You are on page 1of 42

A TECHNICAL REPORT ON INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) WITH: NIGERIAN NATIONAL PETROLEUM CORPORATION (NNPC) NATIONAL PETROLEUM

INVESTMENT MANAGEMENT SERVICES (NAPIMS)

BY: IFON JONATHAN 2006/0148 LEVEL: 400 IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE AWARD OF BACHELOR OF TECHNOLOGY (B. TECH) DEGREE IN COMPUTER SCIENCE SUBMITTED TO THE DEPARTMENT OF COMPUTER SCIENCE COLLEGE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY OCTOBER, 2010

CERTIFICATION
THIS IS TO CERTIFY THAT THIS REPORT IS ORIGINAL TO THE AUTHOR, IFON JONATHAN, OF THE DEPARTMENT OF .., COLLEGE OF INFORMATION AND COMMUNCATION TECHNOLOGY, BELLS UNIVERSITY OF TECHNOLOGY, OTA, OGUN STATE AND WAS SUPERVISED ACCORDINGLY BY: COLLEGE IT COORDINATOR DATE . . HEAD OF DEPARMENT DATE .

DIRECTOR OF ITCU

DATE

The Director, Industrial Training Coordinating Unit, Bells University of Technology, Ota, Ogun State. Dear Sir, LETTER OF SUBMISSION I, Ifon Jonathan of the department of Information and technology hereby submit a technical report on Students Industrial Work Experience Scheme training program conducted at NAPIMS,NNPC, Ikoyi, for the duration of six months: March 2010 to August 2010. Thank you. Yours faithfully, Ifon Jonathan 2006/0148

DEDICATION
3

Our deepest fear is not that we are inadequate; our deepest fear is that we are powerful beyond measure. Often times, we ask ourselves, who am I to be brilliant, gorgeous, wanted and fabulous actually, who are you not to be? This report and the entire duration of which the industrial training lasted is dedicated to God Almighty, who through his infinite mercies saw me through the hustles, struggles and tussles of the training, though it seemed like the world was going to turn upside down, due to my first exposure to work in an organization. I also want to dedicate this report to my parents Captain and Mrs JC.Ifon for their undying love, care and support financially, emotionally, spiritually and morally during this period, this is also dedicated to my brother Ifon Francis. Most importantly, Bells University Of Technology and the entire staff of the College of Computer Science and Information Technology for deeming it fit and appropriate that I undergo this training in order to gain experience in line with my Academics. Thank you all for making this experience worthwhile. God loves you, so do I.

ACKNOWLEDGEMENTS
I wish to acknowledge and appreciate the quality inputs of each person who has in one way or the other contributed tremendously to the success of my industrial experience. To all NAPIMS IT staff; My Manager, Alhaji Safana, his Deputy, Mr. Leo Afu, Mr. Bede, Mr. Mike Kani, Mrs. Usiholo, Mrs. Simisola and many others to mention but a few. Thanks for granting me placement in the department; I say kudos to you all. Thank you for your support. To my colleagues; Toba, Okon, Opeyemi, Patrick, Yussuff, Winifred, Bolaji, Daniel, and Abayomi, can never forget you guys, though the smallest department but the happiest. Thanks a lot! And to all staff of NAPIMS, Bayo Kuku, Ikoyi with whom we shared common goals and interest, Thank you all very much. Also to all staff of the College Of Computer Science and Information Technology, Bells University Of Technology, Ota, Ogun State, Nigeria. May the Good Lord grant our heart desires.

TABLE OF CONTENT

Title Page ..i Dedication ii Acknowledgement .iii Table of Content..........................................iv Chapter 1: Abstract7 1.0 Introduction 8 1.1 Brief History of Nigerian National Petroleum Corporation (NNPC).9 1.2 IT Departments and Their Activities10 1.3 IT Departmental team structure of National Petroleum Investments Management Services 14 Chapter 2: My daily activities at the computer department of NNPC.15 2.1 Networking.15 2.1.1 Evolution of Networks........................................16 2.1.2 Types of Cables.16 2.1.3 Network topologies and Diagrams.17 2.2 Crimping Of Local Area Network Cables.19 2.2.1 Operation of D-Link switch.20 2.2.2 Server21 2.2.3 Mapping..22 2.3 Creation Of User Accounts On The Napims Domain..22 Chapter 3: 3.1 Software Installation.23 3.1.2 Software Installation (NAPIMS).24 3.1.3 SunSystems( System Spec )..25 3.2 Common Administrative Tasks32 Chapter 4: 4.1 Computer Hardware Repairs and Maintenance...33 4.1.1 Slaving of Hard disk33 4.1.2 System Recovery34 4.1.3 Formatting of a System35 4.2 Resolving Printer problems36 4.21 Resolving UPS problems.37 4.22 Inventory..37 Relevance of SIWES to My Academic Growth38

Chapter 5: Conclusion .........................................39 Recommendation.40 REFERENCES.41

ABSTRACT
7

The following report describes an overview of the type of work undergone and the experience gained by the attach in person of Ifon Jonathan which cumulated in the Industrial Training; a major requirement for the awarding of a Bachelors Degree (B.Sc.) in Bells University Of Technology, Ota,Ogun State, Nigeria. This report reviews my IT experience and exposure gotten while undergoing internship at NATIONAL PETROLEUM INVESTMENT MANAGEMENT SERVICES (NAPIMS), a subsidiary of NIGERIAN NATIONAL PETROLEUM CORPORATION (NNPC). It also focuses on the work done and projects carried out during the period of attachment. Reviewed also is the hierarchy of the organization which is aimed at delivering world class services to its customers efficiently and effectively. It reveals the work learned, experience gained and contributions of the attach to increase the productivity of the Unit which is the Information Technology Unit; precisely the I.T. Infrastructure and Desktop support department of the Unit.

CHAPTER ONE
8

1.0

INTRODUCTION

The Student Industrial Work Experience Scheme is a skill acquisition programme designed to expose and prepare students in Institutions of higher learning for the industrial working situations they are likely to meet after graduation. The scheme exposes students to work methods and give them the needed experience in handling equipment and machinery that may not be available in educational institutions. My Industrial attachment was done with NAPIMS group, a subsidiary of NNPC in Lagos, it was an experience-gaining scheme which helped in my Academics in the following computer related areas like Networking, software and hardware installation, system maintenance and a little bit of programming, as most of the activities of the information technology department was mainly hardware and some little networking. Most of the discussions and activities will be more of hardware (NETWORKING). After going through this I.T report, youll be convinced that my Industrial Attachment was indeed a successful, educative and an experience gaining one.

1.1

BRIEF HISTORY OF NIGERIAN NATIONAL PETROLEUM CORPORATION (NNPC)

The Nigerian National Petroleum Corporation, NNPC, was established on April 1, 1977, under the statutory instrument-Decree No.33 of same year by a merger of Nigerian National Oil Corporation, NNOC, with its operational functions and the Federal Ministry of Mines & Power with its regulatory responsibilities. This decree established NNPC, a public organization that would, on behalf of Government, adequately manage all government interests in the Nigerian Oil industry. In addition to its exploration activities, the Corporation was given powers and operational interests in refining, petrochemicals and products transportation as well as marketing. Between 1978 and 1989, NNPC constructed refineries in Warri, Kaduna and Port Harcourt and took over the 35,000-barrel Shell Refinery established in Port Harcourt in 1965. The subsidiary companies include: National Petroleum Investment Management Services (NAPIMS) Nigerian Petroleum Development Company (NPDC) The Nigerian Gas Company (NGC) The Products and Pipelines Marketing Company (PPMC) 9

Integrated Data Services Limited (IDSL) Nigerian LNG limited (NLNG) National Engineering and Technical Company Limited (NETCO) Hydrocarbon Services Nigeria Limited(HYSON) Warri Refinery and Petrochemical Co. Limited (WRPC) Kaduna Refinery and Petrochemical Co. Limited(KRPC) Port Harcourt Refining Co. Limited (PHRC) Eleme Petrochemicals Co. Limited (EPCL)

Notable persons: The Minister For Petroleum; Mrs.Diezani Alison-Madueke The Minister of State For Petroleum; Mr. Odein Ajumogobia The General Managing Director (GMD); Mr . Agustine O. Oniwon

NNPC Management The NNPC Group comprises of the NNPC Board, the Group Managing Director's office, six directorates namely, Exploration & Production, Refineries & Petrochemical, Finance & Accounts and Corporate Services, Commercial & Investment & Engineering & Technology. Each of the Directorates is headed by a Group Executive Director. Its Divisions are headed by Group General Managers while its ten subsidiary companies are headed by Managing Directors. NNPC has two partly owned subsidiaries and 16 associated companies.

NATIONAL PETROLEUM INVESTMENT MANAGEMENT SERVCES (NAPIMS)


The National Petroleum Investment Management Services (NAPIMS) is located at 8/10 Bayo Kuku Road, Ikoyi, Lagos, Nigeria. NAPIMS in the Exploration and Production Directorate of NNPC is a critical arm of the Corporation which manages Government investments in the Joint Ventures, Production Sharing Contracts and other contract agreements in the upstream sector of the industry.

10

NAPIMS is also the upstream arm of NNPC that oversees the Federation investments in the Joint Venture Companies (JVCs), Production Sharing Companies (PSCs) and Service Contract Companies (Scs). NAPIMS is, therefore, set up to earn margin arising from investments in the JVCs, PSCs and SCs with the multinationals and also protect the nation's strategic interests in the JVCs. In addition, NAPIMS engages in frontier exploration services in basins where the multinationals hesitate to venture, like the Chad Basin. Major Strategic Roles of NAPIMS To maximize Petroleum Profit Tax (PPT) and guarantee a higher Margin (Rate of Return) on Investment, through efficient cost of monitoring reduction mechanisms; To ensure that a reserve base is maintained and reserve addition targets are attained. These are: 30 billion barrels by year 2002 and 40 billion barrels by year 2010; To ensure increased production capacity from the current 2.5 million barrels of oil per day (bopd) to 3 million bopd in year 2003 and 4 million bopd by year 2010; To encourage gas utilization and commercialization; To promote local content input in engineering and construction, supplies and materials utilization through in-country technological capability; To enhance Nigerianization in the industry and facilitate technology transfer; To promote maximum co-operation in communities of oil and gas producing areas as well as ensure that environmental protection standards are strictly maintained.

MISSION
Is to enhance the benefits accruing to the Federation from its investments in the upstream Petroleum industry through effective cost control & supervision of JV and PSC operations as well as opening up new frontiers.

VISION
To become a top class portfolio managers of government investments in the Oil and Gas Upstream Sectors.

11

1.2

INFORMATION TECHNOLOGY DEPARTMENT AND THEIR ACTIVITIES

The IT department serves as the life wire of a structured organization where IT professionals handle various technical issues. In NAPIMS, the IT department was initially a small section with about three staff but today it has grown to an eight man staff and is still growing. Basically, we handle Asset management such as UPS, Laptops, Desktops etc. Vendor Management Network/internet infrastructure Reviewing of some business application Meeting with JV and PSC. We also deal with the provision of help desk support which includes; System maintenance Software/hardware installation Internet configuration/Connection Inventory The I.T department have some key contractors with different functions which includes VIEWPAGE View page deals with scanning of the companys mails, most importantly the GGMs (Group General Manager NAPIMS) mails. Also, they are in charge of the database development. Softwares used include; Coffax, Next-4. GLADSTONE TECHNOLOGY In charge of providing the Antivirus software and installation for all the locations for the purpose of preventing virus attacks. The Antivirus software used is SYMANTEC GP SYSTEMS In charge of System maintenance/repairs (external) and headed by Mr. Niyi 21 CENTURY Internet Service Provider. (Internet) SYSTEM SPECS Sun System for accounting applications. FELONS 12

Exchange, Active directory, messaging and collaboration. MECHATRONIC LIMITED In charge of NAPIMS website.

NNPC ORGANISATIONAL STRUCTURE

GMDS SUPPORT STAFF

GROUP MANAGING DIRECTOR NNPC M1

MD NETCO MD HYSON MD PPMC GGM PUBLIC AFFAIRS GGM AUDIT


GGM RENEWABLE ENERGY

GGM, LNG & POWER GGM CSLD GGM CPDD GGM ETD GGM INVESTMENT GGM NIG. CONTENT GGM ITD

GGM R & D
GGM GREENFIELD EXPORT REF.

IKKL

GGM CORPORATE STRATEGY

MD NIKORMA

MD NIDAS

GED E&P

GED R&P

GED F&A

GED CS

GGM NAPIMS MD IDSL MD NPDC MD NGC GGM COMD GGM INTL VEN. OPP.

MD PHRC MD WRPC MD KRPC

GGM ACCOUNTS GGM FINANCE GM TREASURY

GGM HR GGM MEDICAL GGM P&G GM INSURANCE

13

GGM LONDON OFFICE

1.3

IT DEPARTMENTAL TEAM STRUCTURE

MANAGER IT ALHAHI SAFANA

DM SYSTEM DELIVERY MR. LEO AFU

SYSTEM ENGINEER MR. BEDE NEVOBASI

BUSINESS APPLICATION ANALYST MR. BEN OSAMOR

NETWORK ADMINISTRATOR MR. MIKE KANI

TELECOMMS MR ADEGBESAN

INTERNET ADMINISTRATOR MRS. SIMISOLA IMONITIE

GROUPWARE APPLICATION ANALYST MRS. ESELE USIHOLO

SUPERVISOR TELECOMMS UDOH MICHEAL SECURITY ADMINISTRATOR MR. ABDULLAHI NASIRU

14

2.0

WORK DONE AND EXPERIENCE OBTAINED IN THE DEPARTMENT

The work done and experience obtained in the IT department was generally focused on the following: Networking Internet configuration and connection Asset management Software/ Hardware installation Computer Hardware Repairs and Maintenance Inventory Network/ Internet infrastructure Adding users and computers to the companys domain (NAPIMS.LOCAL). Being in the IT department of NNPC also helped me make researches more on Networking (CCNA), web design, software engineering, Graphics /Animation using Auto desk Maya as we were allowed to go for Seminar and also ask question from any aspect including computer science and its related field.

2.1

NETWORKING

I learnt how to connect more than one system together to enable communication and for the purpose of sharing files, folders, resources and information, I was also introduced to most of the CISCO equipment used for networking and with my little knowledge of networking I could help any staff having a network problem. I also learnt how to crimp network cables such as (Straight-through, Crossover and Power Over Ethernet (POE) used for telephone lines)and having no difficulty in connecting to the internet, how to diagnose the problem of a computer which is/seems to be connected but not browsing. 15

Steps to take include; Plug in the Network cable. Click on the network icon on the taskbar. Click Properties if it has been manually configured, uncheck it and Click on Automatically Detect Setting for IP address and DNS servers. In some cases, this might not work until the Cable is unplugged and replugged. In some other cases, theres need for restarting of the system. Also, there are some cases when a computer system would not be able to connect to the internet after all the above steps. I learnt that it could also be a problem from the CISCO switches in the server room. So when we encountered such problems, we note the identification number of the face plates then trace the same identification number on a switch in the server room. Then remove the LAN cables from the exact port on the switch and plug it back, then refresh the internet connection. Sometimes ,we discovered that some LAN ports on the CISCO switches were not working, so we replaced the LAN cables to other ports that were working properly A computer network is a group of interconnected computers. Networks may be classified according to a wide variety of characteristics. The network allows computers to communicate with each other and share resources and information. The Advanced Research Projects Agency (ARPA) designed "Advanced Research Projects Agency Network" (ARPANET) for the United States Department of Defense. It was the first computer network in the world in late 1960s and early 1970s. Some Networking tools include;

A network cable

A crimping tool

RJ45 Plug

A LAN Tester

2.1.1

EVOLUTION OF NETWORKS
16

Initially when networks were non-existent, data transfers were done physically. The network that we have today is an enhancement to the traditional mainframe and dumb terminal networks. Networks are classified depending on the geographical area that spans into the following categories: LOCAL AREA NETWORK (LAN): A private network within a range of 10 kilometers owned and controlled by a single organization. It has a diameter of not more than a few kilometers; this type of network is owned by a single organization. METROPOLITAN AREA NETWORK (MAN): A public or private network used to connect various locations including suburbs in a metropolitan city. WIDE AREA NETWORK (WAN): A public network connecting different cities and town mostly through telephone links or microwave links through a satellite. It spans through countries. This type of network is owned by Organizations.

VERY WIDE AREA NETWORK (VWAN): A public network connecting different continents and countries.

2.1.2

TYPES OF CABLE

Coaxial Cable These cables are widely used for cable television systems, office buildings, and other worksites for local area networks. The cables consist of copper or aluminum wire wrapped with insulating layer typically of a flexible material with a high dielectric constant, all of which are surrounded by a conductive layer. The layers of insulation help minimize interference and distortion. Transmission speed range from 200 million to more than 500 million bits per second. Fiber Optics These cables consist of one or more thin filaments of glass fiber wrapped in a protective layer. It transmits light which can travel over long distance and higher bandwidths. Fiber-optic cables are not affected by electromagnetic radiation. Transmission speed could go up to as high as trillions of bits per second. The speed of fiber optics is hundreds of times faster than coaxial cables and thousands of times faster than twisted-pair wire. Network topologies, such as bus network, star network, ring network, mesh network, star-bus network, tree or hierarchical topology network. Network topology signifies the way in which devices in the network see their logical relations to one another. The use of the term "logical" here is significant. 17

That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a bus topology. In this regard the visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the physical layout. Networks may be classified based on the method of data used to convey the data, these include digital and analog networks.

2.1.3

NETWORK TOPOLOGIES AND DIAGRAMS

Diagram of Ring topology In a ring network, every device has exactly two neighbors for communication purposes. All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise"). A failure in any cable or device breaks the loop and can take down the entire network. To implement a ring network, one typically uses FDDI, SONET, or Token Ring technology. Ring topologies are found in some office buildings or school campuses.

Diagram of Star topology Many home networks use the star topology. A star network features a central connection point called a "hub" that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet.

18

Compared to the bus topology, a star network generally requires more cable, but a failure in any star network cable will only take down one computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.)

Diagram of Tree topology Tree topologies integrate multiple star topologies together onto a bus. In its simplest form, only hub devices connect directly to the tree bus, and each hub functions as the "root" of a tree of devices. This bus/star hybrid approach supports future expandability of the network much better than a bus (limited in the number of devices due to the broadcast traffic it generates) or a star (limited by the number of hub connection points) alone.

Diagram of Mesh topology Mesh topologies involve the concept of routes. Unlike each of the previous topologies, messages sent on a mesh network can take any of several possible paths from source to destination. (Recall that even in a ring, although two cable paths exist, messages can only travel in one direction.) Some WANs, most notably the Internet, employ mesh routing.

19

A mesh network in which every device connects to every other is called a full mesh. As shown in the illustration below, partial mesh networks also exist in which some devices connect only indirectly to others.

2.2

CRIMPING OF LOCAL AREA NETWORKS


PROCEDURE
Strip off insulation Untangle Wires Place wires in correct order and straighten Trim wires to desired length NOTE: If the wires are too long the plug will not crimp onto the insulation for strength Slide wires all the way into the plug. make sure not to disrupt the color scheme Crimp plug Repeat steps 1-6 for the other end Test wire using LAN Tester

CABLES

COLOR SCHEME
STRAIGHT THROUGH CROSS OVER ROLL OVER

Orangewhite

Orangewhite

Orangewhite

Greenwhite
20

Orangewhite

Brown

Orange Greenwhite Blue Blue-white Green Brownwhite Brown

Orange Greenwhite Blue Blue-white Green Brownwhite Brown

Orange Greenwhite Blue Blue-white Green Brownwhite Brown

Green Orangewhite Blue Blue-white Green Brownwhite Brown

Orange Greenwhite Blue Blue-white Green Brownwhite Brown

Brown-white Green Blue-white Blue Green-white Orange Orange-white

2.21

D-LINK SWITCH
DIAGRAM

21

Switches are networking devices that allow you connect multiple computers.They offer the same peer-to-peet network connectivity function as routers and hubs.Switches differ from routers in that routers are designed to provide internet access and switches are not,also,switches differ from hubs in that switches enable dedicated bandwidth for each connected device where as devices connected to the hub share bandwidth.You can use a D-Link switch to quickly enable a home/office network.

OPERATION
Power up the D-link switch. Plug one end of the AC power adapter into the DC power jack on the right-hand side of the back of the switch.Plug the other end of the adapter into an electrical wall outlet.This powers up the switch. Confirm that the D-Link switch is receiving power. The power indicator LED on the front of the switch lights up when the device is powered. Connect a computer switch.Plug one end of an Ethernet cable into the Ethernet adapter on the computer and the other end into any unused, numbered Ethernet port on the back of the D-link switch. When the switch recognizes the computer, the correspondingly numbered LED on the front of the switch will light up. Continue adding computers to the D-link switch. Follow the same procedure as for the first computer. The switch can connect up to five(5) Computers. Communicate between Computers. Use the networking support built into your particular O.S for example; in the Windows XP O.S system, you would use the file and a printer sharing feature. NOTE: (connection between computers to view shared resources is only possible when you are not connected to the server).

2.2.2

SERVER

A server Computer, sometimes called an enterprise server.is a computer system that provides essential services across a network, to private users inside a large Organization or to public users in the internet.

HOUSING
As servers need stable power, good internet access, increased security and are also noisym it is usual to store them in dedicated server centers or special rooms. This requires to reduce power consumption as extra energy used generates more heat and temperature in the room could exceed the 22

limits. Normally, server rooms are equipped with air conditioning devices. Server cases are usually flat and wide, adapted to store many devices next to each other in the server rack.

TYPES OF SERVER
Application Server Database Server File Server Printer Server Web Server

2.2.3

MAPPING

Drive mapping is the way by which Microsoft Windows and O.S/2 associate a local drive letter ( A through Z) with a shared storage area to another computer over a network. After a drive has been mapped, a software application on a clients computer can read and write files from the shared storage area by accessing that drive, just as if that drive represented a local physical disk drive. Mapped drives are hard drives, partitions or volumes, or network drives, which are always represented by names, letters, or numbers and they are often followed by additional strings of data, directory tree branches, or alternate levels separated by a \ symbol. Drive Mapping is used to locate directories, files or objects, and applications, and is needed by the system, administrators, various other operators and users or groups. Mapped drives are usually assigned a letter of the alphabet usually after the first few taken, such as A:\, B:\, C:\, and D:\. Then, with the drive and/or directory (letters, symbols, numbers, names , and all other components, to be mapped would be entered into the necessary locations. NOTE You have to make use of a local computer running MicroSoft Windows XP Working LAN connections on both the local and remote computers.

23

2.3

CREATION OF USER ACCOUNTS ON THE NAPIMS DOMAIN


STEPS
The creation of user accounts on the NAPIMS domain is done by using the Remote Access Desktop Connection (Active Directory).Go to programs, click RAC, ping 10.64.0.5, log on with Administrator password to gain access to the mail server. After the creation of the user accounts i.e user names and departments, set the new passwords for the user accounts NOTE: New passwords must be set on log on. Set the user privileges this includes the rights given to the user. For Example the users are not given the rights and privileges to install programs and applications without the permission of the Administrator. In some cases, there may be need to transfer user files from the ADMINISTRATOR Account to the new user account. To do this go to my computer, right click, properties, go to advanced settings , then select the option. To check if a computer system is on the domain, go to my computer , right click, go to properties. If it is on the domain, it would be shown in the system description ,for example, NAPIMS.LOCAL/DOMAIN

CHAPTER THREE
3.1

SOFTWARE INSTALLATION

Installation (or setup) of a program (including drivers, plugins, etc.) is the act of putting the program onto a computer system so that it can be executed. Some software can be executed by simply copying it to a computer and executing it with no further ado; no installation procedure as such is required. Other programs are supplied in a form not suitable for immediate execution, and require an installation procedure. Installation may include unpacking of files supplied in a compressed form, copying them to suitable locations, tailoring the software to suit the hardware and the user's preferences, providing information about the program to the operating system, and so on. The installer may test for system suitability and available mass storage space. Because the requisite process varies for each program and each computer, many programs (including operating systems) come with a general-purpose or dedicated installer a specialized program which automates most of the work required for their installation.

3.12

SOFTWARE INSTALLATION
24

Most of the basic installations I did during the period of my Industrial Attachment Includes: Microsoft office Windows XP operating system Symantec Anti-virus Printer and Scanner drivers (hp p2015, 1320 e.t.c.) Network driver Sound driver Adobe reader Sun System (System Specs) The most notable of softwares that was installed was the Sun System( System Specs).Sun Systems is a software used for Database Management mainly designed and used by staff in the Accounting Department,NAPIMS.

3.13

SUNSYSTEMS (SYSTEM SPECS)


PROCEDURE

Locate the Oracle file in the directory \\10.64.0.6\e$\Pat_Setup\sun541sp1. Open the oracle folder.

25

26

Open the Application folder.

27

Launch the setup.exe file.

Click on Run

28

Click on Next button.

Select Custom setup type.

29

Disable the application Server.

Click on the drop down to select Oracle home, click next.

30

Enter the application server IP Address, 10.64.0.6.

Click next Button.

31

Click Install Button.

Click finish to mark the end of the installation.

32

NOTE: The installation of this software has four(4) steps and they must be followed accordingly.These are; Installation of Oracle 11G Installation of SunSystems Client Security Installation Of SunSystems Installation Of Vision

3.2

COMMON ADMINISTRATIVE TASKS


Backing up and restoring data. Changing group memberships. Checking event logs. Creating user and group accounts. Deploying and upgrading software. Installing a DHCP Server. Installing a domain controller. Managing applications on a local computer. Managing applications remotely. Managing directory replication. Managing disks and volumes. Managing files and folders. Managing network printers. Managing Services. Managing Network traffic. Monitoring Server performance. Resetting User passwords. Safe guarding your system. Scheduling tasks. Setting up TCP/IP

CHAPTER FOUR:
33

4.1

COMPUTER HARDWARE REPAIRS AND MAINTENANCE

I was trained on computer peripherals and devices such as the motherboard, hard-disk, CD-ROM e.t.c. and I was also trained on how to assembling and dissembling of components of the motherboard. The following were things I Did during the training as regards Hardware; SLAVING OF HARD DISK DISK REPAIR SYSTEM RECOVERY FORMATTING RESOLVING PRINTER PROBLEMS RESOLVING UPS PROBLEMS

4.1.1

SLAVING OF HARD DISK

I learnt how to slave the hard disk of a system on another just for the purpose of backing up files in order to prevent data loss. Many situations could warrant the slaving of a hard disk. If the O.S of a particular system is corrupt or being hit by a strong virus, and all means to restore the O.S to its initial state proves abortive, then the next possible solution is to back up the files in that hard disk/drive on that of another system. Hence you can format the system but make sure that the system/setup files have also been backed up! If the O.S is unable to read or boot from the hard disk, you either restart the system or dissemble the C.P.U and make sure that all cables are tightly fixed, if that has been done and there is no result, then all u need do is back up the files on the computer on another, then any further steps can be taken.

If the system boots and suddenly goes off at some point and then restarts itself again. For this , you can either do a system repair or recovery of the O.S if only you have an XP/Vista CD depending on the type of O.S

34

4.1.2

SYSTEM RECOVERY

System Recovery is yet another means of restoring the computer which was broken down either by a virus or a worm back to the initial state or position it was before the breakdown. This can easily be done in some systems even without the Operating System CD if the recovery partition of the O.S is inbuilt that is (if there is a partitioned space for the system recovery in case of breakdown) but in some other computers or systems, the reverse is the case, that is, there would be a dear need for an operating system CD depending on the Operating system of the Computer. Once the setup begins, the restoration of the computer begins, but to restore a system that broke down say on Monday, the best day or time to restore it is Saturday or Sunday, better still some hours before the breakdown.

4.1.3 FORMATTING Formatting is a way of cleaning the entire hard disk that is wiping out the whole information on the disk including the setup files then installing a new and fresh copy of the operating system alongside the system files that comes with the installation. Formatting only occurs or is said to be necessary only when all effort to restore the system has proved abortive. That is the hard disk or the O.S has been completely hit by viruses or malicious softwares. Notwithstanding the files on the system can still be backed up on another hard disk (SLAVING). To revive the system, there is a great need for formatting This is made possible by:
Inserting the XP / Vista CD Set the first boot menu to CD-Rom Next, you see 3 options, click the one that says INSTALL A FRESH COPY OF WINDOWS Youll see 4 options; FAT and NTFS, Set the installation to NTFS Quick The Installation begins.. 35

Youll be asked to restart the system once some part of the installation is complete, do that and the proper installation continues Once the installation finishes, you have a fresh copy of windows without any programs on it. Then you can start whatever installations you want!

4.2

RESOLVING PRINTER PROBLEMS

So many errors are likely to occur in a printer. Some of the errors which would warrant immediate attention may include the following; 1. Paper Jam: this occurs at a time whereby a document is being sent into the printer and along the way, the paper suddenly gets stuck in the printer and hence any other document cannot be sent into the printer to avoid more complication. The best possible solution to prefer to this kind of problem is to dismantle the printer and remove the stuck paper gently and carefully and to ensure that the paper does not get torn in the process of removal to avoid more complications. 2. Tonner/ Ink problems: this occur when the ink in the tonner is finished or spilling thereby soiling the paper. If the former is the case, there is need for a change in Tonner, it only tells that the ink is finished and even if a document is sent into the printer, such document on getting out of the printer pane would definitely not be clear and readable. If the latter is the case, all that needs be done is just to remove and dust the ink off the body of the tonner and also clean the interior of the printer. 3. In case a document is being sent into the printer and it fails to print, 3 things are responsible; The printer device or driver is not installed on the computer and as such there is no communication between the document about to be printed from the computer and the printer The printer cable that sends signal that a printer is connected to a system is not present. If all this 2 things mentioned have been done or were already in place and still the document does not print, you never know, the fault might just be from the printer icon which is not been set as the default printer. To accomplish this, go to Printers and Faxes from you control panel and set the printer which is being connected to the computer as the Default Printer.

36

And the simple solution might just be to fill the paper pane with A4 paper if the printer has run out of paper or power off and power on the printer back. CONFIGURING/SETTING UP A NETWORK PRINTER Click on Start menu; Select Printers and Faxes Select Add a Printer Select Add a network printer or a printer attached to another computer. Create a new port Add a printer using TCP/IP address or Hostname Printer name or IP address Select Do not share this printer. Click the finish button CONFIGURING A PARALLEL PRINTER This is done by connecting the printer to a computer system directly using a serial cable connected to the Centronics port. When the printer has been successfully connected and working, it is shared on the computer system it is connected to. Other users connect to this printer by searching for the computer name of the machine and clicking on its printer when it is found. This system now acts as the Printer Server for others who want to print. It should be noted here that all of this is done using an administrators Profile and Password. Problems that may arise setting up a network Printer The Printer refused to respond

Possible Solutions A new IP address is assigned to it Firewall of the computer systems should be turned off.

37

4.21

RESOLVING UPS PROBLEMS

Some UPSs generate fault as a result of the battery or its board. For instance; When a UPS is on power but not charging, it should be noted that the fault is from the battery passing across a message for a change in battery. This can only be known when there is power outage. Another case could be that if the UPS is not on power and is triggered on, it brings up a Red light signifying danger and starts making noise, hence the power cord of the UPS should be checked if it is in place. Once this is done the green light comes up.

4.22

INVENTORY

The purpose of taking inventory is just to update ones database or taking record of newly supplied goods. And this is done by checking the specifications of the computer or the newly supplied good. It could also be existing ones depending on the task given. Inventory is all about checking the vital information contained in not necessarily computers but any goods supplied. The Inventory I took on Computers while on the training includes the following: 1. Computer Name 2. Computer Model 3. Computer Serial number 4. Hard Disk Drive (HDD) 5. RAM Size 6. Printer name e.g. Hp LaserJet 2015, 1600 etc. 7. Printer Serial number 8. Mac Address or Physical address 9. Browser Version 10. Operating System This inventory took me and some of my colleagues who were designated to do so a whole week because we had to go from office to office checking the specification of a particular item. 38

RELEVANCE OF SIWES TO MY ACADEMIC GROWTH


The six months industrial attachment was one that captivated my attention and brought me out to see that which was taught in school as it is applied in the outside world practically. Working in the IT department of NAPIMS has helped me build some level of confidence in myself such that I could easily carve a niche for myself and actually boast of things I know how to do, and also getting familiar with so many new techniques in the computing world. My experience during the training not only developed my skills in my area of course of study ( Information technology), it also helped motivate and improve my skills in human relation. During the course of the training, I was able to find, access, maximize and develop my skills due to the fact that I met with people of high standards and professionals who in one way or the other motivated me and helped me see all the potentials Ive got inside me and to that effect, challenged me to be more determined and focused. And with all the experience, I believe Ive got all it takes to be a SUCCESS

39

CHAPTER FIVE CONCLUSION


This industrial training has been a great privilege for me as a person because it made me to learn more on the practical of the courses been taught in school, it has also helped me to have an insight and knowledge on what the outside market and employers expect of a graduate which has then made me determined to be a success. The experience was also more of challenges to seeing human beings like me build great software and hardware for different applications. It is indeed a privilege.

MAJOR CONTRIBUTIONS
As a member of I.T. Infrastructure and Desktop management, I was able to contribute my quota to my unit in the following ways I) Carry out maintenance on the user Computer systems; both corrective and preventive II) Taking Inventory of newly supplied goods. i.e. computers, printers, UPS, data cards, hubs, switches, routers, scanners. III) Resolve general user issues pertaining to

Log-on problems Network issues pertaining to configuration and connection; limited connectivity, no connection to network

Virus Removal from users system. Resolving Printer issues 40

Configuring new users on their computer systems Resolving Scanner issues. Installation of MS-Word and Antivirus on newly setup computers. Joining systems to the Domain of the company (NAPIMS) Offering some tutorials to some staffs on the use of Microsoft office programs.

Installations of programs on laptops and desktops of staffs.

CHALLENGES ENCOUNTERED
Lack of Office Space Limited number of Staffs Character of users Lack of Helpdesk Support Structure Disaster recovery plans or measures.

RECOMMENDATIONS To the IT department (NAPIMS);


Provision should be made for a much bigger place in the department, because the present location of the room is so small such that the office becomes crowded and untidy. Considering the fact that some gadgets are brought into the room for repairs makes it even worse because there is less work space.

41

There is need for a well structured and standard Help desk support to aid users in troubleshooting of minor issues that should not necessarily warrant the physical presence of an IT personnel.

REFERENCES
www.google.com www.wikepedia.com www.nnpcgroup.com

42

You might also like