In short, each time I receive such messages, I try to reply as soon as possible to prevent and possibly reduce the failure rate in this programme. Just read on! The report should give succinct details of all work-related activities that took place in the place of industrial attachment. The dedication page is mostly for appreciation and thanks to your creator, parents, guardians, sponsors etc.

Author:Nagrel Felabar
Language:English (Spanish)
Genre:Health and Food
Published (Last):22 August 2008
PDF File Size:18.67 Mb
ePub File Size:3.96 Mb
Price:Free* [*Free Regsitration Required]

Adeniran Obafemi O. I therefore submit the report work as partial fulfillment of the requirements for the student industrial work experience scheme of the University of Ibadan. Yours sincerely, Adeniran Obafemi.

The company is staffed with hardworking, resilient, intelligent and hospitable personnels. The sale and installation of various security devices are carried out by experts at Aitek Network Systems Limited. Devices like the smoke detectors, satellite televisions, cctv, camera, motion detectors, fire alarm systems, network systems to mention a few are sold and installed by capable engineers and technicians. However, there is the administrative section consisting of the secretary, receptionist, cleaners, drivers, personal assistant and the managing director.

All other staffs are transported to the site to ensure services are procured to customers. An enormous amount of physical and intellectual strength is required to survive on site at the engineering firm.

Almost all the installation processes involves a great deal of cabling that is running of cable through trunkings, pvc pipes or ebonite tubes. Also, cables are run through manholes from metal boxes or adaptable boxes. The basic tools often used are the fishing tapes, draw ropes, drillings machines, screws, screwdrivers, mallet, chisel, cables, connectors, masking tapes, multimeter, cutter to mention a few.

As we all know, our society is in jeopardy as far as security is concerned, this calls for the installation of security systems by experts. Systems such as the fire alarm systems, cameras, motion detectors, smoke and heat detectors etc serve to reduce if not to completely eliminate impending hazards This report treats in details some other systems such as the network system LAN and so on.

I am greatly indebted to my parents, Mr and Mrs Adeniran for their financial and moral support during the course of the programme and my uncle, Mr Omofoyewa for his hospitality and fatherly care towards ensuring that my industrial training was a worthwhile and fulfilling one. I also want to thank everyone that contributed to the success of my industrial training; my industrial supervisors, my colleagues, co-workers and my relatives.

In general, a fire alarm system is either classified as automatic, manually activated, or both. The basic modern system consists of a dependable primary power supply, a secondary or backup power supply, any number of "initiating devices" and "notification appliances. However, the use of fire alarm system in buildings and campuses in Nigeria is not encouraging at all. The panel then processes the information to trigger output devices which are usually bells, horns, or strobes.

Panels usually have a number of loops within the range of two to 20 loops. At the present time, four or six loop panels are the most common.

Each loop can have a number of devices connected to it. Each device has its own address, and so the panel knows the state of each individual device connected to it. There are three types of panels: coded panels, conventional panels, and addressable panels. In non-residential applications, a branch circuit dedicated to the fire alarm system and its constituents. Notification Appliances: This component uses energy supplied from the fire alarm system or other stored energy source, to inform the proximate persons of the need to take action, usually to evacuate.

Example of notification appliance is sounders. Residents and workers in that environment are meant to know their locations and suitability for use on various types of fires e. Fire Extinguishers Extinguishers are only suitable to use on fires in their incipient stages small or beginning. Fire extinguishers are grouped into five classes:.

The self-closing mechanism is in operational order. The door should close automatically and they should not be held open by wedges, rocks, chairs, etc. Their immediate surroundings should be kept neat. Resettable call point. General information on call points Based on a micro controller and is being equipped with a short circuit isolator, the resettable FN digital manual call point is used o manually initiate an addressed fire prevention systems.

The FM is able to store automatically into its non volatile memory, thirty measures before and thirty measures after the alarm condition. These measures can be displayed in graphic or in text mode on the control panel monitor.

This features is very important to understand what has happened before and after the alarm condition has been detected.

The FN is a resettable manual call point. The alarm condition will be initiated by pressing on the operating face of the manual call point. Resetting of the alarm condition is affected by inserting the supplied key in the slit and pulling as shown in fig below.

A lead section of 1. Precaution should be taken not to use cables that exceed these limits; Maximum resistance of lower Maximum capacitance of 2mf The dectoneal connection must be performed by removing approaximately 10mm of insolating cover from the main lead and insert it on the terminal block. The FM is only to be used with ELKRON FAP series control panels Testing trained personnel of call points It is required that before testing competent authorities are withe field that the system is stemporarily out of service due to maintenance operations.

At the end of testing operations, restore the system to normal operation and notify the status to the competent authorites. Each computer on the network has access to the files and peripheral equipment such as printers or modems on all the other computers on the network.

The origin of local area networks can be traced, in part, to IBM terminal equipment introduced in At that time, IBM introduced a series of terminal devices designed for use in transaction-processing applications for banking and retailing.

What was unique about those terminals was their method of connection: a common cable that formed a loop provided a communications path within a localized geographical area.

Unfortunately, limitations in the data transfer rate, incompatibility between individual IBM loop systems, and other problems precluded the widespread adoption of this method of networking.

The economics of media sharing and the ability to provide common access to a centralized resource were, however, key advantages, and they resulted in IBM and other vendors investigating the use of different techniques to provide a localized communications capability between different devices. Since then, hundreds of companies have developed local area networking products, and the installed base of terminal devices connected to such networks has increased exponentially.

They now number in the hundreds of millions. Designing a manageable network One of the most important considerations in designing a network to be manageable is deciding how and where to connect the network-management equipment. Is there a separate network-management center to accommodate?

Do nonoperational staff members like the network designer sit in a different area? Do they require access to the network-management center's equipment through the network?

In general, the design should include a separate virtual local area network VLAN just for network-management equipment. The management VLAN was used to access management functions on remote network equipment.

This network management-equipment VLAN houses servers and workstations used to manage the network. Design Types A large-scale network design is composed of several common building blocks. Every LAN, of whatever size, has to have an access system by which the end stations connect to the network. As a philosophical principle, the network should be built using basic commonly available technology. The design shouldn't have to reinvent any wheels just to allow the machines to talk to one another.

So, just as basic commonly available technologies exist for connecting end stations to LANs, there are common methods for interconnecting LAN segments. Once again, these technologies and methods should involve the most inexpensive yet reliable methods. But in this stage of interconnecting, aggregating, and distributing traffic between these various LAN segments, the designer may run into some serious hidden problems.

There may be thousands of ways to connect things, but most of these methods result in some kind of reliability problems. Network topology The topology of a local area network is the structure or geometric layout of the cable used to connect stations on the network.

Unlike conventional data communications networks, which can be configured in a variety of ways with the addition of hardware and software, most local area networks are designed to operate based on the interconnection of stations that follow a specific topology. The most common topologies used in LANs include the loop, bus, ring, star, and tree, as illustrated in the figure below Loop As previously mentioned, IBM introduced a series of transaction-processing terminals in that communicated through the use of a common controller on a cable formed into a loop.

This type of topology is illustrated at the top of Figure below. Local area network topology. The five most common geometric layouts of LAN cabling form a loop, bus, ring, star, or tree structure. Because the controller employed a poll-and-select access method, terminal devices connected to the loop require a minimum of intelligence. Although this reduced the cost of terminals connected to the loop, the controller lacked the intelligence to distribute the data flow evenly among terminals.

A lengthy exchange between two terminal devices or between the controller and a terminal would thus tend to weigh down this type of network structure. A second problem associated with this network structure was the centralized placement of network control in the controller. If the controller failed, the entire network would become inoperative.

Due to these problems, the use of loop systems is restricted to several niche areas, and they are essentially considered a derivative of a local area network. Bus In a bus topology structure, a cable is usually laid out as one long branch, onto which other branches are used to connect each station on the network to the main data highway. Although this type of structure permits any station on the network to talk to any other station, rules are required for recovering from such situations as when two stations attempt to communicate at the same time.

Ring In a ring topology, a single cable that forms the main data highway is shaped into a ring. As with the bus topology, branches are used to connect stations to one another via the ring.

A ring topology can thus be considered to be a looped bus. Typically, the access method employed in a ring topology requires data to circulate around the ring, with a special set of rules governing when each station connected to the network can transmit data. Star The fourth major local area network topology is the star structure, illustrated in the lower portion of Figure 1.

In a star network, each station on the network is connected to a network controller. Then, access from any one station on the network to any other station can be accomplished through the network controller.

Here, the network controller functions like a telephone switchboard, because access from one station to another station on the network can occur only through the central device. In fact, you can consider a telephone switchboard or PBX as representing a star-structured LAN whose trunks provide connections to the wide area network telephone infrastructure. Tree A tree network structure represents a complex bus.

In this topology, the common point of communications at the top of the structure is known as the head-end. From the head-end, feeder cables radiate outward to nodes, which in turn provide workstations with access to the network.

There may also be a feeder cable route to additional nodes, from which workstations gain access to the network. One common example of a tree structure topology is the cable TV network many readers use on a daily basis.

With the upgrade introduction to networking of many cable TV systems to two-way amplifiers and the support of digital transmission, the local cable TV infrastructure can be considered to represent an evolving type of tree-structured local area network. Mixed Topologies Some networks are a mixture of topologies.



This is useful and will help me in writing siwes report for my level program. Thank you Siwes Report. Kindly re-share to to your course mates so that they benefit too. Home About Contact.


How To Write SIWES Technical Report

To browse Academia. Skip to main content. By using our site, you agree to our collection of information through the use of cookies. To learn more, view our Privacy Policy. Log In Sign Up. The work contained here is original and entirely executed by the above named student.


How To Easily Write A Good & Presentable I.T/SIWES Report

An Industrial Training report should be prepared for each period of approved employment. Development of skills in dealing with people, and communication skills form part of the training experience. Students should seek advice from their employers to ensure that no confidential material is included into the report. The student should be able to present the report to prospective employers, as a complement to their degree. The following should be observed:. References should be made in the text to books, technical papers, standards etc. Finally, a conclusion should include comprehensive comments on the type and value of experience gained, and how this relates to your professional career.


Adeniran Obafemi O. I therefore submit the report work as partial fulfillment of the requirements for the student industrial work experience scheme of the University of Ibadan. Yours sincerely, Adeniran Obafemi. The company is staffed with hardworking, resilient, intelligent and hospitable personnels. The sale and installation of various security devices are carried out by experts at Aitek Network Systems Limited. Devices like the smoke detectors, satellite televisions, cctv, camera, motion detectors, fire alarm systems, network systems to mention a few are sold and installed by capable engineers and technicians.

Related Articles