Intern Final

Download as pdf or txt
Download as pdf or txt
You are on page 1of 61

BAHIR DAR UNIVERSITY

BAHIR DAR INSTITUTE OF TECHNOLOGY (BiT)


FACULITY OF ELECTRICAL AND
COMPUTER ENGINEERING
DEPARTMENET: COMPUTER ENGINEERING

COMPUTER ENGINEERING DEPARTMENT

HOSTING COMPANY: HAWASSA UNIVERSITY ICTD

DURATION: Jun 1 – Oct 10 (2014)

Elias worku 1103141

INTERNSHIP REPORT

DURATION DATE: ---------------------------

Mentor: Mr. Yesunh


Submission date ------------
Bahir dar ,Ethiopia
Declaration
I am a 4th year Computer Engineering student that I have undertaken our
internship experience in HAWASSA UNIVERSITY ICTD for a period of Four
months under the guidance of Mr. Asnake Tadele (company advisor) , and our
academic advisors Mr. Yesuneh.
I clarify that our work is original and compiled according to the internship report
writing guideline given by the Institute.
As the student academic advisors, I clarify that the internship prepared by the
student is original work and compiled according to the guideline provided by the
Institute office.

------------------------------------- ---------------------- -------------


Name of Student Date Signature

------------------------------------ ---------------------- -------------


Name of the Academic Advisor Date Signature

ii | P a g e
` Acknowledgment
First and foremost, praises and thanks to the God, the Almighty for his showers of
blessings throughout my time of working as an intern and preparation of this
document.

I would like to sincerely thank Hawassa University main campus ICTD for it was
voluntary to accept our request letter from Bahir Dar University Industrial Linkage
(UIL). Next I would like to explain our deepest respect for Mr. Asnake because of
their comment and knowledge share at field and in lab. Hence they qualify us to
know more on network installation and maintenance area.

I would like to extend my deepest gratitude for Mr. Yesuneh for fruitful advice and
on initiating me to do all projects and good advice, how to write my document,
directing the way how I shall work there and encouragement for whole work in the
organization which gives me a chance to believe in our self, point out my weakness
and step forward.

iii | P a g e
Contents
` Acknowledgment iii

List of Figures vi

List of Tables viii

List of Acronyms viii

Executive Summary ix

CHAPTER ONE 10

1. Historical Background of Hawassa University main campus 10

1.1 Brief History 10

1.2 Vision, Mission, Objectives and Core Values of Hawassa University 11

1.1.1 Vision of HU 11

1.1.2 Mission of HU 11

1.1.3 Objectives of HU 11

1.2.4 Core Values 12

1.3 National, Regional and/or International Collaboration of Hawassa University 12

1.4.1 Local Partnerships and Collaborations 13

1.4.2 List of Partnerships with Industry per Type and Duration 13

1.5 The overall organization structure and work flows of The Company 14

CHAPTER TWO 2. Over All Internship experience 16

2.1 Objective of the Internship 16

2.1.1 General objective 16

2.1.2 Specific objective 16

2.2 How I did get the Company 16

2.3 The Section of the HU ICTD Office network and ICT Infrastructure Team We have been
working 17

2.4 The work flow in the section looks like 17

2.5. The task I have executed in the section 18

iv | P a g e
2.5.1 Network installation and maintenance 20

2.5.2 Installation of security camera 22

2.6 Procedures we have been using while performing our work tasks 35

2.7 How good we have been in performing our work tasks 36

2.8 The challenges we have been facing while performing our work task? 36

2.9 The measures we have taken in order to overcome our work task 36

Chapter Three 38

Internship project 38

3.1 Project title 38

3.2 Introduction 38

3.3 Summary of the project 38

3.4 Problem statement 39

3.5 Objective 39

3.5.2 Specific objective 40

3.6 Scope of the Project 40

3.7 Contributions of the Project 40

3.8 Methodology 40

3.9 DESIGN MODEL 42

3.10 Network requirements 44

3.11 Software and Hardware requirement 44

3.11.1 Software requirement 44

3.11.2 Hardware requirement 44

3.12 Theoretical design and Implementation 45

3.12.1 Theoretical design 45

3.12.2 Implementation and configuration 48

Chapter four 53

Benefits we gained from Internship 53


v|Page
4.1 What we gained in terms of improving our practical skills 53

4.2 In terms of upgrading theoretical knowledge 53

4.3 In terms of improving interpersonal communication skills 54

4.4 In terms of improving team playing skills 54

4.5 In terms of improving leadership skills 55

4.6 In terms of understanding about work ethics related issues 56

4.8 In terms of entrepreneurship skills 56

Chapter Five Conclusion and recommendation 58

5.1 Conclusions 58

5.2 Recommendation 58

5.2.1. Recommendation for the company 58

5.2.2 Recommendation for the school 59

5.2.3 Recommendation for Industrial Linkage 59

References: 61

List of Figures
Fig 1 1 structure of company .................................................................................................................... 14
Fig 1 2 structure of company..................................................................................................................... 14
Fig 1 3 structure of company..................................................................................................................... 15

Fig 2 1 structure of ICT Directorate ........................................................................................................ 18


Fig 2 2 wall outlet and LAN ...................................................................................................................... 19
Fig 2 3 Visiting and Observation of datacenter ....................................................................................... 20
Fig 2 4 teachers building 4th floor ............................................................................................................ 21
Fig 2 5 security camera that we installed ................................................................................................. 25
Fig 2 6 UTP 6e Cables ................................................................................................................................ 26
Fig 2 7 RJ-45 Plug ...................................................................................................................................... 26
Fig 2 8 Crossover color arrangement ....................................................................................................... 27

vi | P a g e
Fig 2 9 Straight through cable arrangement........................................................................................... 27
Fig 2 10 48 Port switch ............................................................................................................................... 29
Fig 2 11 PVC Trunks ................................................................................................................................. 29
Fig 2 12 Cable ties ...................................................................................................................................... 30
Fig 2 13 Screw drivers ............................................................................................................................... 30
Fig 2 14 Hack saw Fig 2 15 Drill ...................................................................................................... 31
Fig 2 16 Tester ............................................................................................................................................ 31
Fig 2 17 Crimper ....................................................................................................................................... 31
Fig 2 18 fiber optics cable .......................................................................................................................... 33
Fig 2 19 Patch Panels ................................................................................................................................. 34
Fig 2 20 Rack (Switch placement)............................................................................................................. 35

Fig 3. 1 Cisco’s PPDIOO methodology to network design ..................................................................... 41


Fig 3. 2 The chosen hierarchical model (3-tier architecture) ................................................................. 42
Fig 3. 3 network architecture diagram of company ................................................................................ 48
Fig 3. 4 assigning vlan for branch 4.......................................................................................................... 49
Fig 3. 5 DHCP configuration..................................................................................................................... 49
Fig 3. 6 FTP configuration ........................................................................................................................ 50

vii | P a g e
List of Tables
table 3 1 Configure steps of NAT ............................................................................................................. 51

List of Acronyms
HU Hawassa University
ACA Awassa College of Agriculture
ICTD Information Communication and Technology Development
ICT Information Communication and Technology
LAN Local Area Network
DNS Domain Name Server UTP- Unshielded Twisted Pair
IP internet protocol
OSI Open System Interconnection
DHCP Dynamic Host Configuration Protocol
HTTP Hyper-Text Transfer Protocol
POE Power over Ethernet
VLAN Virtual Local Area Network
UTP Unshielded Twisted Pair
UTP Unshielded Twisted Pair
FTP File Transfer Protocol
DNS Domain Name Server
RJ45 Registered jack
IP Internet protocol
NAT Network Address Translation
ISP Internet service provider
ULI University industry linkage

viii | P a g e
Executive Summary

Internship is one of the best experience any student can go through. It is the time where you get to
explore and see for yourself what the real world is like and try to figure out where you fit in it.
Thus, you learn how you can utilize the knowledge and skills that you learnt from school to be
valuable in this dynamic world. As being completely new to practical, startup world setting, every
hour spent working gave me some amount of experience all the time all of which cannot be
explained in words. But nevertheless, they were all useful for our future start up!

This internship report is based on the four months’ internship period I spent at HU ICTD. I
have worked under the supervision of our mentor Mr. Asnake. I worked under the ICTD section
of the company where I worked on the development of network and ICT Infrastructure.

My internship experience has been so priceless in equipping and helping me in refining most of
my skills and gaining new ones. Since, the main purpose of internship is to make students get a
glimpse of the real world work life and prepare themselves to be competent and ready to join the
workforce. Thus, I had a productive internship period in gaining the necessary knowledge
and have become proficient in completing my task. Overall, I can say that our internship is a
successful one in equipping me both technical and non-technical Knowledge’s and skills.

This report consists of five chapters. First chapter gives overview of HU, about its Background
and Structure. Second chapter discusses the task we have been preforming at HU ICTD. The Third
chapter includes all about our internship project, it’s about design of enterprise networking. In the
fourth chapter it describes benefits gained from internship program such as theoretical, practical
team playing skill, inter personal skill and leadership skills. The last chapter contains conclusions
and recommendation. I have briefly summarized what is expected in the next chapters in this
report. Generally I have tried to list general concepts during my internship
program.

ix | P a g e
CHAPTER ONE

1. Historical Background of Hawassa University main campus


1.1 Brief History
Hawassa University (HU) is one of the first-generation universities in Ethiopia whose
establishment was laid as Awassa College of Agriculture (ACA) in 1976 with the admission of
217 students. It was later restructured and promoted to a university in 2000, named “Debub
University” with the merger of ACA and two other colleges in southern Ethiopia: Wondogenet
College of Forestry and Natural Resources, established in 1978; and Dilla College of Teachers’
Education and Health Sciences, established in 1996. In 2006, it was renamed “Hawassa
University” with the addition of its main campus in Hawassa, and Dilla College of Teacher’s
Education and Health Sciences evolved to a separate university on its own.

At the moment, Hawassa University (HU) is one of the first-generation universities in Ethiopia
encompassing 9 colleges, 3 institutes, and 7 campuses set in and outside of Hawassa City. Four of
its seven campuses (the Main campus, Institute of Technology, College of Agriculture, and
College of Medicine and Health Sciences) are situated in Hawassa City while College of Forestry
and Natural Resources, College of Business and Economics, and Daye Campus are located in
Wondogenet, Yirgalem and Bensa Daye, respectively.

In terms of academic capacity, HU hosts more than 32,000 students enrolled in 309 academic
programs: 103 undergraduate; 195 graduate (141 Masters, 54 PhD); and 11 Medical Specialty (10
specialty and 1 sub-specialty) programs in the regular and continuing education programs.
Moreover, HU has 10,988 staff out of which 2,213 are academic (20 expatriates and 460 female)
staff. It has been recently differentiated by MoE as one of the 8 Research Universities in Ethiopia,
so it is working towards becoming one of the top ten research universities in East Africa by 2030.
With this vision, HU is engaged in: advanced level multidisciplinary teaching and learning;
conducting problem-solving research, and delivering research-informed services to the
community.

HU has established a long-standing collaboration with different national and international partners
working closely on teaching, research and community services towards its goals. Hence, HU runs

10 | P a g e
63 collaborative projects (53 international and 10 local) involving 101 global and 91 local partners.
Multiple collaborative projects in HU are predominantly financed by countries such as the USA,
Norway, Germany and UK, and other countries and global institutions such as the Netherlands,
Italy, Japan, Sweden, Australia, Belgium, the UN and EU are also financing one or two
collaborative projects in HU.

HU has been largely contributing its part to the overall development of the country through
teaching, training, research and community services over the last 46 years by establishing and
improving different centers of excellence at colleges, institutes and university levels.

1.2 Vision, Mission, Objectives and Core Values of Hawassa University


1.1.1 Vision of HU
Hawassa University aspires to be one of the top ten East African research universities by 2030.

1.1.2 Mission of HU
Hawassa University strives to produce efficient and internationally competent graduates and undertake
innovative works, rigorous research and technology transfer activities to foster social and economic
development of the country.

1.1.3 Objectives of HU
Four fundamental objectives set by the governmental authorities together form the basis of the
Hawassa University Development Framework

1. Hawassa University shall become a model university for Ethiopia emphasizing economic
development and university-enterprise cooperation according to the German paradigm.

2. Hawassa University shall become a model university for excellence in teaching, learning
and applied research.

3. Hawassa University shall be attractive in international university partnerships and


networks.

4. Hawassa University shall be the center of vocational teacher education in Ethiopia.

11 | P a g e
1.2.4 Core Values

1. Excellence: The University upholds excellence as the ruling standard in teaching, research,
community service and scholarship, and commits itself to the attainment of the highest
standards in academic performance.
2. Honesty: The University promotes honesty, integrity, ethical conduct, justice, fairness,
and nurtures a culture of teamwork, collegiality and mutual support among members of the
University community.
3. Inclusiveness: we champion diversity. We’re passionate about creating an inclusive
workplace that promotes and values a range of ideas and opinions. We embrace all types
of difference in the development of our organization.
4. Academic freedom: The University upholds academic freedom as its core value whereby
all its communities exercise the right to free expression of ideas and scholarship.
5. Accountability: The University is committed to ensure accountability at institutional,
group, and individual levels in an effort to implement its functions by openly displaying its
scholarly ideas and works to the society.
6. Collaboration: The University created a positive and inclusive culture that fosters open,
honest, and meaningful relationship. We celebrate and embrace our diversity, finding a
ways for everyone to belong.
7. Innovation: The University motives to take risk, encourage curiosity and new ideas, learn
from mistakes, and constantly strive to exceed expectation. Though Innovation, and
generate solution.
8. Internationalization: The University will strive to link to the international network of
universities and to support international links of economy. As such, the university will
continuously undertake all supportive and training actions to enable students and staff on
all levels to interact easily in the university's working and teaching language English.

1.3 National, Regional and/or International Collaboration of Hawassa


University

Currently, Hawassa University has active 143 partnerships and collaborations with various national and
international organizations, research institutes, and universities.

12 | P a g e
1.4.1 Local Partnerships and Collaborations

1. Adama Science and Technology University


2. Agricultural Research Institute of South Nation, Nationalities and People Region
3. Agricultural Research Office of Sidama National Regional State
4. Bureau of Housing and Urban Development (BoHUD)
5. Bureau of Public Services and Human Resources Development (BoPSHRM)
6. Bureau of Trade and Industry (BoT&I),
7. Bureau of Women and Children’s Affairs (BoWCA)
8. Bureau of Youth and Sports (BoYS)
9. Centre of Peace and Development (CPD)
10. Environment, Forest and Climate Change Commission

1.4.2 List of Partnerships with Industry per Type and Duration


Hawassa University’s International Collaborations in Europe Different Countries are as follows:-

1. Bern university of applied science, Switzerland


2. Beuth University of Applied Sciences, Berlin, Germany (Beuth)
3. Botanical garden conservation international, UK
4. Czech University of Life Science
5. Frankfurt Frobenius Institute
6. Ghent University
7. Institute of Social Studies (ISS)
8. Justus Liebig University Giessen
9. Maastricht School of Management
10. Mendel University, Czec Republic
11. Molise University
12. NGDO Catalan Association for Cooperation, Sport, Development and Education, Spain

13 | P a g e
1.5 The overall organization structure and work flows of The Company

Fig 1 1 structure of company

Fig 1 2 structure of company

14 | P a g e
Fig 1 3 structure of company

15 | P a g e
CHAPTER TWO
2. Over All Internship experience
2.1 Objective of the Internship
2.1.1 General objective
The general objective of internship is to provide student operational environments
which formulate and focus on their career objectives. It also to connects students with
potential employers and provides opportunities to explore the variety of career objectives
that are often available within in the hosting company. Such opportunities also help
students relate theories and knowledge acquired in the academic year with the skills and
attitudes found in the company and develop idea appreciate businesses area and provide
experience that many employers value.

2.1.2 Specific objective

› The students, during the internship, are aimed to play a great role in improving their
practical, theoretical, interpersonal communications, team playing, entrepreneurship
and leader ship skills, understanding about work ethics related issues, responsibility etc.

› To allow the student to prepare for their future non- internship job by seeking potential
places of employment, practicing resume and cover latter preparation, gaining
references, and interviewing if applicable.

› To adapt working environment.

›Student get opportunity to see the real problem of industry and when back to university
they can find a solution.

2.2 How I did get the Company


Standing at this moment and looking back, for student it’s difficult to get the best company for
internship that have good and efficient workplace. As computer engineer our work environment
or internship company may contain both hardware and software material based on company work.

16 | P a g e
But as we see in regional town there is small company that based on technology improvement in
both hardware and software almost none company. That why I said earlier difficult to student.

When I was 3rd year, I searched technology company round hawassa. Then I get some tech solution
and web developmental company. I try to contact some of them and many of them they don’t
accept internship students in this year but only one of them were accepted me. But the problem
was it wasn’t need physical presence in other word they want to work remotely. They give me a
task when it’s done sent to them via some email or other platform.

I realize before approval of internship company I have to find other company. At that time I try to
contact some of our senior students that work there internship round hawassa and shashemmene.
They give me some place and advice. As they told me I try to contact but it’s not much enough as
I expected because it is some government office and banks.

Finally I decide to out at hawassa university main campus in ICT directorate. I contact Mr. dawit
whose work on ICTD and asked him if they are willing to have interns from Bahir Dar
University and they were very thrilled and excited to host us and share their experience.

2.3 The Section of the HU ICTD Office network and ICT Infrastructure Team
We have been working

The Organization has Many Sections as we tried to locate in the above in Fig . We have
been working in the Network and ICT Infrastructure Team.

2.4 The work flow in the section looks like


The work flow in the ICT Directorate section, the main task of this section is to establish and
monitoring network and ICT Infrastructure across the university including branch campuses as well as
managing operations and maintenance of ICT resources.

The work flow in the ICTD section looks like the Following

17 | P a g e
Fig 2 1 structure of ICT Directorate

2.5. The task I have executed in the section


In this network and ICT Infrastructure Team, I have been working in network
installation, network maintenance and additional installation of security camera in
campus.

At the beginning, there is some tradition procedure that have been follow for the
internship students. Those procedure are :-

I. They give introduction about how the network and ICT Infrastructure Team
work and the ground rule for internship student must obey.
II. Lecture about introduction to computer networking and network device that
help us to remember our background knowledge.
III. They going to train us some simple networking skill. Such as crimping LAN
and making wall outlet. Device that found in the university where we are
going to use in next.

18 | P a g e
IV. They going to show the core and essential work place like data-center and
server room.
V. Working with the staff member in network installation and maintenance all
over the university.
VI. They give project about network design and configuration. To demonstrate
our problem solving knowledge.

III. Simple Training

As describe above, after introduction and lecture class we are not directly go to work
because there is difference in knowledge and skill among us. So that to share our
knowledge and skill and also due to corona virus some of student don’t learn lab
session of computer networking because of that we have to take simple training.

On this training, simple networking skill like how to crimp local area network LAN,
how to make wall outlet and etc.

Fig 2 2 wall outlet and LAN

IV. Visiting and Observation of datacenter and server room

19 | P a g e
After training before going to field work, they show us how the overall network
structure work’s, how network come from Internet service provider ISP or Ethiopian
telecommunication, how they distribute for all campus. We see each and every
components of datacenter, how datacenter bullet and how admin control datacenter.

In HU university there is three datacenter that control flow of network in all branches
an Institutes. These two datacenter are located in main campus and the other one
located in HU institute of technology.

Fig 2 3 Visiting and Observation of datacenter

2.5.1 Network installation and maintenance


2.5.1.1 Network installation
A. network installation at teachers building 4th floor

This is one of task that I have participated during intern program. In this building
there is already installed network but they want to extend new office in 4th floor. So
that they need new local area network (LAN) installation. This task was given for
Network and ICT Infrastructure Team. Team leader give this task for intern students
to do the installation of this office.

20 | P a g e
First we figure out easy, cost effective way of installation which is to extend nearly
office. We can also use to extend from access switch but the switch far from this
office and it’s difficult to drill the wall of building also it’s wastage of LAN cable.

There is four computer in office one and five computer in other. There is many kind
of topology to connect computer each other but we use bus topology to install
because it’s easy to install and maintenance the main reason it is cost effective, it’s
not necessary to install hub for only 9 computer. We do the following task.

 We extend the LAN from the nearest access switch.

 We have drilled the wall of building, there are 2 offices.

 We have fix trunk and node hold by screw to all rooms.

 There are 4 and 5 users in to office respectively. Generally there are 9 users in
this building.

Fig 2 4 teachers building 4th floor

2.5.1.2 Network maintenance


We have participated in maintenance of Network in many building and offices. For
instance at some of register office there were some computers does not get internet

21 | P a g e
because of the network cables that are not working properly so we fixed it . And also
we repaired network in printing and duplication center for distance and extension
and we were able to change new node (outlet) which were not working.

2.5.2 Installation of security camera


Finally we participated in security camera installation almost all over in university.
At the beginning, the university peaceful and friendly until something trouble
happen. One day one motorcycle was stolen from its parking station. No one knows
how. At second day another 4 motorcycle also stolen. Then decided to increase
number of security guards. But this decision didn’t stop the robbery. So they want
to install security camera all over the university and to maintain odd security camera.

At that time network and ICT Infrastructure Team took the task and give to asnake
tadele who is supervisor of intern students to take students and to work with them.

With network and ICT Infrastructure Team we were installed almost seven security
camera in the following places in entrance of head office, at the front and back of
department office, at entrance of female dorm, at the main gate of student, at the
office of ICT maintenance center.

This security camera installation thought me everything about network installation


and maintenance because it include all kind of hardware and software also
mechanical process that have been working in training time and installation of
network for new office like crimping a LAN, making wall outlet or node, and other
things.

Procedures for installation security camera

I. Camera placement

Once you have identify the area they want to monitor, it is time to decide the exact
location for camera placement. We must concern the following things.

22 | P a g e
 Must place to watch front and back statically

 Placing at highest point of an area that gives best view.

 Place the camera in strategic location.

II. Installation and setup

In surveillance camera system at list there is two type of camera system which is
MPX analog camera and PoE camera system. MPX analog camera system is one of
the oldest camera types that transmit high-definition analog video over shielded or
RG59 cable to a digital video recorder (DVR).

In another hand PoE camera stand for power over Ethernet, much more like
traditional security camera it is wired system that requires cable for the power, video
transmission, and internet connection. PoE technology is used to transmit both data
and power through a single cable.

From those camera we work with PoE camera. PoE camera is easy to install and
control as well as it’s not require other hardware devise like power supply box and
power cable.

In PoE camera system there is some hardware system that used in integration of
camera to internet connection. We need to ready all the part of PoE system. Those
components are :-

 NVR: - stands for network video recorder which is responsible for receiving
video feed from camera while supplying camera with the power using Ethernet.
 PoE Injector: - small device that adds voltage in to the Ethernet output,
providing reliable PoE connection that can power the camera and receive data
successfully.
 Additional cat6e cable: - this cable is needed to deliver the power imbued
signal from the injector to the camera.

23 | P a g e
 Injector power adaptor: - is responsible for delivering power to PoE
Injector.
 Hard disk: - most NVR in the market sold with hard drive, typically one
terabyte. So if this was enough, it’s not needed another hard disk.

 And there is some other hardware components but there is another option to
install that don’t need all above components. If we choose this method we have to
notice that using NVR make the system easier to use and control and cost effective,
it is possible to use PoE enabled network switch to connect all camera.

With regarding above statement we use the second method of installation. Because
there was PoE enabled switch already there. There for we use the following steps
below.

Some installation step for PoE security camera using PoE enabled switch

1. Connect all the camera to the PoE enabled switch.


2. Attach the switch with wire or wireless router.
In this step we didn’t do anything because they already connect to the datacenter as
describe in fig 2.
3. Connect the output device (pc, laptop, etc.) to the same network as the switch
mentioned in above step.
This surveillance camera record all data from where they are and collect and also
display in security guard office. So we install local area network to the security guard
office and setup all personal computer to control and monitor.
4. Install the software provided with the camera or directly access them by
entering the network address into web browser.

24 | P a g e
Fig 2 5 security camera that we installed

Materials requirement for installation

UTP Cat 6E cables/Ethernet cable/

UTP (Unshielded Twisted Pair) Cables are the back bone of TCP/IP Computer
Networks. They have four pairs of copper conductors enclosed within an insulation
outer bracket and use RJ-45 Connectors (mostly) at the ends to terminate on the
network hardware equipment’s. Each pair supports full-duplex communications and
they are twisted around each other in order to cancel out the EMI (Electromagnetic
Interference) and to reduce the cross talk between the pairs Due to its low cost, UTP
cabling is used extensively for local-area networks; it is less expensive and easier to
work with.

In our situation, Ethernet cable act as delivery method for both power and video.cat
6e cable transmit significant amount of voltage and act like power supply for PoE
camera.

25 | P a g e
Fig 2 6 UTP 6e Cables Fig 2 7 RJ-45 Plug

RJ45

RJ45 is the acronym for Registered Jack 45. RJ45 connector is an 8-pin jack used by devices to
physically connect to Ethernet based local area networks (LANs).

Crossover color arrangement

Crossover Cable - A crossover cable means that the second and third pairs on one
end of the cable will be reversed on the other end. The pin-outs are T568A on one
end and T568B on the other end. All 8 conductors (wires) should be terminated with
RJ-45 modular connectors. Crossover cable conforms to the structured cabling
standards. As shown in the figure below describes the crossover color arrangement.

26 | P a g e
Fig 2 8 Crossover color arrangement

Straight through color arrangement

Straight-Through Cable - Four-pair, eight-wire, straight-through cable,


this means that the color of wire on Pin 1 on one end of the cable is the same as that
of Pin 1 on the other end. Pin 2 is the same as Pin 2, and so on. The cable is wired to
either EIA/TIA T568B or T568A standards for 10BASE-T Ethernet, which
determines what color wire is on each pin. As shown in the figure below.

Fig 2 9 Straight through cable arrangement

Switch

27 | P a g e
Switch is a network device that connects other devices to Ethernet networks through
twisted pair cables. It uses packet switching technique to receive, store and forward
data packets on the network. The switch maintains a list of network addresses of all
the devices connected to it.

The switch can be divided in to two parts. These are the managed switch and the
unmanaged switch.

Unmanaged Switches - works right out of the box. But it's not designed to be
configured. Usually, you will find unmanaged switches in home networking
equipment. It used for distribution.

Managed Switches - gives you greater flexibility because it can be configured. For
example, you can monitor a managed network switch and adjust it locally or
remotely. This gives you control over network traffic and who has access to the
network.

We use both Unmanaged Switches and Managed Switches for installation.


Unmanaged switch for distribution of network because this switch also use for other
purposes like distribution for office and other.

Manage switch for management purposes. As I describe earlier we install at list 5


security camera. The question is how to control this security camera and maintain.
Shortly to answer this question using this management switch. This switch allow to
control the network flow and who access the network. Because of this we give
VLAN 50 for all security camera to control.

28 | P a g e
Fig 2 10 48 Port switch

PVC Trunks

The PVC Trunk is used to hide and protect the cable with a given range of PVC trunk and
accessories. All of the trunk, which we have worked with, is white as standard however special
colors can be supplied subject to color availability and quantity required.
Network trunks are also used for holds many trunks by one. It used to protect network cables from
much external damage. There are different kinds and shapes of network trunks. Like wide, mediate,
narrow, square, rectangular etc.

Fig 2 11 PVC Trunks

29 | P a g e
Cable ties

the cable tie also known as a wire tie, zip tie is a type of fastener, for holding cables or wires. Cable
ties are generally viewed as single-use devices; they are typically cut off rather than loosened and
reused. However, if a closed loop needs to be opened again, rather than destroying the cable tie by
cutting, it may be possible to release the ratchet from the rack. We have used the cable tie that was
not reused as shown in the figure Fig 2.9 While some cable ties are designed for reuse with a tab
that releases the ratchet.

Fig 2 12 Cable ties

Screw drivers

the screw driver is a tool for screwing and unscrewing screws. A typical simple screw driver has
a handle and a shaft, we have used the screw drivers for assemble and dis assemble physical part
of computers as in the following figure

Fig 2 13 Screw drivers

Hack saw and Drill


30 | P a g e
Hack saw are used for cutting cables trunks. It also used for cut steels All those below tools are
for crimp the cables, cut the cables and the patch down the cables as in the figure ----, But tape
range used for open tapes and cut single cables.
Drills are used to perforate the wall and buildings as shown in the figure –

Fig 2 14 Hack saw Fig 2 15 Drill

Testers
Tester is measurement which is used to check the color code arrangements and Miss understanding
measurement. It points miss places of color code arrangements. Testers are used for testing
network cables as shown below

Fig 2 16 Tester Fig 2 17 Crimper

Crimper
The crimping tool is a device that is used to make cold weld joints between wires and a connector
through deforming one or both of them to hold the other. A special connector is used to join metals
together. The weld joint properties (mechanical and electrical) are strong as the parent materials
when the tool works and offer some result, which is known as crimp. An instance of crimping is

31 | P a g e
to affixing a connector to the end of a wire. For example, a crimping tool is used to create network
cable to combine RJ45 connector to both end

Blower
Blower is important tool to remove any built-up dust from the inside of a computer, printer and
other devices on a regular basis as shown in the figure ------ below.

Fischer
It is a material used to stick the trunk and rack with screw to the wall or floor.

Other materials that have used in internship period

Node/outlets
node is a plastic or metal plate, cover on the face (front) of a device or
surface. It may be single outlet network or double outlet network based on the
port like structure that it contains, but I have done the installation by using the
double one when we have work in installation for new office in teachers building. It can also be
used for a safety covering of the connection point of the female Rj45 and the unshielded twisted
pair cable.

Punch down

A Punch down tool is a small hand tool used by telecommunication and network
technicians. It is used for inserting wire into insulation-displacement connectors on punch down
blocks such as patch panels and female Rj45.

Fiber optic cable

A fiber optic cable defined in IEEE 802.8 is cable that contains optical fibers (usually

32 | P a g e
glass) coated in plastic that are used to send data by pulses of light. The coating helps
protect the fibers from heat, cold, electromagnetic interference from other types of wiring, as well
as some protection from ultraviolet rays from the sun. Fiber optics allow for a much faster data
transmission than standard copper wires, because they have a much higher bandwidth. There are
two types of fiber optics cable.

Single-mode fiber: - In fiber-optic communication, a single-mode optical fiber (SMF) is an


optical fiber designed to carry light only directly down the fiber transverse mode. Single mode is
generally yellow, with a blue connector, and a longer transmission distance. For these reasons,
single-mode fibers can have a higher bandwidth than multimode fibers. Equipment for single mode
fiber is more expensive than equipment for multi-mode optical fiber

.
Multimode fiber: -The term “multimode” refers to the fact that the light takes multiple paths
(modes) through the glass fiber core, as opposed to “single-mode” where the light takes a single
path. Because the light travels different paths, the longer the cable is, the different paths arriving
at the receiving end at slightly different times cause the more distortion. Multi-mode is generally
orange, grey, with a cream, or black connector and a shorter transmission distance Multimode
cables have a larger diameter glass core than single-mode cables and are typically used for shorter
distances and/or lower speeds.

Fig 2 18 fiber optics cable

RJ-45 Connectors

33 | P a g e
RJ45 is a type of connector commonly used for Ethernet networking. It looks similar to a telephone
jack, but is slightly wider. Since Ethernet, cables have an RJ45 connector on each end, Ethernet
cables are sometimes also called RJ-45 cables. RJ45 cables can be wired in two different ways.
One version is called T-568A and the other is T-568B. However, we have used by T-568B
arrangement. Look at the RJ-45 connector.

Patch Panels

The patch panel is essentially an array of ports on one panel. Each port connects, via a patch cable,
to another port located elsewhere in your building. Patch panels bundle multiple network ports
together to connect incoming and outgoing lines - including those for local Area networks and
communications. When patch panels are part of a LAN, they can connect computers to other
computers and to outside lines. Those lines, in turn, allow LANs to connect to wide area networks
or to the Internet. The primary advantage of using patch panel is improved organization and easier
management of the wired network. For most new patch panel designs, the main focus is on cable
management. Patch panels are usually attached to network racks, either above or below network
switches. Patch panels can be based on the number of ports they contain, with 48-port, 24-port and
12-port panels. See a 48-port patch panel

Fig 2 19 Patch Panels

34 | P a g e
Fig 2 20 Rack (Switch placement)

Rack (Switch placement)


Switches and patch panels are sitting in these placements. It protected from external damages and
access.

Console cable
Every Cisco router or a switch has a console port (also known as the management port) on its
backside. Console port is used to connect a computer directly to a router or switch and manage
the router or switch since there is no display device for a router or switch.

2.6 Procedures we have been using while performing our work tasks
They are some fixed step by step sequence of activities or course of actions that must be
followed in the same order to correctly perform a task must follow producers for
performing work tasks.

As I describe earlier as rule they follow the above steps that listed in part 2.5 under the section of
The task I have executed for new intern students. So that am not confused when we work in site
work like security camera installation because they already told us about work flow and steps.

While I was performing my task in each day, I used to ask my friend and monitor everything that
I didn’t understand they also tell me everything they know. As we come from different university
and collage we also share many things during we were work.

35 | P a g e
2.7 How good we have been in performing our work tasks
We believe we did great at performing all the task that we have been assigned to do and the
reason behind that is we were fast learners and adaptive to the technologies. We were introduced
to many new concepts and managed to master all of them within this internship period.

We believe we have added prominent value to the startup we worked for and also
done a good work for our host HU. It is not enough if only us witnessed our work so we have
asked the same question both our mentor Asnake about how well we performed our task and
they give good feedback and suggestion to improve our skill.

2.8 The challenges we have been facing while performing our work task?
The challenge that most commonly face during my internship session which have their own
matter of influence directly or indirectly. So, some of the major challenges are as follows:

Lack of office to work and study in our free time. We CISCO lab as office so the lab has so
many purpose like teaching for student, training center for staff and other member and so on.

The team workers have no permanent scheduled program for their work.

Lack of material in networking.

Some of students that applied in HU ICTD doesn’t match their internship period as we come
from different university and collage almost we have different at all. When they finish their time
all work load fall in me and some student.

Lack of communication at the beginning.

During in project work some of our group student didn’t participate well.

The main challenge that I have been face during this internship session was matter of
transportation. I live in shashemene my intern work place was 20Km away from my town. So it’s
difficult to get there on time as well as it not easy to pay 50 birr per a day in five day in a weak.

2.9 The measures we have taken in order to overcome our work task
As we have seen the challenges we faced above we had to take different measures to overcome
them.

36 | P a g e
Because of lack of schedule we were enforced check presence of work twice a day
and ask them to make call

To solve those problems we discus with supervisor and we solve time schedule.
 In our project we discus to work in individual and at some point together we can merge and
combine our best part of our project.
Occasionally, we faced the above listed challenges and propose the above listed solutions from
our point of view, some of our problems faced effectively. Here the effort that we and some
responsible team members in the company help us to resolve the challenge.

37 | P a g e
Chapter Three

Internship project
3.1 Project title
Enterprise Network Design Using IP Sub netting

3.2 Introduction

An enterprise network is the backbone for facilitating an organization’s communications and


connecting computers and devices throughout departments. An enterprise network environment is
usually configured to facilitate access to data and insight into analytics.

Enterprise networking refers to the physical, virtual and logical design of a network, and how the
various software, hardware and protocols work together to transmit data. When it comes to
enterprise networking, every organization has different needs, and in the era of digital
transformation, modern enterprises are relying more on software-driven solutions to power
intelligent network architecture, automation and design.

In our hyper-connected world, a stable, reliable network is regarded as a given, and the
consequences of an unreliable network are only getting more severe. In fact, according to Gartner,
the approximate cost of network downtime is $5,600 per minute, and can be much higher for
technology-dependent organizations. (David Gewirtz, 2017) As enterprise network architectures
grow more complex, many organizations are finding it difficult to keep up. Thankfully, a number
of networking solutions are available to simplify the process, like unified wired/wireless
infrastructures, automated campus and agile data center networking solutions.

3.3 Summary of the project


This Network Architecture is about designing a topology of a network that is a LAN (Local
Area Network) for company in which various computers of different departments in the different
area across the world which are set up so that they can interact and communicate with each other

38 | P a g e
by interchanging data. To design a networking architecture for the company which connect various
departments to each other, it puts forward communication among different departments.

Cisco Packet Tracer (CPT) is a multi-tasking network simulation software that can be used to
perform and analyze various network activities such as implementation of different topologies,
selection of optimum path based on various routing algorithms, creation of appropriate servers,
sub-netting, and analysis of various network configuration and troubleshooting commands. In
order to start communication between end user devices and to design a network, we need to select
appropriate networking devices like routers, switches, make physical connection by connecting
cables to serial and fast Ethernet ports from the component list of packet tracer. Networking
devices are costly so it is better we perform first on packet tracer to understand the concept and
behavior of the network.

Generally, in this project I use mostly network address translation (NAT) because the branch are
found across in the world so it’s is impossible to connect using local area networks or LAN. But I
didn’t ignore local area networks or LAN at all I used to share networks with in branch itself.

3.4 Problem statement


Companies need their departments to communicate and transfer many information and documents
amongst them. The usual trend to accomplish this task is using human power to move around this
information, which is an inefficient way to do the tasks. Sharing devices like
printers and scanners among workers is not attainable with the absence of Enterprise Network
(LAN). Having a well-designed and configured enterprise network eases the burden of human
power, decreases operating cost and makes the tasks much more efficient. In addition to these
advantages, LAN servers have built-in security features, like firewalls, that improve the security
for online access. At the same time, a LAN server lets us control which users have access to what
data based on their need. These features can prevent unauthorized data access and accidental data
corruption. With a LAN server, we can install and update antivirus software on a network-wide
basis; we can also perform regular network-wide backups.
3.5 Objective
3.5.1 General objective

39 | P a g e
The general objective of the project is to design a secure, efficient and an all-time working
network infrastructure.

3.5.2 Specific objective


- Uncover requirements for performance, capacity and network ports.
- Decide the number of LANs based on the user requirement (number of departments).
- Plan and make the physical design of the network
- Develop an IP address design that meets growth requirements and selects a routing
protocol for the network to support fast convergence with ease of management.
- Perform the necessary configurations for all the devices.

3.6 Scope of the Project


After the completion, the project will provide the following services:
- Interpersonal and Interdepartmental communication
- Connectivity with ISP
- FTP service
- SMTP service
- Resource sharing
- DHCP server to allocate IP addresses automatically

3.7 Contributions of the Project

After the completion of this project, the presence of the enterprise network (LAN) eases the burden
of human power, decreases operating cost and makes the tasks much more efficient. In addition to
these advantages, LAN servers have built-in security features, like firewalls, that improve the
security for online access. At the same time, a LAN server lets us control which users have access
to what data based on their need. These features can prevent unauthorized data access and
accidental data corruption.

3.8 Methodology
I will be using Cisco packet tracer to design and simulate the network architecture. The method I
plan to follow in order to address the problem statement and do the project, which is derived from
Cisco, can be classified in 6 phases.

40 | P a g e
Fig 3. 1 Cisco’s PPDIOO methodology to network design

I. Prepare: first, I plan to establish the organizational (business) requirements, develop a


network strategy, and propose a high-level conceptual architecture, identify
technologies that can best support the architecture.
II. Plan: in the plan phase, I work on identifying the network requirements, which are
based on the goals for the network, where the network will be installed, who will require
which network services, and so forth. The Plan phase also involves assessing the sites
where the network will be installed and any existing networks, and performing a gap
analysis to determine if the existing system infrastructure, sites, and operational
environment can support the proposed system.
III. Design: involves designing the network according to those initial requirements in the
plan phase, incorporating any additional data gathered during network analysis.
IV. Implement: implementation and verification begin after the design has been approved.
I will build the network and any additional components according to the design
specifications, with the goal of integrating devices without disrupting the existing network
or creating points of vulnerability.
V. Operate: I will check the operationality of the network by trying all the functionalities
repeatedly.
VI. Optimize: based on the results of the operate phase, I will perform all the necessary
optimizations to the network

41 | P a g e
3.9 DESIGN MODEL

In this network design, a hierarchical network design model is intended to be used due to the reason
it lets us break the complex flat network into multiple smaller and more manageable networks.
Each level or tier in the hierarchy is focused on a specific set of roles. (Press, 2016)
The hierarchical model can be a 2-tier or 3-tier model. The former model is relevant in a
network where there are not many nodes to communicate or when the functions of the core
and distribution layers (which will be discussed in the following section) can be combined into
one layer. Whereas the latter can be used for mid to large size network spans and as the name
indicates.
3.9.1 Components of the 3-tier model

Fig 3. 2 The chosen hierarchical model (3-tier architecture)

1. Access layer

The access layer is the first tier or edge of the campus. It is the place where end devices attach
to the wired portion of the network. It is also the place where devices that extend the network
out one more level are attached—IP phones and wireless access points (APs) being the prime
two key examples of devices that extend the connectivity out one more layer from the actual
access switch. (Cisco, 2008)

42 | P a g e
Components in the access layer
- Printers
- Laptops
- Voice over IP
- Layer 2 switches
- Personal Computers

2. Distribution layer

The distribution layer in the network design has a unique role in that it acts as a services and
control boundary between the access and the core. Both access and core are essentially
dedicated special purpose layers. The access layer is dedicated to meeting the functions of
end-device connectivity and the core layer is dedicated to providing non-stop connectivity
across the entire campus network. The distribution layer on the other hand serves multiple
purposes. It is an aggregation point for all of the access switches and acts as an integral member
of the access-distribution block providing connectivity and policy services for traffic flows
within the access-distribution block. It also provides aggregation, policy control and isolation
demarcation point between the network distribution building block and the rest of the network.

Components in the distribution layer


- Routers
- Switches
3. Core layer

The network core is in some ways the simplest yet most critical part of the network. It provides
a very limited set of services and is designed to be highly available and operate in an alwayson
mode. In the modern business world, the core of the network must operate as a non-stop
7x24x365 service. It is critical for interconnectivity between distribution layer devices (for
example, interconnecting the distribution block to the WAN and Internet edge).
Components in the distribution layer

43 | P a g e
- High speed network devices
- Core Switches
- Servers

3.10 Network requirements


1. Hardware requirement analysis in main block with quantity.
2. Hardware requirements analysis in wards.
3. The employees should receive dynamic IP addressing from a central server.
4. Network should be loop free at Layer 2
5. Every computer should be able to access the hotel management software from each of the
location using a fixed IP address.
6. IP Network design table.
7. Identify configurations on the hardware wherever appropriate.
8. Network topology diagram with necessary equipment’s

3.11 Software and Hardware requirement


3.11.1 Software requirement
Cisco packet tracer version 8.1
Packet tracer is across platform visual simulation tool designed by Cisco system that allows users
to create network topologies and imitate modern computer network. It allows users to simulate the
configuration of Cisco routers and switches’ using a simulated command line interface.
It helps peoples create their own virtual “network world” for exploration, experimentation, and
explanation of networking concepts and technologies

3.11.2 Hardware requirement


 2811 router
 Desktop computer or Laptop
 Fiber cable(Single and double mode)
 Copper cross and straight-through cable
 Data center components(Server, cooling material, hard drive)
 Access point-PT-N

44 | P a g e
 2460-24PT switch
 365024PS Multilayer switch

3.12 Theoretical design and Implementation


3.12.1 Theoretical design

I have tried to state above the project consists of different services and protocols that
should be to be configured in each layer and integrated to have a functional Local Area
Network.
Those department or branch of company located across in the world so the problem was how do
we connect those braches? In local area networks? That impossible to install and starch LAN from
country. Shall we use internets? Yes we can use internets but how do secure our data and
information. To solve this issue we have two option to use

 Using network address translation or


 Using private VPN
Pros and cons of using NAT and VPN

3.12.1.1 Network address translation /NAT/


Network Address Translation (NAT) is a process of converting single IP address space into
global one. It was introduced overall to prevent IPv4 address space exhaustion. Generally NAT
does it work on a router or firewall simply interconnecting two networks. From NAT many devices
can be connected to the intranet through a single public address.
Advantages of NTA

1. Cost Savings
When using NAT with private IP addresses, the organizations don't need to purchase IP
address for each and every computer out there. Same IP address can be used for multiple
computers. Thus, this can lead to significant cost reduction.

2. Flexible Connection
By implementing multiple tools, backup tools and load balancing tools, NAT can
overall increase the flexibility and reliability of the network.

45 | P a g e
3. Consistent Network
NAT provides a consistent network addressing scheme. Whenever there is a use of
public IP address, there should be proper address space assigned. This is because if the
network is enlarged, more of the IP address will be required.
4. Network Security
All the original source and destination address in NAT is hidden completely. Unless the
user wants to, the hosts inside the NAT cannot be reached by hosts on other networks.
Therefore, NAT provides additional layer of network security.
5. Private Addressing
NAT has its own private IPv4 addressing system even if you move to a new public
addressing scheme. Al though if you change the Internet Service Provider, the changes
in the internal address will be prevented.

Disadvantages of NTA
1. Decreased Performance
Whenever a guest makes a request to a remote server, it will make sure that the
connection belongs to the NAT router.
2. Application Usage
Since hosts inside the network is unreachable at times, some applications tends to
have compatibility issues with NAT. These applications depend on end to end
functionality which the network fails to supply.

3. Troubleshooting

Always when using NAT, the end to end traceability slowly reduces. In here the IP
addresses are changed constantly over multiple NAT hops. This makes
troubleshooting more difficult or almost impossible especially in remote locations.

4. Service Usage

46 | P a g e
Most often when using NAT, services that require TCP or UDP are affected making
them unstable. Incoming packets will have problems reaching their destinations. The
only way to achieve them is by configuring NAT router.

3.12.1.2 Virtual private network (VPN)


A virtual private network (VPN) allows users to safely connect to another network over the internet
by encrypting the connection from their device. A VPN makes an internet connection more secure
and offers both privacy and anonymity online.
Organizations, governments and businesses of all sizes use Business VPN to secure remote
connections to the internet for protection against data interception. Individuals also use personal
VPNs to keep their locations private, safely encrypt data and browse the web anonymously.
Advantages of VPN

Cost savings – organizations are able to use cost-effective Internet transport instead of expensive
dedicated WAN links.
Security – VPN uses advanced encryption and authentication protocols that protect data from
unauthorized access.
Scalability – organizations are able to add new users without making significant changes to their
infrastructure.

Disadvantage of VPN
 A safe, top-quality VPN will cost you money
 Your privacy isn’t always guaranteed
 VPN almost always slow your connection speed

Because of above explanation we use NAT to connect all branches of company. And also in
NAT protocol there are different types of NAT such as
 Dynamic network address translation DNAT
 Static network address translation SNAT and
 Port address translation PAT

47 | P a g e
Among those we use Dynamic network address translation DNAT to configure branch routers to
connect to the main.

Dynamic translation establishes a mapping between an inside local address and a pool of global
addresses. It’s useful when multiple users on a private network must access the Internet. The
dynamically configured pool IP address may be used as needed. It is released for use by other users
when access to the Internet is no longer required. We will see configuration step in Implementation
section.

3.12.2 Implementation and configuration


3.12.2.1 Network architecture diagram

Fig 3. 3 network architecture diagram of company

3.12.2.2 Configuration steps


 First place the network component on dash board in packet tracer and then
connect it’s by cable.
 Create a secure password and give a host name

48 | P a g e
 Before configuration we must subnet public address then Create 5 network
address (private).
 And then Create VLANs in each Distribution and Access Switches and Assign
VLANs

 Assign IP address to each VLAN

Fig 3. 4 assigning vlan for branch 4

 Configure DHCP Pool it consists default gateway ,DNS server ,start IP address
,subnet mask ,maximum number of user on DHCP Server .And Then Make sure
all users can get IP Address

Fig 3. 5 DHCP configuration

 Configure HTTP server in each branches.


 Configure FTP server in each branch

49 | P a g e
Fig 3. 6 FTP configuration

 Configure Dynamic NAT in each branch

Command or Action Purpose

Step 1 Enable Enables privileged EXEC mode.


• Enter your password if prompted.
Step 2 configure terminal Enters global configuration mode.
Step 3 ip nat pool name start-ip end-ip {netmask Defines a pool of global addresses to be allocated as
netmask |prefix-length prefix-length} needed
Step 4 access-list access-list-number permit Defines a standard access list permitting those
source [source-wildcard] addresses that are to be translated.
• The access list must permit only those addresses
that are to be translated. (Remember that there is an
implicit “deny all” at the end of each access list.)
Use of an access list that is too permissive can lead
to unpredictable results.
Step 5 ip nat inside source list access-list- Establishes dynamic source translation with
number pool name overload overloading, specifying the access list defined in
Step 4

50 | P a g e
Step 6 interface type number Specifies an interface and enters the interface
configuration mode
Step 7 ip address ip-address mask Sets a primary IP address for the interface.

Step 8 ip nat inside Connects the interface to the inside network, which
is subject to NAT.
Step 9 exit Exits interface configuration mode and returns to
global configuration mode
Step 10 interface type number Specifies an interface and enters the interface
configuration mode.
Step 11 ip address ip-address mask Sets a primary IP address for the interface.

Step 12 ip nat outside Connects the interface to the outside network.


Step 13 end Exits interface configuration mode and returns to privileged
EXEC mode.

Table 3 1 Configure steps of NAT

3.13 Ring Topology


For design this Enterprise Network I use star topology because this company located across the
world. They need to connect each branches with each other and with main branch. So to do this
connection there is many possibility of topology but I prefer ring topology because of the
following use of this topology.

3.13.1 What is ring topology


Each device has a dedicated point-to-point connection with only the two devices on either side of
it. A signal is passed along the ring in one direction, from device to device, until it reaches its
destination. A repeater in each device regenerates the bits and passes them along

Advantages of Ring Topology


 Administration: High-speed data transfer rates are another classic feature of a ring
network topology. The data transmission that occurs between each workstation generally
is quite fast here. Even under the condition of heavy load, interruptions will not impact its
performance.
 Troubleshooting Feature: Unless one-directional, troubleshooting and error in a ring
topology are relatively straightforward.

51 | P a g e
 Server Specifications: Since all workstations are connected circularly, there is no need
for network servers. Therefore, each workstation on the ring topology has its unique
connectivity. The only element necessary here is the use of special cables to connect each
device on the topology structure.
Disadvantages of Ring Topology
 Expense: Ordinarily, a ring topology architecture needs expensive hardware components
for establishing the network. Without the proper cables and network cards, you cannot
link the workstations, making the installation process pretty high. Hence, for users with a
fixed budget, it is desirable to try some other options.
 Cable Breakdown: The entire network in a ring topology depends heavily on a single
cable. Several network nodes are placed circularly on this cable. By accident, if the
connector experiences any failure, the signals will face a blockage and stop traveling

3.14 Result and Discussion

In this Enterprise Network design and network architecture I have been trying to everything that
needed to accomplish best project. So I have made these progress and result of the project.

Tasks that I have completed thus far


- Requirement gathering
- Learning about network designing
- Choosing the architecture of the network

- Implementing the draft network topology on cisco packet tracer


- Configuring all devices
- Testing the overall network functionality and performance
- Making appropriate adjustments based on result of testing

As result this project perform and work HTTP , FTP , VLAN for management and DHCP for
dynamic routing . Also we can use this project for any company that needed Enterprise Network.

52 | P a g e
Chapter four

Benefits we gained from Internship


An internship is a work experience offered by an organization for a limited period. The
main purpose of internship is to learn by working in practical environment and to apply
the knowledge acquired during the studies in a real-world scenario in order to take on the
problems using the knowledge and skill learned during the academic process.

During the time of internship, I gained so many benefits from our hosting company. This internship
program provided me a platform to introduce myself in professional field. I greatly benefited from
working with professionals.

4.1 What we gained in terms of improving our practical skills


This internship program helped me to get on practical knowledge and be skillful. I could
increase practical performance. I could also evaluate myself how much we can change the
theoretical knowledge to the practical one.

To sum up my internship period has enabled to improve myself enormously. I have now
a different perspective of the technology world and the market demand. This internship program
have improved many skills and also acquired new such as:

 Problem solving: - I develop problem solving skills and learn to think critically, observe
and analyze situations in order to form creative solutions based off of problems
 Communication Skills: - Communication skills are crucial to any role. Through problem
solving, we learn to effectively communicate. I learn to say what I mean and explain
my ideas effectively.
 Failure: - As we all know failure is an important part of finding solutions. I learn not to
give up to find a solution for problem. This kind of type of learning removes the stigma
that stems from failure, and encourages it as a positive way to learn.

4.2 In terms of upgrading theoretical knowledge


Theoretical knowledge is also very important to be efficient in what you do otherwise you work
will be always just trial and error. I believe I have learnt so many new things.

53 | P a g e
I have grasp theoretical knowledge during the period of internship that related to networking. I
have seen that in my internship period how the overall concepts of the courses are related and
applied exactly on practical works? I have learned and gained the following theoretical
knowledge from this internship program:-

 Understand and practice how switches configure and troubleshoot problems


 Effective assessment and management of resource, wisdom, problem & time.
 Learning different kinds of electronics devise and their use in real life.

4.3 In terms of improving interpersonal communication skills


Interpersonal communication skills are one of the most prominent skills to develop in the
working environment. As I have stated in the “Challenges Faced” section. That challenge made
me improve what little interpersonal communication skill I had. In addition to that, the work
environment required a different way of communication than what I have been using for the
previous years when communicating with my family and friends. So, the frequent
communications I have with the coworkers in my environment helped me improve my
interpersonal communication skills.

I always discus with other internship students about so many things like how they good at
networking and other skill that require to become good at their fields, how they used to improve
their skill and other things. We share a lot of thing through this communication about our university
learning teaching process, about our courses and our future works.

Significantly, I worked with different students where they were learning in different streams such
as in computer science, electrical engineering, and software engineering so this scenario help me
to become Versatile person work in different areas.

4.4 In terms of improving team playing skills


Team playing skill is the most critical and necessary skill in engineering field because most
engineering tasks are performed by team. It is a skill of a person to work with other people
cooperatively. Most of the tasks we have been involved were completed as a group duty. The
intern ship helped us to develop our team playing skill. Ideas that are raised in team work help
us to see one thing in different angles and to be a multi directional thinker for elaborating our
knowledge regarding the given issue.

54 | P a g e
Working with them we learned how important it is to be a team player and
also worked to improve ours by working together. You can’t do all the task by yourselves we
learned to classify the task for each of us and work on it together on all the task we performed
specially In networking there is no individuality but only team because one person can’t do all task
by himself like drilling, install PVC trunk and other things. In networking team playing is the key.

In general, some skills I developed: -

1. Listening: - we have to listen to the ideas and concerns of your peers in order to be
an effective team. By asking questions for clarification, not interrupt while he/she is
talking. Show them that you care their ideas.
2. Reliability: - effective team will be reliable and responsible so that your coworkers
can trust you with sensitive tasks and private information. We have to stick to
deadlines and complete assignment on time.
3. Respectfulness: - people will be more open to work, communicate if we have
respect for them and their ideas. Giving acknowledgement, encouragement, patience
to others.
4. Commitment: - we have to be committed to our job. Committed people always be
on time, respect their colleagues. Work in full potential.
5. Openness: - a good team player always open to different ideas and express his idea
clearly and listen to others.

4.5 In terms of improving leadership skills


At the company we have been able to see different workers in their hierarchy they lead the
company in straight way. During these times we have been able to observe that one should have
great skills to be a leader. We develop our leadership skill. Most of times we were meet with vice
leader of the networking team to solve challenges what are we faced. So we are learning in
leadership how we can solve the problem. In the company we were face different challenge, so to
solve these challenge we were meet our monitor again & again. And also there is some challenge
during in intern project about choosing methodology and topology so at some part someone must
have defiance and lead the group. By this means I develop the following leadership skills.

55 | P a g e
✓ Trust building with Coworkers

✓ Decision making
✓ Team management

4.6 In terms of understanding about work ethics related issues


Work ethics is a set of values based on hard work and diligence. It is also a belief in the moral
benefit of work and its ability to enhance character. From this program I can develop how to
improve work related issues before I meet such an organization or when I contact myself in such
social network environment ,some of them includes punctuality, attendance, conducting quality
work, respect for fellow workers, honesty, and showing initiative. A work ethic include being
reliable, having initiative, or pursuing new skills. And also I gained a good work ethics for better
positions, more responsibility & ultimately promotion (placed in positions of a greater
responsibility).These all are teaches me a lot for the future work life of myself. Characteristics that
I gained generally includes being:

1. Strong work ethics: - learning the most efficient way to complete tasks &finding ways
to save time while completing daily assignments.
2. Dependable & responsible: - come on time, responsible for the actions.
3. Adaptability: - adapting to the personality & work habits of co- workers & supervisors.
Being open to change & improvements to complete work in more efficient.
4. Possessing a positive attitude: - to get the job done in a reasonable period of time,
motivates others to do the same within challenges.
5. Honesty & Integrity: - is the responsibility of each person to use their own individual
sense of moral & ethical behavior when working within the scope of their job.

4.8 In terms of entrepreneurship skills


From my time of working, it was apparent to me that a healthy work environment originates
from having workers that have a total understanding of work ethics related issues. And a
healthy environment undoubtedly leads to efficient and productive working hours. I have
gained the following benefits in terms of understanding about work ethics related issues.

✓ Physical appearance (Including dressing code and hygiene)

56 | P a g e
✓ Formal communication

✓ Respect for coworkers.


✓ Taking responsibility

57 | P a g e
Chapter Five
Conclusion and recommendation
5.1 Conclusions
The most important element of internships is that they integrate classroom knowledge and theory
with practical application and skills developed in professional or community settings. They also
bring a wealth of benefits to students, both while completing a degree and when seeking a career
path post-graduation. Our internship period was also effective in equipping us the necessary skill
sets. We learn beyond our goal! I have done in this essay that HAWASSA UNIVERSITY ICTD
is the one which helped me to develop practical skills. Benefit of the internship has to improve
practical and theoretical knowledge.

This internship experience has been an excellent and rewarding experience. I can conclude
that there have been a lot of technical things that I have learnt from my work at HAWASSA
UNIVERSITY ICTD that my understandings of the work environment have improved
significantly. Although during my early days some of the technical parts of my job were a
little bit difficult, I managed to learn from them and improve them fast. In addition to the
knowledge and skills I have gained, I have also came out of this internship with a lot of gained
skill. So, it was one of the most productive experiences I have ever had.

5.2 Recommendation

5.2.1. Recommendation for the company


I would like to give some suggestion on some points, I observe so many things while I was working
last four months. I would like to recommend the following things that they would be considered before
they accept internship students.

They must prepare documented data that explain the working principles of different
section of the company.

They must prepare documented data that explain the working principles of different
section of the company.

58 | P a g e
The company should prepare well organized time scheduled for intern students

 The company should prepare identification card for intern students in order to supervise
the intern.

5.2.2 Recommendation for the school


As school of electrical and computer engineering communications between faculty and company
is low. Due to this reason many students have no idea which company best for their field of study
and capable for best internship work place. So I would like to recommend that the university must
work on communication between company and faculty. Next the school must give some
information before intern time. I know that school give some information but it’s not enough.

5.2.3 Recommendation for Industrial Linkage


Industrial Linkage need to do much work and provide many hosting company choices for students
because many students were struggling to find hosting companies for their internship period or if
the industry linkage would give some sort of guidance or training for students on how to search
and find hosting companies and how to apply for the internship would be great and time saving.

59 | P a g e
60 | P a g e
References:
 Academic handouts
 Company web site(www.hu.edu.et)
 [ OpenCart Documentation ] https://docs.opencart.com/
 Michael Lawrence () The List of the Steps to Design & Implement a New Network for a Small
Manufacturing Company (azcentral.com)
 Cisco Press (August 23, 2016) Campus Network Design Models (www.networkcomputing.com)
 Cisco (April 15, 2008) Enterprise Campus 3.0 Architecture: Overview and Framework
(Cisco.com)
 Wikipedia
 https://www.youtube.com
 Many blog site

61 | P a g e

You might also like