← Back to portfolio
Published on

Sample of CDR Report Writing for Engineers:

CAREER EPISODE 1

INTRODUCTION:

CE 1.1

This Career Episode 1 displayed the information of academic projects on” The development of a framework for security of higher education’s establishment” while pursuing a Bachelor’s degree in electrical engineering from the institute, XXX. It took place from (3/5/2016 -9/23/2016) under the directions and guidance of, Sir XXX.

BACKGROUND

CE 1.2

Security has become an essential administration issue for all advanced education foundations (HEIs). A safe system is obligatory if an association wants to run productively and shield itself from vindictive assaults. Attacks of cybercrime have affected almost all industries including advanced education in the United States 17% of every single announced datum ruptures. Here is no further place for powerless connections and gaps in the system. Now it’s time for measures taken to guarantee critical information. Keeping in mind the above scenario, we developed a structure for the security of an advanced education foundation in the United Arab Emirates.

OBJECTIVE

CE 1.3

The chief objective of this project was to present a framework on how to prevent cyber-attacks in the context of higher education institutions, using the United Arab Emirates as a case study.

CE1.4

Specifically, we had a few minor objectives which were following

  • • To identify the ICT systems used by institutions of higher education that are commonly attacked
  • • To identify the most common points of vulnerability for the various ICT Systems that are used by Institutions of Higher Education
  • • To identify ways through which the institutions of higher education can minimize their vulnerability

CE 1.5

We endeavored to utilize an innovation apparatus (surveymonkey.com) to disseminate the polls everywhere. We were able together information from 60 out of 70 schools in one week. In this particular data collecting procedure, I wrote and set one envelope for each school and IT staff that contains one poll. Maximum two hours were given to finish the surveys for every foundation, and the specialist gathered the polls.

CE 1.6

I helped my team to answer a portion of the exploration inquiries of this examination at the time of data analysis procedures. I took my role in measurements such as implies, combined means, frequencies, and standard deviations for all things to dissect the reactions. With my support, the information was broken down just by utilizing different software for example, Excel was used where it was conceivable to compute rates and deliver outlines that represent the outcomes. I learned a significant number of hard and soft skills that could help me in the very next future.

CE 1.7

Organization Chart:

Umer Draz

Student

Nasir Ali

Student

Sahir Ali

Student

Ali usman

Student

1.3 PERSONAL ENGINEERING ACTIVITY

CE 1.8

In this project, we found out that we have to utilize the current data security best practices in order to ensure advanced education frameworks. In my suggestions, I ensured that security policy, practices, and the usage of security innovation must be set up.

CE 1.9

After completing this project, I understand that institutions should have clear policies on cyber security that will ensure important data assets are officially managed throughout the enterprise through suitable data and IT governance.

CE 1.10

Through this project, I was able to realize the institutions should have formal procedures and structures; and there should be the use of advanced technology. Its use should not be done in an ad-hoc way, but security and privacy should be given cautious consideration before implementation.

CE 1.11

In this particular project, I came to know that higher education institutions in the UAE must act proactively to secure their surroundings because being compliant does not necessarily mean you are secure. I let them realize the moment when something will have gone wrong, then it will be too late for putting security in place, and waiting till then can cause irreversible damage and substantial unexpected costs.

CE 1.12

I learned from this particular project that most of the victims do not effectively back up their data. We recognized that they should make sure the institution has measures in place to back up all of their information and files. Further, The School IT staff or Network Manager should safeguard that the backup storage is satisfactory and has enough room for growth.

CE 1.12

After analyzing all cases carefully, we came to the point that they would be more secure if they organize a cybersecurity management team in place who will be responsible for security applications at the school. By ensuring that they have security strategies in place which everyone observes, discuss these frequently with other participants such as governors and parents, so that everyone knows there are actions in place, and what to do in the event of something serious happening.

SUMMARY

CE 1.13

In this particular research, I with my team able to present a framework on how to prevent cyber-attacks in the context of higher education institutions, using the United Arab Emirates as a case study. Collecting data, and analyzing it, we are able to identify the ICT systems used by institutions of higher education that are commonly attacked. Further, we identified the most common points of vulnerability for the various ICT Systems that are used by Institutions of Higher Education.

CE 1.14

I have learned practically the role of information technology systems in institutions of higher education. Through this research, I was able to find out some major security threats faced by the institutions of higher education that use information communication technology systems. At the end of this research, we look forward that further research should be done on a network design framework for higher education institutions which helps in proper network management as most vulnerabilities lie in the school’s network.

CE 1.15

This undertaking helped me improve my knowledge of security systems which is a field where I am interested. This project was a good starting in learning the cybersecurity issues. Before creating a framework for the security of higher education’s establishment, it was a different experience than now. During this project, significant numbers of meetings were held with experts and teachers where I always ensured to submit my report before deadlines. Overall, I had played an active role as a managerial person amongst my peers in the project.


CAREER EPISODE 2

INTRODUCTION:C

CE 1.1

This career episode displayed the information academic projects on”

Secured Design of Wireless LAN” while pursuing a Bachelor’s degree in electrical engineering from the institute, Preston University. It took place from, date? Under the directions of and guidance of,

Background

I had undertaken this project with the intent to exceed further my understanding of Secured Design of Wireless LAN from just textbook to practical use. Wireless LAN is a form of local area network which is implemented whenever more than one computer are connected with each other in order to generate a network with using any sort of wires. This local Area Network gives the facility of mobility to its user where they can move around with in the coverage area and will not be disconnected. Usually, this network uses of OFDM 802.1 la modulation or spread spectrum modulation technology to provide communication among devices which is enabled by using radio waves as modulation technologies. In this project i have designed and install services of wireless local area network for a small campus. The main objective was achieved to provide data rate with higher speed using authentication of high level. In this project we had use IEEE 802.lX standard for implementing security over both wired and wireless local area network authentication.

The projects were put into practice by me and with a couple of my colleagues under the guidance of our teachers. We divided this project into three phases: The project was done in three phases. In the first phase, we had made a vast literature review and research through different sources. In the next phase all ideas were shared and an effective working plan was settled upon. Finally a full report was submitted at the end of the project.

Objective

In this era of technology, a computer network plays a critical role in our lifestyle. Effective network able us to retrieve important data from the various computers in the network to the main location that we can modify according to our need.

The main objectives of this project were following

  • To Secured troubleshooting of Wireless LAN
  • To provide data rate with higher speed using authentication of high level.
  • To know what security system is best for wireless Network
  • To exceed further understanding of Secured Design of Wireless LAN from just textbook to practical use.

During the troubleshoot of Secured Design of Wireless LAN, we had attached a few required Wireless Network Component which were 1) Wireless Router, 2) Wireless NIC, 3) Access Point and 4) User devices. The use of Wireless Router was to transmitted data over physical cables in a series of Ethernet packets such as it allows it to receive information from — and transmit information to — the internet. On the other side, to communicate with the wireless router systems we needed wireless NIC.

2.3 PERSONAL ENGINEERING ACTIVITY

During this project, I took my part to make a survey of literature that was available on existing technology and another different platform. I have cited correctly and credits where they were due for the all information and data which I had diligently found for my project. I have taken the role of managerial and able to organize the work to be done stipulated timeframe. After assessing the literature and gathered information, we able to proceed phase.

In this project, I actualized from my textbook concept to practical experience that wireless needs to be secured to prevent access from unauthorized users as wireless security is the basic and becoming the need of the wireless network. We had tried the different types of wireless security which are WEP, WAP, WAP2, and WAP3.

After evaluating and assessing the all different types of wireless security systems, we recommended WAP2 for Campus as we have found it provides more security than WEP, WAP, and WAP3.

I have explained the profoundly Secured Design of Wireless LAN with this diagram. The center of the grounds arranges is the system focus. The switch is associated with the outside system and firewall. There are various types of servers interface with the switch. I utilized one center change associated with the wired organize and the remote controller associated with the center switch. At that point, we have a few PoE changes associated with the center switch and passageway interface to the PoE switches. PoE alludes to Power over Ethernet and it is an innovation that let's organize links convey electrical power. It implies that just one link is enough for the PoE change to give system and power association at the same time. At that point, the APS will spread out the remote flag with the goal that all the customers in the inclusion region can get to the WLAN.

So, this is how I proposed Secured Design of Wireless LAN that fulfills the requirements of Campus and also uses the latest technology according to their needs and security requirements.

So, this undertaking academic project helped me improve my knowledge of wireless LAN which is a field I am interested in. It has proved to be a good starting point in computer networking. The point of the venture was to make a WLAN for grounds in principle part I increased profound learning of the highlights of WLANs Including the points of interest and confinements of WLANs, specialized gauges of WLANs Security and confirmations of WLANs. After that, I effectively manufactured a topology for the WLAN in the pragmatic part by utilizing the VISIO apparatus likewise overseen channels and APs by utilizing Hive Manager NG. At that point, I chose the appropriate security techniques and equipment for the Wireless LAN. There were still a few challenges left amid the usage of this undertaking. For instance How to send APs in a genuine domain How to ascertain the constriction control as indicated by the material of the boundary and u what sorts of programming ought to be introduced in the WLAN. Besides, In this undertaking, I just characterized a dynamic idea for WLAN. If you need to manufacture WLANs, you need an IT gathering to examine and think about progressively about the task. It’s anything but simple employment in genuine condition. You need to consider pretty much all the equipment and programming in the meantime with the advancement and consistent development of system innovation. So, Overall, I played an effective part in the Secured troubleshooting of Wireless LAN. In addition to this role, I able to implementation of my idea for the computer network, I learned and able to implement the use of different Wireless Network Components such as Wireless Router, Wireless NIC, and Access Point. So, As an aspiring electrical engineer, I was able to assemble a big capital of good experience and knowledge which may prove very useful in the future.

CAREER EPISODE 3

INTRODUCTION:

[CE 3.1]

This career episode is related to a job titled “ Power plants controller”. This job was carried out during my tenure at FRONTER WORK ORGANIZATIONS as an electrical engineer between Aug 2017 to May 2018.

Background:

[CE 3.2]

The front work organization in Pakistan needed a Power Plant controller to control, maintain and operate machinery to generate electric power. The project aim was to hire a person who can Control generator output to match the phase, frequency, and voltage of electricity supplied to panels.

[CE 3.3]

They required a person who knows operation Monitoring such as watching deals, gauges, and other indicators to make sure a machine is working properly. Except for these technical skills, they were also looking for a person with soft skills such as active listening—giving full attention to what other people are saying and getting the gist, doing critical thinking such as the use of logic and reasoning to identify the solutions and approach to the problem.

PERSONAL ENGINEERING ACTIVITY

[CE 3.4]

As a power plant controller, I divided the project into multiple phases so that I could perform my duties effectively and for being completed in stipulated time; first of all, I tried to understand my all responsibilities and all the basic scenarios of the project. After that, I drafted the phase completion sheet for proper project execution and in the final stage, I applied my skills and learned strategies to effectively accomplish my all duties.

My Roles & Responsibilities

[CE 3.5]

  • It was included in my responsibility to Adjust controls plants to maintain the flow of power between different sources.
  • I performed to Monitor and inspect power plant equipment to detect clues of operating problems.
  • I was supposed to make minors repair such as condensers, pumps, fans, heaters, compressors, filters, feed water, and chlorinators in the whole system in need.
  • It was included in my responsibility to Control generator output so that there is the same phase, voltage of electricity and frequency, supplied to panels.
  • I was used to taking readings from gauges, meters, and charts at established intervals, and later I do corrective steps.

Practical personal activities

[CE 3.5]

In this job I was supposed to obtain information from different sources to evaluating and determine Compliance with Standards and keep Updating and Using Relevant Knowledge. I used relevant information and correct judgment to check whether the whole system is regulating standards.

[CE 3.6]

It was included in my duty to Documenting and Recording critical Information. I do data entry, transcribing, and maintaining information in written form, later Analyzing Data or Information underlying principles, facts, and reason by breaking down information into separate parts and then figured out the best solutions to the technical problem.

[CE 3.6]

It happened several times during the job we had problems in our working system; I detect the problem by categorizing, and estimating the changes in circumstances or events. I had also much time to consult and communicate with supervisors and peers to provide critical information.

[CE 3.7]

I interacted with computers and Maintaining Mechanical Equipment. I did servicing, adjusting, repairing, and testing machines, moving parts, and other mechanical equipment. In the same way, I also do interact with Computers. I used computer systems including its software and hardware to write programs, set up functions, and process information.

[CE 3.8]

I had established and cooperative working Interpersonal Relationships with others over time which shows my team making skills. On the other side, I had also performed general Physical Activities that require considerable use of the whole body such as climbing and lifting, walking and balance, and handling of materials. I did use my hands and arms in handling, positioning, and installing materials.

[CE 3.9]

During these projects, I have also training and teaching a few of my junior others. I identified the educational needs of others. I believe we should teach others whatever skills we have acquired. So, I helped others by transforming my knowledge to others.

[CE 3.10]

During this job, I have also done Processing of Information such as compiling, auditing, coding, calculating, categorizing, and verifying information. Add to this, I also did the Interpreting the Meaning of Information for Others. I did translate and explaining what some coding information means and how it can be used.

[CE 3.11]

I took the responsibility of judging the Qualities of Things and Services. During that job several times, I was supposed to assessing the value and quality of things that were, directly and indirectly, relevant to my expertise.

[CE 3.12]

I interacted with computers and Maintaining Mechanical Equipment. I did servicing, adjusting, repairing, and testing machines, moving parts, and other mechanical equipment. In the same way, I also do interact with Computers. I used computer systems including its software and hardware to write programs, set up functions, and process information.

[CE 3.12]

I did Collaborations in the Work and Activities with Others. I was used to working with the different members of a group to accomplish tasks; those activities have helped me to develop and Building Teams. Further as encouraging and building mutual trust, respect for each other, and most importantly the cooperation among team members.

Summary

[CE 3.13]

This job frolicked a significant role in my professional career as it has raised my project development, preparation, and administration skills. I learned theoretically in the class that how to do minor repairing such as condensers, pumps, fans, heaters, compressors, filters, feed water, and chlorinators in the system in need but in this job I had transformed my all theoretical knowledge, which I acquired in classroom into practical knowledge.

[CE 3.11]

I learned the theoretical concept processing of Information such as compiling, auditing, coding, calculating, categorizing, and verifying information but I become able to experiment through this job. So, overall, this job played a part of edifice block in my upcoming future activities relevant to electrical engineering.

CONTINUING PROFESSIONAL DEVELOPMENT (CPD)

Serial No.

Title

Topic

Start Date

Ending DATE

Location

1

Workshop

National Rural support program

1/25/2O14

3/20/2014

Johor Town Lahore

2

Conference

4th International Electrical Engineering Conference

1/25/2019

1/26/2019

at IEP Karachi

3

Short course

Telecom Technician

3/7/2015

6/10/2015

www.pist.edu.pk

4

Seminars

All Pakistan 35th IEEEP Student’s Seminar

3/21/2017

3/21/2017

at Dha Suffa University

5

Books

Basic electricity, Dover book on electrical engineering

7/9/2018

12/21/2018

Online

6

Journals

IEEE Transactions on Power Systems

8/7/2019

2/3/2020

Online




-

These are the competency Units and Elements. These elements must be addressed in the Summary Statement (see Section C). If you are applying for assessment as a Professional Engineer, you will need to download this page, complete it and lodge it with your application.

Competency Element

A brief summary of how you have applied the element

Paragraph number in the career episode(s) where the element is addressed

PE1 KNOWLEDGE AND SKILL BASE

PE1.1 Comprehensive, theory-based understanding of the underpinning natural and physical sciences and the engineering fundamentals applicable to the engineering discipline

  • a) I applied my theoretical knowledge in project to examine the projects problem and find new and proper solution.
  • b) I enhanced my knowledge about power plant.
  • c) I learned concept of cyber security attacks.
  • d) I gained understanding of various computer software

CE 1.2, CE 1.6

CE 2.2, CE 2.4

CE 3.2, CE 3.13

PE1.2 Conceptual understanding of the mathematics, numerical analysis, statistics and computer and information sciences which underpin the engineering discipline

  • a) I applied my conceptual understanding of mathematics on different projects.
  • b) At the time of data analysis procedures, I helped my team to answer a portion of the exploration inquiries of this examination.
  • c) I actualized from my textbook concept to practical experience that wireless network needs to be secured to prevent access from unauthorized users as wireless security is the basic and becoming the need of the wireless network
  • d) I learned the theoretical concept processing of Information such as compiling, auditing, coding, calculating, categorizing, and verifying information
  • e) need of the wireless network

I learned the theoretical concept processing of Information such as compiling, auditing, coding, calculating, categorizing, and verifying information

CE 1.6

CE 2.7

CE 3.11

PE1.3 In-depth understanding of specialist bodies of knowledge within the engineering discipline

  • a) I built up a structure for the security of an advanced education foundation utilizing the United Arab Emirates.
  • b) To identify ways through which the institutions of higher education can minimize their vulnerability
  • c) I undertook this project with the intent to exceed further my understanding of Secured Design of Wireless LAN from just textbook to practical use

CE 1.2,

CE1.4

CE 2.2

PE1.4 Discernment of knowledge development and research directions within the engineering discipline

  • a) During this project, I took my part to make a survey of literature that was available on existing technology.
  • b) In this project, for data collections purpose, I created a testing system to welcome the clients and to give a prologue to the exploration.
  • c) I have taken the role of managerial and able to organize the work to be done stipulated timeframe.
  • d) It was included in my duty to documenting and Recording critical Information. I do data entry, transcribing, and maintaining information in written form

CE 1.5

CE 2.6

CE 3.6

PE1.5 Knowledge of contextual factors impacting the engineering discipline

  • a) I value the effective system of electrical engineering and people.
  • b) I understand that Institutions should have clear emphasis and clear policies on cyber security that will ensure that important data assets are officially managed throughout the enterprise through suitable data and IT governance.
  • c) In this era of technology, a computer network plays a critical role in our lifestyle.
  • d) I had also much time to consult and communicate with supervisors and peers to provide critical information.

CE 1.9

CE 2.4

CE 3.6

PE1.6 Understanding of the scope, principles, norms, accountabilities and bounds of contemporary engineering practice in the specific discipline

  • a) I ensured that I followed the proper procedure.
  • b) Through this project, I was able to realize that the institutions should have formal procedures and structures; and the there should be the use of advanced technology.
  • c) In this era of technology, a computer network plays a critical role
  • d) I interacted with computers and Maintaining Mechanical Equipment. I did servicing, adjusting, repairing, and testing machines, moving parts, and other mechanical equipment.

CE 1.10

CE 2.4

CE 3.7

PE2 ENGINEERING APPLICATION ABILITY

PE2.1 Application of established engineering methods to complex engineering problem solving

  • a) I have applied engineering knowledge to solutions of many technical problems I have faced during the project.
  • b) Application of established engineering methods to complex engineering problem solving.
  • c) I took my role in unmistakable measurements such as implies, combined means, frequencies, and standard deviations for all things to dissect the reactions.
  • d) I have also done Processing of Information such as compiling, auditing, coding, calculating, categorizing, and verifying information

CE 1.5

CE 1.6

CE 3.10

PE2.2 Fluent application of engineering techniques, tools and resources

  • a) we endeavored to utilize an innovation apparatus to disseminate the polls everywhere
  • b) This network uses OFDM 802.1 la modulation or spread spectrum modulation technology to provide communication among devices which is enabled by using radio waves as modulation technologies.
  • c) I took my part to make a survey of literature that was available on existing technology
  • d) We had used the IEEE 802.lX standard for implementing security over both wired and wireless local area network authentication.

CE 1.5

CE 2.2

CE 2.3

PE2.3 Application of systematic engineering synthesis and design processes

  • a) I followed logical system to accomplish my projects.
  • b) We built up a structure for the security of an advanced education foundation.
  • c) In the first phase, we had made a vast literature review and research through different sources.
  • d) In the next phase, all ideas were shared and an effective working plan was settled upon. Finally, a full report was submitted at the end of the project.

CE 1.2

CE 2.3

PE2.4 Application of systematic approaches to the conduct and management of engineering projects

  • a) I had discussed many time with my supervisors and team members before preceding any task.
  • b) I had played an active role as managerial person amongst my peers in the project.
  • c) I with my team able to present a framework on how to prevent cyber-attacks in the context of higher education institutions, using the United Arab Emirates as a case study.
  • d) All ideas were shared and an effective working plan was settled upon. Finally, a full report was submitted at the end of the project.

CE1.15

CE1.13

CE2.3

PE3 PROFESSIONAL AND PERSONAL ATTRIBUTES

PE3.1 Ethical conduct and professional accountability

  • a) I worked under supervisors and with seniors/juniors members and led team responsibly.
  • b) During the projects, a significant numbers of meeting were held with expert, our teachers and peers, where I always ensured to submit my report before deadlines.
  • c) I believe we should teach others whatever skills we have acquired. So, I helped others by transforming my knowledge to others
  • d) I did collaborations the Work and Activities with Others. I was used to working with the different members of a group to accomplish tasks; those activities have helped me to develop and Building Teams. Further as encouraging and building mutual trust, respect for each other, and most importantly the cooperation among team members.

CE 1.15

CE 3.12

CE 3.9

PE3.2 Effective oral and written communication in professional and lay domains

  • a) In this particular data collecting procedure, I wrote and set one envelope for each school and IT staff that contains one poll.
  • b) At the time of data analysis procedures, I helped my team to answer a portion of the exploration inquiries of this examination.
  • c) I undertook this project with the intent to exceed further my understanding of Secured Design of Wireless LAN from just textbook to practical use

CE 1.5

CE 1.6

CE 2.2

PE3.3 Creative innovative and proactive demeanor

  • a) I let them realize that the moment when something will have gone wrong, then it will be too late for putting security in place, and waiting till then can cause irreversible damage and substantial unexpected costs.
  • b) We endeavored to utilize an innovation apparatus (surveymonkey.com) to disseminate the polls everywhere.
  • c) I learned from this particular project that most of the victims do not effectively back up their data.

CE 1.11

CE 1.5

CE 1.12

PE3.4 Professional use and management of information

  • a) In this job I was supposed to obtain information from different sources to evaluating and determine Compliance with Standards and keep Updating and Using Relevant Knowledge. I used relevant information and correct judgment to check whether the whole system is regulating standards.
  • b) We divided the project into three phases: In the first phase, we had made a vast literature review and research through different sources. In the next phase, all ideas were shared and an effective working plan was settled upon. Finally, a full report was submitted at the end of the project.

CE 3.5

CE 2.3

PE3.5 Orderly management of self, and professional conduct

  • a) I learned from this particular project that most victims do not effectively back up their data. We found out that they should make sure the institution has measures in place to back up all of their information and files.
  • b) As an aspiring electrical engineer, I was able to assemble a big capital of good experience and knowledge which may prove very useful in the future.

CE 1.12

CE 2.10

PE3.6 Effective team membership and team leadership

  • a) During this project, a significant numbers of meeting were held with expert, our teachers and peers.
  • b) I had to many time to consult and communicate with supervisors and peers to get critical information.
  • c) I had established a cooperative working Interpersonal Relationships with others over time which shows my team making skills

CE 1.15

CE 3.6

CE 3.8

Close