ASTU About Networking
ASTU About Networking
ASTU About Networking
UNIVERSITY
COLLEGE OF ELECTRICAL AND MECHANICAL ENGINEERNG
Internship Report
SUBMITTED BY:
NO GROUP-Members ID-NO.
June 2019
i
Dedications
This internship report is dedicated to our parents, and all our friends for being with us and
helping us in each and every difficulty we have faced in this internship report completion and
to our teachers and all those who thought us, trained us and polished our abilities at AASTU
ICT DIRECTORATE.
ii
Acknowledgment
First and foremost, our grateful thanks to almighty God for keeping us safe to finish our
internship program healthy and happy. Next the special thank goes to our helpful supervisor
Mr. Yonas Tesfaye, department head of computer engineering. The supervision and support
he gave us truly helped us in the progression and smoothness of the internship program. The
co-operation is much indeed appreciated.
Furthermore we would also like to acknowledge with much appreciation the crucial role of
the members of ICT directorate specially Mr. Daniel and Mr. Tesfaye, who gave the
permission to use all required equipment and the necessary materials to complete our project
on network configuration and computer maintenance Huawei eNSP and cisco packet tracer in
configuration of router and switch and the computers that have to be maintained for practice
purpose. Last but not least, many thanks
thanks go to Mr. Daniel who have invested h
his
is full effort in
guiding the team in achieving the goal. We have to appreciate the
t he guidance given by other
supervisors.
iii
Executive summary
This report explains the overall internship experience starting with the background of the
internship hosting company that is AASTU ICT Directorate which is located in Addis Ababa
Science and Technology University. The report tries to discuss about the four months stay
experiences, benefits gained from the internship, conclusion and recommendations for the
hosting directorate, it discuss in detail about the trainings that we took in the Directorate, and
the projects that we did during our time as an intern.
i ntern. The report contains Six main chapters.
The first chapter of the report provides about the Directorate, the main services, the main
customers and users, overall organization and workflow of the directorate.
directorate . The second
chapter describes in which sections of the Directorate we have been working in and the work
we have been executing. The third chapter explain practical gained skill, like configuration
networking devices and architectural design on packet tracer and eNSP, how to create domain
control and Active directory management. The fourth chapter explain our project contribution
we done with system administration team centralized FTP-server management and
Centralized printer server management. The fifth
fift h chapter describes the overall knowing and
skill gained from the internship. The final chapter of the report sates recommendation and the
conclusion about the internship. The report also discusses the skills that We gained while we
were an intern by combining the theoretical knowledge that We learnt in class with the
practical work gained from the internship period including develop work ethics, self-
confidence, intercommunication skill, team-work skills and entrepreneurship skill
iv
Table of Content
Declaration ……………………………………………………………………
……………………………………………………………………ii
ii
Acknowledgment………………………………………………………………iii
Acknowledgment……………………………………………………………… iii
Summary………………………………………………………….. iv
Executive Summary…………………………………………………………
Figure…………………………………………………………………. vii
List of Figure………………………………………………………………….
Abbreviation………………………………………………………..… viii
List of Abbreviation………………………………………………………
CHAPTER ONE……………………………………………………………………………1
v
Project and Contribution ……………………………………………………………………… ...35
4.1 Introduction…………………………………………………………………35
statement……………………………………………………………………….35
4.2 Problem statement……………………………………………………………………….35
4.3 Objective…………………………………………………………………………………36
Objective…………………………………………………………………………………36
4.3.1 limitation………………………………………………………………………... .36
Scope and limitation………………………………………………………………………...
Review……………………………………………………………………….36
4.4 Literature Review……………………………………………………………………….36
4.5 Methodology…………………………………………………………………………….37
Methodology…………………………………………………………………………….37
4.5.1 FTP…………………………………………………………….37
Basic Operations of FTP…………………………………………………………….37
4.5.2 FileZilla ………………………………………………………………………………38
FileZilla……………………………………………………………………………… 38
4.6 Conclusion……………………………………………………………………………….41
Conclusion……………………………………………………………………………….41
4.7 Recommendation…………………………………………………………………………41
Recommendation…………………………………………………………………………41
4.8.1 significance……………………………………………………42
Objective, scope and significance……………………………………………………42
4.9 Components of central printing management system…………………………………………….42
4.10 CPMS……………………………………….43
Overview of Network Architecture of CPMS……………………………………….43
4.11 process ………………………………………………44
Overview of network printing process……………………………………………… 44
4.12 ……………………………………………………………………………45
Conclusion……………………………………………………………………………45
Conclusion
4.13 …………………………………………………………………….45
Recommendation…………………………………………………………………….45
Recommendation
CHAPTER FIVE……………………………………………………………………….46
Conclusion………………………………………………………………………………48
6.1 Conclusion………………………………………………………………………………48
Recommendation……………………………………………………………………….48
6.2 Recommendation……………………………………………………………………….48
vi
List of Figures
Figure 2 Firewall
Figure 3 Logical and Physical Router
Figure 18 tracert
Figure 19 Logical design of Network on eNSP
Figure 20 shows CLI of router on eNSP
Figure 21 Domain Name System Hierarchy
vii
List of Abbreviations
CLI……………………...Command
CLI……………………...Command Line Interface
DC………………………Domain Controller
DHCP………………….. Dynamic Host configuration
DHCP………………… configuration protocol
DMZ………………. …. Demilitarized Zone
DNS…………………… Domain
Domain Name System
eNSP……………………enterprise Network Simulation Platform
viii
CHAPTER ONE
1 Overview of AASTU ICT Directorates
1.1 Background
Addis Ababa Science and Technology university is one of the best universities in
Ethiopia. AASTU was founded in 2011
2011 under the Directive of the Council of Ministers No.
216/2011. AASTU is a university in the making, and much of its short-term plans aim at
establishing academic infrastructures and facilities, staff recruitment and manpower
development. AASTU mission is to play as forefront changing actor in the technology
transformation of the country by creating strong linkage with industry. In line with the given
strategic direction of Ethiopian development, the university has a mission
miss ion to be problem
solver of the industry, leading in the nation research, recognized in continental and
international community. To achieve this mission, the university has given special attention
to strengthen the university – industry linkage.
AASTU ICT Directorates is one of the giant directorates found in AASTU under
Administration of Intuitional development and business with respect to vice president.
AASTU to support the learning, research and community service at its premises.
p remises. ICT
Directorate is in charge of managing the central ICT infrastructure, the databases, interfaces,
portals and websites.
The service delivery is organized into five categories
Technical support
su pport
and maintenance
Technology for
Training and
Teaching and
consultancy
Learning
1
For efficient task execution, each part is discharged by specialized team Infrastructure. The
University owns a campus LAN system with standardized datacenter, fiber backbone and
horizontal cabling. Wi-Fi is also available to support mobility. Virtualized servers were also
deployed to host available systems. Currently there is exist up to six different available systems
like; Human Resource Information Management System, Student Service Management
System, Integrated Library Management System, E-learning management System, File sharing
System, Online Help-desk Management System
1.2 .1 MISSION
1.2.2 VISION
The vision of AASTU ICT Directorate is to become a center of excellence in utilizing the
potential of ICT in learning, innovation
innovation and education environment for the benefit of AASTU
AASTU
nation’s development as well.
and the nation’s
2
CHAPTER TWO
2.1 Introduction
are expected to perform on completion of their programs. The main intention is to produce
practically oriented graduates that meet the required job-related competences of their future
This Internship report is about the skills attained, lessons learnt, challenges, relatedness of
theory covered in class and recommendations during our internship placement at AASTU ICT
directorate from march to June 2019. The report also represents our experiences,
recommendations and benefits of the internship. Internships provide us an opportunity to link
theory with practice, to see the capacity how we can make a solution for real world problem,
to develop both our practical and theoretical knowledge.
✓ To apply the principles and techniques theoretically learnt into real-life problem-
solving situation
✓ To Strengthen our professional skills and interpersonal communications
2.3 How we get there: - First we gathered information about companies that are available for
the internship. Then we have chosen AASTU ICT Directorate which is the best for our area
ar ea of
expertise. After that, our University Industry linkage sent a letter for the directorate with
our name on it which they got from our department. Then the directorate called us for an
interview and finally, they send letter of acceptance to the university and they called and
told us that they have accepted our application by giving acceptance letter. And then we
joined the directorate and we have begun our
our intern work.
3
2.4 Work section in the Directorate
In AASTU ICT directorate the service delivery is organized into five categories. but the one which
we worked us are mainly two, they are:
ICT infrastructure and services team: Inside this team there are, network administration and
system administration team. Training and Consultancy is a very interesting team which give
training and the overall professional advice to every universities academic official’s including
teachers and also for internship student
st udent who need their help.
2.5 Network Administration team: are the teams that are responsible for the smooth
running of the AASTU LAN. Their basic roles include, remote hands, support, and
configuration of hardware for the campus network. They are also responsible for maintaining
maintai ning
and expanding of the campus network. Their job is mainly related with our interest, designing
and architecture of enterprise network which is backbone for today’s business and
communication between different organization. Today information sharing is key, so to
facilitate this the optimization of this network infrastructure is the responsibility of us as
computer engineer.
2.5.1 Tasks performed and work done with Network Administration team
email, and the evolution towards applications that enable collaboration between users.
Enterprise networks can be found today present within various industries from office
environments to large energy finance and government-based industries, which often comprise
of enterprise networks that span multiple physical locations
locati ons.
Enterprise level networks need to be evolving- always. Today, networks are overwhelmed by
huge bandwidth consumption to support more users, data, voice, video conferencing, big data
analysis, cloud, virtualization, automation, internet of things (IoT) and more. In addition,
bring-your-own-device (BYOD) policies
policies increase the complexity for the IT manager to
ensure the variety of devices have the necessary service and security. These increasing
demands are stretching networks beyond their capabilities. To manage these demands, you
need your Enterprise network to do more- for less- and you need it fast.
5
2.5.3 Hierarchical Design Models
The hierarchical network design model breaks the complex flat network into multiple
multi ple smaller
and more manageable networks. Each level or tier in the hierarchy is focused on a specific set
of roles. This design approach offers network designers a high degree of flexibility to
optimize and select the right network hardware, software, and features
feat ures to perform specific
roles for the different network layers.
enable communication between the different parts of the cluster and the users of the cluster.
Server farmers typically mount the computers, routers, power supplies, and related
r elated
electronics on 19-inch racks in a server room or data center.
• Core layer: Provides optimal transport between sites and high-performance routing.
Due the criticality of the core layer, the design principles of the core should provide
an appropriate level of resilience that offers the ability to recover quickly and
smoothly after any network failure event with the core block.
• Distribution layer: Provides policy-based connectivity and boundary control
between the access and core layers.
• Access layer: Provides workgroup/user access to the network
Larger enterprise networks implement solutions to ensure minimal network failure, controlled
access and provision for a variety of services
servic es to support the day-to-day operations of the
organization. A multi layered architecture is defined to optimize traffic flow apply policies
for traffic management and controlled access to resources as well as maintain network
availability and stable operation through effective isolation
isolat ion and maintenance should problems
in the network occur, without impacting the entire network
6
2.5.4 Enterprise Network Devices
Firewalls: are the most commonly used type of security device in an enterprise
enterpris e network.
used to protect a network from malicious attack and unwanted intrusion. Firewalls are
primarily used to protect one network from another.
another. They are often the first line of
defense in network security. There are several types of firewalls; some run as software
on server computers, some run as stand-alone dedicated appliances, and some
s ome work as
just one function of many on
on a single device. They are commonly implemented between
the LAN and the Internet.
Figure 2 Firewall
Router
Logical Router
Physical Router
7
Logical Switch
Patch panels: A patch panel in a local area network (LAN) is a mounted hardware assembly
that contains ports used to connect and manage incoming and outgoing LAN cables. Patch
panels are usually attached to network racks, either above or below network switches andand
take up 1.75 inches of space. Patch cords connect ports in the patch panel to ports in the
switch, which creates permanent port connection to the switch that won’t be interrupted
during moves add and changes. Patch panel perform no other function except for acting
as a connector. A Patch panels can be divided based on the number of ports they
contain, with 48-port, 24-port and 12-port panels among the most
Server: is a computer on the network that is i s give service to another computer. Servers also
run on the same hardware as a computer does, the only difference is the services and the
programs it provides to the client. Servers often present required services over a network,
both to private users within a huge organization
organization or else to public users. Usual computing
servers are application server, file server, print server, web server, database server, mail
server, gaming server, or various other types of servers.
ser vers. Several systems employ the client /
server network model as well as email services and Web sites. Another model, peer-to-peer
networking enables the entire computers to perform as both server and client as required.
8
Logical server
Physical server
Racks: Rack is a supporting framework that holds hardware modules. In ICT context racks
typically contain servers, hard disk drives and other computing equipment, Racks make it
possible to contain a lot of equipment in small physical
physical foot print without requiring shelving
Figure 7 Rack
9
2.5.5 Visit o
off AASTU data center
we have observed the AASTU data center by Mr. Daniel Bayu (Network admin), gives us
clear explanation about the data center facilities of the campus.
Inside the data center like fire alarm sensor which is used to detect and warn
warn people
people
through visual and audio appliances when smoke, fire or other emergencies are present in the
room. These alarms may be activated automatically
automatical ly from smoke or heat sensor and also tthe
he
house contain Air conditioning (AC) used to regulates the temperature and humidity.
humidit y. In side
Power system room there is an electric wire which comes from Ethiopia Electric line power
Agency and there is also another data cable comes from Ethiopia telecommunication
corporation as internet service provider for AASTU
Internet
primary domain names
component thatand their associated
implements the DNSrecor
records.
ds. In other
(Domain
(Domain Namewords, a DNS
System) server
protocol is the
and
provisions domain name resolution services to Web hosts and clients on an IP-based
network.
There is not only the server are found in data centers it has also, CORE_SWITCHS which is
a product of cisco which generate DHCP. All switches have basicbas ic functionality that includes
maintaining a media access control (MAC)
( MAC) address-to-port table, which is used to
intelligently forward frames out the right ports to the intended destinations. There is
redundant core switches to decrease failure
fail ure in the device.
network
point. operation in our building or university. In AASTU, it can manage above 5000 access
Fort Gate it is a role gateway to manage data accessibility and to do access list. It also acts
as firmware by blocking unwanted site and manage bandwidth.
AVAYA is a networked device which is used in video conference system and IP telephone
system
Firewall: used for monitoring and controlling of the network traffic between the servers
located inside the DMZ and internal network (client computers). It also performs
different functionalities like routing (determining paths between the user
us er and the internet
server), determining bandwidth input, used as gateway for incoming and outgoing network
and enables to take security issues.
We Understand different network polices and traffic rules performed inside the network
infrastructure of AASTU. E.g. network resources that need to be available to an outside
public user/customer, such as a web, FTP, and Mail servers. You can place these resources
on a separate network behind the firewall, called a demilitarized zone ((DMZ).
DMZ). The firewall
allows limited access to the DMZ, but because the DMZ only includes the public servers,
an attack there only affects the servers and does not affect tthe
he other inside networks.
Demilitarized zone (DMZ) is either a physical or logical sub network that contains
networks externally connected services which connect to the internet. It provides another
layer of security for LAN
UPS in the power house An uninterruptible power supply (UPS) is a device that allows a
computer to keep running for at least a short time
ti me when the primary power source is lost. It
11
Figure 9 Chain of server in AASTU Data Center
12
After we visit data center,
center , we see the following Logical design of AASTU LAN
13
CHAPTER THREE
“The network design you choose to implement should fit the communications problem you
solve” Mr. Daniel and Mr. Adam our supervisors from network Administration
are trying to solve”
team. We get training about network design and simulation. To develop our training, they
have given as a project to review the buildings in AASTU which already had the network
access and to design it by the group. Also, the information about ethernet port gathering from
college of social and natural science and college of Electrical and Mechanical Engineering.
The ethernet port of each building has its own code that identify its interface on AASTU
LAN architecture.SB3PnNm and CL5PnNm is for social and natural science and electrical
and mechanical engineering college respectively.
After we have finished collecting of ethernet ports We come to physical design of network
for each block. The network design is done by using Visio Microsoft office software
application. When the physical design of network on each room is done the port is identified
as active and deactivate port depending on the data gathered.
14
Packet tracer is a cross-platform visual simulation tool designed by Cisco Systems that allow
a llow
users to create network topologies and imitate modern computer networks. The software
allows users to simulate the configuration of Cisco routers and switches using a simulated
command line interface. Packet Tracer makes use of a drag and drop user interface, all
allowing
owing
users to add and remove simulated network devices as they see fit packet Tracer allows
students to design complex and large networks, which is often not feasible with physical
hardware, due to costs
It’s time to introduce us to the Cisco Internetwork Operating System (IOS). The IOS is what
runs Cisco routers as well as Cisco’s switches, and it’s also what we use to configure these
devices. We are going to show you how to configure a Cisco IOS device using the Cisco
Cisc o IOS
command-line interface (CLI). You can to configure
configure hostnames, banners, passwords, and
more as well as troubleshoot skillfully
skillfull y using the Cisco IOS. We start by Logical design a
network on cisco packet tracer which have Router as DHCP-server, Core switch, access
switch and computers as end device
Core switch: Create VLAN, Configure names, console password, banners, interfaces and
port- channel for this switch
Access Switch: Create VLAN, Configure name, console password, interface, banners and
port-channel with core switch
1 Administrative Configurations: these are commands that are particularly helpful when
administering your network. We can configure names, banners, console password and
interfaces to our switch or router.
2 Working with DHCP: DHCP is the Dynamic Host Configuration Protocol. It sends IP
information to clients automatically, making configuration of IP addresses on the network
easier and automated. Dynamic
D ynamic Host Configuration Protocol allows properly configured
client computers to obtain IP addresses automatically
automaticall y from a DHCP server. This is done so
that a network administrator does not have to manually configure IP addresses on all the
computers on a network individually. This protocol therefore reduces the amount of system
administration, allowing devices to be added to the network with little or no manual
intervention. We use router as DHCP server in this case
cas e and give information the same as
DHCP- server. The IP information
in formation obtained might include the following: IP address, Subnet
mask, Gateway list and other advanced option
16
3 Working with creation of sub-interface: one physical interface divided into multiple sub-
interfaces, with one subnet assigned per VLAN, each sub-interface
sub-interfac e being the default gateway
address for each VLAN/subnet. An encapsulation identifier must be assigned to each sub-
interface to define the VLAN ID of that sub-interface.
4 Working with creation of VLAN routing and configuration on packet tracer : Virtual
LANs (VLANs) offer a method of dividing one physical network into multiple broadcast
domains. However, VLAN-enabled switches cannot, by themselves, forward traffic across
VLAN boundaries. For inter-VLAN communication, a Layer 3 router is required and Port-
channel
Access ports an access port belongs to and carries the traffic of only one VLAN.
VLAN.
17
3.2.
3.2.1
1 Logical Design of Networ
Networ k on Cisco packet tr acer
acer
18
Step 2 Set Hostname, banner and Configure Console Password
DHCP-server(config)#line console 0
DHCP-server(config-line)#password aastu
DHCP-server(config-line)#login
DHCP-server(config)#serv
DHCP-server(config)#service
ice password-encryption
password-encryption
DHCP-server(config)#interface fa0/0
DHCP-server (config-if)#no shutdown
DHCP-server (config-if)#exit
DHCP-server(dhcp-config)#default-router 192.168.1.1
DHCP-server(dhcp-config)#exit
DHCP-server(dhcp-config)#default-router 192.168.2.1
DHCP-server(dhcp-config)#exit
19
Figure 14 CLI show basic configuration and sub-interfaces on router
Switch> enable
Switch # config terminal
Switch (config)#
Core-Switch (config-vlan)#exit
Core-Switch (config)#vlan 20
20
Core-Switch (config-vlan)#exit
Switch(config)#interface fa0/1
Switch(config-if)#switchport mode trunk
On this core switch CLI we create two VLAN, configure two port channels, and interface for
port channel is trunk because it is between switch and switch as well as between switch and
router. Even if on the above picture we do not get all configuration we done on this core
switch by clicking enter button on our computer we can get additional configuration.
21
3.2.4 Configuration on Access 1 Switch
Switch> enable
Switch # config terminal
Switch (config)#
AccessSW1 (config-vlan)#exit
Step 4 Assign Ports to Different VLANs and Ethernet channel Configuration :
22
Figure 16 show configuration done on Access Switch 1
Access switch found between end device and core switch. The configuration done on this
switch VLAN 10 is created, Port channel is created and interface with end device access.
Even if on the above picture we do not get all configuration we done on this Access switch by
clicking enter button on our computer we can get additional configuration
Switch> enable
Switch # config terminal
Switch (config)#
AccessSW2 (config-vlan)#exit
23
AccessSW2 (config)#interface range fa0/8- 11
AccessSW2 (config-if-range)#channel-group 2 mode passive
AccessSW2 (config-if-range)#exit
AccessSW2 (config)#interface port-channel 2
AccessSW2 (config-if)#switchport mode trunk
Ipconfig and ping are some of our best friends when we deal on the end device as
network administrator. These basic TCP/IP commands can help us to analyze and
troubleshoot various networking issues that might occur. They also offer a certain amount
of configurative ability, as well as the ability to create performance baselines. These
commands are used in the Windows command prompt
1 Ipconfig: displays information, it can also be used to make basic configuration changes
and reset certain facets of DHCP and DNS
24
Figure 17 shows ipconfig and ping response
3 netstat: In computing netstat (network statics) is command-line network utility tool that
displays network
outgoing), routingconnections
tables and afor the Transmission
number Transmissi on interface
of network Control Protocol
(network(both incoming
interface and
controller
or software defined network interface) and network protocols statics
stati cs
Within eNSP also we did the same task even if eNSP is used for Huawei device like
Router and switch configuration. For this also we done DHCP configuration by using
router as DHCP-Server and creating VLAN for switch.
25
On CLI of eNSP we deal with four command line view
The presence of chevrons identifies that the user is currently in the user view whereas square
bracket show that transition to the system view has occurred.
<Huawei>system-view
Enter system view, return user view with Ctrl+Z.
[Huawei]sysname DHCP-server
[Huawei]sysname
[DHCP-server]header
[DHCP-server]header shell information "Do Not Reboot this router"
[DHCP-server]user-interface console 0
[DHCP-server-ui-console0]authentication-mode password
DHCP-server-ui-console0]set authentication password cipher aastu
26
Step 3 Creating sub-interface for VLAN 10 on router:
[DHCP-server-GigabitEthernet0/0/0]interface g0/0/0.10
[DHCP-server-GigabitEthernet0/0/0.10]dot1q termination vid 10
[DHCP-server-GigabitEthernet0/0/0.10]ip address 192.168.1.1 255.255.255.0
[DHCP-server-GigabitEthernet0/0/0.10]arp broadcast enable
Step 4 Creating sub-interface for VLAN 20 on router:
[DHCP-server-GigabitEthernet0/0/0.10]interface g0/0/0.20
[DHCP-server-GigabitEthernet0/0/0.20]dot1q termination vid 20
[DHCP-server-GigabitEthernet0/0/0.20]ip address 192.168.2.1 255.255.255.0
[DHCP-server-GigabitEthernet0/0/0.20]arp broadcast enable
27
3.3.3 Configuration on core Switch
<Huawei>system-view
[Huawei]sysname CoreS
[CoreS]header shell information "THIS IS CORE SWITCH"
[CoreS]user-interface console 0
[CoreS-ui-console0]authentication-mode password
[CoreS-ui-console0]set authentication password cipher aastu
[CoreS]vlan 10
[CoreS-vlan10]q
[CoreS]vlan 20
[CoreS-vlan20]q
[CoreS]interface Eth-Trunk 1
[CoreS-Eth-Trunk1]mode lacp
[CoreS]interface Ethernet 0/0/6
[CoreS-Ethernet0/0/6]eth-trunk 1
[CoreS-Ethernet0/0/6]interface Ethernet 0/0/7
[CoreS-Ethernet0/0/7]eth-trunk 1
[CoreS-Ethernet0/0/7]interface Ethernet 0/0/8
[CoreS-Ethernet0/0/8]eth-trunk 1
[CoreS-Ethernet0/0/8]interface Ethernet 0/0/9
[CoreS-Ethernet0/0/9]eth-trunk 1
[CoreS]interface Eth-Trunk 1
[CoreS-Eth-Trunk1]port link-type trunk
[CoreS-Eth-Trunk1]port trunk allow-pass vlan 10
[CoreS]interface Eth-Trunk 2
[CoreS-Eth-Trunk2]mode lacp
[CoreS]interface Ethernet 0/0/10
[CoreS-Ethernet0/0/10]eth-trunk 2
[CoreS-Ethernet0/0/10]interface Ethernet 0/0/11
[CoreS-Ethernet0/0/11]eth-trunk 2
[CoreS-Ethernet0/0/11]interface Ethernet 0/0/12
[CoreS-Ethernet0/0/12]eth-trunk 2
[CoreS-Ethernet0/0/12]interface Ethernet 0/0/13
[CoreS-Ethernet0/0/13]eth-trunk 2
[CoreS]interface Eth-Trunk 2
[CoreS-Eth-Trunk1]port link-type trunk
[CoreS-Eth-Trunk1]port trunk allow-pass vlan 20
28
[CoreS]interface GigabitEthernet 0/0/1
[CoreS-GigabitEthernet0/0/1]port link-type trunk
[CoreS-GigabitEthernet0/0/1]port trunk allow-pass vlan all
<Huawei>system-view
[Huawei]sysname AccesS1
[AccesS1]header shell information "THIS IS ACCESS SWITCH 1 "
[AccesS1]user-interface console 0
[AccesS1-ui-console0]authentication-mode password
[AccesS1-ui-console0]set authentication password cipher aastu
[AccesS1]vlan 10
[AccesS1-vlan10]q
[AccesS1]interface Eth-Trunk 1
[AccesS1-Eth-Trunk1]mode lacp
[AccesS1]interface Ethernet 0/0/6
[AccesS1-Ethernet0/0/6]eth-trunk 1
[AccesS1-Ethernet0/0/6]interface Ethernet 0/0/7
[AccesS1-Ethernet0/0/7]eth-trunk 1
[AccesS1-Ethernet0/0/7]interface Ethernet 0/0/8
[AccesS1-Ethernet0/0/8]eth-trunk 1
[AccesS1-Ethernet0/0/8]interface Ethernet 0/0/9
[AccesS1-Ethernet0/0/9]eth-trunk 1
[AccesS1]interface Eth-Trunk 1
[AccesS1-Eth-Trunk1]port link-type trunk
[AccesS1-Eth-Trunk1]port trunk allow-pass vlan 10
3.4 System Administration team: this team is other part of service delivery team for
AASTU community in ICT directorate. They are mainly responsible for the configuration
and reliable operations of computer systems and different
dif ferent server found in AASTU data
center. They are also responsible to installing all the required applications to support the
campus, and to ensure that all the service is running. On the other hand, they check the
29
Internet connection in the office is working, the mail service is running and processing emails
that are sent and received by all staff within the campus.
From this team we get training about domain name service (DNS) and active directory
management. In addition to this training two projects centralized
centraliz ed FTP-server Management
and centralized printer server management is given to us. From these projects we get basic
knowledge and understanding, as well as role of system administrator in real world.
Every computer on the public Internet has a unique numeric address similar
simil ar to the uniqueness
of a telephone number, which is a string of numbers that is difficult for most people to
remember This string is called the IP address in the case of computer on the network. To
make it easier to find given location
locati on on the Internet, the Domain Name System, (DNS), was
invented. DNS was designed as a tree structure, where each named domain is a node in the
tree. The top-most node of the tree is the DNS root
ro ot domain (.), under which there are
subdomains, such as .com, .edu, .gov, and .mil as shown below.
Active Directory (AD) is a directory service that Microsoft developed for windows
domain networks. Initially, Active Directory was only
only in charge of centralized dom
domain
ain
management. Active Directory Domain Service (AD DS) is called a domain controller.
It authenticates and authorizes all users and computers in a Windows domain type network—
assigning and enforcing security policies for all computers and installing or updating
software. For example, when a user logs into a computer that is part of a Windows domain,
Active Directory checks the submitted password and determines whether the user is a system
s ystem
administrator or normal user. Also, it allows management and storage of information,
30
How we add client to domain controller server
31
Step 3 Two blank space is come so, for computer name we enter the name of client computer
as it is comfortable for us to control and manage central and for the second blank space, we
choose domain and enter domain name of our organization example in our case we use
us e
aastu.edu.et then click ok
STEP 4 Click ok and then the below page is come but it is secure and only system
administrator was entered.
32
We see How Remotely connect to the Kaspersky server and install
insta ll for client computer and
central manage all aastu desktop computers under one domain name.
33
this is show when remotely we access Kaspersky server on our computer
after few days we got (ID) and done our work in smoothly and attractive way with our team
34
CHAPTER FOUR
4.1 Introduction
Centralized FTP server is backbone of today communication in this networked world. It use
the concept of standard network protocol used for the transfer of computer files between a
client and server on computer network. FTP is built on a client-server model architecture
using separate control and data connections between the client and the server. Use port 21 for
control connection and port 20 for data connection. To transfer file using FTP, you require to
an FTP server, a user account and FTP client or application. Generally, most FTP servers
require a username and a password in order to make a connection.
35
4.3 Objective
➢ Using centralized FTP server for huge data transfer and store data
4.3.1.1 scope
✓ Explain operation of FTP for transferring data between FTP server and local
machines.
✓ Provide central managed files which only permitted user is used and share
files to others
4.3.1.2 Limitations
Centralized FTP dependent file transfer is not secure, Because FTP uses only
username and password as criteria to access shared files or in some case the user may
enter anonymously without any requirement. As well as the data is transferred without
any encryption so this is limitation of FTP
4.4
4.4 Signifi cance
All user of computer that want to share their file central managed with others can use.
Especially company that have work in different place and want to share huge files
f iles
with other of its employees. Also, as individual person when someone want to store
its file on FTP server. Web developers also use FTP server
you want to transmit small data; you need small rate bandwidth such as the application of
internet telephony encodes voice at 32 kbps. However, if you have huge files and want to
transmit them, you need more bandwidth. This is more advantages than small rate bandwidth.
Timing is important when you transmit the data. Applications should provide quick data
transferring to save time. For example, real-time applications of internet telephony, virtual
environments, multiplayer games or etc.
4.5 Methodology
To transfer file using FTP, you require to an FTP server, a user account and FTP client or
application. Generally, most FTP servers require a username and a password in order to make
a connection. However, some servers may allow users to connect as anonymous users with no
username or password. FTP is founded on a client-server architecture which clients are
transferring files to a server
ser ver and receiving files from a sserver
erver as shown in Figure 2. FTP
period consists two connections which are transmitting standard FTP commands,
commands, responses
and transferring the actual data
1 control connection
For sending control information like user identification, password, commands to change the
remote directory, commands to retrieve and store files, etc., FTP makes use of control
connection. The control connection is initiated on port number 21.
37
2 data connection
For sending the actual file, FTP makes use of data connection. A data connection is initiated
on port number 20. FTP sends the control information out-of-band as it uses a separate
control connection. Some protocols send their request and response header lines and the data
in the same TCP connection. For this reason, they are said to send
s end their control information
in-band. HTTP and SMTP are such examples.
Step 1 Request: This request is initiated by the client allowing the file transfer protocol to
begin. Sub-commands used for
for this step is store, delete, lookup, open and close. Allows client
to interact with the server before they download or upload a file.
Step 2 Response: server will inform the client that it is ready to either receive or send a file.
The sub-commands used in this transaction are ready to send and ready to reactive
Step 4 Terminate: two types of terminate transactions occur at this step these are successful
terminate and unsuccessful terminate
4.5.2 FileZilla
1 username and password login: This is a restrictive method where only users with an
account can access the server.
se rver. This common when there is a need for users to upload or
download files to and from the server.
FileZilla is a free software, cross-platform FTP application, consisting of FileZilla client and
FileZilla server. client binaries are available for window, Linux, and macOS, server binaries
are available for windows only. Both server and client support FTP and FTPS, unlike some
38
other FTP clients, FileZilla Client does not implement a workaround for an error in the IIS
server which causes file corruption when resuming large file downloads
39
(5) Logon Type: Normal
(6) User: ftp-user
(7) Password: user password
(8) Click “Connect” to access your ftp directory
Central managing file transfer using ftp adds many of the management features
required as file transfer needs grow from occasional and non-critical
non -critical to high-volume
and mission-critical. Not so obvious from the name, MFT solutions also provide a large
number of security and compliance features that are either unavailable or just too hard
to add on to off-the-shelf FTP products
4.6 Conclusion
In general, centralized FTP-server is used to transfer huge files between server and clients.
Since the file is stored central
c entral on one place the user can eas
easily
ily access it at any time and any
place. This centralized FTP-server solve space limitation found currently on computers
From three common methods of using FTP to transfer files like, web browser, command line
FTP and Graphical user interface FTP client In our project we
w e use FileZilla which is widely
used in FTP transfer files.
4.7 Recommendation
Even if FTP is the oldest protocol used for many years, FTP was not designed
design ed to be a secure
protocol, and has many security weaknesses. So, we recommend sing a different, more secure
protocol that can handle the job, e.g. Security shell File Transfer protocol (SSH) or Secure
copy protocol (SCP).
41
4.8.1 Objective, scope and significance
The main aim of this project is to design a central printing management system.
Specific objective
✓ Cost reduction
✓ Control and monitoring printing central
✓ Improving environmental performance and minimizing environmental impacts
Scope
The scope of this projects: Evaluate the existing printing system to identify weakness and
configure the print server and to know how the system is work theoretically
Limitation: sin
single
gle point of failure (disaster recovery implications) cause over all failures
The usage of individual desktop printers will be minimized. They will be removed as the new
central print devices are rolled out, unless an approved business case allows them to be kept
as exceptions.
The components of a central printing management system comprise of both hardware and
software. Each of these components provides set of related functions in the system. The
Figure below describes the various components of a central printing management system.
2 Print servers: The print server is regarded as a network device, software application or a
computer that connect printing device to the clients over a network to administer print
request. It is a device that receives print jobs from clients and sends them to a print device.
3 Print Driver: This is software that converts the print jobs generated by applications into an
appropriate string of commands for a specific print device. The printer driver helps renders
prints jobs into a language the print device can use
use to reproduce what one intended to print.
Hence, it is often referred to as a translator a print processor.
with the print device. It is a software entity the client prints through. The installation of the
printer depends on it intends purpose. In the case of a remote printing, the printer resides on
the print server. However, if it is local printing or print jobs redirected to a print device, the
43
The central print management system is a printing service that will be activated on a server
print server. This printing service depends on other coexisting services that are been run on
on
the server. These various services or servers that must exist for print server to function
properly are: Lightweight Directory Access protocol server (LDAP) is a standard application
protocol used over an Internet Protocol (IP) Network for managing and accessing the
distributed directory information services. Domain name System server (DNS) DNS provides
for forward and reverse look up queries. Hence; it resolves an IP address to
t o a computer name
and the hostname to an Internet protocol (IP) address respectively. Dynamic Host
Configuration Protocol (DHCP) This is another auxiliary service that must exist for printing
the interconnectivity between the print server and other auxiliary services within the
network. On boot up, the DHCP client (Workstation) request for an IP configuration, subnet
acknowledge those requests. The DNS client sends a request to resolve the computer name to
IP address. The system administrator creates a username account and gives privileges and
roles. On logging on to the domain, the active directory authorizes the users to inherit this
role to functions within the network. The user sends a print job to the print server through the
software interface and the print server in-turn reply when the job has been printed.
printed. User log
into the network print device, active directory authenticates the user and forward reply to the
print server. Print server forward queue job for the print device to release or pull the print
jobs
44
Figure 29 Network architecture of CPMS
Currently since we have no real printer server on our hand, we use software platform called
Papercut to show how we central manage this printer server. using papercut NG/MF software
to manage central print server Papercut NG/MF is a comprehensive print management system
designed to seamlessly monitor and control your resources with easy
eas y to use administrative
and user tools that can be securely.
4.12 Conclusion
From this project we concluded the necessary printing system is central printing management
system types especially at this
t his time in large company or campus and other wide places. But
CPMS also have advantages and disadvantages part. We know this project the difference
differ ence
between central print management system and direct ip printing system/old printing system
and we can select what is the best one from the two-printing system based on cost reduction,
time saving etc. We know also from our projects what is components of CPMS detail and one
of the best types of print management software papercut
pa percut and know also what is the workflow
process of papercut. accessed from anywhere on the network though
though a web browser.
4.13 Recommendation
Central print server is Loss of autonomy in local sites,
si tes, Implementation requires multiple hops
over the network consuming bandwidth and related latency of print times and Single point of
failure (disaster recovery implications). So, we recommend the best systems use to prevent
this limitation for the future.
45
CHAPTER FIVE
One of the major benefits of our internship was developing our practical skills and operating
on real devices; that is, we have got a free access to some of the enterprise networking devices
that we were learning in the class in the past years. For example, we enter into Access switch
by using console port and see different interface
inte rface that
t hat found on them. We can also configure
router, switch and other end devices on packet tracer and eNSP, software platforms used for
simulation and logical design of enterprise network. which we started experiencing a real-world
phenomenon of enterprise networking. In addition to this we learn how central controller
services in the organization by using domain name of the organization
or ganization on the controller server.
For effective operation of any practical work a clear understanding of the theoretical knowledge
is required. Starting from day one we started reading a training material for CISCO and Huawei
devices So, it was very simple for us to upgrade what we learned in the class since their
document was precise and easy to understand. In addition, we were ordered to read some
documents that were helpful for specific tasks to be taken. All over, the projects, that we were
working with the system administration team, also other practical trainings helped us to ask
questions for ourselves and discover new knowledge.
One of the important things we have found from our internship experience is that we have
improved our personal communication skills; from the trainings our mentors gave us we have
how developed the skills communication with our fellow associates.
46
5.5 Leadership Skills
The internship was an important experience to practice the assets of leadership; and because
all our mentors were team leaders, we got the access to know more about leadership. In doing
our project we were able to improve our self-confidence
self-confi dence as we had the willingness and
inspiration to face any difficulty in the project; this helped us to grow emotionally to learn
from our failure and success; this in turn, gave us the chance to learn about project
management, the technical approach methodology of a project. Above all we have grasp
leadership skills such as self-confidence,
sel f-confidence, accountability, decision making and so on.
In our internship period we understood that ethics is one of the valuable resources a person
can have in the real world; understanding this fact we tried to get closer to others in more
ethical way so that we can be more beneficiary from them. In our internship period we have
developed both our personal and professional ethics; the former being related with how we
should act towards other people while the other related to the ethics we have to acquire
certain tasks done.
Above all this internship has thought as the entrepreneurship skills; working environment had
been a good starting place to enhance our entrepreneur
entrepreneur capabilities. Indeed, we learned a lot
on improving critical thinking and problem-solving skills. The change from school to
workplace itself was another learning opportunity, conditioning us to adapt to change and to
be able to take responsibility.
47
CHAPTER SIX
6.1 Conclusion
In generally this internship program give us a chance not only to work with AASTU ICT
Directorate but also a chance to learn from the good experts. We would like to thank AASTU
ICT Directorate, for introducing us to this great opportunity in which we have developed our
self both theoretical and practical. We also train and learn tthat
hat anything related to information
communication technology is skill, rather than theory which developed in doing practical like
this in internship period.
6.2 Recommendation
As we are Product of AASTU and have relationship with directorates beyond this internship
period, from what we observed we recommended
recommended the followings main points for directorates
➢ Even if AASTU ICT Directorate are try their best, the demand of AASTU community
for Internet access is not answered. We hear many complain from employ in office
and students when we gather the ethernet port of the blocks. However, we see in
some offices there is many ports but not used, so give it for other office.
➢ Also, there is many ethernet ports damaged in both AASTU Libraries and old
48
Reference
[3] Cerf, V. G., & Kahn, R. E. A protocol for packet network intercommunication. IEEE
Transactions on Communications, 22, 5 (1971).
[4] Dag Henning Liodden Sørbø “Increasing the efficiency of a file server by removing
redundant data transfers in popular downloads”
[5] https://en.wikipedia.org/wiki/File_Transfer_Protocol
49