Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Internship Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

ARBA MINCH INSTITUTE OF TECHNOLOGY(AMIT)

ARBA MINCH UNIVERSITY

Faculty of computing and software engineering

Internship Report

Network installation

Group members

s.no name id.no

1. Abdirazak iman…………………………………ramit/1545/10
2 Abdi marera…………………………………………
ramit/1545/10 3 Ali
Mohamed…………………………………ramit/1545/10 4
Abdirazak iman…………………………………ramit/1545/10
5 Abdirazak iman…………………………………ramit/1545/10

Will be submitted to Arba minch, Ethiopia


Mrs.Yibralem -------------------- July, 2021

Acknowledgment

First of all, we would like to thank God keeping our healthy to do this internship report, second and
foremost, we would like to thank our advisor Mrs.Yibralem, for the valuable guidance and advice she
gave us. she inspired us greatly to work in this report. He willingness to motivate us contributed
tremendously to our internship report.

We would like to express our gratitude towards our friends for their kind co-operation and
encouragement which help us in completion of this internship repor
Abstract

This internship is a part of the curriculum requirement for one month, in 2021 G.C. It generally
describes the whole tasks I have been handling, the experience and benefits I have been
gaining, the challenges I have been facing, and measures I have been taking to overcome them
through the internship period at AMU ICT center

I had discussed the Network Installation system, Video Conferencing configuratMaintenances


which I observed and practiced during my internship program.

Generally, it is the overall views of my roles in the company and state recommendations
concerning the program so as to enable the University to correct the problem and to create a
conformable situation for the next generation.

For a better understanding of the report, the report has been divided into five Chapters. Chapter
one is an introduction to the overall view of the hosting company (AMU ICT center). Chapter
two is dealing with the works, responsibilities, and assignments. I have been undertaking the
internship programs. Chapter three discussed the Technical aspects of the internship program.
Finally, in Chapter four, about how to design an enterprise network within logical packet tracer
simulation and chapter five, general comments and conclusion and Recommendation of the
previous Chapters are revealed.
CHAPTER ONE
Introduction
An internship program is known by giving students the opportunity to apply their knowledge in real-
world environments. At the same time, we students will also develop skills that will help us to perform
better at the real world jobs, so based on its aim I have conducted my intern program. Therefore, this
report describes my experiences as a fifth year Arba Minch University Intern student at the company
called the Arba Minch university Information and Communication Technology Center (AMU – ICTC),
which is located in the southern Ethiopia Gamo Zone of the Southern Nations, Nationalities, and
Peoples Region about 500 kilometers south of Addis Ababa and is the largest town in Gamo Zone
called Arba minch.

The internship is part of the curriculum requirement for one industrial practice. It
generally describes the whole tasks I did in the intern program, the experience and practice work
benefits I got, the challenges faced and measures are taken to solve it.

Currently, information and communication technology is important to develop national with national
as well as a country with country and continent with continent come to the same information shared
with at the same time in the world.
Historical Background of the Company

1.2.1 Brief history of the company

Arba minch University network infrastructure

was originally designed and implemented by a local company called Global Computing
System (GCS) in 2003 and it was fully operational in 2005. This LAN was implemented
only on the main campus and it was Ethernet access technology [1].

The original network was not connected to the internet, so security was not that much
importance. But after the network was connected to the internet, security becomes a
considerable issue. Due to these different security measures has been undertaken. But
most of the security controls were concentrated on Firewall using Access control lists
(ACL) and also presently proxy. The university was connected to the internet through
satellite access; this was a relatively slow and insecure connection. Now it is replaced by
a fiber link internet connection. And on 8 March 2009 the internet connection bandwidth
has been increased to 6 Mbps but as the number of campuses grown to five the
bandwidth

requirement highly increase and in June 2011 onwards 100mbps which AMU currently connected to
ETC. That means AMU downlink capacity is 100 Mbps and uplink is 12 Mbps

Currently, AMU has five campuses connected by a fiber link which is a redundant ring
topology, recently all the campuses are interconnected with 10Gb fiber optics cable

backbone in a ring fashion. For the provision of unified Communication service (various
internet/intranet services), a well hierarchically designed network connecting all the buildings has been
established. Over 5000 network nodes are already joined the LAN. At present all the campus are
having cabled LAN and unguided connections almost everywhere on the campus’s premises including
offices, libraries, staff residence, student Dormitory, PG hostels, Cafeterias, Lecture theaters, etc.
ICT has a number of services for the AMU community both academic and administrative staff in the
areas of operational service and system, network and network security and customer support

2 Mission and vision of AMU

1.2.1 vision

To be a leading and vibrant institution of excellence in teaching, research and innovation to achieve the
national goals of a self-reliant, technologically strong and modern India and build an integrated modern
system of education, in accordance with the New Education Policy for sustainable development of
society and better future for all.

1.2.2 mission

To reinvent the university by setting the highest benchmarks of performance and leading by example.

To foster a collaborative academic environment for the promotion of critical and creative thinking.

To transform into a university of global standards, which makes a significant contribution to nation building.

Main services Of AMU ICT CENTER

E-LEARNING FACILITIES

The AMU e-learning Site offers a variety of tools and resources to instructors and students to support
effective online learning and teaching.

COMPUTING AND INTERNET FACILITIES

Internet Facilities - Access is available to a variety of AMU hosted content and also Online Resources.

Computing Facilities - Access to computers with general purpose software to meet the majority of
computing needs.
INTRANET

The Intranet provides means by which news and content of all kinds can be effectively communicated
and distributed to the University community, and by which documents and other resources can be
made available for download.

ICT HELPDESK

 Using the ICT Helpdesk is Easy:-


 Enter your AMU email address and log in.
 Detail your request and click "Submit"
 You can also check the status of your previous requests.

WIRLESS COMPUTING

The wireless network offers all the computing services that the wired network does and is available to
current staff and students of the University for PCs, Laptops, or mobile devices.

1.2.4 AMU ICT Center Staff Profile

ICT Center consists of qualified professional staff members. The staffing pool including individuals
who hold certifications as:

 Information technology Professionals.


 Administration Management Professionals

CHAPTER TWO
2.1.0 Network cabling systems installation

The network was been designed. While it’s time to run the wires, set up the patch panels, string the
fiber, and configure the switches [2].

Network Installation is Services provides high-quality ICT system design and installation services for
the campus students’ and employees' data, voice, video, and share documents from main campus
intranet resources. Network Cabling Systems, (NCS) is especially to the installation of structured
cabling systems with an emphasis on new construction network, NCS can provide the copper and fiber
cabling needed to connect voice/video and data across the LAN or WAN. NCS also offers wireless
access points and CATV installation.

2.1.1 Precondition of NCS Installation Networking

A network consists of two or more computers that are linked in order to share resources, exchange
files, or allow electronic communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.

Two very common types of networks include:

 Local Area Network (LAN)


 Wide Area Network (WAN)

Local Area Network

A Local Area Network (LAN) is a high-speed data network that covers a relatively small geographic
area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs
offer computer users many advantages, including shared access to devices and applications, file
exchange between connected users, and communication between users via electronic mail and other
applications Wide Area Network

Wide Area Networks (WANs) connect networks in larger geographic areas, such as the United States,
or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of
global network.

Protocol
A protocol is a set of rules that governs the communications between computers on a network. In order
for two computers to talk to each other, they must be speaking the same language. Many different types
of network protocols and standards are required to ensure that your computer can communicate with
another computer located on the next desk or half-way around the world. The OSI (Open Systems
Interconnection) Reference Model defines some of the networking protocols. However, can be
simplified into the following forms with their identify some of the common protocols.

The Internet has revolutionized many aspects of our daily lives. It has affected the way we do business
as well as the way we spend our leisure time. The Internet is a communication system that has brought
a wealth of information to our fingertips and organized it for our use.

D. HTTP, FTP, SMTP and DNS (Application Layers)

Several protocols overlap the session, presentation, and application layers of networks. Their protocols
listed below;

DNS - Domain Name System - translates network address (such as IP addresses) into terms
understood by humans (such as Domain Names)

FTP - File Transfer Protocol - a protocol that is used to transfer and manipulate files on the
Internet.

HTTP – Hypertext Transfer Protocol - An Internet-based protocol for sending and receiving
Webpages.

SMTP - Simple Mail Transfer Protocol - A protocol for e-mail messages on the Intern

3. Networking Hardware

Networking hardware includes all computers, peripherals, interface cards and other equipment needed
to perform data-processing and communications within the network.
Figure 3 Networking Hardware Component

Generally, this figure shows provides information on the following components:

 Workstations
 Network Interface Cards
 Switches
 Repeaters
 Bridges
 Firewalls
6. Main Campus Network maintenance

Network maintenance is to keep the network available within service and at


acceptable performance network connection levels. Network Maintenance is also
resolving and repair network problems, Identify the problem, find ways to isolate the
cause and to correct the problem and finally, prevent it from any hurt or damage.
There are two types of network cable maintenance: preventative maintenance and
post-fault maintenance.

A. Preventative maintenance: - it is maintenance, which is before a fault or problem


occurs.

That the type of maintenance involving such work as:

 Periodic testing: means that detection of cable loss increases and deterioration.
 Cable degradation testing: means that Measurement of cable fault location.
 Network element control: means the identification of the cable transfer system.
B. Post-fault maintenance: - it is maintenance, which is after the occurrence of a fault or
problem.

That the type of maintenance involving such work as:

 Reception of transmission system alarm or a trouble report: means that interface with
path operation system
 Cable fault testing: This means that Fault distinction between transmission equipment
and cable network.
 Cable repair/removal: means that cable identification and restoration/permanent repair
transfer system.

Activities

We going to AMU ICT Center through the agreements b/n the our department and AMU
ICT Center. After some process we were assigned in the MAU ICT Center. It has two
divisions the maintenance& networking division. We worked in maintenance &
networking divisions for three days.
2.2 Task one:-Network maintenance
The first task is introducing cabling. This is all about crimping network cable with RJ45.
Also getting hints about printer sharing and file sharing using cable and some
maintenance procedures.

2.2.1 Cable crimping


The steps to crimp RJ45 are:
 We can use this procedure both for straight
1. Cut the cable by the cutter then
 Strip cable end
 Untwist wire ends
 Arrange wires
 Trim wires to size
 Attach connector
 Check and test
 Straight through UTP cable: use to connect different network devices like
 Switch to router
 Switch to PC
 Switch to server
Straight through UTP cable……

Side A Side B

1. White/orange 1. White/Orange

2. Orange 2. Orange

3. White/green 3. White/Green

4. Blue 4. Blue

5. White/Blue 5. White/Blue

6. Green 6.Green
7. White/Brown 7. White/Brown

8. Brown 8. Brown

 Both sides (side A and side B) of cable have wire arrangement with the same color. 
Crossover UTP cable: use to connect the same types of network devices such as
 PC to PC
 Switch to switch by using normal port
 Router LAN port to switch normal port

Cross over cable order…….

Side A Side B

1. White/Green 1. White/Orange

2. Green 2. Orange

3. White/Orange 3. White/Green

4. Blue 4. Blue

5. White/Blue 5. White/Blue

6. Orange 6. Green

7. White/Brown 7. White /Brown

8. Brown 8. Brown

 The two sides (side A and side B) of cable have wire arrangement with the different
color.

Some network tools used

Cat 6 UTP cable  


 It is a standardized cable for Gigabit Ethernet and other network physical layers.

RJ-45  

 In RJ-45 “RJ” stands for Register Jack, it is standardize network interface and “45” refers
to the number of interface standard.

Crimper

 It is used for crimping a cable after we finished possible order of the color for straight
through and crossover using RJ-45.

Cable tester

 It is a device that is used to test the strength and connectivity of a particular type of
cable or other wired assemblies.
Steps to Crimp UTP Cable
Step 1

Strip the cable 1/2 in. down from the end using cable strippers.

Carefully trim off ripcord.

Step 2

 Remove the insulator cover of the cable.

Step 3

 Untwist each pair of wires down to the sheathing. If you’re working with CAT-6 wire,
cut the center core down to the cable end.
 Layout the side of the wire by side in this order: white-orange; orange; white-green;
blue; white-blue; green; white-brown; brown.
Step 4

 Trim all the wires to the same length, 1/2-3/4 in. from the sheath.

Step 5

 Insert the wires in the order specified in Step Two above into the RJ-45 plug. The cable
sheath should extend into the plug by about 1/2 in. and will be held in place by the
crimp.
Step 5’

Step 6

 Crimp the terminal with the appropriate crimping tool.

Step 7

Make sure the wires are in the right order, extend to the front of the plug and make good
contact with the metal contacts in the RJ-45 plug.

Repeat project steps one through four to attach a connector on the other end of the
cable.
3.4 Technical tasks/products

This is my first result from my tasks after thorough observation of a series of steps from my
supervisor.

Figure 5 Technical produce

3.5 Knowledge and Acquaintances Acquired

I have gained some skills during the four-month of the internship program. Some of them
include:-

 I have gained knowledge about how organizational structure looks like and how to behave in a
company.

 I have learned about working processes and principles in industries.

 I have learned how important it is to be punctual!

 I had improved my technical and personal skills that I had learned theoretically, after becoming
familiar with new techniques and methods.

 I sometimes exercised individual responsibility and develop strong teamwork skills with the
employees.

 I build up a network of professional contacts for future opportunities and references.


CHAPTER FOUR
In most countries around the world, there are many enterprises that represent the
main gates for entrance and exit. Because of the importance of these places, each
country takes many necessary measures to provide them with the best technology.
Enterprises are the most sensitive places around the world because they represent
these gates. Technology plays many different roles to protect and represent a high
quality of services for these places. Computer networking is the most crucial part
of modern airports because this new technology takes the most important
responsibilities, rather than people doing the tasks as in previous decades.

4.1 Project Scope and Network requirements

The scope of this project is the design and implementation of a network for
commercial banks of Ethiopia in Addis Ababa and its branch located in other areas.

Network requirements:

 All 80 employees are interconnected with LAN or WAN


 We have accommodated about 200 IP address, science everyone has a smartphone and
requires internet connectivity
 The employee needs internet access
 Only cisco networking devices are used
 The network must be secure, redundant and fast

Network Design strategy

4.2.1 Developing security design strategy

Network security is the most important attribute of any computer network,


especially with the increasing release on neighborhood systems for key functions
and operations. People communicate in different ways with each other with
emails, social websites and other tools that make the communication very easy. As
these tools improve, the danger will be defending against the computer networks
around the world. From ongoing threats and international companies that spend a
lot of money on network security on their local network to protect it from hackers.
Despite this destination, the risk is across the whole system since these
departments could be involved in the data transfer through network elements. It is
difficult to control any computer network from outside attacks unless this network
is isolated from the outside world. In this design, the transaction, request, and
ATM with drowning are the most untrusted and least secure department on
account of the diversity of users. Moreover, as these departments

are connected by the same network, persons from each one of these departments
can become on inside threat [4].

1) Firewalls

Firewalls are the first step toward a high-security level and a primary
mechanism for the design presented here. These devices are a well-known
security system for any computer network. They are used for controlling the
packets and data that create a zone inside and outside the network. The firewall
allows for a higher degree of trust

for the system behind it, as externs hosts generally excluded. In standard configuration, firewalls
will trust the inside activity, and the configuration of the device will give a low level of security
because of the trusted people inside the organization. Otherwise, the outside

activity like internet connections or the connections that establish out the
local network will be untested. Therefore, the network administrates team
responsible for managing the network inside an organization will give a high level
of security for the outside connections inside, some of these levels reach 100% of
security. For that reason, these firewalls filtered packets from hosts the outside
and deny any untrusted connection depending on created rules. Exchanging the
information inside and outside the network. The local network has been
configured to limit the access from outside, this task has been assigned to the by
the proxy server which has already been installed for the Airport network. The
ruleset of the project’s firewalls follows a design structure that reflects security
for each position [5].

1. The internet service providers (ISPs) were connected to the firewall to


control the data exchange from outside to inside the airport network (the Internet to
the local network).

2. The second firewall was placed in the Flight Management Database


Server as shown in figure 1.
3. This firewall was attached to one of the flight management switch ports.

As a result of this design, the security level

for all network and specifically in the Flight Management Department was
increased dramatically because of the security policy which installed for each
firewall the first result of the design was filtering the transmitted data through the
internet. Each device inside the airport’s network can be accessed through any
website from the Internet because the outside security level was set up with zero
security level. Otherwise, the inside network set up with a high-security level to
prevent the outside activities from entering the local network. As a final result,
this will protect the inside network from any hackers and untrusted connections as
shown in figure management strategy [6].

Hardware quantity analysis (Main and branch locations)

In the main branch of the enterprise design server, multilevel switch, switch, and
hostess can be used to provide a quality network.

You might also like