Professional Documents
Culture Documents
HELD AT
ABUJA
BY
15CE03887
SUBMITTED TO
i
CERTIFICATION
This is to certify that this work was undertaken by NWATU VICTOR PRAISE with matric
number 15CE03887 at the Nigerian National Petroleum Corporation (NNPC). The report
submitted to the department of PHYSICS, COVENANT UNIVERSITY OTA OGUN STATE
Nigeria during the 2017/2018 Students industrial Work Experience scheme.
ii
DEDICATION
First of all, I dedicate this SIWES report to my Father in heaven, God Almighty for almighty for
the opportunity and grace given to me to undergo this training and resume a new semester
peacefully. To my wonderful Parents MR and MRS NWATU for their tireless support and
investment in my life and to all those who may consider this thesis relevant in the pursuit of
academic excellence, I dedicate this piece of work.
iii
ACKNOWLEDGEMENT
I wish to express my sincere gratitude to all whom in one way or the other contributed to the
success of my industrial training. I am very grateful to God Almighty whose sufficient grace it is
that I am alive and well able to start and finish my industrial training. I would like to show my
gratitude to my parents Mr. and Mrs. NWATU, To the Group Learning Department (GLD) for
posting me to ITD/ISD, Networks as relevant to my discipline, Also to my numerous Industry
supervisors in persons of Mr. Mohammed Gabdo (Supervisor, Service Support) Mr. Ibrahim Bassi
(Supervisor, Networks), Mr. Mohammed Gumel (Network Risk Analyst), Mr. Umar Janyau
(Network Risk Analyst), Engr. Bassey E. Bassey (Network Admin), Mr. Okereke (support staff)
Engr. Mrs. Eguadike A. U (System analyst), my school supervisor Engr. Wasiu for their
unquantifiable love, care and support both morally and financial to carry me through.
To my HOD Dr Aizeboki and Mr Adewoyin the SIWES coordinator and all prestigious lecturers
in the department of physics.
My gratitude also goes to my entire SIWES colleagues at work and in school for their support,
understanding and sharing of knowledge during my SIWES period and making it a success.
iv
ABSTRACT
This is a report on my Student’s industrial Work Experience scheme (SIWES) carried out in
Networks\telecoms unit and service support unit, Information Technology Division (ITD) of the
Nigeria National Petroleum Corporation, NNPC Abuja. SIWES is a scheme that provides students
the adequate opportunity and room for industrial skill acquisition in respect to their various
discipline. It exposes students to the approaches and techniques in the use of tools, and prepares
them for the work situation ahead of time. This report is aimed at discussing the structure of the
Nigerian National Petroleum Corporation (NNPC), It’s mode of operation and the specifics of my
internship, my area of specifications both Networking/telecommunication and service support,
giving detailed explanation about Networking, Network configuration and System Maintenance.
v
TABLE OF CONTENT
CERTIFICATION .................................................................................................................................ii
DEDICATION ....................................................................................................................................iii
ACKNOWLEDGEMENT .....................................................................................................................iv
ABSTRACT .........................................................................................................................................v
1 INTRODUCTION ....................................................................................................................... 1
vii
2.3.9 Sharing Printer among two or more Systems ......................................................... 50
5 CONCLUSION ......................................................................................................................... 57
viii
TABLE OF FIGURES
Figure 1 Landscape view of NNPC towers ...................................................................................... 3
Figure 1.1 NNPC Board Organogram .............................................................................................. 7
Figure 1.2 NNPC corporate headquarters Organogram ................................................................. 8
Figure 1.3 ITD operational chart ................................................................................................... 11
Figure 2.1 simple network ............................................................................................................ 13
Figure 2.2 client/server network Figure 2.3 a peer to
peer network................................................................................................................................. 14
Figure 2.41 Bus topology .............................................................................................................. 16
Figure 2.42 Star topology .............................................................................................................. 16
Figure 2.5 WAN network topology ............................................................................................... 17
Figure 2.6 MAN network topology ............................................................................................... 17
Figure 2.71 unshielded twisted pair ............................................................................................. 19
Figure 2.72 shielded twisted pair.................................................................................................. 19
Figure 2.73 NETWORK INTERFACE DEVICES ................................................................................. 22
Figure 2.8 OSI LAYER ..................................................................................................................... 23
Figure 2.80 IPv4............................................................................................................................. 25
Figure 2.801 IPv6........................................................................................................................... 26
Table 2.81 Star Topology Communication between NNPC CHQ and the Branches ..................... 28
Table 2.83 Access switch (POE ...................................................................................................... 29
Table 2.831 NNPC chq campus network topology ....................................................................... 30
Figure 2.83 A Distribution and core switch................................................................................... 30
Figure 2.84 fluke link runner ......................................................................................................... 32
Figure 2.85 crimping tool .............................................................................................................. 33
Figure 2.86 punch down tool ........................................................................................................ 34
Figure 2.87 cable stripper ............................................................................................................. 34
Figure 2.88 modular jack .............................................................................................................. 34
Figure 2.89 cable wiring ................................................................................................................ 36
Figure 2.89 Straight Through ethernet cable................................................................................ 36
ix
Figure 2.9 steps in crimping a network cable ............................................................................... 38
Figure 2.92 Disk Cleanup............................................................................................................... 43
Figure 2.93 Proxy Configuration ................................................................................................... 44
Figure 2.93 Static IP Configuration ............................................................................................... 45
Figure 2.94 System Domain Configuration ................................................................................... 49
Figure 2.95 Connecting system to a printer ................................................................................. 50
Figure 2.96 Desktop Computer system and components ............................................................ 53
x
CHAPTER ONE
1 INTRODUCTION
1.1 General introduction to SIWES
The Student Industrial Work Experience Scheme (SIWES) was established by the Industrial
Training Fund (ITF) in 1973 to enable students of tertiary institutions have technical knowledge
of industrial work based on their course of study before the completion of their program in their
respective institutions. The scheme was design to expose students to industrial environment and
enable them develop occupational competencies so that they can readily contribute their quota to
national, economic, and technological development after graduation. The major benefits accrued
(SIWES) are the skills and competencies they acquire. The relevant production skill remains a part
of the recipients of industrial training as life-long assets which cannot be taken away from them.
This is because the knowledge and the skills acquired are internalized and become relevant when
In the earlier stages of science and technology education in Nigeria, students were graduating from
their respective institutions without any technical knowledge or working experience. It was in this
view that student undergoing science and technology related courses were mandated for SIWES
in different institutions to widen their horizons and to enable them have technical knowledge or
1
1.2 Aims and Objectives of SIWES
The Industrial Training Fund Policy Document No.1 of 1973 which established SIWES outlined
objectives of the scheme. Participation in SIWES has become a necessary pre-condition for the
award of Diploma and Degree certificates in specific discipline in most institutions of higher
learning in the country, in accordance with the educational policy of the government. The
a) Provide an avenue for students in higher institutions of learning to acquire industrial skills and
b) Prepare students for industrial work situations that they are likely to meet after graduation.
c) Expose student to work methods and techniques in handling equipment and machinery that
d) Provide student with the opportunities to apply their educational knowledge in real work
e) Enlist and strengthen employers’ involvement in the entire education process and prepare
students for employment in Industry and commerce (Information and guideline for SIWES,
2002).
2
1.3 General introduction to the company
federal government of Nigeria regulates and participates in the country's petroleum industry.
3
Nigerian Petroleum Development Company Ltd. (NPDC)
Nigerian Gas Company (NGC)
Integrated Data Services Limited (IDSL)
National and Engineering and Technical Company limited (NETCO)
Port-Harcourt Refinery Company limited (PHRC)
Warri Refining and Petrochemicals Company limited (WRPC)
In addition to these subsidiaries, the industry is also regulated by the Department of Petroleum
Resources (DPR), a department within the Ministry of Petroleum Resources. The DPR ensures
compliance with industry regulations; processes applications for licenses, leases and permits,
Moreover, DPR, and NAPIMS, play a very crucial role in the day to day activities throughout the
industry.
The NNPC Towers in Abuja is the Corporate Headquarters (CHQ) of NNPC. Consisting of four
identical towers, the complex is located on Herbert Macaulay Way, Central Business District
Abuja. NNPC also has zonal offices in Lagos, Kaduna, Port Harcourt and Warri. It has an
4
Integrity, transparency and accountability
Professional excellence
which entails exploring, refining, and marketing Nigeria’s crude oil. The NNPC through the
NAPIMS supervises and manages government investment in the Oil and Gas Industry. NNPC’s
oil and gas operations are undertaken both in upstream and downstream operations.
The upstream operations i.e. crude oil production, are currently managed under the Exploration
and Production Directorate which consists of the following Strategic Business Units (SBUs) that
These SBUs are collectively responsible for surveys, seismic data collation and interpretation,
Directorates as listed below. Each of the Directorates is headed by a Group Executive Director
5
(GED). Its Divisions are headed by Group General Managers (GGM) while its subsidiary
companies are headed by Managing Directors. NNPC has several subsidiaries, two partly owned
Directorates:
Corporate services
6
Figure 1.1 NNPC Board Organogram
7
Figure 1.2 NNPC corporate headquarters Organogram
8
1.5 NNPC Information Technology Department (ITD)
During my SIWES at NNPC, I was posted to the INFORMATION TECHNOLOGY
Vision: To provide information technology resources and services to strategically drive NNPC
business
Simplify user interface so that customers do not require Experts knowledge to operate IT
systems
9
Network application deployment and support
Telecommunication services
Remote user
Telecommunication users
10
INFORMATION TECHNOLOGY DEPARTMENT(ITD)
ISD TELECOMS
NETWORKS COMMERCIALS
SERVICES TECHNICAL APPLICATIONS PROJECTS OPERATIONS & SYSTEM DEV.
SUPPORT SUPPORT SUPPORT MAINTENANCE & TECHNICAL
SERVICES
11
CHAPTER 2
PARTICIPATION/WORK DONE
In my first two months of SIWES at the Information Technology Division (ITD), NNPC Abuja, I
worked under the Information Technology Department (ITD) with the service support unit and
then with the networks/telecommunication unit for the remaining 4 Months, resolving an average
of three (3) jobs per working day, fifteen (15) jobs per week, sixty (60) jobs per month, which
totals to one hundred and twenty (120) jobs under the first two months of SIWES all at user’s
level.
pertaining to network connectivity such as Cable crimping, cable laying, punching, network
connectivity configuration for Intercom, Desktops, setting up CISCO phones and Land lines
Laptops, Notebook PC, mobile devices, Printers; Access Switch port activation, and network
diagnostics etc.
I was taught on how to properly tackle complaints that is to properly analyze the problems,
interpret the problems, and proffer lasting solutions with recommendations in locations offices
within and without the NNPC Corporate Headquarters as each case required.
12
2.1.1 Work methodology in the Networks/telecommunication unit
There is a laid down system through which users relay their complaints. The Help Desk is
contacted via a help line (01), the job(complaint) is logged and then escalated to the corresponding
ISD units (Networks Unit in this case) via the Service Manager Platform. Other platforms are via
The jobs are then given to IT students by their Supervisors as the case may be.
2.1.2 Network
What is a Network?
A network consists of two or more computers that are linked together in order to share resources
(such as printers and CDs), exchange files, or allow electronic communications. The computers
on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared
light beams. Basically, a network is a route used for communication between two or more
electronic devices. COMPONENTS used to connect various computers together are called
network devices.
a. Client/server networks are more suitable for larger networks. A central computer, or 'server',
acts as the storage location for files and applications shared on the network. In which many
13
less powerful computers or workstations(clients) are connected. The server also controls the
network access of the other computers which are referred to as the 'client' computers. The
clients run programs and access data that are stored on the server. Only the network
b. Peer-to-peer networks are more commonly implemented where less than ten computers are
involved and where strict security is not necessary. It is created when two or more PCs are
connected and share resources without going through a separate server computer. All
computers have the same operational status/capacity, hence the term 'peer', and they
communicate with each other on an equal footing. Files, such as word processing or
spreadsheet documents, can be shared across the network and all the computers on the
network can share devices, such as printers or scanners, which are connected to any one
14
LOCAL AREA NETWORK(LAN)
LAN (local area network): this is a network that interconnects users with computer resources
within a particular building together. They are widely used to connect personal computers and
workstations in company offices and factories to share resources (e.g., printers) and exchange
information. Most local area networks are built with relatively inexpensive hardware such as
Ethernet cables, network adapters, and hubs. Wireless LAN options also exist. Traditional LANs
run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or nanoseconds), and make
very few errors and they operate within the distance of 100m. WLANs are generally composed of
two basic elements: access points and other wireless-enabled client devices, such as laptop
computers Access points are physically wired to a conventional network and provide a means for
wireless devices to connect to them.
There are THREE main ways in which LAN can be broadcasted; we have the ring topology, bus
topology and star topology.
A Network Topology is a way of “laying out” the network. Topologies can be either physical or
logical. Physical topologies describe how the cables are run, while Logical topologies describe
i. Ring Topology creates a network by arranging 2 or more hosts in a circle. Data is passed between
hosts through a 'token.' This token moves rapidly at all times throughout the ring in one direction.
ii.Bus Topology uses a common backbone to connect all devices. A single cable which is the
backbone functions as a shared communication medium that devices attach or tap into with an
interface connector.
15
Figure 2.41 Bus topology
iii. Star or Mesh Topology is one of the most common network setups where each of the
devices and computers on a network connect to a central hub. A major disadvantage of this
network topology is that if the central hub fails, all computers connected to that hub would
lose connectivity.
B. Wide Area Network (WAN), spans a large geographical area, often a country or continent.
WANs utilize public communication links. The largest and most well-known example of a
WAN is the Internet. WANs often connect multiple smaller networks such as LANs or
MANs. A WAN can have a distance of 100 to 10,000km around a continent, transmission
16
Figure 2.5 WAN network topology
C. Metropolitan Area Network (MAN) is a large computer network that usually spans cities,
17
Types of cabling system
a. Coaxial Cable
COAXIAL CABLE conducts electrical signal using an inner conductor (usually a solid
copper, stranded copper or copper plated steel wire) surrounded by an insulating layer and all
enclosed by a shield, typically one to four layers of woven metallic braid and metallic tape. The
cable is protected by an outer insulating jacket. Normally, the shield is kept at ground potential
and a signal carrying voltage is applied to the center conductor. The advantage of coaxial design
is that electric and magnetic fields are confined to the dielectric with little leakage outside the
shield. Conversely, electric and magnetic fields outside the cable are largely kept from
interfering with signals inside the cable.
b. Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted
together for the purposes of canceling out Electromagnetic interference (EMI) from external
sources; for instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and
cross talk between neighboring pairs. It was invented by Alexandra Graham
UTP cables are similar to telephone cables, they contain four pairs of wires twisted together to
help shield against electromagnetic interference. They are easier to install than coaxial and fiber
optic. The maximum distance of UTP is 100 meters
18
Figure 2.71 unshielded twisted pair
STP cables are very similar to UTP cabling, but the only difference is the additional layer of
insulation within the protective jacket which helps maintain the quality of the signal. Twisted pair
is susceptible to interference than coaxial and should not be used in environments containing large
electrical or electronics devices.
Fiber optic cable uses optical fibers that carry digital signal in form of modulated pulses of light.
It consists of an extremely thin cylinder of glass called the core surrounded by a concentric layer
of glass called the ‘cladding’. There are two fibers in each cable, one for transmitting and the other
for receiving data. To reduce signal loss, the core can also be an optical-quality clear plastic, and
the cladding can be made up of gel that reflects signals back into the fiber. Fiber-optic cables have
signal strength over long distances and are highly secure from outside interference and electrical
noise. However, they are too expensive. There are two types of fiber-optic cables:
19
Single-mode fiber (SMF)
Multi-mode fiber (MMF)
Single-mode uses a single ray of light known as mode to carry transmission over long distances of
about 2km, while Multi-mode uses multiple ray of light simultaneously to carry transmission over
short distances.
Cable Categories
Category 3 (CAT3) cable is rated for networks operating up to 16 Mbps. It is suitable for
voice transmissions (not VoIP). ISO/IEC refers to the end-to-end channel as Class C.
Category 4 cable is rated for transmission of 16 Mbps up to 100 meters. It is considered
obsolete.
Category 5 (CAT5) cable was common for 100-Mbps LANs. It was ratified in 1991 and is
now considered obsolete.
Enhanced Category 5 (CAT5e/Class D) cable, ratified in 1999, was designed to enable
twisted-pair cabling to support full-duplex, 100-MHz applications such as 100BASE-TX and
1000BASE-T. CAT5e introduces stricter performance parameters such as Power-Sum Near-
End Crosstalk (PS-NEXT), Equal-Level Far-End Crosstalk (EL-FEXT), and Power-Sum
Equal-Level Far-End Crosstalk (PSELFEXT). It also introduces channel and component
testing.
20
Category 6 (CAT6/Class E) cable easily handles Gigabit Ethernet (1000BASE-T)
applications. It’s a 100-ohm cable with a frequency of 250 MHz CAT6 has far more stringent
performance parameters than CAT5e, and is characterized by channel, link, and component
testing. In addition, CAT6 components must be backwards compatible.
ROUTERS: A router is a networking device that forwards data packets between computer
networks. Routers perform traffic directing functions on the internet. A data packet is typically
forwarded from one router to another through the networks that constitute the internet until it
reaches the destination node.
SWITCHES: In networks, a device that filters and forwards packets between LAN segments is
termed switch. Switches operate at the data link layer (layer 2) and sometimes the network layer
(layer 3) of the OSI model and therefore support any packet protocol. LANs that use switch to join
segments are called switched LANs.
HUBS: A common connection point for devices in a network is termed a Hub. Hubs are commonly
used to connect segments of a LAN. A Hub contains multiple ports and it floods the host system.
It doesn’t filter messages rather it floods the different host on the network with the message and
the one who owns the message regards it while the others disregard it.
21
NIC CARD
22
Figure 2.8 OSI LAYER
LAYER 7: Which is the APPLICATION LAYER provides an interface that allows the application
to communicate across a network. This layer is the most familiar layer because it is basically what
the user sees. Many Protocol are used in these layer (a protocol is a detailed specification of how
communication is to proceed)
LAYER 6: Which is the PRESENTATION LAYER receives data from the application layer and
translates that data into a standard form to be used on the server. Security is also added at this layer
by using data encryption and decryption (data encryption means translating the data into secret
codes and data decryption is the process of decoding data that has already being coded). This
prevents others from intercepting the data.
LAYER 5: Which is the SESSION LAYER allows application on the system to communicate
using a session; it opens uses and closes the communication link.
LAYER 4: Which is the TRANSPORT LAYER describes how data is sent. It receives data from
the session layer and sends it to the network layer. This layer also defines well known services
23
(port numbers). It designates what service a client is trying to access on the server using port
numbers. A server in addition to being a web server might be an email server, using port number
the server is able to know if the client is asking for a web page or otherwise. They also ensure that
data are delivered error free
LAYER 3: Which is the NETWORK LAYER provides logical addresses known as internet
protocol addresses. This layer determines the best route to get to the server. When a packet has to
travel from one network to another to get to its destination, many problems can arise. The
addressing used by the second network may be different from the first one. The second one may
not accept the packet at all because it is too large. The protocols may differ, and so on. It is up to
the network layer to overcome all these problems to allow heterogeneous networks to be
interconnected.
LAYER 2: Which is the DATA LINK provide the physical address known as the MAC address
(media access control) and the logical link control. The MAC controls how a computer on the
network gains access to the data and permission to transmit it and the logical link control the flow
of data and ensure its error free.
LAYER 1: Which is the PHYSICAL LAYER is responsible for point to point connections
between computers. This layer translates bits into electrical signals that can be carried across a
physical medium.
In IPv4 an IP address is always combined with a subnet mask and a default gateway. The subnet
mask represents what part of the network and the host, Subnet mask is a 32 bits long address which
is always used with IP address.
IP address 10. 2. 4 .3
The 255 in the subnet mask represents the network on the IP address while the 0 represents the
host. In computer networking, a gateway is a node (a router) on an IP network that serves as an
access point to another network. Example of a default gateway is 172.30.5.1.
25
Figure 2.801 IPv6
• Static IP the static IP is a type of IP technique that allows for network administrators to
manually assign IP addresses to user PCs or hosts. It can only be used when the Dynamic IP
server is down, but it’s a professional practice to always disable the statics when DHCP is up.
• Dynamic IP this technique uses the Dynamic Host Configuration Protocol (DHCP), this
protocol allows for all registered PCs on the domain to be assigned addresses automatically.
When a computer is disconnected from the network, the system saves the details of the
network, so when the computer is re-connected, it gains access to the network automatically.
This is the system in practice, and every network has a DHCP server.
CIDR is a slash notation of subnet mask. CIDR indicates the number of on bits in a network
address.
Class A has default subnet mask 255.0.0.0 that means first octet of the subnet mask has all on
bits. In slash notation it would be written as /8, means address has 8 bits on.
Class B has default subnet mask 255.255.0.0 that means first two octets of the subnet mask have
all on bits. In slash notation it would be written as /16, means address has 16 bits on.
Class C has default subnet mask 255.255.255.0 that means first three octets of the subnet mask
have all on bits. In slash notation it would be written as /24, means address has 24 bits on.
26
2.1.9 Wireless LANs
Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate
between the workstations, servers, or hubs. They do not make use of cables. Each workstation and
file server on a wireless network has some sort of transceiver/antenna to send and receive the data.
For longer distance, wireless communications can also take place through cellular telephone
Wireless networks are great for allowing laptop computers, portable devices, or remote computers
The two most common types of infrared communications used in schools are line-of-sight and
scattered broadcast. Line-of-sight communication means that there must be an unblocked direct
line between the workstation and the transceiver. Scattered infrared communication is a broadcast
of infrared transmissions sent out in multiple directions that bounces off walls and ceilings until it
eventually hits the receiver. Networking communications with laser are virtually the same as line-
at the branches is a LAN. A WAN then connects branches and the CHQ. At the corporate
Since the corporation is a large one, the network uses a class A IP addressing scheme with about
27
The traffic of the network is such that Routing and Switching of packets runs on a star topology
i.e. no two branches must communicate without passing traffic through the CHQ. The CHQ is the
Table 1.81 Star Topology Communication between NNPC CHQ and the Branches
goes into the CORE of the network. The CORE is a switch that has both routing and switching
capabilities.
The CORE shares the link with the four DISTRIBUTION switches at the basement of every
block (A, B, C and D). The DISTRIBUTION then shares the link with the last tier of the network,
the ACCESS.
The ACCESS is a switch at the user’s level that provides users with access to the network. Every
port in a user’s office is terminated at the PATCH PANEL which is terminated on the ACCESS
28
switch. The patch panel helps for identification of ports by providing space for its numbering for
easy troubleshooting.
Power over Ethernet (PoE) is a technology that enables its devices to get powered over the
network. It also applies to devices such as IP phones that get voice (Dial-up) connection over the
network and the wireless Access Points also uses this technology to get power without any physical
29
Table 2.831 NNPC chq campus network topology
1.LINK RUNNER
2.WIRE TRACKER
30
3. CRIMPING TOOL
5. CABLE STRIPPER
6. MODULAR JACK
LINK RUNNER
The Link Runner is a diagnostic device that can be used for scanning of signal, testing for
continuity with LAN cables, obtaining network properties of a port on the switch, to know the
actual distance between the user port and the access switch etc. It is also one of the fastest way of
solving problems with network connectivity, it identifies the network problems within seconds.
Connect one end of the LAN cable to the port and the other to the Link Runner.
From the result of the scan, you can tell what the problem could be.
i. Faulty switch port (new port will be activated on the access switch),
iv. Damaged Cable (New Cable is crimped and damaged cable is replaced)
31
Figure 2.84 fluke link runner
WIRE TRACKER
This is a sensory device that is used when it is difficult identifying a particular cable in the switch.
One end of the cable from the user port is connected to wire tracker (tone generator) which then
produces a sound, then the wire tracker (tone generator) is used to trace that particular sound to
32
Figure 2.841 Wire tracker
CRIMPING TOOL
This is a tool used for crimping of Ethernet cables. It has provision for blade (for cutting), a 6Pins
RJ11 adapter and an 8pins RJ 45 adapter for crimping of both RJ 11 and 45 cables.
33
on punch down blocks, patch panels, or modular jacks. To use a punch down tool, you apply
pressure on the tool to trigger the insertion of wire into a slot.
CABLE STRIPPER
This is a small tool that helps the stripping and cutting of cables during crimping and other related
MODULAR JACK
Modular connectors were originally used with the registered jack system, which precisely
describes how the connectors are wired for telecommunication. A modular jack connects the
switch to a port using a LAN Ethernet cable.
34
2.2.3 Crimping a Network Cable
This is a process of clamping RJ45 adapter and CAT5E or CAT6 network cable together.
When installing network cable (cat5/cat6), wires in the cable are color-coded to ease the
installation process and for assured reliability and maintenance purpose. Color Code Standards are
laid down to be followed by every cable installer when at installation site. Basically, there are two
The table below shows the arrangement of wires inside the cable according to their colors for both
standards
35
Figure 2.89 cable wiring
Cable Configurations
There are two types configurations for cable crimping, they include:
Straight through Cable: the straight cable is terminated by using the same color codes at both
ends of the cable. This type of configuration enables dissimilar device connections. E.g.
36
Crossover Cable: Crossover cable serves to connect one device directly to another device,
without a switch or hub being present. It is terminated by wiring one end of the cable using
T568A and the other with T568B standard. This type of configuration enables similar device
1. Get the required tools: Wire Stripper, Crimping tool, Wire tracker, RJ 45s.
3. Strip off small parts of the cable at both ends (about 1 inch)
4. Fold back the braiding over the jacket, (used for grounding the cable- for STP cables)
5. Straighten the copper wires, then arrange the wires according to the required standard.
6. Cut off the extra wire making sure there is about1/4 inch of the left before the insert.
7. Insert the arranged copper wires into the RJ45 adapter maintaining the order.
8. Insert the RJ45 adapter with cable into the Crimper and clip firmly together.
9. Test the crimped cable for continuity using the wire tracker.
37
Figure 2.9 steps in crimping a network cable
1. Get the required tools: Wire Stripper or Crimping tool, Link Runner, Punch down tool
2. Pull the cable (CAT5,5E, 6) from the source redundancy behind the face plate
4. Straighten the copper wires and arrange according to the standard indicated on the modular
jack.
5. Insert the arranged copper wires into the RJ45 modular jack in accordance with the color code.
38
6. Punch down the wires, and trim off the excess
8. Test the punched cable for signal from the access switch using the Link runner.
from Internet Access (mobile, desktop, laptop and notebook computer system); Desktop, Laptop,
and Notebook Computer Systems (hardware and software); and Printer issues (network, hardware,
driver configurations) making sure their complaints are resolved. I was trained to receive
39
complaints, analyze problems, interpret the problems adequately and proffer lasting solutions with
recommendations in locations offices within and without the NNPC Corporate Headquarters as
contacted via a help line, the job is logged and then escalated to the corresponding ISD units
(Service Support in this case) via the Service Manager Platform. Other platforms are via Microsoft
Support jobs based on blocks (A, B, C, D) are assigned to the corresponding support teams
(comprises of Staff and Student) in the Service Desk. The Team Lead (Student Supervisor) then
assigns the job to the students with full details of the job description, users’ location and contact.
overtime. The Challenges range from Hardware and Software Failures, Boot Failure, Driver
Failure, Virus and Malware Infection, Hanging and Slow Systems, Printer configuration and
troubleshooting, File Recovery, Password Recovery, Internet Access, Domain Network Access,
User Credential Authentication, Software and Hardware Installation, Mail configuration for
What can cause Boot Error: failed hard drive or RAM chip, failed CMOS battery, power surge,
improper shutdown, failed operating system, virus and malware infections, date and time error.
40
Resolving System Boot Failure from hardware causes
a. First step is to unplug and plug back in the power cable. This is known to resolve minor power
b. Failed/Failing Hard drive is indicated on BIOS screen during system startup; Failed CMOS is
indicated by repetitive time reset prompts upon system startup and can be resolved by pressing
f10 key upon startup and manually correct date and time;
c. While power cable is unplugged take out and clean each RAM and noting the slots so as to
identify a faulty RAM chip or slot. Faulty RAM chip or improper RAM sitting is indicated by
five (5) successive beeps with red indicator lights during system boot.
d. Ensuring the optical disk drive is empty also resolves system boot failure.
e. For ambiguous hardware causes, boot failure can be resolved by performing tests on hardware
components using the BIOS menus during system start up. In Hp desktops and most computer
systems, pressing F9 key accesses the BIOS menus during system startup.
g. Failed OS is resolved by repairing the OS using the original OS installation media; and if
this fails, the files are backed up and the OS is reinstalled or the computer system is
reimaged. Norton Ghost 12 is a popular system reimaging software for windows 7 OS.
h. Virus and Malware infection are rectified by performing a boot time scan of the computer
system using antivirus software packages e.g. Kaspersky antivirus, and for severe cases the
hard drive for the system is attached to a healthy computer system, scanned and cleaned for
41
b. For Hp Desktop (e.g. Hp Compaq dc7700 Small form factor) or Laptop Computer System,
Startup the computer System and insert the OS installation media (Optical Disk or Bootable
USB Flash Drive) into the appropriate slot. Flash drive is made bootable using special software
e.g. Rufus 2.12 together with the Operating System ISO image file.
c. Restart the computer and repeatedly tap the F9 key to get to the boot order, then set the boot
d. The system then attempts boot from the installation media (Hp desktop gives a prompt to press
any key).
e. The system boots and a window display with various options: “Install Windows”, “Reinstall
Windows” (for OS already installed), “Repair Windows” etc. The option selected is dependent
causes e.g. accumulation of junk files, viruses or malware, OS errors, failing hardware, insufficient
Hanging and Slow system may be resolved by employing any of the under listed methods in
windows OS:
Press the windows key; type “Disk Clean-up” in the search field; press enter and wait for the
windows to load. Check the accumulated junk files, then click “OK” followed by “Delete
42
b. Check the system RAM and upgrade it (if below the required capacity). Press the windows
key, select “control panel”, then select “System” to view RAM information.
c. Perform “System Restore” (especially if it was since a last application installation). Press the
windows key, search for “Recovery”, then select “Open System Restore”. Finally, choose a
d. Scan the computer system with an up to date antivirus e.g. Kaspersky Antivirus. Boot time
e. Delete unimportant files, user accounts; uninstall unused application programs (for storage
f. Repair the OS using the installation media or Reimage the entire computer system for severe
cases.
g. Perform hardware test from system BIOS boot menu and replace failed hardware (failing
hardware cases).
43
2.3.6 Internet Access Configuration
Proxy Server Configuration
The proxy server is a computer system that gives users more rapid access to popular websites by
storing frequently requested and recently used items (Microsoft Encarta, 2009). It serves as the
To configure the proxy server in windows 7,8 or 10 OS, right click on the connection Bar and
select Open Network and Sharing center, click on “Internet Options” next click on “Connection”
then Click on “LAN settings” “Connection”, check “Automatically detect settings”, check “Use a
proxy server for your LAN…”, set the proxy “Address:” and “Port”, check “Bypass proxy server
Static IP Address configuration is done when a computer system is unable to connect to the internet
44
First, plug in a LAN cable. On the Windows 7,8 or 10 OS task bar, right click on the network icon
and select “Open Network and Sharing Center”, then double click Ethernet. In the ensuing
window, scroll and double click “Internet Protocol Version 4 (TCP/IPv4)”, and then select the
Enter the values for the “IP address”, “Subnet mask”, and “Default gateway”; then select the radio
button with “Use the following DNS server addresses”. Supply the “Preferred DNS server” and
“Alternate DNS server”, then check “Validate settings upon exit” and finally, click “OK”.
Upon configuration of the proxy server, wireless internet can then be configured for the user
provided the computer system (desktop or laptop) has functioning wireless card, wireless drivers,
45
2. Right click on the network icon on the task bar
46
9. Click on “Settings” and then uncheck the
10. Click on “Advanced settings”, and then check “Specify authentication mode:” Click on
then prompts for user’s (credentials) name and password which allows the computer to access
47
2.3.7 System Domain Troubleshooting and configuration
The Domain Network is the internal network (intranet) used by the organization. It hosts staff
account on local systems giving access to intranet services e.g. the NNPC Workplace; Microsoft
Outlook mail, Microsoft Lync; provides resource access e.g. network printers, and software
applications (installed and updated via the domain network), system security (computer systems
To add a user’s computer system to domain, first confirm internet connectivity (wireless or wired);
otherwise, configure internet access.
For Windows 7,8 or 10 OS, press the Windows key and then navigate through the following steps:
Windows key Control Panel System Advanced System settings Change
In the ensuing window, name the computer system, select the “Domain” radio button and enter the
network domain address. Click “OK”, enter the user’s account credentials and wait for the restart
prompt.
Upon successfully adding the system to domain and restarting, the user logs in and is granted
access to internet and intranet services like “NNPC Workplace”, “Microsoft Outlook”, “Microsoft
Lync” and other software resources.
48
Figure 2.94 System Domain Configuration
User credential authentication failure/denial may be due to changed passwords not successfully
synchronized over the domain network, long periods (months or weeks) since last login and logout,
or absent internet access in the user computer system.
To resolve user credential authentication failure over the domain network, the system administrator
logs in with the local administrator account, ensures internet connectivity, removes the system
from the domain, and then adds it back to the domain network thereby synchronizing the user
credential over the domain network.
2.3.8 Connecting System to Printer
49
Figure 2.95 Connecting system to a printer
50
After activating the share option, copy the present system’s IP Address then paste it at the new
system’s start menu (remember that the IP Address should start with a double backward slash
e.g. [\\10.2.1.190]
Reimaging is a computer system restore process which involves erasing all the current data on the
hard disk and restoring the entire disk from an existing disk image file. It is typically used as a last
resort system recovery option. Reimaging is used usually when the operating system (OS) get
damaged or corrupted, OS is unable to load, or when the OS is not running well as it should be.
A disk image which is a backup copy of a computer system that saves the OS, user accounts, files,
settings and installed applications coupled with a reimaging software application is used for system
reimaging. Reimaging with a standard disk image ensures all computers within a department have
Popular system imaging and reimaging software is Norton Ghost 12, AOMEI Backupper.
a. Back up all important data and files on an external storage device before reimaging.
b. Get the backup system image installation media (optical disk or bootable USB flash), connect
it to the computer and restart. See page 72, Fig. 2.31 Bootable USB flash Drive.
c. Repeatedly tap the F9 key to get to the boot order, then set the boot order to the corresponding
image installation media location (Disk Drive or USB).
d. Once Windows Setup loads, press the 'F8' key to accept Windows license agreement.
e. At the “Where do you want to install Windows” screen, click the hard drive partition to be
reimaged and then click the delete button.
f. The hard drive will be shown as unallocated, and then click “Next” to start reinstall
Windows.
51
Usually, it will take about half an hour to reimage a computer. After that, other required software
applications absent in the image would have to be reinstalled and backed up files restored back to
chips, Hard drive; Multifunction printers of varying types and printer accessories (toners, transfer
kit, fuser kit, and drum), Intercom, Paper Shredders etc. are among the devices worked on in the
52
RAM Wireless Adapter Card
Multifunctional printer
53
CHAPTER 3
CHALLENGES ENCOUNTERED
various challenges still arise, the challenges faced to a large extent affects the aims and objectives
of the program.
Lots of staff tend to be rude to IT students when attending to them and I had to ignore all
that and attend to jobs, assignments, and errands in the best possible way as at when due.
Numerous jobs per day averaging to about one hundred and eighty jobs in the first three
months of SIWES which required walking about the office complex (four blocks each
consisting of 11 floors and 3 basements) for over eight hours posed a major health
Leaving as early as 6:45AM daily and returning late from my place of SIWES attachment
54
3.2 Relation with physics
I worked with landlines which when spoken into the mouth piece, it sends the sound waves to a
metal disk called a diaphragm which converts the sound waves into electrical signals(waves) and
transfers it through electrical lines (transmission lines) to the receiver, where it is then converted
back to sound waves, giving me the practical representation of what I learned from my
phy223(waves) and my PHY313(electromagnetism) also the fiber optic cables which carry
digital signal in form of modulated pulses of light(photons), applying what I learnt in
PHY314(quantum physics) .
CHAPTER 4
4 EXPERIENCE GAINED
Within the period of six months (January-June) spent at NNPC, I have been empowered with
professional skills in networking, computer systems troubleshooting and maintenance, and even
social skills. I was able to acquire practical experiences to support the theoretical aspects being
taught in school. I was exposed to experienced industry professionals, working methods and
techniques in handling equipment and machinery not available in the academic institutions.
b. Network operating systems, network servers, their type’s functions, uses etc.
c. Analyzing and interpreting network, computer systems, internet and other related problems
in the course of use, proffering timely and lasting solutions.
55
I gained more experiences in leadership, project writing, safety and public speaking. I was a
MEMBER of SWEP/SIWES/IT group called Okikiolu Kayode Visionary Class (OKVC). This
platform taught me various leadership qualities and inspired me towards a better future. Classes
are held every day(8am-9am) empowering us for the day, it has also given me a real confidence
boost. OKVC helped me conquer my stage fright in presentation and I also had the opportunity to
In the units I served (Networks\telecoms, Service Support), I was asked severally to teach the new
set of IT students and I helped them in areas where they lacked and was responsible for the office
56
CHAPTER 5
5 CONCLUSION
SIWES gives students the kind of exposure and experience they need to function in and out of
school, to make decisions, to economize and cut down spending. The industrial training has
broadened my knowledge of the information and communications technology (ICT) aspect of my
course and has given me the opportunity to experience “First-Hand” all the things being taught
theoretically in school and has also given me an opportunity to work with other -people in an
office environment and has improved my team work, and People Skills.
growing or grown cannot be over emphasized rather it is a breakthrough that every organization
should embrace in order to maximize its growth potentials and eventually grow.
IT is the backbone of every organization as information empowers on every facet of life. It plays
vital roles in the success of an organization which is why NNPC has invested so much on in
Information Technology.
57
Maintain good customer service
Available
Confidential
Accessible
5.1 Recommendations
I will like to recommend that SWEP/SIWES/IT should compulsorily carry credit units in every
Nigerian tertiary institution because a lot of students are not taking it seriously because it adds
little or no credit unit to their grades and so it is not worth the stress.
Also, schools or the ITF should have incentives for best performance in internship so it will
Industrial Training Fund ITF should review the payment policy by increasing the training
An alternative to submitting all documents by hand to the ITF office should be provided.
REFERENCES
Computer Networking: Principles, Protocols and Practice Release 0.25 Olivier Bonaventure
58
Microsoft ® Encarta ® 2009. © 1993-2008 Microsoft Corporation
IP Network Design Guide for IBM by Martin W. Murhammer, Kok-Keong Lee, Payam
Cabling: The Complete Guide to Network Wiring, Third Edition by David Barnett, David
59