Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

COREN Professional Interview Report

Download as pdf or txt
Download as pdf or txt
You are on page 1of 38

FEDERAL REPUBLIC OF NIGERIA

COUNCIL FOR THE REGULATION


OF ENGINEERING IN NIGERIA

WORK EXPERIENCE REPORT

IN PARTIAL FULFILMENT FOR REGISTRATION AS


REGISTERED ENGINEER/TECHNOLOGIST

COMPUTER ENGINEERING

By: (Ayodeji Festus Fashola)


Application ID: 50834
Phone: 080 351 12897
Email: festus.fash@gmail.com MAY, 2023
A TECHNICAL REPORT PRESENTED TO

COUNCIL FOR THE REGULATION OF ENGINEERING IN


NIGERIA (COREN)

BY

AYODEJI FESTUS FASHOLA

MAY 2023.
CHAPTER ONE

1.0 INTRODUCTION

This report explains briefly my post graduate experience and contribution in the field of

Computer Engineering. It begins with a brief history of my educational background, and

then my Professional Experience in the field of Computer Engineering.

1.1 Summary Of Educational Background

I had my primary education with St Francis Primary School Oyo, Oyo State. from 1991

to 1997 where I obtained my Primary School Certificate. Immediately after my Primary

Education, I enrolled into Command Day Secondary Sch. Ojoo Ibadan from 1997 to

2003, where I obtained my West African Examination Certificate (WAEC) and National

Examination Council (NECO) certificate.

In the year 2011, I gained admission into Ladoke Akintola University of Technology to

Study Civil Engineering. I participated in the 4 months (6) mandatory students Industrial

work experience Scheme with Corporate Electronics Solutions where I was exposed to

the Practical aspect of Computer Engineering by participating in various projects

ranging from Detailing of designs/Planning of Embedded system designs and Software

application development for automation designs and management application

respectively with standard design/coding practices and was introduced to Preparation of


Bill of Engineering Measurement and Evaluation (BEME) etc. I graduated Bachelor of

Technology with Second-Class-Upper in Computer Engineering.

I did my National Youth Service Corps (NYSC) at the Computer Telecoms Services

Limited (CTS) suite 18 Jinifa plaza Central Business District Abuja, where I was

introduced Cloud computing and Infrastructure Engineering.

Ever since graduation, I have been into Embedded system design, automation and

software engineering I'm collaboration with several Engineers, System Architects, and

other professionals in Engineering field and I am proficient in the use of automation

tools, networking and software packages with cloud provisioning inclusive.


CHAPTER TWO

2.0 Summary of Work Experience

Period Detail of Projects/Activities Duration Supervisor

(Months)
Name Signature

July, EMPLOYER: Ericsson

2022 to Position: Site Reliability Engineer

March Project: NetSim/DataCenter and Ericsson 8

2023 Network Manager (ENM) Security

Engineering and Monitoring.

Activities undertaken were;

● Hardware Infrastructure

recommendations.

● Deploying TRUEFORT security

tool.

● Monitor NetSIM/ENM Datacenters

● Troubleshoot & Securing Network

Function Virtualization Infrastructure

(NFVI)
Jan EMPLOYER : Trunks Global Services 13 Eng. Rufus

2021 to Position: Automation Engineer Orimolusi

Feb. Project: Off grid smart house automation

2022 Activities undertaken were for examples: -

● Smart house automation flow and

connectivity.

● Design and Detailing of solar

powered inverter, smart devices

positioning and server rack for ISP.

● Load balancing ISP failover on a

networking router device.

Sept. EMPLOYER: Dynamic-Drive Tech. 15 Engr.

2018 to Position: Embedded System engineer Olanrewaju

Dec. Project: Programming & Embedded Fashola

2020 system design.

Activities undertaken were;

● Programming ATMEL

Microcontroller for smart Inverter.

● Integrating IoT (Internet of Things)

for remote access to power inverter


● Sensor integration and server

administration for remote

monitoring.
CHAPTER THREE

3.0 DETAILS OF ENGINEERING WORK EXPERIENCE

3.1 Project: Embedded system design for IoT Power Inverter

3.1.1 Project Particulars

Project cost: N 3,570,000.00

Position held: Embedded System engineer

Period: 15 Months

3.1.2 Project description

This project is on the designing an IoT power inverter which is an association of a

power inverter and internet of things (IoT) technology. It is designed to convert

24v Direct Current (DC) electricity from batteries or solar panels into alternating

current (AC) electricity 220VAC, 50Hz, 5KVA power rating that is used to power

household appliances and other electronic devices.

IoT power inverter provides advanced functionalities such as remote monitoring

and control of DC and AC power, measuring real-time power utilization and

battery capacity, controlling critical circuit components, ensuring power factor

correction, and monitoring power quality. By connecting the power inverter to the

internet, homeowners can remotely turn on/off their devices, set energy-saving
routines or monitor power usage for all devices, improving energy efficiency

significantly.

Objectives

The objectives of designing IoT power inverters are to provide homeowners with

advanced functionalities that enhance power management's efficiency, safety,

and ease of use. Here are some of the goals of designing IoT power inverters:

I. Increased energy efficiency

II. Remote Monitoring and Control.

III. Improved functionality

IV. Smart automation

3.1.3 Scope of the Works

● Measuring real-time power utilization and battery capacity

● Remotely turn on/off their devices

● set energy-saving routines or monitor power usage for all devices

● Multi charging mode for mains input voltage voltage within the range 160V or

above 240V.
3.1.4 My involvement in this Project

The Projects were executed by a multidisciplinary team of engineers which included

Analog engineers, digital engineers, and Electrical Engineers. The Digital team had the

responsibility of providing the following services:

● control system design,

● Programing & Simulation

● IoT Integration.

● Testing

Overall, building an IoT power inverter requires a solid understanding of circuit design,

simulation, PCB layout, assembly, and testing. With careful planning and attention to

detail, it is possible to build a reliable and high-performance IoT power inverter

The actual project execution work was carried out based on clients’ specifications,

Nigerian standards, international standards and company procedures.

The following are the deliverables I produced on the projects:

● Embedded system design.

● Control switch interfaces

● IoT Smart Control Application.

3.1.5 Challenges encountered and Solutions

Designing an IoT power inverter poses several challenges due to the complexity of the

system and the need for it to be sensitive to the requirements of IoT applications. Below

are some of the challenges involved in designing an IoT power inverter:


The major challenges faced during the course of execution of projects as mention

above was:

I. Sensor Integration: In order to connect to the Internet and enable remote

monitoring and control, IoT power inverters often require sensors such as

temperature sensors, current sensors, and voltage sensors. Integrating these

sensors in a way that doesn't compromise the inverter's existing functionality can

pose challenges.

II. Communication Protocols: IoT power inverters use different communication

protocols to send data to the cloud or a remote monitoring system. Utilizing these

protocols flawlessly can require a different set of skills than what is needed for

inverter design.

III. Security: IoT power inverters must include security measures such as data

encryption and user authentication to protect against attacks. These measures

must be carefully integrated while ensuring that they do not interfere with the

inverter's functionality.

IV. Power Quality: It is crucial to ensure that the IoT power inverter's design

conserves power, is energy-saving, and does not generate dirty power.


Solutions

● To ensure proper sensor integration, real-world tests was employed to ensure

that the IoT power inverter's existing functionality is not compromised. I choose

sensors with an appropriate interface that can smoothly interact with the inverter.

● I chose communication protocols that match their needs and ensure that the

inverter can handle these protocols. Robust hardware and software was also

used to guard against failure, data loss, or DDoS attacks.

● Security systems that guard against hacking attempts, such as encryption,

firewalls, and VPNs, was incorporated into all IoT power inverters. Threat

modeling, an essential process in IoT design, to help identify security risks in

designs and recommend necessary mitigation measures.


3.2 Project: Smart home automation project

3.2.1 Project Particulars

Project cost: N 12,650,000.00

Position held: Automation Engineer

Period: 13

3.2.2 Project description

The Smart House Automation Project is a cutting-edge technology initiative that

promises to revolutionize homeowners' lifestyles by automating routine tasks, improving

energy efficiency, enhancing comfort levels, and improving home security. The project is

part of the larger Internet of Things (IoT) revolution, which aims to connect all devices to

the internet to create a more connected and personalized world. Smart house

automation aims to provide homeowners with a seamless experience, where all home

automation systems can be controlled, monitored and managed from a single hub,

smartphone apps or voice assistants.

The Smart House Automation Project aims to integrate various home systems, including

lighting, heating, cooling, entertainment, security, and appliances, to be able to

communicate and interact with one another. Smart home devices and sensors such as

thermostats, locking mechanisms and motion detectors set up with notifications, which

automatically alerts homeowners if a system is malfunctioning, or if there is any


suspicious activity happening around the house.

Objective

● The objective of smart house automation is to create a home environment that is

comfortable, convenient, secure, and energy-efficient by utilizing advanced

technologies and integrated systems. With the help of connected devices,

sensors, and apps, smart house automation can provide homeowners with

control over various aspects of their home, such as lighting, temperature,

security, entertainment, and appliances.

● The objective of smart house automation is to make everyday tasks simpler and

more efficient, such as controlling the lights and temperature with voice

commands, monitoring home security remotely, and scheduling appliances to

operate during off-peak hours to save energy. Additionally, smart house

automation can provide residents with increased safety and improved quality of

life by detecting potential safety hazards, such as fire and carbon monoxide, and

providing alerts for emergency situations.

● Overall, the objective of smart house automation is to make homes smarter,

more efficient, and more comfortable by using innovative technologies to create a

personalized and intuitive living experience


3.2.3 Scope of the Works

The scope of designing smart house automation is vast and expanding, and there are

numerous factors that designers need to consider when creating a smart home. The

scope of designing smart house automation includes the following:

● Home systems integration: Designers need to focus on integrating all home

systems, such as lighting, heating, ventilation, air conditioning (HVAC),

entertainment, security, and even kitchen appliances.

● Smart devices: Designers also need to include smart devices such as sensors,

cameras, and voice assistants that work together to provide personalized and

intuitive experiences to homeowners.

● User experience: The user experience should be designed to be easy, intuitive,

and streamlined, whether homeowners are using a mobile app, voice commands

or touch panels to control their devices.

● Security: Security is a major concern when designing a smart home, and

designers need to ensure that the system is secure and protected against

hacking and other cyber threats.

● Energy efficiency: In today's world, energy efficiency is a major concern, and

designers need to ensure that energy consumption in a smart home is optimized.

● Customization: Smart home automation can be customized according to the

needs and preferences of the homeowner, so designers need to pay attention to

personalization and customization options.


● Future-proofing: Smart home automation needs to be designed with

future-proofing in mind so that new technologies can be integrated quickly and

efficiently.

In conclusion, the scope of designing smart house automation is multifaceted, and

designers need to consider numerous factors when creating a smart home. With careful

planning, design and execution, smart house automation can greatly benefit

homeowners in terms of convenience, comfort, security, and energy efficiency.

3.2.4 My involvement in this Project:

I was responsible for designing, developing, and maintaining smart home automation

software and hardware, integrating various home systems such as lighting and security,

and ensuring that the system is secure and protected from cyber-attacks.

● Sensors and devices: sensors and devices used in smart home automation, such

as motion sensors, temperature sensors, and various smart home devices.

● Help to define and implement protocols for home automation, including Wi-Fi,

ZigBee, and other wireless communication protocols which allow smart home

devices to communicate with each other.

● Integrating the smart home automation systems with the growing network of

internet-connected devices to enable remote access and control from

smartphones or tablets.
● Develop and maintain platforms and applications used to manage and control

smart home automation systems, including web and mobile applications.

● Ensuring that smart home automation systems are secure and protected from

cyber-attacks, working on the design of firewalls, secure communication

protocols and authentication.

● Optimizing energy use and finding ways to save energy through the use of smart

home automation technology to reduce overall energy consumption.

3.2.5 Challenges encountered and Solutions

While smart home automation technology has numerous benefits, there are also

significant challenges that developers and homeowners need to overcome. Here are

some of the challenges in smart home automation:

● There are numerous communication protocols and systems used in smart home

technology, causing system fragmentation and making it challenging to integrate

different devices together.

● Smart home technology collects and stores personal data, leaving homeowners'

private information vulnerable to cyber-attacks and hacking.

● Smart home devices consume power, and managing power consumption is

challenging, often requiring homeowners to switch off devices manually.

● Smart home technology is still relatively expensive, making it unaffordable for

many homeowners, particularly those in developing countries.


● Smart home technology systems are complex and require technical knowledge to

set up, making it challenging for inexperienced homeowners to access and

manage their devices.

● The maintenance of smart home devices is a challenge, requiring software

upgrades, monitoring regular updates, and managing security patches.

In conclusion, smart home automation technology has overcome many barriers to entry

and demonstrated a huge potential to transform the way we live. However, developers

still need to work together to overcome the challenges posed by fragmentation, security

and energy management issues, compliance, and consumer education for everyday

technology users to benefit from this technology.

Solutions

● The use of VPN (Virtual Private Network) to secure personal data during

transmission.

● Provided a documented operational guidelines.

● Provided a failover Network router that automatically switches to the best internet

coverage.

● Selected devices that works within the basic and fundamental communication

protocol to avoid fragmentation.


3.3 Project: Provisioning and Securing NFVI servers across regions.

3.3.1 Project Particulars

Client: Ericsson Ltd

Position held : Site Reliability Engineer

Period: 8 Months

3.3.2 Project description

This project provides the underlying structure and framework on which software

applications and services run. A robust hardware infrastructure is important for ensuring

that computer systems run efficiently, perform optimally, and have the capacity to handle

heavy workloads. These components include servers, networking devices, storage

devices, and other devices that provide the necessary hardware resources required to

support computing operations

Each layer of the hardware infrastructure has a specific role to play in providing the

necessary hardware resources required to support computing operations. By integrating

the right combination of computing devices, network devices, and storage devices,

organizations can build a robust hardware infrastructure that meets their specific

computing needs and allows them to deliver more efficient and effective services to

stakeholders.
Objectives

The objectives of hardware infrastructure engineering include:

● To ensure reliability and availability: Hardware infrastructure engineering focuses

on designing hardware components that are reliable and available 24/7. This

ensures that system downtime is kept to a minimum and that the system remains

operational at all times.

● To optimize performance: Performance optimization is a key objective of

hardware infrastructure engineering. Engineers aim to design hardware

components that can handle heavy computational workloads and provide the

highest possible performance levels.

● To ensure scalability: Hardware infrastructure engineering should ensure that a

system's hardware can scale up or down depending on changing computational

demands. A scalable system provides cost savings by eliminating the need for

constant hardware upgrades.

● To enhance security: Security is critical for any computer system, and hardware

infrastructure engineering should focus on designing hardware components that

provide the highest levels of security. Secure hardware components protect

against unauthorized access, data theft, and other security threats.

● To provide cost-effective solutions: Hardware infrastructure engineering should

consider the cost of hardware components and prioritize cost-effective solutions

that provide the desired level of functionality and performance without

overspending.
● To enable compatibility: Hardware infrastructure engineering should also address

the issue of compatibility between different hardware components and the

system's software. Engineers should ensure that all hardware components are

compatible with each other and with the software they are running.

Overall, the objective of hardware infrastructure engineering is to design and optimize

the hardware infrastructure of a computer system to ensure that it is reliable, secure,

scalable, and cost-effective while providing optimal performance.

3.3.3 Scope of the Works

Hardware infrastructure engineering has a broad scope that encompasses the planning,

designing, implementation, maintenance, and optimization of hardware components that

form the backbone of a computer system. Some of the key areas of focus within the

scope of hardware infrastructure engineering include:

● Server Hardware: Hardware infrastructure engineering includes the design and

maintenance of server hardware, which forms the backbone of the IT

infrastructure of an organization.

● Networking Hardware: Hardware infrastructure engineering includes the design,

installation, and maintenance of network hardware, such as routers, switches,

and firewalls, that enable communication between different devices within a

network.

● Storage Hardware: Hardware infrastructure engineering includes the design,

maintenance, and optimization of storage hardware, such as hard disk drives and

solid-state drives, which are used to store and retrieve data.


● Virtualization Hardware: Hardware infrastructure engineering includes the design

and maintenance of hardware components that enable virtualization, such as

hypervisors, which allow multiple virtual machines to run on a single physical

server.

● Cloud-based Infrastructure: Hardware infrastructure engineering includes the

design and implementation of cloud-based hardware infrastructure, which

provides scalable, cost-effective, and secure hardware resources via the cloud.

● Security Hardware: Hardware infrastructure engineering includes the design and

implementation of hardware components that enhance the security of a computer

system, such as biometric authentication systems and intrusion detection

devices.

Overall, the scope of hardware infrastructure engineering is vast and covers a wide

range of hardware components and technologies that are critical to the efficient and

secure operation of modern computer systems.

3.3.4 My involvement in this Project:

SRE can be involved in hardware infrastructure engineering in several ways:

● Collaborate with hardware engineers to ensure that the hardware components

are designed and deployed in a reliable manner, providing insights into how

various hardware components will behave under different loads or failure

scenarios, and also made recommendations based on my knowledge of software

systems.
● Helped to ensure high availability for hardware infrastructure by designing

automated monitoring and failover systems. Also develop response strategies for

different types of hardware failures and perform root cause analysis to prevent

future failures.

● I provided Capacity Planning and Load Balancing and plan for future capacity

needs.

● Continuously Improving Hardware Infrastructure: I used analytics and monitoring

data to identify opportunities for continuous improvement in the hardware

infrastructure.

3.3.5 Challenges encountered and Solutions

Hardware infrastructure engineering is a complex field that involves designing,

deploying and maintaining complex hardware systems and technologies. Here are

some of the key challenges in hardware infrastructure engineering:

● Hardware infrastructures can be highly complex, making it difficult to identify and

resolve issues.

● When it comes to hardware infrastructure engineering, scalability is a significant

challenge. Hardware systems are expected to scale up or down to optimize

resource utilization based on demand. This requirement necessitates a

sophisticated infrastructure and scalability plan to meet demand as it evolves

while avoiding overprovisioning of resources.

● Ensuring the reliability and availability of systems is a major challenge.

Unanticipated component failures, network security incidents, and errors in


blueprints or configuration settings all have an impact on the system's availability

and performance.

● Building and maintaining hardware infrastructure can be costly,

● As technology evolves, new components must be integrated with existing

systems.

● Implementing security measures to guard against threats. Defining and

implementing appropriate security measures is crucial to maintain the system's

integrity while balancing operational ease.

Overall, hardware infrastructure engineering requires expert knowledge of hardware

and associated technologies. Identifying and mitigating the challenges posed by

complexity, scalability, reliability, cost, integration of new technologies, and security is

crucial to an organization's success.

Solutions

In other to overcome the challenges in infrastructure engineering, the following solutions

was implemented:

● Simplify System Complexity: System complexity was reduced through careful

design, architecture, and infrastructure management. This was achieved by using

modular systems, analyzing data flows, and employing automation for system

maintenance and upgrades.

● Scalability Planning: This involved proper capacity planning, resource utilization

optimization, predictive maintenance, and fault tolerance measures.


● Robust Reliability and Fault Tolerance Mechanisms: Robust systems that are

designed for resilience and fault tolerance can reduce outages. Redundancy in

resources, automated failover mechanisms, and comprehensive disaster

recovery strategies must be part of the reliable design process.

● Cost Optimization: prioritizing cost optimization tactics, such as cloud computing,

serverless computing, and virtualization, to reduce expenses while preserving

system performance.

● Continuous Improvement: implemented a culture of continuous improvement in

hardware infrastructure.

● Strong Security Measures: security framework covering access management,

threat detection, firewalls, and encryption. Hardware components was hardened

with the latest firmware and software updates to ensure adequate protection

against security threats.

Overall, overcoming the challenges inherent in hardware infrastructure engineering

requires a strategic approach, proper planning, and a focus on reducing complexity,

scalability, reliability, cost, and security. By following these solutions, organizations can

develop a robust hardware infrastructure that delivers optimal performance, resilience,

and availability.
CHAPTER FOUR

4.0 Conclusion

The project experience summary is not exhaustive, because there are some other

ongoing projects I am working on which is not included. But overall, the work experience

I have gathered as outlined in this report shows the hands on responsibility I have been

given and played personally in the profession of Computer Engineering.

These experiences have challenging but rewarding since it has equipped me with

valuable skills to function as both and Computer Engineer and Site Reliability engineer. I

have worked with both locally and internationally with Nigerian and Expatriate engineers

on various projects. The experiences that I have gained have been of immense benefit

to the Companies that I have worked for and to this great Nation.

I hereby certify that, this report is a direct account of my involvement in various

Computer Engineering projects executed, this is not in any way copied from any

unauthorized materials and thus the activities written in this report were built

consistently in an enabling practice environment and under the due supervision of

registered engineers

It is my hope that joining the prestigious Council for the Regulation of Engineering in

Nigeria (COREN) would afford me the opportunity of making significant contribution to

engineering while developing my skills further, I finally wish the COREN to consider,

evaluate and approve my application for registration as a Engineer.


Name: Ayodeji Festus Fashola

Signature:……………………………

Date: 10/05/2023
CHAPTER FIVE

5.1 Endorsement

I, the undersigned, have gone through the report that has been prepared and we

endorse the experience attained and reported by the writer. Based on our personal

knowledge of the character and professional reputation of the applicant, I recommend

for acceptance of this Work Experience report by the COREN in Partial fulfillment of the

requirements for registration as Registered Engineer/Technologist.

Name Stamp and Signature

5.2 Endorsement

I, the undersigned, have gone through the report that has been prepared and we

endorse the experience attained and reported by the writer. Based on our personal

knowledge of the character and professional reputation of the applicant, I recommend

for acceptance of this Work Experience report by the COREN in Partial fulfillment of the

requirements for registration as Registered Engineer/Technologist.

Name Stamp and Signature


APPENDICES

Block diagram of IoT 5KVA inverter operation flow


Inverter Loading control chart
Schematic diagram of Pulse width modulating 50Hz Frequency/buffer unit
Schematic Diagram of Interface/Relay Switch unit
Inverter control circuit (prototype board)
Inverter control circuit with internet module (prototype board)
Signaling Light (LED)

Steps LED 1 LED 2 LED 2 Duration/Stages

(Red) (Green) (Green)

1 Network Searching Blink Blink Blink 30 seconds

2 No Network Found ON OFF OFF Return to 1

3 Network Registered OFF OFF ON Goto 4

4 Internet Connectivity OFF ON ON Goto 5

5 Data Request and Blink & ON ON ON Goto 6

command execution

6 Posting data online and ON ON Blink & ON Goto 5

getting next command

7 Network Request Failure Blink & OFF ON Blink & OFF Goto 5

The Internet module restarts itself to avoid memory overflow after 7mins. Return to 1

If the inverter control circuit doesn’t receive any data from the internet module Return to 1

within the range of 10mins, the controller issues hardware reset.


Result

These are the result obtained from the test carried out on the inverter.

Output voltage (0% loading voltage) 230V

Initial battery no load current 1.5Amps

(Inverter consumption)

Frequency 50Hz

Battery voltage 12V

Oscillator output voltage 6V

75% loading voltage 190V

75% battery consumed current 99.982Amps

Output waveform Modify Sine Wave

Web server Linux OS (Apache)

Database MySql

Programming Language PHP


LIST OF COMPONENTS USED

S/N NAME OF COMPONENTS QUANTITY

1 SG3524 1

2 Transistor (BD139, BD140) 12, 6

respectively

3 Resistor (Fixed & Variable)

4 Diode

5 LCD 1

6 ATMEGA 32 & ATMEGA 328p 1, 1 respectively

7 Capacitor (Electrolytic, Ceramic) 5, 6

8 Transformer (220v to 24v-0-24v) 1

9 Heat sink 2

10 Battery 12v 200AH 1

11 Vero board 2

12 Soldering iron 1

13 Relay 4

14 Casing 1

15 15A Socket 1

16 circuit breaker 2

You might also like