Nesie Report
Nesie Report
This attachment report has been submitted with my approval as the college supervisor.
Name: Mr.
Sign…………………………….. Date…………………………………….
ii
ABSTRACT
This report is compiled in partial fulfilment of Diploma in Information and Communication
Technology at Bukura College and it serves to provide an overview of what the student
learned during the attachment period at West Kenya Sugar Company for the 12-week
training. The report gives a brief description of the history of the institution and the functions
performed. The Company’s complete range of activities involved in IT department is
mentioned. Institution’s structure chart and brief introduction of IT department where the
student was attached is outlined. The duties that were assigned to the student and the
knowledge and skills that were acquired are explained in detail .Evaluation of the Company
on SWOT analysis is explained at length in the report including challenges, conclusions and
recommendations for the future of the company.
iii
ACKNOWLEDGEMENT
I sincerely thank the Lord God Almighty for the divine protection, guidance and the
opportunity of a memorial and fruitful period at West Kenya Sugar Company,
Secondly may I extend my heartfelt gratitude to my family members and relatives for
their support both financially and for the pieces of advice they granted me .I also owe so
much thank you and gratitude to West Kenya Sugar Company as a whole for their
unwavering support and for giving me the chance to undertake my industrial attachment at
their place. Worth to mention, I extend my gratitude to my supervisor Mr. Brian, for his
warm welcoming, guidance, remarks and relevant suggestions and advice he gave me. May
God bless you all. I would like to thank the ICT Department and my assessor Mr. Mutai
who came to supervise my attachment work, May God bless you too
iv
LIST OF FIGURES
Figure 3. 1 LAN structure..........................................................................................................6
Figure 3. 2 Switch in networking structure................................................................................6
Figure 3. 3 Router and its configuration....................................................................................8
Figure 3. 4 A Tool for Crimping Ethernet Cables.....................................................................9
Figure 3. 5 A Nano Station and its Configuration...................................................................10
Figure 3. 6 CPU Structure of the computer..............................................................................12
Figure 3. 7 Monitor for the Display.........................................................................................13
Figure 3. 8 A Keyboard for Typewriting.................................................................................13
Figure 3. 9 A motherboard that contains some parts of a computer........................................13
v
LIST OF ABBREVIATIONS
WEKSCOL-West Kenya Sugar Company Limited
BAC-Bukura Agricultural College
CCTV-Closed Circuit Television
LAN-Local Area Network
WAN- Wide Area Network
PSU-Power Supply Unit
IT-Information Technology
ICT-Information and Communication Technology
RAM-Random Access Memory
CD-Compact Disk
IP-Internet Protocol
WLAN-Wireless Local Area Network
SWOT-Strength Weaknesses Opportunities and Threats
AMS-Agricultural Management System
SAP-System Application and Product Processing
TCP/IP-Transfer Control Protocol/Internet Protocol
DC-Direct Current.
vi
TABLE OF CONTENTS
Table of Contents
DECLARATION......................................................................................................................ii
ABSTRACT.............................................................................................................................iii
ACKNOWLEDGEMENT......................................................................................................iv
LIST OF FIGURES.................................................................................................................v
LIST OF ABBREVIATIONS................................................................................................vi
TABLE OF CONTENTS......................................................................................................vii
CHAPTER 1.............................................................................................................................1
1.0 INTRODUCTION............................................................................................................1
CHAPTER 2:............................................................................................................................2
2.0INTRODUCTION.............................................................................................................2
CHAPTER 3:............................................................................................................................6
3.1NETWORKING....................................................................................................................6
vii
3.1.2 DEVICES USED IN LAN CONNECTION............................................................6
3.1.4 IP ADDRESSING..................................................................................................11
3.1.8 PRINTERS...............................................................................................................16
CHAPTER 4:..........................................................................................................................19
4.1 Strengths.........................................................................................................................19
4.2 Weaknesses.....................................................................................................................19
4.3 Opportunities..................................................................................................................19
4.4 Threats............................................................................................................................19
CHAPTER 5:..........................................................................................................................20
5.1 CONCLUSIONS............................................................................................................20
5.2 RECOMMENDATION..................................................................................................20
References................................................................................................................................21
viii
CHAPTER 1
1.0 INTRODUCTION
Any student of Bukura College undertaking diploma courses is required to undergo an
Industrial attachment for a period of at least 3 months in a field relevant to their course of
study. It is an essential requirement for award of any award of diploma. The Attachment is
under supervision and intensive report compilation required to be submitted to the college on
completion
Field attachment is a learning process, its practical work carried out by both the staff and the
student in any organization or institution. It’s carried out under the supervision and guidance
of training Supervisor.
Industrial attachment entails practical work which exposes the learner in various activities.
This attachment is a component of the curriculum of BAC. Each and every student has to
undergo the practice for partial fulfillment of the award of diploma and certificate courses.
Attachment is a supervised program that requires every attaché to undertake and adhere to
rules and regulations required by an organization. The lecturer asses the student by going
through the log books and asks question on how the student has been doing, the experiences
gained and challenges faced. A student is usually issued with the log book which he/she
records the daily activities and weekly activities which are later on counter checked by the
training supervisor. This is to ascertain the level of seriousness of the student, strength
and weakness of the student. During attachment, attaches are expected to acquire additional
experiences to boost their programs of study back at the college. The trainees also get
exposed to real work which enables them acquire skills and knowledge about the job
opportunities.
1. To apply the knowledge gained from the studies in school to solve problems that
occur in the practical sector.
2. To gain experience in procedures, policies and standard operating procedures in
an ICT Department.
3. To perform basic general duties that relate to professional and practical sector of
ICT in the Company.
4. To learn networking skills from crimping and creating patch cables, working with
routers, switches and bridges.
5. To learn maintenance and repair of computer systems, laptops, printers and
scanners.
6. To carry out procedural steps in installation of systems, setup and deployment.
2
CHAPTER 2:
2.0 INTRODUCTION
It successfully expanded its OPS capacity to 400TCD in 1990. In the year 1992 installed a
500TCD Vacuum Pan Sulphate (VPS) Technology therefore expanding the capacity to
900TCD.
In 2005 it had further expansion and the installed capacity has been increased to 1800TCD.
Presently the company is under the expansion plan of 5000TCD which was commissioned by
2012.
The company sources its raw material sugarcane from 35000 small scale farmers within the
West Kenya Sugar Zone. The Zone has been allocated to the company by the Ministry of
Agriculture (MOA) and covers an approximate of 24km from the factory.
The Directors since then were:
3
Misikhu Weighbridge in Bungoma county
Naitiri plant in Bungoma county
Nzoia Quarry in Kakamega county
Innovation
Respect
4
We treat others as we would like to be treated.
Ownership
5
ix. Decline in productivity at farm level
x. Competition from other producers arising from economic liberalization.
2.2 STRUCTURE AND FUNCTION OF WEST KENYA SUGAR COMPANY
BOARD OF
DIRECTORS
MANAGING DIRECTOR
PROCU
MECHAN CIVIL AUTO
AGRIC REMEN LEGAL&INSU
ICAL TRANS ENGIN HR MOBIL
ULTUR T AND RANCE
ENGINEE PORT EERIN ADMIN E/WOR
RING E LOGIST SERVICES
G KSHOP
IC
MATERIAL MATERIAL
SOFTWARE HARDWARE RECEIVABLE INSURANCE
6
CHAPTER 3:
FIELD ATTACHMENT ACTIVITIES
3.0 DUTIES AND RESPONSIBILITIES
3.1NETWORKING
Computer networks is the connection of two or more computers for the purpose of sharing
information and resource.
7
ETHERNET CABLE
An Ethernet cable is one of the most common forms of network cable used on wired
networks. Ethernet cables connect devices within a local area network, like PCs,
routers, and switches.
In West Kenya Sugar Company the most commonly used Ethernet cable is straight through
cable and the other type is crossover cable.
STRAIGHT THROUGH CABLE
A straight-through cable is a type of twisted pair cable that is used in local area networks to
connect a computer to a network hub such as a router. This cable uses either at both ends
568A Standard or 568B standard.
It is the most commonly cable that is used in WEKSCOL for network connection
I participated in terminating the cable at both ends using crimping tool
The arrangement of the unshielded cable before crimping is orange/white, orange,
green/white, blue, blue/white, green, brown/white, brown
One end of the cable is connected to the computer and the other end connected to the
switch/router.
The arrangement of this cable when unshielded is green/white, green, orange/white, blue,
blue/white, orange, brown/white, blue.
8
ROUTER AND NANO STATION
9
ROUTER CONFIGURATION
Router is a networking device that forwards data packets between computer networks.
During my attachment period I configured routers in different departments of the company.
Steps to configure the router.
STEP 1: Connect your router to the computer and modem
STEP2: Open a web browser and enter your router IP address.
Routers are accessed through your web browser by entering the IP address into the address
bar
STEP 3: Enter username and password
STEP4: Reset your router if you cannot access it.
If you’ve looked up your default address and username/password combo and you still can’t
access your router, you can reset it to factory defaults to clear out any changes that may have
been made
STEP5: Assign the router a new username and password.
Choose a username and password that can’t be easily guessed. Include numbers and symbols
in the password to make sure that it is hard to hacked
NANO STATIONS
There are two types of Nano stations that were commonly used in our company. These Nano
stations are;
Nano station M5
The ubiquity Nano station M5 is the perfect solution for creating a dedicated point to point or
point to multipoint connections between locations where the Ethernet cable is not a visible
option. It can also be used for extending wireless coverage outdoors.
Features of M5 Nano station
10
This is the ultimate 2GHz wireless outdoor CPE with integrated 14dBi Dual polarity
antennae Features
Great performance
Dual Ethernet connectivity
Intelligent POE
Easy installation
3.1.4 IP ADDRESSING
An Internet Protocol address (IP address) is a numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication. (Kumar,
(2016). ) An IP address serves two principal functions: host or network interface
identification and location addressing.
During my attachment I changed the IP addresses of most computers which were conflicting
in various department. To solve the IP conflict the IP address is changed.
HOW TO CHANGE IP ADDRESS OF THE COMPUTER
11
Then you might change the IP Either by doing manually or commanding it to pick
automatically
Central Processing Unit The central processing unit (CPU) is the unit which performs
most of the processing inside a computer. To control instructions and data flow to and
from other parts of the computer, the CPU relies heavily on a chipset, which is a
group of microchips located on the motherboard.
12
Monitor
Keyboard
Motherboard
The motherboard is a sheet of plastic that holds all the circuitry to connect the various
components of a computer system.
13
CD ROM Drive
Hard disk
The hard disk drive is the main, and usually largest, data storage hardware device in a
computer. The operating system, software titles, and most other files are stored in the
hard disk drive.
RAM
Random-access memory is a form of computer data storage that stores data and
machine code currently being used. A random-access memory device allows data
items to be read or written in almost the same amount of time irrespective of the
physical location of data inside the memory
RAM
Network Card
It is network adapter hardware in the form of an add-in card that fits in an expansion
slot on a computer's motherboard.
A power supply unit (or PSU) converts mains AC to low-voltage regulated DC power for the
internal components of a computer
14
3.1.7 WINDOWS REPAIR AND INSTALLATION
Most of the machines run on windows XP, 7 and 8. When I was in this company I was
familiar with the installation of windows operating system into machines. During this period I
was there
I was able to install windows operating system and repair some operating system which had
failed
WINDOWS REPAIR
When it was in use and fails, click on ctr+alt+Delete to restart the computer or
when is switched off click on start menu.
Click on f9 for boot menu and press any key for the booting.
Select the device you want to boot from e.g. CD-ROM
Click on R for repair then click on either CHKDSK\S or CHKDSK\P.
Then wait for the booting process and after its done it will give you the hard
disk to partition
WINDOWS INSTALLATION
Back up all Insert a blank disk into your Disk tray.
Burn the ISO image to a disk.
Reboot your PC with the disk still in the tray.
Go to your BIOS configuration screen.
Choose primary boot device as CD/DVD drive.
Reboot again.
The system should boot to the Windows 8.1 setup screen
Use this product key of the format drive NTTX3-RV7VB-T7X7F-WQYYY-
9Y92F if it asks for and copy from the DVD drive.
Configure your PC settings in the setup
Follow the setup instructions till the setup finishes.
15
3.1.8 PRINTERS
Printer is a peripheral device which makes a persistent human-readable representation of
graphics or text on paper. (Douglas, 1979).)
During my attachment period we have solved so many problems affecting the printers in
different departments of the company. Since the printers help to print out the hard copies of
vouchers, and another documents in the company
The mostly used Printers in the company include: Dot matrix printers, LaserJet printers and
Inkjet Printers.
A dot matrix printer is an impact printer that prints using a fixed number of pins or wires.
16
Solution
Attempts to repair a print head can damage it beyond hope. You can clean the print head
With the lubricant or alcohol. Remove any visible grime.
LASERJET PRINTER
A laser printer is a type of printer that uses a laser and electrical charge model instead of
the traditional printing of ink onto paper.
i. Knowledge on printers; dot matrix and laser printers and their functionalities
17
ii. Advanced knowledge on Servers, IP addresses Switches and routers; their configuration
and use.
iii. Good rapport and confidence in communication with the staff
iv. How to be responsible.
v. Importance of teamwork and cooperation.
18
CHAPTER 4:
SWOT ANALYSIS OF FIELD ATTACHMENT PROGRAM
4.1 Strengths
The ICT department comprises of highly skilled employees who are determined to do
their work diligently to improve the performance of the entire organization. (Fapohunda,
(2013))
The organization has enough capital and funds to enable IT upgrade for example
servers, PC’s, applications etc. to enable efficiency and effectiveness.
The ICT department is well equipped with the necessary equipment needed to repair
machines and clean them too thus enabling the entire team to work effectively and efficiently.
4.2 Weaknesses
The organization is fully equipped with many computers especially the desktops whereby
other staff members in the organization have little skills in computers thus more support is
escalated to the ICT department enhancing a lot of work in the organization. (Zimmerman,
(2014).)
The ICT department has qualified staff but it is often understaffed since there are many times
when there is a lot of work and they can’t do it all at once hence they get fatigued and
sometimes don’t attend to their duties promptly.
19
The organization is fully equipped with many computers and other equipment with an
exception of printers to serve all the employees in the organization. Some employees
share these machines thus leading to delays in meeting deadlines.
4.3 Opportunities
West Kenya has an opportunity to be the leading sugar commodity management and trading
organization in Kakamega and to promote free and fair trade and commodities through
research and market development by ensuring timely accessibility of commodities for
everyone.
4.4 Threats
Weather and climate change may affect the operations of Company in terms of
receiving sugar produce required to be distributed all over the country or other towns
within Kakamega.
CHAPTER 5:
CONCLUSIONS AND RECOMMENDATIONS
5.1 CONCLUSIONS
After going through the whole period of attachment as an attachee I’ve observed so many
professional activities and learnt as well. This attachment was very fruitful to me because I
had to cover many different fields. I also learnt new concepts and new ways of working.
During this attachment period I acquired practical experience to complement the theoretical
content of my study in information technology tasks, wireless local area network (WLAN)
and network security of the company data center
5.2 RECOMMENDATION
From my personal experience at the company I recommend the following:
1. Cable Management: All data cabling should be below the ceiling, both ends of the
cable should be labeled and tagged for proper identification.
2. Training program should be started for both academic and administrator staff
3. I strongly recommend that the company should use licensed antivirus
20
4. Most of the computers used have lower space in terms of memory (RAM) and hard
disk space hence cannot support heavy applications. The machines should be
upgraded if not replaced with new machines.
5. Hardware identification should be with the appropriate, fully qualified server names,
and all equipment’s within the cabinets. If implement in this way the hardware is
easily identifiable.
6. The company should put in place standby generators to allow continuity of the
company Operations in case of power shortages. The generators can also be
supplemented with uninterruptable power supply (UPS)
Most of the employees have no backup system for their computer work which is essential, in
case a machine is faulty and need formatting or it’s beyond repair, all the data is lost. The
company should instill the importance of backup to its employees.
REFERENCES
References
1. Chowdhury, D. D. ((2000)). The Ethernet. In High Speed LAN Technology Handbook
. Berlin, Heidelberg.: (pp. 1-79). Springer, .
21
6. Kumar, R. &. ( (2016). ). Computer Network-IP Address & Subnetting. International
Journal of Engineering and Advanced Technology (IJEAT). 5(4), 242-246.
8. Singh, N. K. ((2021)..). Unit-9 Web Server Hardware and Softwar. . Indira Gandhi
National Open University: e, New Delhi.
22