Siwes Report Ekere
Siwes Report Ekere
Siwes Report Ekere
ON
UNDERTAKEN AT
IBOM E-LIBRARY
AKWA IBOM.
BY
16/EG/CO/964
FACULTY OF ENGINEERING.
SUBMITTED TO
FACULTY OF ENGINEERING
16/EG/CO/964
FACULTY OF ENGINEERING
I dedicate this report to my amazing parents, Mr. & Mrs. Usenekong Eyibio Akpan for the love,
I wish to register my profound gratitude to God almighty for the guidance and grace
throughout my life.
I’m grateful to the entire Staff of Ibom E-library, IBB way, Akwa Ibom state for making
My special gratitude goes to my amazing parents, Pst. Barr and Mrs.Usenekong Eyibio
Akpan, who financially supported my educational pursuit, I say, remain blessed by God
Cover Page i
Title Page ii
Dedication iii
Acknowledgements iv
Abstract v
3.5 IP addresses
included as part of the minimum academic standard in Nigerian Tertiary institutions. The SIWES
programme is designed to expose and prepare students of universities and other tertiary
institutions for the Industrial work situation they are likely to meet after graduation. It is also a
planned and structured programme based on stated and specific career objectives which are
SIWES programme is a compulsory graduation requirement for all Nigerian university students
offering certain courses. The scheme also affords students the opportunity of familiarizing and
exposing themselves to the needed experience in handling equipment and machinery that are
This training program offered to me by the Ibom E-Llibrary has spearheaded my understanding of
aforementioned field.
The training programme at the Ibom E-Library which lasted from March to August has gotten me
exposed to a versatile knowledge field and possibilities of work acquisition in the field.
CHAPTER ONE; ABOUT INDUSTRIAL TRAINING FUND (I.T.F.)
HISTORY OF SIWES
In the earlier stage of science and technology education in Nigeria, students were graduating
from their respective institution without any technical knowledge or working experience. It was
in this view that students undergoing science and technology related courses were mandated for
students in different institution in the view of widening their horizons so as to enable them have
technical knowledge or working experience before graduating from their various institutions.
SIWES was established by ITF (Industrial Training Fund) in the year 1973 to solve the problem
of lack of adequate proper skills for employment of tertiary institution graduates by Nigerian
Industries. The Students’ Industrial Work Experience Scheme (SIWES) was founded to be a skill
training programme to help expose and prepare students of universities, polytechnics and
colleges of education for the industrial work situation to be met after graduation.
OBJECTIVES OF SIWES
1. Bridging the gap between theory and practice by providing a platform to apply knowledge
2. Introduce students to real work atmosphere so that they know what they would most
3. Provide an avenue for students to acquire industrial skills for experience during their
course of study.
4. Expose students to work methods and techniques that may not be available during their
course of study.
ROLES OF THE FEDERAL GOVERNMENT
Federal Government being the major party in the establishment off SIWES; has ever since been
1. To make it mandatory for all ministries, companies and parastatals to offer places of
amended in 1990.
2. To provide necessary and adequate funds to ITF through the Federal ministries of
industries.
Vision:
We are an e-learning/research facility aimed at offering the best of resources to aid with
Mission:
Core Values
Innovative: We are committed to innovative new ways of exposing our teeming clients to a vast
Consistent: We are tirelessly consistent and dedicated to our mission. We are not known to ever
give up.
Technical/network Unit
Electrical Unit
Library Unit
Accounts Unit
FIELDWORK:
Practical’s having been the beam light of the company were always frequently carried out as
NETWORKING FUNDAMENTALS
A network is a group of two or more computer systems or other devices that are linked together
to exchange data. Networks share resources, exchange files and electronic communications. For
example, networked computers can share files or multiple computers on the network can share
the same printer. The importance of networking can be seen clearly in terms of security,
wide range. Basically, network consists of hardware component such as computer, hubs,
switches, routers and other devices which form the network infrastructure. These are the devices
that play an important role in data transfer from one place to another using different technology
such as radio waves and wires. There are many types of network available in the networking
industries and the most common network are Local Area Network (LAN) and Wide Area
Network (WAN). LAN network is made up of two or more computers connected together in a
short distance usually at home, office buildings or school. WAN is a network that covers wider
area than LAN and usually covers cities, countries and the whole world. Networking facilitates
everything from telephone calls to text messaging to streaming video to the internet of things
(IOT).
NETWORKING BASICS
Computer networking is a global field which has applications in all facets of life, from schools to
banks, hospitals, institutions, government organizations and so on. As such, every individual is
• Networking types such as LAN, WAN and PAN which are just the different types of networks
•Networking topologies: How the nodes on a network communicate with each other can be very
Most Home and small office networks use a physical bus topology.
•Servers:
Servers are computers that hold shared programs, files, and the network operating system.
Servers allow access to network resources to all the users of the network.
•Clients:
Clients are computer devices which access and uses the network as well as shares network
resources. They are also users of the network, as they can send and receive requests from the
server.
A computer network is built up from several components. These components together make it
possible to transfer data from one device to another and makes smooth communication between
two different devices. We will discuss the main components of a computer network.
Server: Servers are computers that runs operating system and hold data that can be shared over a
computer network.
Client: A client is a computer that is connected to other computers in the network and can
Transmission Media: All computers in a computer network are connected with each other
through a transmission media such as wires, optical fibre cables, coaxial cables etc.
Network Interface card: Each system or computer in a computer network must have a card
called network interface card (NIC). The main purpose of NIC is to format the data, send the
Hub: Hub acts as a device that connects all the computer in a network to each other. Any request
that comes from a client computer first received by Hub and then hub transmit this request over a
Switch: Switch is similar to hub however instead of broadcasting a incoming data request it uses
the physical device address in the incoming request to transfer the request to correct server
computer.
Router: Router joins multiple computer networks to each other. For example let’s say a
company runs 100 computers over a local area network (LAN) and another company runs
another LAN of 150 computers. These LANs can be connected with each other through an
Bridges
This bridge is a device that has such functionality that it filters the content, for which it reads
MAC addresses of both source and destination. The bridge connects two LANs (Local Area
Network) using the same protocol. This device operates in the data link layer of the OSI Model.
Gateway
This gateway is a hardware device that acts as a “gate” within two networks. It can also be a
router, firewall, server, or any other device that enables traffic to flow in and out of the network.
Gateways are used to connect networks based on different protocols. As a bridge is used to join
two similar types of networks, similarly, the gateway is used to join two dissimilar networks
NIC (Network Interface cards): Network Interface cards (NICs) are also called Network
Interface Controller, Network adapter, LAN adapter, and Physical Network interface. NIC cards
are hardware components used to connect computers with networks. Without NIC a computer
It is installed in a computer circuit board that provides a network connection to the computer.
Due to the popularity and low cost of Ethernet standards, the network interface is built directly
Types of NIC:
In internal network cards, the motherboard has a slot for the network card where it can be
inserted. It requires a network cable to provide network access. There are two types of internal
network cards. The first type uses Peripheral Component Interconnect (PCI) connections, while
The external NIC is used by desktops and laptops because they do not have an internal NIC.
External network cards are of two types: wireless and USB based. Wireless network cards are
required to be inserted into the motherboard. The USB based used to connect to a laptop when
Computer networks connect nodes like computers, routers, and switches using cables, fiber
optics, or wireless signals. These connections allow devices in a network to communicate and
Networks follow protocols, which define how communications are sent and received. These
protocols allow devices to communicate. Each device on a network uses an Internet Protocol or
IP address, a string of numbers that uniquely identifies a device and allows other devices to
recognize it.
Routers are virtual or physical devices that facilitate communications between different
networks. Routers analyse information to determine the best way for data to reach its ultimate
network, ensuring that bundles of information traveling across the network reach their ultimate
destination.
Computer networking has made the sharing of resources and files easier, but just as such, there is
a wide range of disadvantages to employing it in our day-to-day activities. The advantages and
ADVANTAGES
1. Data Storage
Al the data of the respective organization will be stored in a remote server that can be accessed in
any given time. Each and every employee within an organization will be able to access them.
And many computers are interconnected through a central server there is an increase in capacity.
If in case one of the employees happens to loose data, there won't be any problem in retrieval
since all the information are already stored inside the central server.
2. Connecting Computers
A single network can be used to connect limited number of computers interconnecting with each
other. Hence, all the computers do not need to have an ISP account, they can be functioned under
And depending on the location of workplace the type of network that needs to be deployed
changes. If the employees of an organization happen to work within it, a local Area
Network (LAN) will be sufficient. Others who work from far sites, needs to be connected using
larger wide Area Network (WAN). Internet is one type of network which spans globally.
3. Problem Solving
Computer networking makes it possible for people all around the world to troubleshoot and solve
problems in lesser amount of time. Their services include, business, education and medical. For
an example, the business can start a blog to attract customers in various places. And all the
1. Robustness
The connected systems on a network entirely depend on the main server. If the server breaks
down, the system cannot be used anymore. The problem lies on the central server or the bridging
device the entire network will be failing. That is the reason why most of the large organizations
tend to keep their central server as a powerful computer which makes the implementation and
maintenance easy.
2. Independence
Since networks are based on the centralized server, most of the decisions are made themselves.
This hinders the freedom of user who wants to use the computer as they desire.
Moreover, computer networking includes new procedures which makes the process easy. Thus,
there are more chances where users will be relying on computers even for basic tasks that cannot
be done by hand.
CHAPTER FOUR
NETWORK CABLING
Network cables are used to connect and transfer data and information between computers,
routers, switches and storage area networks. These cables are essentially the carrier or media
There are different types of communications cables, and the appropriate type to use will depend
on the structure and topology of the overall architecture of the system. The most commonly used
types of communications cables are dominated by what is referred to as “twisted pair cable”. In
local area networks; typically office environments, retail and commercial sites, copper
communications cabling, i.e., twisted pair cable is by far the most commonly used type of cable.
Twisted pair cable is used in many Ethernet networks. Comprising of four pairs of thin wires or
conductors. This cable consists of color-coded pairs of insulated copper wires. Every two wires
are twisted around each other to form pair. Usually, there are four pairs. Each pair has one solid
color and one stripped color wire. Solid colors are blue, brown, green, and orange. In stripped
Based on how pairs are stripped in the plastic sheath, there are two types of twisted-pair cable;
In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional metal shield,
Both STP and UTP can transmit data at 10Mbps, 100Mbps, 1Gbps, and 10Gbps.
Since the STP cable contains more materials, it is more expensive than the UTP cable.
Both cables use the same RJ-45 (registered jack) modular connectors.
The STP provides more noise and EMI resistance than the UTP cable.
The maximum segment length for both cables is 100 meters or 328 feet.
Cat 1, 2, 3, 4, 5 are outdated and not used in any modern LAN network.
Fibre optic cabling is specified where high bandwidths may be needed; especially in the data
centre environment and where an installation demands high capacity, typically a hospital,
airports, banks….However, Fibre optic cabling is fast becoming the medium of choice for any
Of course, there are other types of cables, i.e., coaxial cable, multipair cable and of course, other
CRIMPING TOOLS
A crimping tool is one of the most crucial network connecting tools. In order to connect a
connector to the cable, you will need a tool to crimp or connect. Known as the crimping tool, this
tool is used to connect RJ-45, RJ-11 and other connectors to the end of a cable. Some crimping
tools have a built-in wire cutter near the handle. This wire cutter can be used to cut a phone cable
or a Cat5 cable.
While using a crimping tool, the wires that need to be crimped are first placed into the connector.
Once this is done, the jack with the wires is placed in the designated slot of the crimping tool and
the handles of the tool are squeezed tight. By doing this, you can ensure that the plastic
connector you are using punctures the wires inside and holds them all in place. This prevents the
wires from loosening and coming out. If the wires are crimped securely in place, data can be
easily transmitted by every wire. We offer several varieties of crimping tools such as the hex
crimp tool.
One of the problems with wired networks is that when they cease to work, troubleshooting may
be a little more difficult as compared to wireless networks. This is where a network cable tester
can help you. A network cable tester is a useful device that allows you to check the continuity of
the cable to figure out if the signal is strong enough to get through to the network. This helps to
It is important to remember that you should never connect a live wire circuit to a network cable
tester. It should be used only after the cable has been disconnected from the router, modem, and
a computer. Generally, a network cable tester has two parts – the tester and remote. Most testers
work with two or three connectors. In general, they will have an Ethernet RJ-45 connector,
telephone cable RJ-11 connectors and one BNC for the coaxial cable.
The remote has connectors for Ethernet and telephone cable. Using a network cable tester is a
simple affair. All you have to do is connect the cable to the right port on the tester and connect
the remote to the other end. Once you run the network cable tester, you will be able to figure out
if the network problem lies in the connectivity. If it doesn’t, you will have ruled it out and can
continue troubleshooting.
The coaxial cable is the cable that includes the outer metal that does the conducting. A central
conducting core ensures that the metal is insulated. High frequency signals are transmitted
through this coaxial cable line. A coaxial compression tool is a useful device that uses connectors
to properly compress the coaxial cable. The side of the cable wire will enable you to know which
You will need to use a connector that is the right fit with the cable wire. Using the male and
female F-style and N-type connectors you will be able to connect the coaxial wire. Once the
connector is attached, it is a simple matter to use the compression tool and compress the coaxial
The punch down tool is also known as the Krone tool. It is small tool that is used most frequently
by network troubleshooting technicians. The basic purpose of a punch down tool is to insert
wires into various devices like pinch down blocks, patch panels, surface mount boxes, and more
The impact type of punch down tool is the most popular and commonly used one. The impact
punch down tool consists of a slot for inserting removable blades, an internal spring impact
mechanism and a handle to hold the tool. Other than just inserting the wire, a punch down tool
can also be used to cut off the excess wire. Some punch down tools come with a fixed blade and
may even lack an impact mechanism. Ensure that you are acquiring the right type of punch down
tool to suit your needs. If you need it for a large number of connections, an impact mechanism
can make life much simpler and stave off muscle fatigue.
Known by many names, a network rack is a metal frame chassis that holds, stacks, organizes,
secures and protects various computer network and server hardware devices. The term “network”
Some network racks hold servers and other computer systems, although some are designed with
specific device types in mind. The rack works by securing technology with brackets, bolts, and
other rack hardware to keep this equipment in place. You can also mount this equipment using
certain types of rails and shelves, such as switch rails and switch shelves.
A wireless network allows devices to remain linked to the network yet to roam without any
cables unattached. Wi-Fi signals are amplified by access points, meaning a computer can be far
from a router but still be linked to the network. You connect to that organization’s wireless
network when you connect to a Wi-Fi hotspot at a cafe or another public location.
Similar to how Wi-Fi standards are upgraded to fill in gaps, the security algorithms are upgraded
WEP- Short for Wired Equivalent Privacy, this method was developed in 1999. It only protects
wireless networks from the average user which makes your network vulnerable to hackers.
WPA- Short for Wi-Fi Protected Access, this method improved on WEP, making it a little bit
better. However, it didn't take long for hackers to bypass the updated security features.
WPA2- This method was based on the Advanced Encryption Standard technology (AES). AES is
approved by the United States government for encrypting the information classified as top secret.
If it protects the government, it must be good to protect your wireless home networks. It provides
WPA3- The current form of network security introduced in 2019. It provides more protection for
the Wi-Fi clients connected to private and public networks. In addition, it makes it harder for
Routers allow devices in your local area network (LAN) – a network of computer networks
within a small area, such as a home, small office, school, and business – to communicate with
each other and the internet. They manage all of the incoming and outgoing information and
router to the modem. One end of the cable plugs into the WAN or Internet port on the router, and
the other end plugs into the Ethernet or LAN port on the modem.
The Wi-Fi range offered by the Wi-Fi standards are theoretical; they are based on perfect
conditions. In the real world, the range can be affected by building material, walls, and furniture.
Therefore, oftentimes, the range of the router is not enough to cover a building. As a result, you
Gadgets like range extenders, mesh networks, and long-range antennas can help extend the range
of your Wi-Fi connection. Both have the option of being wired or wireless.
Range extenders wirelessly connect to your router to access the internet. Once the connection has
been established, it's recommended to place the extender close enough to the router for a reliable
signal, but far enough away to where it can still reach the problem areas. The extender repeats
the signal it’s receiving from the router. To do so, it creates its own network; it’s almost like
having two routers in a building. The extender will have its own network name and password.
When you’re walking around your home you will manually have to switch to the networks you
NETWORKING ADRESSES
WHAT IS AN IP ADDRESS?
An IP address (internet protocol address) is a numerical representation that uniquely identifies a
Addresses in IPv4 are 32-bits long. This allows for a maximum of 4,294,967,296 (232) unique
addresses. Addresses in IPv6 are 128-bits, which allows for 3.4 x 1038 (2128) unique addresses.
The total usable address pool of both versions is reduced by various reserved addresses and other
considerations.
IP addresses are binary numbers but are typically expressed in decimal form (IPv4) or
hexadecimal form (IPv6) to make reading and using them easier for humans.
IP stands for Internet Protocol and describes a set of standards and requirements for creating and
transmitting data packets, or datagrams, across networks. The Internet Protocol (IP) is part of the
Internet layer of the Internet protocol suite. In the OSI model, IP would be considered part of the
network layer. IP is traditionally used in conjunction with a higher-level protocol, most notably
SUBNET MASKS
A single IP address identifies both a network, and a unique interface on that network. A subnet
mask can also be written in dotted decimal notation and determines where the network part of an
When expressed in binary, any bit set to one means the corresponding bit in the IP address is part
of the network address. All the bits set to zero mark the corresponding bits in the IP address as
and continue on until the network mask ends. A Class C subnet mask would be 255.255.255.0.
CHAPTER FIVE
To the Organization
Facilitation; The management of the Ibom E-library should buy more facilities and
More opportunities to students to do intern in their organization; The intern would also
they can because some miss this experience which is also important requirement of the
Allowances, the organization should give allowances to interns most especially transport
allowances to cater for transport cost, most students stay far from the internship places hence
increasing their expenses. Therefore, the intern recommends the Organization to put that in to
action in order to motivate interns and boost their productivity levels in performing their tasks
CONCLUSION
I commenced my I.T at the Ibom e-library on the 22nd of March, 2021 and concluded on the 30th
of July, 2021. The programme at the Ibom e-library offered field knowledge and experience in
the aspect of networking. On the first day, we were shown the various units and equipment’s,
tools and personnel we would be working with. The entire course of the training was a fruitful
one as it enabled us to gain experience and in field knowledge and also expand our knowledge
RECOMMENDATION
Judging from the experience and knowledge I obtained, I strongly recommend that every
Nigerian student should participate in the SIWES program because the program did not only
expose the student to different practices but also prepares the student for the ultimate working
environment and true life realities, and also becoming the Engineer we always wanted to be.
REFERENCES
The manager, HTG global services, Ibom E-library, IBB way, uyo.
Networking fundamentals,
https://www.cisco.com/c/dam/global/fi_fi/assets/docs/SMB_University_120307_Networking_Fu
ndamentals.pdf