A TECHNICAL REPORT ON INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)
WITH:
NIGERIAN NATIONAL PETROLEUM CORPORATION (NNPC)NATIONAL PETROLEUM INVESTMENT MANAGEMENT SERVICES
(NAPIMS)
BY:
IFON JONATHAN2006/0148
LEVEL: 400
IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF BACHELOR OF TECHNOLOGY (B. TECH) DEGREE IN COMPUTER
SCIENCESUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE COLLEGE
OF INFORMATION AND COMMUNICATIONS TECHNOLOGY
OCTOBER, 2010
CERTIFICATION
THIS IS TO CERTIFY THAT THIS REPORT IS ORIGINAL TO THE AUTHOR, IFON JONATHAN, OF THE DEPARTMENT OF ……………………………………………………..…,COLLEGE OF INFORMATION AND COMMUNCATION TECHNOLOGY, BELLS UNIVERSITY OF TECHNOLOGY, OTA, OGUN STATE AND WAS SUPERVISED ACCORDINGLY BY:
……………………………… ……………………………COLLEGE IT COORDINATOR DATE
………………………………. …………………………….HEAD OF DEPARMENT DATE
……………………………. ………………………………
DIRECTOR OF ITCU DATE
2
The Director,Industrial Training Coordinating Unit,Bells University of Technology, Ota, Ogun State.
Dear Sir,LETTER OF SUBMISSION
I, Ifon Jonathan of the department of Information and technology hereby submit a technical report on Student’s Industrial Work Experience Scheme training program conducted at NAPIMS,NNPC, Ikoyi, for the duration of six months: March 2010 to August 2010.Thank you.
Yours faithfully,
Ifon Jonathan2006/0148
DEDICATION
3
Our deepest fear is not that we are inadequate; our deepest fear is that we are powerful beyond measure. Often times, we ask ourselves, who am I to be brilliant, gorgeous, wanted and fabulous……… actually, who are you not to be?
This report and the entire duration of which the industrial training lasted is dedicated to God Almighty, who through his infinite mercies saw me through the hustles, struggles and tussles of the training, though it seemed like the world was going to turn upside down, due to my first exposure to work in an organization.
I also want to dedicate this report to my parents Captain and Mrs JC.Ifon for their undying love, care and support financially, emotionally, spiritually and morally during this period, this is also dedicated to my brother Ifon Francis.
Most importantly, Bells University Of Technology and the entire staff of the College of Computer Science and Information Technology for deeming it fit and appropriate that I undergo this training in order to gain experience in line with my Academics.
Thank you all for making this experience worthwhile.God loves you, so do I.
4
ACKNOWLEDGEMENTS
I wish to acknowledge and appreciate the quality inputs of each person who has in one way or the other contributed tremendously to the success of my industrial experience.
To all NAPIMS IT staff; My Manager, Alhaji Safana, his Deputy, Mr. Leo Afu, Mr. Bede, Mr. Mike Kani, Mrs. Usiholo, Mrs. Simisola and many others to mention but a few. Thanks for granting me placement in the department; I say kudos to you all. Thank you for your support.
To my colleagues; Toba, Okon, Opeyemi, Patrick, Yussuff, Winifred, Bolaji, Daniel, and Abayomi, can never forget you guys, though the smallest department but the happiest. Thanks a lot!
And to all staff of NAPIMS, Bayo Kuku, Ikoyi with whom we shared common goals and interest, Thank you all very much.
Also to all staff of the College Of Computer Science and Information Technology, Bells University Of Technology, Ota, Ogun State, Nigeria.May the Good Lord grant our heart desires.
TABLE OF CONTENT
5
Title Page …………………………………………………………………………………………………..i
Dedication …………………………………………………………………………………………………ii
Acknowledgement …………………………………………………………………………………….iii
Table of Content…………………………………………………..........................................iv
Chapter 1:
Abstract………………………………………………………………………………………………………7
1.0 Introduction ……………………………………………………………………………………8
1.1 Brief History of Nigerian National Petroleum Corporation (NNPC)….9
1.2 IT Departments and Their Activities…………………………………………………10
1.3 IT Departmental team structure of National Petroleum Investments Management Services
…14
Chapter 2:
My daily activities at the computer department of NNPC…………………….15
2.1 Networking……………………………………………………………………………………….15
2.1.1 Evolution of Networks………………………………........................................16
2.1.2 Types of Cables……………………………………………………………………………….16
2.1.3 Network topologies and Diagrams………………………………………………….17
2.2 Crimping Of Local Area Network Cables………………………………………….19
2.2.1 Operation of D-Link switch…………………………………………………………….20
2.2.2 Server………………………………………………………………………………………………21
2.2.3 Mapping…………………………………………………………………………………………..22
2.3 Creation Of User Accounts On The Napims Domain……………………..22
Chapter 3:
3.1 Software Installation…………………………………………………………………………….23
3.1.2 Software Installation (NAPIMS)………………………………………………………….24
3.1.3 SunSystems( System Spec )………………………………………………………………..25
3.2 Common Administrative Tasks……………………………………………………………32
Chapter 4:
4.1 Computer Hardware Repairs and Maintenance……...……………………………33
4.1.1 Slaving of Hard disk……………………………………………………………………………33
4.1.2 System Recovery…………………………………………………………………………………34
4.1.3 Formatting of a System………………………………………………………………………35
4.2 Resolving Printer problems…………………………………………………………………36
4.21 Resolving UPS problems…………………………………………………………………….37
4.22 Inventory……………………………………………………………………………………………..37
Relevance of SIWES to My Academic Growth…………………………………………38
Chapter 5:
6
Conclusion ………………………………………………………….........................................39
Recommendation……………………………………………………………………………………….40
REFERENCES…………………………………………………………………………………………….41
ABSTRACT
7
The following report describes an overview of the type of work undergone and the experience gained by the attaché in person of Ifon Jonathan which cumulated in the Industrial Training; a major requirement for the awarding of a Bachelors Degree (B.Sc.) in Bells University Of Technology, Ota,Ogun State, Nigeria.
This report reviews my IT experience and exposure gotten while undergoing internship at NATIONAL PETROLEUM INVESTMENT MANAGEMENT SERVICES (NAPIMS), a subsidiary of NIGERIAN NATIONAL PETROLEUM CORPORATION (NNPC). It also focuses on the work done and projects carried out during the period of attachment.
Reviewed also is the hierarchy of the organization which is aimed at delivering world class services to its customers efficiently and effectively.
It reveals the work learned, experience gained and contributions of the attaché to increase the productivity of the Unit which is the Information Technology Unit; precisely the I.T. Infrastructure and Desktop support department of the Unit.
CHAPTER ONE
8
1.0 INTRODUCTION
The Student Industrial Work Experience Scheme is a skill acquisition programme designed to expose and prepare students in Institutions of higher learning for the industrial working situations they are likely to meet after graduation. The scheme exposes students to work methods and give them the needed experience in handling equipment and machinery that may not be available in educational institutions.
My Industrial attachment was done with NAPIMS group, a subsidiary of NNPC in Lagos, it was an experience-gaining scheme which helped in my Academics in the following computer related areas like Networking, software and hardware installation, system maintenance and a little bit of programming, as most of the activities of the information technology department was mainly hardware and some little networking.
Most of the discussions and activities will be more of hardware (NETWORKING). After going through this I.T report, you’ll be convinced that my Industrial Attachment was indeed a successful, educative and an experience gaining one.
1.1 BRIEF HISTORY OF NIGERIAN NATIONAL PETROLEUM CORPORATION
(NNPC)The Nigerian National Petroleum Corporation, NNPC, was established on April 1, 1977, under the statutory instrument-Decree No.33 of same year by a merger of Nigerian National Oil Corporation, NNOC, with its operational functions and the Federal Ministry of Mines & Power with its regulatory responsibilities. This decree established NNPC, a public organization that would, on behalf of Government, adequately manage all government interests in the Nigerian Oil industry. In addition to its exploration activities, the Corporation was given powers and operational interests in refining, petrochemicals and products transportation as well as marketing. Between 1978 and 1989, NNPC constructed refineries in Warri, Kaduna and Port Harcourt and took over the 35,000-barrel Shell Refinery established in Port Harcourt in 1965.
The subsidiary companies include:• National Petroleum Investment Management Services (NAPIMS) • Nigerian Petroleum Development Company (NPDC) • The Nigerian Gas Company (NGC)
9
• The Products and Pipelines Marketing Company (PPMC) • Integrated Data Services Limited (IDSL) • Nigerian LNG limited (NLNG) • National Engineering and Technical Company Limited (NETCO) • Hydrocarbon Services Nigeria Limited(HYSON) • Warri Refinery and Petrochemical Co. Limited (WRPC) • Kaduna Refinery and Petrochemical Co. Limited(KRPC) • Port Harcourt Refining Co. Limited (PHRC) • Eleme Petrochemicals Co. Limited (EPCL)
Notable persons: The Minister For Petroleum; Mrs.Diezani Alison-Madueke The Minister of State For Petroleum; Mr. Odein Ajumogobia The General Managing Director (GMD); Mr . Agustine O. Oniwon
NNPC Management
The NNPC Group comprises of the NNPC Board, the Group Managing Director's office, six directorates namely, Exploration & Production,
Refineries & Petrochemical, Finance & Accounts and Corporate Services, Commercial & Investment & Engineering & Technology.
Each of the Directorates is headed by a Group Executive Director. Its
Divisions are headed by Group General Managers while its ten subsidiary companies are headed by Managing Directors. NNPC has two partly owned
subsidiaries and 16 associated companies.
NATIONAL PETROLEUM INVESTMENT MANAGEMENT SERVCES (NAPIMS)
The National Petroleum Investment Management Services (NAPIMS) is located at 8/10 Bayo Kuku Road, Ikoyi, Lagos, Nigeria. NAPIMS in the Exploration and Production Directorate of NNPC is a critical arm of the Corporation which manages Government investments in the Joint Ventures, Production Sharing Contracts and other contract agreements in the upstream sector of the industry.
10
NAPIMS is also the upstream arm of NNPC that oversees the Federation investments in the Joint Venture Companies (JVCs), Production Sharing
Companies (PSCs) and Service Contract Companies (Scs).NAPIMS is, therefore, set up to earn margin arising from investments in the JVCs, PSCs and SCs with the multinationals and also protect the nation's strategic interests in the JVCs. In addition, NAPIMS engages in frontier exploration services in basins where the multinationals hesitate to venture, like the Chad Basin.
Major Strategic Roles of NAPIMS
To maximize Petroleum Profit Tax (PPT) and guarantee a higher Margin (Rate of Return) on Investment, through efficient cost of monitoring reduction mechanisms;
To ensure that a reserve base is maintained and reserve addition targets are attained. These are: 30 billion barrels by year 2002 and 40 billion barrels by year 2010;
To ensure increased production capacity from the current 2.5 million barrels of oil per day (bopd) to 3 million bopd in year 2003 and 4 million bopd by year 2010;
To encourage gas utilization and commercialization; To promote local content input in engineering and construction,
supplies and materials utilization through in-country technological capability;
To enhance Nigerianization in the industry and facilitate technology transfer;
To promote maximum co-operation in communities of oil and gas producing areas as well as ensure that environmental protection standards are strictly maintained.
MISSIONIs to enhance the benefits accruing to the Federation from its investments in the upstream Petroleum industry through effective cost control & supervision of JV and PSC operations as well as opening up new frontiers.
VISIONTo become a top class portfolio managers of government investments in the Oil and Gas Upstream Sectors.
11
1.2 INFORMATION TECHNOLOGY DEPARTMENT AND THEIR ACTIVITIES
The IT department serves as the life wire of a structured organization where IT professionals handle various technical issues. In NAPIMS, the IT department was initially a small section with about three staff but today it has grown to an eight man staff and is still growing.
Basically, we handle Asset management such as UPS, Laptops, Desktops etc. Vendor Management Network/internet infrastructure Reviewing of some business application Meeting with JV and PSC.
We also deal with the provision of “help desk support” which includes; System maintenance Software/hardware installation Internet configuration/Connection Inventory
The I.T department have some key contractors with different functions which includes
VIEWPAGEView page deals with scanning of the company’s mails, most
importantly the GGM’s (Group General Manager NAPIMS) mails. Also, they are in charge of the database development. Softwares used include; Coffax, Next-4.
GLADSTONE TECHNOLOGYIn charge of providing the Antivirus software and installation for
all the locations for the purpose of preventing virus attacks. The Antivirus software used is SYMANTEC GP SYSTEMS
In charge of System maintenance/repairs (external) and headed by Mr. Niyi
21 CENTURYInternet Service Provider. (Internet)
SYSTEM SPECSSun System for accounting applications.
FELONS
12
Exchange, Active directory, messaging and collaboration.
MECHATRONIC LIMITED In charge of NAPIMS’ website.
NNPC ORGANISATIONAL STRUCTURE
IKKL
13
MD NIKORMA
GMD’S SUPPORT STAFF
GGM, LNG & POWER
GGM ETD
GGM CSLD
GGM CPDD
GGM INVESTMENT
GGM NIG. CONTENT
GGM ITD
MD NETCO
MD HYSON
GGM AUDIT
MD PPMC
GGM PUBLIC AFFAIRS
GGM RENEWABLE ENERGY
GGM R & D
GGM GREENFIELD EXPORT REF.
GGM CORPORATE STRATEGY
MD NIDAS
GROUP MANAGING DIRECTORNNPC M1
GED E&P GED R&P GED F&A GED CS
GGM NAPIMS
MD IDSL
MD NPDC
MD NGC
GGM COMD
MD PHRC
MD WRPC
MD KRPC
GGM ACCOUNTS
GGM FINANCE
GM TREASURY
GGM HR
GGM MEDICAL
GGM P&G
GM INSURANCE
GGM LONDONOFFICE
GGM INT’L VEN. OPP.
1.3 IT DEPARTMENTAL TEAM STRUCTURE
14
MANAGER ITALHAHI SAFANAMANAGER ITALHAHI SAFANA
DM SYSTEM DELIVERYMR. LEO AFU
DM SYSTEM DELIVERYMR. LEO AFU
SYSTEM ENGINEERMR. BEDE NEVOBASI
SYSTEM ENGINEERMR. BEDE NEVOBASI
BUSINESS APPLICATION ANALYSTMR. BEN OSAMOR
BUSINESS APPLICATION ANALYSTMR. BEN OSAMOR
NETWORK ADMINISTRATORMR. MIKE KANI
NETWORK ADMINISTRATORMR. MIKE KANI
TELECOMMSMR ADEGBESAN
SUPERVISOR TELECOMMSUDOH MICHEAL
TELECOMMSMR ADEGBESAN
SUPERVISOR TELECOMMSUDOH MICHEAL
SECURITY ADMINISTRATORMR. ABDULLAHI NASIRU
SECURITY ADMINISTRATORMR. ABDULLAHI NASIRU
GROUPWARE APPLICATION ANALYSTMRS. ESELE USIHOLO
GROUPWARE APPLICATION ANALYSTMRS. ESELE USIHOLO
INTERNET ADMINISTRATORMRS. SIMISOLA IMONITIE
INTERNET ADMINISTRATORMRS. SIMISOLA IMONITIE
2.0 WORK DONE AND EXPERIENCE OBTAINED IN THE DEPARTMENT
The work done and experience obtained in the IT department was generally focused on the following:
Networking Internet configuration and connection Asset management Software/ Hardware installation Computer Hardware Repairs and Maintenance Inventory Network/ Internet infrastructure Adding users and computers to the company’s domain
(NAPIMS.LOCAL).
Being in the IT department of NNPC also helped me make researches more on Networking (CCNA), web design, software engineering, Graphics /Animation using Auto desk Maya as we were allowed to go for Seminar and also ask question from any aspect including computer science and its related field.
2.1 NETWORKINGI learnt how to connect more than one system together to enable
communication and for the purpose of sharing files, folders, resources and information, I was also introduced to most of the CISCO equipment used for networking and with my little knowledge of networking I could help any staff having a network problem.I also learnt how to crimp network cables such as (Straight-through, Cross-over and Power Over Ethernet (POE) used for telephone lines)and having no difficulty in connecting to the internet, how to diagnose the problem of a computer which is/seems to be connected but not browsing.
15
Steps to take include; Plug in the Network cable. Click on the network icon on the taskbar. Click “Properties” if it has been manually configured, uncheck it and Click on “Automatically Detect Setting” for IP address and DNS
servers.In some cases, this might not work until the Cable is unplugged and re-plugged. In some other cases, there’s need for restarting of the system. Also, there are some cases when a computer system would not be able to connect to the internet after all the above steps. I learnt that it could also be a problem from the CISCO switches in the server room. So when we encountered such problems, we note the identification number of the face plates then trace the same identification number on a switch in the server room. Then remove the LAN cables from the exact port on the switch and plug it back, then refresh the internet connection. Sometimes ,we discovered that some LAN ports on the CISCO switches were not working, so we replaced the LAN cables to other ports that were working properly
A computer network is a group of interconnected computers. Networks may be classified according to a wide variety of characteristics.The network allows computers to communicate with each other and share resources and information. The Advanced Research Projects Agency (ARPA) designed "Advanced Research Projects Agency Network" (ARPANET) for the United States Department of Defense. It was the first computer network in the world in late 1960s and early 1970s.
Some Networking tools include;
A network cable A crimping tool RJ45 Plug
A LAN Tester
16
2.1.1 EVOLUTION OF NETWORKS Initially when networks were non-existent, data transfers were done physically. The network that we have today is an enhancement to the traditional mainframe and dumb terminal networks. Networks are classified depending on the geographical area that spans into the following categories:
LOCAL AREA NETWORK (LAN): A private network within a range of 10 kilometers owned and controlled by a single organization. It has a diameter of not more than a few kilometers; this type of network is owned by a single organization.
METROPOLITAN AREA NETWORK (MAN): A public or private network used to connect various locations including suburbs in a metropolitan city.
WIDE AREA NETWORK (WAN): A public network connecting different cities and town mostly through telephone links or microwave links through a satellite. It spans through countries. This type of network is owned by Organizations.
VERY WIDE AREA NETWORK (VWAN): A public network connecting different continents and countries.
2.1.2 TYPES OF CABLE Coaxial Cable – These cables are widely used for cable television systems, office buildings, and other worksites for local area networks. The cables consist of copper or aluminum wire wrapped with insulating layer typically of a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer. The layers of insulation help minimize interference and distortion. Transmission speed range from 200 million to more than 500 million bits per second.
Fiber Optics – These cables consist of one or more thin filaments of glass fiber wrapped in a protective layer. It transmits light which can travel over long distance and higher bandwidths. Fiber-optic cables are not affected by electromagnetic radiation. Transmission speed could go up to as high as trillions of bits per second. The speed of fiber optics is hundreds of times faster than coaxial cables and thousands of times faster than twisted-pair wire.
Network topologies, such as bus network, star network, ring network, mesh network, star-bus network, tree or hierarchical topology network. Network topology signifies the way in which devices in the network see their logical
17
relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout. Networks may be classified based on the method of data used to convey the data, these include digital and analog networks.
2.1.3 NETWORK TOPOLOGIES AND DIAGRAMS
Diagram of Ring topologyIn a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses.
Diagram of Star topologyMany home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.
18
Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)
Diagram of Tree topologyTree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.
Diagram of Mesh topologyMesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing.
19
A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.
2.2 CRIMPING OF LOCAL AREA NETWORKS CABLES
PROCEDURE
Strip off insulation Untangle Wires Place wires in correct order and straighten Trim wires to desired length
NOTE: If the wires are too long the plug will not crimp onto the insulation for strength
Slide wires all the way into the plug. make sure not to disrupt the color scheme
Crimp plug Repeat steps 1-6 for the other end Test wire using LAN Tester
COLOR SCHEME
STRAIGHT THROUGH CROSS OVER ROLL OVER
Orange-
white
Orange-
white
Orange-
white
Green-
white
Orange-
white
Brown
20
Orange Orange Orange Green Orange Brown-white
Green-
white
Green-
white
Green-
white
Orange-
white
Green-
white
Green
Blue Blue Blue Blue Blue Blue-white
Blue-white Blue-white Blue-white Blue-white Blue-white Blue
Green Green Green Green Green Green-white
Brown-
white
Brown-
white
Brown-
white
Brown-
white
Brown-
white
Orange
Brown Brown Brown Brown Brown Orange-white
2.21 D-LINK SWITCH
DIAGRAM
21
Switches are networking devices that allow you connect multiple computers.They offer the same peer-to-peet network connectivity function as routers and hubs.Switches differ from routers in that routers are designed to provide internet access and switches are not,also,switches differ from hubs in that switches enable dedicated bandwidth for each connected device where as devices connected to the hub share bandwidth.You can use a D-Link switch to quickly enable a home/office network.
OPERATION Power up the D-link switch. Plug one end of the AC power
adapter into the DC power jack on the right-hand side of the back of the switch.Plug the other end of the adapter into an electrical wall outlet.This powers up the switch.
Confirm that the D-Link switch is receiving power. The power indicator LED on the front of the switch lights up when the device is powered.
Connect a computer switch.Plug one end of an Ethernet cable into the Ethernet adapter on the computer and the other end into any unused, numbered Ethernet port on the back of the D-link switch. When the switch recognizes the computer, the correspondingly numbered LED on the front of the switch will light up.
Continue adding computers to the D-link switch. Follow the same procedure as for the first computer. The switch can connect up to five(5) Computers.
Communicate between Computers. Use the networking support built into your particular O.S for example; in the Windows XP O.S system, you would use the file and a printer sharing feature. NOTE: (connection between computers to view shared resources is only possible when you are not connected to the server).
2.2.2 SERVER A server Computer, sometimes called an enterprise server.is a computer system that provides essential services across a network, to private users inside a large Organization or to public users in the internet.
HOUSING
22
As servers need stable power, good internet access, increased security and are also noisym it is usual to store them in dedicated server centers or special rooms. This requires to reduce power consumption as extra energy used generates more heat and temperature in the room could exceed the limits. Normally, server rooms are equipped with air conditioning devices. Server cases are usually flat and wide, adapted to store many devices next to each other in the server rack.
TYPES OF SERVER
Application Server Database Server File Server Printer Server Web Server
2.2.3 MAPPING
Drive mapping is the way by which Microsoft Windows and O.S/2 associate a local drive letter ( A through Z) with a shared storage area to another computer over a network. After a drive has been mapped, a software application on a client’s computer can read and write files from the shared storage area by accessing that drive, just as if that drive represented a local physical disk drive. Mapped drives are hard drives, partitions or volumes, or network drives, which are always represented by names, letters, or numbers and they are often followed by additional strings of data, directory tree branches, or alternate levels separated by a “\” symbol. Drive Mapping is used to locate directories, files or objects, and applications, and is needed by the system, administrators, various other operators and users or groups. Mapped drives are usually assigned a letter of the alphabet usually after the first few taken, such as A:\, B:\, C:\, and D:\. Then, with the drive and/or directory (letters, symbols, numbers, names , and all other components, to be mapped would be entered into the necessary locations.
NOTE You have to make use of a local computer running MicroSoft Windows
XP
23
Working LAN connections on both the local and remote computers.
2.3 CREATION OF USER ACCOUNTS ON THE NAPIMS DOMAIN
STEPS The creation of user accounts on the NAPIMS domain is done by using
the Remote Access Desktop Connection (Active Directory).Go to programs, click RAC, ping 10.64.0.5, log on with Administrator password to gain access to the mail server.
After the creation of the user accounts i.e user names and departments, set the new passwords for the user accounts
NOTE: New passwords must be set on log on. Set the user privileges this includes the rights given to the user. For
Example the users are not given the rights and privileges to install programs and applications without the permission of the Administrator.
In some cases, there may be need to transfer user files from the ADMINISTRATOR Account to the new user account. To do this go to my computer, right click, properties, go to advanced settings , then select the option.
To check if a computer system is on the domain, go to my computer , right click, go to properties. If it is on the domain, it would be shown in the system description ,for example, NAPIMS.LOCAL/DOMAIN
CHAPTER THREE
3.1 SOFTWARE INSTALLATION
Installation (or setup) of a program (including drivers, plugins, etc.) is the act of putting the program onto a computer system so that it can be executed.Some software can be executed by simply copying it to a computer and executing it with no further ado; no installation procedure as such is required. Other programs are supplied in a form not suitable for immediate execution, and require an installation procedure. Installation may include unpacking of files supplied in a compressed form, copying them to suitable locations, tailoring the software to suit the hardware and the user's preferences, providing information about the program to the operating system, and so on. The installer may test for system suitability and available
24
mass storage space. Because the requisite process varies for each program and each computer, many programs (including operating systems) come with a general-purpose or dedicated installer – a specialized program which automates most of the work required for their installation.
3.12 SOFTWARE INSTALLATION
Most of the basic installations I did during the period of my Industrial AttachmentIncludes:
Microsoft office Windows XP operating system Symantec Anti-virus Printer and Scanner drivers (hp p2015, 1320 e.t.c.) Network driver Sound driver Adobe reader Sun System (System Specs)
The most notable of softwares that was installed was the Sun System( System Specs).Sun Systems is a software used for Database Management mainly designed and used by staff in the Accounting Department,NAPIMS.
3.13 SUNSYSTEMS (SYSTEM SPECS)
PROCEDURE
Locate the Oracle file in the directory \\10.64.0.6\e$\Pat_Setup\sun541sp1.Open the oracle folder.
25
26
Open the Application folder.
27
Launch the setup.exe file.
Click on Run
28
Click on Next button.
Select Custom setup type.
29
Disable the application Server.
Click on the drop down to select Oracle home, click next.
30
Enter the application server IP Address, 10.64.0.6.
Click next Button.
31
Click Install Button.
Click finish to mark the end of the installation.
32
NOTE: The installation of this software has four(4) steps and they must be followed accordingly.These are;
Installation of Oracle 11G Installation of SunSystems Client Security Installation Of SunSystems Installation Of Vision
3.2 COMMON ADMINISTRATIVE TASKS
Backing up and restoring data. Changing group memberships. Checking event logs. Creating user and group accounts. Deploying and upgrading software. Installing a DHCP Server. Installing a domain controller. Managing applications on a local computer. Managing applications remotely. Managing directory replication. Managing disks and volumes. Managing files and folders. Managing network printers. Managing Services. Managing Network traffic. Monitoring Server performance. Resetting User passwords. Safe guarding your system. Scheduling tasks. Setting up TCP/IP
CHAPTER FOUR:
4.1 COMPUTER HARDWARE REPAIRS AND MAINTENANCE
33
I was trained on computer peripherals and devices such as the motherboard, hard-disk, CD-ROM e.t.c. and I was also trained on how to assembling and dissembling of components of the motherboard.
The following were things I Did during the training as regards Hardware;SLAVING OF HARD DISK DISK REPAIRSYSTEM RECOVERYFORMATTINGRESOLVING PRINTER PROBLEMSRESOLVING UPS PROBLEMS
4.1.1 SLAVING OF HARD DISK I learnt how to slave the hard disk of a system on another just for the purpose of backing up files in order to prevent data loss. Many situations could warrant the slaving of a hard disk.
If the O.S of a particular system is corrupt or being hit by a strong virus, and all means to restore the O.S to its initial state proves abortive, then the next possible solution is to back up the files in that hard disk/drive on that of another system. Hence you can format the system but make sure that the system/setup files have also been backed up!
If the O.S is unable to read or boot from the hard disk, you either restart the system or dissemble the C.P.U and make sure that all cables are tightly fixed, if that has been done and there is no result, then all u need do is back up the files on the computer on another, then any further steps can be taken.
If the system boots and suddenly goes off at some point and then restarts itself again. For this , you can either do a system repair or recovery of the O.S if only you have an XP/Vista CD depending on the type of O.S
34
4.1.2 SYSTEM RECOVERY
System Recovery is yet another means of restoring the computer which was broken down either by a virus or a worm back to the initial state or position it was before the breakdown. This can easily be done in some systems even without the Operating System CD if the recovery partition of the O.S is inbuilt that is (if there is a partitioned space for the system recovery in case of breakdown) but in some other computers or systems, the reverse is the case, that is, there would be a dear need for an operating system CD depending on the Operating system of the Computer. Once the setup begins, the restoration of the computer begins, but to restore a system that broke down say on Monday, the best day or time to restore it is Saturday or Sunday, better still some hours before the breakdown.
4.1.3 FORMATTINGFormatting is a way of cleaning the entire hard disk that is wiping out the whole information on the disk including the setup files then installing a new and fresh copy of the operating system alongside the system files that comes with the installation. Formatting only occurs or is said to be necessary only when all effort to restore the system has proved abortive. That is the hard disk or the O.S has been completely hit by viruses or malicious softwares. Notwithstanding the files on the system can still be backed up on another hard disk (SLAVING). To revive the system, there is a great need for formatting This is made possible by:
Inserting the XP / Vista CD Set the first boot menu to CD-Rom Next, you see 3 options, click the one that says ”INSTALL A FRESH
COPY OF WINDOWS” You’ll see 4 options; FAT and NTFS, Set the installation to NTFS
Quick
35
The Installation begins……….. You’ll be asked to restart the system once some part of the installation
is complete, do that and the proper installation continues…… Once the installation finishes, you have a fresh copy of windows
without any programs on it. Then you can start whatever installations you want!
4.2 RESOLVING PRINTER PROBLEMS
So many errors are likely to occur in a printer. Some of the errors which would warrant immediate attention may include the following;
1. Paper Jam: this occurs at a time whereby a document is being sent into the printer and along the way, the paper suddenly gets stuck in the printer and hence any other document cannot be sent into the printer to avoid more complication.The best possible solution to prefer to this kind of problem is to dismantle the printer and remove the stuck paper gently and carefully and to ensure that the paper does not get torn in the process of removal to avoid more complications.
2. Tonner/ Ink problems: this occur when the ink in the tonner is finished or spilling thereby soiling the paper. If the former is the case, there is need for a change in Tonner, it only tells that the ink is finished and even if a document is sent into the printer, such document on getting out of the printer pane would definitely not be clear and readable. If the latter is the case, all that needs be done is just to remove and dust the ink off the body of the tonner and also clean the interior of the printer.
3. In case a document is being sent into the printer and it fails to print, 3 things are responsible;
The printer device or driver is not installed on the computer and as such there is no communication between the document about to be printed from the computer and the printer
The printer cable that sends signal that a printer is connected to a system is not present.
If all this 2 things mentioned have been done or were already in place and still the document does not print, you never know, the fault might just be from the printer icon which is not been set as the default printer. To accomplish this, go to Printers and Faxes from you control panel and set the printer which is being connected to the computer as the Default Printer.
36
And the simple solution might just be to fill the paper pane with A4 paper if the printer has run out of paper or power off and power on the printer back.
CONFIGURING/SETTING UP A NETWORK PRINTER
Click on Start menu; Select “Printers and Faxes”
Select “Add a Printer”
Select “Add a network printer or a printer attached to another computer”.
Create a new port
Add a printer using TCP/IP address or Hostname
Printer name or IP address
Select “Do not share this printer”.
Click the finish button
CONFIGURING A PARALLEL PRINTER
This is done by connecting the printer to a computer system directly
using a serial cable connected to the Centronics port. When the printer
has been successfully connected and working, it is shared on the
computer system it is connected to. Other users connect to this printer
by searching for the computer name of the machine and clicking on its
printer when it is found. This system now acts as the Printer Server for
others who want to print.
It should be noted here that all of this is done using an administrators
Profile and Password.
Problems that may arise setting up a network Printer
The Printer refused to respond
Possible Solutions
A new IP address is assigned to it
Firewall of the computer systems should be turned off.
37
4.21 RESOLVING UPS PROBLEMS
Some UPSs generate fault as a result of the battery or its board. For instance;
When a UPS is on power but not charging, it should be noted that the fault is from the battery passing across a message for a change in battery. This can only be known when there is power outage.
Another case could be that if the UPS is not on power and is triggered on, it brings up a Red light signifying “danger” and starts making noise, hence the power cord of the UPS should be checked if it is in place. Once this is done the green light comes up.
4.22 INVENTORY
The purpose of taking inventory is just to update one’s database or taking record of newly supplied goods. And this is done by checking the specifications of the computer or the newly supplied good. It could also be existing ones depending on the task given. Inventory is all about checking the vital information contained in not necessarily computers but any goods supplied.
The Inventory I took on Computers while on the training includes the following:
1. Computer Name2. Computer Model3. Computer Serial number4. Hard Disk Drive (HDD)5. RAM Size6. Printer name e.g. Hp LaserJet 2015, 1600 etc.7. Printer Serial number8. Mac Address or Physical address9. Browser Version10. Operating System
This inventory took me and some of my colleagues who were designated to do so a whole week because we had to go from office to office checking the specification of a particular item.
38
RELEVANCE OF SIWES TO MY ACADEMIC GROWTH
The six months industrial attachment was one that captivated my
attention and brought me out to see that which was taught in school as it is
applied in the outside world practically.
Working in the IT department of NAPIMS has helped me build some
level of confidence in myself such that I could easily carve a niche for myself
and actually boast of things I know how to do, and also getting familiar with
so many new techniques in the computing world.
My experience during the training not only developed my skills in
my area of course of study ( Information technology), it also helped motivate
and improve my skills in human relation.
During the course of the training, I was able to find, access, maximize and develop my skills due to the fact that I met with people of high standards and professionals who in one way or the other motivated me and helped me see all the potentials I’ve got inside me and to that effect, challenged me to be more determined and focused. And with all the experience, I believe I’ve got all it takes to be a SUCCESS
39
CHAPTER FIVE
CONCLUSION
This industrial training has been a great privilege for me as a person
because it made me to learn more on the practical of the courses been
taught in school, it has also helped me to have an insight and knowledge on
what the outside market and employers expect of a graduate which has then
made me determined to be a success. The experience was also more of
challenges to seeing human beings like me build great software and
hardware for different applications. It is indeed a privilege.
MAJOR CONTRIBUTIONS
As a member of I.T. Infrastructure and Desktop management, I was able to
contribute my quota to my unit in the following ways
I) Carry out maintenance on the user Computer systems; both corrective
and preventive
II) Taking Inventory of newly supplied goods. i.e. computers, printers, UPS,
data cards, hubs, switches, routers, scanners.
III) Resolve general user issues pertaining to
Log-on problems
Network issues pertaining to configuration and connection; limited
connectivity, no connection to network
Virus Removal from users’ system.
Resolving Printer issues
Configuring new users on their computer systems
Resolving Scanner issues.
40
Installation of MS-Word and Antivirus on newly setup computers.
Joining systems to the Domain of the company (NAPIMS)
Offering some tutorials to some staffs on the use of Microsoft office
programs.
Installations of programs on laptops and desktops of staffs.
CHALLENGES ENCOUNTERED
Lack of Office Space
Limited number of Staffs
Character of users
Lack of Helpdesk Support Structure
Disaster recovery plans or measures.
RECOMMENDATIONS
To the IT department (NAPIMS);
Provision should be made for a much bigger place in the department,
because the present location of the room is so small such that the
office becomes crowded and untidy. Considering the fact that some
gadgets are brought into the room for repairs makes it even worse
because there is less work space.
There is need for a well structured and standard Help desk support to
aid users in troubleshooting of minor issues that should not
necessarily warrant the physical presence of an IT personnel.
41
REFERENCES
www.google.comwww.wikepedia.comwww.nnpcgroup.com
42
Top Related