A REPORT OF THE INDUSTRIAL ATTACHMENT UNDERTAKEN AT LAKE VICTORIA SOUTH WATER...Shikhule Kevin
This report is aimed to provide an overview of what I have done for three months at Lake Victoria South Water Works Development Agency as an attaché in the department of Corporate Services Department and was compiled in the fulfillment of Bachelors of Arts in Communication and Media Technology with IT of Maseno University.
This is my report that i did for my industrial placement or what one would call internship. It has some detailed information that can help anyone in the field of IT.
It has all sorts of topics like networks, systems administration and many others.
A REPORT OF THE INDUSTRIAL ATTACHMENT UNDERTAKEN AT LAKE VICTORIA SOUTH WATER...Shikhule Kevin
This report is aimed to provide an overview of what I have done for three months at Lake Victoria South Water Works Development Agency as an attaché in the department of Corporate Services Department and was compiled in the fulfillment of Bachelors of Arts in Communication and Media Technology with IT of Maseno University.
This is my report that i did for my industrial placement or what one would call internship. It has some detailed information that can help anyone in the field of IT.
It has all sorts of topics like networks, systems administration and many others.
Fortune Mushonga Attachment Report Operations Research and Statistics Student...Fortune Fmx Mushonga
Fortune Mushonga Attachment Report at Grassroot Soccer Zimbabwe ..Operations Research and Statistics Student at The National University of science and Technology Zimbawe ,
Final Internship Report by kiyimba Bill (International University Of East Afr...Bill Kiyimba
An Internship / Field Attachment report sample format for fulfillment of the requirements of the degree in Software engineering, Computer science and Information Technology.
Fortune Mushonga Attachment Report Operations Research and Statistics Student...Fortune Fmx Mushonga
Fortune Mushonga Attachment Report at Grassroot Soccer Zimbabwe ..Operations Research and Statistics Student at The National University of science and Technology Zimbawe ,
Final Internship Report by kiyimba Bill (International University Of East Afr...Bill Kiyimba
An Internship / Field Attachment report sample format for fulfillment of the requirements of the degree in Software engineering, Computer science and Information Technology.
An internship report submitted in partial fulfilment of the requirements for the a ward of diploma of science in information technology of muteesa 1 royal university
Innovations in Industry: Navigating the BTCL LandscapeMd. Inzamul Hoque
Industrial training provides students with a significant chance to actively participate in the
telecommunications industry and get practical knowledge that is essential for their career
advancement even before they graduate. The primary aim of industrial training is to impart
pupils with a comprehensive comprehension of their particular domain and to confer
certification for subsequent utilization. This program cultivates attributes such as careful
adherence to industry regulations, unshakeable reliability, a deep sense of accountability, and
successful collaboration with colleagues. This curriculum provides graduates with the
necessary practical skills to effectively supervise network equipment that complies with
industry standards, handle different types of connections, and operate cards within the
telecommunications infrastructure. Throughout this session, we got the opportunity to
examine the extensive network architecture of BTCL and get knowledge about the wide array
of services provided by the company. Furthermore, we analyzed the complexities of losses
that arise inside BTCL's operations and the corresponding tariffs. We have developed
expertise in comprehending the protocols and procedures essential for the functioning of a
telecommunications network. Through this extensive training, we have gained a deep
understanding of the fundamental elements, equipment, and procedures that form the
foundation of BTCL's telecommunications infrastructure. This course has enhanced our
practical understanding and broadened our view of the telecoms industry in Bangladesh.
Student Work Experience Programme (SWEP 1) Technical Report by Michael AgwulonuMichael Agwulonu
Student Work Experience Programme is a structured, career-related experience programme in which the students perform tasks that contribute to their knowledge and widen their knowledge of their various fields. This programme is designed to give students the right attitude towards work.
Student Work Experience Programme is a programme designed to complement the theoretical knowledge to be acquired by the students in the academic environment for a period of 4 weeks in different workshops/laboratories in each department within the Faculty of Engineering.
This Technical Report is an account of 4 weeks work experience in the Federal University of Technology Akure, Ondo State, Nigeria. It briefly discusses the general overview of SWEP, the aims and objectives of SWEP, the code of conduct in the workshops, the duration period of SWEP for the 2019/2020 academic session, the SWEP orientation programme, and the order of projects in Chapter one. Chapter two briefly talks about the overview of the project 1 (production of extension box), the apparatus and materials used in the production, the procedures of operation, and the precautions taken during production. Chapter three briefly discusses the overview of the project 2 (production of industrial gas burner), the apparatus and materials used in the production, the procedures of operation, and the precautions taken during production. Chapter four discusses on the overview of the project 3 (production of interlocks), the apparatus and materials used in the production, the procedures of operation, and the precautions taken during production. Chapter five highlights on the overview of the project 4 (production of frying pan), the apparatus and materials used in the production, the procedures of operation, and the precautions taken during production. Chapter six concluded my report with my personal recommendations. Then, follows my references.
Acknowledgment
Before all I would like to thankful almighty God for giving me guidance and health on the whole year of my semester’s time up to this moment of preparing this report. I would like to take this time to express my deeply and strongly sincerely on gratitude of this report Tanzania Telecommunication Company Limited (TTCL) by giving me the chance to do Industrial Training within their company and experts Mr. Fulgence Mayeye, Mr. Nicholaus Mality and Mr. George Mtendamema for their guidance, support and advice because without their contributions this report could not be completed. Also I would like to take this opportunity to appreciate the work done by Mr. N. Gati the supervisor from The university of Dodoma (CIVE) for good assessment during the Practical Training at Tanzania Telecommunication Company Limited (TTCL) and Mr. Khamis Fereji the project coordinators.
Lastly my special acknowledgements should go to my fellow students of the college of informatics and virtual education for their full time support starting from requirements gathering up to this moment of preparing this report.Introduction
This report is about the knowledge that acquired during industrial training for a student in the University which conducted at the Tanzania Telecommunication Company Limited (TTCL) which program was conducted for six weeks from 15th August, 2016 to 23th September, 2016. It is driven by a need to centralize all related subjects during training period so as to control well all activities and operations of the system.
The applications of Computer Networking are currently accepted and applicable by different people and in several organizations because it’s expected to be implemented practically in automatic way. Through this Industrial Training I have been able to perform several activities and communicate with college staffs through practicing in order to get feedbacks on time.
The tasks and activities that organization experts leave to us was merely involve Network configuration by using Cisco packet tracer and using real computers and real router, configuration and installation of printers in the TTCL offices and their branches, Computer maintenances and Troubleshooting and participating in developing of TTCL Field Student Registration System.
These practices were helped us a lot to gain more knowledge and skills and building confidence among us because it involves actions not only theories.
But this report explains much about the Printers as we know Printers produce paper copies of electronic files. Hard copies of computer documents remain important today.
And explain more about configuration and installation details also explain much about the problems might face the printer and their techniques to troubleshooting and fix those problems
Final Internship Report at Institute of Information Technology, University of Dhaka (IIT, DU [http://www.iit.du.ac.bd]); performed at Jantrik Technologies Ltd. [http://www.jantrik.com]
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
1. i
INDUSTRIAL ATTACHMENT REPORT
NAME: PAULLASTER AMOLO OKOTH
REGISTRATION NUMBER: CIT-221-057/2017
LEVEL OF STUDY: UNDERGRADUATE
DEPARTMENT: INFORMATION TECHNOLOGY
COURSE: BSC. INFORMATION TECHNOLOGY
STATION: MULTIMEDIA UNIVERSITY OF
KENYA
PERIOD: 06/05/2019- 06/08/2019
REPORT SUBMITTED IN PARTIAL FULFILLMENT OF THE
REQUIREMENTS FOR THE AWARD OF DEGREE IN BACHELOR OF
SCIENCE IN INFORMATION TECHNOLOGY.
SUBMITTED TO THE DEPARTMENT OF INFORMATION
TECHNOLOGY.
2. ii
DATE OF SUBMISSION: 14TH
SEPTEMBER 2019
MULTIMEDIA UNIVERSITY OF KENYA
FACULTY OF COMPUTING AND INFORMATION TECHNOLOGY
MULTIMEDIA UNIVERSITY OF KENYA
Date: 15/5/2019-15/8/2019
DECLARATION.
I PAULLASTER A. OKOTH do as a result of this declare that this report is my original work
generated from an attachment which took place at Multimedia University of Kenya.
Signature………………………….…………………date…………………………………
FIELD SUPERVISOR APPROVAL
I NICKSON M. NJIRU confirm that PAULLASTER A. OKOTH was an attaché at Multimedia
University of Kenya for a period of three months with me being the ICT directorate field
supervisor.
Signature ………………. Date…………….………… Stamp………………………
Mr. NICKSON M. NJIRU
Multimedia University of Kenya.
ASSESSOR APPROVAL SCHOOL OF CIT
This attachment report has been submitted for examination with approval respectively as the
university and field attachment coordinator.
3. iii
Signature………………………. …………. Date……………………………….
Mr. KELVIN KARIUKI
SCHOOL OF COMPUTING AND INFORMATION TECHNOLOGY
MULTIMEDIA UNIVERSITY OF KENYA
DEDICATION
I am complacent to my kin, friends, lecturers, instructors, guidance counselors, and the Multimedia
University of Kenya fraternity for their support, whether informational, financial, educational,
psychological, and physical or in any other way during my tenure as an faculty of CIT intern at
Multimedia University of Kenya.
This report comes courtesy of the mentioned role-players and I would love to dedicate my findings,
experience and achievements to them.
4. iv
ACKNOWLEDGMENT
As my academics and internship experience are success, I express my deepest appreciation to all
those who provided me the opportunity and guidance. First and foremost, I thank the almighty
Lord for giving me Life. I cannot wish for anything more from Him. A special gratitude I give to
the Dean Faculty of Computing and Information Technology, Dr. Odeo Moses, Multimedia
University of Kenya, who gave me the chance of doing internship with this esteem institution. I
say thank you very much Dean. To my boss and supervisor, Mr. Nickson M. Njiru, your
contribution in stimulating suggestions and encouragement is forever going to guide me in my
Information Technology career path, thank you sir. I would also like to acknowledge with much
appreciation the important role of the staff of Multimedia University of Kenya, especially, Mr.
Victor Muriithi, who in spite of his duties, got time to listen, guide and keep me on the correct
path. To Mr. Gibran and Mr. Seth Olale, my ICT support work could not have been completed
without your time in providing the needed skills. I say thank you.
Furthermore, distinguished appreciation also goes to the management of Multimedia University of
Kenya most especially the Vice Chancellor, Professor Festus Kiberia. The Dean, Dr. Odeo Moses
5. v
and the Head of Information Technology Department (HOD), Dr. Patrick Mokodir and all others
involved in making internship part of the academic assessment to enable students gain the aspiring
work experience before graduating. Many thanks also goes to The Head of Computer Science
Department, Mr. Peter Muturi for his unending assistance. I can never forget to mention my
Mother, Mrs. Okoth, if it hadn’t been for her, my education wouldn’t have reached this far. God
bless you Mum.
EXECUTIVE SUMMARY
This is an internship report, undertaken by Mr. Paullaster A. Okoth at Multimedia University of
Kenya. The intern started his internship from 6th May to 6th August, 2019. In fulfillment of the
requirement of the Degree in Bachelor of Science in Information Technology at Multimedia
University of Kenya, it is mandatory for Second Year Second Semester students to have a
minimum of two (2) months practical industrial experience in their respective fields of training
and organization of their choice. An Industrial attachment is essential requirement for awarding of
Bachelor Degree Certificate in the Multimedia University of Kenya, (MMU).
The purposes of the internship is to prepare the student to serve the needs of industry and
information technology more effectively upon graduation. This included providing real life
experience and exposure, thus gaining first-hand exposure of working in the real world, granting
the opportunity to learn more about the intern self-potentials and abilities, getting connected and
developing professional network, preventing CV from going to trash during job application and
transition to full-time job position. Internship allows students to harness the skill, knowledge and
theoretical practice they learned in the University and enabling them to transform theory into
practical real life situations. The intern’s time with Multimedia University of Kenya has really
6. vi
illuminated my knowledge and understanding of practical experience of the theories being taught
between the walls of the University lecture halls and in the corporate environment.
Table of Contents
INDUSTRIAL ATTACHMENT REPORT......................................................................................................i
DECLARATION. ...................................................................................................................................ii
DEDICATION......................................................................................................................................iii
ACKNOWLEDGMENT..........................................................................................................................iv
EXECUTIVE SUMMARY ........................................................................................................................v
CHAPTER 1 : INTRODUCTION............................................................................................................viii
1.1 Geographical Location.........................................................................................................viii
1.2 Historical Background of Multimedia University of Kenya ................................................viii
1.2.1 MMU ORGANOGRAM.........................................................................................................ix
1.3.1 Mission...............................................................................................................................x
1.3.2 Vision.................................................................................................................................x
1.4 Institution Goals. ....................................................................................................................x
1.5 Faculty of CIT objectives.......................................................................................................x
CHAPTER 2: WORK EXPERIENCE..........................................................................................................xi
2.1 Student Daily Routine ...........................................................................................................xi
2.2 Tasks performed................................................................................................................... xii
7. vii
2.2.1 Troubleshooting................................................................................................................xii
a). Printer problems..............................................................................................xii
Removing a rear access panel ....................................................................................................xii
b) Network Connection Problems.........................................................................xiv
c) Access points....................................................................................................xv
2.2.2 Networking....................................................................................................................... xv
A. Choose the |Wireless| tab, and change only:....................................................xvi
B. Choose |Network| tab, and change only:..........................................................xvi
C. Choose |Ubiquiti Logo| tab and change only:....................................................xvi
2.2.3 Software Operation Problems.......................................................................................... xvii
2.2.4 Hardware Maintenance..................................................................................................xviii
CHAPTER 3: CONCLUSION AND RECOMMENDATION. ........................................................................ xix
3.1 Skills acquired..................................................................................................................... xix
3.2 Conclusion........................................................................................................................... xix
3.3: Recommendation................................................................................................................xxii
8. viii
CHAPTER 1 : INTRODUCTION.
1.1 Geographical Location
Multimedia University of Kenya Main Campus is located in a serene environment 25 Kilometers
south of Nairobi along Magadi road, a kilometer away form Ongata Rongai town. The campus
stands on 115 ha of land adjacent to Nairobi National Park.
1.2 Historical Background of Multimedia University of
Kenya
Multimedia University of Kenya was founded in 1948 when the institution was founded as
Central Training School to serve as East African Post Training School before changing to Kenya
Posts and Telecommunications Corporation (KPTC). This was after the collapse of the East
African community in 1977. In 1992, the college was upgraded to Kenya College of
Communications Technology under KPTC and became a subsidiary of Telkom Kenya (TKL)
after KPTC split into Postal Corporation of Kenya, Telkom Kenya Ltd and Communications
Commission of Kenya (CCK). The college became a subsidiary of CCK after the privatization of
TKL in 2006. It was established by the Kenya Government under Legal Notice Number 155 of
2008 as a constituent college of Jomo Kenyatta University of Agriculture and Technology
(JKUAT). Multimedia University of Kenya (MMU) is a chartered public university established
by the Kenyan Government under the Universities Act No. 42 of 2012 and the Multimedia
University of Kenya Charter 2013 and it is ISO 9001-2015 certified.
9. ix
Multimedia University of Kenya is a modern day state-of-the-art public university. Given the
vast and rich communication history of the institution, the university has particularly positioned
itself to serving and being the market leader in the fields of IT, Media, Science, Engineering and
Business.
The University Academic Programmes are designed in consultation with the industry so as to
ensure relevant and quality education is offered to all students.
The university takes the lead in offering new academic training in Engineering, Media and
Communication, Information Science and Technology and Business to meet the aspirations of a
dynamic society, while inculcating strong research, outreach, and innovation culture within an
efficient team of academic, technical and administrative staff.
1.2.1 MMU ORGANOGRAM.
11. xi
1.3 Mission and Vision
1.3.1 Mission
To provide quality training, nurture a culture of research, innovation and extension to meet the
aspirations of a dynamic society.
1.3.2 Vision
To be the University of Choice in training, research, innovation and extension.
1.4 Institution Goals.
1.4.1 Faculty of computing and information technology
The faculty of computing and information technology is headed by the Dean . The faculty has
two two departments ; Computer science Department which consist of Bachelor of science in
Computer science and Bachelor of science In software engineering and information Technology
department which consist of Bachelor of science in Information Technology and Bachelor of
science in computer technology. Each department is headed by chair of department. Under the
faculty there is faculty support office for supporting students and staffs
1.5 Faculty of CIT objectives
Multimedia University of Kenya is committed to providing high quality educating producing
competent graduates and endeavors to excel in areas of Training, Research and Innovation,
Extension, Technology Transfer and consultancy services. To help achieve this mandate, CIT has
committed to the following objectives;
1. To automate processing of student matters by June 2019
2. To increase the network coverage from the current 66% to 83% by June 2019
3. To improve time taken to resolve ICT related issues from the current 3 days to within 2
days by June 2019.
12. xii
4. To optimize internet bandwidth usage from the current 67% to 80% by June 2019.
CHAPTER 2: WORK EXPERIENCE
2.1 Student Daily Routine
At my station (Faculty of CIT) I worked as an IT Support staff and my daily activities were to
ensure that all computers and printers in the institution’s offices were in a good condition. This
included; -
Ensure that all computers and printers in the institution’s offices were in a good
condition.
Repair and maintenance of damaged computers.
Ensuring proper functionality of computers in all departments.
Assembling and setting up new computers.
Installation of erp system (Microsoft Dynamics).
Installation of operating systems and computer programs.
Network troubleshooting.
Installing trunking in new offices, terminating the network cables and configuring the
created ports.
Maintaining students’ computer labs.
13. xiii
installing and renovating network cables in some offices.
Connecting the computers to their respective domains.
Ensuring that the installed softwares were functioning as expected.
connecting the computers to the school network.
IP configuration in computers.
2.2 Tasks performed
The tasks were all under specific categories. These categories are; troubleshooting, networking,
Software problems and Hardware maintenance.
2.2.1 Troubleshooting
a). Printerproblems
Printers had some problems like paper jam, printer being connected but not printing or a shared
computer not printing from the computers connected to it.
14. xiv
Paper jam was solved by removing any loose paper in the loading tray and I had to Press the
Resume button on the front of the printer. Overfilling the paper tray is frequently the cause of
paper jams. I had to ensure the printer paper is correctly set into the slot or tray. Examine the
printer for any debris before printing. Paper jams, torn paper, printing labels or other foreign
objects in the printer can cause reoccurring jams.
Sometimes I couldn't get to the paper jam from the loading tray, so I had to perform the following.
Usually, the back of the printer has either a rear access door or a two-sided printing accessory.
Removing a rear access panel
Locate the knob or access tab on the back of the printer by or on the panel itself. If it's a knob,
move it to the unlocked position.
1. Remove the panel and carefully pull out the jammed paper.
2. Locate and clear away any small bits of paper that remain.
3. Replace and secure the rear panel.
In some other cases the printer was connected to the hosted to the host computer and could not
print. This problem was solved by performing some troubleshooting; using the computer’s
troubleshooting too or checking for problems manually. Once the computer’s troubleshooting tool
failed, I could confirm whether the printer driver is set as default, if it is in default then restarting
the computer would solve the issue otherwise reinstalling the printer software solved the problem.
There was the case that a computer was shared to other computers in the same network and the
guest computers could not print. This was solved by confirming that the host computer was
printing to that printer, then checking whether the printer is shared in the host computer. Then
these are the factors I checked for:
1. Check if the computers are in the same network or domain. The computers should be in
the same network for them to connect and share.
15. xv
2. Checking if the guest computers are pinging to the host computer. The computers should
ping for a successful connection to the printer.
3. Checking the OS of the host computer. When the host computer has a higher version of
Windows i.e. Windows 10, then in the case where the guest computers have a lower version
of Windows like windows 7 then it will be challenging for the guest computer to connect
to the printer due to improved security measures improved on higher versions of Windows.
It is then advised that the host computer should be the one with the lowest version of
Windows or ensure that all the computers have the same version of OS.
4. Check the encryption bit type on the network sharing configurations of the host computer.
Figure 2.1: A picture showing file sharing connections
5. Check if the connection to the printer is done using the host computer name or the host
computer IP address. This is necessary especially if the computers are connected to a
DHCP server which assigns dynamic IP addresses to the computers. Thus the host
16. xvi
computer IP address may change from time to time. Connecting to the printer via host
computer name is recommended as it does not change even when its IP address changes.
b) Network Connection Problems
Some computers were not connecting to the internet. To solve this, troubleshooting was necessary
to identify the problem. Steps followed to solve network connection problems were:
1. Checking if the ethernet cable is well connected.
2. Checking whether the system proxy configured in the computer. If present confirm whether
it is the correct one.
3. Check the vlan of the connected lan cable.
4. If the institution has a DHCP server ensure that the IPV4 properties of the network adapter
are set to accept dynamic IP addresses otherwise assign the computer a static IP address
which is not assigned to any other network.
c) Access points.
Some access points could not provide a connection to the internet for the connected devices. This
was solved by restarting the access point manually or by accessing using a browser through its
configured IP address.
2.2.2 Networking
I assisted in installation of trunking in some new offices, distributed LAN cables in the offices
through the trunking. Terminated the ethernet cables and fixed them on the trunking using a
network jack. Then configured the created ethernet ports to be used for both IP phones and desktop
on the available cisco switch. These ports were all set on the staff vlan.
I installed network access points (routers) on different locations in the institution. These
installations were accompanied by configuring the IP address of each access point, its default
17. xvii
gateway and the range of users to be connected to the router. Also, each access point had its unique
SSID and password. The most used Access Point was ubiquiti and below are the configuration
procedures:
These instructions assume that your radio is set to FACTORY DEFAULT values. Please restore
to factory defaults before proceeding. This is critical, especially if you are troubleshooting a
problem.
1.With your Windows 7 PC or MAC computer configured to the 192.168.1.x subnet, connect it to
the radio using an Ethernet cable. The Ethernet port is auto-sensing. You are not required to use a
cross-over cable.
2.Using a web browser, enter 192.168.1.20 as the "URL" to gain access to the radio's management
console.
3.Enter "ubnt" as the administration account and "ubnt" as the password.
Configuration Instructions (change ONLY the items shown, leaving others at default values):
A. Choosethe|Wireless|tab, and changeonly:
Wireless Mode: Access Point
Channel Width: 20MHz
Press [Change] button
OPTIONAL for 5GHz (802.11a) ONLY: Some newer devices can attach to 5GHz (802.11a)
hotspots. It is possible to create a more private hotspot using Ubiquiti M5 radios (5GHz), rather
than M2 radios (2GHz). The setup instructions are the same with this single variation. It applies
ONLY to M5 radios.
Frequency List, MHz [X] Enable (select it)
[Edit...]
Select only those frequencies that are recognized Wi-Fi channels (UBNT radios can operate "in
between" standard channels, where some 802.11a Wi-Fi clients may not be able to find them). In
the USA: 5745, 5765, 5785, 5805, 5825, [OK]. For channel frequencies of other countries, see this
link: http://x.co/mW2I
Press [Change] button
B. Choose|Network|tab, and changeonly:
Network Mode: SOHO Router
Press [Change] button
18. xviii
C. Choose|UbiquitiLogo|tab and changeonly:
airMAX: [ ] Enable (UN-select it)
Press [Change] button
Press [Apply] button
ALERT #1: Since the Ethernet port of the radio is now configured by DHCP, you will lose
connection to the radio via Ethernet. Because it is not connected to a DHCP server, it will use the
"fallback SOHO Router IP address" of 192.168.10.1. Connect the radio's Ethernet port to your
Cable/DSL modem or router to continue.
ALERT #2: When connecting to a Cable or DSL modem, it may be necessary to power-cycle that
modem in order for it to discover the Ubiquiti radio and assign it a functional DHCP
Then telnet the switch and configure a port as an access point so that the access point can be
configured using a public IP address and also make the switchport mode to trunk so that it is not
in some specific vlan.
2.2.3 Software Operation Problems
As IT support staff, I received claims from other staffs claiming that some of their software systems
were not working accordingly. These softwares include Microsoft Dynamics (NAV) which is the
erp system of the school, Groupwise, Kaspersky, Microsoft office, and all other office softwares.
Staffs complained of poor performance on some of the installed softwares. This was solved by
restarting the software or the desktop. Checking network availability was also another factor to
consider. When this didn’t solve the problem then re-installation was done to put fresh
configurations for the software and it worked properly as expected.
At other occasions, some staff asked for assistance on how to use the erp system to perform some
official operations and I helped them through the process. This included helping a student
19. xix
2.2.4 Hardware Maintenance
Under maintenance I assisted to ensure that computers were operating as expected. This process
included checking if the system RAM was of the correct size, clearing temporary files also was a
key to increasing system speed.
Some system units had hard drives which were not functioning, so new hard drives had to used to
replace the spoiled ones. This was done by disconnecting the power cable from the system unit,
opening the system unit’s back cover, unmounting the spoiled hard drive and replacing the new
one on the same position.
RAMs were increased by getting a new RAM stick and mounting it on the extra slots left for
increasing RAM on the system unit’s motherboard. Most computers had 4 GB RAM initially so
we requested to the procurement to provide us with 4 GB RAM sticks which would be used to
upgrade the computers which needed like 8 GB RAM.
20. xx
We also replaced broken fans and blew dust from some computers using a blower. Another activity
performed under the hardware maintenance was replacement of printer toners and refilling toners
with ink.
CHAPTER 3: CONCLUSION AND RECOMMENDATION.
3.1 Skills acquired
As an IT Support Staff, I learned so much regarding on tacit knowledge and explicit knowledge.
Some of the skills obtained include:
Setting up a new network in a small institution.
Erp management (Microsoft Dynamics NAV).
Troubleshooting network problems
Troubleshooting printer problems.
Replacing and Installing new networking devices.
Computer laboratory maintenance.
Software installations and upgrading.
Networking.
3.2 Conclusion
Multimedia University is a very good and favorable environment for attachment full of lots of new
information technology practical aspects that are essential with the modern digital technology. The
place is well organized and suitable for trainees who are willing to learn.
21. xxi
In general, attachment/industrial training has been life changing experience in my information
technology career full of lots of things to learn starting from self-discipline to practical application
of theory learned in class. Therefore, I conclude by saying that the attachment I carried out at
Multimedia University was very important and relevant to me. It has taught me a lot and expanded
on my knowledge in the world of technology. I sincerely thank the university, supervisors and
team members for their support. There has been a spirit of team work and commitment, and I am
now an overall better person, both socially and intellectually.
3.3: Recommendation
This is my first industrial training/internship in my university and I strongly recommend that the
different departments and faculties in the university should look for internship places for the
students because some of the students panic and cannot settle or concentrate because they have
failed to get companies to work with. The university should establish partnership with organization
so that they can secure attachment placements for students. It should be mandatory for
organizations/companies to offer industrial training/attachments to students so as to build on
human resource capacity.