Successfully reported this slideshow.
Your SlideShare is downloading. ×

Internship_Report_Information_Technology.pdf

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
i
MAKERERE UNIVERSITY
MAKERERE UNIVERSITY BUSINESS SCHOOL
FACULTY OF COMPUTING AND INFORMATICS
DEPARTMENT OF APPLIED COMPU...
i
DECLARATION
I OYOO WILFRED declares that this report written in partial fulfillmentfor the award of
Bachelor Degree of B...
ii
APPROVAL
This report has been written and submitted for Examination with approval of the undersigned
supervisor
Academi...
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement

Check these out next

1 of 65 Ad

More Related Content

Similar to Internship_Report_Information_Technology.pdf (20)

Recently uploaded (20)

Advertisement

Internship_Report_Information_Technology.pdf

  1. 1. i MAKERERE UNIVERSITY MAKERERE UNIVERSITY BUSINESS SCHOOL FACULTY OF COMPUTING AND INFORMATICS DEPARTMENT OF APPLIED COMPUTING AND INFORMATION TECHNOLOGY BACHELOR OF BUSINESS COMPUTING REPORT ON FIELD ATTACHMENT CARRIED OUT AT UGANDA REVENUE AUTHORITY June 4th , 2018 – August 3rd , 2018 OYOO WILFRED Registration No: 16/U/17600/PS Student No: 216012548 Academic Supervisor ABDALLAH IBRAHIM NYERO Field Attachment Report submitted to Makerere University Business School in partial fulfillment of the requirements for the award of Bachelor of Business Computing of Makerere University December, 2018
  2. 2. i DECLARATION I OYOO WILFRED declares that this report written in partial fulfillmentfor the award of Bachelor Degree of Business Computing of Makerere University is my own work and the content of this thesis has never been submitted to any University or institute. Signature _____________________________________________________________________ Date _____________________________________________________________________ OYOO WILFRED
  3. 3. ii APPROVAL This report has been written and submitted for Examination with approval of the undersigned supervisor Academic Supervisor Signature _____________________________________________________________________ Date _____________________________________________________________________ Abdallah Ibrahim Nyero Department of Applied Computing and Information Technology Makerere University Business School
  4. 4. iii DEDICATION I would like to dedicate this report thesis to my parents and guardians for the guidance, support, advice and prayers. May the almighty God bless you abundantly.
  5. 5. iv ACKNOWLEDGEMENT I would like to appreciate everyone who gave me a hand both directly and indirectly towards this successful completion of this internship training. My humble regards go the overall staff body of Uganda Revenue Authority who worked tirelessly as a team to support us towards achievement of applicable skills during the field attachment period. My special appreciation goes to my field supervisors Paul Kakaire (Nakawa Business Park), Solomon Ddumba and Damiano Kato (URA Headquarters), Lynette Agaba, Sam Oloya and Alpha Baggaga (Crested Towers), EriaKaduli who permitted and supported me to work in the various fields and checking up on our progress. Thank you so much. My utmost gratitude goes to my faculty, all academic and non-teaching staff members. I would like to thank Assoc Prof Moya B. Musa, Dean, Faculty of Computing and Informatics for the immediate action and arrangement made towards our training period through assignment of academic supervisors. And my humble regards goes to my academic supervisor Abdallah Ibrahim Nyero for the support and guidance given to me towards the best of my capabilities, thank you so much. I would also like to say thank you to my benefactors Mr Julius Kinyera, MsKellenKiconco , Ms Martha Nakazibwe for the support, advice to mention but a few. I am so grateful. In a special way, I would to recognise my dear friends Raymond Mwesigye, SyliviaNamatovu, Sharon Nakiranda, JaliaBabirye, Farida Nakatudde who gave me company during my stay at URA and also Brenda Nabiryo, Halima Hussein, Diana Nabukwasi, and the wonderful experiences enjoyed with the Communication interns to mention but a few not forgetting my Campus group The Ultimate 5 and Networking team mates Martha Mercy Apolot, Henry Makambi, Herbert Barassa, thanks for putting your trust in me as your leader. I am so humbled. Lastly, I would like to give a heartfelt appreciation to the Almighty God for making this training possible for me and keeping not only me but also my benefactors, friends, colleagues and supervisors fine and healthy. Thank you so much.
  6. 6. v TABLE OF CONTENT DECLARATION............................................................................................................................. i APPROVAL ...................................................................................................................................ii DEDICATION...............................................................................................................................iii ACKNOWLEDGEMENT............................................................................................................. iv TABLE OF CONTENT.................................................................................................................. v LIST OF FIGURES ...................................................................................................................... vii LIST OF TABLES.......................................................................................................................viii ABBREVIATIONS ....................................................................................................................... ix ABSTRACT .................................................................................................................................. xi CHAPTER ONE - INTRODUCTION........................................................................................ 1 1.0 Introduction........................................................................................................................... 1 1.1 Introduction to Field attachment........................................................................................... 1 1.2 Objectives of Field Attachment ........................................................................................... 1 1.2.1 Objectives of Field Attachment to the students................................................................ 1 1.2.2 Objectives of Field Attachment to the Organisation......................................................... 2 1.2.3 Objectives of Field Attachment to the University ............................................................ 2 1.3 Benefits of Field Attachment............................................................................................... 2 1.3.0 Introduction........................................................................................................................ 2 1.3.1 Benefits of field attachment to the student ........................................................................ 3 1.3.2 Benefits of Field Attachment to the Organisation ............................................................ 3 1.4 Organizational Background .................................................................................................. 4 1.4.0 Introduction........................................................................................................................ 4 1.4.1 History of Uganda Revenue Authority .............................................................................. 4 1.4.2 Location ............................................................................................................................. 5 1.4.3 Mandate.............................................................................................................................. 5 1.4.4 Strategic Direction ............................................................................................................. 6 1.4.5 Mission............................................................................................................................... 6 1.4.6 Vision................................................................................................................................. 6 1.4.7 Client Service Charter........................................................................................................ 6 1.4.8 Organisatiion core values................................................................................................... 6 1.4.9 Client Value Proposition.................................................................................................... 7 1.4.10 Culture statement ............................................................................................................. 7 1.4.11 Organisation structure...................................................................................................... 8 1.4.3 Broad functionalities of Uganda Revenue Authority....................................................... 10 CHAPTER TWO - FIELD ATTACHMENT ACTIVITIES.................................................... 12 2.0 Introduction......................................................................................................................... 12 2.1 Business Support and System Administration (Crested Towers)....................................... 13 2.2 Business Support and System Administration (Nakawa Business Park)............................ 13 2.2.1 Setting up internet connectivity to the machine............................................................... 13 2.2.2 Adding a computer to the domain.................................................................................... 14 2.2.3 Installation of Windows 10 OS........................................................................................ 15
  7. 7. vi 2.3 Information Technology Infrastructure (Nakawa Headquarters) ....................................... 18 2.3.0 Introduction...................................................................................................................... 18 2.3.1 Wireless Local Area Network.......................................................................................... 18 2.4 Wide Area Network ............................................................................................................ 20 2.4.0 Introduction...................................................................................................................... 20 2.4.1 Configuration of centralised authentication using TACACS+ server ............................. 20 2.4.2 Active Directory and Domain Service............................................................................. 23 2.4.3 Exchange server configuration in VMware workstation ................................................. 25 2.4.4 Information Technology Security.................................................................................... 26 2.4.5 The data center................................................................................................................. 29 2.5 Data Collection, recording and presentation....................................................................... 32 2.5.0 Introduction...................................................................................................................... 32 2.6 The 12th Open Mind Forum ................................................................................................ 33 CHAPTER THREE - LESSONS, SKILLS AND EXPERIENCES......................................... 34 3.0 Introduction......................................................................................................................... 34 3.1 Lessons and Experiences .................................................................................................... 34 3.2 Skills ................................................................................................................................... 35 3.2.0 Introduction...................................................................................................................... 35 3.2.1 Technical skills ................................................................................................................ 39 3.2.2 Academic skills................................................................................................................ 39 CHAPTER FOUR - CHALLENGES AND LIMITATIONS, ENJOYMENTS AND LIMITATIONS......................................................................................................................... 41 4.0 Introduction......................................................................................................................... 41 4.1 Challenges faced and how I was able to manage them....................................................... 41 4.2 Enjoyments derived during internship................................................................................ 44 4.3 Social experiences............................................................................................................... 45 4.4 Challenges and limitations.................................................................................................. 45 CHAPTER FIVE - CONCLUSION AND RECOMMENDATION ........................................ 47 5.0 Introduction......................................................................................................................... 47 5.1 Conclusion .......................................................................................................................... 47 5.2 Recommendations............................................................................................................... 47 References................................................................................................................................. 49 Appendices................................................................................................................................ 50
  8. 8. vii LIST OF FIGURES Fig 1: Organisational structure ....................................................................................................... 8 Fig 2: Internet settings .................................................................................................................. 13 Fig 3: Proxy server settings .......................................................................................................... 14 Fig 4: Exception configuration ..................................................................................................... 14 Fig 5: Termination of Ethernet cable............................................................................................ 18 Fig 6: Centralised authentication topology................................................................................... 21 Fig 7: Packet tracer simulation ..................................................................................................... 22 Fig 8: Remote access using telnet................................................................................................. 23 Fig 9: Management of ports at subnet level.................................................................................. 29 Fig 10: Barracuda spam firewall deployment............................................................................... 31 Fig 11: Fortinet firewall deployment............................................................................................ 31
  9. 9. viii LIST OF TABLES Table 1: Packet filtering firewall .................................................................................................. 27 Table 2: Computer asset data collection and recording ............................................................... 32
  10. 10. ix ABBREVIATIONS ACL Access Control Lists ADDS Active Directory and Domain Services ARP Address Resolution Protocol BGP Border Gateway Protocol BIOS Basic Input Output System BSSA Business Support and System Administration CCTV Closed – Circuit Television CEO Chief Executive Officer CGO Commissioner General Office CLI Command Line Interface CMOS Complementary Metal oxide semi-conductor CPU Central Processing Unit CSD Cooperate Services Department CVP Client Value Proposition DC Data Centre DHCP Dynamic Host Configuration Protocol DNS Domain Name Service DR Data Recovery EAC East African Community E-MAIL Electronic Mail Ext Extension FTP File Transfer Protocol FTP File Transfer Protocol GDP Gross Domestic Product HDD Hard Disk Drive IP Internet Protocol IPSEC Internet Protocol Security LAN Local Area Network
  11. 11. x MOFPED Ministry Of Finance Planning and Economic Development No. Number NOS Network Operating System OMF Open Mind Forum OS Operating System OSI Open Systems Interconnection OU Organisational Unit PCA Public and Cooperate Affairs RAM Random Access Memory RITE Respect Integrity Teamwork Excellence RJ Registered Jack RPD Research and Planning Development SATA Serial – ATA SMTP Simple Mail Transfer Protocol SSH Secured Shell SSID Service Set Identifier TCP/IP Transmission Control Protocol/Internet Protocol Tera Term Tera Terminal UDP User Datagram Protocol URA Uganda Revenue Authority US United States USB Universal Serial Bus UTP Uninterruptable Power Supply UTP Unshielded Twisted Pair VPN Virtual Private Network WAN Wide Area Network ZFs Zettabyte File systems ZLDRA Zero Data Loss Recovery Appliances
  12. 12. xi ABSTRACT Field attachment is an opportunity given to undergraduate students to help them relate theoretical knowledge gained in class into more of practical experience in the real world settings. I had a chance to conduct my field attachment training at Uganda Revenue Authority for a period of eight weeks. During the placement, I was placed in the Cooperate Services Department (CSD), Information Technology specifically. I was able to work in the Business Support and System Administration section in Crested Towers and Nakawa Business Park stations for three weeks before specializing in the IT infrastructure section in core networking. This report thesis is built on a five chapter content which is briefly summarized as follow; Chapter one; This points out the introduction to field attachment, its objectives to the various parties i.e. student, university and the organisation. It further stretches to give highlights on the organisation, its background, structure, services provided and functions. Chapter two; This chapter breaks down the activities I undertook during field attachment ranging from computer asset recording, troubleshooting and hardware maintenance, to core networking in the IT infrastructure department. Chapter three; On the other hand, this chapter highlights the lessons, skills and experiences developed during field attachment. Experiences are area of knowledge accumulated over a certain time period. Lessons on the other hand are derived from the experiences got during internship and skills are proficiencies gained in carrying out specific tasks or acquired technical knowledge in performing tasks. Chapter four emphasizes on the challenges included financial implications. Enjoyments included interaction with different colleagues, teamwork, attending events among others. The last chapter being Chapter five underlines the conclusion about my general perception about this placement and the recommendation I fill can best fit the university, students and the organisation of placement.
  13. 13. 1 CHAPTER ONE INTRODUCTION _____________________________________________________________________________ 1.0 Introduction This chapter underlines some basic information about field attachment. It points out the meaning, benefits and objectives if field attachment. It further stretches to the organisation background with emphasis on structures, services offered and others as follows; 1.1 Introduction to Field Attachment Field attachment program is an opportunity for an undergraduate student to apply his or her theoretical knowledge gained during the university academic program into real world of technology, its applications and professional experiences. The objectives of such programs are to enhance participants‟ skills, and to enrich their industrial knowledge by keeping them updated with the latest technologies. This opportunity has extremely helped me get that exposure into an environment where I could think of as a network administrator instead of just as a software developer. 1.2 Objectives of Field attachment There are several objectives of field attachment to students, organization and university among which include; 1.2.1 Objectives of Field attachment program to students • To get exposed to working pressures, learning how to cope up with them and appropriately respond to them i.e. learn to beat deadlines. • To learn to easily adopt to new working environment. • To give the student an opportunity to learn how to relate with people in the field i.e. team player. • To give the student an opportunity to gain more practical skills. • To give the student an opportunity to put theoretical knowledge learnt into practice. • To give the student exposure to rapid changing technology world.
  14. 14. 2 1.2.2 Objectives of Field attachment program to the Organization • The organization aims at tapping new and bright ideas that interns usually possesses, and such ideas can be used by companies to improve their services and earnings. • The organization view field attachment as an opportunity for future recruitment of employees whereby trainees who display exceptional abilities can be recruited the company in the near future. • Some organizations view filed attachment as an opportunity for tapping cheap labour from the interns for a specific time period. 1.2.3 Objectives of Field attachment program to University • To create a working link between the university and the organization where the student is training from. • The university views the industrial training places as partners in the task of educating the students. • To provide the student with practical work to consolidate the theoretical work taught at the university. • Industrial training acts as the evaluation of the universities by the companies or organizations and hence if the intern display credible knowledge and performance, the university gets a good recommendation. • The students are expected to obtain new ideas from their industrial training places which when presented to the university through reports can help the university to modify the content of the syllabi so as to suit job standards. 1.3 Benefits of Field attachment 1.3.0 Introduction Field attachment program is also associated with a number of justifications to all parties that is the students, organization of establishment and the University.
  15. 15. 3 Among which include the following; 1.3.1 Benefits of Field attachment training to Student • Students can apply their classroom learning in professional environments. Students have the opportunity to develop and apply the skills, theories and concepts learned in the classroom. The ability to develop and hone professional skills that promote growth and development while at the same time gaining industry-specific and often technological skills related to their field is valuable. • Students can gain exposure to their chosen field. Through internship, students get to embrace their potential in such a way that the field that may initially appeal to them most as they begin their college experience may not pan out to be all they expected as they learn more about it. Participating in internships can be a great way to get a taste of the actual professional experience in a particular field before you commit yourself to it fully. • Students can establish critical networking connections. Through experiential learning opportunities like internships, the invaluable chance students have to forge important professional connections before they even reach graduation. In other words, internship is a stepping stone to additional opportunities within the same organization, including fulltime employment. • Students can gain coveted work experience. One of the greatest frustrations graduates who struggle to find employment report is the problems that arise when the only open positions require work experience they've not yet had a chance to acquire. In this case, best real work experience one can have is internship. 1.3.2 Benefits of Field attachment training to the organization
  16. 16. 4  Employers can reap immediate rewards without a hiring commitment. Companies devote time and resources to finding, selecting and training interns which in turn gives a return to their investments i.e. using services of talented individuals without having to make a hiring commitment.  Employers can evaluate up-and-coming talent. When it comes to hiring new employees, hiring managers are always taking on a certain element of risk in determining whether a candidate will be the best fit. Therefore through internship, the employer evaluates and accesses an individual for competences.  Employers can expose young professionals to their brand. Since many internships are coordinated with school programs, there is need to expose those entering the workforce to the company's brand.  Employers can learn from students' fresh perspectives. Interns can come up with some of the best and most innovative ideas. Just as students reap the benefits of an organization mentoring, teaching and guiding them in their learning processes, employers too can learn just as much from their interns. 1.4 Organizational Background 1.4.0 Introduction This section points out in details the organisation background i.e. when URA was founded, Its physical address, contacts, its mandate, strategic direction, mission, vision, core values, culture, the general organizational structure, and its broad functionalities. 1.4.1 History of Uganda Revenue Authority Uganda Revenue Authority was established in 1991 as a central body for the assessment and collection of specified government revenue by the Uganda Revenue Authority statute of 1991 and set up in September of the same year to administer and enforce all the laws relating to such revenue and to provide related matters. This statute incorporated all the laws that were in force then regarding tax collection. The new organization (URA) merged the three tax administration
  17. 17. 5 departments that were responsible for all the taxes collected by the Central Government of Uganda. These Departments were Customs & Excise, Inland Revenue and Income Tax Department The URA was created as a quasi-autonomous unit with a Board of Directors appointed by and responsible to the Minister of Finance. The URA statute grants a considerable degree of independence to the Board in terms of over day – to – day operations. However, the Ministry of Finance (MOFPED) maintains control over two important areas; 1. Budget; For budgetary purposes, URA is regarded as a department of the MOFPED and is subject to the same financial rules and disciplines of its other departments. 2. Revenue; The Ministry sets the revenue targets and how such targets are to be over different tax heads. Among the objectives, URA was to improve the standard of tax administration and correct the weaknesses that characterized the old tax administration. The URA is a state owned organization with number of branches all over the region like Crested Towers, Nakawa Business Park, Entebbe International Airport, Port bell among others. 1.4.2 Location The Uganda Revenue Authority is located on Plot M193/M194 Nakawa Industrial Area. Nakawa – Jinja Road Kampala Telephone (+256) 417442097 Email: services@ura.go.ug Website: https://bridge/ura.go.ug Whistleblower lines: (+256) 417442222 (+256) 417442047 1.4.3 Mandate To assess, collect and account for Central Government Tax Revenue (include Non-Tax
  18. 18. 6 Revenues) and provide advice to government on matters of policy relating to all revenue sources 1.4.4 Strategic Direction Cultivate a tax- paying culture through provision of reliable services, leadership development and building strategic partnerships. 1.4.5 Mission To provide excellent revenue services with purpose and passion. 1.4.6 Vision To be a model for best practice and innovation in revenue services 1.4.7 Client Service Charter The charter outlines our commitment to providing quality services to all our clients. It provides information on what we do and the standards of service you can expect from us. It spells out the rights and obligations of our clients. 1.4.8 Organization Core values One can become a URA employee, but to become part of the URA family, one must adhere and live the URAway in line with the organization core values with an acronym RITE. • Respect We shall highly respect our esteem clients while delivering a responsive service. • Integrity; We shall with accountability, transparency, trust, honesty and consistency in all we do. • Teamwork; We shall promote team efforts, trust and partnership to achieve our set goals. • Excellence;
  19. 19. 7 Excellence in service, client care, image and presentation We continuously strive to offer a better service today than we did yesterday with an aim to exceed client expectations. 1.4.9 Client Value Proposition (CVP) We promise excellent revenue services everywhere. All the time at the lowest cost possible. 1.4.10 Culture Statement We are a client focused and responsive organization that attracts and nurtures talent and innovation to deliver great customer experience in an enjoyable environment. 1.4.11 Organization Structure An organizational structure defines how activities such as task allocation, coordination and supervision are directed toward the achievement of organizational aims. The URA structure in abstract can be divided into seven main groups which are Corporate services, Domestic taxes, Tax investigations, Customs, Internal audit and Compliance, Legal services and Board affairs and the General‟s office. All the different departments are each managed by a Commissioner. In order to enhance close supervision each department has got different sections of which each having a Supervisor assigned four officers who collaborate as a team to enhance the institution‟s core values towards collective development of the Republic of Uganda. The whole organization is managed by the Commissioner General.
  20. 20. 8 The departments can be further grouped into; 1. Commissioner General Office • Public and Cooperate Affairs (PCA) • Research and Planning Department (RPD) • Commissioner General Office (CGO) 2. Domestic Taxes Department • Compliance Policy • Business Policy • Large taxpayers' Office • Service Management Fig 1: Organizational structure
  21. 21. 9 • Oil and Gas 3. Customs Department • Field Services • Customs Audit • Enforcement • Trade • Customs Compliance and Business Analysis 4. Cooperate Services Department • Finance • Human Resource • Information Technology • Administration (Fleet and Procurement) 5. Tax Investigation Department • Intelligence • Investigations 6. Legal Services and Board Affairs • Litigation (Representation in Courts of Law) • Board of Affairs (Policy and Rulings) 7. Internal Audit and Compliance • Internal Audit • Compliance
  22. 22. 10 1.4.12 Broad Functionalities of the Uganda Revenue Authority are as follows; Uganda Revenue Authority is in charge with the responsibility of providing the foundation for development through revenue mobilization to: • Identify the tax payer and inform the tax payers of their tax rights and obligations by providing them with necessary information, fair assessment of tax payers with regard to those taxes relevant to them, collect the taxes in accordance with statute and Enforce collection of taxes where default has occurred. • The Uganda Revenue Authority Administers the following revenue related laws; The income Tax Act, 1997 The stamp Duty Act, 1998 (Cap 172) as amended; • Finance current and capital development activities. • Increase the standard of living of all Ugandans and reduction of poverty. • Increase the ratio of GDP to a level at which Government can fund its own essential expenditure. • From the foregoing, the role of Uganda Revenue Authority can be summarized as follows; - The Finance Statute 1998 (statute No.4 0f 1998) section 12 and the seventh scheduled to the statute (Which provide for the imposition and collection of road users tax) as amended. - The Customs Traffic Act, 1970 (Act No.17 of 1970) as amended. - The East African Customs Management Act 2004. - The value added tax Statute, 1996 as amended. - The Traffic and Road safety Act, 1998 (Act No.15 of 1998) and Regulations. All provisions for the collection of license fees and other fees, fines (other than fines imposed by courts) and other levies collectable under the Act.
  23. 23. 11 - The Excise Tariff Act (Cap.174) as amended and The East African Excise Management Act (EAC cap.26) as amended.
  24. 24. 12 CHAPTER TWO FIELD ATTACHMENT ACTIVITIES _____________________________________________________________________________ 2.0 Introduction Chapter two points out in details the activities, tasks and assignments undertaken during the internship period at the different placement stations. 2.1 Business Support and System Administration (Crested Towers) Under this section, I undertook a number of activities and assignment which were hardware related. I looked at the various components of the system unit among which include CPU, peripheral connectors, the heat sink, the different types of motherboards, the CMOS battery, the SATA cables, the Hard disk drive, the power supply unit, RAM chips and the fan. I also went ahead to disassemble the system unit components and put back and checked whether it was able to function or operate. I was able to work out the different troubleshooting techniques on non-functioning computers due to the missing OS, RAM or HDD. I was able to tell all these simply by hearing the beeping sounds, the sound produced by the fans, the screen displayed. Issues about inability of the computer to auto-reset time was mainly due to a fault in the CMOS battery so the way was to have it replaced for such problem to be solved. Another activity I undertook under hardware was dealing with the Uninterruptable Power Supply. We found out that for the operations of the organisation to be in continuous process, there need to be constant power supply. Therefore, I was introduced to the UPS which we had to configure it to a network through inserting a Network Interface Card (NIC). Through this we were able to plug a console cable and add the UPS into the network using a simulator (Hyper terminal).
  25. 25. 13 2.2 Business Support and System Administration (Nakawa Business Park) Business Support and System Administration (BSSA) mainly emphasizes on the utmost performance of the company‟s computer resources so as to enhance business operation processes in the various department of URA. Since URA has embraced the use of IT in all its operations, that means there is need for fast and reliable internet services. One of the operations I did to ensure there was internet connectivity and reliability, adding the computers to the domain, Installation of antivirus application, and Microsoft Office 2016 at the CSD using the administrative account was as follows; 2.2.1 Setting up internet connectivity to the machine. • Using Internet Explorer application, Go to the Settings Fig 2: Internet Settings
  26. 26. 14 • Then hit Internet Option • Opt for Connection on the menu. • We have to change the LAN settings • Later we advance to proxy settings and configure and exception as follows 2.2.2 After all that process, I had to connect the computer to the domain. I also added a computer to a domain ura.local A domain is a kind of network that allows a client to login into their user account from any computer on the network. Go to start button and search Control Panel then hit System and Security Later click on System on the presented screen. Afterwards, click change settings System Properties windows is displayed Fig 3: Proxy server settings Fig 4: Exception configuration
  27. 27. 15 Under Computer Name/Domain Changes, You can change the Computer name if you prefer and later opt for Member of Domain which is ura.local and hit OK You are then prompted for the user Credentials enter the Administrator username and password then strike OK. Later Restart the Computer in order to save the changes made. 2.2.3 Installation of Windows 10 OS Every computer system needs to have an effectively functioning components i.e. both hardware and software. I was assigned a task of installing windows OS, and later MS office, a browser and and Kaspersky antivirus program on a computer. This was a computer which had no HDD due to the signs and the sounds it produced. I started with inserting opening the system unit and inserting and carefully plugging in the SATA cables and later powered the computer system on and undertook the following procedures in the installation process. After creating an installation media, I wanted to make sure the device can boot from the USB flash drive, therefore I accessed the BIOS and adjusted the boot menu by pressing F9 key and made USB FDD to be first on the boot menu. Then this screen will pop up whereby you choose the OS language, time and currency and the input method. Since the keyboard was a US keyboard, I had to adjust the settings accordingly
  28. 28. 16 This was the next step I interfaced with. It was obvious I clicked install now . By checking that option I accepted the License terms after reading them of course. Later, I was presented the screen aside where I had to choose to either upgrade (files, settings, andapps are moved to windows) or custom install (files, settings and apps are not moved). The latter is the one to choose if you prefer a clean install Here is where I had to select a drive to instal Windows 10 OS on. Onecan Format a drive or partition it as well. But it is advisable not to even temper with either formatting or deleting any drive since it may contain client‟s data Therefore, I chose a drive with a higher memory capacity and hit next.
  29. 29. 17 Now, I was patient and decided to wait for the configurations to proceed. Before I could start using Windows, there are some personalization, location, browser and protection and connectivity and error reporting settings that I had to adjust. Someone can zip through all these by using the Express settings which basically turn everything on or you can hit the small print that says „Customize settings‟ to customize them. I decided to click use Express settings. Thereafter, I added some credentials in terms of username and default password to computer and that was it. Quick tip: When in the process of installing the OS, I was advised not to delete or format ant HDD since it may contains clients‟ data. So I had to always choose other options rather than delete or format. All the previous data were kept in windows.old folder in Drive C.
  30. 30. 18 2.3 Information Technology Infrastructure (Nakawa Headquarters) 2.3.0 Introduction Information technology infrastructure is defined broadly as a set of information technology components that are the foundation of an IT service; typically physical components, but also various software and network components. IT infrastructure is a department under the Cooperate Services Department (CSD) which aims at ensuring effective data communication and networking within the organization. The IT infrastructure is further categorised in WAN section, LAN section, IT security section. This is so because of the need for quality assurance and the need to deliver excellence in clients‟ service. Therefore officers perform tasks they do best either in WAN, LAN or IT security. 2.3.1 Wireless Local Area Network A WLAN is a local area network that doesn‟t rely on wired Ethernet connections. WLAN can be either an extension to a current wired network or an alternative. Under the Local Area Network, we made a fully functional Ethernet cable. Requirements; UTP patch cable, Crimping tool, Modular connector and cable tester. There are four pairs of wires in an Ethernet cable and an Ethernet connector (8P8C) has eight pin slots. Each pin is identified by a number, starting from left to right, with a clip facing away from you. Fig 5: Termination of Ethernet cable
  31. 31. 19 Using the T568A standard, we assembled the Ethernet cable using the following procedures. 1.First we stripped the cable jacket about 1.5 inch down the end. 2. Then we went ahead to spread the four pairs of twisted wires apart using the pull string then cut the pull it. 3. Later we untwisted the wire pairs then neatly aligned them in the T568A orientation. We had in mind not to untwist them any further down the cable than where the jacket begins. 4. We then cut the wires as straight as possible about 0.5 inches above the end of the jacket. 5. Carefully inserted the wires all the way into the modular connector (RJ - 45) making sure each wire passes through the appropriate guide inside the connector. 6. Push the connector inside the crimping tool and squeeze the crimper all the way down. 7. Later I was given the chance to repeat step 1 – 6 for the other end of the cable. 8. Making sure we had successfully terminated each end of the cable, we applied a cable tester to test each pin.
  32. 32. 20 2.4 WIDE AREA NETWORK 2.4.0 Introduction A wide area network is a telecommunications network or computer network that extends over a large geographical distance/place. Wide area networks are often established with leased telecommunication circuits. Under this section of core networking, I learnt how to create LANs configure switches that is at the Data link layer (second layer of the OSI model). I also learnt that URA uses leased lines from telecommunication companies so as to aid in configuring wide area network country wide. This comes with a number of benefits like less costly than having to I created and configured VLANs, IPSEC VPN, BGP, DHCP, Centralized authentication using TACAC+ server, ACL, Remote Access using telnet. I also accomplished basic router and switch configurations which include; 1. How to setup hostnames 2. Setting up passwords like console passwords, vty passwords and enable password 3. Configuring interfaces. 2.4.1 Configuration of Centralized Authentication using TACACS+ server TACACS+ is a protocol for security with AAA services. It is used as a centralized authentication to connect networked devices. It can also provide a specific authorization with centralized access to a particular user to work with the network. Accounting gives a mandatory audit logs by logging all actions executed by privileged users. I configured the topology below in packet tracer.
  33. 33. 21 Below is a summary of the ISO I used to successfully configure the above topology of the centralised authentication. BusinessPark (router) en config t I renamed the router to BusinessPark hostname BusinessPark line console 0 password 123 login I later assigned IPV4 address and turned on the router int fa 0/0 ip address 192.168.11.30 255.255.255.0 no shut Fig 6: Centralised authentication topology
  34. 34. 22 I wanted to make sure the router is able to communicate with that of HQ and CrestedTowers using; line vty 0 4 transport input telnet ip route 192.168.12.0 255.255.255.0 192.168.11.40 When configuring the remote access, I used the following commands; aaa new-model aaa authentication login uraIntern group tacacs+ local username Wilfred privilege 15 password 800 tacacs-server host 10.1.12.131 key nakawa01 line vty 0 4 login authentication uraIntern privilege level 15 I had to save the configurations; do wr Using simulation on packet tracer, I tested my routers and end devices and they were able to be reached. Below is a screen shot. Fig 7: Packet tracer simulation
  35. 35. 23 Using Wilfred‟s computer based at Crested Towers station, it was actually possible to telnet BusinessPark router. One of the benefits of remote access is it makes network administration really convenient. Imagine a scenario whereby a new network officer has been recruited in Gulu station that cost one will incur to travel just to add the new employee on the network. Since in the configuration, Wilfred was given a privilege level of 15 that is why he is actually able to access up to configure terminal point. 2.4.2 Active Directory Domain Service Project carried out; Fig 8: Remote access using telnet
  36. 36. 24 AD DS is called a domain controller. It authenticates and authorizes all users and computers in a windows domain type network. Under AD DS, a database and directory service which maintains the relationship between resources and enable them to work together and provides centralised repository for user account information and directory authentication, authorisation and assignment of rights and permissions. I was able to accomplish the different tasks assigned to me and my team for instance I created virtual machines and installed windows server 2012R on the machine, I also created client virtual machines and installed windows 7 professional OS on those client machines. I later configured a static IP address to the server machine and client machines. I ran the ping command on both machines CLI terminal to make sure they were able to communicate. Installed the role of active directory, promoted the server as a domain controller on the server machine. I created a domain and DNS still on the server machine, later added organisation units (OUs) plus users and computers. In the AD DS server, we added and configured the following roles and features; • Users. (Go to Users and Computers, Right click, New, group, Contact, user, Printer). To delegate (To give privileges to another user to control the domain. And users‟ account unlocking. • Denying user access basing on 3 unsuccessful login attempts. Install (Add Roles and Features IIS Manager), Go to FTP Login Attempt, Adjust the feature. Using Local Security Policy. Go to Account Policy, Account Lockout Policy, Account Lockout threshold Properties. To our disappointment this feature was inactive. Therefore we issued a some commands in the CLI netaccounts / lockoutthreshold: 3
  37. 37. 25 • Created Group Policies to the domain, OUs and users for instance password complexity, administrative policies such as desktop policies and task manager and control panel access policies for the VMware workstation. 2.4.3 Exchange server Configuration in VMware workstation I installed another virtual machine running windows server 2012R. Later I extracted the ISO image setup for exchange and copied to the virtual machine desktop (Having the name Exchange Server). Opened Windows PowerShell
  38. 38. 26 We had to prepare the Active Directory by issuing the following commands. Install-WindowsFeature AS-HTTP-Activation, Desktop-Experience, NET-Framework- 45Features, RPC-over-HTTP-proxy, RSAT-Clustering, RSAT-Clustering-CmdInterface, RSATClustering-Mgmt, RSAT-Clustering-PowerShell, Web-Mgmt-Console, WAS-Process- Model, Web-Asp-Net45, Web-Basic-Auth, Web-Client-Auth, Web-Digest-Auth, Web-Dir-Browsing, WebDyn-Compression, Web-Http-Errors, Web-Http-Logging, Web-Http-Redirect, Web-Http- Tracing, Web-ISAPI-Ext, Web-ISAPI-Filter, Web-Lgcy-Mgmt-Console, Web-Metabase, Web- MgmtConsole, Web-Mgmt-Service, Web-Net-Ext45, Web-Request-Monitor, Web-Server, Web- Stat- Compression, Web-Static-Content, Web-Windows-Auth, Web-WMI, Windows- IdentityFoundation, RSAT-ADDS .setup/Preparead /IAcceptExchangeServerLicenseTerms/OrganizationName: LAB .setup/Prepare Schema /IAcceptExchangeLicenseTerms 2.4.4 Information Technology Security This sections highlights an overview on the different preventive measures URA undertakes to enhance safety and security as in line with their core values that is to say integrity. We had a half day with the IT security officers in the IT infrastructure CSD. Here, we were briefed and lectured on the different security measures URA undertakes to guarantee safety of data and information of clients. Among the measures include; 1. Firewall A firewall is simply a barrier through which the traffic going in each direction must pass. A firewall security policy dictates which traffic is authorized to pass in each direction. It may take the hardware or Software form. Firewall has a number of types among which include, A study research was given to each member to go and read about firewall and their types. Here were my findings.
  39. 39. 27 • Packet filtering Firewall A packet filtering firewall applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet. Filtering rules are based on information contained in a network packet: Source IP address: The IP address of the system that originated the IP packet (e.g., 192.178.1.1) Destination IP address: The IP address of the system the IP packet is trying to reach (e.g., 192.168.1.2) Source and destination transport-level address: The transport-level (e.g., TCP or UDP) port number, which defines applications such as SNMP or TELNET IP protocol field: Defines the transport protocol Interface: For a firewall with three or more ports, which interface of the firewall the packet came from or which interface of the firewall the packet is destined for. • Application-Level Gateway An application-level gateway, also called an application proxy, acts as a relay of application- level traffic. The user contacts the gateway using a TCP/IP application, such as Telnet or FTP, and the gateway asks the user for the name of the remote host to be accessed. • Stateful Inspection Firewalls A traditional packet filter makes filtering decisions on an individual packet basis and does not take into consideration any higher layer context. To understand what is meant by context and Table 1: Packet filtering firewall
  40. 40. 28 why a traditional packet filter is limited with regard to context, a little background is needed. Most standardized applications that run on top of TCP follow a client/server model. For example, for the Simple Mail Transfer Protocol (SMTP), e-mail is transmitted from a client system to a server system. The client system generates new email messages, typically from user input. The server system accepts incoming e-mail messages and places them in the appropriate user mailboxes. 2. Network Scanning and Inspection This is done to detect and classify system weaknesses in computers, networks and communications equipment and predict the effectiveness of countermeasures on timely basis. 3. Use of audit trial (audit log) in database An audit trial is a security – relevant chronological record, set of records or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure or event such transactions have occurred. This plays a big role in maintaining integrity and confidentiality among Database officers and the whole organization at large. 4. Use of role based access control This is a method of regulating access to computer or network resources based on the roles of individual users within the enterprise. Therefore IP address are assigned to users basing on their roles i.e. a Network Officer will not have access to social media sites unlike a Finance client. 5. Whitelisting and black-listing of applications basing on their behaviours. Behaviour whitelisting is a security method in which permissible actions within a given system are specified and all others are blocked. This is used to secure websites, services and forums from bots and hackers, computers from malware and hacking attempts and all emails from spam and phishing attempts. Blacklisting is used to filter messages sent from email addresses, IP addresses that have been flagged as spammers. Messages from these sources generally end up in the junk Mail folder. Therefore this helps protect systems against malicious code by blocking known malware from opening or running.
  41. 41. 29 6. Installing and updating antivirus programs. Antivirus program is also another logical access measure deployed in securing the clients data within the organisation. But in order to save time and make it more convenient, policies are written from a single console to propagate to approximately over 1500 computers connected on the network other than visiting every client wherever they are and installing and updating their computers‟ antivirus programs. 7. Blocking of ports at subnet level At times an attempted attack is made from a given node or computer connected on the network which cause harm to the entire network. So that particular port is blocked from accessing the network until the risk has been dealt with. 2.4.5 The Data Centre On July 11th , 2018, my team and I had a chance access and tour the data centre. While at the server room, I was able to see a number of components which renders a number of functions towards the common goal of data safety. I wrote and did research on how some of them function. Data centre or server room is simply a centralized location where computing and networking equipment is concentrated to enhance effective data storage, confidentiality and retrieving in case certain information is needed. Fig 9: Management of ports at subnet level
  42. 42. 30 URA has a number of servers in the various stations within the region. In order to enhance centralized data storage, the DC is put in place with very powerful servers running 24/7 which are often stacked in racks due to their high concentrations. The DC also provides important services like data storage, backup and recovery, data management and networking. In case of server breakdown, the DR takes over to enhance the continuity of the operations within the organisation. The DC is monitored to keep track of environmental variables like temperature, humidity and alert administrators of the potential problems before they become critical emergencies. To enhance safety against all these variables, the DC is well equipped with cool aerations which produce temperature ranging from 18°C – 25°C, burglar proofing, biometric accessed and installed CCTV cameras to enhance data safety. The DC has got a number of equipment which serves a certain purpose towards the organisational goal of security the client’s data promptly. These equipment among others include; • Firewall A firewall is simply a barrier through which the traffic going in each direction must pass. The DC has got a number of Firewall among which include; Barracuda Spam Firewall. It stops Email borne threats, prevent sensitive data and ensure critical Emails are delivered. Fig 10: Baracudda spam firewall deployment
  43. 43. 31 Fortinet Firewall. It delivers end-to-end network security with one platform, one network security operating system and unified policy management with a single pane of glass for the organization‟s best protection against the most advanced security threats and targeted attacks. Poll alto Firewall. This filters the inbound and outbound traffic before being transmitted to their destinations. • Vblock Systems Made of storage, provisioning and data protection services from switches and servers made by Cisco along with VMware. • Zero Data Loss Recovery Appliances ZDLRA is a cloud-scale engineered system designed to dramatically eliminate data loss and reduce data protection overhead for all Oracle databases in the enterprise. In other words, it enables a centralized incremental forever backup strategy to hundreds and thousands of within URA. • Oracle ZFs Storage Appliance Fig 11: Fortinet firewall deployment
  44. 44. 32 This delivers the best storage performance and unprecedented observability of workloads in the organization. 2.5 Data Collection, Recording and Presentation. 2.5.0 Introduction My team and I assigned tasks of recording all the company‟s computer assets within the stations that we were assigned i.e. Nakawa Business Park, Crested Towers and Entebbe International Airport. The form had the following details. CPU Model + No Keyboard Model + No. Monitor Model + No. O S Use r Computer Name IP Phone Mode + Ext We thereafter approached different clients, asked for permission to capture their computer details and recorded them on the forms later we made records using MS Excel then presented the soft copy to the Field based supervisor. 2.6 The 12th Open Mind Forum On July 12th , we were all urged to go and attend the 12th OMF event organized by URA and its partners. The Open Mind Forum was associated with the theme “Skilling Uganda‟s youths with financial discipline and mind-set of business success.” The OMF was conducted in line with a number of objectives among which include • To provide a platform for sharing experiences and information on key practices of business success. Table 2: Computer asset data collection and recording
  45. 45. 33 • To provide a platform for business skilling for youth entrepreneurs. • To cultivate an enterprise development culture among the youths. • To create network for the youth entrepreneurs adept with business resilience. • To emphasize the practice of embracing financial discipline for business success. The panel discussions were conducted by successful youth entrepreneurs from various strands of life and professions. Its objective articulated the fundamentals that supported and sustained business. The panelists included Ms Ruth MatovuBiyinzika (Skilling Uganda, PFSU), Mr James Abola (Team leader, Akamai Global) Financial Management, Lillian Katiso (Director of Finance and Training – Zaddock Associates Ltd) Financial Management , Niyitegeka Michael (ICDL Africa Country Manager, Uganda) IT Ethan Mussolni (CEO, Success Africa). The forum was graced by Hon. Florence NakiwalaKiyingi (Minister of State for Youth and Children Affairs) as the Guest of Honour and Ms Doris Akol (Commissioner General URA) as the key Note address speaker. While at the event, I was able to interact with a number of individuals of different professions and took home a lot of information concerning growing professionally, improving digital images and much more.
  46. 46. 34 CHAPTER THREE - Lessons, Experience and Skills _____________________________________________________________________________ 3.0 Introduction Chapter three underlines the various lessons I undertook, the experiences I got when performing specific tasks repeatedly, and the skills that were added to my career. There below are some of the lessons, experiences and skills I achieved during this field attachment period at Uganda Revenue Authority. 3.1 Lessons and Experiences. Experiences simply means the value someone gets as a result of performing a given task or tasks repeatedly for sometime The placement at URA was associated with a number of tasks and assignments which tunes a person's mind towards the general work environment within the organisation. The following are some of the experiences I got during my stay at URA. • Operating as a team. Being a team of five interns, this enabled me to work hand in hand so as to perform the assigned tasks effectively and efficiently, being a team planner, I always took the lead and this gave me more confidence about the future. Team work helped me to learn what wasn‟t previously known from the fellow colleagues or even the officers which was beneficial to everyone. This called for maximum co-operation and team work in order to accomplish the different tasks. • Relatedness of University‟s taught programs to the field of work. I was able to find the applicability of a number of course units taught at the university in the field among which include; According to Enterprise Network Administration and Management (ENAM) as a course unit at the university, it elaborates about the different network components which include Firewalls, Routers, Switches, network cables, and others which are used in the networking process. During the internship period I got an opportunity to configure different network topologies like VLANS, IPSEC VPN, DHCP, Centralized Authentication using TACACS+ server and others.
  47. 47. 35 In Business Software Application, I was taught how to apply the different MS office packages like MS Excel which I applied in the recording process of the computer details, MS Access which is used to teach one of the staff from the Procurement department. And I was able to relate the different features in order to present a good information. In ICT fundamentals, I was taught the different hardware components and the possible troubleshooting techniques not forgetting hardware maintenance. This was clearly done in the field as I solved the problem of internet connectivity issues of one of the clients‟ computer from PCA, updating windows defender antivirus, and fixing a frozen mouse. The techniques and processes mentioned in class were not any different with ones in the field. In line Business Law as a course unit, I was able to find out some of the litigation issues governing the operations of URA. • Resume enhancements. I gained valuable experiences and accomplishments to add to my resume and enhance my application to the university. It also created an advantage over other graduate school applicants. • Networking and establishing mentors and references. I met new people and practiced networking skills while establishing a network of professional contacts, mentors and references to attach on the resume some point in time. 3.2 Skills 3.2.0 Introduction A skill is proficiency gained in carrying out specific tasks or acquired technical knowledge in doing work and during events hosted by the organisation. The following are some of the skills I got during this placement. • Communication skills. Different communication skills helped me to be positive and interact more with other workmates at the Organization. During lectures in class in the course unit for Business Communication Skills, I was taught more on how to handle and communicate to people in a diplomatic and firm way hence the internship helped me a lot in increasing such skills. Internship gave me an opportunity to improve on the communication process especially the
  48. 48. 36 feedback stage because my team and I always had to give our supervisor feedback on different tasks assigned. • Time management. Being able to successfully take a full course load every semester and meet assignment deadlines to some extend gave me that time management skills. But during internship, I was able to organize my time and produce results. I was able to prioritize responsibilities and recognize when it was appropriate to multitask on various tasks for instance when I was doing assignments on routing and switching concepts, my team and I were also able to switch to active directory and domain service configurations. • Flexibility. Being so focused to change and with willing to learn attitude towards new things we were being trained. When it came to focusing in one section, I was so flexible to adopt to the Network Infrastructure section with a willing to learn attitude. • Initiative. Especially contributing towards a discussion of what to cover (depth) so as my team and I can do not only basics but also fundamentals of networking • Writing skills. At times my team and I were assigned tasks of data collection basing on the company‟s computer assets which required some recording of computer specific details. In case of hardship I got assistance from a fellow workmate before approaching the supervisor hence perfecting my writing skills. • Typing skills. This was one of the skills I just improved on because in course of studying Information Technology the student used to type a lot and this helped a lot more so when it came to typing the previously written records of the computer assets. In this case since free computers were few at organization, when my turn for typing came, I typed at a high speed hence widening experience and improving typing skills. • Receptiveness. The ability to receive feedback by supervisors are very critical. At times we had a number of challenges during the configuration of AD DS and exchange server. I was able to always keep updating the supervisor on every errors and steps we are to accomplish and what approach we use to approach them. • Adaptability. I was able to adapt to a number of situations. For instance switching from one team and work stations to another. In addition to that, I was not only performing duties as networking
  49. 49. 37 intern but also IT support in terms of troubleshooting, working at the business units and training some staff members in software applications (Microsoft Access). In this case, I had in mind not only an interest in a particular field but also willingness to become familiar with the different parts of the organization which greatly increased my exposure within URA. • Collaboration. As an intern, I was able to collaborate with other interns from my campus and other higher institutions of learning. It was not a hard task to communicate and related well with others towards a common goal. As part of a team I was able to understand my own strength and weaknesses so I knew how best I could contribute as well as knowing how to bring the best in others. • Listening skills. A chance to work at URA gave me an opportunity to put into practice what was studied in Business Communication skills. This greatly improved my ability to listen carefully and understand what was communicated. As I moved on to the WAN section at the headquarters, the process was entirely oral and practical so I had to ensure that I listen carefully thus improving my listening skills. • Leadership skills. I learnt that being a leader comes along with a bunch of responsibilities. Since I was not only a team leader but also a team planner, this brought in a lot of advantages since I had to gear up, mobilize and lead the team as they performed the different tasks assigned by the field supervisor and also give a reminder to him on a day we had no task to perform. • Interpersonal skills. I was able to build and maintain relationships and the kind of person team members wanted within the team with them every day. I was able to identify the needs and wants of the teammates and was able to recognize and acknowledge the value of differing perspectives. • Analytical skills. I gained analytical skills which involved the ability to attempt some tasks with a keen note, this was more with OS installation, troubleshooting a computer, and reassembling the system unit components. I had to carefully analyse the different steps and avoid formatting any data on the HDD, signs and sounds made by the computer system, where different SATA cables go and how the components are fixed respectively very well. • Ability to go extra mile. Given the fact that there was always constant internet connection both guided and wireless, we were given accounts for access the wireless internet. We made use of
  50. 50. 38 the CISCO netacadplatform for reading resources so as to broaden our knowledge on the various configurations we were establishing. • Creative problem solving. After attending the resource 12th Open Mind Forum, I got skills on how to anticipate and manage day-to-day recruitment issues and getting to the bottom of the root cause. I learnt that there are possible ways on how to confidently make decisions under pressure and recommend workable solutions. • Resilience. During this training, I was able to hear from a number successful personnel and I learnt that keeping calm under pressure with the ability to stay positive when things don‟t go well will make one a happy and a successful consultant. • Commercial understanding. I got to know a thorough understanding why companies are hiring and where their needs and expectations lie. Therefore, it is upon me to keep up-todate with changes in the market I am getting exposed to that will help set me apart from other clients. • Self-management. I was inspired to have the ability to plan ahead, be organised and always focus on details which is key. Getting details right is crucial to building relationships but to be successful, one is also required to work with an entrepreneurial mind-set, with an eye on new opportunities towards the growth of one‟s business. • Results driven. I embraced the idea that to make something happen it always require a positive approach and one will combine this with the desire to achieve challenging targets. • People focus. I learnt that using open and honest communication is the key to building lasting relationships. Having this spiced up with a strong team spirit leads to harmonious information sharing, best practices and increase performance. • Technical proficiency. I was able to not only do some reading and research about the various computer errors and symptoms which required troubleshooting but also do some simple troubleshooting techniques for instance correcting a senseless mouse, internet connectivity issues, updating anti-virus programs and others. All these gave me a package of added skills. 3.2.1 Technical Skills
  51. 51. 39 • I acquired practical skills in dealing with computer hardware components, setting up a working computers for the clients. • Punctuality. Time keeping was a part of my daily routine so as to catch up with schedule and assignments. • I had a lot of opportunities visiting server rooms at the long building and the data centre. This was when installing firewalls especially the polo alto firewall, checking for unusual signs and symptoms on servers. It made me busy and I developed a tendency of requesting for tasks to perform in most cases. 3.2.2 Academic Skills • I gained skills in data collection, recording using MS Excel application while maintaining a high level of communication while approaching clients. • Receptiveness. Being able to give feedback on past-learnt and still to learn things basing on the targeted outline and the time schedule. • I obtained the skills of installing OS such as Windows 7, 10 and Windows Server R, Application Software such as VMware work station 12 Professional and configuration VMware tools for effective functionalities of Keyboard and Mouse on the virtual machines. • I also learnt how to install and configure Active Directory to provide domain services, promoting servers such as Domain controllers, adding users, organisation units, and computers to the domain and administering Group Policy Objects (GPO) such as password complexity. • I got skills on how configure static and DHCP IP addresses, configuring interfaces for both routers and switches, configuring routing protocols, telneting and SSH and much more using Cisco Packet Tracer and GNS3. • I also obtained skills on how to install Microsoft Exchange Server using Windows PowerShell. • I got knowledge on IT security i.e. different security measures to safeguard clients‟ information both logical access and the physical access measures.
  52. 52. 40 • I was able to physically see the various appliances at the server room with powerful servers, cooling systems and other components which granted more security to the clients‟ data within the organisation. Looking at the configuration of the Poll alto firewall boosted my confidence in learning the various fields in network administration.
  53. 53. 41 CHAPTER FOUR Challenges, Limitations, Enjoyment & Disappointment 4.0 Introduction Every single scenario in life possess both a negative and positive impact. Therefore Chapter four notes the various challenges, Limitations, enjoyments and disappointments I encountered during this internship period 4.1 Challenges faced and how I was able to manage them These challenges were personal, organizational, work group, community and others. Despite the fact that they were really so depressing, I found possible ways of going about them and they include following; • Adopting to the working environment. Due to the fact that I was new in the organization, it took some time to get used and cope with the working environment. I was not used to this culture and society this was a big challenge. Therefore in the first days of internship I did not have much to do and had to be vigilant and sit and the day ends without having much to do this was a challenge because it made me so idle and bored for the first weeks in the organization. I overcame this challenge by constantly befriending colleagues from different universities and also staff members which really gave me some ease during my stay in the different stations of the organisation. • Boredom. During the field attachment, I had to endure boredom especially towards the end of BSSA work areas at Crested Towers and Nakawa Business Park. This was due to the monotony of the work being carried out and there was little to learn except for the fact that there was an expectation for the work load to increase at a later date. I always approached my supervisors for some tasks so as to us busy. This really helped in making our time a resourceful one since we did some bit of programming in JAVA (using hackerrank.comwebsite) and we were introduced to Angular JS for websites. At times
  54. 54. 42 sympathetic friends and parents hearing us complain during the first weeks of the training always recommended us to try working on report or do something constructive which kept us busy all times. • Too much information absorptions. This started right from the orientation, and every time I was recruited in a new station with different personalities who later introduced us to completely new concepts which must be absorbed. The only way which made me switch to such pace was to read ahead and consult the different officers and minimize time wastage (Siting without a task to perform) by each and every time finding sometime to do or request for a task from the Field based supervisor. • Inadequate equipment. This was the biggest factor in the organization, inadequate equipment included, computers, and chairs for the trainees. At the URA especially Crested Towers station there were limited chairs and inadequate computers, this limited the intern‟s experience during data recording process which was done in phases. This challenge was solved by recruiting the whole team to different sections i.e. some members were shifted to BSSA, IT Infrastructure, and others in order to enhance performance within the different sections. • The network had some restrictions. Looking at the positivity associated returns from such is increased output from the employees since the company‟s internet will be used for the rightly purpose. But on the other, it made our work a bit complicated since we needed to watch some YouTube videos on the various configurations yet YouTube could only be accessed after 5PM. The only solutions we had for this was to stay for some extra hour after 5PM so as to get the work done in time. • The distance from home to the initial work place. Being initially recruited at Crested Towers was really a challenge since every time I will need to compete with traffic jam and arrive at work in time which at times was costly. I got over it by planning earlier enough so as to be just in time so as to prevent the pressure associated with traffic jam, transport fares, and arrival at work.
  55. 55. 43 • At times my tasks were not challenging. Our initial assignments of data collection, recording and presentation were not challenging which made it boring and we had that negativity towards the tasks being assigned to us since we were much interested in Information Technology cores. Constant visiting the Board room at the Headquarters to hold a meeting with MrEriaKaduli who motivated us time and again on what tasks are done within the organisation and finally assigning us into the different sections. • Our supervisors were quite busy and up and down at times. This became a challenge for my team and I since we were already given the task schedules. Therefore following up and completion of tasks within the time bound became a challenge since I was still new to the concept of core networking. I was constantly in touch with the field based supervisor who always send work, and guides on email. Therefore it was always my task to mobilise the team so as to go an extra mile with the concept so that when the supervisor comes, we can just pass over it to see where the hardships where. • I also had a challenge with some of the team mates who wanted to use the work hours for personal things like Instagram since we were assigned to one computer. This became challenge since it was not always easy to keep reminding someone of the tasks they already know which was so uneasy for them to switch. The only solution I got for this was to always arrive at work easier than them so as by the time they come, we just get back to business since it was the reason as to way we came to work. • I got some challenges when it came to asking some staff member questions. All of a sudden, I got a chance to prove myself but was not so sure which at times gave me some pressure to be self-sufficient and independent intern. I always followed a simple rule to become a better intern each and every day by always checking if I am sure of what I was to ask and not just assuming. This always made me avoid silly mistakes and crumbling bridges.
  56. 56. 44 4.2 Enjoyments derived from field attachment. My stay at URA also brought me a number of unforgettable moments. These came with fascinating experiences each day after the other among which include. • I was able to meet and work with potential employers and other staff members from the different stations I was assigned at like social workers and welfare officers thus socialization. • Exposure to the demands and challenges of the work place like giving feedback in the appropriate time, reporting early enough at work, and relating with different categories of people as well as performing the daily activities. • It was a great achievement and enjoyment during the Open Mind Forum 2018 which was organised by URA and its partners. Besides the refreshments, I was able to attend and acquire real life ideas and motivations from the various successful entrepreneurs, motivation speakers, and much more free of charge • The internship program helped me to gain more confidence since I had to do different activities which at times required approaching the different offices for consultations, or even access their user computer details. • New knowledge and practical experience was acquired in fields of communication, computer networking like basic knowledge on GNS3, Team viewer and Wireshark and their applications, and interpersonal skills among others that would help thre future in the future employment fields. • I got an opportunity to relate with different categories of people among which include researchers who provided me some questionnaires for the research study they were conducting. This gave me a highlight on what I will encounter, and how I will do it when I get to face the final year research proposal writing. • I enjoyed the moment when the PCA team joined the IT section at the headquarters. I was humbled by the well welcome, coordination and association between different departments within the organisation. This made my stay indeed a wonderful one.
  57. 57. 45 4.3 Social experience • I learnt how to take responsibilities and do assignments with less or no supervision. For instance in most times when the team was idle, I always approached the supervisor for an assignment so as to keep the team busy every time. • I was able to take an officer from the Procurement department through MS Access practice. This boosted my confidence level and interpersonal skills. • I also improved on my leadership and cooperation skills with the team members in every station I was assigned whereby I was able to be appointed as a Team leader by the team members. Therefore it was always upon me to request for tasks to be done from the various supervisors so as to make the team busy. • I greatly improved on my communication and interpersonal skills when it came to dealing with different personnel within different levels of competences and qualifications the working environment. • Team work. I learnt a lot about the power and spirit of a focused team and its associated benefits in line with the set targets. Most of our tasks were accomplished within a given time frame especially when it came to computer data collection at Nakawa Business Park and Crested Towers stations. 4.4 Challenges and Limitations • Financial constraints. This was mostly on breakfast and meals which were so expensive within and around the organizational premises whose costs were so high. This was quite inconveniencing since we had to go a distance to have lunch so as to minimise some expenses. • Limited time to cover the fundamental contents of core networking. In most cases we were taken through the basis of Core networking so as to catch up with the time scheduled to the various networking architectures we were to cover. • I also faced a challenge with some clients especially those concerned with tea at the headquarters. They mainly used to undermine the interns for instance receiving no reply after
  58. 58. 46 greeting someone for two times consecutively which really created unfriendly work environment for some interns especially during break time.
  59. 59. 47 CHAPTER FIVE Conclusion and Recommendation 5.0 Introduction Chapter Five draws a summary on the various activities offered by the different parties towards a student's career and development. It points out the conclusions in terms of how better or bad something was in the trainees perspective whereas recommendation for this case puts emphasis on how well can the different parties adjust for the better towards provision of training to the interns. 5.1 Conclusion This section elaborates the recommendation to the organization and the university, and the conclusion of the entire internship report. The training impacted a lot of skills and experiences in me. I learnt a lot of technical skills, communication skills and Team leadership skills and more still the 2018 Open Mind Forum challenged me into changing my mind set, improvement on the self-esteem, attitude and the way I look at things around me which has reinforced my future career prospects. Much as the training was enriching, a lot were looked at and introduced to a number of basic skills, therefore a lot more tasks remain to be done in order to support the experiences gained. Finally, I think there is a lot for us students to do so as to level up with fast growing technological world so as to be the right employees with the right skills to attempt the right jobs at that right point in time. 5.2 Recommendations I believe that URA is a great place for a student to do his/her industrial training. Some of the reasons I would put forth are;
  60. 60. 48 • Great Technical Experience and Knowledge. My team and I had a sound technical exposure to new technologies, and excellent procedures and standards at URA. • Responsibility and Accountability for Your Actions. My team and I had a couple of trouble shooting activities under BSSA whereby we had opportunities to install some Windows 10 OS, we were briefed on the idea of formatting HDD which is very critical since it is a major storage hardware which may clients critical data. This is the right kind of experience and responsibility needed to build up accountable, professional IT graduates. • Training Personnel and their Enthusiasm towards trainees. The staff within a given department in which we were assigned were always ready and willing to help us trainees by giving us new practical skills in their section and more still covering up to volunteer to give us some training whenever a colleague isn‟t around. It is not a scenario of giving us some work and forgetting about us, instead, they had a proper plan for our training and were always working closely with us, monitoring our work and giving feedback where necessary. • Providing an overall learning. URA understands that it is not only technical expertise which will make a successful IT professional or make an intern exceptional in his or her field and therefore they are continuously working to ensure that we get an all-round learning and skill development. We had plenty of trainings and opportunities to develop our communication as well as leadership skills. More still organizing the 12th Open Mind Forum which had a great investment of successful minds into skilling not only the trainees but also the whole Uganda at large. • However I recommend the organization to channel non – focused interns into a specific department of their choice in the starting days of the training so that they get basic content on tasks and assignments under such sections. This tends to minimize the complaints regarding inadequate time.
  61. 61. 49 References Uganda Revenue Authority website https//:bridge/www.ura.go.ug Cisco Global Homepage www.cisco.com Windows Server 2012 www.tutorialspoint.com Organisation Core values, Mission and Strategic Objectives https://www.ura.go.ug/readMore.do?contentId=999000000000199&type=TIMELINE Client Value Proposition and Culture Statement https://www.ura.go.ug/readMore.do?contentId=999000000000785&type=TIMELINE Student‟s Logbook
  62. 62. 50 Appendices ______________________________________________________________________________ These are additional information considered appropriate to support the main text. Suggested appendices are as follows; Appendix 1 Configuration of Remote Access and Centralised Authentication using TACAC+ server in Cisco Packet Tracer simulator. I configured a TACACs+ server which is a protocol for security with AAA services. Its major role was to provide a centralised authentication to connect networked devices. Appendix 2
  63. 63. 51 Hardware maintenance and Troubleshooting Appendix 3 Computers Data Collection, Sorting, Recording and Presentation
  64. 64. 52 I was assigned at crested towers station and Nakawa Business Park (Cooperate Services Department). The screenshot below shows part of the recorded information about URA computer assets I captured during the placement. Appendix 4 VMware Workstation 12.
  65. 65. 53 When I was attached at the headquarters, Configuration of AD DS was one of the activities I undertook when virtualizing the computers before installing Windows Server 2012R.

×