Chioma Report
Chioma Report
Chioma Report
INTRODUCTION
The Student Industrial Work Experience Scheme (SIWES) is a program designed to expose
students to real-world industry practices, bridging the gap between theoretical knowledge and
practical experience. This report provides a detailed account of my SIWES experience at the
skills.
The aim of SIWES is to equip students with industry-relevant skills and hands-on experience in
3. Self-learning HTML and CSS for web design, aiming to enhance my front-end development
skills.
The Logbook
The SIWES logbook served as a daily record of my tasks and experiences at the Energy
Commission of Nigeria, detailing specific projects, technical challenges, and skills learned.
1
CHAPTER TWO
The Energy Commission of Nigeria (ECN) was established to drive energy policy and
sustainable development across Nigeria. The vision of ECN is to ensure an efficient, reliable, and
sustainable energy sector for Nigeria’s development. Its mission involves coordinating and
Organizational Chart
The organizational structure of ECN is designed to support interdisciplinary energy projects and
includes departments such as Renewable Energy, Energy Research, and Policy Development.
2
CHAPTER THREE
1. Networking Setup: I participated in network cable installations, learning about different types
of cables (such as CAT5 and CAT6) and the tools used for crimping and connecting cables.
components, and conducting basic repairs. This process included software troubleshooting,
building static web pages. This process helped me develop a basic understanding of front-end
NETWORKING
Networking, also known as computer networking, is the practice of transporting and exchanging
data between nodes over a shared medium in an information system. Networking comprises not
only the design, construction and use of a network, but also the management, maintenance and
Computer networking enables devices and endpoints to be connected to each other on a local
area network (LAN) or to a larger network, such as the internet or a private wide area network
(WAN). This is an essential function for service providers, businesses and consumers worldwide
to share resources, use or offer services, and communicate. Networking facilitates everything
from telephone calls and text messaging to streaming video and the internet of things (IoT).
3
Who uses networking?
The level of skill required to operate a network directly correlates to the complexity of a given
network. For example, a large enterprise may have thousands of network nodes and rigorous
When looking at the physical layer of a computer network, there are two primary types:
Wired networking requires the use of a physical medium for transport between nodes. Copper-
based Ethernet cabling, popular due to its low cost and durability, is commonly used for digital
communications in businesses and homes. Alternatively, optical fiber is used to transport data
over greater distances and at faster speeds, but it has several tradeoffs, including higher costs and
Wireless networking uses radio waves to transport data over the air, enabling devices to be
connected to a network without any cabling. Wireless LANs (WLANs) are the most well-known
and widely deployed form of wireless networking. Alternatives include microwave, satellite,
Generally, wired networking offers greater speed, reliability and security compared to wireless
Networks can also be classified according to how they're designed and built, encompassing
approaches that include software-defined networking (SDN) and overlay networks. Networking
can also be categorized by environment and scale, such as LANs, campus, WANs, data center
networks and storage area networks (SANs). These include the following:
4
LANs. LANs are used in business, government and home environments to interconnect devices
WANs. WANs connect multiple LANs and link large geographic areas, such as a headquarters
Metropolitan area networks. MANs are similar to WANs, with the key difference being that
they encompass one metropolitan area. Such networks can be used to connect multiple buildings
of a large company, such as a bank, within a city. Multiple organizations can share high-
bandwidth MANs for intracity communications. MANs can connect to WANs and the internet.
Campus area networks. CANs are the next size down from MANs. Government buildings,
large enterprises and universities that have multiple buildings within a defined geographic area
may have a campus environment. Linking these buildings and the network infrastructures they
SANs. SANs support connections from multiple servers to multiple storage devices. They're
WLANs. Most commonly implemented as Wi-Fi, WLANs form LANs using radio technology.
Virtual LANs. VLANs are used to create logically segmented networks within the same
Cloud networks. This term can refer to the network infrastructure and software that connects to
public, private or hybrid cloud services. It can also refer to networking resources that are hosted
in the cloud.
5
Carrier networks. Large telecommunications companies operate these large networks, which
are among the largest in the world. They are enormously complex, are highly redundant and have
Network topologies
The physical and logical way a network is configured is called its topology. The physical
deployment may look the same for each topology, but the internal workings of the network -- its
logical structure -- differentiate one network architecture from another. Network diagrams
typically are used to depict different topologies, with nodes depicted as dots and network links
shown as lines.
Star network. Each node in a star network is connected to a central hub, typically a computer or
server, but not directly to other nodes. It's also referred to as a hub-and-spoke topology.
Ring network. Each node has two connection points for linking to other devices; in practice,
such as when using a token ring network, each device has a single physical network connection.
Mesh network. Each node in a mesh network connects to every other node; this is often a costly
Point-to-point network. This topology describes dedicated connections between two nodes. It's
most often used in wireless communications that require line of sight, such as microwave
antennas. It may also be used for dedicated fiber connections between two sites.
Bus network. Each device in a bus network connects to a single cable called a bus. When data
packets traverse the bus, they look for the "station" containing the correct destination address.
This topology is easy to set up and works well on small networks, but it quickly runs into
6
Tree network. Connecting multiple star networks to a shared bus creates a tree topology.
Image of six network topologies. Network topologies map where nodes, such as switches and
Components of networking
At a high level, computer networking requires a physical network infrastructure that includes
components such as switches, routers and wireless access points. In addition, networks have
underlying firmware that operates such equipment. Other components include the software to
monitor, manage and secure the network. These network components are present in wired and
wireless networks.
Network devices
wireless. On one side of this connection is data terminal equipment (DTE), such as computers
and telephones. These devices connect to data communications equipment (DCE), such as
modems, routers, switches and gateways. Network protocols and standards govern the
mechanisms by which DTE connect to DCE, as well as communications among different types
of DCE. Once connected to the network, DTE and DCE are assigned unique IP addresses.
Links
The wired or wireless network medium that connects devices in a network is called a link.
Today's wired networks can use copper twisted-pair, fiber optic or coaxial cables. Wireless links
use different protocols for sending data and voice via Wi-Fi, cellular, satellite and microwave
technologies. Links can have physical and logical attributes that correspond to a specific
7
Communication protocols
Specifications that define how network devices connect to each other are called protocols.
Protocols are used in wired and wireless networks. For instance, voice over IP transports IP
telephony traffic to any endpoint that supports the protocol. Hypertext Transfer Protocol
provides a common way for browsers to display webpages. The IP suite, also known as
for transporting data and services over an IP-based network. The TCP/IP model is divided into
four protocol categories, also known as layers, according to the aspect of network
Physical layer. Sometimes referred to as the network interface layer, this layer specifies how
devices connect to a network and how bits are transmitted over the physical media being used.
Internet layer. These protocols govern data transfers -- how data moves from the point of origin
to the point of termination. Data is put in packets with addressing and routing instructions
embedded in each packet. The internet layer determines the most appropriate route through a
network for the packet to reach its destination. Among the protocols in this layer are IP, Address
Transport layer. Packet switching typically breaks data streams into discrete packets that
contain routing instructions via an IP address. Each time a packet queues up for transmission, its
path is likely to be different from other packets based on network traffic and other criteria. The
disassembled packets are subsequently reassembled at the destination in the correct sequence via
the transport layer. This layer also ensures error-free delivery of packets and can retransmit
8
packets that are lost or dropped. Transport layer protocols include TCP and User Datagram
Protocol.
Application layer. This layer specifies how applications connect to the network and can transmit
and receive data packets. It also includes security protocols, such as Transport Layer Security.
List of eight network devices. Networks are made up of a range of different components and
devices.
Computer networks are ubiquitous today. Businesses, governments, individuals and communities
Convenience and flexibility. Networks make it faster and easier to access all kinds of
information and resources. With internet-connected devices in nearly every pocket, a person can
Resource sharing. Network technology links people with all kinds of information, devices and
resources, making it easy to share them. Access to servers, printers, copiers and scanners helps
businesses of all types and sizes use technology in efficient and cost-effective ways. Otherwise,
Innovation. The ability to interconnect devices and share data among them creates the
opportunity for new ways of doing business, operating communities, communicating with others,
automating tasks and more. Notably, networks are a fundamental requirement for IoT, which
encompasses a broad range of innovative applications centered on the ability for endpoints to
9
Data storage. Networks play a key role in data storage. Getting data from the point of creation
cloud service, networks transport data to a storage device. Without a network, people would need
as games, music and video, possible. The internet enables people around the world to participate
Data networks come with their own set of risks that users must be aware of. They include the
following:
Security threats. Networks are an attractive target for hackers and other malicious actors who
wish to cause disruptions, divert resources, steal data or access sensitive information.
Ransomware and phishing are among the most prevalent threats. Encryption, access control,
firewalls and antivirus software are all used to counter security threats.
Outages. While service-level agreements provide some measure of protection against disruption,
the reality is that network service providers can and do experience unplanned outages. For a
business, the loss of internet or WAN connectivity can bring all operations to a halt.
Misconfigurations. Network devices must be configured for proper operation -- a process that's
susceptible to human error. For example, if an incorrect command is issued, a device might not
Equipment failure. Like any other type of equipment, network devices can experience
10
Power loss. Communications systems need power to operate, so loss of power without a suitable
supporting infrastructure. This can include underground cables, aerial cables on poles, carrier
switching center buildings, wireless transmission towers and buildings, and electric utilities. This
Wired and wireless networking will continue to coexist in the coming years. Speeds are likely to
increase as demands for greater speed and bandwidth continue. Advances in network technology
11
TROUBLESHOOTING
What is troubleshooting?
correct issues with complex machines, electronics, computers and software systems. The first
step in most troubleshooting methods is gathering information on the issue, such as an undesired
Once the issue and how to reproduce it are understood, the next step is to eliminate unnecessary
components to determine if the issue persists. This can help identify component incompatibility
Troubleshooting methodologies usually try to isolate a problem so that it can be examined. The
initial goal is to diagnose the problem and try obvious solutions, such as performing a system
reboot, powering down and up, and checking that the power cord is connected.
Troubleshooters initially look for common, known causes. For example, when a laptop won't
boot up, an obvious first step is to check whether the power cable is working. Once common
issues are ruled out, troubleshooters must run through a checklist of components to identify
The primary objectives of troubleshooting are to figure out why something doesn't work as
Computer problems that troubleshooters address can show up in any number of places. Examples
operating systems
applications
12
central processing units or CPUs
firewalls
hard drives
solid-state drives
servers
One basic troubleshooting method is to press Control-Alt-Delete on a PC, which opens the
Microsoft Windows Task Manager where users can determine which applications have become
unresponsive, close them and restart the computer. Similarly, Option-Command-Escape will
IT and help desk professionals use more extensive ways to troubleshoot problems.
Troubleshooting methodologies vary, but the following seven steps are often used.
The first troubleshooting step for just about any problem is gathering information about it. This
Other important information includes related symptoms and unique circumstances that must
happen to reproduce the issue. The goal is to identify the problem and understand how to
reproduce it.
By comprehensively describing the issue, troubleshooters will know where to look for the root
13
When does the problem occur?
Answers to these questions will expose which components aren't part of the problem. They will
also help identify possible compatibility issues among components and third-party products that
If the issue remains, a specialist might check other common causes, consult product
Sometimes a problem can have many possible causes. A trial-and-error method is used to
eliminate various options. The best approach is to look for the most straightforward cause first,
One common testing method is the split-half troubleshooting approach. This technique isolates
the source of a problem through a process of elimination. This method works best when the
system involved has a number of parts in series. Troubleshooters first test halfway down the line
of components. If the middle component works, they know everything before it works. At this
point, they move on to the middle of the remaining untested section toward the end of the series.
If the test of this second section works, they go on to the midpoint of the remaining section.
If the problem occurs at any point in this testing, then the troubleshooters do a split back toward
the start of the series until the problem part is found. The split-half process can save time in
14
Step 4. Create a plan of action and test a solution
Once the problem is understood, troubleshooters develop a plan to tackle the issue. They test
their hypothesis and keep testing it until they identify a solution. When all tests fail, go back to
Once troubleshooters have identified and understood the problem, they must adjust, repair or
replace whatever is causing the issue. When that is done, they should test the solution to be sure
The goal is to return the system to the way it was before the problem occurred. Successful
restored. The success of the troubleshooting process often depends on the technicians'
Sometimes the solution to a problem creates another issue. Troubleshooters must monitor the
system to ensure the changes made don't adversely affect other parts of it or other systems
connected to it.
The final step is to document all steps taken. This ensures other troubleshooters will know what
to do if the problem happens again. It's critical to document both the solution and the fixes that
didn't work to provide a comprehensive record of the incident. Documentation will also help in
15
CHAPTER FOUR
EXPERIENCE GAINED
1. Gained practical networking skills, including cable setup and network troubleshooting.
2. Developed basic system troubleshooting abilities to handle common hardware and software
issues.
3. Built a foundation in HTML and CSS for front-end web development, improving my self-
learning capabilities.
Challenges
2. Encountered initial difficulties with HTML and CSS concepts due to limited guidance in web
development.
Observations/Contributions
RECOMMENDATION
networking tools and a structured orientation for interns to introduce them to basic web
development.
CONCLUSION
The SIWES period at the Energy Commission of Nigeria was a valuable learning experience. It
provided practical exposure to networking, troubleshooting, and web development, bridging the
gap between academic theory and industry practice. This experience has reinforced my passion
16
REFERENCES
- This book covers detailed methodologies for troubleshooting computer systems, addressing
both hardware and software issues commonly encountered in technical support roles.
- This guide discusses practical IT support strategies and troubleshooting techniques that are
essential for addressing common system problems, aligning with hands-on tasks performed
Network World Editors. (2023). Cable Management and Network Infrastructure Essentials.
This resource provides an overview of effective cable management practices and network
infrastructure planning.
17