SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
STUDENTS’ INDUSTRIAL TRAINING/SIWES
REPORT
PRESENTED BY
EKEH GERALD CHIDUBEM
NOU131848181
OF
THE DEPARTMENT OF B.Sc. IN
MATHEMATICS/COMPUTER SCIENCE
FACULTY OF SCIENCE AND TECHNOLOGY
NATIONAL OPEN UNIVERSITY OF NIGERIA
(AWKA STUDY CENTER)
300 LEVEL
AT
FUTURE TECHNOLOGY
UMUDUNNU VILLAGE ABAGANA,
ANAMBRA STATE, NIGERIA.
NOVEMBER 2016.
ABSTRACT
Practical knowledge is no doubt very essential in every field
of study especially in Mathematics/Computer Science because
it gives an insight or better still, it exposes one to the
challenges we likely face in your working place in future after
graduation. A better society will be built if students are
allowed to engage in doing practically what they have learnt
so far in their institutions rather than theory throughout
because such knowledge will serve as a blueprint for any
other steps he/she wishes to take and also to prepare them for
future technology development.
ACKNOWLEDGEMENT
Am most grateful to Almighty God for making it divinely
possible for me to be alive. I appreciate in a very special way
My Supervisor Mr. George Appolos Riman for his assistance
in seeing that this industrial training is a success.
I lack appropriate words to express my profound gratitude for
my parents who are always there for me in terms of advice
and financial support.
I remain grateful to all my colleagues in the industrial training
for their academic contribution(s).
ABOUT SIWES
History of SIWES
The government’s decree No. 47 of 8th Oct; 1971 as amended in
1990, highlighted the capacity building of human resources in
industry, commerce and government through training and retraining
of workers in order to effectively provide the much needed high
quality goods and services in a dynamic economy as ours (Jemerigbo,
2003). This decree led to the establishment of Industrial Training
Fund (ITF) in 1973/1974.
The growing concern among our industrialists that graduates of our
institutions of Higher learning, lack adequate practical background
studies preparatory for employment in industries, led to the formation
of students Industrial Work Experience Scheme (SIWES) by ITF in
1993/1994(Information and Guideline for SIWES, 2002). ITF has as
one of its key functions; to work as cooperative entity with industry
and commerce where students in institutions of higher learning can
undertake mid-career work experience attachment in industries which
are compatible with student’s area of study (Okorie 2002, in Asikadi
2003).
The students Industrial Work Experience Scheme (SIWES) is a skill
Training programme designed to expose and prepare students of
Agriculture, Engineering, Technology, Environmental, Science,
Medical Sciences and pure and applied sciences for the Industrial
work situation which they likely to meet after graduation. Duration of
SIWES is four months in Polytechnics at the end of NDI, four months
in College of Education at the end of NCE II and six months in the
Universities at the end of 300 or 400 or 500 levels depending on the
discipline (Information and Guideline for SIWES, 2002).
Aims and Objectives of SIWES
The objectives of SIWES among others includes to:-
• Provide an avenue for students in institutions of higher learning to
acquire industrial skills and experience in their approved course of
study.
• Prepare students for the industrial works situation which they are
likely to meet after graduation.
• Expose students to work methods and techniques in handling
equipment and machinery not available in their institutions.
• Provide students with an opportunity to apply their knowledge in
real work situation thereby bridging the gap between theories and
practices.
• Enlist and strengthen employers’ involvement in the entire
educational process and prepare students for employment in Industry
and Commerce (Information and Guideline for SIWES, 2002).
Bodies Involved in the Management of SIWES
The bodies involved are: Federal Government, Industrial Training
Fund (ITF), Other Supervising Agencies are: National University
Commission (NUC), National Board for Technical Education
(NBTE), & National Council for Colleges of Education (NCCE).
The functions of these agencies above include among others to:
• Ensure adequate funding of the scheme;
• Establish SIWES and accredit SIWES unit in the approved
institutions;
• Formulate policies ad guideline for participating bodies and
institutions as well as appointing SIWES coordinators and supporting
staff;
• Supervise students at their places of attachment and sign their log-
book and ITF Forms;
• Vet and process student’s log-books and forward same to ITF Area
office;
• Ensure payment of Allowances for the students and supervisors.
Therefore, the success or otherwise of the SIWES depends on the
efficiency of the Ministries, ITF, Institutions, Employers of labor and
the general public involved in articulation and management of the
program. Thus the evaluation of SIWES in tertiary institutions in
meeting up with the needs for the establishment of the program is
necessary.
TABLE OF CONTENT
INTRODUCTION………………………………………...……...…. 3
ABOUT FUTURE TECHNOLOGY…………….…………..........… 3
DUTIES PERFORMED………………………...……………..….… 4
CREATING A SECURE LOCAL AREA NETWORK…….……..... 4
WHAT IS A COMPUTER NETWORK………………………......... 5
NETWORK ANALYSIS AND DESIGN...…………………....…… 5
NETWORK TOPOLOGY………………..…………………...……. 5
NETWORK DEVICES…………………...….…………………..…. 6
NETWORK DIAGRAM…………………...…………………...…... 7
SECURITY OF THE NETWORK………………...……………...… 7
CONCLUSION…………………………………………………...…. 9
RECOMMENDATIO..…………………………………………....… 9
REFERENCES………………...………………………………..…. 10
INTRODUCTION
This report describes the activities carried out during a 24 weeks,
final, fulltime internship program at the Future Technology.
The document contains information about the organization and the
responsibilities performed throughout the period between June and
October 2016. More than a plain account of tasks, the objective of this
text is to reflect upon the experiences collected during the internship
from the perspective of a BSc student.
The first part of the report offers an overview of the organization,
followed by an outline of all the duties carried out during this time.
Following, it proceeds to describe in some detail the most relevant
projects carried out and their respective analysis. Finally, the report
wraps-up with a few closing remarks and conclusions from the
experience.
ABOUT FUTURE TECHNOLOGY
Future Technology is an institution of higher learning, located in
Nigeria, Kaduna state as their head quarter and has her branch at
Abagana, Anambra State.
The Future ICT Centre is the department of the Future Technology
under the division of Development and Strategy, concerned with
conceiving, designing and implementing ICT strategies for the
institution and company by providing the necessary infrastructure and
network services. The unit carries out the following duties;
 Managing the network as well as provide support for the
network users.
 Helping with the online security of the company’s network.
 Providing technical support to system users by helping with
trainings and giving advices on best practices for the usage of
personal computers
These duties are achieved majorly due to the co-operation of diverse
professionals. The unit is made up of; computer engineers, software
engineers, network administrators, system administrators.
DUTIES PRFORMED WHILE ON THE PROGRAM
Majorly, my duties were that of an assistant to the senior systems
administrator, who was directly the supervisor for all the interns at the
BU ICT.
These duties include;
 Installation of software such as, anti-virus, Microsoft office,
Corel draw and many other utility applications for clients.
 Fixing hardware issues such as, replacing bad keyboards,
replacing broken screens, replacing damaged hard drives,
replacing random access memory (RAM) and so many other
numerous hardware issues.
 Attending to minor internet issues such as, distributing of patch
cords, re-crimping of damaged cable terminators (RJ-45),
replacement of internet cards on clients’ systems, replacement
of damaged switches.
 In addition to working as an assistant in the office alongside
other interns, I participated in 3 major projects that took place
outside the office, at three other locations: -
 Premier Computer Institution Abagana, Anambra State.
 Crux Sancta Schools Nkpor, Anambra State.
 Modern Innovation School of Today (MISTO) Obosi, Anambra
State.
I learnt a great deal when it comes to networking. My knowledge of
crimping, color codes, punching down, working with network hard
ware devices has improved tremendously.
I chose the subject “creating a secure Local Area Network” this is
because; the majority of my experience at the centre was spent
creating a LAN. It was not my first internship: between June and
December 2016.
CREATING A SECURE LOCAL AREA NETWORK (LAN)
As stated earlier, the majority of my time at FUTURE
TECHNOLOGY was spent creating a secure LAN for the faculties,
offices, libraries, etc. this drew my attention majorly because the
security and integrity of the data of any organization, if compromised
can cause serious damage(s) to such organizations. As such the
following pages would describe the processes involved in creating a
secure LAN.
WHAT IS A COMPUTER NETWORK?
A computer network is the connection of computer systems (hardware
and software) and accessories for the purpose of resource sharing and
ease of communication. A computer network can be large enough to
accommodate millions of computers and accessories (Internet) it can
also be as small as 2 computers.
Meanwhile, a local area network is a type of computer network that is
confined to a limited geographical area like UNIZIK campus, homes,
cyber cafes, coffee shops etc. the number of computers in a LAN can
be just 2 and can also be as much as a few hundreds (sometimes
thousands).
Basically, creating a connection (with a cable, Bluetooth, Wi-Fi)
between two computer devices defines a computer network.
NETWORK ANALYSIS AND DESIGN
Before creating anything (in this case a network of computers) it is
necessary to design a logical representation of the project to make
sure it is workable. Then next, consider its feasibility. To do this, you
want to consider the financial implications of creating a network, the
manpower, the importance and necessity, the cost of maintenance and
so on.
In the design phase; deciding what topology you want to use is
necessary as well as, what kind of cables you would need and what
network devices you need to purchase. These would be discussed in
details hereafter.
Bear in mind that, we are trying to simulate a network where the staff
can share network resources and communicate efficiently but most
importantly safely, we would also attempt to make provisions for
guests to connect to the network but in a limited capacity to avoid
security compromise with the application of clients’ authentication
system.
NETWORK TOPOLOGY
Topologies in computer networks refer to the physical arrangement of
computers and the network devices. There are various topology types.
Viz; bus topology (linear), star topology, ring topology, hierarchical
star topology (extended star topology).
For the purpose of this project, the extended star topology would be
implemented for the following reasons;
 Security
 Ease of expansion
 Cheaper to maintain even though it costs more to set up due to
purchase of so many hardware devices.
NETWORK DEVICES
ROUTER: A router traditionally translates network packets from one
network to another. In other words it receives information from the
internet, and transfers it to the right recipient on the LAN. Here the
router used has the capability of implementing the adaptive security
appliances (ASA) capabilities and other security policies.
SWITCH: A switch does almost the same job the router. It distributes
packets to peripherals. But most importantly it serves as a central
connection point for cables from workstations, other switches etc.
WIRELESS ACCESS POINT: The wireless access point serves as an
extension of the LAN to devices that cannot connect to the network
by the use of cables. The WAP becomes the part of the network that
visitors are allowed to connect to with limited security but with some
security too.
CABLES: The cables to be used here would be majorly, the
unshielded twisted pair CAT5 (CAT5 UTP) because of its speed, and
relatively low cost as well as reliability. If there would be a need for
running cables externally (exposed) then the shielded CAT5 twisted
pair cables would be employed. The RJ45 would be used in
terminating the cables.
NETWORK DIAGRAM
From the network diagram above we see that the local area network is
linked with the internet (the external) through the Internet Service
Provider (ISP) (examples of ISPs; MTN, GLO) the connection comes
into the local network through the cisco router that has ASA
(Adaptive security Appliance) enabled. The ASA would be discussed
later. The connection flows through to the core switch which serves as
a central connection point for other workstation switches. Obviously
there are three departments in this simulated network and one public
wireless access point.
SECURITY OF THE NETWORK
For the sake of growth and well-being, owners as well as managers of
a company need to pay special attention to the security system of their
computer network. Network security is concerned with the protection
of network resources and services from natural and human caused
disasters. To do so, the security designer has to look carefully at the
vulnerability of the network system and design security measures to
protect disaster on the company.
All network devices used in the simulated network have been
configured with a basic configuration. The basic configuration
includes the names of the devices, the IP addresses, user names and
their encrypted passwords, VTY and console ports passwords, default
routes, access and trunk ports
As described earlier the simulated network would make use of CISCO
Adaptive security appliance router 5505. ASA 5505 is a full-featured
security appliance capable of offering a high-performance firewall,
SSL and IPsec VPN, and many other network services for small and
medium-sized company networks. ASA 5505 has a flexible eight-port
10/100 Fast Ethernet switch.
Furthermore, it is important to note that switch ports are gateways to a
network. Therefore it is necessary to keep them secure. Unused ports
must be monitored regularly if need be, they must be shut down. For
the purpose of this network, the unused ports are shut down. Security
must be configured on open ports to avoid spoofing, sniffing and
MAC address flooding.
CONCLUSION
In this world of today where so the internet has gotten so many users
and we are just like pebbles in an ocean of information. Majority of
the users of the internet do not understand how exactly it works some
others don’t care, the few who understands the background working
system of internet either exploits the vulnerability of other users or
help to protect others or just don’t care about others. Therefore, it is
necessary to ensure that security is air tight before deploying the
network. Otherwise the organization’s information is vulnerable and
attacks would easy.
It is necessary for the network administrator to understand the nitty-
gritty of the best security practice.
More so, I learnt how to work with experts in different fields of
computing.
RECOMENDATION
SIWES with its numerous challenges has proven to be the link
between pages and reality. I personally got exposed to the running
around of the real world, the rowdiness within which you have to
make calm decisions, the world of opportunities that are lying fallow,
the willingness to crave for logical creativity. Every student should be
allowed a chance to get this experience.
REFENCES
Tamirat Atsemegiorgis. Building a Secure Local Area Network,
Helsinki Metropolia University of applied sciences. May 2013.

Mais conteúdo relacionado

Mais procurados

Sample of SIWES REPORT
Sample of SIWES REPORTSample of SIWES REPORT
Sample of SIWES REPORTMargaret Itam
 
Indusrial trainning Report presentation
Indusrial trainning Report presentationIndusrial trainning Report presentation
Indusrial trainning Report presentationAbdulafeez Fasasi
 
IT Defence Preparation
IT Defence PreparationIT Defence Preparation
IT Defence PreparationHerbey Herdarm
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNEjiro Ndifereke
 
Siwes report original
Siwes report originalSiwes report original
Siwes report originalBrightnyt Pun
 
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLASIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLAG_ade
 
Siwes Report on Back End Web Development
Siwes Report on Back End Web DevelopmentSiwes Report on Back End Web Development
Siwes Report on Back End Web DevelopmentAL-Khalil
 
Siwes report by mukhtar salisu
Siwes report by mukhtar salisuSiwes report by mukhtar salisu
Siwes report by mukhtar salisuMukhtarsalisu2
 
Abolarin james siwes powerpoint
Abolarin james  siwes powerpointAbolarin james  siwes powerpoint
Abolarin james siwes powerpointjabolarin
 
SIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNSIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNEjiro Ndifereke
 
JULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOIJULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOIjulius kemboi
 
Computer science industrial training report carried out at web info net ltd ...
Computer science  industrial training report carried out at web info net ltd ...Computer science  industrial training report carried out at web info net ltd ...
Computer science industrial training report carried out at web info net ltd ...rashid muganga
 

Mais procurados (20)

Sample of SIWES REPORT
Sample of SIWES REPORTSample of SIWES REPORT
Sample of SIWES REPORT
 
Indusrial trainning Report presentation
Indusrial trainning Report presentationIndusrial trainning Report presentation
Indusrial trainning Report presentation
 
IT Defence Preparation
IT Defence PreparationIT Defence Preparation
IT Defence Preparation
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 
It report
It reportIt report
It report
 
Siwes report original
Siwes report originalSiwes report original
Siwes report original
 
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLASIWES TECHNICAL REPORT BY OLADEJI ADEOLA
SIWES TECHNICAL REPORT BY OLADEJI ADEOLA
 
johnson pdf (3)_2N
johnson pdf (3)_2Njohnson pdf (3)_2N
johnson pdf (3)_2N
 
Siwes Report on Back End Web Development
Siwes Report on Back End Web DevelopmentSiwes Report on Back End Web Development
Siwes Report on Back End Web Development
 
Siwes it report
Siwes it reportSiwes it report
Siwes it report
 
Siwes report by mukhtar salisu
Siwes report by mukhtar salisuSiwes report by mukhtar salisu
Siwes report by mukhtar salisu
 
Technical Report
Technical ReportTechnical Report
Technical Report
 
KOHequity SIWES report
KOHequity SIWES reportKOHequity SIWES report
KOHequity SIWES report
 
Abolarin james siwes powerpoint
Abolarin james  siwes powerpointAbolarin james  siwes powerpoint
Abolarin james siwes powerpoint
 
Richard siwes presentation
Richard siwes presentationRichard siwes presentation
Richard siwes presentation
 
SIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGNSIWES I.T REPORT ON WEB DESIGN
SIWES I.T REPORT ON WEB DESIGN
 
JULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOIJULIUS KIPCHUMBA KEMBOI
JULIUS KIPCHUMBA KEMBOI
 
Siwes Pesentation
Siwes PesentationSiwes Pesentation
Siwes Pesentation
 
SIWES PRESENTATION
SIWES PRESENTATIONSIWES PRESENTATION
SIWES PRESENTATION
 
Computer science industrial training report carried out at web info net ltd ...
Computer science  industrial training report carried out at web info net ltd ...Computer science  industrial training report carried out at web info net ltd ...
Computer science industrial training report carried out at web info net ltd ...
 

Semelhante a AbleMoJah's IT Report

Report final
Report finalReport final
Report finalJim Kats
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship reportkaahwa Armstrong
 
Kaahwa armstrong intern report
Kaahwa armstrong intern reportKaahwa armstrong intern report
Kaahwa armstrong intern reportkaahwa Armstrong
 
Report it department concord(retyped)
Report it department concord(retyped)Report it department concord(retyped)
Report it department concord(retyped)Arefin Rahman
 
PLAN B I.T DEFENCE.pptx
PLAN B I.T DEFENCE.pptxPLAN B I.T DEFENCE.pptx
PLAN B I.T DEFENCE.pptxoyelekanSamuel
 
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...IJERA Editor
 
Information Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeInformation Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeJcu Singapore
 
DEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docxDEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docxmansooraliattar
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptxslidecell212100
 
Repositioning prospective graduates for relevance in the emerging IT landscape
Repositioning prospective graduates for relevance in the emerging IT landscapeRepositioning prospective graduates for relevance in the emerging IT landscape
Repositioning prospective graduates for relevance in the emerging IT landscapeTokunbo Taiwo
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal
 
Cisco ite ds
Cisco ite dsCisco ite ds
Cisco ite dsJulio RS
 
Taxation project new
Taxation project newTaxation project new
Taxation project newIT
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMIRJET Journal
 

Semelhante a AbleMoJah's IT Report (20)

Report docx
Report docxReport docx
Report docx
 
Report final
Report finalReport final
Report final
 
CSE
CSECSE
CSE
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship report
 
Kaahwa armstrong intern report
Kaahwa armstrong intern reportKaahwa armstrong intern report
Kaahwa armstrong intern report
 
Report it department concord(retyped)
Report it department concord(retyped)Report it department concord(retyped)
Report it department concord(retyped)
 
Billing project
Billing projectBilling project
Billing project
 
PLAN B I.T DEFENCE.pptx
PLAN B I.T DEFENCE.pptxPLAN B I.T DEFENCE.pptx
PLAN B I.T DEFENCE.pptx
 
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...
 
Information Technology Program: JCU Singapore
Information Technology Program: JCU SingaporeInformation Technology Program: JCU Singapore
Information Technology Program: JCU Singapore
 
DEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docxDEVOPS SEMINAR INDEX (1) (10).docx
DEVOPS SEMINAR INDEX (1) (10).docx
 
Why Computer Science.pptx
Why Computer Science.pptxWhy Computer Science.pptx
Why Computer Science.pptx
 
Repositioning prospective graduates for relevance in the emerging IT landscape
Repositioning prospective graduates for relevance in the emerging IT landscapeRepositioning prospective graduates for relevance in the emerging IT landscape
Repositioning prospective graduates for relevance in the emerging IT landscape
 
Kirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics ProjectKirtesh Khandelwal Visual Basics Project
Kirtesh Khandelwal Visual Basics Project
 
Notes1
Notes1Notes1
Notes1
 
Cisco ite ds
Cisco ite dsCisco ite ds
Cisco ite ds
 
Taxation project new
Taxation project newTaxation project new
Taxation project new
 
web devlopment.docx
web devlopment.docxweb devlopment.docx
web devlopment.docx
 
Ece brochure
Ece brochureEce brochure
Ece brochure
 
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEMAN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
AN ANDROID APPLICATION FOR CAMPUS INFORMATION SYSTEM
 

Último

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 

Último (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

AbleMoJah's IT Report

  • 1. STUDENTS’ INDUSTRIAL TRAINING/SIWES REPORT PRESENTED BY EKEH GERALD CHIDUBEM NOU131848181 OF THE DEPARTMENT OF B.Sc. IN MATHEMATICS/COMPUTER SCIENCE FACULTY OF SCIENCE AND TECHNOLOGY NATIONAL OPEN UNIVERSITY OF NIGERIA (AWKA STUDY CENTER) 300 LEVEL AT FUTURE TECHNOLOGY UMUDUNNU VILLAGE ABAGANA, ANAMBRA STATE, NIGERIA. NOVEMBER 2016.
  • 2. ABSTRACT Practical knowledge is no doubt very essential in every field of study especially in Mathematics/Computer Science because it gives an insight or better still, it exposes one to the challenges we likely face in your working place in future after graduation. A better society will be built if students are allowed to engage in doing practically what they have learnt so far in their institutions rather than theory throughout because such knowledge will serve as a blueprint for any other steps he/she wishes to take and also to prepare them for future technology development.
  • 3. ACKNOWLEDGEMENT Am most grateful to Almighty God for making it divinely possible for me to be alive. I appreciate in a very special way My Supervisor Mr. George Appolos Riman for his assistance in seeing that this industrial training is a success. I lack appropriate words to express my profound gratitude for my parents who are always there for me in terms of advice and financial support. I remain grateful to all my colleagues in the industrial training for their academic contribution(s).
  • 4. ABOUT SIWES History of SIWES The government’s decree No. 47 of 8th Oct; 1971 as amended in 1990, highlighted the capacity building of human resources in industry, commerce and government through training and retraining of workers in order to effectively provide the much needed high quality goods and services in a dynamic economy as ours (Jemerigbo, 2003). This decree led to the establishment of Industrial Training Fund (ITF) in 1973/1974. The growing concern among our industrialists that graduates of our institutions of Higher learning, lack adequate practical background studies preparatory for employment in industries, led to the formation of students Industrial Work Experience Scheme (SIWES) by ITF in 1993/1994(Information and Guideline for SIWES, 2002). ITF has as one of its key functions; to work as cooperative entity with industry and commerce where students in institutions of higher learning can undertake mid-career work experience attachment in industries which are compatible with student’s area of study (Okorie 2002, in Asikadi 2003). The students Industrial Work Experience Scheme (SIWES) is a skill Training programme designed to expose and prepare students of Agriculture, Engineering, Technology, Environmental, Science, Medical Sciences and pure and applied sciences for the Industrial work situation which they likely to meet after graduation. Duration of
  • 5. SIWES is four months in Polytechnics at the end of NDI, four months in College of Education at the end of NCE II and six months in the Universities at the end of 300 or 400 or 500 levels depending on the discipline (Information and Guideline for SIWES, 2002). Aims and Objectives of SIWES The objectives of SIWES among others includes to:- • Provide an avenue for students in institutions of higher learning to acquire industrial skills and experience in their approved course of study. • Prepare students for the industrial works situation which they are likely to meet after graduation. • Expose students to work methods and techniques in handling equipment and machinery not available in their institutions. • Provide students with an opportunity to apply their knowledge in real work situation thereby bridging the gap between theories and practices. • Enlist and strengthen employers’ involvement in the entire educational process and prepare students for employment in Industry and Commerce (Information and Guideline for SIWES, 2002).
  • 6. Bodies Involved in the Management of SIWES The bodies involved are: Federal Government, Industrial Training Fund (ITF), Other Supervising Agencies are: National University Commission (NUC), National Board for Technical Education (NBTE), & National Council for Colleges of Education (NCCE). The functions of these agencies above include among others to: • Ensure adequate funding of the scheme; • Establish SIWES and accredit SIWES unit in the approved institutions; • Formulate policies ad guideline for participating bodies and institutions as well as appointing SIWES coordinators and supporting staff; • Supervise students at their places of attachment and sign their log- book and ITF Forms; • Vet and process student’s log-books and forward same to ITF Area office; • Ensure payment of Allowances for the students and supervisors. Therefore, the success or otherwise of the SIWES depends on the efficiency of the Ministries, ITF, Institutions, Employers of labor and the general public involved in articulation and management of the program. Thus the evaluation of SIWES in tertiary institutions in meeting up with the needs for the establishment of the program is necessary.
  • 7. TABLE OF CONTENT INTRODUCTION………………………………………...……...…. 3 ABOUT FUTURE TECHNOLOGY…………….…………..........… 3 DUTIES PERFORMED………………………...……………..….… 4 CREATING A SECURE LOCAL AREA NETWORK…….……..... 4 WHAT IS A COMPUTER NETWORK………………………......... 5 NETWORK ANALYSIS AND DESIGN...…………………....…… 5 NETWORK TOPOLOGY………………..…………………...……. 5 NETWORK DEVICES…………………...….…………………..…. 6 NETWORK DIAGRAM…………………...…………………...…... 7 SECURITY OF THE NETWORK………………...……………...… 7 CONCLUSION…………………………………………………...…. 9 RECOMMENDATIO..…………………………………………....… 9 REFERENCES………………...………………………………..…. 10
  • 8. INTRODUCTION This report describes the activities carried out during a 24 weeks, final, fulltime internship program at the Future Technology. The document contains information about the organization and the responsibilities performed throughout the period between June and October 2016. More than a plain account of tasks, the objective of this text is to reflect upon the experiences collected during the internship from the perspective of a BSc student. The first part of the report offers an overview of the organization, followed by an outline of all the duties carried out during this time. Following, it proceeds to describe in some detail the most relevant projects carried out and their respective analysis. Finally, the report wraps-up with a few closing remarks and conclusions from the experience. ABOUT FUTURE TECHNOLOGY Future Technology is an institution of higher learning, located in Nigeria, Kaduna state as their head quarter and has her branch at Abagana, Anambra State. The Future ICT Centre is the department of the Future Technology under the division of Development and Strategy, concerned with conceiving, designing and implementing ICT strategies for the
  • 9. institution and company by providing the necessary infrastructure and network services. The unit carries out the following duties;  Managing the network as well as provide support for the network users.  Helping with the online security of the company’s network.  Providing technical support to system users by helping with trainings and giving advices on best practices for the usage of personal computers These duties are achieved majorly due to the co-operation of diverse professionals. The unit is made up of; computer engineers, software engineers, network administrators, system administrators. DUTIES PRFORMED WHILE ON THE PROGRAM Majorly, my duties were that of an assistant to the senior systems administrator, who was directly the supervisor for all the interns at the BU ICT. These duties include;  Installation of software such as, anti-virus, Microsoft office, Corel draw and many other utility applications for clients.  Fixing hardware issues such as, replacing bad keyboards, replacing broken screens, replacing damaged hard drives,
  • 10. replacing random access memory (RAM) and so many other numerous hardware issues.  Attending to minor internet issues such as, distributing of patch cords, re-crimping of damaged cable terminators (RJ-45), replacement of internet cards on clients’ systems, replacement of damaged switches.  In addition to working as an assistant in the office alongside other interns, I participated in 3 major projects that took place outside the office, at three other locations: -  Premier Computer Institution Abagana, Anambra State.  Crux Sancta Schools Nkpor, Anambra State.  Modern Innovation School of Today (MISTO) Obosi, Anambra State. I learnt a great deal when it comes to networking. My knowledge of crimping, color codes, punching down, working with network hard ware devices has improved tremendously. I chose the subject “creating a secure Local Area Network” this is because; the majority of my experience at the centre was spent creating a LAN. It was not my first internship: between June and December 2016. CREATING A SECURE LOCAL AREA NETWORK (LAN) As stated earlier, the majority of my time at FUTURE TECHNOLOGY was spent creating a secure LAN for the faculties,
  • 11. offices, libraries, etc. this drew my attention majorly because the security and integrity of the data of any organization, if compromised can cause serious damage(s) to such organizations. As such the following pages would describe the processes involved in creating a secure LAN. WHAT IS A COMPUTER NETWORK? A computer network is the connection of computer systems (hardware and software) and accessories for the purpose of resource sharing and ease of communication. A computer network can be large enough to accommodate millions of computers and accessories (Internet) it can also be as small as 2 computers. Meanwhile, a local area network is a type of computer network that is confined to a limited geographical area like UNIZIK campus, homes, cyber cafes, coffee shops etc. the number of computers in a LAN can be just 2 and can also be as much as a few hundreds (sometimes thousands). Basically, creating a connection (with a cable, Bluetooth, Wi-Fi) between two computer devices defines a computer network. NETWORK ANALYSIS AND DESIGN Before creating anything (in this case a network of computers) it is necessary to design a logical representation of the project to make
  • 12. sure it is workable. Then next, consider its feasibility. To do this, you want to consider the financial implications of creating a network, the manpower, the importance and necessity, the cost of maintenance and so on. In the design phase; deciding what topology you want to use is necessary as well as, what kind of cables you would need and what network devices you need to purchase. These would be discussed in details hereafter. Bear in mind that, we are trying to simulate a network where the staff can share network resources and communicate efficiently but most importantly safely, we would also attempt to make provisions for guests to connect to the network but in a limited capacity to avoid security compromise with the application of clients’ authentication system. NETWORK TOPOLOGY Topologies in computer networks refer to the physical arrangement of computers and the network devices. There are various topology types. Viz; bus topology (linear), star topology, ring topology, hierarchical star topology (extended star topology). For the purpose of this project, the extended star topology would be implemented for the following reasons;  Security  Ease of expansion
  • 13.  Cheaper to maintain even though it costs more to set up due to purchase of so many hardware devices. NETWORK DEVICES ROUTER: A router traditionally translates network packets from one network to another. In other words it receives information from the internet, and transfers it to the right recipient on the LAN. Here the router used has the capability of implementing the adaptive security appliances (ASA) capabilities and other security policies. SWITCH: A switch does almost the same job the router. It distributes packets to peripherals. But most importantly it serves as a central connection point for cables from workstations, other switches etc. WIRELESS ACCESS POINT: The wireless access point serves as an extension of the LAN to devices that cannot connect to the network by the use of cables. The WAP becomes the part of the network that visitors are allowed to connect to with limited security but with some security too. CABLES: The cables to be used here would be majorly, the unshielded twisted pair CAT5 (CAT5 UTP) because of its speed, and relatively low cost as well as reliability. If there would be a need for running cables externally (exposed) then the shielded CAT5 twisted pair cables would be employed. The RJ45 would be used in terminating the cables.
  • 14. NETWORK DIAGRAM From the network diagram above we see that the local area network is linked with the internet (the external) through the Internet Service Provider (ISP) (examples of ISPs; MTN, GLO) the connection comes into the local network through the cisco router that has ASA (Adaptive security Appliance) enabled. The ASA would be discussed later. The connection flows through to the core switch which serves as a central connection point for other workstation switches. Obviously there are three departments in this simulated network and one public wireless access point. SECURITY OF THE NETWORK For the sake of growth and well-being, owners as well as managers of a company need to pay special attention to the security system of their
  • 15. computer network. Network security is concerned with the protection of network resources and services from natural and human caused disasters. To do so, the security designer has to look carefully at the vulnerability of the network system and design security measures to protect disaster on the company. All network devices used in the simulated network have been configured with a basic configuration. The basic configuration includes the names of the devices, the IP addresses, user names and their encrypted passwords, VTY and console ports passwords, default routes, access and trunk ports As described earlier the simulated network would make use of CISCO Adaptive security appliance router 5505. ASA 5505 is a full-featured security appliance capable of offering a high-performance firewall, SSL and IPsec VPN, and many other network services for small and medium-sized company networks. ASA 5505 has a flexible eight-port 10/100 Fast Ethernet switch. Furthermore, it is important to note that switch ports are gateways to a network. Therefore it is necessary to keep them secure. Unused ports must be monitored regularly if need be, they must be shut down. For the purpose of this network, the unused ports are shut down. Security must be configured on open ports to avoid spoofing, sniffing and MAC address flooding.
  • 16. CONCLUSION In this world of today where so the internet has gotten so many users and we are just like pebbles in an ocean of information. Majority of the users of the internet do not understand how exactly it works some others don’t care, the few who understands the background working system of internet either exploits the vulnerability of other users or help to protect others or just don’t care about others. Therefore, it is necessary to ensure that security is air tight before deploying the network. Otherwise the organization’s information is vulnerable and attacks would easy. It is necessary for the network administrator to understand the nitty- gritty of the best security practice. More so, I learnt how to work with experts in different fields of computing. RECOMENDATION SIWES with its numerous challenges has proven to be the link between pages and reality. I personally got exposed to the running around of the real world, the rowdiness within which you have to make calm decisions, the world of opportunities that are lying fallow, the willingness to crave for logical creativity. Every student should be allowed a chance to get this experience.
  • 17. REFENCES Tamirat Atsemegiorgis. Building a Secure Local Area Network, Helsinki Metropolia University of applied sciences. May 2013.