Edem CSC Report
Edem CSC Report
Edem CSC Report
1.1 Introduction
Knowledge as it been said is power, but practical knowledge is much more than
knowledge involves developing skills through the use of tools and equipment to
perform tasks that are related to a field of study. Such skills enable one to harness
in work activities while attending school. This work experience gives students the
fund (ITF), and the Nigerian universities commission (NUC). Students that
1
participate in this work experience programme include those studying library
before graduation. The training program is undertaken in the fourth year of a five-
of the Industrial Training Fund (ITF). The ITF was established in 1971 and was
apply skills and knowledge acquired during the course of study in the industrial
in the work environment and also to be able to put in practice what has been
technical skills needed for a working life and a chance to be at par with the
changing industry.
2
3. Enhance entrepreneurship skills in students.
4. Prepare students for work situations they are to meet after graduation.
6. Provide the necessary tools and office equipment which are not readily
3. To make the transition from school to the world of work easier and to
3
1.3 Brief History of the Establishment of Attachment
design, content management system (CMS) and database to store data for quick
access, data integrity and effectiveness in report generation. Our full services
Port Harcourt, Lagos and Abuja, Nigeria. We create websites; build online stores
As a result, Greyforth Solutions stands out as one of the top web design Port
Harcourt and web Development Company in Nigeria and having the best website
platform to make your project dynamic and scalable. We build only on solid
dynamic and affordable platform services and our solutions are executed in a
timely manner.
4
1.3.1 Organogram of the firm
GENERAL MANAGER
(ICT)
SIWES STUDENTS
5
SECTION TWO
A network consists of two or more computers that are linked in order to share
building.
workstations. Servers are generally not used by humans directly, but rather run
continuously to provide "services" to the other computers (and their human users)
on the network. Services provided can include printing and faxing, software
hosting, file storage and sharing, messaging, data storage and retrieval, complete
access control (security) for the network's resources, and many others.
6
Workstations are called such because they typically do have a human user which
laptop, with integrated keyboard, display, and touchpad. With the advent of the
tablet computer, and the touch screen devices such as iPod and iPhone, our
their ability to interact with the network and utilize network services.
guided by needs. For example, a group of servers might be located in a secure area,
away from humans, and only accessed through the network. In such cases, it would
However, the size and speed of the server's processor(s), hard drive, and main
memory might add dramatically to the cost of the system. On the other hand, a
workstation might not need as much storage or working memory, but might require
points (WAPs). These WAP devices provide a bridge between computers and
networks. A typical WAP might have the theoretical capacity to connect hundreds
7
or even thousands of wireless users to a network, although practical capacity might
be far less.
Nearly always servers will be connected by cables to the network, because the
cable connections remain the fastest. Workstations which are stationary (desktops)
are also usually connected by a cable to the network, although the cost of wireless
adapters has dropped to the point that, when installing workstations in an existing
facility with inadequate wiring, it can be easier and less expensive to use wireless
for a desktop.
Wide Area Networks (WANs) connect networks in larger geographic areas, such
cabling or satellite uplinks may be used to connect this type of global network.
Using a WAN, schools in Imo State can communicate with places like Ghana in a
matter of seconds, without paying enormous phone bills. Two users a half-world
networks like the Internet. To users, however, a WAN will not appear to be much
8
3.3 Devices use in networking
2.3.1. Router
Routers do the majority of the hard work on a network - they make the decisions
about all the messages that travel on the network, and whether to pass messages to
Assign IPs
They can filter messages or keep users out of private networks. Most routers have a
Firewall built in. This is a software function that keeps unwanted messages from
2.3.2 Hub
A network device that repeats the traffic it receives to all connected devices.
9
2.3.3 Switch
A network device that sends traffic it receives to a specific connected device, such
A type of networking protocol—it defines the types of cables and connections that
are used to wire computers, switches, and routers together. Most often Ethernet
10
11
2.3.5 Host
A host can be any device that has an IP address. An address is used to send and
IP address help identify devices and the networks where they are connected.
This Chapter covers the basics of how networking works, and how to use different
devices to build networks. Computer networking has existed for many years, and
as time has passed the technologies have become faster and less expensive.
community or neighbourhood.
When setting up a LAN, you'll need to know how many computers will be
connecting to the network via Ethernet. This will determine the number of ports
you'll need.
If you have four or less computers that you need to hardwire, you'll just need a
router. If you have more than four, you'll likely need to get a switch to extend the
12
2.4.2. Decide if it will be wireless network
If you want to allow devices to connect wirelessly, you'll need a router that can
broadcast a wireless network. Most routers you'll find at the store or online have
wireless capabilities.
Network switches do not allow wireless devices to connect, and can only be used
for hardwired LANs or to extend the number of ports available to the router.
2.4.3. Determine if you want all network devices to have internet access
If you want all of the connected devices to have access to the internet, you'll need a
router to handle the connections. If you don't need the devices to have a network
This isn't much of an issue in most homes, but network cables cannot run longer
than 100m (328 ft). If you have to run cable farther than this, you'll need switches
in between.
If you're filling all of the ports on your hardware, consider future-proofing to allow
13
2.5 Setting up a basic LAN
To create a LAN, you'll need a router or switch, which will act as the hub of your
the network, and is necessary if you intend to share your internet connection with
all the connected devices. It is highly recommended that you build your network
devices to talk to each other, but will not automatically assign IP addresses and
will not share an internet connection. Switches are best used to expand the number
of LAN ports available on the network, as they can be connected to the router.
You don't need to do much to set up a router for a basic LAN. Just plug it into a
power source, preferably close to your modem if you plan on sharing the internet
If you're sharing the internet connection from your modem, connect the modem to
the WAN/INTERNET port on the router. This is usually a different color from the
other ports.
14
2.5.4. Connect your switch to your router
If you're using a switch to expand the number of ports available on the router, plug
an Ethernet cable into any LAN port on the router and any LAN port on the switch.
This will expand the network to the rest of the LAN ports on the switch.
Use Ethernet cables to connect each computer to an open LAN port on your router
or switch. It doesn't matter what order the ports are connected in.
Ethernet cables cannot reliably transfer data at lengths larger than 100m (328 ft).
After each computer obtains an IP address, they'll be able to talk to each other on
the network. If you're using a router to share your internet connection, each
Once your network is up, you won't see anything on other computers unless that
computer has shared files. You can designate files, folders, drives, printers, and
other devices as shared so that anyone on the network, or just specific users, can
access them.
15
The answer to these would serve as a guide in assembly the right computer that
will serve the purpose it was meant for and putting the entire computer hardware
component together.
Precaution
16
Static shock that is small for human to feel can damage some sensitive ports
of a computer. You can discharge this by rubbing your hand or wearing static wrist
the case. It is often difficult to find a case and motherboard whose mounting hole
exactly corresponds.
Once you have determined which mount holes you will be using you will
need to insert standoff in the corresponding holes in the computer case. Don’t over
Once you have the correct standoff inserted lay the motherboard into the
case line up the mounting holes and the rear panel connectors and screw it down.
17
18
2.6.4 Attach the Power Connect
Connect the ATX power connector from the power IV and most other high
The microprocessor is often the most dedicated and expensive part of the
computer. As such, it deserves and requires special care. Align the processor so
that the pins fit perfectly into the slot, then press gently with zero insertion force.
cooler, a processor would burn out in mere seconds. Inadequate cooling can result
to data errors, and reduces processor life. The CPU cooler is mounted on top of the
Before actually installing the RAM module in your computer, check again to
make sure that the RAM you have is of the type and speed for your motherboard.
Before insertion the RAM module makes sure that the notches and the tabs
are correctly line up. Once you’re sure you have the right RAM, to actually insert
it, simply push it firmly down into the slot and push the clips inward.
19
2.6.9 Installing Expansion Cards
Depending on the motherboard you have purchased, you need to install one
or more expansion card. You must make sure that the cards you are about to install
are compatible with your motherboard. They have little notches with
corresponding tabs in the slot that are designed to prevent you from installing the
wrong card.
Finally, secure the card into place by screwing the card’s metal bracket into
the screw hole over the expansion slot opening in the back of the case.
There are several different types of hard drives you can use in your
computer. In this era IDE drives are being use less and less and SATA drive are
becoming the new standard. Installing an IDE hard drive is more involved than
installing a SATA drive. SATA drives use different cable and connector, and don’t
The hard drive is mounted in the cage using mounting screws. Make sure
that you use the correct holes so that the cage will fit back in the case property and
Before you attach the power connectors to the drives, make sure that the
power connectors are attached using the correct polarity. The sockets and
20
connectors are shaped so that they should only fit the correct way unless you force
them.
There are several different type of auxiliary drives available for your
procedures for all these devices are pretty much the same, make sure the drive is
The vital step whenever you assemble a personal computer is to connect all those
little wires for the front panel switch, from the case to the motherboard. Each
switch and LED on the front panel has a connector attached to if that must be
In the cause of my industrial training I looked at the UPS mercury model – classic
600 pro inputs: 220V output 220V frequency 50/60h2. The UPS can run many
electronic devices and it can supply electricity for a longer duration of load. It
inverter, rectifier.
21
Rectifier: Changes the battery so your battery remains at the proper float
voltage.Heart of your ups system. Your mission critical equipment will depend on
Inverter: This device accept the DC from DC bus which is supplied by the
rectifier and the battery if you have a power outage, the rectifier will no longer
provide current to the D/C buss, leaving the battery as the only source that will
continue to feed the DC buss until the batteries have depleted to a point that they
22
Fig.
2.7.2 Stabilizer
configured to detect the rise and fall of the AC mains voltage. As soon it sense a
risky input voltage, it immediately energize the relay connected to it, this relay in
turn swaps and switches the appropriate winding terminals of the auto transformer
to correct and stabilize the output voltage. Thus, the appliance which is connected
to the output of the voltage stabilizer circuit always receives a safe voltage and is
23
2.8 Component of Data Communication
MEDIUM
SENDER MESSAGE RECIEVER
ii. Half duplex: Receive and transmit the message not simultaneously
iii. Full duplex: Receive and transmit the message simultaneously example
phone.
Architecture
ii. Client / server: Here they have a boss which is the sever, it is secure, it
Connection
ii. Wired: Does not make use of physical medium but wave example radio,
24
2.8.3 Scales
Wide Area Network (WAN): This is a network that connects together computers
over a large geographic area, such as different cities are called Wide Area
Metropolitan Area Network (MAN): These are networks that span only city, for
25
SECTION THREE
3.1 Conclusion
3.2 Recommendations
The following are the recommendations that the Company and the University
should put into consideration to enhance the efficiency and effectiveness of their
activities.
I would like to recommend that the firm delegate more challenging tasks and
responsibilities to the industrial trainees so that they can build more competencies
and have an overview of the various work processes and how everything fits into
place. This will better prepare them for future job opportunities.
We need officials from the university to embark on regular visits to the firms
where the students are; to make sure that the training is done effectively. However,
I will like to recommend that the school works towards ensuring that the visits are
programme.
26
It would be nice if the university departments work together with the Industrial
organizations that are related to their different fields of study. They can also
organize group presentations where companies come to the university and give a
presentation of their job descriptions and the core competencies they require in a
27
References
McGrawHill Companies.
https://www.academia.edu/38568046/Charles_Isaac_SIWES_technical_repo
rt_Computer_Networking_
https://www.academia.edu/38568046/Charles__SIWES_technical_report_C
omputer_Networking_.
wireless-ap-configuration-with-dhcp-using-winbox/
28