topology features every node connected to every other node through separate
wires. It provides each device with a point-to-point connection to every other device, offering
high fault tolerance as the failure of one node doesn't impact data transmission between others.
The SOFTWIRELEX LIMITED adopts mesh topology.
I. Can handle high amounts of traffic, because multiple devices can transmit data
simultaneously.
II. A failure of one device does not cause a break in the network or transmission of data.
III. Adding additional devices does not disrupt data transmission between other devices.
I. The cost to implement is higher than other network topologies, making it a less
desirable option.
II. Building and maintaining the topology is difficult and time consuming.
III. The chance of redundant connections is high, which adds to the high costs and
potential for reduced efficiency.
These are those that provide a medium from one device to another, include twisted-
pair cable, coaxial cable, and fiber-optic cable.
These consists of two conductors (normally copper), each with its own plastic insulation,
twisted together. One of the wires is used to carry signals to the receiver, and the other is
used only as a ground reference.
10
This carries signals of higher frequency ranges than those in twisted pair cable. coax has a
central core conductor of solid or stranded wire (usually copper) enclosed in an insulating
sheath, which is, in turn, encased in an outer conductor of metal foil, braid, or a
combination of the two.
A fiber-optic cable is made of glass or plastic and transmits signals in the form of light.
Light travels in a straight line as long as it is moving through a single uniform substance.
11
Unguided media transport electromagnetic waves without using a physical conductor. This
type of communication is often referred to as wireless communication. Radio Waves
microwaves and Infrared.
Electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are normally called
radio waves. Radio waves are Omni directional. When an antenna transmits radio waves, they
are propagated in all directions. This means that the sending and receiving antennas do not
have to be aligned. A sending antenna sends waves that can be received by any receiving
antenna. The Omni directional property has a disadvantage, too. The radio waves transmit
ed by one antenna are susceptible to interference by another antenna that may send
signals using the same frequency or band.
2.4.2 Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves.
Microwaves are unidirectional. The sending and receiving antennas need to be aligned. The
unidirectional property has an obvious advantage. A pair of antennas can be aligned without
interfering with another pair of aligned antennas
12
Figure 2.4.2 Unidirectional Microwave Antenna
2.4.3 Infrared
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770
nm), can be used for short-range communication. Infrared waves, having high frequencies,
cannot penetrate walls. This advantageous characteristic prevents interference between one
system and another; a shortrange communication system in one room cannot be affected by
another system in the next room. When we use our infrared remote control, we do not
interfere with the use of the remote by our neighbors. Infrared signals useless for long-range
communication. In addition, we cannot use infrared waves outside a building because the sun's
rays contain infrared waves that can interfere with the communication.
Various network equipment’s includes router, switch, Antenna, crimping tool, LAN tester and
connectors. The below are been discussed.
2.5.1 Router
A router is a device that directs data packets between computer networks, creating an overlay
internetwork. It connects to two or more data lines from different networks, determining the
ultimate destination of a data packet based on address information and routing policies.
13
Figure 2.5.1 Router
2.5.2 Switch
A network switch is a device that connects network segments or devices, primarily serving for
extension.
2.5.3 Antenna
An antenna enhances signal strength and quality and is typically attached to other devices.
Antennas come in two types: Directional beams signal in one direction, while Omni-
directional beams signal in all directions.
14
Figure 2.5.3 Antenna
2.5.4 Connectors
The RJ-45 plug is a common 8P8C modular connector for pinning down wires in a twisted
pair cable.
A tool used to terminate category cables (CAT1-CAT6) with an RJ-45 connector and cut
cables to a desired length.
15
2.5.6 LAN Cable Tester
This tool is used to check if a category cable has been properly terminated or has developed a
fault.
The OSI Model, which stands for Open Systems Interconnect model, outlines the essential
functions necessary for the effective operation of the Internet. The OSI model was created as a
set of seven layers, or levels, each of which houses different protocols within one of several
protocol suites, the most common of which is TCP/IP. The OSI model categorizes how
TCP/IP transactions occur. It is invaluable when it comes to installing, configuring,
maintaining, and, especially, troubleshooting networks
16
Sometimes, a protocol suite such as TCP/IP is referred to as a protocol stack. The OSI model
shows how a protocol stack works on different levels of transmission (that is, how it stacks up
against the model). Because it is the most tangible, let’s start with the Physical layer. Later,
when you view the model, it will be from the seventh layer on top to the first layer on bottom.
As mentioned previously, a LAN requires computers with network adapters. These must be
connected in some way to facilitate the transfer of data. It is important to define how they are
connected, as well as how they transmit the data. The OSI model layers do just that. The
following list gives a brief description of each of the layers:
2.6.1 Layer 1
Physical layer: This is the physical and electrical medium for data transfer. It includes but is
not limited to cables, jacks, patch panels, punch blocks, hubs, and multi station access units
(MAUs). It is also known as the physical plant. Concepts related to the Physical layer include
topologies, analog versus digital/encoding, bit synchronization, baseband versus broadband,
multiplexing, and serial (5-volt logic) data transfer. If you can touch it, it is part of the
Physical layer, making this layer one of the easiest to understand. The unit of measurement
used on this layer is bits.
2.6.2 Layer 2
Data Link layer: This layer establishes, maintains, and decides how transfer is accomplished
over the Physical layer. Devices that exist on the DLL are network interface cards and bridges.
This layer also ensures error-free transmission over the Physical layer under LAN
transmissions. It does this through the use of physical addresses (the hexadecimal address that
is burned into the ROM of the NIC), otherwise known as the MAC address (to be discussed
more later in this lesson). Just about any device that makes a physical connection to the
network and can move data is on the Data Link layer. The unit of measurement used on this
layer is frames.
17
2.6.3 Layer 3
Network Layer: The Network layer is dedicated to routing and switching information between
different networks, LANs, or internetworks. This can be on the LAN or WAN (wide area
network). Devices that exist on the Network layer are routers and IP switches. Now we are
getting into the logical addressing of hosts. Instead of physical addresses, the addressing
system of the computer is stored in the operating system—for example, IP addresses
2.6.4 Layer 4
Transport layer: This layer ensures error-free transmission between hosts through logical
addressing. Therefore, it manages the transmission of messages through Layers 1 through 3.
The protocols that are categorized by this layer break up messages, send them through the
subnet, and ensure correct reassembly at the receiving end, making sure there are no
duplicates or lost messages. This layer contains both connection-oriented and connectionless
systems, which are covered later in this lesson, in the Defining the Transport Layer section.
Inbound and outbound ports are controlled by this layer. When you think ports, think the
Transport layer. The unit of measurement used on this layer is sometimes referred to as
segments, or messages. All layers above this use the terms data and messages.
2.6.5 Layer 5
Session layer: This layer governs the establishment, termination, and synchronization of
sessions within the OS over the network and between hosts—for example, when you log on
and log off. It is the layer that controls the name and address database for the OS or NOS.
NetBIOS (Network Basic Input/output System) works on this layer.
2.6.6 Layer 6
Presentation layer: This layer translates the data format from sender to receiver in the various
operating systems that may be used. Concepts include code conversion, data compression, and
file encryption. Redirectors work on this layer, for example, mapped network drives that
enable a computer to access file shares on a remote computer.
18
2.6.7 Layer 7
Application layer: This is where messaging creation—and, therefore, packet creation begins.
DB access is on this level. End-user protocols, such as FTP, SMTP, Telnet, and RAS, work at
this layer. For example, suppose you are using Outlook Express. You type a message and
click Send. This initiates SMTP (Simple Mail Transfer Protocol) and other protocols, which
send the mail message down through the other layers, breaking it down into packets at the
Network layer and so on. This layer is not the application itself, but the protocols that are
initiated by this layer.
2.7 IP ADDRESSING
19
2.7.3 Broadcast Address:
This address is used to send data to all hosts on a broadcast domain. When all host bits are set
to '1,' it becomes a broadcast address, with 255 reserved for sending broadcast messages.
2.8 Subnetting
Subnetting defines class boundaries by taking bits from the host portion of the IP address to
reserve them for defining the subnet address.
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
In the realm of network architecture, two prevalent terms are "client-server" and "peer-to-
peer." While both types of networks facilitate the connection of computers for resource
sharing, such as data files and applications, they operate distinctively. Continue reading to
delve into their unique features and differences.
20
2.9.1 What is Client-Server Network?
In a client–server network, there is at least one dedicated central server that controls the
network, and a number of clients connect to the server to carry out specific tasks. A client-
server network can have more than one central server, each performing a specific function.
Functions may include user access, data storage, internet connection management, and
network traffic monitoring, among others.
This network architecture facilitates efficient communication and resource sharing between
the central server and connected clients, enabling seamless task execution and data access
across various devices.
21
2.9.2 Benefits of a Client-Server Network
The following list shows the key benefits of using a client-server network:
Centralized Management:
Scalability
Enhanced Security
Peer to Peer networks, also called workgroups were the first type of network to be used. In
this type of network there is no centralized management or security, and each computer is in
charge of its own local users and file and folder permissions. Since there is no centralized user
management, any user who wants access to resources on another computer will need to have
an account on that specific computer. So, if a user wants access to files on 10 different
computers then that user will need 10 separate user accounts.
22
Figure 2.10 Peer to Peer network work group
So, if Alo Peter is a user on Computer A and he wants to access files on Laptop A and
Computer C then an admin on Laptop A and Computer C will need to make a user account for
her and then assign the permissions she needs to be able to access those resources. You can
imagine how complicated this would get as the number of computers on the network grows.
When the number of computers in a peer to peer network starts to go past 10 then you can run
into problems such as slowdowns from network broadcasts and other traffic because all the
traffic goes to each computer even though only the computer that it was meant to go to will
accept the information. Plus many workgroup configured operating systems can only accept
10 concurrent connections at a time. So if you have a computer acting as a file server and 20
users then only 10 of them can connect to that file server at a time.
Peer to peer networks work fine for home networks or small office networks where there are
not a lot of users and computers to manage. But once you get to a certain limit, that is where
you need to implement something more such as a client-server network.
23
2.10.1 Benefits of a Peer to Peer Network
The following list shows the key benefits of using a peer-to-peer network:
Communications:
Network Protocols:
Network Connectivity:
Application Support:
Internet Integration
Security Considerations:.
Resource Sharing
24
2.11 TROUBLESHOOTING SKILLS
Troubleshooting involves finding and solving problems. When a client faces browsing or IP
phone call issues, the troubleshooting process includes checking the LAN cable using a LAN-
cable tester, inspecting face plates, verifying the patched panel and switches on the
distribution rack, and pinging the system's Ethernet port and server.
25
CHAPTER THREE
3.0 Introduction:
During my three-month Industrial Training (IT) experience, I immersed myself in the intricate
world of networking, where I not only garnered theoretical knowledge but also acquired
invaluable hands-on experience in configuring, troubleshooting, and optimizing network
infrastructures. This report encapsulates my journey and highlights how the knowledge and
skills acquired during my SIWES experience can be applied in real-world networking
scenarios.
26
3.2 Troubleshooting Connectivity Issues: With my strong troubleshooting skills, I can
swiftly diagnose and resolve connectivity issues within the network. From identifying faulty
devices to diagnosing cable issues, I implement effective solutions to restore connectivity and
minimize downtime.
27
CHAPTER FOUR
4.1 Summary
The benefits derived from this endeavor are profound; describing it as merely worthwhile
would be a significant understatement. Being granted another opportunity to delve into the
practical aspects of workplace dynamics beyond classroom teachings is an invaluable and
enriching experience.
Moreover, the exposure to practical tools, software, and hardware has fostered a deeper
comprehension of lessons taught in the classroom, paving the way for career development in
the field of networking.
4.2 Conclusion
The Student Industrial Work Experience Scheme (SIWES) plays a pivotal role in human
resource development, enabling students to acquire new skills and providing insights into the
realities of the post-graduation society. It serves as a crucial mechanism for students to adapt
and prepare for their future endeavors.
4.3 Recommendations
28
REFERENCES
Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer Networks (5th ed.). New York, NY:
Pearson Education. Retrieved from
https://www.pearson.com/us/higher-education/program/Tanenbaum-Computer-Networks-5th-
Edition/PGM103423.html
Chinedu A, (2022). History of SIWES. Mountain Top University, Ogun State. NIGERIA
Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.).
Boston, MA: Pearson Education. Retrieved from https://www.pearson.com/us/higher-
education/program/Kurose-Computer-Networking-A-Top-Down-Approach-7th-Edition/
PGM113038.html
Peterson, L. L., & Davie, B. S. (2007). Computer Networks: A Systems Approach (5th ed.).
San Francisco, CA: Morgan Kaufmann Publishers. Retrieved from
https://www.elsevier.com/books/computer-networks/peterson/978-1-55860-833-1
Stallings, W. (2013). Data and Computer Communications (10th ed.). Upper Saddle River,
NJ: Pearson Education. Retrieved from
https://www.pearson.com/us/higher-education/program/Stallings-Data-and-Computer-
Communications-10th-Edition/PGM335049.html
Comer, D. E. (2014). Computer Networks and Internets (6th ed.). Upper Saddle River, NJ:
Pearson Education. Retrieved from
https://www.pearson.com/us/higher-education/program/Comer-Computer-Networks-and-
Internets-6th-Edition/PGM335093.html
Forouzan, B. A. (2016). Data Communications and Networking (5th ed.). New York, NY:
McGraw-Hill Education. Retrieved from
https://www.mheducation.com/highered/product/data-communications-networking-
forouzan/M9780073376226.html
29
30