Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
79 views

Design and Secure The Computer Network

This document is an industrial internship report submitted by Genene Gebre and Ashagire Assefa to Jimma University after completing a four-month internship at Hawassa University's ICT Center. The report details their work installing and maintaining Hawassa University's computer network. It includes sections on the history and mission of Hawassa University, an overview of the network architecture and data center, procedures for cabling and fiber optic splicing, and challenges faced and solutions developed. The internship provided the students with valuable practical skills in network installation and troubleshooting as well as experience working as part of a team.

Uploaded by

Genene Gebre
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
79 views

Design and Secure The Computer Network

This document is an industrial internship report submitted by Genene Gebre and Ashagire Assefa to Jimma University after completing a four-month internship at Hawassa University's ICT Center. The report details their work installing and maintaining Hawassa University's computer network. It includes sections on the history and mission of Hawassa University, an overview of the network architecture and data center, procedures for cabling and fiber optic splicing, and challenges faced and solutions developed. The internship provided the students with valuable practical skills in network installation and troubleshooting as well as experience working as part of a team.

Uploaded by

Genene Gebre
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 74

JIMMA UNIVERSITY

JIMMA INSTITUTES OF TECHNOLOGY

FACULTY OF ELECTRICAL AND COMPUTER ENGINEERING

ELECTRONIC COMMUNICATION STREAM

INDUSTRIAL INTERNSHIP REPORT

HOSTING COMPANY: HAWASSA UNIVERSITY ICT CENTER

INTERNSHIP DURATION: FROM NOVEMBER TO FEBRUARY

Advisor: Mr. Zemenu A.

Submission Date: February 28th, 2023

Jimma, Ethiopia
Industrial Internship Report Feb, 2023

DECLARATION

We students Genene Gebre and Ashagire Assefa hereby declare that the presented report of
internship and project titled “Design of secure and scalable computer network for HU-
Daye campus” is uniquely prepared by us after the completion of four months’ work at Hawassa
University ICTD. We also confirm that the report is only prepared for academic requirements
not for any other purpose.

Name ID SIGN

1. Genene Gebre RU3774/11 _____________________


2. Ashagire Assefa RU3712/11 _____________________

Advisor:

Mr. Zemenu A. Sign: --------------------------

I
Industrial Internship Report Feb, 2023

Acknowledgment

First and foremost, we have great full thanks to almighty God for giving us the strength and
energy to accomplish this internship program. Secondly, we have also thanked Jimma University
Institutes of Technology for launching such an extremely useful internship program. Thirdly so it
is my pleasure to express our appreciation thanks to those who have helped us to experience
knowledge and skills in what we have learned on campus. We also have special recognition and
heartfelt thanks to the company of Hawassa University’s ICTD workers for accepting us for the
internship program a member of them, also share their knowledge for us, in addition, they shared
their life experiences including advice the basic way of success this makes us successful and
strong enough in our future life. And also, we would like to thank my Supervisor Mr. Asnake,
who is a manager of ICTD for his devotion of time and a respected approach looking at the
report and serious encouragement and checking process of our report and other workers of that
company. Finally, we also thank our advisor for giving us advice on the report of our internship
program Mr. Zemenu A. for his professional guidance.

II
Industrial Internship Report Feb, 2023

Table of content

DECLARATION...............................................................................................................................................I
Acknowledgment.........................................................................................................................................II
Table of content.........................................................................................................................................III
List of Table..............................................................................................................................................VIII
Acronym.....................................................................................................................................................IX
Executive Summary.....................................................................................................................................X
Chapter One............................................................................................................................................- 1 -
1.Background of Hosting Company.........................................................................................................- 1 -
1.1 History Hawassa University........................................................................................................- 1 -
1.2 Mission, Vision, Values and Goals of Hawassa University.......................................................- 1 -
1.2.1 Mission of the Hawassa University......................................................................................- 1 -
1.2.2 Vision of the Hawassa University........................................................................................- 2 -
1.2.3 Values of the Hawassa University.......................................................................................- 2 -
1.2.4 Goals of the Hawassa University.........................................................................................- 2 -
1.3 Main Products and Services of Hawassa University.................................................................- 2 -
1.3.1 Main Customer of Hawassa University...............................................................................- 2 -
1.4 Service provided by Hawassa University...................................................................................- 2 -
1.5 Overall organization and Workflow..........................................................................................- 3 -
Chapter Two............................................................................................................................................- 5 -
2.Over All Internship Experience.............................................................................................................- 5 -
2.1 How we get into the Company....................................................................................................- 5 -
2.2 Some information of the ICT data center, Hawassa University...............................................- 5 -
2.2.1 ICT Directorate....................................................................................................................- 5 -
2.2 Objectives.....................................................................................................................................- 6 -
2.3 Work flow....................................................................................................................................- 7 -
2.4 Work sections...............................................................................................................................- 7 -
2.5 Network architecture of HU over view......................................................................................- 8 -
2.5.1 Core Layer............................................................................................................................- 8 -

III
Industrial Internship Report Feb, 2023

2.4.2 Distribution Layer................................................................................................................- 9 -


2.4.3 Access Layer.........................................................................................................................- 9 -
2.5 Data Centre of HU.....................................................................................................................- 10 -
2.6 Cabling.......................................................................................................................................- 15 -
2.6.1 UTP Cable...........................................................................................................................- 15 -
2.6.2 Tools used for Crimping....................................................................................................- 16 -
2.7 Procedures to Perform Tasks...................................................................................................- 20 -
2.9 Fiber optics splicing...................................................................................................................- 21 -
2.9.1 Types of splicing.................................................................................................................- 22 -
2.9.2 Types of Fiber optic............................................................................................................- 22 -
2.9.3 Tools and steps we used to splicing fiber..........................................................................- 23 -
2.10 Challenges we have been facing while performing our work task and their solutions.......- 26 -
2.10.1 Challenges.........................................................................................................................- 26 -
Chapter Three.......................................................................................................................................- 26 -
Benefits We Have Gained from Internship............................................................................................- 26 -
3.1 Practical skill.............................................................................................................................- 26 -
3.2 Theoretical skill.........................................................................................................................- 27 -
3.3 Team Playing Skill.....................................................................................................................- 27 -
3.4 Motivation to work....................................................................................................................- 28 -
3.4.1 work ethics..........................................................................................................................- 28 -
3.5 Interpersonal communication Skills........................................................................................- 28 -
3.6 Improved Leadership Skill.......................................................................................................- 29 -
3.7 Achievement of Intern and Contribution................................................................................- 30 -
3.7.1 Achievement of Intern........................................................................................................- 30 -
3.7.2 Contribution........................................................................................................................- 30 -
PART TWO.............................................................................................................................................- 31 -
Abstract............................................................................................................................................- 32 -
Chapter One..........................................................................................................................................- 33 -
Background...........................................................................................................................................- 33 -
1.1 Introduction................................................................................................................................- 33 -
1.2 Problem Identified and proposed solution...............................................................................- 33 -
1.3 Literature Review......................................................................................................................- 34 -

IV
Industrial Internship Report Feb, 2023

1.4 Objective....................................................................................................................................- 35 -
1.4.1 General objective.................................................................................................................- 35 -
1.4.2 Specific objectives...............................................................................................................- 35 -
1.5 Significance and scope...............................................................................................................- 35 -
1.5.1 Significance of the project.................................................................................................- 35 -
Chapter Two..........................................................................................................................................- 36 -
Methodology.........................................................................................................................................- 36 -
2.1 Flow chart of network design...................................................................................................- 36 -
2.2 Network requirements and architectures................................................................................- 36 -
2.3 Hardware Requirements...........................................................................................................- 38 -
2.4 Network Topology Diagram.....................................................................................................- 38 -
2.4.1 Advantage of Star Topology:.............................................................................................- 39 -
2.4.2 Disadvantages of Star Topology........................................................................................- 39 -
2.5 Collapsed Core Architecture....................................................................................................- 39 -
2.6 Redundancy and dynamic routing protocols...........................................................................- 40 -
2.6 Switch/VLAN and access control list configuration................................................................- 41 -
2.7 Software requirement................................................................................................................- 41 -
2.7.1 Cisco Packet tracer.............................................................................................................- 41 -
2.8 The sub-netting of IP address and IP assignment...................................................................- 41 -
2.8.1 IP network design guidelines.............................................................................................- 41 -
2.9 CREATING VLAN...................................................................................................................- 44 -
5.10 Connection Setup.....................................................................................................................- 45 -
Chapter Three.......................................................................................................................................- 47 -
Result And Discussion............................................................................................................................- 47 -
Chapter Four.........................................................................................................................................- 54 -
4.Limitation And Future Works.............................................................................................................- 54 -
4.1 Limitation of the project...........................................................................................................- 54 -
4.2 Future work...............................................................................................................................- 54 -
Recommendation..................................................................................................................................- 54 -
References.............................................................................................................................................- 56 -
Appendix and Annex.............................................................................................................................- 58 -

V
Industrial Internship Report Feb, 2023

List Of Figure
Figure 2. 1 Workflow of Hawassa University ICT center..........................................................- 8 -
Figure 2. 2 Network Topology of HU.......................................................................................- 10 -
Figure 2. 3 Data Centre of HU..................................................................................................- 11 -
Figure 2. 4 Cisco Catalyst 3750 Series.....................................................................................- 12 -
Figure 2. 5 Cisco Catalyst 2960 Series.....................................................................................- 12 -
Figure 2. 6 Rack........................................................................................................................- 12 -
Figure 2. 7 Console cable..........................................................................................................- 13 -
Figure 2. 8 Cisco Firewall.........................................................................................................- 13 -
Figure 2. 9 modem....................................................................................................................- 14 -
Figure 2. 10 modem..................................................................................................................- 14 -
Figure 2. 11 Access Point..........................................................................................................- 15 -
Figure 2. 12 Puncher.................................................................................................................- 17 -
Figure 2. 13 Header /data jack..................................................................................................- 17 -
Figure 2. 14 Screwdriver...........................................................................................................- 17 -
Figure 2. 15 Crimper.................................................................................................................- 17 -
Figure 2. 16 CAT6A UTP.........................................................................................................- 18 -
Figure 2. 17 RJ-45.....................................................................................................................- 18 -
Figure 2. 18 Node frame...........................................................................................................- 18 -
Figure 2. 19 color arrangement for cabling...............................................................................- 20 -
Figure 2. 20 Cutting Plastic.......................................................................................................- 20 -
Figure 2. 21 Unwind and Pair the Same Colors........................................................................- 21 -
Figure 2. 22 Pinch the Wires.....................................................................................................- 21 -
Figure 2. 23 Correct Way..........................................................................................................- 21 -
Figure 2. 24 single mode fiber..................................................................................................- 22 -
Figure 2. 25 Multi mode fiber...................................................................................................- 23 -
Figure 2. 26 Multi mode fiber...................................................................................................- 23 -
Figure 2. 27 Miller Stripper.......................................................................................................- 23 -
Figure 2. 28 Fusion Splicing Machine Materials......................................................................- 24 -
Figure 2. 29 Alcohol..................................................................................................................- 24 -
Figure 2. 30 process of splicing................................................................................................- 25 -
Figure 2. 31 Splice-Protection-Sleeve.......................................................................................- 25 -
Figure 2. 32 Splicing finished...................................................................................................- 25 -

Figure2. 1 Cisco core switch/router symbol..............................................................................- 37 -


Figure2. 2 Cisco distribution switch.........................................................................................- 37 -
Figure2. 3 : Cisco access switch................................................................................................- 38 -
Figure2. 4 Network diagram for Campus network Design.......................................................- 40 -
Figure2. 5 connection setup......................................................................................................- 46 -

VI
Industrial Internship Report Feb, 2023

Figure 3. 1 overall packet tracer diagram - 47 -


Figure 3. 2 DHCP server...........................................................................................................- 48 -
Figure 3. 3 core switch VLAN configuration...........................................................................- 49 -
Figure 3. 4 distribution VLAN..................................................................................................- 50 -

VII
Industrial Internship Report Feb, 2023

List of Table

Table 1. 1 Categories of Unshielded Twisted Pair....................................................................- 16 -


Table 1. 2 the arrangements of straight through and cross over twisted pair copper cable......- 19 -

Table 2. 1 1Finding Broadcast ID for IP address......................................................................- 43 -


Table 2. 2 IP address range.......................................................................................................- 44 -
Table 2. 3 The sub-netted IP address and VLAN.....................................................................- 45 -

VIII
Industrial Internship Report Feb, 2023

Acronym

AC Air Conditioner

BPDU Bridge Protocol Data Units

DHCP Dynamic Host Configuration Protocol

DNS Domain Name System

GLBP Gateway Load Balancing Protocol

HSRP Hot Standby Routing Protocol

ICT Information and Communication Technology

IP Internet Protocol

LAN Local Area Network

MAC Media Access Control

MAN Metropolitan Area Network

NIC Network Interface Card

NOC Network Operation Control

OSI Open System Interconnection Model

PDU Protocol Data Unit

RJ-45 Register Jack 45

TCP Transmission Communication Protocol

STP Spanning Tree Protocol

WAN Wide Area Network

VLAN Virtual Local Area Network

VRRP Virtual router redundancy protocol

IX
Industrial Internship Report Feb, 2023

Executive Summary

This report is prepared based on our four months of Internship Program at Hawassa University.
This internship program helped us to learn about the practical configuration and installation of IP
and ZTP network camera in that HU. This report will cover some background information of the
company from its establishment to until today, basic sections of the company; how the company
was working, about quality inspection, materials specification and selection, basic tasks we have
done and challenges faced us during those four-months and a lot of understanding and
experiences on practice all application of networking system in a well-organized and effective
manner.

It is also including a project on “Design of secure and scalable computer network for HU-
Daye campus “, we have done by observing the problems in the company. In this project, to a
secure and scalable the network as we identified it is problem at the campus we proposed a
solution to project with a easily solve problem by securing our network devices and improving
our designing protocols to help scalabilities of a network.

X
Part One
Chapter One
1. Background of Hosting Company
1.1 History Hawassa University
Hawassa University (HU) was established in 2000 with formerly named as Debub University
through the merger of three independently operating colleges in the SNNPRS region (but now in
Sidama Regional State) namely: Hawassa College of Agriculture (ACA), Wondo Genet College
of Forestry and Natural Resources (WCFNR) and Dilla College of Teacher Education and
Health Sciences (now Dilla University).

Making structural reform again in 2007 the University reorganized itself merging the following
Campuses:  College of Medicine and Health Sciences which detached itself from Dilla College
and moved to Hawassa City Main Campus and the existing two ACA and Wondo Genet College
of Natural Resource and named as Hawassa University within its five campuses. Currently, HU
operates with its 8 Colleges, 3 institutes. Moreover, the giant University currently has nearly
2000 teaching staffs and more than 43,000 Students in regular, summer, and continuing
programs.  Currently, it runs 110 undergraduate, 146 Masters, 10 Specialty, 1 sub speciality and
52 PhD/DEd Programs.  According to the directive from MoSHE to advance the mission of the
country, HU became one of the Eight 1st generation Research University in Ethiopia.

Previously, the School of Education and Training (SoT) was one of the key constituents of the
College of Social Sciences and Humanities of HU since 2011. It acquired its new name
following the restructuring of the University as a result of the BPR study, whose implementation
was started in 2011. Historically, however, the SoET has started its operation as a “Faculty of
Education” in 2007 with the objective of training teachers and educational professionals.

1.2 Mission, Vision, Values and Goals


1.2.1 Mission
Hawassa University strives to produce efficient and internationally competent graduates and
undertake innovative works, rigorous research and technology transfer activities to foster social
and economic development of the country.

1
Industrial Internship Report Feb, 2023

1.2.2 Vision
Hawassa University aspires to be one of the top ten East African research universities by 2030.

1.2.3 Values
The values of Hawassa university is:-

 Excellence 
 Honesty 
 Inclusiveness 
 Academic freedom 
 Accountability
 Collaboration 
 Innovation 
 Internationalization

1.2.4 Goals
 Capacity Teaching-learning
 Research and technology transfer
 Operational excellence
 Institutional development

1.3 Main Products and Services


1.3.1 Main Customer
There are so many customers that get services from the university’s ICT. The most customers are
different offices and sector that found in the university. The different campuses of the university
are also the major customers of the ICT.

Some of the major customers of the service are: -

 Hawassa University office workers


 Students
 Different governmental organization
 The community of Hawassa

1.4 Service provided


Major tasks done by the ICT Directorate in the year 2012 include:

2
Industrial Internship Report Feb, 2023

A design for network expansion in all the campuses is undergoing. The complexes of the staff
office and the different building at the main campus have been connected to the campus-wide
network through wireless bridges. An Internet pool is established at the complex of the staff
office and wireless access points are installed at strategic points.

An on-line grade submission system has been developed; it will soon be deployed. The
University web-site has been redesigned and is being populated with data.

An ICT Policy is almost finished with only some refinement remaining. It will soon be presented
for comment and then it will made public. Recruitment of some staff on the basis of contract and
assignment of some academic staff to work under the directorate office.

The networking of all existing campuses, interconnecting the campuses and introduction of
broadband network for use both by staff and students starting to engage in applications
development

1.5 Overall organization and Workflow

1.6 Major objectives of the Office

Promoting and enhancing research focusing on knowledge and technology transfer consistent
with national priority needs is one of the mandates of public higher education institutions
indicated in Higher Education Proclamation 1152/2019. In line with this provision, Research and
3
Industrial Internship Report Feb, 2023

Technology Transfer Vice President Office (RTTVPO) is responsible to lead research projects
that consider the needs of the country and enable solving challenges and support the overall
development of the country through technology transfer. Specifically, the office is responsible
for:

 Develop and implement the institution’s research, technology transfer, university-industry linkage
and community service plans and policies;
 Monitor the implementation of the institution’s research, technology transfer, university-industry
linkage and community service strategies/plans;
 Make sure that research thematic areas are identified and periodically updated; make sure that
research, technology transfer, university-industry linkage and community service activities and
support systems are functional;
 Enforce the rules and regulations regarding research, technology transfer, university-industry
linkage and community service
 Lead financial administration, procurement and transport services related to research and
community services of the University;
 Create a conducive environment for technology transfer activities, and coordinate and support
researches that lead to production of technology;
 Oversee the delivery of relevant skill training to the academic staff, students and other employees
of the institution;
 Create a conducive environment and organizational culture for research, technology transfer,
university-industry linkage and community services;
 Oversee the general administration of collaborative project grants or funds for research,
technology transfer, university-industry linkage and community service activities;
 Support and oversee the institution’s and its members’ consultancy engagements with the
industry or other institutions.

4
Industrial Internship Report Feb, 2023

Chapter Two
2. Overall Internship Experience
2.1 How we get into the Company
In November, our department sent student’s name list to HU which is found in Sidama Region,
Ethiopia and the head of HU see the students list and wrote a letter to the ICTD then the HU
head office sent a letter in which ICTD should accept us for internship experience, Finally the
ICTD head Mr. Mulugeta see our letters and accept us. Then Mr. Mulugeta has played an
important role in introducing the company’s feature and with all our co-workers to us. Then we
were able to know more about the HU and network system process by discussion and direct
observation

2.2 Some information of the ICT data center, Hawassa University


2.2.1 ICT Directorate
Hawassa University (HU) was established in Hawassa on the 25 th of April 2000; at this time
there was no Internet connection to speak of, except for a few dial-up connections at some
offices. Specifically, there was one in the Library that served one University staff at a time
mainly for sending/receiving e-mail messages.

After the establishment of the ICT Center in late 2000 with some 20 computers at its disposal, a
shared dial-up Internet connection was introduced which, for the first time, started to serve the
University staff to get access to the Internet (WWW and EMAIL).

In the year 2003, the Ministry of Education (MoE) has sponsored the establishment of campus-
wide networks at the Awassa College of Agriculture, Wondogenet College of Forestry and Dilla
College of Teachers Education and Health Sciences (DCTEHS). Soon after the deployment of
the network, a broadband Internet connection was introduced.

In the year 2008, a campus-wide network was established at the main campus.  Moreover, the
three campuses at Hawassa City, i.e. the Main Campus, the College of Health Sciences and the
College of Agriculture, were interconnected via fiber-optic cables and these campuses were
connected to the Internet through two gateways (at the Main Campus and the Awassa College of
Agriculture).

5
Industrial Internship Report Feb, 2023

Finally, in the year 2014 started an expansion of the existing network infrastructure so as to
cover all the buildings that were not included in the previous two phases and also interconnect
the Wondogent campus to the campuses in Hawassa city. The current network infrastructure is
10GB bandwidth support capacity in five campuses, i.e Main Campus, Technology Institute,
College of Health Sciences, College of Agriculture, and Wondogenet College of Forestry.

Mission 

Our mission is to provide, coordinate, and facilitate the use of ICT in all activities of the
University in order to facilitate change.

Vision

Our vision is to exploit ICT to its full potential thereby assisting the University in elevating its
position to a center of academic excellence.

2.2 Objectives
The ICT Directorate office was established to meet the following objectives:

 To plan, develop and manage University-wide ICT infrastructure


 To develop/acquire relevant applications
 To manage operations and maintenance of ICT resources
 To train end-users on computer literacy and offer end-user computing support
 To promote staff development program to ensure that ICT staff continue to acquire the
necessary skills to provide high-quality services and support
 To advise and consult the University management on the acquisition of ICT resources
and related issues

6
Industrial Internship Report Feb, 2023

2.3 Workflow
HU ICT-center work flow looks like as shown in a diagram

2.4 Work sections


HU ICT center has many workers that worked in different places in different department sector.
In this Company there are different working sections. Among those are; -

 Networking divisions
 Software divisions
 Maintenance divisions

There was a selection provides to student to select departments or divisions going to join. We
have picked customer networking infrastructure and system and stayed there for about four
months. Being assigned the division of networking, we familiarized with the subdivisions and
their application where they are going to be focused. The following sub topics are the
technologies used and the activities undertaken in the departments. The activities are not only
what we had observed, they are also what we have been performing, executing and participating
in that division

7
Industrial Internship Report Feb, 2023

2.5 Network architecture of HU over view


The building block components of HU network architecture are based on the recommended cisco
hierarchical model, which is a layered approach network design, core layer, distribution layer
and access layer.

Figure 2. 1 Workflow of Hawassa University ICT center


2.5.1 Core Layer
In this layer core switch receive signal from Tele with in cisco using fiber optic cable in a typical
hierarchical model, the individual building blocks are interconnected using a core layer. The core
serves as the backbone for the network. The core needs to be fast and extremely resilient because
every building block depends on it for connectivity. Current hardware accelerated systems have
the potential to deliver complex services at wire speed. A minimal configuration in the core
reduces configuration complexity limiting the possibility for operational error [2].

Design the core layer as a high-speed, L3 switching environment utilizing only hard ware
accelerated services. Layer3 core designs are superior to Layer2 and other alternatives because
they provide:

 Faster convergence around a link


 Increased scalability because neighbor relationships and meshing are reduced
 More efficient bandwidth utilization
 Use redundant point-to-point L3 interconnections in the core, because this design yields
the fastest and most deterministic convergence results.

8
Industrial Internship Report Feb, 2023

 Avoid L2 loops and the complexity of L2 redundancy, such as STP and indirect failure
detection for L3 building block peers.

2.4.2 Distribution Layer


Receive information from core layer transmit to access layer,that means distribute network to
access layer large network than access layer and small network layer than core layer. In Hawassa
University have core switch in data center connect to each distribution switch if one core switch
has a faller access gain from other core switch.

The distribution layer aggregates nodes from the access layer, protecting the core from
highdensity peering. Additionally, the distribution layer creates a fault boundary providing a
logical isolation point in the event of a failure originating in the access layer. High availability in
the distribution layer is provided through dual equal-cost paths from the distribution layer to the
core and from the access layer to the distribution layer. This results in fast, deterministic
convergence in the event of a link or node failure. When redundant paths are present, failover
depends primarily on hardware link failure detection instead of timer-based software failure
detection. Convergence based on these functions, which are implemented in hardware, is the
most deterministic.

2.4.3 Access Layer


The access layer is the first point of entry into the network for edge devices, end stations, and IP
phones. The switches in the access layer are connected to two separate distribution layer
switches for redundancy. If the connection between the distribution layer switches is an
L3connection, then there are no loops and all uplinks actively forward traffic.

A robust access layer provides the following key features: -

 High availability supported by many hardware and software attribute.


 Inline power for IP telephone and wireless access points, allowing customers to converge voice
onto their data network and providing roaming WLAN access for users.
 Operating system high-availability features, such as Link Aggregation, which provides higher
effective bandwidth while reducing complexity.
 Efficient network and bandwidth management using software features such as Internet Group
Membership Protocol. It snooping helps control multicast packet flooding for multicast
applications.

9
Industrial Internship Report Feb, 2023

Figure 2. 2 Network Topology of HU

2.5 Data Centre of HU


Hawassa University have two Data Centre placed in main campus and referral campus. HU Data
Centre contain two room;-

 System room
 Power room

System room contain; -

 Server
 Core switch
 Firewall
 Rack
 Routers and etc.

10
Industrial Internship Report Feb, 2023

Figure 2. 3 Data Centre of HU


Mail server: - A mail server can receive e-mails from client computers and deliver them to other
mail servers.

Proxy server: -used for like fire wall to authenticate and ignore the given tasks.

File server: -this server is used to store file of the organization.

Core Switch: -distribute network to distribution switch receive from Tele.

Cisco Catalyst 6509 switch (core switch)

Hawassa University has use Cisco catalyst 6509 mode. Cisco Catalyst 6509 Switch provides
high port densities that are ideal for many wiring closet, distribution, and core network as well as
data center deployments. It’s a multi layers switch, so can operate on layer three the Hawassa
University uses core switch instead of router for connecting internal LAN network into the outer
network (wide area network) because of the following problem with router: -

Router has few ports

Routers make bottle neck and the performance of network is decrease

Cisco Catalyst 3750 Series (distribution switch)

11
Industrial Internship Report Feb, 2023

Figure 2. 4 Cisco Catalyst 3750 Series.[19]


This switch can operate on layer 2. In HU DHCP and VTP server mode is configured on this
switch. It providing configuration flexibility, and support for converged network patterns, and
automation of intelligent network services configurations.

Cisco Catalyst 2960 Series

The Cisco Catalyst 2960 Series Switches is the leading Layer 2 edge, providing improved ease of
use, highly secure business operations, improved sustainability, and a borderless network
experience. The university deployed 84 Cisco catalyst 2960 series the end user device is directly
connected to access switch in HU.

Figure 2. 5 Cisco Catalyst 2960 Series.[13]


Rack: is a metal frame used to hold various hardware devices such as switches, cable and other
electronic equipment.

Figure 2. 6 Rack.[13]

Console cable

12
Industrial Internship Report Feb, 2023

We used console cable during configuration of switch.

Figure 2. 7 Console cable.[13]


Cisco Firewall

Firewall is essential part of a networks design. A firewall is a networking device, either hardware
or software based, that controls access to your organizations network. A firewall is a network
system or group of systems that manages access between two or more networks. As my
supervisor says the higher the security level of an interface the higher the trust level of the
network connected to that interface and vice-versa.

It’s physical or software-based service that is used to control incoming and outgoing traffic based
on some predefined set of rules and criteria’s, by default traffic flow from lower security level to
higher level are blocked. The firewall will be placed between the core/distribution switches and
the redundant Server farm switches to secure any traffic flow between the server farms and the
LAN users

Figure 2. 8 Cisco Firewall.[7]

Modem

13
Industrial Internship Report Feb, 2023

Modem is a contraction of the term’s modulator and demodulator. Modems perform a simple
function. They translate digital signals from a computer into analog signals that can travel across
conventional phone lines. The modem modulates the signal at the sending end and demodulates
at the receiving end

Figure 2. 9 modem.[18]
Routers

Router connects networks together and make a large network. A router uses the software
configured network address to make forwarding decisions.

Figure 2. 10 modem
Access Point: - used for wireless network transmit to the user

Access points are used for Providing WLAN service for the office and outer office places. The
wireless access point supports the IEEE802.11 in standard for high performance

WLAN.

 The AP provides the following capability: -


 Wireless transceiver
 Protocol-independent networking functionality
 Central management configuration

AP can be divided in to two these are: -

14
Industrial Internship Report Feb, 2023

Indoor wireless network access: -is very strong its signal strength and it can penetrate its signal
even there is a wall but it does not go through long distance.

Outdoor: - is very weak its signal strength and it cannot penetrate its signal if there is wall or
trees and others but it can discover wide area if there is not walls, trees and other obstacles. The
AP (access point) provides the following functions:

 It gives wireless services for the users.


 It helps the user to get internet service without the need of network cable.

Access Point Adapter: As we observed this tool is used as intermediate between switch and
access point. It has three major structures; power supply port, data- in port, data and power out
port

Power supply port: - is used to supply power for access point.

Data-in port: - is a port that is used to connect switch with access point adapter using UTP
cable.

Through this port the data transferred from switch to access point via access point adapter.

Data and power out port: - is used to connect access point adapter with access point using UTP
cable. This port is used to give data and power to the access point.

Figure 2. 11 Access Point.[7]


.

2.6 Cabling
2.6.1 UTP Cable
Unshielded twisted-pair cable is the most common networking media. UTP consists of four pairs
of thin, copper wires covered in color-coded plastic insulation that are twisted together. The wire
pairs are then covered with a plastic outer jacket. UTP cables are of small diameter and it doesn’t

15
Industrial Internship Report Feb, 2023

need grounding. Since there is no shielding for UTP cabling, it relies only on the cancellation to
avoid noise.

The connector used on a UTP cable is called as RJ-45 connector. One end of the Unshielded
Twisted Pair cable with RJ45 jacks attached is plugged in to computer's Ethernet network
interface card port and other end is plugged to the wall mount plate with female RJ45 port
(receptacle), From the wall mount RJ45 female receptacle, Unshielded Twisted Pair cable is
wired to the Local Area Network switches.

UTP cabling has different categories. Each category of UTP cabling was designed for a specific
type of communication or transfer rate. The most popular categories in use today are 5e and 6,
which can reach transfer rates of over 1000 Megabyte per second.

Unshielded Twisted Pair cables support a maximum distance of 100 Meters (from NIC Card to
Switch Port), without signal distortion.

Table 1. 1 Categories of Unshielded Twisted Pair

UTP Category Frequency Transfer Rate/Speed Use/Application

Category 5e Up to 100 MHz 1000Mbps/1Gbps Gigabit Ethernet

Category 6 Up to 250 MHz 10,000Mbps/10Gbps Gigabit Ethernet

2.6.2 Tools used for Crimping


Cutter: - used for cut UTP CAT6A cable for preparing to punch

Puncher: Puncher is a device used to cut the insulation part of the cables and put them in the
hole of the ports or the socket (the one placed on the wale) as well as cut down the extra length
of the cables. It is a small hand tool used by network technicians. It is used for inserting wire

into insulation-displacement connectors on punch down blocks, patch panels and surface mount
boxes.

16
Industrial Internship Report Feb, 2023

Figure 2. 12 Puncher.[13]
Header /data jack: is attached to the boxer faceplate at back side which is used to terminate the
UTP cat6 cable. Also for generating of the UTP cat6 cable.

Figure 2. 13 Header /data jack


Screwdriver: - This tool is used to drive the bolt to tin the trunk with wall

Figure 2. 14 Screwdriver
Crimper: - crimp RJ45 with CAT6A cable

Figure 2. 15 Crimper.[18]

17
Industrial Internship Report Feb, 2023

CAT6A UTP cable

Figure 2. 16 CAT6A UTP.[18]


Copper Cable Connector RJ-45

Figure 2. 17 RJ-45.[13]
Tester: -We used this tool to test whether a given Ethernet cable is working or not.

Network node:

In a network, a node is a connection point or an endpoint for data transmissions. In general, data
from network switch to workstation transmit via UTP cable lastly to node, as the result, from the
node to user equipment.

Figure 2. 18 Node frame.[13]


Cable trunk/Trucking: is used to hold the cables together and pass along the wall to transfer
Network cables to another place. The purpose of the trunk is preventing the cat 6 UTP cable and
fiber optic cable from damage.

18
Industrial Internship Report Feb, 2023

Steps for crimping

 Strip the cable by measuring it on RJ-45 connector


 After stripping, twisted cable is exposed; untwisted it.
 Arrange the cable according to the color code

Straight through; - is a type of twisted pair copper wire cable for LAN use for which the

RJ-4 5connectors at each end have the same pin out. The wires on the cable are

crossed over so that they receive signal pins on the connector on one end are connected to the
transmit signal pins on the connector on the other end. Straight-through cable is used to connect
different devices such as computers with switch or other end-user devices (e.g., printers) to
networking devices such as hubs and switches.

Cross over; - is a type of twisted pair copper wire cable. It used for LAN (Local Area Network).
Cross Over cable used to connect to similar devices such as Computer to Computer Switch to
Switch, Hub to Hub and Router to Router.

Table 1. 2 the arrangements of straight through and cross over twisted pair copper cable

Straight through Cross over

White - Orange Whit –Green

Orange Green

White – Green White -Orange

Blue Blue

White – Blue White – Blue

Green Orange

White –Brown White- Brown

Brown Brown

19
Industrial Internship Report Feb, 2023

Figure 2. 19 color arrangement for cabling.[18]


 Trim/cut the wires carefully.
 Insert/ plug the wire into RJ-45 connector and check whether all wires extend to end and
the sheath well inside connector.
 Then carefully insert into crimper and crimp it.
 Check the cable with tester whether its work or not.

2.7 Procedures to Perform Tasks


Network cable crimping and identifying network cable type: We had done network cable
crimping for wired when network technicians install wired network cisco lab. We had used the
following materials/equipment:

Network cable (UTP), RJ-45, Crimper

To crimp network cable the procedure below shows the proper orientation of the colored wires to
the pins and how to crimp the connector to the cable.

 Cut the cable by using cutter


 We made the cable ordered in the color configuration (straight through)
 Insert into RJ-45 to the proper position in both side
 Crimping RJ-45 by using crimper.
 Cut and strip the outer skin about 1 inch from the end of the cut cable

Figure 2. 20 Cutting Plastic.[18]

20
Industrial Internship Report Feb, 2023

 Unwind and pair the similar colors.

Figure 2.24 Unwind and Pair the Same Colors

Figure 2. 21 Unwind and Pair the Same Colors.[13]


 Pinch the wires between your fingers and straighten them out.

Figure 2. 22 Pinch the Wires. [18]


 Carefully push all 8 unstrapped colored wires into RJ-45
connector. And making sure that each color goes into its
appropriate channel.

Figure 2. 23 Correct Way.[18]


 Finally testing the crimped wire by the tester

2.9 Fiber optics splicing


Splicing is joining two pieces of fiber-optic cable.

2.9.1 Types of splicing


There are two methods used to splice fiber-optic cable: mechanical and fusion, but we were
doing on fusion splicing method while we perform my task in HU.

21
Industrial Internship Report Feb, 2023

Fusion Splice - A splice accomplished by the application of localized heat sufficient to fuse or
melt the ends of two lengths of optical fiber, forming a continuous single optical fiber and we
used special instrument called splicer machine.

Mechanical Splice - A fiber splice accomplished by fixtures or materials, rather than by thermal
fusion we use this splicing method if we have no splicer machine

2.9.2 Types of Fiber optic


Single- mode blown fiber: - It cover very long distance above 500m do without decrease
performance of network. In fiber-optic communication, a single-mode optical fiber is an optical
fiber designed to carry light only directly down the fiber - the transverse mode. Single mode is
generally yellow, with a blue connector, and a longer transmission distance. Single-mode fiber
cable works better for longer distances. Because the light travels different paths, the longer the
cable is, the more distortion is caused by the different paths arriving at the receiving end at
slightly different times. Single mode fibers are therefore better at retaining the fidelity of each
light pulse over longer distances than multi-mode fibers. For these reasons, single-mode fibers
can have a higher bandwidth than multi-mode fibers. Equipment for single mode fiber is more
expensive than equipment for multi-mode optical fiber, but the single mode fiber itself is usually
cheaper in bulk.

Figure 2. 24 single mode fiber.[13]


Multi-mode fiber: - It covers short distance cover this fiber below 500m without decrease
performance of network. The term “multimode” refers to the fact that the light takes multiple
paths (modes) through the glass fiber core, as opposed to “single-mode” where the light takes
single path. Because the light travels at different paths, the longer the cables, the more distortions
caused by the different paths arriving at the receiving end at slightly different time. Multi-mode
is generally orange or grey, with a cream or black connector and a shorter transmission distance .

22
Industrial Internship Report Feb, 2023

Figure 2. 25 Multi mode fiber.[18]


2.9.3 Tools and steps we used to splicing fiber
Splice Enclosure(Protectors): - A device surrounding the spliced area of an optical fiber used to
protect the splice from physical damage.

Fusion Splicer: - is machine we used for splicing the blown fiber optics.

Figure 2. 26 Multi mode fiber.[15]


Miller Stripper: - it is used to remove plastics from fiber optics.

Figure 2. 27 Miller Stripper.[13]


Fusion-splicing machine: -To splice the fiber optic cable. That means to join two optical fibers
end-to end using heat.

 To made the two glasses of fiber optic cable


 To check whether the two glasses are connected correctly or not
 To differentiate the unclean glass of fiber optic cable

23
Industrial Internship Report Feb, 2023

 To fuse the two fibers together in such a way that light passing through the fibers is not
scattered or reflected back by the splice, and so that the splice and the region surrounding
it are almost as strong as the virgin fiber itself.

Figure 2. 28 Fusion Splicing Machine Materials.[18]


We used a straight through cable within our host company

 Cat-6 cable, RJ-45 heads, Wire crimping tool, Cable tester


 Materials used to terminate the UTP cable into data jack
 Data jack, Punch tool, UTP cable, Wire crimping tool.
 Materials used for OFC fusion splice

Stripper: A cutter for removing the heavy outside jacket of cables

Fiber Stripper: A precise stripper used to remove the buffer coating of the fiber itself for
termination.

Alcohol: used for clean the scratched fiber, because OFC by nature lubricate

Figure 2. 29 Alcohol.[18]
Cotton: is used to dry and clean up some dust from OFC to minimize loss in between 0.00-
0.3dB.

24
Industrial Internship Report Feb, 2023

900 cutters (clever cutter): A tool that precisely breaks (900 cuts) the fiber to produce a flat end
for splicing.

Figure 2. 30 process of splicing.[13]


Sleeves: is the fiber fusion splice protection of single and multimode fiber splices in field
installations, inside contain metal and outer part is plastic cover compatible for this protection.
Therefore, also Fiber Optic Heat Shrinkable sleeves.

Figure 2. 31 Splice-Protection-Sleeve.[13]

Figure 2. 32 Splicing finished.[13]

25
Industrial Internship Report Feb, 2023

2.10 Challenges we have been facing while performing our work task and
their solutions
2.10.1 Challenges
The challenge that we have most commonly face during our internship session, which have their
own matter of influence for us. So, some of the major challenges are as follows: -

 Lack of practical knowledge related to our work.


 There are no enough materials for our work section.
 We didn’t have an opportunity to expose our too much time for practical work.
 The organization staff member was not willingness to give enough information
 At the first time difficult to know network material and miss understand it
 Lack of confidence to made afraid to ask crucial information

Chapter Three
Benefits We Have Gained from Internship
In the internship program we deal about different things in HU ICT center. In our four months of
internship we have gained valuable benefits starting from creating awareness about the external
work environment to achieve entrepreneurship skills.

We are confident to say something, to suggest our opinion for every question or idea those are
forwarded to us; it is nothing but due to the skill that we have developed throughout the
internship program. Getting experience is a great way to build confidence. What's more, if we
have an impressive resume, we will be more confident in our chances of securing a job. After
we’ve done an internship, if an interviewer asks if you know how to do something, we won’t say
“um (doubt), yes, we think we would be able to do that but can say “absolutely and supplement
our assertion with examples.

The following are the main benefits we gain from the work we have done;

3.1 Practical skill


Regarding to the network and infrastructure the practical knowledge gained are real device
configuration, cabling, trucking, visiting data center room and understanding the integration of

26
Industrial Internship Report Feb, 2023

devices located on the room, and deal on how it can be done Configure switch and create VLAN,
configuring router with different routing protocols.

 We know about how to crimp cable


 We know how to label the network in the given organization
 We how to design for any given organization
 We know how to configure the network
 We know how to splice fiber
 And finally know network device and purpose

3.2 Theoretical skill


Theoretical knowledge we get is what a network and networking is, components of network what
a local area network is, what an internet is, how data are transmitted through the internet and
through the network, about a networking medium, what an IP address is and class of IP address,
sub netting, the flow, while a local area network is a network in a small or limited geographical
area. In general network is an intercommunication of networking devices and networking is
intercommunicating them identification given to the components or sites. There are different
type class of IP address of them we were familiar with the first three on a network while sub
netting is classifying an IP address to the required number of network and hosts.

 Mostly know network in terms of theoretical but after internship know in practical
 The network is come from Tele in fiber optic cable
 In Ethiopia have only one Tele server and distribute all over Ethiopian region
 The data come from server in terms of light
 Any data set in computer in terms of digital
 The internet speed different in terms of devices
 In the given organization network is control set in one place with in computer

3.3 Team Playing Skill


Team building skills are one of the basic requirements for proper work in a given company,
regardless of its size and service. In our session of internship, we develop team work activity.
Internship is used to improving team work skill, the ability to work or discussed in the group
member in a professional manner while achieving a common goal. Working, participate and idea

27
Industrial Internship Report Feb, 2023

sharing in group is effective for quality and customer satisfaction. These experiences just needed
to be highlighted in a way that interested employers.

 Coordinate the team


 Building team work and Sharing idea
 Developing communication skill and social interaction
 We know how to work with a team of member
 Understand each other at the time of work
 Respect each member of team and communicate with polite

3.4 Motivation to work


3.4.1 work ethics
Work discipline or desired work behavior can be achieved only by obeying and respecting the
moral or ethical standards of profession. Ethical standards enable workers to distinguish the right
or desired way of conduct from the wrong ones. This helps workers develop good working
environment and enables them to sustain good communication skills and behavior with each
other and with customers.

 A worker with a right conduct or good ethical standard:


 Arrive to work at least 15 minutes before the schedules start time, this offers the ability to
mentally prepare for tasks.
 Being not absent unless you have tangible reason.
 Have a good relationship with an employee.
 Respect the work ethics of the organization must obligation
 Respect and use our right
 Do my obligation and gain our right from organization

3.5 Interpersonal communication Skills


In the four months have been working for HU we meet different persons with different position
and we learn how to approach them, the way of asking questions that we have not under stood
during observation, understanding their technical words, Communicating and discussing with
worker and any other persons in order to solve the problems. We had improved our speaking
ability with different peoples especially with advisors. During this time, we had improved the
way how to generate ideas, system of communication, tolerance and etc. In general, from this

28
Industrial Internship Report Feb, 2023

internship we improve our communication skills by meeting many persons daily and also know
some technical words (company words) that we do not know before.

Starting from interacting with many workers in the Company, the whole internship experience
had improved our communication skills in very good manner which we could talk to any staff
members in the company with full confidence and as easily as possible. In the company we were
given the chance to talk and interview important people from different staffs. All in all, we have
gained confidence on how to ask different questions, to make discussions, to answer questions
when asked, to respond to superiors, and etc.

Generally, the whole past months had been upgrading our speaking skills.

 Increase my communication skill with in other workers


 Improve solve disagreement with in member
 Improve tolerate each other
 Improve appreciate other work
 Increase respect of member

3.6 Improved Leadership Skill


Through this internship experience we learned the following: -

If you show respect to the employees, thanking them for their work and complimenting them on
their successes, they will be far more likely to respect you in return.

You can establish excellent working relationships just by listening to staff and clients. An active
listener focuses on what the speaker is saying, regularly paraphrasing to check that they have
received the speaker’s intended message.

 We know how to manage works


 We know how to control the overall activities of workers
 We know how to communicate with respectfully with another worker
 The ability to learn new skills is crucial for any leader. If you go into business believing
you have nothing more to learn, you will restrict your ability to grow and adapt to
change. You must be ready to adapt to changing circumstances. A successful leader
needs to continually anticipate, evaluate and remain open minded and flexible.

29
Industrial Internship Report Feb, 2023

3.7 Achievement of Intern and Contribution


3.7.1 Achievement of Intern
Our internship time was finished by achieving the following over all benefits:

 We have gained valuable industry knowledge


 We have developed our professional skills
 We got something to show our potential on working area
 Our confidence in professional environments was improved
 Know How to Organize each other and open small business with co-partner
 Know how to agreement with in business
 Know how to understand partner vision and how to do
 Know How to create new idea within a team member
 Know How to benefit distribute within member

In addition to the above benefits the internship time was finished by achieving the objectives
that are listed at the beginning of chapter two through many challenges and success.

The internship program is a useful curriculum to students not only in terms of practical and
theoretical knowledge but also in terms of improving social skills. During our four-month period
we get some useful skills. So, for future work professionalism the program is an important by
solving the problems related with theoretical knowledge, interpersonal communication skills,
team playing skills, leadership skills, and etc.

3.7.2 Contribution
Technical support services attempt to help the user solve specific problems with a product rather
than providing training, customization or other support service. The section gives first aid
support those agents who are working in networking divisions when a problem happens. We
have made a very positive contribution to HU by:

 Providing a solution for UTP CAT6 cable faults


 We install a network for new rooms
 We install a CCTV camera for a company
 In our four months spend in HU ICT center we have found a problem, with a proposed
solution

30
Industrial Internship Report Feb, 2023

Part Two
(Project Carried Out)
Project title: Design of secure and scalable computer network for
HU-Daye campus

31
Industrial Internship Report Feb, 2023

Abstract
Network security is a set of technologies that protects the usability and integrity of a companies
infrastructure by preventing the entry from potential threats. The purpose of this project is to
design a suitable network system for Daye campus which is a branch of HU. The aim of project
was to design security and scalabe network for a campus and also improving existing network
with high-quality security and low cost in such a way that network devices of HU. This project
will help to enhance education in Daye campus as it is a newly starting its educational program.
There are many devices that we were used in designing the network such as; routers, switches,
backup, firewall and servers. All devices were connected to make integration network system
and configured by giving IP addresses to all devices. The networks also needed to have a high
level of security. Accordingly, it incorporated several mechanisms including a firewall devices
that prevents any unfavorable data from entering into the network. Additionally, all devices in
the network were secured by passwords, and configured the interfaces of a device to be more
secure. Finally our project ensures the network security to a campus to prevents the data from an
unauthorized threats and provides a optional path to a connection at a time of faults in one part of
a network

32
Industrial Internship Report Feb, 2023

Chapter One
Background
1.1 Introduction
A computer network is a set of devices (computer, printer, intermediate devices, and so on)
connected by communication link in which meaningful information is transferred through it.[1]
Now a days, computer networking is become the most required one for peoples. It used for
Access to remote information, share views and Interactive entertainment, Electronic commerce,
videoconferencing, on line library and so on. In this paper we look at how to design secure and
robust autonomous network for a HU-Daye campus regarding that we going to design intranet
network which is private. Intranet is applies any network that has multiple LANs interconnected.
The LANs are typically in multiple buildings that are close to each other and interconnected. We
assumed that the company has ten building in which 350 users are hosted in all building,
including Wi-Fi. Also university data center room where core switches, firewall, server farm,
and other devices are placed, distribution room where distribution switches i.e. multilayer
switches are placed and have access layer switch at the end contain end users.

1.2 Problem Identified and proposed solution


The problems HU- Daye campus face deals with some of security issues, well-designed problem,
scalability, and guest Wi-Fi systems. When we trained our internship program under HU-ICT
center we identified as a main problem in a campus network were there is no sclalability
provided protocol for their network design and there is no port security on the network device
interfaces hence everyone can access their network in a campus which is exposed to a data
threat.

To help with solving this problem we have proposed a design by using redundancy based
protocol to mitigate this failures in a network and we were configured a network port interfaces
to assured security issues by using cisco configuration commands.

33
Industrial Internship Report Feb, 2023

1.3 Literature Review


Described the Hierarchical network design model used to break the design up into modular
groups or layers. Breaking the design up into layers allows each layer to implement specific
functions, which simplifies the network design and therefore the deployment and management of
the network. Modularity in network design allows us to create design elements that can be
replicated throughout the network. Replication provides an easy way to scale the network as well
as a consistent deployment method. In flat or meshed network architectures, changes tend to
affect a large number of systems. Hierarchical design helps constrain operational changes to a
subset of the network, which makes it easy to manage and improve resiliency. Modular
structuring of the network into small, easy-to-understand elements also facilitates resiliency via
improved fault isolation. [1]But they didn’t secured network well. this manual described the
process of designing a good network requires concerted efforts by network designers and
technicians, who identify network requirements and select the best solutions to meet the needs of
a business.it also proposed the four fundamental technical requirements of network design are
scalability, availability, security, and manageability.

IN [2] but the cost is very high. He described a collection of communication networks
interconnected by bridges or routers related to interconnection of networks or internetworking.
Interconnected set of networks appears as a larger network. Every system retains identity for
communication across multiple networks referred as an Internet. Internet supports
communication among the devices attached to the network. We took network topology figure
from Pandya, Karta. "Network Structure or Topology." International Journal of Advance
Research in Computer Science and Management Studies. [3] However, the design of computer
networks differs from one university to another. This is as a result of many factors which
determine the differences. Such factors include; adaptability, integration, resilience, security, and
cost. Installing networks in a university relies on the university’s budget, which differs by
institution and from country to country. Now day security issue becomes a highly considerable
objects for one’s network organizations.IN [4] however they do not fullifills all security
parameters. Therefore, this design will be focusing on factors that will enhance computer
network with a secured manner and scalables.

34
Industrial Internship Report Feb, 2023

1.4 Objective
1.4.1 General objective
The general objective of this project is to design and simulate secure,scalable, robust computer
network for the HU-Daye campus.

1.4.2 Specific objectives


 Determining what security devices are required to resolve full solution
 To configure different end devices and network device interface like access switch
 To configure server farm to offer different services.
 Configuring RIP and STP to make network redundancy.
 To make Wi-Fi and the all network secure by configure ACL.
 To configure DHCP, DNS, and different routing protocol
 Finally to test accuracy of solution by test commands

1.5 Significance and scope


1.5.1 Significance of the project
This project the design of computer network which is very secured and redudant including
techniques for configuring the LAN, selecting and configuring routing protocols, DHCP IP
assignment, domain name service (DNS network (internet) to access global services and finally
to increase confidentiality of a services.

1.5.2 scope of the project

The scopes of our project is designing and simulating the results on software only it does not
implemented prototype and if it will implement the project is functioned at our host company
HU-Daye campus.

35
Industrial Internship Report Feb, 2023

Chapter Two
Methodology
The methodology we followed in our project was first we are going to identify and understand
the materials and the techniques needed to met the desired solution for the problem. After then
we gathered a network design information and principles. Then we going to design and integrate
network topology and configured the designed networks to mitigate existed problems. Finally we
simulate our projects by Cisco packet tracer software and test the solutions.

2.1 Flow chart of network design

2.2 Network requirements and architectures


A good designed network should fulfill:-

 Sustainability: the network should stay up all the time.


 Security: it should be accessed only by authorized person.
 Scalability: it should be easy to modify changes with network.
 Manageability: it should be manageable to function efficiently.

36
Industrial Internship Report Feb, 2023

 Cost: it should be cost effective as much as possible

Network architectures: - computer network architectures are classified into three main layers.
Those layers are core, distribution, and access layers. These layers can be spread out into more
layers or compacted into fewer depending on the size of networks. These 3-layers network
structures are incorporated so that it can be easily managed, modified, and to improve data
handling and routing within the network. [3]

Core Layer: - the core layer usually contains high-end layer 3 switches or routers. The core is
the heart or the backbone of the network. The major portion of a network’s data traffic passes
through the core. The core must be able to quickly forward data to other parts of the network.
Data congestion should be avoided at the core.. A layer 3 switch is essentially a router that uses
electronic hardware instead of software to make routing decisions. The advantage of the layer 3
switch is the speed at which it can establish a network connection.

Figure2. 1 Cisco core switch/router symbol.[18]

Distribution Layers: - the distribution layer in the network is the point where the individual
LANs connect to the network routers or layer 3 switches. It mainly used to aggregate many
LANs of access layer Routing and filtering policies are more easily implemented at the

distribution layer without having a negative impact on the performance of the network data
traffic; however, the speeds of the network data connections at the distribution layer are typically
slower than at the core.

Figure2. 2 Cisco distribution switch.[19]

37
Industrial Internship Report Feb, 2023

Access Layers: - the access layer is where the networking devices in a LAN connect together.
The network hardware used here is typically a layer 2 switch. Hubs can be used but are not
recommended in any networks with significant amounts of data traffic. Remember, a switch is a
better choice because it forwards data packets directly to destination hosts Connected to its ports.
Network data traffic is not forwarded to all hosts in the network. The exception to this is a
broadcast that is sent to all hosts connected to the switch.

Figure2. 3 : Cisco access switch.[19]

2.3 Hardware Requirements


 Routers
 Switches
 Servers
 Multimode fiber cable
 Single mode fiber cables
 RJ-45 connectors
 UTP cable
 Duct (Trunk)
 Wall outlet
 Racks
 Storage devices
 Fiber patch panel
 Copper patch panel
 Fiber optic cable

2.4 Network Topology Diagram


Network topology is topological structure of a network and may be depicted physically or
logically. It is an application of graph theory wherein communicating devices are modeled as
nodes and the connection between devices are modeled as links or line between nodes. Physical
topology is the placements of the various components of a network.
38
Industrial Internship Report Feb, 2023

The topology we use for this project is star topology. The reason behind is that Star topologies
provide an inherent advantage that a new site can be added with ease; only the central site will
have to be updated.

2.4.1 Advantage of Star Topology:


The some advantages of star topology are:-

 Centralized network:
 User-friendly:
 Very reliable:
 Highly efficient:
 Easily manageable

2.4.2 Disadvantages of Star Topology


 High cost
 Everything depends on the central device.
 Highly dependent on the central device
 High maintenance

2.5 Collapsed Core Architecture


Collapsed Core Architecture is a campus network design wherein we combine the core and
distribution layers. We do not use a separate set of core switches in addition to the distribution
switches. The core and distribution functions are implemented by a single device.

Core layers are responsible for forwarding large amounts of packets both reliably and quickly.
The distribution layer, on the other hand, is routing and filtering and the communication point
between the access layer and the core. This design is often deployed in small and medium
campus networks.

We used Collapsed core architecture since in a Cisco’s 3 layer-hierarchical we would use more
number of switches, in which the later used it for redundancy and increasing performance in a
large campus network.

39
Industrial Internship Report Feb, 2023

Router CLOUD

Ma in block
ISP

Web server
Web server

ADMIN BUSINESS HR LAB


DHCP server Ma in block Ward1 Ward1

Figure2. 4 Network diagram for Campus network Design

2.6 Redundancy and dynamic routing protocols


An important design issue in a computer network design is the core and distribution redundancy.
Redundancy; provides for a backup route or network connection in case of a link failure or
device deteriorated. The core hardware is typically interconnected to all distribution network
hardware. The objective is to ensure that data traffic continues for the whole network even if a
core networking device or link fails. Each layer below the core breaks the network into smaller
networks with the final result being a group of networks that are capable of handling the amount
of traffic generated. This is ensured by redundancy and load balance protocols. Cisco supports
three protocols to provide transparent Layer-3 redundancy; those are:-

 HSRP (hot standby routing protocol


 VRRP (virtual router redundancy protocol
 GLBP (gateway load balancing protocol

Routing protocol: routing is a process of moving packets across network from one host to
another host by using the best path from router table. It classified into static and dynamic routing
protocol; fatherly dynamic routing protocol classified into interior and exterior gateway routing

40
Industrial Internship Report Feb, 2023

protocol. In this project we raised interior gateway routing protocol which works in one
autonomous computer network system. [5]

OSPF (open shortest path first): is link-state routing protocol that used Dijkstra’s algorithm to
determine the shortest path from forwarding address table. Use shortest path and get common
view of entire network topology. It supports equal load balancing. [3]

2.6 Switch/VLAN and access control list configuration


ACL (access control list configuration): Access control lists (ACLs) perform packet filtering to
control the flow of packets through a network and to where. Packet filtering can restrict the
access of users and devices to a network, providing a measure of security. Access lists can save
network resources by reducing traffic.[4]

Static VLAN: Basically a port-based VLAN. The assignments are created when ports are
assigned to a specific VLAN.

Dynamic VLAN: Ports are assigned to a VLAN based on either the computer’s MAC address or
the username of the client logged onto the computer.

2.7 Software requirement


2.7.1 Cisco Packet tracer: - Packet tracer is across platform visual simulation tool designed by
Cisco system that allows users to create network topologies and imitate modern computer
network; or it is a network simulator used for configuring and creating the virtual Cisco devices
and network. It allows users to simulate the configuration of Cisco routers and switches’ using a
simulated command line interface. It helps peoples create their own virtual “network world” for
exploration,
2.8 The sub-netting of IP address and IP assignment
2.8.1 IP network design guidelines
IP address is a Network Foundation service, which makes it core to the network design. It
provides the base for all other network and user services Without the foundation, it would not be
possible to interact with network and user services, from picking up the phone using the phone
service to reading email using the email service

IP assignment: is a process where subnets are created for each subgroup according to hosts
being supported. The IP address assignment is typically tracked by the network operations center
(NOC). The IP addresses are kept in a central log file so that NOC can troubleshoot network

41
Industrial Internship Report Feb, 2023

problems. For example, a machine could be causing network problems possibly due to hacked or
corrupted software. NOC needs to be able to track down the network problem(s). The NOC
database will have the MAC address, the IP address, and the name of the person who uses the
computer. IP addresses are assigned by NOC based on where the subnet for the computer is
locate.

2.8.2 Managing IP Addresses

With proper planning, the IP network can be more organized, easier to set up, and easier to
troubleshoot than user and network services. By following recommended IP address
management standards, we can avoid:

 Overlapping or duplicate subnets


 Unsymmetrized routes in the network
 Duplicate IP address device assignments
 Wasted IP address space
 Unnecessary complexity

IP network guidelines

IPv4 addresses are usually represented in dot-decimal notation, consisting of four decimal


numbers, each ranging from 0 to 255, separated by dots, e.g., 192.168.2.1 Each part represents a
group of 8 bits (an octet) of the address. To implement the campus network design on cisco
packer tracer we used class C IP address, since it supports a smaller number of hosts it is suitable
for our design.

Device Configuration:-includes the following two systems to assign an IP address

 IP sub netting for each network


 DHCP to assign IP dynamically

Sub netting: is the process of dividing a single network in to multiple sub network and is used
to helps us in minimize wastage of IP address. Smaller networks are easier to manage and
troubleshot.

DHCP: is a protocol that provide IP address, subnet mask, and IP address of a gateway router
dynamically to a host.

42
Industrial Internship Report Feb, 2023

TCP/IP sub netting

2^S >= Number of networks you need(S represents subnet bits)

2^H -2 >= Number of hosts on your largest segment(H represent host bit)

S+H <= Total number of host bits you have for a class of address

172.22.90.0/23 (there is 23 one’s in the our subnet)

11111111.11111111.11111110.00000000:- (255.255.254.0)

11111111.11111111.01011010.00000000 we used short term solution for IP depletion such as;


Subnet Mask ,CIDR (Classless Inter-Domain Routing), VLSM (Variable Length Subnet Mask),
Private Addressing, NAT/PAT (Network Address Translation / Port Address Translation).
Depending on this point of view we chose class ‘Sub netting IP address: is the process of
dividing a network & its IP addresses into segments, each of which is called a sub network or
subnet so that IP address depletion/crisis is reduced. In this project B’ private IP
address172.22.90.0/23.Campus networks use private IP addresses for security, since they make it
difficult for an external host to connect to a system.More times Organizations also use private IP
addresses to restrict internet access to internal users, which helps increase security.

We calculate the IP address by using the inter-Domain routing as the following

Sub net mask of IP address: 255.255.90.0

ANDing the binary of 254 and 90 gives:-

11111110 AND 01011010 = 01011010 (decimal value = 90)

Then our network ID becomes 172.22.90.0

To find broadcast ID as a table shows:

Table 2. 1 1Finding Broadcast ID for IP address.


128 64 32 16 8 4 2 1

0 1 0 1 1 0 1 0

We count from the right to left from above binary value of 90 and we take decimal value from
the first one’s binary which is 2 in this case, then adding on 90 and minus one from the sum.

43
Industrial Internship Report Feb, 2023

90+2 = 92

92-1 = 91 (broadcast ID)

Table 2. 2 IP address range


Net ID 172 22 90 0

BC ID 172 22 91 255

Our usable IP address rang is:-172.22.90.1 -172.22.91.254

2.9 CREATING VLAN

VLAN is a logical classifying a networks to a different subnet.

There are 10 VLAN in our network

VLAN 10 is in Administration building its IP address: 172.22.90.0/26 (it must support 50 users)

VLAN 20 is in staff its IP address: 172.22.90.64/27 (it must support 30 users)

VLAN 30 is in student Lab its IP address: 172.22.90.128/25 (it must support 100 users)

VLAN 35 is in finance its IP address: 172.22.90.192/27 (it must support 22 users)

VLAN 40 is in HR its IP address: 172.22.90.224/28 (it must support 10 users)

VLAN 45 is in economics its IP address: 172.22.91.0/26 (it must support 45 users)

VLAN 50 is in N.Sc computational science its IP : 172.22.91.64/26 (it must support 40 users)

VLAN 55 is in sport science its IP address: 172.22.91.128/27 (it must support 20 users)

VLAN 60 is in business its IP address: 172.22.91.160/27 (it must support 30 users)

VLAN 65 is in student clinic its IP address: 172.22.91.192/27 (it must support 30 users)

VLAN 70 is in server room its IP address: 172.22.91.225/29 (it support 4 IP for 4 servers)

IP address for router 1 =172.22.91.231/30

IP address for router 2=172.22.91.232/30

The sub-netted IP address assignment we did is, as in the following table

44
Industrial Internship Report Feb, 2023

Table 2. 3 The sub-netted IP address and VLAN


VLAN Name Net ID Subne First valid Last Valid BC-ID
t mask Host
Host

VLAN 10 172.22.90.0 /26 172.22.90.1 172.22.90.62 172.22.90.63

VLAN 20 172.22.90.64 /27 172.22.90.65 172.22.90.126 172.22.90.127

VLAN 30 172.22.90.128 /25 172.22.90.129 172.22.90.254 172.22.90.255

VALN 35 172.22.91. /27 172.22.90.212 172.22.90.239 172.22.90.240

VALN 40 172.22.90.241 /28 172.22.90.242 172.22.90.254 172.22.90.255

VALN 45 172.22.91.0 /26 172.22.91.1 172.22.91.49 172.22.91.50

VALN 50 172.22.91.51 /26 172.22.91.52 172.22.91.99 172.22.90.100

VLAN 55 172.22.91.101 /27 172.22.91.102 172.22.91.129 172.22.91.130

VLAN 60 172.22.91.131 /27 172.22.91.132 172.22.91.169 172.22.91.170

VLAN 65 172.22.91.171 /27 172.22.91.172 172.22.91.211 172.22.91.212

VLAN 70 172.22.91.213 /29 172.22.91.214 172.22.91.217 172.22.91.218

5.10 Connection Setup


Our network connection connecting the main campus networks and a branch campus together to
share a data through a computer networks. Here there is a core router in a main campus and this
main campus router connected to a branch campus through a medium which is a single mode
fiber.Then from this core router which is settled in a branch campus the networks distributed in
to a layer three CISCO’s device which is a multi layer switch.From the distribution switch
connection is then going to access switch finally from access switch end device can gets a
network connection and can communicate with a different clients.

45
Industrial Internship Report Feb, 2023

Figure2. 5 connection setup

46
Industrial Internship Report Feb, 2023

Chapter Three
3. Result And Discussion
This chapter is about the result that are obtain through simulating the proposed project on
software program called Cisco packet tracer. Some screenshots are included to help with the
understanding of how the system works from simulation tool. The image below overall packet
tracer diagram of the proposed project

Figure 3. 1 overall packet tracer diagram

47
Industrial Internship Report Feb, 2023

After configuration the host gets IP addresss dynamically from the DHCP server automatically

Figure 3. 2 DHCP server

48
Industrial Internship Report Feb, 2023

The core switch VLAN configuration database looks like

Figure 3. 3 core switch VLAN configuration

49
Industrial Internship Report Feb, 2023

The distribution VLAN database looks like:

Figure 3. 4 distribution VLAN


Our main target to design this network is to configure a network device interface or port to
estabilish a connection by checking end devices MAC address. we configured each access switch
port to enable as security mode by using cisco packet tracer configuration commands.

50
Industrial Internship Report Feb, 2023

Forexample Access switch 8 the configuration enabled as port security mode to see configuration
we can use the commands as:-

Access-switch-8 (confi-if)#enable

Access-switch-8 (config-if)# conf t

Access-switch-8(config-if)#int fa0/2

Access-switch-8(config-if)#switchport port-security

Access-switch-8 (config-if)#do show run

We can check security mode as enabled:

51
Industrial Internship Report Feb, 2023

Packet Tracer Simulation Ping Result


Admin
C:\>ping 172.22.90.2
Pinging 172.22.90.2 with 32 bytes of data:
Reply from 172.22.90.2: bytes=32 time<1ms TTL=128
Reply from 172.22.90.2: bytes=32 time=1ms TTL=128
Reply from 172.22.90.2: bytes=32 time=4ms TTL=128
Reply from 172.22.90.2: bytes=32 time=2ms TTL=128
Ping statistics for 172.22.90.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 4ms, Average = 1ms

Economics
Packet Tracer PC Command Line 1.0
C:\>ping 172.22.91.2
Pinging 172.22.91.2 with 32 bytes of data:
Reply from 172.22.91.2: bytes=32 time<1ms TTL=128
Reply from 172.22.91.2: bytes=32 time=1ms TTL=128
Reply from 172.22.91.2: bytes=32 time=7ms TTL=128
Reply from 172.22.91.2: bytes=32 time=12ms TTL=128
Ping statistics for 172.22.91.2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 12ms, Average = 5ms

Student Clinic
C:\>ping 172.22.91.193
Pinging 172.22.91.193 with 32 bytes of data:
Reply from 172.22.91.193: bytes=32 time=15ms TTL=128
Reply from 172.22.91.193: bytes=32 time=9ms TTL=128

52
Industrial Internship Report Feb, 2023

Reply from 172.22.91.193: bytes=32 time=9ms TTL=128


Reply from 172.22.91.193: bytes=32 time=6ms TTL=128
Ping statistics for 172.22.91.193:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 6ms, Maximum = 15ms, Average = 9ms

Student lab
C:\>ping 172.22.90.129
Pinging 172.22.90.129 with 32 bytes of data:
Reply from 172.22.90.129: bytes=32 time=17ms TTL=128
Reply from 172.22.90.129: bytes=32 time=1ms TTL=128
Reply from 172.22.90.129: bytes=32 time<1ms TTL=128
Reply from 172.22.90.129: bytes=32 time=9ms TTL=128
Ping statistics for 172.22.90.129:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 17ms, Average = 6ms

53
Industrial Internship Report Feb, 2023

Chapter Four
4. Limitation and Future Works

4.1 Limitation of the project

The limitation of our project is the system to attain considerable solution it takes more costs to
implement. Because if we want to design the network with securd and scalable ways the design
will require more costs. The simulation software we used which is Cisco packet tracer supports
only up to twenty four port but we want forty eight port switch to design.

4.2 Future work

It is better to design the networks with more secured ways and redundant. It is also better to
implement the prototype. And it is a better to understand about security issues to design well
secured network considering some element like costs, latest devices and so on.

Recommendation
We suggest that, the company should implement the projects to contribute the secured and scalable
network for the entire its community. And campus should host more intern students in the future for
the development of technology and what the working environment looks like for student.
 The co-ordination between high levels to low level should be strong than before
 We believe that the number of mentors should be increased in order to study all of the
problems existed and to find a solution for existed problem.
 The equipment that help the interns should be added to make improvement
 There should be smooth flow of information about the network security and the scalable
in the organization.

54
Industrial Internship Report Feb, 2023

CONCLUSION
This project has proven that a standard network system can be designed with more scalable and
secured. Although we used the cheapest devices in designing the network with the security of
network turned out to be very strong. This is because we configured the devices security protocol
and additionally we used firewall and backup devices in this network are of good quality. All
networks need many servers for doing their work. For this project, we used some important
servers such as DNS, WEB server, FTP server and DHCP server. These servers help the network
to perform their functions in a smooth way. It can be seen in this project that various costs were
minimized in order to maximize the quality of the designed network. Although there may have
been some challenges in this project due to some financial constraints, at the end our aim was
achieved by designing a network for campus with secured and more scalable network with
minimal cost.

Lastly, as secured and effective as the methods of designing a network in this project are, it is
not limited to HU-Daye campus. At other university that is trying to secure in any of their
network design projects can also adopt the methods used in this research.

55
Industrial Internship Report Feb, 2023

References
[1] Huang, Lifei, and Ten-Hwang Lai. "On the scalability of IEEE 802.11 ad hoc networks."
In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking &
computing, pp. 173-182. 2002.

[2 ]Huang, Lifei, and Ten-Hwang Lai. "On the scalability of IEEE 802.11 ad hoc networks."
In Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking &
computing, pp. 173-182. 2002.

[3] Alabady, Salah A. Jaro. "Design and implementation of a network security model using static
VLAN and AAA server." 2008 3rd International Conference on Information and
Communication Technologies: From Theory to Applications. IEEE, 2008.

[4] Alabady, S.A.J., 2008, April. Design and implementation of a network security model using
static VLAN and AAA server. In 2008 3rd International Conference on Information and
Communication Technologies: From Theory to Applications (pp. 1-6). IEEE.

[5] Alabady, S.A.J., 2008, April. Design and implementation of a network security model using
static VLAN and AAA server. In 2008 3rd International Conference on Information and
Communication Technologies: From Theory to Applications (pp. 1-6). IEEE.

[6] Babine, S., et al. "Comparative Study between Fiber Optic and Copper in.

[7] Lucas, M. W. (2009). Cisco routers for the desperate: router management, the easy way. No
Starch Press.

[8] Cisco Systems, Inc. “SAN-1501: Introduction to Storage Area Networks (SAN)” Networkers
2006 presentation (accessible on a subscription basis)...

[9] Cisco Systems, Inc. “SAN-2605: iSCSI SAN Design and Operation” Networkers 2006
presentation (accessible on a subscription basis).

[10] Johnston, David, and Jesse Walker. "Overview of IEEE 802.16 security." IEEE Security &
Privacy 2.3 (2004): 40-48.

[11] William Stallings,” Data and Computer Communications”, 5th Edition.

[12] Yang, Z., Li, C., & Chen, S. (2015, April). Development of Mobile and Computer Website
Integrated College Content Management System. Atlantis Press.

56
Industrial Internship Report Feb, 2023

[13]Karapistoli, E., Pavlidou, F.N., Gragopoulos, I. and Tsetsinas, I., 2010. An overview of the
IEEE 802.15. 4a standard. IEEE Communications Magazine, 48(1), pp.47-53.

[14] Memnon, A., Brahmi, S., Karina, S., & Afire, K. (2015). Cloud Based Instant File Sharing
System in Wireless College Campus Environment.

[15] McQuerry, S. ed., 2000. Interconnecting Cisco Network Devices. Cisco Press.

[16] Jiang, Dungy, et al. "Layer two firewall with active-active high availability support." U.S.
Patent No. 7,941,837. 10 May 2011.

[17] Mentz, Duane, and David Canine. "Automatic networking device configuration method for
home networking environments." U.S. Patent Application No. 09/969,248.

[18] www.cisco.com/go/trademarks 20 January 2023

[19] McQuerry, S. ed., 2000. Interconnecting Cisco Network Devices. Cisco Press.

57
Industrial Internship Report Feb, 2023

Appendix and Annex


Access switch port-security configuration code

58
Industrial Internship Report Feb, 2023

59
Industrial Internship Report Feb, 2023

60
Industrial Internship Report Feb, 2023

61
Industrial Internship Report Feb, 2023

62
Industrial Internship Report Feb, 2023

63

You might also like