My Siwes Report

Embed Size (px)

Citation preview

  • NOVEMBER 2013.

    A TECHNICAL REPORT ON STUDENTS INDUSTRIAL

    WORK EXPERIENCE SCHEME (SIWES)

    (APRIL OCTOBER 2013)

    AT

    MIKANO INTERNATIONAL LIMITED

    PLOT 34/35 ACME ROAD, OGBA, IKEJA, LAGOS

    BY

    OSINUGA, OLUWASEUN DANIEL

    (090805049)

    DEPARTMENT OF COMPUTER SCIENCES

    400 LEVEL

    UNIVERSITY OF LAGOS

    BEING A TECHNICAL REPORT SUBMITTED IN PARTIAL

    FULFILMENT OF THE REQUIREMENTS FOR SIW 400

    SIWES DIRECTOR: DR (MRS) F. OLADEJI

  • 1 | P a g e

    ABSTRACT

    Students Industrial Work Experience Scheme (SIWES) is an effective avenue organised to expose

    students to the realities of the work environment in Nigeria and the world at large. It helps to broaden

    the students knowledge in their chosen professions so as to achieve the much needed technological

    advancement for the nation. To give an account of the activities carried out during the scheme, the

    trainee submits a technical report stating, in details, all the knowledge and experience gained.

    This report gives a detailed explanation of all the activities carried out by the trainee.

    At the end of it all, conclusions are drawn, and reports are made on how these activities carried out have

    trained the mind of the trainee in their fields.

  • 2 | P a g e

    AKNOWLEDGEMENT

    In respect to the completion of the Students Industrial Work Experience Scheme, my

    appreciation goes to my IT Manager Mr. Sanyaolu Akeem, My Industrial Supervisors (Mr. Bola

    Oguntade & Mr. Fatai Akinwande) for their selfless support and assistance in ensuring that I gain a lot

    from Information Technology department. I wish to thank the management and staff of MIKANO

    INTERNATIONAL LIMITED for their cordial relationship. My appreciation also goes to my Parents,

    Pastor & Dcns. Osinuga for their prayers and encouragement, my sister Oreoluwa, my guardian at work

    Mr. Benjamin Effiong and above all I thank God for granting me good health throughout the SIWES

    period.

  • 3 | P a g e

    ACKNOWLEDGEMENT.............................................................................................................. 2

    TABLE OF CONTENTS ...............................................................................................................3

    CHAPTER ONE:

    INTRODUCTION...........................................................................................................................4

    1.0 SIWES AND ITF OVERVIEW............................................................................................... 4

    CHAPTER TWO:

    DESCRIPTION OF THE ESTABLISHMENT OF THE ATTACHMENT ............. 5

    2.0 LOCATION AND BRIEF HISTORY OF THE WORKPLACE ............................................5

    2.1 OBJECTIVE OF THE ESTABLISHMENT............................................................................. 5

    2.2 ORGANOGRAM...................................................................................................................... 6

    2.3 VARIOUS DEPARTMENT IN THE ESTABLISHMENT......................................................6

    CHAPTER THREE: ACTIVITIES AT THE ORGANIZATION................................................8

    3.0 NETWORK SUPPORT ...........................................................................................................8

    3.0.1 NETWORK INFRASTRUCTURE OVERVIEW.................................................................8

    3.0.2 LAN (LOCAL AREA NETWORK).....................................................................................10

    3.0.3 WAN (WIDE AREA NETWORK)......................................................................................10

    3.0.4 VIRTUAL PRIVATE NETWORK......................................................................................11

    3.1 ETHERNET CABLING..........................................................................................................13

    3.1.1 TYPES OF NETWORK CABLES.......................................................................................13

    3.1.1.2 THE PICTORAL PROCESS OF CRIMPING A NETWORK CABLE...........................15

    3.1.1.3 THE LAN (LOCAL AREA NETWORK) METER..........................................................16

    3.1.1.4 COMMON NETWORKING PROBLEMS FACED ........................................................17

    3.2.0 ACTIVE DIRECTORY AND MAIL ACCOUNT CREATION..........................................18

    3.2.1 USE OF MICROSOFT EXCHANGE SERVER 2010.........................................................20

    CHAPTER FOUR: SKILLS AND KNOWLEDGE ACQUIRED............ 24

    4.0 SKILLS AND ACQUIRED KNOWLEDGE........................................................................ 24

    CHAPTER FIVE:

    PROBLEM ENCOUNTERED, RECOMMENDATION AND CONCLUSION.........................25

  • 4 | P a g e

    CHAPTER ONE

    Introduction

    1.0 SIWES and ITF Overview

    The official Gazette of the Federal Republic of Nigeria No.16 made it clear, that the Supreme Military

    Council then headed by General Yakubu Gowon in 1972 promulgated decree No.47 to indigenize the

    Nigerian economy sector. On, the 31st of March 1974, the decree came into effect with its core aim of

    reducing the dominance of foreigners in Nigerian economy, accompanied by a systematic integration of

    locally oriented skilled manpower into the economy.

    The indigenization decree established many bodies which includes the ITF. The Industrial Training

    Fund (ITF) was charged with the responsibility of training low and middle level manpower for sustained

    industrialization. However, when the Federal Government observed that the training of students who

    are still in school would be easier and cheaper, and that such training would make them more competent

    to assume any responsibility in their related field, a scheme known as the Students Industrial Work

    Experience was established under ITF in 1973.

    The body was mandated to liaise with all relevant agencies like the NUC, National Board or Technical

    Education (NBTE) AND National Commission for Colleges(NCCE) to include SIWES program into a

    their training curriculum for all technical courses and other related field. The Nigerian Universities

    Commissions (NUC) has made it mandatory for all Nigeria University to undertake a minimum of six

    months training in courses that need such relevant training. The duration for students other higher

    institutions of higher learning may differ to that of universities as may be defined by the bodies concern.

    SIWES OBJECTIVES

    To help students apply the theoretical knowledge learnt in school in a more practical sense.

    To enable students get familiar with what is going on in the industry.

    To help students in tertiary institutions achieve industrial skills and have more understanding of

    their fields of study.

    To prepare students for the industrial work situation they are to meet after graduation and have

    adequate practical background studies preparatory for employment in Industries.

    To expose and familiarize students to work methods and techniques in handling equipment and

    machinery that may not be available in their institutions.

  • 5 | P a g e

    CHAPTER TW0

    Description of the Establishment of the Attachment

    I had my Student Industrial Work Experience Scheme at MIKANO INTERNATIONAL LIMITED,

    Ogba, Ikeja which lasted for a period of 24 weeks.

    2.0 Location and brief history of the Workplace

    Mikano International Limited situated at plot 34/35, Acme Road, Ogba, Ikeja, Lagos was established in

    1995 in a small workplace in Ikeja area, after which the company started focusing on the latest designs

    and technology of power generating sets. Mikano manufactures and assembles diesel and gas-power

    generating sets. It is currently the largest power generating company that has distinguished itself through

    quality and dependable power generating product in Africa. Mikano in partnership with Perkins Gas

    Engine UK and ABB has also established a gas division to provide natural power generation alongside

    automation technology. The Companys Gas division provides wide range of gas generating sets with

    various power output from 380KVA to 5000KVA.

    A fully Nigerian company with international staff, Mikano manufactures and assembles 95 percent of

    its products. The company has established well over 25 branched and dealer network strategically

    located nationwide. The companys clientele is highly diversified, including the oil and gas, banking,

    telecom, information technology and construction sectors.

    2.1 Objectives of the Establishment

    Mikano International Limited is committed to supplying power generating sets, steel products, control

    panels, accessories & related maintenance services that meet our clients diverse needs. They seek to

    continually improve customer satisfaction & maintain the highest standards & quality by fulfilling all

    regulatory and statutory requirements mandated by National/International standard.

    QUALITY OBJECTIVES

    1. To supply durable & high quality power generating sets & accessories

    2. To ensure effective after sales service & support including supply of high quality spare parts

    3. To ensure customer requirements in terms of capacity, rating & performance are met at all times.

    4. To create a conducive environment for effective work performance by staff.

  • 6 | P a g e

    2.2 Organogram

    2.3 Various department in the Establishment

    Mikano International Limited has well over 25 departments at the headquarters. Each department is

    listed below.

    1. Admin

    2. Maintenance

    3. ABB

    4. Audit

    5. Procurement

    6. Project

    7. Operation

    8. Account

    9. Spare part

    10. MPSD(Power Solutions Division)

    11. Customer care

    12. Installation

    13. Central store

  • 7 | P a g e

    14. Sales

    15. Data unit

    16. Advert

    17. Cash office

    18. Purchasing

    19. Warranty

    20. Fuel station

    21. Overhauling

    22. Servicing

    23. Construction

    24. Transport

    25. Tax

    26. Hyundai

  • 8 | P a g e

    CHAPTER THREE

    Activities at the Organization

    I worked in the Information Technology Department which was responsible for helpdesk services, IT

    support, Network installation, computer repairs and installation. With 27 departments and over 250

    computer users, the I.T department is responsible for any computer/network problems faced by any staff.

    Communication to the I.T department is done via intercom and Microsoft Outlook. Every day I attend

    to calls made by various staff of the company. Common problems attended to daily include:

    1. Disconnected mail

    2. No internet connection / No network

    3. Frozen windows, inability to work on windows

    4. Documents not printing

    5. Paper jam

    6. Toner empty

    7. Printers waste toner box full

    8. Relocation of computers from one department to another

    9. Crashed Windows Operating system/ blue screen

    10. Mailbox full

    11. Replacements of dysfunctional computer parts such as (mouse, keyboard, memory, hard drive,

    cooling fans etc.)

    12. Installation of new computer systems with antiviruses

    3.0 NETWORK SUPPORT (Information Technology Unit)

    3.0.1 NETWORK INFRASTRUCTURE OVERVIEW

    A network infrastructure is an interconnected group of computer systems linked by the various

    parts of a telecommunications architecture. Specifically, this infrastructure refers to the

    organization of its various parts and their configuration from individual networked computers

    to routers, cables, wireless access points, switches, backbones, network protocols, and network

    access methodologies. Infrastructures can be either open or closed, such as the open architecture

    of the Internet or the closed architecture of a private intranet. They can operate over wired or

    wireless network connections, or a combination of both.

  • 9 | P a g e

    The simplest form of network infrastructure typically consists of one or more computers, a

    network or Internet connection, and a hub to both link the computers to the network connection

    and tie the various systems to each other. The hub merely links the computers, but does not limit

    data flow to or from any one system. To control or limit access between systems and regulate

    information flow, a switch replaces the hub to create network protocols that define how the

    systems communicate with each other. To allow the network created by these systems to

    communicate to others, via the network connection, requires a router, which bridges the networks

    and basically provides a common language for data exchange, according to the rules of each

    network.

    8-PORT SWITCH

    ROUTER

  • 10 | P a g e

    3.0.2 LAN (LOCAL AREA NETWORK)

    A local area network (LAN) is a network that connects computers and devices in a limited

    geographical area such as a home, school, office building, or closely positioned group of

    buildings. Each computer or device on the network is a node. Wired LANs are most likely based

    on Ethernet technology.

    The defining characteristics of a LAN, in contrast to a wide area network (WAN), include higher

    data transfer rates, limited geographic range, and lack of reliance on leased lines to provide

    connectivity. Current Ethernet or other IEEE 802.3 LAN technologies operate at data transfer

    rates up to 10 Gbit/s. A LAN can be connected to a WAN using a router.

    3.0.3 WAN (WIDE AREA NETWORK)

    A wide area network (WAN) is a network that covers a broad area (i.e., any

    telecommunications network that links across metropolitan, regional, or national boundaries)

    using private or public network transports. Business and government entities utilize WANs to

    relay data among employees, clients, buyers, and suppliers from various geographical locations.

    In essence, this mode of telecommunication allows a business to effectively carry out its daily

    function regardless of location. The Internet can be considered a WAN as well, and is used by

    businesses, governments, organizations, and individuals for almost any purpose imaginable.

    Related terms for other types of networks are personal area networks (PANs), local area networks

    (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are

    usually limited to a room, building, campus or specific metropolitan area (e.g., a city)

    respectively.

  • 11 | P a g e

    Source: Data and Computer Communications by William Stallings

    3.0.4 VIRTUAL PRIVATE NETWORK

    Virtual Private Network is a concept or technology that blurs the line between a public and private

    network. Until now there has always been a clear division between public and private networks.

    A Public Network, like the public telephone system and the Internet, is a large collection of unrelated

    peers that exchange information more or less freely with each other. The people with access to the public

  • 12 | P a g e

    network may or may not have anything in common, and any given person on that network may only

    communicate with a small fraction of his potential users.

    A Private Network is composed of computers owned by a single organization that share information

    specifically with each other. They're assured that they are going to be the only ones using the network,

    and that information sent between them will (at worst) only be seen by others in the group. The typical

    corporate Local Area Network (LAN) or Wide Area Network (WAN) is an example of a private

    network. The line between a private and public network has always been drawn at the gateway router,

    where a company will erect a firewall to keep intruders from the public network out of their private

    network, or to keep their own internal users from perusing the public network.

    A virtual private network is a way to simulate a private network over a public network, such as the

    Internet. It is called "virtual" because it depends on the use of virtual connectionsthat is, temporary

    connections that have no real physical presence, but consist of packets routed over various machines on

    the Internet on an ad hoc basis. Secure virtual connections are created between two machines, a machine

    and a network, or two networks.

    A virtual private network (VPN) extends a private network across a public network, such as the Internet.

    It enables a computer to send and receive data across shared or public networks as if it were directly

    connected to the private network, while benefiting from the functionality, security and management

    policies of the private network. This is done by establishing a virtual point-to-point connection through

    the use of dedicated connections, encryption, or a combination of the two.

    A virtual private network connection across the Internet is similar to a wide area network (WAN) link

    between the sites. From a user perspective, the extended network resources are accessed in the same

    way as resources available from the private network.

    VPNs allow employees to securely access their company's intranet while traveling outside the office.

    Similarly, VPNs securely and cost-effectively connect geographically disparate offices of an

    organization, creating one cohesive virtual network. VPN technology is also used by ordinary Internet

    users to connect to proxy servers for the purpose of protecting one's identity.

    VPNs allow you to create a secure, private network over a public network such as the Internet. They

    can be created using software, hardware, or a combination of the two that creates a secure link between

    peers over a public network. This is done through encryption, authentication, packet tunneling, and

    firewalls.

  • 13 | P a g e

    3.1 ETHERNET CABLING

    The cables used for data network are cat5e and fiber optic cables. The fiber is used as a backbone cable

    while the cat 5 cable is used for desktop connections and connections from the switch to the rooms. One

    of the basic cable preparations done is to connect an RJ-45 connector to the cable.

    3.1.1 TYPES OF NETWORK CABLES

    STRAIGHT-THROUGH CABLE

    The straight-through cable is used to connect

    Host to switch or hub

    Router to switch or hub

    Four wires are used in straight-through cable to connect Ethernet devices. Only pins 1,2,3,6 are used.

    FIG 3.1 A Picture of the colour arrangement of the two ends of a straight cable.

  • 14 | P a g e

    CROSS-OVER CABLES

    The crossover cable can be used to connect

    Switch to switch

    Hub to Hub

    Host to Host

    Hub to switch

    Router to direct host

    The same four wires are used in this cable as in the straight cable, we just connect different pins together.

    Instead of connecting 1 to 1, 2 to 2, and so on, we connect pins 1 to 3 and 2 to 6

    FIG 3.2 Picture of the colour arrangement of the two ends of a cross-over cable.

    After arranging the strands out neatly, the next step is to use a cutter to trim the strands neatly to

    a nice length so it could fit properly into the RJ-45 connector.

  • 15 | P a g e

    The wires must be laid out in order, they must be flat, and very close together. They need to be

    parallel for most of the exposed length to fit into the plug properly. Once they are in order and

    flat, cut the wires straight across so that only inch of the strands protrudes from the cable.

    Make sure you get your pin numbers oriented properly.

    After doing this the next step will be to place the cable strands correctly in the RJ-45 connector,

    carefully slide the cable into the plug. The wires must stay in order, and separated from each

    other. The wire tips have to slide all the way into the plug to connect to the contracts properly

    and one has to make sure that the wires reach the end of the plug and still retain the colour

    arrangement.

    Once you are satisfied that the wires are seated fully at the plug contracts, insert the plug into the

    crimping tool and crimp the cable to the plug.

    Now the plug is complete and ready for testing, after testing if its ok then it can be used for the

    network connection.

    3.1.1.2 THE PICTORAL PROCESS OF CRIMPING A NETWORK CABLE

    1)

    Picture of RJ 45 Plug

    2)

    Picture of a network cable being cut.

  • 16 | P a g e

    3)

    Picture of the cable being put into the connector

    4)

    Picture of the cable being crimped.

    5)

    Picture of the cable being tested with a LAN tester

    3.1.1.3 THE LAN (LOCAL AREA NETWORK) METER

    A LAN meter is a device that measures and tests for network connectivity in a network or telephone

    cable or port. It is a rectangular box with two network ports on both sides, to which a cable is inserted

    to at both ends. It allows one to derive information about the cable that is connected into it, such as

    whether or not a cable is working, to determine if a port is active, derive the IP address of the network

    port which the cable is connected to.

  • 17 | P a g e

    3.1.1.4 COMMON NETWORKING PROBLEMS FACED AND HOW THEY WERE

    RESOLVED

    Part of my work was to resolve network connectivity problems when they are reported by users (staff).

    Under this section, I will be talking about the following:

    1) Problems that could arise

    2) Possible reasons why

    3) How to solve the problem

    PROBLEMS THAT COULD ARISE

    A user could complain about the following problems

    1) Limited or No connectivity

    2) Not connecting to the network (intranet) at all.

    3) Connection to the network, but the user not being able to work effectively.

    1) LIMITED OR NO CONNECTIVITY

    POSSIBLE REASONS

    A) There are times that all the available IP addresses will have been taken or used up by other

    systems within the subnet, thereby leaving a few systems with little or no IP address to use.

    B) Network freeze, usually caused by over-usage of the network.

    HOW TO SOLVE THE PROBLEM

    A) The first thing to do is to remove the network cable from the port and then put it back into the

    port. If the problem persists then:

    B) A restart of the Pc is done to research for an IP address.

    2) NO NETWORK CONNECTION

    POSSIBLE REASONS

    1) The network cable could be out

    2) The network cable could be bad

    3) The problem could be from the port

    4) A problem from the patch panel or/and the switch.

  • 18 | P a g e

    HOW TO SOLVE THE PROBLEM

    1) The first thing to do is to check that the lights of the network port of the Pc are blinking

    (yellow and amber colour).

    2) If its not, then you test the both ends of the network cable.

    3) If the cables are alright and the problem persists, then you can now go to the switch and

    check that the port is active, and if it is not, you change the port.

    4) Then restart the Pc.

    3) A PC CONNECTED TO THE NETWORK BUT STILL NOT WORKING.

    POSSIBLE REASONS

    1) Network freeze, this is due the over-using of the network.

    HOW TO SOLVE THE PROBLEM

    1) The first thing to do is to remove the network cable from the port then and put it back.

    2) Then restart pc.

    3.2.0 ACTIVE DIRECTORY AND MAIL ACCOUNT CREATION

    Also part of my work was to create user accounts and mail accounts for new staff. We created the user

    accounts on active directory which is a role on windows server 2008. The mail accounts were created

    on Microsoft Exchange Server 2010.

    Active Directory (AD) is a directory service implemented by Microsoft for Windows domain networks.

    It is included in most Windows Server operating systems.

    An AD domain controller authenticates and authorizes all users and computers in a Windows domain

    type networkassigning and enforcing security policies for all computers and installing or updating

    software. For example, when a user logs into a computer that is part of a Windows domain, Active

    Directory checks the submitted password and determines whether the user is a system administrator or

    normal user.

  • 19 | P a g e

    How to create users on active directory

    1. On the windows 2008 server operating system, click on start

    2. Go to all programs & click on administrative tools

    3. Click on active directory users and computers

    4. right-click users, new > users

  • 20 | P a g e

    Click next and finish. A domain user is being created using the above method.

    3.2.1 USE OF MICROSOFT EXCHANGE SERVER 2010

    Microsoft Exchange Server is calendaring software, a mail server and contact manager developed by

    Microsoft. It is a server program that runs on Windows Server and is part of the Microsoft Servers line

    of products.

    How to create mail accounts for s taff in Microsoft exchange

    1. Go to start and click on exchange management console

    2. Expand the recipient configuration icon

    3. Right click mailbox and click new mailbox

  • 21 | P a g e

    Fig 3.2.2 Mailbox Configuration

  • 22 | P a g e

  • 23 | P a g e

    How to install and configure a local/ne twork printer

    A new printer may be purchased or an existing printer may be asked to be transferred to another

    department. It may have to be connected for a single use or networked for everyone in the department.

    3 things could be done with a printer:

    * It could be connected to a network cable and shared on the network

    * It could be connected locally (port-to-port) to a computer

    * It could be connected locally (port-to-port) to a computer and shared

    The processes involved to achieve the above are as follows:

    1. Go to control panel from the start menu

    2. Click on devices and printers

    3. Click on add a printer

    4. If the search pool sees the printer connected, click on it and click next

    Else, click on the printer I want isnt listed

    FOR A LOCAL PRINTER

    a. Select Add a local printer or network printer with manual settings

    b. Click nest and select use an existing port

    c. Select virtual usb port from the list of ports

    d. Click next and select Have disk

    e. Install the drivers via the disk.

    FOR A NETWORK PRINTER

    a. Select Add a printer using a TCP/IP address or hostname

    b. Click next and type the ip address of the printer, and its port name

    c. Click next and select Have disk

    d. Install the drivers via the disk.

  • 24 | P a g e

    CHAPTER FOUR

    4.0 SKILLS AND ACQUIRED KNOWLEDGE

    My first month was interesting as I was put under the supervision of a fellow attach who had been there

    before me. The major work involved IT support. Mikano had over 300 computer and over 1,000 staffs

    at the head office where I worked. On a daily basis I had to attend to calls made from various staff

    pertaining to problems encountered with their computers. One of the soft skills I acquired was how to

    respect and interact with people, and to explain things in layman terms.

    I learnt how to analyze basic network problems by testing the connectivity with the PING tool. I learnt

    how to crimp CAT 5 network cables, test with a LAN tester and a remote. I also learnt how to install a

    local and network printer. Also when new computers are bought, I learnt how to set it up and install the

    necessary software it would need.

    I learnt how to troubleshoot a computer that refuses to work or come on. I did the following;

    a. Removed the cooling fan to blow the dust with a blower

    b. Checked that the processor is well placed

    c. Checked the power cable

    d. Checked that the RAM is well fitted.

    e. Checked that the hard drive is working etc.

    If it still does not work, we order for a new motherboard. Sometime we need to reinstall the operating

    system. I learnt how to install new operating systems ranging from windows XP to Windows 7 to

    Windows 8.

    I also learnt how to create users on the active directory and to create email accounts on the windows

    sever Microsoft exchange.

  • 25 | P a g e

    CHAPTER FIVE

    Problems Encountered, Recommendation and Conclusion

    Problems Encountered:

    We had some foreign expatriates who were in charge of the software aspect of the Companys IT section

    so the blacks were not allowed to explore the Web development and Software development aspect of

    the IT department.

    Recommendations:

    I think SIWES may be improved if the School department partners with related companies in the labour

    market and agree to select some students who have shown exceptional qualities in their academics and

    fix them in these companies so that some do not have to waste time looking for attachments.

    Conclusion:

    The 24 weeks spent for my SIWES programme was very exciting, challenging and worthwhile as I was

    able to learn new things, meet and make friends with high profile people in the society, relate with

    Britons, Spanish, French, Indians, and Germans etc. I was able to discover my interests and talents in

    the course of the training. The SIWES programme also gave me insights on what the labour market

    looks like, as I have been able to know what to do and what not to do as an employee. From what I have

    undergone, I am absolutely sure that the industrial training program has achieved its entire primary

    objective. It has also prepared students for the real working life. As a result of the programme, I can say

    I am confident to enter the employment world.