Report On Siwes
Report On Siwes
The course, CSC 3299 as offered in Ajayi Crowther University is a compulsory subject offered
by every computer science student in the 2nd semester of the third academic year with the
objective of enabling students to come into contact with real life applications regarding the
knowledge and skills gained in both theoretical and practical courses of the university.
The core courses of Computer Science offered by ACU are both theory and laboratory practical -
based and aid in providing a theoretical concept or ‘base’ to the students so that they are
equipped with sufficient knowledge for joining the work force after completion of under-
graduation. SIWES on the other hand helps the students familiarize themselves with the
experience of being employed in their field and effectively learning and applying the knowledge
required by carrying out their activities in the offices and fields.
Helping students break free from the theoretical world of textbooks and class courses and leap
into the real world of applications of knowledge.
To enable students to pick up skills from the experience and projects of other
employees to apply in their own tasks.
To enable the student realize their relative strength in a field with many practical applications
and help students come out with final year projects that model real life industry challenges.
Brief :
Nigerian Civil Aviation Authority is the regulatory body for aviation in Nigeria. It became
autonomous with the passing into law of the Civil Aviation Act 2006 by the National Assembly
and assent of the President, Federal Republic of Nigeria. The Act not only empowers the
Authority to regulate Aviation Safety without political interference, but also to carry out
Oversight functions of Airports, Airspace, Meteorological Services, etc as well as economic
regulations of the industry.
Nigeria has just successfully passed through the ICAO Security follow-up Audit of May 2006
and the ICAO Universal Safety Oversight Audit in November 2006. Nigeria is now preparing for
the American FAA IASA Category 1 Certification.
With over 25 Airports, 30 Airlines, 590 Pilots, 19 Flight Engineers, 258 Air Traffic
Controllers(ATC), 677 Aircraft Maintenance Engineers, 1103 Cabin Crew and 4 Aircraft
Dispatchers, Nigeria now boasts of improved aviation infrastructural facilities at the Airports,
state of the art navigational aids, modern weather forecasting equipment and highly skilled
manpower to ensure safety and comfort of the flying public.
Airlines have started bringing in brand new aircraft to the industry 737-700 new generation,
Regional Jet CRJ 400/900, Dash 8-400Q, Business Jet/Turboprop, Helicopters, B777,
Dreamliner B787, Jumbo Jet Boeing 747-400 series as well as brand new Regional Jet Embraer.
5.0 Responsibilities
• Advice on adoption of most efficiently and effective ICT policy
• Ascertain proper and smooth operations of computer systems at the headquarters
• Draw ICT and ICT-related Budgets
• Assess the impact of ICT in economic growth and development
• Drawing up specifications to facilitate procurement of appropriate computer hardware and
software related features within the organization
• Supervise the installation and commissioning of computer network systems
• Contact point on all ICT-issues.(i.e. ICT Management)
• Represents the organization in all forums on ICT-related issues
• Coordinate training of staffs on computer systems in line with E-Government Strategy to build
a proper ICT capacity within the organization
• Advice the organization on information security in the use of computers and Maintain
important information and data backups
During my six months SIWES at NCAA, I worked extensively in the Network and maintenance
unit, Where I gained a lot of experience in network environment and system maintenance.
Public port
Private port
Building 1 cabinet
11.0 Ku Band
Ku Band or Kurtz Under band is used to transmit signals at high frequencies. The downlink
frequency of the band ranges from 11.7 to 12.7 GHz while uplink frequency ranges from 14 to
14.5 GHz. NBC started its transmission services on this band in 1983. The DVB or Digital Video
Broadcasting service utilizes this band. The North American satellites broadcast Ku band signals
because they operate in the same range of downlink and uplink frequency. The band consumes
more power than C Band due to additional data transfers. It also requires 16 to 24 transponders
used for broadcasting satellite service. It is mainly used to transmit FM Audio services and in
social and business network projects. The band requires Ku-band LNBF, coaxial cable, and a
C/Ku band feed horn antenna. RG-6 is the perfect coaxial cable for transmission.
Diagram of a Ku-Band-Solid-Dish-Antenna
12.0 Ka Band
Kurtz Above or Ka Band requires more power to transmit signals. The downlink frequency range
is 18.3 to 20.2 GHz while uplink frequency range is 27.5 to 31 GHz. The size of the dish for this
band is even smaller than C band. It varies from two feet to five feet. It is used extensively in
military airplanes and vehicle speed detection.
Diagram of a Ka-Band-Solid-Dish-Antenna
The ISA server also acts as a proxy server/gateway. A proxy server is a server that acts as an
intermediary between a workstation user and the Internet so that the enterprise can ensure
security, administrative control, and caching service. A proxy server is associated with or part of
a gateway server that separates the enterprise network from the outside network and a firewall
server that protects the enterprise network from outside intrusion.
An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites
are frequently requested, these are likely to be in the proxy’s cache, which will improve user
response time. A proxy can also do logging.
A user on a workstation which is connected to the domain can only view the internet if the
address and port number of the ISA server is set in the proxy address and port settings.
• STEP 3: Type in the ISA server ip-address (e.g. 192.168.2.1) in the address box and also insert
the port number (e.g. 3128).
STEP 4: Type in the computer name (e.g. pro 10), then click the domain radio button and type in
the domain name (e.g. dpetri.net), then click ok.
STEP 5: After clicking OK you would prompt with a username and password dialog box where
only those with administrative credentials would be able to logon. Type in the user name and
password, and then click OK.
STEP 5: After clicking OK, you would be prompted with a dialog box welcoming you to the
domain. Then restart the system.
Switch
Patch panel Image of a patch panel connection with a switch
20.0 ROUTER/VPN
A router is a device or a computer that is used to connect two or more networks together. Routers
are physical devices that join multiple wired or wireless networks together. Technically, a wired
or wireless router is a Layer 3 gateway, meaning that the wired/wireless router connects
networks (as gateways do), and that the router operates at the network layer of the OSI model. A
router can also be called a computer because it has a LAN-port, an operating system (OS) and
memory.
20.1 Router’s memories
• ROM (read only memory).
• DRAM (dynamic random access memory).
• NVRAM (non volatile RAM).
• FLASH.
ROM: This is a permanent memory that is used to store the hardware configuration of the router.
DRAM: This is a temporary memory that is used to store the running-configuration of the router.
NVRAM: This is a partially permanent memory that stores the startup-configuration of the
router.
FLASH: This is permanent memory that stores the IOS (Internetwork operating system) of the
router.
A router has an operating system and a user interface (depending on the brand of the router). The
user interface can be viewed by connecting the router via LAN-cable to a computer. There are
series of steps taken to view the user interface.
21.0 STEPS TO VIEW THE USER INTERFACE OF A ROUTER:
• Know the default ip-address of the router (usually 192.168.0.1).
• Connect the router to a computer.
• Open a browser.
• Click on the file tab.
• Click on open then a dialog box appears.
• Type in the Ip-address of the router in the text box and click OK, then a logon dialog box
appears. The default username and password are both admin and admin.
• Type in the username and password then click OK.
In the user interface you can change the Ip-address to suit your company setting, change the
security protocol (i.e. either WAP, WAP2, WEP e.t.c), router name e.t.c
21.1 VPN: A VPN (virtual private network) is a device that uses a series of encryption and
algorithms to secure the data transmitted over the public internet. It allows users to work on their
company network from their home with a higher level of confidence that no one else can access
their work i.e. it provides a level of encryption so that an outsider would not be able to hack in to
the network. VPN eliminates distance between two computers and establish a secured connection
with two computers. A VPN can also act as a router in the sense that it can be used for
connecting two or more networks together.
23.0 Motherboard:
A motherboard is the central printed circuit board (PCB) in a computer that holds many of the
crucial components of the system, while providing connectors for other peripherals. The
motherboard is sometimes alternatively known as the main board, system board. Most
motherboards made nowadays are ATX. An ATX motherboard has the standard I/O
(Input/output) connectors such as PS/2 ports, parallel ports, serial ports, etc, built onto the
motherboard. Old AT motherboard on the other hand uses I/O cards and cables which requires to
be plugged into the motherboard, which gets a bit untidy. AT motherboard requires AT keyboard
and AT power supply. ATX motherboard fits into an ATX case and comes with an ATX power
supply. The following is a picture of an ATX motherboard
Image of a motherboard
24.0 Processor:
The processor (CPU, for Central Processing Unit) is the computer’s brain. It allows the
processing of numeric data, information entered in binary form, and the execution of instructions
stored in memory. The Central Processing Unit (CPU) is responsible for interpreting and
executing most of the commands from the computer’s hardware and software. It is often called
the “brains” of the computer.
Image of a processor
25.0 Memory:
A memory is the name given to a silicon chips that stores volatile computer data. The word
Volatile means that the contents of memory will be lost if the power of the computer switched
off. Memory stores some of your operating system and application data while it is being run. The
more memory you have in your computer the higher the amount of application you can run
simultaneously, and will provide an overall better system performance.
Memory comes in different forms. The older system uses SDRAM, while the current system uses
DDR-SDRAM (Double Data Rate Synchronous Dynamic Random Access Memory).
27.0 RECOMMENDATION
From this experience carried out during the industrial training period. I hereby humbly make the
following recommendation believing that when carefully followed there will be a way forward to
a better future.
1. Six months of SIWES should be strictly adhered to because there is really much to learn
2. ITF should pay students during training to alleviate the problems of transportation than
waiting till the end of the program
3. ITF should pay students during training to alleviate the problems of transportation than
waiting till the end of the programme. The present allowance should be reviewed upward to
reflect present economic realities.
4. The supervisors from the universities and ITF should visit the students at the right time, as this
really would be a motivation
28.0 CONCLUSION
My SIWES was a very successful one, I had an insight of the information security world. I have
now known the power of networking and computer maintenance. With this, I will be able setup a
simple network and maintain my computer and other devices.
SIWES as a course has truly exposed me to the challenges faced in a growing information world
that is dependent on computers.