SlideShare a Scribd company logo
DIGITAL BRIDGE INSTITUTE
INNOVATION | TECHNOLOGY | EDUCATION
TECHNICAL REPORT
ON
STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)
AT
X-CEL COMPUTER COMPANY LIMITED
BY
MUKHTAR SALISU
DBI/NID/NSS/KN/2016/010
IN PARTIAL FULFILLMENT FOR THE AWARD OF NATIONAL
INNOVATIVE DIPLOMA (NID) IN NETWORKING AND SYSTEM SECURITY
SEPTEMBER, 2018
ii
DECLARATION
I hereby declare that this student industrial work experience scheme (SIWES) technical report
was solely written by me under the guidance of my industry base supervisor Engr. Kamal Ya’u.
iii
DEDICATION
I dedicate this work to my dearest parents whom through their advice, love, care and financial
assistance have made me to be where I am today, I pray that the Good Lord will continue to keep
and guide them through their lifetime and reward them in the hereafter with Jannatul Firdaus.
Ameen.
iv
ACKNOWLEDGEMENT
My gratitude goes to the Al-Mighty Allah for his mercies and grace. I would like to acknowledge
my mentor, Engineer Isah El-Hassan (the MD, X-cel Computer Company Limited) who
contributed immensely towards the success of my SIWES. I also acknowledge my friends
Isma’ila Isah Abdu, Auwal S Sanata, Abdulhaq Abubakar, Abdullahi Shu’aibu Aliyu for their
love care and kind gesture. God bless you all.
Mostly, I thanked my lecturers, especially Mal. Yusuf, Mal. Bello, Mal. Auwal, Mal. Abubakar,
Madam Waheeda Who has trained me in field of networking and my departmental SIWES
supervisor Engr. Kamal Ya’u. My prayer is that God will continue to bless and keep them for the
benefit of other younger generations. Ameen.
v
Contents
....................................................................................................................i
CHAPTER ONE ............................................................................................................................. 1
1.0 INTRODUCTION .................................................................................................................... 1
1.1 HISTORY AND MEANING OF SIWES............................................................................. 1
1.2 AIMS AND OBJECTIVES OF SIWES ............................................................................... 1
1.3 BRIEF HISTORY OF DIGITAL BRIGDE INSTITUTE (DBI).......................................... 2
1.4 DBI AND THE NID PROGRAM ........................................................................................ 2
1.5 ABOUT X-CEL COMPUTER COMPANY LIMITED....................................................... 2
CHAPTER TWO ............................................................................................................................ 4
2.0 DEVICES, TOOLS AND EQUIPMENTS USED ................................................................... 4
2.1 ROUTER............................................................................................................................... 4
2.1.1 APPLICATION OF A ROUTER ...................................................................................... 5
2.2 NETWORK SWITCH .......................................................................................................... 5
2.2.1 HOW TO USE A NETWORK SWITCH.......................................................................... 6
2.3 PATCH PANEL.................................................................................................................... 7
2.3.1 TERMINATION OF PATCH PANEL.............................................................................. 7
2.4 REGISTERED JACK 45 CONNECTOR (RJ 45)................................................................ 9
2.4.1 TERMINATING CAT5/ 5e/ 6 CABLES WITH RJ45 CONNECTOR ............................ 9
2.5 TWISTED PAIR CABLE................................................................................................... 10
2.5.1 TYPES OF TWISTED PAIR CABLE ............................................................................ 10
2.5.2 TWISTED PAIR CABLE BUILDING STRUCTURE ................................................... 12
vi
2.5.3 HOW TO TERMINATE TWISTED-PAIR CABLE USING JACK MODULE IN 12
STEPS ....................................................................................................................................... 13
2.6 CABLE TESTER................................................................................................................ 15
2.7 NETWORK RACK ............................................................................................................ 16
2.7.1 INSTALLATION OF 22U RACK .................................................................................. 16
2.8 DIGITAL VIDEO RECORDER (DVR) ............................................................................ 18
2.9 BNC CONNECTOR........................................................................................................... 18
CHAPTER THREE ...................................................................................................................... 20
3.0 EXPERIENCE GAINED........................................................................................................ 20
3.1 NETWORKING.................................................................................................................. 20
3.1.1 CATEGORIES OF NETWORKS ................................................................................... 20
3.1.2 LOCAL AREA NETWORK (LAN) ............................................................................... 20
3.1.3 PHYSICAL NETWORK CONNECTION AND ELECTRICAL WIRING OF AIICO
PENSION MANAGERS LTD. ................................................................................................ 21
3.2 COMPUTER MAINTENANCE ........................................................................................ 23
3.2.1 COMPONETS OF COMPUTER SYSTEM.................................................................... 23
3.2.2 DATA BACKUPS ........................................................................................................... 24
3.2.3 COMPUTER SOFTWARE ............................................................................................. 24
3.3 CCTV (closed circuit television) ........................................................................................ 25
3.3.1 INSTALLATION OF CCTV (closed circuit television) ................................................. 26
CHAPTER FOUR......................................................................................................................... 28
4.1 SUMMARY........................................................................................................................ 28
4.2 CONCLUSION................................................................................................................... 28
4.3 RECOMMENDATION ...................................................................................................... 28
4.4 REFERENCE...................................................................................................................... 28
vii
TABLE OF FIGURES
Figure 1 Tp-Link 3G/4G wireless router ....................................................................................... 4
Figure 2 24-port cisco switch.......................................................................................................... 6
Figure 3 24-port Tp-Link patch panel............................................................................................. 7
Figure 4 patch panel termination .................................................................................................... 8
Figure 5 RJ45 connector Figure 6 terminated cable with RJ45........... 9
Figure 7 Unshielded twisted pair cable Figure 8 shielded twisted pair cable.......... 11
Figure 9 Jack module Figure 10 Termination of jack module...... 14
Figure 11 Cable tester ................................................................................................................... 15
Figure 12 22U networking server rack ......................................................................................... 18
Figure 13 Advance HD DVR........................................................................................................ 18
Figure 14 BNC connector ............................................................................................................. 19
Figure 15 Indoor infrared camera Figure 16 Outdoor infrared camera ........... 27
1
CHAPTER ONE
1.0 INTRODUCTION
1.1 HISTORY AND MEANING OF SIWES
There used to be a time when science and technology students who study in Nigerian institutions
were not getting any practical knowledge before graduation. As the result, they couldn’t easily
find jobs in their fields of study due to lack of working experience. It was a big problem for
thousands of Nigerians until 1973.
What changed back then? The Industrial Training Fund (ITF) decided to help Nigerian students
by proposing the establishment of the SIWES programe. It was officially approved by the
Federal Government and presented to the Institutions for implementation in 1974, under the
coordination of the ITF, in line with the guidelines of the National Universities Commission
(NUC).
The program outlined the academic standards for educational establishments in Nigeria. It
offered special courses to students who got theoretical knowledge and needed to practice in order
to develop and improve their skills.
The Students Industrial Work Experience Scheme (SIWES) is a skill training program, designed
to expose students of different tertiary institutions to real life experience that prepares them for
work situations after graduation. The scheme exposes students to industrial based skills
necessary for smooth transition from the classroom to the world of work. It affords students of
tertiary institution the opportunity of handling machinery and equipment which are not available
in the education institute.
1.2 AIMS AND OBJECTIVES OF SIWES
 To provide an avenue for students in tertiary institutions to acquire industrial skills and
experience in their course of study.
 To expose students to work methods and technique in handling equipment and
machineries that may not be available in the institution.
 To prepare students for the work situation that they are likely to meet after graduation.
 To provide students with the opportunity to apply their theoretical knowledge in real
work situation, thereby bridging the gap between the university work and the actual work
practices.
2
 To expose students to the latest developments and technological innovations in their
chosen professions.
1.3 BRIEF HISTORY OF DIGITAL BRIGDE INSTITUTE (DBI)
Digital Bridge Institute (DBI), Nigeria, was launched in the wake of the phenomenal world-wide
growth of the Telecommunications (telecoms), and Information and Communications
Technology (ICT), which has been especially well noted in Nigeria. The country has witnessed
more than tenfold the growth in Tele-density, significant drops in costs, and increased access to
data and other Information Technology (IT) enabled services. Led by the successful auction of
Digital Mobile Licenses by the Nigerian Communications Commission (NCC) – the government
regulator - and the subsequent roll out of mobile services, increased number of operators and
significantly increased private capital investment, the sector as a whole has been challenged by a
lack of trained and suitably qualified human resources.
Acknowledging the need to continue to foster the rapid development and growth of the sector, as
well as the potentially significant vulnerability that lack of human resources could pose, the NCC
established DBI in 2004. Since then DBI has trained more than 55,000 persons in their
professional and academic programmes.
1.4 DBI AND THE NID PROGRAM
The National Innovation Diploma (NID) is an initiative of the Federal Ministry of Education
through the National Board for Technical Education (NBTE), aimed at providing alternative
route to Higher Education. Access to higher education is more than ever before needed
considering the increasing demand for technical manpower by the various sectors of the
economy and the low carrying capacity of existing higher institutions.
1.5 ABOUT X-CEL COMPUTER COMPANY LIMITED
X-cel Computer Company is a wholly owned indigenous company, located at No. 3 Beirut road,
Kano. Activities carried out by the company include:
 Sales, installation, and maintenance of computers and peripheral devices.
 Provision of wired/wireless network structures and internet connectivity.
 Hardware repairs, training and consultancy.
 Hardware and software maintenance services.
3
 CCTV security network installation and maintenance.
Most of the installation, maintenance and networking activities of the company are carried out at
the customer premises. Only major repairs are done in the workshop.
4
CHAPTER TWO
2.0 DEVICES, TOOLS AND EQUIPMENTS USED
2.1 ROUTER
A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. Data sent through the internet, such as
a web page or email, is in the form of data packets. A packet is typically forwarded from one
router to another router through the networks that constitute an internetwork until it reaches its
destination node.
A router is connected to two or more data lines from different networks. When a data packet
comes in on one of the lines, the router reads the network address information in the packet to
determine the ultimate destination. Then, using information in its routing table or routing policy,
it directs the packet to the next network on its journey.
The most familiar type of routers are home and small office routers that simply forward IP
packets between the home computers and the Internet. An example of a router would be the
owner's cable or DSL router, which connects to the Internet through an Internet service
provider (ISP). More sophisticated routers, such as enterprise routers, connect large business or
ISP networks up to the powerful core routers that forward data at high speed along the optical
fiber lines of the Internet backbone. Though routers are typically dedicated hardware devices,
software-based routers also exist.
Figure 1 Tp-Link 3G/4G wireless router
5
2.1.1 APPLICATION OF A ROUTER
A router may have interfaces for different types of physical layer connections, such as copper
cables, fiber optic, or wireless transmission. It can also support different network
layer transmission standards. Each network interface is used to enable data packets to be
forwarded from one transmission system to another. Routers may also be used to connect two or
more logical groups of computer devices known as subnets, each with a different network prefix.
Routers may provide connectivity within enterprises, between enterprises and the Internet, or
between internet service providers (ISPs') networks. The largest routers (such as the Cisco CRS-
1 or Juniper PTX) interconnect the various ISPs, or may be used in large enterprise
networks. Smaller routers usually provide connectivity for typical home and office networks.
All sizes of routers may be found inside enterprises. The most powerful routers are usually found
in ISPs, academic and research facilities. Large businesses may also need more powerful routers
to cope with ever-increasing demands of intranet data traffic. A hierarchical internetworking
model for interconnecting routers in large networks is in common use.
2.2 NETWORK SWITCH
A network switch is a computer networking device that connects devices together on a computer
network by using packet switching to receive, process, and forward data to the destination
device. A network switch is a multiport network bridge that uses hardware addresses to process
and forward data at the data link layer of the OSI model. Some switches can also process data at
the network layer by additionally incorporating routing functionality, such switches are
commonly known as layer-3 switches or multilayer switches. (wikipedia)
A network switch is used to connect computers and other devices to a wired local network.
Ethernet cables are usually used with network switches, but some switches also have fiber-optic
ports. Wired gigabit networks with switches are much faster than traditional wireless networks.
With some minimal setup and configuration, a network switch can be up and running in a short
time.
6
Figure 2 24-port cisco switch
2.2.1 HOW TO USE A NETWORK SWITCH
Step 1: Determine what speed switch you need. Many switches can only go to speeds of 100
Mbps, while some gigabit switches can get up to 1000 Mbps. To decide on a speed, find out if
the computer(s) you're connecting are capable of going at gigabit speeds. If so, a gigabit switch
is best.
Step 2: Determine if you want any advanced features. More advanced switches can
accommodate more than one network (on one physical switch) through virtual local area
networking (VLAN).
Step 3: Determine how many ports you need on the switch. The number of ports should be equal
to, or greater than, the number of computers that you are connecting.
Step 4: Configure your switch. Connect a computer to the switch using the IP address found in
the switch manual. Set up the IP address for the switch, network address and netmask.
Step 5: Configure the VLANs, if necessary. Decide which port goes to which VLAN, and
configure the switch appropriately.
Step 6: Connect a cable from the uplink port to the rest of the network. Many newer switches can
detect the uplink connection from any port. Use either an orange crossover or Ethernet cable.
Step 7: Connect Ethernet cables from the computers to the switch's ports. If multiple VLANs are
being used, make sure the computers are on the correct VLAN.
Step 8: Hard code the settings, if necessary. Most computers automatically negotiate the switch's
settings. If hard coding is necessary, log into the switch and hard code the settings on a per port
basis.
7
2.3 PATCH PANEL
A patch panel is a device or unit featuring a number of jacks, usually of the same or similar type,
for the use of connecting and routing circuits for monitoring, interconnecting, and testing circuits
in a convenient, flexible manner. Patch panels are commonly used in computer networking,
recording studios, radio and television. (wikipedia)
Figure 3 24-port Tp-Link patch panel
2.3.1 TERMINATION OF PATCH PANEL
Step 1: Strip the cable of its protective outside jacket about 3–6 inches (7.6–15.2 cm) from the
end. This can be done with the cabling scissors by applying pressure from the scissors to the
cable and rotating the scissors around the cable. After you have punctured the cables jacket, you
should be able pull the jacket off easily leaving exposed wires.
Step 2: Stripping the cable can cut and damage the wires at the area that we cut the cable so we
want to expose about 6 more inches of fresh wires. Most twisted pair Cat5, Cat5e and Cat6
cables have a small string inside the cable to assist with this.
Step 3: If your cable has the small string, make a small cut in the jacket of the cable, making sure
not to touch any wires, and then use the string to pull towards the fresh end of the cable exposing
about 6 inches (15.2 cm) of cable. Cut the string after you have enough exposed cable.
Step 4: If your cable does not have the small string, make a small cut in the jacket described
above and gently pull all of the wires together in one hand and pull the jacket in the opposite
direction.
 All Cat5, Cat5e and Cat6 cables follow a standard color pattern for the individual wires.
Blue, Orange, Green and Brown. There are two wires per color. White/Blue and Blue,
White/Orange and Orange, White/Green and Green, White/Brown and Brown. If you
8
look at the back side of your patch panel, you will see the corresponding colors where
you will terminate the cable to.
 Note: There are two color patterns, T568A and T568B. Make sure to terminate both sides
of the cable on the same pattern. If you have already terminated one side of the cable,
look to see what pattern was used! If you have not already terminated, choose a standard
that you will always use. Both patterns will produce the same results.
Step 5: After choosing the correct pattern, choose the port on the patch panel you wish the cable
to connect to. It is general practice to terminate in ascending order so start at the lowest number.
First cable should be terminate to the 1st port and so on.
Step 6: Untwist the wires completely to the jacket. Place the wires into the appropriate color slot
on the patch panel. Make sure to place the wires as tightly as possible in the slots in regards to
the jacket. There should be as little exposed and untwisted wire as possible to keep the signal
strength as high as possible. Make sure to place the White/Blue in the White/Blue spot and not
the solid Blue spot. The White/Color wire is not the same as the solid color.
Step 7: Terminate each wire. After all the wires are in the correct spot and double checked to
make sure as little amount of exposed wires will be left as possible, use the punch down tool
with the 110 blade and terminate each wire individually. The 110 blade will fully cover the wire
connector on the patch panel. Push down until the tool clicks and cuts the end of the wire off.
Repeat this step if the wire was not fully cut.
Step 8: Secure the cable to the patch panel with a zip tie if there is a slot or tab for a zip tie.
Step 9: Use a cable tester to assure that you correctly terminated all the wires.
Figure 4 patch panel termination
9
2.4 REGISTERED JACK 45 CONNECTOR (RJ 45)
A registered jack (RJ) is a standardized physical network interface for connecting
telecommunications or data equipment. The physical connectors that registered jacks use are
mainly of the modular connector and 50-pin miniature ribbon connector types. The most
common twisted-pair connector is an 8-contact (8P8C) modular plug and jack commonly
referred as an RJ 45 connector. (anixter)
Figure 5 RJ45 connector Figure 6 terminated cable with RJ45
2.4.1 TERMINATING CAT5/ 5e/ 6 CABLES WITH RJ45 CONNECTOR
Step 1: In order to terminate cat 5, cat 5e, or cat 6, we'll need the cable, RJ45 terminating tips,
and an RJ45 compatible crimper.
Step 2: Once you have the necessary components the first thing you need to do is strip the jacket
off from the cable. Using the stripping blade on the crimper, strip about an inch of the jacket
from the cable.
Step 3: Once the jacket has been removed you'll have 4 pairs of wire. Each pair consists of a
solid colored wire and a white wire with a stripe of the same color as the solid colored wire.
Step 4: Next you'll want to untwist each pair of wire to make them easy to rearrange. You may
have to untwist them a little further than what is exposed from the jacket in order to make them
easy to move.
10
Step 5: It is best practice to stick to a standardized wiring scheme, but the most important part is
that you're consistent on both sides of the cable. The T568A standard wiring scheme is a good
standard pinout to use when wiring your cat 5. Order the wires from left to right in the order light
green (white with green stripe), green, light orange, blue, light blue, orange, light brown, and
brown.
Step 6: If the wires are coming too far out of the jacket the tip won't be as secure on the wire.
Use the wire cutting tool on the crimper to trim the wire back to about a half-inch.
Step 7: Now that our wires our prepped we need to install the tip. Slide the tip over the wires
with the light green wire being in the top pin if the tip is held like in the picture. Once the cable
is slid into place you need to make certain that everything is well placed. Check all the wires to
make certain they are still in the correct order and that all the wires reach the end of the tip. Also,
make certain that the cable jacket goes far enough into the tip so that it is beyond the part of the
tip that will be pressed up into the cable jacket. This will help to keep the wire from pulling out
of the tip.
Step 8: The pinout is rather important. The layout of the wires has 2 standards. They were
designed to keep gigabit speeds and have a universal installation. You can use T568B OR T568A
standard. The same connection is used on both ends of the cable.
2.5 TWISTED PAIR CABLE
Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted
together for the purposes of improving electromagnetic compatibility. Compared to a single
conductor or an untwisted balanced pair, a twisted pair reduces electromagnetic radiation from
the pair and crosstalk between neighboring pairs and improves rejection of external
electromagnetic interference.
2.5.1 TYPES OF TWISTED PAIR CABLE
There are two types of twisted pair cable; unshielded (UTP) and shielded twisted pair (STP)
 Unshielded twisted pair (UTP) cable is the most common cable used in computer
networking. Modern Ethernet, the most common data network standard, can use UTP
cables. Twisted pair cabling is often used in data networks for short and medium length
11
connections because of its relatively lower costs compared to optical fiber and coaxial
cable.
UTP is also finding increasing use in video applications, primarily in security cameras.
Many cameras include a UTP output with screw terminals; UTP cable bandwidth has
improved to match the baseband of television signals. As UTP is a balanced transmission
line, a balun is needed to connect to unbalanced equipment, for example any using BNC
connectors and designed for coaxial cable.
 Twisted pair cables often incorporate shielding in an attempt to prevent electromagnetic
interference. Shielding provides an electrically conductive barrier to attenuate
electromagnetic waves external to the shield, and provides a conduction path by which
induced currents can be circulated and returned to the source via ground reference
connection.
 Such shielding can be applied to individual pairs or squads, or to a collection of pairs.
Individual pairs are foil shielded, while an overall cable (of multiple pairs) may use any
of braided screen or foil or braiding with foil.
When shielding is applied to a collection of pairs, it is usually referred to as screening,
but usage among vendors and authors in applying such words as screening, shielding, and
STP (shielded twisted pair) can be subject to variability. (wikipedia)
Figure 7 Unshielded twisted pair cable Figure 8 shielded twisted pair cable
12
2.5.2 TWISTED PAIR CABLE BUILDING STRUCTURE
NAME TYPICAL
CONSTRUCTION
BANDWIDTH APPLICATION NOTE
Level 1 0.4 MHz Telephone and modern
lines
Not described in
EIA/TIA
recommendations
.
Unsuitable for
modern systems.
Level 2 4 MHz Older terminal systems,
e.g. IBM 3270
Not described in
EIA/TIA
recommendations
.
Unsuitable for
modern systems.
Cat 3 UTP 16 MHz 10BASE-T and
100BASE-T4
Ethernet
Described in
EIA/TIA-568.
Unsuitable for
speeds above 16
Mbit/s. Now
mainly for
telephone cables.
Cat 4 UTP 20 MHz 16Mbit/s
Token Ring
Not commonly
used.
Cat 5 UTP 100MHz 100BASE-TX &
1000BASE-T
Ethernet
Common for
current LANs.
Superseded by
Cat5e, but most
Cat5 cables meet
Cat5e standards.
Limited to 100m
between
equipment.
Cat 5e UTP
STP
100MHz 100BASE-TX &
1000BASE-T
Ethernet
Enhanced Cat5.
Common for
current LANs.
Same
construction as
Cat5, but with
better testing
standards.
Limited to 100m
between
equipment.
Cat 6 UTP 250 MHz 10GBASE-T ISO/IEC 11801
13
STP Ethernet 2nd Ed. (2002),
ANSI/TIA 568-
B.2-1. Most
commonly
installed cable in
Finland according
to the 2002
standard EN
50173-1. Limited
to 55m distance
at 10GBASE-T
Cat 6A UTP
F/UTP
U/FTP
500MHz 10GBASE-T
Ethernet
Improved
standards, tested
to 500MHz. Full
100m distance at
10GBASE-T
ISO/IEC 11801
2nd Ed. Am. 2.
(2008),
ANSI/TIA-568-
C.1 (2009)
Cat 7 S/FTP
F/FTP
600MHz 10GBASE-T
Ethernet or
POST/CATV/1000BAS
E-T over single cable
Fully shielded
cable. ISO/IEC
110801 2nd Ed.
(2002). It is not
recognized by the
EIA/TIA
(wikipedia)
2.5.3 HOW TO TERMINATE TWISTED-PAIR CABLE USING JACK MODULE IN 12
STEPS
Step 1: The tools you need:
 Jacket stripper
 Punch-down tool
 Wire cutters
Step 2: Insert cable into stripping tool to the desired strip length. Strip off only as much cable
jacket needed to properly terminate the pairs (1 to 1.5 inches should be sufficient to terminate
pairs).
Step 3: Holding the cable near the tool, rotate the tool around the cable several times.
14
Step 4: Slightly bend the outer jacket and manually remove the cut piece or slide the cut outer
jacket with the stripper.
Step 5: Bend each pair in one direction to expose the rip cord, binder or cross-web filler on the
cable.
Step 6: Remove the rip cord, binder or cross-web filler if they are present on the cable, leaving
only the twisted pairs of wire. The cross-web filler should be cut as flush as possible to the
jacket.
Step 7: Determine the wiring scheme and properly align all four cables accordingly on the jack.
Keep the cable jacket as close to the connector as possible. Always use connectors, wall plates
and patch panels that are compatible (same rating or higher) with the grade of the cable used.
Step 8: Preserve the wire pair twists as close as possible to the point of termination. When
connecting jacks and plugs, do not untwist the cable more than 0.5 inches for Category 5e, 6 and
6A cable.
Step 9: Insert wires down into IDC terminal slots to position them before punching down.
Maintain the twist. To “future-proof” an installation, terminate all four pairs.
Step 10: When using a punch-down tool, make sure the tool is straight before punching down on
the connector. Make sure the cut-side of the tool is facing outward.
Step 11: Inspect the connector to verify that the wires are fully engaged in the IDC terminals and
they are cut properly.
Step 12: Place a dust cover on the jack for protection.
Figure 9 Jack module Figure 10 Termination of jack module
15
2.6 CABLE TESTER
A cable tester is an electronic device used to verify the electrical connections in a signal cable or
other wired assembly. Basic cable testers are continuity testers that verify the existence of a
conductive path between ends of the cable, and verify the correct wiring of connectors on the
cable. More advanced cable testers can measure the signal transmission properties of the cable
such as its resistance, signal attenuation, noise and interference.
Generally a basic cable tester is a battery operated portable instrument with a source of electric
current, one or more voltage indicators, and possibly a switching or scanning arrangement to
check each of several conductors sequentially. A cable tester may also have a microcontroller
and a display to automate the testing process and show the testing results, especially for multiple-
conductor cables. A cable tester may be connected to both ends of the cable at once, or the
indication and current source portions may be separated to allow injection of a test current at one
end of a cable and detection of the results at the distant end. Both portions of such a tester will
have connectors compatible with the application, for example, modular
connectors for Ethernet local area network cables.
A cable tester is used to verify that all of the intended connections exist and that there are no
unintended connections in the cable being tested. When an intended connection is missing it is
said to be "open". When an unintended connection exists it is said to be a "short" (a short
circuit). If a connection "goes to the wrong place" it is said to be "miswired" (the connection has
two faults: it is open to the correct contact and shorted to an incorrect contact).
Figure 11 Cable tester
16
2.7 NETWORK RACK
A network rack is a metal frame chassis that holds, stacks, organizes, secures and protects
various computer network and server hardware devices. The term “network” refers to the rack
being used to house network hardware like routers, switches, access points, and modems.
The same rack holds servers and other computer systems, although some are designed with
specific device types in mind. The rack works by securing network and other computer hardware
within the mounting fixtures via brackets, bolts and other hardware to keep the hardware in its
secure place.
A type of open rack called a 2 post server rack is a lower-cost, easy-to-use entry into network
rack mounting equipment. Also called 2 post relay racks, the post rack works by having two
thinner, centralized parallel posts extending from a larger balanced based either 19 or 23 inches
apart depending on the model.
The 2 post rack is easy to set up and start with because of the light and easy to move frame
compared to more robust racks. You secure network equipment into the rack by installing a brace
on network hardware and bolting the brace to the posts.
Once installed, the two post rack allows for you to stack several different network devices on top
of each other taking advantage of vertical space to reduce how much floor space you use to store
your gear. The racks are also very sturdy and can be secured into the floor, making it very
difficult to knock over any installed equipment. Additionally, the open nature of the rack
minimizes airflow obstruction and makes it easier to manage network cables.
If you’re using 2 post relay racks to mount your network hardware, center mount your devices on
the rack for the safest, most secure hold. Center mounting refers to attaching the center of the
hardware bracket to the parallel posts on both sides. Using the center mounting position on a 2
post server rack centralizes the weight distribution which reduces pressure on the rack itself and
improves balance. Flush mounting only works well with lighter, low-profile hardware.
2.7.1 INSTALLATION OF 22U RACK
Packaging Contents
 4 x Adjustable Feet
17
 2 x Allen Wrench (small, large)
 1 x Assembly screw kit (M4, M5, M6, M8)
 4 x Casters
 8 x Corner Caps
 4 x Cross Brace
 1 x Left and Right Panel and frame
 20 x M6 Cabinet Screws and Nuts
 2 x Sets of keys
 1 x Top Panel
 3 x Bottom Panel
Required Tools
 Phillips (crosshead) screwdriver
 Adjustable wrench
Frame assembly
Step 1: Connect the two side frames (with side doors) together using the 4 cross braces at each
corner. Fasten using a large hex screw at each end of the brace with the large AllenWrench.
Attach the cross braces to one side first, then attach the second side frame to the braces.
Step 2: Place the Corner Caps over the corner joints and fasten them with M4 screws and a
Phillips screwdriver.
Step 3: On the bottom of the rack, install the four adjustable corner feet and the four casters. The
adjustable feet screw into the large openings in each corner with their height determined by the
large hex nut. Screw in the feet to the desired height, then use an adjustable wrench to lock the
hex nut in place. The casters are fastened using the M5 screws and Phillips screwdriver.
Step 4: Position the rack right-side up (side panel locks at top) and drop the top panel onto the
top of the rack. Fasten to the frame using M6 hex screws and the smaller Allen Wrench.
Step 5: Position the 3 floor plates on the bottom of the rack, making sure the two pieces with the
cable management slots are at the end. Fasten the floor plates with M5 screws and Phillips screw
driver.
18
Figure 12 22U networking server rack
2.8 DIGITAL VIDEO RECORDER (DVR)
A digital video recorder (DVR) is an electronic device that records video in a digital format to
a disk drive, USB flash drive, SD memory card, SSD or other local or networked mass
storage device. The term includes set-top boxes with direct to disk recording, portable media
players and TV gateways with recording capability, and digital camcorders. Personal computers
are often connected to video capture devices and used as DVRs; in such cases the application
software used to record video is an integral part of the DVR. Many DVRs are classified
as consumer electronic devices; such devices may alternatively be referred to as personal video
recorders (PVRs).
Figure 13 Advance HD DVR
2.9 BNC CONNECTOR
Short for Bayonet NeillConcelman connector, (sometimes erroneously called a British Naval
Connector or Bayonet Nut Connector, a type of connector used with coaxial cables such as the
19
RG-58 A/U cable used with the 10Base-2 Ethernet system. The basic BNC connector is a male
type mounted at each end of a cable. This connector has a center pin connected to the center
cable conductor and a metal tube connected to the outer cable shield. A rotating ring outside the
tube locks the cable to any female connector.
BNC T-connectors (used with the 10Base-2 system) are female devices for connecting two
cables to a network interface card (NIC). A BNC barrel connector allows connecting two cables
together.
BNC connectors can also be used to connect some monitors, which increases the accuracy of the
signals sent from the video adapter.
Figure 14 BNC connector
20
CHAPTER THREE
3.0 EXPERIENCE GAINED
3.1 NETWORKING
A network is a set of devices (often referred to as nodes) connected by communication links. A
node can be a computer, printer, or any other device capable of sending and/or receiving data
generated by other nodes on the network. (A.Forouzan, 2007)
3.1.1 CATEGORIES OF NETWORKS
Today when we speak of networks, we are generally referring to primary categories: Local Area
Network (LAN) and Wide Area Network (WAN). The category into which a network falls is
determined by its size. A LAN normally covers an area less than 2 miles, a WAN can be
worldwide. Network of a size in between are normally referred to as Metropolitan Area Network
and span tens of miles.
3.1.2 LOCAL AREA NETWORK (LAN)
A Local Area Network (LAN) is usually privately owned and links the devices in a single office,
building, or campus. Depending on the needs of an organization and the type of technology used,
a LAN can be as simple as two PCs and a printer in someone’s home office; or it can extend
throughout a company and include audio and video peripherals, Currently, LAN size is limited to
a few kilometers.
LANs are designed to allow resources to be shared between personal computers or workstations.
The resources to be shared can include hardware (e.g. a printer), software (e.g. an application
program), or data. A common example of a LAN, found in many business environments, links a
workgroup of task-related computers, for example, engineering workstations or accounting PCs.
One of the computers may be given a large capacity disk drive and may become a server to
clients. Software can be stored on this central server and used as needed by the whole group. In
this example, the size of the LAN may be determined by licensing restrictions on the number of
users per copy of software, or by restrictions on the number of users licensed to access the
operating system.
21
In addition to size, LANs are distinguished from other types of networks by their transmission
media and topology. In general, a given LAN will use only one type of transmission medium.
The most common LAN topologies are bus, ring, and star.
Early LANs had data rates in the 4 to 16 megabits per second (Mbps) range. Today, however,
speeds are normally 100 or 1000 Mbps.
3.1.3 PHYSICAL NETWORK CONNECTION AND ELECTRICAL WIRING OF AIICO
PENSION MANAGERS LTD.
This is a project for network cabling and electrical wiring of Aiico Pension Managers Limited,
which is the provision of 16-piont data and 16-point voice network points along with 32-points
dual inverter power points as shown in the diagram below:
Steps carried out during the project
 Mapping out of cable paths, network points, and power points.
 Laying of plastic trucking and opening of ceiling for cables path.
 Preparation of data, voice, and power cables.
 Assembling of 22U rack mount in the server room.
 Running of data and voice cables.
 Running of inverter power cables and distribution board power cables.
 Termination of data and voice cables at the 32 nodes using TIA/EIA 568-B standard
arrangement.
 Termination of power cables at the 48-points (32 dual inverter and 16 single distribution
board).
 Patching of the 32-points data and voice cables on the 2×48-ports Tp-Link patch panel
using TIA/EIA 568-B standard arrangement.
 Mounting of the patch panels on the rack and tiding of the cables under and within the rack.
 Assembling of network devices (2×48-ports cisco switches) to the patch panel via 1 meter
patch cable.
 Wire map testing of the data and voice points (from patch panel to the various data and
voice ports).
 Correction of faulty and improper wire map tests.
 Point-to-point testing of the 32-points via switches.
22
23
3.2 COMPUTER MAINTENANCE
Computer maintenance is the practice of keeping computers in a good state of repair. A computer
containing accumulated dust and debris may not run properly.
Dust and debris will accumulate as a result of air cooling. Any filters used to mitigate this need
regular service and changes. If the cooling system is not filtered then regular computer cleaning
may prevent short circuits and overheating.
3.2.1 COMPONETS OF COMPUTER SYSTEM
 Keyboard
The crumbs, dust, and other particulate that fall between the keys and build up underneath are
loosened by spraying pressurized air into the keyboard, then removed with a low-pressure
vacuum cleaner. A plastic-cleaning agent applied to the surface of the keys with a cloth is used to
remove the accumulation of oil and dirt from repeated contact with a user's fingertips. If this is
not sufficient for a more severely dirty keyboard, keys are physically removed for more focused
individual cleaning, or for better access to the area beneath. Finally, the surface is wiped with a
disinfectant.
 Monitor
A monitor displays information in visual form, using text and graphics. The portion of the
monitor that displays the information is called the screen. Like a television screen, a computer
screen can show still or moving pictures and it’s a part of Output Devices. There are two basic
types of monitors: CRT (cathode ray tube) monitors and LCD (liquid crystal display) monitors.
Both types produce sharp images, but LCD monitors have the advantage of being much thinner
and lighter. CRT monitors, however, are generally more affordable.
Fingerprints, water spots, and dust are removed from the screen with a cleaning wipe specialized
for the screen type (CRT, LCD, etc.). A general plastic-cleaning agent is used on the outer
casing, which requires a less gentle cleanser but may need more focused attention to unusual
buildups of dust, grime, pen marks, etc. idiosyncratic to the user and environment.
 Mouse
24
The top surface of the mouse is wiped with a plastic cleanser to remove the dirt that accumulates
from contact with the hand, as on the keyboard. The bottom surface is also cleaned to ensure that
it can slide freely. If it is a mechanical mouse, the trackball is taken out, not only to clean the ball
itself, but to scrape dirt from the runners that sense the ball's movement and can become jittery
or stuck if impeded by grime.
 Tower/desktop unit
Internal components accumulate dust brought in by the airflow maintained by fans to keep the
PC from overheating. A soft brush may remove loose dirt; the remainder is dislodged with
compressed air and removed with a low-pressure vacuum. The case is wiped down with a
cleaning agent. A pressurized blower or gas duster can remove dust that cannot be reached with
a brush.
3.2.2 DATA BACKUPS
Important data stored on computers may be copied and archived securely so that, in the event of
failure, the data and systems may be reconstructed. When major maintenance such as patching is
performed, a backup is recommended as the first step in case the update fails and reversion is
required.
Disk cleanup may be performed as regular maintenance to remove these. Files may become
fragmented and so slow the performance of the computer. Disk defragmentation may be
performed to combine these fragments and so improve performance.
3.2.3 COMPUTER SOFTWARE
Computer software, or simply software, is a generic term that refers to a collection of data or
computer instructions that tell the computer how to work, in contrast to the physical
hardware from which the system is built, that actually performs the work. In computer
science and software engineering, computer software is all information processed by computer
systems, programs and data. Computer software includes computer programs, libraries and
related non-executable data, such as online documentation or digital media. Computer hardware
and software require each other and neither can be realistically used on its own.
25
 Operating system
An operating system (OS) is system software that manages computer hardware and software
resources and provide common services for computer programs.
Time-sharing operating systems schedule tasks for efficient use of the system and may also
include accounting software for cost allocation of processor time, mass storage, printing, and
other resources.
For hardware functions such as input and output and memory allocation, the operating system
acts as an intermediary between programs and the computer hardware, although the application
code is usually executed directly by the hardware and frequently makes system calls to an OS
function or is interrupted by it. Operating systems are found on many devices that contain a
computer – from cellular phones and video game consoles to web servers and super computers.
3.3 CCTV (closed circuit television)
CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but
are monitored, primarily for surveillance and security purposes.
CCTV relies on strategic placement of cameras, and observation of the camera's input on
monitors somewhere. Because the cameras communicate with monitors and/or video recorders
across private coaxial cable runs or wireless communication links, they gain the designation
"closed-circuit" to indicate that access to their content is limited by design only to those able to
see it.
Older CCTV systems used small, low-resolution black and white monitors with no interactive
capabilities. Modern CCTV displays can be color, high-resolution displays and can include the
ability to zoom in on an image or track something (or someone) among their features. Talk
CCTV allows an overseer to speak to people within range of the camera's associated speakers.
CCTV is commonly used for a variety of purposes, including:
 Maintaining perimeter security in medium-to high-secure areas and installations.
 Observation behavior of incarcerated inmates and potentially dangerous patients in
medical facilities.
26
 Traffic monitoring.
 Overseeing locations that would be hazardous to a human, for example, highly
radioactive or toxic industrial environments.
 Building and grounds security.
 Obtaining a visual record of activities in situations where it is necessary to maintain
proper security or access controls (for example, in a diamond cutting or sorting operation;
in banks, casinos, or airports).
CCTV is finding increasing use in law-enforcement, for everything from traffic observation (and
automated ticketing) to observation of high-crime areas or neighborhoods. Such use of CCTV
technology has fueled privacy concerns in many parts of the world, particularly in those areas in
the UK and Europe where it has become a routine part of police procedure.
3.3.1 INSTALLATION OF CCTV (closed circuit television)
I was attached to CCTV security network installation team assigned to install 4 CCTV camera
security surveillance network system in a client’s home. Materials required for the job were
handled and delivered to the site. The materials are:
 4-channel A HD DVR (Advance High Definition Digital Video Recorder).
 3× outdoor and 1× indoor infrared (IR) cameras
 1× 500 GB internal SATA hard drive disk
 Wireless router/modem
 1× TV monitor
 HDMI () cable
 Category 6 cable
 1.2 KVA UPS (uninterrupted power supply).
 BNC connectors
 Trucking pipes
First of all, mapping of cables path, drilling of holes and mounting of trucking pipes carried out.
Then running of cables and cable ends terminated with BNC connector.
Outdoor cameras were mounted to cover the main gate outside and inside of the house and the
3rd on adjoining wall to cover entrance to the sitting room from outside. The indoor cameras was
27
mounted to cover entrance to sitting room, inside the sitting room and the corridor leading to
other rooms.
All cameras were connected to the DVR via BNC connectors, and the TV monitor connected to
the DVR via HDMI cable and the router connected to the DVR via Ethernet cable. All
equipment were connected and powered through the 1.2 KVA UPS. The DVR was first
configured using default settings and password assigned. The cameras were adjusted to focus on
the required coverage areas. The Tp-Link 3G/4G wireless & router was configured via 4-ports
for LAN/WAN connectivity, Ethernet, wireless and registered via the internet USB HSPDA
MODEM with Airtel SIM. Router IP address was assigned to the DVR and network parameters
were set to enable set to enable the owner to monitor all the camera footings through smart
phone, IPhone, IPad, laptop or PC over the internet from any part of the world.
Figure 15 Indoor infrared camera Figure 16 Outdoor infrared camera
28
CHAPTER FOUR
4.1 SUMMARY
The eights week student industrial work experience scheme in X-CEL computer company
limited expose me to know more in practical knowledge of CCTV cameras installation,
networking, and maintenance of computer system.
4.2 CONCLUSION
The training experience is very mandatory and important for all students in tertiary institution
mostly those in field of engineering, science, and technology.
4.3 RECOMMENDATION
I recommend that the (I.T) program its continuity in all tertiary institution because it help so
many students in practical aspect and academic performance as well as work experience.
In other to make this SIWES training easy, student should look for interested place where gain
practical aspect of what they were tough in the classroom.
I also recommended that the government and the school authority should assist the student in
securing a good place for their (I.T) program, because some students found it difficult in
securing a place.
4.4 REFERENCE
A.Forouzan, B. (2007). Data Communication and Networking. McGraw-Hill.
anixter. (n.d.). anixter. Retrieved from anixter:
https://www.anixter.com/en_mx/resoures/lliterature/techbriefs/what-is-an-rj45-
connector.html
wikipedia. (n.d.). Retrieved from https://en.m.wikipedia.org/wiki/twisted_pair
wikipedia. (n.d.). Retrieved from https://en.m.wikipedia.org/wiki/patch_panel
wikipedia. (n.d.). Retrieved from https://em.m.wikipedia.org/wiki/twisted_pair
wikipedia. (n.d.). wikipedia. Retrieved from wikipedia:
https://en.m.wikipedia.org/wiki/network_switch
29

More Related Content

What's hot

SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
Ejiro Ndifereke
 
Final Report v3
Final Report v3Final Report v3
Final Report v3
Shafny Mahir
 
Siwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahayaSiwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahaya
Abdullahi Yahaya AESM, (CPM)
 
SIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNSIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGN
Ejiro Ndifereke
 
MY SIWES REPORT
MY SIWES REPORTMY SIWES REPORT
MY SIWES REPORT
Ayo Odomo mtn
 
AbleMoJah's IT Report
AbleMoJah's IT ReportAbleMoJah's IT Report
AbleMoJah's IT Report
Able MoJah
 
Attachment report IAT
Attachment report IATAttachment report IAT
Attachment report IAT
itronics
 
Experience at WSO2 as an Intern
Experience at WSO2 as an InternExperience at WSO2 as an Intern
Experience at WSO2 as an Intern
Pushpalanka Jayawardhana
 
johnson pdf (3)_2N
johnson pdf (3)_2Njohnson pdf (3)_2N
johnson pdf (3)_2N
Johnson Fartoma
 
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLASIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
G_ade
 
Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.
Abah Joseph Israel
 
Report docx
Report docxReport docx
Report docx
ZhouCrance
 
Technical Report
Technical ReportTechnical Report
Technical Report
Nnamdi Okafor (赵博超)
 
Computer science industrial training report carried out at web info net ltd ...
Computer science  industrial training report carried out at web info net ltd ...Computer science  industrial training report carried out at web info net ltd ...
Computer science industrial training report carried out at web info net ltd ...
rashid muganga
 
Siwes report original
Siwes report originalSiwes report original
Siwes report original
Brightnyt Pun
 
Internship report on IT
Internship report on ITInternship report on IT
Internship report on IT
surafelteshome3
 
Internship Wso2
Internship Wso2Internship Wso2
Internship Wso2
A.Y Dissanayake
 
Student Industrial Workshop Experience Scheme (SIWES) Report
Student Industrial Workshop Experience Scheme (SIWES) ReportStudent Industrial Workshop Experience Scheme (SIWES) Report
Student Industrial Workshop Experience Scheme (SIWES) Report
OkpehHarrison
 
Siwes report
Siwes reportSiwes report
Siwes report
happiness daniel
 
It report
It reportIt report
It report
tersurmd
 

What's hot (20)

SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 
Final Report v3
Final Report v3Final Report v3
Final Report v3
 
Siwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahayaSiwes report on networking by abdullahi yahaya
Siwes report on networking by abdullahi yahaya
 
SIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNSIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGN
 
MY SIWES REPORT
MY SIWES REPORTMY SIWES REPORT
MY SIWES REPORT
 
AbleMoJah's IT Report
AbleMoJah's IT ReportAbleMoJah's IT Report
AbleMoJah's IT Report
 
Attachment report IAT
Attachment report IATAttachment report IAT
Attachment report IAT
 
Experience at WSO2 as an Intern
Experience at WSO2 as an InternExperience at WSO2 as an Intern
Experience at WSO2 as an Intern
 
johnson pdf (3)_2N
johnson pdf (3)_2Njohnson pdf (3)_2N
johnson pdf (3)_2N
 
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLASIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
 
Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.Computer Basics - A SIWES Report.
Computer Basics - A SIWES Report.
 
Report docx
Report docxReport docx
Report docx
 
Technical Report
Technical ReportTechnical Report
Technical Report
 
Computer science industrial training report carried out at web info net ltd ...
Computer science  industrial training report carried out at web info net ltd ...Computer science  industrial training report carried out at web info net ltd ...
Computer science industrial training report carried out at web info net ltd ...
 
Siwes report original
Siwes report originalSiwes report original
Siwes report original
 
Internship report on IT
Internship report on ITInternship report on IT
Internship report on IT
 
Internship Wso2
Internship Wso2Internship Wso2
Internship Wso2
 
Student Industrial Workshop Experience Scheme (SIWES) Report
Student Industrial Workshop Experience Scheme (SIWES) ReportStudent Industrial Workshop Experience Scheme (SIWES) Report
Student Industrial Workshop Experience Scheme (SIWES) Report
 
Siwes report
Siwes reportSiwes report
Siwes report
 
It report
It reportIt report
It report
 

Similar to Siwes report by mukhtar salisu

REPORT IBM (1)
REPORT IBM (1)REPORT IBM (1)
REPORT IBM (1)
Hamza Khan
 
Juniper netscreen 25
Juniper netscreen 25Juniper netscreen 25
Juniper netscreen 25
rikvar
 
Integrating SDN into the Data Center
Integrating SDN into the Data CenterIntegrating SDN into the Data Center
Integrating SDN into the Data Center
Juniper Networks
 
Design And Implementation Of A Phone Card Company
Design And Implementation Of A Phone Card CompanyDesign And Implementation Of A Phone Card Company
Design And Implementation Of A Phone Card Company
grysh129
 
Aja ki pro_mini_manual_v4.1
Aja ki pro_mini_manual_v4.1Aja ki pro_mini_manual_v4.1
Aja ki pro_mini_manual_v4.1
Валерий Шумилов
 
software-eng.pdf
software-eng.pdfsoftware-eng.pdf
software-eng.pdf
fellahi1
 
Plsql
PlsqlPlsql
Services Article Uc Apps Research Wp
Services Article Uc Apps Research WpServices Article Uc Apps Research Wp
Services Article Uc Apps Research Wp
chgibbs7
 
Dissertation report 2_3
Dissertation report 2_3Dissertation report 2_3
Dissertation report 2_3
Abub6666
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
Mohamed Atef
 
KDU Zebra - Manual do Dispositivo
KDU Zebra - Manual do DispositivoKDU Zebra - Manual do Dispositivo
KDU Zebra - Manual do Dispositivo
UseZ
 
Emerging Multicast VPN Applications
Emerging  Multicast  VPN  ApplicationsEmerging  Multicast  VPN  Applications
Emerging Multicast VPN Applications
Johnson Liu
 
XSLATE_B10_Users_Guide_FINAL
XSLATE_B10_Users_Guide_FINALXSLATE_B10_Users_Guide_FINAL
XSLATE_B10_Users_Guide_FINAL
Rochelle Zimmerman
 
document
documentdocument
Juniper Networks: Security for cloud
Juniper Networks: Security for cloudJuniper Networks: Security for cloud
Juniper Networks: Security for cloud
TechnologyBIZ
 
Bx310x Product Specification
Bx310x Product SpecificationBx310x Product Specification
Bx310x Product Specification
Frederic Petit
 
ESTACION DE TRABAJO ALLEN-BRADLEY
ESTACION DE TRABAJO ALLEN-BRADLEYESTACION DE TRABAJO ALLEN-BRADLEY
ESTACION DE TRABAJO ALLEN-BRADLEY
Hard Rock Cafe
 
Oracle pl-sql user's guide & reference
Oracle   pl-sql user's guide & referenceOracle   pl-sql user's guide & reference
Oracle pl-sql user's guide & reference
desitaria
 
cl3108.pdf
cl3108.pdfcl3108.pdf
cl3108.pdf
angelopalaming
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Błażej Matusik
 

Similar to Siwes report by mukhtar salisu (20)

REPORT IBM (1)
REPORT IBM (1)REPORT IBM (1)
REPORT IBM (1)
 
Juniper netscreen 25
Juniper netscreen 25Juniper netscreen 25
Juniper netscreen 25
 
Integrating SDN into the Data Center
Integrating SDN into the Data CenterIntegrating SDN into the Data Center
Integrating SDN into the Data Center
 
Design And Implementation Of A Phone Card Company
Design And Implementation Of A Phone Card CompanyDesign And Implementation Of A Phone Card Company
Design And Implementation Of A Phone Card Company
 
Aja ki pro_mini_manual_v4.1
Aja ki pro_mini_manual_v4.1Aja ki pro_mini_manual_v4.1
Aja ki pro_mini_manual_v4.1
 
software-eng.pdf
software-eng.pdfsoftware-eng.pdf
software-eng.pdf
 
Plsql
PlsqlPlsql
Plsql
 
Services Article Uc Apps Research Wp
Services Article Uc Apps Research WpServices Article Uc Apps Research Wp
Services Article Uc Apps Research Wp
 
Dissertation report 2_3
Dissertation report 2_3Dissertation report 2_3
Dissertation report 2_3
 
Dual-Band Mobile Phone Jammer
Dual-Band Mobile Phone JammerDual-Band Mobile Phone Jammer
Dual-Band Mobile Phone Jammer
 
KDU Zebra - Manual do Dispositivo
KDU Zebra - Manual do DispositivoKDU Zebra - Manual do Dispositivo
KDU Zebra - Manual do Dispositivo
 
Emerging Multicast VPN Applications
Emerging  Multicast  VPN  ApplicationsEmerging  Multicast  VPN  Applications
Emerging Multicast VPN Applications
 
XSLATE_B10_Users_Guide_FINAL
XSLATE_B10_Users_Guide_FINALXSLATE_B10_Users_Guide_FINAL
XSLATE_B10_Users_Guide_FINAL
 
document
documentdocument
document
 
Juniper Networks: Security for cloud
Juniper Networks: Security for cloudJuniper Networks: Security for cloud
Juniper Networks: Security for cloud
 
Bx310x Product Specification
Bx310x Product SpecificationBx310x Product Specification
Bx310x Product Specification
 
ESTACION DE TRABAJO ALLEN-BRADLEY
ESTACION DE TRABAJO ALLEN-BRADLEYESTACION DE TRABAJO ALLEN-BRADLEY
ESTACION DE TRABAJO ALLEN-BRADLEY
 
Oracle pl-sql user's guide & reference
Oracle   pl-sql user's guide & referenceOracle   pl-sql user's guide & reference
Oracle pl-sql user's guide & reference
 
cl3108.pdf
cl3108.pdfcl3108.pdf
cl3108.pdf
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...
 

Recently uploaded

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 

Recently uploaded (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 

Siwes report by mukhtar salisu

  • 1. DIGITAL BRIDGE INSTITUTE INNOVATION | TECHNOLOGY | EDUCATION TECHNICAL REPORT ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) AT X-CEL COMPUTER COMPANY LIMITED BY MUKHTAR SALISU DBI/NID/NSS/KN/2016/010 IN PARTIAL FULFILLMENT FOR THE AWARD OF NATIONAL INNOVATIVE DIPLOMA (NID) IN NETWORKING AND SYSTEM SECURITY SEPTEMBER, 2018
  • 2. ii DECLARATION I hereby declare that this student industrial work experience scheme (SIWES) technical report was solely written by me under the guidance of my industry base supervisor Engr. Kamal Ya’u.
  • 3. iii DEDICATION I dedicate this work to my dearest parents whom through their advice, love, care and financial assistance have made me to be where I am today, I pray that the Good Lord will continue to keep and guide them through their lifetime and reward them in the hereafter with Jannatul Firdaus. Ameen.
  • 4. iv ACKNOWLEDGEMENT My gratitude goes to the Al-Mighty Allah for his mercies and grace. I would like to acknowledge my mentor, Engineer Isah El-Hassan (the MD, X-cel Computer Company Limited) who contributed immensely towards the success of my SIWES. I also acknowledge my friends Isma’ila Isah Abdu, Auwal S Sanata, Abdulhaq Abubakar, Abdullahi Shu’aibu Aliyu for their love care and kind gesture. God bless you all. Mostly, I thanked my lecturers, especially Mal. Yusuf, Mal. Bello, Mal. Auwal, Mal. Abubakar, Madam Waheeda Who has trained me in field of networking and my departmental SIWES supervisor Engr. Kamal Ya’u. My prayer is that God will continue to bless and keep them for the benefit of other younger generations. Ameen.
  • 5. v Contents ....................................................................................................................i CHAPTER ONE ............................................................................................................................. 1 1.0 INTRODUCTION .................................................................................................................... 1 1.1 HISTORY AND MEANING OF SIWES............................................................................. 1 1.2 AIMS AND OBJECTIVES OF SIWES ............................................................................... 1 1.3 BRIEF HISTORY OF DIGITAL BRIGDE INSTITUTE (DBI).......................................... 2 1.4 DBI AND THE NID PROGRAM ........................................................................................ 2 1.5 ABOUT X-CEL COMPUTER COMPANY LIMITED....................................................... 2 CHAPTER TWO ............................................................................................................................ 4 2.0 DEVICES, TOOLS AND EQUIPMENTS USED ................................................................... 4 2.1 ROUTER............................................................................................................................... 4 2.1.1 APPLICATION OF A ROUTER ...................................................................................... 5 2.2 NETWORK SWITCH .......................................................................................................... 5 2.2.1 HOW TO USE A NETWORK SWITCH.......................................................................... 6 2.3 PATCH PANEL.................................................................................................................... 7 2.3.1 TERMINATION OF PATCH PANEL.............................................................................. 7 2.4 REGISTERED JACK 45 CONNECTOR (RJ 45)................................................................ 9 2.4.1 TERMINATING CAT5/ 5e/ 6 CABLES WITH RJ45 CONNECTOR ............................ 9 2.5 TWISTED PAIR CABLE................................................................................................... 10 2.5.1 TYPES OF TWISTED PAIR CABLE ............................................................................ 10 2.5.2 TWISTED PAIR CABLE BUILDING STRUCTURE ................................................... 12
  • 6. vi 2.5.3 HOW TO TERMINATE TWISTED-PAIR CABLE USING JACK MODULE IN 12 STEPS ....................................................................................................................................... 13 2.6 CABLE TESTER................................................................................................................ 15 2.7 NETWORK RACK ............................................................................................................ 16 2.7.1 INSTALLATION OF 22U RACK .................................................................................. 16 2.8 DIGITAL VIDEO RECORDER (DVR) ............................................................................ 18 2.9 BNC CONNECTOR........................................................................................................... 18 CHAPTER THREE ...................................................................................................................... 20 3.0 EXPERIENCE GAINED........................................................................................................ 20 3.1 NETWORKING.................................................................................................................. 20 3.1.1 CATEGORIES OF NETWORKS ................................................................................... 20 3.1.2 LOCAL AREA NETWORK (LAN) ............................................................................... 20 3.1.3 PHYSICAL NETWORK CONNECTION AND ELECTRICAL WIRING OF AIICO PENSION MANAGERS LTD. ................................................................................................ 21 3.2 COMPUTER MAINTENANCE ........................................................................................ 23 3.2.1 COMPONETS OF COMPUTER SYSTEM.................................................................... 23 3.2.2 DATA BACKUPS ........................................................................................................... 24 3.2.3 COMPUTER SOFTWARE ............................................................................................. 24 3.3 CCTV (closed circuit television) ........................................................................................ 25 3.3.1 INSTALLATION OF CCTV (closed circuit television) ................................................. 26 CHAPTER FOUR......................................................................................................................... 28 4.1 SUMMARY........................................................................................................................ 28 4.2 CONCLUSION................................................................................................................... 28 4.3 RECOMMENDATION ...................................................................................................... 28 4.4 REFERENCE...................................................................................................................... 28
  • 7. vii TABLE OF FIGURES Figure 1 Tp-Link 3G/4G wireless router ....................................................................................... 4 Figure 2 24-port cisco switch.......................................................................................................... 6 Figure 3 24-port Tp-Link patch panel............................................................................................. 7 Figure 4 patch panel termination .................................................................................................... 8 Figure 5 RJ45 connector Figure 6 terminated cable with RJ45........... 9 Figure 7 Unshielded twisted pair cable Figure 8 shielded twisted pair cable.......... 11 Figure 9 Jack module Figure 10 Termination of jack module...... 14 Figure 11 Cable tester ................................................................................................................... 15 Figure 12 22U networking server rack ......................................................................................... 18 Figure 13 Advance HD DVR........................................................................................................ 18 Figure 14 BNC connector ............................................................................................................. 19 Figure 15 Indoor infrared camera Figure 16 Outdoor infrared camera ........... 27
  • 8. 1 CHAPTER ONE 1.0 INTRODUCTION 1.1 HISTORY AND MEANING OF SIWES There used to be a time when science and technology students who study in Nigerian institutions were not getting any practical knowledge before graduation. As the result, they couldn’t easily find jobs in their fields of study due to lack of working experience. It was a big problem for thousands of Nigerians until 1973. What changed back then? The Industrial Training Fund (ITF) decided to help Nigerian students by proposing the establishment of the SIWES programe. It was officially approved by the Federal Government and presented to the Institutions for implementation in 1974, under the coordination of the ITF, in line with the guidelines of the National Universities Commission (NUC). The program outlined the academic standards for educational establishments in Nigeria. It offered special courses to students who got theoretical knowledge and needed to practice in order to develop and improve their skills. The Students Industrial Work Experience Scheme (SIWES) is a skill training program, designed to expose students of different tertiary institutions to real life experience that prepares them for work situations after graduation. The scheme exposes students to industrial based skills necessary for smooth transition from the classroom to the world of work. It affords students of tertiary institution the opportunity of handling machinery and equipment which are not available in the education institute. 1.2 AIMS AND OBJECTIVES OF SIWES  To provide an avenue for students in tertiary institutions to acquire industrial skills and experience in their course of study.  To expose students to work methods and technique in handling equipment and machineries that may not be available in the institution.  To prepare students for the work situation that they are likely to meet after graduation.  To provide students with the opportunity to apply their theoretical knowledge in real work situation, thereby bridging the gap between the university work and the actual work practices.
  • 9. 2  To expose students to the latest developments and technological innovations in their chosen professions. 1.3 BRIEF HISTORY OF DIGITAL BRIGDE INSTITUTE (DBI) Digital Bridge Institute (DBI), Nigeria, was launched in the wake of the phenomenal world-wide growth of the Telecommunications (telecoms), and Information and Communications Technology (ICT), which has been especially well noted in Nigeria. The country has witnessed more than tenfold the growth in Tele-density, significant drops in costs, and increased access to data and other Information Technology (IT) enabled services. Led by the successful auction of Digital Mobile Licenses by the Nigerian Communications Commission (NCC) – the government regulator - and the subsequent roll out of mobile services, increased number of operators and significantly increased private capital investment, the sector as a whole has been challenged by a lack of trained and suitably qualified human resources. Acknowledging the need to continue to foster the rapid development and growth of the sector, as well as the potentially significant vulnerability that lack of human resources could pose, the NCC established DBI in 2004. Since then DBI has trained more than 55,000 persons in their professional and academic programmes. 1.4 DBI AND THE NID PROGRAM The National Innovation Diploma (NID) is an initiative of the Federal Ministry of Education through the National Board for Technical Education (NBTE), aimed at providing alternative route to Higher Education. Access to higher education is more than ever before needed considering the increasing demand for technical manpower by the various sectors of the economy and the low carrying capacity of existing higher institutions. 1.5 ABOUT X-CEL COMPUTER COMPANY LIMITED X-cel Computer Company is a wholly owned indigenous company, located at No. 3 Beirut road, Kano. Activities carried out by the company include:  Sales, installation, and maintenance of computers and peripheral devices.  Provision of wired/wireless network structures and internet connectivity.  Hardware repairs, training and consultancy.  Hardware and software maintenance services.
  • 10. 3  CCTV security network installation and maintenance. Most of the installation, maintenance and networking activities of the company are carried out at the customer premises. Only major repairs are done in the workshop.
  • 11. 4 CHAPTER TWO 2.0 DEVICES, TOOLS AND EQUIPMENTS USED 2.1 ROUTER A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets. A packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node. A router is connected to two or more data lines from different networks. When a data packet comes in on one of the lines, the router reads the network address information in the packet to determine the ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. The most familiar type of routers are home and small office routers that simply forward IP packets between the home computers and the Internet. An example of a router would be the owner's cable or DSL router, which connects to the Internet through an Internet service provider (ISP). More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone. Though routers are typically dedicated hardware devices, software-based routers also exist. Figure 1 Tp-Link 3G/4G wireless router
  • 12. 5 2.1.1 APPLICATION OF A ROUTER A router may have interfaces for different types of physical layer connections, such as copper cables, fiber optic, or wireless transmission. It can also support different network layer transmission standards. Each network interface is used to enable data packets to be forwarded from one transmission system to another. Routers may also be used to connect two or more logical groups of computer devices known as subnets, each with a different network prefix. Routers may provide connectivity within enterprises, between enterprises and the Internet, or between internet service providers (ISPs') networks. The largest routers (such as the Cisco CRS- 1 or Juniper PTX) interconnect the various ISPs, or may be used in large enterprise networks. Smaller routers usually provide connectivity for typical home and office networks. All sizes of routers may be found inside enterprises. The most powerful routers are usually found in ISPs, academic and research facilities. Large businesses may also need more powerful routers to cope with ever-increasing demands of intranet data traffic. A hierarchical internetworking model for interconnecting routers in large networks is in common use. 2.2 NETWORK SWITCH A network switch is a computer networking device that connects devices together on a computer network by using packet switching to receive, process, and forward data to the destination device. A network switch is a multiport network bridge that uses hardware addresses to process and forward data at the data link layer of the OSI model. Some switches can also process data at the network layer by additionally incorporating routing functionality, such switches are commonly known as layer-3 switches or multilayer switches. (wikipedia) A network switch is used to connect computers and other devices to a wired local network. Ethernet cables are usually used with network switches, but some switches also have fiber-optic ports. Wired gigabit networks with switches are much faster than traditional wireless networks. With some minimal setup and configuration, a network switch can be up and running in a short time.
  • 13. 6 Figure 2 24-port cisco switch 2.2.1 HOW TO USE A NETWORK SWITCH Step 1: Determine what speed switch you need. Many switches can only go to speeds of 100 Mbps, while some gigabit switches can get up to 1000 Mbps. To decide on a speed, find out if the computer(s) you're connecting are capable of going at gigabit speeds. If so, a gigabit switch is best. Step 2: Determine if you want any advanced features. More advanced switches can accommodate more than one network (on one physical switch) through virtual local area networking (VLAN). Step 3: Determine how many ports you need on the switch. The number of ports should be equal to, or greater than, the number of computers that you are connecting. Step 4: Configure your switch. Connect a computer to the switch using the IP address found in the switch manual. Set up the IP address for the switch, network address and netmask. Step 5: Configure the VLANs, if necessary. Decide which port goes to which VLAN, and configure the switch appropriately. Step 6: Connect a cable from the uplink port to the rest of the network. Many newer switches can detect the uplink connection from any port. Use either an orange crossover or Ethernet cable. Step 7: Connect Ethernet cables from the computers to the switch's ports. If multiple VLANs are being used, make sure the computers are on the correct VLAN. Step 8: Hard code the settings, if necessary. Most computers automatically negotiate the switch's settings. If hard coding is necessary, log into the switch and hard code the settings on a per port basis.
  • 14. 7 2.3 PATCH PANEL A patch panel is a device or unit featuring a number of jacks, usually of the same or similar type, for the use of connecting and routing circuits for monitoring, interconnecting, and testing circuits in a convenient, flexible manner. Patch panels are commonly used in computer networking, recording studios, radio and television. (wikipedia) Figure 3 24-port Tp-Link patch panel 2.3.1 TERMINATION OF PATCH PANEL Step 1: Strip the cable of its protective outside jacket about 3–6 inches (7.6–15.2 cm) from the end. This can be done with the cabling scissors by applying pressure from the scissors to the cable and rotating the scissors around the cable. After you have punctured the cables jacket, you should be able pull the jacket off easily leaving exposed wires. Step 2: Stripping the cable can cut and damage the wires at the area that we cut the cable so we want to expose about 6 more inches of fresh wires. Most twisted pair Cat5, Cat5e and Cat6 cables have a small string inside the cable to assist with this. Step 3: If your cable has the small string, make a small cut in the jacket of the cable, making sure not to touch any wires, and then use the string to pull towards the fresh end of the cable exposing about 6 inches (15.2 cm) of cable. Cut the string after you have enough exposed cable. Step 4: If your cable does not have the small string, make a small cut in the jacket described above and gently pull all of the wires together in one hand and pull the jacket in the opposite direction.  All Cat5, Cat5e and Cat6 cables follow a standard color pattern for the individual wires. Blue, Orange, Green and Brown. There are two wires per color. White/Blue and Blue, White/Orange and Orange, White/Green and Green, White/Brown and Brown. If you
  • 15. 8 look at the back side of your patch panel, you will see the corresponding colors where you will terminate the cable to.  Note: There are two color patterns, T568A and T568B. Make sure to terminate both sides of the cable on the same pattern. If you have already terminated one side of the cable, look to see what pattern was used! If you have not already terminated, choose a standard that you will always use. Both patterns will produce the same results. Step 5: After choosing the correct pattern, choose the port on the patch panel you wish the cable to connect to. It is general practice to terminate in ascending order so start at the lowest number. First cable should be terminate to the 1st port and so on. Step 6: Untwist the wires completely to the jacket. Place the wires into the appropriate color slot on the patch panel. Make sure to place the wires as tightly as possible in the slots in regards to the jacket. There should be as little exposed and untwisted wire as possible to keep the signal strength as high as possible. Make sure to place the White/Blue in the White/Blue spot and not the solid Blue spot. The White/Color wire is not the same as the solid color. Step 7: Terminate each wire. After all the wires are in the correct spot and double checked to make sure as little amount of exposed wires will be left as possible, use the punch down tool with the 110 blade and terminate each wire individually. The 110 blade will fully cover the wire connector on the patch panel. Push down until the tool clicks and cuts the end of the wire off. Repeat this step if the wire was not fully cut. Step 8: Secure the cable to the patch panel with a zip tie if there is a slot or tab for a zip tie. Step 9: Use a cable tester to assure that you correctly terminated all the wires. Figure 4 patch panel termination
  • 16. 9 2.4 REGISTERED JACK 45 CONNECTOR (RJ 45) A registered jack (RJ) is a standardized physical network interface for connecting telecommunications or data equipment. The physical connectors that registered jacks use are mainly of the modular connector and 50-pin miniature ribbon connector types. The most common twisted-pair connector is an 8-contact (8P8C) modular plug and jack commonly referred as an RJ 45 connector. (anixter) Figure 5 RJ45 connector Figure 6 terminated cable with RJ45 2.4.1 TERMINATING CAT5/ 5e/ 6 CABLES WITH RJ45 CONNECTOR Step 1: In order to terminate cat 5, cat 5e, or cat 6, we'll need the cable, RJ45 terminating tips, and an RJ45 compatible crimper. Step 2: Once you have the necessary components the first thing you need to do is strip the jacket off from the cable. Using the stripping blade on the crimper, strip about an inch of the jacket from the cable. Step 3: Once the jacket has been removed you'll have 4 pairs of wire. Each pair consists of a solid colored wire and a white wire with a stripe of the same color as the solid colored wire. Step 4: Next you'll want to untwist each pair of wire to make them easy to rearrange. You may have to untwist them a little further than what is exposed from the jacket in order to make them easy to move.
  • 17. 10 Step 5: It is best practice to stick to a standardized wiring scheme, but the most important part is that you're consistent on both sides of the cable. The T568A standard wiring scheme is a good standard pinout to use when wiring your cat 5. Order the wires from left to right in the order light green (white with green stripe), green, light orange, blue, light blue, orange, light brown, and brown. Step 6: If the wires are coming too far out of the jacket the tip won't be as secure on the wire. Use the wire cutting tool on the crimper to trim the wire back to about a half-inch. Step 7: Now that our wires our prepped we need to install the tip. Slide the tip over the wires with the light green wire being in the top pin if the tip is held like in the picture. Once the cable is slid into place you need to make certain that everything is well placed. Check all the wires to make certain they are still in the correct order and that all the wires reach the end of the tip. Also, make certain that the cable jacket goes far enough into the tip so that it is beyond the part of the tip that will be pressed up into the cable jacket. This will help to keep the wire from pulling out of the tip. Step 8: The pinout is rather important. The layout of the wires has 2 standards. They were designed to keep gigabit speeds and have a universal installation. You can use T568B OR T568A standard. The same connection is used on both ends of the cable. 2.5 TWISTED PAIR CABLE Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted together for the purposes of improving electromagnetic compatibility. Compared to a single conductor or an untwisted balanced pair, a twisted pair reduces electromagnetic radiation from the pair and crosstalk between neighboring pairs and improves rejection of external electromagnetic interference. 2.5.1 TYPES OF TWISTED PAIR CABLE There are two types of twisted pair cable; unshielded (UTP) and shielded twisted pair (STP)  Unshielded twisted pair (UTP) cable is the most common cable used in computer networking. Modern Ethernet, the most common data network standard, can use UTP cables. Twisted pair cabling is often used in data networks for short and medium length
  • 18. 11 connections because of its relatively lower costs compared to optical fiber and coaxial cable. UTP is also finding increasing use in video applications, primarily in security cameras. Many cameras include a UTP output with screw terminals; UTP cable bandwidth has improved to match the baseband of television signals. As UTP is a balanced transmission line, a balun is needed to connect to unbalanced equipment, for example any using BNC connectors and designed for coaxial cable.  Twisted pair cables often incorporate shielding in an attempt to prevent electromagnetic interference. Shielding provides an electrically conductive barrier to attenuate electromagnetic waves external to the shield, and provides a conduction path by which induced currents can be circulated and returned to the source via ground reference connection.  Such shielding can be applied to individual pairs or squads, or to a collection of pairs. Individual pairs are foil shielded, while an overall cable (of multiple pairs) may use any of braided screen or foil or braiding with foil. When shielding is applied to a collection of pairs, it is usually referred to as screening, but usage among vendors and authors in applying such words as screening, shielding, and STP (shielded twisted pair) can be subject to variability. (wikipedia) Figure 7 Unshielded twisted pair cable Figure 8 shielded twisted pair cable
  • 19. 12 2.5.2 TWISTED PAIR CABLE BUILDING STRUCTURE NAME TYPICAL CONSTRUCTION BANDWIDTH APPLICATION NOTE Level 1 0.4 MHz Telephone and modern lines Not described in EIA/TIA recommendations . Unsuitable for modern systems. Level 2 4 MHz Older terminal systems, e.g. IBM 3270 Not described in EIA/TIA recommendations . Unsuitable for modern systems. Cat 3 UTP 16 MHz 10BASE-T and 100BASE-T4 Ethernet Described in EIA/TIA-568. Unsuitable for speeds above 16 Mbit/s. Now mainly for telephone cables. Cat 4 UTP 20 MHz 16Mbit/s Token Ring Not commonly used. Cat 5 UTP 100MHz 100BASE-TX & 1000BASE-T Ethernet Common for current LANs. Superseded by Cat5e, but most Cat5 cables meet Cat5e standards. Limited to 100m between equipment. Cat 5e UTP STP 100MHz 100BASE-TX & 1000BASE-T Ethernet Enhanced Cat5. Common for current LANs. Same construction as Cat5, but with better testing standards. Limited to 100m between equipment. Cat 6 UTP 250 MHz 10GBASE-T ISO/IEC 11801
  • 20. 13 STP Ethernet 2nd Ed. (2002), ANSI/TIA 568- B.2-1. Most commonly installed cable in Finland according to the 2002 standard EN 50173-1. Limited to 55m distance at 10GBASE-T Cat 6A UTP F/UTP U/FTP 500MHz 10GBASE-T Ethernet Improved standards, tested to 500MHz. Full 100m distance at 10GBASE-T ISO/IEC 11801 2nd Ed. Am. 2. (2008), ANSI/TIA-568- C.1 (2009) Cat 7 S/FTP F/FTP 600MHz 10GBASE-T Ethernet or POST/CATV/1000BAS E-T over single cable Fully shielded cable. ISO/IEC 110801 2nd Ed. (2002). It is not recognized by the EIA/TIA (wikipedia) 2.5.3 HOW TO TERMINATE TWISTED-PAIR CABLE USING JACK MODULE IN 12 STEPS Step 1: The tools you need:  Jacket stripper  Punch-down tool  Wire cutters Step 2: Insert cable into stripping tool to the desired strip length. Strip off only as much cable jacket needed to properly terminate the pairs (1 to 1.5 inches should be sufficient to terminate pairs). Step 3: Holding the cable near the tool, rotate the tool around the cable several times.
  • 21. 14 Step 4: Slightly bend the outer jacket and manually remove the cut piece or slide the cut outer jacket with the stripper. Step 5: Bend each pair in one direction to expose the rip cord, binder or cross-web filler on the cable. Step 6: Remove the rip cord, binder or cross-web filler if they are present on the cable, leaving only the twisted pairs of wire. The cross-web filler should be cut as flush as possible to the jacket. Step 7: Determine the wiring scheme and properly align all four cables accordingly on the jack. Keep the cable jacket as close to the connector as possible. Always use connectors, wall plates and patch panels that are compatible (same rating or higher) with the grade of the cable used. Step 8: Preserve the wire pair twists as close as possible to the point of termination. When connecting jacks and plugs, do not untwist the cable more than 0.5 inches for Category 5e, 6 and 6A cable. Step 9: Insert wires down into IDC terminal slots to position them before punching down. Maintain the twist. To “future-proof” an installation, terminate all four pairs. Step 10: When using a punch-down tool, make sure the tool is straight before punching down on the connector. Make sure the cut-side of the tool is facing outward. Step 11: Inspect the connector to verify that the wires are fully engaged in the IDC terminals and they are cut properly. Step 12: Place a dust cover on the jack for protection. Figure 9 Jack module Figure 10 Termination of jack module
  • 22. 15 2.6 CABLE TESTER A cable tester is an electronic device used to verify the electrical connections in a signal cable or other wired assembly. Basic cable testers are continuity testers that verify the existence of a conductive path between ends of the cable, and verify the correct wiring of connectors on the cable. More advanced cable testers can measure the signal transmission properties of the cable such as its resistance, signal attenuation, noise and interference. Generally a basic cable tester is a battery operated portable instrument with a source of electric current, one or more voltage indicators, and possibly a switching or scanning arrangement to check each of several conductors sequentially. A cable tester may also have a microcontroller and a display to automate the testing process and show the testing results, especially for multiple- conductor cables. A cable tester may be connected to both ends of the cable at once, or the indication and current source portions may be separated to allow injection of a test current at one end of a cable and detection of the results at the distant end. Both portions of such a tester will have connectors compatible with the application, for example, modular connectors for Ethernet local area network cables. A cable tester is used to verify that all of the intended connections exist and that there are no unintended connections in the cable being tested. When an intended connection is missing it is said to be "open". When an unintended connection exists it is said to be a "short" (a short circuit). If a connection "goes to the wrong place" it is said to be "miswired" (the connection has two faults: it is open to the correct contact and shorted to an incorrect contact). Figure 11 Cable tester
  • 23. 16 2.7 NETWORK RACK A network rack is a metal frame chassis that holds, stacks, organizes, secures and protects various computer network and server hardware devices. The term “network” refers to the rack being used to house network hardware like routers, switches, access points, and modems. The same rack holds servers and other computer systems, although some are designed with specific device types in mind. The rack works by securing network and other computer hardware within the mounting fixtures via brackets, bolts and other hardware to keep the hardware in its secure place. A type of open rack called a 2 post server rack is a lower-cost, easy-to-use entry into network rack mounting equipment. Also called 2 post relay racks, the post rack works by having two thinner, centralized parallel posts extending from a larger balanced based either 19 or 23 inches apart depending on the model. The 2 post rack is easy to set up and start with because of the light and easy to move frame compared to more robust racks. You secure network equipment into the rack by installing a brace on network hardware and bolting the brace to the posts. Once installed, the two post rack allows for you to stack several different network devices on top of each other taking advantage of vertical space to reduce how much floor space you use to store your gear. The racks are also very sturdy and can be secured into the floor, making it very difficult to knock over any installed equipment. Additionally, the open nature of the rack minimizes airflow obstruction and makes it easier to manage network cables. If you’re using 2 post relay racks to mount your network hardware, center mount your devices on the rack for the safest, most secure hold. Center mounting refers to attaching the center of the hardware bracket to the parallel posts on both sides. Using the center mounting position on a 2 post server rack centralizes the weight distribution which reduces pressure on the rack itself and improves balance. Flush mounting only works well with lighter, low-profile hardware. 2.7.1 INSTALLATION OF 22U RACK Packaging Contents  4 x Adjustable Feet
  • 24. 17  2 x Allen Wrench (small, large)  1 x Assembly screw kit (M4, M5, M6, M8)  4 x Casters  8 x Corner Caps  4 x Cross Brace  1 x Left and Right Panel and frame  20 x M6 Cabinet Screws and Nuts  2 x Sets of keys  1 x Top Panel  3 x Bottom Panel Required Tools  Phillips (crosshead) screwdriver  Adjustable wrench Frame assembly Step 1: Connect the two side frames (with side doors) together using the 4 cross braces at each corner. Fasten using a large hex screw at each end of the brace with the large AllenWrench. Attach the cross braces to one side first, then attach the second side frame to the braces. Step 2: Place the Corner Caps over the corner joints and fasten them with M4 screws and a Phillips screwdriver. Step 3: On the bottom of the rack, install the four adjustable corner feet and the four casters. The adjustable feet screw into the large openings in each corner with their height determined by the large hex nut. Screw in the feet to the desired height, then use an adjustable wrench to lock the hex nut in place. The casters are fastened using the M5 screws and Phillips screwdriver. Step 4: Position the rack right-side up (side panel locks at top) and drop the top panel onto the top of the rack. Fasten to the frame using M6 hex screws and the smaller Allen Wrench. Step 5: Position the 3 floor plates on the bottom of the rack, making sure the two pieces with the cable management slots are at the end. Fasten the floor plates with M5 screws and Phillips screw driver.
  • 25. 18 Figure 12 22U networking server rack 2.8 DIGITAL VIDEO RECORDER (DVR) A digital video recorder (DVR) is an electronic device that records video in a digital format to a disk drive, USB flash drive, SD memory card, SSD or other local or networked mass storage device. The term includes set-top boxes with direct to disk recording, portable media players and TV gateways with recording capability, and digital camcorders. Personal computers are often connected to video capture devices and used as DVRs; in such cases the application software used to record video is an integral part of the DVR. Many DVRs are classified as consumer electronic devices; such devices may alternatively be referred to as personal video recorders (PVRs). Figure 13 Advance HD DVR 2.9 BNC CONNECTOR Short for Bayonet NeillConcelman connector, (sometimes erroneously called a British Naval Connector or Bayonet Nut Connector, a type of connector used with coaxial cables such as the
  • 26. 19 RG-58 A/U cable used with the 10Base-2 Ethernet system. The basic BNC connector is a male type mounted at each end of a cable. This connector has a center pin connected to the center cable conductor and a metal tube connected to the outer cable shield. A rotating ring outside the tube locks the cable to any female connector. BNC T-connectors (used with the 10Base-2 system) are female devices for connecting two cables to a network interface card (NIC). A BNC barrel connector allows connecting two cables together. BNC connectors can also be used to connect some monitors, which increases the accuracy of the signals sent from the video adapter. Figure 14 BNC connector
  • 27. 20 CHAPTER THREE 3.0 EXPERIENCE GAINED 3.1 NETWORKING A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network. (A.Forouzan, 2007) 3.1.1 CATEGORIES OF NETWORKS Today when we speak of networks, we are generally referring to primary categories: Local Area Network (LAN) and Wide Area Network (WAN). The category into which a network falls is determined by its size. A LAN normally covers an area less than 2 miles, a WAN can be worldwide. Network of a size in between are normally referred to as Metropolitan Area Network and span tens of miles. 3.1.2 LOCAL AREA NETWORK (LAN) A Local Area Network (LAN) is usually privately owned and links the devices in a single office, building, or campus. Depending on the needs of an organization and the type of technology used, a LAN can be as simple as two PCs and a printer in someone’s home office; or it can extend throughout a company and include audio and video peripherals, Currently, LAN size is limited to a few kilometers. LANs are designed to allow resources to be shared between personal computers or workstations. The resources to be shared can include hardware (e.g. a printer), software (e.g. an application program), or data. A common example of a LAN, found in many business environments, links a workgroup of task-related computers, for example, engineering workstations or accounting PCs. One of the computers may be given a large capacity disk drive and may become a server to clients. Software can be stored on this central server and used as needed by the whole group. In this example, the size of the LAN may be determined by licensing restrictions on the number of users per copy of software, or by restrictions on the number of users licensed to access the operating system.
  • 28. 21 In addition to size, LANs are distinguished from other types of networks by their transmission media and topology. In general, a given LAN will use only one type of transmission medium. The most common LAN topologies are bus, ring, and star. Early LANs had data rates in the 4 to 16 megabits per second (Mbps) range. Today, however, speeds are normally 100 or 1000 Mbps. 3.1.3 PHYSICAL NETWORK CONNECTION AND ELECTRICAL WIRING OF AIICO PENSION MANAGERS LTD. This is a project for network cabling and electrical wiring of Aiico Pension Managers Limited, which is the provision of 16-piont data and 16-point voice network points along with 32-points dual inverter power points as shown in the diagram below: Steps carried out during the project  Mapping out of cable paths, network points, and power points.  Laying of plastic trucking and opening of ceiling for cables path.  Preparation of data, voice, and power cables.  Assembling of 22U rack mount in the server room.  Running of data and voice cables.  Running of inverter power cables and distribution board power cables.  Termination of data and voice cables at the 32 nodes using TIA/EIA 568-B standard arrangement.  Termination of power cables at the 48-points (32 dual inverter and 16 single distribution board).  Patching of the 32-points data and voice cables on the 2×48-ports Tp-Link patch panel using TIA/EIA 568-B standard arrangement.  Mounting of the patch panels on the rack and tiding of the cables under and within the rack.  Assembling of network devices (2×48-ports cisco switches) to the patch panel via 1 meter patch cable.  Wire map testing of the data and voice points (from patch panel to the various data and voice ports).  Correction of faulty and improper wire map tests.  Point-to-point testing of the 32-points via switches.
  • 29. 22
  • 30. 23 3.2 COMPUTER MAINTENANCE Computer maintenance is the practice of keeping computers in a good state of repair. A computer containing accumulated dust and debris may not run properly. Dust and debris will accumulate as a result of air cooling. Any filters used to mitigate this need regular service and changes. If the cooling system is not filtered then regular computer cleaning may prevent short circuits and overheating. 3.2.1 COMPONETS OF COMPUTER SYSTEM  Keyboard The crumbs, dust, and other particulate that fall between the keys and build up underneath are loosened by spraying pressurized air into the keyboard, then removed with a low-pressure vacuum cleaner. A plastic-cleaning agent applied to the surface of the keys with a cloth is used to remove the accumulation of oil and dirt from repeated contact with a user's fingertips. If this is not sufficient for a more severely dirty keyboard, keys are physically removed for more focused individual cleaning, or for better access to the area beneath. Finally, the surface is wiped with a disinfectant.  Monitor A monitor displays information in visual form, using text and graphics. The portion of the monitor that displays the information is called the screen. Like a television screen, a computer screen can show still or moving pictures and it’s a part of Output Devices. There are two basic types of monitors: CRT (cathode ray tube) monitors and LCD (liquid crystal display) monitors. Both types produce sharp images, but LCD monitors have the advantage of being much thinner and lighter. CRT monitors, however, are generally more affordable. Fingerprints, water spots, and dust are removed from the screen with a cleaning wipe specialized for the screen type (CRT, LCD, etc.). A general plastic-cleaning agent is used on the outer casing, which requires a less gentle cleanser but may need more focused attention to unusual buildups of dust, grime, pen marks, etc. idiosyncratic to the user and environment.  Mouse
  • 31. 24 The top surface of the mouse is wiped with a plastic cleanser to remove the dirt that accumulates from contact with the hand, as on the keyboard. The bottom surface is also cleaned to ensure that it can slide freely. If it is a mechanical mouse, the trackball is taken out, not only to clean the ball itself, but to scrape dirt from the runners that sense the ball's movement and can become jittery or stuck if impeded by grime.  Tower/desktop unit Internal components accumulate dust brought in by the airflow maintained by fans to keep the PC from overheating. A soft brush may remove loose dirt; the remainder is dislodged with compressed air and removed with a low-pressure vacuum. The case is wiped down with a cleaning agent. A pressurized blower or gas duster can remove dust that cannot be reached with a brush. 3.2.2 DATA BACKUPS Important data stored on computers may be copied and archived securely so that, in the event of failure, the data and systems may be reconstructed. When major maintenance such as patching is performed, a backup is recommended as the first step in case the update fails and reversion is required. Disk cleanup may be performed as regular maintenance to remove these. Files may become fragmented and so slow the performance of the computer. Disk defragmentation may be performed to combine these fragments and so improve performance. 3.2.3 COMPUTER SOFTWARE Computer software, or simply software, is a generic term that refers to a collection of data or computer instructions that tell the computer how to work, in contrast to the physical hardware from which the system is built, that actually performs the work. In computer science and software engineering, computer software is all information processed by computer systems, programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be realistically used on its own.
  • 32. 25  Operating system An operating system (OS) is system software that manages computer hardware and software resources and provide common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources. For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer – from cellular phones and video game consoles to web servers and super computers. 3.3 CCTV (closed circuit television) CCTV (closed-circuit television) is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes. CCTV relies on strategic placement of cameras, and observation of the camera's input on monitors somewhere. Because the cameras communicate with monitors and/or video recorders across private coaxial cable runs or wireless communication links, they gain the designation "closed-circuit" to indicate that access to their content is limited by design only to those able to see it. Older CCTV systems used small, low-resolution black and white monitors with no interactive capabilities. Modern CCTV displays can be color, high-resolution displays and can include the ability to zoom in on an image or track something (or someone) among their features. Talk CCTV allows an overseer to speak to people within range of the camera's associated speakers. CCTV is commonly used for a variety of purposes, including:  Maintaining perimeter security in medium-to high-secure areas and installations.  Observation behavior of incarcerated inmates and potentially dangerous patients in medical facilities.
  • 33. 26  Traffic monitoring.  Overseeing locations that would be hazardous to a human, for example, highly radioactive or toxic industrial environments.  Building and grounds security.  Obtaining a visual record of activities in situations where it is necessary to maintain proper security or access controls (for example, in a diamond cutting or sorting operation; in banks, casinos, or airports). CCTV is finding increasing use in law-enforcement, for everything from traffic observation (and automated ticketing) to observation of high-crime areas or neighborhoods. Such use of CCTV technology has fueled privacy concerns in many parts of the world, particularly in those areas in the UK and Europe where it has become a routine part of police procedure. 3.3.1 INSTALLATION OF CCTV (closed circuit television) I was attached to CCTV security network installation team assigned to install 4 CCTV camera security surveillance network system in a client’s home. Materials required for the job were handled and delivered to the site. The materials are:  4-channel A HD DVR (Advance High Definition Digital Video Recorder).  3× outdoor and 1× indoor infrared (IR) cameras  1× 500 GB internal SATA hard drive disk  Wireless router/modem  1× TV monitor  HDMI () cable  Category 6 cable  1.2 KVA UPS (uninterrupted power supply).  BNC connectors  Trucking pipes First of all, mapping of cables path, drilling of holes and mounting of trucking pipes carried out. Then running of cables and cable ends terminated with BNC connector. Outdoor cameras were mounted to cover the main gate outside and inside of the house and the 3rd on adjoining wall to cover entrance to the sitting room from outside. The indoor cameras was
  • 34. 27 mounted to cover entrance to sitting room, inside the sitting room and the corridor leading to other rooms. All cameras were connected to the DVR via BNC connectors, and the TV monitor connected to the DVR via HDMI cable and the router connected to the DVR via Ethernet cable. All equipment were connected and powered through the 1.2 KVA UPS. The DVR was first configured using default settings and password assigned. The cameras were adjusted to focus on the required coverage areas. The Tp-Link 3G/4G wireless & router was configured via 4-ports for LAN/WAN connectivity, Ethernet, wireless and registered via the internet USB HSPDA MODEM with Airtel SIM. Router IP address was assigned to the DVR and network parameters were set to enable set to enable the owner to monitor all the camera footings through smart phone, IPhone, IPad, laptop or PC over the internet from any part of the world. Figure 15 Indoor infrared camera Figure 16 Outdoor infrared camera
  • 35. 28 CHAPTER FOUR 4.1 SUMMARY The eights week student industrial work experience scheme in X-CEL computer company limited expose me to know more in practical knowledge of CCTV cameras installation, networking, and maintenance of computer system. 4.2 CONCLUSION The training experience is very mandatory and important for all students in tertiary institution mostly those in field of engineering, science, and technology. 4.3 RECOMMENDATION I recommend that the (I.T) program its continuity in all tertiary institution because it help so many students in practical aspect and academic performance as well as work experience. In other to make this SIWES training easy, student should look for interested place where gain practical aspect of what they were tough in the classroom. I also recommended that the government and the school authority should assist the student in securing a good place for their (I.T) program, because some students found it difficult in securing a place. 4.4 REFERENCE A.Forouzan, B. (2007). Data Communication and Networking. McGraw-Hill. anixter. (n.d.). anixter. Retrieved from anixter: https://www.anixter.com/en_mx/resoures/lliterature/techbriefs/what-is-an-rj45- connector.html wikipedia. (n.d.). Retrieved from https://en.m.wikipedia.org/wiki/twisted_pair wikipedia. (n.d.). Retrieved from https://en.m.wikipedia.org/wiki/patch_panel wikipedia. (n.d.). Retrieved from https://em.m.wikipedia.org/wiki/twisted_pair wikipedia. (n.d.). wikipedia. Retrieved from wikipedia: https://en.m.wikipedia.org/wiki/network_switch
  • 36. 29