My Siwes Report
My Siwes Report
HELD AT
(NMSL)
PRESENTED BY
HELD AT
(NMSL)
PRESENTED BY
industrial training , to my parents who has been there from the beginning of my education.
ACKNOWLEDGEMENTS
I wish to register my profound gratitude to God almighty for his grace, guidance, inspiration,
I’m grateful to my mom IGBINOBA FORTUNE ADESUWA for the support, love , her prayers
I also express my sincere appreciation to the Dean of the college, Head of the Department,
supervisor, Mr Akilo
ABSTRACT
This report constituents a review of work undertaken and skills learnt during students industrial
I was involve in configuration of server for EMR, installation of CCTV camera, Creation of
software and maintenance of website. This report gives a brief succinct information on all
program I was exposed, the equipment that were used and defines the experience gained during
my attachment. It accentuates some challenged faced during the process of acquiring the
Fund (ITF) in 1973. It is a training program that provides supervised practical training of
student's theoretical knowledge within a specified time frame. This training can be carried out
either in the government organization or private sector which will help bring exposure to trainees
before graduation. It is designed to train and prepare students for the industrial work
The scheme is a tripartite program, involving the students, their respective Universities, and the
attached Industry. It is funded by the Federal Government Aims and Objectives of SIWES
educational systems aimed at exposing students to practical, real-world work experiences related
Provide students with the opportunity to apply theoretical knowledge gained in the classroom to
2. Industry Exposure:
Expose students to the actual working environment and practices within industries related to
Help students gain a better understanding of industry expectations, standards, and challenges.
Bridge the gap between academic knowledge and practical application by integrating theoretical
Enable students to see the practical relevance and application of their academic studies.
1. Professional Development:
2.Experiential Learning:
Provide a platform for experiential learning, allowing students to learn from direct observation,
Encourage students to learn from both successes and challenges encountered during the
internship.
Allow students to interact with professionals, potentially leading to future job opportunities or
mentorship.
Help students explore different career paths within their field of study.
Assist students in making informed decisions about their future careers based on firsthand
experiences.
CHAPTER TWO
DATA ABOUT COMPANY
NNPC Medical Services Limited (NMSL) operates under the Nigerian National Petroleum
Corporation (NNPC) and provides healthcare services at various locations across Nigeria,
including Benin City. The center in Benin functions as a secondary healthcare provider, offering
diagnostic, curative, and general health management services. It also supports NNPC staff, their
families, and external clients as part of a broader initiative to enhance healthcare delivery and
NNPC's medical division includes 52 clinics and hospitals nationwide, emphasizing its
commitment to world-class healthcare. The facilities are also positioned to serve third-party
consumers, including other oil and gas organizations, which aligns with NNPC's vision to
Regarding ICT integration, NMSL strives to adopt advanced technologies to enhance healthcare
service delivery. This aligns with the corporation's vision of establishing its facilities as a
The NNPC Benin medical staff multipurpose co-operative society was establish with the
principal activity of investment, thrift and credit operations. The society which commenced
operations on 14th july 2008 was incorporated as a cooperative society, and registered as NNPC
Benin medical staff multipurpose cooperative society limited (NNPC BMSMCSL) under section
7 of the Bendel state of Nigeria co-perative societies law cap.45 of Bendel state of nigeria laws,
environment for running distributed big data processing tasks using tools like Apache Hadoop,
Apache Spark, Hive, and others. EMR itself is a managed service, but the underlying
configuration of servers, nodes, and networking needs to be carefully planned based on workload
requirements.
EMR uses EC2 instances for its cluster nodes. The instance types should be chosen based on the
General Purpose: t3, m5, m5a, m6g (balance of compute, memory, and networking)
Compute optimized:c5, c5n, c6g(best for memory-intensive tasks)
Storage Optimized: i3, d2, h1( for worklands requiring high storage throughout) EMR clusters
2. Cluster configuration:
When lauching an EMR cluster, you’ll need to configure several parameters:
Number of nodes: you can scale up and down depending on your workload. For example, start
Hadoop configuration: modify hadoop settings (e.g, block size, replication factor) for optimal
performance. EMR allows you to configure hadoop parameters in the cluster setup via the
console or CLI.
Spark/Other Applications: Enable Spark or other applications (like Hive, Presto, HBase, etc.)
Amazon S3: Most EMR jobs interact with data stored in Amazon S3. Make sure you have your
data stored in an S3 bucket and ensure the EMR cluster has the correct permissions to access it.
HDFS: If you want to use HDFS (Hadoop Distributed File System) within the cluster, ensure the
EBS Volumes: If you need additional storage for your nodes, consider attaching EBS volumes to
4. Networking Configuration
VPC and Subnets: Launch your EMR cluster in a VPC (Virtual Private Cloud) for secure
networking. Ensure that the instances have appropriate security group and subnet configurations.
Security Groups: Set up security groups to control inbound and outbound traffic. Typically, the
master node should have SSH access from trusted IPs, and the core/task nodes should only
IAM Roles: Assign IAM roles with appropriate permissions for EMR instances to interact with
Bootstrap Actions: When launching an EMR cluster, you can specify bootstrap actions (custom
scripts) to install additional software or configure the system as needed before the cluster is
6. Cluster Security
Encryption: You can enable encryption for data at rest (HDFS, S3) and in transit (between
nodes).
Kerberos: If you're using a more secure environment, consider setting up Kerberos authentication
IAM Policies: Carefully manage IAM policies for both the EMR service role and the EC2
CloudWatch Monitoring: Enable CloudWatch monitoring to track metrics for the cluster’s
performance.
Auto-scaling: If your workload requires fluctuating compute resources, enable EMR Auto
EMR Managed Scaling: Automatically adjust the number of core and task nodes based on the
workload.
8. Cost Management
Spot Instances: Consider using Spot Instances for cost savings on task nodes if your workloads
are fault-tolerant.
Pricing Model: Choose between On-Demand or Reserved instances based on your usage
patterns.
9. Other Optional Configurations
Presto/Impala for Interactive Queries: If you need interactive SQL query capabilities, you can
Hive Metastore: Use an external relational database for a Hive metastore (e.g., RDS or MySQL)
to manage metadata.
EMR Console: You can launch and configure the cluster via the AWS Management Console,
CLI/API: Use AWS CLI or the EMR API for automation and advanced cluster management.
To launch an EMR cluster with Spark, you can use the AWS CLI:
Figure 2: explaining to other IT students how to access server from the terminal using ANYDESk connect
3.3 Installing a CCTV camera involves several key steps: selecting the right equipment, setting
up the cameras, wiring, and configuring the system. Here's a comprehensive guide to help you
Determine Coverage Area: Identify the areas you want to monitor, such as entrances, parking
lots, hallways, or specific rooms. Make a map or layout of your property to decide the camera
positions.
Number of Cameras: Decide on how many cameras you need based on the coverage areas.
Camera Types: Choose the type of CCTV cameras that suit your needs:
IP (Internet Protocol) Cameras: These use your network and can be accessed remotely.
Wireless Cameras: These don’t require physical cabling but need a Wi-Fi connection.
Power Supply (Power over Ethernet (PoE) for IP cameras or separate adapters)
CCTV Software or App for configuration and remote monitoring (for IP cameras)
Determine Camera Placement: Position the cameras at strategic locations for optimal coverage.
Install cameras high enough to avoid tampering, but angled to capture clear footage.
Drill Holes: Mark the spot where you want to mount the camera and drill holes for the mounting
screws.
Install Mounting Brackets: Attach the camera’s mounting bracket to the wall or ceiling, using
Attach Cameras: Mount the camera to the bracket and adjust its angle to ensure it covers the
desired area.
For Analog Cameras: Run the coaxial cable from the camera to the DVR. Ensure the cable is
If the camera is powered separately, run a separate power cable to the camera.
For IP Cameras:
PoE (Power over Ethernet): If using PoE, you only need to run an Ethernet cable, which will
For Wireless Cameras: These still require power, so make sure the camera is placed near a power
Analog System: Connect each camera’s coaxial cable to the corresponding input ports on the
DVR.
IP System: Connect each camera to the NVR or router/switch (for wired cameras) using Ethernet
cables. For wireless cameras, ensure that the camera connects to the Wi-Fi network.
Power Supply: Connect each camera to a power source (PoE from the NVR, or a separate power
adapter).
DVR/NVR Setup: Power on the DVR/NVR and connect it to a monitor or TV for easy viewing
of camera feeds.
IP Camera Configuration:
If using an IP camera system, access the camera’s web interface through its IP address or use the
Assign IP addresses if needed, set up motion detection, recording schedules, and camera-specific
Record Settings: Set up how you want to record (e.g., continuous, motion detection, or scheduled
recording).
Ensure you have adequate storage based on the recording resolution and duration.
For remote access, configure port forwarding on your router to allow external access.
Set up the mobile app or web interface for remote viewing. Most NVR/DVR systems come with
Ensure your camera system has a strong internet connection if you plan to access it remotely.
Check Camera Angles: Adjust the camera angles to make sure they are covering the intended
areas.
Verify Video Feed: Ensure the video feed is clear and there is no interference or distortion. Test
Test Recording: Check that footage is being recorded properly and stored on the NVR/DVR.
Motion Detection: If your system has motion detection, test it to confirm it triggers recording as
expected.
Clean Lenses Regularly: Dust and dirt can affect image quality. Periodically clean the camera
lenses.
Update Firmware: Keep the camera firmware and NVR/DVR software up to date for optimal
Backup Footage: Regularly back up important footage, especially if your storage capacity is
limited.
Troubleshooting Tips
No Video Feed: Check the camera’s power supply and cable connections. Ensure the DVR/NVR
is functioning correctly.
Poor Image Quality: Adjust the camera’s position or lighting. Ensure the lens is clean and the
Network Issues (for IP Cameras): Verify network connections, ensure the camera has a valid IP
address, and check your router’s settings (e.g., DHCP or static IP).
By following these steps, you should be able to successfully install and set up a CCTV camera
3.4 The creation of software involves several key stages, each of which contributes to turning an
idea into a fully functioning application or system. These stages can vary depending on the
specific development methodology being used (e.g., Agile, Waterfall, DevOps), but the general
This phase involves understanding the needs of the users, business requirements, and technical
constraints. Stakeholders provide input to create a list of features and functional requirements.
Documentation often includes use cases, user stories, and technical specifications.
This phase involves understanding the needs of the users, business requirements, and technical
constraints. Stakeholders provide input to create a list of features and functional requirements.
Documentation often includes use cases, user stories, and technical specifications.
2. System Design
Objective: Plan how the software will be built.
The system architecture is designed, which includes making decisions on technology stacks,
A high-level design (like wireframes or mockups) might also be created for the user interface.
3. Development (Coding)
In this phase, developers begin to build the software using the design documents as a guide. This
step includes front-end development (user interface) and back-end development (server-side
4. Testing
Objective: Ensure the software works as expected and is free from critical bugs.
Quality assurance (QA) testers perform various types of tests, such as unit testing, integration
5. Deployment
Once the software passes all tests, it is deployed to production environments. This could involve
Continuous integration/continuous deployment (CI/CD) practices are often used to streamline the
deployment process.
Objective: Fix bugs, add features, and update software over time.
After release, software will typically undergo updates to fix bugs or security vulnerabilities. New
7. Documentation
Both end-user documentation (help guides, tutorials) and developer documentation (API
references, system design documents) are created to ensure the software is usable and
maintainable.
Development Methodologies
Agile: Emphasizes iterative development with frequent releases and constant feedback.
Waterfall: A linear, sequential approach where each phase must be completed before moving to
the next.
Software creation is a dynamic and collaborative process, often requiring input from various
stakeholders like developers, designers, testers, and business analysts. Proper planning, clear
communication, and regular feedback loops are essential for building successful software.
3.5Website maintenance is the ongoing process of updating, monitoring, and managing a website
to ensure it remains functional, secure, and effective over time. Regular maintenance helps
improve the user experience, boost SEO performance, and keep the website running smoothly.
Actions:
Use tools like Google PageSpeed Insights, GTmetrix, or Lighthouse to identify performance
issues.
Monitor uptime using services like UptimeRobot to ensure the site is accessible.
Actions:
Regularly update software, including the content management system (CMS), plugins, and
Monitor for potential security breaches, including malware and unauthorized access.
Use strong encryption (SSL/TLS certificates) and implement secure authentication protocols.
3. Content Updates
Actions:
Add new blog posts, product updates, news articles, or other content to keep the site engaging.
Ensure that multimedia content like images and videos are properly formatted and up to date.
Actions:
Regularly scan the site for broken links (internal and external) using tools like Screaming Frog or
5. SEO Optimization
Actions:
Regularly check SEO performance using tools like Google Search Console or SEMrush.
Optimize on-page elements, including title tags, meta descriptions, headers, and images.
Improve internal linking structure to ensure good website navigation and better crawling by
search engines.
6. Database Optimization
Actions:
Regularly clean up and optimize the database (especially if using a CMS like WordPress).
Remove unnecessary data, such as post revisions, spam comments, or unused media files.
7. Mobile Responsiveness
Actions:
Test the site across different screen sizes and devices to ensure it’s mobile-friendly.
Update the design or adjust CSS as necessary to improve responsiveness.
8. Accessibility Enhancements
Objective: Ensure the site is accessible to all users, including those with disabilities.
Actions:
Perform accessibility audits to meet standards such as WCAG (Web Content Accessibility
Guidelines).
Check color contrast, alt text for images, keyboard navigation, and screen reader compatibility.
Actions:
Collect feedback from users through surveys or usability tests to identify areas for improvement.
Implement changes based on user insights to enhance site usability and engagement.
Regularly back up the entire website, including files and databases, to a secure location.
Actions:
Regularly review and update privacy policies, terms of service, and cookie consent banners in
accessibility.
Actions:
Update the CMS, themes, plugins, and third-party tools to ensure compatibility, security, and
performance.
Test updates in a staging environment before applying them to the live site to avoid disruptions.
Actions:
Update the website's theme or layout periodically to reflect brand changes, new design trends, or
user feedback.
Ensure the design remains aligned with the overall user experience goals.
Regular maintenance is essential for keeping your website functional, secure, and competitive.
monthly, or quarterly basis. You can choose to handle maintenance in-house or hire a website
CONCLUSION
I extend my sincere gratitude to the entire NNPC Medical Centre LTD, especially the ICT team,
for their mentorship, support, and the opportunity to contribute to the organization's staffs
initiatives. This internship has not only deepened my understanding of every aspects as
mentioned but has also empowered me to make meaningful contributions to the broader realm of
In conclusion, internship at NNPC Medical Center LTD Group has been an invaluable
experience, equipping me with practical skills, industry insights, and a heightened awareness of
the critical role that plays in safeguarding digital assets. I am confident that the knowledge and
RECOMMENDATION
programs to prepare students for workplace expectations, roles, and responsibilities. This
should include:
o Communication skills.
Recommendation:
o Institutions should collaborate with reputable organizations that align with the
o A centralized placement system can help match students to industries that offer
fairness in allocation.
schedules and job descriptions that align with their academic curriculum.
o Institutions should partner with industries to create detailed task lists and training
Recommendation:
students effectively.
5. Financial Support
Recommendation: Regulatory bodies like ITF (Industrial Training Fund) and institutions
should provide adequate stipends to students for transportation, feeding, and other
o Government and private sector partnerships can also fund SIWES programs for
better sustainability.
6. Safety Training and Compliance
o Use this feedback to improve future placements and address recurring issues.
industries through:
o Regular communication.
The Students Industrial Work Experience Scheme (SIWES) serves as a critical bridge
between academic theory and practical application. It offers students the opportunity to
gain hands-on experience, develop technical skills, and understand workplace dynamics,
During the course of SIWES, students face real-world challenges, adapt to organizational
structures, and apply their academic knowledge in solving practical problems. These
experiences not only enhance their technical proficiency but also improve their
employability and preparing students for future career challenges. It is recommended that