You are on page 1of 50

A TECHNICAL REPORT ON

STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

UNDERTAKEN AT

MINISTRY OF SCIENCE AND TECHNOLOGY


BLOCK 25, MOST BUILDING, THE SECRETARIAT, OBAFEMI AWOLOWO WAY,
ALAUSA - IKEJA, LAGOS.

BY

OLAJIDE OLAMIDE BASIT

MATRIC NO: EES/19/20/0420

SIWES REPORT SUBMITTED TO THE


DEPARTMENT OF COMPUTER ENGINEERING
FACULTY OF ENGINEERING
OLABISI ONABANJO UNIVERSITY

IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF


BACHELOR OF ENGINEERING (B.Sc.) IN COMPUTER ENGINEERING

FROM
SEPTEMBER 2023 TO FEBRUARY 2024

1
CERTIFICATION

This is to certify that the Student Industrial Work Experience Scheme (SIWES) was carried
out by Olajide Olamide Basit with Matric Number - EES/19/20/0420 of Computer
Engineering Department, Faculty of Engineering, Olabisi Onabanjo University, Ago – Iwoye,
under my coordination.

____________________ ____________________
Engr Oyedeji Date
SIWES Co-Ordinator

____________________ ____________________
Dr. Abolade Date
Head of Department

2
DEDICATION

I dedicate this report writing to God Almighty the author and the finisher of our faith, who has
made it possible for me to be alive today and has also helped me throughout my SIWES training,
may your name be praised for evermore Amen. I also dedicate this to my lovely and ever
supportive parent Mr. and Mrs. O. O Olajide for their prayers and and my siblings for their
support, I pray God will continue to bless you Amen.
ACKNOWLEDGEMENT

My sincere and ultimate thanksgiving goes to the Almighty God, the one who sustain me
throughout the course of my Industrial Training.

I also appreciate and thank the Managing Director of Ministry of science and technology
infrastructure support unit, Engr Disu for giving me the opportunity to be trained under his
establishment and supporting me throughout the training.

I cannot forget my loving and caring family, and all my sisters and brother for their support both
spiritually and financially during my SIWES program, may God bless you all.

Time and space will not permit me to mention all the Individuals that contributed to the success
of my SIWES in one way or other. I sincerely appreciate you all.

4
ABSTRACT

This report will take you through the journey of my SIWES which I did at ministry of science
and technology, infrastructure support unit Block 25, MOST BUILDING, The Secretariat,
Obafemi Awolowo Way, Alausa - Ikeja, Lagos. My training was on the computer hardware,
networking and MYSQL. During this period, I acquired practical knowledge on how to fix a
networking cable, on some part of the computer, how to create a database with MYSQL,
maintenance of I.T hardware.

This report discussed the technical skills gained during the training period and justifying the
relevance of the scheme in equipping students with needed technical competence to thrive in the
real world.

5
CONTENT

DEDICATION .....................................................................................................................3
ACKNOWLEDGEMENT ..................................................................................................4
ABSTRACT ......................................................................................................................... 5
CHAPTER ONE ............................................................................................................ 8
INTRODUCTION ..........................................................................................................8
OBJECTIVES OF SIWES ............................................................................................. 8
ABOUT INDUSTRIAL TRAINING I.T.F. .................................................................. 9
CHAPTER TWO ............................................................................................................. 10
CHAPTER THREE .......................................................................................................... 15
INDUSTRIAL TRAINING EXPERIENCE ................................................................. 15
COMPUTER HARDWARE NETWORKING ........................................................... 16
DIFFERENT TYPES OF LAN ....................................................................................... 18
Key Architectural Components of LAN ......................................................................20
Key Components of LAN Architecture .......................................................................... 21
Implementation and Management of Local Area Network (LAN) .............................24
LAN Management Best Practices ....................................................................................25
MAJOR NETWORKING TOOLS ................................................................................. 29
How fiber optics works ................................................................................................ 32
MAJOR FIBER OPTIC TOOLS .................................................................................... 33
PROJECTS IN MYSQL ...................................................................................................43
CHAPTER FOUR .............................................................................................................45
WORKDONE AND CHALLENGES ENCOUNTERED ............................................ 45
1. Computer Hardware and Networking ......................................................................45
2. Splicing of fibre optics cable ................................................................................... 45
3. Database management using mysql and excel ........................................................ 45
CHAPTER FIVE ...............................................................................................................49
CONCLUSION AND RECOMMENDATIONS ........................................................... 49

6
LIST OF FIGURES

Figure 1. Server Room ........................................................................................................................ 13

Figure 2. Organizational structure of the company ........................................................................... 15

Figure 3. Local Area Netorks ...............................................................................................................17

Figure 4. LAN Architecture ..................................................................................................................20

Figure 5. LAN Mangement ...................................................................................................................24

Figure 6. Networking Cable ................................................................................................................ 29

Figure 7. Crimping Tool .......................................................................................................................29

Figure 8. Registered Jack 45(RJ 45) .....................................................................................................30

Figure 9. Cable Tester ......................................................................................................................... 30

Figure 10. Outdoor Unit .......................................................................................................................31

Figure 11. A closer look at a fiber optic cable .................................................................................... 33

Figure 12. Fiber Stripper ..................................................................................................................... 34

Figure 13. Slitter/Removal Tool ..........................................................................................................34

Figure 14. Mid Access Tool ................................................................................................................. 34

Figure 15. Fiber Optic Cleavers ...........................................................................................................35

Figure 16. Fiber Optic OTDRs ..............................................................................................................36

Figure 17. Fiber Optic Fusion Slicers ...................................................................................................36

Figure 18. Power Meter & Fusion Slicers ........................................................................................... 37

Figure 19. Talk Sets ............................................................................................................................. 38

Figure 20. Fiber Identifiers ..................................................................................................................38

Figure 21. Optical Spectrum Analyzer ................................................................................................ 39

Figure 22. Visual Fault Locator ........................................................................................................... 39

Figure 23. Inspection Microscope/Video ........................................................................................... 40

7
CHAPTER ONE
INTRODUCTION

The Student Industrial Work Experience Scheme (SIWES) was initiated in October 8,
1973 by the Industrial Training Fund (ITF), the Student Industrial Work Experience
(SIWES) gives opportunity for students to go on a Skill Acquisition or Work Experience
program in an Industry that relate to their field of study in order to update practical
knowledge of students in the Universities, Polytechnics and Colleges of Technology. It
was aimed at bridging the gap between the theoretical knowledge acquired in classes and
technical knowledge in the industry by providing students with the opportunities to apply
their educational knowledge in real work situations.

With the primary purpose of gaining relevant skills required from an engineering
graduate and to secondary purpose of fulfilling the major requirement for the award of
Bachelor of Science degree, I undertook my SIWES at Ministry of science and
technology, which is located at Block 25, MOST BUILDING, The secretariat, obafemi
awolowo way, alausa - ikeja , lagos from SEPTEMBER 2023 to FEBRUARY 2024.

OBJECTIVES OF SIWES
The Industrial Training Fund’s Policy Document No. 1 of 1973 which established
SIWES outlined the objectives of the scheme. The objectives of the Students Industrial
Work Experience Scheme (SIWES) are:
 Provide an avenue for students in institutions of higher learning to acquire
industrial skills and experience during their courses of study.
 Prepare students for industrial work situations that they are likely to meet after
graduation.
 Expose students to work methods and techniques in handling equipment and
machinery that may not be available in their institutions.
 Make the transition from school to the world of work easier and enhance students’
contacts for later job placements.

8
 Provide students with the opportunities to apply their educational knowledge in
real work situations, thereby bridging the gap between theory and practice.

Enlist and strengthen employers’ involvement in the entire educational process through
SIWES.
ABOUT INDUSTRIAL TRAINING I.T.F.

The objective for which the Fund was established has been pursued vigorously and
efficaciously. In the four decades of its existence, the ITF has not only raised training
consciousness in the economy but has also helped in generating a corps of skilled
indigenous manpower which has been manning and managing various sectors of the
national economy.

Over the years, pursuant to its statutory responsibility, the ITF has expanded its structures,
developed training program, reviewed its strategies, operations and services in order to
meet the expanding, and changing demands for skilled manpower in the economy.

As part of its responsibilities, the ITF provides Direct Training, Vocational and
Apprentice Training, Research and Consultancy Service, Reimbursement of up to 50%
Levy paid by employers of labor registered with it and administers the Students Industrial
Work Experience Scheme (SIWES). It also provides human resource development
information and training technology service to industry and commerce to enhance their
manpower capacity and in-house training delivery effort.

9
CHAPTER TWO

BRIEF HISTORY OF THE MINISTRY OF SCIENCE AND


TECHNOLOGY

The Ministry was created in February 2004 by the administration of


Asiwaju Bola Ahmed Tinubu from what used to be the Office of
Special Adviser on Information Technology and Special Services.

The Administration identified the utilization of technology to


effectively manage the challenges of improving government service
delivery and ensure economic and social development.

It is on record that this Ministry had since its creation been providing
professional Information Communication Technology services to the
Civil Service and the public at large.

VISION

To make Lagos a model state through the innovative application of


Science and Technology for solving problems and making impact in
all human endeavours.

MISSION

To employ Science and Technology in all activities towards


improving the quality of life of Lagosians and Transforming Lagos,
through strategic and co-ordinated utilization of available resources
into a developed industrial, and modern State of international stature.

Directorates/Units/Agencies

Directorates:

1. Administration and Human Resources [A & HR]

10
2. Finance and Accounts [[F & A]

3. Information Communication Technology[ICT]

4. Science, Policy, Programmes and Promotion[SPPP]

5. Computer Services [CS]

Units:

1. Public Affairs

2. The Internal Audit

3. Planning

4. Procurement

5. Engineering

6. Legal

Agency:

1. Lagos State Residents Registration Agency (LASRRA)

Objectives

• To properly manage the State’s Global Computerisation Projects.

• To utilise modern technology for the effective management of


Government business, particularly in the areas of operational

11
activities, revenue generation and electronic information
dissemination.

• To utilise Science and Technology to improve the lot of citizens of


the State.

Ministerial Mandate

• Initiate, formulate, execute, monitor and evaluate policies relating to


Science & Information Communication Technology (ICT).

• Automation and re–engineering of government business processes


& harmonisation of all existing ICT assets into a world class
infrastructure.

• Provision and maintenance of ICT services across Ministries,


Departments &Agencies (MDAs).

• Development of Science, Technology, Engineering & Mathematics


(STEM) education as well as setting up ICT Centre for state schools.

• STEM & ICT capacity building across all MDAs.

• Enlarging the pool of scientific manpower, attracting young people


to careers in science and retaining same.

• Establishing globally competitive research facilities for the


promotion of innovation, research & development in Science & ICT.

• Provision of advisory & consultancy services for all MDAs on


Science & ICT.

12
• Developing new models of Public Private Partnerships (PPPs) in
higher education, particularly for research in universities and
technologically-industrialized areas.

• Identifying ways and means of catalysingindustry-academia


collaborations.

• Promoting strong linkages with more advanced countries, including


participation in international science & innovation initiatives.

• Special projects as assigned by the Governor of Lagos State.

Figure 1

Figure 1: Server room

• Upgrade of the network infrastructure

13
• The network upgrade brought benefits which are worth the
investment.

• It increases efficiencies within


the MDAs, hence has enhancedperformance-most MDAs now do
online meetings.

• To enabled flexible working patterns

• Enabled e-learning

• Implementation of online staff audit

• Business process automation

14
Figure 2

Figure 2: Organizational structure of the company

CHAPTER THREE

INDUSTRIAL TRAINING EXPERIENCE

During my industrial I worked in the Infrastructure support unit in the company where I
was trained, assisted and carried out several duties and assignments in the following
fields:

 Computer Hardware and Networking.


 MYSQL.

15
 Microsoft Excel.

COMPUTER HARDWARE NETWORKING

Network hardware is defined as a set of physical or network devices that are essential for
interaction and communication between hardware units operational on a computer
network.

LOCAL AREA NETWORK (LAN)

A local area network (LAN) is a connected environment spanning one or more buildings
– typically in a one-kilometer radius – that links computing devices within close
proximity of each other by using ethernet and Wi-Fi technology. LAN is among the most
foundational components of the global networked landscape, both at consumer and
enterprise levels.

Types of Local Area Network (LAN)

Local area networks can be classified based on the types of devices they connect, the
design of the underlying architecture, and the medium used. There’s also an emerging
LAN market that’s native to the cloud era.

16
Figure 3

Figure 3: Local Area Networks

17
DIFFERENT TYPES OF LAN

1. Client-server LAN

In a client-server LAN environment, a single server connects to multiple devices known


as clients. Client devices cannot interact with each other and a centralized machine
handles activities like network traffic management, network access control, etc. This
LAN type may be faster in small perimeters, but in a large perimeter, it places too much
pressure on the central server.

2. Peer to peer (P2P) LAN

In a P2P LAN, there is no centralized server, and all connected devices have access to
each other, regardless of whether they are servers or clients. The advantage of a P2P
LAN is that devices can freely exchange data with one another, making it easier to stream
media, send files, and perform similar data exchange activities. On the downside, they
tend to be less powerful than client-server LANs.

3. Token ring LAN

Based on the architecture design, you can classify LANs into a token ring or token bus
categories. In the former, all devices are arranged in a ring when they are connected. A
token is assigned to every connected device based on its requirements. It was introduced
by IBM in 1984 for use in corporate environments when ethernet technology was still in
the early stages of development.

18
4. Token bus LAN

In a token bus LAN, connected nodes are arranged in a tree-like topology, and tokens are
transferred either left or right. Typically, it provides better bandwidth capacities than a
token ring LAN environment.

5. Wired LAN

Wired LAN is probably the most common LAN type in use today. It uses electronic
waves to transfer data across optical fiber (or cable variants) instead of tokens. Wired
LAN is extremely reliable and can be very fast, depending on the performance of the
central server. However, it can hinder portability and flexibility, particularly in
environments with no fixed number of devices.

6. Wireless LAN

Wireless LAN is commonly used in home environments to connect computing devices,


wearables, smart appliances, etc. but there is a massive enterprise market for wireless
LAN as well, growing by 10.3% year over year as per IDC. This type of LAN uses
radiofrequency for data transfers, which can make it susceptible to security risks. It is
also battery-intensive and may show fluctuating performance depending on where the
wireless device is situated.

7. Cloud-managed LAN

19
Cloud-managed LAN is a specific type of wireless LAN where a centralized cloud
platform is used to manage network provisioning, policy enforcement, access control, and
other aspects of network performance and security. In a heterogeneous networked
environment, cloud-managed LAN streamlines governance, making it a good fit for
enterprise use.

Key Architectural Components of LAN

Now that we know what a local area network is and its various types let us explore the
various architectural components that make up your average LAN environment.

Figure 4

Figure 4: LAN Architecture

20
Key Components of LAN Architecture

1. Public internet

The public internet is what’s being accessed through the LAN. Typically, the centralized
server receives data packets from the public internet and access requests from the client
devices. It then addresses these requests by enabling data transfer to the various
connected nodes through a wired or wireless medium. Technically, a local area network
may exist without reaching the public internet – for example, for private data exchange or
private intranet hosting use cases. However, internet access is among the top reasons for
LAN adoption.

2. Wired end-user devices

An average LAN environment will have a mix of both wired and wireless devices.
Remember that we are talking about end-user devices here, such as laptops, desktops,
smart televisions, smart monitors, collaboration hardware, meeting room systems, and the
like. These devices will have an ethernet port through which you can plug in the local
area network directly into the device itself. Wired end-user devices typically enjoy high-
speed internet connectivity, high-quality media streaming, and fast processing.

3. Mobile end-user devices

21
Mobile end-user devices refer to devices that you connect using Wi-Fi instead of an
ethernet cable. Keep in mind that the same device can double up as both a wired or
mobile variant. For example, you may connect a laptop to LAN using the ethernet port on
the device or through Wi-Fi, depending on where the device is situated and the
performance you need. Wearables, smart home appliances, smart building components,
laptops, smartphones, and ruggedized handheld devices fall into this category.

4. Centralized server

The centralized server is possibly the most crucial component in a LAN environment,
particularly for enterprise implementations. Enterprises may purchase or lease servers
from vendors like IBM, Cisco, HPE, etc. You can obtain LAN servers from your local
telecom carrier as well. Or, you can choose to connect all your devices to one or more
modems that are in turn connected to a server situated in a different location. This is
typically the case for consumer applications, as there is no cost incurred from housing or
maintaining the server. On the other hand, enterprises with LAN servers located on their
premises enjoy faster speeds and greater bandwidth capacity.

5. Network switch(es)

A network switch is an essential component of a local area network. It governs how data
packets and network resources are allocated between the devices connected to the
centralized server. You can plug in multiple ethernet cables into a multi-port network
switch. The switch enforces your network policies so that performance is optimized for
every connected end-user device. There are two kinds of switches you can consider for
your LAN environment – managed and unmanaged. Managed switches provide you with
more control, but unmanaged switches may be cheaper and easier to maintain.

22
6. Wi-Fi router

A Wi-Fi router is now a staple component of local area networks as wireless LAN
implementations aren’t possible without it. The router is connected to your modem so
that it can receive network signals, and it converts it into wireless signals that your
mobile end-user devices can process. In recent years, it is common to bundle Wi-Fi
routers into the same hardware shell as the modem, as wired-only networks are now
increasingly rare. Along with the router, you can deploy accompanying components like
Wi-Fi extenders, access points, Wi-Fi amplifiers, and analyzers to boost performance. All
of these components are available in both consumer-grade and enterprise-grade variants.

7. Modem

A modem is an indispensable component for a local area network as this is what converts
the analog signals transmitted via wires and cables into a digital format. Traditional
modems are standalone devices where you can plug in the incoming uplink on one end
and the outgoing cable on the other. However, there are several modern alternatives to
this approach. You can purchase a modem + router device that both converts analog
signals into digital and prepares for wireless transmission. You can also combine the
network switch with the modem’s functionality. Companies like Cisco and Dell continue
to manufacture powerful, standalone cable modems for enterprise use.

8. Firewall appliance (optional)

A firewall protects end-user devices and servers from network-related security attacks by
restricting specific kinds of traffic. Today, most end-user devices ship with built-in
firewall software, and you can also download additional software from the internet. Some

23
of the more advanced router systems available in the market also include firewall
capability. Optionally, you can choose to implement a hardware firewall appliance as a
LAN component. It sits between the router and the network switch or between the switch
and the central server to regulate all the data traffic flowing to end-user devices.

Implementation and Management of Local Area Network (LAN)

LAN adoption is a vital step in business growth. It allows you to gain from the latest
digital technologies such as online services, cloud-hosted information, and cloud-based
process management platforms. Here are 10 best practices to guide LAN implementation
and management for business success.

Figure 5

Figure 5: LAN Management

24
LAN Management Best Practices

1. Enable WPA3 encryption

WPA2 encryption was the global standard in Wi-Fi security, which is essential given the
connection’s risk-prone nature. Since 2006, all enterprise-certified Wi-Fi hardware has
used WPA2, with the new WPA3 emerging in 2018. WPA3 improves upon WPA2 by
addressing password-related vulnerabilities, securing public Wi-Fi, and making it easier
to set up a secure Wi-Fi network. It is advisable for enterprises to transition to WPA3 in
the next few quarters, as you will also enjoy backward compatibility with WPA2.

2. Conduct LAN inventory and implement standardization

As discussed, the average LAN has eight key components, and this number can increase
with time. From IP phones, IP cameras, IP speakers, etc., to desktops, printers, access
points, and firewall appliances spread out across the office campus, there is a risk of
growing clutter as your network environment evolves. Clutter not only makes LAN
difficult and expensive to maintain but also causes security vulnerabilities. That’s why
you need to conduct a detailed inventory, take stock of network policies and hardware
versions, and enforce standardization to simplify governance.

3. Deploy network redundancy as a fail safe for LAN downtime

Redundancy (or an idle network resource that kicks in, in case of an emergency) is
essential for a reliable local area network. LAN connectivity may be disrupted due to
inclement weather, problems with the central server’s configurations, security threats,

25
wear and tear, excessive bandwidth demand, and a host of other reasons. Your business
must remain connected throughout this period by using a failsafe mechanism. You can set
up intermediate routers that enable automatic failover to a different line in case of a
disruption. You may also invest in a backup LAN setup from a different carrier to
circumvent carrier-related downtime issues.

4. Carefully consider the physical LAN design

Several vendors now promise plug-and-play LAN solutions, but these may not be the best
fit for every scenario. Particularly for business use, every organization requires a local
area network tailored for their unique requirements – for example, connecting kiosk PCs
in a retail outlet or tablet-based menus in a restaurant. The physical design of your LAN
architecture, including the exact positioning of routers, the number and configuration of
network switches, and the quality of cables used.

5. Plan for Internet of Things (IoT)

There are two types of networks used to connect IoT devices – low power wide area
networks (LPWAN) in long ranges and wireless LAN within the same building or up to
100 meters. You may even connect an IoT device using a wired LAN if it has an ethernet
port, which is often the case for home appliances like smart TVs or enterprise-grade
meeting systems. All of these require a well-articulated blueprint where you take stock of
your existing IoT devices and estimate future requirements. You may allocate dedicated
network resources via LAN as well as LPWAN, depending on your edge radius.

6. Explore software-defined LAN or SD-LAN viability

26
SD-LAN decouples physical network components from the platform from which they are
managed. Instead of configuring each individual device for optimized LAN connectivity,
SD-LAN uses a centralized platform (typically hosted on the cloud and fed with data
wirelessly). SD-LAN has a number of advantages over traditional LAN management.
You obtain observability across your entire landscape through a single pane of glass. You
can also gain from software-based enablers like network automation code or cloud-
delivered updates. Next-gen SD-LAN services like Macquarie Telecom SD-LAN
use artificial intelligence (AI) to enable up to 5X faster speeds than even Wi-Fi 5.

7. Consider managed LAN services to reduce in-house efforts

Managed LAN services allow you to offload the maintenance, governance, and security
aspects of LAN management to an external provider. Nearly every major telecom carrier
globally, including Orange, Verizon, and Vodacom, offer managed LAN to their
enterprise clients. You can also partner with technology companies that bring expertise in
network device management and modernization. Typically, a managed LAN offering will
use a cloud-hosted platform to provide you with visibility and regular insights into LAN
operations without having to put in any on-ground efforts.

8. Adopt LAN segmentation to improve performance

Segmentation allows you to branch a local area network to improve performance and
ensure security. Different LAN segments do not have access to each other and gain from
dedicated resources assigned to them via the network router and switch. There are two
ways to go about this. You can place a physical LAN bridge between the central server
and connected devices to create multiple branches. Or, you can use virtual LAN or

27
VLAN technology to use software-defined network policies to isolate your network into
groups.

9. Use a physical firewall appliance in addition to firewall software

Due to the ubiquity of firewall software, consumers and small businesses often make the
mistake of not investing in an additional firewall appliance. However, software alone
cannot block 100% of your network-related risks and vulnerabilities. Firewall software
resides in the same system as all the other applications on your end-user device. This
means that if the device is infected or compromised in any way, the firewall software
may also stop functioning. An additional firewall appliance regulates data traffic and
enforces restrictions from an external node that is almost impossible to hack.

10. Assign LAN implementation ownership to designated stakeholders

LAN is a key infrastructural pillar of your enterprise and shouldn’t be bundled with the
rest of your IT services or network administration duties. You need a designated project
manager to look after LAN implementation, and they could belong either to your internal
IT team or the managed service provider’s staff. There must be a team of network
management professionals to optimize LAN configurations after it is installed. You also
need a centralized decision-maker to oversee the project. This capability could draw from
a Center of Excellence (CoE) comprising representatives from the various business units
that rely on LAN for day-to-day functioning.

28
MAJOR NETWORKING TOOLS

 NETWORKING CABLE: They are used to connect and transfer data and
information between computers, routers, switches and storage area networks.

Figure 6

Figure 6: Networking cable

 CRIMPING TOOLS: This tool is used to attach the connectors to the cable.
Typically, this tool also includes a wire-cutter and wire-stripper.

Figure 7

Figure 7: Crimping Tool

29
 REGISTERED JACK 45 (RJ45): A registered jack (RJ) is a standardized
physical network interface for connecting telecommunications or data equipment. It is
an 8-pin/8-position plug or jack is commonly used to connect computers onto Ethernet-
based local area networks (LAN).

Figure 8

Figure 8: Registered Jack 45 (RJ 45)

 CABLE TESTER: A cable tester is an electronic device used to verify the electrical
connections in a signal cable or other wired assembly.

Figure 9

Figure 9: Cable Tester

30
 Outdoor Unit(ODU): The Outdoor Unit (ODU) is part of the digital microwave
transmission system. It supports a point-to-point digital fixed radio service and works
together with the Indoor Unit (IDU) to provide multiple types of service interfaces.

Figure 10

Figure 10: Outdoor Unit(ODU)

 Ethernet Jack: An Ethernet port (also called a jack or socket) is an opening on


computer network equipment that Ethernet cables plug into. Their purpose is to
connect wired network hardware in an Ethernet LAN, metropolitan area network
(MAN), or wide area network (WAN).

31
FIBRE OPTICS

Fiber optics, or optical fiber, refers to the technology that transmits information as light
pulses along a glass or plastic fiber. A fiber optic cable can contain a varying number of
glass fibers, from a few up to a couple hundred. Another glass layer
called cladding surrounds the glass fiber core. The buffer tube layer protects the cladding,
and a jacket layer acts as the final protective layer for the individual strand.

Fiber optic cables are commonly used because of their advantages over copper cables.
Some of those benefits include higher bandwidth and transmit speeds.

Fiber optics is used for long-distance and high-performance data networking. It is also
commonly used in telecommunication services, such as internet, television and
telephones. For example, Verizon and Google use fiber optics in their Verizon Fios and
Google Fiber services, respectively, providing Gigabit internet speeds to users.

How fiber optics works


Fiber optics transmits data in the form of light particles, or photons, that pulse through a
fiber optic cable. The glass fiber core and the cladding each have a different refractive
index that bends incoming light at a certain angle.

When light signals are sent through the fiber optic cable, they reflect off the core and
cladding in a series of zig-zag bounces, following a process called total internal
reflection. The light signals do not travel at the speed of light because of the denser glass
layers, instead traveling about 30% slower than the speed of light.

To renew, or boost, the signal throughout its journey, fiber optics transmission sometimes
requires repeaters at distant intervals. These repeaters regenerate the optical signal by
converting it to an electrical signal, processing that electrical signal and retransmitting the
optical signal.

Fiber optic cables are now able to support up to 10 Gbps signals. Typically, as the
bandwidth capacity of a fiber optic cable increases, the more expensive it becomes.

32
Figure 11

Figure 11: A closer look at a fiber optic cable

MAJOR FIBER OPTIC TOOLS


 Fiber Stripper: The right stripper helps makes your job easier. To prepare the fiber
for fusion splicing, the protective acrylate or polymer coating around the optical fiber
must be removed. Whether you use a Manual Mechanical Stripper or a Thermal
Ribbon Stripper, we can help you choose the correct tool. Typically, there are two
popular types of ways to strip optical fiber. They are mechanical and thermal. In the
mechanical method a hand held stripper similar to any other wire stripper is used.
However, the fiber optic stripper is designed specifically for optical fiber. These
strippers are precise when used correctly. They strip away the fiber coating and
expose the fiber without damaging it. When stripping ribbon fiber a thermal fiber
stripper is most often used. This stripper is designed to heat the fiber coating and then
strip it away.

33
Figure 12

Figure 12: Fiber Stripper


 Slitter/Removal Tools: When the need arises and you want to slit a fiber optic cable
at the end or mid-span you need a precision tool. Our Slitters will assist you in
making cuts effortlessly. These tools are built to make a horizontal or a rotary cut in
the fiber jacket so you can quickly expose the fiber without disturbing or damaging
the fiber inside the jacket.

Figure 13

Figure 13: Slitter/Removal Tool


 Mid Access Tools: A mid access tool allows you to easily access a single fiber tube
in a multi fiber cable as well as ribbon fiber optic cable. It splits the buffer tube with
no damage to the fibers inside.

Figure 14

Figure 14: Mid Access Tool


 Fiber Optic Cleavers:Cleaving is the process in which a fiber is cut with precision.
The fiber is not actually cut, this tool scores a precise location on the fiber getting it

34
ready to be cut. Precision Cleavers are usually best for this job and are the most
popular method for cleaving fiber. When a Mechanical Cleaver is used then a bit
more skill is needed. As always, when choosing the correct precision tool, quality is
important. Looking at just price can lead to problems with your installation.

Figure 15

Figure 15: Fiber Optic Cleavers


 Fiber Optic OTDRs: An OTDR measures loss within an optical fiber. When an
OTDR is connected to optical fiber cable it sends light pulses into the fiber being
tested. It then reads scattered or reflected light from the same end of the optical fiber.
This tests the fiber to make sure it will perform properly. It is looking for faults or
defects in the optical fiber. These returned signals of reflected or scattered light will
indicate the location of the fault that is encountered.

35
Figure 16

Figure 16: Fiber Optic OTDRs

 Fiber Optic Fusion Splicers: A Fusion Splicer is a tool that uses an electronic arc to
permanently melt two pieces of optical fiber to form a single fiber. It completes this
task by using an electric arc. This provides the most accurate joint alignment between
the two optical fibers. These splicers offer fast heating which in turn means faster
splicing times; as well as great precision and performance.

Figure 17

Figure 17: Fiber Optic Fusion Splicers

36
 Power Meter & Light Source: The Power Meter & Light Source are used together
to measure the power of an optical signal and loss or attenuation between the
transmitter and the receiver in a fiber optic network. The light source sends the light
and then the power meter measures the loss of power at the other end. This test is for
the average power in the system. It is important to remember to test with the same
wavelength that is being used in the system. If the system is 1310nm then the
equipment must be set to that wavelength. The same holds true for 850nm, 1300nm,
1550nm or any other wavelength(s) that may be used.

Figure 18

Figure 18: Power Meter & Light Source

 Talk Sets: An inexpensive solution for communication when working on a fiber


optic network. These long range talk sets use spare fibers to transmit voice signals.
They are used on multi-mode or single-mode optical fiber during installation or
maintenance. Talk Sets are hands free.

37
Figure 19

Figure 19: Talk Sets

 Fiber Identifiers: Fiber Identifiers are used to verify whether an optical fiber is live
or not; in other words they detect if a signal is being transmitted on a particular fiber.
This is done by creating a safe attenuation in a live optical fiber. The benefit of this
item is that this can be done without interrupting signal traffic. A fiber identifier is
used both in installation and maintenance of fiber optic cable.

Figure 20

Figure 20: Fiber Identifiers

 Opitical Spectrum Analyzer: An Optical Spectrum Analyzer measures the power


level that is being transmitted by each wavelength in a fiber optic cable typically used
in CWDM and DWDM networks. The OSA can identify issues with specific
wavelengths which can be compared against a baseline measurement to analyze a
system’s performance over time.

38
Figure 21
Figure 21: Optical Spectrum Analyzer

 Visual Fault Locator: A Visual Fault Locator is a red laser that injects visible light
into an optical fiber. If a fiber has a faulty connector as well as some types of damage
including breaks, sharp bends or faults; the laser will highlight the area that is
damaged as the light leaks out. They are also used to test continuity and they are
used for fiber identification within patch panels and splice enclosures

Figure 22

Figure 22: Visual Fault Locator

 Inspection Microscope/Video: In order to get good optical performance, inspection


of fiber end faces is very important for your network. You need to look for scratches
or any other type of contamination that will interfere with the transmission of the

39
optical signals. This piece of equipment will magnify any issues and allow you to
easily detect contamination and polish quality.

Figure 23

Figure 23: Inspection Microscope/Video

SQL(STRUCTURED QUERY LANGUAGE)


SQL (Structured Query Language) is a powerful tool in data science that is used to
manage and manipulate large sets of data stored in relational databases. SQL is a standard
language used in the industry for managing and querying data from various database
systems.

In data science, SQL is commonly used to:


● Retrieve data: SQL allows users to retrieve data from a database using a SELECT
statement. This statement can be used to retrieve specific columns or rows of data based
on specific conditions.
● Clean and transform data: SQL can be used to clean and transform data by
modifying the data in the database. This includes updating, deleting, and inserting data.
● Aggregate and summarise data: SQL allows users to perform aggregate functions
such as SUM, COUNT, AVG, MIN, and MAX on a large set of data to obtain summary
statistics.

40
● Join tables: SQL enables users to join two or more tables based on a common column
to combine data from multiple sources.
● Analyse data: SQL can be used to analyse data by performing complex queries that
involve multiple tables and conditions. This can include identifying patterns, trends, and
outliers in the data.

Terminologies In SQL
● Database: A database is a collection of related data that is organised and stored in a
structured way. It can be created using the CREATE DATABASE statement.

Example:
-- Create a database named 'mydatabase'
CREATE DATABASE mydatabase;
● Table: A table is a collection of related data organised into rows and columns. It can be
created using the CREATE TABLE statement.

Example:
27-- Create a table named 'customers' with columns for name, email, and phone number
CREATE TABLE customers (
name VARCHAR(50),
email VARCHAR(50),
phone VARCHAR(15)
);

● Column: A column is a vertical entity in a table that represents a specific attribute of


the data being stored. It can be created using the ALTER TABLE statement.
Example:
-- Add a column named 'age' to the 'customers' table
ALTER TABLE customers ADD age INT;

41
● Row: A row is a horizontal entity in a table that represents a single record or instance
of the data being stored.
Example:
-- Insert a new row into the 'customers' table
INSERT INTO customers (name, email, phone, age)
VALUES ('John Smith', 'john@example.com', '555-1234', 30);

● Primary key: A primary key is a column or set of columns in a table that uniquely
identifies each row in the table. It can be defined using the PRIMARY KEY constraint.
Example:
-- Add a primary key constraint to the 'customers' table on the 'id' column
ALTER TABLE customers ADD CONSTRAINT pk_customers PRIMARY KEY (id);

● Foreign key: A foreign key is a column or set of columns in one table that refers to the
primary
key of another table. It can be defined using the FOREIGN KEY constraint.
Example:
-- Create a foreign key constraint on the 'orders' table that references the 'customers'
table
ALTER TABLE orders ADD CONSTRAINT fk_orders_customers FOREIGN KEY
(customer_id) REFERENCES customers(id)

MYSQL
MySQL is an open-source relational database management system (RDBMS) that is
widely used for web applications and other data-driven applications. MySQL is a popular
choice for many organisations because it is free to use, easy to install, and can be used on
a wide range of operating systems. MySQL is designed to store and manage structured
data in tables, which are organized into rows and columns. Each column in a table is

42
defined with a specific data type, such as integer, string, or date. Rows in a table
represent individual records, and each row contains data values for each column in the
table

PROJECTS IN MYSQL
USE mydb;
CREATE TABLE employees (
employee_ID INT,
first_name VARCHAR(50),
last_name VARCHAR(50),
hourly_pay DECIMAL(5, 2),
hire_date DATE
);

USE MIDEDB;

SELECT Customer_Name, SUM(Unit_Price)


FROM EXCELDATA
WHERE Customer_Name != 'Muhammed MacIntyre'
GROUP BY Customer_Name;

USE MIDEDB;

SELECT Product_Category, SUM(Sales) , 0.05 * SUM(Sales)


FROM EXCELDATA
GROUP BY Product_Category;

USE MIDEDB;

SELECT COUNT(Profit)
FROM EXCELDATA

43
WHERE Profit = 0;

MICROSOFT EXCEL(MS EXCEL): MS Excel is a spreadsheet program where one


can record data in the form of tables. It is easy to analyse data in an Excel spreadsheet.it
is a commonly used Microsoft Office application.

44
CHAPTER FOUR

WORKDONE AND CHALLENGES ENCOUNTERED


During my Industrial training I acquired new skills in different skill such as:

1. Computer Hardware and Networking


2. Splicing of fibre optics cable
3. Database management using mysql and excel

Computer Hardware and Networking: I can now setup a ethernet cable and know correct
colour code used in setting it up. I also know how to run a continuity test as this was done when
there was an issue with switch at the shelter and it was having a problem with the rectifier which
was caused by the humidity and so we had to make use of outdoor unit(ODU). i also learnt how
to detect issues with a port in the switch by running test with a system.

Figure 23: Using an ODU to test power in a port

45
Figure 24: Inspecting a switch

Figure 25: Testing a port

46
Splicing of fibre optics cable: I learnt about the the fibre path in which the fibre optic
cable is laid and was shown the fibre patch panel and what it does how it connects
multiple fibre optical fibre cables and optical equipment. I also learnt about fiber optic
splicing which involves joining two fiber optic cables together. Fiber splicing typically
results in lower light loss and back reflection than termination making it the preferred
method when the cable runs are too long for a single length of fiber or when joining two
different types of cable together, such as a 48-fiber cable to four 12-fiber cables. Splicing
is also used to restore fiber optic cables when a buried cable is accidentally severed.

Figure 26: Splicing of cable

47
Database management using mysql and excel : I learnt how to create a database with
mySQL workbench and how to use data from microsoft excel in mySQL to create a
database

Challenges Encountered

During my Industrial Training, I experienced some challenges, which are.

a. The intense traffic on my way home was a serious challenge, most times I
spend almost 1 hours 30 minutes in traffic, and I have to get up early the next
morning.
b. Learning about implementation of LAN was really difficult for me cause it
was really complex .
c. Standing in inside of staff buss.
d. Learning how to use excel.

48
CHAPTER FIVE

CONCLUSION AND RECOMMENDATIONS


In conclusion, I consider myself very privileged not only to have been a part of this
insightful training but also to have been attached with ministry of science and technology
and strongly believe that the knowledge and skills acquired from the infrastructure
support unit will be very instrumental in my career, especially in the Computer industry.
The experiences I was exposed to was a great deal that I would not have ordinarily gotten
them from anywhere else because I had an added advantage of interacting with and
questioning professional engineers, well vast in their various fields, and they always gave
satisfactorily answers without any ado. Summarily, this experience has helped bridge the
gap between theoretical knowledge and the practical applications which I lacked prior to
my coming for the SIWES programme.

RECOMMENDATION
I believe that I was able to get the best from SIWES but then, I will like to make some
recommendations which could improve the quality of the training.
For students going on I.T., they should look forward to the SIWES as an avenue to
consolidate on the theoretical knowledge already acquired in the classrooms. The
programme shouldn’t be taken with little or no seriousness as it could, most likely will,
be a turning point in the career and even be a foundation to something very big to their
lives and career.
Furthermore, the students should not oblivious of the fact that whatever that is worth
doing at all is worth doing well; the students should not convert the Industrial training to
a period whereby they just want to make money. The learning process should be
considered first before any other thing. However, it is only a student who has acquired
enough knowledge, experience and information about his course that can thrive and get a
good job and be useful to the society too.
For the University, I would propose that the university management and the department
of Electrical/Electronic Engineering and Computer Engineering make it a norm for her
students to undergo SIWES at least twice before they complete their five years in the
university. I will also suggest that the school create a mutual relationship with a number
of industries to accept more of her students for I.T. placements with accommodation,
transportation and monetary support. I also would propose more frequent impromptu visit
of the school supervisors so as to ensure that students are able to fully comprehend the
theoretical work done in school, knowing fully well that the hunt for getting a placement

49
for some people takes up to a month or more which shouldn’t be so. Hence, I implore the
university to create strong ties with neighbouring industries

REFERENCES

1. IEEE Standards Association. (2018). IEEE 802 LAN/MAN Standards Committee.


Retrieved from https://standards.ieee.org/committee/802/
2. Senior, J. M. (2008). Optical Fiber Communications: Principles and Practice.
Prentice Hall
3. Chapple, Mike. "Introduction to Structured Query Language (SQL)." Lifewire,
December 10, 2021. https://www.lifewire.com/sql-101-1019258
4. LaVelle, Michael. "The Top 7 Benefits of Learning SQL." Udacity, March 4, 2022.
https://www.udacity.com/blog/2022/03/top-benefits-of-learning-sql.html

50

You might also like