You are on page 1of 51

[DOCUMENT TITLE]

FACULITY OF TECHNOLOGY

DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

COMMUNICATION STREAM

IN DEBRE MARKOS UNIVERSITY ICT CENTER

NAME ID

LAKACHEW ADANE ENG(R) 0665/05

Mentor Name: Mr. ADDISU WORKU (MSC)

Intern period November 01-Feburary 26/2017 G.c

Submission date, March 02/2017G.c

FEBRUARY, 2017 G.C DEBRE TABOR, Ethiopia

Page i
DECLARATION

I am Lakachew Adane a student of DebreTabor University I have completed my internship

report that is Debre Markos University for Academic year of 2016/17G.C. All the report

information’s written in this report are obtained from what I have seen in my Internship period

and from reading different books of the company, and the Company project working manuals.

All the report is done by me except those documents which are mentioned in the reference.

Approved by:-

Name Signature Date

1. …………………………….. ………….. ……………..

Page ii
[DOCUMENT TITLE]

Acknowledgement

First of all I would like to thanks my GOD that helps me in all aspects from the start to the ends.

He was the first adviser of me during the internship period and before that and forever.

Secondly ,I would like to thanks Mr. Bikis ALebachew head of electrical and computer

engineering in Debre Tabor university, he gives great support for me to out the internship in

Debre Markos university. And also,. I’am are also grateful to our school mentor mr,Addisu, for

his comments and suggestions while he came in the first round mentoring.

The other one is my entire department lecturer that helps me to upgrade my theoretical

knowledge in the field of study. And also I would like to thanks the institute that prepares

internship program that the student practices their theoretical knowledge in the real world. I

would like to express my profound sense of gratitude to my supervisor’s mr.Gashaw.

Weldegebriel (The University ICT Director) for their immense interest, invaluable guidance and

moral support and constant encouragement during the Internship work.

My deepest thanks to Mr. Belayneh Mamo and Mr. Tadele for their invaluable teaching and

guidance throughout my stay at DMU ICT. I am also indebted to all the members’ of ICT center,

for providing help whenever needed in my Practical Assignment.

At last but not least, we like forward our acknowledgement to the whole employees of the hosted

company for their friendly attribute and appreciation throughout the project.

Page iii
Contents

DECLARATION ............................................................................................................................ ii

Acknowledgement ......................................................................................................................... iii

LIST OF TABLES ........................................................................................................................ vii

LIST OF FIGURE......................................................................................................................... vii

Executive Summary ....................................................................................................................... ix

HAPTER ONE ................................................................................................................................ 1

1. CAMPANY BACKGROUND ................................................................................................... 1

1.1. HISTORY OF DEBRE MARKOS UNIVERSITY ............................................................. 1

1.2 Background of the ICT directorate........................................................................................ 2

1.2.1 General objective of the directorate................................................................................ 2

1.2.2 Specific objective of the directorate ............................................................................... 3

1.3 Organizational structure of the directorate ............................................................................ 4

CHAPTER TWO ............................................................................................................................ 8

2. Overall Internship Experience .................................................................................................... 8

2.1 Objectives of the Internship .................................................................................................. 8

2.1.1 General Objective ........................................................................................................... 8

2.1.2 Specific Internship objectives ......................................................................................... 8

2. 1 the way I got to the company ............................................................................................... 9

2.3 Overall System Components found in DMU ICT Center working world. ........................... 9

2.3.1 Building Network Installation ........................................................................................ 9

Chapter Three................................................................................................................................ 15

3.1 Technical aspects of the internship ..................................................................................... 15

DTU ECE SET BY LAKACHEW ADANE Page iv


[DOCUMENT TITLE]

3.2 Objective of the technical task ............................................................................................ 16

3.3 Methods and procedures ..................................................................................................... 16

3.4 Network topology................................................................................................................ 17

3 5 Components in the internship area ...................................................................................... 17

3.6 technical tasks/products....................................................................................................... 31

3.7 The Overall Benefits I gained From the Internship............................................................. 31

3.7.1 Practical Skill ................................................................................................................ 31

3.7.2 Benefits in terms of improving technical skills ............................................................ 31

3.7.3 Benefits in terms of management knowledge............................................................... 32

3.7.4 Benefits in terms of improving team skills ................................................................... 32

3.7.5 Benefits in terms of acquiring entrepreneurship skills ................................................. 32

3.7.6 Benefits in terms of acquiring work ethics ................................................................... 33

3.7.7 Benefits in terms of acquiring Leader ship skill ........................................................... 33

Chapter four .................................................................................................................................. 35

Project and Contributions ............................................................................................................. 35

4.1 Overall Achievement of the Intern ...................................................................................... 35

4.2 Project Title: improve design performance, Reliable and Secure network for DMU. ........ 35

4.2.1 Abstract of the project .................................................................................................. 35

4.2.3 Introduction of the project ............................................................................................ 36

4.4 Problems identification. ...................................................................................................... 37

4.4.1 Poorly terminated cable ................................................................................................ 38

4.4.2 Data and electrical cable in one distribution tray ......................................................... 38

4.4.3. Unidentified cables connected to the switch ............................................................... 39

4.4.4. Wastage of materials ................................................................................................... 40

4.4 Objective of Project ................................................................................................................ 41

Page v
4.4.1 General Objective ............................................................................................................. 41

4.4.2Specific objective .............................................................................................................. 41

4.5 Methodology of the Project ................................................................................................. 41

4.7 Literature Review ................................................................................................................ 42

4.6 The Detail Design Works of my Projec .............................................................................. 43

Chapter five ................................................................................................................................... 53

Conclusion and Recommendations ............................................................................................... 53

1 Conclusion ................................................................................................................................. 53

2 Recommendations .................................................................................................................. 53

3 Reference ................................................................................................................................... 54

Page vi
[DOCUMENT TITLE]

LIST OF TABLES

Table 1:- :- Orders of wires at the RJ_45...................................................................................... 10

Table 2:- straight through cable color arrangement ...................................................................... 12

Table 3:- cross over cooler of cable arrangement ......................................................................... 13

Table 4:- UTP Cable categories .................................................................................................... 29

Table 5:- UTP cable types and their use. ...................................................................................... 29

LIST OF FIGURE

Figure 1 Organizational structure. .................................................................................................. 4

Page vii
Figure 2:- Network Flow diagram of DMU .................................................................................... 5

Figure 3:- Overview of server room ............................................................................................. 20

Figure 4 :-Network Switch 24 port Server ................................................................................ 21

Figure 5:- proxy server.................................................................................................................. 22

Figure 6:- -trunk ............................................................................................................................ 25

Figure 7:- RJ 45 connector. ........................................................................................................... 25

Figure 8:- puncher ......................................................................................................................... 26

Figure 9:- cable tester.................................................................................................................... 27

Figure 10:- UTP cable patch panel ............................................................................................... 28

Figure 11:- Ethernet cable cover cutter ......................................................................................... 28

Figure 12:- UTP cable ................................................................................................................... 30

Figure 13:- Unwanted material ..................................................................................................... 37

Figure 14:- poor terminated cable ................................................................................................. 38

Figure 15:- Poor coverings of the trays......................................................................................... 39

Figure 16:- unidentified cables connected to the switch ............................................................... 40

Figure 17:- Wastage material in the lab ........................................................................................ 40

Figure 18:- simulated drawing ...................................................................................................... 43

Figure 19:-pc 0 configuration ....................................................................................................... 51

Figure 20:-pc 1 configuration ....................................................................................................... 52

Page viii
[DOCUMENT TITLE]

DMU Debre Marko’s University.

UIL university industrial linkage

UTP- Unshielded Twisted Pair

ICT Information Communication Technology

LAN Local Area Network

NIS Network Information System

RJ Registered Jack

STP Shielded twisted pair

Pc personal computer

CAT6 Category- 6 Ethernet cable

Executive Summary

The internship program report is necessary part of the BSc program, & every student has to do

internship of 4 months in any organizational related to his /her field of interest. After successfull

completion of the internship work a student is required to write whatever practices & practical

work he has done in his internship work.

Internship was my first step in practical life, through which I learnt a lot and it has aided me in

being well equipped with valuable experience that would help me once I enter the professional

life after the completion my studies.

This report is the collection of my observation and experience during the internship period at

DMU ICT center from October 2016 to mid of February 2017.The internship has also prepared

me for my future career. The experience has taught me responsibility, team work and how to

handle problems occurring. Even though the nature of the work was quite basic as an internee,

nevertheless I got to see what practical life is.

HAPTER ONE

1. CAMPANY BACKGROUND

1.1. HISTORY OF DEBRE MARKOS UNIVERSITY

Debre Markos University is one of the thirteen newly established universities by the federal

democratic republic government of Ethiopia. Its foundation stone was laid in 1997 E.C/.2005.
The university is located two kilometers east from the central square of the town. It is laid out on

100 hectares. It is found in north western part of Ethiopia at Debre Markos town.

The teaching learning process of the university began in 2007. Currently the university is

organized into 18 offices and 6 Colleges and 1 school with over 598 (302 academic staff, 146

permanent and 150 contract supportive staff). This time (2010/11) the previous Education

College opened in 2007 was dividend in to two (Social Science and Humanity, and Natural and

Computational Science Colleges). The six Colleges are Social Science and Humanity, Natural

and Computational Science, Business and Economics, Agriculture and Natural Resource, Health

Science, Technology, and one school i.e. school of Law.

 Mission

The mission of the Debre Markos University is to contribute substantially for social, cultural,

economic, political, scientific and technological development of the nation; through the

provision of high quality education, active engagement in research and outreach activities for the

betterment of life, while offering our employees a conducive and rewarding working

environment that values, recognizes and appreciates their contributions.

 Vision

The vision of the Debre Markos University is to become one of the ten premier research

universities in Africa in 2025 recognized for its quality education, research and outreach

activities.

 Main Customers of Debre Markos University.

The customers of Debre Markos University are divided in different groups of actors, who are

linked to the educational process being the main: current students, potential students, employees,

employers, government and industry. Which have classified the customers in internal and

external, emphasizing that the internal customer who are work to the satisfaction of external

customers Besides, to the authors the customers can be classified in primary ones and secondary

ones, based on their location being as internal customers or external ones and based on the

frequency of interaction that the institution has with them too. While consider that the product of

higher education is the education and then, depending on the role developed by them during the

course, the students can be classified as internal or external.


[DOCUMENT TITLE]

1.2 Background of the ICT directorate

The ICT directorate was established in 2003, with the hope of using it to respond to the current

developments at DMU and ever increasing needs of the University Community towards

Information Technology Products and services.

1.2.1 General objective of the directorate

1. Coordinating all the ICT activities of the University

2. Serves as a liaison between DMU on the one hand and international donor countries,

collaborating overseas universities and relevant local institutions on the other hand in initiating

and implementing ICT related projects and activities at DMU and provide ICT related enabled

environment which facilitate information exchange among local scientists and the interactions

and collaborations between researchers in the institution and the outside world.

3. Ensuring that the current and planned ICT projects and activities at DMU are Implemented

irrespective of change in leadership, staff, and source of fund and ensuring that the planning,

initiation and implementation of ICT projects and activities are coordinated under clearly

Formulated ICT vision and strategies of the university.

4. Helping students to use ICT and allow them exploit enormous possibilities for acquiring

information for schooling purposes and increase learning through communication

5. Ensuring coordination and continuing of the ICT efforts initiated and planned at DMU

6. Ensuring that the financial and other resources required initiating and implementing ICT

projects are in place.

7. Since the idea of utilizing ICTs as a strategic tool is at infant stage in the university, the

directorate coordinates its efforts and contributions towards the introduction and adoption of

ICTs in the University.

8. Coordinates the introduction and wider application of ICTs across all Units of DMU as an

institution.

1.2.2 Specific objective of the directorate

Establishing LAN within and connecting the university with foreign world via Internet.

Providing maintenance service for all collages and directorates.

Developing ICT projects for different colleges and directorates to give efficient services
1.3 Organizational structure of the directorate

Figure 1:- Organizational structure.


[DOCUMENT TITLE]

Ethio

telecommunication

Router

Server

Switch

Social Digital ICT

Building Library Directorate

Master Technolog

library y Faculty ICT DIRECTORATE

OFFICE(BLOCK-27)

Figure 2:- Network Flow diagram of DMU

Main Products or Services

DMU ICT provides the following services and products

Generally products or services of the organization are:

 software installation system

 Software testing

 Also it provides the application such as:

o Office machinery Maintenance

o Hardware Maintenance

o Network installation

o Network Security

o ICT training

o Video Conference

Software installing

This company gives the installing software services for different offices and students. Some of

the software that company can be installing is as follows:-

 Anti-virus

 Word-office
 Any types of windows

 Accounting software (like Peachtree)

 Any Engineering software (like Auto-cad, Eagle point etc.)

Software testing

Under this method the company will check whether the installed software will expire or not,

when it is expired it will be updated. In addition to this, the company will add extra things, if it

will need. The above indicated software could be tested under this topic.

Office machinery maintenance

We have tried to mention in our topic the company could maintain their own office machineries

as well as the other sectors and so on. The maintained machines are described below:-

 Printer

 Copy machine

 Scanner

 Rural connectivity, give like maintenance and short training. In addition, they give

technicians supportive for sector zone and all wereda. Example. Supervisor

Desktop and PC hardware maintenance

The company could be give service concerning desktop and PC hardware maintenance for their

own sectors and other sectors as well as for private people. As we tried to explain above

maintaining hardware for the desktop and PC are one of the services that the company gives for

the students, teachers as well as office workers.

Network installation

Since this company would give multiservice for all society, all sector in that zone and non-

governmental organization. This network installation expansion is highly necessary for

everybody who wants to use it. .

ICT training

DMU ICT Company could help people who live in that zone without any payment to give short

basic computer training course. Internet service, give for any sector wereda and individual

person.

CHAPTER TWO
[DOCUMENT TITLE]

2. Overall Internship Experience

2.1 Objectives of the Internship

2.1.1 General Objective

Debre tabor institute of technology aims this internship program enables engineering students

under the institute to relate their theoretical knowledge to the real world. Internships will provide

students the opportunity to test their interest in a particular career before permanent

commitments are made.

The main objective of the internship was to gain an experienced practical knowledge in

Different electrical equipment’s and control automation systems by inter-relating with the

Theoretical knowledge and to upgrade our technology. Internships will provide us the

Opportunity to test their interest in a particular career before permanent commitments is made.

Apart from this it has the following advantages:

 We will develop skills and techniques directly applicable to the careers we hold.

 Internships will provide us the opportunity to develop attitudes conducive to effective

interpersonal relationships.

 Internships will provide us to have depth knowledge of the formal functional activities of

a participating organization.

 Internship programs will help to develop problem solving skills.

In general, an Internship is thought of as a program which "narrows the gap" between the

academic environment and a future work environment. Many employers prefer students who

have previous work experience and the Internship provides to have those experiences.Students

that participate in an Internship program are generally more confident and more qualified when

seeking in the future employment.

2.1.2 Specific Internship objectives

 To provide intensive field experience allowing for hands-on computer work.

 To gain a better understanding of the design, structure and information system of an

industrial organization.

 To develop an understanding of an organization's various management and technical

skills, the communications techniques and the decision-making processes.


 To apply the theoretical knowledge (theory, skill development, professionalism) to be

familiar with different electrical instruments, their application in the real world and their

control system design and installation to achieve our goals.

 To develop leadership skill and interaction with co-workers.

 To relate practical knowledge interacting with theoretical knowledge.

 To apply what was learned during coursework (skill development and professionalism)

to the real world.

2. 1 the way I got to the company

The university industry linkage program is planned to create a good interaction between

universities and industries, and also create students that have the capability of facing and solving

practical problems. Because of these reasons, Debre Tabor University has given a great deal of

attention to this program in helping students, starting from searching companies that are willing

to be part of this program up to giving essential documents and schedules. So I get into the

company by giving internship place request letter of my University to company head office.

Then they observe the request letter and they had given their acceptance letter. When I come

back to their company to begin the internship program, I should bring the acceptance letter of the

company. Then I started my internship program.

2.3 Overall System Components found in DMU ICT Center working world.

2.3.1 Building Network Installation

Building NW installation is simply inserting a NW service in to the Building or making the NW

available within the building. NW installation is mainly important for resources sharing.

CAT6UTP cable is used for the connection in our case. Because UTP cables are economically

feasible and well protected.CAT6 UTP cable has 4 pairs twisted. Out of these 4 pairs; 2 pairs are

used for TX (transmission of text) and the remaining 2 pairs are used for RX (receiving of text).

The 4 pairs are punched to the outlet according to the given order of standard B. actually the

outlet has two standards: namely standard A and standard B. It has been also seen that 2 pairs of

wires (white orange, orange, white green and green) are used to test the presence of adapter with

in a computer. There are two types of connections in the case of NW installation. These are:

straight through and cross over. Straight through is used to connect different devices (e.g.
[DOCUMENT TITLE]

computer with printer) and cross over is used to connect similar devices (e.g. computer to

computer). But for now straight through connection is our issue. The placement of colors in both

connections is shown in table 1 below.

Table 1:- :- Orders of wires at the RJ_45

Straight through connection Cross over connection

White orange White green

Orange Green

White green White orange

Blue Blue

White blue White blue

Green Orange

White brown White brown

Brown Brown

Networks are extremely complex but are the very back bone of every business. We at NIS fully

understand the requirements of our clients which is why you the client are our first priority. In

general network installation is the interconnection of different data center and share the

information technically. During the interconnection of the data centers all the clients connects

each other and also to the server that controls all the data that flowing through it. So everyone

who install network should have to know how to interconnect and considers any engineering

aspect as well as economic aspects to keep up with safety.

Overall tasks performed are briefly explained below:-

Cabling

Labeling

During this task meaning that network installation I did network cabling system

Cabling

Cables are used to connect one network device to other network devices or to connect two or

more computers to share printer, scanner etc. Different types of network cables like

Coaxialcable, Optical fiber cable, Twisted Pair cables are used depending on the network's

topology, protocol and size. The devices can be separated by a few meters (e.g. via Ethernet) or
nearly unlimited distances (e.g. via the interconnections of the Internet).There are several types

of cable which are commonly used with LANs. In some cases, a network will utilize only one

type of cable, other networks will use a variety of cable types. The type of cable chosen for a

network is related to the network's topology, protocol, and size. Understanding the characteristics

of different types of cable and how they relate to other aspects of a network is necessary for the

development of a successful network.

An Optical fiber cable consists of a center glass core surrounded by several layers of protective

material. The outer insulating jacket is made of Teflon or PVC to prevent interference. It is

expensive but has higher bandwidth and can transmit data over longer distances.

Coaxial lines confine the electromagnetic wave to area inside the cable, between the center

conductor and the shield. The transmission of energy in the line occurs totally through the

dielectric inside the cable between the conductors. The most common use for coaxial cables is

for television and other signals with bandwidth of multiple megahertz.

Twisted pair cabling is a form of wiring in which pairs of wires (the forward and return

conductors of a single circuit) are twisted together for the purposes of cancelling out

electromagnetic interference (EMI) from other wire pairs and from external sources. This type of

cable is used for home and corporate Ethernet networks.

Depending on devices they connect to share data by twisted pair cable, cabling of twisted pair

cabling is divided into two major parts:

 Straight through

 Crossover

Straight through

Straight through cable is a type of twisted pair copper wire cable for LAN use for which the RJ-

45 connectors at each end have the same pin out. The wires on the cable are crossed over so that

they receive signal pins on the connector on one end are connected to the transmit signal pins on

the connector on the other end. Straight-through cable is used to connect computers and other

end-user devices (e.g., printers) to networking devices such as hubs and switches. It can also be

used to directly connect like devices (e.g., two hubs or two switches) if the cable is plugged

intoan uplink port on one (but not both) of the devices.


[DOCUMENT TITLE]

In general straight through cable we used to connect like:-

 Computers with switch

 Routers with switch

 Switch with hub

Table 2:- straight through cable color arrangement

RJ45 No.1 Pin# Pin# RJ45 No.1

White Green 1 1 White Green

Green 2 2 Green

White Orange 3 3 White orange

Blue 4 4 Blue

White Blue 5 5 White Blue

Orange 6 6 Orange

White Brown 7 7 White Brown

Brown 8 8 Brown

Cross over cable

Cross over cable is a type of twisted pair copper wire cable for LAN use for which the second

and third pairs on one end of the cable will be reversed on the other end. Cross over cabling is

used as a backbone cable to connect two or more switches in LAN, or connect two isolated hosts

to create a mini-LAN. Crossover cable is used to connect two like devices without the use of an

uplink port.

In general we used Cross over cable to connect like:

 Two computers

 Two routers

 Two switch

 Two PC’

Table 3:- cross over cooler of cable arrangement

RJ45 NO.1 Pin# Pin# RJ45No.1

White Green 1 1 White Green

Green 2 2 Green
White orange 3 3 White orange

Blue 4 4 Blue

White Blue 5 5 White Blue

Orange 6 6 Orange

White Brown 7 7 White Brown

Brown 8 8 Brown

Labeling

Labeling is the process of giving the proper number existing on the switches or Patch Panel

correspondingly to the ports, i.e. the out let of the cable rising from the switches or hubs. It is

very important to give labels to the cables. Labels make the network troubleshooting less painful.

In case of problem, no need to trace every cable end to end. Each end of cable should be labeled;

the label should give information about where the cable is connected to.

Objective and mission of the cabling

 To verify the functionality of the network.

 To verify that the performance of the installed the network meet with the specifieddesign

intent through a series of tests and adjustment

Chapter Three

3.1 Technical aspects of the internship

As I mentioned earlier, mean that during network installation I did many technical things related

to network installation. Just I’ve entered to the DMU-ICT, our supervisors gives us orientation

about how we install network and also all over the campus work ethics. Then after we are going

to our job. The first job was selection of cables that founds in the University and by cable

standard arrangement we crimp the cable. That I mentioned in chapter two the cabling system

that we did is straight through cabling system. The cable standard of straight through is TIA/EIA

standard 568B as follow.

1. White orange 3.white blue 5. Blue 7. White green

2. Orange 4. Green 6.Brown 8.whitebrown

The other one is the maintenance part .In these sections we have try to identify the problem of

the computer and how to solve the problem. And also during this task we have try to know which
[DOCUMENT TITLE]

parts of the computer is sensitive to damage and we are try to know how to fix this problem. For

example when we push the on/off button the computer, then the computer starts working. After

some minutes the computer turn off .if this types of problem is occurred repeatedly on the

computer, we have to check directly to the fan area. This types of problem occurs when the hole

of the fan are closed by waste materials like dust. So we have to clean the area. Usually, the

problem of the computer is either the hard ware part or the software part. In most case, problem

occurs in computer is in its software part. we have also learned that how to format computers and

install software’s on the computer. But we haven’t maintained computer that much. AsI

mentioned earlier (in chapter two), in maintenance part mostly the only thing that we didis

checking whether the computer function or not. So we haven’t got that much enough knowledge

because all the computers are normal. But the main thing that I gained from the maintenance part

is full of confidence to open the computer to maintain for todays and future job market. But I

would like thanks to my campus and my Internship University for their contributions on me to

develop my theoretical knowledge that I gained in classes to apply in the real world.

3.2 Objective of the technical task

 To verify proper functioning of the equipment/system after installation;

 To verify that the performance of the installed the equipment/systems meet with the

specified design intent through a series of tests and adjustments

 To capture and record performance data of the whole installation as the baseline for

future operation and maintenance.

The other objective is that, students have theoretical knowledge that gains in the class when they

are in their campus.as we all know, theoretical knowledge is not enough to allow graduates to

perform at a higher level and for the development of one country. I mean that, in the real world

environment, analytical skills are not enough. Students must have both interpersonal

andleadership abilities. By efficiently using internships, students will increase their skills and

makethem valuable to the job market.

In general technical task is used to develop analytical knowledge of the student in the real world

and also to show what look like the real world.

In general the objectives of the technical task according to the University are:
 To Checking up functionality of the system that we installed

 To satisfy goals of the University

3.3 Methods and procedures

Networking

In the ICT department the networking portion was one of the subsections under my hosting

company (DMU ICT). I have been participating and have got a great knowledge about it during

the four months I spent as an intern there. I will give the priority for it to describe the work flow

and procedures undertaking in a complete networking project.

There were some procedures during this task. Thus are:

 Taking of pre-training about networking by our adviser

 Collecting of data which was carried out daily

 Using previous theoretical knowledge & also reading some references with hard copies

and internet related to networking

3.4 Network topology

Network topology refers to the physical structure of the transmission links. In our design we

have chosen star topology because all terminal nodes connect directly to a central node, usually a

host computer, or file server. This topology facilitates central control of the network and

economizes on the need for network intelligence in remote nodes because the central nodes

manage all network activity. In addition to this topology is used to:

 Easy to install and wire.

 No disruption to the network then connecting or removing devices.

 Easy to detect faults and to remove parts.

3 5 Components in the internship area

When I was in my internship host University, there were components that I used during my

work. The components in the internship area are basically network devices and materials which

will be used during network design and computer maintenance. Even though there were so many

materials in the University. These are:-

 Server room (Data center)

 Routers
[DOCUMENT TITLE]

 Switches

 Access points

 Servers

 Trunk

 Rj45 connector

 punch down tool

 network cable tester

 patch panel

 CAT6 UTP cables

 Ethernet cable cover cutter

 Rank= is a device used to hold UTP patch panel and switch.

 Screw= a device used to fix the trunk and the wall.

 Saw= is used to cut the trunk.

 Hummer= is used to beat the screws and to widen the transmission hole for UTP cable.

 Outlet= is a device used to punch wires according to their color.

 Patch panel= is a device used to forward the data received from switch to node.

PROCEDURES: These are the strategies used to implement the NW installation.

1. It has been designed the floor layout

2. It has been continued to the physical design according to the lay out.

3. It has been prepare the required materials properly.

4. It has been selected one office for the rank to hung 180 centimeters high from the floor.

5. It has been measured the dimensions for the trunk to be 65 cm high from the floor.

6. It has been penetrated the trunk to fasten with the wall through screws.

7. It has been drilled the wall according to the given dots on the wall.

8. It has been inserted a feature to the hole.

9. Finally, it has been fastened the trunk, node and rank properly with the wall.

Punching procedures

1. It has been strip the cable

2. It has been punched each wire to the outlet carefully


3. It has been inserted the outlet to the node properly

4. It has been punched the wires at the UTP cable patch panel similar to the outlet

5. It has been crimped the wires at the RJ_45

6. It has been connected the switches of each floor through RJ_45

7. It has been connected switch to patch panel through RJ_45

Observation

As it has been seen in the building NW installation converting theoretical concepts to practical

aspect is too much easy. It has been also observed that working practically is much easier than

theoretical. Since every activity is in the same ones smartness. The same is true it has been seen

that punching technique is somewhat difficult than trunk leveling. Since wires should be

carefully stripped and punched properly to their appropriate position. especially when it has been

inserted to RJ-45. Generally, it has been seen that any failure in the connection can be easily

maintained by checking at the patch panel punching, at the node outlet connection, and at the

RJ_45 connection.

Server room: - a data center might consist of several server rooms, each of which is used for

separate applications and services. A server room is the physical space that houses all the data

running through the computer network of a business or organization. It is a room used to store,

power and operate computer servers and their associated components. This room is part of a data

center, which typical houses several physical servers lined up together in different form factors,

such as rack mounted, or in tower or blade enclosures.

A server room provides the operational and environmental components and services to operate

enterprise class servers. The servers housed in a server room usually include basic CPU

components and lack any display or input device. They can all be centrally accessed and

managed through a server administrator system, which is typically found outside the server

room.

A server room is designed to provide a continuous and redundant supply of electrical power,

backup/alternate power, lighting and air conditioning, and is monitored by one or more server

administrators. Design a server room must be safe, spacious and computer friendly for the entire

IT team. Putting together a safe and accessible data center for the storing of technology and files
[DOCUMENT TITLE]

is essential in creating a hub for IT infrastructure and operations.

Figure 3:- Overview of server room

Network switches:-are telecommunication device that receives a message from any device

connected to it and then transmits the message only to the device for which the message was

meant. This makes the switch a more intelligent device than a hub (which receives a message

and then transmits it to all the other devices on its network). The network switch plays an

integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized

LANs contain a number of linked managed switches.

A networking switch is also the central device in a wired or wireless LAN. It receives signal

from each computer on the network via Ethernet cables in a wired network or radio waves in

wireless LAN. In both cases the networking switch directs traffic across the LAN enabling the

computers to talk to each other and share resources.

Figure 4 :-Network Switch 24 port Server

Server

Servers in Debre Markos University include

1 proxy server

Figure 5:- proxy server

A proxy server has a variety of potential purposes, including:

 To keep machines behind it anonymous, mainly for security

 To speed up access to resources (using caching). Web proxies are commonly used to

cache web pages from a web server.

 To prevent downloading the same content multiple times (and save bandwidth).

 To scan outbound content, e.g., for data loss prevention.

 To bypass website restrictions at work and/or school.

 Access enhancement/restriction

DNS or Domain Name Server

Is a computer server that hosts a network service for providing responses to queries against a

directory service? It maps a human-recognizable identifier to a system-internal, often numeric

identification or addressing component. This service is performed by the server in response to a


network service protocol request.

Mail Server

A mail server is a computer that serves as an electronic post office for email. Mail exchanged

across networks is passed between mail servers that run specially designed software. This

software is built around agreed-upon, standardized protocols for handling mail messages and any

data files (such as images, multimedia or documents) that might be attached to them. a mail

server is the computerized equivalent of your friendly neighborhood mailman. Every email that

is sent passes through a series of mail servers along its way to its intended recipient. Although it

may seem like a message is sent instantly - zipping from one PC to another in the blink of an

eye- the reality is that a complex series of transfers takes place. Without this series of mail

servers, you would only be able to send emails to people whose email address domains matched

your own - i.e., you could only send messages from one example.com account to another

example.com account.

Mail servers can be classified into two main categories:

I. Outgoing mail servers: - Outgoing mail servers are known as SMTP, or Simple Mail

Transfer Protocol, servers.

II. Incoming mail servers: - Incoming mail servers come in two main varieties.

1. POP3 (Post Office Protocol, version 3) servers are best known for storing sent and received

messages on PCs' local hard drives.

2. IMAP (Internet Message Access Protocol) servers always store copies of messages on servers.

Most POP3servers can store messages on servers, too, which is a lot more.

Web Server

A web server is simply a computer program that dispenses web pages as they are requested. The

machine the program runs on is usually also called a server, and the two references are

interchangeable in everyday conversation. When someone sits down at a computer and enters an

address into an internet browser like Internet Explorer or Firefox, the browser sends a request off

into the internet asking to view the web page found at that address.

The web server is the program or machine that responds to that request, and delivers the content

of the page back to the user. This can be done because every computer or device that connects to
[DOCUMENT TITLE]

the internet has a uniquely identifying number, called an Internet Protocol address, or IP address

for short. This address is what allows computers to find one another and communicate across the

network.in brief, the process works as follows. Every web page on the internet also has a unique

address called a Uniform Resource Locator, or URL.

Something like"www.example.com/page1.htm" is an example of a typical URL. When a user

types that URL into a web browser, the machine the browser is running on sends a request to the

IP address of the machine running the web server for that page, requesting that all the content

found there be sent back. Once the web server receives that request, it sends the page content

back to the IP address of the computer asking for it. The web browser then translates that content

into all of the text, pictures, links, videos, etc. that so many web pages contain.

The web servers can also handle data requests for other protocols not covered here, like SMTP

for email, or FTP for file transfer and storage, it is their ability to respond to web page requests

that is the underlying force keeping the entire World Wide Web up and running.

Trunk: - Trunk is one of the main network installations instrument that casted on the body of

civil structures. Main Features of Computer Network Cable Trucking System are:

 Properly drill the wall using drill machine

 Be sure the trunk we configure is 6 cm above the ground

Some of the tools we are used to configure trunk are:-

 Drill machine

 Fisher(expedition pipe)

 Trunk

 Screw driver

 Pilon

Figure 6:- -trunk

Rj-45 connector: - are only slightly smaller RJ45 is a standard type of connector for network

cables. RJ45 connectors are most commonly seen with Ethernet cables and networks.RJ45

connectors feature eight pins to which the wire strands of a cable interface electrically. Standard

RJ-45 pin outs define the arrangement of the individual wires needed when attaching connectors

to a cable. Several other kinds of connectors closely resemble RJ45 and can be easily confused
for each other. The RJ-11 connectors used with telephone cables, for example,(narrower) than

RJ-45 connectors.

Figure 7:- RJ 45 connector.

Punch down tool: - a punch down tool is a small hand tool used by Telecommunication and

network technicians. It is used for inserting wire into insulation displacement connectors on

punch down blocks, patch panels and surface mount boxes (also known as biscuit jacks).

Most punch down tools are of the impact type, consisting of a handle, an internal spring

mechanism, and a removable slotted blade. To use the punch down tool, a wire is pre-positioned

into a slotted post, and then the punch down tool is pressed down on top of the wire, over the

post. Once the required pressure is reached, the internal spring is triggered, and the blade pushes

the wire into the slot, cutting the insulation, and securing the wire. For light -duty use, there are

also less expensive punch down tools with fixed blades and no impact mechanism.

The trimming blade cutting edge works against the plastic insulating post. Krone blades require a

separate scissor-like mechanism for trimming the wire.

Figure 8:- puncher

Network cable tester:-a cable tester is used to verify that all of the intended connections exist

and that there are no unintended connections in the cable being tested. When an intended

connection is missing it is said to be "open". When an unintended connection exists it is said to

be a "short" (as in short circuit). If a connection "goes to the wrong place" it is said to be "Miss

wired" (the connection has two faults: it is open to the correct contact and shorted to an incorrect

contact).

Generally, the testing is done in two phases. The first phase, called the opens test makes sure

each of the intended connections is good. The second phase, called the shorts test makes sure

there are no unintended connections.

Figure 9:- cable tester

UTP patch panel: - provides a convenient place to terminate all of the cable runs coming from

different rooms into the wiring closet. Of course, one could skip the patch panel and just connect

all RJ-45Connectors directly into the hub, but one may miss the following advantages:

You can label the patch panel so you know which room the cable run goes to. Putting the labels
[DOCUMENT TITLE]

on the cables is tougher to read than labels on a patch panel and also there is risk of having the

cable labels fall off. A patch panel is a step up from a punch-down block. Each of those

connectors is wired to an RJ-45 on the front. The RJ-45 on the front provides a spot to plug in a

patch cable that goes to the hub. UTP patch panels facilitate a world-class installation for data

centers and telecommunications rooms by offering an attractive appearance combined with

flexible labeling and color coding options.

DTU ECE SET BY LAKACHEW ADANE Page 27


FINAL INTERNSHIP REPORT

2017

Figure 10:- UTP cable patch panel

Ethernet cable cover cutter: - We are used this tool to strip the protective part around Ethernet

cable. To remove the cover of Ethernet cables especially CAT-6 we rotate this tool 360 degree

around the cable.

Figure 11:- Ethernet cable cover cutter

CAT6 UTP cables:-The most common copper network media is unshielded twisted pair (UTP)

cable. UTP in Ethernet consists of eight wires twisted into four color-coded pairs and then

wound inside a cable jacket. The colored pairs identify the wires for proper connection at the

terminals.

Table 4:- UTP Cable categories

Category 1(CAT 1) Category 6(CAT 6)

Category 2(CAT 2) Category 6e(CAT 6e)

Category 3(CAT 3) Data to 10Mbps (Ethernet)

Category 4(CAT 4) Data to 20Mbps (Token ring)

Category 5(CAT 5) Data to 100Mbps (Fast Ethernet)

Category 5e(CAT 5e) Data to 1000Mbps (Gigabit Ethernet)

Category 6(CAT 6) Data to 2500Mbps (Gigabit Ethernet)

The twisting of pairs in UTP cable is part of the cable engineering design. When wires carry

electrical current, they can create an electromagnetic field that can cause interference on other

wires in the cable. Because each wire in the pair carries current in the opposite direction, keeping

them close together with twisting will cause the magnetic fields on the wire pair to cancel each

other. This magnetic interference from wires within the cable is called crosstalk. The rate of

twisting in each pair of wires is different so that each pair self-cancels and reduces crosstalk to a

minimum.

Table 5:- UTP cable types and their use.

Cable Type TIA/EIA Standard Cable Use

Straight-through Both ends are the same, either Connects a network host to a
[DOCUMENT TITLE]

568A or 568B hub or switch

Crossover cable One end 568A and the other Directly connects like devices,

such as two hosts, two

568B. It does not matter

Switches, or two routers. Also

which end goes to which used to directly connect a host

to a router.

device.

Rollover (known as a “Cisco” Cisco-proprietary Connects a workstation serial

cable) port to a Cisco device console

port.

Figure 12:- UTP cable

I use standard wiring for the RJ45 connector:

1 = orange/white

2 = orange

3 = green/white

4 = blue

5 = blue/white

6 = green

7 = brown/white

8 = brown

3.6 technical tasks/products

Technical tasks in the internship program passed evidence for me in that a brief vision on what

real world look likes. I also have a great vision on my field that I get from the technical task of

the internship. I have too joyful by joining electrical and computer engineering department

because of I get the chance to see what look like the real world in related to electrical &

computer engineering department and I have a great initiation of working in this field in widely.

3.7 The Overall Benefits I gained From the Internship.

Introduction
Internship is the beginning of the road that will take me to the point I want to be at after my

graduation. Internship is a practice I need to perform, because it prepares me for the business life

that I aim at.

3.7.1 Practical Skill

The Internship will have the opportunity to connect classroom theory with current industry

challenges, and have exposure to the latest technologies. Opportunities to converse and interact

with a large pool of talented experienced department members will provide a deeper insight to

the overall operation, as well as provide a valuable pool of resources to assist in completion of

internship program. This internship program was exactly what I needed to nurture the lack of

practical skills I had. I would acquire practical experience to complement the theoretical content

of my studies.

3.7.2 Benefits in terms of improving technical skills

At the time when I joined to Debre markosUniversity -ICT I didn’t have that much knows how

about how network is cabled. The networking work was totally new for me. This was because,

the problem of converting theoretical aspects to practical world. During the period I spent as an

intern there, I learned the very basics of the field starting from a scratch. Again the network

engineers were very cooperative in making us informed about many of the concepts regarding

the field.

The visitations I made on the previously started networks had given me a clear vision about the

field. The knowledge and skill I have before and after the internship is totally incomparable.

During the time I spent there I know how to design a network layout for a given working site and

accordingly how to make the cost analysis for the design made.

3.7.3 Benefits in terms of management knowledge

When someone took a part as a leader, he must not make it personal and don’t rush in to for

personal attack. In the other hand he has to change or modify his own position when he found

other person’s idea is better and more convincing. The overall benefit that I gained from the

Internship program regarding improving leadership is that, directing successful leadership results

in the employee growth and development with new skills and capabilities that enables to increase

the productivity. I have seen this while doing some group tasks with my friend working with me
[DOCUMENT TITLE]

and other workers. Accordingly I have improved my leadership capabilities during the four

Months of my work experience.

3.7.4 Benefits in terms of improving team skills

Working as a team is the key point to gain the maximum possible result than working

individually. Especially the one I was practicing in during my internship program needs a team

work in great demand. In the University Networking things are worked out (solved) by

cooperated effort working together as a team. So, what I had learnt in this internship is that doing

things in a team makes things (problems) easier to solve. The work nature of the University by

itself supports and Recommends making things in a group.

3.7.5 Benefits in terms of acquiring entrepreneurship skills

“Entrepreneurship is the ability to “create and build something from practically nothing. It is

initiating, doing, achieving and building an enterprise or organization, rather than just watching ,

analyzing or describing one. It is the knack of sensing an opportunity where others see chaos ,

contradiction and confusion. It is the ability to build a founding team to complement your own

skills and talents. It is the know-how to find, marshal and control resources and to make sure you

don’t run out of money when you need it most. Finally, it is the willingness to take calculated

risks, both personal and financial, and then to do everything possible to get the odds in your

favour.”

An entrepreneurship education program consists of wide-ranging subjects, and in every

entrepreneurship education program, learning something at outside classroom like internship in

accompany plays an important role, as well as normal lectures in classroom. Of course, in this

respect, the good relationship between educational institutions and business society is very

important for the purpose of implementing an internship program as a part of curriculum. Interns

gain firsthand understanding of entrepreneurship along with enhanced technical, professional,

and communication skills. In this internship I have gained self-confidence, information seeking,

problem seeking and sees and acts on opportunities of business in networking. Though helping

me to clarify my vision a decided whether or not to forge ahead with the idea.

3.7.6 Benefits in terms of acquiring work ethics

An internship is an opportunity to learn the skills and behaviors along with the work values that
are required for success in the workplace. Workplace ethics are established codes of conduct that

reflect the values of the organization or company where you are employed. I have seen possess

willing ness to work hard from my supervisor during my internship period. In addition to

working hard it is also important to work smart. This means I acquired the most efficient way to

complete tasks and finding ways to save time while completing daily assignments. It’s also

important to care about my job and complete all projects while maintaining a positive attitude.

3.7.7 Benefits in terms of acquiring Leader ship skill

Leadership skills are the tool, behaviors, and capabilities that a person needs in order to be

successful at motivating and directing others. Yet true leadership skills involve something more

the ability to help people grow in their own abilities. It can be said that the most successful

leaders are those that drive other to active their own success. I gained leadership skills from my

supervisor during the internship period which include managing time, motivating individuals ,

giving feedback and building teams.

Contributions

My contribution to the University is I install networks to the intended room of the block. During

the installation time I record all the installation materials in paper because if failure is exist

another time I have to use the paper in order to identify the material being properly installed or

not.

Chapter four

Project and Contributions

4.1 Overall Achievement of the Intern

As I all know I mostly take theoretical lessons on my learning times; this internship helps us to

improve my practical knowledge. During intern program I have developed many skills related to

my profession and contribute useful thing to DMU ICT such as:

 shearing my professional skill with workers of the company

 Advertising problems

 Performing usable tasks

 Working as installing Forman in installing section

4.2 Project Title: improve design performance, Reliable and Secure network for DMU.
[DOCUMENT TITLE]

4.2.1 Abstract of the project

Today, information technology is strategically important to the goals and aspirations of the

business enterprises, government and high-level education institutions – university.

Universities are facing new challenges with the emerging global economy characterized by the

importance of providing faster communication services and improving the productivity and

effectiveness of individuals. New challenges such as provides an information network that

supports the demands and diversification of university issues. A new network architecture, which

is a set of design principles for build a network, is one of the pillar bases. It is the cornerstone

that enables the university’s faculty, researchers, students, administrators, and staff to discover,

learn, reach out, and serve society.

This project focuses on the network architecture definitions and fundamental components. Three

most important characteristics of high-quality architecture are that: it’s open network

architecture; it’s service-oriented characteristics and is an IP network based on packets. There are

four important components in the architecture, which are: Services and Network Management,

Network Control, Core Switching and Edge Access.

The theoretical contribution of this study is a reference model Architecture of University

Campus Network that can be followed or adapted to build a robust yet flexible network that

respond next generation requirements. The results found are relevant to provide an important

complete reference guide to the process of building campus network which nowadays play a very

important role. Respectively, the research gives university networks a structured modular model

that is reliable, robust and can easily grow.

4.2.3 Introduction of the project

In today’s modern and global world, the importance and added values provided by Network

infrastructure is evident whether it is for business enterprises, government entities or educational

institutions particularly universities. It contributes to achieve important goals such as more

productivity, collaboration, efficiency and acquire knowledge. Increased use of Information

technologies in the university requires a robust technical infrastructure and adequate network

architecture

The development of models and strategies to control networking installation is the vital for the
community, the sector of that company as well as for the worlds. One important reason was that

influencing the network variables such as Arrangement of Lab computer, Cabling layout

,Functionality of computer Placement of switch ,Placement of wall jack, Settlement of extension

network cable ,Unwanted material From this project report, we see that there are factors that

need to be controlled in network installation .

The introduction and rapid spread of Information and Communications Technologies (ICTs),

such as the World Wide Web, e-mail, telephones, fiber optics and satellites is revolutionizing the

way in which societies interact, conduct their businesses, compete in international markets and

set their economic and human development agendas. This fact leads to the establishment of

DMU ICT in order to full fill the gap that happens due to information communication technology

and to create an economic community whose capacity of making decision based on information

and knowledge is developed in. In general and the DMU ICT, in particular has made the

Information and Communication Technology as one of strategic priorities. The government has

fully recognized Information and Communication Technology as a development strategy in the

fight against poverty and backwardness and to bring about fast and sustainable development.

4.4 Problems identification.

1. There is a great problem concerning database system in that company. The rational case of this

problem is they do not have a programmer. For this reason there is no database application took

place in this company.

2. The second one is the network installation problem. In this case there is a great network

installation even if from the installation up to user depending on using of the network cable.

As we have been observing the network structure in the DMU Information and communication

technology we were able to identify the following problems:

 Arrangement of computer in the Lab

 Cabling layout

 Room layout

 Functionality of computer

 Placement of switch and white(marker) board

 Placement of wall jack


[DOCUMENT TITLE]

 Settlement of extension cable(voltage divider) and power adapter

 Unwanted material

Figure 13:- Unwanted material

4.4.1 Poorly terminated cable

"(20-30) % network problems are cabling related .only terminated cable results in decreasing the

quality of signals and performance of network. The poor terminated cables we have observed at

DMU ICT are as shown below.

Figure 14:- poor terminated cable

4.4.2 Data and electrical cable in one distribution tray

If the power level of electrical cable is large enough, the electrical noise can interfere with the

operation and performance of the data cable due to this we have identified the data and electrical

cables which are put together as a provided.

Figure 15:- Poor coverings of the trays

4.4.3. Unidentified cables connected to the switch

The cables connected to the hub are difficult to identify from which computer they are coming

due to large number of computers this results in difficulties in identifying problems easily

Figure 16:- unidentified cables connected to the switch

4.4.4. Wastage of materials

Nonoperational ports, rj45, socket outlets, ups, monitors and pcs are in the laboratory which

affects economically and also the look of the laboratory in general. Some of the non-operating

materials are shown in the pictures below.

Figure 17:- Wastage material in the lab

4.4 Objective of Project

4.4.1 General Objective

The main aim of this project is: to design reliable and secure network for DMU.

4.4.2Specific objective

 To design and install network for large as well as small building.

 To increase the performance network.

 To minimize wastage of cable.


4.5 Methodology of the Project

Research methodology is a systematic way to solve the problem.it is science of studding how

research is to be carried out. It is the way of describing, explain and predicting phenomena by

Which the methodology of researcher.it is also defined as a method of acquiring of

Knowledge. Therefore I use research methodology for our project.

 Literature review

 Reading CISCO books, articles, forums, journals, papers, simulation tools

related to the subject matter

 System comparison

 Analysis and Comparing the previous network system and the new network

system

Primary Data

 Interviews: in order to know electric wiring consumption of the company.

 Gathering data from the networking section of company.

Secondary Data

 Referring different manual in the company.

4.7 Literature Review

Network Installation

A network is a set of devices (often referred to as nodes) connected by communication links.

Nodes can be a computer, printer, or any other device capable of sending and/or receiving data

generated by other nodes on the network. Most networks use distributed processing in which a

task is divided among multiple computers. A network must be able to meet a certain number of

criteria. Computer and communication networks to provide a wide range of services, from

simple networks of computers to remote-file access, digital libraries, video conferencing, and

networking billions of users and devices. Users and networks are connected together by certain

rules called network communication protocols.

The most important parts of networks are as follow:-

 Performance

 Reliability and
[DOCUMENT TITLE]

 Security.

Performance

Is measured by transmit and response time

Transmit time is the amount of time required for a message to travel from travel from one device

to another.

Response time is the elapsed time between an inquiry and response.

In general the performance of networks depends on a number of factors, including the number of

users, the type of transmission medium, the capabilities of the connected hardware and efficiency

of the software.

Reliability

Is measured by the frequency of failure, the time it takes a link to recover from a failure and the

networks robustness.

Security

Network security issues include protecting data from unauthorized access, protecting data from

damage and development and implementing policies and procedures for recovery from breaches

and data losses.

4.6 The Detail Design Works of my Project.

NETWORK DEVICES

ROUTER: a router traditionally translates network packets from one network to another. In other

words it receives information from the internet, and transfers it to the right recipient on the LAN.

Here the router used has the capability of implementing the adaptive security appliances (ASA)

capabilities and other security policies.

SWITCH: A switch does almost the same job the router. It distributes packets to peripherals. But

most importantly it serves as a central connection point for cables from workstations, other

switches etc.

WIRELESS ACCESS POINT: The wireless access point serves as an extension of the LAN to

devices that cannot connect to the network by the use of cables. The WAP becomes the part of

the network that visitors are allowed to connect to with limited security but with some security

too.
CABLES: The cables to be used here would be majorly, the unshielded twisted pair CAT5

(CAT5 UTP) because of its speed, and relatively low cost as well as reliability. If there would be

a need for running cables externally (exposed) then the shielded CAT5 twisted pair cables would

be employed. The RJ45 would be used in terminating the cables.

Drawings and simulations


[DOCUMENT TITLE]

Figure 18:- simulated drawing

Router configuration

Router>

Router>ena

Router>enable

Router#config t

Router#config terminal

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#HOST NAME R1

% Invalid input detected at '^' marker.

Router(config)#HOSTNAME R1

R1(config)#int

R1(config)#interface f0/0

R1(config-if)#ip addre

R1(config-if)#ip address 192.168.1.254

% Incomplete command.

R1(config-if)#ip address 192.168.1.254 255.255.255.0

R1(config-if)#no shut

R1(config-if)#

%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up

R1(config-if)#

R1(config-if)#

R1(config-if)#^Z

R1#

%SYS-5-CONFIG_I: Configured from console by console


R1#

R1#

R1#

R1#show ip brief

% Invalid input detected at '^' marker.

R1#show ip brief int

R1#show ip int brief

Interface IP-Address OK? Method Status Protocol

FastEthernet0/0 192.168.1.254 YES manual up up

FastEthernet0/1 unassigned YES unset administratively down down

Vlan1 unassigned YES unset administratively down down

R1#

R1#

R1#

Switch configuration

Switch>enable

Switch#config t

Enter configuration commands, one per line. End with CNTL/Z.

Switch(config)#HOSTNAME SW1

SW1(config)#INT VLAN F0/0

% Invalid input detected at '^' marker.

SW1(config)#

SW1(config)#int vlan 1

SW1(config-if)#ip address 192.168.1.253 255 255 255 0

% Invalid input detected at '^' marker.

SW1(config-if)#ip address 192.168.1.253 255..255.255.0


[DOCUMENT TITLE]

% Invalid input detected at '^' marker.

SW1(config-if)#ip address 192.168.1.253 255.255.255.0

SW1(config-if)#exit

SW1(config)#

SW1(config)#

SW1(config)#

SW1(config)#

SW1(config)#ip default gateway 192.168.1.254

% Invalid input detected at '^' marker.

SW1(config)#ip default gateway 192.168.1.254 255.255.255.0

% Invalid input detected at '^' marker.

SW1(config)#?

Configure commands:

access-list Add an access list entry

banner Define a login banner

boot Boot Commands

cdp Global CDP configuration subcommands

clock Configure time-of-day clock

crypto Encryption module

do To run exec commands in config mode

enable Modify enable password parameters

end Exit from configure mode

exit Exit from configure mode

hostname Set system's network name

interface Select an interface to configure

ip Global IP configuration subcommands


line Configure a terminal line

logging Modify message logging facilities

mac MAC configuration

mac-address-table Configure the MAC address table

no Negate a command or set its defaults

port-channel EtherChannel configuration

privilege Command privilege parameters

service Modify use of network based services

snmp-server Modify SNMP engine parameters

spanning-tree Spanning Tree Subsystem

username Establish User Name Authentication

vlan Vlan commands

vtp Configure global VTP state

SW1(config)#

SW1(config)#

SW1(config)#

SW1(config)# ip Default-gateway 192.168.1.254

SW1(config)#^Z

SW1#

%SYS-5-CONFIG_I: Configured from console by console

SW1#

SW1#show run

Building configuration...

Current configuration : 1034 bytes

version 12.1

no service timestamps log datetime msec

no service timestamps debug datetime msec

no service password-encryption
[DOCUMENT TITLE]

hostname SW1

spanning-tree mode pvst

interface FastEthernet0/1

interface FastEthernet0/2

interface FastEthernet0/3

interface FastEthernet0/4

interface FastEthernet0/5

interface FastEthernet0/6

interface FastEthernet0/7

interface FastEthernet0/8

interface FastEthernet0/9

interface FastEthernet0/10

interface FastEthernet0/11

!
interface FastEthernet0/12

interface FastEthernet0/13

interface FastEthernet0/14

interface FastEthernet0/15

interface FastEthernet0/16

interface FastEthernet0/17

DTU ECE SET BY LAKACHEW ADANE Page 48


[DOCUMENT TITLE]

FINAL INTERNSHIP REPORT

2017

interface FastEthernet0/18

interface FastEthernet0/19

interface FastEthernet0/20

interface FastEthernet0/21

interface FastEthernet0/22

interface FastEthernet0/23

interface FastEthernet0/24

interface Vlan1

ip address 192.168.1.253 255.255.255.0

shutdown

ip default-gateway 192.168.1.254

line con 0

line vty 0 4
login

line vty 5 15

login

end

SW1#

SW1#

SW1#comfig t

% Invalid input detected at '^' marker.

SW1#

SW1#config t

Enter configuration commands, one per line. End with CNTL/Z.

SW1(config)#int VLAN 1

SW1(config-if)#no shut down

SW1(config-if)#

%LINK-5-CHANGED: Interface Vlan1, changed state to up

%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up

SW1(config-if)#

SW1(config-if)#

SW1 con0 is now available

Press RETURN to get started.

PC CONFIGURATION

Figure 19:-pc 0 configuration

Figure 20:-pc 1 configuration

As I describe from the portion of organizational and project back ground portion Debre Marko’s

University network infrastructure was originally designed and implemented in 2003 and it was

fully operational in 2004.This LAN was implemented only in the limited area of the campus.
[DOCUMENT TITLE]

Thus till no such internship project or final year project done within the university by any one.

But design and installation of local area network system have done over limited area of the

university with the help of local contractor or local professional. Hence the designed and the

installation of system well not secured well no use its good performance and cover very limited

areas. Thus this project will provide the secured local area network infrastructure design and

install of the Debre Marko’s University that can be implemented with modification and addition

of some design considerations.

Chapter five

Conclusion and Recommendations

1 Conclusion

After going through the whole period of internship as an intern I’ve observed so many

professional activities and learnt as well. This internship was very fruitful to me because I had to

cover many different fields. I also learnt new concepts and new ways of working. During this

internship period I acquired practical experience to complement the theoretical content of my

study for campus networking system tasks, wireless local area network (WLAN) and network

security of main campus data center. To conclude, I think that this internship was very beneficial

to me as I learnt a lot, and it made me discover work's in a real world.

2 Recommendations

The Data Center is the hub of the University’s computing resources, which are shared by the

academic, research, and administrative communities. These facilities provide a secure,

enterprise-wide, reliable, and redundant infrastructure for the delivery of mission-critical

University systems. As per earns observation some suggestion for the improvement of the

situation are given below:

Access floors: One of the key predesigned considerations that affect almost every aspect of

success within a data center environment is the access floor, or “raised floor” as it is often

referred to. This infrastructure is every bit as important to cooling, equipment support,

grounding, and electrical and communications connectivity as the building structure supporting

it. Main campus data center uses class room building, the building should be maintained in

standard data center designed way. Optimizes airflow and heat dissipation allowing the
computing equipment to run more efficiently, so the data center should be installed raised floor

in standard way.

Cable Management: All data cabling should be under the floor, both ends of the cable should be

labeled and tagged for proper identification.

The data center hardware identification should be with the appropriate, fully qualified server

names, and all equipment’s within the cabinets. If implement in this way the hardware is easily

identifiable.

The data center should be protected in building grounding and lightning protection system.

ICT Development Office must configure FTP protocol for the retrieve of files based onFTP

protocol.

I strongly recommend that the university should use licensed antivirus.

Training program should be started for both academic and administrator staff.

3 Reference

[1] Behrouz A. forouzan Data communication and networking 4th Edition.

[2] Comer, D. Internetworking with TCPlIp, Volume 1: Principles, Protocols, and Architecture.

Upper Saddle River, NJ: Prentice Hall, 2000.

[3] Agrawal D. and Zeng, Q. Introduction to Wireless and Mobile Systems. Pacific Grove, CA,

NJ: Brooks/Cole Thomson Learning, 2003.

[4] Garcia, A. and Widjaja, I, Communication Networks. New York, NY:McGraw-Hill, 2003.

[5] Keiser, G. Local Area Networks. New York, NY: McGraw-Hill, 2002.

[6] Kumar A., Manjunath, D., and Kuri, 1. Communication Networking. San

Francisco, CA: Morgan, Kaufmans, 2004.

[7]. BehrouzA.Forouzan (2000). Data Communication and Computer Networking.

[8] William Stallings (2001). Data and Computer Communications.

[9] http://www.youtube.com
[DOCUMENT TITLE]

You might also like