0% found this document useful (0 votes)
6 views

I dropped

Uploaded by

musaaluzey
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

I dropped

Uploaded by

musaaluzey
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 22

A TECHNICAL REPORT ON

INDUSTRIAL TRAINING (I.T)

UNDERTAKEN AT:

AIR FORCE INSTITUTE OF TECHNOLOGY, KADUNA

NIGERIAN AIR FORCE, KADUNA.


BY:

MUSA USMAN ZUBAIRU


REG: KASU/20/CSC/1047
DEPARTMENT OF COMPUTER SCIENCE

FACULTY OF COMPUTING AND ENGINEERING

KADUNA STATE UNIVERISITY

SUBMITTED IN PARTIAL FULFILLMENT OF THE AWARD OF

BACHELOR OF SCIENCE (BSc) DEGREE IN COMPUTER


SCIENCE

FROM:

1 TH JUNE TO 22TH DECEMBER 2024


DEDICATION

This Industrial training (IT) report is dedicated to DR ABUBAKAR


MUHAMMAD ZUBAIRU for supporting me throughout my academic
carrier.

ACKNOWLEDGEMENTS
I wish to register my profound gratitude to God Almighty for HIS guidance
and grace throughout my life. I also want to thank my parents for their
support. They never let me down. A special appreciation to my father MR
Usman Muhammad Zubairu. May almighty Allah grant him Jannah Ameen.
To lovely uncle, may almighty Allah bless you for your support for making
this possible for me.
ABSTRACT

This report is based on the student industrial work experience scheme held at AFIT
located at, Nigerian Airforce Base, MANDO Kaduna. It provides a brief
explanation about the (IT) program such as its history, objectives, aims while also
giving a description of the work done in AFIT. It gives an account to some of the
devices and equipments used in the various departments as well their its functions.
It also provides insight into some of the challenges faced and gives a few
recommendations on how to further improve the program.
TABLE OF CONTENT

Title page

Dedication

Acknowledgment

Abstract

CHAPTER ONE:

ABOUT INDUSTRIAL TRAINING FOUND (L.T.F)

1.1About SIWES
1.2Scope of SIWES
1.3AIM and objective of SIWES
1.4Brief History and Background of THE NIGERIAN AIRFORCE BASE

CHAPTER TWO

Work Experience

2.0 Networking

2.1 Network Topology

2.2 Transmission Media

2.3 Network Equipment

2.4 IP Addressing

2.5 Troubleshooting skills


CHAPTER THREE

Network Communication

3.0 Introductions to the OSI model


CHAPTER FOUR

5:0 Summary, conclusions and recommendation

5.1 Summary of attachment activities

5.2 Suggestions for improvement of the scheme


CHAPTER ONE
1.0 INTRODUCTION
1.1 ABOUT SIWES
The Students Industrial Work Experience Scheme (SIWES) is a skill
development program designed to integrate academic learning with practical
industry experience. Established by the Nigerian government in 1971 through the
Industrial Training Fund (ITF) via Decree No. 43, the scheme was created to
bridge the gap between theoretical education and real-world work experience,
ensuring that Nigerian students are equipped with the practical skills required in
their chosen fields. SIWES is an important part of the academic curriculum for
students in Polytechnics, Colleges of Education, and Universities in Nigeria. The
program allows students to gain hands-on experience in industries related to their
courses of study, such as engineering, sciences, social sciences, humanities and
business studies. It ensures that students are not only educated theoretically but
also trained in the practical aspects of their profession.
1.2 SCOPE OF SIWES

The scope of the Students Industrial Work Experience Scheme (SIWES) is wide-
ranging and covers multiple sectors and industries. The program involves students
undergoing practical training in various industries, government agencies, and
private sector companies relevant to their fields of study.

1. Field of Study: SIWES caters for a wide variety of disciplines, including but
not limited to:
o Engineering (Mechanical, Civil, Electrical, etc.)
o Information Technology and Computer Science

o Medical and Health Sciences

2. Duration of the Scheme: Typically, the duration of SIWES for


undergraduate students is about 3 to 6 months, depending on the
requirements of their academic program and the type of industry they are
placed in.

1.3 Aims and Objectives of SIWES

The main aim of the Students Industrial Work Experience Scheme (SIWES) is
to prepare students for the professional world by providing them with an
opportunity to gain practical skills that will enhance their employability upon
graduation. The specific objectives of the scheme include:

1. Skill Development:

The scheme focuses on developing students' technical and soft skills that are
required by employers in their respective industries. These skills range from the
use of specific machinery and technology to critical thinking, problem-solving,
teamwork, and communication.

2. Exposure to Professional Work Environments:

SIWES provides students with the opportunity to become familiar with


professional work environments. They gain firsthand knowledge of industry
standards, operational processes, and workplace dynamics, making them more
competitive in the job market.
CHAPTER TWO

WORK EXPERIENCE

2.0 NETWORKING
Networks are components involved in connecting computer and applications across
small and large distances. Each computer on the network has access to the files and
peripheral devices

(Such as printers or modems) on all the other computers on the network.

2.1 NETWORK TOPOLOGY

Common topology found in networking includes; Mesh topology, Star topology,


Bus topology, Ring topology and others.

Network topology refers to the layout of the transmission medium and devices on a
network. Topologies use either a point to point or multipoint connection Scheme.
A connection scheme indicates how many devices are connected to a transmission
media segment or an individual cable.

An example of point-to-point connection scheme is a modem/ printer connected to


computer and a direct cable connection between two computers. An example of a
multi-point connection scheme is a star or bus topology network.

Star Topology

This is a local area network topology where all the nodes are connected
individually to a central connecting device called a hub or switch. Signals travel
from the nodes to the hub which then sends signals to other nodes on the network.
A star topology network is scale able –i.e. it can be designed and redesigned easily.
Bus Topology

A LAN topology where each node is connected to a single main bus cable transmits data
to all the nodes on the network. The bus is actually a series of cable segments running
from one node to the other. Break or a faulty piece of cable anywhere on the segment
prevents all the computers on the segment from being able to communicate.

Mesh Topology

This is a network topology where every node on the network has a separate
wire connecting it to every other node on the network. It provides each
device with a point-to-point connection to every other device in the network.
This type of network has a high fault tolerance because failure of one node
does not affect data transmission between other nodes.
3.2 TRANSMISSION MEDIA

• Wired media

• Wireless media

Wired Media

These are media which require the use of wires, lines and cables to transmit
communication signals. During my industrial training at NAF, I encountered
majorly three different types of wired network media namely:

Coaxial cable

A coaxial cable is an alternative for protecting data from noise. Coaxial


cable do not produce external electric and magnetic fields and are not
affected by them. This makes them ideally suited, although more expensive,
for transmitting signals.

Twisted pair cable


In a twisted pair there are eight copper wires that are coated with different colours;
the colours are mix/orange, orange, mix/blue, blue, mix/green, green, mix/brown
and brown.

These colors are very important when terminating cables. The two most common
ways of terminating Ethernet cables are:

(i) Straight-through method

(ii) cross-over method


In straight-through method, in any way you put in your cable, the color adopted at
both ends must be the same.
In a cross-over method all you need to do is to terminate one end with a straight
rule method and the other end would be that pin ‘1’ goes to pin ‘3’ and vice-versa,
the pin ‘2’ then goes to pin ‘6’ and also vice-versa.
I got to know that a cross-over cable is used to connect two similar devices like a
PC to a PC while a straight through cable is used to connect different devices e.g. a
PC to a router.

Fiber optic cable

At NOC the backbone upon which the network is built is fiber optic. It is made of
glass fiber instead of wire. It consists of a centre glass core surrounded by several
layers of protective material. The outer insulating jacket is made of Teflon or PVC.
The fiber optic cables transmit light rather than electronic signals, thereby
eliminating the problem of electrical interference.

Optical fibers come in two types:

• Single-mode fibers
• Multi-mode fibers

Single-mode fibers have small cores whilst multi-mode fibers have larger cores.
Used for short-distance communication links.

Wireless Media

To fully explore the wireless added dimension, Communication system designers


have sought to use wireless media to reduce infrastructure cost and complexity
when compared to wired communication systems. There is no need to construct
miles of telephone line poles or cable trenches.

During my stay at NAF, I was able to interact with the following devices:

2.3 NETWORK EQUIPMENT

Some network equipments:

Ethernet Radio

Is a device that sends and receives packets from one network to the other.
Router

A router is a device that forwards data packets between computer networks,


creating an overlay internet work. A router is connected to two or more data lines
from different networks. When a data packet comes in one of the lines, the router
reads the address information in the packet to determine its ultimate destination.
Then, using information in its routing table or routing policy, it directs the packet
to the next network on its journey.

Switch

Connects devices in a network and sends data to specific devices.


Hubs

Connect devices but sends data to all devices at once.

Modem

Allow devices to connect to the internet by converting data.

Network Interface Cards (NICs) - Lets a device connect to a network.

2.4 IP ADDRESSING

An IP address is a unique identifier that is assigned to a host on a network. It is


also a unique identifier for a host or a node on a network. We have IPv4 and IPv6.
The most used being IPv4 (with 32bits).

Functions of IP Addressing

• For location of a device on the network

• It is assigned to allow hosts on one network to communicate to hosts on another


network

• IPv4 address is 32 bits divided in to four octets or bytes using dot ’.’
Classes of IPv4 Addresses

IPv4 which is 32bits has class ranges from class A-E

Class A

This Class address can only be between 0 and 127. All 0’s reserved for default
route and ‘127’ is reserved for trouble shooting –loop back, therefore in reality,
class A valid address range that can be assigned to host on a network is 10-126

Class B

Class B address can only be between 172 – 191

Class C

Class address can only be between 192 – 223

Class A-C is used for uncast.

Class D and E

Class D (224-239) used for multicasting

Class E (240-255) for research purposes

Broadcast Address

This is the address used to send data to all hosts on a broadcast domain. When all
the host bits are on (‘1’), this is a broadcast address for all hosts 255 and are
reserved for sending broadcast message.

Subnet ting

The basic function of sub-netting is to define the class boundary. To create subnets
you take bits from the host portion of the IP address and reserve them to define the
subnet address.

Subnet Mask
The subnet mask for class A ranges from 255.0.0.0 The subnet mask for class B
ranges from 255.255.0.0. The subnet mask for class C ranges from 255.255.255.0.
The first octet determines the class.

The ‘255’ above represent the network portion and the zeros represent the host
portion.

Private IP address ranges

The ranges and the amount of usable IP's are as follows:

10.0.0.0 - 10.255.255.255

Addresses: 16,777,216

172.16.0.0 - 172.31.255.255

Addresses: 1, 048, 5

2.5 TROUBLESHOOTING SKILLS

Troubleshooting is the process of finding problems and solving them. If a client


unable to browse or is unable to make calls via the IP phone, the check begins with
the cable being used if the client is connected via LAN cable. This is done using
the LAN-cable tester, check the face plates to know if it is working, check the
patched panel and switches on the distribution rack where they are kept. Ping the
systems Ethernet port, ping the server etc.

CHAPTER THREE

3.0 Introductions to the OSI Model

The OSI Model breaks down network communication into seven layers. These
layers are useful for identifying network issues.

 Application layer (layer 7)


 Presentation layer (layer 6)
 Session layer (layer 5)
 Transport layer (layer 4)
 Network layer (layer 3)
 Data Link layer (layer 2)
 Physical layer (layer 1)

Physical layer (layer 1)

The physical layer refers to the physical communication medium and the
technologies used to transmit data across that medium. At its core, data
communication is the transfer of digital and electronic signals through various
physical channels, such as crimping tools and connectors.

Data link layer

The data link layer refers to the technologies that connect two machines across a
network where the physical layer already exists. It manages data frames, which are
digital signals encapsulated into data packets. Flow control and error control of
data are often key focuses of the data link layer. Ethernet is an example of a
standard at this level. The data link layer is often split into two sub-layers: Media
Access Control (MAC) and Logical Link Control (LLC).
Network layer

The network layer is concerned with concepts such as routing, forwarding, and
addressing across a dispersed network or multiple connected networks of nodes or
machines. The network layer may also manage flow control. Across the internet,
the Internet Protocol v4 (IPv4) and IPv6 are used as the main network layer
protocols.

Transport layer

The primary focus of the transport layer is to ensure that data packets arrive in the
right order, without losses or errors, or can be seamlessly recovered if required.
Flow control, along with error control, is often a focus at the transport layer. At
this layer, commonly used protocols include the Transmission Control Protocol
(TCP), a near-lossless connection-based protocol, and the User Datagram Protocol
(UDP), a lossy connectionless protocol. TCP is commonly used where all data
must be intact (e.g. file share), whereas UDP is used when retaining all packets is
less critical (e.g. video streaming).

Session layer

The session layer is responsible for network coordination between two separate
applications in a session. A session manages the beginning and ending of a one-to-
one application connection and synchronization conflicts.

Presentation layer
The presentation layer is primarily concerned with the syntax of the data itself for
applications to send and consume.

Application layer

The application layer is concerned with the specific type of application itself and
its standardized communication methods. For example, browsers can communicate
using Hypertext Transfer Protocol Secure (HTTPS), and HTTP and email clients
can communicate using POP3 (Post Office Protocol version 3) and SMTP (Simple
Mail Transfer Protocol).

CHAPTER FOUR
4.0 RECOMMENDATIONS & SUGGESTION FOR IMPROVEMENT OF THE
SCHEME.

I put forward the following suggestions and recommendations for future


improvement of the scheme;

 Organizing workshops, seminars and symposium for students in various


faculties in other to keep the student abreast of new technologies and
innovations.
 Posting of students for SIWES should be done by the scheme to ensure
conformity with course of study.
 A mass enlightenment campaign should be carried out, to enable industries
and establishments know the importance of SIWES to the future of the
student and the society at large.
 The scheme should also try to enforce the act guiding the establishment of
the scheme, to serve as deterrent to those establishments who reject students
for IT.
 School Curriculum should be organized in such a way that the SIWES
exercise be carried out at a stretch of six months and not the intermittent
arrangement of three months twice.

4.3 CONCLUSION

The Student Industrial Work Experience Scheme (SIWES) plays a significant Role
in human resource development, it helps students develop new skills and
Enlightens them of what the present society holds for them after graduation and
Helps them adapt accordingly.

You might also like