School Ofinformatics and Electrical Enginering Department of Computer Science

Download as pdf or txt
Download as pdf or txt
You are on page 1of 70

SCHOOL OFINFORMATICS AND ELECTRICAL ENGINERING

DEPARTMENT OF COMPUTER SCIENCE

INTERNSHIP REPORT

ON

ASTU-ICT Directorate Networking Department

By

YARED ABEBAYEHU ID NO. TUS/16705/12

TSEGAYE ABITI ID NO. TUS/16635/12

Host Company: ASTU

ADVISOR: Mr. WAKJIRA BEKELE

Ambo Ethiopia

[2023]
INTERNSHIP REPORT ON ASTU 2023

PREFACE
Industrial project is an integral part for the students of B.Sc. Computer Science and each and
every student has to undergo the practice for 2 months in a company.

This record is concerned about our practical training during the Summer Vacations after the 3rd

year. We have taken our Practical training in Adama Science and Technology University

(ASTU). During this training, we got to learn many new things about the industry and the
current requirements of companies. This training proved to be a milestone in our knowledge of
present industry. Every say and every moment was an experience in itself, an experience which
theoretical study can’t provide

Ambo university
Department of computer science
i
INTERNSHIP REPORT ON ASTU 2023
ACKNOWLEDGEMENT
First of all we would like to thanks God, and then we would like to thank our family for
supporting us. Next to this we would like to give a great regards and thanks to our department
for providing with this internship program to develop practical knowledge and understandings.
We would also be very grateful to announce thanks to The Adama Science and Technology
University for giving the chance to perform our internship in their main campus.

Words can’t express to say thanks those people and institution that have helped us in
accomplishing our internship program. But the following deserve a special mention. First and
foremost we would like to thanks our supervisor Miss. Victoria Demeke, in providing the
request materials, Constructive comments, guidance and encouraging in all moment since the
Internship program preparation. Her comments on the instrument greatly helped us to come
up with goods and practically would have been hardly possible without her guidance and heart
full support.

Then we would also give a warm thanks to Mr. Tadios the ICT Administrator in Adama Science
and Technology University, to Mr. Beyene leader of our team, and to Mr. Endale Addisu System
admin in Adama Science and Technology University.

YARED ABEBAYEHU (TUS/16705/12)

TSEGAYE ABITI (TUS/16635/12)

Ambo university
Department of computer science
ii
INTERNSHIP REPORT ON ASTU 2023
CANDIDATE’S DECLARATION
We Yared Abebayehu and Tsegaye Abiti, Roll No. TUS/16705/12 AND TUS/16638/12, BSc in
computer science (3rd year) of the Computer Science department, Institute of Technology,
Ambo University, hereby declare that the Practical Report entitled “Network Installation And
Configuration” is an original work and data provided in the study is authentic to the best of my
knowledge. This report has not been submitted to any other Institute for the award of any
other degree.

YARED ABEBAYEHU (TUS/16705/12)

TSEGAYE ABITI (TUS/16635/12)

Place: Adama

Date: 30/ 9/2023

Ambo university
Department of computer science
iii
INTERNSHIP REPORT ON ASTU 2023
Abstraction
During our internship period of ASTU-ICT Directorate, We had an opportunities to
participate designing and manipulating basic networking infrastructure and to see how new
technology could be effectively used. Since the agency is started recently there is not that much
multidirectional service availability at a time. But it will ramp up its services to varieties of
problem that are addressed and even practically observed in bulk of society that should be
improved.

This report describes new and evolving networking technology that can be enhance the
performance of existing structure and design we ever used and at least customize todays
incredible technology in the way it will help us in better ways. We act as student or observer at
the agency but after we have had all things we had done networking design project by packet
tracer software and Microsoft Visio. In this practice we are able to manage network
connectivity, network configuration, room network installing, Switch, Router, WAP
configuration etc.

Ambo university
Department of computer science
iv
INTERNSHIP REPORT ON ASTU 2023

Contents
PREFACE ......................................................................................................................................................... i

ACKNOWLEDGEMENT ................................................................................................................................... ii

CANDIDATE’S DECLARATION ....................................................................................................................... iii

Abstraction ................................................................................................................................................... iv

LIST OF Table ............................................................................................................................................... vii

LIST OF FIGURE ........................................................................................................................................... viii

LIST OF ACRONOMYS ................................................................................................................................... ix

Chapter 1....................................................................................................................................................... 1

Introduction .................................................................................................................................................. 1

1. General about the internship................................................................................................................ 1

1.1 Company Background and overviews ..................................................................................................... 2

1.1.1 Company Profile................................................................................................................................... 2

1.1.2. History of the ASTU ............................................................................................................................. 2

1.1.2. Main functions/ core activities of the ASTU-ICT Directorate.............................................................. 3

1.1.3. Vision, mission statement and core values of the ASTU .................................................................... 4

...................................................................................................................................................................... 5

1.1.4 Research, Center of Excellence and Incubation Center ....................................................................... 6

1.2 Organization Design and Structure ASTU-ICT Directorate ................................................................ 6

1.3 Responsibilities of the Department ........................................................................................................ 8

1.3 .1 Work section in the Directorate.......................................................................................................... 8

1.3.2 Network Administration team ............................................................................................................. 8

Ambo university
Department of computer science
v
INTERNSHIP REPORT ON ASTU 2023
Topology and Architecture of ASTU.............................................................................................................. 9

1.4 Statement of problem............................................................................................................................. 9

1.5 Objective of the project ........................................................................................................................ 10

1.5.1. General objective .............................................................................................................................. 10

1.5.2. Specific objectives ............................................................................................................................. 10

1.6. Scope of the Project/Report ................................................................................................................ 11

1.7. Significance and beneficiaries of the attachment................................................................................ 11

1.8 Materials and methodologies used regarding to the software project ................................................ 11

1.9 Materials and equipment used ............................................................................................................. 11

1.9.1 Network Devices (End Points) ............................................................................................................ 12

1.9.2 Interconnections (Cables and Connectors) ........................................................................................ 18

1.9.3 Software Applications ........................................................................................................................ 26

1.9.4 Installation Tools ................................................................................................................................ 27

1.9.5 Container Tools .................................................................................................................................. 32

1.9. Limitation of the Project/Report.......................................................................................................... 33

1.10. Constraints and recommendations.................................................................................................... 34

Chapter 2..................................................................................................................................................... 34

Project work ................................................................................................................................................ 34

2.1 Methodology......................................................................................................................................... 34

2.1 Technical tasks/products ...................................................................................................................... 36

2.3. Key functions/activities of the department ......................................................................................... 50

2.4. Assignments and responsibilities of the students ............................................................................... 51

2.5. Assigned routine duties at the technical department ......................................................................... 52

2.6 Evaluation of the attachment report period......................................................................................... 52

2.6.1. Benefits of the attachment exercise ................................................................................................. 52

Ambo university
Department of computer science
vi
INTERNSHIP REPORT ON ASTU 2023
2.6.2. Achievements during the attachment exercise ................................................................................ 53

2.7. Knowledge and skills/ learning experience acquired........................................................................... 53

2.7.1. Socially .............................................................................................................................................. 53

2.7.2 Personally ........................................................................................................................................... 54

2.7.3 Professionally ..................................................................................................................................... 55

2.8 Contributions ........................................................................................................................................ 55

2.9. Challenges encountered during the project/training activities period ............................................... 56

2.10. How you cope-up with the challenges............................................................................................... 56

Chapter 3..................................................................................................................................................... 57

Conclusion and Recommendation .............................................................................................................. 57

3.1. Conclusion ............................................................................................................................................ 57

3.2 Summary and Conclusion ..................................................................................................................... 58

3.3. Recommendation................................................................................................................................. 58

Reference .................................................................................................................................................... 59

LIST OF Table
Table 1.1 Straight through cable arrangement ………………………………………………………………………..18
Table 1.2 Cross over cable arrangement………………………………………………………………………………….20
Table 1.3 UTP Cable Categories ……………………………………………………………………………………………….20

Table 1.4 Pin Number in T-568B ……………………………………………………………………………….………….…24

Table 1.5 pin number T-568A ………………………..…………………………………………………………………….…25

Ambo university
Department of computer science
vii
INTERNSHIP REPORT ON ASTU 2023
LIST OF FIGURE
Figure 1.1 ASTU Profile…...…………………………………………………………………………………………………………1

Figure 1.2 Structure of schools & program………………………………………………………………………………….…..4

Figure 1.3 Organizational Structure of ASTU………………………………………………………………………………6

Figure 1.4 overall network structure of ASTU…………………………………………………………………………….8

Figure 1.5 server………………………………………………………………………………………………………………………11

Figure 1.6 Managed switch………………………………………………………………………………………………………13

Figure 1.7 Unmanaged switch………………………………………………………………………………………………….14

Figure 1.8 Router……………………………………………………………………………………………………………………..15

Figure 1.9 Access point…………………………………………………………………………………………………………….16

Figure 1.10 Straight through cable……………………………………………………………………………………………17

Figure 1.11 Cross over cable…………………………………………………………………………………………………….19

Figure 1.12 fiber optic………………………………………………………………………………………………………………21

Figure 1.13 patch chord……………………………………………………………………………………………………………22

Figure 1.14 console cable…………………………………………………………………………………………………………23

Figure 1.15 RJ 45………………………………………………………………………………………………………………….....24

Figure 1.16 cisco packet tracer…………………………………………………………………………………………………26

Figure 1.17 tera term……………………………………………………………………………………………………………….26

Figure 1.19 putty term……………………………………………………………………………………………………………..27

Figure 1.20 Crimper……………………………………………………………………………………………………………………………….28

Ambo university
Department of computer science
viii
INTERNSHIP REPORT ON ASTU 2023
Figure 1.21 puncher…………………………………………………………………………………………………………………28

Figure 1.22 Trunk……………………………………………………………………………………………………………………..29

Figure 1.23 Drilling Machine…………………………………………………………………………………………………….30

Figure 1.24 Screw Driver………………………………………………………………………………………………………….30

Figure 1.25 Screw & Screw Fisher………………………………………………………………………………………….…31

Figure 1.26 Cutting & Stripping tool…………………………………………………………………………………………31

Figure 1.27 Tester………………………………………………………………………………………………………………………………….32

Figure 1.28 patch panel……………………………………………………………………………………………………………33

Figure 1.29: rack…………………………………………………………...............................................................33

LIST OF ACRONOMYS
ASTU………………………………………………………………Adama Science and Technology University

ICT……………………………………………………………Information Communication and Technology

DMZ…………………………………………………………………………………………………..Demilitarized Zone

IP……………………………………………………………………………….…………………………Internet Protocol

LAN………………………..…………………………………………………………………………Local Area Network

CAT……………………………………………………………………………………………………………………Category

CLI…………………………………………….......................…………………….Command Line Interpreter

DNS………………………………………………………………………………………………Domain Name System

Ambo university
Department of computer science
ix
INTERNSHIP REPORT ON ASTU 2023
HTTP………………………………………………………….………………………..Hyper Text Transfer Protocol

ISP…………………………………………………………………………………………...Internet Service Provider

PC………………………………………………………………………………………………………Personal Computer

SMPT………………………………………………………………………………...Simple mail Transfer Protocol

WIFI……………………………………………………………………………………….………………Wireless Fidelity

UTP……………………………………………………………………….………………….Unshielded Twisted Pair

Ambo university
Department of computer science
x
INTERNSHIP REPORT ON ASTU 2023

Chapter 1

Introduction

1. General about the internship


The internship program is the best part of the curriculum for the students to relate and
understand the theoretical class which has taken with the practical knowledge’s on the working
environment and from the co –workers and so on.

The internship program is typically secondary school for students or recent college
graduates who work in an office setting and handle routine administrative tasks. For most, the
purpose is to learn new skills, improving their resumes and build professional connections.

Ambo University
Department Of Computer Science
1
INTERNSHIP REPORT ON ASTU 2023
1.1 Company Background and overviews

1.1.1 Company Profile

Figure 1.1 ASTU Profile

1.1.2. History of the ASTU


Adama Science and Technology University (formerly known as Nazareth Technical College,
Nazareth College of Technical Teachers Education, and Adama University) is a university with
branches in Adama city and a branch in Asella, and Debre Zeyit cities, Oromia Region, Ethiopia
and also in Addis Ababa (Winget campus). He University was established in 1993 as Nazareth
Technical College (NTC), and was later renamed as Nazareth College of Technical Teacher
Education (NCTTE), specializing in training technical teachers until 2003. The same college
became a university, namely Adama University (AU), in 2006. Five years later, the university
once again changed its name to Adama Science and Technology University (ASTU). Currently,
the university is located in two different towns-in Adama, the main campus, and Asella, home
to the two different campuses hosting the School of Agriculture and School of Health Sciences,

Ambo University
Department Of Computer Science
2
INTERNSHIP REPORT ON ASTU 2023
respectively. Starting from 2011, the university is moving towards a new phase of
transformation that is befitting to the country context. It has restructured its Schools and is
already underway to set up new institutions, in addition to the existing ones, so as to foster
quality of education. Currently, the number of academic entities has reached seven Schools,
and a separate School has also been established to coordinate all the postgraduate studies. The
university has ratified a Five-Years Strategic Plan and Senate Legislation that will allow for the
achievement of its vision- ASTU aspires to become a first choice in Ethiopia and one of the
distinguished universities dedicated to excellence in applied sciences and technology in Africa.
For this vision to materialize, the university community is working towards joining the real
world with the academia. And an instance of this could be the initial steps towards creating a
Research Park in the university, the first of its kind in the Ethiopian context.

1.1.2. Main functions/ core activities of the ASTU-ICT Directorate


 Provide sustainable and quality ICT infrastructure and improve student and staff access to
ICT resources in line with University priorities.

 Ensure all staff members are motivated and skilled in the use of ICT to spark the culture of
continuous development in ICT expertise and exposures.
 Initiate/Develop/Supervise application development for different sections of the
University and provide ongoing maintenance of both the software and the hardware.
 Building a digital teaching-learning environment both in terms of teaching-learning
materials and digital resource sharing, promoting interactive academic and professional
communications between teachers, administrative staff, researchers and students.
 Provide on time and online user support platform for the University community.
 Establish a dynamic and adaptive online University communication network serving
internal and external users.
 Provide basic computer training and ICT training
Ambo University
Department Of Computer Science
3
INTERNSHIP REPORT ON ASTU 2023
 Networking and installation and web development
 Comprising ICT Business incubation and community data center service
 Domain name and data center administration
 Preparing specification of ICT equipment’s.
 Use ICT to for E-learning, smart rooms, video conferencing and software development
 Software and hardware maintenance

1.1.3. Vision, mission statement and core values of the ASTU


Vision

ASTU aspires to be the first choice in Ethiopia and the premier center of excellence in
applied science and technology in Africa by 2030.

Mission

The mission of ASTU is to provide ethical and competent graduates in applied science and
technology through quality education, demand driven research and community service. ASTU
also provides innovative knowledge to support the socio-economic development of the nation.

Core Values

 Originality and Innovativeness

 Academic freedom and integrity

 Sense of belongingness and ownership

 Nurturing diversity

 Transparency and accountability

 Professional ethics

 Responsiveness

Ambo University
Department Of Computer Science
4
INTERNSHIP REPORT ON ASTU 2023

School of Civil
School of Applied Engineering
Natural

ASTU

SCHOOL AND PROGRAMS

School of Electrical School of Mechanical,


Engineering Chemical

Figure 1.2 Structure of schools & program

1. School of Applied Natural Sciences Programs (4 year)

 Applied Biology
 Applied Chemistry
 Applied Geology
 Applied Mathematics
 Applied Physics
2. School of Civil Engineering and Architecture Programs (5 year)
 Architecture

Ambo University
Department Of Computer Science
5
INTERNSHIP REPORT ON ASTU 2023
 Civil Engineering
 Urban Planning and Design
3. School of Electrical Engineering and Computing Programs (5 year)

 Computer Science and Engineering


 Electronics and Communication Engineering
 Electrical Power and control Engineering
4. School of Mechanical, Chemical, and Materials Engineering Programs (5 year)

 Chemical Engineering ...


 Materials Science and Engineering
 Mechanical Design and Manufacturing Engineering
 Mechanical Systems Engineering
 Thermal and Aerospace Engineering

1.1.4 Research, Center of Excellence and Incubation Center


 Advanced Manufacturing Engineering
 Advanced Material science and Engineering
 Transportation and vehicle engineering
 Advancement of electrical system and electronics,
 Institute of pharmaceutical science
 Space Technology Institute
 Entrepreneurship Development Center (ASTU-EDC

1.2 Organization Design and Structure ASTU-ICT Directorate

Ambo University
Department Of Computer Science
6
INTERNSHIP REPORT ON ASTU 2023
Organizational infrastructure and
business vice president

ICT directorate
E-learning coordinator
Secretor property
M Executive secretor manager

Infrastructure Business ICT support& ICT training Management


Technology
&services team application maintenance and team leader
learning&
unit development unit consultation
teaching
&administration team leader device unit Secretor
High network Senior
administrator computer
Software Website Help desk
maintenance
Senior programmer administra
tor Training
network
Advanced
System expert
administrator
computer
analysis Content
Junior maintenance
Infrastructure
administrator System expert
Junior
analysis
High system computer
E-learning
administrator maintenance
expert

System
Video
administrator
conference
techniques
Junior system
Figure 1.3 Organizational Structure of ASTU
administrator

Ambo University
Department Of Computer Science
7
INTERNSHIP REPORT ON ASTU 2023
The University owns a campus LAN system with standardized datacenter, fiber backbone
and horizontal cabling. Wi-Fi is also available to support mobility. Virtualized servers were also
deployed to host available systems.

1.3 Responsibilities of the Department

1.3 .1 Work section in the Directorate


In ASTU ICT directorate the service delivery is organized into six categories.

 Infrastructure and services team unit


 Business application development and administration
 Technology learning and teaching team leader
 ICT support and maintenance unit
 ICT training and consultancies services unit
 Management team leader

But the one which worked us are mainly one, they are:

 ICT infrastructure and services team

ICT infrastructure and services team: Inside this team there are, network administration and
system administration team.

1.3.2 Network Administration team: are the teams that are responsible for the
smooth running of the ASTU LAN.

Main job of network administrations

 Network installation
 Network maintain
 Network device configuration

Ambo University
Department Of Computer Science
8
INTERNSHIP REPORT ON ASTU 2023
 Network monitoring

Topology and Architecture of ASTU

Figure 1.4 overall network structure of ASTU

1.4 Statement of problem


The previous design of ASTU was in wired connection which is less benefit than wireless
connection. Which means if the connection is wired it have its own damage? The first is the
number of user is limited and the second is connected with neat less of the room. If the
connection is wireless the number of user is not limited since we use the access point in
addition of room cleanliness.
Ambo University
Department Of Computer Science
9
INTERNSHIP REPORT ON ASTU 2023
1.5 Objective of the project

1.5.1. General objective


Design the network installation of the company and Make some improvements by using
Cisco Packet Tracer application software.

The main objective of this task is to configure different cisco devices by using Packet tracer
and to improve configurations skills of internship students and to provide the way of setting up
different cisco devices. Configuration is the process arranging functional units of network
devices.

1.5.2. Specific objectives


 Obtain a thorough understanding of how to use the Cisco packet tracer tool.
 To provide extensive instructions on how to configure routers, switches, wireless access
points, and other network devices.
 To gain a thorough understanding of the network materials' functions.
 provide us to broaden our chance for handling a job and jump starting our careers
 To enable us to get hands-on real-life experience
 To apply the principles and techniques theoretically learnt into real-life problem-solving
situation
 To Strengthen our professional skills and interpersonal communications
 To design a simple network based on cisco packet tracer software by using wired and
wireless device to minimize a network problem.
 Design a wireless telephone it is more portable than wired telephone. Wireless telephone
has less in cost

Ambo University
Department Of Computer Science
10
INTERNSHIP REPORT ON ASTU 2023
1.6. Scope of the Project/Report
The scope of this project is focused to modify the wired local area network (LAN) to wireless
local area network (WLAN) in order to increase the network coverage of the institute.

1.7. Significance and beneficiaries of the attachment


Significance of the attachment

After completion of this project it will provide the following significant for Adama Science and
Technology University of ASTU-ICT Directorate for networking department.

 Minimize work overload of the employee.


 Minimize time and efforts needed to perform tasks

Beneficiaries of the attachment

In this internship we benefit through practical skills, theoretical knowledge, Improving industrial
problem-solving capability, time management, Add new knowledge. Increase competency

1.8 Materials and methodologies used regarding to the


software project
Our institute gives a service to configure and installation of a network design using wired and
wireless components.

1.9 Materials and equipment used


Physical Devices & Tools Used During Internship Program

To create a simple network topology different device are used, so as an internship student
we tried to understand the meaning and usage of each device that we used to complete each
task. The devices that we used in the internship program are divided into 5 categories.
Ambo University
Department Of Computer Science
11
INTERNSHIP REPORT ON ASTU 2023
 Category 1: Network Devices (End Points)
 Category 2: Interconnections (Cables and Connectors)
 Category 3: Software Applications
 Category 4: Installation Tools
 Category 5: Container Tools

1.9.1 Network Devices (End Points)


These are hardware devices that are used to connect computers, printers, fax machines and
other electronic devices to a network are called network devices. These devices transfer data in
a fast, secure and correct way over same or different networks. These devices are the main
checkpoints when data is delivered from sender to receiver.

A. Server

A server is a computer or system that provides resources, data, services, or programs to other
computers, known as clients, over a network. In theory, whenever computers share resources
with client machines they are considered servers. There are many types of servers, including
web servers, mail servers, and virtual servers.

Ambo University
Department Of Computer Science
12
INTERNSHIP REPORT ON ASTU 2023

Figure 1.5 server

Servers have more processing power, memory and storage than their client computers. The
client is the computer that is not acting as the server and is requesting information from the
server.

B. Switch:

A network switch or switching hub is a computer networking device that connects network
segments. The term commonly refers to a network bridge that processes and routes data at the
data link layer (layer 2) of the OSI model. Switches that additionally process data at the network
layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer switches.

A switch is a device that filters and forwards data packets between networks. Switches operate
at the data layer, and sometimes at the network layer. Is used to network multiple computers
together.

Types of Network Switches

Modular switches vs. fixed-configuration switches

Ambo University
Department Of Computer Science
13
INTERNSHIP REPORT ON ASTU 2023
There are two main categories of switches: modular and fixed configuration. There are
variations among these categories of network switches, but the primary definition of each
remains the same.

Modular switches

Modular switches let you add expansion modules as needed, giving you flexibility as network
requirements change. Expansion modules are application-specific and include those for
firewalls, wireless connectivity, or network analysis. They may also allow for additional
interfaces, power supplies, or cooling fans. This type of switch provides you with the most
flexibility, but at a higher cost.

Fixed-configuration switches

Fixed-configuration switches provide a fixed number of ports and are typically not expandable,
which makes them less expensive overall. Fixed- configuration switches include unmanaged
switches and managed switches.

I. Managed Switch

A managed switch is exactly what it sounds like—a switch that requires some oversight by a
network administrator. This type of switch gives you total control over the traffic accessing your
network while allowing you to custom-configure each Ethernet port so you get maximum
efficiency over data transfers on the network. Administrators can tweak these devices for
optimal data rate as new devices and users are added to the network through commands such
as bandwidth rate limiting and port mirroring.

Managed switches are also typically the best network switches to support the Gigabit standard
of Ethernet rather than traditional Fast Ethernet. Many administrators use managed switches
to create virtual local area networks (VLANs), which allow you to further segment your network
and control the traffic burden for each type of connected device.

Ambo University
Department Of Computer Science
14
INTERNSHIP REPORT ON ASTU 2023

Figure 1.6 Managed switch

II. Unmanaged Switch

Unmanaged switches are generally made as plug-and- play devices and require little to no
special installation beyond an Ethernet cable. The setup of this type of switch relies on auto-
negotiation between Ethernet devices to enable communication between them. The switch will
automatically determine the best data rate to use, switching between full-duplex mode (where
data is received or transmitted in two directions at the same time) and half-duplex mode
(where data is received or transmitted two ways but only one direction at a time).

While some unmanaged switches may be accessed remotely, most will require the admin to
physically make broad changes when setting up the switch. If you want a switch that will
perform the basic functions of network efficiency without the need for customization,
unmanaged may be the best the type of network switch for you.

Ambo University
Department Of Computer Science
15
INTERNSHIP REPORT ON ASTU 2023

Figure 1.7 Unmanaged switches

C. Router

A router is an electronic device that interconnects two or more computer networks, and
selectively interchanges packets of data between them. Each data packet contains address
information that a router can use to determine if the source and destination are on the same
network, or if the data packet must be transferred from one network to another. Where
multiple routers are used in a large collection of interconnected networks, the routers
exchange information about target system addresses, so that each router can build up a table
showing the preferred paths between any two systems on the interconnected networks.

Figure 1.8 Routers

Ambo University
Department Of Computer Science
16
INTERNSHIP REPORT ON ASTU 2023
D. Hub:

An Ethernet hub, active hub, network hub, repeater hub, hub or concentrator is a device for
connecting multiple twisted pair or fiber optic Ethernet devices together and making them act
as a single network segment. Hubs work at the physical layer (layer 1) of the OSI model. The
device is a form of multiport repeater. Repeater hubs also participate in collision detection,
forwarding a jam signal to all ports if it detects a collision.

E. Access point

An access point is a device that creates a wireless local area network, or WLAN usually in an
office or large building. An access point connects to a wired Router, Switch, or Hub via an
Ethernet cable, and projects a Wi-Fi signal to a designated area.

The AP provides the following capability:-


 Wireless transceiver.
 Protocol-independent networking functionality.
 Central management configuration.

Figure 1.9 Access point


Ambo University
Department Of Computer Science
17
INTERNSHIP REPORT ON ASTU 2023
1.9.2 Interconnections (Cables and Connectors)
These are communication channels used to interconnect nodes on a computer network.
Generally, these are physical channel used for transmission in the network. Typically, these
media are located below the physical layer and are controlled by the physical layer.

The following sections discuss the types of cables used during our internship training program
and other related topics.

A. Twisted Pair Cable: It is a high-speed cable that transmits the data over 1Gbps or more. It
comes in two varieties: Shielded (STP) and unshielded (UTP). The standard connector for
UTP is an RJ45. STP is the least expensive cable, and it uses RJ48 as a connector.

Twisted Pair Cable Arrangement: Twisted Pair cable has 2 different arrangements: straight
through and cross over. The only difference between this arrangement is straight through is
used to connect different devices, whereas, cross over is used to connect similar devices.

1. STRAIGHT-THROUGH CABLES and it purpose

We use this UTP cabling for the different type of network devices. This type of cable will be
used most of the time and can be used to:

 Connect a computer to a switch/hub's normal port.


 Connect a computer to a cable/ LAN port.

Ambo University
Department Of Computer Science
18
INTERNSHIP REPORT ON ASTU 2023

Figure 1.10 Straight through cable

Pin ID Side A Side B

1 White Orange White Orange


2 Orange Orange
3 White Green White Green
4 Blue Blue
5 White Blue White Blue
6 Green Green
7 White Brown White Brown
8 Brown Brown

Table 1.1 Straight through cable arrangement

Use a straight-through cable when:

1. Connecting a router to a hub

Ambo University
Department Of Computer Science
19
INTERNSHIP REPORT ON ASTU 2023
2. Connecting a computer to a switch
3. Connecting a LAN port to a switch, hub, or computer
2. CROSSOVER CABLES and it purpose

We use this UTP cabling for the same type of network devices where the pins order on one
end follows the 568A pinning order and the other end of the cable follows the 568B pinning
order. That means connecting two pieces of equipment that have the same pin edge on
both ports.

 Connect computer directly.


 It used to operate in the peer to peer fashion without Hub or switch.
 Connect two switches/hubs by using normal port in both switches/hubs.

Figure 1.11 Cross over cable

Pin ID Side A Side B

1 White Green White Orange


2 Green Orange
3 White Orange White Green

Ambo University
Department Of Computer Science
20
INTERNSHIP REPORT ON ASTU 2023
4 Blue Blue
5 White Blue White Blue
6 Orange Green
7 White Brown White Brown
8 Brown Brown
Table 1.2 Cross over cable arrangement

Use a crossover cable when:

1. Connecting a computer to a router


2. Connecting a computer to a computer
3. Connecting a router to a router
4. Connecting a switch to a switch
5. Connecting a hub to a hub
 Category of UTP cables: During our internship program we used most widely CAT6 cable
and we also learned the difference between each category

UTP Category Purpose Transfer Rate


Cat 1 Voice only <1 Mbps
Cat 2 Data 4 Mbps
Cat 3 Data 10 Mbps
Cat 4 Data 16 Mbps
Cat 5 Data 100 Mbps
Cat 5E Data 1 Gbps
Cat 6 Data 10 Gbps
Cat 6E Data
Table 1.3 UTP Cable Categories

B. Fiber optics

Ambo University
Department Of Computer Science
21
INTERNSHIP REPORT ON ASTU 2023
Fiber optics is the technology used to transmit information as pulses of light through strands of
fiber made of glass or plastic over long distances. A fiber-optic cable contains anywhere from a
few to hundreds of optical fibers within a plastic casing. Also known as optic cables or optical
fiber cables, they transfer data signals in the form of light and travel hundreds of miles
significantly faster than those used in traditional electrical cables. And because fiber-optic
cables are non- metallic, they are not affected by electromagnetic interference (i.e. weather)
that can reduce speed of transmission. Fiber cables are also safer as they do not carry a current
and therefore cannot generate a spark.

Figure 1.12 fiber optic

C. Fiber optic patch cable (chord)

Fiber optic patch cable, often called fiber optic patch cord or fiber jumper cable, is a fiber optic
cable terminated with fiber optic connectors on both ends.

It has two major application areas: computer work station to outlet and fiber optic patch panels
or optical cross connect distribution center. Fiber optic patch cables are for indoor applications
only.

Ambo University
Department Of Computer Science
22
INTERNSHIP REPORT ON ASTU 2023

Figure 1.13 patch chord


D. Console Cable

Console cables — also known as Cisco cables, rollover cables and management cables — are
designed for a specific purpose. They connect Cisco networking devices to terminals or PCs for
configuration. Typically the Cisco end will connect via RJ45, and the terminal end will conclude
in a serial connection. What matters most about console cables is the specific nature of the
connection. This is not an Ethernet or networking connection. It is a terminal connection, and
its purpose is to enable the connected computer to configure the networking device. This is
true for older Cisco equipment and brand-new devices. Configuration is performed through the
serial connection.

Ambo University
Department Of Computer Science
23
INTERNSHIP REPORT ON ASTU 2023

Figure 1.14 console cable

E. Ethernet cable connectors

The RJ45, Registered Jack 45 connector is used almost universally as the physical connector
used on Ethernet cables, and with networking cables in general. From Ethernet Category 3 right
through to Cat 6, the RJ45 is the format that is used. Cat 7 Ethernet cables can be terminated
with RJ45 connectors but specialized versions called GigaGate45 (GG45) are often used.
Fortunately these are backwards compatible with the RJ45 so there is no need to have a
completely new installation when migrating to Cat 7.

Figure 1.15 RJ 45
Ambo University
Department Of Computer Science
24
INTERNSHIP REPORT ON ASTU 2023
Pin Number Designations

There are pin number designations for each color in T-568B

Pin Color Pin Name


1 Orange stripe TX+
2 Orange TX-
3 Green stripe RX+
4 Blue Not used
5 Blue stripe Not used
6 Green RX-
7 Brown stripe Not used
8 Brown Not used

Table 1.4 Pin Number in T-568B

There are pin number designations for each color in T-568A

Pin Color Pin Name


1 Green stripe RX+
2 Green RX-
3 Orange stripe TX+
4 Blue Not used
5 Blue stripe Not used
6 Orange TX-
7 Brown stripe Not used
8 Brown Not used
Table 1.5 pin number T-568A

Ambo University
Department Of Computer Science
25
INTERNSHIP REPORT ON ASTU 2023
1.9.3 Software Applications
A. Cisco Packet Tracer

Cisco Packet Tracer is a simulation program used by Cisco to configure the necessary
configurations before installing Router, Switch, Hub, or Security Devices on a real network.

Cisco Packet Tracer does not include only Cisco branded devices. You can find many network
devices on the Packet Tracer.

Packet Tracer provides simulation, visualization, authoring, assessment, and collaboration


capabilities to facilitate the teaching and learning of complex technology concepts.

Figure 1.16 cisco packet tracers

B. Tera Term:

Tera Term is a terminal emulation program. This program allows you to access the terminal
output of the switch. It also allows you to configure the switch.

Ambo University
Department Of Computer Science
26
INTERNSHIP REPORT ON ASTU 2023

Figure 1.17 Tera term

1.9.4 Installation Tools


These are hardware materials that we used to install a network in a particular area. Installation
tools make the network installation easier and manageable.

A. Crimper: A crimping tool is a device used to conjoin two pieces of metal by deforming one
or both of them to hold each other. The result of the tool's work is called a crimp. An
example of crimping is affixing a connector to the end of a cable. For instance, network
cables and phone cables are created using a crimping tool (shown below) to join RJ-45 and
RJ-11 connectors to both ends of phone or Cat 5 cable.

Ambo University
Department Of Computer Science
27
INTERNSHIP REPORT ON ASTU 2023
Figure 1.20 Crimper

B. Puncher: A punch down tool, also called a krone tool, is a hand tool used to connect
telecommunications and network wires to a patch panel, punch down block, keystone
module, or surface mount box. The "punch down" part of the name comes from punching a
wire into place using an impact action. It consists of a handle, a spring mechanism, and a
removable slotted blade. When the punch down tool connects a wire the blade cuts off the
excess wire.

Figure 1.21 puncher

C. Trunk: Cable trunking is installed as a protective routing and covering system for electrical
cables and wires which prevents accidental damage. Trunking is installed onto a wall or
surface as opposed to within it and is also a great way of hiding unsightly wiring from view.
It's typically offered in a variety of materials although plastic trunking is the most common
and there are also various widths and sizes available to suit many locations and
requirements.

Network trunking is often manufactured with a slide and hinge system which allows easy access
to the ducting once installed for ease of maintenance.

Ambo University
Department Of Computer Science
28
INTERNSHIP REPORT ON ASTU 2023

Figure 1.22 Trunks

D. Driller: Driller is a device that uses a drill bit to cut a hole of circular cross-section in solid
materials. The drill bit is usually a rotary cutting tool, often multi-point. The bit is pressed
against the work-piece and rotated at rates from hundreds to thousands of revolutions per
minute. This forces the cutting edge against the work-piece, cutting off chips (swarf) from
the hole as it is drilled.

Figure 1.23 Drilling Machine

E. Screw Driver: A screwdriver is an essential in any toolkit, used to manually drive screws
into a variety of surfaces such as walls, wood, metal or porcelain.

Ambo University
Department Of Computer Science
29
INTERNSHIP REPORT ON ASTU 2023

Figure 1.24 Screw Drivers

F. Screw and Fischer: Screws are generally used to fasten materials by the engagement of the
screw thread with a similar female thread in the matching part. In other hand fishers
ensures a fast bite. This makes installation simple and safe.

Figure 1.25 Screw & Screw Fisher


G. Stripper and wire cutter: Wire strippers are used to remove the insulation from electric
wires in order to make contact. There are two primary types: manual and automatic

Figure 1.26 Cutting & Stripping tool

Ambo University
Department Of Computer Science
30
INTERNSHIP REPORT ON ASTU 2023
H. Keystone Jack: Is a standardized snap-in package for mounting a variety of low-voltage
electrical jacks or optical connectors into a keystone wall plate, surface mount box or patch
panel. Sometimes, this device is known as RJ45 Female.

Figure 43: Keystone jack


I. Tester: is an electronic material that checks cable arrangement.

We used this networking tool for:

 To test whether a given Ethernet cable is working or not and


 To test whether a given Ethernet node is working or not.
 To identify the arrangement of the network media/Cable.

Ambo University
Department Of Computer Science
31
INTERNSHIP REPORT ON ASTU 2023
Fig 1.27 Testers

1.9.5 Container Tools


These are network tools that help to arrange and manage different network devices into one.
Container tools are very useful in network environment with their grater management
advantage and effective way of structuring devices. The following are container tools that we
used in our internship training.

A. Patch panel

A patch panel is a piece of hardware with multiple ports that helps organize a group of cables.
Each of these ports contains a wire that goes to a different location. Patch panels can be quite
small, with just a few ports, or very large, with many hundreds of ports. They can also be set up
for fiber optic cables, cat5 cables, RJ45 cables, and many others.

What is a Patch Panel Used for?

Patch panels connect various IT devices together. They are in many different environments
including communications closets, telephone company central offices, and data centers.
Understanding the role they play can help to determine if your facility requires a patch panel,
and if so, how to set it up. Each port in a patch panel goes to a different device somewhere in
the facility. Each panel bundles all the connections together in order to connect to another
network. This is often how a LAN connects to a WAN, or to the Internet. Patch panels are also
commonly used in facilities with a lot of telephone lines, in which one mainline is used for all
phones.

Ambo University
Department Of Computer Science
32
INTERNSHIP REPORT ON ASTU 2023

Figure 1.28 patch panel


B. Racks: Rack is a supporting framework that holds hardware modules. In ICT context racks
typically contain servers, hard disk drives and other computing equipment, Racks make it
possible to contain a lot of equipment in small physical foot print without requiring shelving

Figure 1.29: rack

1.9. Limitation of the Project/Report


The following limitations were encountered during the internship

 Lack of full resource such as personal computer, money.


 Lack of time for doing more and more

Ambo University
Department Of Computer Science
33
INTERNSHIP REPORT ON ASTU 2023
 Lack of material like cable,RJ45
 Shortage of time

1.10. Constraints and recommendations


During the development of small or wide project there may be expected some problems/obstacles.
We face some problems starting from group arrangement to final during the development of the new
system

Business Constraints: our project is limited on resources, time and costs; actually the cost is
our effort we during performing the project. The time schedule also one of the business
constraints which limits our project functioning of working. We must submit at the time
schedule that the given time of deadline.
Cost: To develop an approximation of a project cost depends on several variables including:
resources, work packages such as labor rates and mitigating or controlling influencing
factors that create cost variances.
Time constraint: The project is supposed to be complete in few months. This can be
handled by having a project management schedule
Scope: Due to changes to system structure or organization policies.
Skill constraints: we have a skill constraint because we have not enough knowledge on
networking.

Chapter 2

Project work

2.1 Methodology
Mainly follow the following methodologies to accomplish the project work:

Ambo University
Department Of Computer Science
34
INTERNSHIP REPORT ON ASTU 2023
 Drag and drop the material that we want to design.
 connect them by appropriate cables
 Configure each material that we use and name it
 And implement it in Cisco Packet Tracer application. Then understanding the result and
conclude.

In the first configuration task, the workplace supervisor gave us to study basic network
configuration commands. These basic commands can help us to analyze and troubleshoot
various networking issues that might occur. They also offer a certain amount of configurative
ability, as well as the ability to create performance baselines. These commands usually used in
windows command promote and several simulation tools like packet tracer.

i. Ipconfig: displays detail configuration information, it can also be used to make basic
configuration changes and reset certain facets of DHCP and DNS
ii. nslookup: used to get the IP address of specific domain name
iii. Ping: is used to test connectivity to other hosts; here, command-line results tell you
whether a remote host is “alive” on the network.
iv. . Tracert: traceroute and tracert are computer network diagnostic commands for
displaying the route (path) and measuring transit delays of packets across an Internet
protocol (IP) network.

Route between the modes respectively

 User exec mode Limited to basic monitoring commands


 Privileged exec mode Provides access to all other router commands
 Global configuration mode Commands that affect the entire system
Switch>enable……………. // user exec-mode
Switch#config terminal…. // Privilege mode
Switch(config)#..................// global mode

Ambo University
Department Of Computer Science
35
INTERNSHIP REPORT ON ASTU 2023
2.1 Technical tasks/products
Design works

Performing an Initial Switch Configuration

step1, Click on cisco packet tracer app software

step2, file

step3, New

step4, drag and drop the equipment that we want

Figure 3.1Initial Switch Configuration Topology


Ambo University
Department Of Computer Science
36
INTERNSHIP REPORT ON ASTU 2023
Background / Preparation

In this activity, we configure these settings on the customer Cisco Catalyst 2960 switch:

 Host name
 Console password
 vty password
 Privileged EXEC mode password
 Privileged EXEC mode secret
 IP address on VLAN1 interface
 Default gateway

Note: Not all commands are graded by Packet Tracer.

Step 1: Configure the switch host name.

a. From the Customer PC, use a console cable and terminal emulation software to connect
to the console of the customer Cisco Catalyst 2960 switch.
b. Set the host name on the switch to CustomerSwitch using these commands.
Switch>enable
Switch# configure terminal
Switch(config)#hostname CustomerSwitch

Step 2: Configure the privileged mode password and secret.

a. From global configuration mode, configure the password as cisco.


CustomerSwitch(config)#enable password cisco
b. From global configuration mode, configure the secret as cisco123.
CustomerSwitch(config)#enable secret cisco123

Step 3: Configure the console password.

Ambo University
Department Of Computer Science
37
INTERNSHIP REPORT ON ASTU 2023
a. From global configuration mode, switch to configuration mode to configure the console
line.
CustomerSwitch(config)#line console 0
b. From line configuration mode, set the password to cisco and require the password to be
entered at login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 4: Configure the vty password.

a. From global configuration mode, switch to the configuration mode for the vty lines 0
through 15.
CustomerSwitch(config)#line vty 0 15
b. From line configuration mode, set the password to cisco and require the password to be

entered at login.
CustomerSwitch(config-line)#password cisco
CustomerSwitch(config-line)#login
CustomerSwitch(config-line)#exit

Step 5: Configure an IP address on interface VLAN1.

From global configuration mode, switch to interface configuration mode for VLAN1, and assign
the IP address 192.168.1.5 with the subnet mask of 255.255.255.0.

CustomerSwitch(config)#interface vlan 1
CustomerSwitch(config-if)#ip address 192.168.1.5 255.255.255.0
CustomerSwitch(config-if)#no shutdown CustomerSwitch(config-if)#exit

Step 6: Configure the default gateway.

Ambo University
Department Of Computer Science
38
INTERNSHIP REPORT ON ASTU 2023
a. From global configuration mode, assign the default gateway to 192.168.1.1.
CustomerSwitch(config)#ip default-gateway 192.168.1.1b.
Click the Check Results button at the bottom of this instruction window to check your
work.

Step 7: Verify the configuration.

The Customer Switch should now be able to ping the ISP Server at 209.165.201.10. The first one
or two pings may fail while ARP converges.

CustomerSwitch(config)#end
CustomerSwitch#ping 209.165.201.10

Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 209.165.201.10, timeout is
2 seconds: ..!!!

Success rate is 60 percent (3/5), round-trip min/avg/max = 181/189/197 ms

Performing an Initial Router Configuration

Figure 3.2Initial Router Configuration Topology

Objectives

Ambo University
Department Of Computer Science
39
INTERNSHIP REPORT ON ASTU 2023
 Configure the router host name.
 Configure passwords.
 Configure banner messages.
 Verify the router configuration.

Background / Preparation

In this activity, we use the Cisco IOS CLI to apply an initial configuration to a router, including
host name, passwords, a message-of-the-day (MOTD) banner, and other basic settings.

Note: Some of the steps are not graded by Packet Tracer.

Step 1: Configure the router host name.

a. On Customer PC, use the terminal emulation software to connect to the console of the
customer Cisco 1841 ISR.
Set the host name on the router to CustomerRouter by using these commands.
Router>enable
Router#configure terminal
Router(config)#hostname CustomerRouter

Step 2: Configure the privileged mode and secret passwords.

a. In global configuration mode, set the password to cisco.


CustomerRouter(config)#enable password cisco Set an encrypted privileged password to
cisco123 using the secret command.
CustomerRouter(config)#enable secret cisco123

Step 3: Configure the console password.

a. In global configuration mode, switch to line configuration mode to specify the console line.
CustomerRouter(config)#line console 0

Ambo University
Department Of Computer Science
40
INTERNSHIP REPORT ON ASTU 2023
Set the password to cisco123, require that the password be entered at login, and then
exit line configuration mode.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 4: Configure the vty password to allow Telnet access to the router.

a. In global configuration mode, switch to line configuration mode to specify the vty lines.
CustomerRouter(config)#line vty 0 4
Set the password to cisco123, require that the password be entered at login, exit line
configuration mode, and then exit the configuration session.
CustomerRouter(config-line)#password cisco123
CustomerRouter(config-line)#login
CustomerRouter(config-line)#exit
CustomerRouter(config)#

Step 5: Configure password encryption, a MOTD banner, and turn off domain server lookup.

a. Currently, the line passwords and the enable password are shown in clear text when you
show the running configuration.
Verify this now by entering the show running-config command.
To avoid the security risk of someone looking over your shoulder and reading the
passwords, encrypt all clear text passwords.

CustomerRouter(config)#service password-encryption Use the show running-config command


again to verify that the passwords are encrypted. To provide a CustomerRouter(config)#banner
motd $Authorized Access Only!$Test the banner and passwords.

Ambo University
Department Of Computer Science
41
INTERNSHIP REPORT ON ASTU 2023
Log out of the router by typing the exit command twice. The banner displays before the prompt
for a password. Enter the password to log back into the router. You may have noticed that
when you enter a command incorrectly at the user or privileged EXEC prompt, the router
pauses while trying to locate an IP address for the mistyped word you entered. For example,
this output shows what happens when the enable command is mistyped.

CustomerRouter>enable

Translating "enable"...domain server (255.255.255.255)

To prevent this from happening, use the following command to stop all DNS lookups from the
router CLI.

CustomerRouter(config)#no ip domain-lookup Save the running configuration to the startup


configuration.

CustomerRouter(config)#end

CustomerRouter#copy run start

Step 6: Verify the configuration.

a. Log out of your terminal session with the Cisco 1841 customer router.
b. Log in to the Cisco 1841 Customer Router. Enter the console password when prompted.
c. Navigate to privileged EXEC mode. Enter the privileged EXEC password when prompted.
d. Click the Check Results button at the bottom of this instruction window to check your
work.

Configuring WEP on a Wireless Router

Ambo University
Department Of Computer Science
42
INTERNSHIP REPORT ON ASTU 2023

Figure 3.3 WEP on a Wireless Router Topology

Objectives

 Configure WEP security between a workstation and a Linksys wireless router.

Background / Preparation

We might have been asked to go back to a business customer and install a new Linksys wireless
router for the customer office. The company has some new personnel who will be using
wireless computers to save money on adding additional wired connections to the building. The
business is concerned about the security of the network because they have financial and highly
classified data being transmitted over the network.

Our job is to configure the security on the router to protect the data. In this activity, we will
configure WEP security on both a Linksys wireless router and a workstation.

Step 1: Configure the Linksys wireless router to require WEP.

Ambo University
Department Of Computer Science
43
INTERNSHIP REPORT ON ASTU 2023
a. Click the Customer Wireless Router icon. Then, click the GUI tab to access the router
web management interface.
b. Click the Wireless menu option and change the Network Name (SSID) from Default to
CustomerWireless. Leave the other settings with their default options.
c. Click the Save Settings button at the bottom of the Basic Wireless Settings window.
d. Click the Wireless Security submenu under the Wireless menu to display the current
wireless security parameters.
e. From the Security Mode drop-down menu, select WEP.
f. In the Key1 text box, type 1a2b3c4d5e. This will be the new WEP pre-shared key to
access the wireless network.
g. Click the Save Settings button at the bottom of the Wireless Security window .

Step 2: Configure WEP on the customer wireless workstation.

a. Click the Customer Wireless Workstation.


b. Click the Config tab.
c. Click the Wireless button to display the current wireless configuration settings on the
workstation.
d. Change the SSID to CustomerWireless.
e. Change the Security Mode to WEP. Enter 1a2b3c4d5e in the Key text box, and then
close the window.

Step 3: Verify the configuration.

After we configure the correct WEP key and SSID on the customer wireless workstation, notice
that there is a wireless connection between the workstation and the wireless router.

a. Click the Customer Wireless Workstation.


b. Click the Desktop tab to view the applications that are available.
c. Click on the Command Prompt application to bring up the command prompt.
d. Type ipconfig /all and press Enter to view the current network configuration settings.
Ambo University
Department Of Computer Science
44
INTERNSHIP REPORT ON ASTU 2023
e. Type ping 192.168.2.1 to verify connectivity to the LAN interface of the customer
wireless router.
f. Close the command prompt window.
g. Open a web browser.
h. In the address bar of the web browser window, type http://192.168.1.10. Press Enter.
The Intranet web page that is running on the customer server appears. You have just
verified that the customer wireless workstation has connectivity to the rest of the
customer network.
i. Click the Check Results button at the bottom of this instruction window to check your
work.

Visit of ASTU data center

We have observed ASTU data center by Mr. Addisu Endale (System admin), gives us clear
explanation about the data center facilities of the campus. To relate theoretical what we
understand about networking into reality, we visit ASTU data center, different networking
devices and logical design of currently used in ASTU LAN Data centers are simply centralized
locations where computing and networking equipment is concentrated for the purpose of
collecting, storing, processing, distributing or allowing access to large amounts of data.

ASTU data center is also the place where overall information’s and data in the university is
stored. This data center is found in ASTU next to women library in ICT directorate, data centers
constructed by separating the power house and data center in different houses. The building
structure of this data center is also different from other rooms buildings.

Inside the main room there is labeled floor which is 60cm above the ground for the purpose of
installing wire and protective devices. Inside the data center like fire alarm sensor which is used
to detect and warn people through visual and audio appliances when smoke, fire or other
emergencies are present in the room. These alarms may be activated automatically from smoke
or heat sensor and also the house contain Air conditioning (AC) used to regulates the

Ambo University
Department Of Computer Science
45
INTERNSHIP REPORT ON ASTU 2023
temperature and humidity. In side Power system room, there is an electric wire which comes
from Ethiopia Electric line power Agency and there is also another data cable comes from
Ethiopia telecommunication corporation as internet service provider for ASTU.

ASTU data center network structure start from the firewall, next to the firewall there is a core
switch, this core transmit networks into five different distributed switch, those five distribute
switch also transfer for access switch witch located in ASTU.

Different device I see in ASTU data center

As shown below the rack is contain different server like,

1 VERTUAL(ESXI) SERVER:

3 WEB_SERVER

2 E-LEARNING_SERVER

4 ETHERNET SERVE

Remotely Access and Manage System

During our internship period we gained technical knowledge about how to access and manage
different networking device and system.

Telnet and SSH are network protocols used to remotely access and manage systems. Although
both tools are similar, there are some differences with each protocol as we learned. we also
learn the key difference between the two protocols.

What is Telnet?

Telnet, which stands for Telecommunications and Networks, is a TCP/IP protocol that allows a
user to establish a remote connection to a system in a way that makes it appear as a local
system via the command line. This protocol is typically used by network administrators to

Ambo University
Department Of Computer Science
46
INTERNSHIP REPORT ON ASTU 2023
access and manage devices remotely. Telnet only supports known port numbers and not
dynamic ports.

How Does Telnet Work?

We can remotely connect to a server by entering the following Telnet into the command line:
telnet hostname (Note: we may also use an IP address instead of the hostname) Once
connected to the server, we can execute commands on the server using specific Telnet
commands.

Operation

Telnet uses TCP port 23 and operates best with LANs (local area networks)

Authentication

Telnet sends data including usernames and passwords over the network in plain text making it
highly vulnerable. It is possible to add security to Telnet such as using Kerberos which would aid
with authentication and encryption.

Suitability of Network

Telnet works with a private network.

Vulnerabilities

Since Telnet transmits data in clear text, it is vulnerable to man-in-the-middle attacks allowing
hackers to retrieve the username and passwords of admin accounts and read the data that is
being transmitted over the network. Obtaining these credentials allows hackers to gain access
to admin accounts which would give them more access to do whatever they want.

Due to the many vulnerabilities that Telnet faces, with packet sniffing being one of them, SSH
was developed to resolve these issues and more.

Ambo University
Department Of Computer Science
47
INTERNSHIP REPORT ON ASTU 2023
When Should We Use Telnet?

Since Telnet is not secure and sends data in clear text, it is rarely used today, however, there
are two cases when it may be recommended to use Telnet instead of SSH:

 If you are working with devices that do not support SSH


 When you work on a trusted network (LAN) that is not connected to the Internet

What is SSH?

SSH, which stands for Secure Shell, is an open-source network protocol used to access and
manage devices remotely via a program. It helps us log into another system over a network and
allows us to execute commands in the remote system. Once logged in, we also have the ability
to move files from one system to another, and deliver software updates and patches to
multiple systems.

How Does SSH Work?

We can connect to a remote server with the following command:

ssh username@SSHserver.example.com (Note: Replace SSHserver.example.com with the


appropriate hostname or IP address)

This command will attempt to connect to the server named server.example.com using the user,
username. Note that if it is the first time we are connecting with the server; the remote host’s
public key fingerprint will be shown and will ask if we want to establish a connection. The
screenshot below is an example of the prompt that will appear on our screen if it's the first time
establishing a connection with the server.

Ambo University
Department Of Computer Science
48
INTERNSHIP REPORT ON ASTU 2023

Figure 3.4 screen that appear first when connection with the server

We can either type out the word yes or hit the enter key on your keyboard to initiate the
session. After you answer the prompt, we now have access to the server.

Operation

SSH uses TCP port 22 by default but we can change the port number.

Authentication

There are two ways to authenticate with SSH:

Username and password

Public/private key pair

SSH uses encryption, specifically public key encryption meaning it uses two separate keys: a
public key and a private key. When data is encrypted with the public key, it can only be
decrypted with a private key and vice versa.

Suitability of Network

SSH works with a public network.

Vulnerabilities

SSH are vulnerable to brute force/dictionary attacks as hackers and here is what can be done
to prevent such attacks:

Ambo University
Department Of Computer Science
49
INTERNSHIP REPORT ON ASTU 2023
Disable SSH when it is not in use

Disabling root access is a good security practice which means we should log in as a no privilege
user and escalate privileges as needed

When and Why Should We Use SSH?

SSH is very secure and should therefore be used whenever we want to connect to a remote
system. SSH protects user identities, passwords, and data from any snooping attacks and
ensures confidentiality and anonymity on unsecured networks.

What is the Key Difference between Telnet and SSH?

The key difference between Telnet and SSH is that SSH uses encryption meaning all data
transmitted over the network is protected from eavesdropping. This makes it extremely difficult
for hackers to decrypt and read the data being exchanged between the client and server .

Final Thoughts: Difference between Telnet and SSH

Although Telnet and SSH are both network protocols that can be used to access and manage
devices remotely, the SSH protocol is the better option. I hope that you now have a better
understanding of what Telnet and SSH are. It is important to remember that the major
difference between Telnet and SSH is that SSH encrypts traffic in both directions, meaning all
data including usernames and passwords.

2.3. Key functions/activities of the department


The ASTU-ICT Directorate department play a vital role in ASTU . Nowadays our live is
connected and depend on technology so as the University function most of the project from
ASTU-ICT Directorate.

The department key functions are

Ambo University
Department Of Computer Science
50
INTERNSHIP REPORT ON ASTU 2023
 Install network in the university
 Switch configuration
 Router configuration
 Repairing old and unworked cables
 Control all network of university

2.4. Assignments and responsibilities of the students


Assignment that we have taken during the internship period

During this internship program in addition of practical work and office work we also gave the
assignment by our mentor.

This assignment gives more knowledge about networking, cabling, trucking, subnneting, and
it give more knowledge about basics of Networking.

Responsibilities that we have taken during the internship period

During our internship program we were allowed to have an office in Adama science and
technology university main campus, and we have the responsibilities to protect and keep safe
office material.

And also our team members allow us to access different network device, such as switch,
wireless access point, different network cable and gave us a freedom to use those device as we
wanted. In this case we also have the responsibilities to keep safe those devices.

Another responsibilities that we have taken during our internship program was sometimes
some of our teams member are absent from site work, in this time we have the responsibilities
to cover the absence of our team member to complete the work at time .

Ambo University
Department Of Computer Science
51
INTERNSHIP REPORT ON ASTU 2023
2.5. Assigned routine duties at the technical department
During our internship training we were part of several activities assigned by the company
supervisor. These activities helped us to improve my skills in installation and working in
different networking sector. Each task assigned by the supervisor has different procedures and
methods to complete in proper manner.

Technical Aspect of the Internship

In today's world, network access has become one of the most important instruments for
sustaining communications, particularly at home and at work, in order to make things much
easier. A network is a collection of computers or a collection of smaller networks that are linked
by various techniques so that they may communicate with one another. In Adama Science and
Technology University my internship program was concerned on Networking Structure of the
University. The main technical aspect of this program is to study about different type of
networking device, Configuration technique, and installation of Networking Cable.

2.6 Evaluation of the attachment report period

2.6.1. Benefits of the attachment exercise


Internships provide we an opportunity to link theory with practice to see the capacity how
we can make a solution for real world problem to develop both our practical and theoretical
knowledge. The internship program allows us an opportunity to understand the unique
environmental conditions associated with a particular level of government such as a regional

Generally the benefits we gained from the internship is as follows

 Practical skill
 Upgrading theoretical knowledge
 Improving industrial problem-solving capability

Ambo University
Department Of Computer Science
52
INTERNSHIP REPORT ON ASTU 2023
 Time management
 Team playing skills
 Leadership skills
 Understanding about work ethics, industrial psychology and related issues
 In term of gaining entrepreneurship skill
 Interpersonal communication skills
 Work ethics and related issues
 entrepreneurship skill

2.6.2. Achievements during the attachment exercise


Achievements included System and Personal achievements.

 This project enabled us to apply most of the concepts we have learnt.


 We were also able to gain experience in using many software e.g., Tera term, packet
tracer,
 We were able to learn networking and its configuration and this helped us to grow as a
network designer and analyst.
 We gained experience in using network simulation software e.g., packet tracer, cisco iOS
command

2.7. Knowledge and skills/ learning experience acquired

2.7.1. Socially
A. Interpersonal Communication Skills

One of the important things we have found from our internship experience is that we have
improved our personal communication skills; from the trainings our mentors gave us how to
develop the skills of communication with our fellow associates.

Ambo University
Department Of Computer Science
53
INTERNSHIP REPORT ON ASTU 2023
B. Team Playing Skills

This skill was not that much difficult to adapt since we have already done some projects
and assignments as a team in the past four years of university stay. The additional skills we
learned through the internship are that the knowledge of a team is stronger and more effective
than individual person’s effort. Again, we learned the importance of sharing information and
knowledge between the team.

C. Entrepreneurship skill
Above all this internship has thought as the entrepreneurship skills; working
environment had been a good starting place to enhance our entrepreneur capabilities.
Indeed, we learned a lot on improving criteria.

2.7.2 Personally
A. Leadership Skills

The internship was an important experience to practice the assets of leadership; we got the
access to know more about leadership. In doing our project we were able to improve our self-
confidence as we had the willingness and inspiration to face any difficulty in the project; this
helped us to grow emotionally to learn from our failure and success; this in turn, gave us the
chance to learn about project management, the technical approach methodology of a project.
Above all we have grasp leadership skills such as self-confidence, accountability, decision
making and so on.

B. Work Ethics

In our internship period we understood that ethics is one of the valuable resources a
person can have in the real world; understanding this fact we tried to get closer to others in
more ethical way so that we can be more beneficiary from them. In our internship period we
have developed both our personal and professional ethics; the former being related with how

Ambo University
Department Of Computer Science
54
INTERNSHIP REPORT ON ASTU 2023
we should act towards other people while the other related to the ethics we have to acquire
certain tasks done.

2.7.3 Professionally
In this period we have develop many different technical skill, those are
 Performing initial switch configuration
 Performing initial router configuration
 Performing initial wire-less configuration

 Crimping Ethernet cable.


 Installing Network Cable

2.8 Contributions
We have our own contribution on our internship program on ASTU.

Those roles that we contributed are listed below.

 We helped network installation team during cable installation in the university


management by truncking the wall and moving network materials.
 We also helped network installation team during cable installation in the university
department by truncking the wall.
 We solved network failure in the university community building.
 We helped network administration during some network troubleshooting time.
 We also participated in network configuration in small office with the workplace
supervisor.
 Prepare Ethernet cable.

 Crimping UTP cable.


 Installing network cable.
 Cover absent team member role.
 Keep safe network device.
Ambo University
Department Of Computer Science
55
INTERNSHIP REPORT ON ASTU 2023
 Troubleshoot different network errors around the office.

2.9. Challenges encountered during the project/training


activities period
There are many challenges occur during Internship

 It took a lot of time to learn again network configuration and design Shortage of devices during
implementation
 A lot of errors were encountered during the development of the system.
 A lot of errors and misconfiguration were encountered during the development of the system
and the network.

 Coming up with appropriate design for our project


 Challenges in learning new network configuration of the different devices involved
 The challenge interrupt during practices those challenges are financial problem.
 Shortage of staffs to guide us. , Shortage of time to cover all things.
 The most mandatory challenges that is occurred during internships is lack of time to
show all activities because of they Generally, we have good feeling about internship

2.10. How you cope-up with the challenges


To overcome the above challenges we have studied hard day and night using the resources
from the internet and from the networking manager, Maintenance Manager and we would like
to thank our supervisor especially Miss Victoria for her extreme support and the main reason
we overcome our challenge is that we work together as a team.

Ambo University
Department Of Computer Science
56
INTERNSHIP REPORT ON ASTU 2023
Chapter 3

Conclusion and Recommendation

3.1. Conclusion
In general, this internship program provides us with the opportunity to not only work with
the ASTU ICT Directorate, but also to learn from excellent professionals. We’d want to express
our gratitude to the ASTU ICT Directorate for presenting us to this fantastic opportunity.

We have improved both our theoretical and practical self-skills. We also train and educate
ourselves. That anything having to do with information and communication technology is a
talent rather than knowledge. Theory that emerged from conducting practical work like this
during the internship term

Comments on what we experienced in this apparent ship

 This internship has taught me how to be punctual in our work.


 This internship also teaches responsibility for each task.
 We have gained more practical knowledge in addition to theoretical understanding.
 We may simply learn how to communicate with employees from them.

Comments on level of satisfaction: -

We were satisfied with this organization for a variety of reasons, including the fact that all
employees or workers treated each other with respect, took the initiative to teach us anything
we didn't understand, offered us their time, and generally sought to assist us.

Comments on the supervisor

Ambo University
Department Of Computer Science
57
INTERNSHIP REPORT ON ASTU 2023
All of the workers were pleasant and eager to teach us what they knew, but in our opinion,
the students that accepted this internship should gain a wealth of information and be
willing to devote their time to teaching us what we needed to know, and they should be
honest with their students.

The company has recognized that internship students lack knowledge of what appears to
be a working environment as well as practical work, so employees or advisors have an
obligation to teach us the practical work in greater depth than the theoretical work, so
they must pay more attention to their students and attempt to teach everything.

Because the company has sophisticated equipment and also a working space, it has the
possibility to accommodate future internship students. As a result, the company must plan
placement for future students without any requirements.

3.2 Summary and Conclusion


In general, this internship program gives me a chance not only to work with ASTU ICT
Directorate but also a chance to learn from the good experts. We would like to thank ASTU ICT
Directorate, for introducing us to this great opportunity in which we have developed our self-
skills both theoretical and practical. We also train and learn that anything related to
information communication technology is skill, rather than theory which developed in doing
practical like this in internship period. Finally, from this internship period in addition to formal
academic knowledge, we was able to get the general experience in every other aspects of life;
this experience was unforgettable and we believe it shaped our personality and behavior by
helping us to be optimistic in our future tasks, to be stronger to overcome challenges and be
successful, to develop critical thinking ability and problem-solving skills.

3.3. Recommendation
As a member of the ASTU ICT Directorate from what we observed we recommended the
followings main points for directorates
Ambo University
Department Of Computer Science
58
INTERNSHIP REPORT ON ASTU 2023
 Even if ASTU ICT Directorate is try their best, the demand of ASTU community for Internet
access is not answered. We hear many complain from employ in office and students when
we gather the Ethernet port of the blocks.
However, we see in some offices there is many ports but not used, so give it for other
office.

 Also, there is many Ethernet ports damaged in both ASTU Libraries and old buildings like,
Administration, Registrar and college of Social and Natural science so repair these ports and
open other interface for users.

Reference
[1 Ambo University Hachalu Hudesa Campus Guidelines for Writing an Internship Report

[2] Internet

[3] CCNA and HCNA routing and switching study guide

4] Tutorials Point Web Page

[5]CISCO Packet, Magazine.

[6]Adama Science and Technology University

Ambo University
Department Of Computer Science
59

You might also like