Beruflich Dokumente
Kultur Dokumente
Declaration
Signed
Date
Approval
This industrial training report has been submitted for examination to
Mbarara University of Science and Technology by;
Signed
Date...
Company supervisor: Mr. Phaisal Lubega
Signed
Date...
University supervisor: Mr. Aggrey Obbo
ii
Dedication
This industrial training report is dedicated to the almighty God for having
guided me throughout this training and to my dear father for his endless
and tireless support he has given me may God reward his efforts.
iii
Acknowledgement
In the first place, i would like to thank the almighty God who has protected
me up this far, given me the energy, wisdom, courage and strength
throughout my industrial training period.
I extend my sincere gratitude to the staff and management of Rimpscom
Uganda Limited especially the technical department for all the cooperation
and friendly treatment that was given to us during internship .I am highly
obliged to Mr. Lubega Phaisal for his noble spontaneous and timely help
that carried out me throughout my endeavor and finally made a great
success of the training. I also wish to thank my fellow interns i worked with;
they were creative, encouraging and cooperative through exchange of ideas
and advice that has enabled me come up with the report.
iv
Short summary/Abstract
This report describes what Rimpscom Company is and its activities it
renders to clients; critically it looks at different types of skills achieved
during the industrial training undertaken. It talks about the practical
aspects of the training which actually is what is required of a student. This
report was a collection of the daily work compiled and executed from the
commencement of the training to the end. It gives an account of work
performed, lessons learnt and challenges in different areas. The report
entails more about diagnosing and troubleshooting personal computers,
networks, setting up local networks where necessary, Backing up of data,
Disassembling and reassembling of computer, Installation of programs
(software) like windows operating system windows XP II & III and windows
2007, 0ffice 2003, 2007, antivirus, drivers and other software, Repairs and
maintenance of personal computers that were at Rimpscom company
limited, configuration networks.Hard ware and software programming.
DDR
CPU
LAN
NIC
SATA
IP
OS
MAN
WAN
SDRAM
Synchronous DRAM
DRAM
Dynamic RAM
RAM
DC
RAM
ATX
STP
UTP
AC
CONFIG
WAMP
vii
Table of Contents
Declaration.................................................................................................................. i
Approval..................................................................................................................... ii
Dedication................................................................................................................. iii
Acknowledgement..................................................................................................... iv
Short summary/Abstract............................................................................................ v
Acronyms /List of abbreviations................................................................................ vi
List of Figures............................................................................................................ 2
CHAPTER ONE.......................................................................................................... 4
1.0 Introduction...................................................................................................... 4
1.1 Background/ Profile of Rimpscom....................................................................5
1.2 Company clients/customers.............................................................................. 5
1.3 Main activities/operation at Rimpscom...........................................................5
1.4 Location of Rimpscom..................................................................................... 6
1.5 Vision of Rimpscom.......................................................................................... 6
1.6 Mission of Rimpscom....................................................................................... 6
1.7 Values of Rimpscom......................................................................................... 6
1.8 Objectives of Rimpscom....................................................................................7
1.9 Organizational structure of Rimpscom.............................................................8
CHAPTER TWO.......................................................................................................... 9
2.0 Rimpscom orientation....................................................................................... 9
2.1 Introduction to hardware identication and maintainance...............................9
2.1.1 Hardware basics:........................................................................................... 9
2.2 Virtualization................................................................................................. 19
2.3 Linux commands............................................................................................. 20
2.3.1 File handling commands..............................................................................21
List of Figures
Figure 1 : Basic Mother board................................................................................. 10
Figure 2:ATX mother board..................................................................................... 11
2
CHAPTER ONE
1.0 Introduction
This report provides detailed description of all the activities that were
carried out during the period of industrial training which was carried out at
Rimpscom Company Limited from 1st June to 27th July 2012. Industrial
training refers to a period of time when an individual/student leaves the
class room work and goes out into the field to test his/her practical
capability and learn new things relevant to the course he is undertaking and
at the end of the training period a report is written to summarize what
he/she has done.
As a university routine all second year Bachelor of Information Technology
(BIT), Bachelor of computer science (BCS), second and third year Bachelor
of Computer Engineering students at Mbarara University of science and
technology (MUST) do industrial training (IT) as initiated by the institute of
Computer science (ICS) in any IT related company or organization.
This takes place during recess term and students are exposed to practical
field environment for 8 weeks. This job training is a contribution to their
academic excellence and expertise. During the course of the industrial
training, many things are taught to the students that require a lot of hands
on skills. Such practical is acquired in conjunction with an overwhelming
volume of theoretical material that is taught. To understand the material
that is taught, there is need to carry out Industrial Training in many
institutions, companies, schools, universities, industries and ministries. This
gives a student a chance feel of what happens in the field and to open up
the thinking capacity of the student.
Industrial training also shapes character and attitude of students thus
making them ready for employment. Vital aspects such as responsibility,
4
Customer orientation
Results orientation
Risk taking
DEPUTY MANAGING
DIRECTOR
ADMINISTRATOR
RECEPTIONIST/OFFI
CE MESSANGER
ASSISTANT
SALES
MANAGER
ASSISTANCE
MD/CREDIT
CONTROL
TECHNICAL
MANAGER
COLLECTOR,
SALES,
WORKSHOP
ACCOUNTANT,
STORESTAFF
CORDINATOR
AUDITOR
ENGINEERS, TECHNICIANS
TRAINEE
S/
STUDEN
TS
CHAPTER TWO
2.0 Rimpscom orientation
I was introduced to Rimpscom Company limited what it does, its future
plans and what it intends to do in the next generation for Mbarara district
and the country at large. I forwarded my
expectations as far as was concerned, i was assured to be trained and my
expectations were to be fulfilled ,this gave me hope,motivation and drived
me to work hard in whatever i was going to be taken through as outlined
in their curriculum.Mr.Lubega phaisal our placement supervisor was going
to deal with hardware ,Mugisha Samuel introduced himself to us and he
was to be responsible for software part that is with information
systems,webdesign,database design on top of that Oroni Ivan responsible
for mobile applications using j2me,Martin Galinsonga responsible for
Networking,troubleshooting networks ,router and switch configurations.
i) Mother Boards: - This is the main Printed Circuit Board (PCB) that
connects all the components of a computer system. Chipsets are
components which are embedded on the mother board and they can be
simply defined as Integrated Circuits that allow computer components to
communicate with each other.
The figure below shows a Mother board and all its components:-
Power
connector
North
Bridge
IDE
connecto
rs
RAM slots
CPU socket
Capacitors
USB
ports
10
CMOS
battery
South
bridge
SATA
connectors
Expansion
slots
VGA port
12
Processor remote
from the power
supply
i)
13
is for purposes of
ii)
conserving space
ii)
iii)
as the monitor is an
cable
iii)
board
iv)
Discs (CDs)
extra wireless
component/device.
v)
screens
v)
iv)
board
The other important component that was reviewed is the CPU socket. The
CPU socket comes in two basic designs. These include:
ii) Heat sink: - This is another important component on the mother board
and its placed on top of devices that heat up due to the functionalities they
perform. Such devices include the North Bridge and the CPU. Heat sinks
are made out of aluminum, copper or a black body that absorbs heat from
devices on which are placed. They are designed in form of fins, a design
that enables them to radiate heat generated by those devices on which are
placed very fast such that they may not heat up and exceed the expected
heat capacities which might cause mal functioning of the whole computer
system.
iii) Expansion buses: Expansion buses enhance the PCs capabilities by
allowing users to add missing features in their computers in form of adapter
cards that are slotted in expansion slots.
Expansion
slots
15
CMOSCMOS battery
battery
v)BIOS
include low level software that controls the system hardware and an
interface between the operating system and the hardware.
BIOS contains all the code required to control key board, display
screen, disk drives, serial communications and a number of miscellaneous
functions. BIOS is ROM chip on the mother board used by the computer
during the startup routine to check out the system and prepare hardware to
run.
.
BIOS chip
BIOS chip
16
vi) USB (universal Serial Bus) port:- These are used for connecting
external devices like USB flash drives, external hard disks, iPods, MP3
players and cameras.
vii)Main memory (Random Access Memory):- This refers to the
computer chips that temporarily store data dynamically when we are
working with our computers to enhance computers performance. When one
turns on power to a computer, certain operating system files (such as the
files that determine how the desktop appears) load into RAM from a storage
device such as a hard disk. These files remain in RAM as long as the
computer has continuous power.
Its also important to note that RAM is volatile. That is it loses its contents
when power is switched off. Therefore permanent storage like ROM (Read
Only Memory) is necessary since its permanent and has a bigger storage
capacity compared to RAM.
There are different categories of Dynamic Random Access Memory (DRAM)
where chips must be re-energized constantly or they lose their contents
include:
17
STA
connector
s
IDE
connectors
Figure 8:Connectors
18
SATA
cable
IDE
cable
South
Bridge
North Bridge.
Always placed under
a sink because it
generates heat
19
x) Processor
This is also called the central processing unit processor, (CPU), interprets
and carries out the basic instructions that operate a computer. The
processor significantly impacts overall computing power and manages most
of a computers operations. On larger computers, such as mainframes and
supercomputers, the various functions performed by the processor extend
over many separate chips and often multiple circuit boards. On a personal
computer, all functions of the processor usually are on a single chip. Some
computer and chip manufacturers use the term microprocessor to refer to a
personal computer processor chip. Most processor chip manufacturers now
offer multi-core processors. A processor core, or simply core, contains the
circuitry necessary to execute instructions. The operating system views
each processor core as a separate processor. A multi-core processor is a
single chip with two or more separate processor cores. Two common multicore processors are dual-core and quad-core. A dual-core is a chip that
contains two separate processor cores. Similarly, a quad-core processor is a
chip with four separate processor cores. Each processor core on a multicore processor generally runs at a slower clock speed than a single-core
processor, but multi-core processors typically increase overall performance.
For example, although a dual-core processor does not double the processing
speed of a single-core processor, it can approach those speeds. The
performance increase is especially noticeable when users are running
multiple programs simultaneously such as antivirus software, spyware
remover, e-mail program, instant messaging, media player, disc burning
software, and photo editing software. Multi-core processors also are more
energy efficient than separate multiple
2.2 Virtualization
Computers today are very durable and very efficient. This would mean
buying several computers to perform several related tasks is not ideal.
20
For example buying different servers for mail, DHCP, fire wall and
proxy yet these would be implemented by the same server.
The idea of virtualization solves this problem as its essence is to
economize resources. Virtualization can be best be described by the
diagram below:-
One physical
computer
Sub computers
(virtual
computers) inside
one physical
VM ware
Virtual box
The Advantages of virtual machines are:a) They are portable that is they can be moved from one
environment to another.
b) They can be easily configured
Common terms used in virtualization are:i)
21
ii)
22
ssh SSH client (remote login program). ssh is a program for logging into a
remote machine
and for executing commands on a remote machine
Syntax: ssh [options] [user]@hostname
For example ssh X guest@10.105.11.20
its output
23
scp secure copy (remote file copy program). scp copies files between
hosts on a network
Usage: scp [options] [[user]@host1:file1] [[user]@host2:file2]
example. scp file1.txt guest@10.105.11.20:~/Desktop/
2.3.3 Archival Commands
tar: to archive a file. Syntax: tar [OPTION] DEST SOURCE
for example: tar cvf /home/archive.tar /home/original
tar xvf /home/archive.tar
zip: package and compress (archive) files. Syntax: zip [OPTION] DEST
SOURSE
for example: zip original.zip original
24
Syntax: jobs
2.4 Hardware maintenance and Troubleshooting
The week was intended for troubleshooting most of the hardware problems
after having been introduced to the basic of hardware and having gotten
sufficient knowledge on how each component in the system unit is
interconnected to ensure that they do not malfunction.
In order to troubleshoot, I was introduced to different tools that one can
use. One of the most important tools was the Digital Multi Meter. This is
device is used to measure the following:-voltage,current,resistance and
continuity.
The digital multi meter has basically two wires, that is red and black. The
red wire is a positive terminal and its connected to a positive terminal of
the component you want to measure. The black wire is ground or earth and
is connected to a negative terminal. Connecting negative and positive
terminals has to be done correctly especially when measuring Direct
Current (DC). This is because DC does not change and measuring it
requires that the black and red wires of the digital multi meter are
connected correctly (that is red to positive and black to negative). Another
precaution to take is that the pointer has to be pointing to a voltage scale
and close to the value that you intend to measure.
Alternating Current which can be the amount of current running in the wall
socket does not have a fixed negative or positive terminal, that is positive
and negative terminals are always switching and its for the same reason
that it called AC. Its important to note that AC carries a very high amount
compared to DC. AC carries about 240 volts compared to DC which ranges
from 3.7v to 20v. Its very important to take care while measuring AC
because it can shock easily and sometimes lead to death.
Most electronic appliances use DC (like hoofers, radios, televisions, laptops,
and desktops). These devices have converters which convert AC from a wall
26
Troubleshooting steps
We opened the upper part of its casing and connected the power cable to
the power supply. Checked if any of the LEDs on the motherboard were
lighting which could show that the motherboard is being powered. This did
not work because none of the LEDs seemed to be lighting.
It was suspected that power supply could be faulty. We changed the power
supply and tried a power supply from a working computer. But the behavior
was still the same. We tested the suspected faulty power supply by joining
the green wire which carries 5v with black which is ground (negative). By
completing the circuit, the power supply fan started working, so we had to
give the idea of the power supply being faulty.
Having in mind that the computer was earlier subjected to a short circuit,
we removed the motherboard to take a closer look. We found out that the
wires of the chip that connected to the motherboard were not independent
and this was caused by the short circuit.
We resolved that the motherboard should first be cleaned such that each
joint is independent and tried to check the behavior of the computer after
that.
The problem was still pending. More troubleshooting steps to come after
that.
Scenario 3
Consider a desktop computer which when power on does not start. The
scenario is in one way or any other similar to scenario 2.
Solution
28
Troubleshooting steps
Having prior knowledge if testing the power supply, we joined the green
wire with the black wire but the behavior was static (as before). The power
supply fan did not start. We therefore resolved that the power supply was
faulty.
We opted for another power supply that was working. On connecting it to
the motherboard and connecting the power cable, it behaved as expected
(that is the LEDs on the motherboard started lighting).
We opted for the display (monitor) to check if the computer would display,
but there was not any display at all. We suspect that probably the memory
might be faulty. We are opting for some other memory chips to continue
with trouble shooting.
The problem is still pending..
Scenario 4
Consider a laptop that beeps on start up. But it was starting normally.
Originally it would display but never load the operating system. But we
were told by the owner that it fell done once.
Solution
Troubleshooting steps
We started the computer normally and read the contents it was display on
the screen. We also went to the BIOS set up to check the most important
components if the computer system like memory. RAM was being display
but the hard disk which had the operating system on it was showing none.
We tried to locate the hard disk removed and fixed it properly and we
switched on the laptop again to check if there was any change. On startup it
29
loaded it loaded the operating system. The beeps reduced but they were
just a few.
Since we told that the lap top had earlier fallen down, we thought that may
be there could be some other component that were loosely fixed. We
therefore opened the computer and put all the components aside and tried
to fix them one by one.
We reassembled it. The beep number still reduced, so suspect that there
could be another component that is loosely fixed by the computer is now
running very well. We recently installed a new copy of windows.
30
the
LinkSys
wireless
router
which i
went
ahead to
configure.
31
This router had a default IP address which was 192.168.1.1 and a default
network name which was LinkSys. I performed several configurations on
the router which included changing the default network name and IP
address, assigning particular users to access the wireless network by
adding their MAC address to the router, blocking certain websites and
protocols (like File Transfer Protocol and Telnet). I captured several screen
shoots that show the particular configurations that I did. They are as
below:-
32
Figure 12: interface for setting the wireless name that is broadcast to
clients
Figure 13: change the default IP for the router from this interface and
DHCP
33
34
.
iv)Modem: A modem is a device that allows a person to connect to your
Internet service provider. Because modems only provide one IP address
each, the best way to use a high-speed modem is to share its services
among computers.
v)Ethernet Cable:It is needed to allow the transmission of data from one
networked device to another. To set up a wired network, Ethernet cables are
needed that allow the transmission of data from one networked device to
another. Category 5 (Cat 5) cable is one of the most common types of
Ethernet cable.
vi) Switch: A switch is a device that distributes packets, or blocks of data,
between computers in a network. Switches function in a similar fashion to
hubs, but are much more efficient. A switch can send a packet directly to a
specific destination, instead of sending it to every computer in a network.
35
terminating RJ45 and cable tester which is used to test if the cable is
functioning as expected.
I terminated two types of cables that is a straight through and crossover.
i)
Figure 15 : Shows the color codes for straight through cable-both ends are
similar
Connector
Color
Pin No
Code
1
2
White/Oran
ge
Orange
36
White/Gree
Blue
White/Blue
Green
White/Bro
wn
Brown
ii)
Figure 16: color codes for crossover cable for both ends
connector
Color
Pin No
Code
37
White/Gree
Green
White/Oran
ge
Blue
White/Blue
Orange
White/Bro
wn
Brown
iii)
Step 1
Using a crimping tool, i trimmed the end of the cable i was going to
terminate, to ensure that the ends of the conducting wires are even.
Step 2
Being careful not to damage the inner conducting wires, I stripped off
approximately 1 inch of the cables jacket, using a modular climping tool.
Step 3
After that i separated the 4 twisted wire pairs from each other, and then
unwinded each pair, so thati could end up with 8 individual wires. I flatten
38
the wires out as much as possible, since they needed to be very straight for
them to be properly inserted into the connector.
Step 4
I held the cable with the wire ends facing away from me. I arranged the
wires in a flat, side-by-side ribbon formation, placing them in the following
order: white/orange, solid orange, white/green, solid blue, white/blue, solid
green, white/brown, solid brown. The table below explains straight through
and cross over arrangement.
Step 5
I held the RJ45 connector so that its pins are facing away from me and the
plug-clip side was facing down, carefully inserted the flattened, arranged
wires into the connector, pushing through until the wire ends emerge from
the pins. For strength of connection, I also pushed as much of the cable
jacket as possible into the connector so that no loss of signals takes place.
Step 6
I made sure that the wire ends coming out of the connectors pin side are in
the correct order if not i would rearrange them into proper formation, and
re-insert them into RJ45 because once the connector is crimped onto the
cable, its permanent. If at all i realized that a mistake has been made in
wire order after termination, I would have to cut the connector off and start
all over again.
Step 7
I inserted the prepared connector into the RJ45 slot in my crimping tool. I
firmly squeezed the crimpers handles together until I couldnt go any
39
further. Released the handles and repeated this step to ensure a proper
crimp.
Step 8
After completing the first termination,I repeated the process on the
opposite end of my cable.
Click
here to
continue
On clicking the view network status and tasks, i got new window as
shown below.
41
Click set up
new
connection
network
Finally the network was showing a small window which was at the
right most corner of the computer. It was showing waiting for users
since there were no computers connected to that network.
42
43
44
Went to the Remote tab, and checked allowed connections only from
computers running remote Desktop with Network Level Authentication.
45
I Selected users to add user accounts that have the right to connect to
Remote Desktop on my computer.
After that I went to start button inputted Remote desktop in the search
field, then clicked Remote Desktop Connection.
46
Then input the ip address or hostname of the computer you want to connect
to, click connect then input the username and password. Now you have
connected to this remote desktop
After I logged in the user of the computer that I logged in was logged out.
47
48
Logical design where we used the Mysql workbench to draw the entities
and make clear relationships between them and we were advised to first
know what we want the system to do and this will enable us to go ahead and
design the interface.
49
I exported the logical design to WAMP server to help build the physical
database. This was done by forward engineering the sql script using My
SQL workbench.
Building the database was followed by the need to create a suitable
interface for the user to interact with the system. We made this possible
using Adobe Macromedia Dreamweaver while programming in PHP and
html. The user interface had six pages namely; index (system start point
page), inquiry page, consultant registration, consultant login and the
solution page.
The index page is the system entry point where the user gains access to the
inquiry page which receives any inquiries posted. The consultant
registration contains a form to register any new help desk personnel.
The consultant login is responsible for consultants login and the solution
page is responsible for replying any inquiries made.
As already stated before, our scope defines an offline system therefore the
messages are posted to the users and likewise the consultants email
addresses.
When the user interface was done, we connected to our database. This was
done using a PHP script. The script was later used to connect the different
form fields to the related tables in the database.
Adding functionality to the system was the next step to be tackled. The
functionalities added included a validation procedure to satisfy proper
registration and logging in of the consultant and a way to handle user
sessions.
When the consultants log in, they are able to view any inquiries posted and
make any necessary replies accordingly. This is done from the solutions
page. The reply is sent to the users email address which he submits in
before writing the message.
50
Start page:
Inquiry page:
51
Consultant login and sign up fields: The project is safe and secure to use for
Mbarara University of science and Technology. We hereby disclaim any
misuse or irrelevant use of the system that may result into harm towards
the user in anyway.
52
CHAPTER THREE
3.0 Experiences and Challenges
3.1 Experiences
For the two month training placement that I underwent at Rimpscom, a lot
was done and gained in respect to the projects that I undertook and that
was Helpdesk system development.
During this time, I learnt how to plan for any software development
that is identifying the various steps and how they are supposed to be
carried out while designing the system.
I also learnt some programming in PHP and I was able to write codes/
scripts to insert data to the database, retrieve the inserted data and
validating the various form fields.
I learnt how to link forms to the database and to insert, retrieve and
validate the different form fields using PHP as a programming
language.
I learnt how to design the interfaces using tables and div tags and
modifying websites templates to fit websites of my interests.
3.2 Challenges
It was hard to relate theory got from lectures to the practical bit of
information technology.
The fear of damaging computer components due to the fact that i had
been told that i would replace any component damaged. This
therefore meant buying new ones
CHAPTER FOUR
4.0 Recommendations and Conclusions
4.1 Recommendations:
In order to combat the problems and challenges faced by me
4.2 Conclusions:
In my conclusion industrial training is good and essential for every student
doing their bit because most of the practical skills related to this course are
gained while doing this training.
Advancement in computer technology has to be appreciated. Great thanks
to Rimpscom company limited, without them i would not have known
56
where my ability could reach and what technology has brought to this new
generation.
I will treasure and cherish Rimpscom company limited wherever i go for
allowing me to study from their company, long live, all the best.
I performed various tasks, some of them being trouble shooting which
confirmed the idea i had that Information Technology is not a job that does
not only involve technical skills, but implies a fair amount of communication
and negotiation with the clients hence the need for good communication
skills.
The training has not only helped me gain technical skills but also has
adjusted my intended future prospects. Much as the training was enriching,
much was looked at, so a lot remains to be done in order to support the
experience gained.
Finally to be sincere ,I think there is a lot to do at the university for the
students to gain skills since they are crucial to the working
environment,most students take what is taught in class for granted but it is
very crucial especially in programming.
4.3 References:
[1] http://www.rimpscom.co.ug.
[2] http://www.sqlcommands.net/
57
[3] http://www.w3schools.com/php/default.asp
[4] http://www.w3schools.com/css/default.asp
[5]http://i.ehow.com/images/Globalphoto/Articles
[6]http://computer.howstuffworks.com
[7]http://upload.wikimedia.org/wikipedia/en
4.4 Appendices:
58
59
60
61