INTERNSHIPREPORT
INTERNSHIPREPORT
net/publication/373833804
INTERNSHIP REPORT
CITATIONS READS
0 1,281
1 author:
SEE PROFILE
All content following this page was uploaded by Yusuf Auwal Sani on 11 September 2023.
FEBRUARY, 2016
i
CERTIFICATION
This is to certify that Yusuf Auwal Sani with Registration Number U/CS/13/219 of
computer science Department, Yobe State University, Damaturu, has undergone
his six (6) month industrial work experience scheme (SIWES) at Information
Communication Technology Unit Yobe State University, Damaturu, from 1 st June,
2016 to 15th December, 2016.
ii
DEDICATION
iii
ACKNOLODGEMENT
I thank Almighty ALLAH (SWT) for giving me the opportunity to carry out
this work. I also wish to express me profound gratitude to my Head of Department
and SIWES supervisor in person of Dr. Mahdi Alhaji Musa, My internal supervisor
Mr. Ibrahim Muhammad, industrial Based Supervisor ; Engineer Farouq
Muhammad Aliyu for taken their time to supervised me during the period of my
training.
iv
TABLE OF CONTENTS
TITLE PAGE………………………………………………………………… i
CERTIFICATION …………………………………………………………... ii
DEDICATION …………………………………………………………….… iii
ACKNOLEDGMENT………………………………………………………... iv
TABLE OF CONTENTS …………………………………………………….. v
CHAPTER ONE: GENERAL INTRODUCTION…………………………….1
1.1 ABOUT THE SIWES…………………………………………………...1
1.1.0 Brief overview of Industrial Program…………………………… 1
1.1.1 Brief History of Industrial Training (IT) Program ……………….1
1.1.2 Aims of Industrial Training Fund ………………………………...3
1.1.3 Objective of the Industrial Training Fund ………………………..3
1.1.4 Functions of Industrial Attachment Program……………………..4
1.1.5 Conclusion ………………………………………………………..4
1.2 BRIEF HISTORY OF YOBE STATE UNIVERSITY ICT UNIT……...5
1.3 ORGANIZATIONAL CHART………………………………………….7
1.4VARIOUS DEPARTMENTS AND THEIR FUNCTIONS……………..7
CHAPTER TWO: ACTIVITIES DURING MY SIWES PERIOD……………8
2.0 INTRODUCTION……………………………………………………....8
2.1 WEB DEVELOPMENT………………………………………………...8
2.1.0 Web development using Joomla! ………………………………….10
2.1.1Basics of Joomla CMS……………………………………………...10
2.1.2 Joomla features …………………………………………………….11
2.1.3 Advantages of Joomla……………………………………………….12
2.1.4 Disadvantages of Joomla…………………………………………….13
v
2.1.5 Installing Joomla……………………………………………………..13
2.1.6 System Requirement for Joomla……………………………………….13
2.1.7 Set Up Wizard………………………………………………………….14
2.1.8 Joomla Architecture…………………………………………………….18
2.1.9 Control Panel …………………………………………………………..20
2.2 GLOBAL SYSTEM OF MOBILE NETWORKS…………………………….24
2.3 COMPUTER NETWORKS…………………………………………………..31
2.3.0 Classifications of computer networks…………………………………..32
2.3.1 Computer network topology……………………………………………35
2.3.2 Transmission Media and Cabling……………………………………….38
2.3.3 Making of a crossover and straight through Cable………………...……41
2.3.4 Networking Hardware………………………………..…………………47
2.4 COMPUTER HARDWARE MAINTENANCE…………………………….. 48
CHAPTER THREE: PROBLEMS ENCOUNTERED AND RELEVANCE OF
SIWES ………………………………………………………………………… ...53
3.0 PROBLEMS ENCOUNTERED DURING MY SIWES PERIOD…………...53
3.1RELEVANCE OF SIWES ACTIVITIES……………………………………..53
CHAPTER FOUR: RECOMMENDATIONS AND CONCLUSION……………54
4.0 RECOMMENDATIONS……………………………………………………...54
4.1 CONCLUSION……………………………………………………………….54
REFERENCES……………………………………………………………………55
vi
CHAPTER ONE
GENERAL INTRODUCTION
At working site one could see, feel and touch machines, equipment and get to
know more of safety measures. It creates competence in a person and generates
room for learning and adjustment.
The students work experience scheme brings to the knowledge of students the
much needed experience of handling machineries, with practical.
1
familiarized and exposed to the needed experience in handling machinery and
equipment which are usually not available in the educational institutions.
Participation in SIWES has become a necessary pre-condition for the award of
Diploma and Degree certificates in specific disciplines in most institutions of
higher learning in the country, in accordance with the education policy of
government.
i. Operators - The ITF, the coordinating agencies (NUC, NBTE, NCCE),
employers of labor and the institutions.
ii. Funding - The Federal Government of Nigeria
iii. Beneficiaries - Undergraduate students of the following: Agriculture,
Engineering, Technology, Environmental, Science, Education, Medical
Sciences and Pure and Applied Sciences.
iv. Duration - Four months for Polytechnics and Colleges of Education, Six
months for the conventional Universities and one year for universities of
technologies.
v. Highlight Number of Participating Institutions:
Universities 34
Polytechnics 65
Colleges of Education 59
158
2
Going by the decree of the Federal Government, it becomes generally imperative
to all Nigerian Universities to encourage and observe industrial training as part of
their training programs.
3
1.1.4 FUNCTIONS OF INDUSTRIAL ATTACHMENT PROGRAMME
iii. It gives students an idea of the relevant ministries or private organization that
can suit their profession. It creates an opportunity for students to be acquainted
with important persons.
1.1.5 CONCLUSION
4
1.2 BRIEF HISTORY OF YOBE STATE UNIVERSITY ICT UNIT
The history of the university ICT unit dates back to the inception of the
university itself. The idea to establish a state University in Yobe State was first
muted by the administration of Alh. Bukar Abba Ibrahim, the then Executive
Governor of Yobe State.
The government clearly expressed her determination to provide sound and
qualitative education in the state. It aims at establishing a good tertiary institution
for thousands of our Senior Secondary School Certificate holders at a time of
stiffer competition for admissions into institutions of higher learning to which
Yobe State is catchment.
The current number of Universities in the country can hardly accommodate
more than 20% of the total number of candidates seeking admissions each year.
Unfortunately, candidates including Yobe State indigenes who have met the
requirements for admission into universities were left roaming the streets, largely
due to inadequate spaces in the existing universities. This situation readily called
for the need to establish a state own university in Yobe State.
The State under the leadership of His Excellency the then Executive Governor,
Alh. Bukar Abba Ibrahim decided to establish a university named Bukar Abba
IbrahimUniversity at its take off, now Yobe State University. To achieve this, he
immediately constituted a Planning Committee under the chairmanship of Prof.
Muhammad Nur Alkali in January 2006, to plan and prepare the takeoff of the
State University. The committee immediately commenced action. The Academic
brief the Law establishing the University
and the Master Plan were produced and approved by the National Universities
Commission (NUC). The University is planned for twenty five (25) year period
and provides the details of the Vision, Mission, Philosophy, Objectives,
Administrative structure and Research Policy of the University. The brief captures
5
the Faculties, Departments and Courses that the University in the first ten (10)
years of its existence as well as the resources required to run the university during
the same period.
The University was established by Law which was enacted by the Yobe State
House of Assembly on 20 September, 2006 and was recognized by the
National Universities Commission (NUC) in October, 2006. More so, the
University commenced academic activities in January, 2007 with Remedial
Programme and fourteen (14) undergraduate programmes domiciled in
fourteen (14) Departments and four (4) Faculties which were later
merged to two (2) faculties i.e. Faculty of Arts/Social and Management
Sciences and faculty of Science.
6
information and this information can be passed on more reliably and faster
through the use of computer systems and other computer accessories like the
internet, intranet etc. Thus there is the need to have a section or a unit within
the university that will see to the procurement, distribution, installation, and
overall maintenance of these computer systems and their related accessories.
This is where the ICT unit of Yobe State University comes into play.
The ICT unit is directly under the Vice Chancellor of the university and
is headed by the ICT committee chairman. The unit manages the university’s
computer Centre, Management Information System (MIS), as well as the
university e-library and all other Computer and Information Technology
related issues.
VICE CHANCELLOR
ICT/MIS UNIT
The Yobe State University ICT unit has no departments and its primary
responsibility is the maintenance of the website, registration portal, e-library as
well as handling all issues relating to computers, the internet, intranet and
communication of information throughout the university.
7
CHAPTER TWO
2.0 INTRODUCTION
This chapter discussed all the work done and what I learned during my training
exercise.
Web development ranges from creating plain text pages to complex web based
applications, social networks applications and electronic business application.
(Techopedia, 2016)
8
Web development hierarchy is as follows:
i. Client-site coding
ii. Server-site coding , and
iii. Database technology
The Yobe State University ICT unit as mentioned in the previous chapter,
has the responsibility of maintaining the website, registration portal, e-
library as well as handling all issues relating to the web, internet and
networking throughout the university. Moreover, at the commencement the
IT my colleagues and I were assigned to development a website to each
department in the university, in which each can be linked to the main
university website on completion.
9
i. Web development from scratch and
ii. Web development using content management system (CMS)
database, and includes features such as page caching, RSS feeds, printable
versions of pages, news flashes, blogs, search, and support for language
internationalization.(Wikipedia, 2016)
Joomla has its own powerful build-in features, the core features are:
11
ii. Content Manager: It allows managing the content using WYSIWYG
editor to create or edit the content in a very simple way.
iii. Banner Manager: It is used to add or edit the banner on the website.
iv. Template Manager: It manages the designs that are used on the website.
The templates can be implemented without changing the content
structure within a few seconds.
v. Media Manager: It is the tool for managing the media files and folder in
which you can easily upload, organize and manage your media files into
your article editor tool.
vi. Contact Manager: It allows adding contacts, managing the contact
information of the particular users.
vii. Web link Manager: The link resources are provided for user of the site
and can be sorted into categories.
viii. Search: It allows creating menus and menu items and can be managed
subsequently. You can put menu in any style and multiple places.
ix. RSS: It stands for Really Simple Syndication, which helps your site
contents and RSS files to be automatically updated.
12
2.1.4 DISADVANTAGES OF JOOMLA
Step 1: Extract the downloaded Joomla folder and upload it on the web server
or local host.
Step 2: Open the browser and navigate to Joomla file path, then we can get the
first screen of Joomla installer as shown below. In my case the path is local
host/ Joomla folder.
14
Fig 1.2: Main configuration screen
i. Site Name: I entered the name of the site which I am going to create in
Joomla.
ii. Description: Add a small description about the site.
iii. Admin Email: Enter your email address which helps to recover our
password or any update.
iv. Admin Username: Enter the username as per your choice while
logging into Joomla.
v. Admin Password: Enter password to protect your site.
vi. Site Offline: It specifies whether your site should be offline or online
after completion of installation by clicking on Yes/No.
After filling all the information, I clicked on the Next button.
Step 3: The screen below asked to enter information about the MySQL
database.
Step 6: After few minutes, installation was successfully, and the following
screen was shown.
Next, I clicked on the “Remove installation folder” button which will help
protect my site, so that no other person can re-installed it.
Note: I encounter installation problem, where the Step 5 got stuck and does not
completed for more than an hour. I followed the procedures below in resolving
the problem:
17
iii. Sql folder
iv. MySQL folder Open joomla.sql files and I found the following term:
"ENGINE=InnoDB". I Replace this term with "ENGINE=MyIsam" and
I save the file.
Before MySQL 5.5.5, MyIsam is the default storage engine.
(The default was changed to InnoDB in MySQL 5.5.5.)
Then the installation began.
COMPONENT
WEB BROWSERS
S
TEMPLATES
MODULES
Database
PLUGINS
Database
18
Joomla framework
Component
Modules
Plugin
Templates
Webserver
Modules: modules are extensions which are used to render pages to Joomla. It
frequently looks like boxes such as login module. In Joomla administrator the
modules are managed by the module manager. It displays the new content images
when a module linked to Joomla components.
19
Plugin: This is also a kind of Joomla extension; it is very flexible and powerful for
extending the framework. It contains a bit of codes that used to execute the
particular event trigger. It is commonly, used to format the output of a component
or module when the page is built. The plugin function which is associated with
event executed in sequence when particular event occurs.
Templates: Template determines the look of the Joomla website. There are two
type of template used, there are; Front-end and Back-end. The back-end template
is used to control the functions by the administrator whereas; the front end
template is the way to represent the website to the users. Templates are easy to
build and customized a website.
Web browser: It is a server where the user interacts. It delivers the web pages to
the client. The HTTP (Hyper Text Transfer Protocol) is used to communicate
between the client and the server.
20
Fig 1.8: Joomla back-end
Article content
Structure format
User information
Set the configuration
Install extension and
Maintenance
Article content: there are four icons under the content section as shown below:
Menu Manager: Menu manager allows the creating custom menus for
website and navigating through the website.
Module Manager: It manages the module such as location and function of
modules that are installed on the site.
User Manager: It manages the user information, which allows creating and
deleting the user, changing passwords, time and languages.
21
Set the configuration: Three icons are located under this configuration section as
given below:
22
Fig 1.10: Academic staff profile page
23
2.2 GLOBAL SYSTEM OF MOBILE (GSM) NETWORK
This section would cover some aspect and concept of mobile communication
system which I leaned during the period of my industrial attachment through a
three days working with Huawei Company to upgrade GLO Base transceiver
station (BTS) at Yobe State University Cell Site opposite ICT unit.
In simple terms, a cell site depicts a place where antenna and electronic
communication equipment are located, usually on tower or on other high place to
create cell (or adjacent cells) in cellular network. This exalted structure includes
antennas set of transmitters and receivers, control electronics, electrical power
backups or electrical generator set and sheltering. In GSM networks, the cell site is
term as base transceiver station (BTS) which reflects the increasing number of
locations for multiple mobile operators and multiple base stations at a single site.
Defending upon the technology used by mobile operators, even if a single site has
only one mobile operator, then also it includes multiple base stations to serve
various wireless technologies.
Among various terms used in mobile telephony, the most used will be
discussed here.
Mobile Station: the mobile station (MS) communicate the information with the
user and modifies it to the transmission protocols of the air interface to
communicate with the BSS. The user information communicates with the MS
through microphone and speaker for speech, keyboard and display for short
messaging and the cable connection for other data terminals. The mobile station
has two elements Mobile Equipment (ME) and Subscriber Identity Module (SIM).
Short message Service (SMS) are also stored in the SIM card. It carries
every user’s personal information which enables a number of useful applications.
Base Station: Base stations (BS) transmit and receives user data. When a mobile is
Responsible for its user’s data transmission and reception, a base station is capable
to handle the calls of several subscribers simultaneously.
25
Base Transceiver Station: The user data transmission takes place between the
mobile phone and the Base Station (BS) through the base transceiver station. A
transceiver is a circuit which transmits and receives.
26
Fig 1.15: Skeleton of a Huawei 3G Base transceiver Station
Mobile Switching Center: MSC is the hardware part of the wireless switch that
can communicate with Public Switching Telephone Network (PSTN) switches
using Signaling System (SS7) protocol as well as other MSCs in the coverage area
of the service provider. The MSC also provides for communication with other
wired and wireless networks as well as support for registration and maintenance of
the connection with the mobile stations.
27
Fig 1.17: Mobile Network connect to Public Switching Telephone Network
Also, on this is half of the encryption key pair that used to authenticate the
data in the SIM, which is important for stopping people from cloning the phone.
28
Moreover, the SIM contains a Location Area Identifier which identifies the base
station that the phone talks to. The phone is connected to base station over an air
link; the base station has three (3) main components;
One is the base station transceiver or base transceiver station sub-system, in any
case, the transceiver stations is the radio and it produces energy at GHz frequency
The base station has to be connected back to a mobile switch. The mobile
switch is a device that capable of keeping track of users moving around. This
connection from the base station into the mobile switch is called the BACKHAUL,
there to ways of implementing the backhaul; one is the fiber backhaul this occurs
when there is fiber running between the base station and the mobile switch, and the
company operating the base station is an affiliate of the phone company that owns
that fiber then there will used that fiber to connect the base station back to the
mobile switch.
In many other cases, there is no fiber available, and so what is use are dishes
pointing site way facing each other to implement the backhaul with point to point
radio link, and so we might have the communication from the base station from the
base station, back to the mobile switch goes through multiple different towers with
29
point to point radio system before it final goes back to the mobile switch. The
phones learn which base station it talking to from the base station and stores that
on the SIM card. Now when we first turn our communicator on, it programmed to
communicate a particular radio frequency, and what going to do is it going to
transmit on this frequency it international mobile subscriber identity and a bunch
of other things, and this is going to receive by the mobile switch, and the mobile
switch is going to look up whether that customer, is one of their customers, or
whether that phone is the right phone and authenticate using encryption
technology. And then there are going to see whether that customer has paid their
bill or not, and if all of the above is true then the switch is going to give indication
to the phone, over the backhaul, over the airlink saying yes you got a service.
And as part of this process, the phone would inform the switch what the
value of the location area identity on the SIM card is and the switch stores that in a
table called the Location Register, then the idea is, if somebody calls you from a
land line, there pick up the phone and punch in some numbers and that call goes
over their loop to their central office to a toll center and then to the cellular
telephone company. And the phone call would be terminated at the mobile switch.
Then the mobile switch is going to look at the location register to see which base
station that phone last registered on, it then sent a page to that base station and if
the phone is still on it going to answer the page and at this point the mobile switch
will course the caller to hear the ringing signal and the mobile switch will say to
the phone, do you want to take this phone call here is the caller ID, in other words,
the phone will start ringing and the caller ID would show on the screen, and then
when the cell phone user presses the answer button, at this point then we will have
a voice communication going from the phone, over the airlink to the base station
and then over the backhaul to the mobile switch and the switch will bridge the
30
communication internally to the connection that is has to the public telephone
network. So we have communications over the airlink to the backhaul, over
connection to the toll center, over connection to the central office and then down
the land line.
When we get into a car and then having a conversation, we drive away from
the base station, and what is going to happen is that sooner or later, the switch is
going to do a handoff, in a simplest example, that means the switch is going to stop
sending information to and listening to this base station it going to start sending
information and listening to that base station. And your phone of course has to stop
talking to that base station transceiver and start talking to the new one. With some
of the technologies actually break the connection from the first base station and
then make a new connection to the second one, and there will be period of time in
the middle when the communication drop out for seconds. But with other
technologies we actually make the connection to the second base station before
dropping the connection to the first one so that there is no interruption in the
communication. (Teracom Training Institute, 2014)
Scale
Connection method
Functional relationship
Network topology and
Protocol
32
Fig 1.18: Personal area network
33
Metropolitan Area Network
Back bone of Metropolitan Area Network (MAN) is high capacity and high speed
fiber optics. MAN is works in between Local area network and wide area network.
MAN provides uplink for LANs and to WANs or internet. (TutorialsPoint, 2016)
As name suggests, this network covers a wide area which may span across
provinces and even a whole country. Generally, telecommunication networks are
Wide Area Network. That network provides connectivity to MANs and LANs.
34
Fig 1.21: Wide Area Network
WAN may use advanced technologies like Asynchronous Transfer Mode (ATM),
Frame Relay and SONET. WAN may be managed under more than one
administration.
35
Fig 1.22: Point- to- Point Topology
Bus Topology
Both ends of the shared channel have line terminator. The data is sent in
only one direction and as soon as it reaches the extreme end, the terminator
removes the data from the line.
Star Topology
All hosts in star topology are connected to central device, known as hub device,
using a point-to-point connection. That is, there exist a point- to-point connection
36
between host and hub. The device can be layer-1 device (Hub/Repeater) or layer-2
device (Switch/Bridge) or layer-3 device (Router/Gateway).
Ring Topology
In ring topology, each host machine connects to exactly two other machines,
creating a circular network structure. When one host tries to communicate or sent
message to a host which is not adjacent to it, the data travels through all
intermediate hosts. To connect one more host in the existing structure
administrator may need only one more extra cable.
37
Fig 1.25: Ring Topology
Failure of any host results in failure of the whole ring. Thus every connection in
the ring is a point of failure. There exist methods which employs one more back-up
ring.
Magnetic Media
One of the more convenient ways to transfer data from one computer to another,
even before the birth of networking, was to save it on some storage media and
transfer physically from one station to another. Thought it may seem odd in
today’s world of high speed internet, but when the size of data to transfer is huge,
Magnetic Media comes into play.
Twisted Pair Cable: A twisted pair cable is made up of two plastic insulated
copper wires twisted together to form a single media. Out of those two wires only
38
one carries actual signal and another is used for ground reference. The twist
between wires is helpful in reducing noise (Electromagnetic interference) and
crosstalk.
There are two types twisted pair cable there are as follows:
STP cables come with twisted wire pair covered in metal foil. This made it more
indifferent and crosstalk.
UTP has seven categories, each suitable for specific use. In computer networks,
Cat-5, Cat-5e, and Cat-6 cables are mostly used. UTP cables are connected by
RJ45 connectors.
Coaxial Cable : Coaxial cables have two wires of copper. The core wire lies in
center and it made of solid conductor. Core is enclosed in an insulating sheath.
Over sheath the second wire is wrapped around and that too in turn encased by
insulated sheath. This all is covered by plastic cover.
39
Fig 1.27: Coaxial Cable
Because of it structure coax cables are capable of carrying high frequency signals
than the twisted pair cables. The wrapped structure provides it a good shield
against noise and cross talk. Coaxial cables provide high bandwidth rates of up to
450 mbps.
There are three categories of Coax cables namely, RG-59(Cable TV), RG-58(Thin
Ethernet) and RG-11 (Thick Ethernet) RG stands for Radio Government.
(TutorialsPoint)
Fiber Optics
Fiber optics works on the properties of light. When a light ray hits at critical angle
it tend to refract at 90 degree. This property has been used in fiber optic. The core
of fiber optic cable is made of high quality glass or plastic. From one end of it light
is emitted, it travels through it and at the other end light detector detects light
stream and convert it to electric data form.
Fiber optic provides the highest mode of speed. It comes in two modes, one is
single mode fiber and the other is multimode fiber. Single mode fiber carries single
ray of light whereas multimode is capable of carrying multiple beams of light.
40
Fig 1.28: Fiber Optic
Basically, there are two types of cabling use in an Ethernet technology; cross-
over cables that is use to connect similar devices, example a Laptop to Laptop,
whereas, straight through cable connect to dissimilar devices such as a Personal
computer to a switch or router. However, the difference between the two lays in
the way at which the cable terminates; that is the color code arrangement of the
cable signifies it type.
Cat 5e cable
RJ 45 connectors
41
Cable stripper
Scissors
Crimping tool and
Tester
An RJ-45 here RJ stands for registered jack, is an eight pin Ethernet cable
connector.
Straight through Pinout: This entails the cabling standard that used to
connect a computer such as laptop to a network switch or a router.
However, there are two ANSI recognize color coding standard for a
straight through cabling, there are; Telecommunication Industrial
Association (TIA) and the Electronic Industrial Alliance (EIA). There are
jointly established to form two basic wiring scheme for a straight through
and cross over cabling, that is TIA/EIA 568A and TIA/EIA 568B. While the
former is deals with straight through color coding, the latter is for cross over
color code.
42
Fig 1.30: Straight through cabling type A and B
43
Step 2:
Avoid cutting into conductor insulation, strip off approximately 1 inch of the
cable’s jacket, using a modular crimping tool or a UTP cable stripper.
Step 3:
Sort wires by insulation colors; flatten the wires as out as much as possible,
since they will need to be very straight for proper insertion into the
connector.
Step 4:
Arrange wires, holding the cable with the wire ends facing away from you,
facing them from the following order:
44
TIA/EIA 568A: GW-G OW-Bl BlW-O BrW-Br, TIA/EIA 568B: OW-O
GW-Bl BlW-G BrW-Br.
Step 5:
Maintain wire order, left-to-right, with RJ 45 tab facing downward, and
carefully insert the flattered, arranger wires into the connector, pushing
through until the wire ends emerge from the pins. For straight of connection,
also push as much of the cable jacket as possible into the connector.
Step 6:
Do all wires extend to the end and is the sheath well inside the
connector? If not remove them from the connector, re-arrange into
appropriate order, and reinsert. Keeping in mind that once the connector in
crimp into the cable, it is permanent. However, if we find out that a mistake
has been made after crimping the cable. The whole procedure has to be
repeated again.
45
Step 7:
Insert the prepared wires into the RJ45 slot and squeeze firmly to crimp
connecter onto cable end until they cannot go any further. Release the
handle and repeat this process once more to ensure proper crimp.
Step 8:
After the first termination is complete, repeat the same procedure on the
other end other cable, or by crossing the wire to the other side in the case of
cross over cable.
After crimping the cable, the effectiveness and correctness of the cable can
be determine using a cable tester.
46
Fig 1.32: RJ 45 and RJ 11 cable tester
Hub: At the bottom of networking food chain, so to speak, are hubs. Hubs are used
in a network that use twisted pair cabling to connect devices. Hubs can also be
joined together to create larger networks. Hubs are simply devices that direct data
packets to all devices connected to the hub, regardless of whether the data packet is
destined for the device. This makes them inefficient devices and can create
performance bottleneck on busy networks. A hub is a layer 1 device of OSI
reference model.
Switch: Like hubs switches are the connectivity points of an Ethernet network.
Devices connect to switches via twisted pair cabling, one cable for each device.
The difference between hubs and switches is on how the devices deal with the data
that they receive. Whereas a hub forward the data it receipted to all ports on the
device, a switch forward it to the port that connect to the destination device. It does
this by learning the MAC address of the devices attached to it, and then by
matching the destination MAC address in the data it receives. Fig 1.23 shows how
a switch works. A switch is a layer 2 device of OSI reference model.
47
Router: A router is computer, just like any other computer including a PC.
Routers have many of the same hardware and software components that are found
in other computers including; CPU, RAM, ROM and operating system.
Router is the basic backbone for the internet. The main function of the router is
to connect two or more than two network and forwards the packet from one
network to another. A is incorporated with Dynamic Host Configuration Protocol
(DHCP) server that automatically assign IP address to a host connect to the
network. A router is layer 3 device of the OSI reference model.
1. The Mother Board: This is a thin flat piece of circuit board (usually of
Green or Gold color). Everything in the computer connects to it directly
or indirectly. It contains special number of sockets that accept various
component of the computer (Peripherals).
48
Fig 1.25: Component of a Motherboard
2. Hard Drive: Hard drives stores programs that are not currently used by the
CPU. There are termed nonvolatile storage device, for fact that programs
stored them cannot not be loss when the system crashes or in case of power
outage.
49
Very Slow Performance: If computer take long time to boot and load
programs, then the hard drive is slow. Therefore disk defragmenter utility
has to run to delete unwanted file to free off space in order to improve
performance. If the problems persist, then the hard disk needs to be change
thoroughly.
Data is losing without formatting the hard disk or deletion by the user:
if data is not deleted by user or the disk is not formatted but get loss, then
this may be due to a corrupted partition and file system. Although this type
of problem rarely occurs, but when it happens, the effects are devastating.
To solve this, software like Recuva should use to fix the issue.
File transfer gets stuck: this is due to a bad drive sector. “chkdsk/r”
command should be run in the command prompt to fix the problem.
The Computer is unable to boot and produces rhythmic clicking noise:
this might be sign of head crash and is very dangerous premonition to the
death of the hard drive. A full back up of the system should be done if
possible.
3. RAM: stands for Random Access Memory is a computer memory that store
programs and applications that are currently used by the CPU. It is measured
in bytes, average PC usually has between 32 megabyte/128 megabyte to 1
Giga byte of RAM (Modern PCs may have more than 1 Gigabyte of RAM.
A RAM is plug onto the motherboard through an expansion slot.
50
If there are malfunction with computer RAM one often experience the
following symptoms:
Computer does not display anything on the screen when turn on:
this symptom is usually followed by sequence of beep sound
indicating that either the RAM is wrongly plug onto the computer or
it is complete removed from the PC.
To solve this type of problem, open the computer case and place the
RAM correctly and turn on the computer back again.
Excessive blue screen errors: blue screen errors often occur when
there is something wrong with the memory. Although this is not
always a rule. However, if there are very random and there are not
generally reproducible, then there is probably a memory problem. If
you can reproduce the issue by clicking something, it is probably that
thing’s fault.
Unusually slow performance: if a computer is taking long time to
open an application, first open the task manager to make sure that the
RAM is not overwhelm with processes. If it is full try closing
programs that using a lot of RAM. It that does not yield a positive
result, then you needs to upgrade the memory higher capacity or scan
the computer to check if the computer is infected by a virus.
4. The Power supply: The power supply distributes power to the motherboard
and other component in the computer.
51
The computer cannot turn on without the power supply unit functions. It is
directly connected and many other components of the computer such as
DVD drive and the Hard drive. The common problems experiences with the
power supply are:
Computer does not turn on: since the power supply serves as a
power house of the computer. So if there is not power in the computer
component then the power supply component will be the number one
culprit. The best way to determine whether the power supply is
causing this is to listing for any sound coming from the computer. If
there is no noise coming of the fans whirring, then the power supply
may be faulty. On the other hand, if the power supply is working
properly check it connector to the mother board to ensure that it is
properly plugged.
Insufficient Power: If the electricity supply to the power unit is not
enough or a hardware device is attached to the computer, then the
computer may not be stable. Try to plug the computer on a power
stabilizer or disconnect the new attached device and turn on the
computer back again.
Faulty Power Supply: this often occur as a result of short circuit and
power surges. Connecting a surge computer to a surge protector on a
grounded socket to help prevent these incidents.
52
CHAPTER THREE
It is obvious that problems are almost always inevitable in our day to day
activities. During the period of my industrial attachment I across numerous
problems, which include among others the following:
The activities I was engaged in during my Industrial Attached are all relevant to
my field of study as computer science has to do with networks both local and
mobile networks, programming, computer troubleshooting and maintenance.
However, it is during this period that a gained more practical knowledge on the
courses we covered in 300 levels such as internet programming, as well as those to
be taking in the subsequent semesters like computer networks(400 level).
53
CHAPTER FOUR
4.0 RECOMMENDATIONS
I want to use this medium to call on the management of Yobe State
University to take measures in tackling aforementioned problem in section
3.0. I will also like to recommend the ITF to start paying the SIWES
allowance prior to the commencement of the training, rather than on
completion; as many students complained of lack of funds to convey
themselves to their various places of attachment.
Finally, it should be of help if the SIWES unit can initiate a kind of
internship assistance to outstanding students by providing them with
scholarships to undergo some professional certification training during the
period of their IT.
4.1 CONCLUSION
The significance of Industrial attachment cannot be over emphasized. It
indeed plays a tremendous role by equip ting undergraduate students in the
fields of science and technology with technical know-how necessary in their
course of study.
As a matter of fact, I had a lot of experiences during the period of my IT
ranging from administrative, academics and technologies which are worthy
enough for me to struggle in the labor market after graduation and/or to
make a living despite the economic challenges.
However, I believe that application of computing technologies can make
Nigeria one of the vibrant economic nations in the world.
54
REFERENCES
https://teracomtraining .com
https://TutorialsPoint.com
55