Professional Documents
Culture Documents
KOJO IT REPORT
KOJO IT REPORT
A TECHNICAL REPORT
ON
STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)
AT
UNIVERSITY OF ABUJA(ICT)
BY
GODFREY AMOS
PSP/ICT/CSC/ND/21/ 3336
SUBMITTED TO
THE DEPARTMENT OF COMPUTER SCIENCE, SCHOOL OF
INFORMATION AND COMMUNICATION TECHNOLOGY, PLATEAU
STATE POLYTECHNIC BARKIN LADI
APRIL 2024
DEDICATION
I would like to express my deepest appreciation to God Almighty and to those who
provided me the possibility to complete this IT report. A special gratitude goes to
the staffs of Plateau State Polytechnic Barkin Ladi whose contribution in
stimulating suggestions and encouragement helped me to co-ordinate myself
especially in writing this report.
1.1 INTRODUCTION
The Student Industrial Work Experience Scheme (SIWES) was first
established in 1973 by Industrial Training Fund (ITF) with the aim of
exposing student in tertiary institutes to professional work methods and
ways of safe guarding the work area and workers in industries.
As a federal parasternal ITF was established in1971 and charged with the
responsibility of generating a pool of indigenous trained man power
sufficient to meet the need of the economy and promotion and incorporating
the acquisition skills.
There is no need overemphasizing the facts that the scheme makes vital
impacts on the national economy, through technological and human
resources development. This includes:
OBJECTIVES
ACHIEVEMENT
PROSPECTS
1. Network Devices:
o Routers: Direct data packets between different networks, often
connecting LANs to WANs.
o Switches: Connect devices within a single network, managing data
traffic to ensure efficient communication.
o Hubs: Basic devices that connect multiple Ethernet devices, making
them act as a single network segment.
o Modems: Convert digital data from a computer into the analog signal
needed for a telephone line or other types of network media and vice
versa.
o Access Points (APs): Allow wireless devices to connect to a wired
network using Wi-Fi, Bluetooth, or other standards.
2. Network Media:
o Ethernet Cables: Commonly used wired connection medium (Cat5,
Cat6, etc.).
o Fiber Optic Cables: High-speed data transmission medium,
especially for long distances.
o Wireless Media: Includes radio waves (Wi-Fi), microwaves, and
satellite signals.
3. Network Protocols:
o TCP/IP (Transmission Control Protocol/Internet Protocol):
Fundamental protocol suite for networking, providing the basic
communication language of the internet.
o HTTP/HTTPS (Hypertext Transfer Protocol/Secure): Protocols
for web browsing.
o FTP (File Transfer Protocol): Used for transferring files between
systems.
o SMTP (Simple Mail Transfer Protocol): Protocol for sending
emails.
o DNS (Domain Name System): Resolves human-readable domain
names to IP addresses.
Types of Networks
Network Topologies
1. Bus Topology:
o All devices share a single communication line.
o Simple and cost-effective but can be slow and has a single point of
failure.
2. Star Topology:
o All devices are connected to a central hub.
o Easy to manage and troubleshoot, but the hub represents a single point
of failure.
3. Ring Topology:
o Each device is connected to two other devices, forming a ring.
o Data travels in one direction, reducing chances of collision, but a
break in the ring can disrupt the entire network.
4. Mesh Topology:
o Devices are interconnected.
o Provides high redundancy and reliability but is complex and costly.
5. Hybrid Topology:
o Combination of two or more topologies.
o Inherits the strengths and weaknesses of the combined topologies.
Network Security
1. Firewalls:
o Hardware or software solutions that control incoming and outgoing
network traffic based on predetermined security rules.
2. Encryption:
o Scrambles data to protect it during transmission, ensuring that only
authorized parties can read it.
3. Antivirus and Antimalware:
o Software solutions that detect and remove malicious software from a
network.
4. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems
(IPS):
o Monitor network traffic for suspicious activity and can take action to
block attacks.
5. Access Control:
o Policies and technologies that restrict network access to authorized
users and devices.
RECOMMENDATIONS
I urge the Federal Government to take the SIWES program more seriously
especially for I.T students and Applied Sciences because the world is drifting
towards I.T. The Government should ensure a proper supervision of SIWES
students so that the purpose of the program will be archived. The Federal
Government should also make adequate provision in the annual budget for proper
funding of SIWES in view of the potential of the program to contribute to
enhancing the quality of the pool I.T skills available to the country. A
comprehensive and detailed directory of who accepts students for SIWES is
urgently required to facilitate placement for SIWES student in industry. The ITF
also should ensure that the payment of the student allowance is paid on time in
other to keep the SIWES students zealous and motivated.
CONCLUSION
My SIWES was a very successful one, I had an insight of the information
technology world. I have now known the power of programming and graphics
designing. With this, I will be able set a goal for myself to build a complete
website and write codes for different programs. SIWES as a course has truly
exposed me to the challenges faced in a growing I.T world that is dependent on
computers.