This document is a report on the student's industrial training experience at Future Technology. It includes an introduction to Future Technology and describes the student's duties assisting with IT support and network administration. The bulk of the report focuses on a project to create a secure local area network for Future Technology, detailing the network design, devices used, security configuration and concluding that practical experience like industrial training is valuable for students.
The students industrial work experience scheme (SIWES) is a skills training programme designed to expose and prepare students of Universities, Polytechnics/Colleges of Technology/Colleges of Agriculture and Colleges of Education for the industrial work situation they are likely to meet after graduation.
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNEjiro Ndifereke
This is a technical report on a 6 month Industrial Training on networking and little of web design. The format used is as stated in the SIWES Handbook.
Technical report of a three month student industrial work experience scheme. Covering C# programming, Microsoft Office, and Basic computer networking.
By Abah Joseph Israel.
The students industrial work experience scheme (SIWES) is a skills training programme designed to expose and prepare students of Universities, Polytechnics/Colleges of Technology/Colleges of Agriculture and Colleges of Education for the industrial work situation they are likely to meet after graduation.
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNEjiro Ndifereke
This is a technical report on a 6 month Industrial Training on networking and little of web design. The format used is as stated in the SIWES Handbook.
Technical report of a three month student industrial work experience scheme. Covering C# programming, Microsoft Office, and Basic computer networking.
By Abah Joseph Israel.
Students' Industrial Work Experience Scheme (SIWES) is a scheme developed for Undergraduates in NIGERIA to gain experience in the industry before graduating.
This is my technical report on my 6 months Industrial Training on Web Design (i.e HTML, CSS, JAVASCRIPT, PHP, DATABASE) using the format as stated in the SIWES Hand Book.
Final Internship Report by kiyimba Bill (International University Of East Afr...Bill Kiyimba
An Internship / Field Attachment report sample format for fulfillment of the requirements of the degree in Software engineering, Computer science and Information Technology.
Student Industrial Work Experience Scheme was establish by Federal Government of Nigeria in 1973 and it been head by Industrial Training Fund in line with the Federal Government and this is a SIWES report carried out in the Nigerian Airspace Management Agency, Calabar Airport.
Students' Industrial Work Experience Scheme (SIWES) is a scheme developed for Undergraduates in NIGERIA to gain experience in the industry before graduating.
This is my technical report on my 6 months Industrial Training on Web Design (i.e HTML, CSS, JAVASCRIPT, PHP, DATABASE) using the format as stated in the SIWES Hand Book.
Final Internship Report by kiyimba Bill (International University Of East Afr...Bill Kiyimba
An Internship / Field Attachment report sample format for fulfillment of the requirements of the degree in Software engineering, Computer science and Information Technology.
Student Industrial Work Experience Scheme was establish by Federal Government of Nigeria in 1973 and it been head by Industrial Training Fund in line with the Federal Government and this is a SIWES report carried out in the Nigerian Airspace Management Agency, Calabar Airport.
The project “Billing system” is an application to automate the process of ordering
And billing of a restaurant .This application is developed for the established restaurants in the city to manage the billing operations. It has the entire basic module to operate the billing modules. This application also administrates its users and customers.
This project will serve the following objectives:-
• Add and maintain records of available products.
• Add and maintain customer details.
• Add and maintain description of new products.
• Add and maintain admin and employee details.
• Provides a convenient solution of billing pattern.
• Make an easy to use environment for users and customers.
• Create membership for customers.
Implementation of ICT As a Change Agent in Computing Students Result in Chukw...IJERA Editor
Manual method of sorting out for result and computing it has posed a big problem to exams unit in ChukwuemekaOdumegwuOjukwu University (COOU), In Anambra State, Nigeria. During computation of results, the exam officers collect paper results from the department and either calculate them on papers or enter them on a computer for computation. Either of them is hard work and time wasting. Hence we propose a change and retrieval agent in computing results in ChukwuemekaOdumegwuOjukwu University, Uli. Since the University already has an existing website, we require a new format for uploading results to the website using Microsoft excel witheight (8) specific columns namely: names of students, registration numbers, continuous assignment, examination score, total score, grade and remarks done by course lecturers.To compute the results of a particular student, the exam officer opens the application; enters the required detail and the application will fetch and populate the grade fields automatically from the results already uploaded on the university website by the course lecturers. The application needs internet connection in order to do this. Thereafter the results are computed by the application. The methodology used is Object Oriented Analysis and Design Methods. The application is a windows application written with Microsoft visual basic.net. The database used in saving login information and computed CGPAs is a free distributed database MySQL. The result of this researchis a functional result retrieval and computation application used only by the authorized personnel for computation of degree results.
Information Technology Program: JCU SingaporeJcu Singapore
Modern business and society is increasingly computer reliant. In recent years the Internet and local computer networks have become essential everyday business tools. Not surprisingly, the IT industry is one of the world’s fastest-growing industries, and IT graduates can expect exciting and rewarding careers, anywhere in the world.
Repositioning prospective graduates for relevance in the emerging IT landscapeTokunbo Taiwo
Presentation made by Mr. Tokunbo Taiwo (Principal Consultant/CEO, Safe Sail Consulting Ltd.) at the Town and Gown Seminar of the Department of Computer & Information Sciences, Covenant University, Ota on October 31 2016.
The presentation discusses the emerging fields of Cloud Computing, Big Data, Internet of Things, Mobile Computing, Devops and Cybersecurity.
It hghlights the skills gaps and how they can be bridged.
Restaurant Billing System contain Creation of bills of Customers, Add new Customers, Employees and Admins, Proper Authentication and Authorization of Employees and Admins, Regeneration of bill for Customer facility, additional discount for pre-defined Customers.
this is my first SIWES report on web development, held at ABU-TECH IT HUB birnin kebbi, and im student of federal university birnin kebbi. computer science department
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
1. STUDENTS’ INDUSTRIAL TRAINING/SIWES
REPORT
PRESENTED BY
EKEH GERALD CHIDUBEM
NOU131848181
OF
THE DEPARTMENT OF B.Sc. IN
MATHEMATICS/COMPUTER SCIENCE
FACULTY OF SCIENCE AND TECHNOLOGY
NATIONAL OPEN UNIVERSITY OF NIGERIA
(AWKA STUDY CENTER)
300 LEVEL
AT
FUTURE TECHNOLOGY
UMUDUNNU VILLAGE ABAGANA,
ANAMBRA STATE, NIGERIA.
NOVEMBER 2016.
2. ABSTRACT
Practical knowledge is no doubt very essential in every field
of study especially in Mathematics/Computer Science because
it gives an insight or better still, it exposes one to the
challenges we likely face in your working place in future after
graduation. A better society will be built if students are
allowed to engage in doing practically what they have learnt
so far in their institutions rather than theory throughout
because such knowledge will serve as a blueprint for any
other steps he/she wishes to take and also to prepare them for
future technology development.
3. ACKNOWLEDGEMENT
Am most grateful to Almighty God for making it divinely
possible for me to be alive. I appreciate in a very special way
My Supervisor Mr. George Appolos Riman for his assistance
in seeing that this industrial training is a success.
I lack appropriate words to express my profound gratitude for
my parents who are always there for me in terms of advice
and financial support.
I remain grateful to all my colleagues in the industrial training
for their academic contribution(s).
4. ABOUT SIWES
History of SIWES
The government’s decree No. 47 of 8th Oct; 1971 as amended in
1990, highlighted the capacity building of human resources in
industry, commerce and government through training and retraining
of workers in order to effectively provide the much needed high
quality goods and services in a dynamic economy as ours (Jemerigbo,
2003). This decree led to the establishment of Industrial Training
Fund (ITF) in 1973/1974.
The growing concern among our industrialists that graduates of our
institutions of Higher learning, lack adequate practical background
studies preparatory for employment in industries, led to the formation
of students Industrial Work Experience Scheme (SIWES) by ITF in
1993/1994(Information and Guideline for SIWES, 2002). ITF has as
one of its key functions; to work as cooperative entity with industry
and commerce where students in institutions of higher learning can
undertake mid-career work experience attachment in industries which
are compatible with student’s area of study (Okorie 2002, in Asikadi
2003).
The students Industrial Work Experience Scheme (SIWES) is a skill
Training programme designed to expose and prepare students of
Agriculture, Engineering, Technology, Environmental, Science,
Medical Sciences and pure and applied sciences for the Industrial
work situation which they likely to meet after graduation. Duration of
5. SIWES is four months in Polytechnics at the end of NDI, four months
in College of Education at the end of NCE II and six months in the
Universities at the end of 300 or 400 or 500 levels depending on the
discipline (Information and Guideline for SIWES, 2002).
Aims and Objectives of SIWES
The objectives of SIWES among others includes to:-
• Provide an avenue for students in institutions of higher learning to
acquire industrial skills and experience in their approved course of
study.
• Prepare students for the industrial works situation which they are
likely to meet after graduation.
• Expose students to work methods and techniques in handling
equipment and machinery not available in their institutions.
• Provide students with an opportunity to apply their knowledge in
real work situation thereby bridging the gap between theories and
practices.
• Enlist and strengthen employers’ involvement in the entire
educational process and prepare students for employment in Industry
and Commerce (Information and Guideline for SIWES, 2002).
6. Bodies Involved in the Management of SIWES
The bodies involved are: Federal Government, Industrial Training
Fund (ITF), Other Supervising Agencies are: National University
Commission (NUC), National Board for Technical Education
(NBTE), & National Council for Colleges of Education (NCCE).
The functions of these agencies above include among others to:
• Ensure adequate funding of the scheme;
• Establish SIWES and accredit SIWES unit in the approved
institutions;
• Formulate policies ad guideline for participating bodies and
institutions as well as appointing SIWES coordinators and supporting
staff;
• Supervise students at their places of attachment and sign their log-
book and ITF Forms;
• Vet and process student’s log-books and forward same to ITF Area
office;
• Ensure payment of Allowances for the students and supervisors.
Therefore, the success or otherwise of the SIWES depends on the
efficiency of the Ministries, ITF, Institutions, Employers of labor and
the general public involved in articulation and management of the
program. Thus the evaluation of SIWES in tertiary institutions in
meeting up with the needs for the establishment of the program is
necessary.
7. TABLE OF CONTENT
INTRODUCTION………………………………………...……...…. 3
ABOUT FUTURE TECHNOLOGY…………….…………..........… 3
DUTIES PERFORMED………………………...……………..….… 4
CREATING A SECURE LOCAL AREA NETWORK…….……..... 4
WHAT IS A COMPUTER NETWORK………………………......... 5
NETWORK ANALYSIS AND DESIGN...…………………....…… 5
NETWORK TOPOLOGY………………..…………………...……. 5
NETWORK DEVICES…………………...….…………………..…. 6
NETWORK DIAGRAM…………………...…………………...…... 7
SECURITY OF THE NETWORK………………...……………...… 7
CONCLUSION…………………………………………………...…. 9
RECOMMENDATIO..…………………………………………....… 9
REFERENCES………………...………………………………..…. 10
8. INTRODUCTION
This report describes the activities carried out during a 24 weeks,
final, fulltime internship program at the Future Technology.
The document contains information about the organization and the
responsibilities performed throughout the period between June and
October 2016. More than a plain account of tasks, the objective of this
text is to reflect upon the experiences collected during the internship
from the perspective of a BSc student.
The first part of the report offers an overview of the organization,
followed by an outline of all the duties carried out during this time.
Following, it proceeds to describe in some detail the most relevant
projects carried out and their respective analysis. Finally, the report
wraps-up with a few closing remarks and conclusions from the
experience.
ABOUT FUTURE TECHNOLOGY
Future Technology is an institution of higher learning, located in
Nigeria, Kaduna state as their head quarter and has her branch at
Abagana, Anambra State.
The Future ICT Centre is the department of the Future Technology
under the division of Development and Strategy, concerned with
conceiving, designing and implementing ICT strategies for the
9. institution and company by providing the necessary infrastructure and
network services. The unit carries out the following duties;
Managing the network as well as provide support for the
network users.
Helping with the online security of the company’s network.
Providing technical support to system users by helping with
trainings and giving advices on best practices for the usage of
personal computers
These duties are achieved majorly due to the co-operation of diverse
professionals. The unit is made up of; computer engineers, software
engineers, network administrators, system administrators.
DUTIES PRFORMED WHILE ON THE PROGRAM
Majorly, my duties were that of an assistant to the senior systems
administrator, who was directly the supervisor for all the interns at the
BU ICT.
These duties include;
Installation of software such as, anti-virus, Microsoft office,
Corel draw and many other utility applications for clients.
Fixing hardware issues such as, replacing bad keyboards,
replacing broken screens, replacing damaged hard drives,
10. replacing random access memory (RAM) and so many other
numerous hardware issues.
Attending to minor internet issues such as, distributing of patch
cords, re-crimping of damaged cable terminators (RJ-45),
replacement of internet cards on clients’ systems, replacement
of damaged switches.
In addition to working as an assistant in the office alongside
other interns, I participated in 3 major projects that took place
outside the office, at three other locations: -
Premier Computer Institution Abagana, Anambra State.
Crux Sancta Schools Nkpor, Anambra State.
Modern Innovation School of Today (MISTO) Obosi, Anambra
State.
I learnt a great deal when it comes to networking. My knowledge of
crimping, color codes, punching down, working with network hard
ware devices has improved tremendously.
I chose the subject “creating a secure Local Area Network” this is
because; the majority of my experience at the centre was spent
creating a LAN. It was not my first internship: between June and
December 2016.
CREATING A SECURE LOCAL AREA NETWORK (LAN)
As stated earlier, the majority of my time at FUTURE
TECHNOLOGY was spent creating a secure LAN for the faculties,
11. offices, libraries, etc. this drew my attention majorly because the
security and integrity of the data of any organization, if compromised
can cause serious damage(s) to such organizations. As such the
following pages would describe the processes involved in creating a
secure LAN.
WHAT IS A COMPUTER NETWORK?
A computer network is the connection of computer systems (hardware
and software) and accessories for the purpose of resource sharing and
ease of communication. A computer network can be large enough to
accommodate millions of computers and accessories (Internet) it can
also be as small as 2 computers.
Meanwhile, a local area network is a type of computer network that is
confined to a limited geographical area like UNIZIK campus, homes,
cyber cafes, coffee shops etc. the number of computers in a LAN can
be just 2 and can also be as much as a few hundreds (sometimes
thousands).
Basically, creating a connection (with a cable, Bluetooth, Wi-Fi)
between two computer devices defines a computer network.
NETWORK ANALYSIS AND DESIGN
Before creating anything (in this case a network of computers) it is
necessary to design a logical representation of the project to make
12. sure it is workable. Then next, consider its feasibility. To do this, you
want to consider the financial implications of creating a network, the
manpower, the importance and necessity, the cost of maintenance and
so on.
In the design phase; deciding what topology you want to use is
necessary as well as, what kind of cables you would need and what
network devices you need to purchase. These would be discussed in
details hereafter.
Bear in mind that, we are trying to simulate a network where the staff
can share network resources and communicate efficiently but most
importantly safely, we would also attempt to make provisions for
guests to connect to the network but in a limited capacity to avoid
security compromise with the application of clients’ authentication
system.
NETWORK TOPOLOGY
Topologies in computer networks refer to the physical arrangement of
computers and the network devices. There are various topology types.
Viz; bus topology (linear), star topology, ring topology, hierarchical
star topology (extended star topology).
For the purpose of this project, the extended star topology would be
implemented for the following reasons;
Security
Ease of expansion
13. Cheaper to maintain even though it costs more to set up due to
purchase of so many hardware devices.
NETWORK DEVICES
ROUTER: A router traditionally translates network packets from one
network to another. In other words it receives information from the
internet, and transfers it to the right recipient on the LAN. Here the
router used has the capability of implementing the adaptive security
appliances (ASA) capabilities and other security policies.
SWITCH: A switch does almost the same job the router. It distributes
packets to peripherals. But most importantly it serves as a central
connection point for cables from workstations, other switches etc.
WIRELESS ACCESS POINT: The wireless access point serves as an
extension of the LAN to devices that cannot connect to the network
by the use of cables. The WAP becomes the part of the network that
visitors are allowed to connect to with limited security but with some
security too.
CABLES: The cables to be used here would be majorly, the
unshielded twisted pair CAT5 (CAT5 UTP) because of its speed, and
relatively low cost as well as reliability. If there would be a need for
running cables externally (exposed) then the shielded CAT5 twisted
pair cables would be employed. The RJ45 would be used in
terminating the cables.
14. NETWORK DIAGRAM
From the network diagram above we see that the local area network is
linked with the internet (the external) through the Internet Service
Provider (ISP) (examples of ISPs; MTN, GLO) the connection comes
into the local network through the cisco router that has ASA
(Adaptive security Appliance) enabled. The ASA would be discussed
later. The connection flows through to the core switch which serves as
a central connection point for other workstation switches. Obviously
there are three departments in this simulated network and one public
wireless access point.
SECURITY OF THE NETWORK
For the sake of growth and well-being, owners as well as managers of
a company need to pay special attention to the security system of their
15. computer network. Network security is concerned with the protection
of network resources and services from natural and human caused
disasters. To do so, the security designer has to look carefully at the
vulnerability of the network system and design security measures to
protect disaster on the company.
All network devices used in the simulated network have been
configured with a basic configuration. The basic configuration
includes the names of the devices, the IP addresses, user names and
their encrypted passwords, VTY and console ports passwords, default
routes, access and trunk ports
As described earlier the simulated network would make use of CISCO
Adaptive security appliance router 5505. ASA 5505 is a full-featured
security appliance capable of offering a high-performance firewall,
SSL and IPsec VPN, and many other network services for small and
medium-sized company networks. ASA 5505 has a flexible eight-port
10/100 Fast Ethernet switch.
Furthermore, it is important to note that switch ports are gateways to a
network. Therefore it is necessary to keep them secure. Unused ports
must be monitored regularly if need be, they must be shut down. For
the purpose of this network, the unused ports are shut down. Security
must be configured on open ports to avoid spoofing, sniffing and
MAC address flooding.
16. CONCLUSION
In this world of today where so the internet has gotten so many users
and we are just like pebbles in an ocean of information. Majority of
the users of the internet do not understand how exactly it works some
others don’t care, the few who understands the background working
system of internet either exploits the vulnerability of other users or
help to protect others or just don’t care about others. Therefore, it is
necessary to ensure that security is air tight before deploying the
network. Otherwise the organization’s information is vulnerable and
attacks would easy.
It is necessary for the network administrator to understand the nitty-
gritty of the best security practice.
More so, I learnt how to work with experts in different fields of
computing.
RECOMENDATION
SIWES with its numerous challenges has proven to be the link
between pages and reality. I personally got exposed to the running
around of the real world, the rowdiness within which you have to
make calm decisions, the world of opportunities that are lying fallow,
the willingness to crave for logical creativity. Every student should be
allowed a chance to get this experience.