SlideShare a Scribd company logo
1 of 86
Download to read offline
I
A
TECHNICAL REPORT
ON
STUDENTS’ INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)
UNDERTAKEN AT
NIMBLES ENGINEERING COMPANY LTD,
IBADAN, OYO STATE, NIGERIA
FROM JULY, 2019 TO DECEMBER, 2019
MADE BY
AROSO EMMANUEL ADEDEJI
CPE/15/2399
SUBMITTED TO
THE DEPARTMENT OF COMPUTER ENGINEERING,
SCHOOL OF ENGINEERING AND ENGINEERING TECHNOLOGY,
FEDERAL UNIVERSITY OF TECHNOLOGY, AKURE
ONDO STATE, NIGERIA
IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD
OF THE DEGREE OF BACHELOR OF ENGINEERING (B.ENG)
IN COMPUTER ENGINEERING
FEBRUARY, 2020.
II
CERTIFICATION
This is to certify that this report is a detailed report of the Student Industrial Work Experience Scheme
undertaken by AROSO EMMANUEL ADEDEJI with matriculation number CPE/15/2399 at NIMBLES
ENGINEERING COMPANY LIMITED for a period of six months and has been prepared in accordance
to regulations guiding the preparation of reports in the Department of Computer Engineering, Federal
University of Technology, Akure, in partial fulfilment of the requirements for the award of Bachelor of
Engineering (B. Eng.) in Computer Engineering.
….……………………… ….…….……………………………..
Student’s Signature/Date SIWES Coordinator’s Signature/Date
III
ACKNOWLEDGEMENT
I am grateful, first and foremost, to almighty God for his grace, strength and knowledge, which made it
possible for me to commence and finish my SIWES program successfully.
My utmost and heartfelt gratitude goes to my parents for their actions during the course of my education in
life; Mr David Aroso for his constant and invaluable support both financially and morally, and Mrs
Oluwakemi Aroso for her prayers and encouragement. You shall reap infinite fruits from the seeds you
labored to sow in the name of JESUS. I also appreciate my brothers and sisters for their love and assistance
during the period of my training.
I would also like to express my special thanks to my department father and role model Mr Ogunti and my
beloved mother and HOD Mrs Dahunsi and the entire Staff of this thriving department for imparting me
adequately to survive in the corporate world.
My most profound appreciation goes to my IT Supervisor, who out of his busy schedule gave me his time
and was patient enough to painstakingly guide me on how to prepare and write this project. May God bless
and reward you abundantly sir.
I would not forget my energetic supervisor, Mr. Oladipupo Seun for his unflinching support till date, and
also Mr. Hakeem, the Human Resources Manager of Nimblescorps, the entire staff and my colleagues at the
company (Blessing, Abiodun, Peace, and Joseph). May God bless you all and reward you abundantly.
IV
DEDICATION
This report is dedicated to GOD almighty, and my hardworking parents; Mr and Mrs Aroso, for their
enduring support and contributions in my life.
V
ABSTRACT
The Students’ Industrial Work Experience Scheme (SIWES) is a scheme that was set up to enhance and
expose students to acquire adequate and relevant skills that would enable them to perform effectively in their
future place of work and assignment. It also exposes students to work methods and enrich their experiences
in acceptable methods of handling equipment and machinery that may not be available in the education
institution. It is also aimed at exposing students to people from all works of life, hence enhancing their
communication skills and ability to interact with people after graduation. This report is a summary of the
knowledge and experiences gained during my Students Industrial Work Experience Scheme (SIWES),
which was done at Nimbles Engineering Company Ltd, Ibadan. Throughout my SIWES period, I worked at
the Automation, Electrical and Networking sections where I was exposed to such things as PLC, HMI,
contactors, industrial star delta configuration, VFDs, network configuration,network routers and switches.
The training has afforded me the opportunity to be exposed and learn from my colleagues and other
individuals within and outside the organization.
1
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME
(SIWES)
In the early stage of science and technology education in Nigeria, students were graduating from their
respective institutions without any technical knowledge or working experience. There was a growing
concern among industrialists that graduates of institutions of higher learning lacked adequate practical
background studies necessary for employment in industries. Thus, the employers were of the opinion that
the theoretical education going on in higher institutions was not responsive to the needs of the employers of
labour. It was in this view that students undergoing science and technology related courses were mandated
for training in different institutions in view of widening their horizons so as to enable them have technical
knowledge or working experience before graduating from their various institutions.
1.2 HISTORY OF SIWES
The Student Industrial Work Experience Scheme (SIWES) was established by the Industrial Training Fund
(ITF) in 1973 to enable students of tertiary institutions have technical knowledge of industrial work based on
their course of study before the completion of their program in their respective institutions. The ITF solely
funded the scheme during its formative years, but as the financial involvement became unbearable to the
Fund, it withdrew from the Scheme in 1978. The Federal Government handed over the scheme in 1979 to
both the National Universities Commission (NUC) and the National Board for Technical Education (NBTE).
Later the Federal Government in November 1984 reverted the management and implementation of the
SIWES to ITF and it was effectively taken over by the Industrial Training Fund in July 1985 with the
funding being solely borne by the Federal Government.
1.3 SIGNIFICANCE OF SIWES
The scheme was designed to expose students to industrial environment and enable them develop
occupational competencies so that they can readily contribute their quota to national, economic and
2
technological development after graduation. The major benefit accruing to students who participate
conscientiously in Students Industrial Work Experience Scheme (SIWES) are the skills and competencies
they acquire. The relevant production skills remain a part of the recipients of industrial training as life-long
assets which cannot be taken away from them. This is because the knowledge and skills acquired through
training are internalized and become relevant when required to perform jobs or functions.
1.4 OBJECTIVES OF SIWES
The Industrial Training Funds policy Document No. 1 of 1973 which established SIWES outlined the
objectives of the scheme. The objectives are to:
i. Provide an avenue for students in higher institutions of learning to acquire industrial skills and
experiences during their course of study.
ii. Prepare students for industrial work situations that they are likely to meet after graduation.
iii. Expose students to work methods and techniques in handling equipment and machinery that may
not be available in their institutions.
iv. Make the transition from school to the world of work easier and enhance students’ contacts for later
job placements.
v. Provide students with the opportunities to apply their educational knowledge in real work situations,
thereby bridging the gap between theory and practice.
vi. Enlist and strengthen employers’ involvement in the entire educational process and prepare students
for employment in Industry and Commerce.
1.5 BODIES INVOLVED IN THE MANAGEMENT OF SIWES
The major bodies involved are: The Federal Government and the Industrial Training Fund (ITF). Other
supervising agents are: National University Commission (NUC), National Board for Technical Education
(NBTE), National Council for Colleges of Education (NCCE), Employers of Labour and Institutions.
3
The functions of these agencies above include among others to:
a) Ensure adequate funding of the scheme
b) Establish SIWES and accredit SIWES units in the approved institutions
c) Formulate policies and guidelines for participating bodies and institutions as well as appointing
SIWES coordinators and supporting staff.
d) Supervise students at their places of attachment and sign their log-books and IT forms.
e) Vet and process student’s log-book and forward same to ITF Area office.
f) Ensure payment of allowances to the students and supervisors.
Therefore, the success or otherwise of the SIWES depends on the efficiency of the Ministries, ITF,
Institutions, Employers of labour and the general public involved in articulation and management of the
program. It is pertinent to mention that the scheme is aimed at promoting the much-desired technological
know-how for the advancement of the nation. This laudable scheme among others will surely develop the
much-needed well-skilled and articulated labour force required to build an indigenous self-reliant economy
envisaged for Nigeria.
1.6 PARTICULAR ITF OFFICE VISITED
During the course of my training, I visited the ITF Ibadan Area Office located at Queen Elizabeth Road
Near PHCN Office, Agodi Total Garden, Oyo State. This is where I submitted my SCAF form and had my
logbook signed.
1.7 OBJECTIVES OF THE REPORT
The objectives of the SIWES report are;
a) To put into writing all the practical knowledge and experience acquired during the course of the
industrial training.
b) To prove that I actually participated in the SIWES training.
c) To keep the record for future use or reference.
4
d) To fulfill the requirement for bachelor degree in Computer Engineering.
e) To contribute to the body of knowledge and to enhance the understanding of other writers about a
similar or same job.
1.8 THE LOGBOOK
The logbook issued to student on attachment by the institution was used to record all daily activities that
took place during the period of attachment, and it was checked and endorsed by the industry-based,
institution-based supervisors and ITF during supervision.
1.9 RELEVANCE OF SIWES PROGRAMME
My academic work was paramount to the experience I gained from both networking and electrical motor
control systems, because it gave me real basics of theories and as a computer engineer, understanding these
theories was really important because it’s what makes the difference between someone who read computer
engineering and someone one who attended a road side computer schools as system technician.
The industrial experience scheme is an opportunity to work and have the real practical skills needed. The
academic work serves as a platform to know and understand the components, the various aspects, the
theories, laws, principles, techniques and diverse areas of computer engineering which serves as the basis for
understanding what would be done practically as well as selecting the area of specialization in accordance
with the choice of company to work with during the SIWES training. My academic work made me to
understand what I did well during my IT because some terms were used during my training of which were
not explained in details but my academic knowledge made me understand what was being taught. For
example, application of EEE405 (Communication Systems) in understanding the encoding scheme used in
the Physical layer of OSI model to transmits bits from a computer systems to another, CSC101 (Introduction
to Computing Systems), CPE401 (Computer Architecture and Organization) and EEE307 (Electrical
Machines I) assisted in understanding and troubleshooting hardware problems and electric control systems
respectively.
5
CHAPTER TWO
2.0 COMPANY PROFILE
2.1 BACKGROUND OF NIMBLES ENGINEERING COMPANY
Nimbles Engineering Company Limited (NEC) is a modern technology-driven company, and was
established in January 15, 2015 by Mr. Bamidele Audu and by Mr. Valentine Bright. It has two branches
located at Suite 4, Drugfield building, adjacent Yunsol Oil gas station, Akala-Expressway,
Oluyole-Extension, Ibadan, Oyo State and 290A Ajose Adeogun, Victoria Island, Lagos. NEC is an
engineering firm that provide technological solutions and support services in Industrial Automation, Home
Automation, Electrical and Control systems as well as IT infrastructure to Oil and Gas, manufacturing,
process and communication industries, and management. The company’s core business is more on
automation (Home and Industrial), networking, hardware repairs and the maintenance and servicing of
industrial machines for manufacturing companies in Nigeria. The company is also into building of industrial
panels for companies and installation of the panels plus its full repairing and PLC programming.
Its team of highly skilled and experienced engineers and business domain specialists offer innovative
solutions to various key industries with a particular focus on Engineering and Technology. They act as a
think tank to collectively craft solutions that make business technology work for their clients and themselves,
and keeping to their core values.
2.2 SERVICES PROVIDED BY NIMBLES ENGINEERING COMPANY
With a team of seasoned technology specialists and dedicated engineers, the company offer the following
services which include:
i. Embedded Systems Engineering
ii. Electrical Services
iii. Home Automation
iv. Industrial Automation
v. Panel Design
vi. Networking
6
vii. Security Technologies
viii. Training
2.3 HISTORY OF THE COMPANY
It was established in the year 2015, but before that, they have been operating for five years under the name
and building of a different company. As at then, the company had just a company which was situated in
Ibadan. The company functioned more as a company providing electrical and industrial automation services.
As at 2018, the company has grown financially and substantially providing much more various services and
building projects. Towards the end of the same year, it opened a new and bigger office in V.I. at Lagos, and
moved most of their properties and activities over there.
2.4 ORGANIZATIONAL STRUCTURE OF THE COMPANY
Fig 2.0: The Company’s Organogram
7
2.5 OBJECTIVES OF THE COMPANY
2.5.1 VISION
To provide unrivalled customer experience using advances in technology to make living better.
2.5.2 MISSION
To continually improve on quality of service delivery and ensuring that the best of standards is provided to
our customers at all time.
2.6 WORK EXPERIENCE GAINED
During the industrial training program. I gained a lot in the company which has opened and widen my
reasoning about automation in general. The under listed points of experiences are what I took away from the
company.
a) ฀ Programming a PLC (programmable logic controller)
b) ฀ Wiring and maintenance of a PLC.
c) ฀ Repairing of a VFD (variable frequency drive).
d) ฀ Programming of a VFD (variable frequency drive).
e) ฀ Wiring of the VFD (variable frequency drive) in line with the PLC.
f) ฀ Networking of computers in general.
g) ฀ Usage of simulation software: GX Developer, WinCC Flexible, Tesla SCADA, Cisco Packet
Tracer.
h) ฀ Configuration of switches and routers using the hyper-terminal, TELNET and Putty.
i) ฀ Creation of a massive network areas.
j) ฀ Usage of Electrical simulation software such as EKTS for electric motor controls.
2.7 INSTRUMENTS USED IN THE LABORATORY OF THE COMPANY
There are different types of instruments used in the Laboratory for different or the same purposes which can
be grouped according to the way they are used. Some instrument used in the laboratory includes the
following; Relays, Contactors, Wires, Buzzers, LED, Switches, Sensors, Screw drivers, Pliers, Overload
relays, Circuit breakers, PLCs, HMIs, etc.
8
According to the way they are used, the instruments can be grouped as both peripheral and main instruments.
The peripheral instruments include; screw drivers, wires, pliers, The main instruments include; sensors,
switches, limit switch, emergency stop switch, terminal point box, 24Vdc relay switch, overload relays,
buzzers, contactors, LEDs, PLCs and so on. The main instruments can also be sub divided into input and
output devices.
The device used mainly by the company by which all other devices rely on is the PLC.
Plate 2.0: A timer-relay Plate 2.1: A Relay Plate 2.2: Pushbutton LEDs
Plate 2.3: 1P,2P, 3P Circuit breaker Plate 2.4: A contactor Plate 2.5: A
Pushbutton
9
CHAPTER THREE
3.0 KNOWLEDGE AND WORK EXPERIENCE GAINED
3.1.0 NETWORKING AND SECURITY SYSTEMS
Network:At the most basic level, a network is defined as a group of systems interconnected to share
resources.
Networking: Is the sharing of resources and services between interconnected devices.
A network, also referred to as a data network or a computer network, consists of a set of devices connected
together through a medium in order to be able to exchange data between themselves. These devices create a
network using their respective network interfaces. Some devices may use a single network interface, other
devices may be connected to the network via multiple interfaces.
The basic function of a computer network is to make it possible for geographically remote end users to
communicate. We need networking for the following; file sharing, network gaming, audio/video calls, file
transfer, database access, printer sharing, hardware sharing, surfing the web and so on.
3.1.1 THE STRUCTURE OF COMPUTER NETWORKS
A typical computer-communications network comprises hosts, users and a subnet that connects them.
Communication networks that provide connections between a computer and another (or a terminal) can be
divided into two basic types:
a) Connection-oriented (or circuit-switched): It operates by forming a dedicated connection or circuit
between two points. The telephone system uses this type of technology - a telephone call will establish a
connection from the caller’s phone through local switching office, across trunk lines, to a remote
switching office, and finally to the destination phone. The main advantage of this network is guaranteed
network capacity. One disadvantage is circuits cost are fixed, independent of use.
b) Connectionless (or packet-switched): Data to be transferred across a network is divided into small
pieces called packets that are multiplexed onto high capacity inter-machine connections. The chief
advantage is that multiple communications among computers can occur concurrently. The disadvantage
is that whenever the network activity increases, a particular pair of communicating computers receive
less of the network capacity.
10
Despite the potential drawback faced, connectionless networks have become extremely popular, the Internet
has chosen it’s approach to switching at the network layer. The motivations for adopting packet switching
are cost and performance, and since it allows multiple computers to share the network bandwidth, fewer
connections are required and cost is kept low. Engineers have been able to build high-speed network
hardware, hence, capacity is not usually a problem.
3.1.2 NETWORK BASICS
3.1.2.1 COMPONENTS OF A NETWORK
A network can be as simple as two PCs that are connected by a wire or as complex as several thousand
devices that are connected through different types of media. I observed that the elements that form a network
can be roughly divided into three categories: devices, media and services. Devices are interconnected by
media. Media provides the channel over which the data travels from source to destination. Services are
software and processes that support common networking applications.
3.1.2.1.1 NETWORK DEVICES
They can be further divided into endpoints and intermediary devices:
A. Endpoints: End-users devices fall under this category and include PCs, laptops, tablets, mobile phones,
game consoles and television sets (Smart-TV). Endpoints are also file servers, printers, sensors, cameras,
smart home components and so on. I learnt many end devices are now virtualized, this is made possible
due to Virtualization technology. Virtualization is commonly applied to servers.
B. Intermediary devices: An intermediary device is any networking device that provide connectivity and
work behind the scenes to ensure that data flows across the network. Intermediary devices connect the
individual hosts to the network and can connect multiple individual networks to form an internetwork.
Examples of intermediary network devices are:
a) switches and wireless access points (network access)
b) routers (internetworking)
11
c) firewalls (security).
During my stay at NEC, I was able to interact with the following devices:
a) Server: In general, a server is a computer that provides shared resources to network users called clients.
Servers are typically powerful computers that run the software that manage a network. A server is
usually dedicated to a task.
Plate 3.0: A server
b) Network Interface Card (NIC): A NIC provides the hardware interface between a computer and a
network, which means a computer must have at least one NIC to participate in a network. This device
provides the physical, electrical, and electronic connections to the network media. Today, almost all
new computer motherboards have built-in NICs which were originally available as expansion cards.
Plate 3.1: An expansion card NIC
Some NIC cards are meant for wired networks (e.g. Ethernet) while others are for wireless networks ( e.g.
Wi-Fi). Every NIC has a 48-bit globally unique identifier called as MAC address burned into its ROM chip,
which is used to deliver Ethernet Frames (packets) to a computer. The NIC driver software passes the data
between the OS and the NIC.
12
c) Network Switches and Hubs: Both are LAN devices used to interconnect multiple devices. The hub
repeats all received electrical signals and floods out through all other ports (except the incoming port).
It uses half-duplex algorithm called CSMA/CD to avoid collisions when forwarding electrical signals.
Plate 3.2: A Cisco Catalyst Switch Plate 3.3: A network hub
Switches segment each link connected to it as a separate collision domain, hence, do not have half-duplex
restrictions like hubs. Switches are called intelligent devices because they have the knowledge of ethernet
frames and MAC addresses, and make decisions based on these to forward data to it’s destination only
They both possess two types of ports: MDI and MDI-X. The MDI-X port has it’s wiring crossed and is used
to connect to devices with an MDI port such as PC, server, router, printer, firewall and so on using a
straight-through cable.
Both devices come in two versions: managed and unmanaged. They also use LEDs to indicate certain
connection conditions. I observed that the LEDs show current status of the device such as duplex mode,
speed, activity, errors/collision and so on.
d) Network Router: It’s primary function is to route data packets to other networks, instead of only the
local computers. When a data packet comes into one of the links, the router reads the address
information in the packet to determine its ultimate destination. Then, using information in its routing
table or routing policy, it directs the packet to the next network on its journey.
Essentially, a router bridges the gap between other networks and gives a network access to more features
such as firewall, VPN, QoS, traffic monitoring and much more.
13
Plate 3.4: A Cisco 1800 series ISR Router
3.1.2.2 CLASSIFICATION OF NETWORKS
From my experiences gained at NEC, I discerned that a network can be classified into three different
categories: by geography, topology and architecture.
3.1.2.2.1 CLASSIFYING NETWORKS BY GEOGRAPHY
The fundamental differences among these are distance coverage, data rates,transmission delay, media and
error rates.
i. Personal Area Network (PAN): It is a network that exist around an individual within a single building
e.g. between two Bluetooth devices/smartphones.
ii. Local Area Connection (LAN): It is owned by a single organization and physically located in the same
building or within a group of buildings. A LAN is useful for sharing of resources such as printers, file
servers, flash drives, CD-ROM, scanners etc.
iii. Campus Area Network (CAN): is a computer network of computer devices or LANs connected
together within a wide campus.
iv. Metropolitan Area Network (MAN): It interconnects or links multiple LANs by using high bandwidth
backbone inside a large city or metropolitan region covering up to 40km.
v. Wide Area Network (WAN): is a network that exists over a large-scale geographical area. A WAN
connects different smaller networks, including LANs and MANs. WAN implementation can be done
either with the help of the public transmission system or a private network. The Internet is a WAN.
14
vi. Global Area Network (GAN): refers to a network composed of different interconnected networks that
cover an unlimited geographical area. The term is loosely synonymous with Internet, which is
considered a global area network. The most sought-after GAN type is a broadband GAN, which is a
global satellite Internet network that uses portable terminals for telephony.
Because the cable length in a LAN do not generally exceed about 3km, it transmits data at a much higher
speed than a WAN which may extend across entire continents and have intercontinental links. Same trend
occur for error rates and transmission delays in both.
3.1.2.2.2 Classifying Networks By Topology
Network Topology refers to the arrangement by which computers are connected to each other. Topologies
use either a point-to-point or multipoint connection scheme.
A connection scheme indicates how many devices are connected to a transmission media segment or an
individual cable.
An example of a point-to-point connection scheme is a modem or printer connected to computer, direct
cable connection between two computers.
An example of a multipoint connection scheme is a star or bus topology network.
3.1.2.2.2.1 Physical vs. Logical Topologies
Physical topology refers to the way in which a network is laid out physically, that is, the actual layout of the
wire or media (cabling). Two or more devices connect to a link; two or more links form a topology.
Two networks might have the same physical topology, but distances between nodes, physical
interconnections, transmission rates, or signal types may be different.
Logical topology defines how the hosts access the media to send data. It shows the flow of data on a
network. The two most common types of logical topologies are broadcast and token passing.
A physical topology can be further categorized into two types: LAN and WAN (site-to-site) topologies.
15
1. LAN Network Topologies
i. Bus Topology: It consists of a main run of cable(s) that transmit data to all the nodes on the
network. Terminators at the end of the cable prevent signals from reflecting back to the sender.
Break or faulty piece of cable anywhere on the segment prevents all the computers on the
segment from being able to communicate.
ii. Ring Topology: Each node is connected to its two adjacent nodes and data is circulated around
the closed ring. Each device in the ring incorporates a repeater, which regenerates the bits of a
signal intended for another device and passes them along.
iii. Mesh Topology: There is multiple data paths between network devices or nodes. It require
extra cables, which makes it costly, and it is very complex and difficult to manage. It is not
commonly used these days.
iv. Star Topology: This is the most widely used network topology. It involves the use of a central
intermediary device (e.g. a network switch/router) to connect among all the endpoints.
v. Hybrid Topology: It is a mixture of different topologies. Examples include a star-ring
network.
Fig 3.0: LAN network topologies
16
2. Site-to-Site Network Topologies
i. Hub-and-spoke WAN Topology: Large enterprises have multiple offices (physical sites) in different
geographical locations. Normally, Internet Service Providers (ISPs) provide network connectivity
solutions to connect multiple physical sites in different geographical locations. In this network topology,
one physical site acts as “Hub”, while other physical sites act as “spokes”. The network communication
between two spokes always travel through the hub, since they are connected to each other via Hub site.
Fig 3.1: Hub-and-spoke network
ii. Tree Topology: It has a root node and all other nodes are connected to it forming a hierarchy, it is also
called hierarchical topology.
3.1.2.2.3 CLASSIFYING NETWORKS BY ARCHITECTURE
By architecture means where do the clients get their resources such as a dedicated server on a network, or
from one another.
i. Client-Server Network: Shared resources are placed on a dedicated server that manage a
given resource on behalf of clients sharing the resources. Examples of servers include file
server, web server, printer server, DNS server, DHCP server, optical disk server.
ii. Peer-to-peer Network: Computers communicate with any other networked computers on an
equal or peer-like basis without going through an intermediary, such as a server or dedicated
17
host. Resources are located at terminals and system administration is largely left up to the
users.
Fig 3.2: Client-server network Fig 3.3: Peer-to-peer network
3.1.2.3 NETWORK REFERENCE MODELS
A reference model is a conceptual blueprint of how communication should take place. For a network to
work correctly, the various devices and software must follow rules which come in the form of standard and
protocols.
3.1.2.3.1 HISTORY OF REFERENCE MODELS
When networks first existed, computers could only communicate with computers from the same
manufacturer. So, if a company bought computers from three vendors, network engineers often had to create
three different networks based on the networking models created by each company, and then somehow
connect those networks, making the combined networks much more complex. The ISO took on the task to
create an open, vendor-neutral networking model that would aid competition and reduce complexity by
developing the OSI model. Years later, the DoD released their TCP/IP networking model for the same
purpose.
Presently, TCP/IP dominates and while proprietary networking models still exist, they have mostly been
discarded in favor of TCP/IP.
18
3.1.2.3.2 THE OSI REFERENCE MODEL
The OSI (Open Systems Interconnection) model is a reference model for how applications communicate
over a network. A reference model is a conceptual framework for understanding relationships. The purpose
of the OSI reference model is to guide vendors and developers so the digital communication products and
software programs they create can interoperate, and to facilitate a clear framework that describes the
functions of a networking or telecommunication system. Most vendors involved in telecommunications
make an attempt to describe their products and services in relation to the OSI model.
The main concept of OSI model is that the process of communication between two endpoints in a network
can be divided into seven distinct groups of related functions, or layers. The model is composed of seven
ordered layers: physical (layer 1), data link (layer 2), network (layer 3), transport (layer 4), session (layer 5),
presentation (layer 6), and application (layer 7).
3.1.2.3.2.1 ORGANIZATION OF THE OSI LAYERS
The seven layers can be thought of as belonging to three subgroups:
A. The Network support layers: Layers I, 2, and 3; they deal with the physical aspects of moving data
from one device to another (such as electrical specifications, physical connections, physical addressing,
and transport timing and reliability).
B. The Transport layer: Layer 4; it links the two subgroups and ensures that what the lower layers have
transmitted is in a form that the upper layers can use.
C. The User support layers: Layers 5, 6, and 7; they allow interoperability among unrelated software
systems.
The upper OSI layers are almost always implemented in software; lower layers are a combination of
hardware and software, except for the physical layer, which is mostly hardware.
3.1.2.3.2.2 FUNCTIONS OF EACH LAYER
19
Summary of the functions of each layers is given below:
1. Application - contains protocols used for process-to-process communications. Basically, it provides
functions for users or their programs. This layer does not represent user applications on a system
such as a web browser or spreadsheet, but defines the processes that enable applications to use
network services.
2. Presentation - it’s basic function is to convert the data intended for or received from the application
layer into another format, so that it can be transported across the network. Some common data
formats handled by this layer include: Graphics files (JPEG, PNG), Text and data (ASCII), Sound
/ video (MPEG, MP3). This layer also provides encryption.
3. Session - is responsible for managing and controlling the synchronization of data between
applications on two devices. It does this by establishing, maintaining, and breaking sessions.
Whereas the transport layer is responsible for setting up and maintaining the connection between
the two endpoints, the session layer performs the same function on behalf of the application.
4. Transport - responsible for host-to-host communication and making sure the segments received from
the upper layer reaches their destination. It performs error correction, reliable delivery of data ,
segmentation and reassembly of the data. It uses TCP and UDP protocols.
5. Network - the primary responsibility of this layer is routing - providing mechanisms by which data
can be passed between networks. It does so by using logical addresses such as IPv4, IPv6 and
Appletalk.
6. Data Link - is responsible for communication in a LAN using physical address called MAC address.
It has two distinct sublayers: MAC and LLC layers.
7. Physical - describes the mechanical, electrical, functional, and procedural means to transmit
bits/signals across physical connections.
20
Fig 3.4: Encapsulation of data from layer-to-layer
3.1.2.3.3 THE TCP/IP SUITE
The TCP/IP suite is a set of protocols used on computer networks today (most notably on the Internet). It
provides an end-to-end connectivity by specifying how data should be packetized, addressed, transmitted,
routed and received on a TCP/IP network. This functionality is organized into four abstraction layers and
each protocol in the suite resides in a particular layer.
The TCP/IP suite is named after its most important protocols, the Transmission Control Protocol (TCP) and
the Internet Protocol (IP).
Fig 3.5: Comparison of OSI vs TCP/IP and their corresponding protocols
21
3.1.2.4 TRANSMISISON MEDIA
The type of interface(s) used by a device to connect to a network depends on the medium being used to
connect. A wireless network interface is used to connect to a network over-the-air using a standard such as
IEEE 802.11. There are various types of wired mediums in use today, the most common of which follows
the IEEE 802.3 standard (Ethernet). Most devices that have a wired network interface will have at least one
Ethernet interface.
3.1.2.4.1 WIRED MEDIA
These are media which require the use of wires, lines and cables to transmit communication signals or data
(bits). During my industrial training at NEC, I encountered majorly three different types of wired network
media namely: coaxial cables, twisted cables and optical fibre cables.
1. Coaxial Cables
A coaxial cable is an alternative for protecting data from noise. Coaxial cables do not produce external
electric and magnetic fields and are not affected by them. This makes them ideally suited, although more
expensive, for transmitting signals.
Fig 3.6: Coaxial cable
Coaxial cables is outdated as an Ethernet technology and have been replaced by twisted pair Ethernet, which
is easier and cheaper to install.
2. Twisted Pair Cables
This is so called due to the fact that wire pairs in the actual cable are twisted together. When electrical
current passes over any wire, it creates electromagnetic interference (EMI) that interferes with the electrical
22
signals in nearby wires, including the wires in the same cable (EMI between wire pairs in the same cable is
called crosstalk). Twisting the wire pairs together helps cancel out most of the EMI, so most networking
physical links that use copper wires use twisted pairs.
There exist two types of twisted pair cables: Shielded Twisted Pair and Unshielded Twisted Pair (UTP). The
shielded twisted pair cable gives better network strength while UTP cable provides faster transfer rate. In
most situations, UTP cables get the job done just fine and at the same time cost less than the shielded type.
Hence, why UTP is popular and usually used among the two.
In a twisted pair cable, there are eight copper wire that are coated with different colours; the colours are
mix/orange, orange, mix/blue, blue, mix/green, green, mix/brown and brown.
Fig 3.7: Unshielded pair Fig 3.8: Shielded pair
3. Optical Fibre Cables
Fiber-optic cabling uses glass as the medium through which light passes, varying that light over time to
encode 0s and 1s. It transmits optical pulses instead of electric signals, so it does not get interfered by
electrical interference.
Fiber-optic cables use fiberglass, which allows a manufacturer to spin a long thin string (fiber) of flexible
glass. A fiber-optic cable holds the fiber in the middle of the cable, allowing the light to pass through the
glass, which is a very important attribute for the purposes of sending data.
Although sending data through a glass fiber works well, the glass fiber by itself needs some help. The glass
could break, so the glass fiber needs some protection and strengthening. The three outer layers of the cable
provides the needed protection for the interior of the cable and make the cables easier to install and manage.
23
A light source, called the optical transmitter, shines a light into the core. Light can pass through the core;
however, light reflects off the cladding back into the core.
Fig 3.9: Components of a Fibre-Optic Cable
Optical fibre come in two types:
i. Multi-mode Fibre: Multi-mode improves the maximum distances over UTP, and it uses less expensive
transmitters as compared with single-mode.
Fig 3.10: Transmission on Multimode Fiber with Internal Reflection
ii. Single-Mode Fibre: Single-mode allows distances into the tens of kilometers, but with slightly more
expensive hardware.
Fig 3.11: Transmission on Single-Mode Fiber with Laser Transmitter
24
3.1.2.4.2 WIRELESS MEDIA
To fully explore the wireless added dimension, communication system designers have sought to use wireless
media to reduce infrastructure cost and complexity, when compared to wired communication systems. There
is no need to construct miles of telephone line poles or cable trenches.
I learnt that the wireless devices use radio frequencies (RFs) that are radiated into the air from an antenna
that creates radio waves. Wireless LANs run half-duplex communication, similarly as Ethernet hubs, due to
the fact that everyone is sharing the same bandwidth. Hence, only one user can communicate at a time.
There are various kinds of IEEE 802.11 (also called the Wi-Fi Alliance) wireless standards that have been in
use in a LAN, each offering new features which each updates:
Table 3.1: IEEE 802.11 Wireless Standards
IEEE Standard Frequency Range Max. Speed Max. Distance Capacity Per Cell
IEEE 802.11a 5 GHz 54 Mbps 200 ft 15 users
IEEE 802.11b 2.4 GHz 11 Mbps 350 ft 25 users
IEEE 802.11g 2.4 GHz 54 Mbps 300 ft 20 users
IEEE 802.11n 2.4/5 GHz 300 Mbps 230 ft Not definite
IEEE 802.11ac 5 GHz 0.5-1 Gbps 230 ft Not definite
3.1.2.5 ETHERNET CABLING
3.1.2.5.1 ETHERNET LANS
Many types of LANs have existed over the years, but today’s networks use two general types of LANs:
Ethernet LANs and Wireless LANs (WLANs). Ethernet LANs use cables for the links between nodes, and
because many types of cables use copper wires, Ethernet LANs are often called wired LANs. Ethernet LANs
also make use of fiber-optic cabling.
3.1.2.5.1.2 IEEE CABLING STANDARDS
25
The Ethernet physical layer standards specifies the name and features of cables used in an Ethernet LAN. So
one should consult it before deciding on products to buy for a new LAN.
Table 3.2: IEEE 802.3 Cabling Standards
Speed Common Name Informal IEEE
Standard Name
Formal IEEE
Standard Name
Cable Type/Max. Length
10Mbps Thin-Wire Ethernet 10Base2 (thinnet) Coaxial/200m
10Mbps Thick-Wire Ethernet 10Base5(thicknet) Coaxial/500m
100Mbps FastEthernet 100Base-T 802.3u Copper (UTP)/100m
1000Mbps GigabitEthernet 1000Base-LX 802.3z Fibre (single-mode)/5000m
1000Mbps GigabitEthernet 1000Base-T 802.3ab Copper (UTP)/100m
3.1.2.5.1.3 ETHERNET PROTOCOLS IN DATA LINK LAYER VS PHYSICAL LAYER
Although Ethernet includes many physical layer standards, Ethernet acts like a single LAN technology
because it uses the same data-link layer standard over all types of Ethernet physical links.
I learnt that whether the data flows over a UTP cable or any kind of fiber cable, and no matter the speed, the
data-link header and trailer use the same format.
While the physical layer standards focus on sending bits over a cable, the Ethernet data-link protocols focus
on sending an Ethernet frame from source to destination Ethernet node.
3.1.2.5.1.3.1 ETHERNET FRAMES
The encapsulated data defined by the Network Access layer is called an Ethernet frame. An Ethernet frame
starts with a header, which contains the source and destination MAC addresses, among other data. The
middle part of the frame is the actual data. The frame ends with a field called Frame Check Sequence (FCS).
The Ethernet frame structure is defined in the IEEE 802.3 standard. Here is a graphical representation of an
Ethernet frame and a description of each field in the frame:
26
Fig 3.12 : An Ethernet frame
I. Preamble: informs the receiving system that a frame is starting and enables synchronization.
II. SFD(Start Frame Delimiter): signifies that the Destination MAC Address field begins with the next
byte.
III. Destination Address: identifies the receiving system.
IV. Source Address: identifies the sending system.
V. Type: defines the type of protocol inside the frame, for example IPv4 or IPv6.
VI. Data: contains the payload data. Padding data is added to meet the minimum length requirement for this
field (46 bytes).
VII. FCS (Frame Check Sequence): contains a 32-bit Cyclic Redundancy Check (CRC) which allows
detection of corrupted data.
The FCS field is the only field present in the Ethernet trailer. It allows the receiver to discover whether
errors occurred in the frame. Note that Ethernet only detects in-transit corruption of data; it does not attempt
to recover a lost frame. Other higher level protocols (e.g. TCP) perform error recovery.
3.1.2.5.1.4 FULL AND HALF DUPLEX IN ETHERNET LANS
a) Ethernet Shared Media: It refers to network designs that use hubs, and share the bandwidth. The
devices connected to the hub share the network because they must use CSMA/CD to avoid collisions of
signals, and CSMA/CD enforces rules that allow only one device to successfully send a frame at any
point in time which implies half-duplex communication.
27
b) Ethernet Point-To-Point: In a network built with switches, each (point-to-point) link works
independently of the others. Because a switch isolates each link into separate collision domains, a frame
can be sent and received on every point-to-point link in an Ethernet at the same time.
3.1.2.5.1.5 UTP CABLING
Before the Ethernet network as a whole can send Ethernet frames between user devices, each node must be
ready and able to send data over an individual physical link.
3.1.2.5.1.5.1 TRANSMITTING DATA USING TWISTED PAIRS
To better illustrate how Ethernet sends data using electricity, two scenarios are considered as shown below:
First, an electrical circuit is created between two nodes using the two wires inside a single twisted pair of
wires inside a UTP cable. So, the two nodes, using circuitry on their Ethernet ports, connect the wires in one
pair to complete a loop, allowing electricity to flow.
+
Fig 3.13: Creating One Electrical Circuit over One Pair to Send in One Direction
Secondly, following some set of rules called encoding scheme, the transmitting node changes the electrical
signal over time, while the other node, the receiver, using the same rules, interprets those changes as either
0s or 1s. I learnt that Ethernet uses Manchester encoding.
3.1.2.5.1.5.2 METHODS OF UTP CABLING
There are three connection methods for the UTP cable with it’s connector (RJ45) and every method is used
in a certain situation: straight-through , crossover and rolled cables.
28
Ethernet twisted pair cable uses two pairs of wires for transmission of data. MDI devices (e.g. PC) transmits
on pins “1” and “2”, and receives on pin “3” and “6”. Knowing this fact, switches and hubs use MDI-X
which reverses the wiring scheme of MDI.
a) Straight-through cable: This cable is used to connect between two devices with different interfaces or
ports. This is achieved through the use of the same color scheme on both ends of a UTP. The color code
used may be either T-568A or T-568B standard.
Fig 3.14: MDI to MDI-X connection Fig 3.15: Straight-through wiring
b) Crossover cable: It connects two devices with the same interface or ports. This cable is made by using
different color schemes on the ends of a UTP cable.
Fig 3.16: MDI to MDI connection Fig 3.17: Crossover wiring
c) Rolled cable: This is a special cable which used to connect a PC or laptop to a router’s console, in case
we need to configure the router directly or perform initial configuration on it.
29
Fig 3.18: Rolled cable wiring
3.1.2.5.1.5.3 HOW TO MAKE A CAT 5/6 UTP CABLE FOR TRANSMITTING
STRAIGHT-THROUGH OR CROSSOVER
I learnt that there is various categories of UTP cables: CAT 1 to 8; each with their various capability.
The following are the materials needed to produce an Ethernet LAN UTP cable:
a) Cat 5 cable: One can buy a 1000 feet roll of Cat 5 cable at computer stores and industry supply houses
at an affordable price depending on the quality. Check to make sure that the color-coding on the wires is
easily recognizable.
Plate 3.5: A pack of cat 5 cables
b) RJ-45 Connectors: RJ45 is a standard type of connector for network cables. RJ45 connectors are most
commonly seen with Ethernet cables and networks. RJ45 connectors feature eight pins to which the
wire strands of a cable interface electrically. They usually come in bags of 50, 100 etc. Attention should
be paid to the type of RJ-45 connector being purchased and make sure it is intended for the type of Cat 5
wire you are using. There are two different kinds of RJ-45 connectors, using the wrong kind with the
wrong cable will most likely result in a bad connection
30
c) Crimping tool: Is a tool used to terminate category cables such as CAT1-CAT6 using an RJ-45
connector. A good crimping tool has a pair of wire cutters built in, as well as a blade to strip insulation.
It also might support crimping of other connectors such as RJ-11.
d) LAN cable tester: This is used to test if a category cable has been well terminated, or developed a fault.
e) Diagonal Cutter Pliers: You will need a pair of this to cut the wires in case the crimper does not come
with a built-in wire cutter or failed to cut.
Plate 3.6: RJ-45 connectors Plate 3.7: Crimping tool Plate 3.8: Cable tester
STEPS INVOLVED
Step1: Cut a piece of Cat 5 cable as long as you need. Make sure the cut on each end is clean and straight.
Plate 3.9: A cut cat 5 cable
Step2: Strip about an inch of the insulation off the cable. It is extremely important that you only cut the
plastic insulation or jacket and not the wire. Damaging one of the 8 wires, even if you just nick it or
partially cut it, will ruin your cable.
Plate 3.10: A stripped cable
31
Step 3: Untwist the wires and pair similar colors. Sort the 4 pairs of multi-colored wires inside and align
according to preferred wiring standard (color scheme).
Plate 3.11: Untwisted cat 5 cable
Step 4: Prepare wires for RJ-45 connector. Get the wires lined up nice and straight. Then clip off the top
millimeter so that they are all the same length and stick out about half an inch from the insulated part.
Plate 3.12: A lined-up/straightened cable
Step 5: Insert wires into RJ-45 connector.
Plate 3.13: Inserted cable
Step 6: Crimp and test the continuity.
Plate 3.14: Crimping the cable Plate 3.15: Crimped cable Plate 3.16: Testing of the cable
32
Using Optical Fiber Cables With Ethernet (Fiber-Optics Cabling)
The distance between Ethernet switches and endpoints in a LAN is unlikely to exceed the maximum cable
length capability of UTP cables, however, there might cases where, in a LAN, fiber cabling is the only way
to go.
To use fiber with Ethernet switches,your switch must have ports (built-in or modular) that supports optical
Ethernet Standard. Two cables are needed to transmit between two devices, one for each direction. Despite
the cost being relatively high when compared with UTP, benefits for using fiber include longer distance,
higher transfer speed and zero risk of EMI and signal emissions.
3.1.2.5.1.6 WIRELESS LAN
I worked with two of the most common wireless LAN technologies namely: Wi-Fi and Bluetooth.
3.1.2.6 RELEVANT TERMS USED IN NETWORKING
Host: A host is the ultimate consumer of communication services. It is a physical network node with an IP
address assigned and they are general-purpose computers. It has a complete network stack from physical
layer to application layer.
Node: It is any device that is active in the network; a node may have only a partial network stack e.g. only
physical layer or only physical to network layer. All hosts are nodes but all nodes are hosts.
Gateway: A device connected to two or more networks, appearing to each of these networks as a connected
host. Thus, it has a physical interface and an IP address on each of the connected network.
Ethernet: It refers to an entire family of standards or technologies for LANs. The Ethernet protocol, also
referred to as IEEE 802.3, has largely replaced competing wired LAN technologies. Ethernet used coaxial
cable as a shared medium. Later, the coaxial cables were replaced by twisted pair and fibre optics links in
conjunction with hubs or switches.
33
Collision Domain: This is the part of a network where packet collisions can occur. A collision occurs when
two devices send a packet at the same time on the shared network segment. Collisions are often in a hub
environment, because each port on a hub is in the same collision domain.
Broadcast Domain: It is the domain in which a broadcast is forwarded. A broadcast domain contains all
devices that can reach each other at the data link layer (OSI layer 2) by using broadcast. All ports on a hub
or a switch are by default in the same broadcast domain.
DNS: Domain Name System, is the phone-book of the Internet,
DHCP: Dynamic Host Configuration Protocol,
Firewalls: A firewall is a device that prevents unauthorized electronic access to an entire network. The
term firewall is generic, and includes many different kinds of protective hardware and software devices.
Proxy Server: acts as a gateway between a host and the internet. It’s an intermediary server separating end
users from the websites they browse. Proxy servers data security, network performance and a high level of
privacy.
World Wide Web (WWW): is a collection of interconnected documents and other resources, linked by
hyperlinks and URLs. It is one of the services accessible via the Internet along others including email, video
streaming etc. It is fundamentally a client/server application running over the Internet and TCP/IP intranets.
Internetwork: can be defined as two or more computers (typically LANs) which are connected together,
using network routers. Each network in an internetwork has it’s own network address. The words
internetwork and internet are simply a contraction of the phrase interconnected network, internet should not
be confused with Internet.
Internet: is a worldwide publicly accessible computer network of interconnected computer networks that
transmit data using the standard Internet Protocol (IP) . Internet is such a huge network of several different
interlinked networks relating to the business, government, academic, and even smaller domestic networks,
therefore internet is known as the network of all the other network.
34
Intranet: An intranet is a private network that is contained within an enterprise. It may consist of many
interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet
includes connections through one or more gateway computers to the outside Internet. The main purpose of
an intranet is to share company information and computing resources among employees. An intranet can
also be used to facilitate working in groups and for teleconferences.
Extranet: It can be viewed as part of a company’s intranet that is extended to users outside the company.
VPN: In a VPN, Virtual Private Network, private communication between two or more devices is achieved
through a public network in the Internet.
Backbones: are large networks that exist primarily to interconnect other networks.
Network Protocols: are rules and standards that must be followed before any form of communication can
occur over a network. They extend from the electric connection to the network and the format of the
message, all the way to the interaction between application programs that run on different endpoints.
Proprietary protocols are developed by a company while standard protocols are not vendor-specific.
Quality of Service (QoS): The application of QoS is a methodology used to provide optimal performance
for a variety of applications in what is ultimately an environment with finite resources. A well-designed QoS
plan conditions the network to give access to the right amount of network resources needed by applications
using the network, whether they are real-time or interactive applications. If no QoS level is defined, the
network defaults to what is called best-effort service.
3.1.2.6.1 ORGANIZATION THAT GOVERNS NETWORK PROTOCOLS
i. IEEE: The Institute of Electrical and Electronics Engineers regulates the technologies and
protocols used in networks.
ii. IANA: Internet Assigned Numbers Authority, based in the United States, is an Internet-specific
organization that gives out (assigns and allocates) IP addresses in a systematic, organized and
consistent manner that benefits everyone.
35
iii. RIR: Regional Internet Registry, is an organization that manages and controls Internet
addresses in a specific region, usually a country and sometimes an entire continent. RIRs
control assigning and distributing IP addresses and domain registrations. The RIRs, as a matter
of fact, do not generate the IP addresses that they themselves allocate, but take the IP addresses
allocated to them by the IANA and handle the next level of allocation. They serve ISPs,
educational institutions, governments, large corporation and organizations.
iv. ICANN: Internet Corporation For Assigned Names And Numbers, is the institution which runs
IANA.
3.1.2.7 IP ADDRESSING AND SUBNET MASK
3.1.2.7.1 IP ADDRESS
An IP address is a long logical address that logically identify a host in a network. The two types of IP
addresses are IPv4 and IPv6. IPv4 is 32-bits and IPv6 is 128-bits.
IPv4 => 192.168.1.10. It contains four octets (8-bits each) divided by using dots “.”
IPv6 => 2001:0DB8:0000:0000:1234:0000:A9FE:133E. It comprises alphanumeric eight octets (16-bits
each) separated by colon “:”.
3.1.2.7.1.1 Functions of IP Addressing
i. For location of a device on the network
ii. It is assigned to allow hosts on one network to communicate to hosts on another network.
Computers do not understand decimal but only binary.
3.1.2.7.1.2 Terms used in IP addressing
i. Bit- A bit is a binary digit, either 0 or 1.
ii. Byte - A byte is eight bits.
iii. Network address - This is a designation used to send packets to a remote network. Examples
are 10.0.0.0, 172.68.0.0, 192.168.10.0
36
iv. Broadcast Address - This is the address used to send data to all hosts on a broadcast domain.
When all the host bits are on (‘1’) this is a broadcast address for all hosts, 255 are reserved for
sending broadcast message. E.g. 192.168.10.255.
v. Unicast Address - is an address that identifies a unique node on a network
3.1.2.7.1.3 Classes of IPv4 Addresses
IPv4 which is 32-bits has class ranges from class A-E.
a. Class A: This Class of address can only be between 0 and 127. All 0’s reserved are for default
route and ‘127’ is reserved for troubleshooting –loop back, therefore, Class A valid address
ranges that can be assigned to host on a network is 1-126.
b. Class B: It ranges between 172 – 191.
c. Class C: Class address can only be between 192 – 223.
Note: Class A to C are unicast addresses.
d. Class D: 224-239. It is used for multicasting.
e. Class E: 240-255. It is for research purposes.
3.1.2.7.1.4 PRIVATE IPV4 ADDRESSES
Are introduced in mid 1990s due to depletion of IPv4 addresses. They are used only in internal networks
such as LANs, and must be translated to a public IPv4 to be routable to the Internet.
3.1.2.7.1.4.1 PRIVATE IP ADDRESS BLOCKS
i. Class A: 10.0.0.0 to 10.255.255.255
ii. Class B: 172.16.0.0 to 172.31.255.255
iii. Class C: 192.168.0.0 to 192.168.255.255
37
3.1.2.7.1.2.5 PUBLIC IPV4 ADDRESSES
Are allowed for use on the Internet. The ranges of the public IPv4 addresses are as follows:
a. Class A - 1.0.0.0 to 9.255.255.255
11.0.0.0 to 126.255.255.255
b. Class B - 128.0.0.0 to 172.15.255.255
172.32.0.0 to 191.255.255.255
c. Class C - 192.0.0.0 to 192.167.255.255
192.169.0.0 to 223.255.255.255
3.1.2.7.2 SUBNET MASK
Each host on a TCP/IP network is assigned a unique 32-bit logical address, called subnet mask, which is
divided into two main parts: network ID portion of the IP address and the host ID portion of the IP address.
It enables one to know the network portion and host portion of any IP address.
If no subnet mask information is associated with the IP, then the default is to determine the network portion
and the host portion of this IP address depending on its IP class as shown in Table 3 below.
The subnet mask determines the network portion and the host portion of an IP address by converting the
network portion to all ones and converting the host portion to all zeros.
Subnet mask 255.255.255.0 (decimal) or /24 => 11111111.11111111.11111111.00000000 (binary)
Network ID - 1 bit portion of subnet mask
Host ID - 0 bit portion of subnet mask
Table 3.3: Subnet Mask for Different Classes of Networks
Class of IP Format Default Subnet Mask
A Network. host. host. host 255.0.0.0
38
B Network. network. host. host 255.255.0.0
C Network. network. network. host 255.255.255.0
The theoretical method to get the network IP, is to make a logical AND operation between the IP and its
subnet mask.
3.1.2.7.3 IP SUBNET ADDRESSING (SUBNETTING)
Subnetting is to get many network IPs (called subnets) from only one network IP. To create subnetworks,
bits are taken from the host portion of the IP address and reserved to define the subnet address. Subnetting
provides the network administrator with several benefits, including extra flexibility, more efficient use of
network addresses, and the capability to contain broadcast traffic (i.e. a broadcast will not cross a router).
Subnets are under local administration. As such, the outside world sees an organization as a single network
and has no detailed knowledge of the organization’s internal structure. Subnetting can be done in three basic
ways:
1) Based on the number of subnetworks you wish to obtain from a single block of IP address.
2) Based on the number of host computers or devices you want to be connected to that
sub-network.
3) By reverse engineering which is a scenario in which a subnet mask and an IP address block is
given and the number of subnetworks and number of hosts per each subnet are found.
Based on the power of 2s (binary), there are some equations that allow us to determine the required details,
and these are:
i. Number of subnets = 2x
subnets
ii. Number of hosts per subnet = 2y
- 2 hosts
39
iii. Block size / Increment = value of last network ID in decimal
3.1.2 NETWORK CONFIGURATION
3.1.2.1 CISCO IOS, ROUTER AND SWITCH
The Cisco IOS (Internetworking Operating System) is a proprietary kernel that provides routing, switching,
internetworking and communications features on Cisco routers and switches, and it’s what allows the
configuration of the devices as well.
3.1.2.1.1 CONNECTION TO A CISCO DEVICE
I learnt that there are three various ways to connect to Cisco router for configuration purposes:
1. The Console port: Rollover cable (also known as Cisco console cable) is a type of cable that is most
commonly used to connect a computer terminal to a router's console port. PuTTY or other terminal
emulators are used to open a console session, and then configure the router or switch.
2. The Auxiliary port: This port is usually used when one needs to configure the router out-of-band,
meaning out of the network. A switch does not have this port.
3. Use of an In-band program: This is done through the use of a terminal emulation program such as
Telnet or its secure form called SSH (SecureShell).
3.1.2.1.2 CISCO DEVICES HARDWARE
There are many models of routers and switches with certain capabilities and features, but every model
contains a certain number of Ethernet and Serial ports. Some models allow increase in their number ports by
plugging some in them.
The LAN is always connected to the router through its Ethernet port, hence the port is known as the LAN
interface. While the WAN is connected through the Serial port and called the WAN interface.
40
3.1.2.1.3 THE CLI COMMANDS
The CLI (Command Line Interface) is the software interface that the network administrator uses in order to
configure the Cisco device. The CLI has different modes which permit configuration of a certain set of
functions.
i. Setup mode: This is the initial configuration mode, which contains interactive config dialogue that
enables one to to configure the Cisco device.
ii. USER EXEC mode: This is used for and limited to basic monitoring commands.
iii. PRIVILEGED mode: Provides access to all other router and switch commands.
iv. Global configuration mode: Commands made in this mode affect the entire system.
v. Specific configuration mode: Used for commands that affect interfaces/processes only.
3.1.2.2 CISCO PACKET TRACER
Packet Tracer is an exciting network design, simulation and modelling tool that allows one to develop skill
set in networking, cybersecurity, and the Internet of Things (IoT). It allows one to model complex systems
without the need for dedicated equipment. It is used to practice CCNA-level network configurations and
troubleshooting skills via a PC or computer devices.
Most importantly, it helps students and instructors create their own virtual network worlds for exploration,
experimentation, and explanation of networking concepts and technologies.
During my training at NEC, I was able practice and simulate many network scenarios using this software.
3.1.2.3 NETWORKS SIMULATED
I learnt how to perform basic administrative configurations such as hostnames, banners, passwords (enable,
console, telnet, SSH), management IP, default gateway, saving running-config, VLANs and so on; using a
real Cisco Catalyst 2950G switch. Then, I performed various tasks using the Packet Tracer to simulate
network labs for my configurations.
41
3.1.2.3.1 A SMALL OFFICE
I designed a real world scenario of a small office, and applied various concepts such as subnetting, VLANs,
trunks etc.
Fig 3.19: A simulated small office network
After the design, I used a troubleshooting tool called PING, to test connectivity among all the device to
ensure the specifications are met.
42
Fig 3.20: The virtual window of the network ADMIN’s PC
43
Fig 3.21: The virtual window of a Sales PC
As can be seen from the pictures above, only computers in the same department could communicate with
with each other, but not with other department’s. And only the ADMIN could telnet and configure any of the
switches.
3.1.3 NETWORK SECURITY
There are many security threats that can affect a network. One of the best practices in network security is to
try and stop security threats from the entry-point of a LAN network. This means that the switch can play an
important role in network security since it’s the entry-point of the network.
44
3.1.3.1 PORT SECURITY
This method is usually used to prevent layer 2 threats such as: STP attacks, ARP attacks, MAC Spoofing,
(VLAN) Hopping, DHCP spoofing and so on.
Port security is a method of securing an interface by only allowing traffic from a specific set or number of
MAC Address. If traffic from an invalid MAC is detected, it will be blocked or dropped. This is a low level
form of security that can be used to prevent unwanted devices from being connected to the network.
One can configure the interface for one of these violation modes, based on the action to be taken if a
violation occurs:
a) Restrict: A port security violation restricts data, causes the SecurityViolation counter to increment, and
causes an SNMP Notification to be generated. The rate at which SNMP traps are generated can be
controlled by the snmp-server enable traps port-security trap-rate command. The default value ("0")
causes an SNMP trap to be generated for every security violation.
b) Shutdown: A port security violation causes the interface to shut down immediately. When a secure port
is in the error-disabled state, you can bring it out of this state by entering the err-disable recovery
cause secure-violation global configuration command or you can manually re-enable it by entering
the shutdown and no shut down interface configuration commands. This is the default mode.
3.1.3.2 NETWORK ACCESS CONTROL (FOR ENTERPRISE NETWORKS)
Access Control: In the context of network security, access control is the ability to limit and control the
access to host systems and applications via communications links.
Network Access Control: Network access control (NAC) is an umbrella term for managing access to a
network. It authenticates users logging into the network and determines what data they can access and
actions they can perform. NAC also examines the health of the endpoints.
3.1.3.2.1 ELEMENTS OF A NETWORK ACCESS CONTROL SYSTEM
45
1) Access requestor (AR): The AR is the node that is attempting to access the network and may be
any device that is managed by the NAC system. Also referred to as supplicants, or simply clients.
2) Policy server: It determines what access should be granted. It often relies on backend systems,
including antivirus, patch management, or a user directory, to help determine the host’s condition.
3) Network access server (NAS): It functions as an access control point for users in remote locations
connecting to an enterprise’s internal network. Also called a media gateway or a remote access
server, it may rely on itself or a policy server to provide authentication services.
3.1.3.2.2 NETWORK ACCESS ENFORCEMENT METHODS
Enforcement methods are the actions that are applied to ARs to regulate access to the enterprise network.
The common NAC enforcement methods are:
a. AAA and IEEE 802.1X: IEEE 802.1X is a link layer protocol that enforces authorization before a port
is assigned an IP address. IEEE 802.1X makes use of the Extensible Authentication Protocol for the
authentication process.
b. VLANs: A VLAN is a logical subgroup within a LAN that is created via software rather than manually
moving cables in the wiring closet. In this approach, the enterprise network, consisting of an
interconnected set of LANs, is segmented logically into a number of virtual LANs. The NAC system
decides to which of the network’s VLANs it will direct an AR, based on whether the device needs
security remediation, Internet access only, or some level of network access to enterprise resources.
c. Firewalls: A firewall provides a form of NAC by allowing or denying network traffic between an
enterprise host and an external user.
d. DHCP management: DHCP is an Internet protocol that enables dynamic allocation of IP addresses to
hosts. A DHCP server intercepts DHCP requests and assigns IP addresses instead. Thus, NAC
enforcement occurs at the IP layer based on subnet and IP assignment. A DCHP server is easy to install
and configure, but is subject to various forms of IP spoofing, providing limited security.
46
3.1.3.2.3 EXTENSIBLE AUTHENTICATION PROTOCOL (EAP)
EAP provides a set of protocol which 802.1X port access protocol use to encapsulate and pass the
authentication information between the supplicant and the authentication server.
Which EAP type to implement, or whether to implement 802.1X at all, depends on the level of security that
the organization needs, the administrative overhead, and features desired.
3.1.3.2.4 VPN
Instead of relying on Wi-Fi LAN for authentication and privacy (encryption), many enterprises implement a
VPN. This is done by placing the access points outside the corporate firewall and having the user tunnel in
via a VPN Gateway; just as if they were a remote user. The downsides of implementing a VPN solution are
cost, initial installation complexities, and ongoing administration overhead.
3.1.4 TROUBLESHOOTING SKILLS
One of the basic IP addressing troubleshooting techniques learnt consist of four steps which are as follows:
1) Open a DOS window and ping loopback address: If failed, then there is a TCP/IP stack failure.
2) Ping the IP address of the localhost from same DOS window: If this is successful, then your
NIC is functioning well.
3) Ping the default gateway (router): If ping works, then the NIC is connected into the network, and
communicate with it.
4) Ping the remote server: If it works, then there is an IP communication between localhost and the
remote server.
By applying the above techniques, one can figure out at what level an issue lies: whether internal or external
to the computer system.
47
3.2.0 ELECTRICAL MOTOR CONTROL
3.2.1 ELECTRIC MOTOR
An electric motor is an electric machine that converts electrical energy into mechanical energy. In normal
motoring mode, most electric motors operate through the interaction between an electric motor's magnetic
field and winding currents to generate force within the motor. In certain applications, such as in the
transportation industry with traction motors, electric motors can operate in both motoring and generating or
braking modes to also produce electrical energy from mechanical energy.
3.2.1.1 MOTOR CONTROL
Motor control is the basic electrical process by which an electrical motor is controlled be it an AC or a DC
motor. The electric motor can be categorized into different methods either by its intake voltage, by its mode
of connections or by its mode of starter.
3.2.1.2 DC MOTORS
Irrespective of the different types of DC motors, however suffice it to say that they are all connected in the
same manner. From the output of the motor terminal would be two wires where the right magnitude (either
12V, 24V etc. depending on the size of the motor) of the DC supply voltage is connected to it (+ve and –ve
terminals).
When connecting DC motor pay attention to the polarity of the plug or lead. Make sure to connect the +ve
lead to the positive terminal of the supply and –ve lead to the terminal marked -ve. As interchanging the
polarity will cause the motor to run/turn in the wrong (undesired) direction.
3.2.2 AC SQUIRREL CAGE INDUCTION MOTOR
The induction motor is also called Asynchronous Motor. It is classified into single phase and 3 phase. The
induction motor mainly deals with alternating current of 220Volts at a frequency of 50Hz.
3.2.2.1 3 PHASE INDUCTION MOTOR TERMINALS
48
In these motor, 3 phase voltages (red, yellow and blue phases) from the mains supply is applied
to the stator winding via the electrical terminal of the motor. Meanwhile the body/chassis of the motor must
be grounded/earthed. Owing to the mechanical construction of the rotor (squirrel cage type) winding. It
starts rotating in as much as the stator winding has been supplied by the right voltage that is stated on the
name plate of the motor.
So on the motor terminals from where the electrical power is fed to the stator, there are 6 terminals (which
are actually 3 pairs of coils) which are labeled as U1, V1, W1, on one side and U2, V2, W2 on the other side.
Two of these terminals are similar (because it is a single coil) and so they are labelled with the same
alphabet. Thus we would have;
 U1 and U2 is one coil, U1 is the start coil and U2 is the end coil
 V1 and V2 is one coil, V1 is the start coil and V2 is the end coil
 W1 and W2 is one coil, W1 is the start coil and W2 is the end coil
And the arrangement on the terminals of the motor is as show below:
Plate 3.17: 220V AC Electric Motor
49
3.2.2.2 CONNECTION OF INDUCTOR MOTORS TO AC SUPLLY
An induction motor's windings can be connected to a 3-phase AC line in two different ways:
i. Wye in U.S, star in Europe, where the windings are connected from phases of the supply to the
neutral;
ii. Delta (sometimes mesh in Europe), where the windings are connected between phases of the supply.
3.2.2.2.1 DELTA CONNECTION
One of the connection modes of the 3 phase induction motor is the DELTA CONNECTION. Some electrical
motors could be connected in delta form. When electrical motor is connected in delta at the terminal a small
metal is used to shunt the terminals in a vertical arrangement. It is such that the metal would shunt U1 and
V2, V1 and W2, W1 and U2 respectively. The picture below is a motor connected in delta
Plate 3.18: Delta connection mode
When the electrical motor is connected in delta the normal voltage from the line (i.e. from the supply) is
been supplied to the motor i.e. if your normal supply voltage per any pair phase (red/yellow, yellow/blue,
red/blue) is 415Volts; then this would be the voltage that would be on the motor’s terminal (i.e. in between
two different windings) when the supply is switched on.
50
After shunting the terminals vertically as shown in the figure above you can now connect your power supply
cable to any side of the coils either on U1, V1, W1 or V2, U2, W2.
3.2.2.2.2 STAR CONNECTION
One of the connection modes of the 3 phase induction motor is the STAR CONNECTION. In this mode, the
small metals are used to shunt the whole aspect of one section of the motor terminal and the power supply
cable must be connected only to the other side of the terminal and never to be shunted star joint side. We can
choose to shunt any aspect of the coil terminal (U1, V1, W1 or U2, V2, W2) and then put the supply cable
via the other side of the coil (but not on the same shunted side). The below is an image of star connection
mode.
Plate 3.19: Star connection mode
When the motor is connected in star mode, the shunted terminals forms the start point so that the voltage on
each windings is √(1/3) of the supply voltage unlike in the delta connection mode. Or for instance, if the
mains supply voltage is 15Volts then the voltage that appears on any pair of the coils must be 240Volts that
is 425(√1/3).
3.2.3 ELECTRICAL MOTOR STARTERS
Irrespective of connecting the electrical motor in star or delta mode, there will always be a switch or group
of switch gears that must be closed in other for current to flow from the mains power supply wired into the
51
wires that is connecting the motor and then into the motor’s stator. And only to the large size of induction
motors (used industrially) and the large amount of in rush current that is taken in when the motor is started,
it is not a safe practice to use an ordinary air break switch to close the circuit for power supply to flow to the
motor; as well as in interrupting the power supply to the motor in other for it to come to a halt more so there
is equally the need to protect the motor from damages that could resort from problems like short circuit or
overload.
Thus, electrical motors are proper connected with the following component: circuit breakers (of fuses),
contractors, overload relays and start/stop push button switches. Sometimes these components could be
coupled together in a panel such that all one needs is to connect a power supply wires to the starter (on the
input side of the panel) and then from the output side of the panel the load wire will be connected. There is
also the advantage that the panel can be located remotely (far away) from the location where the motor is
installed. On the panel, there would be a button that can be pressed (start button) for the motor to start and
another button (stop button) to bring the motor to a halt. Such panels are regarded as motor starter panel or
motor drives. In industrial application, we would often come in contact with the following types of starters
and drives.
I. Direct Online Starters (DOL)
II. Star/Delta starters
III. Variable Frequency Drives (VFD)
I. Direct Online Starters (DOL) CONNECTION MODE OF ELECTRICAL MOTORS
This type of connection involves connection of the induction motor directly across the supply voltage (3
phase). With this type of connection in the event of starting of the motor, there is an in-rush of full current
that is required to give the motor maximum torque. The effect of this in-rush current is sometimes noticed
by the slight dimming of light (that are connected to the same power systems as the motor) in the event of
starting of the motor.
In order to carry out this connection to the motor several switch gears are placed in between the supply line
and the motor terminals to protect the motors from problems of short circuit, overload etc. Also, the
52
connection can be done such that the motor can be started from distance very far from its point of
use/installation. So to carry out the wiring/building of a DOL starter, two types of circuit diagram is used to
describe it: the POWER CIRCUIT diagram and the CONTROL CIRCUIT diagram.
 POWER CIRCUIT DIAGRAM: This diagram shows how the main power gets to the motor from the
supply lines (mains). It tells the various switch gears that the power goes through. It is usually from
circuit breakers (or fuses) to contactors, overload relays and then to the terminals of the motor. The fig.
3.22 is a power circuit dig diagram of how the main power supply of either 220VAC or 415VAC gets to
the electric motor.
Fig 3.22: Power circuit diagram Fig 3.23: Control circuit diagram
 CONTROL CIRCUIT DIG: Even after connecting the electrical power from the mains up to the
electric motor terminal as described in the power circuit dig above and then close the circuit breaker, the
motor will not start as the contactor is not closed. So the electrical power will flow up to the supply part
of the contactor, but cannot go to the load part of the contactor until the contactor is closed. And the
contactor will not be closed until a (properly connected) START and STOP button is connected
53
properly with the auxiliary contacts of the contactor and the overload relay for proper operation of the
motor.
For the contactor to become closed the required voltage that is needed to energize the coils of the contactor
must be supplied to it. In the case of a contactor with single phase coil, then only a phase and neutral is
needed to be supplied to the contactor, however in a case of a contactor with a 2 phase coil, then two
different phases will be needed to energize the coil. The fig 3.23 is a control circuit of how the coils of the
contactor are energize using the start and stop buttons.
II. Star/Delta starters CONNECTION MODE
This is a form of reduced voltage starting of induction motor. It is usually used to start induction motors that
are of very large size (say from 7.5kW motor and above). If induction motor as large as 10kW and above
were to be started normally in a delta mode this would draw very large current from the power system at
start up for some seconds (which could seriously distort it and affect other loads like lightings that are
connected from the same power supply with the motor) thus leading to over sizing of the circuit breakers,
contactors and overload relays that are used to connect the motor. Besides the huge torque that is associated
with the delta starting may not be desired for some applications. Also after some seconds when the current
reduced to that which is needed to continuously run the motor, the already oversized switched gears (that
was put in place to enable the motor to start) won’t be able to protect the motor in event of overloading of
the motor. Besides the windings of the motor would become weak quickly owing to the large current that
results at start-up of large motors with the normal line voltage (which is usually 415VAC or more). Note
that the larger the motor the larger the multiple of start-up current. On the other hand if we just decide to
connect the motor in star, it would be just good in starting the motor normally without much stress on the
power system of the motor’s winding but the full speed output of the motor will be lesser than the required
output from the motor owing to reduced voltage created by running the motor in star mood (i.e. √3).
So in other to achieve good starting and good running of such large induction motors, one way to do this is
by the use of star/delta starters. These starters enables us to start the motor in star connection mode and after
54
running the motor for some seconds (when the large startup current drawn by large induction motor must
have died down and the motor must have attained a fair speed), then the starter switches to delta connection
mode (with the aid of a timer) in order to make the motor run on full speed. The items needed for the
star/delta connection are;
a) Three contactors (2 of the contactors must have at least one pair of NO and NC auxiliary contacts
each while the third must have at least 2 pairs of NO auxiliary contacts and a pair of NC auxiliary
contacts. From the first two contactors we call one the main/lime contactor, and the other we call
the delta contactor while the third is the star contactor).
b) One timer
c) One overload relay
d) One START and one STOP push buttons switches
e) Control cables for connecting all the components
f) Control fuse/MCB
If we label the main/line contactor as 1, the delta contactor as 2 and the star contactor as 3 then the sequence
of operation of the contactor are as follows: The contactor 3 (I.e. the star contactor) closes first and forms a
star point on contactor 2 (delta contactor) which appears on one side of the motor terminal (either terminals
u1, v1 & w1 or u2, v2 & w2 depending on the terminal in which the cables from contactor 2 is connected to).
Immediately the star contactor closes, almost at the same time the line or main contactor closes. There by
achieving the essence of this (star/delta) starting mechanism (i.e. to ensure that the motor is started on a
reduced voltage and current-tar, before increasing the voltage in order for the motor to achieve full speed by
changing to delta connection mode). Thus the star and the line contactors become closed. But from visual
inspection it will seem as if both contactors closes simultaneously, this is because of the high speed of
electric current flow. The start line contactors remain closed for a certain time that will be determined by the
set point on the timer. After a set time is reached, the timer times out and the star contactor only becomes de
energized. And then the delta contactor will become energize immediately. However in the course of this
55
change (i.e. from star connection to delta), the motor’s speed will slow down slightly and then builds up to
full speed when both contactors (main & delta) are fully engaged. Under normal continuous operation, the
main and the delta contactor carries the supply current to the motor. Thus the load current is divided
between both contactors and the motor resumes running on full speed (owing to the full current and voltage
that exist at the motor’s terminals). The figure below is the power and the control circuit of the star/delta
starter connection mode. The figure xxiii, is the power circuit of the star-delta connection mode.
The figure xxiv, is a functional control circuit but not the correct circuit because in its mode of operation,
once the timer starts counting the timer remains ON and his can cause the timer to get faulty. While the
figure xxv, control circuit 2 is the correct control circuit of the star-delta connection mode, because once
the timer starts counting the timer goes OFF.
Fig:
Fig 3.24: Power circuit Fig3.25 : Control circuit 1
56
Fig
3.26: Control circuit 2
III. Variable Frequency Drives (VFD)
It is an electronic controller used to change the speed of a normal electric induction motor. The variable
frequency drive is capable of controlling the electric motor via, several ports either by BOP, TOP or by a
remote connection. It can also be called a variable speed drive, or an inverter drive. A variable-frequency
drive (VFD) or adjustable-frequency drive (AFD), variable voltage/variable-frequency (VVVF) drive,
variable speed drive, AC drive, micro drive or inverter drive is a type of adjustable-speed drive used in
electro-mechanical drive systems to control AC motor speed and torque by varying motor input frequency
and voltage. VFDs are used in applications ranging from small appliances to large compressors. About 25%
of the world's electrical energy is consumed by electric motors in industrial applications, which can be more
efficient when using VFDs in centrifugal load service; however, the global market penetration for all
applications of VFDs is relatively small. Over the last four decades, power electronics technology has
reduced VFD cost and size and has improved performance through advances in semiconductor switching
devices, drive topologies, simulation and control techniques, andcontrol hardware and software. VFDs are
made in a number of different low- and medium-voltage AC-AC and DC-AC topologies.
57
3.2.4 BRANDS OF VARIABLE FREQUENCY DRIVES (VFD)
There are several companies that are responsible for the manufacturing and production of the VFDs. Some
of this companies includes ABB ltd, American Electric Technologies Inc. (Aeti), Crompton Greaves Ltd,
Danfoss Vlt Drives, Eaton Corp, Emerson Industries Automation, Fuji Electric Co. Ltd, Ge Energy Power
Conversion, Hiconics Drive Technology Co. Ltd, Hitachi Ltd, Johnson Controls Inc., Honeywell
international Inc., Kb Electronic Inc., Mitsubishi Electric corporation, Rockwell Automation Inc, Schneider
Electric Sa, Siemens Industry Inc., Toshiba international corporation, Vacon Plc, Yaskawa Electric Corp,
and so on.
VFD manufacturers mainly focus on R&D in order to develop new and improved products, which offer
more distinguished and revolutionary features such as more precision, control, and efficiency. Expansion
into new and emerging markets such as Asia-Pacific, Russia, and South America has been and will be the
key for success for VFD manufacturers if they intend to increase their overall sales and revenue. . In 2012,
ABB Ltd (Switzerland) dominated the VFD market with 19% market share. Siemens Industry Inc. (U.S.)
stood second with 13.8% and Schneider Electric SA (France) occupied around 8.5% market share of the
total VFD market share.
Plate 3.20: Schneider Inverter drive Plate 3.21: Siemens Inverter drive
58
3.2.4.1 SYSTEM DESCRIPTION AND OPERATION
A variable-frequency drive is a device used in a drive system consisting of the following three main
sub-systems: AC motor, main drive controller assembly, and drive/operator interface
3.2.5 FORWARD AND REVERSE
In this connection mode, the main motor itself can be connected in star or delta mode and the right voltage
be made available according to the specification on the name plate of the motor. But in order to connect the
motor so that when we press one button it turns clockwise direction and after it is stopped, on pressing
another button the motor will turn in counter clockwise direction, it is termed the reverse connection mode.
3.2.5.1 POWER AND CONTROL CIRCUIT OF THE FORWARD AND REVERSE INDUCTION
MOTOR
Fig 3.27:Forward/Reverse Induction motor
59
3.2.6 VARIABLE FREQUENCY STARTER (VFD)
Variable-frequency drives (VFD) can be of considerable use in starting as well as running motors. A VFD
can easily start a motor at a lower frequency than the AC line, as well as a lower voltage, so that the motor
starts with full rated torque and with no inrush of current. The rotor circuit's impedance increases with slip
frequency, which is equal to supply frequency for a stationary rotor, so running at a lower frequency actually
increases torque.
3.2.6.1 PROGRAMMING A VFD
Depending on the model a VFD's operating parameters can be programmed via: dedicated programming
software, internal keypad, external keypad, or SD card. VFDs will often block out most programming
changes while running. Typical parameters that need to be set include: motor nameplate information, speed
reference source, and braking control. It is also common for VFDs to provide debugging information such as
fault codes and the states of the input signals.
3.2.6.1.1 DRIVE OPERATION
Referring to the accompanying chart, drive applications can be categorized as single-quadrant, two-quadrant,
or four-quadrant; the chart's four quadrants are defined as follows:
1) Quadrant I - Driving or motoring, forward accelerating quadrant with positive speed and torque.
2) Quadrant II - Generating or braking, forward braking-decelerating quadrant with positive speed and
negative torque.
3) Quadrant III - Driving or motoring, reverse accelerating quadrant with negative speed and torque.
4) Quadrant IV - Generating or braking, reverse braking-decelerating quadrant with negative speed
and positive torque.
Most applications involve single-quadrant loads operating in quadrant I, such as in variabletorque (e.g.
centrifugal pumps or fans) and certain constant-torque (e.g. extruders) loads.
60
Certain applications involve two-quadrant loads operating in quadrant I and II where the speed is positive
but the torque changes polarity as in case of a fan decelerating faster than natural mechanical losses. Some
sources define two-quadrant drives as loads operating in quadrants I and III where the speed and torque is
same (positive or negative) polarity in both directions.
Certain high-performance applications involve four-quadrant loads (Quadrants I to IV) where the speed and
torque can be in any direction such as in hoists, elevators, and hilly conveyors. Regeneration can occur only
in the drive's DC link bus when inverter voltage is smaller in magnitude than the motor back-EMF and
inverter voltage and back-EMF are the same polarity.
In starting a motor, a VFD initially applies a low frequency and voltage, thus avoiding high in rush of
current associated with direct-on-line starting. After the start of the VFD, the applied frequency and voltage
are increased at a controlled rate or ramped up to accelerate the load. This starting method typically allows a
motor to develop 150% of its rated torque while the VFD is drawing less than 50% of its rated current from
the mains in the low-speed range. A VFD can be adjusted to produce a steady 150% starting torque from
standstill right up to full speed. However, motor cooling deteriorates and can result in overheating as speed
decreases such that prolonged lowspeed operation with significant torque is not usually possible without
separately motorized fan ventilation. With a VFD, the stopping sequence is just the opposite as the starting
sequence. The frequency and voltage applied to the motor are ramped down at a controlled rate. When the
frequency approaches zero, the motor is shut off. A small amount of braking torque is available to help
decelerate the load a little faster than it would stop if the motor were simply switched off and allowed to
coast. Additional braking torque can be obtained by adding a braking circuit (resistor controlled by a
transistor) to dissipate the braking energy. With a four-quadrant rectifier (active front-end), the VFD is able
to brake the load by applying a reverse torque and injecting the energy back to the AC line.
3.2.6.2 ELECTRICAL WIRING OF THE VARIABLE FREQUENCY DRIVE (VFD)
The variable frequency drive is electrically wired to an output motor, such as; a conveyor, an electric motor,
a pulley motor system, a moving crane, an electric train, blowers, fans, compressor, stirrers, pressers,
vacuum pumps, crushers and so on. The electrical circuit is as follows;
61
Figure 3.28: Wiring of a variable frequency drive (VFD)
3.2.7 EKTS SOFTWARE
The EKTS software is a simulator for learning Electromechanical Control Systems (ECS). It helps students
to easily design and test a solution circuit for a given problem and it has a flexible structure and
user-friendly interface.
3.2.7.1 The EKTS and It’s Operational Procedure
The simulator, EKTS, is developed in the environment of Microsoft C#.NET and is basically divided into
three main sections:
1) Work Sheet: The electrical control and power circuits are designed in the Work Sheet by means of
ladder diagram programming format.
2) Tool Bar: The icons of basic operations of files for opening, saving, running, printing, etc. are located
in the Tool Bar.
3) Library: All the components, the systems, the power sources and the motors are within the Library.
The simulator has been designed to reinforce the training and enable participants of the course to quickly
design and test new circuit before physical realization of the application. It will also increase self-confidence
of the students and strengthen the interest to the course will consciously and willingly participate in
laboratory and industrial studies. The start up window, the work environment and library window of the
ECSS is shown in the figure below.
62
Fig. 3.29: The start up window, the work environment window of the EKTS
All of the components are in the library section. This section has four main parts as seen on Fig. 3.
i. AC Power supplies: There are single and three phase ac supplies in the AC Power supplies menu.
ii. Components: Contactor, time-relays, switches, buttons, open and closed contacts etc. are located in the
Components menu.
iii. Induction motors: Single and three phase squirrel cage induction motors are under the Induction
motors menu.
iv. Systems: A five-floor elevator and two kind of gate systems are in the Systems menu.
Fig. 3.30 The library section of the ECSS
The ECSS has also an help menu. Users can easily learn all information about the simulator such as how to
design a circuit on the simulator or how to use it and etc.
63
Fig 3.31: The Help window
3.2.7.2 WORKDONE
Some of the circuits drawn and simulated using the EKTS include: Star-Delta motor starter, ATS
(Automatic Transfer Switch), Forward and Reverse, Direct Online starter, Gate system, and so on.
A. Star-Delta
Fig 3.32: Star-delta circuit in EKTS
B. ATS
Fig 3.33: ATS circuit in EKTS
64
3.2.7.3 BENEFITS OF USING EKTS
a. If there are some mistakes or wrong connections it can be seen easily and corrected.
b. It can be used to design far more complicated control circuit such as
c. Students can understand and test it easily and in a very short time by using ECSS.
d. In practice, this kind of circuits mostly includes high voltage, and due to carelessness electrical
shock can occur. But by using EKTS, there is no risk for electrical shock or other dangerous
situations.
e. Performing modifications on designed circuit is easy and takes a few second in EKTS.
3.2.8 PRACTICAL CLASSES
3.2.8.1 ON ELECTRICAL AND MOTOR CONTROL STARTERS
Plate 3.22: Star-delta motor starter system
65
Plate 3.23: ATS (Automatic Transfer Switch)
3.2.8.2 PHASE FAILURE/SEQUENCE DEVICE
Phase sequence relay is an electronic changeover type relay, which provide normally open or normally
closed type output, when the correct phase sequence of a three phase system is interrupted. They are widely
used in three phase power monitoring applications and for protection, where we have to monitor and control
the raw power supplied from the source.
3.2.8.2.1 IMPORTANCE OF THE DEVICE
Major industrial loads such as three phase induction or synchronous motors are connected in positive phase
sequence with the supply. However, if the phase sequence is suddenly reversed from the supply side, that is
“BYR” instead of “RYB”, then the motor will start rotating in reverse direction, which might cause damage
to the device and its immediate environment.
3.2.8.2.2 PHASE FAILURE DEVICE CONNECTION
In a phase sequence relay, there are three major segments. The input side, the internal circuit and the NO/NC
output. The three phase mains is connected in the input side of the relay. The internal circuit of the phase
66
sequence relay contains a voltage comparator, which continuously detects and monitor the positive phase
sequence.
And finally the output side provides potential free NO/ NC changeover. Typically, the output relay contact is
capable to carry a maximum of 1100 VA load, and beyond that you must connect a higher current rated
contactor in between the phase sequence relay and load.
Fig 3.34: Basic circuit for Plate 3.24: Wiring of a phase Plate 3.25: Completed
phase
Phase failure device failure system failure system
67
3.3.0 INDUSTRIAL AUTOMATION
3.3.1 INTRODUCTION
The word Automation gives the meaning self dictating or a mechanism move by itself that derived from the
Greek words Auto and Matos where auto means self while matos means moving. Automation goes a step
further than mechanization that uses a particular machinery mechanism aided by human operators for
performing a task.
Mechanization is the manual operation of a task using powered machinery that depends on human decision
making. On the other hand, automation replaces the human involvement with the use of logical
programming commands and powerful machineries.
Hence, Industrial Automation, can be defined as the use of set of technologies and automatic control devices
that results in the automatic operation and control of industrial processes without significant human
intervention and achieving superior performance than manual control. These automation devices include
PLCs, PCs, PACs, etc. and the technologies include various industrial communication systems.
Figure 3.35: An automation system
3.3.2 PROGRAMMABLE LOGIC CONTROLLERS (PLCs)
The PLC can be explained to be a device that is used in an automation industry to replace most or all human
effort. A programmable logic controller (PLC), or programmable controller is an industrial digital computer
which has been made rugged and adapted for the control of manufacturing processes, such as assembly,
lines or robotics devices, or any activity that requires high reliability control and ease of programming and
process fault diagnosis.
They were first developed in the automobile industry to provide flexible, rugged and easily programmable
controllers to replace hard-wired relays, timers and sequencers. Since then they have been widely adopted as
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf
Aroso Emmanuel A. - IT Technical Report.pdf

More Related Content

What's hot

SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLASIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLAG_ade
 
SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)Stephen Ahiante
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNEjiro Ndifereke
 
IT Defence Preparation
IT Defence PreparationIT Defence Preparation
IT Defence PreparationHerbey Herdarm
 
Final Internship Report by kiyimba Bill (International University Of East Afr...
Final Internship Report by kiyimba Bill (International University Of East Afr...Final Internship Report by kiyimba Bill (International University Of East Afr...
Final Internship Report by kiyimba Bill (International University Of East Afr...Bill Kiyimba
 
SIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNSIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNEjiro Ndifereke
 
Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.Abah Joseph Israel
 
siwes technical report in mechanical engineering, automobile workshop
siwes technical report in mechanical engineering, automobile workshopsiwes technical report in mechanical engineering, automobile workshop
siwes technical report in mechanical engineering, automobile workshopjsunny155
 
Siwes report by mukhtar salisu
Siwes report by mukhtar salisuSiwes report by mukhtar salisu
Siwes report by mukhtar salisuMukhtarsalisu2
 
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEMEA PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEMEIbrahim Yusuf Salihu
 
Siwes Report on Back End Web Development
Siwes Report on Back End Web DevelopmentSiwes Report on Back End Web Development
Siwes Report on Back End Web DevelopmentAL-Khalil
 
Indusrial trainning Report presentation
Indusrial trainning Report presentationIndusrial trainning Report presentation
Indusrial trainning Report presentationAbdulafeez Fasasi
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship reportkaahwa Armstrong
 
Information technology Internship report
Information technology Internship reportInformation technology Internship report
Information technology Internship reportRodney kaweesa
 

What's hot (20)

SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLASIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
 
It report
It reportIt report
It report
 
SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 
IT Defence Preparation
IT Defence PreparationIT Defence Preparation
IT Defence Preparation
 
Final Internship Report by kiyimba Bill (International University Of East Afr...
Final Internship Report by kiyimba Bill (International University Of East Afr...Final Internship Report by kiyimba Bill (International University Of East Afr...
Final Internship Report by kiyimba Bill (International University Of East Afr...
 
SIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNSIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGN
 
Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.
 
siwes technical report in mechanical engineering, automobile workshop
siwes technical report in mechanical engineering, automobile workshopsiwes technical report in mechanical engineering, automobile workshop
siwes technical report in mechanical engineering, automobile workshop
 
Siwes report by mukhtar salisu
Siwes report by mukhtar salisuSiwes report by mukhtar salisu
Siwes report by mukhtar salisu
 
SIWES TECHNICAL REPORT SAMPLE
SIWES TECHNICAL REPORT SAMPLESIWES TECHNICAL REPORT SAMPLE
SIWES TECHNICAL REPORT SAMPLE
 
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEMEA PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME
A PRESENTATION ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME
 
I.T. Report
I.T. ReportI.T. Report
I.T. Report
 
internship report covert
internship report covertinternship report covert
internship report covert
 
Technical Report
Technical ReportTechnical Report
Technical Report
 
Siwes Report on Back End Web Development
Siwes Report on Back End Web DevelopmentSiwes Report on Back End Web Development
Siwes Report on Back End Web Development
 
Indusrial trainning Report presentation
Indusrial trainning Report presentationIndusrial trainning Report presentation
Indusrial trainning Report presentation
 
Siwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahayaSiwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahaya
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship report
 
Information technology Internship report
Information technology Internship reportInformation technology Internship report
Information technology Internship report
 

Similar to Aroso Emmanuel A. - IT Technical Report.pdf

COMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptx
COMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptxCOMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptx
COMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptxaguc419
 
Industrial_Training_Report_docx.docx
Industrial_Training_Report_docx.docxIndustrial_Training_Report_docx.docx
Industrial_Training_Report_docx.docxKomeshKumar2
 
Industrial training Report
Industrial training ReportIndustrial training Report
Industrial training ReportDavid James
 
Ajayi samson aduragbemi siwes report
Ajayi samson aduragbemi siwes reportAjayi samson aduragbemi siwes report
Ajayi samson aduragbemi siwes reportSamsonAjayi4
 
Appraisal of Students Industrial Work Experience Scheme (SIWES) in NCAM, Agri...
Appraisal of Students Industrial Work Experience Scheme (SIWES) in NCAM, Agri...Appraisal of Students Industrial Work Experience Scheme (SIWES) in NCAM, Agri...
Appraisal of Students Industrial Work Experience Scheme (SIWES) in NCAM, Agri...Journal of Agriculture and Crops
 
Industrial Installation Skills Acquired and Job Performance of Graduates of E...
Industrial Installation Skills Acquired and Job Performance of Graduates of E...Industrial Installation Skills Acquired and Job Performance of Graduates of E...
Industrial Installation Skills Acquired and Job Performance of Graduates of E...theijes
 
brochure-for-institutions222.pdf
brochure-for-institutions222.pdfbrochure-for-institutions222.pdf
brochure-for-institutions222.pdfBARUNBIKASHDE
 
SIWES REPORT by Inyikim E. A.
SIWES REPORT by Inyikim E. A.SIWES REPORT by Inyikim E. A.
SIWES REPORT by Inyikim E. A.Effiong Inyikim
 
ITF Catering Technical Training Sheet.pdf
ITF Catering Technical Training Sheet.pdfITF Catering Technical Training Sheet.pdf
ITF Catering Technical Training Sheet.pdfaishaayubaazaki02
 
9131-FITLeafletEmp-A5-final2-2
9131-FITLeafletEmp-A5-final2-29131-FITLeafletEmp-A5-final2-2
9131-FITLeafletEmp-A5-final2-2Ronan Coy
 

Similar to Aroso Emmanuel A. - IT Technical Report.pdf (20)

COMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptx
COMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptxCOMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptx
COMPUTER ENGINEERING DIVINE UCHENNA WOGA.pptx
 
Industrial_Training_Report_docx.docx
Industrial_Training_Report_docx.docxIndustrial_Training_Report_docx.docx
Industrial_Training_Report_docx.docx
 
SIWES REPORT SAMPLE
SIWES REPORT SAMPLESIWES REPORT SAMPLE
SIWES REPORT SAMPLE
 
Industrial training Report
Industrial training ReportIndustrial training Report
Industrial training Report
 
Ajayi samson aduragbemi siwes report
Ajayi samson aduragbemi siwes reportAjayi samson aduragbemi siwes report
Ajayi samson aduragbemi siwes report
 
ITREPORTC (1).docx
ITREPORTC (1).docxITREPORTC (1).docx
ITREPORTC (1).docx
 
MY SIWES REPORT
MY SIWES REPORTMY SIWES REPORT
MY SIWES REPORT
 
Appraisal of Students Industrial Work Experience Scheme (SIWES) in NCAM, Agri...
Appraisal of Students Industrial Work Experience Scheme (SIWES) in NCAM, Agri...Appraisal of Students Industrial Work Experience Scheme (SIWES) in NCAM, Agri...
Appraisal of Students Industrial Work Experience Scheme (SIWES) in NCAM, Agri...
 
web devlopment.docx
web devlopment.docxweb devlopment.docx
web devlopment.docx
 
Industrial Installation Skills Acquired and Job Performance of Graduates of E...
Industrial Installation Skills Acquired and Job Performance of Graduates of E...Industrial Installation Skills Acquired and Job Performance of Graduates of E...
Industrial Installation Skills Acquired and Job Performance of Graduates of E...
 
brochure-for-institutions222.pdf
brochure-for-institutions222.pdfbrochure-for-institutions222.pdf
brochure-for-institutions222.pdf
 
Report docx
Report docxReport docx
Report docx
 
III C
III C III C
III C
 
IIIC ppt
IIIC pptIIIC ppt
IIIC ppt
 
SIWES REPORT by Inyikim E. A.
SIWES REPORT by Inyikim E. A.SIWES REPORT by Inyikim E. A.
SIWES REPORT by Inyikim E. A.
 
Ijebea14 211
Ijebea14 211Ijebea14 211
Ijebea14 211
 
Skill zip final
Skill zip finalSkill zip final
Skill zip final
 
ITF Catering Technical Training Sheet.pdf
ITF Catering Technical Training Sheet.pdfITF Catering Technical Training Sheet.pdf
ITF Catering Technical Training Sheet.pdf
 
9131-FITLeafletEmp-A5-final2-2
9131-FITLeafletEmp-A5-final2-29131-FITLeafletEmp-A5-final2-2
9131-FITLeafletEmp-A5-final2-2
 
It Report-Makerere
It Report-MakerereIt Report-Makerere
It Report-Makerere
 

More from Yolanda Ivey

How Can I Write About Myself. Write My Essay Or
How Can I Write About Myself. Write My Essay OrHow Can I Write About Myself. Write My Essay Or
How Can I Write About Myself. Write My Essay OrYolanda Ivey
 
Do My Essay For Cheap Uk - Can So
Do My Essay For Cheap Uk - Can SoDo My Essay For Cheap Uk - Can So
Do My Essay For Cheap Uk - Can SoYolanda Ivey
 
Soal Essay Sistem Inventory Beinyu.Com
Soal Essay Sistem Inventory Beinyu.ComSoal Essay Sistem Inventory Beinyu.Com
Soal Essay Sistem Inventory Beinyu.ComYolanda Ivey
 
Petra Van Der Merwe Champion Of IOCD Essay Competition
Petra Van Der Merwe Champion Of IOCD Essay CompetitionPetra Van Der Merwe Champion Of IOCD Essay Competition
Petra Van Der Merwe Champion Of IOCD Essay CompetitionYolanda Ivey
 
Premium Writing Paper Sets - Honeytree Person
Premium Writing Paper Sets - Honeytree PersonPremium Writing Paper Sets - Honeytree Person
Premium Writing Paper Sets - Honeytree PersonYolanda Ivey
 
PPT - How To Write A Perfect Persuasive Essay Conclusi
PPT - How To Write A Perfect Persuasive Essay ConclusiPPT - How To Write A Perfect Persuasive Essay Conclusi
PPT - How To Write A Perfect Persuasive Essay ConclusiYolanda Ivey
 
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...Hire The Cheap Custom Writing Services For Getting Best Quality Of ...
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...Yolanda Ivey
 
College Of Charleston Highly Ranked By U.S. News World Report
College Of Charleston Highly Ranked By U.S. News  World ReportCollege Of Charleston Highly Ranked By U.S. News  World Report
College Of Charleston Highly Ranked By U.S. News World ReportYolanda Ivey
 
Strathmore 400 Series Calligraphy Writing Paper
Strathmore 400 Series Calligraphy Writing PaperStrathmore 400 Series Calligraphy Writing Paper
Strathmore 400 Series Calligraphy Writing PaperYolanda Ivey
 
Sample Case Study Paper - Example Of Case Study R
Sample Case Study Paper - Example Of Case Study RSample Case Study Paper - Example Of Case Study R
Sample Case Study Paper - Example Of Case Study RYolanda Ivey
 
Pay Someone To Write Your Research Paper. Write
Pay Someone To Write Your Research Paper. WritePay Someone To Write Your Research Paper. Write
Pay Someone To Write Your Research Paper. WriteYolanda Ivey
 
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...Yolanda Ivey
 
Lined Writing Paper For Kids
Lined Writing Paper For KidsLined Writing Paper For Kids
Lined Writing Paper For KidsYolanda Ivey
 
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......Yolanda Ivey
 
ABE fermentation products recovery methods A review.pdf
ABE fermentation products recovery methods A review.pdfABE fermentation products recovery methods A review.pdf
ABE fermentation products recovery methods A review.pdfYolanda Ivey
 
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdf
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdfAN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdf
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdfYolanda Ivey
 
Age, equality, and cultural oppression An argument against ageism.pdf
Age, equality, and cultural oppression  An argument against ageism.pdfAge, equality, and cultural oppression  An argument against ageism.pdf
Age, equality, and cultural oppression An argument against ageism.pdfYolanda Ivey
 
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...A Study on Work Environment, Work-life Balance and Burnout among Health Worke...
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...Yolanda Ivey
 
Anthropology A Global Perspective Ninth Edition.pdf
Anthropology A Global Perspective Ninth Edition.pdfAnthropology A Global Perspective Ninth Edition.pdf
Anthropology A Global Perspective Ninth Edition.pdfYolanda Ivey
 
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
Attacks in Cognitive Radio Networks (CRN)   A Survey.pdfAttacks in Cognitive Radio Networks (CRN)   A Survey.pdf
Attacks in Cognitive Radio Networks (CRN) A Survey.pdfYolanda Ivey
 

More from Yolanda Ivey (20)

How Can I Write About Myself. Write My Essay Or
How Can I Write About Myself. Write My Essay OrHow Can I Write About Myself. Write My Essay Or
How Can I Write About Myself. Write My Essay Or
 
Do My Essay For Cheap Uk - Can So
Do My Essay For Cheap Uk - Can SoDo My Essay For Cheap Uk - Can So
Do My Essay For Cheap Uk - Can So
 
Soal Essay Sistem Inventory Beinyu.Com
Soal Essay Sistem Inventory Beinyu.ComSoal Essay Sistem Inventory Beinyu.Com
Soal Essay Sistem Inventory Beinyu.Com
 
Petra Van Der Merwe Champion Of IOCD Essay Competition
Petra Van Der Merwe Champion Of IOCD Essay CompetitionPetra Van Der Merwe Champion Of IOCD Essay Competition
Petra Van Der Merwe Champion Of IOCD Essay Competition
 
Premium Writing Paper Sets - Honeytree Person
Premium Writing Paper Sets - Honeytree PersonPremium Writing Paper Sets - Honeytree Person
Premium Writing Paper Sets - Honeytree Person
 
PPT - How To Write A Perfect Persuasive Essay Conclusi
PPT - How To Write A Perfect Persuasive Essay ConclusiPPT - How To Write A Perfect Persuasive Essay Conclusi
PPT - How To Write A Perfect Persuasive Essay Conclusi
 
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...Hire The Cheap Custom Writing Services For Getting Best Quality Of ...
Hire The Cheap Custom Writing Services For Getting Best Quality Of ...
 
College Of Charleston Highly Ranked By U.S. News World Report
College Of Charleston Highly Ranked By U.S. News  World ReportCollege Of Charleston Highly Ranked By U.S. News  World Report
College Of Charleston Highly Ranked By U.S. News World Report
 
Strathmore 400 Series Calligraphy Writing Paper
Strathmore 400 Series Calligraphy Writing PaperStrathmore 400 Series Calligraphy Writing Paper
Strathmore 400 Series Calligraphy Writing Paper
 
Sample Case Study Paper - Example Of Case Study R
Sample Case Study Paper - Example Of Case Study RSample Case Study Paper - Example Of Case Study R
Sample Case Study Paper - Example Of Case Study R
 
Pay Someone To Write Your Research Paper. Write
Pay Someone To Write Your Research Paper. WritePay Someone To Write Your Research Paper. Write
Pay Someone To Write Your Research Paper. Write
 
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...
A 10-Step Process For Writing White Papers - B2B Technology Copywriting ...
 
Lined Writing Paper For Kids
Lined Writing Paper For KidsLined Writing Paper For Kids
Lined Writing Paper For Kids
 
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......
AN ANALYIS OF THE LATE PROFESSOR ATIENO-ODHIAMBO S HISTORICAL DISCOURESES.......
 
ABE fermentation products recovery methods A review.pdf
ABE fermentation products recovery methods A review.pdfABE fermentation products recovery methods A review.pdf
ABE fermentation products recovery methods A review.pdf
 
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdf
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdfAN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdf
AN ANALYSIS ON WRITING ANXIETY OF INDONESIAN EFL COLLEGE LEARNERS.pdf
 
Age, equality, and cultural oppression An argument against ageism.pdf
Age, equality, and cultural oppression  An argument against ageism.pdfAge, equality, and cultural oppression  An argument against ageism.pdf
Age, equality, and cultural oppression An argument against ageism.pdf
 
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...A Study on Work Environment, Work-life Balance and Burnout among Health Worke...
A Study on Work Environment, Work-life Balance and Burnout among Health Worke...
 
Anthropology A Global Perspective Ninth Edition.pdf
Anthropology A Global Perspective Ninth Edition.pdfAnthropology A Global Perspective Ninth Edition.pdf
Anthropology A Global Perspective Ninth Edition.pdf
 
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
Attacks in Cognitive Radio Networks (CRN)   A Survey.pdfAttacks in Cognitive Radio Networks (CRN)   A Survey.pdf
Attacks in Cognitive Radio Networks (CRN) A Survey.pdf
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

Aroso Emmanuel A. - IT Technical Report.pdf

  • 1. I A TECHNICAL REPORT ON STUDENTS’ INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) UNDERTAKEN AT NIMBLES ENGINEERING COMPANY LTD, IBADAN, OYO STATE, NIGERIA FROM JULY, 2019 TO DECEMBER, 2019 MADE BY AROSO EMMANUEL ADEDEJI CPE/15/2399 SUBMITTED TO THE DEPARTMENT OF COMPUTER ENGINEERING, SCHOOL OF ENGINEERING AND ENGINEERING TECHNOLOGY, FEDERAL UNIVERSITY OF TECHNOLOGY, AKURE ONDO STATE, NIGERIA IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF BACHELOR OF ENGINEERING (B.ENG) IN COMPUTER ENGINEERING FEBRUARY, 2020.
  • 2. II CERTIFICATION This is to certify that this report is a detailed report of the Student Industrial Work Experience Scheme undertaken by AROSO EMMANUEL ADEDEJI with matriculation number CPE/15/2399 at NIMBLES ENGINEERING COMPANY LIMITED for a period of six months and has been prepared in accordance to regulations guiding the preparation of reports in the Department of Computer Engineering, Federal University of Technology, Akure, in partial fulfilment of the requirements for the award of Bachelor of Engineering (B. Eng.) in Computer Engineering. ….……………………… ….…….…………………………….. Student’s Signature/Date SIWES Coordinator’s Signature/Date
  • 3. III ACKNOWLEDGEMENT I am grateful, first and foremost, to almighty God for his grace, strength and knowledge, which made it possible for me to commence and finish my SIWES program successfully. My utmost and heartfelt gratitude goes to my parents for their actions during the course of my education in life; Mr David Aroso for his constant and invaluable support both financially and morally, and Mrs Oluwakemi Aroso for her prayers and encouragement. You shall reap infinite fruits from the seeds you labored to sow in the name of JESUS. I also appreciate my brothers and sisters for their love and assistance during the period of my training. I would also like to express my special thanks to my department father and role model Mr Ogunti and my beloved mother and HOD Mrs Dahunsi and the entire Staff of this thriving department for imparting me adequately to survive in the corporate world. My most profound appreciation goes to my IT Supervisor, who out of his busy schedule gave me his time and was patient enough to painstakingly guide me on how to prepare and write this project. May God bless and reward you abundantly sir. I would not forget my energetic supervisor, Mr. Oladipupo Seun for his unflinching support till date, and also Mr. Hakeem, the Human Resources Manager of Nimblescorps, the entire staff and my colleagues at the company (Blessing, Abiodun, Peace, and Joseph). May God bless you all and reward you abundantly.
  • 4. IV DEDICATION This report is dedicated to GOD almighty, and my hardworking parents; Mr and Mrs Aroso, for their enduring support and contributions in my life.
  • 5. V ABSTRACT The Students’ Industrial Work Experience Scheme (SIWES) is a scheme that was set up to enhance and expose students to acquire adequate and relevant skills that would enable them to perform effectively in their future place of work and assignment. It also exposes students to work methods and enrich their experiences in acceptable methods of handling equipment and machinery that may not be available in the education institution. It is also aimed at exposing students to people from all works of life, hence enhancing their communication skills and ability to interact with people after graduation. This report is a summary of the knowledge and experiences gained during my Students Industrial Work Experience Scheme (SIWES), which was done at Nimbles Engineering Company Ltd, Ibadan. Throughout my SIWES period, I worked at the Automation, Electrical and Networking sections where I was exposed to such things as PLC, HMI, contactors, industrial star delta configuration, VFDs, network configuration,network routers and switches. The training has afforded me the opportunity to be exposed and learn from my colleagues and other individuals within and outside the organization.
  • 6. 1 CHAPTER ONE 1.0 INTRODUCTION 1.1 BACKGROUND OF THE STUDENTS INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) In the early stage of science and technology education in Nigeria, students were graduating from their respective institutions without any technical knowledge or working experience. There was a growing concern among industrialists that graduates of institutions of higher learning lacked adequate practical background studies necessary for employment in industries. Thus, the employers were of the opinion that the theoretical education going on in higher institutions was not responsive to the needs of the employers of labour. It was in this view that students undergoing science and technology related courses were mandated for training in different institutions in view of widening their horizons so as to enable them have technical knowledge or working experience before graduating from their various institutions. 1.2 HISTORY OF SIWES The Student Industrial Work Experience Scheme (SIWES) was established by the Industrial Training Fund (ITF) in 1973 to enable students of tertiary institutions have technical knowledge of industrial work based on their course of study before the completion of their program in their respective institutions. The ITF solely funded the scheme during its formative years, but as the financial involvement became unbearable to the Fund, it withdrew from the Scheme in 1978. The Federal Government handed over the scheme in 1979 to both the National Universities Commission (NUC) and the National Board for Technical Education (NBTE). Later the Federal Government in November 1984 reverted the management and implementation of the SIWES to ITF and it was effectively taken over by the Industrial Training Fund in July 1985 with the funding being solely borne by the Federal Government. 1.3 SIGNIFICANCE OF SIWES The scheme was designed to expose students to industrial environment and enable them develop occupational competencies so that they can readily contribute their quota to national, economic and
  • 7. 2 technological development after graduation. The major benefit accruing to students who participate conscientiously in Students Industrial Work Experience Scheme (SIWES) are the skills and competencies they acquire. The relevant production skills remain a part of the recipients of industrial training as life-long assets which cannot be taken away from them. This is because the knowledge and skills acquired through training are internalized and become relevant when required to perform jobs or functions. 1.4 OBJECTIVES OF SIWES The Industrial Training Funds policy Document No. 1 of 1973 which established SIWES outlined the objectives of the scheme. The objectives are to: i. Provide an avenue for students in higher institutions of learning to acquire industrial skills and experiences during their course of study. ii. Prepare students for industrial work situations that they are likely to meet after graduation. iii. Expose students to work methods and techniques in handling equipment and machinery that may not be available in their institutions. iv. Make the transition from school to the world of work easier and enhance students’ contacts for later job placements. v. Provide students with the opportunities to apply their educational knowledge in real work situations, thereby bridging the gap between theory and practice. vi. Enlist and strengthen employers’ involvement in the entire educational process and prepare students for employment in Industry and Commerce. 1.5 BODIES INVOLVED IN THE MANAGEMENT OF SIWES The major bodies involved are: The Federal Government and the Industrial Training Fund (ITF). Other supervising agents are: National University Commission (NUC), National Board for Technical Education (NBTE), National Council for Colleges of Education (NCCE), Employers of Labour and Institutions.
  • 8. 3 The functions of these agencies above include among others to: a) Ensure adequate funding of the scheme b) Establish SIWES and accredit SIWES units in the approved institutions c) Formulate policies and guidelines for participating bodies and institutions as well as appointing SIWES coordinators and supporting staff. d) Supervise students at their places of attachment and sign their log-books and IT forms. e) Vet and process student’s log-book and forward same to ITF Area office. f) Ensure payment of allowances to the students and supervisors. Therefore, the success or otherwise of the SIWES depends on the efficiency of the Ministries, ITF, Institutions, Employers of labour and the general public involved in articulation and management of the program. It is pertinent to mention that the scheme is aimed at promoting the much-desired technological know-how for the advancement of the nation. This laudable scheme among others will surely develop the much-needed well-skilled and articulated labour force required to build an indigenous self-reliant economy envisaged for Nigeria. 1.6 PARTICULAR ITF OFFICE VISITED During the course of my training, I visited the ITF Ibadan Area Office located at Queen Elizabeth Road Near PHCN Office, Agodi Total Garden, Oyo State. This is where I submitted my SCAF form and had my logbook signed. 1.7 OBJECTIVES OF THE REPORT The objectives of the SIWES report are; a) To put into writing all the practical knowledge and experience acquired during the course of the industrial training. b) To prove that I actually participated in the SIWES training. c) To keep the record for future use or reference.
  • 9. 4 d) To fulfill the requirement for bachelor degree in Computer Engineering. e) To contribute to the body of knowledge and to enhance the understanding of other writers about a similar or same job. 1.8 THE LOGBOOK The logbook issued to student on attachment by the institution was used to record all daily activities that took place during the period of attachment, and it was checked and endorsed by the industry-based, institution-based supervisors and ITF during supervision. 1.9 RELEVANCE OF SIWES PROGRAMME My academic work was paramount to the experience I gained from both networking and electrical motor control systems, because it gave me real basics of theories and as a computer engineer, understanding these theories was really important because it’s what makes the difference between someone who read computer engineering and someone one who attended a road side computer schools as system technician. The industrial experience scheme is an opportunity to work and have the real practical skills needed. The academic work serves as a platform to know and understand the components, the various aspects, the theories, laws, principles, techniques and diverse areas of computer engineering which serves as the basis for understanding what would be done practically as well as selecting the area of specialization in accordance with the choice of company to work with during the SIWES training. My academic work made me to understand what I did well during my IT because some terms were used during my training of which were not explained in details but my academic knowledge made me understand what was being taught. For example, application of EEE405 (Communication Systems) in understanding the encoding scheme used in the Physical layer of OSI model to transmits bits from a computer systems to another, CSC101 (Introduction to Computing Systems), CPE401 (Computer Architecture and Organization) and EEE307 (Electrical Machines I) assisted in understanding and troubleshooting hardware problems and electric control systems respectively.
  • 10. 5 CHAPTER TWO 2.0 COMPANY PROFILE 2.1 BACKGROUND OF NIMBLES ENGINEERING COMPANY Nimbles Engineering Company Limited (NEC) is a modern technology-driven company, and was established in January 15, 2015 by Mr. Bamidele Audu and by Mr. Valentine Bright. It has two branches located at Suite 4, Drugfield building, adjacent Yunsol Oil gas station, Akala-Expressway, Oluyole-Extension, Ibadan, Oyo State and 290A Ajose Adeogun, Victoria Island, Lagos. NEC is an engineering firm that provide technological solutions and support services in Industrial Automation, Home Automation, Electrical and Control systems as well as IT infrastructure to Oil and Gas, manufacturing, process and communication industries, and management. The company’s core business is more on automation (Home and Industrial), networking, hardware repairs and the maintenance and servicing of industrial machines for manufacturing companies in Nigeria. The company is also into building of industrial panels for companies and installation of the panels plus its full repairing and PLC programming. Its team of highly skilled and experienced engineers and business domain specialists offer innovative solutions to various key industries with a particular focus on Engineering and Technology. They act as a think tank to collectively craft solutions that make business technology work for their clients and themselves, and keeping to their core values. 2.2 SERVICES PROVIDED BY NIMBLES ENGINEERING COMPANY With a team of seasoned technology specialists and dedicated engineers, the company offer the following services which include: i. Embedded Systems Engineering ii. Electrical Services iii. Home Automation iv. Industrial Automation v. Panel Design vi. Networking
  • 11. 6 vii. Security Technologies viii. Training 2.3 HISTORY OF THE COMPANY It was established in the year 2015, but before that, they have been operating for five years under the name and building of a different company. As at then, the company had just a company which was situated in Ibadan. The company functioned more as a company providing electrical and industrial automation services. As at 2018, the company has grown financially and substantially providing much more various services and building projects. Towards the end of the same year, it opened a new and bigger office in V.I. at Lagos, and moved most of their properties and activities over there. 2.4 ORGANIZATIONAL STRUCTURE OF THE COMPANY Fig 2.0: The Company’s Organogram
  • 12. 7 2.5 OBJECTIVES OF THE COMPANY 2.5.1 VISION To provide unrivalled customer experience using advances in technology to make living better. 2.5.2 MISSION To continually improve on quality of service delivery and ensuring that the best of standards is provided to our customers at all time. 2.6 WORK EXPERIENCE GAINED During the industrial training program. I gained a lot in the company which has opened and widen my reasoning about automation in general. The under listed points of experiences are what I took away from the company. a) ฀ Programming a PLC (programmable logic controller) b) ฀ Wiring and maintenance of a PLC. c) ฀ Repairing of a VFD (variable frequency drive). d) ฀ Programming of a VFD (variable frequency drive). e) ฀ Wiring of the VFD (variable frequency drive) in line with the PLC. f) ฀ Networking of computers in general. g) ฀ Usage of simulation software: GX Developer, WinCC Flexible, Tesla SCADA, Cisco Packet Tracer. h) ฀ Configuration of switches and routers using the hyper-terminal, TELNET and Putty. i) ฀ Creation of a massive network areas. j) ฀ Usage of Electrical simulation software such as EKTS for electric motor controls. 2.7 INSTRUMENTS USED IN THE LABORATORY OF THE COMPANY There are different types of instruments used in the Laboratory for different or the same purposes which can be grouped according to the way they are used. Some instrument used in the laboratory includes the following; Relays, Contactors, Wires, Buzzers, LED, Switches, Sensors, Screw drivers, Pliers, Overload relays, Circuit breakers, PLCs, HMIs, etc.
  • 13. 8 According to the way they are used, the instruments can be grouped as both peripheral and main instruments. The peripheral instruments include; screw drivers, wires, pliers, The main instruments include; sensors, switches, limit switch, emergency stop switch, terminal point box, 24Vdc relay switch, overload relays, buzzers, contactors, LEDs, PLCs and so on. The main instruments can also be sub divided into input and output devices. The device used mainly by the company by which all other devices rely on is the PLC. Plate 2.0: A timer-relay Plate 2.1: A Relay Plate 2.2: Pushbutton LEDs Plate 2.3: 1P,2P, 3P Circuit breaker Plate 2.4: A contactor Plate 2.5: A Pushbutton
  • 14. 9 CHAPTER THREE 3.0 KNOWLEDGE AND WORK EXPERIENCE GAINED 3.1.0 NETWORKING AND SECURITY SYSTEMS Network:At the most basic level, a network is defined as a group of systems interconnected to share resources. Networking: Is the sharing of resources and services between interconnected devices. A network, also referred to as a data network or a computer network, consists of a set of devices connected together through a medium in order to be able to exchange data between themselves. These devices create a network using their respective network interfaces. Some devices may use a single network interface, other devices may be connected to the network via multiple interfaces. The basic function of a computer network is to make it possible for geographically remote end users to communicate. We need networking for the following; file sharing, network gaming, audio/video calls, file transfer, database access, printer sharing, hardware sharing, surfing the web and so on. 3.1.1 THE STRUCTURE OF COMPUTER NETWORKS A typical computer-communications network comprises hosts, users and a subnet that connects them. Communication networks that provide connections between a computer and another (or a terminal) can be divided into two basic types: a) Connection-oriented (or circuit-switched): It operates by forming a dedicated connection or circuit between two points. The telephone system uses this type of technology - a telephone call will establish a connection from the caller’s phone through local switching office, across trunk lines, to a remote switching office, and finally to the destination phone. The main advantage of this network is guaranteed network capacity. One disadvantage is circuits cost are fixed, independent of use. b) Connectionless (or packet-switched): Data to be transferred across a network is divided into small pieces called packets that are multiplexed onto high capacity inter-machine connections. The chief advantage is that multiple communications among computers can occur concurrently. The disadvantage is that whenever the network activity increases, a particular pair of communicating computers receive less of the network capacity.
  • 15. 10 Despite the potential drawback faced, connectionless networks have become extremely popular, the Internet has chosen it’s approach to switching at the network layer. The motivations for adopting packet switching are cost and performance, and since it allows multiple computers to share the network bandwidth, fewer connections are required and cost is kept low. Engineers have been able to build high-speed network hardware, hence, capacity is not usually a problem. 3.1.2 NETWORK BASICS 3.1.2.1 COMPONENTS OF A NETWORK A network can be as simple as two PCs that are connected by a wire or as complex as several thousand devices that are connected through different types of media. I observed that the elements that form a network can be roughly divided into three categories: devices, media and services. Devices are interconnected by media. Media provides the channel over which the data travels from source to destination. Services are software and processes that support common networking applications. 3.1.2.1.1 NETWORK DEVICES They can be further divided into endpoints and intermediary devices: A. Endpoints: End-users devices fall under this category and include PCs, laptops, tablets, mobile phones, game consoles and television sets (Smart-TV). Endpoints are also file servers, printers, sensors, cameras, smart home components and so on. I learnt many end devices are now virtualized, this is made possible due to Virtualization technology. Virtualization is commonly applied to servers. B. Intermediary devices: An intermediary device is any networking device that provide connectivity and work behind the scenes to ensure that data flows across the network. Intermediary devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork. Examples of intermediary network devices are: a) switches and wireless access points (network access) b) routers (internetworking)
  • 16. 11 c) firewalls (security). During my stay at NEC, I was able to interact with the following devices: a) Server: In general, a server is a computer that provides shared resources to network users called clients. Servers are typically powerful computers that run the software that manage a network. A server is usually dedicated to a task. Plate 3.0: A server b) Network Interface Card (NIC): A NIC provides the hardware interface between a computer and a network, which means a computer must have at least one NIC to participate in a network. This device provides the physical, electrical, and electronic connections to the network media. Today, almost all new computer motherboards have built-in NICs which were originally available as expansion cards. Plate 3.1: An expansion card NIC Some NIC cards are meant for wired networks (e.g. Ethernet) while others are for wireless networks ( e.g. Wi-Fi). Every NIC has a 48-bit globally unique identifier called as MAC address burned into its ROM chip, which is used to deliver Ethernet Frames (packets) to a computer. The NIC driver software passes the data between the OS and the NIC.
  • 17. 12 c) Network Switches and Hubs: Both are LAN devices used to interconnect multiple devices. The hub repeats all received electrical signals and floods out through all other ports (except the incoming port). It uses half-duplex algorithm called CSMA/CD to avoid collisions when forwarding electrical signals. Plate 3.2: A Cisco Catalyst Switch Plate 3.3: A network hub Switches segment each link connected to it as a separate collision domain, hence, do not have half-duplex restrictions like hubs. Switches are called intelligent devices because they have the knowledge of ethernet frames and MAC addresses, and make decisions based on these to forward data to it’s destination only They both possess two types of ports: MDI and MDI-X. The MDI-X port has it’s wiring crossed and is used to connect to devices with an MDI port such as PC, server, router, printer, firewall and so on using a straight-through cable. Both devices come in two versions: managed and unmanaged. They also use LEDs to indicate certain connection conditions. I observed that the LEDs show current status of the device such as duplex mode, speed, activity, errors/collision and so on. d) Network Router: It’s primary function is to route data packets to other networks, instead of only the local computers. When a data packet comes into one of the links, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Essentially, a router bridges the gap between other networks and gives a network access to more features such as firewall, VPN, QoS, traffic monitoring and much more.
  • 18. 13 Plate 3.4: A Cisco 1800 series ISR Router 3.1.2.2 CLASSIFICATION OF NETWORKS From my experiences gained at NEC, I discerned that a network can be classified into three different categories: by geography, topology and architecture. 3.1.2.2.1 CLASSIFYING NETWORKS BY GEOGRAPHY The fundamental differences among these are distance coverage, data rates,transmission delay, media and error rates. i. Personal Area Network (PAN): It is a network that exist around an individual within a single building e.g. between two Bluetooth devices/smartphones. ii. Local Area Connection (LAN): It is owned by a single organization and physically located in the same building or within a group of buildings. A LAN is useful for sharing of resources such as printers, file servers, flash drives, CD-ROM, scanners etc. iii. Campus Area Network (CAN): is a computer network of computer devices or LANs connected together within a wide campus. iv. Metropolitan Area Network (MAN): It interconnects or links multiple LANs by using high bandwidth backbone inside a large city or metropolitan region covering up to 40km. v. Wide Area Network (WAN): is a network that exists over a large-scale geographical area. A WAN connects different smaller networks, including LANs and MANs. WAN implementation can be done either with the help of the public transmission system or a private network. The Internet is a WAN.
  • 19. 14 vi. Global Area Network (GAN): refers to a network composed of different interconnected networks that cover an unlimited geographical area. The term is loosely synonymous with Internet, which is considered a global area network. The most sought-after GAN type is a broadband GAN, which is a global satellite Internet network that uses portable terminals for telephony. Because the cable length in a LAN do not generally exceed about 3km, it transmits data at a much higher speed than a WAN which may extend across entire continents and have intercontinental links. Same trend occur for error rates and transmission delays in both. 3.1.2.2.2 Classifying Networks By Topology Network Topology refers to the arrangement by which computers are connected to each other. Topologies use either a point-to-point or multipoint connection scheme. A connection scheme indicates how many devices are connected to a transmission media segment or an individual cable. An example of a point-to-point connection scheme is a modem or printer connected to computer, direct cable connection between two computers. An example of a multipoint connection scheme is a star or bus topology network. 3.1.2.2.2.1 Physical vs. Logical Topologies Physical topology refers to the way in which a network is laid out physically, that is, the actual layout of the wire or media (cabling). Two or more devices connect to a link; two or more links form a topology. Two networks might have the same physical topology, but distances between nodes, physical interconnections, transmission rates, or signal types may be different. Logical topology defines how the hosts access the media to send data. It shows the flow of data on a network. The two most common types of logical topologies are broadcast and token passing. A physical topology can be further categorized into two types: LAN and WAN (site-to-site) topologies.
  • 20. 15 1. LAN Network Topologies i. Bus Topology: It consists of a main run of cable(s) that transmit data to all the nodes on the network. Terminators at the end of the cable prevent signals from reflecting back to the sender. Break or faulty piece of cable anywhere on the segment prevents all the computers on the segment from being able to communicate. ii. Ring Topology: Each node is connected to its two adjacent nodes and data is circulated around the closed ring. Each device in the ring incorporates a repeater, which regenerates the bits of a signal intended for another device and passes them along. iii. Mesh Topology: There is multiple data paths between network devices or nodes. It require extra cables, which makes it costly, and it is very complex and difficult to manage. It is not commonly used these days. iv. Star Topology: This is the most widely used network topology. It involves the use of a central intermediary device (e.g. a network switch/router) to connect among all the endpoints. v. Hybrid Topology: It is a mixture of different topologies. Examples include a star-ring network. Fig 3.0: LAN network topologies
  • 21. 16 2. Site-to-Site Network Topologies i. Hub-and-spoke WAN Topology: Large enterprises have multiple offices (physical sites) in different geographical locations. Normally, Internet Service Providers (ISPs) provide network connectivity solutions to connect multiple physical sites in different geographical locations. In this network topology, one physical site acts as “Hub”, while other physical sites act as “spokes”. The network communication between two spokes always travel through the hub, since they are connected to each other via Hub site. Fig 3.1: Hub-and-spoke network ii. Tree Topology: It has a root node and all other nodes are connected to it forming a hierarchy, it is also called hierarchical topology. 3.1.2.2.3 CLASSIFYING NETWORKS BY ARCHITECTURE By architecture means where do the clients get their resources such as a dedicated server on a network, or from one another. i. Client-Server Network: Shared resources are placed on a dedicated server that manage a given resource on behalf of clients sharing the resources. Examples of servers include file server, web server, printer server, DNS server, DHCP server, optical disk server. ii. Peer-to-peer Network: Computers communicate with any other networked computers on an equal or peer-like basis without going through an intermediary, such as a server or dedicated
  • 22. 17 host. Resources are located at terminals and system administration is largely left up to the users. Fig 3.2: Client-server network Fig 3.3: Peer-to-peer network 3.1.2.3 NETWORK REFERENCE MODELS A reference model is a conceptual blueprint of how communication should take place. For a network to work correctly, the various devices and software must follow rules which come in the form of standard and protocols. 3.1.2.3.1 HISTORY OF REFERENCE MODELS When networks first existed, computers could only communicate with computers from the same manufacturer. So, if a company bought computers from three vendors, network engineers often had to create three different networks based on the networking models created by each company, and then somehow connect those networks, making the combined networks much more complex. The ISO took on the task to create an open, vendor-neutral networking model that would aid competition and reduce complexity by developing the OSI model. Years later, the DoD released their TCP/IP networking model for the same purpose. Presently, TCP/IP dominates and while proprietary networking models still exist, they have mostly been discarded in favor of TCP/IP.
  • 23. 18 3.1.2.3.2 THE OSI REFERENCE MODEL The OSI (Open Systems Interconnection) model is a reference model for how applications communicate over a network. A reference model is a conceptual framework for understanding relationships. The purpose of the OSI reference model is to guide vendors and developers so the digital communication products and software programs they create can interoperate, and to facilitate a clear framework that describes the functions of a networking or telecommunication system. Most vendors involved in telecommunications make an attempt to describe their products and services in relation to the OSI model. The main concept of OSI model is that the process of communication between two endpoints in a network can be divided into seven distinct groups of related functions, or layers. The model is composed of seven ordered layers: physical (layer 1), data link (layer 2), network (layer 3), transport (layer 4), session (layer 5), presentation (layer 6), and application (layer 7). 3.1.2.3.2.1 ORGANIZATION OF THE OSI LAYERS The seven layers can be thought of as belonging to three subgroups: A. The Network support layers: Layers I, 2, and 3; they deal with the physical aspects of moving data from one device to another (such as electrical specifications, physical connections, physical addressing, and transport timing and reliability). B. The Transport layer: Layer 4; it links the two subgroups and ensures that what the lower layers have transmitted is in a form that the upper layers can use. C. The User support layers: Layers 5, 6, and 7; they allow interoperability among unrelated software systems. The upper OSI layers are almost always implemented in software; lower layers are a combination of hardware and software, except for the physical layer, which is mostly hardware. 3.1.2.3.2.2 FUNCTIONS OF EACH LAYER
  • 24. 19 Summary of the functions of each layers is given below: 1. Application - contains protocols used for process-to-process communications. Basically, it provides functions for users or their programs. This layer does not represent user applications on a system such as a web browser or spreadsheet, but defines the processes that enable applications to use network services. 2. Presentation - it’s basic function is to convert the data intended for or received from the application layer into another format, so that it can be transported across the network. Some common data formats handled by this layer include: Graphics files (JPEG, PNG), Text and data (ASCII), Sound / video (MPEG, MP3). This layer also provides encryption. 3. Session - is responsible for managing and controlling the synchronization of data between applications on two devices. It does this by establishing, maintaining, and breaking sessions. Whereas the transport layer is responsible for setting up and maintaining the connection between the two endpoints, the session layer performs the same function on behalf of the application. 4. Transport - responsible for host-to-host communication and making sure the segments received from the upper layer reaches their destination. It performs error correction, reliable delivery of data , segmentation and reassembly of the data. It uses TCP and UDP protocols. 5. Network - the primary responsibility of this layer is routing - providing mechanisms by which data can be passed between networks. It does so by using logical addresses such as IPv4, IPv6 and Appletalk. 6. Data Link - is responsible for communication in a LAN using physical address called MAC address. It has two distinct sublayers: MAC and LLC layers. 7. Physical - describes the mechanical, electrical, functional, and procedural means to transmit bits/signals across physical connections.
  • 25. 20 Fig 3.4: Encapsulation of data from layer-to-layer 3.1.2.3.3 THE TCP/IP SUITE The TCP/IP suite is a set of protocols used on computer networks today (most notably on the Internet). It provides an end-to-end connectivity by specifying how data should be packetized, addressed, transmitted, routed and received on a TCP/IP network. This functionality is organized into four abstraction layers and each protocol in the suite resides in a particular layer. The TCP/IP suite is named after its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP). Fig 3.5: Comparison of OSI vs TCP/IP and their corresponding protocols
  • 26. 21 3.1.2.4 TRANSMISISON MEDIA The type of interface(s) used by a device to connect to a network depends on the medium being used to connect. A wireless network interface is used to connect to a network over-the-air using a standard such as IEEE 802.11. There are various types of wired mediums in use today, the most common of which follows the IEEE 802.3 standard (Ethernet). Most devices that have a wired network interface will have at least one Ethernet interface. 3.1.2.4.1 WIRED MEDIA These are media which require the use of wires, lines and cables to transmit communication signals or data (bits). During my industrial training at NEC, I encountered majorly three different types of wired network media namely: coaxial cables, twisted cables and optical fibre cables. 1. Coaxial Cables A coaxial cable is an alternative for protecting data from noise. Coaxial cables do not produce external electric and magnetic fields and are not affected by them. This makes them ideally suited, although more expensive, for transmitting signals. Fig 3.6: Coaxial cable Coaxial cables is outdated as an Ethernet technology and have been replaced by twisted pair Ethernet, which is easier and cheaper to install. 2. Twisted Pair Cables This is so called due to the fact that wire pairs in the actual cable are twisted together. When electrical current passes over any wire, it creates electromagnetic interference (EMI) that interferes with the electrical
  • 27. 22 signals in nearby wires, including the wires in the same cable (EMI between wire pairs in the same cable is called crosstalk). Twisting the wire pairs together helps cancel out most of the EMI, so most networking physical links that use copper wires use twisted pairs. There exist two types of twisted pair cables: Shielded Twisted Pair and Unshielded Twisted Pair (UTP). The shielded twisted pair cable gives better network strength while UTP cable provides faster transfer rate. In most situations, UTP cables get the job done just fine and at the same time cost less than the shielded type. Hence, why UTP is popular and usually used among the two. In a twisted pair cable, there are eight copper wire that are coated with different colours; the colours are mix/orange, orange, mix/blue, blue, mix/green, green, mix/brown and brown. Fig 3.7: Unshielded pair Fig 3.8: Shielded pair 3. Optical Fibre Cables Fiber-optic cabling uses glass as the medium through which light passes, varying that light over time to encode 0s and 1s. It transmits optical pulses instead of electric signals, so it does not get interfered by electrical interference. Fiber-optic cables use fiberglass, which allows a manufacturer to spin a long thin string (fiber) of flexible glass. A fiber-optic cable holds the fiber in the middle of the cable, allowing the light to pass through the glass, which is a very important attribute for the purposes of sending data. Although sending data through a glass fiber works well, the glass fiber by itself needs some help. The glass could break, so the glass fiber needs some protection and strengthening. The three outer layers of the cable provides the needed protection for the interior of the cable and make the cables easier to install and manage.
  • 28. 23 A light source, called the optical transmitter, shines a light into the core. Light can pass through the core; however, light reflects off the cladding back into the core. Fig 3.9: Components of a Fibre-Optic Cable Optical fibre come in two types: i. Multi-mode Fibre: Multi-mode improves the maximum distances over UTP, and it uses less expensive transmitters as compared with single-mode. Fig 3.10: Transmission on Multimode Fiber with Internal Reflection ii. Single-Mode Fibre: Single-mode allows distances into the tens of kilometers, but with slightly more expensive hardware. Fig 3.11: Transmission on Single-Mode Fiber with Laser Transmitter
  • 29. 24 3.1.2.4.2 WIRELESS MEDIA To fully explore the wireless added dimension, communication system designers have sought to use wireless media to reduce infrastructure cost and complexity, when compared to wired communication systems. There is no need to construct miles of telephone line poles or cable trenches. I learnt that the wireless devices use radio frequencies (RFs) that are radiated into the air from an antenna that creates radio waves. Wireless LANs run half-duplex communication, similarly as Ethernet hubs, due to the fact that everyone is sharing the same bandwidth. Hence, only one user can communicate at a time. There are various kinds of IEEE 802.11 (also called the Wi-Fi Alliance) wireless standards that have been in use in a LAN, each offering new features which each updates: Table 3.1: IEEE 802.11 Wireless Standards IEEE Standard Frequency Range Max. Speed Max. Distance Capacity Per Cell IEEE 802.11a 5 GHz 54 Mbps 200 ft 15 users IEEE 802.11b 2.4 GHz 11 Mbps 350 ft 25 users IEEE 802.11g 2.4 GHz 54 Mbps 300 ft 20 users IEEE 802.11n 2.4/5 GHz 300 Mbps 230 ft Not definite IEEE 802.11ac 5 GHz 0.5-1 Gbps 230 ft Not definite 3.1.2.5 ETHERNET CABLING 3.1.2.5.1 ETHERNET LANS Many types of LANs have existed over the years, but today’s networks use two general types of LANs: Ethernet LANs and Wireless LANs (WLANs). Ethernet LANs use cables for the links between nodes, and because many types of cables use copper wires, Ethernet LANs are often called wired LANs. Ethernet LANs also make use of fiber-optic cabling. 3.1.2.5.1.2 IEEE CABLING STANDARDS
  • 30. 25 The Ethernet physical layer standards specifies the name and features of cables used in an Ethernet LAN. So one should consult it before deciding on products to buy for a new LAN. Table 3.2: IEEE 802.3 Cabling Standards Speed Common Name Informal IEEE Standard Name Formal IEEE Standard Name Cable Type/Max. Length 10Mbps Thin-Wire Ethernet 10Base2 (thinnet) Coaxial/200m 10Mbps Thick-Wire Ethernet 10Base5(thicknet) Coaxial/500m 100Mbps FastEthernet 100Base-T 802.3u Copper (UTP)/100m 1000Mbps GigabitEthernet 1000Base-LX 802.3z Fibre (single-mode)/5000m 1000Mbps GigabitEthernet 1000Base-T 802.3ab Copper (UTP)/100m 3.1.2.5.1.3 ETHERNET PROTOCOLS IN DATA LINK LAYER VS PHYSICAL LAYER Although Ethernet includes many physical layer standards, Ethernet acts like a single LAN technology because it uses the same data-link layer standard over all types of Ethernet physical links. I learnt that whether the data flows over a UTP cable or any kind of fiber cable, and no matter the speed, the data-link header and trailer use the same format. While the physical layer standards focus on sending bits over a cable, the Ethernet data-link protocols focus on sending an Ethernet frame from source to destination Ethernet node. 3.1.2.5.1.3.1 ETHERNET FRAMES The encapsulated data defined by the Network Access layer is called an Ethernet frame. An Ethernet frame starts with a header, which contains the source and destination MAC addresses, among other data. The middle part of the frame is the actual data. The frame ends with a field called Frame Check Sequence (FCS). The Ethernet frame structure is defined in the IEEE 802.3 standard. Here is a graphical representation of an Ethernet frame and a description of each field in the frame:
  • 31. 26 Fig 3.12 : An Ethernet frame I. Preamble: informs the receiving system that a frame is starting and enables synchronization. II. SFD(Start Frame Delimiter): signifies that the Destination MAC Address field begins with the next byte. III. Destination Address: identifies the receiving system. IV. Source Address: identifies the sending system. V. Type: defines the type of protocol inside the frame, for example IPv4 or IPv6. VI. Data: contains the payload data. Padding data is added to meet the minimum length requirement for this field (46 bytes). VII. FCS (Frame Check Sequence): contains a 32-bit Cyclic Redundancy Check (CRC) which allows detection of corrupted data. The FCS field is the only field present in the Ethernet trailer. It allows the receiver to discover whether errors occurred in the frame. Note that Ethernet only detects in-transit corruption of data; it does not attempt to recover a lost frame. Other higher level protocols (e.g. TCP) perform error recovery. 3.1.2.5.1.4 FULL AND HALF DUPLEX IN ETHERNET LANS a) Ethernet Shared Media: It refers to network designs that use hubs, and share the bandwidth. The devices connected to the hub share the network because they must use CSMA/CD to avoid collisions of signals, and CSMA/CD enforces rules that allow only one device to successfully send a frame at any point in time which implies half-duplex communication.
  • 32. 27 b) Ethernet Point-To-Point: In a network built with switches, each (point-to-point) link works independently of the others. Because a switch isolates each link into separate collision domains, a frame can be sent and received on every point-to-point link in an Ethernet at the same time. 3.1.2.5.1.5 UTP CABLING Before the Ethernet network as a whole can send Ethernet frames between user devices, each node must be ready and able to send data over an individual physical link. 3.1.2.5.1.5.1 TRANSMITTING DATA USING TWISTED PAIRS To better illustrate how Ethernet sends data using electricity, two scenarios are considered as shown below: First, an electrical circuit is created between two nodes using the two wires inside a single twisted pair of wires inside a UTP cable. So, the two nodes, using circuitry on their Ethernet ports, connect the wires in one pair to complete a loop, allowing electricity to flow. + Fig 3.13: Creating One Electrical Circuit over One Pair to Send in One Direction Secondly, following some set of rules called encoding scheme, the transmitting node changes the electrical signal over time, while the other node, the receiver, using the same rules, interprets those changes as either 0s or 1s. I learnt that Ethernet uses Manchester encoding. 3.1.2.5.1.5.2 METHODS OF UTP CABLING There are three connection methods for the UTP cable with it’s connector (RJ45) and every method is used in a certain situation: straight-through , crossover and rolled cables.
  • 33. 28 Ethernet twisted pair cable uses two pairs of wires for transmission of data. MDI devices (e.g. PC) transmits on pins “1” and “2”, and receives on pin “3” and “6”. Knowing this fact, switches and hubs use MDI-X which reverses the wiring scheme of MDI. a) Straight-through cable: This cable is used to connect between two devices with different interfaces or ports. This is achieved through the use of the same color scheme on both ends of a UTP. The color code used may be either T-568A or T-568B standard. Fig 3.14: MDI to MDI-X connection Fig 3.15: Straight-through wiring b) Crossover cable: It connects two devices with the same interface or ports. This cable is made by using different color schemes on the ends of a UTP cable. Fig 3.16: MDI to MDI connection Fig 3.17: Crossover wiring c) Rolled cable: This is a special cable which used to connect a PC or laptop to a router’s console, in case we need to configure the router directly or perform initial configuration on it.
  • 34. 29 Fig 3.18: Rolled cable wiring 3.1.2.5.1.5.3 HOW TO MAKE A CAT 5/6 UTP CABLE FOR TRANSMITTING STRAIGHT-THROUGH OR CROSSOVER I learnt that there is various categories of UTP cables: CAT 1 to 8; each with their various capability. The following are the materials needed to produce an Ethernet LAN UTP cable: a) Cat 5 cable: One can buy a 1000 feet roll of Cat 5 cable at computer stores and industry supply houses at an affordable price depending on the quality. Check to make sure that the color-coding on the wires is easily recognizable. Plate 3.5: A pack of cat 5 cables b) RJ-45 Connectors: RJ45 is a standard type of connector for network cables. RJ45 connectors are most commonly seen with Ethernet cables and networks. RJ45 connectors feature eight pins to which the wire strands of a cable interface electrically. They usually come in bags of 50, 100 etc. Attention should be paid to the type of RJ-45 connector being purchased and make sure it is intended for the type of Cat 5 wire you are using. There are two different kinds of RJ-45 connectors, using the wrong kind with the wrong cable will most likely result in a bad connection
  • 35. 30 c) Crimping tool: Is a tool used to terminate category cables such as CAT1-CAT6 using an RJ-45 connector. A good crimping tool has a pair of wire cutters built in, as well as a blade to strip insulation. It also might support crimping of other connectors such as RJ-11. d) LAN cable tester: This is used to test if a category cable has been well terminated, or developed a fault. e) Diagonal Cutter Pliers: You will need a pair of this to cut the wires in case the crimper does not come with a built-in wire cutter or failed to cut. Plate 3.6: RJ-45 connectors Plate 3.7: Crimping tool Plate 3.8: Cable tester STEPS INVOLVED Step1: Cut a piece of Cat 5 cable as long as you need. Make sure the cut on each end is clean and straight. Plate 3.9: A cut cat 5 cable Step2: Strip about an inch of the insulation off the cable. It is extremely important that you only cut the plastic insulation or jacket and not the wire. Damaging one of the 8 wires, even if you just nick it or partially cut it, will ruin your cable. Plate 3.10: A stripped cable
  • 36. 31 Step 3: Untwist the wires and pair similar colors. Sort the 4 pairs of multi-colored wires inside and align according to preferred wiring standard (color scheme). Plate 3.11: Untwisted cat 5 cable Step 4: Prepare wires for RJ-45 connector. Get the wires lined up nice and straight. Then clip off the top millimeter so that they are all the same length and stick out about half an inch from the insulated part. Plate 3.12: A lined-up/straightened cable Step 5: Insert wires into RJ-45 connector. Plate 3.13: Inserted cable Step 6: Crimp and test the continuity. Plate 3.14: Crimping the cable Plate 3.15: Crimped cable Plate 3.16: Testing of the cable
  • 37. 32 Using Optical Fiber Cables With Ethernet (Fiber-Optics Cabling) The distance between Ethernet switches and endpoints in a LAN is unlikely to exceed the maximum cable length capability of UTP cables, however, there might cases where, in a LAN, fiber cabling is the only way to go. To use fiber with Ethernet switches,your switch must have ports (built-in or modular) that supports optical Ethernet Standard. Two cables are needed to transmit between two devices, one for each direction. Despite the cost being relatively high when compared with UTP, benefits for using fiber include longer distance, higher transfer speed and zero risk of EMI and signal emissions. 3.1.2.5.1.6 WIRELESS LAN I worked with two of the most common wireless LAN technologies namely: Wi-Fi and Bluetooth. 3.1.2.6 RELEVANT TERMS USED IN NETWORKING Host: A host is the ultimate consumer of communication services. It is a physical network node with an IP address assigned and they are general-purpose computers. It has a complete network stack from physical layer to application layer. Node: It is any device that is active in the network; a node may have only a partial network stack e.g. only physical layer or only physical to network layer. All hosts are nodes but all nodes are hosts. Gateway: A device connected to two or more networks, appearing to each of these networks as a connected host. Thus, it has a physical interface and an IP address on each of the connected network. Ethernet: It refers to an entire family of standards or technologies for LANs. The Ethernet protocol, also referred to as IEEE 802.3, has largely replaced competing wired LAN technologies. Ethernet used coaxial cable as a shared medium. Later, the coaxial cables were replaced by twisted pair and fibre optics links in conjunction with hubs or switches.
  • 38. 33 Collision Domain: This is the part of a network where packet collisions can occur. A collision occurs when two devices send a packet at the same time on the shared network segment. Collisions are often in a hub environment, because each port on a hub is in the same collision domain. Broadcast Domain: It is the domain in which a broadcast is forwarded. A broadcast domain contains all devices that can reach each other at the data link layer (OSI layer 2) by using broadcast. All ports on a hub or a switch are by default in the same broadcast domain. DNS: Domain Name System, is the phone-book of the Internet, DHCP: Dynamic Host Configuration Protocol, Firewalls: A firewall is a device that prevents unauthorized electronic access to an entire network. The term firewall is generic, and includes many different kinds of protective hardware and software devices. Proxy Server: acts as a gateway between a host and the internet. It’s an intermediary server separating end users from the websites they browse. Proxy servers data security, network performance and a high level of privacy. World Wide Web (WWW): is a collection of interconnected documents and other resources, linked by hyperlinks and URLs. It is one of the services accessible via the Internet along others including email, video streaming etc. It is fundamentally a client/server application running over the Internet and TCP/IP intranets. Internetwork: can be defined as two or more computers (typically LANs) which are connected together, using network routers. Each network in an internetwork has it’s own network address. The words internetwork and internet are simply a contraction of the phrase interconnected network, internet should not be confused with Internet. Internet: is a worldwide publicly accessible computer network of interconnected computer networks that transmit data using the standard Internet Protocol (IP) . Internet is such a huge network of several different interlinked networks relating to the business, government, academic, and even smaller domestic networks, therefore internet is known as the network of all the other network.
  • 39. 34 Intranet: An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences. Extranet: It can be viewed as part of a company’s intranet that is extended to users outside the company. VPN: In a VPN, Virtual Private Network, private communication between two or more devices is achieved through a public network in the Internet. Backbones: are large networks that exist primarily to interconnect other networks. Network Protocols: are rules and standards that must be followed before any form of communication can occur over a network. They extend from the electric connection to the network and the format of the message, all the way to the interaction between application programs that run on different endpoints. Proprietary protocols are developed by a company while standard protocols are not vendor-specific. Quality of Service (QoS): The application of QoS is a methodology used to provide optimal performance for a variety of applications in what is ultimately an environment with finite resources. A well-designed QoS plan conditions the network to give access to the right amount of network resources needed by applications using the network, whether they are real-time or interactive applications. If no QoS level is defined, the network defaults to what is called best-effort service. 3.1.2.6.1 ORGANIZATION THAT GOVERNS NETWORK PROTOCOLS i. IEEE: The Institute of Electrical and Electronics Engineers regulates the technologies and protocols used in networks. ii. IANA: Internet Assigned Numbers Authority, based in the United States, is an Internet-specific organization that gives out (assigns and allocates) IP addresses in a systematic, organized and consistent manner that benefits everyone.
  • 40. 35 iii. RIR: Regional Internet Registry, is an organization that manages and controls Internet addresses in a specific region, usually a country and sometimes an entire continent. RIRs control assigning and distributing IP addresses and domain registrations. The RIRs, as a matter of fact, do not generate the IP addresses that they themselves allocate, but take the IP addresses allocated to them by the IANA and handle the next level of allocation. They serve ISPs, educational institutions, governments, large corporation and organizations. iv. ICANN: Internet Corporation For Assigned Names And Numbers, is the institution which runs IANA. 3.1.2.7 IP ADDRESSING AND SUBNET MASK 3.1.2.7.1 IP ADDRESS An IP address is a long logical address that logically identify a host in a network. The two types of IP addresses are IPv4 and IPv6. IPv4 is 32-bits and IPv6 is 128-bits. IPv4 => 192.168.1.10. It contains four octets (8-bits each) divided by using dots “.” IPv6 => 2001:0DB8:0000:0000:1234:0000:A9FE:133E. It comprises alphanumeric eight octets (16-bits each) separated by colon “:”. 3.1.2.7.1.1 Functions of IP Addressing i. For location of a device on the network ii. It is assigned to allow hosts on one network to communicate to hosts on another network. Computers do not understand decimal but only binary. 3.1.2.7.1.2 Terms used in IP addressing i. Bit- A bit is a binary digit, either 0 or 1. ii. Byte - A byte is eight bits. iii. Network address - This is a designation used to send packets to a remote network. Examples are 10.0.0.0, 172.68.0.0, 192.168.10.0
  • 41. 36 iv. Broadcast Address - This is the address used to send data to all hosts on a broadcast domain. When all the host bits are on (‘1’) this is a broadcast address for all hosts, 255 are reserved for sending broadcast message. E.g. 192.168.10.255. v. Unicast Address - is an address that identifies a unique node on a network 3.1.2.7.1.3 Classes of IPv4 Addresses IPv4 which is 32-bits has class ranges from class A-E. a. Class A: This Class of address can only be between 0 and 127. All 0’s reserved are for default route and ‘127’ is reserved for troubleshooting –loop back, therefore, Class A valid address ranges that can be assigned to host on a network is 1-126. b. Class B: It ranges between 172 – 191. c. Class C: Class address can only be between 192 – 223. Note: Class A to C are unicast addresses. d. Class D: 224-239. It is used for multicasting. e. Class E: 240-255. It is for research purposes. 3.1.2.7.1.4 PRIVATE IPV4 ADDRESSES Are introduced in mid 1990s due to depletion of IPv4 addresses. They are used only in internal networks such as LANs, and must be translated to a public IPv4 to be routable to the Internet. 3.1.2.7.1.4.1 PRIVATE IP ADDRESS BLOCKS i. Class A: 10.0.0.0 to 10.255.255.255 ii. Class B: 172.16.0.0 to 172.31.255.255 iii. Class C: 192.168.0.0 to 192.168.255.255
  • 42. 37 3.1.2.7.1.2.5 PUBLIC IPV4 ADDRESSES Are allowed for use on the Internet. The ranges of the public IPv4 addresses are as follows: a. Class A - 1.0.0.0 to 9.255.255.255 11.0.0.0 to 126.255.255.255 b. Class B - 128.0.0.0 to 172.15.255.255 172.32.0.0 to 191.255.255.255 c. Class C - 192.0.0.0 to 192.167.255.255 192.169.0.0 to 223.255.255.255 3.1.2.7.2 SUBNET MASK Each host on a TCP/IP network is assigned a unique 32-bit logical address, called subnet mask, which is divided into two main parts: network ID portion of the IP address and the host ID portion of the IP address. It enables one to know the network portion and host portion of any IP address. If no subnet mask information is associated with the IP, then the default is to determine the network portion and the host portion of this IP address depending on its IP class as shown in Table 3 below. The subnet mask determines the network portion and the host portion of an IP address by converting the network portion to all ones and converting the host portion to all zeros. Subnet mask 255.255.255.0 (decimal) or /24 => 11111111.11111111.11111111.00000000 (binary) Network ID - 1 bit portion of subnet mask Host ID - 0 bit portion of subnet mask Table 3.3: Subnet Mask for Different Classes of Networks Class of IP Format Default Subnet Mask A Network. host. host. host 255.0.0.0
  • 43. 38 B Network. network. host. host 255.255.0.0 C Network. network. network. host 255.255.255.0 The theoretical method to get the network IP, is to make a logical AND operation between the IP and its subnet mask. 3.1.2.7.3 IP SUBNET ADDRESSING (SUBNETTING) Subnetting is to get many network IPs (called subnets) from only one network IP. To create subnetworks, bits are taken from the host portion of the IP address and reserved to define the subnet address. Subnetting provides the network administrator with several benefits, including extra flexibility, more efficient use of network addresses, and the capability to contain broadcast traffic (i.e. a broadcast will not cross a router). Subnets are under local administration. As such, the outside world sees an organization as a single network and has no detailed knowledge of the organization’s internal structure. Subnetting can be done in three basic ways: 1) Based on the number of subnetworks you wish to obtain from a single block of IP address. 2) Based on the number of host computers or devices you want to be connected to that sub-network. 3) By reverse engineering which is a scenario in which a subnet mask and an IP address block is given and the number of subnetworks and number of hosts per each subnet are found. Based on the power of 2s (binary), there are some equations that allow us to determine the required details, and these are: i. Number of subnets = 2x subnets ii. Number of hosts per subnet = 2y - 2 hosts
  • 44. 39 iii. Block size / Increment = value of last network ID in decimal 3.1.2 NETWORK CONFIGURATION 3.1.2.1 CISCO IOS, ROUTER AND SWITCH The Cisco IOS (Internetworking Operating System) is a proprietary kernel that provides routing, switching, internetworking and communications features on Cisco routers and switches, and it’s what allows the configuration of the devices as well. 3.1.2.1.1 CONNECTION TO A CISCO DEVICE I learnt that there are three various ways to connect to Cisco router for configuration purposes: 1. The Console port: Rollover cable (also known as Cisco console cable) is a type of cable that is most commonly used to connect a computer terminal to a router's console port. PuTTY or other terminal emulators are used to open a console session, and then configure the router or switch. 2. The Auxiliary port: This port is usually used when one needs to configure the router out-of-band, meaning out of the network. A switch does not have this port. 3. Use of an In-band program: This is done through the use of a terminal emulation program such as Telnet or its secure form called SSH (SecureShell). 3.1.2.1.2 CISCO DEVICES HARDWARE There are many models of routers and switches with certain capabilities and features, but every model contains a certain number of Ethernet and Serial ports. Some models allow increase in their number ports by plugging some in them. The LAN is always connected to the router through its Ethernet port, hence the port is known as the LAN interface. While the WAN is connected through the Serial port and called the WAN interface.
  • 45. 40 3.1.2.1.3 THE CLI COMMANDS The CLI (Command Line Interface) is the software interface that the network administrator uses in order to configure the Cisco device. The CLI has different modes which permit configuration of a certain set of functions. i. Setup mode: This is the initial configuration mode, which contains interactive config dialogue that enables one to to configure the Cisco device. ii. USER EXEC mode: This is used for and limited to basic monitoring commands. iii. PRIVILEGED mode: Provides access to all other router and switch commands. iv. Global configuration mode: Commands made in this mode affect the entire system. v. Specific configuration mode: Used for commands that affect interfaces/processes only. 3.1.2.2 CISCO PACKET TRACER Packet Tracer is an exciting network design, simulation and modelling tool that allows one to develop skill set in networking, cybersecurity, and the Internet of Things (IoT). It allows one to model complex systems without the need for dedicated equipment. It is used to practice CCNA-level network configurations and troubleshooting skills via a PC or computer devices. Most importantly, it helps students and instructors create their own virtual network worlds for exploration, experimentation, and explanation of networking concepts and technologies. During my training at NEC, I was able practice and simulate many network scenarios using this software. 3.1.2.3 NETWORKS SIMULATED I learnt how to perform basic administrative configurations such as hostnames, banners, passwords (enable, console, telnet, SSH), management IP, default gateway, saving running-config, VLANs and so on; using a real Cisco Catalyst 2950G switch. Then, I performed various tasks using the Packet Tracer to simulate network labs for my configurations.
  • 46. 41 3.1.2.3.1 A SMALL OFFICE I designed a real world scenario of a small office, and applied various concepts such as subnetting, VLANs, trunks etc. Fig 3.19: A simulated small office network After the design, I used a troubleshooting tool called PING, to test connectivity among all the device to ensure the specifications are met.
  • 47. 42 Fig 3.20: The virtual window of the network ADMIN’s PC
  • 48. 43 Fig 3.21: The virtual window of a Sales PC As can be seen from the pictures above, only computers in the same department could communicate with with each other, but not with other department’s. And only the ADMIN could telnet and configure any of the switches. 3.1.3 NETWORK SECURITY There are many security threats that can affect a network. One of the best practices in network security is to try and stop security threats from the entry-point of a LAN network. This means that the switch can play an important role in network security since it’s the entry-point of the network.
  • 49. 44 3.1.3.1 PORT SECURITY This method is usually used to prevent layer 2 threats such as: STP attacks, ARP attacks, MAC Spoofing, (VLAN) Hopping, DHCP spoofing and so on. Port security is a method of securing an interface by only allowing traffic from a specific set or number of MAC Address. If traffic from an invalid MAC is detected, it will be blocked or dropped. This is a low level form of security that can be used to prevent unwanted devices from being connected to the network. One can configure the interface for one of these violation modes, based on the action to be taken if a violation occurs: a) Restrict: A port security violation restricts data, causes the SecurityViolation counter to increment, and causes an SNMP Notification to be generated. The rate at which SNMP traps are generated can be controlled by the snmp-server enable traps port-security trap-rate command. The default value ("0") causes an SNMP trap to be generated for every security violation. b) Shutdown: A port security violation causes the interface to shut down immediately. When a secure port is in the error-disabled state, you can bring it out of this state by entering the err-disable recovery cause secure-violation global configuration command or you can manually re-enable it by entering the shutdown and no shut down interface configuration commands. This is the default mode. 3.1.3.2 NETWORK ACCESS CONTROL (FOR ENTERPRISE NETWORKS) Access Control: In the context of network security, access control is the ability to limit and control the access to host systems and applications via communications links. Network Access Control: Network access control (NAC) is an umbrella term for managing access to a network. It authenticates users logging into the network and determines what data they can access and actions they can perform. NAC also examines the health of the endpoints. 3.1.3.2.1 ELEMENTS OF A NETWORK ACCESS CONTROL SYSTEM
  • 50. 45 1) Access requestor (AR): The AR is the node that is attempting to access the network and may be any device that is managed by the NAC system. Also referred to as supplicants, or simply clients. 2) Policy server: It determines what access should be granted. It often relies on backend systems, including antivirus, patch management, or a user directory, to help determine the host’s condition. 3) Network access server (NAS): It functions as an access control point for users in remote locations connecting to an enterprise’s internal network. Also called a media gateway or a remote access server, it may rely on itself or a policy server to provide authentication services. 3.1.3.2.2 NETWORK ACCESS ENFORCEMENT METHODS Enforcement methods are the actions that are applied to ARs to regulate access to the enterprise network. The common NAC enforcement methods are: a. AAA and IEEE 802.1X: IEEE 802.1X is a link layer protocol that enforces authorization before a port is assigned an IP address. IEEE 802.1X makes use of the Extensible Authentication Protocol for the authentication process. b. VLANs: A VLAN is a logical subgroup within a LAN that is created via software rather than manually moving cables in the wiring closet. In this approach, the enterprise network, consisting of an interconnected set of LANs, is segmented logically into a number of virtual LANs. The NAC system decides to which of the network’s VLANs it will direct an AR, based on whether the device needs security remediation, Internet access only, or some level of network access to enterprise resources. c. Firewalls: A firewall provides a form of NAC by allowing or denying network traffic between an enterprise host and an external user. d. DHCP management: DHCP is an Internet protocol that enables dynamic allocation of IP addresses to hosts. A DHCP server intercepts DHCP requests and assigns IP addresses instead. Thus, NAC enforcement occurs at the IP layer based on subnet and IP assignment. A DCHP server is easy to install and configure, but is subject to various forms of IP spoofing, providing limited security.
  • 51. 46 3.1.3.2.3 EXTENSIBLE AUTHENTICATION PROTOCOL (EAP) EAP provides a set of protocol which 802.1X port access protocol use to encapsulate and pass the authentication information between the supplicant and the authentication server. Which EAP type to implement, or whether to implement 802.1X at all, depends on the level of security that the organization needs, the administrative overhead, and features desired. 3.1.3.2.4 VPN Instead of relying on Wi-Fi LAN for authentication and privacy (encryption), many enterprises implement a VPN. This is done by placing the access points outside the corporate firewall and having the user tunnel in via a VPN Gateway; just as if they were a remote user. The downsides of implementing a VPN solution are cost, initial installation complexities, and ongoing administration overhead. 3.1.4 TROUBLESHOOTING SKILLS One of the basic IP addressing troubleshooting techniques learnt consist of four steps which are as follows: 1) Open a DOS window and ping loopback address: If failed, then there is a TCP/IP stack failure. 2) Ping the IP address of the localhost from same DOS window: If this is successful, then your NIC is functioning well. 3) Ping the default gateway (router): If ping works, then the NIC is connected into the network, and communicate with it. 4) Ping the remote server: If it works, then there is an IP communication between localhost and the remote server. By applying the above techniques, one can figure out at what level an issue lies: whether internal or external to the computer system.
  • 52. 47 3.2.0 ELECTRICAL MOTOR CONTROL 3.2.1 ELECTRIC MOTOR An electric motor is an electric machine that converts electrical energy into mechanical energy. In normal motoring mode, most electric motors operate through the interaction between an electric motor's magnetic field and winding currents to generate force within the motor. In certain applications, such as in the transportation industry with traction motors, electric motors can operate in both motoring and generating or braking modes to also produce electrical energy from mechanical energy. 3.2.1.1 MOTOR CONTROL Motor control is the basic electrical process by which an electrical motor is controlled be it an AC or a DC motor. The electric motor can be categorized into different methods either by its intake voltage, by its mode of connections or by its mode of starter. 3.2.1.2 DC MOTORS Irrespective of the different types of DC motors, however suffice it to say that they are all connected in the same manner. From the output of the motor terminal would be two wires where the right magnitude (either 12V, 24V etc. depending on the size of the motor) of the DC supply voltage is connected to it (+ve and –ve terminals). When connecting DC motor pay attention to the polarity of the plug or lead. Make sure to connect the +ve lead to the positive terminal of the supply and –ve lead to the terminal marked -ve. As interchanging the polarity will cause the motor to run/turn in the wrong (undesired) direction. 3.2.2 AC SQUIRREL CAGE INDUCTION MOTOR The induction motor is also called Asynchronous Motor. It is classified into single phase and 3 phase. The induction motor mainly deals with alternating current of 220Volts at a frequency of 50Hz. 3.2.2.1 3 PHASE INDUCTION MOTOR TERMINALS
  • 53. 48 In these motor, 3 phase voltages (red, yellow and blue phases) from the mains supply is applied to the stator winding via the electrical terminal of the motor. Meanwhile the body/chassis of the motor must be grounded/earthed. Owing to the mechanical construction of the rotor (squirrel cage type) winding. It starts rotating in as much as the stator winding has been supplied by the right voltage that is stated on the name plate of the motor. So on the motor terminals from where the electrical power is fed to the stator, there are 6 terminals (which are actually 3 pairs of coils) which are labeled as U1, V1, W1, on one side and U2, V2, W2 on the other side. Two of these terminals are similar (because it is a single coil) and so they are labelled with the same alphabet. Thus we would have;  U1 and U2 is one coil, U1 is the start coil and U2 is the end coil  V1 and V2 is one coil, V1 is the start coil and V2 is the end coil  W1 and W2 is one coil, W1 is the start coil and W2 is the end coil And the arrangement on the terminals of the motor is as show below: Plate 3.17: 220V AC Electric Motor
  • 54. 49 3.2.2.2 CONNECTION OF INDUCTOR MOTORS TO AC SUPLLY An induction motor's windings can be connected to a 3-phase AC line in two different ways: i. Wye in U.S, star in Europe, where the windings are connected from phases of the supply to the neutral; ii. Delta (sometimes mesh in Europe), where the windings are connected between phases of the supply. 3.2.2.2.1 DELTA CONNECTION One of the connection modes of the 3 phase induction motor is the DELTA CONNECTION. Some electrical motors could be connected in delta form. When electrical motor is connected in delta at the terminal a small metal is used to shunt the terminals in a vertical arrangement. It is such that the metal would shunt U1 and V2, V1 and W2, W1 and U2 respectively. The picture below is a motor connected in delta Plate 3.18: Delta connection mode When the electrical motor is connected in delta the normal voltage from the line (i.e. from the supply) is been supplied to the motor i.e. if your normal supply voltage per any pair phase (red/yellow, yellow/blue, red/blue) is 415Volts; then this would be the voltage that would be on the motor’s terminal (i.e. in between two different windings) when the supply is switched on.
  • 55. 50 After shunting the terminals vertically as shown in the figure above you can now connect your power supply cable to any side of the coils either on U1, V1, W1 or V2, U2, W2. 3.2.2.2.2 STAR CONNECTION One of the connection modes of the 3 phase induction motor is the STAR CONNECTION. In this mode, the small metals are used to shunt the whole aspect of one section of the motor terminal and the power supply cable must be connected only to the other side of the terminal and never to be shunted star joint side. We can choose to shunt any aspect of the coil terminal (U1, V1, W1 or U2, V2, W2) and then put the supply cable via the other side of the coil (but not on the same shunted side). The below is an image of star connection mode. Plate 3.19: Star connection mode When the motor is connected in star mode, the shunted terminals forms the start point so that the voltage on each windings is √(1/3) of the supply voltage unlike in the delta connection mode. Or for instance, if the mains supply voltage is 15Volts then the voltage that appears on any pair of the coils must be 240Volts that is 425(√1/3). 3.2.3 ELECTRICAL MOTOR STARTERS Irrespective of connecting the electrical motor in star or delta mode, there will always be a switch or group of switch gears that must be closed in other for current to flow from the mains power supply wired into the
  • 56. 51 wires that is connecting the motor and then into the motor’s stator. And only to the large size of induction motors (used industrially) and the large amount of in rush current that is taken in when the motor is started, it is not a safe practice to use an ordinary air break switch to close the circuit for power supply to flow to the motor; as well as in interrupting the power supply to the motor in other for it to come to a halt more so there is equally the need to protect the motor from damages that could resort from problems like short circuit or overload. Thus, electrical motors are proper connected with the following component: circuit breakers (of fuses), contractors, overload relays and start/stop push button switches. Sometimes these components could be coupled together in a panel such that all one needs is to connect a power supply wires to the starter (on the input side of the panel) and then from the output side of the panel the load wire will be connected. There is also the advantage that the panel can be located remotely (far away) from the location where the motor is installed. On the panel, there would be a button that can be pressed (start button) for the motor to start and another button (stop button) to bring the motor to a halt. Such panels are regarded as motor starter panel or motor drives. In industrial application, we would often come in contact with the following types of starters and drives. I. Direct Online Starters (DOL) II. Star/Delta starters III. Variable Frequency Drives (VFD) I. Direct Online Starters (DOL) CONNECTION MODE OF ELECTRICAL MOTORS This type of connection involves connection of the induction motor directly across the supply voltage (3 phase). With this type of connection in the event of starting of the motor, there is an in-rush of full current that is required to give the motor maximum torque. The effect of this in-rush current is sometimes noticed by the slight dimming of light (that are connected to the same power systems as the motor) in the event of starting of the motor. In order to carry out this connection to the motor several switch gears are placed in between the supply line and the motor terminals to protect the motors from problems of short circuit, overload etc. Also, the
  • 57. 52 connection can be done such that the motor can be started from distance very far from its point of use/installation. So to carry out the wiring/building of a DOL starter, two types of circuit diagram is used to describe it: the POWER CIRCUIT diagram and the CONTROL CIRCUIT diagram.  POWER CIRCUIT DIAGRAM: This diagram shows how the main power gets to the motor from the supply lines (mains). It tells the various switch gears that the power goes through. It is usually from circuit breakers (or fuses) to contactors, overload relays and then to the terminals of the motor. The fig. 3.22 is a power circuit dig diagram of how the main power supply of either 220VAC or 415VAC gets to the electric motor. Fig 3.22: Power circuit diagram Fig 3.23: Control circuit diagram  CONTROL CIRCUIT DIG: Even after connecting the electrical power from the mains up to the electric motor terminal as described in the power circuit dig above and then close the circuit breaker, the motor will not start as the contactor is not closed. So the electrical power will flow up to the supply part of the contactor, but cannot go to the load part of the contactor until the contactor is closed. And the contactor will not be closed until a (properly connected) START and STOP button is connected
  • 58. 53 properly with the auxiliary contacts of the contactor and the overload relay for proper operation of the motor. For the contactor to become closed the required voltage that is needed to energize the coils of the contactor must be supplied to it. In the case of a contactor with single phase coil, then only a phase and neutral is needed to be supplied to the contactor, however in a case of a contactor with a 2 phase coil, then two different phases will be needed to energize the coil. The fig 3.23 is a control circuit of how the coils of the contactor are energize using the start and stop buttons. II. Star/Delta starters CONNECTION MODE This is a form of reduced voltage starting of induction motor. It is usually used to start induction motors that are of very large size (say from 7.5kW motor and above). If induction motor as large as 10kW and above were to be started normally in a delta mode this would draw very large current from the power system at start up for some seconds (which could seriously distort it and affect other loads like lightings that are connected from the same power supply with the motor) thus leading to over sizing of the circuit breakers, contactors and overload relays that are used to connect the motor. Besides the huge torque that is associated with the delta starting may not be desired for some applications. Also after some seconds when the current reduced to that which is needed to continuously run the motor, the already oversized switched gears (that was put in place to enable the motor to start) won’t be able to protect the motor in event of overloading of the motor. Besides the windings of the motor would become weak quickly owing to the large current that results at start-up of large motors with the normal line voltage (which is usually 415VAC or more). Note that the larger the motor the larger the multiple of start-up current. On the other hand if we just decide to connect the motor in star, it would be just good in starting the motor normally without much stress on the power system of the motor’s winding but the full speed output of the motor will be lesser than the required output from the motor owing to reduced voltage created by running the motor in star mood (i.e. √3). So in other to achieve good starting and good running of such large induction motors, one way to do this is by the use of star/delta starters. These starters enables us to start the motor in star connection mode and after
  • 59. 54 running the motor for some seconds (when the large startup current drawn by large induction motor must have died down and the motor must have attained a fair speed), then the starter switches to delta connection mode (with the aid of a timer) in order to make the motor run on full speed. The items needed for the star/delta connection are; a) Three contactors (2 of the contactors must have at least one pair of NO and NC auxiliary contacts each while the third must have at least 2 pairs of NO auxiliary contacts and a pair of NC auxiliary contacts. From the first two contactors we call one the main/lime contactor, and the other we call the delta contactor while the third is the star contactor). b) One timer c) One overload relay d) One START and one STOP push buttons switches e) Control cables for connecting all the components f) Control fuse/MCB If we label the main/line contactor as 1, the delta contactor as 2 and the star contactor as 3 then the sequence of operation of the contactor are as follows: The contactor 3 (I.e. the star contactor) closes first and forms a star point on contactor 2 (delta contactor) which appears on one side of the motor terminal (either terminals u1, v1 & w1 or u2, v2 & w2 depending on the terminal in which the cables from contactor 2 is connected to). Immediately the star contactor closes, almost at the same time the line or main contactor closes. There by achieving the essence of this (star/delta) starting mechanism (i.e. to ensure that the motor is started on a reduced voltage and current-tar, before increasing the voltage in order for the motor to achieve full speed by changing to delta connection mode). Thus the star and the line contactors become closed. But from visual inspection it will seem as if both contactors closes simultaneously, this is because of the high speed of electric current flow. The start line contactors remain closed for a certain time that will be determined by the set point on the timer. After a set time is reached, the timer times out and the star contactor only becomes de energized. And then the delta contactor will become energize immediately. However in the course of this
  • 60. 55 change (i.e. from star connection to delta), the motor’s speed will slow down slightly and then builds up to full speed when both contactors (main & delta) are fully engaged. Under normal continuous operation, the main and the delta contactor carries the supply current to the motor. Thus the load current is divided between both contactors and the motor resumes running on full speed (owing to the full current and voltage that exist at the motor’s terminals). The figure below is the power and the control circuit of the star/delta starter connection mode. The figure xxiii, is the power circuit of the star-delta connection mode. The figure xxiv, is a functional control circuit but not the correct circuit because in its mode of operation, once the timer starts counting the timer remains ON and his can cause the timer to get faulty. While the figure xxv, control circuit 2 is the correct control circuit of the star-delta connection mode, because once the timer starts counting the timer goes OFF. Fig: Fig 3.24: Power circuit Fig3.25 : Control circuit 1
  • 61. 56 Fig 3.26: Control circuit 2 III. Variable Frequency Drives (VFD) It is an electronic controller used to change the speed of a normal electric induction motor. The variable frequency drive is capable of controlling the electric motor via, several ports either by BOP, TOP or by a remote connection. It can also be called a variable speed drive, or an inverter drive. A variable-frequency drive (VFD) or adjustable-frequency drive (AFD), variable voltage/variable-frequency (VVVF) drive, variable speed drive, AC drive, micro drive or inverter drive is a type of adjustable-speed drive used in electro-mechanical drive systems to control AC motor speed and torque by varying motor input frequency and voltage. VFDs are used in applications ranging from small appliances to large compressors. About 25% of the world's electrical energy is consumed by electric motors in industrial applications, which can be more efficient when using VFDs in centrifugal load service; however, the global market penetration for all applications of VFDs is relatively small. Over the last four decades, power electronics technology has reduced VFD cost and size and has improved performance through advances in semiconductor switching devices, drive topologies, simulation and control techniques, andcontrol hardware and software. VFDs are made in a number of different low- and medium-voltage AC-AC and DC-AC topologies.
  • 62. 57 3.2.4 BRANDS OF VARIABLE FREQUENCY DRIVES (VFD) There are several companies that are responsible for the manufacturing and production of the VFDs. Some of this companies includes ABB ltd, American Electric Technologies Inc. (Aeti), Crompton Greaves Ltd, Danfoss Vlt Drives, Eaton Corp, Emerson Industries Automation, Fuji Electric Co. Ltd, Ge Energy Power Conversion, Hiconics Drive Technology Co. Ltd, Hitachi Ltd, Johnson Controls Inc., Honeywell international Inc., Kb Electronic Inc., Mitsubishi Electric corporation, Rockwell Automation Inc, Schneider Electric Sa, Siemens Industry Inc., Toshiba international corporation, Vacon Plc, Yaskawa Electric Corp, and so on. VFD manufacturers mainly focus on R&D in order to develop new and improved products, which offer more distinguished and revolutionary features such as more precision, control, and efficiency. Expansion into new and emerging markets such as Asia-Pacific, Russia, and South America has been and will be the key for success for VFD manufacturers if they intend to increase their overall sales and revenue. . In 2012, ABB Ltd (Switzerland) dominated the VFD market with 19% market share. Siemens Industry Inc. (U.S.) stood second with 13.8% and Schneider Electric SA (France) occupied around 8.5% market share of the total VFD market share. Plate 3.20: Schneider Inverter drive Plate 3.21: Siemens Inverter drive
  • 63. 58 3.2.4.1 SYSTEM DESCRIPTION AND OPERATION A variable-frequency drive is a device used in a drive system consisting of the following three main sub-systems: AC motor, main drive controller assembly, and drive/operator interface 3.2.5 FORWARD AND REVERSE In this connection mode, the main motor itself can be connected in star or delta mode and the right voltage be made available according to the specification on the name plate of the motor. But in order to connect the motor so that when we press one button it turns clockwise direction and after it is stopped, on pressing another button the motor will turn in counter clockwise direction, it is termed the reverse connection mode. 3.2.5.1 POWER AND CONTROL CIRCUIT OF THE FORWARD AND REVERSE INDUCTION MOTOR Fig 3.27:Forward/Reverse Induction motor
  • 64. 59 3.2.6 VARIABLE FREQUENCY STARTER (VFD) Variable-frequency drives (VFD) can be of considerable use in starting as well as running motors. A VFD can easily start a motor at a lower frequency than the AC line, as well as a lower voltage, so that the motor starts with full rated torque and with no inrush of current. The rotor circuit's impedance increases with slip frequency, which is equal to supply frequency for a stationary rotor, so running at a lower frequency actually increases torque. 3.2.6.1 PROGRAMMING A VFD Depending on the model a VFD's operating parameters can be programmed via: dedicated programming software, internal keypad, external keypad, or SD card. VFDs will often block out most programming changes while running. Typical parameters that need to be set include: motor nameplate information, speed reference source, and braking control. It is also common for VFDs to provide debugging information such as fault codes and the states of the input signals. 3.2.6.1.1 DRIVE OPERATION Referring to the accompanying chart, drive applications can be categorized as single-quadrant, two-quadrant, or four-quadrant; the chart's four quadrants are defined as follows: 1) Quadrant I - Driving or motoring, forward accelerating quadrant with positive speed and torque. 2) Quadrant II - Generating or braking, forward braking-decelerating quadrant with positive speed and negative torque. 3) Quadrant III - Driving or motoring, reverse accelerating quadrant with negative speed and torque. 4) Quadrant IV - Generating or braking, reverse braking-decelerating quadrant with negative speed and positive torque. Most applications involve single-quadrant loads operating in quadrant I, such as in variabletorque (e.g. centrifugal pumps or fans) and certain constant-torque (e.g. extruders) loads.
  • 65. 60 Certain applications involve two-quadrant loads operating in quadrant I and II where the speed is positive but the torque changes polarity as in case of a fan decelerating faster than natural mechanical losses. Some sources define two-quadrant drives as loads operating in quadrants I and III where the speed and torque is same (positive or negative) polarity in both directions. Certain high-performance applications involve four-quadrant loads (Quadrants I to IV) where the speed and torque can be in any direction such as in hoists, elevators, and hilly conveyors. Regeneration can occur only in the drive's DC link bus when inverter voltage is smaller in magnitude than the motor back-EMF and inverter voltage and back-EMF are the same polarity. In starting a motor, a VFD initially applies a low frequency and voltage, thus avoiding high in rush of current associated with direct-on-line starting. After the start of the VFD, the applied frequency and voltage are increased at a controlled rate or ramped up to accelerate the load. This starting method typically allows a motor to develop 150% of its rated torque while the VFD is drawing less than 50% of its rated current from the mains in the low-speed range. A VFD can be adjusted to produce a steady 150% starting torque from standstill right up to full speed. However, motor cooling deteriorates and can result in overheating as speed decreases such that prolonged lowspeed operation with significant torque is not usually possible without separately motorized fan ventilation. With a VFD, the stopping sequence is just the opposite as the starting sequence. The frequency and voltage applied to the motor are ramped down at a controlled rate. When the frequency approaches zero, the motor is shut off. A small amount of braking torque is available to help decelerate the load a little faster than it would stop if the motor were simply switched off and allowed to coast. Additional braking torque can be obtained by adding a braking circuit (resistor controlled by a transistor) to dissipate the braking energy. With a four-quadrant rectifier (active front-end), the VFD is able to brake the load by applying a reverse torque and injecting the energy back to the AC line. 3.2.6.2 ELECTRICAL WIRING OF THE VARIABLE FREQUENCY DRIVE (VFD) The variable frequency drive is electrically wired to an output motor, such as; a conveyor, an electric motor, a pulley motor system, a moving crane, an electric train, blowers, fans, compressor, stirrers, pressers, vacuum pumps, crushers and so on. The electrical circuit is as follows;
  • 66. 61 Figure 3.28: Wiring of a variable frequency drive (VFD) 3.2.7 EKTS SOFTWARE The EKTS software is a simulator for learning Electromechanical Control Systems (ECS). It helps students to easily design and test a solution circuit for a given problem and it has a flexible structure and user-friendly interface. 3.2.7.1 The EKTS and It’s Operational Procedure The simulator, EKTS, is developed in the environment of Microsoft C#.NET and is basically divided into three main sections: 1) Work Sheet: The electrical control and power circuits are designed in the Work Sheet by means of ladder diagram programming format. 2) Tool Bar: The icons of basic operations of files for opening, saving, running, printing, etc. are located in the Tool Bar. 3) Library: All the components, the systems, the power sources and the motors are within the Library. The simulator has been designed to reinforce the training and enable participants of the course to quickly design and test new circuit before physical realization of the application. It will also increase self-confidence of the students and strengthen the interest to the course will consciously and willingly participate in laboratory and industrial studies. The start up window, the work environment and library window of the ECSS is shown in the figure below.
  • 67. 62 Fig. 3.29: The start up window, the work environment window of the EKTS All of the components are in the library section. This section has four main parts as seen on Fig. 3. i. AC Power supplies: There are single and three phase ac supplies in the AC Power supplies menu. ii. Components: Contactor, time-relays, switches, buttons, open and closed contacts etc. are located in the Components menu. iii. Induction motors: Single and three phase squirrel cage induction motors are under the Induction motors menu. iv. Systems: A five-floor elevator and two kind of gate systems are in the Systems menu. Fig. 3.30 The library section of the ECSS The ECSS has also an help menu. Users can easily learn all information about the simulator such as how to design a circuit on the simulator or how to use it and etc.
  • 68. 63 Fig 3.31: The Help window 3.2.7.2 WORKDONE Some of the circuits drawn and simulated using the EKTS include: Star-Delta motor starter, ATS (Automatic Transfer Switch), Forward and Reverse, Direct Online starter, Gate system, and so on. A. Star-Delta Fig 3.32: Star-delta circuit in EKTS B. ATS Fig 3.33: ATS circuit in EKTS
  • 69. 64 3.2.7.3 BENEFITS OF USING EKTS a. If there are some mistakes or wrong connections it can be seen easily and corrected. b. It can be used to design far more complicated control circuit such as c. Students can understand and test it easily and in a very short time by using ECSS. d. In practice, this kind of circuits mostly includes high voltage, and due to carelessness electrical shock can occur. But by using EKTS, there is no risk for electrical shock or other dangerous situations. e. Performing modifications on designed circuit is easy and takes a few second in EKTS. 3.2.8 PRACTICAL CLASSES 3.2.8.1 ON ELECTRICAL AND MOTOR CONTROL STARTERS Plate 3.22: Star-delta motor starter system
  • 70. 65 Plate 3.23: ATS (Automatic Transfer Switch) 3.2.8.2 PHASE FAILURE/SEQUENCE DEVICE Phase sequence relay is an electronic changeover type relay, which provide normally open or normally closed type output, when the correct phase sequence of a three phase system is interrupted. They are widely used in three phase power monitoring applications and for protection, where we have to monitor and control the raw power supplied from the source. 3.2.8.2.1 IMPORTANCE OF THE DEVICE Major industrial loads such as three phase induction or synchronous motors are connected in positive phase sequence with the supply. However, if the phase sequence is suddenly reversed from the supply side, that is “BYR” instead of “RYB”, then the motor will start rotating in reverse direction, which might cause damage to the device and its immediate environment. 3.2.8.2.2 PHASE FAILURE DEVICE CONNECTION In a phase sequence relay, there are three major segments. The input side, the internal circuit and the NO/NC output. The three phase mains is connected in the input side of the relay. The internal circuit of the phase
  • 71. 66 sequence relay contains a voltage comparator, which continuously detects and monitor the positive phase sequence. And finally the output side provides potential free NO/ NC changeover. Typically, the output relay contact is capable to carry a maximum of 1100 VA load, and beyond that you must connect a higher current rated contactor in between the phase sequence relay and load. Fig 3.34: Basic circuit for Plate 3.24: Wiring of a phase Plate 3.25: Completed phase Phase failure device failure system failure system
  • 72. 67 3.3.0 INDUSTRIAL AUTOMATION 3.3.1 INTRODUCTION The word Automation gives the meaning self dictating or a mechanism move by itself that derived from the Greek words Auto and Matos where auto means self while matos means moving. Automation goes a step further than mechanization that uses a particular machinery mechanism aided by human operators for performing a task. Mechanization is the manual operation of a task using powered machinery that depends on human decision making. On the other hand, automation replaces the human involvement with the use of logical programming commands and powerful machineries. Hence, Industrial Automation, can be defined as the use of set of technologies and automatic control devices that results in the automatic operation and control of industrial processes without significant human intervention and achieving superior performance than manual control. These automation devices include PLCs, PCs, PACs, etc. and the technologies include various industrial communication systems. Figure 3.35: An automation system 3.3.2 PROGRAMMABLE LOGIC CONTROLLERS (PLCs) The PLC can be explained to be a device that is used in an automation industry to replace most or all human effort. A programmable logic controller (PLC), or programmable controller is an industrial digital computer which has been made rugged and adapted for the control of manufacturing processes, such as assembly, lines or robotics devices, or any activity that requires high reliability control and ease of programming and process fault diagnosis. They were first developed in the automobile industry to provide flexible, rugged and easily programmable controllers to replace hard-wired relays, timers and sequencers. Since then they have been widely adopted as