0% found this document useful (0 votes)
48 views

Aba Siwes

This technical report summarizes Aliyu Bello Aliyu's student industrial work experience scheme (SIWES) held at A.U.A Technologies. The report details the aims of SIWES to provide students practical experience outside of the classroom to prepare them for future employment. It also provides background on A.U.A Technologies, which consists of skilled professionals working in various fields like networking, IT, programming and more. The report outlines Aliyu's responsibilities during the training, which included maintaining IT infrastructure, repairing devices, and software installations.

Uploaded by

aleeyubj
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views

Aba Siwes

This technical report summarizes Aliyu Bello Aliyu's student industrial work experience scheme (SIWES) held at A.U.A Technologies. The report details the aims of SIWES to provide students practical experience outside of the classroom to prepare them for future employment. It also provides background on A.U.A Technologies, which consists of skilled professionals working in various fields like networking, IT, programming and more. The report outlines Aliyu's responsibilities during the training, which included maintaining IT infrastructure, repairing devices, and software installations.

Uploaded by

aleeyubj
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 59

TECHNICAL REPORT

OF

STUDENT INDUSTRIALWORK EXPERIENCE SCHEME


(SIWES)

HELD AT

A.U.A TECHNOLOGIES
BY
ALIYU BELLO ALIYU
UG18ICT1006

A TECHNICAL REPORT SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE,


YUSUF MAITAMA SULE UNIVERSITY KANO IN PARTIAL FULFILMENT FOR THE
AWARD BACHALOR OF SCIENCE (B.SC HONS) IN INFORMATION AND
COMMUNICATION TECHNOLOGY

SUPERVISED BY
Dr. ABDURRA’UF SHARIFAI GARBA
DECEMBER, 2022

DEDICATION

This work is dedicated to my family who support me from the beginning to the end of this SIWES
programme successfully and complete this report. I also dedicate it to my father Alhaji Muhammad

1
Bello Aliyu and my beloved mother Hajiya Khadija Sulaiman Ishaq for their utmost support. May
Allah reward them with the paradise, Ameen.

ACKNOWLEDGEMENT

My profound gratitude goes to Allah the nourisher, cherisher, sustainer, provider the one who
provide and sustain our lives to witness the end of this session, indeed is a gift. ALHAMDULILAH.

My special thanks goes to my family who had never failed to show interest in my studies.

My appreciation also goes to my supervisor Dr. ABDURRA’UF SHARIFAI GARBA who come all
the way to supervise me and guide all through in writing the report, An appreciation goes to my
lecturers for their support and their contributions toward their effort to provide quality education.

I will also like to thanks the management of A.U.A Technologies, Networking Department
especially the Managing Director, Mus’ab Abbas and my appreciation goes to my industrial base
supervisor Egnr. Umar Hamza and other staff.

I should not fail to appreciate the help of my colleagues toward completing this work. May Allah
reward them all.

2
CERTIFICATION
This is to certify that, this work was carried out by ALIYU BELLO ALIYU under my supervision
and has been read and approved as meeting the requirement for the award of B.sc Information and
Communication Technology (ICT), Yusuf Maitama Sule University - Kano

Aliyu Bello Aliyu ………………………………


Student, (UG18ICT1006) Sign and Date

Dr. Abdurra’uf Sharifai Garba ………………………………


SIWES Supervisor Sign and Date

Malam Lawan Garba


………………………………
SIWES Coordinator Sign and Date

Dr. Sani Danjuma ….


……………………………
H.O.D, Computer Science Sign and Date

3
TABLE OF CONTENTS
CONTENT_______________________________________________________________PAGE
Dedication____________________________________________________________________2
Acknowledgment______________________________________________________________3
Certification___________________________________________________________________4
Abstraction___________________________________________________________________7
Chapter one___________________________________________________________________8
Introduction___________________________________________________________________8
Objectives of SIWES____________________________________________________________8
Chapter two___________________________________________________________________10
Historical background of A,U,A Technology_________________________________________10
Chapter three__________________________________________________________________11
Works carried out during the training_______________________________________________11
Chapter four__________________________________________________________________12
Basic Electrical________________________________________________________________12
Introduction to ELV Cables______________________________________________________12
Introduction to Connectors______________________________________________________27
Introduction to Testing and Measurement Units______________________________________38
Peripheral items for CCTV______________________________________________________42
Types of CCTV Camera________________________________________________________51
HDD Calculation_____________________________________________________________50
CCTV Video-Compression Technology___________________________________________49
Generation of Video/image Resolution____________________________________________49
Access Control System________________________________________________________60
Fire Alarm System9___________________________________________________________62
Experience acquired___________________________________________________________67
Conclusion___________________________________________________________________67
Recommendation______________________________________________________________67
Summary____________________________________________________________________67

4
ABSTRACTION
The report will covers all the skills acquired during my training, the department where I conducted
my SIWES training consists of highly skilled personnel from various range of disciplines such as
Networking, Information Technology, Programming, Computer engineering and System Analysis.
The department is supportive department which primarily work was dealing with the Computer
Based Test, Network Installation and Maintenance, and all other Computer/ Digital activities within
the nation. The report covers all the responsibilities of the Organization which include: the managing
and maintaining the information technology infrastructure for business purpose, repairing computer
appliances such as printers, scanners, cameras and installations of software.

5
CHAPTER ONE

1.0 Introduction
The Student Industrial Work Experience Scheme (SIWES) program
The students Industrial Work Experience Scheme (SIWES) is a skills training program designed to
expose and prepare students of universities, polytechnics/colleges of technology/colleges of
agriculture and colleges of education for the industrial work situation they are likely to meet after
graduation. The scheme also affords students the opportunity of familiarizing and exposing
themselves to the needed experience in handling equipment and machinery that are usually not
available in their institutions. Before the establishment of the scheme, there was a growing concern
among our industrialists that graduates of our institutions of higher learning lacked adequate
practical background studies preparatory for employment in industries. Thus, the employers were of
the opinion that the theoretical education going on in higher institutions was not responsive to the
needs of the employers of labour.

It is against this background that the rationale for initiating and designing the scheme by fund during
its formative years – 1973/74 was introduced to acquaint students with the skills of handling
employers’ equipment and machinery. The ITF solely funded the scheme during its formative years.
But as the financial involvement became unbearable to the fund, it withdrew from the Scheme in
1978. The federal government handed over the scheme in 1979 to both the National Universities
Commission (NUC) and the National Board for Technical Education (NBTE). Later the federal
government in November 1984 reverted the management and implementation of the SIWES
programme to ITF and it was effectively taken over by the Industrial Training Fund in July 1985
with the funding being solely borne by the federal government.

1.2 Aims and Objective of SIWES


1. To provide an opportunity for students in institutions of higher learning to acquire industrial
skills and experience in their course of study, which are restricted to Engineering and
Technology including Environmental studies and other courses that may be approved.
Courses of NCE (Technical), NCE Agriculture, NCE (Business), NCE (Fine and Applied
Arts) and NCE (Home Economics) in Colleges of Education are also included.

2. To prepare students for the industrial work situation they are to meet after graduation.

6
3. To expose students to work methods and techniques in handling equipment and machinery
that may not be available in their institutions.

4. To make the transition from school to the world of work easier, and enhance students

5. To create contacts for later job placement;

7
CHAPTER TWO

INTRODUCTION OF THE COMPANY AND ITS WORKS/ACTIVITIES

This 2-Storey building company was established in February 2021, the ground floor has two (2)
offices, one (1) conference room, two (2) toilets and a waiting area, the first floor has One hundred
and thirty (130) Laptop computers capacity CBT Examination hall and two (2) toilets, the second
floor has also One hundred and thirty (130) Laptop computers capacity CBT Examination hall with a
Server Room, we have enough parking zone, we have petrol and diesel generators for adequate and
nonstop power supply.

This company is a Vicenarians’ company because all of our productive staffs are within the ages of
20 and 29, 90% of them are Degree holders some with even Masters Degree and fully equipped with
endurance, dedication and human management, we are ready to work tirelessly under any
circumstance for the betterness of our lives and promotion of our company at large.

We are Corporate Partners of MTN Nigeria –we sell their items e.g 4G Router, MiFi, Sim Cards and
now 5G Network router, Airtel Nigeria –the same function as MTN Nigeria, Phase 3 –for the
provision of high-speed internet connectivity via a small satellite dish and modem.

The company is Information Technology (IT) Company primarily initiated for Joint Admission &
Matriculation Board (JAMB) Examinations which holds once in a year but we stand the ground to
conduct all but not only the following services;

1. ICT Hub 2. Private work space/station 3. Design, thinking & innovation 4. Entrepreneurship
training services 5. Data laboratory services 6. Machine learning & robotic technology development
7. Registrations and bursaries services 8. Bills payment 9. SMEs clinic services

10. Software development 11. General networking 12. Management information system 13.
Geographical information system.

To expand the business and generate more revenue we delved into Computer Training for students
which we expected would be embraced but still no nice response due to the locality. Regardless of
the low revenue generation and patronize for Information Technology activities by our environs, we
still recorded some achievements by giving our services back to the society, among which are
mentioned below;

1. Free Diploma in Basic Computer for 800+ students. 2. Ongoing Women programme titled
‘Northern Women Entrepreneurship Programme’ for 200 women. 3. Ongoing Almajiri programme
titled ‘Almajiri is a child’ for 100 Almajiri where after skill acquisition would be awarded with
startup profit and business item/materials. 4. Computer training to the disabled sponsored by British
Council..
8
CHAPTER THREE
Work Carried Out During the Training
We have received our posting from the registrar to the various department and we get our own into
the A.U.A Technologies.
We report to the department that we have been posted to, and then the instructor was taking us
workshop and show us the various equipment that we could use during the training.
The instructor was also called our attention to our previous knowledge in order to know the different
types of networking and their uses, such networks are satellite installation, CCTV installation and
computer networking

9
CHAPTER FOUR
Basic electrical

So what is electricity and where does it come from? More importantly, why is carpet, socks and a
doorknob a bad combination?
No single discovery hasIn itsaffected
simplest terms, electricity
our lives, ourisculture
the movement
and ourof charge, which is
survival
considered by convention to be, from positive to negative. No matter how the charge is created,
more than electricity. Electricity is everywhere; it lights our way, cooks
chemically (like in batteries) or physically (friction from socks and carpet), the movement of the
our food
discharge and can even brush your teeth. For an example, imagine where
is electricity.
the medical field would be without electricity and in that sense how

ELECTRICITY

Understanding Current

This flow of electrical charge is referred to as electric current. There are two types of current, direct current (DC)
and alternating current (AC). DC is current that flows in one direction with a constant voltage polarity while AC
is current that changes direction periodically along with its voltage polarity. Thomas Edison and Alessandro Volta
were pioneers in DC current and wrote much of electricity’s history. But as societies grew the use of DC over long
transmission distances became too inefficient. Nikola Tesla changed all that with the invention of alternating
current electrical systems. With AC it is possible to produce the high voltages needed for long transmissions.
Therefore, today, most portable devices use DC power while power plants produce AC.

OHM’S LAW
The most fundamental law in electricity is Ohm’s law or V=IR. The V is for voltage, which means
the potential difference between two charges. In other words, it is a measurement of the work
required to move a unit charge between two points. When we see a value such as 10 Volts, it is a
measurement of the potential difference between two reference points. Normally the two points will
be +10V and 0V (alsoknown as ground), but it can also be the difference between +5V and -5V,
+20V and +10V, etc. In the field, you might hear the term “common grounds” which refers to each
device in a system using the same zero-point reference (or ground) to ensure the same potential
difference ( or voltage) is applied throughout the system. The next component of Ohm’s law is
10
current, the units of which are Amperes; in the formula, current is represented by the very logical
choice of the letter I. As mentioned previously, current is the measurement of the flow of charge in a
circuit. This leaves us with the letter R which represents Resistance. Electrical resistance, measured
in Ohms, is the measure of the amount of current repulsion in a circuit. Simply, resistance resists
current flow. When electrons flow against the opposition offered by resistance in the circuit, friction
occurs and heat is produced. The most common application for resistance in a circuit is the light
bulb. The light bulb introduces enough resistance in a circuit to heat up the filament inside, causing
light to be emitted. Resistance in a circuit can also be helpful when needing to alter voltage levels,
current paths, etc. Resistors are self-contained packages of resistance that can be added to a circuit
and are commonly used to divide voltage levels.

VOLTAGE
V=IR

Voltage can be direct or alternating. A direct voltage maintains thesame polarity at all times. In an
alternating voltage, the polarity reverses direction periodically. The number of complete cycles per
second isthe frequency, which is measured in hertz (one cycle per second), kilohertz, megahertz,
gigahertz, or terahertz. An example of direct voltage is the potential difference between the terminals
of an electrochemical cell.Alternating voltage exists between the terminals of a common utility
outlet.

RESISTANCE
R=V/I

Resistance is the opposition that a substance offers to the flow of electric current. It is represented by
the uppercase letter R. The standard unit of resistance is the ohm, sometimes written out as a word,
and sometimes symbolized by the uppercase Greek letter omega:

When an electric current of one ampere passes through a component across which a potential
difference (voltage) of one volt exists, then the resistance of that omponent is one ohm. (For more
discussion of the relationship among current, resistance and voltage.)
POWER
P=I * V
P=Square of Voltage/Resistance

P=square of Current X Resistance

11
For Example we have a battery voltage/DC voltage of 18 volts and a lamp resistance of 3 Ω. Using Ohm’s
Law to determine current, we get:

Now that we know the current, we can take that value and multiply it by the voltage to determine
power:

Answer: the lamp is dissipating (releasing) 108 watts of power, most likely in the form of both light and heat.

DC

DC (direct current) is the unidirectional flow or movement of electric charge carriers (which are
usually electrons). The intensity of the current can vary with time, but the general direction of
movement stays the same at all times. As an adjective, the term DC is used in reference to voltage
whose polarity never reverses. In a DC circuit, electrons emerge from the negative, or minus, pole
and move towards the positive, or plus, pole. Nevertheless, physicists define DC as traveling from
plus to minus. Direct current is produced by electrochemical and photovoltaic cells and batteries. In
contrast, the electricity available from utility mains in most countries is AC (alternating current).
Utility AC can be converted to DC by means of a power supply consisting of a transformer, a
rectifier (which prevents the flow of current from reversing), and a filter (which eliminates current
pulsations in the output of the rectifier).

AC

12
Introduction to ELV Cables
CAT5/6/6A/7 CABLE

13
Cat5 e Cable

Category 5 Cable
Category 5 (CAT5) cable is a multi-pair (usually 4 pair) high performance cable that consists of
twisted pair conductors, used mainly for data transmission. Basic CAT5 cable was designed for
characteristics of up to 100 MHz. CAT5 cable is typically used for Ethernet networks running at
10 or 100 Mbps.

Category 5 Cable

Category 5e (CAT5e) cable, also known as Enhanced Category 5, is designed to support full-
duplex Fast Ethernet operation and Gigabit Ethernet. The main differences between CAT5 and
CAT5e can be found in the specifications. The performance requirements have been raised
slightly in the new standard (see comparison chart below).

CAT5e has stricter specifications for Power Sum Equal-Level Far-End Crosstalk (PS-ELFEXT),
Near-End Crosstalk (NEXT), Attenuation, and Return Loss (RL) than those for CAT5. Like
CAT5, CAT5e is a 100- MHz standard, but it has the capacity to handle bandwidth superior to
that of CAT5. CAT5 cable is typically used for Ethernet networks running at 100 Mbps or 1
Gbps. Use Cablek's GigaBase 350 CAT5e, 350-MHz Solid High-Performance, ETL Verified
Bulk Cable.

Easy way to tell the difference between a Cat5e Cat 6 Patch Cable

Cat5e Cat6

Category 6 Cable

Category 6 (CAT6) cable provides higher performance than CAT5e and features more stringent
specifications for crosstalk and system noise.

14
The quality of the data transmission depends upon the performance of the components of the
channel. To transmit according to CAT6 specifications, jacks, patch cables, patch panels, cross-
connects, and cabling must all meet CAT6 standards. The CAT6 components are tested
individually, and they are also tested together for performance. In addition, the standard calls for
generic system performance so that CAT6 components from any vendor can be used in the
channel.

All CAT6 components must be backward compatible with CAT5e, CAT5, and CAT3. If different
category components are used with CAT6 components, then the channel will achieve the
transmission performance of the lower category. For instance, if CAT6 cable is used with CAT5e
jacks, the channel will perform at a CAT5e level.

Augmented Category 6 (CAT6a) Cable

CAT6a is a 10-Gigabit Ethernet over copper proposal to the CAT6 standard. The IEEE
published a draft standard (Std 802.3an) in October 2004.
The draft calls for 10-Gigabit data transmission over a 4-pair twisted-pair copper cable for a
distance of 100 meters on Class F or Class E-augmented copper cabling. The draft extends CAT6
electrical specifications from 250 MHz to 500 MHz. It also proposes a new measurement: Power-
Sum Alien Crosstalk to 500 MHz. Alien Crosstalk is a coupled signal in a disturbed pair arising
from a signal in a neighboring cable.

The TIA is working to complete a new specification that will define enhanced performance
standards for unshielded twisted pair cable systems. Draft specification ANSI/TIA/EIA-568-B.2-
10 specifies cable systems, called "Augmented Category 6" or more frequently as "Category 6a",
that operate at frequencies up to 500 MHz and will provide up to 10 Gbit/s bandwidth. The new
specification has limits on alien crosstalk in cabling systems.
Augmented Category 6 specifies cable operating at minimum frequency of 500 MHz, for both
shielded and unshielded. It can support future 10 Gb/s applications up to the maximum distance
of 100 meters on a 4- connector channel.
Within the networking market place the move towards the ratification of Category 6 Augmented
cabling is continuing, but with no firm standards set, it is a time to wait and see. Although a
number of companies have announced Cat6A products, it is clear that these are purely based on
proprietary systems, with a great deal of hope thrown in. The basic drive behind Cat6A is the
desire to support 10Gbps to the desk over the standard 100m. Although the current Cat6 standard
will support it up to 55m, this is not suitable for most organizations.

Category 7/class F

15
Category 7/Class F (ISO/IEC 11801:2002) specifies a frequency range of 1–600 MHz over 100
meters of fully shielded twisted-pair cabling. It encompasses four individually shielded pairs
inside an overall shield, called Shielded/Foiled Twisted Pair (S/FTP) or Foiled/ Foiled Twisted
Pair (F/FTP). There is a pending class Fa, based on the use of S/FTP cable to 1000 MHz. It can
support 10GBASE-T transmissions.
With both types of cable, each twisted pair is enclosed in foil. In S/FTP cable, all four pairs are
encased in an overall metal braid. In F/FTP, the four pairs are encased in foil.

Category 7/Class F cable can be terminated with two interface designs as specified in IEC 6063-7-
7 and IEC 61076-3-104. One is an RJ-45 compatible GG-45 connector. The other is the more
common TERA connector, which was launched in 1999.

Category 7/Class F is backwards compatible with traditional CAT6 and CAT5 cable, but it has far
more stringent specifications for crosstalk and system noise. The fully shielded cable virtually
eliminates crosstalk between the pairs. In addition, the cable is noise resistant, which makes the
Category 7/Class F systems ideal for high EMI areas, such as industrial and medical imaging
facilities. Category 7/Class F cable can also increase security by preventing the emission of data
signals from the cable to nearby areas.

COAXIAL CABLE (RG58/RG6)

Rg6 Coaxial Cable

16
RG 6 is generally a much better choice for your CATV, satellite, TV antenna, or broadband internet. RG
59 is generally better for most CCTV systems. What you really need to consider are the frequency ratings

your equipment uses. If your equipment uses higher frequencies (above 50 MHz), then you’ll
want to go with RG 6. If your frequencies are lower than that, then you’ll want to use RG 59.
RG59 Cable has been around for a long time. This cable used to be what most people used for their cable
TV connection. However, modern signal requirements have made this cable less popular in the last few
years. RG 59 has a smaller conductor than RG 6, which means that it can’t achieve the same signal
quality as RG 6. The way its shielding is designed also means that it doesn’t keep Gigahertz level signals
inside the conductor very well. This is why RG 59 probably isn’t a good choice for your TV or internet
connection.

RG 59 is good for lower frequency signals (anything under about 50 MHz). That makes it a good
choice for a closed circuit television (CCTV) video surveillance system. You can even make
your installation easier by getting what’s called “Siamese coaxial cable.” This cable consists of a
RG 59 cable merged together with a 2C power cable. By using this type of cable you can run the
power and video for your security cameras simultaneously, effectively cutting your install time
in half. Also some older HD TV’s still use lower frequencies (around 37 MHz), making RG 59 a
better choice for them.

17
RCA CABLE

RCA Audio Cable

RCA cables have been in existence since the early 1940s, connecting Victrola turntables to radio systems.
Since then, the cabling type has expanded into multichannel surround sound, video and digital audio
applications. Although the cable's essential construction varies little when used with these signal types,
limitations of the types change how far you can run an RCA cable before encountering signal
degradation.

Various RCA signals dictate maximum


cabling lengths. credit:
Photodisc/Photodisc/Getty Images
STANDARD AUDIO
Stereo audio is the standard use for most RCA cables. The issue with a well-shielded cable has to do
with signal output voltage. Every preamplifier or receiver, whether home or car, outputs a certain
level of audio signal, measured in volts. Most preamp outputs are 1 to 2 volts, while higher-end
outputs measure from 4 to 14 volts. Higher voltages are commonly used in car audio applications
to counter noise. However, resistance on the cable means that you are limited as to how far you
can run the cable before losing significant voltage along the way and perhaps encountering hum
and other undesirable effects. Most RCA audio cables that are built reasonably well with shielding
can be run effectively from 100 to 200 feet.

18
RCA VIDEO CABLE/COMPONENT CABLE

Composite Video Cable

Composite video (one channel) is an analog video transmission (without audio) that carries
standard definition video typically at 480i or 576i resolution. Video information
is encoded on one channel, unlike the higher-quality S-video (two channels) and the even higher-
quality component video (three or more channels).
Composite video is usually in standard formats such as NTSC, PAL, and SECAM and is
often designated by the initials CVBS, for color, video, blanking and sync, or simply as
video.

Component Video Cable (RGB)

 Y - which is brightness (luma)


 Pb - which is the difference between blue and luma
 Pr - which is the difference between red and luma

The component video connection on the back of your device will look something like
this.

19
A component video connection transmits a high quality analog video signal between devices. It
can transmit standard and high-definition image resolutions - although high-definition images
over this type of connection may be limited due to copyright restrictions.
It is a very common interface on all types of consumer audio-visual equipment.
It does not send any audio signals. You will need a separate audio connection if you are using
this to send the image. In this case, you would usually use a separate optical or coaxial audio
connection to send digital audio - or failing that a good old stereo analog connection.

VGA CABLE

P
i

A female DE15 socket

Pin 1 RED Red video Pin 7 GREEN_RTN

Pin 2 GREEN Green video Pin 8 BLUE_RTN

Pin 3 BLUE Blue video Pin 9 KEY/PWR

Pin 4 ID2/RES formerly Monitor Pin 10 GND


ID bit 2,
reserved since
E-DDC

Pin 5 GND Ground (HSync) Pin 11 ID0/RES

Pin 6 RED_RTN Red return Pin 12 ID1/SDA

20
Pin HSync Pin 15 ID3/SCL
13

Pin VSync
14

HDMI CABLE

HDMI type A

Pin 1

Pin 2 TMDS

Pin 3

Pin 4

Pin 5 TMDS

Pin 6

Pin 7

Pin 8 TMDS

Pin 9

Pin 10

21
HDMI (High-Definition Multimedia Interface) is a proprietary audio/video interface for
transmitting uncompressed video data and compressed or uncompressed digital audio data from
an HDMI-compliant source device, such as a display controller, to a compatible computer
monitor, video projector, digital television, or digital audio device.[4] HDMI is a digital
replacement for analog video standards.

DISPLAYPORT CABLE(DP CABLE)-NEW GEN CABLE

Pin ML_Lane 0 Lane 0 (positive)


1 (p)[a]

Pin GND Ground


2

Pin ML_Lane 0 Lane 0 (negative)


3 (n)[a]

Pin ML_Lane 1 Lane 1 (positive)


4 (p)[a]

Pin GND Ground


5

Pin ML_Lane 1 Lane 1 (negative)


6 (n)[a]

Pin ML_Lane 2 Lane 2 (positive)


7 (p)[a]

22
Pin 8 GND Ground

Pin 9 ML_Lane 2 Lane 2 (negative)


(n)[a]

Pin ML_Lane 3 Lane 3 (positive)


10 (p)[a]

Pin GND Ground


11

Pin ML_Lane 3 Lane 3 (negative)


12 (n)[a]

Pin CONFIG1 Connected to ground[b]


13

Pin CONFIG2 Connected to ground[b]


14

Pin AUX CH (p) Auxiliary channel (positive)


15

Pin GND Ground


16

Pin AUX CH (n) Auxiliary channel (negative)


17

Pin Hot plug Hot plug detect


18

Pin Return Return for power


19

Pin DP_PWR Power for connector (3.3 V


20 500 mA)

23
Introduction to Connectors
RJ45 CONNECTOR

A registered jack (RJ) is a standardized physical network interface for connecting


telecommunications or data equipment. The physical connectors that registered jacks use are
mainly of the modular connector and 50-pin miniature ribbon connector types. The most
common twisted-pair connector is an 8-position, 8-contact (8P8C) modular plug and jack
commonly referred to as an RJ45 connector.
An 8-pin/8-position plug or jack is commonly used to connect computers onto Ethernet-based
local area networks (LAN).
Two wiring schemes–T568A and T568B–are used to terminate the twisted-pair cable onto
the connector interface.

Color Code For T568A(TA) & T568B(TB)

BNC CONNECTOR
A BNC connector allows our to connect your security camera to your DVR unit. BNC
24
connectors typically is just a term to express the industry standard for digital/analog signal
connection. All security cameras, DVRs, multiplexers, have these ends. The connectors below
all fit these connections. The major connections are twist-on-BNC-connectors, crimp-on-
BNC- connectors, and compression-BNC-connectors. The rest of the pieces are adapters and
they help end-users achieve the right connection, which enables them to render live video
feeds from their security cameras.

Crimp-on BNC connectors are available in two styles: 2 piece and 3 piece. The two piece
style is much more popular, so that is the type that we will discuss here. Installation using two
piece BNC crimp-on connectors requires two tools: a coax cable stripper and a coax crimping
tool. The attachment process takes a little longer than the other methods, but this is still a
favorite among professional installers because the connector stays very secure when done.

DC CONNECTOR
A DC connector (or DC plug, for one common type ofconnector) is an electrical connector for
supplying direct current (DC) power. Compared to domestic AC power plugs and sockets, DC
connectors have many more standard types that are not interchangeable.

CCTV BALUNS
CCTV video baluns, also known as UTP baluns, allow traditional coax cable to be replaced by
category 5 and other forms of twisted pair wire in CCTV video camera & surveillance
installations. Video baluns allow installers to use more cost effective structured cabling
techniques to wire security cameras. By using video baluns, UTP wire such as cat-5 can be run
over longer distances easier than coax cable and for less money. Active balun transceivers
enable UTP wires for cameras to be run distances up to 5,000 feet. If you are new to the idea
of using baluns for video, check out our video balun installation videos. CCTV Camera Pros
believes that we supply the best UTP video baluns on the market.

25
FIBER CONNECTOR(LC/APC/SL)

An optical fiber cable, also known as fiber optic cable, is an assembly similar to an
electrical cable, but containing one or more optical fibers that are used to carry light. The
optical fiber elements are typically individually coated with plastic layers and contained in
a protective tube suitable for the environment where the cable will be deployed.
Different types of cable[1] are used for different applications, for example long distance
telecommunication, or providing a high-speed data connection between different parts of a
building.

Introduction to Testing and Measurement Units


MULTIMETER

26
What is a Multimeter
A multimeter or Volt-Ohm meter, is a device used to measure voltage, current and resistance.
Multimeter might be analog type multimeters or digital multimeters, depending on the type of
circuit being used. Normally, these hand-held devices are very useful to detect faults or
provide field
measurements at a high degree of accuracy. They are one of the preferred tools by electricians
to troubleshoot electrical problems on motors, appliances, circuit, power supplies, and wiring
systems.

Analog multimeters are becoming obsolete as they are being replaced by digital multimeters.

Analog Multimeters
Analog multimeter is based on a micro ammeter that moves over a scale. Analog multimeters
although cheap, can be very difficult to read accurately, and they must be handled carefully,
because of you drop the meter, you are likely to damage it. Analog multimeter are not
accurate as a digital meter, when you are trying to use it as a voltmeter; however, analog
multimeters are great detecting slow voltage
changes, as you will the see the needle moving over the scale.
The best way to use an analog multimeter is when it is set as an ammeter, due to their low
resistance and high sensitivity, with scales down to 50µA.
Digital Multimeters
Digital multimeters are designed for electronics engineers, so many multimeters, might
contain features that probably you will not need ever. Digital meters will provide their output
on a LCD screen, and might cost more than analog multimeters.By turning the central knob,
you will be selecting the appropriate type of measurement you will me making. For example
when it is set to 20V DC, it means that 20 volts will be the maximum voltage that can be
measured, normally ideal for all circuits that you will build. If you would like to measure
smaller voltages then you should set your digital multimeter to the 2V or 200mV selection.

The digital multimeter is better when it is used as a voltmeter, because it resistance is much
higher, 1 M or 10 M, compared to 200 for an analogue multimeter on a similar range.
Occasionally, a digital multimeter will show voltage present when a circuit should not be
energized. The question is whether it's real and potentially dangerous voltage, or merely
'Ghost Voltage.' This kind of voltage is caused when energized circuits and non-energized
wiring are located in close proximity to each other.

27
RJ45 CABLE TESTER

Generally a basic cable tester is a battery operated portable instrument with a source of electric
current, one or more voltage indicators, and possibly a switching or scanning arrangement to
check each of several conductors sequentially. A cable tester may also have a microcontroller
and a display to automate the testing process and show the testing results, especially for
multiple-conductor cables. A cable tester may be connected to both ends of the cable at once, or
the indication and current source portions may be separated to allow injection of a test current at
one ond of a cable and detection of the results at the distant end. Both portions of such a tester
will have connectors compatible with the application, for example, modular connectors for
Ethernet local area network cables.A cable tester is used to verify that all of the intended
connections exist and that there are no unintended connections in the cable being tested. When
an intended connection is missing it is said to be "open". When an unintended connection exists
it is said to be a "short" (a short circuit). If a connection "goes to the wrong place" it is said to be
"miswired" (the connection has two faults: it is open to the correct contact and shorted to an
incorrect contact). [1]Generally, the testing is done in two phases. The first phase, called the
"opens test" makes sure each of the intended connections is good. The second phase, called the
"shorts test" makes sure there are no unintended connections.There are two common ways to
test a connection:A continuity test. Current is passed down the connection. If there is current the
connection is assumed to be good. This type of test can be done with a series combination of a
battery (to provide the current) and a light bulb (that lights when there is a current).A resistance
test. A known current is passed down the connection and the voltage that develops is measured.
From the voltage and current the resistance of the connection can be calculated and compared to
the expected value.There are two common ways to test for a short:A low voltage test. A low
power, low voltage source is connected between two conductors that should not be connected
and the amount of current is measured. If there is no current the conductors are assumed to be
well
isolated.A high voltage test. Again a voltage source is connected but this time the voltage is of
several hundred volts. The increased voltage will make the test more likely to find connections
that are nearly shorted since the higher voltage will cause the insulation of nearly shorted wires
to break down.Signal testers

 Open/short wiring test


 Connected wires display
 Crossover wiring display
 No connection/ No terminator indication
 Wrong connection/ Non parallel connection display

28
RJ45 TONER/TRAISER

29
Peripheral items For CCTV
MIC

MONITOR

SPEAKER

TV
RACK

30
Video parameters
VIDEO RESOLUTIONS

FPS (FRAME PER SECOND)


Animation works by using an optical illusion. Film theorists often refer to this illusion
of movement as the persistence of vision. Persistence of vision works because the human eye
and brain can only process 10 to 12 separate images per second, retaining an image for up
to a fifteenth of a second..
A frame rate, expressed as fps or frames per second, is the number of frames (or images) you
camera can take per second. The current industry standard for clear, smooth video even with
moving objects is 30 fps, although the quality of video you’re hoping to capture and your
network’s bandwidth heavily influence what frame rate will work best for you. 30 fps is the
standard rate for your television, since it results in smooth movement of people and objects
between frames.
BIT-RATE
one of the biggest ones is the video bit rate at which a camera records. Bit rates are defined by
mega bits per second (mbps). And in a nutshell, the higher the bit rate of a video, the higher the
video quality. For example, most video you watch on the web has a bit rate of around 800 kbps
(less than 1 mbps)

31
Cctv parameters
FOCAL LENGTH(FIXED AND VARIABLE)

LENS
CCD stands for charge-coupled device; CMOS stands for complimentary metal-oxide
semiconductor. These are the chips onto which the light captured by a camcorder's lens is focused.
LUX(UNIT OF LIGHT)
The lux (symbol: lx) is the SI derived unit of illuminance and luminous emittance, measuring
luminous flux per unit area.[1] It is equal to one lumen per square meter. In photometry, this is used
as a measure of the intensity, as perceived by the human eye, of light that hits or passes through a
surface. It is analogous to the radiometric unit watt per square meter, but with the power at each
wavelength weighted according to the luminosity function, a standardized model of human visual
brightness perception. In English, "lux" is used as both the singular and plural form.
IR

Infrared security cameras have the capability to capture video in low light and no light (0 Lux) areas.
Infrared cameras (IR) are sometimes referred to as IR cameras or "Night Vision Security Cameras"
32
because of this. Infrared cameras have IR LEDs positioned around the outer edges of the camera lens
which gives the camera its "Night Vision".
Infrared Cameras can capture acceptable video in total darkness and even better quality video in
low light. Even a small amount of ambient light helps the overall night vision capability of IR
cameras a lot. IR cameras are available in various body styles, such as dome and bullet styles.
There are also specialty cameras such as license plate recognition (LPR cameras). Please select
from the below sub-categories or browse all camera types below. CCTV Camera Pros also sells
Infrared.

0.0001(Lux .0001) Moonless, overcast night sky (starlight)[3]

0.002 Moonless clear night sky with airglow[3]

0.05–0.3 Full moon on a clear night[4]

3.4 Dark limit of civil twilight under a clear


sky[5]

20–50 Public areas with dark surroundings[6]

50 Family living room lights (Australia, 1998)


[7]

80 Office building hallway/toilet lighting[8][9]

100 Very dark overcast day[3]

150 Train station platforms[10]

320–500 Office lighting[7][11][12][13]

400 Sunrise or sunset on a clear day.

1000 Overcast day;[3] typical TV studio lighting

33
10,000–25,000 Full daylight (not direct sun)[3]

32,000–100,000(LUX Max) Direct sunlight

Cctv Features

WB

34
AG

35
DNR

IP UNITS
he IP value indicates the degree to which electrical appliances like lighting fixtures are
protected against solid objects or materials, and water. The IP value always consists of two
digits.
The first digit indicates the protection against solid objects or materials. The second digit
indicates the degree to which the fixture is protected against water.
Logically it makes sense that when the appliance is well protected against water, it is also hard
for solid objects to invade the appliance. A high second digit is therefor always accompanied
with a high first digit.
A lighting fixture you want to install in the bathroom logically asks a higher IP value. The
bathroom can be divided into four imaginary safety zones each with their own requirements in
terms of IP value.
WHERE DO ALL THESE DIGITS STAND FOR EXACTLY?
The first IP digit:

 IP 0x = No protection.
 IP 1x = Protected against objects with a diameter over 50mm (e.g. accidental touch by person’s
hand).
 IP 2x = Protected against solid objects with a diameter over 12mm (e.g. a person’s fingers).
 IP 3x = Protected against solid objects with a diameter over 2,5mm (e.g. wires and tools).
 IP 4x = Protected against solid objects with a diameter over 1mm (e.g. wires and tools).
 IP 5x = Complete protection against touching voltage carrying parts (i.e. wiring) and
harmful accumulation of dust. Ingress of dust is possible but will not harm the working.
 IP 6x = Complete protection against touching voltage carrying parts (i.e. wiring) and ingress of
dust.
The second IP digit:
 IP x0 = No protection.
 IP x1 = Protected against vertically falling drops of water.
 IP x2 = Protected against drops of water up to 15° from the vertical.
 IP x3 = Protected against direct water sprays up to 60° from the vertical.
 IP x4 = Protected against water sprays from all directions.
 IP x5 = Protected against low pressure jets of water from all directions.
 IP x6 = Protected against strong jets of water from all directions.
 IP x7 = Protected against the effects of temporary immersion between 15cm and 1m. Duration
of test: 30 min.
 IP x8 = Protected against long periods of immersion under pressure.

IK UNITS

Protection Against Mechanical Impact


Impact Size
IK Protected Description
Code against
(joules)
36
No protection against any
IK00 - mechanical impact
Protected against a 200 g object
IK01 0.15 dropped from 7.5 cm in height
Protected against a 200 g object
IK02 0.2 dropped from 10 cm in height
Protected against a 200 g object
IK03 0.35 dropped from 17.5 cm in height
Protected against a 200 g object
IK04 0.5 dropped from 25 cm in height
Protected against a 200 g object
IK05 0.7 dropped from 35 cm in height
Protected against a 500 g object
IK06 1 dropped from 20 cm in height
Protected against a 500 g object
IK07 2 dropped from 40 cm in height
Protected against a 1.7 Kg object
IK08 5 dropped from 29.5 cm in height
Protected against a 5 Kg object
IK09 10 dropped from 20 cm in height
Protected against a 5 Kg object
IK10 20 dropped from 40 cm in height
Protected against a 10 Kg object
IK10+ 40 dropped from 40 cm in height

UNDERSTADING VIDEO COMPRESSION RATIO


As the CCTV industry continues to move towards digital devices, such as Digital Video
Recorders (DVRs) and IP devices, technicians need to be familiar with the subject of
Compression – the methods such as MPEG, Wavelet™, and similar. In this article we spell out
some of the basics of compression technology.
So first – why is data compression necessary? Because without it, the volumes of data produced
by digitising CCTV image streams would swamp the available storage and communications
systems.
To overcome this, the process of compression is applied to the image stream, reducing the
amount of information that needs to be transmitted and stored. In fact compression of the camera
signal is not new - many people do not realise that all ‘analogue video’ has always been
compressed.
Similarly, there has long been a need for data compression in the computer industry. Specialist
mathematicians have worked for many years on solving the basic problem of how to reduce the
image size to produce the best compromise between image clarity, the data size of the image, and
the amount of processing power it takes to run the compression method.

Different applications have different priorities regarding clarity of the image, data volumes, and
processing power – for example identification evidence has a different picture quality
requirement compared to monitoring the length of a queue. So if you are selecting digital
equipment, you’ll need to select the compression format that suits the network or the application
you are installing.
37
Different sorts of compression are described as lossless or lossy. In general, the less compression
the better the playback and recorded image, so naturally in that sense lossless is always better
than lossy; however, less compression means more data to be transmitted and stored, and thus
incurs higher system costs.
Compression reduces the signal in three ways. The first is by various mathematical tricks that are
lossless to the image, and can be reversed at the time of display so that the full image is viewed.
The second is to remove parts of the signal that are redundant to human viewing of the image.
The third method is to start to visibly reduce image quality – definition, frames per second, and
colour range – and it is this type of compression that is called lossy.
The compression formats used in CCTV vary by manufacturer and by product. But the four most
commonly used compression formats are:
 H264
 Motion JPEG, also written M-JPEG or M-JPG
 Wavelet™
 MPEG, also written mpg
H264
H264 is a digitisation and compression scheme for analogue video. It is widely used in video
conferencing and is aimed at providing digitised video at a bit rate of 64Kbps-1Mbps, which is
the bandwidth range of public data networks.
Compression rates as high as 2500:1 are achieved, but of course at the cost of quality. The format
is good for high frame rates, showing movement, but the resolution of those frames is not high.
This is not good if, say, person identification images are required. But if the application is a non-
security application such as video-conferencing, the quality is likely to be adequate.
Uniquely among the compression formats discussed here, H264 encoded signals can also be
decoded or decompressed by reversing the process(es) from a valid reference or I-Frame. That
means you can get back to the original high quality if you ever need to.
An advantage of Motion JPEG is that, because it is based on still images, it can produce any of its
frames as a
single image for identification purposes. As we will explain, some compression techniques
cannot provide such
images.
HDD STORAGE CALCULATION
Yes, the online CCTV storage calculator software can give you quick answers to the CCTV
storage needs.
But the results are far from preciseness – different CCTV storage calculators can provide you
divergent outcomes. More importantly, they don’t apply to EVERYONE.
So we have got this DIY CCTV storage calculation formula for you to calculate the CCTV
camera and DVR storage on your own:

Storage Space (GB) = Bitrate (Kbps) * 1000/8 * 3600 * 24 * Cameras * Days/1000 000 000

38
For example, if you have 2 cameras whose maximum bitrate is 1024 Kbps and you want to
record for 7 days nonstop, the required storage space = 1024 * 1000/8 * 3600 * 24 * 2 *
7/1000 000 000 = 154.8288 GB

FACTORS EFFECTING STORAGE


Note that the actual storage needs may differ from the results worked out by the above CCTV storage
calculation formula, since the CCTV camera storage calculation is impacted by various factors.
Below is a list of the main determinants:
 Resolution – The CCTV camera resolution is measured in vertical and horizontal pixel
dimensions, such as CIF (352 x 240), 720P (1280 x 720), 1080p (1920 x 1080), 1440P (2560 x 1440)
and etc.
 Compression – Video compression is a kind of technique that reduces the size of original
video file formats and thus occupies less space than the original files. The popular video
compression formats include H.264, MJPEG and MPEG4.
 Bitrate – The higher the camera bitrate is, the better the video quality. And it is affected
by the resolution and compression formats. Lower resolution and highly compressed videos will
require less bitrate.
 Camera – The number of cameras you use can also impact the CCTV storage calculation. If you
use multiple cameras simultaneously, more CCTV storage will be required.
 Days – The longer CCTV recording retention period is, the more storage space is required.
When you utilize the CCTV storage calculation formula, note that it is calculated by days, so you
might need to convert the hours to days if the camera records in hours.
Types Of CCTV Camera
DOME
Dome cameras are installed indoor applications, with short view distance and with stylish compact
size design. The dome camera with aesthetic look, can blend itself in with the area of installation.It’s
necessary to pull the dome cover off for adjusting the camera (zoom & focus, OSD…etc), this is a
disadvantage for dome camera. In addition, typically dome camera with compact design, limited to be
equipped with small lens for short distance view.
BULLET
Bullet cameras with weatherproof design. they are installed outdoor applications, they are with large
size and can provide the best way to deter theft. Majority of bullet cameras come with mounting
bracket, The mounting bracket can make bullet camera with flexibility to swivel horizontally and
vertically for getting best field of view. Camera can be large size, and equipped with big lens for long
range view distance, also can be added with Infrared illuminators for long range night vision.

39
PTZ
A pan–tilt–zoom camera (PTZ camera) is a camera that is capable of remote directional and
zoom control. In television production, PTZ controls are used with professional video cameras
in television studios, sporting events, and other spaces. They are commonly referred to as robos,

an abbreviation of robotic camera

FISH EYE
A fisheye lens is an ultra wide-angle lens that produces strong visual distortion intended to
create a wide panoramic or hemispherical image.[1][2] Fisheye lenses achieve extremely wide
angles of view. Instead of producing images with straight lines of perspective (rectilinear
images), fisheye lenses use a special mapping (for example: equisolid
angle), which gives images a characteristic convex non-rectilinear appearance.

Terms in Networking and CCTV system (Basic/network)


Dual Stream: Dual stream is a technology used to record high resolution video locally while
transmitting a lower resolution stream over the network. The two streams are generated by the
DVR, with the main stream having a maximum resolution of 4CIF and the sub-stream having
a maximum resolution of CIF
HDD: Acronym for Hard Disk Drive. A storage medium which stores digitally encoded
data on platters with magnetic surfaces.
40
• DHCP: Dynamic Host Configuration Protocol (DHCP) is a network application protocol
used by devices (DHCP clients) to obtain configuration information for operation in an
Internet Protocol network
HTTP: Acronym for Hypertext Transfer Protocol. A protocol to transfer hypertext request
and information between servers and browsers over a network
PPPoE: PPPoE, Point-to-Point Protocol over Ethernet, is a network protocol for encapsulating
Point-to-
Point Protocol (PPP) frames inside Ethernet frames. It is used mainly with ADSL services
where individual users connect to the ADSL transceiver (modem) over Ethernet and in plain
Metro Ethernet networksDDNS: Dynamic DNS is a method, protocol, or network service that
provides the capability for a networked device, such as a router or computer system using the
Internet Protocol Suite, to notify a domain name server to change, in real time (ad-hoc) the
active DNS configuration of its configured hostnames, addresses or other information stored in
DNS
• HybridDVR: A hybrid DVR is a combination of a DVR and NVR.
NTP: Acronym for Network Time Protocol. A protocol designed to synchronize the clocks of
computers over a network.
NTSC: Acronym for National Television System Committee. NTSC is an analog television
standard used in such countries as the United States and Japan. Each frame of anNTSC signal
contains 525 scan lines at 60Hz

NVR: Acronym for Network Video Recorder. An NVR can be a PC-based or embedded
system used for centralized management and storage for IP cameras, IP Domes and other
DVRs.

PAL: Acronym for Phase Alternating Line. PAL is also another video standard used in broadcast
televisions systems in large parts of the world. PAL signal contains 625 scan lines at 50Hz.
PTZ: Acronym for Pan, Tilt, Zoom. PTZ cameras are motor driven systems that allow the
camera to pan left and right, tilt up and down and zoom in and out.
• USB: Acronym for Universal Serial Bus. USB is a plug-and-play serial bus standard to
interface devices to a host computer.

Typical CCTV datasheet

41
DS-2CD2125FWD-I
2 MP Ultra-Low Light Outdoor Network Dome Camera

 Up to 2 MP High Resolution
 Full 1080p @30 fps
 2.8 mm / 4 mm / 6 mm / 8 mm Fixed Lens Options
 Ultra-Low Light, 0.008 lux, DarkFighter Technology
 H.265+, H.265, H.264+, H.264
 120dB Wide Dynamic Range
 3D Digital Noise Reduction
 12 VDC & PoE (802.3af)
 EXIR 2.0 with up to 100 ft (30 m) IR Range
 MicroSD card slot supports up to 128 GB
 IP67, IK10 Protection
 3-Axis Adjustment

ACCESS CONTROL SYSTEM


Biometrics is the technical term for body measurements and calculations. It refers to metrics
related to human characteristics. Biometrics authentication (or realistic authentication)[note
1] is used in computer science as a form of identification and access control.[1][2] It is also
used to identify individuals in groups that are under surveillance.
Biometric identifiers are then distinctive, measurable characteristics used to label and
describe individuals.[3] Biometric identifiers are often categorized as physiological versus
behavioral characteristics.[4] Physiological characteristics are related to the shape of the
body. Examples include, but are not limited to fingerprint, palm veins, face recognition,
DNA, palm print, hand geometry, iris recognition, retina and odour/scent. Behavioral
characteristics are related to the pattern of behavior of a person, including but not limited
to typing rhythm, gait,[5] and voice.[note
2] Some researchers have coined the term behaviometrics to describe the latter class of
biometrics.[6]
More traditional means of access control include token-based identification systems,
such as a driver's license or passport, and knowledge-based identification systems, such
as
a password or personal identification number.[3] Since biometric identifiers are unique to
individuals, they are more reliable in verifying identity than token and knowledge-based
methods; however, the collection of biometric identifiers raises privacy concerns about the
ultimate use of this information

42
Types of Biometric

 Face recognition
Of the various biometric identification methods, face recognition is one of the most
flexible, working even when the subject is unaware of being scanned. It also shows
promise as a way to search through masses of people who spent only seconds in front
of a "scanner" - that is, an ordinary digital camera.
Face recognition systems work by systematically analyzing specific features that are
common to everyone's face - the distance between the eyes, width of the nose, position
of cheekbones, jaw line, chin and so forth. These numerical quantities are then
combined in a single code that uniquely identifies each person.
 Fingerprint identification
Fingerprints remain constant throughout life. In over 140 years of fingerprint
comparison worldwide, no two fingerprints have ever been found to be alike, not even
those of identical twins. Good fingerprint scanners have been installed in PDAs like
the iPaq Pocket PC; so scanner technology is also easy. Might not work in industrial
applications since it requires clean hands.
Fingerprint identification involves comparing the pattern of ridges and furrows on the
fingertips, as well as the minutiae points (ridge characteristics that occur when a ridge
splits into two, or ends) of a specimen print with a database of prints on file.
 Hand geometry biometrics
Hand geometry readers work in harsh environments, do not require clean
conditions, and forms a very small dataset. It is not regarded as an intrusive kind
of test. It is often the authentication method of choice in industrial environments.
 Retina scan
There is no known way to replicate a retina. As far as anyone knows, the pattern of
the blood vessels at the back of the eye is unique and stays the same for a lifetime.
However, it requires about 15 seconds of careful concentration to take a good scan.
Retina scan remains a standard in military and government installations.
 Iris scan
43
Like a retina scan, an iris scan also provides unique biometric data that is very
difficult to duplicate and remains the same for a lifetime. The scan is similarly
difficult to make (may be difficult for children or the infirm). However, there are
ways of encoding the iris scan biometric data in a way that it can be carried around
securely in a "barcode" format. (See the SF in the News article Biometric
Identification Finally Gets Started for some detailed information about how to
perform an iris scan.)
 Signature
A signature is another example of biometric data that is easy to gather and is not
physically intrusive. Digitized signatures are sometimes used, but usually have
insufficient resolution to ensure authentication.
 Voice analysis
Like face recognition, voice biometrics provide a way to authenticate identity without
the subject's knowledge. It is easier to fake (using a tape recording); it is not possible
to fool an analyst by imitating another person's voice.

Advantages of Biometric systems Biometric recognition has several advantages compared to


the traditional access system with simple passwords and IDs. • Users do not need to remember
passwords • Users need not have to carry an ID card • Unless the person is physically present,
access is denied. No impersonation of identity is possible Chapter 14 ■ Physical Security and
Biometrics 303 • Biometric traits cannot be stolen
or duplicated • Biometric systems are hard to break • Biometric systems have good accuracy
• With the advent of the computers, the declining cost of computers, the cost of the biometric
systems have
significantly reduced

Types of Common Physical Security


1. Password Authentication

2. Card (RFID/5MHz card)

3. Finger print

4. Retina Authenticating

RFID CARD (SMART CARD) RADIO FREQUENCY IDENTIFICATION READER (RFID READER)
RFID methods utilize radio waves to accomplish this. At a simple level, RFIDsystems consist
of three components: an RFID tag or smart label, an RFID reader, and an antenna. RFID tags
contain an integrated circuit and an antenna, which are used to transmit data to the RFID
reader (also called an interrogator).
Passive RFID systems use tags with no internal power source and instead are powered by the
electromagnetic energy transmitted from an RFID reader. Passive RFID tags are used for
applications such as access

44
control, file tracking, race timing, supply chain management, smart labels, and more. The
lower price point per tag makes employing passive RFID systems economical for many
industries.

Active RFID systems use battery-powered RFID tags that continuously broadcast their own
signal. Active RFID tags are commonly used as “beacons” to accurately track the real-time
location of assets or in high-speed environments such as tolling. Active tags provide a much
longer read range than passive tags, but they are also much more expensive.
Basics of Access control
Relay Concept
A relay is an electromagnetic switch operated by a relatively
small electric current that can turn on or off a much larger electric current. The heart of a
relay is an electromagnet (a coil of wire that becomes a temporary magnet when electricity
flows through it). You can think of a relay as a kind of electric lever: switch it on with a tiny
current and it switches on ("leverages") another appliance using a much bigger current. Why
is that useful? As the name suggests, many sensors are incredibly sensitivepieces of
electronic equipment and produce only small electric currents. But often we need them to
drive bigger pieces of apparatus that use bigger currents. Relays bridge the gap, making it
possible for small currents to activate larger ones. That means relays can work either as
switches (turning things on and off) or as amplifiers (converting small currents into larger
ones).

45
NO is normally open i.e. the contacts are normally open and close when the switch is
actuated. NC is normally closed i.e. the contacts are normally closed and open when the
switch is actuated. 1NO1NC is generally used to describe contactors (industrial power
relays) and manual switches like emergency stop buttons

Access Control Type of Security


In the most simplest way possible what it means fail secure vs fail safe:

Fail secure: The lock unlocks when power is applied


Fail-safe The lock unlocks when power is removed
FAILSECURE

So in the end fail secure means that if the power is interrupted or fails, the door stays locked.
That's why it's called "secure": It's default state is locked or secured. So a fail secure lock locks
the door when power is removed.
Often fail secure locks are used for IT rooms or other sensitive areas. However because the
door keeps being locked in emergencies, typically it will be usable with a mechanical override,
such as a regular key. However this is also a way of getting in the door without leaving any
electronic traces. This is why the use of mechanical override keys is often restricted to only a
few people who are highly restricted in use, naturally that would be to complex for too many
members to operate.
Fail secure locks are used for fire related doors or staircase (stairwell) doors. The reason is that
in case of fire, those doors should remain closed to seal off a portion of the space and help
reduce spreading of the fire.
FAIL SAFE
When looking at fail safe locks this means that it's default state is actually unlocked. To keep it
locked during normal business operations, power is applied. Should the power be interrupted
or fail, the door automatically
unlocks or releases to let people out of the space. That's why it's called "safe"

46
- it's safe for people - not the space!
Mostly fail safe locks are used for main entry points like office doors or lobby access doors. A
popular use for this application are maglocks which - by design - require power to operate.
Peripheral items for Access control
Magnetic Locks
An electromagnetic lock, magnetic lock, or maglock is a locking device that consists of
an electromagnet and an armature plate. There are two main types of electric locking
devices. Locking devices can be either "fail safe" or "fail secure". A fail-secure locking
device remains locked when power is lost. Fail-safe locking devices are unlocked when de-
energized. Direct pull electromagnetic locks are inherently fail-safe. Typically the
electromagnet portion of the lock is attached to the door frame and a mating armature plate
is attached to the door. The two components are in contact when the door is closed. When
the electromagnet is energized,
a current passing through the electromagnet creates a magnetic flux that causes the
armature plate to attract to the electromagnet, creating a locking action. Because the
mating area of the electromagnet and armature is relatively large, the force created by the
magnetic flux is strong enough to keep the door locked even under stress.

Door Contact

47
Contact sensors tell your system if something is open or closed.
They're typically installed on doors, windows or drawers throughout the house. They have
two pieces: one installed on the door itself; the other installed next to it on the jamb. When
the door is opened and the pieces move apart, the sensor signals ‘open' to your security
system.

Card Reader

Time Attendance machine

Time and attendance systems (TNA) are used to track and monitor when employees start
and stop work. A time and attendance system provides many benefits to organizations as it
enables an employer to have full control of their employees working hours as it monitors
late arrivals, early departures, time taken on breaks and absenteeism [1]. It also helps to
control labor costs by reducing over-payments, which are often caused by paying

48
employees for time that are not working, and eliminates transcription error, interpretation
error and intentional error. TNA systems are also invaluable for ensuring compliance with
labor regulations regarding proof of attendance.
All of these benefits provide both employer and employees with confidence in the accuracy
of their wage payments all while improving productivity.
Modern automated time and attendance systems like ClockIt simply require employees to
touch or swipe to identify themselves and record their working hours as they enter or
leave the work area. Originally this consisted of using a RFID electronic tag or a barcode
badge but these have been replaced by bio-metrics(vein reader, hand geometry,
fingerprint, or facial recognition), and touch screens devices. Modern biometric TNA
systems offer additional benefits[2] over traditional manual systems which include

 Faster processing of employees as attendance can be recorded with just one touch or a
quick scan
 Fraud prevention by eliminating duplicate and fake registration
 Saves time as attendance can either be integrated directly with your payroll system or
it can produce a report that can be downloaded or printed
 Improves punctuality and reduces long breaks and absenteeism

Motion Detection sensor

Passive Infrared (PIR)

49
Detects body heat (infrared energy). Passive infrared sensors are the most widely used
motion in home security systems. When your system is armed, your motion sensors are
activated.
Once the sensor warms up, it can detect heat and movement in the surrounding areas,
creating a protective "grid." If a moving object blocks too many grid zones and the
infrared energy levels change rapidly, the sensors are tripped.
MircoWave (MW):

Sends out microwave pulses and measures the reflection off a moving object. They cover a
larger area than infrared sensors, but they are vulnerable to electrical interference and are
more expensive.
Dual Technology Motion Sensors:

Motion sensors can have combined features in an attempt to reduce false alarms. For
example, a passive infrared (PIR) sensor could be combined with a microwave sensor.
Since each operates in different areas of the spectrum, and one is passive and one is active,
Dual Technology motion sensors are not as likely as other types to cause false alarms,
because in order for the alarm to be triggered, both sensors have to be tripped. However,
this does not mean that they never cause false alarms.
Area Reflective Type:
Emits infrared rays from an LED. Using the reflection of those rays, the sensor measures
the distance to the person or object and detects if the object is within the designated area.
Ultrasonic:

50
Sends out pulses of ultrasonic waves and measures the reflection off a moving object.
Vibration:
Detects vibration. These can be purchased or easily made at home. A homemade vibration
sensor uses a small mass on a lever, which is activated by a switch to an alarm when it
vibrates. Homemade motion sensors can work, but they can also be unreliable.

Smoke Detector

CONCEPT OF SMOKE DETECTOR

IONIZATION SMOKE DETECTORS

OPTICAL LENS SMOKE DETECTORS


Ionization smoke alarms are generally more responsive to flaming fires.
How they work: Ionization-type smoke alarms have a small amount of radioactive material
between two electrically charged plates, which ionizes the air and causes current to flow
between the plates. When smoke enters the chamber, it disrupts the flow of ions, thus

51
reducing the flow of current and activating the alarm.

Photoelectric smoke alarms are generally more responsive to fires that begin

with a long period of smoldering (called “smoldering fires”).

HTML 5
Introduction:
HTML stands for Hyper Text Markup Language. It is used to design web pages using a markup
language. HTML is an abbreviation of Hypertext and Markup language. Hypertext defines the
link between the web pages. The markup language is used to define the text document within
the tag which defines the structure of web pages. HTML 5 is the fifth and current version of
HTML. It has improved the markup available for documents and has introduced application
programming interfaces(API) and Document Object Model(DOM).

Features:
 It has introduced new multimedia features which support audio and video controls by
using <audio> and <video> tags.
 There are new graphics elements including vector graphics and tags.
 Enrich semantic content by including <header> <footer>, <article>, <section> and
<figure> are added.
 Drag and Drop- The user can grab an object and drag it further dropping it to a new location.
 Geo-location services- It helps to locate the geographical location of a client.
 Web storage facility which provides web application methods to store data on the web browser.
 Uses SQL database to store data offline.

52
 Allows drawing various shapes like triangle, rectangle, circle, etc.
 Capable of handling incorrect syntax.
 Easy DOCTYPE declaration i.e. <!doctype html>
 Easy character encoding i.e. <meta charset=”UTF-8″>
Removed elements from HTML 5: There are many elements which are depreciated from HTML 5
are listed below:

Removed
Elements Use Instead Elements

<acronym> <abbr>

<applet> <object>

<basefont> CSS

<big> CSS

<center> CSS

<dir> <ul>

<font> CSS

<frame>

<frameset>

<noframes>

<isindex>

<strike> CSS, <s> or <del>

<tt> CSS

New Added Elements in HTML 5:

53
 <article>: The <article> tag is used to represent an article. More specifically, the content within
the <article> tag is independent from the other content of the site (even though it can be related).
 <aside>: The <aside> tag is used to describe the main object of the web page in a shorter way like
a highlighter. It basically identifies the content that is related to the primary content of the web page
but does not constitute the main intent of the primary page. The <aside> tag contains mainly author
information, links, related content and so on.
 <figcaption>: The <figcaption> tag in HTML is used to set a caption to the figure element in a
document.
 <figure>: The <figure> tag in HTML is used to add self-contained content like illustrations,
diagrams, photos or codes listing in a document. It is related to main flow but it can be used in any
position of a document and the figure goes with the flow of the document and if remove it then it
should not affect the flow of the document.
 <header>: It contains the section heading as well as other content, such as a navigation links, table
of contents, etc.
 <footer>: The <footer> tag in HTML is used to define a footer of HTML document. This section
contains the footer information (author information, copyright information, carriers etc.). The footer
tag are used within body tag. The <footer> tag is new in the HTML 5. The footer elements require a
start tag as well as an end tag.
 <main>: Delineates the main content of the body of a document or web app.
 <mark>: The <mark> tag in HTML is used to define the marked text. It is used to highlight the
part of the text in the paragraph.
 <nav>: The <nav> tag is used to declaring the navigational section in HTML documents. Websites
typically have sections dedicated to navigational links, which enables user to navigate the site. These
links can be placed inside a nav tag.
 <section>: It demarcates a thematic grouping of content.
 <details>: The <details> tag is used for the content/information which is initially hidden but could be
displayed if the user wishes to see it. This tag is used to create interactive widget which user can open
or close it. The content of details tag is visible when open the set attributes.
 <summary>: The <summary> tag in HTML is used to define a summary for the <details> element.
The <summary> element is used along with the <details> element and provides a summary visible to
the user. When the summary is clicked by the user, the content placed inside the <details> element

54
becomes visible which was previously hidden. The <summary> tag was added in HTML 5. The
<summary> tag requires both starting and ending tag.
 <time>: The <time> tag is used to display the human-readable data/time. It can also be used to
encode dates and times in a machine-readable form. The main advantage for users is that they can
offer to add birthday reminders or scheduled events in their calendar’s and search engines can
produce smarter search results.
 <bdi>: The <bdi> tag refers to the Bi-Directional Isolation. It differentiate a text from other text that
may be formatted in different direction. This tag is used when a user generated text with an unknown
directions.
 <wbr>: The <wbr> tag in HTML stands for word break opportunity and is used to define the position
within the text which is treated as a line break by the browser. It is mostly used when the used word is
too long and there are chances that the browser may break lines at the wrong place for fitting the text.
 <datalist>: The <datalist> tag is used to provide autocomplete feature in the HTML files. It can be
used with input tag, so that users can easily fill the data in the forms using select the data.
 <keygen>: The <keygen> tag in HTML is used to specify a key-pair generator field in a form. The
purpose of <keygen> element is to provide a secure way to authenticate users. When a from is
submitted then two keys are generated, private key and public key. The private key stored locally, and
the public key is sent to the server. The public key is used to generate client certificate to authenticate
user for future.
 <output>: The <output> tag in HTML is used to represent the result of a calculation performed by the
client-side script such as JavaScript.
 <progress>: It is used to represent the progress of a task. It is also define that how much work is done
and how much is left to download a things. It is not used to represent the disk space or relevant query.
 <svg>: It is the Scalable Vector Graphics.
 <canvas>: The <canvas> tag in HTML is used to draw graphics on web page using JavaScript. It can
be used to draw paths, boxes, texts, gradient and adding images. By default it does not contains
border and text.
 <audio>: It defines the music or audio content.
 <embed>: Defines containers for external applications (usually a video player).
 <source>: It defines the sources for <video> and <audio>.
 <track>: It defines the tracks for <video> and <audio>.

55
 <video>: It defines the video content.

Advantages:

 All browsers supported.


 More device friendly.
 Easy to use and implement.
 HTML 5 in integration with CSS, JavaScript, etc. can help build beautiful websites.

Disadvantages:
 Long codes have to be written which is time consuming.
 Only modern browsers support it.
Supported Browsers: It is supported by all modern browsers.
Below examples illustrate the HTML 5 content.
Example 1:
 html

<!DOCTYPE html>
<html>
<head>
<title>HTML 5</title>
<style>
h1 {
font-size:50px;
}
</style>
</head>
<body>
<h1>Aliyu Baba</h1>
</body>
</html>

Output:
Aliyu Baba
Example 2:
 html

<!DOCTYPE html>

56
<html>
<head>
<title>HTML 5 Demo</title>
<style>
.GFG {
font-size:40px;
font-weight:bold;
color:green;
}
body {
text-align:center;
}
</style>
</head>
<body>
<div class = "GFG">Aliyu Baba</div>
<aside>
<div>A computer science porta</div>
</aside>
</body>
</html>

Output:
Aliyu baba
A computer science portal

57
CHAPTER FIVE

EXPERIENCE ACQUIRED, SUMMARY, RECOMMENDATION, CONCLUSION and


REFERENCES

EXPERIENCE ACQUIRED
I acquired a strategic understanding of how different network operates in real life and how
important it is for a professional to understand their core offerings needs and objectives in order
to deliver the overall goal.
This work experience gave me confidence to know that I am well suited for a profession and
combined with my constant effort to learn more on my own, and it was a great learning
experience.
SUMMARY

The SIWES program are all about straitening future employees. Such program is successful
attempt to help students to understand the underlying principle of their future work. After passing
the program, the student can concentrate on the really necessary factors of his work.
RECOMMENDATION
The Students Industrial Work Experience scheme has provided me an outstanding opportunity to
acquire a set of technical skills that I have not acquired at school taking a series of unit credit
courses. During my training I grab enough of understanding through the concept of networking as
well as knowing which network will be suited to a particular requirement
I would like to recommend that information and communication technology (ICT), curriculum in
Yusuf Maitama Sule University-Kano, be adjusted such as would provide going on industrial
attachment for a longer period of time as opposed to six months or making the program to occur
twice throughout Information and Communications Technology degree program.
CONCLUSION
The industrial work experience scheme (S.I.W.E.S) is an important program that brings about
improvement to students in the field of work (SIWES), and also make student to be self-
confidence and to withstand industrial work. The training as afforded me the basic practical &
theoretical knowledge that I may not have gotten from the lecture room. It also gave me the

58
opportunity to have a ford of what it would be live when I would be working after graduation.
Confidently Saying, the experience gotten from this training was a worthwhile experience.
The sides program has made it possible to apply the theoretical knowledge in real work situation
especially as it concerns programing

REFERENCE
1. Yusuf Maitama Sule University – Kano (students hand book)
2. guidelines for SIWES oral presentation and technical report ©dept. of computer science 2019
3. cisco networking online courses
4. https://punchyinfo.com/history-of-siwes-in-nigeria/#The_Background
5. vlado Damjanovski, CCTV networking and digital technology

59

You might also like