You are on page 1of 53

AKSUM UNIVERSITY

INTERNSHIP REPORT AND PROJECT

ON

AKSUM UNIVERSITY ICT CENTER

Project title: Design and Implementation of Smart room for disable


students using Cisco Packet Tracer Simulator

BY
Student Name…………………………………… id number
1)Brhanu Abrha …………………………………………AKU 0901329
2)Tadese Atomssa …...…………………………………….AKU0904885
3)Hajer tekle …………..………………………………….Aku0903803
4)Yemane Gedamu …..…………………………….………..Aku1200639
5)Tesfay Gitet ………….………………………….…….…AKU09005100

Submitted to the
DEPARTMENT OF ELECTRONIC COMMUNICATION ENGINEERING
FACULTY OF ELECTRICAL AND COMPUTER ENGINEERIN

[Semester I,june 25/2021]


Declaration
We have undertaken our internship experience in Aksum university ICT center, from a period of
four months from ____________ to ____________ under the guidance of MR ____________
(Academic advisor),MR ___________ (company supervisor) and supervisors of electrical
engineering department. We certify that our work is original and Compiled according to the
internship report writing guideline given by the Industry Linkage Office of the university.
Students Name Signature Date
________________ _____________ ____________
______________ ____________ _____________
___________________ _____________ ___
This is to certify that the above declaration made by the candidate is corrected to the best of his
knowledge.
Name of company advisors Signature Date
______________ _____________ _____________
Name of Academic advisors Signature Date
_________________ __________ ____________

i
Acknowledgement

We would like to acknowledge the support and help of Information and communication
Technology ___________ in the completion of our internship and the preparation of internship
report by providing supportive reference materials and constructive ideas.

Next, we would like to express our deepest thanks to our advisor ___________ who assists us do
well our project continuously.

ii
Abstract

In the new time of technology improvement today, without understanding the new time of
innovation has turned into a need and that is regularly utilized for everyday existence of the
present society. Where nearly in the greater part of the regions have had the option to feel from
the advancement of new time of such innovation, as in the field of PC systems administration
and hardware. For this situation, the requirement for actualizing the room innovation is
progressively required to make a smart room, where during this time the home control is finished
by executing the gadgets. Home can be mechanized through the turn on or off switch utilizing
these hardware gadgets. The planning of Smart room is an application which is a mix of
innovation and administrations gave to the room condition with explicit capacities meant to
improve the security, proficiency, and furthermore solace of its occupants. In the planning some
portion of keen home framework normally comprises of control devices, monitoring apparatuses
and programmed there are a few gadgets that can be gotten to utilizing an advanced mobile
phone or PC which is associated with the Internet organize. IOT (Internet of things) is where a
few things can be associated together, sensed and furthermore remotely controlled over the
system. This paper manages the execution of brilliant home utilizing using new released version
of Cisco packet tracer simulator 7.2, because this feature include different kind of sensor and
actuator and also having different types of smart device used for room automation.

Keywords : IOE,Sensor,Smart home,packet tracer 7.2 simulator.

iii
Contents
Declaration ..................................................................................................................................................... i

Acknowledgement ........................................................................................................................................ ii

Abstract ........................................................................................................................................................ iii

CHAPTER ONE ........................................................................................................................................... 1

1. History of Aksum University ................................................................................................................ 1

1.1Background .............................................................................................................................................. 1

1.3. Vision and Mission of Aksum University.............................................................................................. 2

1.3.1. Vision .................................................................................................................................................. 2

1.3.2. Mission................................................................................................................................................ 2

1.4. Overall work flow .................................................................................................................................. 2

1.5. Main products and services .................................................................................................................... 2

1.6. Customer ................................................................................................................................................ 3

CHAPTER TWO .......................................................................................................................................... 4

2. OVERALL INTERNSHIP EXPERIENCE .............................................................................................. 4

2.1 How we get in to the company................................................................................................................ 4

2.2. The Section of the company we have been working in ......................................................................... 4

2.3. Networking Department Work Flow ..................................................................................................... 5

2.3.1. Roles and responsibility ICTD Director ............................................................................................. 5

2.3.2. Roles and responsibilities of Business Applications Development and Administration .................... 6

2.3.3. Roles and Responsibilities of ICT Infrastructure and Services........................................................... 6

2.3.4. Roles and responsibilities of Teaching and Learning Technologies ................................................... 6

2.3.5. Roles and responsibilities of Technical support and maintenance...................................................... 6

2.3.6. Roles and responsibilities of Training and Consultancy ..................................................................... 7

iv
2.4. Hardware over view ............................................................................................................................... 7

2.4.1. Rj-45 connectors and network adapter................................................................................................ 7

2.4.2.1. Fiber optic cables ............................................................................................................................. 9

2.4.2.2. Shielded twisted pair (STP) cables ................................................................................................ 10

2.4.2.3. Unshielded twisted-pair cable ........................................................................................................ 10

2.4.2.3.1. Category 6 (cat 6) cable .............................................................................................................. 11

2.4.3. Rack .................................................................................................................................................. 12

2.4.4. Switch ............................................................................................................................................... 12

2.4.5. Router................................................................................................................................................ 13

2.4.6. Firewall ............................................................................................................................................. 14

2.2.7. Server ................................................................................................................................................ 15

2.5 Work piece and work task we have been executing ............................................................................. 15

2.5.1. Cabling .............................................................................................................................................. 16

2.5.2. Punching cables ................................................................................................................................ 21

2.6 Procedures we have been following while performing our Tasks ....................................................... 22

2.7. How good we have been in performing our tasks ................................................................................ 22

2.8. Challenges we have faced while performing our tasks ........................................................................ 22

2.9. The measures we have taken in order to overcome our work task ...................................................... 22

Chapter THREE .......................................................................................................................................... 23

3.1 The Overall Internship Benefits Gained ............................................................................................... 23

3.2 Challenges we have faced while performing our tasks ......................................................................... 23

3.3 The Overall Benefits we gained from the Internship ............................................................................ 23

3.4 Practical Skill ........................................................................................................................................ 24

3.5 Interpersonal Communication Skills ..................................................................................................... 24

3.6 Leadership Skills................................................................................................................................... 25

3.7 Work Ethics Related Issue .................................................................................................................... 25

v
3.8 Entrepreneurship Skills ......................................................................................................................... 25

CHAPTER FOUR....................................................................................................................................... 27

Design and Implementation of Smart room for disable students using Cisco Packet Tracer Simulator .. 27

4. INTRODUCTION .................................................................................................................................. 27

4.1 Statement of problems .......................................................................................................................... 28

4.2 General objective .................................................................................................................................. 28

4.2.1 Specific object .................................................................................................................................... 28

4.2.2 Limitation of the project .................................................................................................................... 28

4.3 Theory ................................................................................................................................................... 29

4.4 ............................................................................................................................................................... 29

4.5 METHODOLOGY ............................................................................................................................... 30

4.5.1Tools those needs in the smart home ............................................................................................ 30

4.6 Algorithm .............................................................................................................................................. 31

4.6.1Material requirements ........................................................................................................................ 33

4.7 IMPLEMENTATION & RESULTS .................................................................................................... 33

4.7.1. Device Configuration ........................................................................................................................ 33

4.8 IOT-Layouts. ......................................................................................................................................... 35

4.8 RESULTS ............................................................................................................................................. 37

4.9 CONCLUSION ..................................................................................................................................... 37

REFERENCES ........................................................................................................................................... 38

APPENDEXE ................................................................................................................................................. 40

vi
List of figure
Figure 1: Work flow....................................................................................................................................... 5
Figure 2: network interface card .................................................................................................................. 8
Figure 3: Rj45 connector ............................................................................................................................... 8
Figure 4: Fiber optic cable ............................................................................................................................. 9
Figure 5: Shielded twisted cable ................................................................................................................. 10
Figure 6: Twisted-pair cable with the wire exposed ................................................................................... 11
Figure 7: Rack .............................................................................................................................................. 12
Figure 8: switch ........................................................................................................................................... 13
Figure 9: Router .......................................................................................................................................... 14
Figure 10: firewall ....................................................................................................................................... 14
Figure 11: server ......................................................................................................................................... 15
Figure 12: Tools used for cabling ................................................................................................................ 17
Figure 13:Untwist wire ends ....................................................................................................................... 17
Figure 14:Arrange wires from left to right depending on the connections standard. ............................... 18
Figure 15:Trim wires into a purposed size .................................................................................................. 18
Figure 16:Attach connector (RJ45 connector) ............................................................................................ 19
Figure 17:Check it whether it has fitted or not ........................................................................................... 19
Figure 18:Crimp using crimping tool. .......................................................................................................... 20
Figure 19:Test it whether its working or not .............................................................................................. 20
Figure 20: Wiring standard ......................................................................................................................... 20
Figure 21:: Punch down tool ....................................................................................................................... 21
Figure 22:After the wire punched ............................................................................................................... 21
Figure 23:Smart home with IOT .................................................................................................................. 29
Figure 24:Smart home circuit diagram ....................................................................................................... 30
Figure 25:home gateway ............................................................................................................................ 33
Figure 26:Connecting the wireless devices to home gate way ................................................................... 34
Figure 27:Creating an account to register devices. .................................................................................... 34
Figure 28: conditions or programs to show the result............................................................................... 35
Figure 29:User credentials verification ....................................................................................................... 36
Figure 30:Checking the full simulation ....................................................................................................... 37

vii
List of Abbreviations
LAN Local Area Network

SW Software

HW Hardware

ICT Information and Communication Technology

IP Internet Protocol

RJ Registered Jack

OSI Open System Interconnection

PC Personal Computer

HA High Availability

WLAN Wireless Local area Network Design

VLAN Virtual Local Area Network

VTP VLAN Trunk Protocol

DNS Domain Name System

DHCP Dynamic Host Configuration Protocol

FTP File Transfer Protocol

UTP Unshielded Twisted Pair

viii
CHAPTER ONE

1. History of Aksum University

Aksum University is found at the town of Aksum in Tigray region of Northern Ethiopia, at a
distance of 1080 Kilometers from the Ethiopian capital city. Aksum University was officially
established in February 08, 1999. During this time it included three faculties. These are natural
science, social science, Business and Economics Faculty. At present the University runs
undergraduate programs. It is expected that with the on-going expansion a number of faculties and
programs will be opened and the enrolment capacity will increase.

The ICT in Aksum University store office was established during this time and it is developed
from time to time with the development of the University. As it is developed from time to time it
increases its capacity by increasing the number of workers in the office. The ICT in Aksum
University store office is the back bone of the University by managing any activities related to
materials available on the University. Now a day’s, Aksum University ICT store office gives many
services, among these services the following are the main services:

 Registering new materials

 Generate report periodically

 Offering materials to the users

1.1Background
Inventory management system deals primarily with determining the amount and placement of the
materials within a facility or within multiple locations of a store. One way of managing this
system is to have a web-based system in place that can instantly track and update the information
about the tools or equipment. The importance of implementing a web based inventory system is
becoming vital as most of the time the information are accessible directly, so making the details
of the usage of the equipment

1
Available, and improving the movement and anticipation of their demand as well as the
productivity of the system as a whole.

1. The implementation of this web-based inventory system can help the University to develop the
skills to handle with their operational environments. Because lack of system tool to be used to
monitor the availability and quantity of materials in this University.

1.3. Vision and Mission of Aksum University

1.3.1. Vision
On 2025, Aksum University aspires to become one of the top 25 universities in Africa by
emphasizing on empowering local communities, excelling in innovation and entrepreneurship, and
partnering national and international institutions.

1.3.2. Mission
The mission of Aksum University is to pursue excellence in academics, research and community
services. It also seeks to contribute to the advancement of knowledge, economic growth, and social
welfare of the country.

1.4. Overall work flow


Aksum University has to strive to emplace management system that is democratic, honest,
inspiring, transparent, and highly participatory. The University has two core processes and five
support processes. The University’s top management includes the president, two Vice-presidents,
and deans/directors for academic units and seven process owners. The major focus of the
management in terms of governance and management includes improve efficiency on major
administration areas such as budget utilization, business process (procurement, finance, registrar.)

1.5. Main products and services


The University's commitment to pursuing excellence in all its core activities is reflected in the
major values expressed below:

 Quality Oriented Service Delivery

2
 Pursuit of Truth and Freedom of Expression

 Good Governance

 Instill a Culture of Combating Corruption

1.6. Customer
The customer of AKU ICT inventory management system is staff member only that is staff
member can give comment, request item, view item, return request and take response on the
materials

3
CHAPTER TWO

2. OVERALL INTERNSHIP EXPERIENCE

2.1 How we get in to the company


When Aksum University gave us the application letter to apply for internship, we had to compare
available companies that can give us good experience. From these companies we choose Aksum
university campus. We got the chance to work in the company by showing the formal application
form and the applicant letter given by our institute. After this we agreed with the company when
to start practicing and what materials are required for the internship practice. During the first month
of our internship in Aksum university ICT agency, Mr. Mohamed gives us an introduction about
the company. First time we get into the company; we meet our advisor working in the company.
He introduces us to know about all the process of the company.

He gave us a description about the company’s organizational structure introduced us with all
departments, staffs and key people in the office introduced us all services of the office which has
helped us to familiarize the overall current situation of the company easily It was nice for us
working in this office because all sections of the office are well organized and it was a good time.

2.2. The Section of the company we have been working in


As we have tried to explain above, after we understood the structure and environment of the
organization, observed the functions and services of the different departments, the end user,
working flow of the organization, we began to work on the on the networking department.

4
2.3. Networking Department Work Flow

Figure 1: Work flow

2.3.1. Roles and responsibility ICTD Director


 Accountable to the university president

 Provide leadership and management to the ICTD

 Insure that ICT provides, operates and maintains the ICT infrastructure, systems and
solutions to meet the needs of the administrative, educational, and research programs of
the University

5
2.3.2. Roles and responsibilities of Business Applications Development
and Administration
 Analyzing business processes of different sections of the university and come up with
automation solution

 Automate and facilitate the student-instructor communications

 Automate and facilitate the full life-cycle activities of students and staff (from enrollment
to graduation/resignation/retirement)

 Verify the compatibility, scalability and Integrality the different business automation
application going to be implemented in the University.

2.3.3. Roles and Responsibilities of ICT Infrastructure and Services


 Create and manage the physical layer connectivity of new and existing campuses,
buildings, classrooms, offices and laboratories

 Create and manage the IP layer connectivity

 Plan, implement and manage the Internet connectivity

 Creating acceptable use policy for the network and Internet

 Secure the network from Internal and external threats

2.3.4. Roles and responsibilities of Teaching and Learning Technologies


 Work with the academic departments for course material preparation and uploading

 Plan, implement and manage E-learning infrastructure

 Plan, implement and manage Digital Library infrastructure

2.3.5. Roles and responsibilities of Technical support and maintenance


 Single point of contact for ICT related issues, problems, requests

6
 Provide quick services to its users, provide problem identification, support and resolution
functions to its customers

 Record, monitor problems being reported to ICT, update users on status of problems, and
report on service level metrics for services provided

 Compile a knowledge base of problems and solutions, for use by first level support
personnel

 Track and report on Service Level performance that it achieves and ICT delivers

 Maintain failed office equipment (printer, ups, computer, laptops, phones, network devices)

2.3.6. Roles and responsibilities of Training and Consultancy


 Arrange trainings for the ICT team
 Plan Inter-ICT Team knowledge and exchange sharing
 Arrange training for campus users and staff about newly implemented and developed
applications

 Create basic awareness on Internet, security, productivity tools, emerging technologies and
new projects in ICT for the campus users and staff

2.4. Hardware over view


Networking is established by interconnecting many network devices. Networking hardware
devices also known as network equipment or computer networking devices. All these devices have
their own functionality on the network. The last receiver or data generating devices are called hosts
or data terminal equipment. All these terms refer to devices facilitating the use of a computer
network. The networking devices we have been using in our internship program are the

Following

2.4.1. Rj-45 connectors and network adapter


A network adapter also known as a network interface card (NIC) is the hardware device that
enables us to receive and send from the computer.

7
Rj-45 is the most common type of network adapter connection. RJ45 is a type of connector
with 8 pins to be connected with the 8 pins from the cable and is commonly

used for Ethernet networking. Since Ethernet cables have an RJ45 connector on their two ends,
Ethernet cables are sometimes also called RJ45 cables. The "RJ" in RJ45 stands for

"registered jack," since it is a standardized networking interface, the "45" simply refers to the
number of the interface standard. Since RJ45 connector has eight pins, it holds 8 separate wires. If
you look closely at the end of an Ethernet cable, you can actually see the eight wires, which are
each with different color. Four of them are solid colors, while the other four are striped.

Figure 2: network interface card

Figure 3: Rj45 connector

8
2.4.2.1. Fiber optic cables
Fiber optic cables transmit light (photons) over glass or plastic “fibers”. These cables are very
good for high-speed, high-capacity data transmission due to lack of attenuation. Fiber optic cables
are single-mode and multi-mode. Single-mode fiber cables carry single ray of light. This type of
cable is normally used for high-bandwidth, longer distance .it generally runs 10-80km and it is
more expensive equipment. But multi-mode fiber cable carries multiple rays of light. This type of
cable is used for shorter distance and runs up to 600m. There are different types of fiber optic
cables

Table 1: List of types of fiber optic cable

Figure 4: Fiber optic cable

9
2.4.2.2. Shielded twisted pair (STP) cables
Shielded twisted pair cables have an aluminum shield inside the plastic jacket surrounded the
pairs of wires

Figure 5: Shielded twisted cable

2.4.2.3. Unshielded twisted-pair cable


Unshielded twisted-pair cable is the most common used cable in local area network. It is relatively
easy to work with, flexible, efficient and fast. This cable contains eight wires grouped in to four
pairs, typically blue, orange, green and brown. The twisted pair wires reduce crosstalk. Crosstalk
is a signal that is transmitted on a wire or pair of wires that creates an un desired effect on another
wire or pair of wires.

Unshielded twisted-pair cables are categorized according to the frequency at which they transmit
signals and their data transfer rate

Cable type speed

Category 3(cat 3) 10Mbps

Category 5(cat 5) 100Mbps

Category 5 e (cat 5e) 100Mbps and 1000Mbps+

Category 6(cat 6) 1000Mbps

10
Figure 6: Twisted-pair cable with the wire exposed

2.4.2.3.1. Category 6 (cat 6) cable


Category 6 cable, commonly referred to as Cat 6, is a cable standard for Gigabit Ethernet.
Nowadays it is the most commonly used cable in local area networks and relatively easy to work
with, flexible, efficient and fast. Compared with Cat 5 and Cat 5e, Cat 6 features more resistant
for crosstalk and system noise. Crosstalk is a signal that is transmitted on the wire or pair of wires
creates undesired effect on another wire or pair of wires. The cable standard provides performance
of up to 250 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet)1000BASE-
T/1000BASE-TX (Gigabit Ethernet) and 10GBASE-T (10-Gigabit Ethernet). Category 6 cable
contains eight wires grouped in to four twisted wire pairs typically blue, green, orange and brown.

Attenuation, near end crosstalk (NEXT), and PSNEXT (power sum NEXT) in Cat 6 cable and
connectors are all significantly lower than Cat 5 or Cat 5e. The heavier insulation in some Cat 6
cables makes them too thick to attach to 8P8C connectors without a special modular piece,
resulting in a technically out-of-compliance assembly. Connectors use either T568A or T568B pin
assignments

11
2.4.3. Rack
It is a tool that used to contain the patch panel and switch and used as power distribution. It has a box
shape.

Figure 7: Rack

2.4.4. Switch
Switch is an “intelligent” device because it has application specific integrated circuit (ASIC).it has
the future of storing the MAC address information. Switches learn all the MAC addresses
connected to it. It has many collision domains and one broadcast domain. Each of the switch
interfaces should be connected to the same network. Switch can send and receive data at the same
time. Switches control the flow of network traffic based on the address information in each packet.
A switch learns which devices are connected to its ports (by monitoring the packets it receives),
and then forwards on packets to the appropriate port only. This allows simultaneous
communication across the switch, improving bandwidth. This switching operation reduces the
amount of unnecessary traffic that would have occurred if the same information had been sent
from every port. Switches divide the network into smaller, less congested sections.

12
Figure 8: switch

2.4.5. Router
Router enables computers to communicate and allow communication between two networks, such
as our home network and the Internet. It has many collision domains and many broadcast domains.
Each interface of a router will be connected to a different network. Router functions in an Internet
protocol based network operate at the network layer (OSI Model's layer 3). The primary function
of a router is to connect networks together and keep certain kinds of broadcast traffic under control.
When a data packet comes in on one of the lines, the router reads the address information in the
packet to determine its ultimate destination. Then, using information in its routing table or routing
policy, it directs the packet to the next network on its journey. This creates an overlay internetwork.

When multiple routers are used in interconnected networks, the routers exchange
information about destination addresses using a dynamic routing protocol. Each router
builds up a table listing the preferred routes between any two systems on the interconnected
networks. A router has interfaces for different physical types of network connections, such
as copper cables, fiber optic, or wireless transmission. It also contains firmware for
different networking communications protocol standards. Each network interface uses this

13
specialized computer software to enable data packets to be forwarded from one protocol
transmission system to another. Routers may also be used to connect two or more logical
groups of computer devices known as subnets, each with a different

sub-network address. The subnet addresses recorded in the router do not necessarily map
directly to the physical interface connections.

Figure 9: Router

2.4.6. Firewall
Firewall is a network device that is used to help a network from unwanted or malicious attack and
unwanted intrusion. Firewall is the most commonly used type of security device in an
organization’s perimeter.

Figure 10: firewall

14
2.2.7. Server
Servers are nothing more than computers, sometimes with overbuilt parts in them that have been
told to provide some kind of service. They might serve files, accept print jobs, push out web pages,
scan email, handle database transactions, or whatever, but at their hearts, they're Computers. If we
put the right software on it, the computer on our desk would be a server.

Figure 11: server

2.5 Work piece and work task we have been executing


The basic work tasks which we had been executing during our internship period were: -

 Acquired the skills required the three-hierarchal network model

 Acquired the skills required basic switch and router configuration.

 Acquired the skills required and VLAN configuration.

Acquired the skills required and VTP configuration.

15
 Running cable, trunk, network design, crimp, punch.

Running cables:-A length of installed cable connecting two network components that are not
in immediate proximity to one another. Laying cable runs is the main work of installing premise
cabling in a customer premises. Types of cable runs include;

 Horizontal cable:-Runs through building plenums (the space between the floor and the
ceiling) and false ceilings, connecting wiring closets together and connecting patch panels
to wall plates.
 Vertical cable:-Runs through vertical building rises, connecting wiring closets on each
floor with the building’s main equipment room.
 Network design:-is generally performed by network designers, engineers, IT
administrators and other related staff. It is done before the implementation of a network
infrastructure.
 Crimping: - are typically used to terminate stranded wire.
 Punching: - is used to connect and cutting a wire.

2.5.1. Cabling
The most commonly used cable types are unshielded twisted pair (UTP), shielded twisted pair
(STP)coaxial and fiber optic. Unshielded twisted pair is a popular type of cable that consists of
two unshielded wires twisted around each other. Due to its low cost, UTP cabling is used
extensively for local -area networks (LANs) and telephone connections. Throughout the whole
internship time we used unshielded twisted pair cable, specifically cat 6 cables.

While we make connections for cables in our internship time we have been using the following
tools.

 Cat6 cable

 RJ45 connectors

16
 Cutter

 Crimping tool

 Cable tester

Figure 12: Tools used for cabling

We make connections for the cable we have to follow the steps below:-

Step1. Strip cable end carefully

Strip 2– 2.5 cm of insulating sheath

Avoid cutting into conductor insulation

Figure 13:Untwist wire ends

17
Sort wires by insulation colors

Figure 14:Arrange wires from left to right depending on the connections standard.

Figure 15:Trim wires into a purposed size

Trim all wires evenly

Leave about ½” of wires exposed

18
Figure 16:Attach connector (RJ45 connector)

Step5.

Maintain wire order, left-to-right, with RJ45 tab facing downward

Figure 17:Check it whether it has fitted or not

Do all wires extend to end?

Is the sheath well inside connector?

19
Figure 18:Crimp using crimping tool.

Step7.

Figure 19:Test it whether its working or not

Step8.

When we attach RJ45 connector to our intended cable we follow the following pin assignment
wiring standard from left to right:-

Figure 20: Wiring standard

20
2.5.2. Punching cables
For punching cables there is a tool used to punch the wires into the jacket called punch down
tool, also called a punch down tool is a small hand tool used by telecommunication and network
technicians. It is used for inserting wire into insulation displacement connectors on punch down
blocks, patch panels, keystone modules, and surface mount boxes (also known as biscuit jacks).

To use the punch down tool, a wire is pre-positioned into a slotted post, and then the punch down
tool is pressed down on top of the wire, over the post. Once the required pressure is reached, the
internal spring is triggered, and the blade pushes the wire into the slot, cutting the insulation, and
securing the wire. For light -duty use, there are also less expensive punch down tools with fixed
blades and no impact mechanism.

Figure 21:: Punch down tool

Figure 22:After the wire punched

21
2.6 Procedures we have been following while performing our Tasks
Procedures we have been using during our internship period in ICT, networking department
procedures while we are performing tasks are:-

1. Analyze each network hardware equipment’s in data center.

2. Identified the three layer Campus hierarchical network model.

3. Trunk in order to manage the cables.

4. Punching and crimping the cables.

5. Running the cables to their appropriate ports.

6. Configuration to set up the network.

2.7. How good we have been in performing our tasks


During our internship program, we work our tasks in enthusiasm and sincerely, as well as our
supervisor is such a sincere man when we ask him a question he answered clearly and
understandably. All we did our task effectively and efficiently, and punctually when we performed
our tasks.

2.8. Challenges we have faced while performing our tasks


There are challenges that always happen throughout any real-world tasks. The challenges we have
faced in our whole internship period with ICT center are many but we have tried to solve those
challenges using different mechanisms also smoothly. Some of the challenges are:-

 Lack of having materials on time when we work on our project

2.9. The measures we have taken in order to overcome our work task
Communicating and discussing with organization supervisor and the organization supervisor
discussed with the head of ICT. They told to the resource allocators that the necessary resources
are permitted to us on time. And we gained some knowledge from our organization supervisor and
reading to perform well on the working environment and also we discussed with our friends and
colleagues on how to solve the problems

22
Chapter THREE

3.1 The Overall Internship Benefits Gained


How good we have been in performing our tasks during our internship program we work our
tasks in hobby, as well as our supervisor is such a truthful man when we ask a question he
answered courteously. We did our tasks effectively and efficiently, and we were punctual on our
program days.

3.2 Challenges we have faced while performing our tasks


we can truly say that during our internship with innovation and technology bureau that we were
challenged, and through all those challenges we grew as a people as well as a student. Not only
was the work that we were doing beneficial to get knowledge, but it also made us have to work
hard to get it right knowledge. We learned how to configured distribution layer and access layer
switch is new for us, how to multi-task and manage my time.

3.3 The Overall Benefits we gained from the Internship


During our internship at aksum university data center we had gain so many benefits from the
internship. During these one and half months of our internship program we were able to bridge
the gap between student life and professional life. This internship program provided us a
platform to introduce our self in professional field. We greatly benefited from working with the
dedicated professionals in the company. The company has provided a conductive working
atmosphere among the staffs. This has opened doors for us to understand what is waiting for us
when we finish our graduate studies at this field. This internship experience has made us respect
the company advisor stream more and more throughout these months We are very glad to get
opportunity to be a part of this internship program. Having a dedicated advisor and mentors
made the outcome of this experience very fruitful. We had the opportunity to ask question. In
short this internship work more interesting rather than being tedious and routines. In overall
within these One and half months we had the opportunity to improve our theoretical knowledge,
our interpersonal communication

skills, team playing skills, leadership skills and etc. In the next pages we will try to describe what
we have learnt in the different aspects that we have mentioned before.

23
Internship is the beginning of the road that will take us to the point we want to be at after our
graduation. Internship is a practice we need to perform, because it prepares us for the future
works

3.4 Practical Skill


The Internship will have the opportunity to connect classroom theory with current industry
challenges, and have exposure to the latest technologies. Opportunities to converse and interact
with a large pool of talented experienced department members will provide a deeper insight to
the overall operation, as well as provide a valuable pool of resources to assist in completion of
internship program. This internship program was exactly what we needed to nurture the lack of
practical skills we had. we can acquire practical experience to complement the theoretical
content of our studies, some of these:

1) Network design, expansion and configuration

2) Cisco switch configuration

3) VMWAR ( Virtual Machine Software ) configuration

4) Basic fiber splicing e.t.c

3.5 Interpersonal Communication Skills


During our internship period the Interpersonal skills, which are the life skills we use every day
to communicate and interact with other people, individually and in groups are good for us. Not
only how we communicate with others, but also we got confidence and our ability to listen and
understand. Problem solving, decision making and personal stress

Management are also considered interpersonal skills. Through this internship, we found that we
matured and gained many new perspectives, such as problem solving skill, diversity, effective
communication, teamwork and service recovery, attention to detail, time management, personal
empowerment, self-confidence, responsibility and cultural sensitivity. Our supervisor was so
kind to answer with patience and teach us much that made this internship so enjoyable. We had
gotten a wonderful internship that spent such a happy moment with all of them. Though, still
have so much to learn, we think this challenge was what should include in our career. This
helped much on our future planning

24
3.6 Leadership Skills
Leadership skills are the tool, behaviors, and capabilities that a person needs in order to be
successful at motivating and directing others. Yet true leadership skills involve something more;
the ability to help people grow in their own abilities. It can be said that the most successful
leaders are those that drive other to active their own success. we gained leadership skills from
our supervisor during the internship period which includes managing time, motivating
individuals, giving feedback and building teams.

3.7 Work Ethics Related Issue


Our supervisor was always advising us that we should be an ethical and responsible professional
for the future. He had been showing how to develop this good behavior during our stay on the
company with him. And also he told us lots of practical cases that related to work ethic that he
could see when he was working in different company. On our stay in the company we were very
punctual, daily attendant of the work & responsible to our profession. During this program we
had developed our work ethics.

3.8 Entrepreneurship Skills


“Entrepreneurship is the ability to “create and build something from practically nothing. It is
initiating, doing, achieving and building an enterprise or organization, rather than just watching,
analyzing or describing one. It is the knack of sensing an opportunity where others see chaos,
contradiction and confusion. It is the ability to build a founding team to complement your own
skills and talents. It is the know-how to find, marshal and control resources and to make sure you
don’t run out of money when you need it most. Finally,

it is the willingness to take calculated risks, both personal and financial, and then to do
everything possible to get the odds in your favor.”

An entrepreneurship education program consists of wide-ranging subjects, and in every


entrepreneurship education program, learning something at outside classroom like internship in a
company plays an important role, as well as normal lectures in classroom. Of course, in this
respect, the good relationship between educational institutions and business society is very
important for the purpose of implementing an internship program as a part of curriculum. Interns

25
gain firsthand understanding of entrepreneurship along with enhanced technical, professional,
and communication skills. In this internship we have gained self-confidence, information
seeking, problem seeking and sees and acts on opportunities of business in networking. Though
helping us to clarify

26
CHAPTER FOUR

Design and Implementation of Smart room for disable students using


Cisco Packet Tracer Simulator

4. INTRODUCTION
The IOT (internet of things) is a system which is equipped for interfacing everything to the web
through remote sensor networks. IOT (internet of things) is made out of two words :web and
things. The IOT innovation usage made a change in new developments in the fields of
horticulture, industry and vitality dispersion by including the significant data with the assistance
of various kinds of sensors. As per Cisco organizing there are enormous number of organizations
and research associations which gives the effects of Internet of things on the web and the
economy in the following five to ten years. The internet of things was first presented by pioneer
Kevin Ashton in the time of 1999 to characterize that the items in the physical globe can be
utilized to associated with

The web by utilizing of the sensors. He gave that the capacity of interfacing Radio recurrence
Identification (RFID) utilized in business to the web to follow the different kinds of
products/materials prepared selling without prerequisite of the human intercession. The present
internet of things (IOT) has a capacity to depict the various sorts articles, gadgets and sensors to
interface with the web. As a result, IOT is commonly new idea, yet coordinating systems and
PCs to oversee and control things had existed in this genuine world for around quite a few years.
Internet of things (IOT) enables items and clients to speak with one another by utilizing of a
novel IP address to each article to distinguish which clients are going to getting to what asset of
the system effectively. IOT additionally depicts a universe of system wherein all items are
associated with the system so information can be partaken in a system. Everyone as of now has
an advanced cell, however a telephone isn't savvy rather it encourages its client to make more
intelligent decisions. also depicts a universe of system wherein each article is associated with the
system so information can be shared. Everybody as of now has an advanced cell, however a
27
telephone is certainly not a brilliant as opposed to it causes its client to settle on more astute
choices.

4.1 Statement of problems


in aksum university there are a lot of buildings some of them are work as students room ,and
some of them are used as class room ,in aksum university a lot of disable students are suffered
due to the shorten of technology in the rooms ,class etc .

Then using the VLAN we going to design or make the rooms better and smart and easy for the
disable students.

4.2 General objective


In this project we are going to solve the problem that we got in our internship time, try
to Design and Implementation of Smart room for disable students using Cisco Packet Tracer
Simulator

4.2.1 Specific object


 In our project we are going to make a smart room that makes easy life of disable students in
Aksum University.
 To familiar Aksum university with smart technology’s like internet of things (iot).

4.2.2 Limitation of the project


 In this project the tools that we have used to design the room are limited like smoke detected
sensor ,temperature sensor ,programmable( door, window, fan ,camera, fire sprinkler)
 The specific area of our project is only in Aksum university

28
4.3 Theory
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that allows
users to create network topologies and imitate modern computer networks. The software allows
users to simulate the configuration of Cisco routers and switches using a simulated command
line interface. Packet Tracer makes use of a drag and drop user interface, allowing users to add
and remove simulated network devices as they see fit. The software is mainly focused towards
Certified Cisco Network Associate Academy students as an educational tool for helping them
learn fundamental CCNA concepts. Previously students enrolled in a CCNA Academy program
could freely download and use the tool free of charge for educational use.[2][1]

4.4 Smart home


Smart home is a living home that comprise of shrewd item to improve the every home action
ahead of time, that can be mechanizing exercises of the home without the contribution of client
such checking home condition shouldbe possible by utilizing different sensor (Temperature,
Humidity, sound, smoke, twist) at that point ventilate the earth dependent on the data of sensor..

Figure 23:Smart home with IOT

To execute smart home, Cisco packet tracer 7.2 variant is utilized which is another discharged
innovation that incorporates every smart article planned for office mechanization. These gadgets
are: brilliant fan, keen light, savvy window, shrewd entryway. Be that as it may, the home door
gives the controlling components by enlisting every single smart gadget separately by means of
the cloud (WAN).

29
4.5 METHODOLOGY

The circuit chart of keen home Automation is given as beneath appeared

Figure 24:Smart home circuit

4.5.1Tools those needs in the smart home


 Home gateway
 Movement detector sensor. That detect any movement in the said the home
 Smoke detector. That detect the smoke
 Fire sprinkler. That used to control the fire using water
 Fan : door: Light . Those all tools are programed

As clear at the above figure the house is created by utilizing the system test system which
comprises of various gadgets an IOT passage with associated brilliant gadgets, IOT server, DNS
server, IOT cloud (WAN), cell tower, Central office server, ISP server, advanced cell ,link
modem and PC.
The server contains 1. internet of things server 2.Domain name server.The IOT server stores all
the recognized data from the working environment and give customers an endorsed access to the
advantages by entering username and mystery state.

30
4.6 Algorithm
The Algorithm is explained as follows
Step 1: Start the project.
Step 2: Open the pkt file and save the file.
Step 3: Add the required components to the work space as packet tracer simultor shown above.
Step 4: Connect all devices in work space Using cables.
Step 5 : Configure the device and setup internet service provider router.
Step 6: Add Home Gateway to the Network.
Step 7 : Connect smart Devices to the Wireless Network.
Step 8 : Add End User Device to the Network
Step 9:stop

31
The flow chart is explained as follow

start

Add the
components

Configure the
router

Check the
configurat
ion Re configure

Add the homegatway

connect the devices

Add an end user

stop
32
4.6.1Material requirements
We have been used both hardware and software material to design this project

Hardware, pc (personal computer)

Software, packet tracer 7.3.0 v

4.7 IMPLEMENTATION & RESULTS

4.7.1. Device Configuration


What is an IoT Gateway?

Gateway is a physical device or software program that serves as the connection point between th
e cloud and controllers, sensors
and intelligent devices. All data moving between IoT devices and the cloud passes through an Io
T gateway, which can be either a dedicated hardware
appliance or software program. An IoT gateway might also be referred to as an intelligent gatewa
y or a control tier

Figure 25:home gateway

33
Figure 26:Connecting the wireless devices to home gate way

Figure 27:Creating an account to register devices.

34
Figure 28: conditions or programs to show the result

4.8 IOT-Layouts.
IoT rationale availability was set up on the highest point of the system network. As appeared in
the Figure all IoT gadgets must be set to be associated remotely to the IoT server utilizing
recently made username, secret phrase and the server IP. Effective network was set up when
"Interface" catch changed into "Invigorate". All gadget must utilize the equivalent IoT
qualifications, same certifications were likewise utilized by the mortgage holder for passing the
verification when interfacing by means of program to the principle IoT checking landing page as
appeared in the Figure As the IoT server was arrangement likewise for DNS administrations, the
iothomepage.com was interpreted with the IoT server static IP. When client is associated with
IoThomepage.com it is conceivable to picture the status of the IoT gadgets yet it is additionally
conceivable to audit the collaboration rationale between them. As noticeable in the Figure in this
activity f IoT keen gadgets were utilized: movement indicator, alarm, carport entryway, fan and
smoke alarm however these were just for impact the ecological variable of the reenactment

35
Figure 29:User credentials verification

The protocols used for the Network are shown as follows.

Simulation environment in transmitting mode used protocol

36
4.8 RESULTS
Once you finish all the main procedure of designing a smart home environment that is – Add home
gateway to the workspace, Add IoT devices to the home gateway in workspace and finally add the end
user device such as smartphone, tab, laptop, etc. When the smartphone in the workspace is clicked, IoT
server can be selected to verify the connections that have been established. Fig shows the registered
devices in the smart home implemented.

Figure 30:Checking the full simulation

4.9 CONCLUSION
This venture work is to examine the idea of the Internet of things and its pertinence in home robotization
setting. Internet of things is another innovation that is utilized for the interconnection of the gadgets with
the assistance of the web association. It empowers the gadgets to detect and screen gadgets remotely. It
has been told the best way to effectively manufacture a keen home that will contain advanced gadgets to
thusly screen and control every action and occasions inside home utilizing IoT shrewd gadgets. So as to
demonstrate the achievability of the work a reenactment instrument is utilized for planning a keen home

37
REFERENCES

[1] Corporate Social Responsibility. (2018). Retrieved from


https://www.cisco.com/c/en/us/about/csr.html

[2] packettracernetwork. (2018, January). (What's new in Cisco Packet Tracer 7.0) Retrieved
from packettracernetwork: http://www.packettracernetwork.com/features/packettracer-7- new-
features.html

[3] A, E., & K. A, H. (n.d.). Design and Implementation of a WiFi Based Home Automation
System,. pages 2177-2180.

[4] Abdi, A. (2018). Designing Smart Campus Using Internet of Things. International Journal of
Computer Science Trends and Technology (IJCST), V 6 I 3 PP 109-116.

[5] Aggarwal, R., & Lal Das, M. (2012). RFID Security in the Context of Internet of Things.
page 51-56. Kerala: First International Conference on Security of Internet of Things.

[6] al, M. c. (n.d.). Designing Smart Campus Using Internet of Things. 6(3).

[7] Alexandria, A. (2014). Enabling communication between wireless sensor networks and the
internet of things-ACOAP communication stacks. International journal of Science and
Engineering, 6-7 Vol.5.

[8] AlFarsi, G., & ALSinani, M. (2017). Developing a Mobile Notification System for
AlBuraimi University College Students. International Journal of Information Technology and
Language Studies(IJITLS), 1(1).

[9] ALFarsi, G., Jabbar, J., & ALSinani, M. (2018). Implementing a Mobile Application News
Tool for Disseminating Messages and Events of AlBuraimi University College. International
Journal of Interactive Mobile Technologies (iJIM), 12(7).

38
[10] ALFARSI, G., M, K. A., & ALSINANI, M. (2017). A RULE- BASED SYSTEM FOR
ADVISING UNDERGRADUATE STUDENTS. Journal of Theoretical and Applied Information
Technology, 95(11).

39
APPENDEXE
Programing of the equipment

Smoke detector

from gpio import *

from time import *

from ioeclient import *

from physical import *

import math

from environment import *

ENVIRONMENT_NAME = "Smoke"

state = 0

level = 0

ALARM_LEVEL = 40

def main():

setup()

while True:

loop()

def setup():

IoEClient.setup({

"type": "Smoke Detector",

"states": [{

"name": "Alarm",

"type": "bool",

"controllable": False

},

40
{

"name": "Level",

"type": "number",

"controllable": False

}]

})

restoreProperty("Alarm Level", 40)

IoEClient.onInputReceive(onInputReceiveDone)

add_event_detect(0, detect)

state = restoreProperty("state", 0)

setState(state)

def onInputReceiveDone(data):

processData(data, True)

def detect():

processData(customRead(0), False)

def restoreProperty(propertyName, defaultValue):

value = getDeviceProperty(getName(), propertyName)

if not (value is "" or value is None):

if type(defaultValue) is int :

value = int(value)

setDeviceProperty(getName(), propertyName, value)

return value

return defaultValue

41
def loop():

global ENVIRONMENT_NAME

value = Environment.get(ENVIRONMENT_NAME)

if value >= 0:

setLevel(Environment.get(ENVIRONMENT_NAME))

#print(value)

sleep(1)

def processData(data, bIsRemote):

if len(data) <= 0 :

return

data = data.split(",")

setState(int(data[0]))

def sendReport():

global state

global level

report = str(state) + "," + str(level); # comma seperated states

IoEClient.reportStates(report)

setDeviceProperty(getName(), "state", state)

setDeviceProperty(getName(), "level", level)

def setState(newState):

global state

state = newState

if newState is 0:

42
digitalWrite(1, LOW)

else:

digitalWrite(1, HIGH)

sendReport()

def setLevel(newLevel):

global level

if level == newLevel:

return

level = newLevel

if level > ALARM_LEVEL:

setState(1)

else:

setState(0)

sendReport()

if __name__ == "__main__":

main()

43

You might also like