Escolar Documentos
Profissional Documentos
Cultura Documentos
The report is all about the fieldwork practical training at Tanzania electric supply company
(TANESCO.) In manyara region, the eight weeks fieldwork attachment was started from 27th July
2015 to 20th September 2015, the aim of attachment was to get the link between the theories
learnt in the class programs and their application in real work. The fieldwork involves the direct
participation of field staff in any activities in computer technology.
The practical training program which took eight weeks took place between July and September
each year and it compulsory to the students pursuing Bachelor of Science in information
technology. The practical training constitutes the first and second year, whereby later the student
has to prepare report on what he or she has observed, experienced and exposure to the
organization in which a student is attached for such training.
This report examines the current state of computer technology and outlines operation of
computer parts and how to troubleshoot them. These are integrated into business and industries
to help in problem solving capabilities that normally are the responsibilities of the final IT
department in TANESCO.
The report is consist of the four parts, the first part deals with the department roles and
responsibilities of the IT department in general, and second focus in lessons learned during the
practical training period that focused on computer maintenance and networking configuration
and the third part involves literature review, analysis, last focus in conclusion and
recommendation and references.
ACKNOLEDGEMENT
First I express my sincere thanks to God Almighty for granting me the whole period of my
practical training.
The accomplishment of this training is the result of various ideas and help from various sources
therefore I express my sincere gratitude to all who assisted me in one way or another especially
my lovely family who were very instrumental during my field attachment.
I wish to pay tribute to Tanesco manyara management and all staff, Special thanks also go to the
Regional business application officer Mr. Albert Rwezaula who guided me through various ways
to accomplish my field attachment and this report.
Also the thanks should go to Dr. Dossa Massa Ifm field supervisor who guide and instruct during
report writing.
My sincere appreciation is extended to my fellow students who supported me in one way or
another during my preparation of this report and through the whole period of my training.
I cannot end this list without paying tribute to the entire IFM, Faculty of computing, information
system and mathematics Lecturers for their constructive training and the knowledge they have
imparted in me throughout the years training. May God bless you all.
ii
ABBREVIATION
ATM
DNS
DHCP
TANESCO
CD
Compact disc
DVD
IT
Information technology
OS
Operating system
IFM
IPPs
ZECO
LAN
TCP/IP
RJ
Registered Jack
CMD
Command Prompt
WAN
MAN
FDDI
STP
UTP
iii
TABLE CONTEBTS
EXECUTIVE SUMMARY.................................................................................................. i
ACKNOLEDGEMENT..................................................................................................... ii
ABBREVIATION........................................................................................................... iii
TABLE CONTEBTS....................................................................................................... iv
CHAPTER ONE.............................................................................................................. 2
1.0
Overview.......................................................................................................... 2
1.1
1.2
1.3
CHAPTER TWO............................................................................................................. 5
2.0
TASKS PERFORMED......................................................................................... 5
2.1
Networking.................................................................................................... 5
2.2
CHAPTER THREE........................................................................................................ 10
3.0
3.1
Computer networking...................................................................................... 10
3.2
3.3
3.3.1
CHAPTER FIVE........................................................................................................... 17
5.0
5.1
RECOMMENDATION TO IFM........................................................................17
5.2
CONCLUSION............................................................................................. 17
iv
CHAPTER ONE
INTRODUCTION
1.0 Overview
I have prepared this report basically for the purpose of submitting it to the institute of finance
management (IFM) as part of practical training assessment. Practical training program as it is a
very useful tool to enable the students to apply practically what she or he has learnt theoretically
at the different modules. This is intended to focus on encouraging students to analyze some of
the causes and implications of many of the most pressing problems confronting people at their
work places. This enhances and provides thoughts, discussions and debates among students in
their practical experiences.
three (43) substations interconnected by transmission lines. Transmission lines use pylons made
of still. Almost all the transmission lines are radial single circuit lines. The system is all
alternating current (AC) and the system frequency is 50 Hz.
Distribution and Customer Services
The marketing Business Unit stands at the customer end of the electricity supply chain and is
therefore Tanescos major interface with customers. It deals with distribution of electricity,
promotion of services and all customer service matters. The unit is headed by a General Manager
who is assisted by two senior managers; a senior manager for marketing and customer service on
the one hand and a senior manager for distribution on the other. Services of the Marketing
Business Unit are delivered to customers through a network of 24 Tanesco defined regions. To
ensure effective management of operations, these regions are clustered into five zones each
headed by a Zonal Manager.
Vision
To be an efficient and commercially focused utility supporting the development of Tanzania
Mission
To generate, transmit and supply electricity in the most effective, competitive and sustainable
manner possible
CHAPTER TWO
WORKDONE AND LESSON LEARNT
vii
2.1 Networking
What was being done in the field at large extent is concerned with networking, sometimes
upgrading and repairing of computer systems, in networking the major activities were
preparation of network cables, network and internet connection, resource sharing such as printer,
network management and troubleshooting, also responsible to provide help and support to the
other staffs (non-IT specialists) in upgrading and repairing of computer network systems.
Preparation of network cables
If the defective cable found it has to be replaced so as to ensure that the system is operating
effectively. The main source of connection failure is the presence of defective cables, cables may
fail to work properly due to the number of reasons either the insulation has been cut off by the
time when the exterior cover is removed.
Network connection
Refers to the process of enabling a computer system to access the network. The authorization of
the user of the computer system to access the network is done by the system administrator by
assigning unique IP address to every host computer. There are two ways of assigning IP address
to the computer system that have to be connected to the internet, the first one allows a user to
obtain IP address automatically and the second one needs the system administrator to enter IP
addresses. The DNS server configuration and the alternate DNS server configuration. there are
two options for internet configuration either by allowing the user computer to obtain DNS server
address automatically or by setting the DNS server address manually by the system administrator
,this allows only the authorized user to access the internet and others remain using the
TANESCO local area network
viii
The lesson I learnt from the task is that for any computer system to connect to the network must
have a particular combination of TCP/IP protocol settings, also there are two ways of connecting
the computer to the internet either by using fixed IP address or allowing to obtain IP address
automatically.
Sharing of resources through the network
Sharing of resources means to enable little number of resources that you have to be used by a
large number of users, things like files, printers, scanners can be shared through the network.
One of the resources that was configured to be shared is the printer.
Network printer configuration
The first thing is to make sure that you have installed drivers for a particular printer. Set up a
printer for sharing means to make it available to the computers connected to the network. Then
choose the share this printer option and give the printer a share name. This name will be used to
locate and identify the printer on the network, so it should be not more than 8 letters and no
spaces or characters.
The lesson I learnt from this task is that, for any resource to be shared through the network, the
devices need to share the resource must belong to the same WORKGROUP.
A WORKGROUP is the collection of individuals who share the same files or other resources
over the LAN.
Network requirement tools used
o
Router , Link [CAT network cable], Connectors [RJ], Mail server ,Website server
debris from cooling fans, power supplies, and other hardware components. Dust may accumulate
as a result of air cooling. Any filters used to mitigate this need regular service and changes. If the
cooling system is not filtered then regular computer cleaning may prevent short circuits and
overheating.
Disk Defragmentation
Defragmentation is a process that reduces the amount of fragmentation. It does this by physically
organizing the contents of the mass storage device used to store files into the smallest number of
contiguous regions (fragments). It also attempts to create larger regions of free space using
compaction to impede the return of fragmentation.
Disk Cleanup
Disk Cleanup helps to reduce the number of unnecessary files on computer drives, which can
help PC to run faster. It can delete temporary files and system files, empty the Recycle Bin, and
remove a variety of other items that you might no longer need. Delete cookies/temp file Delete
of temp file and cookies, run the %temp%.
Data recovery from shortcut virus
I have learned how to recovery the data attacked by shortcut virus, procedures is by running
CMD, (command prompt) then fix with attrib -h -r -s /s /d g:\*.* code. Where h: to unhide all
files on drive.-r: create the files in drive is free of read-only attribute.-s: making all files on drive
to be not part of the system again.
Installation of Antivirus software
Anti-virus software is a program installed for the purpose of detecting viruses and preventing
them from destroying the system or from performing any undesirable act.
Anti-virus scan is the process in which antivirus program used to examines the computer
suspected of having a virus and eradicate any viruses if found.
The lesson I learnt from this task is the installation and update of the viruses software so that
viruses developed everyday by different organizations and individuals for commercial purpose so
the regular update of antivirus will help to identify the new viruses.
Window installation
A Microsoft window is a progression of interface operating systems developed, marketed, and
sold by Microsoft. This is a person computer operating system from Microsoft that together with
some commonly used commerce applications such as Microsoft office, has become a defector for
individual users in most corporations as well as in most homes. There are several versions of
windows such as windows XP, window vista, windows 7, windows 8 and window 10.
We check all hardware to ensure that it is compatible with the version of windows to install
Repair of Operating system
I did this for those computers which were not necessary to format them. In the process of
repairing an operating system I inserted a bootable CD containing operating system to the
particular computer and allow computer to boot from a CD-ROM and in the options we selected
repair window during installation procedure to repair folders of the operating system which
caused problems.
Driver installation and Update
This is sometimes appears after installation of windows you now need to check the device
manager to confirm that all the drivers has been loaded or if there are any conflicts. From the
start menu select Start -> Settings -> Control Panel. Click on the System icon and then from the
xi
System Properties window select the Hardware tab, then click on Device Manager. If there are
any yellow exclamation mark "!" next to any of the listed device, it means that no drivers or
incorrect drivers has been loaded for that device. Your hardware should come with manufacturer
supplied drivers. You need to install these drivers using the automatic setup program provided by
the manufacturer or you need to manually install these drivers. If you do not have the drivers,
check the manufacturers website to download them.
CHAPTER THREE
ANALYSIS
xii
Local Area Network A computer network spanned inside a building and operated under single
administrative system is generally termed as Local Area Network (LAN). Usually, LAN covers
an organization offices, schools, colleges or universities LAN provides a useful way of sharing
the resources between end users. The resources such as printers, file servers, scanners, and
internet are easily sharable among computers. LAN uses either Ethernet or Token-ring
technology. Ethernet is most widely employed LAN technology and uses Star topology, while
Token-ring is rarely seen. LAN can be wired, wireless, or in both forms at once
o Metropolitan Area Network (MAN)
The Metropolitan Area Network generally expands throughout a city such as cable TV network.
It can be in the form of Ethernet, Token-ring, ATM, or Fiber Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand
their Local Area Networks. For example, MAN can help an organization to connect all of its
offices in a city. Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in
between Local Area Network and Wide Area Network. MAN provides uplink for LANs to
WANs or internet.
o Wide Area Network (WAN)
As the name suggests, the Wide Area Network covers a wide area which may span across
provinces and even a whole country. Generally, telecommunication networks are Wide Area
Network. These networks provide connectivity to MANs and LANs. Since they are equipped
with very high speed backbone, WANs use very expensive network equipment.
Bus topology, all devices share single communication line or cable. Bus topology may have
problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses
CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the
simple forms of networking where a failure of a device does not affect the other devices. But
failure of the shared communication line can make all other devices stop functioning. Both ends
of the shared channel have line terminator. The data is sent in only one direction and as soon as it
reaches the extreme end, the terminator removes the data from the line
o Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point
to-point connection. As in Bus topology, hub acts as single point of failure. If hub fails,
connectivity of all hosts to all other hosts fails. Every communication between hosts takes place
through only the hub. Star topology is not expensive as to connect one more host, only one cable
is required and configuration is simple.
o Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a circular
network structure. When one host tries to communicate or send message to a host which is not
adjacent to it, the data travels through all intermediate hosts. To connect one more host in the
existing structure, the administrator may need only one more extra cable. Failure of any host
results in failure of the whole ring. Thus, every connection in the ring is a point of failure. There
are methods which employ one more backup ring.
o Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts in
point-to-point connection with every other host or may also have hosts which are in point-topoint connection with few hosts only. Hosts in Mesh topology also work as relay for other hosts
which do not have direct point-to-point links. Mesh technology comes into two types:
xv
o Full Mesh: All hosts have a point-to-point connection to every other host in the network.
Thus for every new host n(n-1)/2 connections are required. It provides the most reliable
network structure among all network topologies.
o Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts
connect to each other in some arbitrarily fashion. This topology exists where we need to
provide reliability to some hosts out of all.
Transmission media
The transmission media is nothing but the physical media over which communication takes place
in computer networks.
Twisted Pair Cable
A twisted pair cable is made of two plastic insulated copper wires twisted together to form a
single media. Out of these two wires, only one carries actual signal and another is used for
ground reference. The twists between wires are helpful in reducing noise (electro-magnetic
interference) and crosstalk.
There are two types of twisted pair cables:
o Shielded Twisted Pair (STP) Cable
STP cables comes with twisted wire pair covered in metal foil. This makes it more indifferent to
noise and crosstalk.
o Unshielded Twisted Pair (UTP) Cable
UTP has seven categories, each suitable for specific use. In computer networks, Cat5, Cat-5e,
and Cat-6 cables are mostly used. UTP cables are connected by RJ45 connectors.
Coaxial Cable
Coaxial cable has two wires of copper. The core wire lies in the center and it is made of solid
conductor. The core is enclosed in an insulating sheath. The second wire is wrapped around over
the sheath and that too in turn encased by insulator sheath. This all is covered by plastic cover.
Because of its structure, the coax cable is capable of carrying high frequency signals than that of
xvi
twisted pair cable. The wrapped structure provides it a good shield against noise and cross talk.
Coaxial cables provide high bandwidth rates of up to 450 mbps.
There are three categories of coax cables namely,
o RG-59 (Cable TV),
o RG-58 (Thin Ethernet), and RG-11 (Thick Ethernet).
o RG stands for Radio Government.
Cables are connected using BNC connector and BNC-T. BNC terminator is used to terminate the
wire at the far ends.
Fiber Optics Fiber Optic
Fiber Optics Fiber Optic works on the properties of light. When light ray hits at critical angle, it
tends to refracts at 90 degree. This property has been used in fiber optic. The core of fiber optic
cable is made of high quality glass or plastic. From one end of it light is emitted, it travels
through it and at the other end light detector detects light stream and converts it to electric data.
Fiber Optic provides the highest mode of speed. It comes in two modes, one is single mode fiber
and second is multimode fiber. Single mode fiber can carry a single ray of light whereas
multimode is capable of carrying multiple beams of light.
Fiber Optic also comes in unidirectional and bidirectional capabilities. To connect and access
fiber optic special type of connectors are used. These can be Subscriber Channel (SC), Straight
Tip (ST), or MT-RJ.
mask, the default gateway and the DNS server(s). If you understood any of what I just said, you
probably have the skills and knowledge necessary to manage static IP addresses on a home
network.
Dynamic Host Configuration Protocol (DHCP)
DHCP takes all of the manual work out of IP addressing. Generally, the device that's at the "top"
of your home network whether it's a standalone firewall or a router/gateway device it provide
DHCP by default as a service on the network. When DHCP is enabled, a new device connected
to the network asks the DHCP server for an address, and the server assigns one from its pool of
unused locations. The server itself tracks which addresses are used and which addresses are
available, and keeps a record of which addresses have been assigned to the various devices. This
ensures that addresses don't conflict with each other. However, it also means that, if a device
goes offline, when it reconnects it may not have the same IP address it had before.
Mixing Configurations
It's entirely possible to mix static IP and DHCP addressing schemes. Since the default DHCP
address range is between 100 and 149, you'll want to avoid all of the addresses between
192.168.1.100 and 192.168.1.149 when you're assigning static IP addresses. That leaves the
ranges from 2-99 and from 150-254 wide open, which is usually plenty for most home networks.
CHAPTER FIVE
CONCLUSION AND RECOMMENDATION
5.0
All my appreciation to TANESCO, it was very good to do my training around there, I would like
to recommend that the team work is very important aspect also they should work hard to meet
their objective.
o The organization should establish policies to ensure the regular assessment of the system
performance; this will help to identify major critical areas that cause frequent system
failures.
xix
o The organization should encourage regular training to its staffs so as to make sure they
are well knowledgeable and experienced enough for proper control and management of
the system.
5.1
RECOMMENDATION TO IFM
During my practical training in the whole course that I have been taking, I noticed some aspects
that I would like to suggest , first about handling the gap in the placement process and also
second on narrowing the gap between teaching theories and practicals. All these
recommendations aims on how to improve the practical training and how to enhance the students
to acquire the knowledge that they intend to get during the practical training and also the skills
that they get through training
The institution should increase more practical tools and trainees who have qualified on the use of
the computer technology.
5.2
CONCLUSION
I can conclude by saying that I enjoyed during the training since I got new knowledge, skills
about computer technology as well as on how to interact with people at the organization of
different behaviors and altitude.
REFERENCES:
Book references
Logbook
The Protocols TCP/IP Illustrated, Volume 1 ) W. Richard Stevens
Online references
http://www.pccomputerrepairs.co.uk/
http://www.cpointcc.com/
xx