Anda di halaman 1dari 26

NOVEMBER 2013.

A TECHNICAL REPORT ON STUDENTS INDUSTRIAL


WORK EXPERIENCE SCHEME (SIWES)
(APRIL OCTOBER 2013)
AT
MIKANO INTERNATIONAL LIMITED
PLOT 34/35 ACME ROAD, OGBA, IKEJA, LAGOS

BY
OSINUGA, OLUWASEUN DANIEL
(090805049)
DEPARTMENT OF COMPUTER SCIENCES
400 LEVEL
UNIVERSITY OF LAGOS

BEING A TECHNICAL REPORT SUBMITTED IN PARTIAL
FULFILMENT OF THE REQUIREMENTS FOR SIW 400
SIWES DIRECTOR: DR (MRS) F. OLADEJI


1 | P a g e

ABSTRACT
Students Industrial Work Experience Scheme (SIWES) is an effective avenue organised to expose
students to the realities of the work environment in Nigeria and the world at large. It helps to broaden
the students knowledge in their chosen professions so as to achieve the much needed technological
advancement for the nation. To give an account of the activities carried out during the scheme, the
trainee submits a technical report stating, in details, all the knowledge and experience gained.

This report gives a detailed explanation of all the activities carried out by the trainee.
At the end of it all, conclusions are drawn, and reports are made on how these activities carried out have
trained the mind of the trainee in their fields.





2 | P a g e

AKNOWLEDGEMENT
In respect to the completion of the Students Industrial Work Experience Scheme, my
appreciation goes to my IT Manager Mr. Sanyaolu Akeem, My Industrial Supervisors (Mr. Bola
Oguntade & Mr. Fatai Akinwande) for their selfless support and assistance in ensuring that I gain a lot
from Information Technology department. I wish to thank the management and staff of MIKANO
INTERNATIONAL LIMITED for their cordial relationship. My appreciation also goes to my Parents,
Pastor & Dcns. Osinuga for their prayers and encouragement, my sister Oreoluwa, my guardian at work
Mr. Benjamin Effiong and above all I thank God for granting me good health throughout the SIWES
period.


3 | P a g e

ACKNOWLEDGEMENT.............................................................................................................. 2
TABLE OF CONTENTS ...............................................................................................................3
CHAPTER ONE:
INTRODUCTION...........................................................................................................................4
1.0 SIWES AND ITF OVERVIEW............................................................................................... 4
CHAPTER TWO:
DESCRIPTION OF THE ESTABLISHMENT OF THE ATTACHMENT ............. 5
2.0 LOCATION AND BRIEF HISTORY OF THE WORKPLACE ............................................5
2.1 OBJECTIVE OF THE ESTABLISHMENT............................................................................. 5
2.2 ORGANOGRAM...................................................................................................................... 6
2.3 VARIOUS DEPARTMENT IN THE ESTABLISHMENT......................................................6
CHAPTER THREE: ACTIVITIES AT THE ORGANIZATION................................................8
3.0 NETWORK SUPPORT ...........................................................................................................8
3.0.1 NETWORK INFRASTRUCTURE OVERVIEW.................................................................8
3.0.2 LAN (LOCAL AREA NETWORK).....................................................................................10
3.0.3 WAN (WIDE AREA NETWORK)......................................................................................10
3.0.4 VIRTUAL PRIVATE NETWORK......................................................................................11
3.1 ETHERNET CABLING..........................................................................................................13
3.1.1 TYPES OF NETWORK CABLES.......................................................................................13
3.1.1.2 THE PICTORAL PROCESS OF CRIMPING A NETWORK CABLE...........................15
3.1.1.3 THE LAN (LOCAL AREA NETWORK) METER..........................................................16
3.1.1.4 COMMON NETWORKING PROBLEMS FACED ........................................................17
3.2.0 ACTIVE DIRECTORY AND MAIL ACCOUNT CREATION..........................................18
3.2.1 USE OF MICROSOFT EXCHANGE SERVER 2010.........................................................20
CHAPTER FOUR: SKILLS AND KNOWLEDGE ACQUIRED............ 24
4.0 SKILLS AND ACQUIRED KNOWLEDGE........................................................................ 24
CHAPTER FIVE:
PROBLEM ENCOUNTERED, RECOMMENDATION AND CONCLUSION.........................25
4 | P a g e

CHAPTER ONE
Introduction
1.0 SIWES and ITF Overview

The official Gazette of the Federal Republic of Nigeria No.16 made it clear, that the Supreme Military
Council then headed by General Yakubu Gowon in 1972 promulgated decree No.47 to indigenize the
Nigerian economy sector. On, the 31
st
of March 1974, the decree came into effect with its core aim of
reducing the dominance of foreigners in Nigerian economy, accompanied by a systematic integration of
locally oriented skilled manpower into the economy.
The indigenization decree established many bodies which includes the ITF. The Industrial Training
Fund (ITF) was charged with the responsibility of training low and middle level manpower for sustained
industrialization. However, when the Federal Government observed that the training of students who
are still in school would be easier and cheaper, and that such training would make them more competent
to assume any responsibility in their related field, a scheme known as the Students Industrial Work
Experience was established under ITF in 1973.
The body was mandated to liaise with all relevant agencies like the NUC, National Board or Technical
Education (NBTE) AND National Commission for Colleges(NCCE) to include SIWES program into a
their training curriculum for all technical courses and other related field. The Nigerian Universities
Commissions (NUC) has made it mandatory for all Nigeria University to undertake a minimum of six
months training in courses that need such relevant training. The duration for students other higher
institutions of higher learning may differ to that of universities as may be defined by the bodies concern.
SIWES OBJECTIVES
To help students apply the theoretical knowledge learnt in school in a more practical sense.
To enable students get familiar with what is going on in the industry.
To help students in tertiary institutions achieve industrial skills and have more understanding of
their fields of study.
To prepare students for the industrial work situation they are to meet after graduation and have
adequate practical background studies preparatory for employment in Industries.
To expose and familiarize students to work methods and techniques in handling equipment and
machinery that may not be available in their institutions.
5 | P a g e

CHAPTER TW0
Description of the Establishment of the Attachment

I had my Student Industrial Work Experience Scheme at MIKANO INTERNATIONAL LIMITED,
Ogba, Ikeja which lasted for a period of 24 weeks.
2.0 Location and brief history of the Workplace
Mikano International Limited situated at plot 34/35, Acme Road, Ogba, Ikeja, Lagos was established in
1995 in a small workplace in Ikeja area, after which the company started focusing on the latest designs
and technology of power generating sets. Mikano manufactures and assembles diesel and gas-power
generating sets. It is currently the largest power generating company that has distinguished itself through
quality and dependable power generating product in Africa. Mikano in partnership with Perkins Gas
Engine UK and ABB has also established a gas division to provide natural power generation alongside
automation technology. The Companys Gas division provides wide range of gas generating sets with
various power output from 380KVA to 5000KVA.
A fully Nigerian company with international staff, Mikano manufactures and assembles 95 percent of
its products. The company has established well over 25 branched and dealer network strategically
located nationwide. The companys clientele is highly diversified, including the oil and gas, banking,
telecom, information technology and construction sectors.
2.1 Objectives of the Establishment
Mikano International Limited is committed to supplying power generating sets, steel products, control
panels, accessories & related maintenance services that meet our clients diverse needs. They seek to
continually improve customer satisfaction & maintain the highest standards & quality by fulfilling all
regulatory and statutory requirements mandated by National/International standard.
QUALITY OBJECTIVES
1. To supply durable & high quality power generating sets & accessories
2. To ensure effective after sales service & support including supply of high quality spare parts
3. To ensure customer requirements in terms of capacity, rating & performance are met at all times.
4. To create a conducive environment for effective work performance by staff.

6 | P a g e

2.2 Organogram


2.3 Various department in the Establishment

Mikano International Limited has well over 25 departments at the headquarters. Each department is
listed below.
1. Admin
2. Maintenance
3. ABB
4. Audit
5. Procurement
6. Project
7. Operation
8. Account
9. Spare part
10. MPSD(Power Solutions Division)
11. Customer care
12. Installation
13. Central store
7 | P a g e

14. Sales
15. Data unit
16. Advert
17. Cash office
18. Purchasing
19. Warranty
20. Fuel station
21. Overhauling
22. Servicing
23. Construction
24. Transport
25. Tax
26. Hyundai


8 | P a g e

CHAPTER THREE
Activities at the Organization
I worked in the Information Technology Department which was responsible for helpdesk services, IT
support, Network installation, computer repairs and installation. With 27 departments and over 250
computer users, the I.T department is responsible for any computer/network problems faced by any staff.
Communication to the I.T department is done via intercom and Microsoft Outlook. Every day I attend
to calls made by various staff of the company. Common problems attended to daily include:
1. Disconnected mail
2. No internet connection / No network
3. Frozen windows, inability to work on windows
4. Documents not printing
5. Paper jam
6. Toner empty
7. Printers waste toner box full
8. Relocation of computers from one department to another
9. Crashed Windows Operating system/ blue screen
10. Mailbox full
11. Replacements of dysfunctional computer parts such as (mouse, keyboard, memory, hard drive,
cooling fans etc.)
12. Installation of new computer systems with antiviruses

3.0 NETWORK SUPPORT (Information Technology Unit)
3.0.1 NETWORK INFRASTRUCTURE OVERVIEW
A network infrastructure is an interconnected group of computer systems linked by the various
parts of a telecommunications architecture. Specifically, this infrastructure refers to the
organization of its various parts and their configuration from individual networked computers
to routers, cables, wireless access points, switches, backbones, network protocols, and network
access methodologies. Infrastructures can be either open or closed, such as the open architecture
of the Internet or the closed architecture of a private intranet. They can operate over wired or
wireless network connections, or a combination of both.

9 | P a g e

The simplest form of network infrastructure typically consists of one or more computers, a
network or Internet connection, and a hub to both link the computers to the network connection
and tie the various systems to each other. The hub merely links the computers, but does not limit
data flow to or from any one system. To control or limit access between systems and regulate
information flow, a switch replaces the hub to create network protocols that define how the
systems communicate with each other. To allow the network created by these systems to
communicate to others, via the network connection, requires a router, which bridges the networks
and basically provides a common language for data exchange, according to the rules of each
network.

8-PORT SWITCH


ROUTER



10 | P a g e

3.0.2 LAN (LOCAL AREA NETWORK)
A local area network (LAN) is a network that connects computers and devices in a limited
geographical area such as a home, school, office building, or closely positioned group of
buildings. Each computer or device on the network is a node. Wired LANs are most likely based
on Ethernet technology.
The defining characteristics of a LAN, in contrast to a wide area network (WAN), include higher
data transfer rates, limited geographic range, and lack of reliance on leased lines to provide
connectivity. Current Ethernet or other IEEE 802.3 LAN technologies operate at data transfer
rates up to 10 Gbit/s. A LAN can be connected to a WAN using a router.

3.0.3 WAN (WIDE AREA NETWORK)
A wide area network (WAN) is a network that covers a broad area (i.e., any
telecommunications network that links across metropolitan, regional, or national boundaries)
using private or public network transports. Business and government entities utilize WANs to
relay data among employees, clients, buyers, and suppliers from various geographical locations.
In essence, this mode of telecommunication allows a business to effectively carry out its daily
function regardless of location. The Internet can be considered a WAN as well, and is used by
businesses, governments, organizations, and individuals for almost any purpose imaginable.
Related terms for other types of networks are personal area networks (PANs), local area networks
(LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are
usually limited to a room, building, campus or specific metropolitan area (e.g., a city)
respectively.
11 | P a g e



Source: Data and Computer Communications by William Stallings

3.0.4 VIRTUAL PRIVATE NETWORK

Virtual Private Network is a concept or technology that blurs the line between a public and private
network. Until now there has always been a clear division between public and private networks.
A Public Network, like the public telephone system and the Internet, is a large collection of unrelated
peers that exchange information more or less freely with each other. The people with access to the public
12 | P a g e

network may or may not have anything in common, and any given person on that network may only
communicate with a small fraction of his potential users.
A Private Network is composed of computers owned by a single organization that share information
specifically with each other. They're assured that they are going to be the only ones using the network,
and that information sent between them will (at worst) only be seen by others in the group. The typical
corporate Local Area Network (LAN) or Wide Area Network (WAN) is an example of a private
network. The line between a private and public network has always been drawn at the gateway router,
where a company will erect a firewall to keep intruders from the public network out of their private
network, or to keep their own internal users from perusing the public network.
A virtual private network is a way to simulate a private network over a public network, such as the
Internet. It is called "virtual" because it depends on the use of virtual connectionsthat is, temporary
connections that have no real physical presence, but consist of packets routed over various machines on
the Internet on an ad hoc basis. Secure virtual connections are created between two machines, a machine
and a network, or two networks.
A virtual private network (VPN) extends a private network across a public network, such as the Internet.
It enables a computer to send and receive data across shared or public networks as if it were directly
connected to the private network, while benefiting from the functionality, security and management
policies of the private network. This is done by establishing a virtual point-to-point connection through
the use of dedicated connections, encryption, or a combination of the two.
A virtual private network connection across the Internet is similar to a wide area network (WAN) link
between the sites. From a user perspective, the extended network resources are accessed in the same
way as resources available from the private network.
VPNs allow employees to securely access their company's intranet while traveling outside the office.
Similarly, VPNs securely and cost-effectively connect geographically disparate offices of an
organization, creating one cohesive virtual network. VPN technology is also used by ordinary Internet
users to connect to proxy servers for the purpose of protecting one's identity.
VPNs allow you to create a secure, private network over a public network such as the Internet. They
can be created using software, hardware, or a combination of the two that creates a secure link between
peers over a public network. This is done through encryption, authentication, packet tunneling, and
firewalls.
13 | P a g e

3.1 ETHERNET CABLING
The cables used for data network are cat5e and fiber optic cables. The fiber is used as a backbone cable
while the cat 5 cable is used for desktop connections and connections from the switch to the rooms. One
of the basic cable preparations done is to connect an RJ-45 connector to the cable.
3.1.1 TYPES OF NETWORK CABLES
STRAIGHT-THROUGH CABLE
The straight-through cable is used to connect
Host to switch or hub
Router to switch or hub
Four wires are used in straight-through cable to connect Ethernet devices. Only pins 1,2,3,6 are used.



FIG 3.1 A Picture of the colour arrangement of the two ends of a straight cable.


14 | P a g e

CROSS-OVER CABLES
The crossover cable can be used to connect
Switch to switch
Hub to Hub
Host to Host
Hub to switch
Router to direct host
The same four wires are used in this cable as in the straight cable, we just connect different pins together.
Instead of connecting 1 to 1, 2 to 2, and so on, we connect pins 1 to 3 and 2 to 6


FIG 3.2 Picture of the colour arrangement of the two ends of a cross-over cable.

After arranging the strands out neatly, the next step is to use a cutter to trim the strands neatly to
a nice length so it could fit properly into the RJ-45 connector.

15 | P a g e

The wires must be laid out in order, they must be flat, and very close together. They need to be
parallel for most of the exposed length to fit into the plug properly. Once they are in order and
flat, cut the wires straight across so that only inch of the strands protrudes from the cable.
Make sure you get your pin numbers oriented properly.

After doing this the next step will be to place the cable strands correctly in the RJ-45 connector,
carefully slide the cable into the plug. The wires must stay in order, and separated from each
other. The wire tips have to slide all the way into the plug to connect to the contracts properly
and one has to make sure that the wires reach the end of the plug and still retain the colour
arrangement.

Once you are satisfied that the wires are seated fully at the plug contracts, insert the plug into the
crimping tool and crimp the cable to the plug.

Now the plug is complete and ready for testing, after testing if its ok then it can be used for the
network connection.

3.1.1.2 THE PICTORAL PROCESS OF CRIMPING A NETWORK CABLE
1)

Picture of RJ 45 Plug
2)

Picture of a network cable being cut.
16 | P a g e

3)

Picture of the cable being put into the connector
4)

Picture of the cable being crimped.

5)

Picture of the cable being tested with a LAN tester

3.1.1.3 THE LAN (LOCAL AREA NETWORK) METER
A LAN meter is a device that measures and tests for network connectivity in a network or telephone
cable or port. It is a rectangular box with two network ports on both sides, to which a cable is inserted
to at both ends. It allows one to derive information about the cable that is connected into it, such as
whether or not a cable is working, to determine if a port is active, derive the IP address of the network
port which the cable is connected to.

17 | P a g e

3.1.1.4 COMMON NETWORKING PROBLEMS FACED AND HOW THEY WERE
RESOLVED
Part of my work was to resolve network connectivity problems when they are reported by users (staff).
Under this section, I will be talking about the following:
1) Problems that could arise
2) Possible reasons why
3) How to solve the problem

PROBLEMS THAT COULD ARISE
A user could complain about the following problems
1) Limited or No connectivity
2) Not connecting to the network (intranet) at all.
3) Connection to the network, but the user not being able to work effectively.

1) LIMITED OR NO CONNECTIVITY
POSSIBLE REASONS
A) There are times that all the available IP addresses will have been taken or used up by other
systems within the subnet, thereby leaving a few systems with little or no IP address to use.
B) Network freeze, usually caused by over-usage of the network.
HOW TO SOLVE THE PROBLEM
A) The first thing to do is to remove the network cable from the port and then put it back into the
port. If the problem persists then:
B) A restart of the Pc is done to research for an IP address.

2) NO NETWORK CONNECTION
POSSIBLE REASONS
1) The network cable could be out
2) The network cable could be bad
3) The problem could be from the port
4) A problem from the patch panel or/and the switch.


18 | P a g e

HOW TO SOLVE THE PROBLEM
1) The first thing to do is to check that the lights of the network port of the Pc are blinking
(yellow and amber colour).
2) If its not, then you test the both ends of the network cable.
3) If the cables are alright and the problem persists, then you can now go to the switch and
check that the port is active, and if it is not, you change the port.
4) Then restart the Pc.

3) A PC CONNECTED TO THE NETWORK BUT STILL NOT WORKING.
POSSIBLE REASONS
1) Network freeze, this is due the over-using of the network.

HOW TO SOLVE THE PROBLEM
1) The first thing to do is to remove the network cable from the port then and put it back.
2) Then restart pc.

3.2.0 ACTIVE DIRECTORY AND MAIL ACCOUNT CREATION
Also part of my work was to create user accounts and mail accounts for new staff. We created the user
accounts on active directory which is a role on windows server 2008. The mail accounts were created
on Microsoft Exchange Server 2010.
Active Directory (AD) is a directory service implemented by Microsoft for Windows domain networks.
It is included in most Windows Server operating systems.
An AD domain controller authenticates and authorizes all users and computers in a Windows domain
type networkassigning and enforcing security policies for all computers and installing or updating
software. For example, when a user logs into a computer that is part of a Windows domain, Active
Directory checks the submitted password and determines whether the user is a system administrator or
normal user.


19 | P a g e

How to create users on active directory
1. On the windows 2008 server operating system, click on start
2. Go to all programs & click on administrative tools
3. Click on active directory users and computers
4. right-click users, new > users


20 | P a g e

Click next and finish. A domain user is being created using the above method.
3.2.1 USE OF MICROSOFT EXCHANGE SERVER 2010
Microsoft Exchange Server is calendaring software, a mail server and contact manager developed by
Microsoft. It is a server program that runs on Windows Server and is part of the Microsoft Servers line
of products.
How to create mail accounts for staff in Microsoft exchange
1. Go to start and click on exchange management console
2. Expand the recipient configuration icon
3. Right click mailbox and click new mailbox

21 | P a g e



Fig 3.2.2 Mailbox Configuration


22 | P a g e





23 | P a g e

How to install and configure a local/network printer
A new printer may be purchased or an existing printer may be asked to be transferred to another
department. It may have to be connected for a single use or networked for everyone in the department.
3 things could be done with a printer:
* It could be connected to a network cable and shared on the network
* It could be connected locally (port-to-port) to a computer
* It could be connected locally (port-to-port) to a computer and shared
The processes involved to achieve the above are as follows:
1. Go to control panel from the start menu
2. Click on devices and printers
3. Click on add a printer
4. If the search pool sees the printer connected, click on it and click next
Else, click on the printer I want isnt listed

FOR A LOCAL PRINTER
a. Select Add a local printer or network printer with manual settings
b. Click nest and select use an existing port
c. Select virtual usb port from the list of ports
d. Click next and select Have disk
e. Install the drivers via the disk.

FOR A NETWORK PRINTER
a. Select Add a printer using a TCP/IP address or hostname
b. Click next and type the ip address of the printer, and its port name
c. Click next and select Have disk
d. Install the drivers via the disk.
24 | P a g e

CHAPTER FOUR
4.0 SKILLS AND ACQUIRED KNOWLEDGE
My first month was interesting as I was put under the supervision of a fellow attach who had been there
before me. The major work involved IT support. Mikano had over 300 computer and over 1,000 staffs
at the head office where I worked. On a daily basis I had to attend to calls made from various staff
pertaining to problems encountered with their computers. One of the soft skills I acquired was how to
respect and interact with people, and to explain things in layman terms.
I learnt how to analyze basic network problems by testing the connectivity with the PING tool. I learnt
how to crimp CAT 5 network cables, test with a LAN tester and a remote. I also learnt how to install a
local and network printer. Also when new computers are bought, I learnt how to set it up and install the
necessary software it would need.
I learnt how to troubleshoot a computer that refuses to work or come on. I did the following;
a. Removed the cooling fan to blow the dust with a blower
b. Checked that the processor is well placed
c. Checked the power cable
d. Checked that the RAM is well fitted.
e. Checked that the hard drive is working etc.
If it still does not work, we order for a new motherboard. Sometime we need to reinstall the operating
system. I learnt how to install new operating systems ranging from windows XP to Windows 7 to
Windows 8.
I also learnt how to create users on the active directory and to create email accounts on the windows
sever Microsoft exchange.

25 | P a g e

CHAPTER FIVE
Problems Encountered, Recommendation and Conclusion
Problems Encountered:
We had some foreign expatriates who were in charge of the software aspect of the Companys IT section
so the blacks were not allowed to explore the Web development and Software development aspect of
the IT department.
Recommendations:
I think SIWES may be improved if the School department partners with related companies in the labour
market and agree to select some students who have shown exceptional qualities in their academics and
fix them in these companies so that some do not have to waste time looking for attachments.
Conclusion:
The 24 weeks spent for my SIWES programme was very exciting, challenging and worthwhile as I was
able to learn new things, meet and make friends with high profile people in the society, relate with
Britons, Spanish, French, Indians, and Germans etc. I was able to discover my interests and talents in
the course of the training. The SIWES programme also gave me insights on what the labour market
looks like, as I have been able to know what to do and what not to do as an employee. From what I have
undergone, I am absolutely sure that the industrial training program has achieved its entire primary
objective. It has also prepared students for the real working life. As a result of the programme, I can say
I am confident to enter the employment world.

Anda mungkin juga menyukai