0% found this document useful (0 votes)
18 views62 pages

INTERNSHIPREPORT

The document discusses the Student Industrial Work Experience Scheme (SIWES) in Nigeria. It provides background information on SIWES, including its history, aims, objectives and participating institutions. It also describes the author's activities during their six-month internship at the ICT Unit of Yobe State University, including web development, networking, and computer hardware maintenance.

Uploaded by

training
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
0% found this document useful (0 votes)
18 views62 pages

INTERNSHIPREPORT

The document discusses the Student Industrial Work Experience Scheme (SIWES) in Nigeria. It provides background information on SIWES, including its history, aims, objectives and participating institutions. It also describes the author's activities during their six-month internship at the ICT Unit of Yobe State University, including web development, networking, and computer hardware maintenance.

Uploaded by

training
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 62

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/373833804

INTERNSHIP REPORT

Presentation · February 2016


DOI: 10.13140/RG.2.2.19108.45440

CITATIONS READS
0 1,281

1 author:

Yusuf Auwal Sani


Universidade Lusófona
4 PUBLICATIONS 0 CITATIONS

SEE PROFILE

All content following this page was uploaded by Yusuf Auwal Sani on 11 September 2023.

The user has requested enhancement of the downloaded file.


YOBE STATE UNIVERSITY, DAMATURU

STUDENTS INDUSTRIAL WORK EXPERIENCE


SCHEME (SIWES) REPORT-CSC 3690
WITH
ICT UNIT, YOBE STATE UNIVERSITY, DAMATURU
BY
YUSUF AUWAL SANI
U/CS/13/219

SUBMITTED TO SCHOOL OF SCIENCE, COMPUTER


SCIENCE DEPARTMENT

IN PARTIAL FULFILMENT FOR THE AWARD OF


BACHELOR DEGREE (B.Sc.) IN COMPUTER SCIENCE, YOBE
STATE UNIVERSITY, DAMATURU.

FEBRUARY, 2016
i
CERTIFICATION

This is to certify that Yusuf Auwal Sani with Registration Number U/CS/13/219 of
computer science Department, Yobe State University, Damaturu, has undergone
his six (6) month industrial work experience scheme (SIWES) at Information
Communication Technology Unit Yobe State University, Damaturu, from 1 st June,
2016 to 15th December, 2016.

Head of Department’s Signature: ……………… Date: ……………………

ii
DEDICATION

This write up is dedicated to all people that helped me in my life.

iii
ACKNOLODGEMENT

I thank Almighty ALLAH (SWT) for giving me the opportunity to carry out
this work. I also wish to express me profound gratitude to my Head of Department
and SIWES supervisor in person of Dr. Mahdi Alhaji Musa, My internal supervisor
Mr. Ibrahim Muhammad, industrial Based Supervisor ; Engineer Farouq
Muhammad Aliyu for taken their time to supervised me during the period of my
training.

I also express my appreciation to the SIWES coordinator, Yobe State


University, Damaturu; Mallam Iliya Audu, and to my Role model in person of
Engineer Farouq Muhammad Aliyu for taking his time despite his busy schedule to
train me.

I will also like to acknowledge the effort of my colleagues Falmata Modu,


Abubakar Habu Umar Gabus, Musa Lawan Tikau (ATBU. Bauchi), Usman A.
Usman, Muhammad Gidado Ibrahim, Tijjani Iliya, Abubakar Suleiman
Muhammad, Muhammad Kachalla Koriyel, Hajiya Yagana Alhaji Bukar, Mai
Kolo Muhammad, Suleiman Shehu Turah, Fatima Zannah Bukar,Musa (Tailor
Master) , Salisu Suleiman Musa, Suleiman Widah and Habiba Hussaini for their
support, cooperation, understanding and team work.

iv
TABLE OF CONTENTS

TITLE PAGE………………………………………………………………… i
CERTIFICATION …………………………………………………………... ii
DEDICATION …………………………………………………………….… iii
ACKNOLEDGMENT………………………………………………………... iv
TABLE OF CONTENTS …………………………………………………….. v
CHAPTER ONE: GENERAL INTRODUCTION…………………………….1
1.1 ABOUT THE SIWES…………………………………………………...1
1.1.0 Brief overview of Industrial Program…………………………… 1
1.1.1 Brief History of Industrial Training (IT) Program ……………….1
1.1.2 Aims of Industrial Training Fund ………………………………...3
1.1.3 Objective of the Industrial Training Fund ………………………..3
1.1.4 Functions of Industrial Attachment Program……………………..4
1.1.5 Conclusion ………………………………………………………..4
1.2 BRIEF HISTORY OF YOBE STATE UNIVERSITY ICT UNIT……...5
1.3 ORGANIZATIONAL CHART………………………………………….7
1.4VARIOUS DEPARTMENTS AND THEIR FUNCTIONS……………..7
CHAPTER TWO: ACTIVITIES DURING MY SIWES PERIOD……………8
2.0 INTRODUCTION……………………………………………………....8
2.1 WEB DEVELOPMENT………………………………………………...8
2.1.0 Web development using Joomla! ………………………………….10
2.1.1Basics of Joomla CMS……………………………………………...10
2.1.2 Joomla features …………………………………………………….11
2.1.3 Advantages of Joomla……………………………………………….12
2.1.4 Disadvantages of Joomla…………………………………………….13

v
2.1.5 Installing Joomla……………………………………………………..13
2.1.6 System Requirement for Joomla……………………………………….13
2.1.7 Set Up Wizard………………………………………………………….14
2.1.8 Joomla Architecture…………………………………………………….18
2.1.9 Control Panel …………………………………………………………..20
2.2 GLOBAL SYSTEM OF MOBILE NETWORKS…………………………….24
2.3 COMPUTER NETWORKS…………………………………………………..31
2.3.0 Classifications of computer networks…………………………………..32
2.3.1 Computer network topology……………………………………………35
2.3.2 Transmission Media and Cabling……………………………………….38
2.3.3 Making of a crossover and straight through Cable………………...……41
2.3.4 Networking Hardware………………………………..…………………47
2.4 COMPUTER HARDWARE MAINTENANCE…………………………….. 48
CHAPTER THREE: PROBLEMS ENCOUNTERED AND RELEVANCE OF
SIWES ………………………………………………………………………… ...53
3.0 PROBLEMS ENCOUNTERED DURING MY SIWES PERIOD…………...53
3.1RELEVANCE OF SIWES ACTIVITIES……………………………………..53
CHAPTER FOUR: RECOMMENDATIONS AND CONCLUSION……………54
4.0 RECOMMENDATIONS……………………………………………………...54
4.1 CONCLUSION……………………………………………………………….54
REFERENCES……………………………………………………………………55

vi
CHAPTER ONE

GENERAL INTRODUCTION

1.1 ABOUT THE SIWES

1.1.0 BRIEF OVERVIEW OF THE INDUSTRIAL PROGRAM

The Student’s Industrial Works Experience Schemes (SIWES) is meant to


expose students to their fields of endeavor. It equips them with experience and
better understanding of learning which they must have acquired the theoretical
background.

At working site one could see, feel and touch machines, equipment and get to
know more of safety measures. It creates competence in a person and generates
room for learning and adjustment.

The Industrial Program is a vital component of training in all the universities.


Basically, it has dual advantage of molding students for their career in life after
graduation and consequently, to enable the students to produce the best of their
undergraduate research projects.

The students work experience scheme brings to the knowledge of students the
much needed experience of handling machineries, with practical.

1.1.1 BRIEF HISTORY OF INDUSTRIAL TRAINING (IT) PROGRAM


The SIWES program was established by the ETF in 1973 to solve the problem
of lack of adequate practical skills preparatory for employment in industries by
Nigerian graduates of tertiary institutions. The scheme exposes students to industry
based skills necessary for a smooth transition from the classroom to the world of
work. It affords students of tertiary institutions the opportunity of being

1
familiarized and exposed to the needed experience in handling machinery and
equipment which are usually not available in the educational institutions.
Participation in SIWES has become a necessary pre-condition for the award of
Diploma and Degree certificates in specific disciplines in most institutions of
higher learning in the country, in accordance with the education policy of
government.
i. Operators - The ITF, the coordinating agencies (NUC, NBTE, NCCE),
employers of labor and the institutions.
ii. Funding - The Federal Government of Nigeria
iii. Beneficiaries - Undergraduate students of the following: Agriculture,
Engineering, Technology, Environmental, Science, Education, Medical
Sciences and Pure and Applied Sciences.
iv. Duration - Four months for Polytechnics and Colleges of Education, Six
months for the conventional Universities and one year for universities of
technologies.
v. Highlight Number of Participating Institutions:

Universities 34

Polytechnics 65

Colleges of Education 59

158

vi. Average number of students scheduled to participate in SIWES from


Universities, Polytechnics, and Colleges of Education annually is about
78,000.

2
Going by the decree of the Federal Government, it becomes generally imperative
to all Nigerian Universities to encourage and observe industrial training as part of
their training programs.

1.1.2 AIMS OF INDUSTRIAL TRAINING FUND

It aimed at exposing students to machine and equipment, professional work


methods and ways of safe- guiding the work areas and workers in industrial and
other organizations. The scheme is a program that involves the students, the
universities (institutions and the industries (Employers of Labor)). It promotes
social understanding, technological acquisition and articulate labor force needed
for vibrant economy.

1.2.3 OBJECTIVE OF INDUSTRIAL TRAINING FUND

The main objectives of ITF are to:

i. Provide an avenue for students in the Nigerian Universities to acquire


industrial skills and experience in their course of study.
ii. Prepare students for the work situation they are likely to meet after
graduation.
iii. Expose students to work methods and techniques in handling equipment and
machinery that may not be available in the universities.
iv. Provide students an opportunity to apply theoretical knowledge in real
work situation and actual practice.
v. Make transition from university to the place of work and thus enhance
student’s contact for later job placement after graduation.
vi. Enlist and strengthens employers involvement in the entire educational
process of preparing university graduates for employment in industries.

3
1.1.4 FUNCTIONS OF INDUSTRIAL ATTACHMENT PROGRAMME

i. It enables the students to study the practical aspect of their profession.

ii. It gives students a privilege to mix up with professionals graduate


during their industrial training.

iii. It gives students an idea of the relevant ministries or private organization that
can suit their profession. It creates an opportunity for students to be acquainted
with important persons.

1.1.5 CONCLUSION

It is of great importance to note that if necessity is the mother of all invention


and that if the world is of improvement, then one cannot afford to graduate through
a university without having an experience of Students Industrial Works
Experiences. This is to say that Industrial Training (IT) should be part and parcel
of all prospective universities in this world of technological challenges.

4
1.2 BRIEF HISTORY OF YOBE STATE UNIVERSITY ICT UNIT
The history of the university ICT unit dates back to the inception of the
university itself. The idea to establish a state University in Yobe State was first
muted by the administration of Alh. Bukar Abba Ibrahim, the then Executive
Governor of Yobe State.
The government clearly expressed her determination to provide sound and
qualitative education in the state. It aims at establishing a good tertiary institution
for thousands of our Senior Secondary School Certificate holders at a time of
stiffer competition for admissions into institutions of higher learning to which
Yobe State is catchment.
The current number of Universities in the country can hardly accommodate
more than 20% of the total number of candidates seeking admissions each year.
Unfortunately, candidates including Yobe State indigenes who have met the
requirements for admission into universities were left roaming the streets, largely
due to inadequate spaces in the existing universities. This situation readily called
for the need to establish a state own university in Yobe State.
The State under the leadership of His Excellency the then Executive Governor,
Alh. Bukar Abba Ibrahim decided to establish a university named Bukar Abba
IbrahimUniversity at its take off, now Yobe State University. To achieve this, he
immediately constituted a Planning Committee under the chairmanship of Prof.
Muhammad Nur Alkali in January 2006, to plan and prepare the takeoff of the
State University. The committee immediately commenced action. The Academic
brief the Law establishing the University
and the Master Plan were produced and approved by the National Universities
Commission (NUC). The University is planned for twenty five (25) year period
and provides the details of the Vision, Mission, Philosophy, Objectives,
Administrative structure and Research Policy of the University. The brief captures
5
the Faculties, Departments and Courses that the University in the first ten (10)
years of its existence as well as the resources required to run the university during
the same period.

The University was established by Law which was enacted by the Yobe State
House of Assembly on 20 September, 2006 and was recognized by the
National Universities Commission (NUC) in October, 2006. More so, the
University commenced academic activities in January, 2007 with Remedial
Programme and fourteen (14) undergraduate programmes domiciled in
fourteen (14) Departments and four (4) Faculties which were later
merged to two (2) faculties i.e. Faculty of Arts/Social and Management
Sciences and faculty of Science.

Due to change of policy stand in education by the state government the


degree program was suspended to enable government improve on the
infrastructural base of the University within (2) years. However, during this
period, a School of Basic Studies was established, to train students to have the
pre-requisite Advanced Level requirements for entry into various Universities.
Nonetheless, the State Government in its determination to give qualitative
education to its citizens redeemed its pledge in 2009 by restoring degree
programs and university in 2009/2010 academic session commenced degree
programs with admission of 500 students into various Departments of the
two faculties. Furthermore, in 2010/2011 and 2011/2012 academic
sessions the University also admitted about five hundred students (500) into
various degree programmes of the University respectively. However, the
Pre-Degree or Remedial Program has been in existence since 2006.(Student
Affairs,Nov,2013)
Most of the academic and non-academic activities in the university rely on

6
information and this information can be passed on more reliably and faster
through the use of computer systems and other computer accessories like the
internet, intranet etc. Thus there is the need to have a section or a unit within
the university that will see to the procurement, distribution, installation, and
overall maintenance of these computer systems and their related accessories.
This is where the ICT unit of Yobe State University comes into play.
The ICT unit is directly under the Vice Chancellor of the university and
is headed by the ICT committee chairman. The unit manages the university’s
computer Centre, Management Information System (MIS), as well as the
university e-library and all other Computer and Information Technology
related issues.

1.3 ORGANIZATIONAL CHART

VICE CHANCELLOR

ICT/MIS UNIT

COORDINATOR TECHNICAL OFFICER SYSTEM ANALYST OTHERS

1.4 VARIOUS DEPARTMENT AND THEIR FUNCTIONS

The Yobe State University ICT unit has no departments and its primary
responsibility is the maintenance of the website, registration portal, e-library as
well as handling all issues relating to computers, the internet, intranet and
communication of information throughout the university.
7
CHAPTER TWO

ACTIVITIES DURING MY SIWES PERIOD

2.0 INTRODUCTION

During the course of my Industrial Attachment (IT) at Information


Communication Technology Centre (ICT) Yobe State University, I was engaged in
so many activities such as Web development, GSM networks, computer networks,
computer maintenance and trouble shooting, solar power installation and
upgrading, and some theoretical aspect of computing which are immensely related
to the practical skills acquired.

This chapter discussed all the work done and what I learned during my training
exercise.

2.1 WEB DEVELOPMENT

Web development broadly refers to the tasks associated with development of


web site for hosting via internet or intranet. The web development process includes
web design, web content development, client-site/server-site scripting and network
security configuration, among other tasks. On the other hand, web development is
the coding or programming that enable website functionality, per the owner’s
requirement. It mainly concerned with the non-design aspect of building website,
which include coding and writing markup.

Web development ranges from creating plain text pages to complex web based
applications, social networks applications and electronic business application.
(Techopedia, 2016)

8
Web development hierarchy is as follows:

i. Client-site coding
ii. Server-site coding , and
iii. Database technology

The Yobe State University ICT unit as mentioned in the previous chapter,
has the responsibility of maintaining the website, registration portal, e-
library as well as handling all issues relating to the web, internet and
networking throughout the university. Moreover, at the commencement the
IT my colleagues and I were assigned to development a website to each
department in the university, in which each can be linked to the main
university website on completion.

In my own case, is was ask to developed a website for English language


department of the university, which can incorporate all information
regarding both academics and non-academic staffs; such as name,
qualifications, rank, designation, area of research interest(Academics
only),phone number, contact address and e-mail address. However, the
website should also include admission requirements, departmental journals
and researches, tutorial and course material as well as the departmental
handbook respectively. To take tour visit: www.eng.ysu.edu.ng

Furthermore, a lot of web development technologies emerged over last


decades from static web scripting languages such as HTML to dynamic and
interactive scripting languages like DHTML, JavaScript, VBScript, JQuery,
Ajax as well as Database driven application development programming
languages such as PHP, Perl, Ruby etc. Basically, there are two (2)
paradigms in developing a website:

9
i. Web development from scratch and
ii. Web development using content management system (CMS)

The choice of what approach to use is most often at the developer’s


discretion, with regard to software engineering issues such as
maintainability, reliability, robustness, user friendliness, cost effectiveness,
security, and on time delivery. To satisfy the aforementioned software
qualities especially maintainability and to minimize the development time I
opt the use Content Management System which are mainly created to
addressed such issues.

The beauty of using CMS in not only limited to development aspect,


but rather it reduces the cost of hiring expert to update the side content
whenever the need arises. CMS provide a WYSIWYG editor at the back end
to enable web administrator with little or no training to simple update the
website, unlike the one used in the traditional method where updates are
only accomplished via FTP application which required some technicalities.

2.1.0 WEB DEVELOPMENT USING JOOMLA!

2.1.1 Basics of Joomla CMS

Joomla is a free system for creating websites. It is an open source project,


which, like most open source projects, is constantly in motion. It has been
extremely successful for seven years now and is popular with millions of
users worldwide.
The word Joomla is a derivative of the word Jumla from the African
language Swahili and means "all together".
The project Joomla is the result of a heated discussion between the Mambo
Foundation, which was founded in August 2005, and its then-development
10
team. Joomla is a development of the successful system Mambo. Joomla is
used all over the world for simple homepages and for complex corporate
websites as well. It is easy to install, easy to manage and very reliable.
The Joomla team has organized and reorganized itself throughout the last
seven years to better meet the user demands.

Joomla is written in PHP, uses object-oriented programming (OOP)


techniques (since version 1.5) and software design patterns, stores data in a
MySQL, MS SQL (since version 2.5), or PostgreSQL (since version 3.0)

database, and includes features such as page caching, RSS feeds, printable
versions of pages, news flashes, blogs, search, and support for language
internationalization.(Wikipedia, 2016)

Fig. 1.0: Diagram showing how Joomla CMS works.

2.1.2 Joomla features

Joomla has its own powerful build-in features, the core features are:

i. User Manager: It allows managing the user information such as


permission to edit, access, publish, create or delete the user, change the
password and languages. The main part of the user manager is
Authentication.

11
ii. Content Manager: It allows managing the content using WYSIWYG
editor to create or edit the content in a very simple way.
iii. Banner Manager: It is used to add or edit the banner on the website.
iv. Template Manager: It manages the designs that are used on the website.
The templates can be implemented without changing the content
structure within a few seconds.
v. Media Manager: It is the tool for managing the media files and folder in
which you can easily upload, organize and manage your media files into
your article editor tool.
vi. Contact Manager: It allows adding contacts, managing the contact
information of the particular users.
vii. Web link Manager: The link resources are provided for user of the site
and can be sorted into categories.
viii. Search: It allows creating menus and menu items and can be managed
subsequently. You can put menu in any style and multiple places.
ix. RSS: It stands for Really Simple Syndication, which helps your site
contents and RSS files to be automatically updated.

2.1.3 ADVANTAGES OF JOOMLA

i. It is an open source platform and available for free.


ii. Joomla is design to be easy to it install and setup even if you are not
advanced user.
iii. It is very easy to edit content with the help of what you see is what you
get (WYSYWIG) editor.
iv. It allows the safety of data content and does not allow anyone to edit the
data.
v. By default, Joomla is compatible to any browser.

12
2.1.4 DISADVANTAGES OF JOOMLA

i. Joomla is not much SEO (Search Engine Optimization) friendly


ii. It make website heavy to load and run
iii. Plug ins and module are not free in Joomla
iv. Development is more difficult to handle when changing the layout
v. It gives compatibility problems while installing modules, plugins and
extensions simultaneously.

2.1.5 INSTALLING JOOMLA

There are two way of installing a Joomla CMS, there are:

i. Installing a Joomla online on hosting account


ii. Installing Joomla offline on a local server

However, in the course of my training I opt to learn how to installed a Joomla


on a local machine so as to familiarized myself with some obscured
requirements of Joomla when installing online since the hosting account
provide everything needed for the installation, what is left out is to filled the
required field and click the next button to completion.

2.1.6 SYSTEM REQUIREMENT FOR JOOMLA

i. Database: MySQL 5.1 +


ii. Web Server
 WAMP (Windows)
 LAMP (Linux)
 XAMP (Cross-Platform)
 MAMP (Macintosh)
 Microsoft IIS
13
iii. Operating system: Cross- Platform
iv. Browser support: Internet Explorer 7, Firefox and Google Chrome
v. PHP compatibility : PHP 5.4 +

When we open the link http://www.joomla.org/download.html, we will get to


see the link below:

Fig 1.1: Joomla download/ upgrade link

2.1.7 SET UP WIZARD

The following steps describe how to setup Joomla locally on a personal


computer.

Step 1: Extract the downloaded Joomla folder and upload it on the web server
or local host.

Step 2: Open the browser and navigate to Joomla file path, then we can get the
first screen of Joomla installer as shown below. In my case the path is local
host/ Joomla folder.

14
Fig 1.2: Main configuration screen

It contains the following fields

i. Site Name: I entered the name of the site which I am going to create in
Joomla.
ii. Description: Add a small description about the site.
iii. Admin Email: Enter your email address which helps to recover our
password or any update.
iv. Admin Username: Enter the username as per your choice while
logging into Joomla.
v. Admin Password: Enter password to protect your site.
vi. Site Offline: It specifies whether your site should be offline or online
after completion of installation by clicking on Yes/No.
After filling all the information, I clicked on the Next button.

Step 3: The screen below asked to enter information about the MySQL
database.

Fig 1.3: Database configuration screen

It contains the following fields


15
i. Database Type: this field allows me to select the database type, it is
MySQLi by default.
ii. Host Name: this is where to write the host name, by default it will be
local host.
iii. Username: this is where I entered the username of MySQL database.
iv. Password: this is where I type the password for my database.
v. Database name: this is where I entered the name for me database I
created for the MySQL database for Joomla.
vi. Table prefix: It is used to add prefix in the database tables which helps
to run multiple sites on the same database. It takes the default value.
vii. Old database process: This gives two options backup or remove. If
you had already created a database then you can either remove it or
select the backup option to create the backup of the whole database
information. After filling the whole information, I clicked on the next
button.

Step 4: This step was my last page of installation process.

Fig 1.4: Finalization screen

Here is where I viewed all the information I added in the previous


installation stages. I choose default English (GB) sample data as an example to
build my website and clicked on install button.
16
Step 5: Next, Joomla starts installation process on my machine.

Fig 1.5: Installation screen

Step 6: After few minutes, installation was successfully, and the following
screen was shown.

Fig 1.6: Congratulation screen.

Next, I clicked on the “Remove installation folder” button which will help
protect my site, so that no other person can re-installed it.

Note: I encounter installation problem, where the Step 5 got stuck and does not
completed for more than an hour. I followed the procedures below in resolving
the problem:

i. Open the Joomla folder


ii. Installation

17
iii. Sql folder
iv. MySQL folder Open joomla.sql files and I found the following term:
"ENGINE=InnoDB". I Replace this term with "ENGINE=MyIsam" and
I save the file.
Before MySQL 5.5.5, MyIsam is the default storage engine.
(The default was changed to InnoDB in MySQL 5.5.5.)
Then the installation began.

2.1.8 JOOMLA ARCHITECTURE

Joomla is a model view controller web application. After I installed


Joomla is was so curious to know more about the design model of the
application, as result, I came up with the following skeletal diagram,
representing the architectural style of Joomla.
JOOLA FRAMEWORK

COMPONENT

WEB BROWSERS
S
TEMPLATES

MODULES
Database

PLUGINS

Fig 1.7: Joomla Architecture

The architecture of Joomla contains the following layers:

 Database

18
 Joomla framework
 Component
 Modules
 Plugin
 Templates
 Webserver

Database: is a collection of data and can be stored, manipulate and organized in a


particular manner. The database stores the user information, content and many
more required data of the site.it use to store administrative information to manage
Joomla site. Using Joomla database layer, it ensures maximum flexibility and
compatibility of extensions.

Joomla Framework: framework is collection open source software, where the


Joomla CMS is built. It is built for more flexibility and breaks the framework into
single modular packages which help each package to develop more easily.

Components: Components are considered mini applications. It consists of two


site, that is the administrator and site. When every application is loaded,
component is been called to render the body of the main page. The administrator
part manages s different aspect of component and the site part helps in rendering
the pages when request is made by site visitors. Components are main functional
unit of Joomla.

Modules: modules are extensions which are used to render pages to Joomla. It
frequently looks like boxes such as login module. In Joomla administrator the
modules are managed by the module manager. It displays the new content images
when a module linked to Joomla components.

19
Plugin: This is also a kind of Joomla extension; it is very flexible and powerful for
extending the framework. It contains a bit of codes that used to execute the
particular event trigger. It is commonly, used to format the output of a component
or module when the page is built. The plugin function which is associated with
event executed in sequence when particular event occurs.

Templates: Template determines the look of the Joomla website. There are two
type of template used, there are; Front-end and Back-end. The back-end template
is used to control the functions by the administrator whereas; the front end
template is the way to represent the website to the users. Templates are easy to
build and customized a website.

Web browser: It is a server where the user interacts. It delivers the web pages to
the client. The HTTP (Hyper Text Transfer Protocol) is used to communicate
between the client and the server.

2.1.9 CONTROL PANEL

The control panel provides default features and functions of Joomla to


access through clickable icon, menu bar etc. when I log into the Joomla control
panel, the following screen was displayed on the browser window:

20
Fig 1.8: Joomla back-end

The control panel consists of difference sections which include:

 Article content
 Structure format
 User information
 Set the configuration
 Install extension and
 Maintenance

Article content: there are four icons under the content section as shown below:

 Add New Article: It creates a new article page.


 Article Manager: It manages all present articles.
 Category Manager: It creates new categories and helps in
publishing/publishing the categories.
 Media Manager: It manages the modules such as location and functions of
modules that are installed on the site.

Structure Format: in structure section there are two groups of icons:

 Menu Manager: Menu manager allows the creating custom menus for
website and navigating through the website.
 Module Manager: It manages the module such as location and function of
modules that are installed on the site.

User Information: under user section, there is one icon located:

 User Manager: It manages the user information, which allows creating and
deleting the user, changing passwords, time and languages.

21
Set the configuration: Three icons are located under this configuration section as
given below:

 Global Configuration: This is an important part of Joomla back-end. Any


changes made in this configuration, will affect the entire website.
 Template Manager: It manages the template used in the website.
 Language Manager: It manages installed language by setting the default
language for your site.

Installed Extension: There are many extensions available in Joomla, different


kind of extensions can be installed to extend the functionality of the site.
(TutorialsPoint, 2016)

However, the aforementioned features were used in development of English


Language website which I was charged to accomplish as a part of my IT activities.
Below screen shot of some of the work accomplished so far:

Fig 1.9: English language department website (Home page)

22
Fig 1.10: Academic staff profile page

Fig 1.11: Location page

23
2.2 GLOBAL SYSTEM OF MOBILE (GSM) NETWORK

This section would cover some aspect and concept of mobile communication
system which I leaned during the period of my industrial attachment through a
three days working with Huawei Company to upgrade GLO Base transceiver
station (BTS) at Yobe State University Cell Site opposite ICT unit.

In simple terms, a cell site depicts a place where antenna and electronic
communication equipment are located, usually on tower or on other high place to
create cell (or adjacent cells) in cellular network. This exalted structure includes
antennas set of transmitters and receivers, control electronics, electrical power
backups or electrical generator set and sheltering. In GSM networks, the cell site is
term as base transceiver station (BTS) which reflects the increasing number of
locations for multiple mobile operators and multiple base stations at a single site.
Defending upon the technology used by mobile operators, even if a single site has
only one mobile operator, then also it includes multiple base stations to serve
various wireless technologies.

Among various terms used in mobile telephony, the most used will be
discussed here.

Mobile Station: the mobile station (MS) communicate the information with the
user and modifies it to the transmission protocols of the air interface to
communicate with the BSS. The user information communicates with the MS
through microphone and speaker for speech, keyboard and display for short
messaging and the cable connection for other data terminals. The mobile station
has two elements Mobile Equipment (ME) and Subscriber Identity Module (SIM).

Mobile Equipment: mobile equipment is a piece of hardware that customer


purchase from the equipment manufacturer. The hardware piece contains all the
24
components needed for implementation of protocols to interface with the user and
the air interface to the base stations.

Fig 1.12: Mobile Equipment (Handset)

Subscriber Identity Module: Subscriber Identity Module (SIM) is a smart card


issued at the subscription to identify the specification of the user as address and
type of service. The call in GSM is directed to the SIM rather than the terminal.

Short message Service (SMS) are also stored in the SIM card. It carries
every user’s personal information which enables a number of useful applications.

Fig 1.13: Subscriber Identity Module (SIM) cards

Base Station: Base stations (BS) transmit and receives user data. When a mobile is
Responsible for its user’s data transmission and reception, a base station is capable
to handle the calls of several subscribers simultaneously.

25
Base Transceiver Station: The user data transmission takes place between the
mobile phone and the Base Station (BS) through the base transceiver station. A
transceiver is a circuit which transmits and receives.

Fig 1.14: Huawei 3G Base Transceiver Station

26
Fig 1.15: Skeleton of a Huawei 3G Base transceiver Station

Mobile Switching Center: MSC is the hardware part of the wireless switch that
can communicate with Public Switching Telephone Network (PSTN) switches
using Signaling System (SS7) protocol as well as other MSCs in the coverage area
of the service provider. The MSC also provides for communication with other
wired and wireless networks as well as support for registration and maintenance of
the connection with the mobile stations.

The following image illustrates the parts of mobile network:

Fig 1.16: Simple Mobile Phone Network

27
Fig 1.17: Mobile Network connect to Public Switching Telephone Network

HOW MOBILE NETWORK WORKS

We first start with a handset (terminal), it has a speaker and a microphone, it


also has a codec for digitizing speech, modem for moving ones and zeros around
and an antenna and battery and of course it has a keypad and screen on it. Another
component of the terminal is the Subscriber Identity Module (SIM) which is
removable on must phones, on this card is stores some critical information, one
piece of information is the international mobile subscriber identification that
identifies users to the networks. The implication is that the users can remove the
SIM card from one phone and plug it into another phone and then the network can
know that you as a customer now use a different phone.

Also, on this is half of the encryption key pair that used to authenticate the
data in the SIM, which is important for stopping people from cloning the phone.

28
Moreover, the SIM contains a Location Area Identifier which identifies the base
station that the phone talks to. The phone is connected to base station over an air
link; the base station has three (3) main components;

One is the base station transceiver or base transceiver station sub-system, in any
case, the transceiver stations is the radio and it produces energy at GHz frequency

in form of electricity. The electricity is carry up to the second component of the


base station which is the antennas over thick co-axial cables, the thick type co-
axial cable is use in order to reduce the attenuation on the wires moving from the
ground level to the antennas. The antenna is the device that converts electricity
vibrating at GHz frequency to electromagnetic wave, also vibrating at GHz
frequency which then propagates through space at the speed of light. The last
component of the base station is tower, which is used to support the antenna up the
ground.

The base station has to be connected back to a mobile switch. The mobile
switch is a device that capable of keeping track of users moving around. This
connection from the base station into the mobile switch is called the BACKHAUL,
there to ways of implementing the backhaul; one is the fiber backhaul this occurs
when there is fiber running between the base station and the mobile switch, and the
company operating the base station is an affiliate of the phone company that owns
that fiber then there will used that fiber to connect the base station back to the
mobile switch.

In many other cases, there is no fiber available, and so what is use are dishes
pointing site way facing each other to implement the backhaul with point to point
radio link, and so we might have the communication from the base station from the
base station, back to the mobile switch goes through multiple different towers with

29
point to point radio system before it final goes back to the mobile switch. The
phones learn which base station it talking to from the base station and stores that
on the SIM card. Now when we first turn our communicator on, it programmed to
communicate a particular radio frequency, and what going to do is it going to
transmit on this frequency it international mobile subscriber identity and a bunch
of other things, and this is going to receive by the mobile switch, and the mobile
switch is going to look up whether that customer, is one of their customers, or
whether that phone is the right phone and authenticate using encryption
technology. And then there are going to see whether that customer has paid their
bill or not, and if all of the above is true then the switch is going to give indication
to the phone, over the backhaul, over the airlink saying yes you got a service.

And as part of this process, the phone would inform the switch what the
value of the location area identity on the SIM card is and the switch stores that in a
table called the Location Register, then the idea is, if somebody calls you from a
land line, there pick up the phone and punch in some numbers and that call goes
over their loop to their central office to a toll center and then to the cellular
telephone company. And the phone call would be terminated at the mobile switch.
Then the mobile switch is going to look at the location register to see which base
station that phone last registered on, it then sent a page to that base station and if
the phone is still on it going to answer the page and at this point the mobile switch
will course the caller to hear the ringing signal and the mobile switch will say to
the phone, do you want to take this phone call here is the caller ID, in other words,
the phone will start ringing and the caller ID would show on the screen, and then
when the cell phone user presses the answer button, at this point then we will have
a voice communication going from the phone, over the airlink to the base station
and then over the backhaul to the mobile switch and the switch will bridge the

30
communication internally to the connection that is has to the public telephone
network. So we have communications over the airlink to the backhaul, over
connection to the toll center, over connection to the central office and then down
the land line.

When we get into a car and then having a conversation, we drive away from
the base station, and what is going to happen is that sooner or later, the switch is
going to do a handoff, in a simplest example, that means the switch is going to stop
sending information to and listening to this base station it going to start sending
information and listening to that base station. And your phone of course has to stop
talking to that base station transceiver and start talking to the new one. With some
of the technologies actually break the connection from the first base station and
then make a new connection to the second one, and there will be period of time in
the middle when the communication drop out for seconds. But with other
technologies we actually make the connection to the second base station before
dropping the connection to the first one so that there is no interruption in the
communication. (Teracom Training Institute, 2014)

2.3 COMPUTER NETWORKS

In this section, I would elaborate on knowledge of computer networks I


learned during the period of my Industrial Attachment.

Computer network is composed of multiple connected computers that


communicate over a wired or wireless medium to share files and other resources.

Network data protocols are used to communicate on the network between


computes. The size and scalability of any computer network are determined both
by the physical medium of communication and the software controlling the
communication (i.e., the protocols).
31
The field of computer networking and today’s internet trace their beginnings back
to the early 1960s, a time at which the telephone network was the world’s
dominant communication network. The global internet’s origin was the Advance
Research Project Agency Networks (ARPANET) of the U.S Department of
Defense in 1969. Nowadays, computer networks are growing rapidly.

2.3.0 CLASSIFICATION OF COMPUTER NETWORKS

Networks can be categorized in several ways, they include classification by:

 Scale
 Connection method
 Functional relationship
 Network topology and
 Protocol

Generally, networks are distinguished based on their geographical span. A


network can be as small as distance between your mobile phone and its
Bluetooth headphone and as large as the internet itself, covering the whole
geographical world.

Personal Area Network

Personal area network or simply PAN is smallest network who is very


personal to user. This may include Bluetooth enabled or infra-red enabled
devices. PAN has connectivity range up to 10 meters. PAN may include
wireless computer keyboard and mouse, Bluetooth enabled headset, wireless
printers and TV remotes.

32
Fig 1.18: Personal area network

Local Area Network

This is a computer network that spanned inside a building and operated


under a single administrative system. Usually, Local Area Network covers an
organization’s offices, schools, universities etc. Number of systems may vary from
at least two to as much as 16 million. LAN provides a useful way of sharing
resources like printers, file servers, scanner and internet is easy sharable among
computers.

Fig 1.19: Local Area Network

33
Metropolitan Area Network

MAN, generally, expands throughout a city such as cable TV network. It can be in


form of Ethernet, Token- ring, ATM or FDDI. Metro Ethernet is a service which is
provided by Internet Service Providers. This service enables its users to expand
their Local Area Networks. For example, MAN can help an organization to
connect to all of its offices in a city.

Fig 1.20: Metropolitan Area Network

Back bone of Metropolitan Area Network (MAN) is high capacity and high speed
fiber optics. MAN is works in between Local area network and wide area network.
MAN provides uplink for LANs and to WANs or internet. (TutorialsPoint, 2016)

Wide Area Network

As name suggests, this network covers a wide area which may span across
provinces and even a whole country. Generally, telecommunication networks are
Wide Area Network. That network provides connectivity to MANs and LANs.

34
Fig 1.21: Wide Area Network

WAN may use advanced technologies like Asynchronous Transfer Mode (ATM),
Frame Relay and SONET. WAN may be managed under more than one
administration.

2.3.1: COMPUTER NETWORK TOPOLOGY

A network topology is the way computer systems or network equipment is


connected to each other. Topologies may define the both logical and physical
aspect of the network. Both logical and physical topologies could be same or
different in a same network.

Point- to- Point

Point to Point networks contains exactly to hosts. Example, computer to computer


connected to each other using a piece of cable.

35
Fig 1.22: Point- to- Point Topology

Bus Topology

In contrast to point-to-point, in bus topology all devices share single


communication line or cable. All devices are connected to this shared cable. Bus
topology may have a problem while more than one host is sending data at the same
time. Therefore, the bus topology either uses CSMA/CD technology or recognizes
one host as bus master to solve the issue. It is one of the simple forms of
networking where a failure of a device does not affect the others. But failure of the
shared communication line make all other devices fail.

Fig 1.23: Bus Topology

Both ends of the shared channel have line terminator. The data is sent in
only one direction and as soon as it reaches the extreme end, the terminator
removes the data from the line.

Star Topology

All hosts in star topology are connected to central device, known as hub device,
using a point-to-point connection. That is, there exist a point- to-point connection

36
between host and hub. The device can be layer-1 device (Hub/Repeater) or layer-2
device (Switch/Bridge) or layer-3 device (Router/Gateway).

Fig 1.24: Star Topology

As in bus topology, hub acts as a single point of failure. If hub fails,


connectivity of all hosts to all other hosts fails. Every communication happens
between hosts, goes through hub only. Star topology is not expensive as to connect
one more host, only one cable is required and configuration is simple.

Ring Topology

In ring topology, each host machine connects to exactly two other machines,
creating a circular network structure. When one host tries to communicate or sent
message to a host which is not adjacent to it, the data travels through all
intermediate hosts. To connect one more host in the existing structure
administrator may need only one more extra cable.

37
Fig 1.25: Ring Topology

Failure of any host results in failure of the whole ring. Thus every connection in
the ring is a point of failure. There exist methods which employs one more back-up
ring.

2.3.2 TRANSMISSION MEDIA AND CABLING

There are two forms of transmission media viz:

 Guided transmission media and


 Unguided transmission media

Magnetic Media

One of the more convenient ways to transfer data from one computer to another,
even before the birth of networking, was to save it on some storage media and
transfer physically from one station to another. Thought it may seem odd in
today’s world of high speed internet, but when the size of data to transfer is huge,
Magnetic Media comes into play.

Twisted Pair Cable: A twisted pair cable is made up of two plastic insulated
copper wires twisted together to form a single media. Out of those two wires only
38
one carries actual signal and another is used for ground reference. The twist
between wires is helpful in reducing noise (Electromagnetic interference) and
crosstalk.

Fig 1.26: Unshielded Twisted pair cable

There are two types twisted pair cable there are as follows:

 Shielded twisted pair(STP) cable and


 Unshielded twisted pair (UTP) cable.

STP cables come with twisted wire pair covered in metal foil. This made it more
indifferent and crosstalk.

UTP has seven categories, each suitable for specific use. In computer networks,
Cat-5, Cat-5e, and Cat-6 cables are mostly used. UTP cables are connected by
RJ45 connectors.

Coaxial Cable : Coaxial cables have two wires of copper. The core wire lies in
center and it made of solid conductor. Core is enclosed in an insulating sheath.
Over sheath the second wire is wrapped around and that too in turn encased by
insulated sheath. This all is covered by plastic cover.

39
Fig 1.27: Coaxial Cable

Because of it structure coax cables are capable of carrying high frequency signals
than the twisted pair cables. The wrapped structure provides it a good shield
against noise and cross talk. Coaxial cables provide high bandwidth rates of up to
450 mbps.

There are three categories of Coax cables namely, RG-59(Cable TV), RG-58(Thin
Ethernet) and RG-11 (Thick Ethernet) RG stands for Radio Government.
(TutorialsPoint)

Fiber Optics

Fiber optics works on the properties of light. When a light ray hits at critical angle
it tend to refract at 90 degree. This property has been used in fiber optic. The core
of fiber optic cable is made of high quality glass or plastic. From one end of it light
is emitted, it travels through it and at the other end light detector detects light
stream and convert it to electric data form.

Fiber optic provides the highest mode of speed. It comes in two modes, one is
single mode fiber and the other is multimode fiber. Single mode fiber carries single
ray of light whereas multimode is capable of carrying multiple beams of light.

40
Fig 1.28: Fiber Optic

Fiber optic also comes in unidirectional and bidirectional capabilities. To connect


and access fiber optic special type of connectors are used. These can be SC
(Subscriber Channel) and ST (Straight Tip) or MT-RJ.

2.3.3 MAKING OF A CROSS OVER AND STRAIGHT THROUGH CABLE

Basically, there are two types of cabling use in an Ethernet technology; cross-
over cables that is use to connect similar devices, example a Laptop to Laptop,
whereas, straight through cable connect to dissimilar devices such as a Personal
computer to a switch or router. However, the difference between the two lays in
the way at which the cable terminates; that is the color code arrangement of the
cable signifies it type.

Making connections – Tools

 Cat 5e cable
 RJ 45 connectors

41
 Cable stripper
 Scissors
 Crimping tool and
 Tester

An RJ-45 here RJ stands for registered jack, is an eight pin Ethernet cable
connector.

Fig 1.29: RJ-45 connector and its crimper

 Straight through Pinout: This entails the cabling standard that used to
connect a computer such as laptop to a network switch or a router.

However, there are two ANSI recognize color coding standard for a
straight through cabling, there are; Telecommunication Industrial
Association (TIA) and the Electronic Industrial Alliance (EIA). There are
jointly established to form two basic wiring scheme for a straight through
and cross over cabling, that is TIA/EIA 568A and TIA/EIA 568B. While the
former is deals with straight through color coding, the latter is for cross over
color code.

42
Fig 1.30: Straight through cabling type A and B

 Cross-over Pinout: this type cabling is so called because there is cross/


swaps between the sending and receiving signal cable at the both end of the
cable terminals or RJ 45 connectors.

Fig 1.31: Cross over Pinout


 Terminating RJ 45 connector ( Step-by-Step)
Essentially, for one to install and maintain a Local Area Network (LAN)
He/she must know the recipe of terminating RJ 45 connector. Here come the
steps:
Step 1:
Initially, use the crimper blade and trim the cable to size and make sure all
wires are trim evenly.

43
Step 2:
Avoid cutting into conductor insulation, strip off approximately 1 inch of the
cable’s jacket, using a modular crimping tool or a UTP cable stripper.

Step 3:
Sort wires by insulation colors; flatten the wires as out as much as possible,
since they will need to be very straight for proper insertion into the
connector.

Step 4:
Arrange wires, holding the cable with the wire ends facing away from you,
facing them from the following order:
44
TIA/EIA 568A: GW-G OW-Bl BlW-O BrW-Br, TIA/EIA 568B: OW-O
GW-Bl BlW-G BrW-Br.

Step 5:
Maintain wire order, left-to-right, with RJ 45 tab facing downward, and
carefully insert the flattered, arranger wires into the connector, pushing
through until the wire ends emerge from the pins. For straight of connection,
also push as much of the cable jacket as possible into the connector.

Step 6:

Do all wires extend to the end and is the sheath well inside the
connector? If not remove them from the connector, re-arrange into
appropriate order, and reinsert. Keeping in mind that once the connector in
crimp into the cable, it is permanent. However, if we find out that a mistake
has been made after crimping the cable. The whole procedure has to be
repeated again.

45
Step 7:

Insert the prepared wires into the RJ45 slot and squeeze firmly to crimp
connecter onto cable end until they cannot go any further. Release the
handle and repeat this process once more to ensure proper crimp.

Step 8:

After the first termination is complete, repeat the same procedure on the
other end other cable, or by crossing the wire to the other side in the case of
cross over cable.

After crimping the cable, the effectiveness and correctness of the cable can
be determine using a cable tester.

46
Fig 1.32: RJ 45 and RJ 11 cable tester

2.3.4 Networking Hardware

Hub: At the bottom of networking food chain, so to speak, are hubs. Hubs are used
in a network that use twisted pair cabling to connect devices. Hubs can also be
joined together to create larger networks. Hubs are simply devices that direct data
packets to all devices connected to the hub, regardless of whether the data packet is
destined for the device. This makes them inefficient devices and can create
performance bottleneck on busy networks. A hub is a layer 1 device of OSI
reference model.

Switch: Like hubs switches are the connectivity points of an Ethernet network.
Devices connect to switches via twisted pair cabling, one cable for each device.
The difference between hubs and switches is on how the devices deal with the data
that they receive. Whereas a hub forward the data it receipted to all ports on the
device, a switch forward it to the port that connect to the destination device. It does
this by learning the MAC address of the devices attached to it, and then by
matching the destination MAC address in the data it receives. Fig 1.23 shows how
a switch works. A switch is a layer 2 device of OSI reference model.

Fig 1.23: How a switch works

47
Router: A router is computer, just like any other computer including a PC.
Routers have many of the same hardware and software components that are found
in other computers including; CPU, RAM, ROM and operating system.

Fig 1.24: Integrated Service Router

Router is the basic backbone for the internet. The main function of the router is
to connect two or more than two network and forwards the packet from one
network to another. A is incorporated with Dynamic Host Configuration Protocol
(DHCP) server that automatically assign IP address to a host connect to the
network. A router is layer 3 device of the OSI reference model.

Repeater: Repeater is a layer 1device of OSI reference mode whose function is to


amplified weaken signal by a phenomenon called attenuation, which occurs after a
signal travels for a long distance.

2.3.5 COMPUTER HARDWARE MAINTANANCE

As a part of training and skills acquire during my IT also include


troubleshooting/maintaining a PC and other Networking gadgets. Below are must
of the hardware that I dealt with:

1. The Mother Board: This is a thin flat piece of circuit board (usually of
Green or Gold color). Everything in the computer connects to it directly
or indirectly. It contains special number of sockets that accept various
component of the computer (Peripherals).

48
Fig 1.25: Component of a Motherboard

2. Hard Drive: Hard drives stores programs that are not currently used by the
CPU. There are termed nonvolatile storage device, for fact that programs
stored them cannot not be loss when the system crashes or in case of power
outage.

There are numerous symptom of hard disk failure, which includes:

49
 Very Slow Performance: If computer take long time to boot and load
programs, then the hard drive is slow. Therefore disk defragmenter utility
has to run to delete unwanted file to free off space in order to improve
performance. If the problems persist, then the hard disk needs to be change
thoroughly.
 Data is losing without formatting the hard disk or deletion by the user:
if data is not deleted by user or the disk is not formatted but get loss, then
this may be due to a corrupted partition and file system. Although this type
of problem rarely occurs, but when it happens, the effects are devastating.
To solve this, software like Recuva should use to fix the issue.
 File transfer gets stuck: this is due to a bad drive sector. “chkdsk/r”
command should be run in the command prompt to fix the problem.
 The Computer is unable to boot and produces rhythmic clicking noise:
this might be sign of head crash and is very dangerous premonition to the
death of the hard drive. A full back up of the system should be done if
possible.
3. RAM: stands for Random Access Memory is a computer memory that store
programs and applications that are currently used by the CPU. It is measured
in bytes, average PC usually has between 32 megabyte/128 megabyte to 1
Giga byte of RAM (Modern PCs may have more than 1 Gigabyte of RAM.
A RAM is plug onto the motherboard through an expansion slot.

Fig 1.26: RAM Sticks

50
If there are malfunction with computer RAM one often experience the
following symptoms:
 Computer does not display anything on the screen when turn on:
this symptom is usually followed by sequence of beep sound
indicating that either the RAM is wrongly plug onto the computer or
it is complete removed from the PC.
To solve this type of problem, open the computer case and place the
RAM correctly and turn on the computer back again.
 Excessive blue screen errors: blue screen errors often occur when
there is something wrong with the memory. Although this is not
always a rule. However, if there are very random and there are not
generally reproducible, then there is probably a memory problem. If
you can reproduce the issue by clicking something, it is probably that
thing’s fault.
 Unusually slow performance: if a computer is taking long time to
open an application, first open the task manager to make sure that the
RAM is not overwhelm with processes. If it is full try closing
programs that using a lot of RAM. It that does not yield a positive
result, then you needs to upgrade the memory higher capacity or scan
the computer to check if the computer is infected by a virus.
4. The Power supply: The power supply distributes power to the motherboard
and other component in the computer.

51
The computer cannot turn on without the power supply unit functions. It is
directly connected and many other components of the computer such as
DVD drive and the Hard drive. The common problems experiences with the
power supply are:
 Computer does not turn on: since the power supply serves as a
power house of the computer. So if there is not power in the computer
component then the power supply component will be the number one
culprit. The best way to determine whether the power supply is
causing this is to listing for any sound coming from the computer. If
there is no noise coming of the fans whirring, then the power supply
may be faulty. On the other hand, if the power supply is working
properly check it connector to the mother board to ensure that it is
properly plugged.
 Insufficient Power: If the electricity supply to the power unit is not
enough or a hardware device is attached to the computer, then the
computer may not be stable. Try to plug the computer on a power
stabilizer or disconnect the new attached device and turn on the
computer back again.
 Faulty Power Supply: this often occur as a result of short circuit and
power surges. Connecting a surge computer to a surge protector on a
grounded socket to help prevent these incidents.
52
CHAPTER THREE

PROBLEMS ENCOUNTER AND RELEVANCE OF SIWES

3.0 PROBLEMS ENCOUNTERED DURING MY SIWES PERIOD

It is obvious that problems are almost always inevitable in our day to day
activities. During the period of my industrial attachment I across numerous
problems, which include among others the following:

1. Unstable Electricity in the computer laboratory which hinders so


many activities to be completed at a stipulated time.
2. Insufficient Tools in the laboratory to conduct live demonstration and
to aids fabrication.
3. So many national holidays as well as a One week warning strike by
ASUU was observed during my SIWES period which brought all
activities to stand still.
4. Some of the faulty system components more especially hardware were
so expensive to afford, thus as result many problems were unable to
fix. Example Registered RAM used in a Proxy Server.
5. The internet bandwidth in the ICT center was so slow and fluctuating.

3.1 RELEVANCE OF SIWES ACTIVITIES

The activities I was engaged in during my Industrial Attached are all relevant to
my field of study as computer science has to do with networks both local and
mobile networks, programming, computer troubleshooting and maintenance.

However, it is during this period that a gained more practical knowledge on the
courses we covered in 300 levels such as internet programming, as well as those to
be taking in the subsequent semesters like computer networks(400 level).

53
CHAPTER FOUR

RECOMMENDATIONS AND CONCLUTION

4.0 RECOMMENDATIONS
I want to use this medium to call on the management of Yobe State
University to take measures in tackling aforementioned problem in section
3.0. I will also like to recommend the ITF to start paying the SIWES
allowance prior to the commencement of the training, rather than on
completion; as many students complained of lack of funds to convey
themselves to their various places of attachment.
Finally, it should be of help if the SIWES unit can initiate a kind of
internship assistance to outstanding students by providing them with
scholarships to undergo some professional certification training during the
period of their IT.
4.1 CONCLUSION
The significance of Industrial attachment cannot be over emphasized. It
indeed plays a tremendous role by equip ting undergraduate students in the
fields of science and technology with technical know-how necessary in their
course of study.
As a matter of fact, I had a lot of experiences during the period of my IT
ranging from administrative, academics and technologies which are worthy
enough for me to struggle in the labor market after graduation and/or to
make a living despite the economic challenges.
However, I believe that application of computing technologies can make
Nigeria one of the vibrant economic nations in the world.

54
REFERENCES

Adamu,I.A (2015). Unpublished SIWES report, Department of mathematical

sciences, Abubakar Tafawa Balewa University, Bauchi.

Eric,C.C.(Online Tutor, 2015). Lesson 2.03: Mobile Network Component and

Operations. Retrieved December 3,2016, from Teracom Training Institution:

https://teracomtraining .com

Saleh,S.A (2015). Unpublished SIWES report, Computer Science Department, Yobe

State University, Damaturu.

Student Affairs, D. (Nov, 2013). Undergraduate Students' Hand Book. Damaturu:

Student Affairs Division, Yobe State University, Damaturu.

SIWES, N. (2013). SIWES. Retrieved December, 20, 2017, from National


Open University: http://nou.edu.ng/page/siwes-home

TutorialsPoint. (2015). Joomla Tutorial. Retrieved December 12, 2016, from

https://TutorialsPoint.com

Tutorials Point. (2015). Data Communication and Computer Networks Tutorial.

Retrieved December 22, 2016, from https:// TutorialsPoint.com

Wikipedia. (2016). Web development. Retrieved December 5, 2016, from


Wikipedia, the free encyclopedia: https://en.wikipedia.org/wiki/Web_development

55

View publication stats

You might also like