0% found this document useful (0 votes)
75 views58 pages

The Directorate of Students Industrial Work Experience Scheme Cloud

This document provides information about the student's participation in the Student Industrial Work Experience Scheme (SIWES) program at the ICT Department of Lagos State University Teaching Hospital. The 6-month program exposed the student to networking, maintenance, and software development. Key activities included learning networking concepts, installing and configuring hardware and software, and performing computer repairs and maintenance. The goal of SIWES is to provide students with practical work experience relevant to their field of study to help transition from school to employment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views58 pages

The Directorate of Students Industrial Work Experience Scheme Cloud

This document provides information about the student's participation in the Student Industrial Work Experience Scheme (SIWES) program at the ICT Department of Lagos State University Teaching Hospital. The 6-month program exposed the student to networking, maintenance, and software development. Key activities included learning networking concepts, installing and configuring hardware and software, and performing computer repairs and maintenance. The goal of SIWES is to provide students with practical work experience relevant to their field of study to help transition from school to employment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 58

THE DIRECTORATE OF STUDENTS INDUSTRIAL WORK EXPERIENCE

SCHEME (SIWES)

NATIONAL OPEN UNIVERSITY OF NIGERIA


University Village, Plot 91, Cadastral Zone, Nnamdi Azikiwe Express Way Jabi - Abuja

Course Title: Industrial Training/Siwes

Course Code: CIT 389

Level/Semester: 300L/2022_2

Name of Student: BIOSHOGUN ABIOLA YUSUF

Matric No: NOU201079664

Email Address: [email protected]


Phone No: 08034807000

Location/Firm of Training: ICT Department, Lagos State University


Teaching Hospital Ikeja, Lagos

Program of Study: B.sc Computer science

Faculty: Science

Study Centre/Zone: Mushin center/South West

Duration: September 2022 - February 2023


ABSTRACT

This report is based on the student industrial work experience scheme (SIWES) held at Lagos
State University Teaching Hospital (LASUTH) located at 1-5 Oba Akinjobi Street GRA Ikeja
Lagos. The Students’ Industrial Work Experience Scheme (SIWES) is a scheme that was set
up by the university commission to enhance and expose students to acquire adequate and
relevant skills that would enable them to perform effectively in their future place of work
and assignment. The work exposes students to work methods and enrich their experiences
in acceptable methods of handling equipment and machinery that may not be available in
the education institution. It is also aimed at exposing students to people from all works of
life, hence enhancing their communication skills and ability to interact with people after
graduation.

The report provides a brief explanation about the SIWES program such as its history,
objectives, aims while also giving a description of the work done mostly in computer
networking field. My industrial work scheme experience was achieved within three main
units of the ICT Department which entails working at the networking unit, maintenance unit
and Software development unit where I was exposed to the basics of the Hypertext mark-up
Language (HTML) used for website developments and management, knowledge about
different network topologies for the administration of the organization network and
internet services, installation of different application software’s and utilities, antivirus
programs, maintenance, repairs, assembly and reassembly of computer systems etc.
The networking operations and components such as the OSI model, TCP/IP, and other
networking protocols. The layers of osi model includes the Application Layer, Session layer,
Transport layer, Network layer, Data link layer, Physical layer and presentation layer.
It finally gives account to some of the machines and equipment used in the various units of
ICT department as well as their functions. It also provides insight in some of the challenges
faced and gives a few recommendations on how to further improve the program.

ACKNOWLEDGEMENT
I am grateful to the Almighty God, the beginning and the end, my creator and my everlasting
father who spared my life throughout the period of my SIWES program. May His name be
glorified and worshiped forever.

I appreciate my school, National Open University of Nigeria, Mushin Study Centre for the
opportunity to learn new skills through this Industrial Training Scheme. This has immensely
broadening my capacity and added to my exposure in the field of information technology.

I also appreciate the Unit Heads of ICT Networking unit, Maintenance unit and Software
Development Unit in persons of , Mr. Oledeoku oluwaseun, my supervisor Engr. Olalekan
Paul, Mr. Adekunle Olugbenga and the entire management staffs of ICT department of Lagos
state university teaching hospital ikeja lagos For their corporation and for accepting me in
the organization for this purpose.

I will not forget my sweet mother Mrs, Olayinka Bioshogun for her prayers and motherly
love to me through the thick and thin and my late father Mr. Bioshogun M.A who this report
is dedicated to may his gentle soul continue to rest in peace till we meet at the feet of the
lord Jesus Christ.

1.0 INTRODUCTION

This technical report is all about the skills and experience I acquired during the six months
SIWES program which I undertook at the Lagos State University Teaching Hospital (LASUTH)
Ikeja-Lagos from 1st September, 2022 to 28th February, 2023.
The report contains the account of all the operations and training received and the training
revolves around three units of the ICT department in Lasuth which are; The Networking unit,
Maintenance unit and Software development unit.

The networking unit is the unit that deals with the operations and administration of Lasuth
network which is built on star topology for the establishment of internet and intranet
services in Lasuth. The operation of IP phones, intercoms, CCTV surveillance, access point’s
installations and so on were taught with dexterity. The modus-operandi of the various
networking components like The Networking switches, Hubs, Bridges, patch panels,
Gateways, OSI model, network topologies etc. were shown to us on a platter of gold.

The maintenance unit is the unit that deals with the procuring, repairing, assembling,
reassembling and maintenance of the hardware components of the computer system. They
deal with identifying and fixing of faults in a faulty computer system. The computer
components such as the CPU, Motherboard, RAM slots, hard disc, etc was identified and
worked upon. While the software unit handles the creation of websites, web developments,
application software development, and configuration of servers, DNS management, and
installation of antivirus.

The student industrial work experience scheme (SIWES) is appreciable skill program, which
forms part of the approved minimum academic standard in the various degree programs for
all the universities. The scheme bridges the gap existing between theory and practice of the
engineering and technology, sciences agriculture, medical and other professional education
programs in the Nigerian tertiary institution. It is aimed at exposing and equipping students
to the real life working experience.
The training lasted for six (6) months, which involve the students, universities and the
industries.
SIWES was established by the federal Government of Nigeria and is jointly coordinated by
the Industrial Training Fund (ITF) and National University Commission (NUC).

1.1 AIM AND OBJECTIVES OF SIWES

SIWES is aimed at providing skills for students in their various fields. Some of the various
objectives why the program put in place are:
1. To provide an avenue for students in institution of higher learning to

acquire skill and experiences in their course of study.

2. To prepare students for the industrial work situation they are to meet

after graduation.

3. To expose students to work methods and techniques in handling

equipment and machinery that may not be available in their institutions.

4. To make the transition from the school to the world of work easier, and

enhances students contact for later Job placement.

5. To provide students with an opportunity to apply their knowledge in real

work situation thereby bridging the gap between theory and practice.

1.2 OBJECTIVES OF THE REPORT


1. The objective of this report is to put into writing all the practical

knowledge and experience I gained during the course.

2. To prove that I actually participated in the SIWES training.

3. To keep the record for future use or reference.

1.3 DESCRIPTION OF THE PLACE OF ATTACHMENT

The establishment is Lagos State University Teaching Hospital Ikeja, (LASUTH) located at the
capital of Lagos the center of excellency and Nigeria’s hub of commercial and business city
center. It is a place with broad expertise in contemporary hospital services in Nigeria. Lasuth
evolves from a cottage hospital in the 60’s formally known as Ikeja General Hospital and
fully transformed into a teaching hospital in 1992 now offering a wide range of automated
and integrated solution in broad spectrum of technology driven medical services like
telemedicine, medical teleconferencing, e-medicine etc. using computers and
telecommunication technology in reaching out to their patience remotely. This large
technology-oriented corporation is on record to be the cheapest source for high quality
healthcare services and has a high reputation for performance in proving efficient and
affordable healthcare delivery in Nigeria.

1.4 THE ICT DEPARTMENT IN LASUTH

The department is headed by a Director of ICT Mr. Adenuga O.A (GL17) with a team of
seasoned computer Engineers, Data processing officers, System analysts and Programmers
with proven track records in computer and communication business, the department offers
the following wide areas of specialization within the hospital domain;
(i) Repairs, Assembling and Maintenance of computers and I.T services

(ii) Maintenance of all up-to date Computers, Computer peripherals and

other consumables

(iii) Services and maintenance of Photocopying and Fax Machines

(iv) Software Development and Maintenance

(v) Computer Networking and Maintenance and Surveillance

(vi) VSAT Installation and Maintenance, Radio and other communication

equipment
(vii) Internet and E-mail Services

(viii) Training Services

1.5 SECTIONS OR UNITS OF THE ICT DEPARTMENT

(i) Computer repair and maintenance unit

(ii) Networking unit

(iii) Software development unit

(iv) Service delivery unit

(v) Web design unit

(vi) Training unit

1.6 Networking Unit

They manage and monitor the network at the receiving end. They are also responsible for
the operation, administration, and maintenance and provisioning of networked system.
They are also responsible for the upkeep, configuration, and reliable operation of the
computer system most especially multi user computers such as the server.

1.7 Computer Repair and Maintenances Unit

They are responsible for maintaining all system across the network and other IT peripheral
devices including printers and scanners. Maintenance and improvement of system
performance and online availability. Inventory of all computer equipment, keeping
maintenance records, and ensuring adequate maintenance provision. Identifying
bottlenecks and problems, making recommendations to solve them, keeping standard
software and hardware recommendations under review, and providing input into future IT
strategy. Overseeing computer security and Antivirus precautions and ensuring that
software licenses are adhered to.

The hardware unit also handles the administration of installation of operating systems
especially windows operating system. To install windows 10 or 7 will go through some steps

Upgrading the window entails the installation with cd rom or flash disk with some processes
of installation.

The maintenance unit answers to any complain regarding the malfunctioning of the
hardware part of computer system from anywhere within the hospital premises. The
complaints such as issues with the printer, computer not booting, keyboard problems and
blank- screens etc.

1.8 ORGANIZATIONAL CHART

Figure 1.1 below shows the organogram of the company according to the various
departments.
Figure 1.1: Organogram of the Company

EXPERIENCE GAINED

Under this text, I will be writing on what I gained and with brief explanation

on them to at least explain myself out .I gained a lot from the hardware

section, maintenance section, and software section, networking section and

programming section but I mainly worked in networking department and

programming department in learning about surveillance system, internet

and i.p telephony systems.

2.0 HARDWARE SECTION (MAINTENANCE)

2.1 HARDWARE

Hardware is the physical equipment needed for a computer to function properly.


HARDWARE COMPONENTS

Hardware comprise the following components:

(i) CASE: This is also called a tower or housing, it is the box that encloses

many of the parts

(Components) discussed below.


(ii) POWER SUPPLY: This is used to connect all of the parts of the computer

to electrical power, as can be seen in figure 2.1 below. You can find it at

the back of the computer.

Figure 2.1: Power Supply


(iii) MOTHERBOARD: This is a large electronic board that is used to connect the power
supply to various electronic parts and to hold these parts in place on the computer. Figure
2.2, shows a mother board. The computer memory (RAM) and processor are attached to the
motherboard. On the motherboard you also see the BIOS (Basic Input and Output System)
chip that is responsible for some fundamental operations of the computer such as linking
hardware and the software.
Figure 2.2: Motherboard

(v) DRIVES: These are devices used for long time storage of
information. The main storages for a computer is the internal hard
drive (also called a hard disk).A typical hard disk is the one in figure
2.3 below.

Figure 2.3: Hard drive

(iv) CARDS: Cards is used to describe important tools that allow your

computer to connect and communicate with various output devices. The

term card is used because these items are relatively flat, with the sound

card, video card, a network card and a modem.


(v) RAM: RAM is abbreviation for Random Access Memory. It is a short term

memory that is used to store documents while they are being processed.

Also note that the amount of RAM in a computer is one of the factors that

affect the speed of a computer. Seeing below is a typical RAM in computer in

figure 2.4.

(vii) PROCESSOR: Processor is the main ‘brain’ of the computer system, as


can be seen in figure

2.5. It performs instructions and calculation that are needed and managed a flow of
information through a computer. Processors are continually evolving and becoming faster
and more powerful. It is measured in MHz (megahertz) or GHz (gigahertz).
Figure 2.5: Processor

2.2 MAINTENANCE

Maintenance is a process of taking necessary precautionary and correcting measures to


prevent the computer from breaking down. We also use precautionary maintenance and
correcting maintenance in maintaining a hardware.

2.2.1 Precaution maintenance: This has to do with the process of taking necessary
preventive measures and putting in place the required resources to prevent a computer
from breaking down. There are some common hardware problems that can be avoided or at
least made less frequent by taking particular preventive measures with computer which are:

1. Dust control: Dust is very harmful to computer part. Excess dust can cause mechanical
failures, particularly on computer components with moving parts. We minimize dust in a
computer lab which is an important part in computer maintenance.

Preventive measures of dust effect

(i) Computer should be regularly dusted (wiped with a dry cloth or

duster).

(ii) When a computer is opened for others repairs, the dust that has built

up inside the case should be blown out using blower etc.


2. Heat control: When noticed that computer parts precisely CPU, produce a
large amount of heat while operating, it is important that this heat is
dissipate so that the computer is not damaged by overheating.

Preventive measures of heat effect

(i) A laptop computer should not be left running for any length of time

on a soft surface (like a sofa) that conforms around it.

(ii) A desktop computer case should not be used while in an enclosed


cabinets.
(iii) It is ideal that computer lab temperature should be kept low, using air

conditional is also good option since the windows can be kept close to

minimize dust.

3. Surge protection: At times, electrical supply does not have a uniform


(well controlled) voltage. Voltage is also due to surges that occur; voltage
surge can be very damaging to computers and electrical components.

Preventive measures of surge effect

(i) Purchase protecting power (adapter) strips, these devices contain 4 outlets that are

protected by a fuse that is shown in case of a power surge.

(ii) Install a surge compressor where the main power enters a computer lab.

(iii) Finally, use an uninterruptable power supply (U.P.S).


2.3 CORRECTIVE MAINTENACE: This involves taken necessary trouble-shooting steps against
any computer software and hardware problem, corrective maintenance has to do with
troubleshooting which involves the use of human intelligence, deductive reasoning and the
use of diagnosing tools to identify and isolate faulty components.

2.3.1 Basic Laptop Problems I Experienced and Their Possible Solution.

In using a computer, there is a coup of additional issues to be aware of,


that can affect the computer lifespan.

The ones I have experienced so far and their possible solutions are:

2.3.1.1 Computer doesn’t turn on at all: When you plug the AC adapter into the laptop,
there are no light turning on at all, even when the power button is pushed, no lights we say
that the laptop is dead because it makes no sounds and no indication of light.

Possible problem and solution

(i) The AC adapter failed and battery has no charge left. In this case test the

AC adapter with a voltmeter. If it is dead, it should be replaced with new

one.

(ii) DC jack failed and the motherboard does not receive any power from the

adapter in this case the DC jack has to be replaced.

(iii) Motherboard failed, the motherboard has to be replaced, if not too

expensive otherwise get ready to buy a new computer.


2.3.1.2 Blank screen: In most cases, I experienced that when laptop is

booted (turns on), the power IED light will come up, cooling fan works but

nothing appears or displayed on the screen that is the screen is completely

black and blank.

Possible problem and solution

(i) This can be memory failure; it is possible that one of the memory

modules failed. In this case I try resetting memory modules to make sure

they are making good contact with the slot. I can also test the laptop with

another memory modules if it does not help,

(ii) I remove the hard drive, DVD drive, wireless card, keyboard etc. in other

to disassemble the laptop to bare minimum and test again if it still does not

turn on most likely the motherboard has failed or the processor has failed.

2.3. Laptop makes noise while running: When you turn on your computer and everything
works fine, but (except) it makes some constant noise or rattling noise.

Possible problem and solution

(i) In most case this noise comes from the cooling fan or hard drive

(takes a closer look at the cooling fan and observe).


(ii) If the fan does not spin but the laptop makes noise probably it is from

the hard drive so replacing the hard drive is to be considered.

(iii) Bad key-board can also cause the noise which will result to change of

key-board.

2.3. Battery not charging properly: It might be that battery has stopped charging properly
or it does not charge at all or it charges only when the AC adapter is adjusted inside the
power connector.

Possible problem and solution

(i) Failed battery (bad battery), I replaced the battery.

(ii) Failed DC power connector. That is, if it charges well when the AC is

been adjusted.

2.3 Some keyboard keys stopped working: Possible problem and solution

(i) Most likely it might be that there is stuck keys on the keyboard, which

will result to changing or replacing of the keyboard.

(ii) But I also open the keyboard and dust it properly before replacing

decision is carried
2.4 SOFTWARE SECTION/UNIT

SOFTWARE: Computer software instrument that has been programmed to


allow a computer to process information. The categories of software I have
come across are:
(i) Operating system

(ii) Utility software

(iii)Productive software

2.4.1 OPERATING SYETEM: These programs are installed in the computer system to manage
and coordinate the activities of the hardware components examples are window xp, vista,
window 8, window 7, window 10 etc.
2.4.2 MAJOR FUNCTIONS OF AN OPERATING SYSTEM

(i) Resource management: the resource management of an operating


system allocates resources such as CPU time, main memory, secondary
storage and input and output device for use. (ii) Data management: the
data management function of an operation system govern the input and
output of the data and their location, storage, and retrieval
(iii) Job/task management: task management is responsible for schedule,
control and monitoring of jobs submitted for execution to attain the most
efficient processing.

2.4. INSTALLATION OF OPERATING SYSTEM

Installation of operating system was one of the key things I did during my industrial
attachment. Install various operating systems such as window 7, vista, xp and Linux
(ubuntu), below are the steps in installing window 7 operating system.

Note: Before installing operating system, it is advisable to backup all important files saved
on the hard drive.
Step 1: Make sure the computer is working properly; the peripherals and

motherboard are connected and installed properly. Turn ON your PC and

Press ‘F2’ Continuously. There will come up an option to boot through

CD/DVD. Select that option. Windows will start loading its files, as can

exactly be seen in figure 2.6 below.

Figure 2.6: Windows Loading


Step 2: Now you will get the Windows Setup Window, as can be seen in

figure 2.7. This is the part to select Language for your windows. Select

‘English’ and click Next. Also there will be a

‘INSTALL NOW’ button. Click on it and proceed to next step


Figure 2.7: Installing windows 7

Step 3: There will be a license agreement. Check on ‘I ACCEPT’ and proceed

to NEXT. After that there will be an option to install windows. ‘UPGRADE’

and ‘CUSTOM’, as can be seen in figure 2.8. Right now we are installing a

clean version so click on CUSTOM.

Figure 2.8: Step three of installation


Step 4: In this step you will do partitioning of your drive. One needs to be

careful, this is the most important part of the Installation. In this you will

allocate spaces to your drive as seen in figure 2.9 below. If you want to

create a new drive, simply click on a drive and then click ‘NEW’. A new drive

will be created.
Figure 2.9: Step four of installation

Step 5: When you have created the drives, simply select the drive in which

you want to install windows. Click ‘Format’, this will erase all the previous

data on your drive. Click on ‘NEXT’ to proceed, as seen in figure 2.10.

Figure 2.10: Step five of installation

Step 6: Now your windows will start installing its files, as seen in figure 2.11

below. Grab a cup of coffee and wait for a few minutes while it is installing.

During this process do not plug in or off your device. It might cause
interruption and you might lose your data and have to begin the process all

over again
.

Figure 2.11: Step six of installation

Step 7: Now when your files are installed. Your PC will be rebooted and now you will
see a ‘User

Settings’ Screen. Simply add your Name and password and proceed to ‘NEXT’

Figure 2.12: Step seven of installation

Step 8: In this step you have to activate your windows. Simply look at the back of

your Windows CD/DVD cover there will be a PRODUCT KEY. Add this key into your

PC and Click ‘NEXT’.


Figure 2.13: Step eight of installation26

Step 9: Now you have installed you windows. Give the desired information the

Windows Step guide will ask, like Time Zone, Update Timing and Your Computers

location, as can be seen in figure 2.14 below. There are three types of location.’

WORK’, ‘PUBLIC’ and ‘HOME’. Select on anyone of them according to your location.

It only add sharing security according to your location.

Figure 2.14: Final stage of installation

Last Step – Congratulations: - You have installed your windows. Now you can see is

your desktop.
It is simple to use, setup your desktop and enjoy!

2.5 UTILITY SOFTWARE: These are broad categories of programs that allow a computer
to perform task that are not parts of the OS, but are still practical and useful. Example
tera-copy, Nero etc.

2.6 PRODUCTIVE SOFTWARE: This is a program that performs standard office computer
task like word processing, presentation, spreadsheet and database software all graphs
software are all common example of productive programs.

2.6.1 Steps I used when installing utility/productivity system.

(i) I boot the computer.


(ii) I insert the CD or DVD (it might be mega or word office etc.) into the CD-drive.

(iii) I allow it to load, after few minutes; I open and click on my computer or

window in that environment, I locate the Disk and opened it, and then I choose any

program I want to install from the CD.

(iv) I click on the program to be installed, it loads, accepts the policy after going

through it.

(v) Then I click on next continually when prompt on screen.

2.6.2 Tips I used for uninstalling software

The following steps are used for software un-installation:

(i) I make sure that the software I wish to remove is not vital for the function of the

computer, if not sure, I search the internet to learn more about the software.
(ii) Once I am sure that I want to remove the software, I go to the start menu and

select control panel. (Note: in window xp click on the choice for add and remove

programs. In window vista, click on the program then select uninstall the program.

(iii) After clicking on the control panel, a list of software will appear, I choose the

program that I want to uninstall or remove ( guide through the removal steps

appears).

(iv) If not prompted to do so, I restore the computer after completing the removal

processes when the computer restart, I click the list of programs again to make sure

the desired program was fully removed.

In summary, I observed that to install software is easier than uninstalling.


2.6.3 HOW TO DISTINGUISH A SOFTWARE ISSUE FROM HARDWARE
ISSUE

I experience that it is not always easy to know the source of a computer program but
determining whether the problem is from hardware or software will help to give a
computer lab manager some direction for action in trouble shooting and repair.

Tips I use to distinguish between hardware problems from a software problem.

(i) I make sure I reduced possible “external” problem before proceeding. This

means unplugging any external devices (such as scanner etc.) and remove CD or

DVD disk from their drives.


(ii) Where there is any loud noise or smote when the problem just appeared

(occurred)? Then it is a probably a hardware problem, with most likely culprit being

the power supply unit.

(iii) Is the computer entirely dead? Or is the screen blank these faults are probably

due to hardware problem also.

(iv) Does the computer produce a series of beeps? This is a code that can be used to

distinguish some hardware problems.

(v) Does the computer produce error information after it has booted or only when

some programs are opened? This could be a cause of software problems.

(vi) Finally, I opened my control panel any device either hardware or software that

has a problem will have a warning symbol next to it, I double click on the device

detail or recommendation will appear.

NETWORKING SECTION

2.7 NETWORKING: In the world of computer, networking is the practice of linking two
or more computing devices together for the purpose of sharing data. Network is built
with a mix of computer hardware and software. In order to telecommunicate, local,
regional, national, and international telecommunication networks are required. In the
world of computers, networking is the practice of linking two or more computing devices
together for the purpose of sharing data.
Communication and networking go together.
The meaning of the word 'networking' may not be very clear at first, but it is something
we all do. Networking is making contacts, maintaining contacts and using contacts.
Figure 2.15: Computer Network
2.7.1 THE OSI MODEL LAYERS

The OSI Model is not a physical model, though. Rather, it is a set of guidelines that
application developers can use to create and implement applications that run on a
network. It also provides a framework for creating and implementing networking
standards, devices, and internetworking schemes.
The OSI Model has seven different layers, divided into two groups. The top three layers
define how the applications within the end stations will communicate with each other
and with users. The bottom four layers define how data is transmitted end to end.

Figure 2.16: The OSI Model Layers


2.8 INTERNET PROTOCOL ADDRESSING

An IP address is a numeric identifier assigned to each machine on an IP network. It


designates the specific location of a device on the network. It is a software address. The
two types of IP addresses are the version 4 types (IPv4) and the version 6 type (IPv6). The
IPv6, often referred to as ‘The next generation internet protocol’, is still under research
and is not yet in use publicly. The IPv4 is the most widely used.

Terms used in IP addressing are briefly explained below;

(i) Bit- A bit is a binary digit, either 0 or 1.

(ii) Byte- A byte is eight bits

(iii) Network address- This is a designation used to send packets to a remote

network.

Examples are 10.0.0.0, 172.68.0.0, 192.168.10.0


(iv) Node- A node is any device in an inter-network
(v) Broadcast address- This is the address used by applications and hosts to send

information to all nodes in a network. Example 10.255.255.255, which is all

nodes in 10.0.0.0 network.

There are three types or classes of IP addresses in use.

They are:
(i) The Class A IP addresses: These have 8 bits for network addressing, and 24

bits for host. Example 10.0.0.4 is an address under the 10.0.0.0.network.

The range for the network address is 0 to 127.


(ii) The Class B IP addresses: These have 16 bits for network addressing, and 16

bits for host. Example is 171.52.0.6 is a host address under the 171.52.0.0

network. The range for the network address is 128-191.

(iii) The Class C IP addresses: These have 24 bits for network addressing, and 8
bits for host.
2.9 TERMS USED IN NETWORKING

(i) Server: In general, a server is a computer that provides shared resources to

network users (client). Servers are typically powerful computers that run

the software that controls and maintained the network.

(ii) Network interface card: The network interface card (NIC), is the expansion

card one installs in a computer to connect, or interface, a computer to the

network (i.e. NICs are used to connect PCs to the network). This device

provides the physical, electrical, and electronic connections to the network

media. NICs are either an expansion card or built in to the computer

motherboard.

NICs come in three basic varieties: 8bits, 16bits and 32bits. The larger the number
of bits that transfer to the NIC, the faster the NIC can transfer data to the network
cable.
Figure 2.17: Network Interface Card

iii) Router: This is a specialized network device that determines the next point to
which it can forward a data packet towards the ultimate destination of the
packet.

iv) Gateway: This device is placed at a network node and interface with another
network that uses different protocols.

v) Switch: This device allocate traffics from one network segment to certain lines
(intended destination (s)) which connects the segment to another work segment.
Switch splits the network traffic and sends it to different destination to all system
on the network.

Figure 2.18: Front and Back View of a Switch

vi) Hub: This device connects multiple Ethernet segments, making them act as

a single segment when using a hub, every attached device shares the same

broadcast domain and the same collision domain. Therefore, only one computer

connected to the hub is able to transmit at a time.


Depending on the network topology the hub provides a basic

OSI mode connection among the network objects (workstations, servers etc.)
bandwidth which is shared among all the objects in contrast to switches which
provide a connection between individuals nodes can be supported by hub.
vii) Ethernet: This is a family of computer networking technologies for local

area networks (LANs).It has largely replaced competing wired LAN technologies.

Ethernet used coaxial cable as a shared medium. Later the coaxial cables were

replaced by twisted pair and fibre optics links in conjunction with hubs or

switches.

viii) Intranet: An intranet is a private network that is contained within an

enterprise. It may consist of many interlinked local area networks and also use

leased lines in the wide area network. Typically, an intranet includes connections

through one or more gateway computers to the outside Internet. The main

purpose of an intranet is to share company information and computing resources

among employees. An intranet can also be used to facilitate working in groups

and for teleconferences.


ix) Internet: The internet in simple terms is a network of the interlinked

computer networking worldwide, which is accessible to the general public. These

interconnected computers work by transmitting data through a special type of

packet switching which is known as the internet protocol (IP). Internet is such a

huge network of several different interlinked networks relating to the business,

government, academic, and even smaller domestic networks, therefore internet

is known as the network of all the other networks

x) Frame: This is the protocol data unit of the data link layer. xi) Packet: This

is the protocol data unit of the network layer.

xii) E1: This is a fractional unit of transmission. It carries signal at 2.0468Mbps

with 32 channels at 64Kbps. 30 channels carries traffic that is, voice and

data, 1 channel is for signaling and the other 1 is for synchronization that is,

reviewing. E1 is the minimum Megabits that can be required by a customer

to be rendered as a leased services.

xiii) T1: This is a transmission equipment that carries signal at 1.544Mbps with

24 channels at 64Kbps. E1 & T1 can be interconnected for international use.

xiv) IP Monitor: It is a monitoring system that monitors the network through

the
internet protocol (IP) assigned to each microwaves
radio. xv) Link: It is a barrier between a source and
the destination.

2.10 TYPES OF NETWORKING

Computer networks can be characterized by their size as well as by their


purposes. The size of a network can be expressed by the geographical area they
occupy and the numbers of computers that are part of the network. Network can
cover anything from a handful of devices within single room to millions of devices
spread across the entire globe. Some of the different networks I have
experienced based on size are:

(i) Personal Area Network (PAN): PAN is a computer network around an

individual within a single building. It can be in a small office or residence.

(ii) Local Area Network (LAN): LAN consists of a computer network a single sit,

typically an individual office building. A LAN is useful for sharing of resources.

Note: network resources are other peripheral devices that are shared on a

network such as printers, flash drives, CD-ROM, scanner etc.

(iii) Metropolitan Area Network (MAN): It is consists of a computer network

across an entire city, collage campus or small region. Note that: a MAN is larger

than a LAN. The combination of both network forms a

(iv) Campus Area Network (CAM).


(v) (iv) Wide Area Network (WAN): WAN occupies a very large area, such as

countries or entire world. WAN contains multiple smaller networks just as

mentioned above.

As I have studied, I can summaries that network provides great flexibility, such as:

(i) Sending document to printer in an office.

(ii) Watch movies from an online streaming server to your TV.

(iii) All forms of network resources are being shared including accessing the

internet.

2.11 NETWORK TOPOLOGY

Network topology is also known as physical topology which refers to the


configuration of connected devices on a network. Network topologies are
categorized into the following basic types;

(i) Star Topology; In this topology all the computers are connected to a single

hub through a cable the hub is the control node all other nodes are connected to

the node.
(ii) Mesh topology: This forms a ring as each computer is connected to another

computer, with the last one connected to the first two neighbors for each device.

(iii) Ring Topology: This forms a ring as each computer is connected to another

computer, with the last one connected to the first two neighbors for each devices

(iv) Tree Topology: It has a root node and all other nodes are connected to it

forming a hierarchy, it is also called hierarchical topology.

(v) Bus Topology: In this topology, all stations are attached to a single cable.

When a station sends a message, it is broadcast down in both directions.

Terminators at the end of the cable prevent the signal from reflecting back to the

sender.
Figure 2.20: Structures of Ring, Star, and Bus and mesh topologies

2.12 NETWORK CABLING

The three primary cables that I have come across are:

(i) Coaxial cable

(ii) Twisted-pair (unshielded and shielded)

(iii) Fiber-Optic cable


Just as I have learnt, these cables are able to transmit data and information from
computer to other viz.

(i) Transmit voice. All these transmissions are being done due to their

respective capacities or capabilities in speed and in terms of security.

(ii) The data sent is being carried in the form of more related pulse of light or

electronic signals.
2.13 HOW TO MAKE CABLE FOR TRANSMISSING STRIAGHT THROUGH/

CROSSOVER CABLING (Configuration of Registered jack (Rj) 45)

Materials needed

A. Cat 5 cable - One can buy a 1000 feet roll of Cat 5 cable at computer stores and
industry supply houses for somewhere between 6 and 10 cents a foot, depending
on the quality. Check to make sure that the color-coding on the wires is easily
recognizable.

Figure 2.21: Cat 5 cable packet

RJ-45 connectors: They usually come in bags of 50, 100 etc. Pay attention to the
type of RJ-45 connector you get and make sure it is intended for the type of Cat 5
wire you are using. There are two different kinds of RJ-45 connectors, depending
on whether you use them with solid or stranded wire cable. Using the wrong kind
with the wrong cable will most likely result in a bad connection.
Figure 2.22: RJ-45 connectors

B. Crimping tool: While this is the expensive part of making your own cables, it is
only a one-time startup cost. A good crimping tool has a pair of wire cutters built
in, as well as a blade to strip insulation. It also might support crimping of other
connectors such as RJ-11.

Figure 2.23: Crimping tool

C. Diagonal Cutter Pliers: You will need a pair of this to cut the wires in case

the crimper does not come with a built-in wire cutter. Cutting, Stripping, and

Sorting the Wires Cut a piece of Cat 5 as long as you need. When you cut,

remember the old saying:

Measure twice, cut once. Make sure the cut on each end is clean and straight.
Strip about an inch of the insulation off the cable. Cut it back nice and square.
Some crimping tools such as the one used here, come with a built-in wire
stripper. You put the cable in to a stop on one side of the cutter. It will cut the
jacket the right length to make a perfect crimp. It is extremely important that you
only cut the plastic insulation or jacket and not the wire. Damaging one of the 8
wires, even if you just nick it or partially cut it, will ruin your cable.

D. Untwist the wires. You will notice that there are 4 pairs of multi-colored

wires inside. Sort the pairs by color. You should end up with wires color coded as

follows: blue/blue-white, orange/orange-white, green/green-white, and

brown/brown-white.
Figure 2.25: Untwist the wires
Now align the wires in the following order from left to right. The order is
important since there is a wiring standard defined by the Telecommunications
Industry

Get the wires lined up and nice and straight. Then clip off the top millimeter so
that they are all the same length and stick out about half an inch from the
insulated part.

2.14 CONFIGURING A NETWORK


Steps taken to configure a network:

Step1. I write clicked on the network icon.

Step2. I clicked on open network and sharing center.

Step3. From the task pan bar, I clicked on changing advanced sharing setting
Step4. I turn on all network option e.g. I turn on network discoveries.

Step5. I turn on file and printer sharing, I turn on all sharing in order to
communicate with everyone in the network.

Step6. Finally, I turn off password protection sharing then I clicked on save
SETTING UP AN INTERNET PROTOCAL (IP) ADDRESS

Here are the steps I take when setting up IP address

Step1. I right clicked on the network icon on the taskbar.

Step2. I clicked on open network and sharing center


Step3. I changed adapter of my choice.

Step4. From the environment that appears I clicked on properties.

Step.5 I double clicked on the use of the following IP addresses, I clicked on


subordinate mask.

Step6. Finally, I clicked on okay and closed all open windows.

2.15 WIRELESS HOST COMPUTER CONFIGURATION

Here is the way you configure ad hoc wireless setting on host computer, so that
other computers can connect to it wirelessly and directly:

1. Go to Start and right click on Network and then click Properties.

2. Network and Sharing Center window will appear, click on Set up a


connection or network.
Note: The other way to do it is by going to Start -> Connect to -> click on Set

up a connection or network.

Figure 2.26: Setting up a connection

3. Set up a connection or network window will appear, select Set up a wireless

ad hoc (computer-to-computer) network option, and then click next.

4. Set up a wireless ad hoc network window will appear, this window will

briefly explain what an ad hoc wireless network is. Click next after the

reading.

5. On this wireless network configuration window, one can type in the

network name (SSID),


6.

7.

8. Security type (encryption) and security key. One can set up the ad hoc

connection without the authentication first, and then enable the encryption
(WEP, WPA2, etc.) once it worked. The encryption should be enabled, if not

every nearby computer can connect to this network. Click next again.

Note: You can click save this network to save it as wireless network profile. If not,
the network setting will not be saved.
The next window will tell you that the ad hoc network is ready for use with
connection setting. Click Close to finish the setup.

Back to your Network and Sharing Center, click on Manage Wireless networks,
you will see the New created ad-hoc network and it is ready to be connected.

Figure 2.28: Network ready for use


Note: Please note this ad-hoc is tagged as Unsecured since there is no encryption
enabled, so do not forget to enable the encryption once it worked.

Client Computer Configuration:

You can then use other client computer to connect to the adhoc wireless
network.

(i) Go to Start and click on Connect to.


(ii) Connect to a network window will appear. This window will show all

available connections, which are dial-up, VPN and wireless connections, but

your focus is on ad hoc wireless connection. Scroll down the list and select

the ad-hoc wireless network and click Connect button. Note: You will be

prompted if you connect to unsecured wireless network, click Connect

Anyway to connect for this case.


Once you get connected, you will see the following message. You can then tick on
save this network and Close the window. You can then ping other computers to
ensure it is working

2.17 PROGRAMING SECTION /UNIT

HTML:

HTML stands for Hypertext Markup Language, and it is the most widely used
language to write Web Pages.

(i) Hypertext refers to the way in which Web pages (HTML documents) are

linked together. Thus, the link available on a webpage is called Hypertext.


(ii) As its name suggests, HTML is a Markup Language which means you use

HTML to

simply "mark-up" a text document with tags that tell a Web browser how to
structure it to display. Originally, HTML was developed with the intent of defining
the structure of documents like headings, paragraphs, lists, and so forth to
facilitate the sharing of scientific information between researchers.
Now, HTML is being widely used to format web pages with the help of different
tags available in HTML language.

HTML Tags: As told earlier, HTML is a markup language and makes use of various
tags to format the content. These tags are enclosed within angle braces <Tag
Name>. Except few tags, most of the tags have their corresponding closing tags.
For example, <html>has its closing tag</html>and
<body>tag has its closing tag </body>tag etc

LESSTHAN <P>
GRATER THAN

ELEMENT

Table 2.1List of some HTML tags

Tag Description

This tag encloses the complete HTML document and mainly

<html> comprises document header which is represented by


<head>...</head> and document body which is represented by

<body>...</body> tags.

<head> This tag represents the document's header which can keep other

HTML tags like <title>, <link>

<title> The <title> tag is used inside the <head> tag to mention the
document title.

<body> This tag represents the document's body which keeps other HTML

tags like <h1>, <div>, <p> etc.

<h1> This tag represents the document's body which keeps other HTML

tags like <h1>, <div>, <p> etc.

<p> This tag represents a paragraph.

<b>, <i>, Bold, italic, list, unordered list, ordered list


<li>,

<ul>, <ol>etc
With the help of HTML Tags a web page can be easy created.

2.18 CASCADING STYLE SHEETS

C.S.S explains how HTML elements are to be displayed on screen, web browsers
etc
C.S.S controls a layer of multiple web page all at once also external sheets are
being stored in CSS files.

USE OF C.S.S

We use C.S.S to define style for your documents, including the design, layout and
variations in display for different devices and screen sizes. You can place your
C.S.S in the <head> of a documents with an embedded style sheet, or attached a
separate files and defines your styles with an external style sheet. To link an
external style sheet to your documents you simply add a link to the style sheet in
the <head> of the documents.
When a user displays a web page, the users browsers loads style information
along with the content of the page.
When a user prints a web page, you can provide different style information that
makes printed page easy to read.
In general, we use html to describe the content of the documents, not its style
while we use C.S.S to specify the documents style, not its content

CONTRIBUTION TO THE ESTABLISHMENT


3.1 PERSONAL INPUT TO THE COMPANY

The fore knowledge I had in CIT 311, CIT 321 and Cisco networking essentials book

really helped me in computer networking and programming departments, due to

my knowledge in computer hardware, computer networking, data

communications and the training I went through in the organization, I was able to

contribute to the establishment in the following ways:

(i) Teaching and assisting I.Tstudents and other staffs in training through their
lessons, During the Students’ Industrial Work Experience, I was able to put
into practice all that I was taught teaching others too. This really gave me
the opportunity to know what I was taught better.

(ii) Assist in repairs and deployments of computer infrastructures to places

where they are needed within the hospital : I was able to assist

industriously by introducing the ICT department of the hospital to the

clients outside and some other staffs that needed ICT services.

(iii) I was able to successfully install Windows 7, despite the fact that I could

install other recent windows but I was personally interested in installing

the old operating system as many people have been forgetting how to

install this windows. With this I was able to also make positive contribution

to the establishment.
(iv) Attending to the organization needs in the areas of photocopying,

scanning, laminating of documents and snapping of passport photograph. I

was able to increase the efficiency and proficiency of the ICT department

by the uniqueness of my assisting method. I was part of the first group of

students to practically carry out wireless adhoc configuration which was so

amazing to many of the staff members of the institution.

(v) I was able to successfully troubleshoot, reinstall and replace bad parts of

computer system both desktop and laptop, and I also upgraded some of

the computers alone.

3.4 CHALLENGES ENCOUNTERD

(i) Insufficient Vehicles: The shortage of vehicles for work especially when a

lot of services were required concurrently was a challenge .Sometimes, we had

to wait for a particular team to return before heading out to site or even take

public transport in very urgent situations. This often leads to unwanted

downtime.

(ii) Distance: The distance between the office and my home was also a major

challenge. Sometimes, I had to wake up around 4am to be able to meet up with


work around 8am considering the fact that I reside at Ogun state, although my

passion for what I did kept me going/

(iii) Bureaucracy: A lot of regulations and protocols were involved in various

operations especially in procuring materials for branch faulty equipment. We had

to go through the rigorous process of securing a waybill. There were also several

cases of material shortage

(iv) Use of Crude Implements: In some cases, most of the equipment and

facilities used were not up to standard and this had a way of slowing down the

job process. Examples are the rack system configuration, servers, faulty port

configuration.

(i) Difficulty in seeking IT attachment.

(ii) Lack of transportation.

(iii) Lack of good facilities for networking and computer maintenance.

(iv) I was not paid either by SIWES or the place of my attachment.

(v) There are no standard equipment for learning and practical.


(vi) The company lacks proper SIWES orientation on how to train students

somewhat but I had to cope with the situation.

RECOMMENDATION AND CONCLUSION

4.1 CONCLUSION

In respective of the challenges encountered in this SIWES program, there were


many things that I have experienced and learned during the six (6) months of my
industrial training at LASUTH, the whole period was very educating, interesting
and instructing.

Through this training I was able to gain new insight and more understanding
about the real industry working condition and practice. I was able to successfully
troubleshoot, reinstall and replace bad parts of computer system both desktop
and laptop, and I also upgraded some of the computers. It has provided me the
opportunities to develop and improve my soft and functional skills. All of this
valuable experiences and knowledge that I had gained were not only acquired
through direct involvement in task given but also through other aspect of the
training such as work observation, interaction with colleagues, superior, and
other people related to the field. From what I have undergone, I am very sure that
industrial training program has achieved its entire primary objectives.

This program has also prepared students to face the real working life. As a result
of the program, now I am more confident to build my future career. So also, the
fore knowledge I had in CIT311 and CIT321 really helped me in ICT department,
due to my knowledge in computer hardware, computer Networking, data
communications and the training I went through in the organization, I was able to
contribute to the establishment in some ways.

4.2 RECOMMENDATION

(i) School should provide a place of attachment for students.

(ii) Students should be paid monthly in their places of attachment by the SIWES

body.

(iii) Supervisors should always visit students monthly in their various places of

attachment.

(iv) School should always liaise with industries, firm and companies where the

students are doing their industrial training to check and improve their

facilities.

(v) School should organize a seminal for students place of attachment (the

industry) to enable effective training of students.


(vi) Despite the challenges encountered I still wish to recommend my place of

attachment (Lagos State University Teaching Hospital, Ikeja) for schools and

students who are yet to undergo their IT program.

REFERENCES

Huudemann M., (2013):The World Wide History of Telecommunication.


International Journal of Software Science and Computational Intelligence,
(January-March2010) 2(1), 102-131,
Olusegun, M., (2014):Guide to Successful Participation in SIWES.
Orin T. (2012):Training guide administering windows server 2012.
Network Digital Signage Player, iCAT Web Manager User’s Guide, 26-02-2010.
Olusegun,

Mafe N.,(2005),:Guide to Successful Participation in SIWES, Seven Twelve


Integrated Logistics Limited ,(2015): cooperate profile,(accessed 8 th
December,2016) @ http://Seven-
12.com.

You might also like