Technical Report
Technical Report
_______________________
Student signature & date
CERTIFICATION
This is to certify that the SIWES report is part of the requirements for the successful completion of the
STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES), has been reviewed and
examined.
This report has been found to be a comprehensive and accurate reflection of the student`s experiences and
learning during the SIWES program at LIRS. The student has demonstrated a commitment to the
objectives and standards of SIWES
ACKNOWLEDGEMENT
My appreciation goes to the industrial Training Fund for their foresight in putting this program in place.
I am grateful to LIRS for providing me with the necessary skills to be exposed in my field.
I also want to say a big thank you to my industry based supervisors and my able colleague for making my
stay at LIRS an exciting and blissful one.
To my parents and siblings thank you all for your moral and financial support. I cannot wish for a better
family.
I am deeply indebted to God almighty, the giver of all wisdom, knowledge and understanding, without
whom i would have achieved nothing at all.
Finally to my Institution based supervisor for his support and to my other friends and colleagues. Thank
you all, I am highly grateful.
SUMMARY
During my internship experience at Lagos State Internal Revenue Service, I had the invaluable
opportunity to apply and enhance my skills as a Networking Enthusiast. Working within a dynamic and
collaborative team, I gained hands-on experience in various aspects of Networking. From Configuring to
troubleshooting and testing, I was exposed to real-life tasks that allowed me to grow both technically and
professionally.
During my internship, I was immersed in the day-to-day operations of the networking department, where
they engaged in various tasks that provided hands-on experience with networking technologies and
practices. Their responsibilities included configuring and managing network devices such as routers and
switches, learning to set up and troubleshoot network connectivity issues, and assisting in the
implementation of network security measures.
Some Key activities that were performed are:
Network Configuration: The intern worked with networking hardware and software, gaining practical
skills in configuring routers and switches, setting up VLANs, and managing IP addresses and sub-netting.
Troubleshooting and Support: They played a role in diagnosing and resolving network issues, utilizing
tools like Wireshark and command-line utilities to analyze and fix connectivity problems.
Security Practices: Exposure to network security principles included implementing firewalls,
configuring VPNs, and understanding basic intrusion detection and prevention measures.
Documentation and Reporting: The intern assisted in documenting network configurations, maintaining
network diagrams, and preparing reports on network performance and incidents.
The internship provided me with a comprehensive understanding of networking concepts, hands-on
experience with network equipment, and insights into the challenges and solutions associated with
network management. I developed practical skills in network configuration and troubleshooting, gained
knowledge of security practices, and learned the importance of effective documentation and
communication in a professional setting. The experience helped me build a solid foundation for a career
in networking and cybersecurity.
TABLE OF CONTENTS
Cover page...............................................................................................................................
Dedication................................................................................................................................
Acknowledgement...................................................................................................................
Summary..................................................................................................................................
Table of content........................................................................................................................
CHAPTER ONE
1.1 Introduction.....................................................................................................................
1.2 Aims and Objectives………….......................................................................................
1.3 Role of student during SIWES........................................................................................
1.4 Objectives of the report...................................................................................................
1.5 The logbook.....................................................................................................................
CHAPTER TWO
2.1 History and Background of Lagos state internal revenue service ..................................
2.2 Company’s Objectives………….....................................................................................
2.3 Work Units and Activities Performed within Each Unit.................................................
2.4 Organogram at LIRS……………...................................................................................
CHAPTER THREE
3.1 Assigned Unit and Duties carried out.............................................................................
3.2 Project Experience...........................................................................................................
3.3 Lesson learned..............................................................................................................
CHAPTER FOUR
4.1 Problems Encountered At Work Place.........................................................................
4.2 Recommendations........................................................................................................
4.3 References....................................................................................................................
LIST OF FIGURES
CHAPTER ONE
1.0 INTRODUCTION TO SIWES
SIWES stands for Students Industrial Work Experience Scheme. It is the accepted skills training program,
which forms part of the approved minimum Academic standards in the various degree program for all
Nigerian tertiary Universities (N.U.C 1996). SIWES goes a long way in putting to test the level of
knowledge a student has acquired during the industrial training program. It is an effort to bridge the gap
existing between theory and other practice of architecture, engineering and technology, sciences,
agriculture and other professional educational programs in the Nigerian tertiary institutions. It is aimed at
exposing students to machines and equipment and professional work methods in industries and other
organizations.
The scheme is a tripartite program, involving the students, the universities and the industries (employers
of labor). It affords students the opportunity to familiarize and expose themselves to the knowledge and
experience needed in handling equipment that is not readily available in their various institutions. Before
the establishment of this scheme, employers believed that the theoretical education in tertiary institutions
were not adequate enough to meet most of the needs of employers of labor.
Networking Department: Their duty is to ensure optimal performance, identifying and resolving
any bottlenecks or issues that could impact connectivity. This involves using network monitoring
tools to track traffic, detect anomalies, and optimize network resources
2.4 Organogram at LIRS IT unit
A-DIT
HIT
CHAPTER THREE
2. Troubleshooting:
Identifying Connectivity Issues: I helped in Diagnosing and resolving basic connectivity
problems, such as network outages, slow connections, or device disconnections. I begin
by identifying the scope of the issue, whether it's affecting a single device, a group of
users, or the entire network. I use tools like ping commands, traceroutes, or network
diagnostic utilities to trace the problem's origin. For instance, if a user reports an inability
to connect to the internet, I might check the physical connections, verify the network
settings, and ensure the device is properly configured.
Configuring and Testing Network Devices: I assisted in configuring network devices like
routers, switches, and firewalls, and perform testing to ensure proper functionality. When
troubleshooting network issues, I might need to reconfigure network devices to resolve
misconfigurations or restore network connectivity. This could involve resetting a router to
its default settings, adjusting firewall rules, or reconfiguring a switch’s VLAN settings.
After making changes, I would test the network to confirm that the issue is resolved. This
process taught me the importance of correct device configuration and how changes can
impact network performance and security.
3. Configuration Management:
Backup and Restore Network Configurations: I helped in backing up current network
configurations and restoring them when necessary. I help in creating and maintaining
backups of network device configurations, such as those for routers, switches, and
firewalls. This involves using tools or commands to save the current configurations to a
secure location. If a device fails or a configuration change causes issues, I assist in
restoring the previous stable configuration from these backups. This process teaches me
the importance of regularly backing up configurations to minimize downtime and data
loss in case of network issues.
4. Patch management:
Assisting with Patch Testing: I Helped in testing patches in the organization to ensure
they function correctly and do not introduce new issues. I assist in setting up a test
environment that replicates the production network. I applied patches in this environment
to observe their effects and identify any potential issues. This testing helps ensure that
patches work as intended and do not negatively impact network performance or
functionality before being deployed to the live network.
Monitoring Post-Patch Performance: After the patch, I monitored the network
performance and stability after patch deployment to ensure that the patches have not
caused any issues. This includes checking for any performance degradation, connectivity
issues, or unexpected behavior.
5. Network security:
Monitoring Security Alerts: I assist in the monitoring and analyzing security alerts
generated by security information and event management (SIEM) systems or intrusion
detection systems (IDS). I help review alerts and notifications related to potential security
incidents, such as unauthorized access attempts, unusual traffic patterns, or malware
detections. I used SIEM a tool called (PRTG) to examine these alerts and determine their
severity. I may perform initial analysis to categorize the alerts and decide if they require
further investigation or immediate action. This duty provides experience in understanding
and responding to security threats.
Conducting Vulnerability Assessments: I assist in performing vulnerability assessments
and scans to identify potential security weaknesses in the network. I help run
vulnerability scanning tool (Nessus) to detect security vulnerabilities in network devices,
servers, and applications. This involves configuring and initiating scans, reviewing the
results, and identifying critical vulnerabilities that need to be addressed. I learnt how to
interpret scan results, prioritize vulnerabilities based on risk, and contribute to
remediation efforts. This task is crucial for maintaining the network’s security posture
and addressing potential risks proactively.
6. Wi-Fi Management:
Access Point Configuration and Deployment: Here I collaborated with the team in
configuring and deploying Wi-Fi access points (APs) to ensure optimal coverage and
performance. I help to set up Wi-Fi access points by configuring their settings, such as
SSIDs (Service Set Identifiers), security protocols (e.g., WPA3), and channel selections. I
also assist in physically installing APs in strategic locations to ensure comprehensive
coverage across the area. This involves working with network management tools to
configure and optimize AP settings based on site surveys and user needs.
Monitoring Wi-Fi Performance: I Monitor Wi-Fi performance metrics to identify and
address issues related to signal strength, interference, or bandwidth usage. I use Wi-Fi
monitoring tool (PRTG) to track performance metrics such as signal strength, data
transfer rates, and channel utilization. I analyze these metrics to identify areas with weak
signals, high interference, or excessive congestion.
Troubleshooting Wi-Fi Issues: When users report connectivity problems, I help
diagnose and resolve these issues. This may involve checking AP status, verifying
network settings, and troubleshooting interference or configuration problems. I might use
diagnostic tools to identify issues such as weak signals, improper AP configurations, or
network congestion. They work to restore connectivity and ensure users can access the
Wi-Fi network reliably.
7. Backup and Recovery:
Performing Routine Backups: I was involved in executing scheduled backups of
network data, configurations, and system states. I help manage and execute regular
backup tasks to ensure that network data, including device configurations, critical files,
and system states, are securely backed up according to the organization’s backup
schedule. This involves using backup software or tools to perform full or incremental
backups. I ensure that backups are completed successfully and verifies their integrity by
checking logs and reports. Routine backups are crucial for data protection and recovery in
case of data loss or system failures.
Testing Backup Restorations: I was involved in testing backup restorations to ensure
that backups can be successfully restored when needed. I help verify the effectiveness of
backup solutions by performing test restorations from backup files. This involves
restoring data or system configurations from backups to a test environment to ensure that
the data is intact and usable. Testing helps identify any issues with the backup process or
data integrity before an actual recovery situation arises. By conducting these tests, I
ensure that backups are reliable and that recovery processes are effective.
8. Reporting:
Performance Reporting: Creating reports that document the uptime and downtime of
network devices and services. This includes tracking incidents that led to outages and the
time taken to resolve them.
Incident Reports: Helping to prepare reports on security incidents, including
unauthorized access attempts, detected vulnerabilities, and any breaches.
Network Configuration Audits: Assisting in generating reports that compare the current
network configuration against established standards or baselines. This helps ensure that
the network is configured securely and efficiently.
3.2 Project Experience
Task Master OS TICKET
The FEST OS Ticket is likely a specific implementation or a customization of OS Ticket, which
is an open-source support ticketing system designed to streamline customer service and
communication by creating a centralized platform for managing incoming queries, complaints, or
requests. Here are some key features of OS Ticket that may also apply to the Task Master OS
Ticket:
Issue: Ensuring secure user authentication and protecting sensitive data from unauthorized
access, SQL injections, and brute-force attacks.
Solution:
Implemented strong password policies, using secure hashing algorithms like `bcrypt` for
password storage.
Utilized prepared statements and parameterized queries to prevent SQL injection attacks.
Introduced multi-factor authentication (MFA) for additional security.
Issue: Slow response times and performance bottlenecks due to an increasing number of
tickets and users.
Solution:
Issue: Difficulty in integrating the new ticketing system with existing enterprise tools like
CRM, ERP, and other third-party applications.
Solutions:
Developed RESTful APIs to facilitate communication between the ticketing
system and other applications.
Used middleware to handle data transformation and synchronization, ensuring
seamless integration.
CHAPTER 4
REFERENCES
. "Network+ Guide to Networks" by Jill West, Tamara Dean, and Jean Andrews(2021)
"Network Warrior" by Gary A. Donahue(2009)
"The Art of Network Architecture: Business-Driven Design" by Russ White and Denise Donohue (2014)