School Ofinformatics and Electrical Enginering Department of Computer Science
School Ofinformatics and Electrical Enginering Department of Computer Science
School Ofinformatics and Electrical Enginering Department of Computer Science
INTERNSHIP REPORT
ON
By
Ambo Ethiopia
[2023]
INTERNSHIP REPORT ON ASTU 2023
PREFACE
Industrial project is an integral part for the students of B.Sc. Computer Science and each and
every student has to undergo the practice for 2 months in a company.
This record is concerned about our practical training during the Summer Vacations after the 3rd
year. We have taken our Practical training in Adama Science and Technology University
(ASTU). During this training, we got to learn many new things about the industry and the
current requirements of companies. This training proved to be a milestone in our knowledge of
present industry. Every say and every moment was an experience in itself, an experience which
theoretical study can’t provide
Ambo university
Department of computer science
i
INTERNSHIP REPORT ON ASTU 2023
ACKNOWLEDGEMENT
First of all we would like to thanks God, and then we would like to thank our family for
supporting us. Next to this we would like to give a great regards and thanks to our department
for providing with this internship program to develop practical knowledge and understandings.
We would also be very grateful to announce thanks to The Adama Science and Technology
University for giving the chance to perform our internship in their main campus.
Words can’t express to say thanks those people and institution that have helped us in
accomplishing our internship program. But the following deserve a special mention. First and
foremost we would like to thanks our supervisor Miss. Victoria Demeke, in providing the
request materials, Constructive comments, guidance and encouraging in all moment since the
Internship program preparation. Her comments on the instrument greatly helped us to come
up with goods and practically would have been hardly possible without her guidance and heart
full support.
Then we would also give a warm thanks to Mr. Tadios the ICT Administrator in Adama Science
and Technology University, to Mr. Beyene leader of our team, and to Mr. Endale Addisu System
admin in Adama Science and Technology University.
Ambo university
Department of computer science
ii
INTERNSHIP REPORT ON ASTU 2023
CANDIDATE’S DECLARATION
We Yared Abebayehu and Tsegaye Abiti, Roll No. TUS/16705/12 AND TUS/16638/12, BSc in
computer science (3rd year) of the Computer Science department, Institute of Technology,
Ambo University, hereby declare that the Practical Report entitled “Network Installation And
Configuration” is an original work and data provided in the study is authentic to the best of my
knowledge. This report has not been submitted to any other Institute for the award of any
other degree.
Place: Adama
Ambo university
Department of computer science
iii
INTERNSHIP REPORT ON ASTU 2023
Abstraction
During our internship period of ASTU-ICT Directorate, We had an opportunities to
participate designing and manipulating basic networking infrastructure and to see how new
technology could be effectively used. Since the agency is started recently there is not that much
multidirectional service availability at a time. But it will ramp up its services to varieties of
problem that are addressed and even practically observed in bulk of society that should be
improved.
This report describes new and evolving networking technology that can be enhance the
performance of existing structure and design we ever used and at least customize todays
incredible technology in the way it will help us in better ways. We act as student or observer at
the agency but after we have had all things we had done networking design project by packet
tracer software and Microsoft Visio. In this practice we are able to manage network
connectivity, network configuration, room network installing, Switch, Router, WAP
configuration etc.
Ambo university
Department of computer science
iv
INTERNSHIP REPORT ON ASTU 2023
Contents
PREFACE ......................................................................................................................................................... i
ACKNOWLEDGEMENT ................................................................................................................................... ii
Abstraction ................................................................................................................................................... iv
Chapter 1....................................................................................................................................................... 1
Introduction .................................................................................................................................................. 1
1.1.3. Vision, mission statement and core values of the ASTU .................................................................... 4
...................................................................................................................................................................... 5
Ambo university
Department of computer science
v
INTERNSHIP REPORT ON ASTU 2023
Topology and Architecture of ASTU.............................................................................................................. 9
1.8 Materials and methodologies used regarding to the software project ................................................ 11
Chapter 2..................................................................................................................................................... 34
2.1 Methodology......................................................................................................................................... 34
Ambo university
Department of computer science
vi
INTERNSHIP REPORT ON ASTU 2023
2.6.2. Achievements during the attachment exercise ................................................................................ 53
Chapter 3..................................................................................................................................................... 57
3.3. Recommendation................................................................................................................................. 58
Reference .................................................................................................................................................... 59
LIST OF Table
Table 1.1 Straight through cable arrangement ………………………………………………………………………..18
Table 1.2 Cross over cable arrangement………………………………………………………………………………….20
Table 1.3 UTP Cable Categories ……………………………………………………………………………………………….20
Ambo university
Department of computer science
vii
INTERNSHIP REPORT ON ASTU 2023
LIST OF FIGURE
Figure 1.1 ASTU Profile…...…………………………………………………………………………………………………………1
Ambo university
Department of computer science
viii
INTERNSHIP REPORT ON ASTU 2023
Figure 1.21 puncher…………………………………………………………………………………………………………………28
LIST OF ACRONOMYS
ASTU………………………………………………………………Adama Science and Technology University
DMZ…………………………………………………………………………………………………..Demilitarized Zone
IP……………………………………………………………………………….…………………………Internet Protocol
CAT……………………………………………………………………………………………………………………Category
Ambo university
Department of computer science
ix
INTERNSHIP REPORT ON ASTU 2023
HTTP………………………………………………………….………………………..Hyper Text Transfer Protocol
PC………………………………………………………………………………………………………Personal Computer
WIFI……………………………………………………………………………………….………………Wireless Fidelity
Ambo university
Department of computer science
x
INTERNSHIP REPORT ON ASTU 2023
Chapter 1
Introduction
The internship program is typically secondary school for students or recent college
graduates who work in an office setting and handle routine administrative tasks. For most, the
purpose is to learn new skills, improving their resumes and build professional connections.
Ambo University
Department Of Computer Science
1
INTERNSHIP REPORT ON ASTU 2023
1.1 Company Background and overviews
Ambo University
Department Of Computer Science
2
INTERNSHIP REPORT ON ASTU 2023
respectively. Starting from 2011, the university is moving towards a new phase of
transformation that is befitting to the country context. It has restructured its Schools and is
already underway to set up new institutions, in addition to the existing ones, so as to foster
quality of education. Currently, the number of academic entities has reached seven Schools,
and a separate School has also been established to coordinate all the postgraduate studies. The
university has ratified a Five-Years Strategic Plan and Senate Legislation that will allow for the
achievement of its vision- ASTU aspires to become a first choice in Ethiopia and one of the
distinguished universities dedicated to excellence in applied sciences and technology in Africa.
For this vision to materialize, the university community is working towards joining the real
world with the academia. And an instance of this could be the initial steps towards creating a
Research Park in the university, the first of its kind in the Ethiopian context.
Ensure all staff members are motivated and skilled in the use of ICT to spark the culture of
continuous development in ICT expertise and exposures.
Initiate/Develop/Supervise application development for different sections of the
University and provide ongoing maintenance of both the software and the hardware.
Building a digital teaching-learning environment both in terms of teaching-learning
materials and digital resource sharing, promoting interactive academic and professional
communications between teachers, administrative staff, researchers and students.
Provide on time and online user support platform for the University community.
Establish a dynamic and adaptive online University communication network serving
internal and external users.
Provide basic computer training and ICT training
Ambo University
Department Of Computer Science
3
INTERNSHIP REPORT ON ASTU 2023
Networking and installation and web development
Comprising ICT Business incubation and community data center service
Domain name and data center administration
Preparing specification of ICT equipment’s.
Use ICT to for E-learning, smart rooms, video conferencing and software development
Software and hardware maintenance
ASTU aspires to be the first choice in Ethiopia and the premier center of excellence in
applied science and technology in Africa by 2030.
Mission
The mission of ASTU is to provide ethical and competent graduates in applied science and
technology through quality education, demand driven research and community service. ASTU
also provides innovative knowledge to support the socio-economic development of the nation.
Core Values
Nurturing diversity
Professional ethics
Responsiveness
Ambo University
Department Of Computer Science
4
INTERNSHIP REPORT ON ASTU 2023
School of Civil
School of Applied Engineering
Natural
ASTU
Applied Biology
Applied Chemistry
Applied Geology
Applied Mathematics
Applied Physics
2. School of Civil Engineering and Architecture Programs (5 year)
Architecture
Ambo University
Department Of Computer Science
5
INTERNSHIP REPORT ON ASTU 2023
Civil Engineering
Urban Planning and Design
3. School of Electrical Engineering and Computing Programs (5 year)
Ambo University
Department Of Computer Science
6
INTERNSHIP REPORT ON ASTU 2023
Organizational infrastructure and
business vice president
ICT directorate
E-learning coordinator
Secretor property
M Executive secretor manager
System
Video
administrator
conference
techniques
Junior system
Figure 1.3 Organizational Structure of ASTU
administrator
Ambo University
Department Of Computer Science
7
INTERNSHIP REPORT ON ASTU 2023
The University owns a campus LAN system with standardized datacenter, fiber backbone
and horizontal cabling. Wi-Fi is also available to support mobility. Virtualized servers were also
deployed to host available systems.
But the one which worked us are mainly one, they are:
ICT infrastructure and services team: Inside this team there are, network administration and
system administration team.
1.3.2 Network Administration team: are the teams that are responsible for the
smooth running of the ASTU LAN.
Network installation
Network maintain
Network device configuration
Ambo University
Department Of Computer Science
8
INTERNSHIP REPORT ON ASTU 2023
Network monitoring
The main objective of this task is to configure different cisco devices by using Packet tracer
and to improve configurations skills of internship students and to provide the way of setting up
different cisco devices. Configuration is the process arranging functional units of network
devices.
Ambo University
Department Of Computer Science
10
INTERNSHIP REPORT ON ASTU 2023
1.6. Scope of the Project/Report
The scope of this project is focused to modify the wired local area network (LAN) to wireless
local area network (WLAN) in order to increase the network coverage of the institute.
After completion of this project it will provide the following significant for Adama Science and
Technology University of ASTU-ICT Directorate for networking department.
In this internship we benefit through practical skills, theoretical knowledge, Improving industrial
problem-solving capability, time management, Add new knowledge. Increase competency
To create a simple network topology different device are used, so as an internship student
we tried to understand the meaning and usage of each device that we used to complete each
task. The devices that we used in the internship program are divided into 5 categories.
Ambo University
Department Of Computer Science
11
INTERNSHIP REPORT ON ASTU 2023
Category 1: Network Devices (End Points)
Category 2: Interconnections (Cables and Connectors)
Category 3: Software Applications
Category 4: Installation Tools
Category 5: Container Tools
A. Server
A server is a computer or system that provides resources, data, services, or programs to other
computers, known as clients, over a network. In theory, whenever computers share resources
with client machines they are considered servers. There are many types of servers, including
web servers, mail servers, and virtual servers.
Ambo University
Department Of Computer Science
12
INTERNSHIP REPORT ON ASTU 2023
Servers have more processing power, memory and storage than their client computers. The
client is the computer that is not acting as the server and is requesting information from the
server.
B. Switch:
A network switch or switching hub is a computer networking device that connects network
segments. The term commonly refers to a network bridge that processes and routes data at the
data link layer (layer 2) of the OSI model. Switches that additionally process data at the network
layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer switches.
A switch is a device that filters and forwards data packets between networks. Switches operate
at the data layer, and sometimes at the network layer. Is used to network multiple computers
together.
Ambo University
Department Of Computer Science
13
INTERNSHIP REPORT ON ASTU 2023
There are two main categories of switches: modular and fixed configuration. There are
variations among these categories of network switches, but the primary definition of each
remains the same.
Modular switches
Modular switches let you add expansion modules as needed, giving you flexibility as network
requirements change. Expansion modules are application-specific and include those for
firewalls, wireless connectivity, or network analysis. They may also allow for additional
interfaces, power supplies, or cooling fans. This type of switch provides you with the most
flexibility, but at a higher cost.
Fixed-configuration switches
Fixed-configuration switches provide a fixed number of ports and are typically not expandable,
which makes them less expensive overall. Fixed- configuration switches include unmanaged
switches and managed switches.
I. Managed Switch
A managed switch is exactly what it sounds like—a switch that requires some oversight by a
network administrator. This type of switch gives you total control over the traffic accessing your
network while allowing you to custom-configure each Ethernet port so you get maximum
efficiency over data transfers on the network. Administrators can tweak these devices for
optimal data rate as new devices and users are added to the network through commands such
as bandwidth rate limiting and port mirroring.
Managed switches are also typically the best network switches to support the Gigabit standard
of Ethernet rather than traditional Fast Ethernet. Many administrators use managed switches
to create virtual local area networks (VLANs), which allow you to further segment your network
and control the traffic burden for each type of connected device.
Ambo University
Department Of Computer Science
14
INTERNSHIP REPORT ON ASTU 2023
Unmanaged switches are generally made as plug-and- play devices and require little to no
special installation beyond an Ethernet cable. The setup of this type of switch relies on auto-
negotiation between Ethernet devices to enable communication between them. The switch will
automatically determine the best data rate to use, switching between full-duplex mode (where
data is received or transmitted in two directions at the same time) and half-duplex mode
(where data is received or transmitted two ways but only one direction at a time).
While some unmanaged switches may be accessed remotely, most will require the admin to
physically make broad changes when setting up the switch. If you want a switch that will
perform the basic functions of network efficiency without the need for customization,
unmanaged may be the best the type of network switch for you.
Ambo University
Department Of Computer Science
15
INTERNSHIP REPORT ON ASTU 2023
C. Router
A router is an electronic device that interconnects two or more computer networks, and
selectively interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another. Where
multiple routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can build up a table
showing the preferred paths between any two systems on the interconnected networks.
Ambo University
Department Of Computer Science
16
INTERNSHIP REPORT ON ASTU 2023
D. Hub:
An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a device for
connecting multiple twisted pair or fiber optic Ethernet devices together and making them act
as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. The
device is a form of multiport repeater. Repeater hubs also participate in collision detection,
forwarding a jam signal to all ports if it detects a collision.
E. Access point
An access point is a device that creates a wireless local area network, or WLAN usually in an
office or large building. An access point connects to a wired Router, Switch, or Hub via an
Ethernet cable, and projects a Wi-Fi signal to a designated area.
The following sections discuss the types of cables used during our internship training program
and other related topics.
A. Twisted Pair Cable: It is a high-speed cable that transmits the data over 1Gbps or more. It
comes in two varieties: Shielded (STP) and unshielded (UTP). The standard connector for
UTP is an RJ45. STP is the least expensive cable, and it uses RJ48 as a connector.
Twisted Pair Cable Arrangement: Twisted Pair cable has 2 different arrangements: straight
through and cross over. The only difference between this arrangement is straight through is
used to connect different devices, whereas, cross over is used to connect similar devices.
We use this UTP cabling for the different type of network devices. This type of cable will be
used most of the time and can be used to:
Ambo University
Department Of Computer Science
18
INTERNSHIP REPORT ON ASTU 2023
Ambo University
Department Of Computer Science
19
INTERNSHIP REPORT ON ASTU 2023
2. Connecting a computer to a switch
3. Connecting a LAN port to a switch, hub, or computer
2. CROSSOVER CABLES and it purpose
We use this UTP cabling for the same type of network devices where the pins order on one
end follows the 568A pinning order and the other end of the cable follows the 568B pinning
order. That means connecting two pieces of equipment that have the same pin edge on
both ports.
Ambo University
Department Of Computer Science
20
INTERNSHIP REPORT ON ASTU 2023
4 Blue Blue
5 White Blue White Blue
6 Orange Green
7 White Brown White Brown
8 Brown Brown
Table 1.2 Cross over cable arrangement
B. Fiber optics
Ambo University
Department Of Computer Science
21
INTERNSHIP REPORT ON ASTU 2023
Fiber optics is the technology used to transmit information as pulses of light through strands of
fiber made of glass or plastic over long distances. A fiber-optic cable contains anywhere from a
few to hundreds of optical fibers within a plastic casing. Also known as optic cables or optical
fiber cables, they transfer data signals in the form of light and travel hundreds of miles
significantly faster than those used in traditional electrical cables. And because fiber-optic
cables are non- metallic, they are not affected by electromagnetic interference (i.e. weather)
that can reduce speed of transmission. Fiber cables are also safer as they do not carry a current
and therefore cannot generate a spark.
Fiber optic patch cable, often called fiber optic patch cord or fiber jumper cable, is a fiber optic
cable terminated with fiber optic connectors on both ends.
It has two major application areas: computer work station to outlet and fiber optic patch panels
or optical cross connect distribution center. Fiber optic patch cables are for indoor applications
only.
Ambo University
Department Of Computer Science
22
INTERNSHIP REPORT ON ASTU 2023
Console cables — also known as Cisco cables, rollover cables and management cables — are
designed for a specific purpose. They connect Cisco networking devices to terminals or PCs for
configuration. Typically the Cisco end will connect via RJ45, and the terminal end will conclude
in a serial connection. What matters most about console cables is the specific nature of the
connection. This is not an Ethernet or networking connection. It is a terminal connection, and
its purpose is to enable the connected computer to configure the networking device. This is
true for older Cisco equipment and brand-new devices. Configuration is performed through the
serial connection.
Ambo University
Department Of Computer Science
23
INTERNSHIP REPORT ON ASTU 2023
The RJ45, Registered Jack 45 connector is used almost universally as the physical connector
used on Ethernet cables, and with networking cables in general. From Ethernet Category 3 right
through to Cat 6, the RJ45 is the format that is used. Cat 7 Ethernet cables can be terminated
with RJ45 connectors but specialized versions called GigaGate45 (GG45) are often used.
Fortunately these are backwards compatible with the RJ45 so there is no need to have a
completely new installation when migrating to Cat 7.
Figure 1.15 RJ 45
Ambo University
Department Of Computer Science
24
INTERNSHIP REPORT ON ASTU 2023
Pin Number Designations
Ambo University
Department Of Computer Science
25
INTERNSHIP REPORT ON ASTU 2023
1.9.3 Software Applications
A. Cisco Packet Tracer
Cisco Packet Tracer is a simulation program used by Cisco to configure the necessary
configurations before installing Router, Switch, Hub, or Security Devices on a real network.
Cisco Packet Tracer does not include only Cisco branded devices. You can find many network
devices on the Packet Tracer.
B. Tera Term:
Tera Term is a terminal emulation program. This program allows you to access the terminal
output of the switch. It also allows you to configure the switch.
Ambo University
Department Of Computer Science
26
INTERNSHIP REPORT ON ASTU 2023
A. Crimper: A crimping tool is a device used to conjoin two pieces of metal by deforming one
or both of them to hold each other. The result of the tool's work is called a crimp. An
example of crimping is affixing a connector to the end of a cable. For instance, network
cables and phone cables are created using a crimping tool (shown below) to join RJ-45 and
RJ-11 connectors to both ends of phone or Cat 5 cable.
Ambo University
Department Of Computer Science
27
INTERNSHIP REPORT ON ASTU 2023
Figure 1.20 Crimper
B. Puncher: A punch down tool, also called a krone tool, is a hand tool used to connect
telecommunications and network wires to a patch panel, punch down block, keystone
module, or surface mount box. The "punch down" part of the name comes from punching a
wire into place using an impact action. It consists of a handle, a spring mechanism, and a
removable slotted blade. When the punch down tool connects a wire the blade cuts off the
excess wire.
C. Trunk: Cable trunking is installed as a protective routing and covering system for electrical
cables and wires which prevents accidental damage. Trunking is installed onto a wall or
surface as opposed to within it and is also a great way of hiding unsightly wiring from view.
It's typically offered in a variety of materials although plastic trunking is the most common
and there are also various widths and sizes available to suit many locations and
requirements.
Network trunking is often manufactured with a slide and hinge system which allows easy access
to the ducting once installed for ease of maintenance.
Ambo University
Department Of Computer Science
28
INTERNSHIP REPORT ON ASTU 2023
D. Driller: Driller is a device that uses a drill bit to cut a hole of circular cross-section in solid
materials. The drill bit is usually a rotary cutting tool, often multi-point. The bit is pressed
against the work-piece and rotated at rates from hundreds to thousands of revolutions per
minute. This forces the cutting edge against the work-piece, cutting off chips (swarf) from
the hole as it is drilled.
E. Screw Driver: A screwdriver is an essential in any toolkit, used to manually drive screws
into a variety of surfaces such as walls, wood, metal or porcelain.
Ambo University
Department Of Computer Science
29
INTERNSHIP REPORT ON ASTU 2023
F. Screw and Fischer: Screws are generally used to fasten materials by the engagement of the
screw thread with a similar female thread in the matching part. In other hand fishers
ensures a fast bite. This makes installation simple and safe.
Ambo University
Department Of Computer Science
30
INTERNSHIP REPORT ON ASTU 2023
H. Keystone Jack: Is a standardized snap-in package for mounting a variety of low-voltage
electrical jacks or optical connectors into a keystone wall plate, surface mount box or patch
panel. Sometimes, this device is known as RJ45 Female.
Ambo University
Department Of Computer Science
31
INTERNSHIP REPORT ON ASTU 2023
Fig 1.27 Testers
A. Patch panel
A patch panel is a piece of hardware with multiple ports that helps organize a group of cables.
Each of these ports contains a wire that goes to a different location. Patch panels can be quite
small, with just a few ports, or very large, with many hundreds of ports. They can also be set up
for fiber optic cables, cat5 cables, RJ45 cables, and many others.
Patch panels connect various IT devices together. They are in many different environments
including communications closets, telephone company central offices, and data centers.
Understanding the role they play can help to determine if your facility requires a patch panel,
and if so, how to set it up. Each port in a patch panel goes to a different device somewhere in
the facility. Each panel bundles all the connections together in order to connect to another
network. This is often how a LAN connects to a WAN, or to the Internet. Patch panels are also
commonly used in facilities with a lot of telephone lines, in which one mainline is used for all
phones.
Ambo University
Department Of Computer Science
32
INTERNSHIP REPORT ON ASTU 2023
Ambo University
Department Of Computer Science
33
INTERNSHIP REPORT ON ASTU 2023
Lack of material like cable,RJ45
Shortage of time
Business Constraints: our project is limited on resources, time and costs; actually the cost is
our effort we during performing the project. The time schedule also one of the business
constraints which limits our project functioning of working. We must submit at the time
schedule that the given time of deadline.
Cost: To develop an approximation of a project cost depends on several variables including:
resources, work packages such as labor rates and mitigating or controlling influencing
factors that create cost variances.
Time constraint: The project is supposed to be complete in few months. This can be
handled by having a project management schedule
Scope: Due to changes to system structure or organization policies.
Skill constraints: we have a skill constraint because we have not enough knowledge on
networking.
Chapter 2
Project work
2.1 Methodology
Mainly follow the following methodologies to accomplish the project work:
Ambo University
Department Of Computer Science
34
INTERNSHIP REPORT ON ASTU 2023
Drag and drop the material that we want to design.
connect them by appropriate cables
Configure each material that we use and name it
And implement it in Cisco Packet Tracer application. Then understanding the result and
conclude.
In the first configuration task, the workplace supervisor gave us to study basic network
configuration commands. These basic commands can help us to analyze and troubleshoot
various networking issues that might occur. They also offer a certain amount of configurative
ability, as well as the ability to create performance baselines. These commands usually used in
windows command promote and several simulation tools like packet tracer.
i. Ipconfig: displays detail configuration information, it can also be used to make basic
configuration changes and reset certain facets of DHCP and DNS
ii. nslookup: used to get the IP address of specific domain name
iii. Ping: is used to test connectivity to other hosts; here, command-line results tell you
whether a remote host is “alive” on the network.
iv. . Tracert: traceroute and tracert are computer network diagnostic commands for
displaying the route (path) and measuring transit delays of packets across an Internet
protocol (IP) network.
Ambo University
Department Of Computer Science
35
INTERNSHIP REPORT ON ASTU 2023
2.1 Technical tasks/products
Design works
step2, file
step3, New
In this activity, we configure these settings on the customer Cisco Catalyst 2960 switch:
Host name
Console password
vty password
Privileged EXEC mode password
Privileged EXEC mode secret
IP address on VLAN1 interface
Default gateway
a. From the Customer PC, use a console cable and terminal emulation software to connect
to the console of the customer Cisco Catalyst 2960 switch.
b. Set the host name on the switch to CustomerSwitch using these commands.
Switch>enable
Switch# configure terminal
Switch(config)#hostname CustomerSwitch
Ambo University
Department Of Computer Science
37
INTERNSHIP REPORT ON ASTU 2023
a. From global configuration mode, switch to configuration mode to configure the console
line.
CustomerSwitch(config)#line console 0
b. From line configuration mode, set the password to cisco and require the password to be
entered at login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
a. From global configuration mode, switch to the configuration mode for the vty lines 0
through 15.
CustomerSwitch(config)#line vty 0 15
b. From line configuration mode, set the password to cisco and require the password to be
entered at login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit
From global configuration mode, switch to interface configuration mode for VLAN1, and assign
the IP address 192.168.1.5 with the subnet mask of 255.255.255.0.
CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config-if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if)#no shutdown CustomerSwitch(config-if)#exit
Ambo University
Department Of Computer Science
38
INTERNSHIP REPORT ON ASTU 2023
a. From global configuration mode, assign the default gateway to 192.168.1.1.
CustomerSwitch(config)#ip default-gateway 192.168.1.1b.
Click the Check Results button at the bottom of this instruction window to check your
work.
The Customer Switch should now be able to ping the ISP Server at 209.165.201.10. The first one
or two pings may fail while ARP converges.
CustomerSwitch(config)#end
CustomerSwitch#ping 209.165.201.10
Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 209.165.201.10, timeout is
2 seconds: ..!!!
Objectives
Ambo University
Department Of Computer Science
39
INTERNSHIP REPORT ON ASTU 2023
Configure the router host name.
Configure passwords.
Configure banner messages.
Verify the router configuration.
Background / Preparation
In this activity, we use the Cisco IOS CLI to apply an initial configuration to a router, including
host name, passwords, a message-of-the-day (MOTD) banner, and other basic settings.
a. On Customer PC, use the terminal emulation software to connect to the console of the
customer Cisco 1841 ISR.
Set the host name on the router to CustomerRouter by using these commands.
Router>enable
Router#configure terminal
Router(config)#hostname CustomerRouter
a. In global configuration mode, switch to line configuration mode to specify the console line.
CustomerRouter(config)#line console 0
Ambo University
Department Of Computer Science
40
INTERNSHIP REPORT ON ASTU 2023
Set the password to cisco123, require that the password be entered at login, and then
exit line configuration mode.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#
Step 4: Configure the vty password to allow Telnet access to the router.
a. In global configuration mode, switch to line configuration mode to specify the vty lines.
CustomerRouter(config)#line vty 0 4
Set the password to cisco123, require that the password be entered at login, exit line
configuration mode, and then exit the configuration session.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#
Step 5: Configure password encryption, a MOTD banner, and turn off domain server lookup.
a. Currently, the line passwords and the enable password are shown in clear text when you
show the running configuration.
Verify this now by entering the show running-config command.
To avoid the security risk of someone looking over your shoulder and reading the
passwords, encrypt all clear text passwords.
Ambo University
Department Of Computer Science
41
INTERNSHIP REPORT ON ASTU 2023
Log out of the router by typing the exit command twice. The banner displays before the prompt
for a password. Enter the password to log back into the router. You may have noticed that
when you enter a command incorrectly at the user or privileged EXEC prompt, the router
pauses while trying to locate an IP address for the mistyped word you entered. For example,
this output shows what happens when the enable command is mistyped.
CustomerRouter>enable
To prevent this from happening, use the following command to stop all DNS lookups from the
router CLI.
CustomerRouter(config)#end
a. Log out of your terminal session with the Cisco 1841 customer router.
b. Log in to the Cisco 1841 Customer Router. Enter the console password when prompted.
c. Navigate to privileged EXEC mode. Enter the privileged EXEC password when prompted.
d. Click the Check Results button at the bottom of this instruction window to check your
work.
Ambo University
Department Of Computer Science
42
INTERNSHIP REPORT ON ASTU 2023
Objectives
Background / Preparation
We might have been asked to go back to a business customer and install a new Linksys wireless
router for the customer office. The company has some new personnel who will be using
wireless computers to save money on adding additional wired connections to the building. The
business is concerned about the security of the network because they have financial and highly
classified data being transmitted over the network.
Our job is to configure the security on the router to protect the data. In this activity, we will
configure WEP security on both a Linksys wireless router and a workstation.
Ambo University
Department Of Computer Science
43
INTERNSHIP REPORT ON ASTU 2023
a. Click the Customer Wireless Router icon. Then, click the GUI tab to access the router
web management interface.
b. Click the Wireless menu option and change the Network Name (SSID) from Default to
CustomerWireless. Leave the other settings with their default options.
c. Click the Save Settings button at the bottom of the Basic Wireless Settings window.
d. Click the Wireless Security submenu under the Wireless menu to display the current
wireless security parameters.
e. From the Security Mode drop-down menu, select WEP.
f. In the Key1 text box, type 1a2b3c4d5e. This will be the new WEP pre-shared key to
access the wireless network.
g. Click the Save Settings button at the bottom of the Wireless Security window .
After we configure the correct WEP key and SSID on the customer wireless workstation, notice
that there is a wireless connection between the workstation and the wireless router.
We have observed ASTU data center by Mr. Addisu Endale (System admin), gives us clear
explanation about the data center facilities of the campus. To relate theoretical what we
understand about networking into reality, we visit ASTU data center, different networking
devices and logical design of currently used in ASTU LAN Data centers are simply centralized
locations where computing and networking equipment is concentrated for the purpose of
collecting, storing, processing, distributing or allowing access to large amounts of data.
ASTU data center is also the place where overall information’s and data in the university is
stored. This data center is found in ASTU next to women library in ICT directorate, data centers
constructed by separating the power house and data center in different houses. The building
structure of this data center is also different from other rooms buildings.
Inside the main room there is labeled floor which is 60cm above the ground for the purpose of
installing wire and protective devices. Inside the data center like fire alarm sensor which is used
to detect and warn people through visual and audio appliances when smoke, fire or other
emergencies are present in the room. These alarms may be activated automatically from smoke
or heat sensor and also the house contain Air conditioning (AC) used to regulates the
Ambo University
Department Of Computer Science
45
INTERNSHIP REPORT ON ASTU 2023
temperature and humidity. In side Power system room, there is an electric wire which comes
from Ethiopia Electric line power Agency and there is also another data cable comes from
Ethiopia telecommunication corporation as internet service provider for ASTU.
ASTU data center network structure start from the firewall, next to the firewall there is a core
switch, this core transmit networks into five different distributed switch, those five distribute
switch also transfer for access switch witch located in ASTU.
1 VERTUAL(ESXI) SERVER:
3 WEB_SERVER
2 E-LEARNING_SERVER
4 ETHERNET SERVE
During our internship period we gained technical knowledge about how to access and manage
different networking device and system.
Telnet and SSH are network protocols used to remotely access and manage systems. Although
both tools are similar, there are some differences with each protocol as we learned. we also
learn the key difference between the two protocols.
What is Telnet?
Telnet, which stands for Telecommunications and Networks, is a TCP/IP protocol that allows a
user to establish a remote connection to a system in a way that makes it appear as a local
system via the command line. This protocol is typically used by network administrators to
Ambo University
Department Of Computer Science
46
INTERNSHIP REPORT ON ASTU 2023
access and manage devices remotely. Telnet only supports known port numbers and not
dynamic ports.
We can remotely connect to a server by entering the following Telnet into the command line:
telnet hostname (Note: we may also use an IP address instead of the hostname) Once
connected to the server, we can execute commands on the server using specific Telnet
commands.
Operation
Telnet uses TCP port 23 and operates best with LANs (local area networks)
Authentication
Telnet sends data including usernames and passwords over the network in plain text making it
highly vulnerable. It is possible to add security to Telnet such as using Kerberos which would aid
with authentication and encryption.
Suitability of Network
Vulnerabilities
Since Telnet transmits data in clear text, it is vulnerable to man-in-the-middle attacks allowing
hackers to retrieve the username and passwords of admin accounts and read the data that is
being transmitted over the network. Obtaining these credentials allows hackers to gain access
to admin accounts which would give them more access to do whatever they want.
Due to the many vulnerabilities that Telnet faces, with packet sniffing being one of them, SSH
was developed to resolve these issues and more.
Ambo University
Department Of Computer Science
47
INTERNSHIP REPORT ON ASTU 2023
When Should We Use Telnet?
Since Telnet is not secure and sends data in clear text, it is rarely used today, however, there
are two cases when it may be recommended to use Telnet instead of SSH:
What is SSH?
SSH, which stands for Secure Shell, is an open-source network protocol used to access and
manage devices remotely via a program. It helps us log into another system over a network and
allows us to execute commands in the remote system. Once logged in, we also have the ability
to move files from one system to another, and deliver software updates and patches to
multiple systems.
This command will attempt to connect to the server named server.example.com using the user,
username. Note that if it is the first time we are connecting with the server; the remote host’s
public key fingerprint will be shown and will ask if we want to establish a connection. The
screenshot below is an example of the prompt that will appear on our screen if it's the first time
establishing a connection with the server.
Ambo University
Department Of Computer Science
48
INTERNSHIP REPORT ON ASTU 2023
Figure 3.4 screen that appear first when connection with the server
We can either type out the word yes or hit the enter key on your keyboard to initiate the
session. After you answer the prompt, we now have access to the server.
Operation
SSH uses TCP port 22 by default but we can change the port number.
Authentication
SSH uses encryption, specifically public key encryption meaning it uses two separate keys: a
public key and a private key. When data is encrypted with the public key, it can only be
decrypted with a private key and vice versa.
Suitability of Network
Vulnerabilities
SSH are vulnerable to brute force/dictionary attacks as hackers and here is what can be done
to prevent such attacks:
Ambo University
Department Of Computer Science
49
INTERNSHIP REPORT ON ASTU 2023
Disable SSH when it is not in use
Disabling root access is a good security practice which means we should log in as a no privilege
user and escalate privileges as needed
SSH is very secure and should therefore be used whenever we want to connect to a remote
system. SSH protects user identities, passwords, and data from any snooping attacks and
ensures confidentiality and anonymity on unsecured networks.
The key difference between Telnet and SSH is that SSH uses encryption meaning all data
transmitted over the network is protected from eavesdropping. This makes it extremely difficult
for hackers to decrypt and read the data being exchanged between the client and server .
Although Telnet and SSH are both network protocols that can be used to access and manage
devices remotely, the SSH protocol is the better option. I hope that you now have a better
understanding of what Telnet and SSH are. It is important to remember that the major
difference between Telnet and SSH is that SSH encrypts traffic in both directions, meaning all
data including usernames and passwords.
Ambo University
Department Of Computer Science
50
INTERNSHIP REPORT ON ASTU 2023
Install network in the university
Switch configuration
Router configuration
Repairing old and unworked cables
Control all network of university
During this internship program in addition of practical work and office work we also gave the
assignment by our mentor.
This assignment gives more knowledge about networking, cabling, trucking, subnneting, and
it give more knowledge about basics of Networking.
During our internship program we were allowed to have an office in Adama science and
technology university main campus, and we have the responsibilities to protect and keep safe
office material.
And also our team members allow us to access different network device, such as switch,
wireless access point, different network cable and gave us a freedom to use those device as we
wanted. In this case we also have the responsibilities to keep safe those devices.
Another responsibilities that we have taken during our internship program was sometimes
some of our teams member are absent from site work, in this time we have the responsibilities
to cover the absence of our team member to complete the work at time .
Ambo University
Department Of Computer Science
51
INTERNSHIP REPORT ON ASTU 2023
2.5. Assigned routine duties at the technical department
During our internship training we were part of several activities assigned by the company
supervisor. These activities helped us to improve my skills in installation and working in
different networking sector. Each task assigned by the supervisor has different procedures and
methods to complete in proper manner.
In today's world, network access has become one of the most important instruments for
sustaining communications, particularly at home and at work, in order to make things much
easier. A network is a collection of computers or a collection of smaller networks that are linked
by various techniques so that they may communicate with one another. In Adama Science and
Technology University my internship program was concerned on Networking Structure of the
University. The main technical aspect of this program is to study about different type of
networking device, Configuration technique, and installation of Networking Cable.
Practical skill
Upgrading theoretical knowledge
Improving industrial problem-solving capability
Ambo University
Department Of Computer Science
52
INTERNSHIP REPORT ON ASTU 2023
Time management
Team playing skills
Leadership skills
Understanding about work ethics, industrial psychology and related issues
In term of gaining entrepreneurship skill
Interpersonal communication skills
Work ethics and related issues
entrepreneurship skill
2.7.1. Socially
A. Interpersonal Communication Skills
One of the important things we have found from our internship experience is that we have
improved our personal communication skills; from the trainings our mentors gave us how to
develop the skills of communication with our fellow associates.
Ambo University
Department Of Computer Science
53
INTERNSHIP REPORT ON ASTU 2023
B. Team Playing Skills
This skill was not that much difficult to adapt since we have already done some projects
and assignments as a team in the past four years of university stay. The additional skills we
learned through the internship are that the knowledge of a team is stronger and more effective
than individual person’s effort. Again, we learned the importance of sharing information and
knowledge between the team.
C. Entrepreneurship skill
Above all this internship has thought as the entrepreneurship skills; working
environment had been a good starting place to enhance our entrepreneur capabilities.
Indeed, we learned a lot on improving criteria.
2.7.2 Personally
A. Leadership Skills
The internship was an important experience to practice the assets of leadership; we got the
access to know more about leadership. In doing our project we were able to improve our self-
confidence as we had the willingness and inspiration to face any difficulty in the project; this
helped us to grow emotionally to learn from our failure and success; this in turn, gave us the
chance to learn about project management, the technical approach methodology of a project.
Above all we have grasp leadership skills such as self-confidence, accountability, decision
making and so on.
B. Work Ethics
In our internship period we understood that ethics is one of the valuable resources a
person can have in the real world; understanding this fact we tried to get closer to others in
more ethical way so that we can be more beneficiary from them. In our internship period we
have developed both our personal and professional ethics; the former being related with how
Ambo University
Department Of Computer Science
54
INTERNSHIP REPORT ON ASTU 2023
we should act towards other people while the other related to the ethics we have to acquire
certain tasks done.
2.7.3 Professionally
In this period we have develop many different technical skill, those are
Performing initial switch configuration
Performing initial router configuration
Performing initial wire-less configuration
2.8 Contributions
We have our own contribution on our internship program on ASTU.
It took a lot of time to learn again network configuration and design Shortage of devices during
implementation
A lot of errors were encountered during the development of the system.
A lot of errors and misconfiguration were encountered during the development of the system
and the network.
Ambo University
Department Of Computer Science
56
INTERNSHIP REPORT ON ASTU 2023
Chapter 3
3.1. Conclusion
In general, this internship program provides us with the opportunity to not only work with
the ASTU ICT Directorate, but also to learn from excellent professionals. We’d want to express
our gratitude to the ASTU ICT Directorate for presenting us to this fantastic opportunity.
We have improved both our theoretical and practical self-skills. We also train and educate
ourselves. That anything having to do with information and communication technology is a
talent rather than knowledge. Theory that emerged from conducting practical work like this
during the internship term
We were satisfied with this organization for a variety of reasons, including the fact that all
employees or workers treated each other with respect, took the initiative to teach us anything
we didn't understand, offered us their time, and generally sought to assist us.
Ambo University
Department Of Computer Science
57
INTERNSHIP REPORT ON ASTU 2023
All of the workers were pleasant and eager to teach us what they knew, but in our opinion,
the students that accepted this internship should gain a wealth of information and be
willing to devote their time to teaching us what we needed to know, and they should be
honest with their students.
The company has recognized that internship students lack knowledge of what appears to
be a working environment as well as practical work, so employees or advisors have an
obligation to teach us the practical work in greater depth than the theoretical work, so
they must pay more attention to their students and attempt to teach everything.
Because the company has sophisticated equipment and also a working space, it has the
possibility to accommodate future internship students. As a result, the company must plan
placement for future students without any requirements.
3.3. Recommendation
As a member of the ASTU ICT Directorate from what we observed we recommended the
followings main points for directorates
Ambo University
Department Of Computer Science
58
INTERNSHIP REPORT ON ASTU 2023
Even if ASTU ICT Directorate is try their best, the demand of ASTU community for Internet
access is not answered. We hear many complain from employ in office and students when
we gather the Ethernet port of the blocks.
However, we see in some offices there is many ports but not used, so give it for other
office.
Also, there is many Ethernet ports damaged in both ASTU Libraries and old buildings like,
Administration, Registrar and college of Social and Natural science so repair these ports and
open other interface for users.
Reference
[1 Ambo University Hachalu Hudesa Campus Guidelines for Writing an Internship Report
[2] Internet
Ambo University
Department Of Computer Science
59