You are on page 1of 69

A TECHNICAL REPORT ON

STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME(SIWES)

(JANUARY 2018-JUNE 2018)

HELD AT

NIGERIAN NATIONAL PETROLEUM CORPORATION(NNPC)

ABUJA

BY

NWATU VICTOR PRAISE

15CE03887

INDUSTRIAL PHYSICS ELECTRONICS AND IT APPLICATION

SUBMITTED TO

THE DEPARTMENT OF PHYSICS

COVENANT UNVERSITY OTA, OGUN STATE

IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF A


BACHERLOR OF SCIENCE B.SC IN INDUSTRIAL PHYSICS

DEAN OF CST: Professor James Katende

i
CERTIFICATION
This is to certify that this work was undertaken by NWATU VICTOR PRAISE with matric
number 15CE03887 at the Nigerian National Petroleum Corporation (NNPC). The report
submitted to the department of PHYSICS, COVENANT UNIVERSITY OTA OGUN STATE
Nigeria during the 2017/2018 Students industrial Work Experience scheme.

ii
DEDICATION
First of all, I dedicate this SIWES report to my Father in heaven, God Almighty for almighty for
the opportunity and grace given to me to undergo this training and resume a new semester
peacefully. To my wonderful Parents MR and MRS NWATU for their tireless support and
investment in my life and to all those who may consider this thesis relevant in the pursuit of
academic excellence, I dedicate this piece of work.

iii
ACKNOWLEDGEMENT
I wish to express my sincere gratitude to all whom in one way or the other contributed to the
success of my industrial training. I am very grateful to God Almighty whose sufficient grace it is
that I am alive and well able to start and finish my industrial training. I would like to show my
gratitude to my parents Mr. and Mrs. NWATU, To the Group Learning Department (GLD) for
posting me to ITD/ISD, Networks as relevant to my discipline, Also to my numerous Industry
supervisors in persons of Mr. Mohammed Gabdo (Supervisor, Service Support) Mr. Ibrahim Bassi
(Supervisor, Networks), Mr. Mohammed Gumel (Network Risk Analyst), Mr. Umar Janyau
(Network Risk Analyst), Engr. Bassey E. Bassey (Network Admin), Mr. Okereke (support staff)
Engr. Mrs. Eguadike A. U (System analyst), my school supervisor Engr. Wasiu for their
unquantifiable love, care and support both morally and financial to carry me through.

To my HOD Dr Aizeboki and Mr Adewoyin the SIWES coordinator and all prestigious lecturers
in the department of physics.

My gratitude also goes to my entire SIWES colleagues at work and in school for their support,
understanding and sharing of knowledge during my SIWES period and making it a success.

iv
ABSTRACT
This is a report on my Student’s industrial Work Experience scheme (SIWES) carried out in
Networks\telecoms unit and service support unit, Information Technology Division (ITD) of the
Nigeria National Petroleum Corporation, NNPC Abuja. SIWES is a scheme that provides students
the adequate opportunity and room for industrial skill acquisition in respect to their various
discipline. It exposes students to the approaches and techniques in the use of tools, and prepares
them for the work situation ahead of time. This report is aimed at discussing the structure of the
Nigerian National Petroleum Corporation (NNPC), It’s mode of operation and the specifics of my
internship, my area of specifications both Networking/telecommunication and service support,
giving detailed explanation about Networking, Network configuration and System Maintenance.

v
TABLE OF CONTENT
CERTIFICATION .................................................................................................................................ii

DEDICATION ....................................................................................................................................iii

ACKNOWLEDGEMENT .....................................................................................................................iv

ABSTRACT .........................................................................................................................................v

TABLE OF FIGURES .......................................................................................................................... ix

CHAPTER ONE ................................................................................................................................. 1

1 INTRODUCTION ....................................................................................................................... 1

1.1 General introduction to SIWES ........................................................................................ 1

1.2 Aims and Objectives of SIWES.......................................................................................... 2

1.3 General introduction to the company ............................................................................. 3

1.3.1 The Nigerian National Petroleum Corporation......................................................... 3

1.3.2 History of NNPC ........................................................................................................ 3

1.3.3 Areas of Operations and Job Description ................................................................. 5

1.3.4 NNPC Organization Structure ................................................................................... 5

1.5 NNPC Information Technology Department (ITD) ........................................................... 9

1.5.1 ITD Mission and Vision .............................................................................................. 9

1.5.2 ITD Goals ................................................................................................................... 9

1.5.3 ITD Current Services.................................................................................................. 9

1.5.4 ITD Customer .......................................................................................................... 10

2 Overall work done................................................................................................................. 12

2.1 Work done: Network/telecommunication unit ............................................................. 12

2.1.1 Work methodology in the Networks/telecommunication unit .............................. 13

2.1.2 Network .................................................................................................................. 13


vi
2.1.3 Network configuration ............................................................................................ 13

2.1.4 Types of Networks .................................................................................................. 14

2.1.5 The cabling system .................................................................................................. 17

2.1.6 Wired Network access device ................................................................................. 21

Hub and Switch and Router .................................................................................................. 21

Network interface Card (NIC) ............................................................................................... 21

2.1.7 OPEN SYSTEM INTERCONNECTION LAYER (OSI LAYERS) ........................................ 22

2.1.8 Internet protocol address ....................................................................................... 24

2.1.9 Wireless LANs.......................................................................................................... 27

2.2 ACTUAL WORKDONE IN NETWORKS UNIT ..................................................................... 27

2.2.1 NNPC Network Structure ........................................................................................ 27

2.2.2 Troubleshooting a Network .................................................................................... 30

2.2.3 Crimping a Network Cable ...................................................................................... 35

2.2.4 Punching RJ45 Modular Jack ................................................................................... 38

2.2.5 Activating Ethernet/Internet Access Port ............................................................... 39

2.3 Work Done: Service support Unit .................................................................................. 39

2.3.1 Work methodology in the Service Support Unit..................................................... 40

2.3.2 Systems Configuration, Troubleshooting, Maintenance and Repairs .................... 40

2.3.3 Resolving System Boot Error................................................................................... 40

2.3.4 Repairing or Installing Windows OS ........................................................................ 41

2.3.5 Rectifying Hanging and Slow System ...................................................................... 42

2.3.6 Internet Access Configuration ................................................................................ 44

2.3.7 System Domain Troubleshooting and configuration .............................................. 48

2.3.8 Connecting System to Printer ................................................................................. 49

vii
2.3.9 Sharing Printer among two or more Systems ......................................................... 50

2.3.10 System Reimaging ................................................................................................... 51

3 Challenges encountered and how it was solved .................................................................. 54

3.1 Contribution to the Company ........................................................................................ 54

4 EXPERIENCE GAINED ............................................................................................................. 55

5 CONCLUSION ......................................................................................................................... 57

5.1 Recommendations ......................................................................................................... 58

viii
TABLE OF FIGURES
Figure 1 Landscape view of NNPC towers ...................................................................................... 3
Figure 1.1 NNPC Board Organogram .............................................................................................. 7
Figure 1.2 NNPC corporate headquarters Organogram ................................................................. 8
Figure 1.3 ITD operational chart ................................................................................................... 11
Figure 2.1 simple network ............................................................................................................ 13
Figure 2.2 client/server network Figure 2.3 a peer to
peer network................................................................................................................................. 14
Figure 2.41 Bus topology .............................................................................................................. 16
Figure 2.42 Star topology .............................................................................................................. 16
Figure 2.5 WAN network topology ............................................................................................... 17
Figure 2.6 MAN network topology ............................................................................................... 17
Figure 2.71 unshielded twisted pair ............................................................................................. 19
Figure 2.72 shielded twisted pair.................................................................................................. 19
Figure 2.73 NETWORK INTERFACE DEVICES ................................................................................. 22
Figure 2.8 OSI LAYER ..................................................................................................................... 23
Figure 2.80 IPv4............................................................................................................................. 25
Figure 2.801 IPv6........................................................................................................................... 26
Table 2.81 Star Topology Communication between NNPC CHQ and the Branches ..................... 28
Table 2.83 Access switch (POE ...................................................................................................... 29
Table 2.831 NNPC chq campus network topology ....................................................................... 30
Figure 2.83 A Distribution and core switch................................................................................... 30
Figure 2.84 fluke link runner ......................................................................................................... 32
Figure 2.85 crimping tool .............................................................................................................. 33
Figure 2.86 punch down tool ........................................................................................................ 34
Figure 2.87 cable stripper ............................................................................................................. 34
Figure 2.88 modular jack .............................................................................................................. 34
Figure 2.89 cable wiring ................................................................................................................ 36
Figure 2.89 Straight Through ethernet cable................................................................................ 36
ix
Figure 2.9 steps in crimping a network cable ............................................................................... 38
Figure 2.92 Disk Cleanup............................................................................................................... 43
Figure 2.93 Proxy Configuration ................................................................................................... 44
Figure 2.93 Static IP Configuration ............................................................................................... 45
Figure 2.94 System Domain Configuration ................................................................................... 49
Figure 2.95 Connecting system to a printer ................................................................................. 50
Figure 2.96 Desktop Computer system and components ............................................................ 53

x
CHAPTER ONE

1 INTRODUCTION
1.1 General introduction to SIWES

The Student Industrial Work Experience Scheme (SIWES) was established by the Industrial

Training Fund (ITF) in 1973 to enable students of tertiary institutions have technical knowledge

of industrial work based on their course of study before the completion of their program in their

respective institutions. The scheme was design to expose students to industrial environment and

enable them develop occupational competencies so that they can readily contribute their quota to

national, economic, and technological development after graduation. The major benefits accrued

to student who participate conscientiously in Student Industrial Work Experience Scheme

(SIWES) are the skills and competencies they acquire. The relevant production skill remains a part

of the recipients of industrial training as life-long assets which cannot be taken away from them.

This is because the knowledge and the skills acquired are internalized and become relevant when

required in jobs or functions.

In the earlier stages of science and technology education in Nigeria, students were graduating from

their respective institutions without any technical knowledge or working experience. It was in this

view that student undergoing science and technology related courses were mandated for SIWES

in different institutions to widen their horizons and to enable them have technical knowledge or

working experience before graduating from their various institutions.

1
1.2 Aims and Objectives of SIWES

The Industrial Training Fund Policy Document No.1 of 1973 which established SIWES outlined

objectives of the scheme. Participation in SIWES has become a necessary pre-condition for the

award of Diploma and Degree certificates in specific discipline in most institutions of higher

learning in the country, in accordance with the educational policy of the government. The

objectives are to:

a) Provide an avenue for students in higher institutions of learning to acquire industrial skills and

experiences during their course of study.

b) Prepare students for industrial work situations that they are likely to meet after graduation.

c) Expose student to work methods and techniques in handling equipment and machinery that

may not be available in their institutions.

d) Provide student with the opportunities to apply their educational knowledge in real work

situations, thereby bridging the gap between theory and practical.

e) Enlist and strengthen employers’ involvement in the entire education process and prepare

students for employment in Industry and commerce (Information and guideline for SIWES,

2002).

2
1.3 General introduction to the company

1.3.1 The Nigerian National Petroleum Corporation


The Nigerian National Petroleum Corporation (NNPC) is the Oil Corporation through which the

federal government of Nigeria regulates and participates in the country's petroleum industry.

Figure 1 Landscape view of NNPC towers

1.3.2 History of NNPC


The Oil and Gas Industry in Nigeria emerged from the merging of the then Nigerian National Oil
Corporation (NNOC) and the Ministry of Petroleum Resources, to give birth to the new oil
regulatory body now, which is the Nigeria National Petroleum Corporation (NNPC) formed in
April 1977. The corporation was tasked with various responsibilities among which included active
participation in exploration and production, refining and product marketing. The corporation
constructed refineries at Warri, Kaduna and Port Harcourt, together with a huge network of
pipelines, depots and pump stations for effective distribution of petroleum products throughout the
country. It also undertook Joint Venture Agreement as well as Production Sharing Contacts with
multinational companies operating in the upstream sector of the oil industry. It has ten (8)
subsidiary companies among which are;

 National Petroleum Investment Management Services (NAPIMS)


 Kaduna Refining and Petrochemical Company Ltd. (KRPC)

3
 Nigerian Petroleum Development Company Ltd. (NPDC)
 Nigerian Gas Company (NGC)
 Integrated Data Services Limited (IDSL)
 National and Engineering and Technical Company limited (NETCO)
 Port-Harcourt Refinery Company limited (PHRC)
 Warri Refining and Petrochemicals Company limited (WRPC)

In addition to these subsidiaries, the industry is also regulated by the Department of Petroleum

Resources (DPR), a department within the Ministry of Petroleum Resources. The DPR ensures

compliance with industry regulations; processes applications for licenses, leases and permits,

establishes and enforces environmental regulations.

Moreover, DPR, and NAPIMS, play a very crucial role in the day to day activities throughout the

industry.

The NNPC Towers in Abuja is the Corporate Headquarters (CHQ) of NNPC. Consisting of four

identical towers, the complex is located on Herbert Macaulay Way, Central Business District

Abuja. NNPC also has zonal offices in Lagos, Kaduna, Port Harcourt and Warri. It has an

international office located in London, United Kingdom.

1.3.2.1 Vision statement


NNPC will be a world-class Oil and Gas company driven by shared commitment to excellence

1.3.2.2 Mission statement


NNPC is an integrated Oil and Gas Company, engaged in adding value to the nation’s hydrocarbon
resources for the benefit of all Nigerians and other stake holders.

NNPC Core values:

 Staff development and growth

4
 Integrity, transparency and accountability

 Professional excellence

 Respect for the individual

1.3.3 Areas of Operations and Job Description


The NNPC is vested with the exclusive responsibility of upstream and downstream development,

which entails exploring, refining, and marketing Nigeria’s crude oil. The NNPC through the

NAPIMS supervises and manages government investment in the Oil and Gas Industry. NNPC’s

oil and gas operations are undertaken both in upstream and downstream operations.

The upstream operations i.e. crude oil production, are currently managed under the Exploration

and Production Directorate which consists of the following Strategic Business Units (SBUs) that

operate directly under the NNPC:

a. National Petroleum Investment Management Services (NAPIMS)

b. Crude Oil Sales Division (COSD)

c. Integrated Data Services Limited (IDSL)

d. Nigerian Petroleum Development Company (NPDC)

e. Nigerian Gas Company (NGC)

These SBUs are collectively responsible for surveys, seismic data collation and interpretation,

crude oil exploration, production, transportation, storage and marketing.

1.3.4 NNPC Organization Structure


The NNPC Group comprises the NNPC Board, the Group Managing Director's office, Five

Directorates as listed below. Each of the Directorates is headed by a Group Executive Director

5
(GED). Its Divisions are headed by Group General Managers (GGM) while its subsidiary

companies are headed by Managing Directors. NNPC has several subsidiaries, two partly owned

subsidiaries and 16 associated companies.

Directorates:

 Exploration and Production

 Refinery and Petrochemicals

 Commerce and Investment

 Corporate services

 Finance and Accounts

6
Figure 1.1 NNPC Board Organogram

7
Figure 1.2 NNPC corporate headquarters Organogram

8
1.5 NNPC Information Technology Department (ITD)
During my SIWES at NNPC, I was posted to the INFORMATION TECHNOLOGY

DIVISION (ITD) which consists of two departments which are:

i. Information Systems Department (ISD) and

ii. Telecommunications\Networking Department (TELECOMS\NETWORKS).

Under ITD, I worked with the:

a. Networks unit and,

b. Service Support Unit.

1.5.1 ITD Mission and Vision


Mission: IT will be the Key enabler of NNPC business transformation by driving efficiencies and

enhancing performance for competitive advantages

Vision: To provide information technology resources and services to strategically drive NNPC

business

1.5.2 ITD Goals

 Provide efficient IT services to users

 Be proactive to customers’ needs

 Deploy reliable technology as soon as the needs arises

 Simplify user interface so that customers do not require Experts knowledge to operate IT

systems

1.5.3 ITD Current Services


 IT helpdesk and user training

 Operating Systems/Applications deployment

9
 Network application deployment and support

 Internal and external email services

Telecommunication services

1.5.4 ITD Customer


 All IT services users

 Remote user

 Network application users

 Telecommunication users

10
INFORMATION TECHNOLOGY DEPARTMENT(ITD)

ISD TELECOMS

NETWORKS COMMERCIALS
SERVICES TECHNICAL APPLICATIONS PROJECTS OPERATIONS & SYSTEM DEV.
SUPPORT SUPPORT SUPPORT MAINTENANCE & TECHNICAL
SERVICES

HELPDESK SERVICE DESK PROCUREMENT SUPPORT SBU PROJECTS


SERVICES

NETWORK WAN & INFRASTRUCTURE SWITCHING


OPERATIONS SECURITY DEPLOYMENT
Figure 1.3 ITD operational chart

11
CHAPTER 2

PARTICIPATION/WORK DONE

2 Overall work done


During my Six Months Compulsory SIWES at NNPC Abuja, I was designated first at Service

support, then at Networks/telecommunications, both designations were at user’s level, totaling

to Six Months of SIWES.

In my first two months of SIWES at the Information Technology Division (ITD), NNPC Abuja, I

worked under the Information Technology Department (ITD) with the service support unit and

then with the networks/telecommunication unit for the remaining 4 Months, resolving an average

of three (3) jobs per working day, fifteen (15) jobs per week, sixty (60) jobs per month, which

totals to one hundred and twenty (120) jobs under the first two months of SIWES all at user’s

level.

2.1 Work done: Network/telecommunication unit


As a Network/telecommunication Analyst, I analyze and attend to a wide variety of user needs

pertaining to network connectivity such as Cable crimping, cable laying, punching, network

connectivity configuration for Intercom, Desktops, setting up CISCO phones and Land lines

Laptops, Notebook PC, mobile devices, Printers; Access Switch port activation, and network

diagnostics etc.

I was taught on how to properly tackle complaints that is to properly analyze the problems,

interpret the problems, and proffer lasting solutions with recommendations in locations offices

within and without the NNPC Corporate Headquarters as each case required.

12
2.1.1 Work methodology in the Networks/telecommunication unit
There is a laid down system through which users relay their complaints. The Help Desk is

contacted via a help line (01), the job(complaint) is logged and then escalated to the corresponding

ISD units (Networks Unit in this case) via the Service Manager Platform. Other platforms are via

Microsoft Outlook, Lync, Telephone Calls, and the NNPC Workplace.

The jobs are then given to IT students by their Supervisors as the case may be.

2.1.2 Network
What is a Network?

A network consists of two or more computers that are linked together in order to share resources
(such as printers and CDs), exchange files, or allow electronic communications. The computers
on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared
light beams. Basically, a network is a route used for communication between two or more
electronic devices. COMPONENTS used to connect various computers together are called
network devices.

Figure 2.1 simple network

2.1.3 Network configuration


There are two types of network configuration, peer-to-peer networks and client/server networks.

a. Client/server networks are more suitable for larger networks. A central computer, or 'server',

acts as the storage location for files and applications shared on the network. In which many

13
less powerful computers or workstations(clients) are connected. The server also controls the

network access of the other computers which are referred to as the 'client' computers. The

clients run programs and access data that are stored on the server. Only the network

administrator will have access rights to the server.

b. Peer-to-peer networks are more commonly implemented where less than ten computers are

involved and where strict security is not necessary. It is created when two or more PCs are

connected and share resources without going through a separate server computer. All

computers have the same operational status/capacity, hence the term 'peer', and they

communicate with each other on an equal footing. Files, such as word processing or

spreadsheet documents, can be shared across the network and all the computers on the

network can share devices, such as printers or scanners, which are connected to any one

computer. Peer-to-peer networks have no centralized control.

Figure 2.2 client/server network Figure 2.3 a peer to peer


network

2.1.4 Types of Networks


There are three (3) major types of network; Local area network (LAN), Wide area network
(WAN), Metropolitan area network (MAN)

14
LOCAL AREA NETWORK(LAN)

LAN (local area network): this is a network that interconnects users with computer resources
within a particular building together. They are widely used to connect personal computers and
workstations in company offices and factories to share resources (e.g., printers) and exchange
information. Most local area networks are built with relatively inexpensive hardware such as
Ethernet cables, network adapters, and hubs. Wireless LAN options also exist. Traditional LANs
run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or nanoseconds), and make
very few errors and they operate within the distance of 100m. WLANs are generally composed of
two basic elements: access points and other wireless-enabled client devices, such as laptop
computers Access points are physically wired to a conventional network and provide a means for
wireless devices to connect to them.

There are THREE main ways in which LAN can be broadcasted; we have the ring topology, bus
topology and star topology.

A Network Topology is a way of “laying out” the network. Topologies can be either physical or

logical. Physical topologies describe how the cables are run, while Logical topologies describe

how the network messages travel between different components.

i. Ring Topology creates a network by arranging 2 or more hosts in a circle. Data is passed between

hosts through a 'token.' This token moves rapidly at all times throughout the ring in one direction.

Figure 2.4 a Ring topology

ii.Bus Topology uses a common backbone to connect all devices. A single cable which is the

backbone functions as a shared communication medium that devices attach or tap into with an

interface connector.

15
Figure 2.41 Bus topology

iii. Star or Mesh Topology is one of the most common network setups where each of the

devices and computers on a network connect to a central hub. A major disadvantage of this

network topology is that if the central hub fails, all computers connected to that hub would

lose connectivity.

Figure 2.42 Star topology

B. Wide Area Network (WAN), spans a large geographical area, often a country or continent.

WANs utilize public communication links. The largest and most well-known example of a

WAN is the Internet. WANs often connect multiple smaller networks such as LANs or

MANs. A WAN can have a distance of 100 to 10,000km around a continent, transmission

rates are typically 2Mbps, 34Mbps or more..

16
Figure 2.5 WAN network topology

C. Metropolitan Area Network (MAN) is a large computer network that usually spans cities,

states or a large campus. It usually interconnects a number LANs using a high-capacity

backbone technology, such as fiber-optical links or using a WMAN. The best-known

examples of MANs are the cable television networks.

Figure 2.6 MAN network topology

2.1.5 The cabling system


The cabling employed in the NNPCs network is one of the most important components of the
network and is the most Long-lived with an expected life span of 15–20 years. There is a likely
replacement of network equipment three to four times over the life of the cabling system. Cabling
takes about 15% total network cost. Long-term considerations are made and the best cable and
installation services are utilized.

17
Types of cabling system

a. Coaxial Cable
COAXIAL CABLE conducts electrical signal using an inner conductor (usually a solid
copper, stranded copper or copper plated steel wire) surrounded by an insulating layer and all
enclosed by a shield, typically one to four layers of woven metallic braid and metallic tape. The
cable is protected by an outer insulating jacket. Normally, the shield is kept at ground potential
and a signal carrying voltage is applied to the center conductor. The advantage of coaxial design
is that electric and magnetic fields are confined to the dielectric with little leakage outside the
shield. Conversely, electric and magnetic fields outside the cable are largely kept from
interfering with signals inside the cable.

Figure 2.7 Coaxial cable

b. Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted
together for the purposes of canceling out Electromagnetic interference (EMI) from external
sources; for instance, electromagnetic radiation from unshielded twisted pair (UTP) cables, and
cross talk between neighboring pairs. It was invented by Alexandra Graham

The twisted pair cable is divided into two categories:

 Unshielded Twisted Pair (UTP)


 Shielded Twisted Pair (STP)

UTP cables are similar to telephone cables, they contain four pairs of wires twisted together to
help shield against electromagnetic interference. They are easier to install than coaxial and fiber
optic. The maximum distance of UTP is 100 meters

18
Figure 2.71 unshielded twisted pair

STP cables are very similar to UTP cabling, but the only difference is the additional layer of
insulation within the protective jacket which helps maintain the quality of the signal. Twisted pair
is susceptible to interference than coaxial and should not be used in environments containing large
electrical or electronics devices.

Figure 2.72 shielded twisted pair

C. Fiber Optic Technology

Fiber optic cable uses optical fibers that carry digital signal in form of modulated pulses of light.
It consists of an extremely thin cylinder of glass called the core surrounded by a concentric layer
of glass called the ‘cladding’. There are two fibers in each cable, one for transmitting and the other
for receiving data. To reduce signal loss, the core can also be an optical-quality clear plastic, and
the cladding can be made up of gel that reflects signals back into the fiber. Fiber-optic cables have
signal strength over long distances and are highly secure from outside interference and electrical
noise. However, they are too expensive. There are two types of fiber-optic cables:

19
 Single-mode fiber (SMF)
 Multi-mode fiber (MMF)

Single-mode uses a single ray of light known as mode to carry transmission over long distances of
about 2km, while Multi-mode uses multiple ray of light simultaneously to carry transmission over
short distances.

Figure 2.73 FIBER OPTIC CABLE

Cable Categories

 Category 3 (CAT3) cable is rated for networks operating up to 16 Mbps. It is suitable for
voice transmissions (not VoIP). ISO/IEC refers to the end-to-end channel as Class C.
 Category 4 cable is rated for transmission of 16 Mbps up to 100 meters. It is considered
obsolete.
 Category 5 (CAT5) cable was common for 100-Mbps LANs. It was ratified in 1991 and is
now considered obsolete.
 Enhanced Category 5 (CAT5e/Class D) cable, ratified in 1999, was designed to enable
twisted-pair cabling to support full-duplex, 100-MHz applications such as 100BASE-TX and
1000BASE-T. CAT5e introduces stricter performance parameters such as Power-Sum Near-
End Crosstalk (PS-NEXT), Equal-Level Far-End Crosstalk (EL-FEXT), and Power-Sum
Equal-Level Far-End Crosstalk (PSELFEXT). It also introduces channel and component
testing.

20
 Category 6 (CAT6/Class E) cable easily handles Gigabit Ethernet (1000BASE-T)
applications. It’s a 100-ohm cable with a frequency of 250 MHz CAT6 has far more stringent
performance parameters than CAT5e, and is characterized by channel, link, and component
testing. In addition, CAT6 components must be backwards compatible.

2.1.6 Wired Network access device


Wired network access devices enable wired connection to a LAN

Hub and Switch and Router

ROUTERS: A router is a networking device that forwards data packets between computer
networks. Routers perform traffic directing functions on the internet. A data packet is typically
forwarded from one router to another through the networks that constitute the internet until it
reaches the destination node.

SWITCHES: In networks, a device that filters and forwards packets between LAN segments is
termed switch. Switches operate at the data link layer (layer 2) and sometimes the network layer
(layer 3) of the OSI model and therefore support any packet protocol. LANs that use switch to join
segments are called switched LANs.

HUBS: A common connection point for devices in a network is termed a Hub. Hubs are commonly
used to connect segments of a LAN. A Hub contains multiple ports and it floods the host system.
It doesn’t filter messages rather it floods the different host on the network with the message and
the one who owns the message regards it while the others disregard it.

Network interface Card (NIC)


A NIC (pronounced 'nick') is also known as a network card. It connects the computer to the cabling,
which in turn links all of the computers on the network together. Each computer on a network must
have a network card. Most modern network cards are 10/100 NICs and can operate at either
10Mbps or 100Mbps. Only NICs supporting a minimum of 100Mbps should be used in new
installations students. Computers with a wireless connection to a network also use a network card.

21
NIC CARD

A HUB AND A SWITCH

Figure 2.73 NETWORK INTERFACE DEVICES

2.1.7 OPEN SYSTEM INTERCONNECTION LAYER (OSI LAYERS)


The OSI model defines internetworking in terms of a vertical stack of seven layers. The upper 3
layers of the OSI model represent software that implements network services like encryption and
connection management. The lower 4 layers of the OSI model implement more primitive,
hardware-oriented functions like routing, addressing, and flow control.

22
Figure 2.8 OSI LAYER

LAYER 7: Which is the APPLICATION LAYER provides an interface that allows the application
to communicate across a network. This layer is the most familiar layer because it is basically what
the user sees. Many Protocol are used in these layer (a protocol is a detailed specification of how
communication is to proceed)

LAYER 6: Which is the PRESENTATION LAYER receives data from the application layer and
translates that data into a standard form to be used on the server. Security is also added at this layer
by using data encryption and decryption (data encryption means translating the data into secret
codes and data decryption is the process of decoding data that has already being coded). This
prevents others from intercepting the data.

LAYER 5: Which is the SESSION LAYER allows application on the system to communicate
using a session; it opens uses and closes the communication link.

LAYER 4: Which is the TRANSPORT LAYER describes how data is sent. It receives data from
the session layer and sends it to the network layer. This layer also defines well known services

23
(port numbers). It designates what service a client is trying to access on the server using port
numbers. A server in addition to being a web server might be an email server, using port number
the server is able to know if the client is asking for a web page or otherwise. They also ensure that
data are delivered error free

LAYER 3: Which is the NETWORK LAYER provides logical addresses known as internet
protocol addresses. This layer determines the best route to get to the server. When a packet has to
travel from one network to another to get to its destination, many problems can arise. The
addressing used by the second network may be different from the first one. The second one may
not accept the packet at all because it is too large. The protocols may differ, and so on. It is up to
the network layer to overcome all these problems to allow heterogeneous networks to be
interconnected.

LAYER 2: Which is the DATA LINK provide the physical address known as the MAC address
(media access control) and the logical link control. The MAC controls how a computer on the
network gains access to the data and permission to transmit it and the logical link control the flow
of data and ensure its error free.

LAYER 1: Which is the PHYSICAL LAYER is responsible for point to point connections
between computers. This layer translates bits into electrical signals that can be carried across a
physical medium.

2.1.8 Internet protocol address


The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to
another on the Internet. Each computer (known as a host) on the Internet has at least one IP
address that uniquely identifies it from all other computers on the Internet. An Internet Protocol
address (IP address) is a numerical label assigned to each device (e.g., computer, printer)
participating in a computer network that uses the internet protocol for communication. An IP
address serves two principal functions: host or network interface identification and location
addressing. The designers of the Internet Protocol defined an IP address as a 32-bit number and
this system, known as internet protocol version 4 (IPv4), is still in use today. However, because
of the growth of the internet and the predicted depletion of the address, a new version of IP, IPv6
using 128 bits for the address, was developed in 1995. IPv6 was standardized as RFC 2460 in
1998 and its deployment has been ongoing since the mid-2000s.
24
IP addresses are usually written and displayed in human readable notations, such as 172.16.254.1
(IPv4), and 2001:db8:0:1234:0:567:8:1 (IPv6).

In IPv4 an IP address is always combined with a subnet mask and a default gateway. The subnet
mask represents what part of the network and the host, Subnet mask is a 32 bits long address which
is always used with IP address.

IP address 10. 2. 4 .3

Subnet mask 255.255.255.0

The 255 in the subnet mask represents the network on the IP address while the 0 represents the
host. In computer networking, a gateway is a node (a router) on an IP network that serves as an
access point to another network. Example of a default gateway is 172.30.5.1.

Figure 2.80 IPv4

25
Figure 2.801 IPv6

Types of Internet protocol Techniques

There are majorly two types of IP techniques and these are

• Static IP the static IP is a type of IP technique that allows for network administrators to

manually assign IP addresses to user PCs or hosts. It can only be used when the Dynamic IP

server is down, but it’s a professional practice to always disable the statics when DHCP is up.

• Dynamic IP this technique uses the Dynamic Host Configuration Protocol (DHCP), this

protocol allows for all registered PCs on the domain to be assigned addresses automatically.

When a computer is disconnected from the network, the system saves the details of the

network, so when the computer is re-connected, it gains access to the network automatically.

This is the system in practice, and every network has a DHCP server.

CIDR (Classless Inter Domain Routing)

CIDR is a slash notation of subnet mask. CIDR indicates the number of on bits in a network

address.

Class A has default subnet mask 255.0.0.0 that means first octet of the subnet mask has all on

bits. In slash notation it would be written as /8, means address has 8 bits on.

Class B has default subnet mask 255.255.0.0 that means first two octets of the subnet mask have

all on bits. In slash notation it would be written as /16, means address has 16 bits on.

Class C has default subnet mask 255.255.255.0 that means first three octets of the subnet mask

have all on bits. In slash notation it would be written as /24, means address has 24 bits on.

26
2.1.9 Wireless LANs
Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate

between the workstations, servers, or hubs. They do not make use of cables. Each workstation and

file server on a wireless network has some sort of transceiver/antenna to send and receive the data.

For longer distance, wireless communications can also take place through cellular telephone

technology, microwave transmission, or by satellite.

Wireless networks are great for allowing laptop computers, portable devices, or remote computers

to connect to the LAN.

The two most common types of infrared communications used in schools are line-of-sight and

scattered broadcast. Line-of-sight communication means that there must be an unblocked direct

line between the workstation and the transceiver. Scattered infrared communication is a broadcast

of infrared transmissions sent out in multiple directions that bounces off walls and ceilings until it

eventually hits the receiver. Networking communications with laser are virtually the same as line-

of-sight infrared networks.

2.2 ACTUAL WORKDONE IN NETWORKS UNIT

2.2.1 NNPC Network Structure


The Nigerian National Petroleum Corporation (NNPC) employs a WLANs at the public level i.e.

at the branches is a LAN. A WAN then connects branches and the CHQ. At the corporate

headquarter (CHQ), a 3-tier Network structure exists on a LAN scale.

Since the corporation is a large one, the network uses a class A IP addressing scheme with about

65300 hosts and 255 sub-net masks.

27
The traffic of the network is such that Routing and Switching of packets runs on a star topology

i.e. no two branches must communicate without passing traffic through the CHQ. The CHQ is the

backbone of the network.

Table 1.81 Star Topology Communication between NNPC CHQ and the Branches

Corporate headquarters Network Topology


The CHQ’s is one that harbors the link (bandwidth) from the Internet Service Provider (ISP). It

goes into the CORE of the network. The CORE is a switch that has both routing and switching

capabilities.

The CORE shares the link with the four DISTRIBUTION switches at the basement of every

block (A, B, C and D). The DISTRIBUTION then shares the link with the last tier of the network,

the ACCESS.

The ACCESS is a switch at the user’s level that provides users with access to the network. Every

port in a user’s office is terminated at the PATCH PANEL which is terminated on the ACCESS

28
switch. The patch panel helps for identification of ports by providing space for its numbering for

easy troubleshooting.

The ACCESS Switch is in different categories which could be


 Ethernet switch (10Mbps E.g. 3-COM 24, 8 ports switch)
 Fast Ethernet (10/100Mbps E.g. Cisco2700 Catalyst, 24 port switch)
 Gigabit Ethernet (10/100/1000 Mbps (1Gbps) E.g. 3750G PoE, 24 port switch)

Power over Ethernet (PoE) is a technology that enables its devices to get powered over the

network. It also applies to devices such as IP phones that get voice (Dial-up) connection over the

network and the wireless Access Points also uses this technology to get power without any physical

connection to power source.

Table 2.83 Access switch (POE)

29
Table 2.831 NNPC chq campus network topology

Figure 2.83 A Distribution and core switch

2.2.2 Troubleshooting a Network


In order to resolve any LAN network issue, various tools are used such as;

1.LINK RUNNER

2.WIRE TRACKER

30
3. CRIMPING TOOL

4. PUNCH DOWN TOOL

5. CABLE STRIPPER

6. MODULAR JACK

LINK RUNNER
The Link Runner is a diagnostic device that can be used for scanning of signal, testing for

continuity with LAN cables, obtaining network properties of a port on the switch, to know the

actual distance between the user port and the access switch etc. It is also one of the fastest way of

solving problems with network connectivity, it identifies the network problems within seconds.

In order to use the Link-Runner the following steps are involved:

 Connect one end of the LAN cable to the port and the other to the Link Runner.

 Allow it to scan (run diagnostics).

 From the result of the scan, you can tell what the problem could be.

Likely problems are:

i. Faulty switch port (new port will be activated on the access switch),

ii. Damaged modular jack (new modular jack will be punched)

iii. Faulty RJ45 connector (new RJ45 Connector is crimped)

iv. Damaged Cable (New Cable is crimped and damaged cable is replaced)

v. Wrong Network Configuration on user’s Computer system

vi. Wrong cable Color Code (Very rarely)

31
Figure 2.84 fluke link runner

WIRE TRACKER
This is a sensory device that is used when it is difficult identifying a particular cable in the switch.

One end of the cable from the user port is connected to wire tracker (tone generator) which then

produces a sound, then the wire tracker (tone generator) is used to trace that particular sound to

the exact port where the cable is connected on the switch.

32
Figure 2.841 Wire tracker

CRIMPING TOOL
This is a tool used for crimping of Ethernet cables. It has provision for blade (for cutting), a 6Pins

RJ11 adapter and an 8pins RJ 45 adapter for crimping of both RJ 11 and 45 cables.

Figure 2.85 crimping tool

PUNCH DOWN TOOL


This is a tool that helps in punching down copper wires of CAT6 and CAT5 cable into a modular
jack. The modular jack is equipment found inside a face plate that is terminated at the access switch
which the user connects from. It is used for inserting wire into insulation-displacement connectors

33
on punch down blocks, patch panels, or modular jacks. To use a punch down tool, you apply
pressure on the tool to trigger the insertion of wire into a slot.

Figure 2.86 punch down tool

CABLE STRIPPER

This is a small tool that helps the stripping and cutting of cables during crimping and other related

activities. It contains very sharp blades at both ends.

Figure 2.87 cable stripper

MODULAR JACK
Modular connectors were originally used with the registered jack system, which precisely
describes how the connectors are wired for telecommunication. A modular jack connects the
switch to a port using a LAN Ethernet cable.

Figure 2.88 modular jack

34
2.2.3 Crimping a Network Cable
This is a process of clamping RJ45 adapter and CAT5E or CAT6 network cable together.

Color Code Standards are used.

Cable Wiring Schematics

When installing network cable (cat5/cat6), wires in the cable are color-coded to ease the

installation process and for assured reliability and maintenance purpose. Color Code Standards are

laid down to be followed by every cable installer when at installation site. Basically, there are two

major standards namely T568A and T568B.

The table below shows the arrangement of wires inside the cable according to their colors for both
standards

WIRE 568A 568B


1 White/ Green stripe(White Green) White/ Orange stripe (White Orange)
2 Green wire Orange wire
3 White/ Orange stripe (White Orange) White/ Green stripe (White Green)
4 Blue wire Blue wire
5 White/ Blue stripe (White Blue) White/ Blue stripe (White Blue)
6 Orange wire Green wire
7 White/Brown stripe (white brown) White/Brown stripe (white brown)
8 Brown wire Brown wire

35
Figure 2.89 cable wiring

Cable Configurations

There are two types configurations for cable crimping, they include:

 Straight through Cable: the straight cable is terminated by using the same color codes at both

ends of the cable. This type of configuration enables dissimilar device connections. E.g.

computer  Switch, IP phone (serves as a MODEM)  Computer connections.

Figure 2.89 Straight Through ethernet cable

36
 Crossover Cable: Crossover cable serves to connect one device directly to another device,

without a switch or hub being present. It is terminated by wiring one end of the cable using

T568A and the other with T568B standard. This type of configuration enables similar device

connections. E.g. Computer  Computer, Switch  Switch

Figure 2.90 crossover ethernet cable

The steps for Crimping Ethernet Network cables

1. Get the required tools: Wire Stripper, Crimping tool, Wire tracker, RJ 45s.

2. Cut your desired length of the cable (CAT5,5E, 6)

3. Strip off small parts of the cable at both ends (about 1 inch)

4. Fold back the braiding over the jacket, (used for grounding the cable- for STP cables)

5. Straighten the copper wires, then arrange the wires according to the required standard.

6. Cut off the extra wire making sure there is about1/4 inch of the left before the insert.

7. Insert the arranged copper wires into the RJ45 adapter maintaining the order.

8. Insert the RJ45 adapter with cable into the Crimper and clip firmly together.

9. Test the crimped cable for continuity using the wire tracker.

37
Figure 2.9 steps in crimping a network cable

2.2.4 Punching RJ45 Modular Jack

1. Get the required tools: Wire Stripper or Crimping tool, Link Runner, Punch down tool

2. Pull the cable (CAT5,5E, 6) from the source redundancy behind the face plate

3. Strip off small parts of the cable (about 1 inch)

4. Straighten the copper wires and arrange according to the standard indicated on the modular

jack.

5. Insert the arranged copper wires into the RJ45 modular jack in accordance with the color code.

38
6. Punch down the wires, and trim off the excess

7. Insert the modular jack from behind the face plate

8. Test the punched cable for signal from the access switch using the Link runner.

2.2.5 Activating Ethernet/Internet Access Port


1) Check the faceplate port number in the office.
2) Identify the port on the patch panel using LAN map or wire tracker.
3) Ensure patch cords for the switch and PC have been tested and certified ok.
4) Connect patch cord from switch to port on the patch panel.

2.3 Work Done: Service support Unit


As a Support provider/system analyst, I analyze and attend to a wide variety of user needs, ranging

from Internet Access (mobile, desktop, laptop and notebook computer system); Desktop, Laptop,

and Notebook Computer Systems (hardware and software); and Printer issues (network, hardware,

driver configurations) making sure their complaints are resolved. I was trained to receive

39
complaints, analyze problems, interpret the problems adequately and proffer lasting solutions with

recommendations in locations offices within and without the NNPC Corporate Headquarters as

each case requires.

2.3.1 Work methodology in the Service Support Unit.


Firstly, there is a laid down system through which users relay their complaints. The Help Desk is

contacted via a help line, the job is logged and then escalated to the corresponding ISD units

(Service Support in this case) via the Service Manager Platform. Other platforms are via Microsoft

Outlook, Lync, Telephone Calls, and the NNPC Workplace.

Support jobs based on blocks (A, B, C, D) are assigned to the corresponding support teams

(comprises of Staff and Student) in the Service Desk. The Team Lead (Student Supervisor) then

assigns the job to the students with full details of the job description, users’ location and contact.

2.3.2 Systems Configuration, Troubleshooting, Maintenance and Repairs


Computer or Electronic Systems in the course of use bring up a wide variety of challenges to the

user, and therefore requires professional troubleshooting, maintenance/servicing and repairs

overtime. The Challenges range from Hardware and Software Failures, Boot Failure, Driver

Failure, Virus and Malware Infection, Hanging and Slow Systems, Printer configuration and

troubleshooting, File Recovery, Password Recovery, Internet Access, Domain Network Access,

User Credential Authentication, Software and Hardware Installation, Mail configuration for

Microsoft exchange server, other Operating System (OS) Challenges etc.

2.3.3 Resolving System Boot Error


Boot error can be caused by either software or hardware complications

What can cause Boot Error: failed hard drive or RAM chip, failed CMOS battery, power surge,

improper shutdown, failed operating system, virus and malware infections, date and time error.

40
Resolving System Boot Failure from hardware causes

a. First step is to unplug and plug back in the power cable. This is known to resolve minor power

surge issues and is the most proffered solution in most cases.

b. Failed/Failing Hard drive is indicated on BIOS screen during system startup; Failed CMOS is

indicated by repetitive time reset prompts upon system startup and can be resolved by pressing

f10 key upon startup and manually correct date and time;

c. While power cable is unplugged take out and clean each RAM and noting the slots so as to

identify a faulty RAM chip or slot. Faulty RAM chip or improper RAM sitting is indicated by

five (5) successive beeps with red indicator lights during system boot.

d. Ensuring the optical disk drive is empty also resolves system boot failure.

e. For ambiguous hardware causes, boot failure can be resolved by performing tests on hardware

components using the BIOS menus during system start up. In Hp desktops and most computer

systems, pressing F9 key accesses the BIOS menus during system startup.

f. Detected failed hardware components are replaced.

g. Failed OS is resolved by repairing the OS using the original OS installation media; and if

this fails, the files are backed up and the OS is reinstalled or the computer system is

reimaged. Norton Ghost 12 is a popular system reimaging software for windows 7 OS.

h. Virus and Malware infection are rectified by performing a boot time scan of the computer

system using antivirus software packages e.g. Kaspersky antivirus, and for severe cases the

hard drive for the system is attached to a healthy computer system, scanned and cleaned for

viruses and malware.

2.3.4 Repairing or Installing Windows OS


a. Back up important data to an external storage device and get installation media.

41
b. For Hp Desktop (e.g. Hp Compaq dc7700 Small form factor) or Laptop Computer System,

Startup the computer System and insert the OS installation media (Optical Disk or Bootable

USB Flash Drive) into the appropriate slot. Flash drive is made bootable using special software

e.g. Rufus 2.12 together with the Operating System ISO image file.

c. Restart the computer and repeatedly tap the F9 key to get to the boot order, then set the boot

order to the corresponding OS installation media location (Disk Drive or USB).

d. The system then attempts boot from the installation media (Hp desktop gives a prompt to press

any key).

e. The system boots and a window display with various options: “Install Windows”, “Reinstall

Windows” (for OS already installed), “Repair Windows” etc. The option selected is dependent

on the goal to be achieved and produces the corresponding result.

f. Follow the ensuing instructions and indicate preferences.

2.3.5 Rectifying Hanging and Slow System


With time Computers tend to become slow or hang during use, and this is attributable to multiple

causes e.g. accumulation of junk files, viruses or malware, OS errors, failing hardware, insufficient

memory, insufficient storage etc.

Resolving Hanging and Slow Systems

Hanging and Slow system may be resolved by employing any of the under listed methods in

windows OS:

a. Perform Windows “Disk Clean-up”

Press the windows key; type “Disk Clean-up” in the search field; press enter and wait for the

windows to load. Check the accumulated junk files, then click “OK” followed by “Delete

Files”, then wait for the deletion to complete.

42
b. Check the system RAM and upgrade it (if below the required capacity). Press the windows

key, select “control panel”, then select “System” to view RAM information.

c. Perform “System Restore” (especially if it was since a last application installation). Press the

windows key, search for “Recovery”, then select “Open System Restore”. Finally, choose a

restore point, click next and follow the ensuing instructions.

d. Scan the computer system with an up to date antivirus e.g. Kaspersky Antivirus. Boot time

scan is preferable for severe virus infections.

e. Delete unimportant files, user accounts; uninstall unused application programs (for storage

approaching full capacity).

f. Repair the OS using the installation media or Reimage the entire computer system for severe

cases.

g. Perform hardware test from system BIOS boot menu and replace failed hardware (failing

hardware cases).

Figure 2.92 Disk Cleanup

43
2.3.6 Internet Access Configuration
Proxy Server Configuration

The proxy server is a computer system that gives users more rapid access to popular websites by

storing frequently requested and recently used items (Microsoft Encarta, 2009). It serves as the

gateway to the internet in any network.

To configure the proxy server in windows 7,8 or 10 OS, right click on the connection Bar and

select Open Network and Sharing center, click on “Internet Options” next click on “Connection”

then Click on “LAN settings” “Connection”, check “Automatically detect settings”, check “Use a

proxy server for your LAN…”, set the proxy “Address:” and “Port”, check “Bypass proxy server

for local addresses”; then finally select “OK”.

Figure 2.93 Proxy Configuration

Static LAN Configuration

Static IP Address configuration is done when a computer system is unable to connect to the internet

automatically via the DHCP server.

44
First, plug in a LAN cable. On the Windows 7,8 or 10 OS task bar, right click on the network icon

and select “Open Network and Sharing Center”, then double click Ethernet. In the ensuing

window, scroll and double click “Internet Protocol Version 4 (TCP/IPv4)”, and then select the

radio button with “Use the following IP address”.

Enter the values for the “IP address”, “Subnet mask”, and “Default gateway”; then select the radio

button with “Use the following DNS server addresses”. Supply the “Preferred DNS server” and

“Alternate DNS server”, then check “Validate settings upon exit” and finally, click “OK”.

Figure 2.93 Static IP Configuration

Wireless Internet Access Configuration

Upon configuration of the proxy server, wireless internet can then be configured for the user

provided the computer system (desktop or laptop) has functioning wireless card, wireless drivers,

and wireless capability turned on.

How to Configure a Wireless Network

1. First, turn on the computer system Wireless Assess

45
2. Right click on the network icon on the task bar

3. Click on “Open network and Sharing Center”

4. Click on “Setup a new connection or network”

5. Double Click on “Manually connect to a wireless network”

6. Enter the “Network name:” to be added

7. Chose a security type (WPA2-Enterprice), Click “Next”

8. Click on “Change connection settings” and then click on “Security” tab

46
9. Click on “Settings” and then uncheck the

icon “Verify the servers identity by

validating the certificate” an then click on “OK”

10. Click on “Advanced settings”, and then check “Specify authentication mode:” Click on

“Users or computer authentication”, then choose “User authentication” as applies. These

then prompts for user’s (credentials) name and password which allows the computer to access

the network when the user is logged on.

47
2.3.7 System Domain Troubleshooting and configuration
The Domain Network is the internal network (intranet) used by the organization. It hosts staff

account on local systems giving access to intranet services e.g. the NNPC Workplace; Microsoft

Outlook mail, Microsoft Lync; provides resource access e.g. network printers, and software

applications (installed and updated via the domain network), system security (computer systems

are monitored) etc.

Adding System to Domain

To add a user’s computer system to domain, first confirm internet connectivity (wireless or wired);
otherwise, configure internet access.
For Windows 7,8 or 10 OS, press the Windows key and then navigate through the following steps:
Windows key Control Panel System Advanced System settings Change
In the ensuing window, name the computer system, select the “Domain” radio button and enter the
network domain address. Click “OK”, enter the user’s account credentials and wait for the restart
prompt.
Upon successfully adding the system to domain and restarting, the user logs in and is granted
access to internet and intranet services like “NNPC Workplace”, “Microsoft Outlook”, “Microsoft
Lync” and other software resources.

48
Figure 2.94 System Domain Configuration

Resolving User Credential Authentication Failure on the Domain Network

User credential authentication failure/denial may be due to changed passwords not successfully
synchronized over the domain network, long periods (months or weeks) since last login and logout,
or absent internet access in the user computer system.

To resolve user credential authentication failure over the domain network, the system administrator
logs in with the local administrator account, ensures internet connectivity, removes the system
from the domain, and then adds it back to the domain network thereby synchronizing the user
credential over the domain network.
2.3.8 Connecting System to Printer

To connect system to a multi-functional printer:


First get the IP address of the network printer by clicking on the network icon the display. Confirm
internet connectivity on the user’s system. Press the windows key, search for devices and printers;
in the ensuing window click add a printer, then click “The printer that I want isn’t listed”, select
the “Add printer using TCP/IP address or host name”, click “Next” and supply the printer IP
address. Click next, follow any given instructions and wait for the process completion.

49
Figure 2.95 Connecting system to a printer

2.3.9 Sharing Printer among two or more Systems


In sharing a printer first, you would have to right click on the printer you want to share, then go,
select print properties, under its task bar, you would see an icon suggestion sharing

50
After activating the share option, copy the present system’s IP Address then paste it at the new
system’s start menu (remember that the IP Address should start with a double backward slash
e.g. [\\10.2.1.190]

2.3.10 System Reimaging

Reimaging is a computer system restore process which involves erasing all the current data on the

hard disk and restoring the entire disk from an existing disk image file. It is typically used as a last

resort system recovery option. Reimaging is used usually when the operating system (OS) get

damaged or corrupted, OS is unable to load, or when the OS is not running well as it should be.

A disk image which is a backup copy of a computer system that saves the OS, user accounts, files,

settings and installed applications coupled with a reimaging software application is used for system

reimaging. Reimaging with a standard disk image ensures all computers within a department have

the same data.

Popular system imaging and reimaging software is Norton Ghost 12, AOMEI Backupper.

Steps in reimaging a computer system

a. Back up all important data and files on an external storage device before reimaging.
b. Get the backup system image installation media (optical disk or bootable USB flash), connect
it to the computer and restart. See page 72, Fig. 2.31 Bootable USB flash Drive.
c. Repeatedly tap the F9 key to get to the boot order, then set the boot order to the corresponding
image installation media location (Disk Drive or USB).
d. Once Windows Setup loads, press the 'F8' key to accept Windows license agreement.
e. At the “Where do you want to install Windows” screen, click the hard drive partition to be
reimaged and then click the delete button.
f. The hard drive will be shown as unallocated, and then click “Next” to start reinstall
Windows.

51
Usually, it will take about half an hour to reimage a computer. After that, other required software

applications absent in the image would have to be reinstalled and backed up files restored back to

the computer hard disk.

2.3.10.1 Hardware Devices


Desktop Computer Systems, Laptops, Notebook PC, Mobile Phones, Wireless PCI adapter, RAM

chips, Hard drive; Multifunction printers of varying types and printer accessories (toners, transfer

kit, fuser kit, and drum), Intercom, Paper Shredders etc. are among the devices worked on in the

ITD Service Support unit.

52
RAM Wireless Adapter Card

Multifunctional printer

Figure 2.96 Desktop Computer system and components

53
CHAPTER 3

CHALLENGES ENCOUNTERED

3 Challenges encountered and how it was solved


SIWES provides a great opportunity for students to gain industrial exposure in their fields of study

various challenges still arise, the challenges faced to a large extent affects the aims and objectives

of the program.

 Lots of staff tend to be rude to IT students when attending to them and I had to ignore all

that and attend to jobs, assignments, and errands in the best possible way as at when due.

 Numerous jobs per day averaging to about one hundred and eighty jobs in the first three

months of SIWES which required walking about the office complex (four blocks each

consisting of 11 floors and 3 basements) for over eight hours posed a major health

challenge. Jobs seemed to be unending.

 Leaving as early as 6:45AM daily and returning late from my place of SIWES attachment

also posed a health challenge.

I made a lot of sacrifices in other to cope.

3.1 Contribution to the Company


I did my best, pushing myself to the limit so as to be punctual, attentive, to be able to attend to
given tasks as at when due, came up with an Idea to use rechargeable batteries for the link
runner, tackling the problem of always buying new batteries. I used both my knowledge and
skills learnt from school and lots of research done in order to perform given tasks (jobs) obedient
to the laid down rules and regulations, all in line with organizations goals, and code of ethics.

54
3.2 Relation with physics
I worked with landlines which when spoken into the mouth piece, it sends the sound waves to a
metal disk called a diaphragm which converts the sound waves into electrical signals(waves) and
transfers it through electrical lines (transmission lines) to the receiver, where it is then converted
back to sound waves, giving me the practical representation of what I learned from my
phy223(waves) and my PHY313(electromagnetism) also the fiber optic cables which carry
digital signal in form of modulated pulses of light(photons), applying what I learnt in
PHY314(quantum physics) .

CHAPTER 4

4 EXPERIENCE GAINED
Within the period of six months (January-June) spent at NNPC, I have been empowered with

professional skills in networking, computer systems troubleshooting and maintenance, and even

social skills. I was able to acquire practical experiences to support the theoretical aspects being

taught in school. I was exposed to experienced industry professionals, working methods and

techniques in handling equipment and machinery not available in the academic institutions.

To highlight a few experiences based on the sections under which I worked:

a. I gained professional knowledge in computer networking; computer systems installation,


troubleshooting, maintenance and repairs; and web applications development.

b. Network operating systems, network servers, their type’s functions, uses etc.

c. Analyzing and interpreting network, computer systems, internet and other related problems
in the course of use, proffering timely and lasting solutions.

55
I gained more experiences in leadership, project writing, safety and public speaking. I was a

MEMBER of SWEP/SIWES/IT group called Okikiolu Kayode Visionary Class (OKVC). This

platform taught me various leadership qualities and inspired me towards a better future. Classes

are held every day(8am-9am) empowering us for the day, it has also given me a real confidence

boost. OKVC helped me conquer my stage fright in presentation and I also had the opportunity to

meet and learn from different people from various schools.

In the units I served (Networks\telecoms, Service Support), I was asked severally to teach the new

set of IT students and I helped them in areas where they lacked and was responsible for the office

as well as circulating information.

56
CHAPTER 5

CONCLUSION AND RECOMMENDATIONS

5 CONCLUSION
SIWES gives students the kind of exposure and experience they need to function in and out of
school, to make decisions, to economize and cut down spending. The industrial training has
broadened my knowledge of the information and communications technology (ICT) aspect of my
course and has given me the opportunity to experience “First-Hand” all the things being taught
theoretically in school and has also given me an opportunity to work with other -people in an
office environment and has improved my team work, and People Skills.

The importance of Information Technology/Networking in particular to an organization either

growing or grown cannot be over emphasized rather it is a breakthrough that every organization

should embrace in order to maximize its growth potentials and eventually grow.

IT is the backbone of every organization as information empowers on every facet of life. It plays

vital roles in the success of an organization which is why NNPC has invested so much on in

Information Technology.

Effective information helps organizations in the following ways

 Increase work efficiency

57
 Maintain good customer service

 Ease work flow

 Increase time management

For information sharing to be perfect, it has to be

 Available

 Confidential

 Accessible

This is the sole of the 21st century businesses.

5.1 Recommendations
I will like to recommend that SWEP/SIWES/IT should compulsorily carry credit units in every

Nigerian tertiary institution because a lot of students are not taking it seriously because it adds

little or no credit unit to their grades and so it is not worth the stress.

Also, schools or the ITF should have incentives for best performance in internship so it will

challenge forth coming students to put in their best.

Most organizations don’t pay students on internship and it discourages them.

Industrial Training Fund ITF should review the payment policy by increasing the training

allowance and making it timelier. This will salvage the situation.

An alternative to submitting all documents by hand to the ITF office should be provided.

REFERENCES

 The History of NNPC, 2016 revised edition. www.wikipedia.com

 CCNA™ Cisco® Certified Network Associate Study Guide Second Edition

 Computer Networking: Principles, Protocols and Practice Release 0.25 Olivier Bonaventure

58
 Microsoft ® Encarta ® 2009. © 1993-2008 Microsoft Corporation

 Internetworking Concepts, CCNA sixth edition

 IP Network Design Guide for IBM by Martin W. Murhammer, Kok-Keong Lee, Payam

Motallebi, Paolo Borghi, Karl Wozabal.

 Cabling: The Complete Guide to Network Wiring, Third Edition by David Barnett, David

Groth and Jim McBee

59

You might also like