Design and Secure The Computer Network
Design and Secure The Computer Network
Jimma, Ethiopia
Industrial Internship Report Feb, 2023
DECLARATION
We students Genene Gebre and Ashagire Assefa hereby declare that the presented report of
internship and project titled “Design of secure and scalable computer network for HU-
Daye campus” is uniquely prepared by us after the completion of four months’ work at Hawassa
University ICTD. We also confirm that the report is only prepared for academic requirements
not for any other purpose.
Name ID SIGN
Advisor:
I
Industrial Internship Report Feb, 2023
Acknowledgment
First and foremost, we have great full thanks to almighty God for giving us the strength and
energy to accomplish this internship program. Secondly, we have also thanked Jimma University
Institutes of Technology for launching such an extremely useful internship program. Thirdly so it
is my pleasure to express our appreciation thanks to those who have helped us to experience
knowledge and skills in what we have learned on campus. We also have special recognition and
heartfelt thanks to the company of Hawassa University’s ICTD workers for accepting us for the
internship program a member of them, also share their knowledge for us, in addition, they shared
their life experiences including advice the basic way of success this makes us successful and
strong enough in our future life. And also, we would like to thank my Supervisor Mr. Asnake,
who is a manager of ICTD for his devotion of time and a respected approach looking at the
report and serious encouragement and checking process of our report and other workers of that
company. Finally, we also thank our advisor for giving us advice on the report of our internship
program Mr. Zemenu A. for his professional guidance.
II
Industrial Internship Report Feb, 2023
Table of content
DECLARATION...............................................................................................................................................I
Acknowledgment.........................................................................................................................................II
Table of content.........................................................................................................................................III
List of Table..............................................................................................................................................VIII
Acronym.....................................................................................................................................................IX
Executive Summary.....................................................................................................................................X
Chapter One............................................................................................................................................- 1 -
1.Background of Hosting Company.........................................................................................................- 1 -
1.1 History Hawassa University........................................................................................................- 1 -
1.2 Mission, Vision, Values and Goals of Hawassa University.......................................................- 1 -
1.2.1 Mission of the Hawassa University......................................................................................- 1 -
1.2.2 Vision of the Hawassa University........................................................................................- 2 -
1.2.3 Values of the Hawassa University.......................................................................................- 2 -
1.2.4 Goals of the Hawassa University.........................................................................................- 2 -
1.3 Main Products and Services of Hawassa University.................................................................- 2 -
1.3.1 Main Customer of Hawassa University...............................................................................- 2 -
1.4 Service provided by Hawassa University...................................................................................- 2 -
1.5 Overall organization and Workflow..........................................................................................- 3 -
Chapter Two............................................................................................................................................- 5 -
2.Over All Internship Experience.............................................................................................................- 5 -
2.1 How we get into the Company....................................................................................................- 5 -
2.2 Some information of the ICT data center, Hawassa University...............................................- 5 -
2.2.1 ICT Directorate....................................................................................................................- 5 -
2.2 Objectives.....................................................................................................................................- 6 -
2.3 Work flow....................................................................................................................................- 7 -
2.4 Work sections...............................................................................................................................- 7 -
2.5 Network architecture of HU over view......................................................................................- 8 -
2.5.1 Core Layer............................................................................................................................- 8 -
III
Industrial Internship Report Feb, 2023
IV
Industrial Internship Report Feb, 2023
1.4 Objective....................................................................................................................................- 35 -
1.4.1 General objective.................................................................................................................- 35 -
1.4.2 Specific objectives...............................................................................................................- 35 -
1.5 Significance and scope...............................................................................................................- 35 -
1.5.1 Significance of the project.................................................................................................- 35 -
Chapter Two..........................................................................................................................................- 36 -
Methodology.........................................................................................................................................- 36 -
2.1 Flow chart of network design...................................................................................................- 36 -
2.2 Network requirements and architectures................................................................................- 36 -
2.3 Hardware Requirements...........................................................................................................- 38 -
2.4 Network Topology Diagram.....................................................................................................- 38 -
2.4.1 Advantage of Star Topology:.............................................................................................- 39 -
2.4.2 Disadvantages of Star Topology........................................................................................- 39 -
2.5 Collapsed Core Architecture....................................................................................................- 39 -
2.6 Redundancy and dynamic routing protocols...........................................................................- 40 -
2.6 Switch/VLAN and access control list configuration................................................................- 41 -
2.7 Software requirement................................................................................................................- 41 -
2.7.1 Cisco Packet tracer.............................................................................................................- 41 -
2.8 The sub-netting of IP address and IP assignment...................................................................- 41 -
2.8.1 IP network design guidelines.............................................................................................- 41 -
2.9 CREATING VLAN...................................................................................................................- 44 -
5.10 Connection Setup.....................................................................................................................- 45 -
Chapter Three.......................................................................................................................................- 47 -
Result And Discussion............................................................................................................................- 47 -
Chapter Four.........................................................................................................................................- 54 -
4.Limitation And Future Works.............................................................................................................- 54 -
4.1 Limitation of the project...........................................................................................................- 54 -
4.2 Future work...............................................................................................................................- 54 -
Recommendation..................................................................................................................................- 54 -
References.............................................................................................................................................- 56 -
Appendix and Annex.............................................................................................................................- 58 -
V
Industrial Internship Report Feb, 2023
List Of Figure
Figure 2. 1 Workflow of Hawassa University ICT center..........................................................- 8 -
Figure 2. 2 Network Topology of HU.......................................................................................- 10 -
Figure 2. 3 Data Centre of HU..................................................................................................- 11 -
Figure 2. 4 Cisco Catalyst 3750 Series.....................................................................................- 12 -
Figure 2. 5 Cisco Catalyst 2960 Series.....................................................................................- 12 -
Figure 2. 6 Rack........................................................................................................................- 12 -
Figure 2. 7 Console cable..........................................................................................................- 13 -
Figure 2. 8 Cisco Firewall.........................................................................................................- 13 -
Figure 2. 9 modem....................................................................................................................- 14 -
Figure 2. 10 modem..................................................................................................................- 14 -
Figure 2. 11 Access Point..........................................................................................................- 15 -
Figure 2. 12 Puncher.................................................................................................................- 17 -
Figure 2. 13 Header /data jack..................................................................................................- 17 -
Figure 2. 14 Screwdriver...........................................................................................................- 17 -
Figure 2. 15 Crimper.................................................................................................................- 17 -
Figure 2. 16 CAT6A UTP.........................................................................................................- 18 -
Figure 2. 17 RJ-45.....................................................................................................................- 18 -
Figure 2. 18 Node frame...........................................................................................................- 18 -
Figure 2. 19 color arrangement for cabling...............................................................................- 20 -
Figure 2. 20 Cutting Plastic.......................................................................................................- 20 -
Figure 2. 21 Unwind and Pair the Same Colors........................................................................- 21 -
Figure 2. 22 Pinch the Wires.....................................................................................................- 21 -
Figure 2. 23 Correct Way..........................................................................................................- 21 -
Figure 2. 24 single mode fiber..................................................................................................- 22 -
Figure 2. 25 Multi mode fiber...................................................................................................- 23 -
Figure 2. 26 Multi mode fiber...................................................................................................- 23 -
Figure 2. 27 Miller Stripper.......................................................................................................- 23 -
Figure 2. 28 Fusion Splicing Machine Materials......................................................................- 24 -
Figure 2. 29 Alcohol..................................................................................................................- 24 -
Figure 2. 30 process of splicing................................................................................................- 25 -
Figure 2. 31 Splice-Protection-Sleeve.......................................................................................- 25 -
Figure 2. 32 Splicing finished...................................................................................................- 25 -
VI
Industrial Internship Report Feb, 2023
VII
Industrial Internship Report Feb, 2023
List of Table
VIII
Industrial Internship Report Feb, 2023
Acronym
AC Air Conditioner
IP Internet Protocol
IX
Industrial Internship Report Feb, 2023
Executive Summary
This report is prepared based on our four months of Internship Program at Hawassa University.
This internship program helped us to learn about the practical configuration and installation of IP
and ZTP network camera in that HU. This report will cover some background information of the
company from its establishment to until today, basic sections of the company; how the company
was working, about quality inspection, materials specification and selection, basic tasks we have
done and challenges faced us during those four-months and a lot of understanding and
experiences on practice all application of networking system in a well-organized and effective
manner.
It is also including a project on “Design of secure and scalable computer network for HU-
Daye campus “, we have done by observing the problems in the company. In this project, to a
secure and scalable the network as we identified it is problem at the campus we proposed a
solution to project with a easily solve problem by securing our network devices and improving
our designing protocols to help scalabilities of a network.
X
Part One
Chapter One
1. Background of Hosting Company
1.1 History Hawassa University
Hawassa University (HU) was established in 2000 with formerly named as Debub University
through the merger of three independently operating colleges in the SNNPRS region (but now in
Sidama Regional State) namely: Hawassa College of Agriculture (ACA), Wondo Genet College
of Forestry and Natural Resources (WCFNR) and Dilla College of Teacher Education and
Health Sciences (now Dilla University).
Making structural reform again in 2007 the University reorganized itself merging the following
Campuses: College of Medicine and Health Sciences which detached itself from Dilla College
and moved to Hawassa City Main Campus and the existing two ACA and Wondo Genet College
of Natural Resource and named as Hawassa University within its five campuses. Currently, HU
operates with its 8 Colleges, 3 institutes. Moreover, the giant University currently has nearly
2000 teaching staffs and more than 43,000 Students in regular, summer, and continuing
programs. Currently, it runs 110 undergraduate, 146 Masters, 10 Specialty, 1 sub speciality and
52 PhD/DEd Programs. According to the directive from MoSHE to advance the mission of the
country, HU became one of the Eight 1st generation Research University in Ethiopia.
Previously, the School of Education and Training (SoT) was one of the key constituents of the
College of Social Sciences and Humanities of HU since 2011. It acquired its new name
following the restructuring of the University as a result of the BPR study, whose implementation
was started in 2011. Historically, however, the SoET has started its operation as a “Faculty of
Education” in 2007 with the objective of training teachers and educational professionals.
1
Industrial Internship Report Feb, 2023
1.2.2 Vision
Hawassa University aspires to be one of the top ten East African research universities by 2030.
1.2.3 Values
The values of Hawassa university is:-
Excellence
Honesty
Inclusiveness
Academic freedom
Accountability
Collaboration
Innovation
Internationalization
1.2.4 Goals
Capacity Teaching-learning
Research and technology transfer
Operational excellence
Institutional development
2
Industrial Internship Report Feb, 2023
A design for network expansion in all the campuses is undergoing. The complexes of the staff
office and the different building at the main campus have been connected to the campus-wide
network through wireless bridges. An Internet pool is established at the complex of the staff
office and wireless access points are installed at strategic points.
An on-line grade submission system has been developed; it will soon be deployed. The
University web-site has been redesigned and is being populated with data.
An ICT Policy is almost finished with only some refinement remaining. It will soon be presented
for comment and then it will made public. Recruitment of some staff on the basis of contract and
assignment of some academic staff to work under the directorate office.
The networking of all existing campuses, interconnecting the campuses and introduction of
broadband network for use both by staff and students starting to engage in applications
development
Promoting and enhancing research focusing on knowledge and technology transfer consistent
with national priority needs is one of the mandates of public higher education institutions
indicated in Higher Education Proclamation 1152/2019. In line with this provision, Research and
3
Industrial Internship Report Feb, 2023
Technology Transfer Vice President Office (RTTVPO) is responsible to lead research projects
that consider the needs of the country and enable solving challenges and support the overall
development of the country through technology transfer. Specifically, the office is responsible
for:
Develop and implement the institution’s research, technology transfer, university-industry linkage
and community service plans and policies;
Monitor the implementation of the institution’s research, technology transfer, university-industry
linkage and community service strategies/plans;
Make sure that research thematic areas are identified and periodically updated; make sure that
research, technology transfer, university-industry linkage and community service activities and
support systems are functional;
Enforce the rules and regulations regarding research, technology transfer, university-industry
linkage and community service
Lead financial administration, procurement and transport services related to research and
community services of the University;
Create a conducive environment for technology transfer activities, and coordinate and support
researches that lead to production of technology;
Oversee the delivery of relevant skill training to the academic staff, students and other employees
of the institution;
Create a conducive environment and organizational culture for research, technology transfer,
university-industry linkage and community services;
Oversee the general administration of collaborative project grants or funds for research,
technology transfer, university-industry linkage and community service activities;
Support and oversee the institution’s and its members’ consultancy engagements with the
industry or other institutions.
4
Industrial Internship Report Feb, 2023
Chapter Two
2. Overall Internship Experience
2.1 How we get into the Company
In November, our department sent student’s name list to HU which is found in Sidama Region,
Ethiopia and the head of HU see the students list and wrote a letter to the ICTD then the HU
head office sent a letter in which ICTD should accept us for internship experience, Finally the
ICTD head Mr. Mulugeta see our letters and accept us. Then Mr. Mulugeta has played an
important role in introducing the company’s feature and with all our co-workers to us. Then we
were able to know more about the HU and network system process by discussion and direct
observation
After the establishment of the ICT Center in late 2000 with some 20 computers at its disposal, a
shared dial-up Internet connection was introduced which, for the first time, started to serve the
University staff to get access to the Internet (WWW and EMAIL).
In the year 2003, the Ministry of Education (MoE) has sponsored the establishment of campus-
wide networks at the Awassa College of Agriculture, Wondogenet College of Forestry and Dilla
College of Teachers Education and Health Sciences (DCTEHS). Soon after the deployment of
the network, a broadband Internet connection was introduced.
In the year 2008, a campus-wide network was established at the main campus. Moreover, the
three campuses at Hawassa City, i.e. the Main Campus, the College of Health Sciences and the
College of Agriculture, were interconnected via fiber-optic cables and these campuses were
connected to the Internet through two gateways (at the Main Campus and the Awassa College of
Agriculture).
5
Industrial Internship Report Feb, 2023
Finally, in the year 2014 started an expansion of the existing network infrastructure so as to
cover all the buildings that were not included in the previous two phases and also interconnect
the Wondogent campus to the campuses in Hawassa city. The current network infrastructure is
10GB bandwidth support capacity in five campuses, i.e Main Campus, Technology Institute,
College of Health Sciences, College of Agriculture, and Wondogenet College of Forestry.
Mission
Our mission is to provide, coordinate, and facilitate the use of ICT in all activities of the
University in order to facilitate change.
Vision
Our vision is to exploit ICT to its full potential thereby assisting the University in elevating its
position to a center of academic excellence.
2.2 Objectives
The ICT Directorate office was established to meet the following objectives:
6
Industrial Internship Report Feb, 2023
2.3 Workflow
HU ICT-center work flow looks like as shown in a diagram
Networking divisions
Software divisions
Maintenance divisions
There was a selection provides to student to select departments or divisions going to join. We
have picked customer networking infrastructure and system and stayed there for about four
months. Being assigned the division of networking, we familiarized with the subdivisions and
their application where they are going to be focused. The following sub topics are the
technologies used and the activities undertaken in the departments. The activities are not only
what we had observed, they are also what we have been performing, executing and participating
in that division
7
Industrial Internship Report Feb, 2023
Design the core layer as a high-speed, L3 switching environment utilizing only hard ware
accelerated services. Layer3 core designs are superior to Layer2 and other alternatives because
they provide:
8
Industrial Internship Report Feb, 2023
Avoid L2 loops and the complexity of L2 redundancy, such as STP and indirect failure
detection for L3 building block peers.
The distribution layer aggregates nodes from the access layer, protecting the core from
highdensity peering. Additionally, the distribution layer creates a fault boundary providing a
logical isolation point in the event of a failure originating in the access layer. High availability in
the distribution layer is provided through dual equal-cost paths from the distribution layer to the
core and from the access layer to the distribution layer. This results in fast, deterministic
convergence in the event of a link or node failure. When redundant paths are present, failover
depends primarily on hardware link failure detection instead of timer-based software failure
detection. Convergence based on these functions, which are implemented in hardware, is the
most deterministic.
9
Industrial Internship Report Feb, 2023
System room
Power room
Server
Core switch
Firewall
Rack
Routers and etc.
10
Industrial Internship Report Feb, 2023
Proxy server: -used for like fire wall to authenticate and ignore the given tasks.
Hawassa University has use Cisco catalyst 6509 mode. Cisco Catalyst 6509 Switch provides
high port densities that are ideal for many wiring closet, distribution, and core network as well as
data center deployments. It’s a multi layers switch, so can operate on layer three the Hawassa
University uses core switch instead of router for connecting internal LAN network into the outer
network (wide area network) because of the following problem with router: -
11
Industrial Internship Report Feb, 2023
The Cisco Catalyst 2960 Series Switches is the leading Layer 2 edge, providing improved ease of
use, highly secure business operations, improved sustainability, and a borderless network
experience. The university deployed 84 Cisco catalyst 2960 series the end user device is directly
connected to access switch in HU.
Figure 2. 6 Rack.[13]
Console cable
12
Industrial Internship Report Feb, 2023
Firewall is essential part of a networks design. A firewall is a networking device, either hardware
or software based, that controls access to your organizations network. A firewall is a network
system or group of systems that manages access between two or more networks. As my
supervisor says the higher the security level of an interface the higher the trust level of the
network connected to that interface and vice-versa.
It’s physical or software-based service that is used to control incoming and outgoing traffic based
on some predefined set of rules and criteria’s, by default traffic flow from lower security level to
higher level are blocked. The firewall will be placed between the core/distribution switches and
the redundant Server farm switches to secure any traffic flow between the server farms and the
LAN users
Modem
13
Industrial Internship Report Feb, 2023
Modem is a contraction of the term’s modulator and demodulator. Modems perform a simple
function. They translate digital signals from a computer into analog signals that can travel across
conventional phone lines. The modem modulates the signal at the sending end and demodulates
at the receiving end
Figure 2. 9 modem.[18]
Routers
Router connects networks together and make a large network. A router uses the software
configured network address to make forwarding decisions.
Figure 2. 10 modem
Access Point: - used for wireless network transmit to the user
Access points are used for Providing WLAN service for the office and outer office places. The
wireless access point supports the IEEE802.11 in standard for high performance
WLAN.
14
Industrial Internship Report Feb, 2023
Indoor wireless network access: -is very strong its signal strength and it can penetrate its signal
even there is a wall but it does not go through long distance.
Outdoor: - is very weak its signal strength and it cannot penetrate its signal if there is wall or
trees and others but it can discover wide area if there is not walls, trees and other obstacles. The
AP (access point) provides the following functions:
Access Point Adapter: As we observed this tool is used as intermediate between switch and
access point. It has three major structures; power supply port, data- in port, data and power out
port
Data-in port: - is a port that is used to connect switch with access point adapter using UTP
cable.
Through this port the data transferred from switch to access point via access point adapter.
Data and power out port: - is used to connect access point adapter with access point using UTP
cable. This port is used to give data and power to the access point.
2.6 Cabling
2.6.1 UTP Cable
Unshielded twisted-pair cable is the most common networking media. UTP consists of four pairs
of thin, copper wires covered in color-coded plastic insulation that are twisted together. The wire
pairs are then covered with a plastic outer jacket. UTP cables are of small diameter and it doesn’t
15
Industrial Internship Report Feb, 2023
need grounding. Since there is no shielding for UTP cabling, it relies only on the cancellation to
avoid noise.
The connector used on a UTP cable is called as RJ-45 connector. One end of the Unshielded
Twisted Pair cable with RJ45 jacks attached is plugged in to computer's Ethernet network
interface card port and other end is plugged to the wall mount plate with female RJ45 port
(receptacle), From the wall mount RJ45 female receptacle, Unshielded Twisted Pair cable is
wired to the Local Area Network switches.
UTP cabling has different categories. Each category of UTP cabling was designed for a specific
type of communication or transfer rate. The most popular categories in use today are 5e and 6,
which can reach transfer rates of over 1000 Megabyte per second.
Unshielded Twisted Pair cables support a maximum distance of 100 Meters (from NIC Card to
Switch Port), without signal distortion.
Puncher: Puncher is a device used to cut the insulation part of the cables and put them in the
hole of the ports or the socket (the one placed on the wale) as well as cut down the extra length
of the cables. It is a small hand tool used by network technicians. It is used for inserting wire
into insulation-displacement connectors on punch down blocks, patch panels and surface mount
boxes.
16
Industrial Internship Report Feb, 2023
Figure 2. 12 Puncher.[13]
Header /data jack: is attached to the boxer faceplate at back side which is used to terminate the
UTP cat6 cable. Also for generating of the UTP cat6 cable.
Figure 2. 14 Screwdriver
Crimper: - crimp RJ45 with CAT6A cable
Figure 2. 15 Crimper.[18]
17
Industrial Internship Report Feb, 2023
Figure 2. 17 RJ-45.[13]
Tester: -We used this tool to test whether a given Ethernet cable is working or not.
Network node:
In a network, a node is a connection point or an endpoint for data transmissions. In general, data
from network switch to workstation transmit via UTP cable lastly to node, as the result, from the
node to user equipment.
18
Industrial Internship Report Feb, 2023
Straight through; - is a type of twisted pair copper wire cable for LAN use for which the
RJ-4 5connectors at each end have the same pin out. The wires on the cable are
crossed over so that they receive signal pins on the connector on one end are connected to the
transmit signal pins on the connector on the other end. Straight-through cable is used to connect
different devices such as computers with switch or other end-user devices (e.g., printers) to
networking devices such as hubs and switches.
Cross over; - is a type of twisted pair copper wire cable. It used for LAN (Local Area Network).
Cross Over cable used to connect to similar devices such as Computer to Computer Switch to
Switch, Hub to Hub and Router to Router.
Table 1. 2 the arrangements of straight through and cross over twisted pair copper cable
Orange Green
Blue Blue
Green Orange
Brown Brown
19
Industrial Internship Report Feb, 2023
To crimp network cable the procedure below shows the proper orientation of the colored wires to
the pins and how to crimp the connector to the cable.
20
Industrial Internship Report Feb, 2023
21
Industrial Internship Report Feb, 2023
Fusion Splice - A splice accomplished by the application of localized heat sufficient to fuse or
melt the ends of two lengths of optical fiber, forming a continuous single optical fiber and we
used special instrument called splicer machine.
Mechanical Splice - A fiber splice accomplished by fixtures or materials, rather than by thermal
fusion we use this splicing method if we have no splicer machine
22
Industrial Internship Report Feb, 2023
Fusion Splicer: - is machine we used for splicing the blown fiber optics.
23
Industrial Internship Report Feb, 2023
To fuse the two fibers together in such a way that light passing through the fibers is not
scattered or reflected back by the splice, and so that the splice and the region surrounding
it are almost as strong as the virgin fiber itself.
Fiber Stripper: A precise stripper used to remove the buffer coating of the fiber itself for
termination.
Alcohol: used for clean the scratched fiber, because OFC by nature lubricate
Figure 2. 29 Alcohol.[18]
Cotton: is used to dry and clean up some dust from OFC to minimize loss in between 0.00-
0.3dB.
24
Industrial Internship Report Feb, 2023
900 cutters (clever cutter): A tool that precisely breaks (900 cuts) the fiber to produce a flat end
for splicing.
Figure 2. 31 Splice-Protection-Sleeve.[13]
25
Industrial Internship Report Feb, 2023
2.10 Challenges we have been facing while performing our work task and
their solutions
2.10.1 Challenges
The challenge that we have most commonly face during our internship session, which have their
own matter of influence for us. So, some of the major challenges are as follows: -
Chapter Three
Benefits We Have Gained from Internship
In the internship program we deal about different things in HU ICT center. In our four months of
internship we have gained valuable benefits starting from creating awareness about the external
work environment to achieve entrepreneurship skills.
We are confident to say something, to suggest our opinion for every question or idea those are
forwarded to us; it is nothing but due to the skill that we have developed throughout the
internship program. Getting experience is a great way to build confidence. What's more, if we
have an impressive resume, we will be more confident in our chances of securing a job. After
we’ve done an internship, if an interviewer asks if you know how to do something, we won’t say
“um (doubt), yes, we think we would be able to do that but can say “absolutely and supplement
our assertion with examples.
The following are the main benefits we gain from the work we have done;
26
Industrial Internship Report Feb, 2023
devices located on the room, and deal on how it can be done Configure switch and create VLAN,
configuring router with different routing protocols.
Mostly know network in terms of theoretical but after internship know in practical
The network is come from Tele in fiber optic cable
In Ethiopia have only one Tele server and distribute all over Ethiopian region
The data come from server in terms of light
Any data set in computer in terms of digital
The internet speed different in terms of devices
In the given organization network is control set in one place with in computer
27
Industrial Internship Report Feb, 2023
sharing in group is effective for quality and customer satisfaction. These experiences just needed
to be highlighted in a way that interested employers.
28
Industrial Internship Report Feb, 2023
internship we improve our communication skills by meeting many persons daily and also know
some technical words (company words) that we do not know before.
Starting from interacting with many workers in the Company, the whole internship experience
had improved our communication skills in very good manner which we could talk to any staff
members in the company with full confidence and as easily as possible. In the company we were
given the chance to talk and interview important people from different staffs. All in all, we have
gained confidence on how to ask different questions, to make discussions, to answer questions
when asked, to respond to superiors, and etc.
Generally, the whole past months had been upgrading our speaking skills.
If you show respect to the employees, thanking them for their work and complimenting them on
their successes, they will be far more likely to respect you in return.
You can establish excellent working relationships just by listening to staff and clients. An active
listener focuses on what the speaker is saying, regularly paraphrasing to check that they have
received the speaker’s intended message.
29
Industrial Internship Report Feb, 2023
In addition to the above benefits the internship time was finished by achieving the objectives
that are listed at the beginning of chapter two through many challenges and success.
The internship program is a useful curriculum to students not only in terms of practical and
theoretical knowledge but also in terms of improving social skills. During our four-month period
we get some useful skills. So, for future work professionalism the program is an important by
solving the problems related with theoretical knowledge, interpersonal communication skills,
team playing skills, leadership skills, and etc.
3.7.2 Contribution
Technical support services attempt to help the user solve specific problems with a product rather
than providing training, customization or other support service. The section gives first aid
support those agents who are working in networking divisions when a problem happens. We
have made a very positive contribution to HU by:
30
Industrial Internship Report Feb, 2023
Part Two
(Project Carried Out)
Project title: Design of secure and scalable computer network for
HU-Daye campus
31
Industrial Internship Report Feb, 2023
Abstract
Network security is a set of technologies that protects the usability and integrity of a companies
infrastructure by preventing the entry from potential threats. The purpose of this project is to
design a suitable network system for Daye campus which is a branch of HU. The aim of project
was to design security and scalabe network for a campus and also improving existing network
with high-quality security and low cost in such a way that network devices of HU. This project
will help to enhance education in Daye campus as it is a newly starting its educational program.
There are many devices that we were used in designing the network such as; routers, switches,
backup, firewall and servers. All devices were connected to make integration network system
and configured by giving IP addresses to all devices. The networks also needed to have a high
level of security. Accordingly, it incorporated several mechanisms including a firewall devices
that prevents any unfavorable data from entering into the network. Additionally, all devices in
the network were secured by passwords, and configured the interfaces of a device to be more
secure. Finally our project ensures the network security to a campus to prevents the data from an
unauthorized threats and provides a optional path to a connection at a time of faults in one part of
a network
32
Industrial Internship Report Feb, 2023
Chapter One
Background
1.1 Introduction
A computer network is a set of devices (computer, printer, intermediate devices, and so on)
connected by communication link in which meaningful information is transferred through it.[1]
Now a days, computer networking is become the most required one for peoples. It used for
Access to remote information, share views and Interactive entertainment, Electronic commerce,
videoconferencing, on line library and so on. In this paper we look at how to design secure and
robust autonomous network for a HU-Daye campus regarding that we going to design intranet
network which is private. Intranet is applies any network that has multiple LANs interconnected.
The LANs are typically in multiple buildings that are close to each other and interconnected. We
assumed that the company has ten building in which 350 users are hosted in all building,
including Wi-Fi. Also university data center room where core switches, firewall, server farm,
and other devices are placed, distribution room where distribution switches i.e. multilayer
switches are placed and have access layer switch at the end contain end users.
To help with solving this problem we have proposed a design by using redundancy based
protocol to mitigate this failures in a network and we were configured a network port interfaces
to assured security issues by using cisco configuration commands.
33
Industrial Internship Report Feb, 2023
IN [2] but the cost is very high. He described a collection of communication networks
interconnected by bridges or routers related to interconnection of networks or internetworking.
Interconnected set of networks appears as a larger network. Every system retains identity for
communication across multiple networks referred as an Internet. Internet supports
communication among the devices attached to the network. We took network topology figure
from Pandya, Karta. "Network Structure or Topology." International Journal of Advance
Research in Computer Science and Management Studies. [3] However, the design of computer
networks differs from one university to another. This is as a result of many factors which
determine the differences. Such factors include; adaptability, integration, resilience, security, and
cost. Installing networks in a university relies on the university’s budget, which differs by
institution and from country to country. Now day security issue becomes a highly considerable
objects for one’s network organizations.IN [4] however they do not fullifills all security
parameters. Therefore, this design will be focusing on factors that will enhance computer
network with a secured manner and scalables.
34
Industrial Internship Report Feb, 2023
1.4 Objective
1.4.1 General objective
The general objective of this project is to design and simulate secure,scalable, robust computer
network for the HU-Daye campus.
The scopes of our project is designing and simulating the results on software only it does not
implemented prototype and if it will implement the project is functioned at our host company
HU-Daye campus.
35
Industrial Internship Report Feb, 2023
Chapter Two
Methodology
The methodology we followed in our project was first we are going to identify and understand
the materials and the techniques needed to met the desired solution for the problem. After then
we gathered a network design information and principles. Then we going to design and integrate
network topology and configured the designed networks to mitigate existed problems. Finally we
simulate our projects by Cisco packet tracer software and test the solutions.
36
Industrial Internship Report Feb, 2023
Network architectures: - computer network architectures are classified into three main layers.
Those layers are core, distribution, and access layers. These layers can be spread out into more
layers or compacted into fewer depending on the size of networks. These 3-layers network
structures are incorporated so that it can be easily managed, modified, and to improve data
handling and routing within the network. [3]
Core Layer: - the core layer usually contains high-end layer 3 switches or routers. The core is
the heart or the backbone of the network. The major portion of a network’s data traffic passes
through the core. The core must be able to quickly forward data to other parts of the network.
Data congestion should be avoided at the core.. A layer 3 switch is essentially a router that uses
electronic hardware instead of software to make routing decisions. The advantage of the layer 3
switch is the speed at which it can establish a network connection.
Distribution Layers: - the distribution layer in the network is the point where the individual
LANs connect to the network routers or layer 3 switches. It mainly used to aggregate many
LANs of access layer Routing and filtering policies are more easily implemented at the
distribution layer without having a negative impact on the performance of the network data
traffic; however, the speeds of the network data connections at the distribution layer are typically
slower than at the core.
37
Industrial Internship Report Feb, 2023
Access Layers: - the access layer is where the networking devices in a LAN connect together.
The network hardware used here is typically a layer 2 switch. Hubs can be used but are not
recommended in any networks with significant amounts of data traffic. Remember, a switch is a
better choice because it forwards data packets directly to destination hosts Connected to its ports.
Network data traffic is not forwarded to all hosts in the network. The exception to this is a
broadcast that is sent to all hosts connected to the switch.
The topology we use for this project is star topology. The reason behind is that Star topologies
provide an inherent advantage that a new site can be added with ease; only the central site will
have to be updated.
Centralized network:
User-friendly:
Very reliable:
Highly efficient:
Easily manageable
Core layers are responsible for forwarding large amounts of packets both reliably and quickly.
The distribution layer, on the other hand, is routing and filtering and the communication point
between the access layer and the core. This design is often deployed in small and medium
campus networks.
We used Collapsed core architecture since in a Cisco’s 3 layer-hierarchical we would use more
number of switches, in which the later used it for redundancy and increasing performance in a
large campus network.
39
Industrial Internship Report Feb, 2023
Router CLOUD
Ma in block
ISP
Web server
Web server
Routing protocol: routing is a process of moving packets across network from one host to
another host by using the best path from router table. It classified into static and dynamic routing
protocol; fatherly dynamic routing protocol classified into interior and exterior gateway routing
40
Industrial Internship Report Feb, 2023
protocol. In this project we raised interior gateway routing protocol which works in one
autonomous computer network system. [5]
OSPF (open shortest path first): is link-state routing protocol that used Dijkstra’s algorithm to
determine the shortest path from forwarding address table. Use shortest path and get common
view of entire network topology. It supports equal load balancing. [3]
Static VLAN: Basically a port-based VLAN. The assignments are created when ports are
assigned to a specific VLAN.
Dynamic VLAN: Ports are assigned to a VLAN based on either the computer’s MAC address or
the username of the client logged onto the computer.
IP assignment: is a process where subnets are created for each subgroup according to hosts
being supported. The IP address assignment is typically tracked by the network operations center
(NOC). The IP addresses are kept in a central log file so that NOC can troubleshoot network
41
Industrial Internship Report Feb, 2023
problems. For example, a machine could be causing network problems possibly due to hacked or
corrupted software. NOC needs to be able to track down the network problem(s). The NOC
database will have the MAC address, the IP address, and the name of the person who uses the
computer. IP addresses are assigned by NOC based on where the subnet for the computer is
locate.
With proper planning, the IP network can be more organized, easier to set up, and easier to
troubleshoot than user and network services. By following recommended IP address
management standards, we can avoid:
IP network guidelines
Sub netting: is the process of dividing a single network in to multiple sub network and is used
to helps us in minimize wastage of IP address. Smaller networks are easier to manage and
troubleshot.
DHCP: is a protocol that provide IP address, subnet mask, and IP address of a gateway router
dynamically to a host.
42
Industrial Internship Report Feb, 2023
2^H -2 >= Number of hosts on your largest segment(H represent host bit)
S+H <= Total number of host bits you have for a class of address
11111111.11111111.11111110.00000000:- (255.255.254.0)
0 1 0 1 1 0 1 0
We count from the right to left from above binary value of 90 and we take decimal value from
the first one’s binary which is 2 in this case, then adding on 90 and minus one from the sum.
43
Industrial Internship Report Feb, 2023
90+2 = 92
BC ID 172 22 91 255
VLAN 10 is in Administration building its IP address: 172.22.90.0/26 (it must support 50 users)
VLAN 30 is in student Lab its IP address: 172.22.90.128/25 (it must support 100 users)
VLAN 50 is in N.Sc computational science its IP : 172.22.91.64/26 (it must support 40 users)
VLAN 55 is in sport science its IP address: 172.22.91.128/27 (it must support 20 users)
VLAN 65 is in student clinic its IP address: 172.22.91.192/27 (it must support 30 users)
VLAN 70 is in server room its IP address: 172.22.91.225/29 (it support 4 IP for 4 servers)
44
Industrial Internship Report Feb, 2023
45
Industrial Internship Report Feb, 2023
46
Industrial Internship Report Feb, 2023
Chapter Three
3. Result And Discussion
This chapter is about the result that are obtain through simulating the proposed project on
software program called Cisco packet tracer. Some screenshots are included to help with the
understanding of how the system works from simulation tool. The image below overall packet
tracer diagram of the proposed project
47
Industrial Internship Report Feb, 2023
After configuration the host gets IP addresss dynamically from the DHCP server automatically
48
Industrial Internship Report Feb, 2023
49
Industrial Internship Report Feb, 2023
50
Industrial Internship Report Feb, 2023
Forexample Access switch 8 the configuration enabled as port security mode to see configuration
we can use the commands as:-
Access-switch-8 (confi-if)#enable
Access-switch-8(config-if)#int fa0/2
Access-switch-8(config-if)#switchport port-security
51
Industrial Internship Report Feb, 2023
Economics
Packet Tracer PC Command Line 1.0
C:\>ping 172.22.91.2
Pinging 172.22.91.2 with 32 bytes of data:
Reply from 172.22.91.2: bytes=32 time<1ms TTL=128
Reply from 172.22.91.2: bytes=32 time=1ms TTL=128
Reply from 172.22.91.2: bytes=32 time=7ms TTL=128
Reply from 172.22.91.2: bytes=32 time=12ms TTL=128
Ping statistics for 172.22.91.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 12ms, Average = 5ms
Student Clinic
C:\>ping 172.22.91.193
Pinging 172.22.91.193 with 32 bytes of data:
Reply from 172.22.91.193: bytes=32 time=15ms TTL=128
Reply from 172.22.91.193: bytes=32 time=9ms TTL=128
52
Industrial Internship Report Feb, 2023
Student lab
C:\>ping 172.22.90.129
Pinging 172.22.90.129 with 32 bytes of data:
Reply from 172.22.90.129: bytes=32 time=17ms TTL=128
Reply from 172.22.90.129: bytes=32 time=1ms TTL=128
Reply from 172.22.90.129: bytes=32 time<1ms TTL=128
Reply from 172.22.90.129: bytes=32 time=9ms TTL=128
Ping statistics for 172.22.90.129:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 17ms, Average = 6ms
53
Industrial Internship Report Feb, 2023
Chapter Four
4. Limitation and Future Works
The limitation of our project is the system to attain considerable solution it takes more costs to
implement. Because if we want to design the network with securd and scalable ways the design
will require more costs. The simulation software we used which is Cisco packet tracer supports
only up to twenty four port but we want forty eight port switch to design.
It is better to design the networks with more secured ways and redundant. It is also better to
implement the prototype. And it is a better to understand about security issues to design well
secured network considering some element like costs, latest devices and so on.
Recommendation
We suggest that, the company should implement the projects to contribute the secured and scalable
network for the entire its community. And campus should host more intern students in the future for
the development of technology and what the working environment looks like for student.
The co-ordination between high levels to low level should be strong than before
We believe that the number of mentors should be increased in order to study all of the
problems existed and to find a solution for existed problem.
The equipment that help the interns should be added to make improvement
There should be smooth flow of information about the network security and the scalable
in the organization.
54
Industrial Internship Report Feb, 2023
CONCLUSION
This project has proven that a standard network system can be designed with more scalable and
secured. Although we used the cheapest devices in designing the network with the security of
network turned out to be very strong. This is because we configured the devices security protocol
and additionally we used firewall and backup devices in this network are of good quality. All
networks need many servers for doing their work. For this project, we used some important
servers such as DNS, WEB server, FTP server and DHCP server. These servers help the network
to perform their functions in a smooth way. It can be seen in this project that various costs were
minimized in order to maximize the quality of the designed network. Although there may have
been some challenges in this project due to some financial constraints, at the end our aim was
achieved by designing a network for campus with secured and more scalable network with
minimal cost.
Lastly, as secured and effective as the methods of designing a network in this project are, it is
not limited to HU-Daye campus. At other university that is trying to secure in any of their
network design projects can also adopt the methods used in this research.
55
Industrial Internship Report Feb, 2023
References
[1] Huang, Lifei, and Ten-Hwang Lai. "On the scalability of IEEE 802.11 ad hoc networks."
In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking &
computing, pp. 173-182. 2002.
[2 ]Huang, Lifei, and Ten-Hwang Lai. "On the scalability of IEEE 802.11 ad hoc networks."
In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking &
computing, pp. 173-182. 2002.
[3] Alabady, Salah A. Jaro. "Design and implementation of a network security model using static
VLAN and AAA server." 2008 3rd International Conference on Information and
Communication Technologies: From Theory to Applications. IEEE, 2008.
[4] Alabady, S.A.J., 2008, April. Design and implementation of a network security model using
static VLAN and AAA server. In 2008 3rd International Conference on Information and
Communication Technologies: From Theory to Applications (pp. 1-6). IEEE.
[5] Alabady, S.A.J., 2008, April. Design and implementation of a network security model using
static VLAN and AAA server. In 2008 3rd International Conference on Information and
Communication Technologies: From Theory to Applications (pp. 1-6). IEEE.
[6] Babine, S., et al. "Comparative Study between Fiber Optic and Copper in.
[7] Lucas, M. W. (2009). Cisco routers for the desperate: router management, the easy way. No
Starch Press.
[8] Cisco Systems, Inc. “SAN-1501: Introduction to Storage Area Networks (SAN)” Networkers
2006 presentation (accessible on a subscription basis)...
[9] Cisco Systems, Inc. “SAN-2605: iSCSI SAN Design and Operation” Networkers 2006
presentation (accessible on a subscription basis).
[10] Johnston, David, and Jesse Walker. "Overview of IEEE 802.16 security." IEEE Security &
Privacy 2.3 (2004): 40-48.
[12] Yang, Z., Li, C., & Chen, S. (2015, April). Development of Mobile and Computer Website
Integrated College Content Management System. Atlantis Press.
56
Industrial Internship Report Feb, 2023
[13]Karapistoli, E., Pavlidou, F.N., Gragopoulos, I. and Tsetsinas, I., 2010. An overview of the
IEEE 802.15. 4a standard. IEEE Communications Magazine, 48(1), pp.47-53.
[14] Memnon, A., Brahmi, S., Karina, S., & Afire, K. (2015). Cloud Based Instant File Sharing
System in Wireless College Campus Environment.
[16] Jiang, Dungy, et al. "Layer two firewall with active-active high availability support." U.S.
Patent No. 7,941,837. 10 May 2011.
[17] Mentz, Duane, and David Canine. "Automatic networking device configuration method for
home networking environments." U.S. Patent Application No. 09/969,248.
57
Industrial Internship Report Feb, 2023
58
Industrial Internship Report Feb, 2023
59
Industrial Internship Report Feb, 2023
60
Industrial Internship Report Feb, 2023
61
Industrial Internship Report Feb, 2023
62
Industrial Internship Report Feb, 2023
63