Chioma Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 17

CHAPTER ONE

INTRODUCTION

The Student Industrial Work Experience Scheme (SIWES) is a program designed to expose

students to real-world industry practices, bridging the gap between theoretical knowledge and

practical experience. This report provides a detailed account of my SIWES experience at the

Energy Commission of Nigeria, focusing on networking, troubleshooting, and web development

skills.

Aim and Objectives of SIWES

The aim of SIWES is to equip students with industry-relevant skills and hands-on experience in

their field of study. Specific objectives include:

1. Gaining practical experience in network installation and system troubleshooting.

2. Developing basic web design skills through self-study.

3. Observing and understanding organizational structures and workflows.

Roles of Student during SIWES

During the SIWES period, my primary roles included:

1. Assisting in networking setup, including connecting and configuring network cables.

2. Troubleshooting system issues, including hardware diagnostics and software troubleshooting.

3. Self-learning HTML and CSS for web design, aiming to enhance my front-end development

skills.

The Logbook

The SIWES logbook served as a daily record of my tasks and experiences at the Energy

Commission of Nigeria, detailing specific projects, technical challenges, and skills learned.

1
CHAPTER TWO

Brief History about the Organization (Vision, Mission, Objectives)

The Energy Commission of Nigeria (ECN) was established to drive energy policy and

sustainable development across Nigeria. The vision of ECN is to ensure an efficient, reliable, and

sustainable energy sector for Nigeria’s development. Its mission involves coordinating and

implementing policies for energy conservation, distribution, and innovation.

Organizational Chart

The organizational structure of ECN is designed to support interdisciplinary energy projects and

includes departments such as Renewable Energy, Energy Research, and Policy Development.

2
CHAPTER THREE

Participation and Work Done

1. Networking Setup: I participated in network cable installations, learning about different types

of cables (such as CAT5 and CAT6) and the tools used for crimping and connecting cables.

2. System Troubleshooting: I assisted in diagnosing system issues, identifying faulty

components, and conducting basic repairs. This process included software troubleshooting,

updating drivers, and handling system installations.

3. Web Development Self-Study: I undertook self-learning in HTML and CSS, focusing on

building static web pages. This process helped me develop a basic understanding of front-end

development, which I applied in small personal projects.

NETWORKING

What is networking (computer)?

Networking, also known as computer networking, is the practice of transporting and exchanging

data between nodes over a shared medium in an information system. Networking comprises not

only the design, construction and use of a network, but also the management, maintenance and

operation of the network infrastructure, software and policies.

Computer networking enables devices and endpoints to be connected to each other on a local

area network (LAN) or to a larger network, such as the internet or a private wide area network

(WAN). This is an essential function for service providers, businesses and consumers worldwide

to share resources, use or offer services, and communicate. Networking facilitates everything

from telephone calls and text messaging to streaming video and the internet of things (IoT).

3
Who uses networking?

The level of skill required to operate a network directly correlates to the complexity of a given

network. For example, a large enterprise may have thousands of network nodes and rigorous

security requirements, such as end-to-end encryption, requiring specialized network

administrators to oversee the network.

Wired vs. wireless networking

When looking at the physical layer of a computer network, there are two primary types:

Wired networking requires the use of a physical medium for transport between nodes. Copper-

based Ethernet cabling, popular due to its low cost and durability, is commonly used for digital

communications in businesses and homes. Alternatively, optical fiber is used to transport data

over greater distances and at faster speeds, but it has several tradeoffs, including higher costs and

more fragile components.

Wireless networking uses radio waves to transport data over the air, enabling devices to be

connected to a network without any cabling. Wireless LANs (WLANs) are the most well-known

and widely deployed form of wireless networking. Alternatives include microwave, satellite,

cellular and Bluetooth.

Generally, wired networking offers greater speed, reliability and security compared to wireless

networks; wireless networking provides more flexibility, mobility and scalability.

Types of computer networks

Networks can also be classified according to how they're designed and built, encompassing

approaches that include software-defined networking (SDN) and overlay networks. Networking

can also be categorized by environment and scale, such as LANs, campus, WANs, data center

networks and storage area networks (SANs). These include the following:

4
LANs. LANs are used in business, government and home environments to interconnect devices

within a specific domain, such as an office building.

WANs. WANs connect multiple LANs and link large geographic areas, such as a headquarters

location and branch offices across multiple cities, states or countries.

Metropolitan area networks. MANs are similar to WANs, with the key difference being that

they encompass one metropolitan area. Such networks can be used to connect multiple buildings

of a large company, such as a bank, within a city. Multiple organizations can share high-

bandwidth MANs for intracity communications. MANs can connect to WANs and the internet.

Campus area networks. CANs are the next size down from MANs. Government buildings,

large enterprises and universities that have multiple buildings within a defined geographic area

may have a campus environment. Linking these buildings and the network infrastructures they

contain can be achieved using a CAN.

SANs. SANs support connections from multiple servers to multiple storage devices. They're

generally secure and can support disaster recovery.

WLANs. Most commonly implemented as Wi-Fi, WLANs form LANs using radio technology.

Virtual LANs. VLANs are used to create logically segmented networks within the same

physical network, a concept known as an overlay. This enables network administrators to

separate different types of traffic along the same physical infrastructure.

Cloud networks. This term can refer to the network infrastructure and software that connects to

public, private or hybrid cloud services. It can also refer to networking resources that are hosted

in the cloud.

5
Carrier networks. Large telecommunications companies operate these large networks, which

are among the largest in the world. They are enormously complex, are highly redundant and have

extremely high bandwidth.

Network topologies

The physical and logical way a network is configured is called its topology. The physical

deployment may look the same for each topology, but the internal workings of the network -- its

logical structure -- differentiate one network architecture from another. Network diagrams

typically are used to depict different topologies, with nodes depicted as dots and network links

shown as lines.

The following are six main types of network topologies:

Star network. Each node in a star network is connected to a central hub, typically a computer or

server, but not directly to other nodes. It's also referred to as a hub-and-spoke topology.

Ring network. Each node has two connection points for linking to other devices; in practice,

such as when using a token ring network, each device has a single physical network connection.

Mesh network. Each node in a mesh network connects to every other node; this is often a costly

arrangement considering the number of links required.

Point-to-point network. This topology describes dedicated connections between two nodes. It's

most often used in wireless communications that require line of sight, such as microwave

antennas. It may also be used for dedicated fiber connections between two sites.

Bus network. Each device in a bus network connects to a single cable called a bus. When data

packets traverse the bus, they look for the "station" containing the correct destination address.

This topology is easy to set up and works well on small networks, but it quickly runs into

scalability and performance challenges on larger networks.

6
Tree network. Connecting multiple star networks to a shared bus creates a tree topology.

Image of six network topologies. Network topologies map where nodes, such as switches and

routers, are placed on a network and how they're interconnected.

Components of networking

At a high level, computer networking requires a physical network infrastructure that includes

components such as switches, routers and wireless access points. In addition, networks have

underlying firmware that operates such equipment. Other components include the software to

monitor, manage and secure the network. These network components are present in wired and

wireless networks.

Network devices

Various components connect computing devices to a network medium, whether wired or

wireless. On one side of this connection is data terminal equipment (DTE), such as computers

and telephones. These devices connect to data communications equipment (DCE), such as

modems, routers, switches and gateways. Network protocols and standards govern the

mechanisms by which DTE connect to DCE, as well as communications among different types

of DCE. Once connected to the network, DTE and DCE are assigned unique IP addresses.

Links

The wired or wireless network medium that connects devices in a network is called a link.

Today's wired networks can use copper twisted-pair, fiber optic or coaxial cables. Wireless links

use different protocols for sending data and voice via Wi-Fi, cellular, satellite and microwave

technologies. Links can have physical and logical attributes that correspond to a specific

topology describing how they connect to each other.

7
Communication protocols

Specifications that define how network devices connect to each other are called protocols.

Protocols are used in wired and wireless networks. For instance, voice over IP transports IP

telephony traffic to any endpoint that supports the protocol. Hypertext Transfer Protocol

provides a common way for browsers to display webpages. The IP suite, also known as

Transmission Control Protocol/Internet Protocol (TCP/IP), is a family of protocols responsible

for transporting data and services over an IP-based network. The TCP/IP model is divided into

four protocol categories, also known as layers, according to the aspect of network

communications they facilitate:

Physical layer. Sometimes referred to as the network interface layer, this layer specifies how

devices connect to a network and how bits are transmitted over the physical media being used.

Some models of TCP/IP have a fifth network access layer.

Internet layer. These protocols govern data transfers -- how data moves from the point of origin

to the point of termination. Data is put in packets with addressing and routing instructions

embedded in each packet. The internet layer determines the most appropriate route through a

network for the packet to reach its destination. Among the protocols in this layer are IP, Address

Resolution Protocol and Internet Control Message Protocol.

Transport layer. Packet switching typically breaks data streams into discrete packets that

contain routing instructions via an IP address. Each time a packet queues up for transmission, its

path is likely to be different from other packets based on network traffic and other criteria. The

disassembled packets are subsequently reassembled at the destination in the correct sequence via

the transport layer. This layer also ensures error-free delivery of packets and can retransmit

8
packets that are lost or dropped. Transport layer protocols include TCP and User Datagram

Protocol.

Application layer. This layer specifies how applications connect to the network and can transmit

and receive data packets. It also includes security protocols, such as Transport Layer Security.

List of eight network devices. Networks are made up of a range of different components and

devices.

Advantages of computer networks

Computer networks are ubiquitous today. Businesses, governments, individuals and communities

depend on networking for various benefits:

Convenience and flexibility. Networks make it faster and easier to access all kinds of

information and resources. With internet-connected devices in nearly every pocket, a person can

coordinate transportation, conduct financial transactions, participate in meetings and perform an

almost infinite number of digital activities from almost anywhere.

Resource sharing. Network technology links people with all kinds of information, devices and

resources, making it easy to share them. Access to servers, printers, copiers and scanners helps

businesses of all types and sizes use technology in efficient and cost-effective ways. Otherwise,

each user would need their own copy of each resource.

Innovation. The ability to interconnect devices and share data among them creates the

opportunity for new ways of doing business, operating communities, communicating with others,

automating tasks and more. Notably, networks are a fundamental requirement for IoT, which

encompasses a broad range of innovative applications centered on the ability for endpoints to

share and receive data over a network.

9
Data storage. Networks play a key role in data storage. Getting data from the point of creation

to a storage location depends on networking. Whether stored locally or hosted remotely in a

cloud service, networks transport data to a storage device. Without a network, people would need

to physically transport data from one device to another.

Entertainment. Networks make access to an enormous selection of entertainment sources, such

as games, music and video, possible. The internet enables people around the world to participate

in multiplayer games, for example.

Risks to computer networks

Data networks come with their own set of risks that users must be aware of. They include the

following:

Security threats. Networks are an attractive target for hackers and other malicious actors who

wish to cause disruptions, divert resources, steal data or access sensitive information.

Ransomware and phishing are among the most prevalent threats. Encryption, access control,

firewalls and antivirus software are all used to counter security threats.

Outages. While service-level agreements provide some measure of protection against disruption,

the reality is that network service providers can and do experience unplanned outages. For a

business, the loss of internet or WAN connectivity can bring all operations to a halt.

Misconfigurations. Network devices must be configured for proper operation -- a process that's

susceptible to human error. For example, if an incorrect command is issued, a device might not

transmit data as needed.

Equipment failure. Like any other type of equipment, network devices can experience

hardware- or software-related failures, with or without warning. To avoid machine failures,

network administrators must maintain an up-to-date inventory of backup devices.

10
Power loss. Communications systems need power to operate, so loss of power without a suitable

backup can disrupt business operations.

Infrastructure damage. Network integrity depends on the continuous availability of the

supporting infrastructure. This can include underground cables, aerial cables on poles, carrier

switching center buildings, wireless transmission towers and buildings, and electric utilities. This

infrastructure is susceptible to tornadoes, earthquakes, floods, electrical storms, solar flares,

physical and cybersecurity breaches, vandalism and terrorism.

The future of networking

Wired and wireless networking will continue to coexist in the coming years. Speeds are likely to

increase as demands for greater speed and bandwidth continue. Advances in network technology

have raised the bar on performance and reduced latency.

11
TROUBLESHOOTING

What is troubleshooting?

Troubleshooting is a systematic approach to problem-solving that is often used to find and

correct issues with complex machines, electronics, computers and software systems. The first

step in most troubleshooting methods is gathering information on the issue, such as an undesired

behavior or a lack of expected functionality.

Once the issue and how to reproduce it are understood, the next step is to eliminate unnecessary

components to determine if the issue persists. This can help identify component incompatibility

issues and problems caused by third-party products.

Troubleshooting methodologies usually try to isolate a problem so that it can be examined. The

initial goal is to diagnose the problem and try obvious solutions, such as performing a system

reboot, powering down and up, and checking that the power cord is connected.

Troubleshooters initially look for common, known causes. For example, when a laptop won't

boot up, an obvious first step is to check whether the power cable is working. Once common

issues are ruled out, troubleshooters must run through a checklist of components to identify

where the failure is happening.

The primary objectives of troubleshooting are to figure out why something doesn't work as

intended and provide a solution to resolve the issue.

How does troubleshooting work?

Computer problems that troubleshooters address can show up in any number of places. Examples

of places troubleshooters find themselves working include the following:

 operating systems

 applications

12
 central processing units or CPUs

 firewalls

 hard drives

 solid-state drives

 servers

List of steps for troubleshooting server problems

IT pros usually follow basic guidelines when troubleshooting server issues.

One basic troubleshooting method is to press Control-Alt-Delete on a PC, which opens the

Microsoft Windows Task Manager where users can determine which applications have become

unresponsive, close them and restart the computer. Similarly, Option-Command-Escape will

force quit apps on a Mac.

IT and help desk professionals use more extensive ways to troubleshoot problems.

Troubleshooting methodologies vary, but the following seven steps are often used.

Step 1. Gather information

The first troubleshooting step for just about any problem is gathering information about it. This

can be information about why something unexpected is happening or a missing capability.

Other important information includes related symptoms and unique circumstances that must

happen to reproduce the issue. The goal is to identify the problem and understand how to

reproduce it.

Step 2. Describe the problem

By comprehensively describing the issue, troubleshooters will know where to look for the root

cause. It can help to ask the following questions:

What are the symptoms?

13
When does the problem occur?

Where does the problem occur?

What are the conditions when the problem occurs?

Is the problem reproducible?

Answers to these questions will expose which components aren't part of the problem. They will

also help identify possible compatibility issues among components and third-party products that

might cause issues.

If the issue remains, a specialist might check other common causes, consult product

documentation, and conduct research on a support database or through a search engine.

Step 3. Determine the most probable cause

Sometimes a problem can have many possible causes. A trial-and-error method is used to

eliminate various options. The best approach is to look for the most straightforward cause first,

even when working with a complex system.

One common testing method is the split-half troubleshooting approach. This technique isolates

the source of a problem through a process of elimination. This method works best when the

system involved has a number of parts in series. Troubleshooters first test halfway down the line

of components. If the middle component works, they know everything before it works. At this

point, they move on to the middle of the remaining untested section toward the end of the series.

If the test of this second section works, they go on to the midpoint of the remaining section.

If the problem occurs at any point in this testing, then the troubleshooters do a split back toward

the start of the series until the problem part is found. The split-half process can save time in

systems that depend on many components.

14
Step 4. Create a plan of action and test a solution

Once the problem is understood, troubleshooters develop a plan to tackle the issue. They test

their hypothesis and keep testing it until they identify a solution. When all tests fail, go back to

Step 3 and start over.

Step 5. Implement the solution

Once troubleshooters have identified and understood the problem, they must adjust, repair or

replace whatever is causing the issue. When that is done, they should test the solution to be sure

the problem is fixed.

The goal is to return the system to the way it was before the problem occurred. Successful

troubleshooting is indicated when the problem is no longer reproducible and functionality is

restored. The success of the troubleshooting process often depends on the technicians'

thoroughness and experience.

Step 6. Analyze the results

Sometimes the solution to a problem creates another issue. Troubleshooters must monitor the

system to ensure the changes made don't adversely affect other parts of it or other systems

connected to it.

Step 7. Document the process

The final step is to document all steps taken. This ensures other troubleshooters will know what

to do if the problem happens again. It's critical to document both the solution and the fixes that

didn't work to provide a comprehensive record of the incident. Documentation will also help in

creating troubleshooting checklists to quickly identify and fix potential problems.

15
CHAPTER FOUR

EXPERIENCE GAINED

1. Gained practical networking skills, including cable setup and network troubleshooting.

2. Developed basic system troubleshooting abilities to handle common hardware and software

issues.

3. Built a foundation in HTML and CSS for front-end web development, improving my self-

learning capabilities.

Challenges

1. Limited access to advanced tools for network diagnostics.

2. Encountered initial difficulties with HTML and CSS concepts due to limited guidance in web

development.

Observations/Contributions

- Observed the impact of organized infrastructure on workflow efficiency.

- Contributed to minor system repairs, enhancing the efficiency of network operations.

RECOMMENDATION

To enhance future SIWES experiences, I recommend increased access to more advanced

networking tools and a structured orientation for interns to introduce them to basic web

development.

CONCLUSION

The SIWES period at the Energy Commission of Nigeria was a valuable learning experience. It

provided practical exposure to networking, troubleshooting, and web development, bridging the

gap between academic theory and industry practice. This experience has reinforced my passion

for computer science and will guide my future career path.

16
REFERENCES

- Energy Commission of Nigeria. (2024). Organizational Documents.

- Basic Networking Troubleshooting Document Tools and Techniques, Journal of Networking

and Security, Vol. 5, Issue 3.

Quinn, A. (2023). Computer Systems: Troubleshooting and Maintenance. Springer.

- This book covers detailed methodologies for troubleshooting computer systems, addressing

both hardware and software issues commonly encountered in technical support roles.

Gonzalez, J. & Taylor, H. (2024). The Fundamentals of IT Helpdesk Support and

Troubleshooting. McGraw-Hill Education.

- This guide discusses practical IT support strategies and troubleshooting techniques that are

essential for addressing common system problems, aligning with hands-on tasks performed

during the SIWES program.

Network World Editors. (2023). Cable Management and Network Infrastructure Essentials.

Retrieved from [https://www.networkworld.com] (https://www.networkworld.com)

This resource provides an overview of effective cable management practices and network

infrastructure planning.

17

You might also like