+ All Categories
Home > Technology > Information technology Internship report

Information technology Internship report

Date post: 14-Feb-2017
Category:
Upload: rodney-kaweesa
View: 103 times
Download: 15 times
Share this document with a friend
96
UGANDA CHRISTIAN UNIVERSITY FACULTY OF SCIENCE AND TECHNOLOGY BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY A REPORT ON FIELD ATTACHMENT AT UGANDA REVENUE AUTHORITY. BY KAWEESA RODNEY S14B13/329 PRACTICAL TRAINING REPORT An Internship Report Submitted in Partial Fulfillment of the requirements for the award of a Degree of Bachelor of Science in Information technology of Uganda Christian University. August, 2016 1
Transcript
Page 1: Information technology Internship report

UGANDA CHRISTIAN UNIVERSITY

FACULTY OF SCIENCE AND TECHNOLOGY

BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY

A REPORT ON FIELD ATTACHMENT AT UGANDA REVENUE AUTHORITY.

BYKAWEESA RODNEY S14B13/329

PRACTICAL TRAINING REPORT

An Internship Report Submitted in Partial Fulfillment of the requirements for the award of a Degree of Bachelor of Science in Information technology of Uganda Christian University.

August, 2016

1

Page 2: Information technology Internship report

DeclarationI Kaweesa Rodney of Registration Number S14B13/329, sincerely declare to the best of my knowledge that I am the sole writer of this report and no one has ever submitted this work in Uganda Christian University or any other learning institution.

Sign: ………………………..

Date: ………………………..

2

Page 3: Information technology Internship report

ApprovalThis report has been complied and submitted by Kaweesa Rodney under the guidance of my field supervisor at Uganda Revenue Authority with the approval of the following supervisors;

Field Supervisor:

Signature……………….. Date and Stamp………………

Kaduli Eria

Academic Supervisor:

Signature……………….. Date and Stamp………………

Tomusange Brian

3

Page 4: Information technology Internship report

DedicationI dedicate this report to my guardians, Mr. Moses Kaduyu, Mr. Samuel Kaduyu and Mr. David Kaduyu for their encouragement and physical and financial support in my education.

It’s been a tough journey but may the Almighty God Bless you all.

4

Page 5: Information technology Internship report

AcknowledgementI would like to express my gratitude to Uganda Revenue Authority and Uganda Christian University for giving me this opportunity to do an information technology training as a partial fulfillment of the requirement for the degree of Bachelor of Science in Information technology.

Throughout this training, I am very honored and lucky with the encouragement and guidance from my supervisors Mr. Kaduli Eria, Ms. Actavia Kemigisha, and my academic supervisor Mr. Tomusange Brian.

I thank the staff of Uganda Revenue Authority for being supportive and sparing the time to share their knowledge in various fields.

In addition, I offer sincere thanks to my fellow trainees for making learning a interesting team work adventure.

5

Page 6: Information technology Internship report

AbstractAs a requirement for a student to acquire a Bachelor’s degree in information technology, he/she has to go undergo graduate training in order to gain experience necessary in the field and for the job market. This is at least done from a known organization which deals with some computing beyond mere theoretical work and to satisfy this requirement, I trained with Uganda Revenue Authority.

I joined Uganda Revenue Authority as an IT officer on 27th June, 2016 for a period of 5 weeks having joined late for not having sent a notification for my placement. In this report, I have highlighted the experience and skills I gained, challenges that I faced and actions taken in solving the problems during my training.

My training focused on various things like hardware repair and maintenance, networking and systems administration. Some of the activities I did during the training include; repairing printers, assembling and disassembling computer systems and adding computers to the domain.

During this training, there was an addition of skills acquired and among these were ability to work under minimum supervision, planning to be able to beat deadlines and being a team player.

6

Page 7: Information technology Internship report

Abbreviations and Acronyms

CMOS Complementary Metal-oxide Semi-conductor

RAM Random Access Memory

CD Compact Disc

UPS Uninterruptable Power Supply

ROM Read Only Memory

HDD Hard Disk Drive

SATA Serial Advanced Technology Attachment

CPU Central Processing Unit

IDE Integrated Drive Electronics

USB Universal Serial Bus

LAN Local Area Network

WAN Wide Area Network

Wi-Fi Wireless Fidelity

IP Internet Protocol

IC Integrated Circuits

i Intel

MAC Media Access Control

DNS Domain Name System

TCP Transmission Control Protocol

VLAN Virtual Local Area Network

POST Power On Self-Test

IEEE Institute of Electrical and Electronic Engineers

7

Page 8: Information technology Internship report

EMI Electro-magnetic Interference

NIC Network Interface Card

PCI Peripheral Component Interconnect

VGA Video Graphics Adapter

OS Operating System

DOS Disk Operating System

RJ Registered Jack

FAT File Allocation Table

NTFS New Technology File System

FTP Foiled Twisted Pair

STP Shielded Twisted Pair

UTP Unshielded Twisted Pair

MC Media Converter

AVR Automatic Voltage Regulator

I/O Input Output

BIOS Basic Input Output System

PSU Power Supply Unit

BSSA Business Support And System Administration

DVI Digital Visual Interface

WLAN Wireless Local Area Network

IBSS Independent Basic Service Set

BSS Basic Service Set

8

Page 9: Information technology Internship report

BSA Basic Service Area

ESA Extended Service Area

AP Access Point

SFP Small Form-factor Pluggable

WLAN Wireless Local Area Network

VPN Virtual Private Network

ACL Access Control Lists

ACE Access Control Entries

Table of Contents

9

Page 10: Information technology Internship report

Declaration.................................................................................................................................................2

Approval.....................................................................................................................................................3

Dedication..................................................................................................................................................4

Acknowledgement.....................................................................................................................................5

Abstract......................................................................................................................................................6

Abbreviations and Acronyms...................................................................................................................7

CHAPTER ONE......................................................................................................................................11

1.0 INTRODUCTION...........................................................................................................................11

Historical Background....................................................................................................................11

1.1.1 about industrial training........................................................................................................11

1.2 Objectives of industrial training.......................................................................................................11

1.2.1 Objectives of industrial training to the student....................................................................12

1.2.2 Objectives of industrial training to the organization...........................................................12

1.2.3 Objectives of industrial training to the university................................................................12

1.3 Organization profile.........................................................................................................................13

Value proposition..............................................................................................................................13

1.4 Mission............................................................................................................................................14

1.5 Vision..............................................................................................................................................14

Code of Conduct Expected in the URA..........................................................................................14

1.6 URA core values..............................................................................................................................14

1.7 Organization structure.....................................................................................................................15

i) Commissioner General’s Office which includes;.......................................................................15

ii) Domestic tax Department which includes;................................................................................15

iii) Customs Department which includes;......................................................................................16

iv) Corporate Service Department which includes;......................................................................16

v) Tax investigations department which includes;........................................................................16

vi) Legal services and Board affairs which includes;....................................................................16

vii) Internal Audit and Compliance which includes;....................................................................16

1.7 Organization functions.....................................................................................................................16

1.8 An elaborate structure of the IT section in URA..............................................................................17

CHAPTER TWO.....................................................................................................................................18

FIELD ATTACHMENT ACTIVITIES.................................................................................................18

2.0 HARDWARE..................................................................................................................................18

10

Page 11: Information technology Internship report

Hardware repair and maintenance.........................................................................................................18

2.1 System unit.................................................................................................................................18

2.2 Printers.......................................................................................................................................21

2.3 Automatic Voltage Regulator...................................................................................................22

2.4 Installation of Windows 7..........................................................................................................23

CHAPTER THREE.................................................................................................................................27

3.0 BSSA CRESTED TOWERS...........................................................................................................27

3.1 System Administration..............................................................................................................27

3.2 Email account not opening up:.................................................................................................35

3.3 Failed Boot:................................................................................................................................36

CHAPTER FOUR...................................................................................................................................41

4.0 WIDE AREA NETWORK..............................................................................................................41

4.1 VIRTUALISATION AND CLOUD COMPUTING.......................................................................43

4.1.2 Storage..........................................................................................................................................43

Advanced Technology Attachment.................................................................................................44

Serial ATA (SATA).........................................................................................................................44

Small Computer System Interface (SCSI).....................................................................................44

Serial attached SCSI (SAS).............................................................................................................44

Storage Area Networks and cloud storage.............................................................................................45

RAIDS...................................................................................................................................................45

RAID 0..............................................................................................................................................45

RAID 1................................................................................................................................................46

VBLOCK SYSTEM..............................................................................................................................46

CHAPTER FIVE.....................................................................................................................................47

5.0 LOCAL AREA NETWORK...........................................................................................................47

5.1 Cables:........................................................................................................................................47

5.2 LAN:...........................................................................................................................................50

5.3 Ethernet refers to an entire family of standards.....................................................................52

5.4 WLAN.........................................................................................................................................54

Planning wireless LAN:...................................................................................................................56

5.4.1 Wireless LAN security............................................................................................................56

5.4.2 Wireless security protocols.....................................................................................................57

5.5 VLAN..........................................................................................................................................57

11

Page 12: Information technology Internship report

5.5.3 Controlling Broadcast Domains with VLANs......................................................................59

5.5.4 VLAN ranges and catalyst switches......................................................................................59

5.5.5 Creating a VLAN....................................................................................................................60

CHAPTER SIX........................................................................................................................................62

6.0 IT SECURITY.................................................................................................................................62

6.1 VIRTUAL PRIVATE NETWORKS........................................................................................62

6.2 VPN CREATION.......................................................................................................................62

6.2.1 Why URA uses VPN...............................................................................................................63

6.2.2 Two types of VPN;..................................................................................................................63

6.3 FIREWALL...............................................................................................................................64

Common information security tools and techniques.....................................................................64

Instructions............................................................................................................................................64

6.4 HACKING............................................................................................................................67

CHAPTER SEVEN.................................................................................................................................68

7.0 BSSA SPOC....................................................................................................................................68

CHAPTER EIGHT.................................................................................................................................69

8.0 DISCUSSING THE EXPERIENCES..............................................................................................69

Lessons and experiences..................................................................................................................69

Challenges and limitations..............................................................................................................69

CHAPTER NINE....................................................................................................................................70

9.0 CONCLUSIONS AND RECOMMENDATIONS...........................................................................70

Recommendations............................................................................................................................70

Conclusion........................................................................................................................................70

REFERENCES........................................................................................................................................71

APPENDIX..............................................................................................................................................72

12

Page 13: Information technology Internship report

CHAPTER ONE

1.0 INTRODUCTIONHistorical Background

Uganda Revenue Authority (URA) was established by a Uganda Revenue Authority Statute of 1991 and set up in September of the same year as a central body for assessment and collection of specified revenue, to administer and enforce the laws relating to such revenue and regarding tax collection. The new organization (URA) amalgamated the three tax administration departments that were responsible for all the taxes collected by the Central Government of Uganda. These department are Customs and Excise, Inland Revenue and Income Tax Department.

The URA was created as a quasi-autonomous unit with the Board of Directors appointed by and responsible Minister of Finance. The URA statute grants a considerable degree of independence to the Board in terms of control over day-to-day operations. However the Ministry of Finance (MOFPED) maintains control over two important areas:

1. Budget: For budgetary purposes, URA is regarded as a department of the MOFPED and is subject to the same financial rules and disciplines of its other departments.

2. Revenue: The ministry sets the revenue targets and how such targets are to be spread over different tax heads.

Among the objectives, the URA was to improve the standard of tax administration and correct the weaknesses that characterized the old tax administration.

1.1.1 about industrial trainingIndustrial training refers to a program which aims to provide supervised practical training within a specified timeframe. This training can be carried out either in government organization or in private sector.

During this time a student is given an opportunity to train with already existing companies which starts after the last semester of second academic year of the I.T degree and runs within the holiday.

1.2 Objectives of industrial trainingThere are several objectives of industrial training to the student, organization and university, and some of them are listed below;

1.2.1 Objectives of industrial training to the studentThese are some of the objectives of industrial training to the student;

13

Page 14: Information technology Internship report

To give the student an opportunity to put theoretical knowledge learnt in to practice. To give the student an opportunity to gain more practical skills. To give the student an opportunity to learn how to relate with the people in the field that is to say be a team player.

To give the student exposure to the rapidly changing technological world.

To get exposed to working pressures, learning to cope up with them and

appropriately respond to them i.e. learn to beat deadline.

To develop the skill of punctuality and responsibility at the work places.

To learn to easily adapt to new working environments.

To develop a student’s computing skills in various skills like networking security.

To improve technical skills by having hands on working experience at the industrial training places.

1.2.2 Objectives of industrial training to the organizationSome of the objectives of industrial training to the organization include;The organizations aim at tapping new and bright ideas that trainees/interns usually possess, and such ideas can be used by the companies to improve their services and their earnings.

The organizations view industrial training as an opportunity for future recruitment of employees whereby trainees/interns who display exceptional abilities can be recruited by the companies in the near future.

Some organizations view industrial training as an opportunity for tapping cheap labor from the interns for that specified period of time.

It is a compulsory obligation for the companies/organizations to offer training to students from tertiary institutions such as universities, technical colleges and technical schools.

1.2.3 Objectives of industrial training to the universitySome of the objectives of industrial training to the university include; To provide the students with practical work to consolidate the theoretical work taught at the University.

To create a working link between the university and the organization where the student is training from.

The University views the industrial training places as the partners in the task of educating the students.

14

Page 15: Information technology Internship report

The students are expected to obtain new ideas from their industrial training places which when presented to the university through the reports, can help the university to modify the content of the syllabi so as to suit the job standards.

Industrial training acts as an evaluation of the universities by the companies/organizations and hence if the student interns display credible knowledge, the university gets a good recommendation.

1.3 Organization profile

Uganda Revenue Authority is a government revenue collection agency established by the parliament of Uganda. URA Is responsible for enforcing, assessing, collecting and accounting for the various taxes imposed in Uganda.

Value propositionTeamwork

• To Harness Individual talents and ideas for a common goal.

• We shall promote Team effort, Trust and Partnership to achieve our set goals.

Integrity

• We shall serve with accountability, transparency, trust, honest and consistency in all we do.

Respect

 We shall highly esteem our clients while delivering a responsive Service.

Excellence

• Excellence in service, client care, image and presentation.

• We continuously strive to offer a better service today than we did yesterday.

• We aim to exceed client expectations.

15

Page 16: Information technology Internship report

1.4 MissionTo provide Excellent Revenue Services with purpose and passion

While facilitating the payment of government revenue and providing revenue information to all

stakeholders

1.5 VisionTo be a model for best practices and innovation in Revenue services”

URA pledges to be a center of excellence, seeking out best practices in and beyond the industry and

fostering of innovation.

Code of Conduct Expected in the URA

1. Descent dressing is recommended

2. Discipline should attained

3. Confidentiality is necessary

4. Making loose talks and unguarded statements is not allowed

5. Politics engagement is not allowed

1.6 URA core values1. Excellence: we pledge to offer the highest quality of service through continuous improvement

and innovation to extend client expectations.

2. Integrity: we shall consistently serve our clients with impeccable conduct, paying attention to

the rules and regulations and taking responsibility for our actions

3. Team work: we shall promote team effort, interdependence and trust in the execution of

duties and build on the partnerships to achieve our set goals.

4. Respect: we believe that everybody matters; we shall therefore highly esteem our clients as

we strive to deliver a responsive service.

16

Page 17: Information technology Internship report

1.7 Organization structure

URA as a whole has seven departments which include;

i) Commissioner General’s Office which includes; Public and Corporate Affairs (PCA) Research and Planning (RPD) Commissioner General’s Office (CGO)

ii) Domestic tax Department which includes; Service Management. Compliance Management Business Policy Large Taxpayers’ Office. Process Management. Oil and Gas.

iii) Customs Department which includes; Field Services. Customs Audit. Trade (looks at values of imports and exports. Enforcement. Customs Compliance and Business Analysis.

17

Page 18: Information technology Internship report

iv) Corporate Service Department which includes; Finance. Human resources. Information Technology. Administration (Fleet, procurement).

v) Tax investigations department which includes; Intelligence. Investigations.

vi) Legal services and Board affairs which includes; Litigation (Representation in courts of Law). Board of affairs (policy, rulings).

vii) Internal Audit and Compliance which includes; Internal Audit. Compliance.

1.7 Organization functions

Uganda Revenue Authority provides the following services to its clients/customers in the field of information technology;

It assesses and collects taxes for national development in Uganda. It helps check in the standards of goods being imported in the Uganda.

1.8 An elaborate structure of the IT section in URA

18

Page 19: Information technology Internship report

19

Page 20: Information technology Internship report

CHAPTER TWO

FIELD ATTACHMENT ACTIVITIES

2.0 HARDWARE

Hardware repair and maintenance.

2.1 System unit.

I opened a systems unit/case and disassembled the different components found in it.The different components that I identified were;

CPU RAM chip CMOS battery South Bridge North Bridge HDD PCI slots Fan IDE cables SATA cables Motherboard Heat sink CD-drive Power Supply Unit IDE connectors BIOS

CPUThe central processing unit (also known as the microprocessor) is the brain of

computer it is where the processing of data takes place. It carries out the instructions of a computer program by performing basic arithmetic, logical, control and I/O operations.

The CPU has four primary functions: fetch, decode, execute and writeback.Fetch

The CPU gets the instruction that it needs to run in a program and each instruction in a program is stored in a specific address.The CPU has a program counter which keeps track of the CPU’s position in the program.Decode

Here the compiler of a specific language breaks down the code in Assembly language that the CPU understands. Then the Assembler translates assembling language into binary code.Execute

Using the ALU the computer performs extremely complicated mathematical calculations.Moves data from one location to another

20

Page 21: Information technology Internship report

Jumps to different locations based on decisions made by the CPU itselfWriteback

For every process the CPU produces some sort of output and it writes it into the computer memory.There are two types of processors and they include;

Pinned processors Pin less processors

Pinned processors

RAM chipIt is best known as computer memory. It is referred to as ‘random access’ because you can access any memory cell directly if you know the row and column that intersect at that cell.RAM has volatile memory which means the stored information on it is lost when there is no power.RAM is used by the CPU when a computer is running to store information that needs to be used very quickly, but the information is not stored permanently.

CMOS batteryCMOS is a physical part on the motherboard. It is a memory chip that houses setting configurations and is powered by an onboard battery. It is reset in case the battery runs out of energy.The CMOS battery power codes that runs before the operating system is loaded in a computer. The common tasks completed are; activating the keyboard, loading the system drives and setting the system clock.

South BridgeSouth Bridge is an IC on the motherboard responsible for hard drive controller, I/O controller and integrated hardware.Integrated hardware may include; the sound card, video card if on the motherboard, USB, PCI, IDE, BIOS and Ethernet.

North BridgeIt is an Intel chipset that communicates with the computer processor and controls interaction with the memory PCI bus, Level 2 cache and all AGP activities.

Hard Disk DriveIts purpose is to store data or information permanently.

PCI slotsThese refer to a computer bus. It helps the computer to connect to peripheral add-on devices such as a PCI video card.

Fan

21

Page 22: Information technology Internship report

There are two fans in the systems unit, one on the power supply and other on-top of the CPU. Help in cooling the computer especially the CPU.

IDE cablesThe IDE cables connects CD drives and Hard drives to the motherboard. They transfer data and commands between the devices but not power.

SATA cablesIt is computer bus interface for connecting host bus adapters to mass storage devices such as hard disk drives and optical drives.

CD driveThe computer uses this to read data encoded digitally on a compact disc.

Power Supply UnitPSU converts main AC to low-voltage DC power for the internal components of the computer.

IDE connectorsIt helps connect IDE devices to the motherboard. And this is done by the help of the IDE connectors.A single IDE channel/connector can more two connected devices thus the two share the channel that is to say a single request is processed at a time.

BIOSBIOS works hand in hand with the CMOS and the bios help set up the computer and boot the operating system.BIOS has drivers which are low-level drivers that give the computer basic operational control over your computer’s hardware.There is a BIOS setup that help in configuration of hardware settings including system settings like time, date and computer passwords.

Motherboard It holds many crucial components of a computer together, including the CPU, RAM and connectors for input and output devices.

2.2 PrintersI got the chance to fix printers that had several problems. Some of the problems were;

Some were missing cartridges, Some had fuser errors i.e. had torn sleeves, Other fuser errors were because the connector of the cable connecting from fuser to

printer board was missing.

For the first problem, the printer was easily fixed by just inserting a cartridge

22

Page 23: Information technology Internship report

Toner cartridge is a component of a laser printer. It contains toner powder, a fine dry mixture of plastic particles, carbon and black or other coloring agents that make an actual image on the paper.The toner is transferred to paper via an electrostatically charged drum unit, and fused onto the paper by heated rollers during the printing process.

For the second problem, I removed the fuser and disassembled it so that I could replace the sleeve. It was an interesting thing because removing the sleeve needed a lot of skill and finesse and most importantly something I noted that the work was greasy and the sleeve shouldn’t have any grease on it.

SLEEVE:

23

Page 24: Information technology Internship report

FUSER:

The third problem was challenging but I managed to fix it.I fixed it by completely opening two printers and changed the cable that connects the fuser to the printer board.The messed cable connecting the fuser to the printer

A fuser unit is a pair of heated rollers within the printer that fuses the toner onto the paper being printed on. Toner particles are pulled to the paper to create the desired text and images as the paper passes the imaging drum.

2.3 Automatic Voltage RegulatorThe AVR maintains constant voltage and power line conditioning to the equipment load, even when the input voltage, frequency or system load vary widely.Some of the functions of the AVR;

Drop voltage in a facility Solve the cost of voltage problem

Some voltage regulators are manually set or configured due to different input voltage but they are configured basing on certain things which include; response time and operating frequency.

I managed to open the AVR and saw the different components found inside.

Electronic charge wire is wound around a magnet where there is a magnetic field when current starts flowing through the circuit it maintains the voltage to the needed voltage by moving along the wound wire which marks different voltage levels.

AVR is connected to the main power source. Then the UPS which is eventually connected to the computer system that helps in backup information in case power is off.

24

POWER-SOURCE AVR UPS COMPUTER

SYSTEM

Page 25: Information technology Internship report

2.4 Installation of Windows 7When installing an operating system you have to insert a storage device like a DVD or flash that has been made bootable with windows 7 professional stored on it.

Once it is inserted must be booted or rebooted if it is on and then the boot key should be pressed.

A black window will appear while the content on the DVD is read. Sometimes you have to choose which storage device the computer has to boot from.

Next a Starting Windows screen will appear

Windows 7 boots directly into the graphical user

interface mode. After a few minutes the first prompt comes.

Click “Next” unless you want to change some regional

settings for the installation process.

25

Page 26: Information technology Internship report

Click on the “install now” button.

Accept the license terms and click on “Next”.

Press the “Custom (Advanced)” installation type button.

The next phase is to pick the installation partition.

26

Page 27: Information technology Internship report

If you don't want to specify a specific partition to install Windows on, or create partitions on

your hard disk, click “Next” to begin the installation.

If you already have another existing partition with enough free space and want to install the

Windows 7 on that partition to create a multi-boot configuration, select the partition you want to

use, and then click Next to begin the installation.

If you want to create, extend, delete, or format a partition, click Drive options (advanced), click

the option you want, and then follow the instructions.

The setup process will now begin to copy files from the installation DVD media to the hard disk.

The computer will reboot, and the next thing you'll see is the prompt to set the user's and

computer's name. By default, the computer's name will be username-PC, where username is the

username you've entered.

Click on “Next”.

27

Page 28: Information technology Internship report

Enter the user's password. Remember this password, as it will be the ONLY user on the system,

and unless you create an additional user or enable the built-in administrator account.

Click on “Next’.

Type in the product key. If you do not have the product key at hand you can still click "Next",

and proceed with the installation. You will be asked to enter the product key after Windows is

installed.

28

Page 29: Information technology Internship report

CHAPTER THREE

3.0 BSSA CRESTED TOWERS

3.1 System AdministrationThis is individual responsibility for maintaining a multi-user computer system, including a local area network.

This can also be defined as the field of work in which someone manages one or more systems, like software, hardware, servers or workstations and its main goal is ensuring that the systems ae running effectively and efficiently.

All this must be done using an administrative account

Use the internet explorer browser,

Go to Internet options

Change home page to: bridge.ura.go.ug,

29

Page 30: Information technology Internship report

Under internet options go to connections tab,

Then the LAN settings,

30

Page 31: Information technology Internship report

Check the box for use proxy server,

Then change the proxy address to- proxy.ura.local,

Then check box for bypass proxy server for local addresses which is very important to help access other URA services on the bridge page e.g. eTax

31

Page 32: Information technology Internship report

Then select advanced and in the text area for (don’t use proxy server with addresses beginning with)

Type *.ura.*; 10.1.*; 10.2.*

32

Page 33: Information technology Internship report

After all that you must add the computer back to the domain,

Go to my computer then properties,

Select change settings then,

Select network ID, computer is a business computer, then computer uses the company domain

33

Page 34: Information technology Internship report

Set a the username and password and set the domain to URA.LOCAL

34

Page 35: Information technology Internship report

Connecting the computer back to the printer, problem is when computer is not printing.

One, you go to windows search and type in \\printerserveraddress then press enter

35

Page 36: Information technology Internship report

Then it will open a window showing all the printers on that server

Then double-click on the printer you want to connect to that’s to say the printer used on that specific floor.

Installation and uninstallation of software can only be done with administrative rights that is to say it’s done by an administrators account.

3.2 Email account not opening up:Note that the backlash (\) should be used on the username portion e.g. ura\kaweesa

This is made possible through configurations and licenses that URA follows which are provided by Microsoft.

36

Page 37: Information technology Internship report

3.3 Failed Boot:Computer system was not booting, it was requesting for a system image.

When not booting device is present in systems unit, then the operating system is corrupted.

Another problem faced was a user account being slow on a computer, and solved the problem by first removed the account and make it look like it’s the first time its logging in on any computer.

We made sure that all the important files were stored on drive C and not in the account folder.

Removing the account you go to registry editor, run window type regedit.

Then click on hkey local machine, then software and then you go to Microsoft that under software.

From Microsoft, click on Windows NT and after click on currentVersion.

Under currentVersion click the ProfileList.

Then look for folders/directories having many digits as their names and double click.

37

Page 38: Information technology Internship report

The information displayed will help you identify the account you are looking for.

It will look like this: ProfileImagePath REG_EXPAND_SZ C:\Users\KAWEESA

Installation of windows operating system on computer of staff members, and also other necessary important software e.g. jdk, Microsoft office, antivirus, WinRAR, WinZip, lynch

Manually connected computers to wireless network,

Chose security type of WPA2-Enterprise which has an encryption type of AES.

38

Page 39: Information technology Internship report

Changed connection settings, then security tab and go to settings,

Uncheck the validate by certificate box,

Then go to configure and uncheck automatically use windows logon name.

When you go back to the security tab we select the advanced settings button and we specify the authentication mode, which we make user authentication and save credentials which the user must fill in.

Checked on the server through an administrative account that had active directory tool to check which computer are not in use so that we can give the repaired computer name as those saved on the server.

Printers that are on the server are added there and given ip addresses by a tool called “MyQ”.

They are given names and then added to the domain

We backed up email by moving the emails in the archive folder manually, through the control panel, then mail to the outlook web app to check whether we are sending them to the right archive folder.

This is done when a user’s inbox is full and he/she cannot receive any more emails

We installed an operating system to a computer but first backed up data.

During the installation we didn’t format or delete any partition, we installed straight away to drive C where the old operating system (Windows) was stored in a folder called “Windows. Old” which the computer created itself.

39

Page 40: Information technology Internship report

After all the installation is done, an administrative account has to be created and given a password. We create accounts from the local users and groups and we can get there through the run window (windows key + R) and type in there lusrmgr.msc

From there we created an account called administrator and give it administrative rights

40

Page 41: Information technology Internship report

41

Page 42: Information technology Internship report

CHAPTER FOUR

4.0 WIDE AREA NETWORK

This is a telecommunications network or computer network that extends over a large geographical distance.Typically a WAN consists of two or more LANs. Computers connected to a WAN are often connected through public networks, such as the telephone system. They can be connected through lease lines or satellites. The largest WAN in existence is the Internet.

We configured routers but not real tangible routers. We used a software called Cisco Packet Tracer that helped also design network infrastructures.It helps us learn and understand how to configure routers, give network devices IP addressesAlso helps us to know what kind of cables connected to different devices.

I noticed that straight-through cables connected to different devices e.g. switch to computer while the cross-over connect to similar devices e.g. router to router.

But discover something else that with the latest technology in switch one can used a straight-through cable to connect switch to switch.

I also accomplished a task of demystifying the OSI model and the TCP/IP model.

The OSI model is comprised of 7 layers these are:

1. Application

2. Presentation

3. Session: This is layers controls dialogues (connections) between computers, it

establishes, manages and terminates connections between local and remote applications.

4. Transport: This is the fourth layer in the model; it holds PDUs called datagrams and

segments.

5. Network: This is the third layer in the model; it uses ip addresses for communication and

hold PDUs called packets. It handles the layer three communication and is responsible for

translating physical address (mac addresses) into Logical addresses.

6. Data link: This is the second layer in the model, it handles the node to node transfer and it

uses mac addresses and link logical control address. It also handles layer 2 (switching)

communication. The PDUs at this layer are frames.

42

Page 43: Information technology Internship report

7. Physical: The physical layer is the first layer; it specifies the electrical and physical

specifications of the data connection. It holds a PDU called a bit.

The TCP/IP protocol stack

This model has four layers. These are:

1. Network interface

2. Internet

3. Transport

4. Application

I also accomplished basic router and switch configurations, this included task like:

1. How to configure the hostnames

2. How to configure a few password like console passwords, vty passwords, enable

passwords

3. Banners

4. How to configure interfaces

One of the WAN architecture designed;

Above is an image of the topology I used to configure eigrp

43

Page 44: Information technology Internship report

Step 1: Enable the EIGRP routing process.

Enable the EIGRP routing process on each router using AS number 1. The configuration for RTF

is shown.

RTF(config)# router eigrp 1

Step 2: Advertise directly connected networks.

a. Use the show ip route command to display the directly connected networks on each router.

b. On each router, configure EIGRP to advertise the specific directly connected subnets. The

configuration for RTF is shown.

RTF(config-router)# network 172.16.16.0 0.0.0.255

RTF(config-router)# network 172.16.20.0 0.0.0.255

Step 3: Configure passive interfaces.

Configure the LAN interfaces to not advertise EIGRP updates. The configuration for R1 is

shown.

RTF(config-router)# passive-interface g0/0

Step 4: Disable automatic summarization.

If the topology contains discontinuous networks automatic summarization should be disabled on

each router. The configuration for R1 is shown.

RTF(config-router)# no auto-summary

Note: Prior to IOS 15 auto-summary had to be manually disabled.

Step 5: Save the configurations.

4.1 VIRTUALISATION AND CLOUD COMPUTINGURA uses large storage area networks to create storage pools and assigns them to different

virtual machines in other words provides cloud storage for servers and users.

4.1.2 Storage There are different types of hard disks and some of the include;

SATA

44

Page 45: Information technology Internship report

SCSI SSD SAS NLSAS

Advanced Technology AttachmentATA (also known as IDE) is a disk drive implementation that integrates the controller on the disk drive itself. ATA is used to connect hard disk drives, CD-ROM drives and similar peripherals and supports 8/16-bit interface that transfer up to 8.3MB/s for ATA-2 and up to 100MB/s.

Serial ATA (SATA)This is an evolution of the parallel ATA physical storage interface. Because of the shortcomings

of ATA, SATA was invented data transfer is done serially. It has a 7pin connector and data

transfer rate is 150mb/s to 300mb/s. The differences between ATA and SATA are the data

transfer modes, transfer rate and the interface module. SATA creates point-to-point connection.

Small Computer System Interface (SCSI)Data transfer is also done in parallel interface standard used by apple Macintosh computers and

Personal Computers (PCs) and many UNIX systems. This interface is used to attach different

devices to computers. Multiple devices can be connected to a single SCSI port. Its transfer rate is

80mb/s. it is an I/O bus rather than a simple interface. SCSI uses half duplex signal transmission

mode.

Serial attached SCSI (SAS)Serial Attached SCSI, an evolution of parallel SCSI into a point-to-point serial peripheral

interface in which controllers are linked directly to disk drives. SAS is a performance

improvement over traditional SCSI because SAS enables multiple devices (up to 128) of

different sizes and types to be connected simultaneously with thinner and longer cables; its full-

duplex signal transmission supports 3.0Gb/s, which provides for faster throughout of data. In

addition, SAS drives can be hot-plugged.

Multiple bits are wrapped into packets and it is able to move that single stream faster than

parallel technology.

45

Page 46: Information technology Internship report

Storage Area Networks and cloud storageURA uses large storage area networks to create storage pools and assigns them to different

virtual machines in other words provides cloud storage for servers and users. A storage area

network (SAN) is a network which provides access to consolidated, block level data storage.

A SAN typically has its own network of storage devices that are generally not accessible through

the local area network (LAN) by other devices. The cost and complexity of SANs dropped in the

early 2000s to levels allowing wider adoption across both enterprise and small to medium-sized

business environments.

Cloud storage is a model of data storage in which the digital data is stored in logical pools, the

physical storage spans multiple servers (and often locations), and the physical environment is

typically owned and managed by a hosting company.

We learnt that in virtualization three factors are put under consideration and these are;

1. The computer and its components

2. Virtual desktop infrastructure (VDI)

3. Redundancy

RAIDSRAID is redundant array independent disk. A number of disks are aggregated to form a single

logical disk. Some of the raids are; Raid 0, raid 1, raid 10, raid 3, raid 4, raid 5 and raid 6. Below

are the RAIDS used at URA;

RAID 0RAID 0 consists of striping, without mirroring or parity. The capacity of a RAID 0 volume is the

sum of the capacities of the disks in the set, the same as with a spanned volume. There is no

added redundancy for handling disk failures, just as with a spanned volume. Thus, failure of one

disk causes the loss of the entire RAID 0 volume, with reduced possibilities of data recovery

when compared to a broken spanned volume. Striping distributes the contents of files roughly

equally among all disks in the set, which makes concurrent read or write operations on the

multiple disks almost inevitable and results in performance improvements. The concurrent

operations make the throughput of most read and write operations equal to the throughput of one

46

Page 47: Information technology Internship report

disk multiplied by the number of disks. Increased throughput is the big benefit of RAID 0 versus

spanned volume, at the cost of increased vulnerability to drive failures.

RAID 1It implements striping technique where by data is written across all disks that is, each disk has a

character of data being recorded. Used for booting because of its high read speeds. The minimum

number of disks to participate in the raid is two. (RAID, 2016)

VBLOCK SYSTEMVblock systems from VCE simplify all aspects of IT and enable organizations to achieve better

business outcomes faster. Seamlessly integrating best in-class compute, network, and storage

technologies from industry leaders Cisco, EMC, and VMware, Vblock system provide dynamic

pools of resource that can be intelligently provisioned and managed to address changing

demands and rapidly shifting business opportunities (corporation, 2016).

Vblock systems environment includes the vCenter Orchestrator and vCenter Update Manager. VSphere provides the foundation of the virtual architecture allowing for the optimization of IT assets.

47

Page 48: Information technology Internship report

CHAPTER FIVE

5.0 LOCAL AREA NETWORK

5.1 Cables:I looked at data cables and a data cable is a medium that allows baseband transmission (binary 1,0s) from the transmitter to the receiver.

Types of network cables are coaxial cable, optical fiber cable and twisted pair.

Coaxial cable

Fiber optic cable

Emphasis was put most on the twisted pair type of cables.Twisted pair cabling is a type of wiring in which two conductors of a single circuit are twisted for the purpose of cancelling out electromagnetic interference (EMI).

48

Page 49: Information technology Internship report

Unshielded twisted pair

The unshielded twisted pair cables have categories which include; Category 1 Voice Only (Telephone) Category 2 Data to 4Mbps (Local talk) Category 3 Data to 10Mbps (Ethernet talk) Category 4 Data to 20Mbps (Token Ring) Category 5 Data to 100Mbps (Fast Ethernet) Category 5e Data to 1000Mbps (Gigabit Ethernet) Category 6 Data to 2500Mbps (Gigabit Ethernet)

The Cat5e runs up to 90 meters and it’s a solid core cable ideal for structural installations (PVC or Plenum). It terminated with RJ-45 connectors.

I was able to terminate cables that are very essential in networking. The two cables I terminated were:

Straight-through that connects dissimilar devices Cross-over that connects similar devices

Before termination there are necessary tools needed to do the job right and they are; Cat5e cable RJ-45 connector

49

Page 50: Information technology Internship report

Cable stripper Scissors Crimping tool

Steps to follow when making connection/termination:1. Strip cable end2. Untwist wire ends3. Arrange wires4. Trim wires to size5. Attach connectors6. Check 7. Crimp8. Test

Arrangement of wires is done following standards there; are standards A and B.o TIA/EIA 568A: GW-G OW-Bl BlW-O BrW-Bro TIA/EIA 568B: OW-O GW-Bl BlW-G BrW-Br

Standard TIA/EIA 568B.

Then the wires should be trimmed to the right size which is ½’’.

The color order should be maintain when wires are being fixed into the RJ-45 connector and the connector should be facing downwards. Make sure all the wires extend to the end of the connector.Squeeze firmly to crimp connector onto cable end.

50

Page 51: Information technology Internship report

Then finally test the cable with a cable tester.

5.2 LAN:There are two types of LANs;

Ethernet LANs Wireless LANs

5.2.1 Ethernet LANsEthernet refers to a family of LAN standards that together define the physical and data link layers of wired LAN technology.It defines the cabling, the connectors on the ends of the cables, the protocol rules and everything else required to create an Ethernet LAN.

51

Page 52: Information technology Internship report

LAN basically runs from the machine to the data socket on the wall then through the trunks to the patch panel and then to the patch panel.I started by inserting UTP cables in a data module, and that would runs from there to the patch panel. The connection/termination used must be the same at both ends (module end and patch-panel end).

One can build a LAN with both Ethernet LAN technology and wireless LAN technologyWireless LANs;

Defined by the IEEE using standards that begin with 802.11 Use radio waves to send bits from one node to next. Most wireless LANs rely on wireless access points(AP)

Building physical Ethernet LANs with UTPThe Ethernet transmits data using electricity. An electrical circuit requires a complete loop, so the two nodes, using circuitry on Ethernet ports.

Typical Enterprise LANsFor single building

52

Page 53: Information technology Internship report

5.3 Ethernet refers to an entire family of standards.And this table shows them all.

Breaking down a UTP Ethernet Link

53

Page 54: Information technology Internship report

The RJ-45 connectors are put into RJ-45 ports

Some switches have a gigabit fiber SFP sitting just outside a switch SFP port while some don’t have especially those with lesser numbers of ports. And they use a media converter to connect to the fiber cable.

5.4 WLAN Wireless is in use because business networks today want to support people who are on the move.

54

Page 55: Information technology Internship report

To provide a mobility environment where people can take their connection to the network along the road

Comparing WLAN to LAN

Wireless has quite a number of standards and table below defines all of them;

55

Page 56: Information technology Internship report

There are different types of 802.11 topologies and they include;

Ad hoc network. This basically has no access points, has a topology building block of the independent basic service set (IBSS) and a basic service area as coverage.

Basic service sets (BSS). These have one access points and the connection is basically between the client and AP. Coverage is a basic service area.

Extended service sets (ESS). This have more than one access points, connection is between client and access point. Coverage is extended service area (ESA).

Client and Access Point Association

An access point emits periodic beacon:

SSID- which is the name of the network

Supported rates

Clients with radio NICs hear the beacon.

Probing:

Step 1:

Client sends probe of SSID and supported rates.

Open authentication request that is to say the type (open, shared key) and key if the type shared key.

Step 2:

After, the access point gives an authentication response of the type, key and whether the connection is successful or unsuccessful.

56

Page 57: Information technology Internship report

Step 3:

The association request is sent by the client with the;

Client MAC address

Access point MAC address (BSSID)

ESS identifier (ESSID)

The access point returns an association response to show whether the connection is successful or unsuccessful and an association identifier if association is successful.

Planning wireless LAN:

Align coverage areas along “Z” to ensure minimize BSA overlap.

5.4.1 Wireless LAN securityThreats

There are some few wireless LAN security threats which are; hackers and even employees.

Hackers. These exploit weak privacy measures to view sensitive WLAN information and even break into WLAN.

Employees. Employees plug consumer grade APs/Gateways into company Ethernet ports to create their own WLANs.

Man in the middle attacks;

The attacker intercept the traffic of the client and access point association.

Denial of service;

57

Page 58: Information technology Internship report

Common consumer devices can interfere with WLAN devices causing denial of service.

An attacker turns the laptop into an access point. He can send CTS messages or dissociate commands. Clients also flood the WLAN causing collisions and denial of service.

Wireless security protocols

Open Access First Generation Encryption

Interim Present

SSID WEP WPA 802.11i/WPA2 No

Encryption Basic Not a

security handle

No strong authentication

Static, breakable keys

Not scalable

Standardized Improved

encryption Strong, user

based authentication (e.g. LEAP, PEAP, EAP-FAST)

AES Encryption

Authentication: 802.1X

Dynamic key management

WPA2 is the Wi-Fi Alliance implementation of 802.11i

5.4.2 Wireless security protocolsEncryption

TKIP- Temporary key integrity key

Encrypts by increasingly complex bit coding to each pocket Based on same cipher (RC4) as WEP.

AES- Advanced Encryption Standard

New cipher used in 802.11i Based on TKIP with additional features that enhances the level of provided

security.

Methods of controlling wireless LAN access;

1. SSID broadcasts from access points are off2. MAC address filtering enabled3. WPA2 security implemented

5.5 VLANVLAN is a logical partition of a layer 2 network. Multiple partitions can be created, allowing for multiple VLANs to co-exist.

58

Page 59: Information technology Internship report

Each VLAN is usually a broadcast domain usually with its own IP network.

Packets can only pass between VLANs via routers.

The partitioning of the layer 2 network takes place inside a layer 2 device, which is a switch.

5.5.1 Benefits of VLANs Security Cost reduction i.e. buying less hardware Better performance Shrink broadcast domain Improved IT staff efficiency

There are different types of VLANs and they include;

Data VLAN Default VLAN Native VLAN Management VLAN

5.5.2 Voice VLANsVoIP traffic is time-sensitive and requires: Assured bandwidth to ensure voice quality

59

Page 60: Information technology Internship report

Transmission priority over other types of network traffic.

Ability to be routed around congested areas on the network.

Delay of less than 150 ms across the network

The cisco 7690 IP phone has two RJ-45 ports that each support connections to external devices.

Network port (10/100 SW) – Use this port to connect the phone to the network. The phone can also obtain inline power from the cisco catalyst switch over this connection.

Access port (10/100 PC) – Use this port to connect a network device, such as a computer, to the phone.

5.5.3 Controlling Broadcast Domains with VLANsVLANs can be used to limit the reach of broadcast frames.

A VLAN is a broadcast domain of its own.

A broadcast frame sent by a device in a specific VLAN is forwarded within that VLAN only.

VLANs help control the reach of broadcast frames and their impact in the network.

Unicast and multicast frames are forwarded within the originating VLAN.

5.5.4 VLAN ranges and catalyst switches Cisco catalyst 2960 and 3560 series switches support over 4000 VLANs.

VLANs are split into two categories:

Normal range VLANs

VLAN number from 1 to 1005

Configurations stored in the vlan.dat (in the flash memory)

VTP can only learn and store normal range VLANs.

60

Page 61: Information technology Internship report

5.5.5 Creating a VLAN

Assigning ports to VLANs

61

Page 62: Information technology Internship report

62

Page 63: Information technology Internship report

CHAPTER SIX

6.0 IT SECURITY In IT security is the protection of information systems from theft or damage to the hardware, the software and to the information on them, as well as from disruption or misdirection of the services they provide.

It also refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization.

Physical security involves individual, biometrics where individuals at URA are given access

codes, passwords, fingerprints to access any main door to any room or office and even server

room. Fire extinguishers in case of fire catastrophes, smoke sensors are put in place for sensing

smoke in case of smoke outbreak, racks for server equipment protection.

Network security quite a number of things are put in place like;

Firewalls, antiviruses like Symantec, network detection system, access control lists etc.

6.1 VIRTUAL PRIVATE NETWORKSThis is a technology that creates an encrypted over a less secure network. This is a private network that extends across a public network or internet.

VPN gives extremely secure connections between private networks linked through the internet. It

allows remote computers to act as though they were on the same secure local network.

6.2 VPN CREATIONVPN is created by establishing a virtual point to point connection through the use of dedicated

connections, virtual tunneling protocols traffic.

A virtual private network connection access the internet is similar to a wide area network (WAN)

link between sites. VPN allows URA employees to securely access their intranet while out of

office. In simple terms the VPN securely connect geographically separated offices of an

organization (GirlTrucker, 2016).

VPN technology is also used by internet users to connect to proxy servers for the purpose of

protecting personal identity and location.

63

Page 64: Information technology Internship report

6.2.1 Why URA uses VPN VPN allows employees to be home and access organizations computers in the same way

as if you in the sitting at work

Almost impossible for someone to tap or interfere with data in the VPN tunnel

If you have VPN client software on a laptop, you can connect to your organization from

anywhere in the world

6.2.2 Two types of VPN; VPN client-to-server (client-to-box)

VPN Server-to-server (Box-to-box)

VPN client-to-server (client-to-box)

VPN server-to-server (box-to-box)

64

Page 65: Information technology Internship report

6.3 FIREWALLFirewall is a layer of security between your home and the internet since a router modern is the main connection from a home network to the internet, a firewall is often packaged with those devices (Michael, 2014).

Perimeter defense are set in information security with use of firewalls.

A firewall typically establishes a barrier between a trusted, secure internal network and another outside network, such as the internet, that is assumed not be secure or trusted.

Firewalls are often categorized as either network firewalls or host based networks. Network firewalls are a software appliance running on general purpose hardware or hardware firewall computer appliances that filter traffic between two or more networks.

Firewall rules can be set and access control lists are be created. An Access Control List (ACL) is a list of access control entries. Each ACE in an ACL identifies a trustee and specifies the access rights allowed, denied, or audited for that trustee (microsoft, 2016).

Common information security tools and techniquesThere are several IT security tools and techniques used to ensure security for both information and the network are secure. Some of the techniques are;

Port scanning done using Ssh, putty, sysinternals

Download steps for putty

Instructions

1. Download Putty from http://www.chiark.greenend.org.uk/~sgtatham/putty/ or another Putty download source. The "putty.exe" download is good for basic SSH.

2. Save the download to your C:\WINDOWS folder.3. If you want to make a link to Putty on your desktop:

o Open the C:\WINDOWS folder in Windows Explorer.o Right click on the putty.exe file and select Send To > Desktop

4. Double-click on the putty.exe program or the desktop shortcut to launch the application.

NOTE:

65

Page 66: Information technology Internship report

You may receive a warning that the publisher cannot be verified. If you have downloaded this program from a good source, select Run. While (mt) Media Temple cannot vouch for third-party servers, the link provided above is generally a good source for Putty.

5. Enter your connection settings:

o Host Name: example.com OR s00000.gridserver.como Port: 22 (leave as default)o Connection Type: SSH (leave as default)

6. Click Open to start the SSH session.7. If this is your first time connecting to the server from this computer, you will see the

following output. Accept the connection by clicking yes.

66

Page 67: Information technology Internship report

8. Once the SSH Connection is open, you should see a terminal prompt asking for your username:

9.10. login as:

Connect with your SSH user of choice.

11. Next, enter your password. Please note that you will NOT see your cursor moving, or any characters typed (such as ******), when typing your password. This is a standard Putty security feature. Hit enter.

12.13. Using keyboard-interactive authentication.14. Password:15. You are now logged into your server with SSH. You should see output like this: 16.17. The programs included with the Debian GNU/Linux system are free software;18. the exact distribution terms for each program are described in the19. Individual files in /usr/share/doc/*/copyright.20.21. Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent22. Permitted by applicable law.23. example.com@n11:~$

You can begin typing commands at the prompt.

Network packet traffic capture and analysis done using Wireshark/tcpdump/tshark/netcat which capture, read, save, filter src/dst/host/net.

Tcpdump is a common packet analyzer that runs under the command line.it allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Network flow analysis using (cisco netflow-PRTG), cacti etc.

67

Page 68: Information technology Internship report

6.4 HACKINGThere are three types of hackers which include;

White-hat hackers Gray-hat hackers Black-hat hackers

6.4.1 Phases of hacking:Reconnaissance-information gathering, physical and social engineering, locate network ranges.

Scanning-enumerating live hosts, open ports, open services, access points, accounts and policies.

Gaining access-breach systems, plant malicious code, backdoors

Maintaining access-rootkits, unpatched systems

Covering tracks-IDS evasion, log manipulation code, backdoors.

68

Page 69: Information technology Internship report

CHAPTER SEVEN

7.0 BSSA SPOCBSSA SPOC stands for Business Support and Systems Administration while SPOC is Single Point of Contact.

Under this section is where you find the IT service help desk. The help desk is an

The IT help desk has several functions. It serves as a central point for receiving help on different computer issues. The help desk manages its requests via the help desk software (synergy) that allows them to track user requests with a unique ticket number this cab also be called the ‘LBT’ local bug tracker.

There is an automated system for tracking customer service calls. To enable both customer and

IT management know (at all times) to what extent his/her case has been handled. To provide

current and historical data to all customer service requests.

Request coming to IT division are centralized to this IT desk, so that the customer get standard,

predictable and efficient response to their queries from us.

We use a software package known as Pro-synergy LAN support, which is used to allocate

work /tasks to the different IT officials/personnel responsible for that particular query that comes

to in.

Sometimes we would offer online support by directing callers on what to do directly over phone.

if such fails, then a job would be loaded in to synergy which would alert the concerned It officer

to respond to the problem. After the problems solved, the officer must enter a resolution into the

system to confirm the completion of the job.

The Synergy-pro LAN support System

Modules

Master call List A list of calls and to whom

each job has been assigned

Shows what jobs are pending

and finished jobs .And who is

handling what job.

New /Edit call Identity of caller (Full Names

and Contacts)

Give provision for logging in

a job

Clients Alphabetic List of client

Users giving details of login

69

Page 70: Information technology Internship report

IDs and contacts all over the

country

Description Full details of the call The caller should as much as

possible provide enough

information about the

call/problem. As much as

possible caller should avail

his/her contact address

(phone, email etc…..) in

addition to department and

location. So that we are able

to contact him/ her later.

Priority These levels are:

-custom

-High

-Low

-Normal

Priority need to be

differentiated to enable IT

officials respond accordingly

to a logged on job/call

70

Page 71: Information technology Internship report

Problem category Category

-printers

-ASYCUDA

-Documentation manuals

-DTI connections

-internet

-Intranet

-LAN (Local Area Network)

-Machine

-Microsoft office product

-Network

-New equipment

configuration

-password

-printers

-Repairs

-Maintenance

-Schedule

-System

-Telephone

-URA application updates

These different categories are

filled into the system by IHD

personnel depending on the

clients’ complaints and

statement.

System Users Alphabetic list of all IT

personnel giving details of

extensions, mobile contacts

and their specialization

preferences.

71

Page 72: Information technology Internship report

IT HELP DESK CATEGORIES ELABORATED

Category Subcategory

Application support

-Asycuda connection

-Asycuda support

-Microsoft product support

- Microsoft product installation

-URA business application support

-Anti-virus software support

-Anti-virus software installation

Printing support -Printer installation

-Network printing

-Printer repairs

Authentication support -Mail/intranet support

-Windows logon

Computer support -Computer repairs

-New computer configuration

-Computer warranty

UPS support -UPS installation

-UPS repairs

-UPS warranty

Network support -LAN setup

-DTI connection

-LAN troubleshooting

-Network equipment support

Server support -Failed database connection

-Failed domain controller

-Failed DHCP

72

Page 73: Information technology Internship report

CHAPTER EIGHT

8.0 DISCUSSING THE EXPERIENCESLessons and experiences

A lot of experience as far as the Uganda Revenue Authority work ethics and day to day activities were concerned.

First and fore most I learnt how to be punctual. URA is a busy organization and work had to be done as early as possible especially the service desk section. Arrival time was 8am but the service desk one had to arrive at 7am.

I learnt how to terminate cables which is one of the ICT fundamentals. It helped me learn how to use certain tools like the crimping tool.

In hardware repair and maintenance was able to learn how to troubleshoot a printer that is to say find what problem it has. Fix fuser units, replace cartridges.

In the LAN was able to know learn to create VLANs and to punch in wires into data modules that are on patch panel following the different standards learnt in theory class.

I was able to learn how to install tow operating systems into one computer system. I was also to learn to clear vivid knowledge about IT security which am yet to learn in

my 3rd year. Got to know different tools used in IT security like tcpdump, Wireshark .etc.

At the service desk was able to learn how to create for people accounts using the active directory tool.

At the BSSA at crested towers and other stations that I was taken I was able to installed different software like anti-viruses e.g. Kaspersky, even Microsoft Office and even set proxy setting on computer system that couldn’t access intranet services.

I was also able to learn how to work efficiently under minimal supervision since I was deployed at different stations where I was minimal supervision but worked fast and efficiently.

Smartness and decency was emphasized at URA where I easily maintained my university’s decent dress that gave me credit.

Challenges and limitations Limited time that made it impossible to continue with further training for detailed

understanding of certain things like security Some users were impatient when some computers were being worked on. Financial constraint especially meals that were costly and were not provided by the

organization. This led to high daily expenses. Lack of identification by other staff from other stations due to lack of IDs. High ranking officers who were so tough not allowing interns to work on their laptops.

73

Page 74: Information technology Internship report

CHAPTER NINE

9.0 CONCLUSIONS AND RECOMMENDATIONSRecommendations This is my first industrial training/internship in my university and I strongly recommend that;

The different departments and faculties in the university should look for internship places for the students because some of the students panic and cannot settle or concentrate because they have failed to get companies to work with.

The university should establish partnership with organization so that they can secure internship placements for students.

It should be mandatory for organizations/companies to offer industrial training/internship to students so as to build on human resource capacity.

Uganda Revenue Authority is a very good and favorable environment for internship full of lots of new information technology practical aspects that are essential with the modern digital technology. The place is well organized and suitable for trainees who are willing to learn.

ConclusionInternship/industrial training has been life changing experience in my information technology career full of lots of things to learn starting from self-discipline to practical application of theory learnt in class, therefore I conclude by saying that the field attachment I carried out at Uganda Revenue Authority was very important and relevant to me, has taught me a lot and expanded on my knowledge in the world of technology.

I sincerely thank the university, field supervisors and team members for their support. There has been a spirit of team work and commitment, and I am now an overall better person, both socially and intellectually.

74

Page 75: Information technology Internship report

REFERENCES

http://bridge.ura.go.ug

75

Page 76: Information technology Internship report

APPENDIX

76

Page 77: Information technology Internship report

disassembled and removed cable connecting to the fuser unit

77

Page 78: Information technology Internship report

78


Recommended