Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Siwes Report Ekere

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 32

A TECHNICAL REPORT

ON

STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

UNDERTAKEN AT

IBOM E-LIBRARY

IBB WAY, UYO

AKWA IBOM.

BY

EYIBIO, EKEREOBONG USENEKONG

16/EG/CO/964

DEPARTMENT OF COMPUTER ENGINEERING.

FACULTY OF ENGINEERING.

SUBMITTED TO

DEPARTMENT OF COMPUTER ENGINEERING

FACULTY OF ENGINEERING

UNIVERSITY OF UYO, UYO.

IN PARTIAL FUFILMENT OF THE REQUIREMENTS

FOR THE AWARD OF BACHELOR DEGREE IN COMPUTER ENGINEERING


400 LEVEL SIWES REPORT

COURSE CODE: GRE 421

UNIVERSITY OF UYO, UYO

COMPANY ATTACHED: IBOM E-LIBRARY, IBB WAY

AKWA IBOM STATE, NIGERIA

INDUSTRY BASED SUPERVISOR: MR GABILAR MORONDO

EYIBIO, EKEREOBONG USENEKONG

16/EG/CO/964

DEPARTMENT OF COMPUTER ENGINEERING

FACULTY OF ENGINEERING

UNIVERSITY OF UYO, UYO

PERIOD OF INTERNSHIP: MARCH 2021 TO AUGUST 2021


DEDICATION

I dedicate this report to my amazing parents, Mr. & Mrs. Usenekong Eyibio Akpan for the love,

support and encouragement which has inadvertently brought me this far.


ACKNOWLEDGEMENTS

I wish to register my profound gratitude to God almighty for the guidance and grace

throughout my life.

I’m grateful to the entire Staff of Ibom E-library, IBB way, Akwa Ibom state for making

my industrial training interesting, educative and worthwhile.

My special gratitude goes to my amazing parents, Pst. Barr and Mrs.Usenekong Eyibio

Akpan, who financially supported my educational pursuit, I say, remain blessed by God

Almighty and my beloved siblings, I love you all.


TABLE OF CONTENTS

Cover Page i

Title Page ii

Dedication iii

Acknowledgements iv

Abstract v

CHAPTER ONE: ABOUT INDUSTRIAL TRAINING FUND (I.T.F)

1.1 History of SIWES

1.2 Objectives of SIWES

1.3 Roles of the Industrial Training Fund (I.T.F)

1.4 Roles of the Federal Government

CHAPTER TWO: IBOM E-LIBRARY

2.1 About the company

2.2 History and Background of the company

2.3 Company Objectives, Values and Scope of service

2.4 Organizational Structure of Company

CHAPTER THREE: MAJOR WORKS CARRIED OUT

3.1 Networking Fundamentals

3.2 Networking tools

3.3 Preparation of networking tools


3.4 Network addresses

3.5 IP addresses

CHAPTER FOUR: EXPERIENCE GANIED

CHAPTER FIVE: CONCLUSION, RECOMMENDATION AND REFERENCES


ABSTRACT

The Student Industrial Work Experience Scheme is an appreciable skill/training which is

included as part of the minimum academic standard in Nigerian Tertiary institutions. The SIWES

programme is designed to expose and prepare students of universities and other tertiary

institutions for the Industrial work situation they are likely to meet after graduation. It is also a

planned and structured programme based on stated and specific career objectives which are

geared towards developing the occupational competencies of participants. Consequently, the

SIWES programme is a compulsory graduation requirement for all Nigerian university students

offering certain courses. The scheme also affords students the opportunity of familiarizing and

exposing themselves to the needed experience in handling equipment and machinery that are

usually not available in their institutions.

This training program offered to me by the Ibom E-Llibrary has spearheaded my understanding of

networking and how it significantly relates to computer engineering, aiding me in being

acquainted in networking principles, operations and the on-field experiences in the

aforementioned field.

The training programme at the Ibom E-Library which lasted from March to August has gotten me

exposed to a versatile knowledge field and possibilities of work acquisition in the field.
CHAPTER ONE; ABOUT INDUSTRIAL TRAINING FUND (I.T.F.)

HISTORY OF SIWES

In the earlier stage of science and technology education in Nigeria, students were graduating

from their respective institution without any technical knowledge or working experience. It was

in this view that students undergoing science and technology related courses were mandated for

students in different institution in the view of widening their horizons so as to enable them have

technical knowledge or working experience before graduating from their various institutions.

SIWES was established by ITF (Industrial Training Fund) in the year 1973 to solve the problem

of lack of adequate proper skills for employment of tertiary institution graduates by Nigerian

Industries. The Students’ Industrial Work Experience Scheme (SIWES) was founded to be a skill

training programme to help expose and prepare students of universities, polytechnics and

colleges of education for the industrial work situation to be met after graduation.

OBJECTIVES OF SIWES

1. Bridging the gap between theory and practice by providing a platform to apply knowledge

learnt in school to real work situations.

2. Introduce students to real work atmosphere so that they know what they would most

likely meet once they graduate.

3. Provide an avenue for students to acquire industrial skills for experience during their

course of study.

4. Expose students to work methods and techniques that may not be available during their

course of study.
ROLES OF THE FEDERAL GOVERNMENT

Federal Government being the major party in the establishment off SIWES; has ever since been

involved in the management of SIWES. Some of the roles played are:

1. To make it mandatory for all ministries, companies and parastatals to offer places of

attachment for students in accordance with the provision decree of No 47 of 1971 as

amended in 1990.

2. To provide necessary and adequate funds to ITF through the Federal ministries of

industries.

ROLES OF ITF (INDUSTRIAL TRAINING FUND)

1. Provide logistics and materials needed to administer the scheme

2. Supervise students through it Area offices.


CHAPTER TWO

COMPANY’S PROFILE (IBOM E-LIBRARY)

Vision:

We are an e-learning/research facility aimed at offering the best of resources to aid with

educational activities, specifically online acquisition of knowledge and certifications.

Mission:

Offer a wide range of resources to help in acquisition of knowledge in varying fields.

Core Values

Innovative: We are committed to innovative new ways of exposing our teeming clients to a vast

of resources for their learning and research purposes.

Consistent: We are tirelessly consistent and dedicated to our mission. We are not known to ever

give up.

Departments in the Ibom E-library:

Human Resources Unit


ICT Unit

Technical/network Unit

Electrical Unit

Library Unit

Accounts Unit

FIELDWORK:

Practical’s having been the beam light of the company were always frequently carried out as

different projects were always been given out to expose us.


CHAPTER THREE; ACTIVITIES CARRIED OUT

NETWORKING FUNDAMENTALS

A network is a group of two or more computer systems or other devices that are linked together

to exchange data. Networks share resources, exchange files and electronic communications. For

example, networked computers can share files or multiple computers on the network can share

the same printer. The importance of networking can be seen clearly in terms of security,

efficiency, manageability and cost effectiveness as it allows collaboration between users in a

wide range. Basically, network consists of hardware component such as computer, hubs,

switches, routers and other devices which form the network infrastructure. These are the devices

that play an important role in data transfer from one place to another using different technology

such as radio waves and wires. There are many types of network available in the networking

industries and the most common network are Local Area Network (LAN) and Wide Area

Network (WAN). LAN network is made up of two or more computers connected together in a

short distance usually at home, office buildings or school. WAN is a network that covers wider

area than LAN and usually covers cities, countries and the whole world. Networking facilitates

everything from telephone calls to text messaging to streaming video to the internet of things

(IOT).
NETWORKING BASICS

Computer networking is a global field which has applications in all facets of life, from schools to

banks, hospitals, institutions, government organizations and so on. As such, every individual is

expected to be acquainted in this phenomenon as to have a clear understanding of the modern

world in which he/she dwells. Some of these phenomenon is listed as follows:

• Networking types such as LAN, WAN and PAN which are just the different types of networks

which are suited for different organizational sizes and needs.

•Networking topologies: How the nodes on a network communicate with each other can be very

different to how they are physically interconnected.

Most Home and small office networks use a physical bus topology.

Common logical typologies are Peer to Peer and Client Server

•Servers:

Servers are computers that hold shared programs, files, and the network operating system.

Servers allow access to network resources to all the users of the network.

•Clients:
Clients are computer devices which access and uses the network as well as shares network

resources. They are also users of the network, as they can send and receive requests from the

server.

COMPONENTS OF A COMPUTER NETWORK

A computer network is built up from several components. These components together make it

possible to transfer data from one device to another and makes smooth communication between

two different devices. We will discuss the main components of a computer network.
Server: Servers are computers that runs operating system and hold data that can be shared over a

computer network.

Client: A client is a computer that is connected to other computers in the network and can

receive data sent by other computers.

Transmission Media: All computers in a computer network are connected with each other

through a transmission media such as wires, optical fibre cables, coaxial cables etc.

Network Interface card: Each system or computer in a computer network must have a card

called network interface card (NIC). The main purpose of NIC is to format the data, send the

data and receive the data at the receiving node.

Hub: Hub acts as a device that connects all the computer in a network to each other. Any request

that comes from a client computer first received by Hub and then hub transmit this request over a

network so that the correct server receives and respond to it.

Switch: Switch is similar to hub however instead of broadcasting a incoming data request it uses

the physical device address in the incoming request to transfer the request to correct server

computer.

Router: Router joins multiple computer networks to each other. For example let’s say a

company runs 100 computers over a local area network (LAN) and another company runs

another LAN of 150 computers. These LANs can be connected with each other through an

internet connection which is provided by the router.


LAN cable: A wire that is used to connect more than one computers or other devices such as

printers and scanner to each other.

Bridges

This bridge is a device that has such functionality that it filters the content, for which it reads

MAC addresses of both source and destination. The bridge connects two LANs (Local Area

Network) using the same protocol. This device operates in the data link layer of the OSI Model.

Gateway

This gateway is a hardware device that acts as a “gate” within two networks. It can also be a

router, firewall, server, or any other device that enables traffic to flow in and out of the network.

Gateways are used to connect networks based on different protocols. As a bridge is used to join

two similar types of networks, similarly, the gateway is used to join two dissimilar networks

NIC (Network Interface cards): Network Interface cards (NICs) are also called Network

Interface Controller, Network adapter, LAN adapter, and Physical Network interface. NIC cards

are hardware components used to connect computers with networks. Without NIC a computer

cannot be connected to the network

It is installed in a computer circuit board that provides a network connection to the computer.

Due to the popularity and low cost of Ethernet standards, the network interface is built directly

into the motherboard in almost all new computers.

Types of NIC:

There are two types of NIC:


1. Internal Network Card (Wired NIC)

In internal network cards, the motherboard has a slot for the network card where it can be

inserted. It requires a network cable to provide network access. There are two types of internal

network cards. The first type uses Peripheral Component Interconnect (PCI) connections, while

the second type uses Industry Standard Architecture (ISA).

2. External Network Card (Wireless NIC)

The external NIC is used by desktops and laptops because they do not have an internal NIC.

External network cards are of two types: wireless and USB based. Wireless network cards are

required to be inserted into the motherboard. The USB based used to connect to a laptop when

traveling or accessing wireless signals.

HOW DO THEY WORK?

Computer networks connect nodes like computers, routers, and switches using cables, fiber

optics, or wireless signals. These connections allow devices in a network to communicate and

share information and resources.

Networks follow protocols, which define how communications are sent and received. These

protocols allow devices to communicate. Each device on a network uses an Internet Protocol or

IP address, a string of numbers that uniquely identifies a device and allows other devices to

recognize it.
Routers are virtual or physical devices that facilitate communications between different

networks. Routers analyse information to determine the best way for data to reach its ultimate

destination. Switches connect devices and manage node-to-node communication inside a

network, ensuring that bundles of information traveling across the network reach their ultimate

destination.

ADVANTAGES AND DISADVANTAGES OF COMPUTER NETWORKING

Computer networking has made the sharing of resources and files easier, but just as such, there is

a wide range of disadvantages to employing it in our day-to-day activities. The advantages and

disadvantages of using computer networking are as follows;

ADVANTAGES

1. Data Storage

Al the data of the respective organization will be stored in a remote server that can be accessed in

any given time. Each and every employee within an organization will be able to access them.

And many computers are interconnected through a central server there is an increase in capacity.

If in case one of the employees happens to loose data, there won't be any problem in retrieval

since all the information are already stored inside the central server.
2. Connecting Computers

A single network can be used to connect limited number of computers interconnecting with each

other. Hence, all the computers do not need to have an ISP account, they can be functioned under

the network with single unit.

And depending on the location of workplace the type of network that needs to be deployed

changes. If the employees of an organization happen to work within it, a local Area

Network (LAN) will be sufficient. Others who work from far sites, needs to be connected using

larger wide Area Network (WAN). Internet is one type of network which spans globally.

3. Problem Solving

Computer networking makes it possible for people all around the world to troubleshoot and solve

problems in lesser amount of time. Their services include, business, education and medical. For

an example, the business can start a blog to attract customers in various places. And all the

medical expenses can be viewed for an emergency using a computer network.


DISADVANTAGES OF COMPUTER NETWORKING

1. Robustness

The connected systems on a network entirely depend on the main server. If the server breaks

down, the system cannot be used anymore. The problem lies on the central server or the bridging

device the entire network will be failing. That is the reason why most of the large organizations

tend to keep their central server as a powerful computer which makes the implementation and

maintenance easy.

2. Independence

Since networks are based on the centralized server, most of the decisions are made themselves.

This hinders the freedom of user who wants to use the computer as they desire.

Moreover, computer networking includes new procedures which makes the process easy. Thus,

there are more chances where users will be relying on computers even for basic tasks that cannot

be done by hand.
CHAPTER FOUR

NETWORK CABLING

Network cables are used to connect and transfer data and information between computers,

routers, switches and storage area networks. These cables are essentially the carrier or media

through which data flows.

There are different types of communications cables, and the appropriate type to use will depend

on the structure and topology of the overall architecture of the system. The most commonly used

types of communications cables are dominated by what is referred to as “twisted pair cable”. In

local area networks; typically office environments, retail and commercial sites, copper

communications cabling, i.e., twisted pair cable is by far the most commonly used type of cable.

Twisted Pair Cable

Twisted pair cable is used in many Ethernet networks. Comprising of four pairs of thin wires or

conductors. This cable consists of color-coded pairs of insulated copper wires. Every two wires

are twisted around each other to form pair. Usually, there are four pairs. Each pair has one solid

color and one stripped color wire. Solid colors are blue, brown, green, and orange. In stripped

color, the solid color is mixed with the white color.

Based on how pairs are stripped in the plastic sheath, there are two types of twisted-pair cable;

UTP and STP.

In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional metal shield,

then all pairs are wrapped in a single outer plastic sheath.

Similarities and differences between STP and UTP cables

Both STP and UTP can transmit data at 10Mbps, 100Mbps, 1Gbps, and 10Gbps.

Since the STP cable contains more materials, it is more expensive than the UTP cable.

Both cables use the same RJ-45 (registered jack) modular connectors.

The STP provides more noise and EMI resistance than the UTP cable.

The maximum segment length for both cables is 100 meters or 328 feet.

Both cables can accommodate a maximum of 1024 nodes in each segment.

Cat 1, 2, 3, 4, 5 are outdated and not used in any modern LAN network.

Cat 7 is still a new technology and not commonly used.


Cat 5e, 6, 6a are the commonly used twisted-pair cables.

FIBRE OPTICS CABLE

Fibre optic cabling is specified where high bandwidths may be needed; especially in the data

centre environment and where an installation demands high capacity, typically a hospital,

airports, banks….However, Fibre optic cabling is fast becoming the medium of choice for any

installation that is sending high volumes of data!

Of course, there are other types of cables, i.e., coaxial cable, multipair cable and of course, other

types of media such as wireless, otherwise known as Wifi.

CRIMPING TOOLS

A crimping tool is one of the most crucial network connecting tools. In order to connect a

connector to the cable, you will need a tool to crimp or connect. Known as the crimping tool, this

tool is used to connect RJ-45, RJ-11 and other connectors to the end of a cable. Some crimping

tools have a built-in wire cutter near the handle. This wire cutter can be used to cut a phone cable

or a Cat5 cable.
While using a crimping tool, the wires that need to be crimped are first placed into the connector.

Once this is done, the jack with the wires is placed in the designated slot of the crimping tool and

the handles of the tool are squeezed tight. By doing this, you can ensure that the plastic

connector you are using punctures the wires inside and holds them all in place. This prevents the

wires from loosening and coming out. If the wires are crimped securely in place, data can be

easily transmitted by every wire. We offer several varieties of crimping tools such as the hex

crimp tool.

NETWORK CABLE TESTER

One of the problems with wired networks is that when they cease to work, troubleshooting may

be a little more difficult as compared to wireless networks. This is where a network cable tester

can help you. A network cable tester is a useful device that allows you to check the continuity of

the cable to figure out if the signal is strong enough to get through to the network. This helps to

eliminate cable connectivity issues while troubleshooting the problems.

It is important to remember that you should never connect a live wire circuit to a network cable

tester. It should be used only after the cable has been disconnected from the router, modem, and

a computer. Generally, a network cable tester has two parts – the tester and remote. Most testers

work with two or three connectors. In general, they will have an Ethernet RJ-45 connector,

telephone cable RJ-11 connectors and one BNC for the coaxial cable.

The remote has connectors for Ethernet and telephone cable. Using a network cable tester is a

simple affair. All you have to do is connect the cable to the right port on the tester and connect

the remote to the other end. Once you run the network cable tester, you will be able to figure out
if the network problem lies in the connectivity. If it doesn’t, you will have ruled it out and can

continue troubleshooting.

COAXIAL COMPRESSION TOOL

The coaxial cable is the cable that includes the outer metal that does the conducting. A central

conducting core ensures that the metal is insulated. High frequency signals are transmitted

through this coaxial cable line. A coaxial compression tool is a useful device that uses connectors

to properly compress the coaxial cable. The side of the cable wire will enable you to know which

type of cable it is.

You will need to use a connector that is the right fit with the cable wire. Using the male and

female F-style and N-type connectors you will be able to connect the coaxial wire. Once the

connector is attached, it is a simple matter to use the compression tool and compress the coaxial

cable by closing the level and sealing tightly.

PUNCH DOWN TOOL

The punch down tool is also known as the Krone tool. It is small tool that is used most frequently

by network troubleshooting technicians. The basic purpose of a punch down tool is to insert

wires into various devices like pinch down blocks, patch panels, surface mount boxes, and more

with the help of insulation-displacement connectors.

The impact type of punch down tool is the most popular and commonly used one. The impact

punch down tool consists of a slot for inserting removable blades, an internal spring impact

mechanism and a handle to hold the tool. Other than just inserting the wire, a punch down tool

can also be used to cut off the excess wire. Some punch down tools come with a fixed blade and
may even lack an impact mechanism. Ensure that you are acquiring the right type of punch down

tool to suit your needs. If you need it for a large number of connections, an impact mechanism

can make life much simpler and stave off muscle fatigue.

RACK AND POWER MANAGEMENT

What is a Network Rack?

Known by many names, a network rack is a metal frame chassis that holds, stacks, organizes,

secures and protects various computer network and server hardware devices. The term “network”

refers to the rack actually housing this type of hardware.

How to Set-Up a Network Rack

Some network racks hold servers and other computer systems, although some are designed with

specific device types in mind. The rack works by securing technology with brackets, bolts, and

other rack hardware to keep this equipment in place. You can also mount this equipment using

certain types of rails and shelves, such as switch rails and switch shelves.

WIRELESS FIDELITY (Wi-Fi)

A wireless network allows devices to remain linked to the network yet to roam without any

cables unattached. Wi-Fi signals are amplified by access points, meaning a computer can be far

from a router but still be linked to the network. You connect to that organization’s wireless

network when you connect to a Wi-Fi hotspot at a cafe or another public location.

Wi-Fi Security Protocols: Protect your Network


Due to Wi-Fi clients and router communicating over the air, any device can connect to your

wireless network, which creates a serious security threat.

Similar to how Wi-Fi standards are upgraded to fill in gaps, the security algorithms are upgraded

to make them more secure for the user.

There are different wireless security protocols available:

WEP- Short for Wired Equivalent Privacy, this method was developed in 1999. It only protects

wireless networks from the average user which makes your network vulnerable to hackers.

WPA- Short for Wi-Fi Protected Access, this method improved on WEP, making it a little bit

better. However, it didn't take long for hackers to bypass the updated security features.

WPA2- This method was based on the Advanced Encryption Standard technology (AES). AES is

approved by the United States government for encrypting the information classified as top secret.

If it protects the government, it must be good to protect your wireless home networks. It provides

stronger data protection and user authentication control.

WPA3- The current form of network security introduced in 2019. It provides more protection for

the Wi-Fi clients connected to private and public networks. In addition, it makes it harder for

hackers to access your network. WPA3 is the security protocol we recommend.

What Does a Router Do?

Routers allow devices in your local area network (LAN) – a network of computer networks

within a small area, such as a home, small office, school, and business – to communicate with

each other and the internet. They manage all of the incoming and outgoing information and

direct it to the correct location within your own private network.


To allow multiple devices to connect to the internet, an Ethernet cable is used to connect the

router to the modem. One end of the cable plugs into the WAN or Internet port on the router, and

the other end plugs into the Ethernet or LAN port on the modem.

Routers can create wired or wireless networks.

How to Extend Wi-Fi Range?

The Wi-Fi range offered by the Wi-Fi standards are theoretical; they are based on perfect

conditions. In the real world, the range can be affected by building material, walls, and furniture.

Therefore, oftentimes, the range of the router is not enough to cover a building. As a result, you

could experience slow speeds and connectivity issues.

Gadgets like range extenders, mesh networks, and long-range antennas can help extend the range

of your Wi-Fi connection. Both have the option of being wired or wireless.

Range extenders wirelessly connect to your router to access the internet. Once the connection has

been established, it's recommended to place the extender close enough to the router for a reliable

signal, but far enough away to where it can still reach the problem areas. The extender repeats

the signal it’s receiving from the router. To do so, it creates its own network; it’s almost like

having two routers in a building. The extender will have its own network name and password.

When you’re walking around your home you will manually have to switch to the networks you

are closest to.

NETWORKING ADRESSES

WHAT IS AN IP ADDRESS?
An IP address (internet protocol address) is a numerical representation that uniquely identifies a

specific interface on the network.

Addresses in IPv4 are 32-bits long. This allows for a maximum of 4,294,967,296 (232) unique

addresses. Addresses in IPv6 are 128-bits, which allows for 3.4 x 1038 (2128) unique addresses.

The total usable address pool of both versions is reduced by various reserved addresses and other

considerations.

IP addresses are binary numbers but are typically expressed in decimal form (IPv4) or

hexadecimal form (IPv6) to make reading and using them easier for humans.

THE INTERNET PROTOCOL (IP)

IP stands for Internet Protocol and describes a set of standards and requirements for creating and

transmitting data packets, or datagrams, across networks. The Internet Protocol (IP) is part of the

Internet layer of the Internet protocol suite. In the OSI model, IP would be considered part of the

network layer. IP is traditionally used in conjunction with a higher-level protocol, most notably

TCP. The IP standard is governed by RFC 791.

SUBNET MASKS

A single IP address identifies both a network, and a unique interface on that network. A subnet

mask can also be written in dotted decimal notation and determines where the network part of an

IP address ends, and the host portion of the address begins.

When expressed in binary, any bit set to one means the corresponding bit in the IP address is part

of the network address. All the bits set to zero mark the corresponding bits in the IP address as

part of the host address.


The bits marking the subnet mask must be consecutive ones. Most subnet masks start with 255.

and continue on until the network mask ends. A Class C subnet mask would be 255.255.255.0.

CHAPTER FIVE

CONCLUSION AND RECOMMENDATION


PROBLEMS ENCOUNTERED AND PROPOSED SOLUTIONS TO THE PROBLEM

 To the Organization

 Facilitation; The management of the Ibom E-library should buy more facilities and

components such as computers, sensors, so as to enable smooth running of the

company’s activities and respond to the dynamic competition environment.

 More opportunities to students to do intern in their organization; The intern would also

recommend the Organization to continue giving internship placements to as many students as

they can because some miss this experience which is also important requirement of the

University due to the fact that they failed to get placements.

 Allowances, the organization should give allowances to interns most especially transport

allowances to cater for transport cost, most students stay far from the internship places hence

increasing their expenses. Therefore, the intern recommends the Organization to put that in to

action in order to motivate interns and boost their productivity levels in performing their tasks

during the field attachment.

CONCLUSION

I commenced my I.T at the Ibom e-library on the 22nd of March, 2021 and concluded on the 30th

of July, 2021. The programme at the Ibom e-library offered field knowledge and experience in

the aspect of networking. On the first day, we were shown the various units and equipment’s,
tools and personnel we would be working with. The entire course of the training was a fruitful

one as it enabled us to gain experience and in field knowledge and also expand our knowledge

on things already learnt in the school environment.

RECOMMENDATION

Judging from the experience and knowledge I obtained, I strongly recommend that every

Nigerian student should participate in the SIWES program because the program did not only

expose the student to different practices but also prepares the student for the ultimate working

environment and true life realities, and also becoming the Engineer we always wanted to be.

REFERENCES

The manager, HTG global services, Ibom E-library, IBB way, uyo.

About Ibom E-libraary, https://www.theibomelibrary.com/

https://mysiwesplacement.com.ng/history-of-siwes/, the history of SIWES

Networking fundamentals,

https://www.cisco.com/c/dam/global/fi_fi/assets/docs/SMB_University_120307_Networking_Fu

ndamentals.pdf

You might also like