Professional Documents
Culture Documents
FACULITY OF TECHNOLOGY
COMMUNICATION STREAM
NAME ID
Page i
DECLARATION
report that is Debre Markos University for Academic year of 2016/17G.C. All the report
information’s written in this report are obtained from what I have seen in my Internship period
and from reading different books of the company, and the Company project working manuals.
All the report is done by me except those documents which are mentioned in the reference.
Approved by:-
Page ii
[DOCUMENT TITLE]
Acknowledgement
First of all I would like to thanks my GOD that helps me in all aspects from the start to the ends.
He was the first adviser of me during the internship period and before that and forever.
Secondly ,I would like to thanks Mr. Bikis ALebachew head of electrical and computer
engineering in Debre Tabor university, he gives great support for me to out the internship in
Debre Markos university. And also,. I’am are also grateful to our school mentor mr,Addisu, for
his comments and suggestions while he came in the first round mentoring.
The other one is my entire department lecturer that helps me to upgrade my theoretical
knowledge in the field of study. And also I would like to thanks the institute that prepares
internship program that the student practices their theoretical knowledge in the real world. I
Weldegebriel (The University ICT Director) for their immense interest, invaluable guidance and
My deepest thanks to Mr. Belayneh Mamo and Mr. Tadele for their invaluable teaching and
guidance throughout my stay at DMU ICT. I am also indebted to all the members’ of ICT center,
At last but not least, we like forward our acknowledgement to the whole employees of the hosted
company for their friendly attribute and appreciation throughout the project.
Page iii
Contents
DECLARATION ............................................................................................................................ ii
2.3 Overall System Components found in DMU ICT Center working world. ........................... 9
Chapter Three................................................................................................................................ 15
4.2 Project Title: improve design performance, Reliable and Secure network for DMU. ........ 35
Page v
4.4.1 General Objective ............................................................................................................. 41
1 Conclusion ................................................................................................................................. 53
2 Recommendations .................................................................................................................. 53
3 Reference ................................................................................................................................... 54
Page vi
[DOCUMENT TITLE]
LIST OF TABLES
LIST OF FIGURE
Page vii
Figure 2:- Network Flow diagram of DMU .................................................................................... 5
Page viii
[DOCUMENT TITLE]
RJ Registered Jack
Pc personal computer
Executive Summary
The internship program report is necessary part of the BSc program, & every student has to do
internship of 4 months in any organizational related to his /her field of interest. After successfull
completion of the internship work a student is required to write whatever practices & practical
Internship was my first step in practical life, through which I learnt a lot and it has aided me in
being well equipped with valuable experience that would help me once I enter the professional
This report is the collection of my observation and experience during the internship period at
DMU ICT center from October 2016 to mid of February 2017.The internship has also prepared
me for my future career. The experience has taught me responsibility, team work and how to
handle problems occurring. Even though the nature of the work was quite basic as an internee,
HAPTER ONE
1. CAMPANY BACKGROUND
Debre Markos University is one of the thirteen newly established universities by the federal
democratic republic government of Ethiopia. Its foundation stone was laid in 1997 E.C/.2005.
The university is located two kilometers east from the central square of the town. It is laid out on
100 hectares. It is found in north western part of Ethiopia at Debre Markos town.
The teaching learning process of the university began in 2007. Currently the university is
organized into 18 offices and 6 Colleges and 1 school with over 598 (302 academic staff, 146
permanent and 150 contract supportive staff). This time (2010/11) the previous Education
College opened in 2007 was dividend in to two (Social Science and Humanity, and Natural and
Computational Science Colleges). The six Colleges are Social Science and Humanity, Natural
and Computational Science, Business and Economics, Agriculture and Natural Resource, Health
Mission
The mission of the Debre Markos University is to contribute substantially for social, cultural,
economic, political, scientific and technological development of the nation; through the
provision of high quality education, active engagement in research and outreach activities for the
betterment of life, while offering our employees a conducive and rewarding working
Vision
The vision of the Debre Markos University is to become one of the ten premier research
universities in Africa in 2025 recognized for its quality education, research and outreach
activities.
The customers of Debre Markos University are divided in different groups of actors, who are
linked to the educational process being the main: current students, potential students, employees,
employers, government and industry. Which have classified the customers in internal and
external, emphasizing that the internal customer who are work to the satisfaction of external
customers Besides, to the authors the customers can be classified in primary ones and secondary
ones, based on their location being as internal customers or external ones and based on the
frequency of interaction that the institution has with them too. While consider that the product of
higher education is the education and then, depending on the role developed by them during the
The ICT directorate was established in 2003, with the hope of using it to respond to the current
developments at DMU and ever increasing needs of the University Community towards
2. Serves as a liaison between DMU on the one hand and international donor countries,
collaborating overseas universities and relevant local institutions on the other hand in initiating
and implementing ICT related projects and activities at DMU and provide ICT related enabled
environment which facilitate information exchange among local scientists and the interactions
and collaborations between researchers in the institution and the outside world.
3. Ensuring that the current and planned ICT projects and activities at DMU are Implemented
irrespective of change in leadership, staff, and source of fund and ensuring that the planning,
initiation and implementation of ICT projects and activities are coordinated under clearly
4. Helping students to use ICT and allow them exploit enormous possibilities for acquiring
5. Ensuring coordination and continuing of the ICT efforts initiated and planned at DMU
6. Ensuring that the financial and other resources required initiating and implementing ICT
7. Since the idea of utilizing ICTs as a strategic tool is at infant stage in the university, the
directorate coordinates its efforts and contributions towards the introduction and adoption of
8. Coordinates the introduction and wider application of ICTs across all Units of DMU as an
institution.
Establishing LAN within and connecting the university with foreign world via Internet.
Developing ICT projects for different colleges and directorates to give efficient services
1.3 Organizational structure of the directorate
Ethio
telecommunication
Router
Server
Switch
Master Technolog
OFFICE(BLOCK-27)
Software testing
o Hardware Maintenance
o Network installation
o Network Security
o ICT training
o Video Conference
Software installing
This company gives the installing software services for different offices and students. Some of
Anti-virus
Word-office
Any types of windows
Software testing
Under this method the company will check whether the installed software will expire or not,
when it is expired it will be updated. In addition to this, the company will add extra things, if it
will need. The above indicated software could be tested under this topic.
We have tried to mention in our topic the company could maintain their own office machineries
as well as the other sectors and so on. The maintained machines are described below:-
Printer
Copy machine
Scanner
Rural connectivity, give like maintenance and short training. In addition, they give
technicians supportive for sector zone and all wereda. Example. Supervisor
The company could be give service concerning desktop and PC hardware maintenance for their
own sectors and other sectors as well as for private people. As we tried to explain above
maintaining hardware for the desktop and PC are one of the services that the company gives for
Network installation
Since this company would give multiservice for all society, all sector in that zone and non-
ICT training
DMU ICT Company could help people who live in that zone without any payment to give short
basic computer training course. Internet service, give for any sector wereda and individual
person.
CHAPTER TWO
[DOCUMENT TITLE]
Debre tabor institute of technology aims this internship program enables engineering students
under the institute to relate their theoretical knowledge to the real world. Internships will provide
students the opportunity to test their interest in a particular career before permanent
The main objective of the internship was to gain an experienced practical knowledge in
Different electrical equipment’s and control automation systems by inter-relating with the
Theoretical knowledge and to upgrade our technology. Internships will provide us the
Opportunity to test their interest in a particular career before permanent commitments is made.
We will develop skills and techniques directly applicable to the careers we hold.
interpersonal relationships.
Internships will provide us to have depth knowledge of the formal functional activities of
a participating organization.
In general, an Internship is thought of as a program which "narrows the gap" between the
academic environment and a future work environment. Many employers prefer students who
have previous work experience and the Internship provides to have those experiences.Students
that participate in an Internship program are generally more confident and more qualified when
industrial organization.
familiar with different electrical instruments, their application in the real world and their
To apply what was learned during coursework (skill development and professionalism)
The university industry linkage program is planned to create a good interaction between
universities and industries, and also create students that have the capability of facing and solving
practical problems. Because of these reasons, Debre Tabor University has given a great deal of
attention to this program in helping students, starting from searching companies that are willing
to be part of this program up to giving essential documents and schedules. So I get into the
company by giving internship place request letter of my University to company head office.
Then they observe the request letter and they had given their acceptance letter. When I come
back to their company to begin the internship program, I should bring the acceptance letter of the
2.3 Overall System Components found in DMU ICT Center working world.
available within the building. NW installation is mainly important for resources sharing.
CAT6UTP cable is used for the connection in our case. Because UTP cables are economically
feasible and well protected.CAT6 UTP cable has 4 pairs twisted. Out of these 4 pairs; 2 pairs are
used for TX (transmission of text) and the remaining 2 pairs are used for RX (receiving of text).
The 4 pairs are punched to the outlet according to the given order of standard B. actually the
outlet has two standards: namely standard A and standard B. It has been also seen that 2 pairs of
wires (white orange, orange, white green and green) are used to test the presence of adapter with
in a computer. There are two types of connections in the case of NW installation. These are:
straight through and cross over. Straight through is used to connect different devices (e.g.
[DOCUMENT TITLE]
computer with printer) and cross over is used to connect similar devices (e.g. computer to
computer). But for now straight through connection is our issue. The placement of colors in both
Orange Green
Blue Blue
Green Orange
Brown Brown
Networks are extremely complex but are the very back bone of every business. We at NIS fully
understand the requirements of our clients which is why you the client are our first priority. In
general network installation is the interconnection of different data center and share the
information technically. During the interconnection of the data centers all the clients connects
each other and also to the server that controls all the data that flowing through it. So everyone
who install network should have to know how to interconnect and considers any engineering
Cabling
Labeling
During this task meaning that network installation I did network cabling system
Cabling
Cables are used to connect one network device to other network devices or to connect two or
more computers to share printer, scanner etc. Different types of network cables like
Coaxialcable, Optical fiber cable, Twisted Pair cables are used depending on the network's
topology, protocol and size. The devices can be separated by a few meters (e.g. via Ethernet) or
nearly unlimited distances (e.g. via the interconnections of the Internet).There are several types
of cable which are commonly used with LANs. In some cases, a network will utilize only one
type of cable, other networks will use a variety of cable types. The type of cable chosen for a
network is related to the network's topology, protocol, and size. Understanding the characteristics
of different types of cable and how they relate to other aspects of a network is necessary for the
An Optical fiber cable consists of a center glass core surrounded by several layers of protective
material. The outer insulating jacket is made of Teflon or PVC to prevent interference. It is
expensive but has higher bandwidth and can transmit data over longer distances.
Coaxial lines confine the electromagnetic wave to area inside the cable, between the center
conductor and the shield. The transmission of energy in the line occurs totally through the
dielectric inside the cable between the conductors. The most common use for coaxial cables is
Twisted pair cabling is a form of wiring in which pairs of wires (the forward and return
conductors of a single circuit) are twisted together for the purposes of cancelling out
electromagnetic interference (EMI) from other wire pairs and from external sources. This type of
Depending on devices they connect to share data by twisted pair cable, cabling of twisted pair
Straight through
Crossover
Straight through
Straight through cable is a type of twisted pair copper wire cable for LAN use for which the RJ-
45 connectors at each end have the same pin out. The wires on the cable are crossed over so that
they receive signal pins on the connector on one end are connected to the transmit signal pins on
the connector on the other end. Straight-through cable is used to connect computers and other
end-user devices (e.g., printers) to networking devices such as hubs and switches. It can also be
used to directly connect like devices (e.g., two hubs or two switches) if the cable is plugged
Green 2 2 Green
Blue 4 4 Blue
Orange 6 6 Orange
Brown 8 8 Brown
Cross over cable is a type of twisted pair copper wire cable for LAN use for which the second
and third pairs on one end of the cable will be reversed on the other end. Cross over cabling is
used as a backbone cable to connect two or more switches in LAN, or connect two isolated hosts
to create a mini-LAN. Crossover cable is used to connect two like devices without the use of an
uplink port.
Two computers
Two routers
Two switch
Two PC’
Green 2 2 Green
White orange 3 3 White orange
Blue 4 4 Blue
Orange 6 6 Orange
Brown 8 8 Brown
Labeling
Labeling is the process of giving the proper number existing on the switches or Patch Panel
correspondingly to the ports, i.e. the out let of the cable rising from the switches or hubs. It is
very important to give labels to the cables. Labels make the network troubleshooting less painful.
In case of problem, no need to trace every cable end to end. Each end of cable should be labeled;
the label should give information about where the cable is connected to.
To verify that the performance of the installed the network meet with the specifieddesign
Chapter Three
As I mentioned earlier, mean that during network installation I did many technical things related
to network installation. Just I’ve entered to the DMU-ICT, our supervisors gives us orientation
about how we install network and also all over the campus work ethics. Then after we are going
to our job. The first job was selection of cables that founds in the University and by cable
standard arrangement we crimp the cable. That I mentioned in chapter two the cabling system
that we did is straight through cabling system. The cable standard of straight through is TIA/EIA
The other one is the maintenance part .In these sections we have try to identify the problem of
the computer and how to solve the problem. And also during this task we have try to know which
[DOCUMENT TITLE]
parts of the computer is sensitive to damage and we are try to know how to fix this problem. For
example when we push the on/off button the computer, then the computer starts working. After
some minutes the computer turn off .if this types of problem is occurred repeatedly on the
computer, we have to check directly to the fan area. This types of problem occurs when the hole
of the fan are closed by waste materials like dust. So we have to clean the area. Usually, the
problem of the computer is either the hard ware part or the software part. In most case, problem
occurs in computer is in its software part. we have also learned that how to format computers and
install software’s on the computer. But we haven’t maintained computer that much. AsI
mentioned earlier (in chapter two), in maintenance part mostly the only thing that we didis
checking whether the computer function or not. So we haven’t got that much enough knowledge
because all the computers are normal. But the main thing that I gained from the maintenance part
is full of confidence to open the computer to maintain for todays and future job market. But I
would like thanks to my campus and my Internship University for their contributions on me to
develop my theoretical knowledge that I gained in classes to apply in the real world.
To verify that the performance of the installed the equipment/systems meet with the
To capture and record performance data of the whole installation as the baseline for
The other objective is that, students have theoretical knowledge that gains in the class when they
are in their campus.as we all know, theoretical knowledge is not enough to allow graduates to
perform at a higher level and for the development of one country. I mean that, in the real world
environment, analytical skills are not enough. Students must have both interpersonal
andleadership abilities. By efficiently using internships, students will increase their skills and
In general technical task is used to develop analytical knowledge of the student in the real world
In general the objectives of the technical task according to the University are:
To Checking up functionality of the system that we installed
Networking
In the ICT department the networking portion was one of the subsections under my hosting
company (DMU ICT). I have been participating and have got a great knowledge about it during
the four months I spent as an intern there. I will give the priority for it to describe the work flow
Using previous theoretical knowledge & also reading some references with hard copies
Network topology refers to the physical structure of the transmission links. In our design we
have chosen star topology because all terminal nodes connect directly to a central node, usually a
host computer, or file server. This topology facilitates central control of the network and
economizes on the need for network intelligence in remote nodes because the central nodes
When I was in my internship host University, there were components that I used during my
work. The components in the internship area are basically network devices and materials which
will be used during network design and computer maintenance. Even though there were so many
Routers
[DOCUMENT TITLE]
Switches
Access points
Servers
Trunk
Rj45 connector
patch panel
Hummer= is used to beat the screws and to widen the transmission hole for UTP cable.
Patch panel= is a device used to forward the data received from switch to node.
2. It has been continued to the physical design according to the lay out.
4. It has been selected one office for the rank to hung 180 centimeters high from the floor.
5. It has been measured the dimensions for the trunk to be 65 cm high from the floor.
6. It has been penetrated the trunk to fasten with the wall through screws.
7. It has been drilled the wall according to the given dots on the wall.
9. Finally, it has been fastened the trunk, node and rank properly with the wall.
Punching procedures
4. It has been punched the wires at the UTP cable patch panel similar to the outlet
Observation
As it has been seen in the building NW installation converting theoretical concepts to practical
aspect is too much easy. It has been also observed that working practically is much easier than
theoretical. Since every activity is in the same ones smartness. The same is true it has been seen
that punching technique is somewhat difficult than trunk leveling. Since wires should be
carefully stripped and punched properly to their appropriate position. especially when it has been
inserted to RJ-45. Generally, it has been seen that any failure in the connection can be easily
maintained by checking at the patch panel punching, at the node outlet connection, and at the
RJ_45 connection.
Server room: - a data center might consist of several server rooms, each of which is used for
separate applications and services. A server room is the physical space that houses all the data
running through the computer network of a business or organization. It is a room used to store,
power and operate computer servers and their associated components. This room is part of a data
center, which typical houses several physical servers lined up together in different form factors,
A server room provides the operational and environmental components and services to operate
enterprise class servers. The servers housed in a server room usually include basic CPU
components and lack any display or input device. They can all be centrally accessed and
managed through a server administrator system, which is typically found outside the server
room.
A server room is designed to provide a continuous and redundant supply of electrical power,
backup/alternate power, lighting and air conditioning, and is monitored by one or more server
administrators. Design a server room must be safe, spacious and computer friendly for the entire
IT team. Putting together a safe and accessible data center for the storing of technology and files
[DOCUMENT TITLE]
Network switches:-are telecommunication device that receives a message from any device
connected to it and then transmits the message only to the device for which the message was
meant. This makes the switch a more intelligent device than a hub (which receives a message
and then transmits it to all the other devices on its network). The network switch plays an
integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized
A networking switch is also the central device in a wired or wireless LAN. It receives signal
from each computer on the network via Ethernet cables in a wired network or radio waves in
wireless LAN. In both cases the networking switch directs traffic across the LAN enabling the
Server
1 proxy server
To speed up access to resources (using caching). Web proxies are commonly used to
To prevent downloading the same content multiple times (and save bandwidth).
Access enhancement/restriction
Is a computer server that hosts a network service for providing responses to queries against a
Mail Server
A mail server is a computer that serves as an electronic post office for email. Mail exchanged
across networks is passed between mail servers that run specially designed software. This
software is built around agreed-upon, standardized protocols for handling mail messages and any
data files (such as images, multimedia or documents) that might be attached to them. a mail
server is the computerized equivalent of your friendly neighborhood mailman. Every email that
is sent passes through a series of mail servers along its way to its intended recipient. Although it
may seem like a message is sent instantly - zipping from one PC to another in the blink of an
eye- the reality is that a complex series of transfers takes place. Without this series of mail
servers, you would only be able to send emails to people whose email address domains matched
your own - i.e., you could only send messages from one example.com account to another
example.com account.
I. Outgoing mail servers: - Outgoing mail servers are known as SMTP, or Simple Mail
II. Incoming mail servers: - Incoming mail servers come in two main varieties.
1. POP3 (Post Office Protocol, version 3) servers are best known for storing sent and received
2. IMAP (Internet Message Access Protocol) servers always store copies of messages on servers.
Most POP3servers can store messages on servers, too, which is a lot more.
Web Server
A web server is simply a computer program that dispenses web pages as they are requested. The
machine the program runs on is usually also called a server, and the two references are
interchangeable in everyday conversation. When someone sits down at a computer and enters an
address into an internet browser like Internet Explorer or Firefox, the browser sends a request off
into the internet asking to view the web page found at that address.
The web server is the program or machine that responds to that request, and delivers the content
of the page back to the user. This can be done because every computer or device that connects to
[DOCUMENT TITLE]
the internet has a uniquely identifying number, called an Internet Protocol address, or IP address
for short. This address is what allows computers to find one another and communicate across the
network.in brief, the process works as follows. Every web page on the internet also has a unique
types that URL into a web browser, the machine the browser is running on sends a request to the
IP address of the machine running the web server for that page, requesting that all the content
found there be sent back. Once the web server receives that request, it sends the page content
back to the IP address of the computer asking for it. The web browser then translates that content
into all of the text, pictures, links, videos, etc. that so many web pages contain.
The web servers can also handle data requests for other protocols not covered here, like SMTP
for email, or FTP for file transfer and storage, it is their ability to respond to web page requests
that is the underlying force keeping the entire World Wide Web up and running.
Trunk: - Trunk is one of the main network installations instrument that casted on the body of
civil structures. Main Features of Computer Network Cable Trucking System are:
Drill machine
Fisher(expedition pipe)
Trunk
Screw driver
Pilon
Rj-45 connector: - are only slightly smaller RJ45 is a standard type of connector for network
cables. RJ45 connectors are most commonly seen with Ethernet cables and networks.RJ45
connectors feature eight pins to which the wire strands of a cable interface electrically. Standard
RJ-45 pin outs define the arrangement of the individual wires needed when attaching connectors
to a cable. Several other kinds of connectors closely resemble RJ45 and can be easily confused
for each other. The RJ-11 connectors used with telephone cables, for example,(narrower) than
RJ-45 connectors.
Punch down tool: - a punch down tool is a small hand tool used by Telecommunication and
network technicians. It is used for inserting wire into insulation displacement connectors on
punch down blocks, patch panels and surface mount boxes (also known as biscuit jacks).
Most punch down tools are of the impact type, consisting of a handle, an internal spring
mechanism, and a removable slotted blade. To use the punch down tool, a wire is pre-positioned
into a slotted post, and then the punch down tool is pressed down on top of the wire, over the
post. Once the required pressure is reached, the internal spring is triggered, and the blade pushes
the wire into the slot, cutting the insulation, and securing the wire. For light -duty use, there are
also less expensive punch down tools with fixed blades and no impact mechanism.
The trimming blade cutting edge works against the plastic insulating post. Krone blades require a
Network cable tester:-a cable tester is used to verify that all of the intended connections exist
and that there are no unintended connections in the cable being tested. When an intended
be a "short" (as in short circuit). If a connection "goes to the wrong place" it is said to be "Miss
wired" (the connection has two faults: it is open to the correct contact and shorted to an incorrect
contact).
Generally, the testing is done in two phases. The first phase, called the opens test makes sure
each of the intended connections is good. The second phase, called the shorts test makes sure
UTP patch panel: - provides a convenient place to terminate all of the cable runs coming from
different rooms into the wiring closet. Of course, one could skip the patch panel and just connect
all RJ-45Connectors directly into the hub, but one may miss the following advantages:
You can label the patch panel so you know which room the cable run goes to. Putting the labels
[DOCUMENT TITLE]
on the cables is tougher to read than labels on a patch panel and also there is risk of having the
cable labels fall off. A patch panel is a step up from a punch-down block. Each of those
connectors is wired to an RJ-45 on the front. The RJ-45 on the front provides a spot to plug in a
patch cable that goes to the hub. UTP patch panels facilitate a world-class installation for data
2017
Ethernet cable cover cutter: - We are used this tool to strip the protective part around Ethernet
cable. To remove the cover of Ethernet cables especially CAT-6 we rotate this tool 360 degree
CAT6 UTP cables:-The most common copper network media is unshielded twisted pair (UTP)
cable. UTP in Ethernet consists of eight wires twisted into four color-coded pairs and then
wound inside a cable jacket. The colored pairs identify the wires for proper connection at the
terminals.
The twisting of pairs in UTP cable is part of the cable engineering design. When wires carry
electrical current, they can create an electromagnetic field that can cause interference on other
wires in the cable. Because each wire in the pair carries current in the opposite direction, keeping
them close together with twisting will cause the magnetic fields on the wire pair to cancel each
other. This magnetic interference from wires within the cable is called crosstalk. The rate of
twisting in each pair of wires is different so that each pair self-cancels and reduces crosstalk to a
minimum.
Straight-through Both ends are the same, either Connects a network host to a
[DOCUMENT TITLE]
Crossover cable One end 568A and the other Directly connects like devices,
to a router.
device.
port.
1 = orange/white
2 = orange
3 = green/white
4 = blue
5 = blue/white
6 = green
7 = brown/white
8 = brown
Technical tasks in the internship program passed evidence for me in that a brief vision on what
real world look likes. I also have a great vision on my field that I get from the technical task of
the internship. I have too joyful by joining electrical and computer engineering department
because of I get the chance to see what look like the real world in related to electrical &
computer engineering department and I have a great initiation of working in this field in widely.
Introduction
Internship is the beginning of the road that will take me to the point I want to be at after my
graduation. Internship is a practice I need to perform, because it prepares me for the business life
The Internship will have the opportunity to connect classroom theory with current industry
challenges, and have exposure to the latest technologies. Opportunities to converse and interact
with a large pool of talented experienced department members will provide a deeper insight to
the overall operation, as well as provide a valuable pool of resources to assist in completion of
internship program. This internship program was exactly what I needed to nurture the lack of
practical skills I had. I would acquire practical experience to complement the theoretical content
of my studies.
At the time when I joined to Debre markosUniversity -ICT I didn’t have that much knows how
about how network is cabled. The networking work was totally new for me. This was because,
the problem of converting theoretical aspects to practical world. During the period I spent as an
intern there, I learned the very basics of the field starting from a scratch. Again the network
engineers were very cooperative in making us informed about many of the concepts regarding
the field.
The visitations I made on the previously started networks had given me a clear vision about the
field. The knowledge and skill I have before and after the internship is totally incomparable.
During the time I spent there I know how to design a network layout for a given working site and
accordingly how to make the cost analysis for the design made.
When someone took a part as a leader, he must not make it personal and don’t rush in to for
personal attack. In the other hand he has to change or modify his own position when he found
other person’s idea is better and more convincing. The overall benefit that I gained from the
Internship program regarding improving leadership is that, directing successful leadership results
in the employee growth and development with new skills and capabilities that enables to increase
the productivity. I have seen this while doing some group tasks with my friend working with me
[DOCUMENT TITLE]
and other workers. Accordingly I have improved my leadership capabilities during the four
Working as a team is the key point to gain the maximum possible result than working
individually. Especially the one I was practicing in during my internship program needs a team
work in great demand. In the University Networking things are worked out (solved) by
cooperated effort working together as a team. So, what I had learnt in this internship is that doing
things in a team makes things (problems) easier to solve. The work nature of the University by
“Entrepreneurship is the ability to “create and build something from practically nothing. It is
initiating, doing, achieving and building an enterprise or organization, rather than just watching ,
analyzing or describing one. It is the knack of sensing an opportunity where others see chaos ,
contradiction and confusion. It is the ability to build a founding team to complement your own
skills and talents. It is the know-how to find, marshal and control resources and to make sure you
don’t run out of money when you need it most. Finally, it is the willingness to take calculated
risks, both personal and financial, and then to do everything possible to get the odds in your
favour.”
accompany plays an important role, as well as normal lectures in classroom. Of course, in this
respect, the good relationship between educational institutions and business society is very
important for the purpose of implementing an internship program as a part of curriculum. Interns
and communication skills. In this internship I have gained self-confidence, information seeking,
problem seeking and sees and acts on opportunities of business in networking. Though helping
me to clarify my vision a decided whether or not to forge ahead with the idea.
An internship is an opportunity to learn the skills and behaviors along with the work values that
are required for success in the workplace. Workplace ethics are established codes of conduct that
reflect the values of the organization or company where you are employed. I have seen possess
willing ness to work hard from my supervisor during my internship period. In addition to
working hard it is also important to work smart. This means I acquired the most efficient way to
complete tasks and finding ways to save time while completing daily assignments. It’s also
important to care about my job and complete all projects while maintaining a positive attitude.
Leadership skills are the tool, behaviors, and capabilities that a person needs in order to be
successful at motivating and directing others. Yet true leadership skills involve something more
the ability to help people grow in their own abilities. It can be said that the most successful
leaders are those that drive other to active their own success. I gained leadership skills from my
supervisor during the internship period which include managing time, motivating individuals ,
Contributions
My contribution to the University is I install networks to the intended room of the block. During
the installation time I record all the installation materials in paper because if failure is exist
another time I have to use the paper in order to identify the material being properly installed or
not.
Chapter four
As I all know I mostly take theoretical lessons on my learning times; this internship helps us to
improve my practical knowledge. During intern program I have developed many skills related to
Advertising problems
4.2 Project Title: improve design performance, Reliable and Secure network for DMU.
[DOCUMENT TITLE]
Today, information technology is strategically important to the goals and aspirations of the
Universities are facing new challenges with the emerging global economy characterized by the
importance of providing faster communication services and improving the productivity and
supports the demands and diversification of university issues. A new network architecture, which
is a set of design principles for build a network, is one of the pillar bases. It is the cornerstone
that enables the university’s faculty, researchers, students, administrators, and staff to discover,
This project focuses on the network architecture definitions and fundamental components. Three
most important characteristics of high-quality architecture are that: it’s open network
architecture; it’s service-oriented characteristics and is an IP network based on packets. There are
four important components in the architecture, which are: Services and Network Management,
Campus Network that can be followed or adapted to build a robust yet flexible network that
respond next generation requirements. The results found are relevant to provide an important
complete reference guide to the process of building campus network which nowadays play a very
important role. Respectively, the research gives university networks a structured modular model
In today’s modern and global world, the importance and added values provided by Network
technologies in the university requires a robust technical infrastructure and adequate network
architecture
The development of models and strategies to control networking installation is the vital for the
community, the sector of that company as well as for the worlds. One important reason was that
influencing the network variables such as Arrangement of Lab computer, Cabling layout
network cable ,Unwanted material From this project report, we see that there are factors that
The introduction and rapid spread of Information and Communications Technologies (ICTs),
such as the World Wide Web, e-mail, telephones, fiber optics and satellites is revolutionizing the
way in which societies interact, conduct their businesses, compete in international markets and
set their economic and human development agendas. This fact leads to the establishment of
DMU ICT in order to full fill the gap that happens due to information communication technology
and to create an economic community whose capacity of making decision based on information
and knowledge is developed in. In general and the DMU ICT, in particular has made the
Information and Communication Technology as one of strategic priorities. The government has
fight against poverty and backwardness and to bring about fast and sustainable development.
1. There is a great problem concerning database system in that company. The rational case of this
problem is they do not have a programmer. For this reason there is no database application took
2. The second one is the network installation problem. In this case there is a great network
installation even if from the installation up to user depending on using of the network cable.
As we have been observing the network structure in the DMU Information and communication
Cabling layout
Room layout
Functionality of computer
Unwanted material
"(20-30) % network problems are cabling related .only terminated cable results in decreasing the
quality of signals and performance of network. The poor terminated cables we have observed at
If the power level of electrical cable is large enough, the electrical noise can interfere with the
operation and performance of the data cable due to this we have identified the data and electrical
The cables connected to the hub are difficult to identify from which computer they are coming
due to large number of computers this results in difficulties in identifying problems easily
Nonoperational ports, rj45, socket outlets, ups, monitors and pcs are in the laboratory which
affects economically and also the look of the laboratory in general. Some of the non-operating
The main aim of this project is: to design reliable and secure network for DMU.
4.4.2Specific objective
Research methodology is a systematic way to solve the problem.it is science of studding how
research is to be carried out. It is the way of describing, explain and predicting phenomena by
Literature review
System comparison
Analysis and Comparing the previous network system and the new network
system
Primary Data
Secondary Data
Network Installation
Nodes can be a computer, printer, or any other device capable of sending and/or receiving data
generated by other nodes on the network. Most networks use distributed processing in which a
task is divided among multiple computers. A network must be able to meet a certain number of
criteria. Computer and communication networks to provide a wide range of services, from
simple networks of computers to remote-file access, digital libraries, video conferencing, and
networking billions of users and devices. Users and networks are connected together by certain
Performance
Reliability and
[DOCUMENT TITLE]
Security.
Performance
Transmit time is the amount of time required for a message to travel from travel from one device
to another.
In general the performance of networks depends on a number of factors, including the number of
users, the type of transmission medium, the capabilities of the connected hardware and efficiency
of the software.
Reliability
Is measured by the frequency of failure, the time it takes a link to recover from a failure and the
networks robustness.
Security
Network security issues include protecting data from unauthorized access, protecting data from
damage and development and implementing policies and procedures for recovery from breaches
NETWORK DEVICES
ROUTER: a router traditionally translates network packets from one network to another. In other
words it receives information from the internet, and transfers it to the right recipient on the LAN.
Here the router used has the capability of implementing the adaptive security appliances (ASA)
SWITCH: A switch does almost the same job the router. It distributes packets to peripherals. But
most importantly it serves as a central connection point for cables from workstations, other
switches etc.
WIRELESS ACCESS POINT: The wireless access point serves as an extension of the LAN to
devices that cannot connect to the network by the use of cables. The WAP becomes the part of
the network that visitors are allowed to connect to with limited security but with some security
too.
CABLES: The cables to be used here would be majorly, the unshielded twisted pair CAT5
(CAT5 UTP) because of its speed, and relatively low cost as well as reliability. If there would be
a need for running cables externally (exposed) then the shielded CAT5 twisted pair cables would
Router configuration
Router>
Router>ena
Router>enable
Router#config t
Router#config terminal
Router(config)#HOST NAME R1
Router(config)#HOSTNAME R1
R1(config)#int
R1(config)#interface f0/0
R1(config-if)#ip addre
% Incomplete command.
R1(config-if)#no shut
R1(config-if)#
R1(config-if)#
R1(config-if)#
R1(config-if)#^Z
R1#
R1#
R1#
R1#show ip brief
R1#
R1#
R1#
Switch configuration
Switch>enable
Switch#config t
Switch(config)#HOSTNAME SW1
SW1(config)#
SW1(config)#int vlan 1
SW1(config-if)#exit
SW1(config)#
SW1(config)#
SW1(config)#
SW1(config)#
SW1(config)#?
Configure commands:
SW1(config)#
SW1(config)#
SW1(config)#
SW1(config)#^Z
SW1#
SW1#
SW1#show run
Building configuration...
version 12.1
no service password-encryption
[DOCUMENT TITLE]
hostname SW1
interface FastEthernet0/1
interface FastEthernet0/2
interface FastEthernet0/3
interface FastEthernet0/4
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface FastEthernet0/9
interface FastEthernet0/10
interface FastEthernet0/11
!
interface FastEthernet0/12
interface FastEthernet0/13
interface FastEthernet0/14
interface FastEthernet0/15
interface FastEthernet0/16
interface FastEthernet0/17
2017
interface FastEthernet0/18
interface FastEthernet0/19
interface FastEthernet0/20
interface FastEthernet0/21
interface FastEthernet0/22
interface FastEthernet0/23
interface FastEthernet0/24
interface Vlan1
shutdown
ip default-gateway 192.168.1.254
line con 0
line vty 0 4
login
line vty 5 15
login
end
SW1#
SW1#
SW1#comfig t
SW1#
SW1#config t
SW1(config)#int VLAN 1
SW1(config-if)#
SW1(config-if)#
SW1(config-if)#
PC CONFIGURATION
As I describe from the portion of organizational and project back ground portion Debre Marko’s
University network infrastructure was originally designed and implemented in 2003 and it was
fully operational in 2004.This LAN was implemented only in the limited area of the campus.
[DOCUMENT TITLE]
Thus till no such internship project or final year project done within the university by any one.
But design and installation of local area network system have done over limited area of the
university with the help of local contractor or local professional. Hence the designed and the
installation of system well not secured well no use its good performance and cover very limited
areas. Thus this project will provide the secured local area network infrastructure design and
install of the Debre Marko’s University that can be implemented with modification and addition
Chapter five
1 Conclusion
After going through the whole period of internship as an intern I’ve observed so many
professional activities and learnt as well. This internship was very fruitful to me because I had to
cover many different fields. I also learnt new concepts and new ways of working. During this
study for campus networking system tasks, wireless local area network (WLAN) and network
security of main campus data center. To conclude, I think that this internship was very beneficial
2 Recommendations
The Data Center is the hub of the University’s computing resources, which are shared by the
University systems. As per earns observation some suggestion for the improvement of the
Access floors: One of the key predesigned considerations that affect almost every aspect of
success within a data center environment is the access floor, or “raised floor” as it is often
referred to. This infrastructure is every bit as important to cooling, equipment support,
grounding, and electrical and communications connectivity as the building structure supporting
it. Main campus data center uses class room building, the building should be maintained in
standard data center designed way. Optimizes airflow and heat dissipation allowing the
computing equipment to run more efficiently, so the data center should be installed raised floor
in standard way.
Cable Management: All data cabling should be under the floor, both ends of the cable should be
The data center hardware identification should be with the appropriate, fully qualified server
names, and all equipment’s within the cabinets. If implement in this way the hardware is easily
identifiable.
The data center should be protected in building grounding and lightning protection system.
ICT Development Office must configure FTP protocol for the retrieve of files based onFTP
protocol.
Training program should be started for both academic and administrator staff.
3 Reference
[2] Comer, D. Internetworking with TCPlIp, Volume 1: Principles, Protocols, and Architecture.
[3] Agrawal D. and Zeng, Q. Introduction to Wireless and Mobile Systems. Pacific Grove, CA,
[4] Garcia, A. and Widjaja, I, Communication Networks. New York, NY:McGraw-Hill, 2003.
[5] Keiser, G. Local Area Networks. New York, NY: McGraw-Hill, 2002.
[6] Kumar A., Manjunath, D., and Kuri, 1. Communication Networking. San
[9] http://www.youtube.com
[DOCUMENT TITLE]