Internship Report
Internship Report
Internship Report
Internship Report
Network installation
Group members
1. Abdirazak iman…………………………………ramit/1545/10
2 Abdi marera…………………………………………
ramit/1545/10 3 Ali
Mohamed…………………………………ramit/1545/10 4
Abdirazak iman…………………………………ramit/1545/10
5 Abdirazak iman…………………………………ramit/1545/10
Acknowledgment
First of all, we would like to thank God keeping our healthy to do this internship report, second and
foremost, we would like to thank our advisor Mrs.Yibralem, for the valuable guidance and advice she
gave us. she inspired us greatly to work in this report. He willingness to motivate us contributed
tremendously to our internship report.
We would like to express our gratitude towards our friends for their kind co-operation and
encouragement which help us in completion of this internship repor
Abstract
This internship is a part of the curriculum requirement for one month, in 2021 G.C. It generally
describes the whole tasks I have been handling, the experience and benefits I have been
gaining, the challenges I have been facing, and measures I have been taking to overcome them
through the internship period at AMU ICT center
Generally, it is the overall views of my roles in the company and state recommendations
concerning the program so as to enable the University to correct the problem and to create a
conformable situation for the next generation.
For a better understanding of the report, the report has been divided into five Chapters. Chapter
one is an introduction to the overall view of the hosting company (AMU ICT center). Chapter
two is dealing with the works, responsibilities, and assignments. I have been undertaking the
internship programs. Chapter three discussed the Technical aspects of the internship program.
Finally, in Chapter four, about how to design an enterprise network within logical packet tracer
simulation and chapter five, general comments and conclusion and Recommendation of the
previous Chapters are revealed.
CHAPTER ONE
Introduction
An internship program is known by giving students the opportunity to apply their knowledge in real-
world environments. At the same time, we students will also develop skills that will help us to perform
better at the real world jobs, so based on its aim I have conducted my intern program. Therefore, this
report describes my experiences as a fifth year Arba Minch University Intern student at the company
called the Arba Minch university Information and Communication Technology Center (AMU – ICTC),
which is located in the southern Ethiopia Gamo Zone of the Southern Nations, Nationalities, and
Peoples Region about 500 kilometers south of Addis Ababa and is the largest town in Gamo Zone
called Arba minch.
The internship is part of the curriculum requirement for one industrial practice. It
generally describes the whole tasks I did in the intern program, the experience and practice work
benefits I got, the challenges faced and measures are taken to solve it.
Currently, information and communication technology is important to develop national with national
as well as a country with country and continent with continent come to the same information shared
with at the same time in the world.
Historical Background of the Company
was originally designed and implemented by a local company called Global Computing
System (GCS) in 2003 and it was fully operational in 2005. This LAN was implemented
only on the main campus and it was Ethernet access technology [1].
The original network was not connected to the internet, so security was not that much
importance. But after the network was connected to the internet, security becomes a
considerable issue. Due to these different security measures has been undertaken. But
most of the security controls were concentrated on Firewall using Access control lists
(ACL) and also presently proxy. The university was connected to the internet through
satellite access; this was a relatively slow and insecure connection. Now it is replaced by
a fiber link internet connection. And on 8 March 2009 the internet connection bandwidth
has been increased to 6 Mbps but as the number of campuses grown to five the
bandwidth
requirement highly increase and in June 2011 onwards 100mbps which AMU currently connected to
ETC. That means AMU downlink capacity is 100 Mbps and uplink is 12 Mbps
Currently, AMU has five campuses connected by a fiber link which is a redundant ring
topology, recently all the campuses are interconnected with 10Gb fiber optics cable
backbone in a ring fashion. For the provision of unified Communication service (various
internet/intranet services), a well hierarchically designed network connecting all the buildings has been
established. Over 5000 network nodes are already joined the LAN. At present all the campus are
having cabled LAN and unguided connections almost everywhere on the campus’s premises including
offices, libraries, staff residence, student Dormitory, PG hostels, Cafeterias, Lecture theaters, etc.
ICT has a number of services for the AMU community both academic and administrative staff in the
areas of operational service and system, network and network security and customer support
1.2.1 vision
To be a leading and vibrant institution of excellence in teaching, research and innovation to achieve the
national goals of a self-reliant, technologically strong and modern India and build an integrated modern
system of education, in accordance with the New Education Policy for sustainable development of
society and better future for all.
1.2.2 mission
To reinvent the university by setting the highest benchmarks of performance and leading by example.
To foster a collaborative academic environment for the promotion of critical and creative thinking.
To transform into a university of global standards, which makes a significant contribution to nation building.
E-LEARNING FACILITIES
The AMU e-learning Site offers a variety of tools and resources to instructors and students to support
effective online learning and teaching.
Internet Facilities - Access is available to a variety of AMU hosted content and also Online Resources.
Computing Facilities - Access to computers with general purpose software to meet the majority of
computing needs.
INTRANET
The Intranet provides means by which news and content of all kinds can be effectively communicated
and distributed to the University community, and by which documents and other resources can be
made available for download.
ICT HELPDESK
WIRLESS COMPUTING
The wireless network offers all the computing services that the wired network does and is available to
current staff and students of the University for PCs, Laptops, or mobile devices.
ICT Center consists of qualified professional staff members. The staffing pool including individuals
who hold certifications as:
CHAPTER TWO
2.1.0 Network cabling systems installation
The network was been designed. While it’s time to run the wires, set up the patch panels, string the
fiber, and configure the switches [2].
Network Installation is Services provides high-quality ICT system design and installation services for
the campus students’ and employees' data, voice, video, and share documents from main campus
intranet resources. Network Cabling Systems, (NCS) is especially to the installation of structured
cabling systems with an emphasis on new construction network, NCS can provide the copper and fiber
cabling needed to connect voice/video and data across the LAN or WAN. NCS also offers wireless
access points and CATV installation.
A network consists of two or more computers that are linked in order to share resources, exchange
files, or allow electronic communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
A Local Area Network (LAN) is a high-speed data network that covers a relatively small geographic
area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs
offer computer users many advantages, including shared access to devices and applications, file
exchange between connected users, and communication between users via electronic mail and other
applications Wide Area Network
Wide Area Networks (WANs) connect networks in larger geographic areas, such as the United States,
or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of
global network.
Protocol
A protocol is a set of rules that governs the communications between computers on a network. In order
for two computers to talk to each other, they must be speaking the same language. Many different types
of network protocols and standards are required to ensure that your computer can communicate with
another computer located on the next desk or half-way around the world. The OSI (Open Systems
Interconnection) Reference Model defines some of the networking protocols. However, can be
simplified into the following forms with their identify some of the common protocols.
The Internet has revolutionized many aspects of our daily lives. It has affected the way we do business
as well as the way we spend our leisure time. The Internet is a communication system that has brought
a wealth of information to our fingertips and organized it for our use.
Several protocols overlap the session, presentation, and application layers of networks. Their protocols
listed below;
DNS - Domain Name System - translates network address (such as IP addresses) into terms
understood by humans (such as Domain Names)
FTP - File Transfer Protocol - a protocol that is used to transfer and manipulate files on the
Internet.
HTTP – Hypertext Transfer Protocol - An Internet-based protocol for sending and receiving
Webpages.
SMTP - Simple Mail Transfer Protocol - A protocol for e-mail messages on the Intern
3. Networking Hardware
Networking hardware includes all computers, peripherals, interface cards and other equipment needed
to perform data-processing and communications within the network.
Figure 3 Networking Hardware Component
Workstations
Network Interface Cards
Switches
Repeaters
Bridges
Firewalls
6. Main Campus Network maintenance
Periodic testing: means that detection of cable loss increases and deterioration.
Cable degradation testing: means that Measurement of cable fault location.
Network element control: means the identification of the cable transfer system.
B. Post-fault maintenance: - it is maintenance, which is after the occurrence of a fault or
problem.
Reception of transmission system alarm or a trouble report: means that interface with
path operation system
Cable fault testing: This means that Fault distinction between transmission equipment
and cable network.
Cable repair/removal: means that cable identification and restoration/permanent repair
transfer system.
Activities
We going to AMU ICT Center through the agreements b/n the our department and AMU
ICT Center. After some process we were assigned in the MAU ICT Center. It has two
divisions the maintenance& networking division. We worked in maintenance &
networking divisions for three days.
2.2 Task one:-Network maintenance
The first task is introducing cabling. This is all about crimping network cable with RJ45.
Also getting hints about printer sharing and file sharing using cable and some
maintenance procedures.
Side A Side B
1. White/orange 1. White/Orange
2. Orange 2. Orange
3. White/green 3. White/Green
4. Blue 4. Blue
5. White/Blue 5. White/Blue
6. Green 6.Green
7. White/Brown 7. White/Brown
8. Brown 8. Brown
Both sides (side A and side B) of cable have wire arrangement with the same color.
Crossover UTP cable: use to connect the same types of network devices such as
PC to PC
Switch to switch by using normal port
Router LAN port to switch normal port
Side A Side B
1. White/Green 1. White/Orange
2. Green 2. Orange
3. White/Orange 3. White/Green
4. Blue 4. Blue
5. White/Blue 5. White/Blue
6. Orange 6. Green
8. Brown 8. Brown
The two sides (side A and side B) of cable have wire arrangement with the different
color.
RJ-45
In RJ-45 “RJ” stands for Register Jack, it is standardize network interface and “45” refers
to the number of interface standard.
Crimper
It is used for crimping a cable after we finished possible order of the color for straight
through and crossover using RJ-45.
Cable tester
It is a device that is used to test the strength and connectivity of a particular type of
cable or other wired assemblies.
Steps to Crimp UTP Cable
Step 1
Strip the cable 1/2 in. down from the end using cable strippers.
Step 2
Step 3
Untwist each pair of wires down to the sheathing. If you’re working with CAT-6 wire,
cut the center core down to the cable end.
Layout the side of the wire by side in this order: white-orange; orange; white-green;
blue; white-blue; green; white-brown; brown.
Step 4
Trim all the wires to the same length, 1/2-3/4 in. from the sheath.
Step 5
Insert the wires in the order specified in Step Two above into the RJ-45 plug. The cable
sheath should extend into the plug by about 1/2 in. and will be held in place by the
crimp.
Step 5’
Step 6
Step 7
Make sure the wires are in the right order, extend to the front of the plug and make good
contact with the metal contacts in the RJ-45 plug.
Repeat project steps one through four to attach a connector on the other end of the
cable.
3.4 Technical tasks/products
This is my first result from my tasks after thorough observation of a series of steps from my
supervisor.
I have gained some skills during the four-month of the internship program. Some of them
include:-
I have gained knowledge about how organizational structure looks like and how to behave in a
company.
I had improved my technical and personal skills that I had learned theoretically, after becoming
familiar with new techniques and methods.
I sometimes exercised individual responsibility and develop strong teamwork skills with the
employees.
The scope of this project is the design and implementation of a network for
commercial banks of Ethiopia in Addis Ababa and its branch located in other areas.
Network requirements:
are connected by the same network, persons from each one of these departments
can become on inside threat [4].
1) Firewalls
Firewalls are the first step toward a high-security level and a primary
mechanism for the design presented here. These devices are a well-known
security system for any computer network. They are used for controlling the
packets and data that create a zone inside and outside the network. The firewall
allows for a higher degree of trust
for the system behind it, as externs hosts generally excluded. In standard configuration, firewalls
will trust the inside activity, and the configuration of the device will give a low level of security
because of the trusted people inside the organization. Otherwise, the outside
activity like internet connections or the connections that establish out the
local network will be untested. Therefore, the network administrates team
responsible for managing the network inside an organization will give a high level
of security for the outside connections inside, some of these levels reach 100% of
security. For that reason, these firewalls filtered packets from hosts the outside
and deny any untrusted connection depending on created rules. Exchanging the
information inside and outside the network. The local network has been
configured to limit the access from outside, this task has been assigned to the by
the proxy server which has already been installed for the Airport network. The
ruleset of the project’s firewalls follows a design structure that reflects security
for each position [5].
for all network and specifically in the Flight Management Department was
increased dramatically because of the security policy which installed for each
firewall the first result of the design was filtering the transmitted data through the
internet. Each device inside the airport’s network can be accessed through any
website from the Internet because the outside security level was set up with zero
security level. Otherwise, the inside network set up with a high-security level to
prevent the outside activities from entering the local network. As a final result,
this will protect the inside network from any hackers and untrusted connections as
shown in figure management strategy [6].
In the main branch of the enterprise design server, multilevel switch, switch, and
hostess can be used to provide a quality network.