Aba Siwes
Aba Siwes
OF
HELD AT
A.U.A TECHNOLOGIES
BY
ALIYU BELLO ALIYU
UG18ICT1006
SUPERVISED BY
Dr. ABDURRA’UF SHARIFAI GARBA
DECEMBER, 2022
DEDICATION
This work is dedicated to my family who support me from the beginning to the end of this SIWES
programme successfully and complete this report. I also dedicate it to my father Alhaji Muhammad
1
Bello Aliyu and my beloved mother Hajiya Khadija Sulaiman Ishaq for their utmost support. May
Allah reward them with the paradise, Ameen.
ACKNOWLEDGEMENT
My profound gratitude goes to Allah the nourisher, cherisher, sustainer, provider the one who
provide and sustain our lives to witness the end of this session, indeed is a gift. ALHAMDULILAH.
My special thanks goes to my family who had never failed to show interest in my studies.
My appreciation also goes to my supervisor Dr. ABDURRA’UF SHARIFAI GARBA who come all
the way to supervise me and guide all through in writing the report, An appreciation goes to my
lecturers for their support and their contributions toward their effort to provide quality education.
I will also like to thanks the management of A.U.A Technologies, Networking Department
especially the Managing Director, Mus’ab Abbas and my appreciation goes to my industrial base
supervisor Egnr. Umar Hamza and other staff.
I should not fail to appreciate the help of my colleagues toward completing this work. May Allah
reward them all.
2
CERTIFICATION
This is to certify that, this work was carried out by ALIYU BELLO ALIYU under my supervision
and has been read and approved as meeting the requirement for the award of B.sc Information and
Communication Technology (ICT), Yusuf Maitama Sule University - Kano
3
TABLE OF CONTENTS
CONTENT_______________________________________________________________PAGE
Dedication____________________________________________________________________2
Acknowledgment______________________________________________________________3
Certification___________________________________________________________________4
Abstraction___________________________________________________________________7
Chapter one___________________________________________________________________8
Introduction___________________________________________________________________8
Objectives of SIWES____________________________________________________________8
Chapter two___________________________________________________________________10
Historical background of A,U,A Technology_________________________________________10
Chapter three__________________________________________________________________11
Works carried out during the training_______________________________________________11
Chapter four__________________________________________________________________12
Basic Electrical________________________________________________________________12
Introduction to ELV Cables______________________________________________________12
Introduction to Connectors______________________________________________________27
Introduction to Testing and Measurement Units______________________________________38
Peripheral items for CCTV______________________________________________________42
Types of CCTV Camera________________________________________________________51
HDD Calculation_____________________________________________________________50
CCTV Video-Compression Technology___________________________________________49
Generation of Video/image Resolution____________________________________________49
Access Control System________________________________________________________60
Fire Alarm System9___________________________________________________________62
Experience acquired___________________________________________________________67
Conclusion___________________________________________________________________67
Recommendation______________________________________________________________67
Summary____________________________________________________________________67
4
ABSTRACTION
The report will covers all the skills acquired during my training, the department where I conducted
my SIWES training consists of highly skilled personnel from various range of disciplines such as
Networking, Information Technology, Programming, Computer engineering and System Analysis.
The department is supportive department which primarily work was dealing with the Computer
Based Test, Network Installation and Maintenance, and all other Computer/ Digital activities within
the nation. The report covers all the responsibilities of the Organization which include: the managing
and maintaining the information technology infrastructure for business purpose, repairing computer
appliances such as printers, scanners, cameras and installations of software.
5
CHAPTER ONE
1.0 Introduction
The Student Industrial Work Experience Scheme (SIWES) program
The students Industrial Work Experience Scheme (SIWES) is a skills training program designed to
expose and prepare students of universities, polytechnics/colleges of technology/colleges of
agriculture and colleges of education for the industrial work situation they are likely to meet after
graduation. The scheme also affords students the opportunity of familiarizing and exposing
themselves to the needed experience in handling equipment and machinery that are usually not
available in their institutions. Before the establishment of the scheme, there was a growing concern
among our industrialists that graduates of our institutions of higher learning lacked adequate
practical background studies preparatory for employment in industries. Thus, the employers were of
the opinion that the theoretical education going on in higher institutions was not responsive to the
needs of the employers of labour.
It is against this background that the rationale for initiating and designing the scheme by fund during
its formative years – 1973/74 was introduced to acquaint students with the skills of handling
employers’ equipment and machinery. The ITF solely funded the scheme during its formative years.
But as the financial involvement became unbearable to the fund, it withdrew from the Scheme in
1978. The federal government handed over the scheme in 1979 to both the National Universities
Commission (NUC) and the National Board for Technical Education (NBTE). Later the federal
government in November 1984 reverted the management and implementation of the SIWES
programme to ITF and it was effectively taken over by the Industrial Training Fund in July 1985
with the funding being solely borne by the federal government.
2. To prepare students for the industrial work situation they are to meet after graduation.
6
3. To expose students to work methods and techniques in handling equipment and machinery
that may not be available in their institutions.
4. To make the transition from school to the world of work easier, and enhance students
7
CHAPTER TWO
This 2-Storey building company was established in February 2021, the ground floor has two (2)
offices, one (1) conference room, two (2) toilets and a waiting area, the first floor has One hundred
and thirty (130) Laptop computers capacity CBT Examination hall and two (2) toilets, the second
floor has also One hundred and thirty (130) Laptop computers capacity CBT Examination hall with a
Server Room, we have enough parking zone, we have petrol and diesel generators for adequate and
nonstop power supply.
This company is a Vicenarians’ company because all of our productive staffs are within the ages of
20 and 29, 90% of them are Degree holders some with even Masters Degree and fully equipped with
endurance, dedication and human management, we are ready to work tirelessly under any
circumstance for the betterness of our lives and promotion of our company at large.
We are Corporate Partners of MTN Nigeria –we sell their items e.g 4G Router, MiFi, Sim Cards and
now 5G Network router, Airtel Nigeria –the same function as MTN Nigeria, Phase 3 –for the
provision of high-speed internet connectivity via a small satellite dish and modem.
The company is Information Technology (IT) Company primarily initiated for Joint Admission &
Matriculation Board (JAMB) Examinations which holds once in a year but we stand the ground to
conduct all but not only the following services;
1. ICT Hub 2. Private work space/station 3. Design, thinking & innovation 4. Entrepreneurship
training services 5. Data laboratory services 6. Machine learning & robotic technology development
7. Registrations and bursaries services 8. Bills payment 9. SMEs clinic services
10. Software development 11. General networking 12. Management information system 13.
Geographical information system.
To expand the business and generate more revenue we delved into Computer Training for students
which we expected would be embraced but still no nice response due to the locality. Regardless of
the low revenue generation and patronize for Information Technology activities by our environs, we
still recorded some achievements by giving our services back to the society, among which are
mentioned below;
1. Free Diploma in Basic Computer for 800+ students. 2. Ongoing Women programme titled
‘Northern Women Entrepreneurship Programme’ for 200 women. 3. Ongoing Almajiri programme
titled ‘Almajiri is a child’ for 100 Almajiri where after skill acquisition would be awarded with
startup profit and business item/materials. 4. Computer training to the disabled sponsored by British
Council..
8
CHAPTER THREE
Work Carried Out During the Training
We have received our posting from the registrar to the various department and we get our own into
the A.U.A Technologies.
We report to the department that we have been posted to, and then the instructor was taking us
workshop and show us the various equipment that we could use during the training.
The instructor was also called our attention to our previous knowledge in order to know the different
types of networking and their uses, such networks are satellite installation, CCTV installation and
computer networking
9
CHAPTER FOUR
Basic electrical
So what is electricity and where does it come from? More importantly, why is carpet, socks and a
doorknob a bad combination?
No single discovery hasIn itsaffected
simplest terms, electricity
our lives, ourisculture
the movement
and ourof charge, which is
survival
considered by convention to be, from positive to negative. No matter how the charge is created,
more than electricity. Electricity is everywhere; it lights our way, cooks
chemically (like in batteries) or physically (friction from socks and carpet), the movement of the
our food
discharge and can even brush your teeth. For an example, imagine where
is electricity.
the medical field would be without electricity and in that sense how
ELECTRICITY
Understanding Current
This flow of electrical charge is referred to as electric current. There are two types of current, direct current (DC)
and alternating current (AC). DC is current that flows in one direction with a constant voltage polarity while AC
is current that changes direction periodically along with its voltage polarity. Thomas Edison and Alessandro Volta
were pioneers in DC current and wrote much of electricity’s history. But as societies grew the use of DC over long
transmission distances became too inefficient. Nikola Tesla changed all that with the invention of alternating
current electrical systems. With AC it is possible to produce the high voltages needed for long transmissions.
Therefore, today, most portable devices use DC power while power plants produce AC.
OHM’S LAW
The most fundamental law in electricity is Ohm’s law or V=IR. The V is for voltage, which means
the potential difference between two charges. In other words, it is a measurement of the work
required to move a unit charge between two points. When we see a value such as 10 Volts, it is a
measurement of the potential difference between two reference points. Normally the two points will
be +10V and 0V (alsoknown as ground), but it can also be the difference between +5V and -5V,
+20V and +10V, etc. In the field, you might hear the term “common grounds” which refers to each
device in a system using the same zero-point reference (or ground) to ensure the same potential
difference ( or voltage) is applied throughout the system. The next component of Ohm’s law is
10
current, the units of which are Amperes; in the formula, current is represented by the very logical
choice of the letter I. As mentioned previously, current is the measurement of the flow of charge in a
circuit. This leaves us with the letter R which represents Resistance. Electrical resistance, measured
in Ohms, is the measure of the amount of current repulsion in a circuit. Simply, resistance resists
current flow. When electrons flow against the opposition offered by resistance in the circuit, friction
occurs and heat is produced. The most common application for resistance in a circuit is the light
bulb. The light bulb introduces enough resistance in a circuit to heat up the filament inside, causing
light to be emitted. Resistance in a circuit can also be helpful when needing to alter voltage levels,
current paths, etc. Resistors are self-contained packages of resistance that can be added to a circuit
and are commonly used to divide voltage levels.
VOLTAGE
V=IR
Voltage can be direct or alternating. A direct voltage maintains thesame polarity at all times. In an
alternating voltage, the polarity reverses direction periodically. The number of complete cycles per
second isthe frequency, which is measured in hertz (one cycle per second), kilohertz, megahertz,
gigahertz, or terahertz. An example of direct voltage is the potential difference between the terminals
of an electrochemical cell.Alternating voltage exists between the terminals of a common utility
outlet.
RESISTANCE
R=V/I
Resistance is the opposition that a substance offers to the flow of electric current. It is represented by
the uppercase letter R. The standard unit of resistance is the ohm, sometimes written out as a word,
and sometimes symbolized by the uppercase Greek letter omega:
When an electric current of one ampere passes through a component across which a potential
difference (voltage) of one volt exists, then the resistance of that omponent is one ohm. (For more
discussion of the relationship among current, resistance and voltage.)
POWER
P=I * V
P=Square of Voltage/Resistance
11
For Example we have a battery voltage/DC voltage of 18 volts and a lamp resistance of 3 Ω. Using Ohm’s
Law to determine current, we get:
Now that we know the current, we can take that value and multiply it by the voltage to determine
power:
Answer: the lamp is dissipating (releasing) 108 watts of power, most likely in the form of both light and heat.
DC
DC (direct current) is the unidirectional flow or movement of electric charge carriers (which are
usually electrons). The intensity of the current can vary with time, but the general direction of
movement stays the same at all times. As an adjective, the term DC is used in reference to voltage
whose polarity never reverses. In a DC circuit, electrons emerge from the negative, or minus, pole
and move towards the positive, or plus, pole. Nevertheless, physicists define DC as traveling from
plus to minus. Direct current is produced by electrochemical and photovoltaic cells and batteries. In
contrast, the electricity available from utility mains in most countries is AC (alternating current).
Utility AC can be converted to DC by means of a power supply consisting of a transformer, a
rectifier (which prevents the flow of current from reversing), and a filter (which eliminates current
pulsations in the output of the rectifier).
AC
12
Introduction to ELV Cables
CAT5/6/6A/7 CABLE
13
Cat5 e Cable
Category 5 Cable
Category 5 (CAT5) cable is a multi-pair (usually 4 pair) high performance cable that consists of
twisted pair conductors, used mainly for data transmission. Basic CAT5 cable was designed for
characteristics of up to 100 MHz. CAT5 cable is typically used for Ethernet networks running at
10 or 100 Mbps.
Category 5 Cable
Category 5e (CAT5e) cable, also known as Enhanced Category 5, is designed to support full-
duplex Fast Ethernet operation and Gigabit Ethernet. The main differences between CAT5 and
CAT5e can be found in the specifications. The performance requirements have been raised
slightly in the new standard (see comparison chart below).
CAT5e has stricter specifications for Power Sum Equal-Level Far-End Crosstalk (PS-ELFEXT),
Near-End Crosstalk (NEXT), Attenuation, and Return Loss (RL) than those for CAT5. Like
CAT5, CAT5e is a 100- MHz standard, but it has the capacity to handle bandwidth superior to
that of CAT5. CAT5 cable is typically used for Ethernet networks running at 100 Mbps or 1
Gbps. Use Cablek's GigaBase 350 CAT5e, 350-MHz Solid High-Performance, ETL Verified
Bulk Cable.
Easy way to tell the difference between a Cat5e Cat 6 Patch Cable
Cat5e Cat6
Category 6 Cable
Category 6 (CAT6) cable provides higher performance than CAT5e and features more stringent
specifications for crosstalk and system noise.
14
The quality of the data transmission depends upon the performance of the components of the
channel. To transmit according to CAT6 specifications, jacks, patch cables, patch panels, cross-
connects, and cabling must all meet CAT6 standards. The CAT6 components are tested
individually, and they are also tested together for performance. In addition, the standard calls for
generic system performance so that CAT6 components from any vendor can be used in the
channel.
All CAT6 components must be backward compatible with CAT5e, CAT5, and CAT3. If different
category components are used with CAT6 components, then the channel will achieve the
transmission performance of the lower category. For instance, if CAT6 cable is used with CAT5e
jacks, the channel will perform at a CAT5e level.
CAT6a is a 10-Gigabit Ethernet over copper proposal to the CAT6 standard. The IEEE
published a draft standard (Std 802.3an) in October 2004.
The draft calls for 10-Gigabit data transmission over a 4-pair twisted-pair copper cable for a
distance of 100 meters on Class F or Class E-augmented copper cabling. The draft extends CAT6
electrical specifications from 250 MHz to 500 MHz. It also proposes a new measurement: Power-
Sum Alien Crosstalk to 500 MHz. Alien Crosstalk is a coupled signal in a disturbed pair arising
from a signal in a neighboring cable.
The TIA is working to complete a new specification that will define enhanced performance
standards for unshielded twisted pair cable systems. Draft specification ANSI/TIA/EIA-568-B.2-
10 specifies cable systems, called "Augmented Category 6" or more frequently as "Category 6a",
that operate at frequencies up to 500 MHz and will provide up to 10 Gbit/s bandwidth. The new
specification has limits on alien crosstalk in cabling systems.
Augmented Category 6 specifies cable operating at minimum frequency of 500 MHz, for both
shielded and unshielded. It can support future 10 Gb/s applications up to the maximum distance
of 100 meters on a 4- connector channel.
Within the networking market place the move towards the ratification of Category 6 Augmented
cabling is continuing, but with no firm standards set, it is a time to wait and see. Although a
number of companies have announced Cat6A products, it is clear that these are purely based on
proprietary systems, with a great deal of hope thrown in. The basic drive behind Cat6A is the
desire to support 10Gbps to the desk over the standard 100m. Although the current Cat6 standard
will support it up to 55m, this is not suitable for most organizations.
Category 7/class F
15
Category 7/Class F (ISO/IEC 11801:2002) specifies a frequency range of 1–600 MHz over 100
meters of fully shielded twisted-pair cabling. It encompasses four individually shielded pairs
inside an overall shield, called Shielded/Foiled Twisted Pair (S/FTP) or Foiled/ Foiled Twisted
Pair (F/FTP). There is a pending class Fa, based on the use of S/FTP cable to 1000 MHz. It can
support 10GBASE-T transmissions.
With both types of cable, each twisted pair is enclosed in foil. In S/FTP cable, all four pairs are
encased in an overall metal braid. In F/FTP, the four pairs are encased in foil.
Category 7/Class F cable can be terminated with two interface designs as specified in IEC 6063-7-
7 and IEC 61076-3-104. One is an RJ-45 compatible GG-45 connector. The other is the more
common TERA connector, which was launched in 1999.
Category 7/Class F is backwards compatible with traditional CAT6 and CAT5 cable, but it has far
more stringent specifications for crosstalk and system noise. The fully shielded cable virtually
eliminates crosstalk between the pairs. In addition, the cable is noise resistant, which makes the
Category 7/Class F systems ideal for high EMI areas, such as industrial and medical imaging
facilities. Category 7/Class F cable can also increase security by preventing the emission of data
signals from the cable to nearby areas.
16
RG 6 is generally a much better choice for your CATV, satellite, TV antenna, or broadband internet. RG
59 is generally better for most CCTV systems. What you really need to consider are the frequency ratings
your equipment uses. If your equipment uses higher frequencies (above 50 MHz), then you’ll
want to go with RG 6. If your frequencies are lower than that, then you’ll want to use RG 59.
RG59 Cable has been around for a long time. This cable used to be what most people used for their cable
TV connection. However, modern signal requirements have made this cable less popular in the last few
years. RG 59 has a smaller conductor than RG 6, which means that it can’t achieve the same signal
quality as RG 6. The way its shielding is designed also means that it doesn’t keep Gigahertz level signals
inside the conductor very well. This is why RG 59 probably isn’t a good choice for your TV or internet
connection.
RG 59 is good for lower frequency signals (anything under about 50 MHz). That makes it a good
choice for a closed circuit television (CCTV) video surveillance system. You can even make
your installation easier by getting what’s called “Siamese coaxial cable.” This cable consists of a
RG 59 cable merged together with a 2C power cable. By using this type of cable you can run the
power and video for your security cameras simultaneously, effectively cutting your install time
in half. Also some older HD TV’s still use lower frequencies (around 37 MHz), making RG 59 a
better choice for them.
17
RCA CABLE
RCA cables have been in existence since the early 1940s, connecting Victrola turntables to radio systems.
Since then, the cabling type has expanded into multichannel surround sound, video and digital audio
applications. Although the cable's essential construction varies little when used with these signal types,
limitations of the types change how far you can run an RCA cable before encountering signal
degradation.
18
RCA VIDEO CABLE/COMPONENT CABLE
Composite video (one channel) is an analog video transmission (without audio) that carries
standard definition video typically at 480i or 576i resolution. Video information
is encoded on one channel, unlike the higher-quality S-video (two channels) and the even higher-
quality component video (three or more channels).
Composite video is usually in standard formats such as NTSC, PAL, and SECAM and is
often designated by the initials CVBS, for color, video, blanking and sync, or simply as
video.
The component video connection on the back of your device will look something like
this.
19
A component video connection transmits a high quality analog video signal between devices. It
can transmit standard and high-definition image resolutions - although high-definition images
over this type of connection may be limited due to copyright restrictions.
It is a very common interface on all types of consumer audio-visual equipment.
It does not send any audio signals. You will need a separate audio connection if you are using
this to send the image. In this case, you would usually use a separate optical or coaxial audio
connection to send digital audio - or failing that a good old stereo analog connection.
VGA CABLE
P
i
20
Pin HSync Pin 15 ID3/SCL
13
Pin VSync
14
HDMI CABLE
HDMI type A
Pin 1
Pin 2 TMDS
Pin 3
Pin 4
Pin 5 TMDS
Pin 6
Pin 7
Pin 8 TMDS
Pin 9
Pin 10
21
HDMI (High-Definition Multimedia Interface) is a proprietary audio/video interface for
transmitting uncompressed video data and compressed or uncompressed digital audio data from
an HDMI-compliant source device, such as a display controller, to a compatible computer
monitor, video projector, digital television, or digital audio device.[4] HDMI is a digital
replacement for analog video standards.
22
Pin 8 GND Ground
23
Introduction to Connectors
RJ45 CONNECTOR
BNC CONNECTOR
A BNC connector allows our to connect your security camera to your DVR unit. BNC
24
connectors typically is just a term to express the industry standard for digital/analog signal
connection. All security cameras, DVRs, multiplexers, have these ends. The connectors below
all fit these connections. The major connections are twist-on-BNC-connectors, crimp-on-
BNC- connectors, and compression-BNC-connectors. The rest of the pieces are adapters and
they help end-users achieve the right connection, which enables them to render live video
feeds from their security cameras.
Crimp-on BNC connectors are available in two styles: 2 piece and 3 piece. The two piece
style is much more popular, so that is the type that we will discuss here. Installation using two
piece BNC crimp-on connectors requires two tools: a coax cable stripper and a coax crimping
tool. The attachment process takes a little longer than the other methods, but this is still a
favorite among professional installers because the connector stays very secure when done.
DC CONNECTOR
A DC connector (or DC plug, for one common type ofconnector) is an electrical connector for
supplying direct current (DC) power. Compared to domestic AC power plugs and sockets, DC
connectors have many more standard types that are not interchangeable.
CCTV BALUNS
CCTV video baluns, also known as UTP baluns, allow traditional coax cable to be replaced by
category 5 and other forms of twisted pair wire in CCTV video camera & surveillance
installations. Video baluns allow installers to use more cost effective structured cabling
techniques to wire security cameras. By using video baluns, UTP wire such as cat-5 can be run
over longer distances easier than coax cable and for less money. Active balun transceivers
enable UTP wires for cameras to be run distances up to 5,000 feet. If you are new to the idea
of using baluns for video, check out our video balun installation videos. CCTV Camera Pros
believes that we supply the best UTP video baluns on the market.
25
FIBER CONNECTOR(LC/APC/SL)
An optical fiber cable, also known as fiber optic cable, is an assembly similar to an
electrical cable, but containing one or more optical fibers that are used to carry light. The
optical fiber elements are typically individually coated with plastic layers and contained in
a protective tube suitable for the environment where the cable will be deployed.
Different types of cable[1] are used for different applications, for example long distance
telecommunication, or providing a high-speed data connection between different parts of a
building.
26
What is a Multimeter
A multimeter or Volt-Ohm meter, is a device used to measure voltage, current and resistance.
Multimeter might be analog type multimeters or digital multimeters, depending on the type of
circuit being used. Normally, these hand-held devices are very useful to detect faults or
provide field
measurements at a high degree of accuracy. They are one of the preferred tools by electricians
to troubleshoot electrical problems on motors, appliances, circuit, power supplies, and wiring
systems.
Analog multimeters are becoming obsolete as they are being replaced by digital multimeters.
Analog Multimeters
Analog multimeter is based on a micro ammeter that moves over a scale. Analog multimeters
although cheap, can be very difficult to read accurately, and they must be handled carefully,
because of you drop the meter, you are likely to damage it. Analog multimeter are not
accurate as a digital meter, when you are trying to use it as a voltmeter; however, analog
multimeters are great detecting slow voltage
changes, as you will the see the needle moving over the scale.
The best way to use an analog multimeter is when it is set as an ammeter, due to their low
resistance and high sensitivity, with scales down to 50µA.
Digital Multimeters
Digital multimeters are designed for electronics engineers, so many multimeters, might
contain features that probably you will not need ever. Digital meters will provide their output
on a LCD screen, and might cost more than analog multimeters.By turning the central knob,
you will be selecting the appropriate type of measurement you will me making. For example
when it is set to 20V DC, it means that 20 volts will be the maximum voltage that can be
measured, normally ideal for all circuits that you will build. If you would like to measure
smaller voltages then you should set your digital multimeter to the 2V or 200mV selection.
The digital multimeter is better when it is used as a voltmeter, because it resistance is much
higher, 1 M or 10 M, compared to 200 for an analogue multimeter on a similar range.
Occasionally, a digital multimeter will show voltage present when a circuit should not be
energized. The question is whether it's real and potentially dangerous voltage, or merely
'Ghost Voltage.' This kind of voltage is caused when energized circuits and non-energized
wiring are located in close proximity to each other.
27
RJ45 CABLE TESTER
Generally a basic cable tester is a battery operated portable instrument with a source of electric
current, one or more voltage indicators, and possibly a switching or scanning arrangement to
check each of several conductors sequentially. A cable tester may also have a microcontroller
and a display to automate the testing process and show the testing results, especially for
multiple-conductor cables. A cable tester may be connected to both ends of the cable at once, or
the indication and current source portions may be separated to allow injection of a test current at
one ond of a cable and detection of the results at the distant end. Both portions of such a tester
will have connectors compatible with the application, for example, modular connectors for
Ethernet local area network cables.A cable tester is used to verify that all of the intended
connections exist and that there are no unintended connections in the cable being tested. When
an intended connection is missing it is said to be "open". When an unintended connection exists
it is said to be a "short" (a short circuit). If a connection "goes to the wrong place" it is said to be
"miswired" (the connection has two faults: it is open to the correct contact and shorted to an
incorrect contact). [1]Generally, the testing is done in two phases. The first phase, called the
"opens test" makes sure each of the intended connections is good. The second phase, called the
"shorts test" makes sure there are no unintended connections.There are two common ways to
test a connection:A continuity test. Current is passed down the connection. If there is current the
connection is assumed to be good. This type of test can be done with a series combination of a
battery (to provide the current) and a light bulb (that lights when there is a current).A resistance
test. A known current is passed down the connection and the voltage that develops is measured.
From the voltage and current the resistance of the connection can be calculated and compared to
the expected value.There are two common ways to test for a short:A low voltage test. A low
power, low voltage source is connected between two conductors that should not be connected
and the amount of current is measured. If there is no current the conductors are assumed to be
well
isolated.A high voltage test. Again a voltage source is connected but this time the voltage is of
several hundred volts. The increased voltage will make the test more likely to find connections
that are nearly shorted since the higher voltage will cause the insulation of nearly shorted wires
to break down.Signal testers
28
RJ45 TONER/TRAISER
29
Peripheral items For CCTV
MIC
MONITOR
SPEAKER
TV
RACK
30
Video parameters
VIDEO RESOLUTIONS
31
Cctv parameters
FOCAL LENGTH(FIXED AND VARIABLE)
LENS
CCD stands for charge-coupled device; CMOS stands for complimentary metal-oxide
semiconductor. These are the chips onto which the light captured by a camcorder's lens is focused.
LUX(UNIT OF LIGHT)
The lux (symbol: lx) is the SI derived unit of illuminance and luminous emittance, measuring
luminous flux per unit area.[1] It is equal to one lumen per square meter. In photometry, this is used
as a measure of the intensity, as perceived by the human eye, of light that hits or passes through a
surface. It is analogous to the radiometric unit watt per square meter, but with the power at each
wavelength weighted according to the luminosity function, a standardized model of human visual
brightness perception. In English, "lux" is used as both the singular and plural form.
IR
Infrared security cameras have the capability to capture video in low light and no light (0 Lux) areas.
Infrared cameras (IR) are sometimes referred to as IR cameras or "Night Vision Security Cameras"
32
because of this. Infrared cameras have IR LEDs positioned around the outer edges of the camera lens
which gives the camera its "Night Vision".
Infrared Cameras can capture acceptable video in total darkness and even better quality video in
low light. Even a small amount of ambient light helps the overall night vision capability of IR
cameras a lot. IR cameras are available in various body styles, such as dome and bullet styles.
There are also specialty cameras such as license plate recognition (LPR cameras). Please select
from the below sub-categories or browse all camera types below. CCTV Camera Pros also sells
Infrared.
33
10,000–25,000 Full daylight (not direct sun)[3]
Cctv Features
WB
34
AG
35
DNR
IP UNITS
he IP value indicates the degree to which electrical appliances like lighting fixtures are
protected against solid objects or materials, and water. The IP value always consists of two
digits.
The first digit indicates the protection against solid objects or materials. The second digit
indicates the degree to which the fixture is protected against water.
Logically it makes sense that when the appliance is well protected against water, it is also hard
for solid objects to invade the appliance. A high second digit is therefor always accompanied
with a high first digit.
A lighting fixture you want to install in the bathroom logically asks a higher IP value. The
bathroom can be divided into four imaginary safety zones each with their own requirements in
terms of IP value.
WHERE DO ALL THESE DIGITS STAND FOR EXACTLY?
The first IP digit:
IP 0x = No protection.
IP 1x = Protected against objects with a diameter over 50mm (e.g. accidental touch by person’s
hand).
IP 2x = Protected against solid objects with a diameter over 12mm (e.g. a person’s fingers).
IP 3x = Protected against solid objects with a diameter over 2,5mm (e.g. wires and tools).
IP 4x = Protected against solid objects with a diameter over 1mm (e.g. wires and tools).
IP 5x = Complete protection against touching voltage carrying parts (i.e. wiring) and
harmful accumulation of dust. Ingress of dust is possible but will not harm the working.
IP 6x = Complete protection against touching voltage carrying parts (i.e. wiring) and ingress of
dust.
The second IP digit:
IP x0 = No protection.
IP x1 = Protected against vertically falling drops of water.
IP x2 = Protected against drops of water up to 15° from the vertical.
IP x3 = Protected against direct water sprays up to 60° from the vertical.
IP x4 = Protected against water sprays from all directions.
IP x5 = Protected against low pressure jets of water from all directions.
IP x6 = Protected against strong jets of water from all directions.
IP x7 = Protected against the effects of temporary immersion between 15cm and 1m. Duration
of test: 30 min.
IP x8 = Protected against long periods of immersion under pressure.
IK UNITS
Different applications have different priorities regarding clarity of the image, data volumes, and
processing power – for example identification evidence has a different picture quality
requirement compared to monitoring the length of a queue. So if you are selecting digital
equipment, you’ll need to select the compression format that suits the network or the application
you are installing.
37
Different sorts of compression are described as lossless or lossy. In general, the less compression
the better the playback and recorded image, so naturally in that sense lossless is always better
than lossy; however, less compression means more data to be transmitted and stored, and thus
incurs higher system costs.
Compression reduces the signal in three ways. The first is by various mathematical tricks that are
lossless to the image, and can be reversed at the time of display so that the full image is viewed.
The second is to remove parts of the signal that are redundant to human viewing of the image.
The third method is to start to visibly reduce image quality – definition, frames per second, and
colour range – and it is this type of compression that is called lossy.
The compression formats used in CCTV vary by manufacturer and by product. But the four most
commonly used compression formats are:
H264
Motion JPEG, also written M-JPEG or M-JPG
Wavelet™
MPEG, also written mpg
H264
H264 is a digitisation and compression scheme for analogue video. It is widely used in video
conferencing and is aimed at providing digitised video at a bit rate of 64Kbps-1Mbps, which is
the bandwidth range of public data networks.
Compression rates as high as 2500:1 are achieved, but of course at the cost of quality. The format
is good for high frame rates, showing movement, but the resolution of those frames is not high.
This is not good if, say, person identification images are required. But if the application is a non-
security application such as video-conferencing, the quality is likely to be adequate.
Uniquely among the compression formats discussed here, H264 encoded signals can also be
decoded or decompressed by reversing the process(es) from a valid reference or I-Frame. That
means you can get back to the original high quality if you ever need to.
An advantage of Motion JPEG is that, because it is based on still images, it can produce any of its
frames as a
single image for identification purposes. As we will explain, some compression techniques
cannot provide such
images.
HDD STORAGE CALCULATION
Yes, the online CCTV storage calculator software can give you quick answers to the CCTV
storage needs.
But the results are far from preciseness – different CCTV storage calculators can provide you
divergent outcomes. More importantly, they don’t apply to EVERYONE.
So we have got this DIY CCTV storage calculation formula for you to calculate the CCTV
camera and DVR storage on your own:
Storage Space (GB) = Bitrate (Kbps) * 1000/8 * 3600 * 24 * Cameras * Days/1000 000 000
38
For example, if you have 2 cameras whose maximum bitrate is 1024 Kbps and you want to
record for 7 days nonstop, the required storage space = 1024 * 1000/8 * 3600 * 24 * 2 *
7/1000 000 000 = 154.8288 GB
39
PTZ
A pan–tilt–zoom camera (PTZ camera) is a camera that is capable of remote directional and
zoom control. In television production, PTZ controls are used with professional video cameras
in television studios, sporting events, and other spaces. They are commonly referred to as robos,
FISH EYE
A fisheye lens is an ultra wide-angle lens that produces strong visual distortion intended to
create a wide panoramic or hemispherical image.[1][2] Fisheye lenses achieve extremely wide
angles of view. Instead of producing images with straight lines of perspective (rectilinear
images), fisheye lenses use a special mapping (for example: equisolid
angle), which gives images a characteristic convex non-rectilinear appearance.
NVR: Acronym for Network Video Recorder. An NVR can be a PC-based or embedded
system used for centralized management and storage for IP cameras, IP Domes and other
DVRs.
PAL: Acronym for Phase Alternating Line. PAL is also another video standard used in broadcast
televisions systems in large parts of the world. PAL signal contains 625 scan lines at 50Hz.
PTZ: Acronym for Pan, Tilt, Zoom. PTZ cameras are motor driven systems that allow the
camera to pan left and right, tilt up and down and zoom in and out.
• USB: Acronym for Universal Serial Bus. USB is a plug-and-play serial bus standard to
interface devices to a host computer.
41
DS-2CD2125FWD-I
2 MP Ultra-Low Light Outdoor Network Dome Camera
Up to 2 MP High Resolution
Full 1080p @30 fps
2.8 mm / 4 mm / 6 mm / 8 mm Fixed Lens Options
Ultra-Low Light, 0.008 lux, DarkFighter Technology
H.265+, H.265, H.264+, H.264
120dB Wide Dynamic Range
3D Digital Noise Reduction
12 VDC & PoE (802.3af)
EXIR 2.0 with up to 100 ft (30 m) IR Range
MicroSD card slot supports up to 128 GB
IP67, IK10 Protection
3-Axis Adjustment
42
Types of Biometric
Face recognition
Of the various biometric identification methods, face recognition is one of the most
flexible, working even when the subject is unaware of being scanned. It also shows
promise as a way to search through masses of people who spent only seconds in front
of a "scanner" - that is, an ordinary digital camera.
Face recognition systems work by systematically analyzing specific features that are
common to everyone's face - the distance between the eyes, width of the nose, position
of cheekbones, jaw line, chin and so forth. These numerical quantities are then
combined in a single code that uniquely identifies each person.
Fingerprint identification
Fingerprints remain constant throughout life. In over 140 years of fingerprint
comparison worldwide, no two fingerprints have ever been found to be alike, not even
those of identical twins. Good fingerprint scanners have been installed in PDAs like
the iPaq Pocket PC; so scanner technology is also easy. Might not work in industrial
applications since it requires clean hands.
Fingerprint identification involves comparing the pattern of ridges and furrows on the
fingertips, as well as the minutiae points (ridge characteristics that occur when a ridge
splits into two, or ends) of a specimen print with a database of prints on file.
Hand geometry biometrics
Hand geometry readers work in harsh environments, do not require clean
conditions, and forms a very small dataset. It is not regarded as an intrusive kind
of test. It is often the authentication method of choice in industrial environments.
Retina scan
There is no known way to replicate a retina. As far as anyone knows, the pattern of
the blood vessels at the back of the eye is unique and stays the same for a lifetime.
However, it requires about 15 seconds of careful concentration to take a good scan.
Retina scan remains a standard in military and government installations.
Iris scan
43
Like a retina scan, an iris scan also provides unique biometric data that is very
difficult to duplicate and remains the same for a lifetime. The scan is similarly
difficult to make (may be difficult for children or the infirm). However, there are
ways of encoding the iris scan biometric data in a way that it can be carried around
securely in a "barcode" format. (See the SF in the News article Biometric
Identification Finally Gets Started for some detailed information about how to
perform an iris scan.)
Signature
A signature is another example of biometric data that is easy to gather and is not
physically intrusive. Digitized signatures are sometimes used, but usually have
insufficient resolution to ensure authentication.
Voice analysis
Like face recognition, voice biometrics provide a way to authenticate identity without
the subject's knowledge. It is easier to fake (using a tape recording); it is not possible
to fool an analyst by imitating another person's voice.
3. Finger print
4. Retina Authenticating
RFID CARD (SMART CARD) RADIO FREQUENCY IDENTIFICATION READER (RFID READER)
RFID methods utilize radio waves to accomplish this. At a simple level, RFIDsystems consist
of three components: an RFID tag or smart label, an RFID reader, and an antenna. RFID tags
contain an integrated circuit and an antenna, which are used to transmit data to the RFID
reader (also called an interrogator).
Passive RFID systems use tags with no internal power source and instead are powered by the
electromagnetic energy transmitted from an RFID reader. Passive RFID tags are used for
applications such as access
44
control, file tracking, race timing, supply chain management, smart labels, and more. The
lower price point per tag makes employing passive RFID systems economical for many
industries.
Active RFID systems use battery-powered RFID tags that continuously broadcast their own
signal. Active RFID tags are commonly used as “beacons” to accurately track the real-time
location of assets or in high-speed environments such as tolling. Active tags provide a much
longer read range than passive tags, but they are also much more expensive.
Basics of Access control
Relay Concept
A relay is an electromagnetic switch operated by a relatively
small electric current that can turn on or off a much larger electric current. The heart of a
relay is an electromagnet (a coil of wire that becomes a temporary magnet when electricity
flows through it). You can think of a relay as a kind of electric lever: switch it on with a tiny
current and it switches on ("leverages") another appliance using a much bigger current. Why
is that useful? As the name suggests, many sensors are incredibly sensitivepieces of
electronic equipment and produce only small electric currents. But often we need them to
drive bigger pieces of apparatus that use bigger currents. Relays bridge the gap, making it
possible for small currents to activate larger ones. That means relays can work either as
switches (turning things on and off) or as amplifiers (converting small currents into larger
ones).
45
NO is normally open i.e. the contacts are normally open and close when the switch is
actuated. NC is normally closed i.e. the contacts are normally closed and open when the
switch is actuated. 1NO1NC is generally used to describe contactors (industrial power
relays) and manual switches like emergency stop buttons
So in the end fail secure means that if the power is interrupted or fails, the door stays locked.
That's why it's called "secure": It's default state is locked or secured. So a fail secure lock locks
the door when power is removed.
Often fail secure locks are used for IT rooms or other sensitive areas. However because the
door keeps being locked in emergencies, typically it will be usable with a mechanical override,
such as a regular key. However this is also a way of getting in the door without leaving any
electronic traces. This is why the use of mechanical override keys is often restricted to only a
few people who are highly restricted in use, naturally that would be to complex for too many
members to operate.
Fail secure locks are used for fire related doors or staircase (stairwell) doors. The reason is that
in case of fire, those doors should remain closed to seal off a portion of the space and help
reduce spreading of the fire.
FAIL SAFE
When looking at fail safe locks this means that it's default state is actually unlocked. To keep it
locked during normal business operations, power is applied. Should the power be interrupted
or fail, the door automatically
unlocks or releases to let people out of the space. That's why it's called "safe"
46
- it's safe for people - not the space!
Mostly fail safe locks are used for main entry points like office doors or lobby access doors. A
popular use for this application are maglocks which - by design - require power to operate.
Peripheral items for Access control
Magnetic Locks
An electromagnetic lock, magnetic lock, or maglock is a locking device that consists of
an electromagnet and an armature plate. There are two main types of electric locking
devices. Locking devices can be either "fail safe" or "fail secure". A fail-secure locking
device remains locked when power is lost. Fail-safe locking devices are unlocked when de-
energized. Direct pull electromagnetic locks are inherently fail-safe. Typically the
electromagnet portion of the lock is attached to the door frame and a mating armature plate
is attached to the door. The two components are in contact when the door is closed. When
the electromagnet is energized,
a current passing through the electromagnet creates a magnetic flux that causes the
armature plate to attract to the electromagnet, creating a locking action. Because the
mating area of the electromagnet and armature is relatively large, the force created by the
magnetic flux is strong enough to keep the door locked even under stress.
Door Contact
47
Contact sensors tell your system if something is open or closed.
They're typically installed on doors, windows or drawers throughout the house. They have
two pieces: one installed on the door itself; the other installed next to it on the jamb. When
the door is opened and the pieces move apart, the sensor signals ‘open' to your security
system.
Card Reader
Time and attendance systems (TNA) are used to track and monitor when employees start
and stop work. A time and attendance system provides many benefits to organizations as it
enables an employer to have full control of their employees working hours as it monitors
late arrivals, early departures, time taken on breaks and absenteeism [1]. It also helps to
control labor costs by reducing over-payments, which are often caused by paying
48
employees for time that are not working, and eliminates transcription error, interpretation
error and intentional error. TNA systems are also invaluable for ensuring compliance with
labor regulations regarding proof of attendance.
All of these benefits provide both employer and employees with confidence in the accuracy
of their wage payments all while improving productivity.
Modern automated time and attendance systems like ClockIt simply require employees to
touch or swipe to identify themselves and record their working hours as they enter or
leave the work area. Originally this consisted of using a RFID electronic tag or a barcode
badge but these have been replaced by bio-metrics(vein reader, hand geometry,
fingerprint, or facial recognition), and touch screens devices. Modern biometric TNA
systems offer additional benefits[2] over traditional manual systems which include
Faster processing of employees as attendance can be recorded with just one touch or a
quick scan
Fraud prevention by eliminating duplicate and fake registration
Saves time as attendance can either be integrated directly with your payroll system or
it can produce a report that can be downloaded or printed
Improves punctuality and reduces long breaks and absenteeism
49
Detects body heat (infrared energy). Passive infrared sensors are the most widely used
motion in home security systems. When your system is armed, your motion sensors are
activated.
Once the sensor warms up, it can detect heat and movement in the surrounding areas,
creating a protective "grid." If a moving object blocks too many grid zones and the
infrared energy levels change rapidly, the sensors are tripped.
MircoWave (MW):
Sends out microwave pulses and measures the reflection off a moving object. They cover a
larger area than infrared sensors, but they are vulnerable to electrical interference and are
more expensive.
Dual Technology Motion Sensors:
Motion sensors can have combined features in an attempt to reduce false alarms. For
example, a passive infrared (PIR) sensor could be combined with a microwave sensor.
Since each operates in different areas of the spectrum, and one is passive and one is active,
Dual Technology motion sensors are not as likely as other types to cause false alarms,
because in order for the alarm to be triggered, both sensors have to be tripped. However,
this does not mean that they never cause false alarms.
Area Reflective Type:
Emits infrared rays from an LED. Using the reflection of those rays, the sensor measures
the distance to the person or object and detects if the object is within the designated area.
Ultrasonic:
50
Sends out pulses of ultrasonic waves and measures the reflection off a moving object.
Vibration:
Detects vibration. These can be purchased or easily made at home. A homemade vibration
sensor uses a small mass on a lever, which is activated by a switch to an alarm when it
vibrates. Homemade motion sensors can work, but they can also be unreliable.
Smoke Detector
51
reducing the flow of current and activating the alarm.
Photoelectric smoke alarms are generally more responsive to fires that begin
HTML 5
Introduction:
HTML stands for Hyper Text Markup Language. It is used to design web pages using a markup
language. HTML is an abbreviation of Hypertext and Markup language. Hypertext defines the
link between the web pages. The markup language is used to define the text document within
the tag which defines the structure of web pages. HTML 5 is the fifth and current version of
HTML. It has improved the markup available for documents and has introduced application
programming interfaces(API) and Document Object Model(DOM).
Features:
It has introduced new multimedia features which support audio and video controls by
using <audio> and <video> tags.
There are new graphics elements including vector graphics and tags.
Enrich semantic content by including <header> <footer>, <article>, <section> and
<figure> are added.
Drag and Drop- The user can grab an object and drag it further dropping it to a new location.
Geo-location services- It helps to locate the geographical location of a client.
Web storage facility which provides web application methods to store data on the web browser.
Uses SQL database to store data offline.
52
Allows drawing various shapes like triangle, rectangle, circle, etc.
Capable of handling incorrect syntax.
Easy DOCTYPE declaration i.e. <!doctype html>
Easy character encoding i.e. <meta charset=”UTF-8″>
Removed elements from HTML 5: There are many elements which are depreciated from HTML 5
are listed below:
Removed
Elements Use Instead Elements
<acronym> <abbr>
<applet> <object>
<basefont> CSS
<big> CSS
<center> CSS
<dir> <ul>
<font> CSS
<frame>
<frameset>
<noframes>
<isindex>
<tt> CSS
53
<article>: The <article> tag is used to represent an article. More specifically, the content within
the <article> tag is independent from the other content of the site (even though it can be related).
<aside>: The <aside> tag is used to describe the main object of the web page in a shorter way like
a highlighter. It basically identifies the content that is related to the primary content of the web page
but does not constitute the main intent of the primary page. The <aside> tag contains mainly author
information, links, related content and so on.
<figcaption>: The <figcaption> tag in HTML is used to set a caption to the figure element in a
document.
<figure>: The <figure> tag in HTML is used to add self-contained content like illustrations,
diagrams, photos or codes listing in a document. It is related to main flow but it can be used in any
position of a document and the figure goes with the flow of the document and if remove it then it
should not affect the flow of the document.
<header>: It contains the section heading as well as other content, such as a navigation links, table
of contents, etc.
<footer>: The <footer> tag in HTML is used to define a footer of HTML document. This section
contains the footer information (author information, copyright information, carriers etc.). The footer
tag are used within body tag. The <footer> tag is new in the HTML 5. The footer elements require a
start tag as well as an end tag.
<main>: Delineates the main content of the body of a document or web app.
<mark>: The <mark> tag in HTML is used to define the marked text. It is used to highlight the
part of the text in the paragraph.
<nav>: The <nav> tag is used to declaring the navigational section in HTML documents. Websites
typically have sections dedicated to navigational links, which enables user to navigate the site. These
links can be placed inside a nav tag.
<section>: It demarcates a thematic grouping of content.
<details>: The <details> tag is used for the content/information which is initially hidden but could be
displayed if the user wishes to see it. This tag is used to create interactive widget which user can open
or close it. The content of details tag is visible when open the set attributes.
<summary>: The <summary> tag in HTML is used to define a summary for the <details> element.
The <summary> element is used along with the <details> element and provides a summary visible to
the user. When the summary is clicked by the user, the content placed inside the <details> element
54
becomes visible which was previously hidden. The <summary> tag was added in HTML 5. The
<summary> tag requires both starting and ending tag.
<time>: The <time> tag is used to display the human-readable data/time. It can also be used to
encode dates and times in a machine-readable form. The main advantage for users is that they can
offer to add birthday reminders or scheduled events in their calendar’s and search engines can
produce smarter search results.
<bdi>: The <bdi> tag refers to the Bi-Directional Isolation. It differentiate a text from other text that
may be formatted in different direction. This tag is used when a user generated text with an unknown
directions.
<wbr>: The <wbr> tag in HTML stands for word break opportunity and is used to define the position
within the text which is treated as a line break by the browser. It is mostly used when the used word is
too long and there are chances that the browser may break lines at the wrong place for fitting the text.
<datalist>: The <datalist> tag is used to provide autocomplete feature in the HTML files. It can be
used with input tag, so that users can easily fill the data in the forms using select the data.
<keygen>: The <keygen> tag in HTML is used to specify a key-pair generator field in a form. The
purpose of <keygen> element is to provide a secure way to authenticate users. When a from is
submitted then two keys are generated, private key and public key. The private key stored locally, and
the public key is sent to the server. The public key is used to generate client certificate to authenticate
user for future.
<output>: The <output> tag in HTML is used to represent the result of a calculation performed by the
client-side script such as JavaScript.
<progress>: It is used to represent the progress of a task. It is also define that how much work is done
and how much is left to download a things. It is not used to represent the disk space or relevant query.
<svg>: It is the Scalable Vector Graphics.
<canvas>: The <canvas> tag in HTML is used to draw graphics on web page using JavaScript. It can
be used to draw paths, boxes, texts, gradient and adding images. By default it does not contains
border and text.
<audio>: It defines the music or audio content.
<embed>: Defines containers for external applications (usually a video player).
<source>: It defines the sources for <video> and <audio>.
<track>: It defines the tracks for <video> and <audio>.
55
<video>: It defines the video content.
Advantages:
Disadvantages:
Long codes have to be written which is time consuming.
Only modern browsers support it.
Supported Browsers: It is supported by all modern browsers.
Below examples illustrate the HTML 5 content.
Example 1:
html
<!DOCTYPE html>
<html>
<head>
<title>HTML 5</title>
<style>
h1 {
font-size:50px;
}
</style>
</head>
<body>
<h1>Aliyu Baba</h1>
</body>
</html>
Output:
Aliyu Baba
Example 2:
html
<!DOCTYPE html>
56
<html>
<head>
<title>HTML 5 Demo</title>
<style>
.GFG {
font-size:40px;
font-weight:bold;
color:green;
}
body {
text-align:center;
}
</style>
</head>
<body>
<div class = "GFG">Aliyu Baba</div>
<aside>
<div>A computer science porta</div>
</aside>
</body>
</html>
Output:
Aliyu baba
A computer science portal
57
CHAPTER FIVE
EXPERIENCE ACQUIRED
I acquired a strategic understanding of how different network operates in real life and how
important it is for a professional to understand their core offerings needs and objectives in order
to deliver the overall goal.
This work experience gave me confidence to know that I am well suited for a profession and
combined with my constant effort to learn more on my own, and it was a great learning
experience.
SUMMARY
The SIWES program are all about straitening future employees. Such program is successful
attempt to help students to understand the underlying principle of their future work. After passing
the program, the student can concentrate on the really necessary factors of his work.
RECOMMENDATION
The Students Industrial Work Experience scheme has provided me an outstanding opportunity to
acquire a set of technical skills that I have not acquired at school taking a series of unit credit
courses. During my training I grab enough of understanding through the concept of networking as
well as knowing which network will be suited to a particular requirement
I would like to recommend that information and communication technology (ICT), curriculum in
Yusuf Maitama Sule University-Kano, be adjusted such as would provide going on industrial
attachment for a longer period of time as opposed to six months or making the program to occur
twice throughout Information and Communications Technology degree program.
CONCLUSION
The industrial work experience scheme (S.I.W.E.S) is an important program that brings about
improvement to students in the field of work (SIWES), and also make student to be self-
confidence and to withstand industrial work. The training as afforded me the basic practical &
theoretical knowledge that I may not have gotten from the lecture room. It also gave me the
58
opportunity to have a ford of what it would be live when I would be working after graduation.
Confidently Saying, the experience gotten from this training was a worthwhile experience.
The sides program has made it possible to apply the theoretical knowledge in real work situation
especially as it concerns programing
REFERENCE
1. Yusuf Maitama Sule University – Kano (students hand book)
2. guidelines for SIWES oral presentation and technical report ©dept. of computer science 2019
3. cisco networking online courses
4. https://punchyinfo.com/history-of-siwes-in-nigeria/#The_Background
5. vlado Damjanovski, CCTV networking and digital technology
59