You are on page 1of 43

UNIVERSITY OF PORTHARCOURT

EAST-WEST ROAD, CHOBA, PORTHARCOURT,


RIVERS STATE P.M.B 5323

DEPARTMENT OF COMPUTER SCIENCE

SIX MONTHS REPORT ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)

AT
DEPARTMENT OF PETROLEUM RESOURCES
4-9 MOSCOW ROAD, PORT HARCOURT.

BY

IWUEKE OBINNA PRINCEWILL


U2016/5570069

SIWES SUPERVISOR
DR. P.C JACKREECE

JANUARY,2020
ABSTRACT
This is a report on my Student’s industrial Work Experience scheme (SIWES)
carried out in the Data Management/ Information Technology under the Engineering
& Standard Division (E&S) of the Department Of Petroleum Resources (D.P.R)
Rivers. SIWES is a scheme that provides students the adequate opportunity and
room for industrial skill acquisition in respect to their various discipline. It exposes
students to the approaches and techniques in the use of tools, and prepares them for
the work situation ahead of time. This report is aimed at discussing the structure of
the Department Of Petroleum Resources (D.P.R), It’s mode of operation and the
specifics of my internship, my area of specifications both Networking and Service
Support, giving detailed explanation about System Maintenance.
ACKNOWLEDGEMENT

Wish to express my sincere gratitude to whom in one way or the other contributed
to the success of my industrial training.
I am very grateful to God Almighty whose sufficient grace it is that I am alive and
well able to start and finish my industrial training. I would like to show my gratitude
to my parents Mr. and Mrs. PATRICK IKEJIAKU, The ZONAL CONTROLLER
D.P.R Mr NKANGA BASSEY also to the CO-OPERATIVE SERVICES for
posting me to the ENGINEERIG AND STANDARD DIVISION, as many things
relevant to my discipline, Also to my numerous Industry supervisors in persons of
Mr. DAN ONYEGBU (HEAD E&S) also Mr CKIKE & Mr ADUKU
JOHN(Supervisors, D.P.R SIWES Coordinators), my school supervisor, Dr. P.C
JACKREECE. I Thank all of Them for showering me with unquantifiable love, care
and support both morally and financial to carry me through.
To my H.O.D Dr. Oghenevo and the SIWES coordinator and all prestigious lecturers
in the department of Computer Science.
My gratitude also goes to my entire SIWES colleagues at work and in school for
their support, understanding and sharing of knowledge during my SIWES period and
making it a success.
TABLE OF CONTENTS

Title Page i\
Abstract ii
Dedication iii
Acknowledgment iv

CHAPTER ONE
1.0 Establishment of SIWES
1.1 Objective of SIWES
1.2 History of Department of Petroleum Resources
1.3 The Engineering & Standards and their various units
1.4 Organogram for the Department of Petroleum Resources

CHAPTER TWO
2.0 Activities covered during the SIWES period with Department of
Petroleum Resources
CHAPTER THREE
3.1 New Skills Acquired
3.2 Problems Encountered
CHAPTER FOUR
4.1 Conclusion
CHAPTER 1

INTRODUCTION

1.0 ESTABLISHMENT OF SIWES

The SIWES was initiated in 1973 by the ITF. This was to update practical knowledge

of students in the Universities, Polytechnics and Colleges of Technology. It was

aimed at bridging the gap between the theoretical knowledge acquired in classes and

technical knowledge in the industry by providing students with the opportunities to

apply their educational knowledge in real work situations. Over the years, SIWES

has contributed immensely to building the common pool of technical and allied skills

available in the Nigeria economy which are needed for the nation’s industrial

development.

Furthermore, the place and relevance of SIWES is underscored by the fact that the

scheme contributes to improving the quality of technical skills generally available

in the pool from which employers’ sources technical manpower.

Its gives students the opportunity to blend the theoretical knowledge acquired in the

classroom and with practical hands on application of knowledge required to perform

work in the industry. Also, it prepares students for employment and makes the

transition from school to the World of work easier after graduation.


1.1 OBJECTIVES OF SIWES

 The program teaches the students on how to interact effectively with other

workers in the organization

 It exposes students to work methods and techniques in handling equipment

and machine that may not be available in education institution

 It will help students to gain increased maturity and understanding of the work

place or environment

 It help the students to evaluate companies for which they might wish to work

 The program helps the students to tolerate with others and work as a team to

achieve greater task.

1.2 HISTORY OF DEPARTMENT OF PETROLEUM RESOURCES

The DPR is a department in the Federal Ministry of Petroleum Resources. Prior to

this time, petroleum matters were handled by the Hydrocarbon Section of the

Ministry of Lagos Affairs, which reported directly to the Governor-General.

The Unit keeps records on matters relating to exploration and importation of

petroleum products. It also enforced safety and other regulations on matters which

were then mostly products importation and distribution. As the activities of the
petroleum industry expanded, the Unit was upgraded to a Petroleum Division within

the Ministry of Mines and Power.

In 1971, a new body known as Nigerian National Oil Corporation (NNOC) was

created to handle and direct commercial operational activities in the oil industry on

behalf of the Federal Government, while the Department of Petroleum Resources in

the Federal Ministry of Mines and Power continued to exercise statutory supervision

and control of the industry.

In 1975, the department was upgraded to a ministry and named the Ministry of

Petroleum and Energy, which was later renamed to the Ministry of Petroleum

Resources.

Later Decree 33 of 1977, merged the Ministry of Petroleum Resources and the

Nigeria National Petroleum Corporation to form the Nigerian National Petroleum

Corporation, in order to conserve the then scarce manpower in the oil industry. This

decree also created the Petroleum Inspectorate as an integral part of the NNPC, and

it entrusted it with the regulation of the petroleum industry.

In 1985, the Ministry of Petroleum Resources was re-established, but the Petroleum

Inspectorate remained within the NNPC until March, 1988 when it was re-organized.
By the re-organization, the Petroleum Inspectorate was excised from the NNPC and

transferred to the Ministry of Petroleum Resources as the Technical arm and

renamed the DPR.

DPR has the statutory responsibility of ensuring compliance to petroleum laws,

regulations and guidelines in the oil and gas industry. The discharge of these

responsibilities involves monitoring of operations at drilling sites, producing wells,

production platforms and flow stations, crude oil export terminals, refineries, storage

depots, pump stations, retail outlets, any other locations where petroleum is either

stored or sold, and all pipelines carrying crude oil, natural gas and petroleum

products.

FUNCTIONS OF THE DPR:

 Supervising all petroleum industry operations being carried out under licenses

and leases in the country

 Monitoring the Petroleum Industry operations to ensure that are in line with

national goals and aspirations including those relating to flare down and

Domestic Gas Supply Obligations.

 Ensuring that HSE regulations conform to national and international best oil

field practice
 Maintaining records on Petroleum Industry operations, particularly on matters

relating to petroleum reserves, production / exports, licenses and leases.

 Advising government and relevant government agencies on technical matters

and public policies that may have impact on the administration and petroleum

activities.

 Processing industry applications for leases, licenses and permits.

 Ensure timely and accurate payments of rents, royalties and other revenues due

to the government

 Maintain and administer the National Data Repository (NDR)


CHAPTER 2

2.0 ACTIVITIES COVERED DURING THE SIWES PERIOD WITH THE

DEPARTMENT OF PETROLEUM RESOURCES

During the SIWES with the DPR, I was deployed to the Engineering & Standards

and served under the Data Management/ Information Tech Unit. And I was

exposed to the following activities where I acquired my experience and technical

know-how in writing the report, such as Networking; Data transmission, types of

networks, Interconnection, Protocols, Protocol layers. Service Support Unit;

Work methodology in service support unit, Service support configuration,

troubleshooting, maintenance and repairs, Hardware devices.

1. Introduction to Basic Networking

-A network can be defined as a group of computers and other devices connected in


some ways so as to be able to exchange data.
-Each of the devices on the network can be thought of as a node; each node has a
unique address.
-Addresses are numeric quantities that are easy for computers to work with, but not
for humans to remember.
Example: 204.160.241.98

-Some networks also provide names that humans can more easily remember than
numbers.
Example: www.javasoft.com, corresponding to the above numeric
address.

NI add1 NI add2 NI addN


C C C

Addressing
Internet address
Consists of 4 bytes separated by periods
Example: 136.102.233.49

-The R first bytes (R= 1,2,3) correspond to the network address;


-The remaining H bytes (H = 3,2,1) are used for the host machine.
-InterNIC Register: organization in charge of the allocation of the address ranges
corresponding to networks.
-Criteria considered:
 Geographical area (country)
 Organization, enterprise
 Department
 Host
Domain Name System (DNS)
-Mnemonic textual addresses are provided to facilitate themanipulation of internet
addresses.
-DNS servers are responsible for translating mnemonic textual Internet addresses
into hard numeric Internet addresses.

Ports
-An IP address identifies a host machine on the Internet.
-An IP port will identify a specific application running on an Internethost
machine.
-A port is identified by a number, the port number.

-The number of ports is not functionally limited, in contrast to serial


communications where only 4 ports are allowed.
-There are some port numbers which are dedicated for specific
applications.

Applications Port numbers

HTTP 80
FTP 20 and 21
Gopher 70
SMTP (e-mail) 25
POP3 (e-mail) 110
Telnet 23
Finger 79
Data Transmission

-In modern networks, data are transferred using packet switching. -Messages
are broken into units called packets, and sent from one computer to the other.

-At the destination, data are extracted from one or more packets and used to
reconstruct the original message.

-Each packet has a maximum size, and consists of a header and a data area.

-The header contains the addresses of the source and destination computers
and sequencing information necessary to reassemble the message at the
destination.

packet

header data

1001….101 00010000111…000000110001100

Types of Networks
There are two principle kinds of networks: Wide Area Networks
(WANs) and Local Area Networks (LANs).
WANs
-Cover cities, countries, and continents.
-Based on packet switching technology
-Examples of WAN technology: Asynchronous Transfer Mode (ATM), Integrated
Services Digital Network (ISDN)
LANs
-Cover buildings or a set of closely related buildings.
-Examples of LAN technology: Ethernet, Token Ring, and Fibber
Distributed Data Interconnect (FDDI).
Ethernet LANs: based on a bus topology and broadcast communication
Token ring LANs: based on ring topology
FDDI LANs: use optical fibbers and an improved token ring mechanism based on
two rings flowing in opposite directions

Shared
bus
(a) Ethernet

Ring Dual Ring

(b) TOKEN RING LAN (c) FDDI LAN


Network connectivity type Speed Transmission
time for 10
Mbytes
(Telephone) dial-up modem 14.4 Kbps 90 min
ISDN modem 56/128 Kbps 45/12min
T1 connection 1.54 Mbps 50s
Ethernet 10 Mbps 9s
Token ring 4/16 Mbps

Fast Ethernet 100 Mbps

FDDI 100 Mbps

Gigabit Ethernet 1 Gbps

ATM 25Mbps/2.4Gbs

Interconnection
-Networks of low capacity may be connected together via a backbone network
which is a network of high capacity such as a FDDI network, a WAN network
etc.

-LANs and WANs can be interconnected via T1 or T3 digital leased lines

-According to the protocols involved, networks interconnection is


achieved using one or several of the following devices:

→ Bridge: a computer or device that links two similar LANs based on the
same protocol.
→ Router: a communication computer that connects different types of
networks using different protocols.
→ B-router or Bridge/Router: a single device that combines both the
functions of bridge and router.
Gateway: a network device that connects two different systems, using direct
and systematic translation between

Toronto branch Vancouverbranch

Frame Gateway
EthernetLAN Router Relay Token Ring LAN
ATM

T1 line
NY Headquaters
Bridge

Bridge Bridge/Router Router

Ethernet

Token Ring LAN


Network Topology Diagram

The specification of the network topology diagram requires the definition of the
characteristics and entities underlying the network: -Geographical locations of the
different components or subnets involved in the network.

-Description of the LAN


topology -Description of
the WAN topology

-Description of the network connectors such as routers, bridges, repeaters,


and gateways.

2. Protocols

-Define the rules that govern the communications between two


computers connected to the network.
-Roles: addressing and routing of messages, error detection and
recovery, sequence and flow controls etc.
-A protocol specification consists of the syntax, which defines the kinds and
formats of the messages exchanged, and the semantic, which specifies the action
taken by each entity when specific events occur.

Example: HTTP protocol for communication between web browsers and


servers.
Request For Comments (RFC): specifications of the protocols involved in Internet
Communications.

-Example: sample of RFC 821 describing communications between SMTP


server and client.
S: MAIL. FROM: Paul @ ALPHA .ARPA

R: 250 OK

S: RCPT TO : JACK@BETA . ARPA

R: 250 OK

S: DATA

R: 354 Beginning of mail: ending by <CRLF>. <CRLE>

S: Blah blah blah

S: ….. etc.

S: <CRLE>, <CRLF>

R: 250 OK

-Protocols are designed based on a layered architecture such as the OSI reference
model.

-Each entity at a layer n communicates only with entities at layer n-1. -The data
exchanged, known as Protocol Data Unit (PDU), goes back and forth through the
layers, each layer adds or removes its own header and vice-versa. Therefore a layer
n PDU may become a layer n-1 data.

nth layer nth layer

(n-1)th layer (n-1)th layer

… …

NETWORK
3. Protocol Layers
The OSI (Open Systems Interconnection) Data Model
-ISO standard for computer networks design and functioning.
-Involves at least 7 layers, each playing a specific role when applications are
communicating over the net.
-During the sending process, each layer (from top to down) will add a specific
header to the raw data.
-At the reception, headers are eliminated conversely until the data arrived to the
receiving application.
OSI Layers

Application layer
(applications connected to the network)
Presentation layer

(provides standard data representations for applications)

Session layer
(manages sessions among applications)
Transport layer

(provides end-to-end errors detection and correction)

Network layer

(handles connection to the network by the higher layers)

Data-link layer
(provides safe communication of data over the physical network)
Physical layer
(defines the physical characteristics of the network)
Physical layer: ensures a safe and efficient travel of data; consists of electronic
circuits for data transmission etc.
Data link layer: in charge of data encapsulation under the form of packets
and their interpretation at the physical layer.
Network layer: in charge of packets transmission from a source A to a destination
B.
Transport layer: in charge of the delivery of packets from a source A to a
destination B
Session layer: in charge of the management of network access.
Presentation layer: determines the format of the data transmitted to
applications, data compressing/decompressing, encrypting etc.\
Application layer: contains the applications which are used by the
end-user, such as Java, Word etc.

The TCP/IP Model


-Consists of only 4 layers: application, transport, internet and network.

Application layer
(applications and processes running on the network)
Transport layer

(provides end-to-end data delivery services)


Internet layer
(makes datagrams and handles data routing)
Network layer
(provides routines allowing access to the physical
network)
Network layer
-Provides the same functionality as the physical, the data linkand network layers in
the OSI model.
-Mapping between IP addresses and network physical addresses.
-Encapsulation of IP datagrams, e.g packets, in format understandable by the
network.
Internet layer
-Lies at the heart of TCP/IP.
-Based on the Internet Protocol (IP), which provides the frame for transmitting data
from
FTPplace A to place B. Telnet SMTP SNMP
Transport layer
-Based on two main protocols: TCPTCP/UDP
(Transmission Control Protocol) and UDP
(User Datagram protocol)
Application layer
IP presentation, and session layers.
-Combines the functions of the OSI application,
-Protocols involved in this layer: HTTP, FTP, SMTP etc.

4. Networks Interconnection/Internet
Arpanet Token ring
Concept of Network Interconnection

-First implemented in the Defense Advanced Research Project Agency Network


(Arpanet), in 1966 in USA.

-Consists of connecting several computer networks based on different


protocols

-Requires the definition of a common interconnection protocol on top the local


protocols.

-The Internet Protocol (IP) plays this role, by defining unique addresses for a
network and a host machine.
FTP TELNET SMTP SNMP

TCP/UDP

IP

ETHERNET ARPANET TOKEN RING

P1
P2

IP

P4
P3
Internet Protocol (IP)
Overview

-The IP protocol provides two main functionalities:


→ Decomposition of the initial information flow into packets of standardized size,
and reassembling at the destination.
→ Routing of a packet through successive networks, from the source machine to the
destination identified by its IP address.
-Transmitted packets are not guaranteed to be delivered (datagram protocol).

-The IP protocol does not request for connection (connectionless)

before sending data and does not make any error detection.
Functions

-Decompose the initial data (to be sent) into datagrams.


-Each datagram will have a header including, the IP address and the port
number of the destination.
-Datagrams are then sent to selected gateways, e.g IP routers, connected at the same
time to the local network and to an IP service provider network.
-Datagrams are transferred from gateways to gateways until they arrived at their
final destination.
packet1

Sender

packet 2 Receivers

Routers

Structure of an IP packet

-The fields at the beginning of the packet, called the frame header,
define the IP protocol’s functionality and limitations.

-32 bits are allocated for encoding source and destination addresses (32 bits for
each of these address fields).

-The remainder of the header (16 bits) encodes various information such as the
total packet length in bytes.

-Hence an IP packet can be a maximum of 64Kb long.


0 10 12 16 20 24

Header
Checksum
Source address
Destination address
Options 24 Data
Transmission Control Protocol (TCP)

Overview
-TCP provides by using IP packets a basic service that does guarantee safe delivery:
→ error detection
→ safe data transmission
→ assurance that data are received in the correct order
-Before sending data, TCP requires that the computers communicating establish a
connection (connection-oriented protocol).

CLIENT TCP Server

SYN
SYN_ ACK
ACK

DATA
DATA

FIN

ACK
DATA

FIN

ACK

-TCP provides support for sending and receiving arbitrary amounts of data as
one big stream of byte data (IP is limited to 64Kb).

-TCP does so by breaking up the data stream into separate IP packets. -Packets are
numbered, and reassembled on arrival, using sequence and sequence acknowledge
numbers.
-TCP also improves the capability of IP by specifying port numbers.

→ There are 65,536 different TCP ports (sockets) through which every TCP/IP
machine can talk.
Structure of a TCP packet

0 2 4 8 12 20

Source port
Destnaton port
Sequence No.
Sequence Ack No.
Misc. header
Data

User Datagram Protocol (UDP)

Overview

-Datagram protocol also built on top of IP.

-Has the same packet-size limit (64Kb) as IP, but allows for port
number specification.

-Provides also 65,536 different ports.

-Hence, every machine has two sets of 65,536 ports: one for TCP and the other for
UDP.

-Connectionless protocol, without any error detection facility.


-Provides only support for data transmission from one end to the other, without
any further verification.

-The main interest of UDP is that since it does not make further
verification, it is very fast.

-Useful for sending small size data in a repetitive way such as time
information.

4.5 Internet Application Protocols

On top of TCP/IP, several services have been developed in order to


homogenize applications of same nature:

-FTP (File Transfer Protocol) allows the transfer of collection of files between
two machines connected to the Internet.

-Telnet (Terminal Protocol) allows a user to connect to a remote host in terminal


mode.

-NNTP (Network News Transfer Protocol) allows the constitution of


communication groups (newsgroups) organized around specific topics. -SMTP
(Simple Mail Transfer Protocol) defines a basic service for electronic mails.

-SNMP (Simple Network Management Protocol) allows the


management of the network.
FTP TELNET SMTP SNMP

TCP/UDP

IP

ETHERNET ARPANET TOKEN RING


2.0 Work Done: Service support Unit
As a Support provider/system analyst, I analyze and attend to a wide variety of user
needs, ranging fro7m Internet Access (mobile, desktop, laptop and notebook
computer system); Desktop, Laptop, and Notebook Computer Systems (hardware
and software); and Printer issues (network, hardware, driver configurations) making
sure their complaints are resolved. I was trained to receive complaints, analyze
problems, interpret the problems adequately and proffer lasting solutions with
recommendations in locations offices within and without the NNPC Corporate
Headquarters as each case requires.

Work methodology in the Service Support Unit.


Firstly, there is a laid down system through which users relay their complaints. The
Help Desk is contacted via a help line, the job is logged and then escalated to the
corresponding ISD units (Service Support in this case) via the Service Manager
Platform. Other platforms are via Microsoft Outlook, Lync, Telephone Calls, and
the NNPC Workplace.

Support jobs based on blocks (A, B, C, D) are assigned to the corresponding support
teams (comprises of Staff and Student) in the Service Desk. The Team Lead (Student
Supervisor) then assigns the job to the students with full details of the job
description, users’ location and contact.

Systems Configuration, Troubleshooting, Maintenance and Repairs


Computer or Electronic Systems in the course of use bring up a wide variety of
challenges to the user, and therefore requires professional troubleshooting,
maintenance/servicing and repairs overtime. The Challenges range from Hardware
and Software Failures, Boot Failure, Driver Failure, Virus and Malware Infection,
Hanging and Slow Systems, Printer configuration and troubleshooting, File
Recovery, Password Recovery, Internet Access, Domain Network Access, User
Credential Authentication, Software and Hardware Installation, Mail configuration
for Microsoft exchange server, other Operating System (OS) Challenges etc.

Repairing or Installing Windows OS


a. Back up important data to an external storage device and get installation media.
b. For Hp Desktop (e.g. Hp Compaq dc7700 Small form factor) or Laptop Computer
System, Startup the computer System and insert the OS installation media
(Optical Disk or Bootable USB Flash Drive) into the appropriate slot. Flash drive
is made bootable using special software e.g. Rufus 2.12 together with the
Operating System ISO image file.
c. Restart the computer and repeatedly tap the F9 key to get to the boot order, then
set the boot order to the corresponding OS installation media location (Disk Drive
or USB).
d. The system then attempts boot from the installation media (Hp desktop gives a
prompt to press any key).
e. The system boots and a window display with various options: “Install Windows”,
“Reinstall Windows” (for OS already installed), “Repair Windows” etc. The
option selected is dependent on the goal to be achieved and produces the
corresponding result.
f. Follow the ensuing instructions and indicate preferences.

Rectifying Hanging and Slow System


With time Computers tend to become slow or hang during use, and this is attributable
to multiple causes e.g. accumulation of junk files, viruses or malware, OS errors,
failing hardware, insufficient memory, insufficient storage etc.
Resolving Hanging and Slow Systems
Hanging and Slow system may be resolved by employing any of the under listed
methods in windows OS:
a. Perform Windows “Disk Clean-up”
Press the windows key; type “Disk Clean-up” in the search field; press enter and
wait for the windows to load. Check the accumulated junk files, then click “OK”
followed by “Delete Files”, then wait for the deletion to complete.
b. Check the system RAM and upgrade it (if below the required capacity). Press the
windows key, select “control panel”, then select “System” to view RAM
information.
c. Perform “System Restore” (especially if it was since a last application
installation). Press the windows key, search for “Recovery”, then select “Open
System Restore”. Finally, choose a restore point, click next and follow the
ensuing instructions.
d. Scan the computer system with an up to date antivirus e.g. Kaspersky Antivirus.
Boot time scan is preferable for severe virus infections.
e. Delete unimportant files, user accounts; uninstall unused application programs
(for storage approaching full capacity)
f. Perform hardware test from system BIOS boot menu and replace failed hardware
(failing hardware cases).
Figure 2.92 Disk Cleanup

Internet Access Configuration


Proxy Server Configuration
The proxy server is a computer system that gives users more rapid access to popular
websites by storing frequently requested and recently used items (Microsoft Encarta,
2009). It serves as the gateway to the internet in any network.
To configure the proxy server in windows 7,8 or 10 OS, right click on the connection
Bar and select Open Network and Sharing center, click on “Internet Options” next
click on “Connection” then Click on “LAN settings” “Connection”, check
“Automatically detect settings”, check “Use a proxy server for your LAN…”, set the
proxy “Address:” and “Port”, check “Bypass proxy server for local addresses”; then
finally select “OK”.
Figure 2.93 Proxy Configuration

Wireless Internet Access Configuration

Upon configuration of the proxy server, wireless internet can then be configured for
the user provided the computer system (desktop or laptop) has functioning wireless
card, wireless drivers, and wireless capability turned on.
How to Configure a Wireless Network

1. First, turn on the computer system Wireless Assess


2. Right click on the network icon on the task bar
3. Click on “Open network and Sharing Center”
4. Click on “Setup a new connection or network”
5. Double Click on “Manually connect to a wireless network”
6. Enter the “Network name:” to be added
7. Chose a security type (WPA2-Enterprice), Click “Next”
8. Click on “Change connection settings” and then click on “Security” tab
9. Click on “Settings” and then uncheck the icon “Verify the server identity by validating the
certificate” and then click on “OK”

10.Click on “Advanced settings”, and then check “Specify authentication mode:”


Click on “Users or computer authentication”, then choose “User authentication”
as applies. These then prompts for user’s (credentials) name and password which
allows the computer to access the network when the user is logged on.
14.6 Connecting System to Printer

To connect system to a multi-functional printer:


First get the IP address of the network printer by clicking on the network
icon the display. Confirm internet connectivity on the user’s system. Press
the windows key, search for devices and printers; in the ensuing window
click add a printer, then click “The printer that I want isn’t listed”, select
the “Add printer using TCP/IP address or host name”, click “Next” and
supply the printer IP address. Click next, follow any given instructions
and wait for the process completion

Figure 2.95 Connecting system to a printer


Sharing Printer among two or more Systems
In sharing a printer first, you would have to right click on the printer you want to
share, then go, select print properties, under its task bar, you would see an icon
suggestion sharing

After activating the share option, copy the present system’s IP Address then paste it
at the new system’s start menu (remember that the IP Address should start with a
double backward slash e.g. [\\10.2.1.190]

Hardware Devices
Desktop Computer Systems, Laptops, Notebook PC, Mobile Phones, Wireless PCI
adapter, RAM chips, Hard drive; Multifunction printers of varying types and printer
accessories (toners, transfer kit, fuser kit, and drum), Intercom, Paper Shredders etc.
are among the devices worked on in the ITD Service Support unit.
RAM Wireless Adapter Card
Multifunctional printer

Figure 2.96 Desktop Computer system and components


CHAPTER THREE

EXPERIENCE GAINED
Within the period of six months (July – January) spent at DPR, I have been
empowered with professional skills in networking, computer systems
troubleshooting and maintenance, and even social skills. I was able to acquire
practical experiences to support the theoretical aspects being taught in school. I was
exposed to experienced industry professionals, working methods and techniques in
handling equipment and machinery not available in the academic institutions.

To highlight a few experiences based on the sections under which I worked:


a. I gained professional knowledge in computer networking; computer systems
installation, troubleshooting, maintenance and repairs; and web applications
development.
b. Network operating systems, network servers, their type’s functions, uses etc.
c. Analyzing and interpreting network, computer systems, internet and other
related problems in the course of use, proffering timely and lasting solutions.

I gained more experiences in leadership, project writing, safety and public


speaking. This platform taught me various leadership qualities and inspired me
towards a better future. Classes are held every day (8am-9am) empowering us for
the day, it has also given me a real confidence boost. My supervisors helped me
conquer my stage fright in presentation and I also had the opportunity to meet and
learn from different people from various schools.
In the units I served (Data Management /Infotech), I was asked severally to teach
the new set of IT students and I helped them in areas where they lacked and was
responsible for the office as well as circulating information.
CHAPTER FOUR

CONCLUSION

SIWES gives students the kind of exposure and experience they need to function in
and out of school, to make decisions, to economize and cut down spending. The
industrial training has broadened my knowledge of the information and
communications technology (ICT) aspect of my course and has given me the
opportunity to experience “First-Hand” all the things being taught theoretically in
school and has also given me an opportunity to work with other -people in an office
environment and has improved my team work, and People Skills.

The importance of Information Technology/Networking in particular to an


organization either growing or grown cannot be over emphasized rather it is a
breakthrough that every organization should embrace in order to maximize its
growth potentials and eventually grow.
IT is the backbone of every organization as information empowers on every face of
life. It plays vital roles in the success of an organization which is why DPR has
invested so much in Information Technology.

Effective information helps organizations in the following ways


 Increase work efficiency
 Maintain good customer service
 Ease work flow
 Increase time management
For information sharing to be perfect, it has to be
 Available
 Confidential
 Accessible
This is the sole of the 21st century businesses

You might also like