LAN Design for Aksum University
LAN Design for Aksum University
Internship Project On
Submitted by
January 2024
DECLARATION
We, 5th year Electrical and Computer Engineering students, have undertaken our
internship experience in AKSUM UNIVERSITY ICT Directorate for a period of
October 15, 2016 to January 29, 2016 E.C under the guidance of Mr. ZELEALEM H.
(Advisor). We certify that our work is original and done according to the internship
report writing guidelines.
i
EXECUTIVE SUMMARY
This internship report provides a comprehensive overview of our internship
experience at Aksum University, specifically within the Aksum university ICT
department. The report outlines the background of the university, its mission and
vision, the overall workflow, the main products and services offered, and the
organization structure. It also delves into the aim and objectives of the data center, the
role of Aksum university ICT directorate, and the organization's governance structure
within the ICT department. Additionally, the report discusses our internship
experience, impact, contribution and discusses our project with theoretical
explanation.
ii
ACKNOWLEDGMENT
We would like to express our sincere gratitude to Mr. ZELEALEM H. and Mr.
AREAYA for their guidance, support, and valuable insights throughout our internship
at Aksum University ICT directorate. Their expertise and mentor ship have been
instrumental in shaping our learning experience. We extend our appreciation to Mr.
ABRHA BELAY and Mr. GEBRETSADKAN as well as the entire team at Aksum
University ICT directorate for their cooperation and assistance during our internship.
iii
ACRONYMS
AKU - Aksum University
BPDU - bridge protocol data unit
DHCP – dynamic host configuration protocol
ICT - Information and Communication Technology
ID - identification
IEEE - institute of electrical and electronics engineers
IP - internet protocol
LAN - Local Area Network
MAC - media access control
PC - personal computer
RSTP - rapid spanning tree
STP - spanning tree
VLAN - virtual LAN
iv
Table of Contents
DECLARATION ...................................................................................................................... i
EXECUTIVE SUMMARY ..................................................................................................... ii
ACKNOWLEDGMENT ........................................................................................................ iii
ACRONYMS .......................................................................................................................... iv
Table of figures ...................................................................................................................... vii
CHAPTER ONE ...................................................................................................................... 1
BACKGROUND INFORMATION of AKSUM UNIVERSITY ......................................... 1
1.1 Brief History Of AKU ............................................................................................. 1
1.2 Vision and Mission of Aksum University .............................................................. 1
1.3 Main products and services .................................................................................... 2
1.4 Main Customers of Aksum University .................................................................. 2
1.5 The overall organizational structure and work flow of Aksum University......... 2
1.6 Objective of Aksum university ICT directorate ................................................... 3
1.7 Organization Governance Structure of ICT ......................................................... 3
CHAPTER TWO ..................................................................................................................... 6
THE OVER ALL INTERNSHIP EXPERIENCE ................................................................ 6
2.1 How We Got into the Company ................................................................................... 6
2.2 Procedures and methods ............................................................................................... 6
2.3 How good we have been performing our tasks ........................................................... 7
2.4 Challenges we have been facing while performing our tasks .................................... 8
2.5 Measures taken to overcome challenges ...................................................................... 8
2.6 Network topology of AKU main campus..................................................................... 8
CHAPTER THREE .............................................................................................................. 10
ENHANCED DESIGN OF LOCAL AREANETWORK (LAN) FOR AKSUM
UNIVERSITY MAIN CAMPUS .......................................................................................... 10
3.1 Introduction ................................................................................................................. 10
3.2 Statement of problem .................................................................................................. 10
3.3 Objective of the Project............................................................................................... 11
3.4 Scope and Limitation of the Project .......................................................................... 11
3.5 Significant of the Project............................................................................................. 12
3.6 Literature Review ........................................................................................................ 12
3.7 Methodology................................................................................................................. 12
3.8 Result and discussion .................................................................................................. 20
CHAPTER FOUR ................................................................................................................. 22
OVERALL BENEFITS GAINED........................................................................................ 22
4.1 Improving practical skills ........................................................................................... 22
v
4.2 Improving interpersonal communication skills ........................................................ 22
4.3 Improving team playing skills .................................................................................... 22
4.4 Improving leadership skills ........................................................................................ 22
4.5 Understanding work ethics related issues ................................................................. 23
4.6 Entrepreneurial skills.................................................................................................. 23
CHAPTER FIVE ................................................................................................................... 24
CONCLUSION AND RECOMMENDATION ................................................................... 24
5.1 Conclusion .................................................................................................................... 24
5.2 Recommendation ......................................................................................................... 24
REFERENCE ........................................................................................................................ 27
Appendix ................................................................................................................................ 28
vi
Table of figures
Figure 1.1 MAIN Customers of AKU ........................................................................... 2
Figure 2.1AKU network topology ................................................................................. 9
Figure 3.1 Over all execution procedure flowchart ..................................................... 13
Figure 3.2 Current AKU main campus network systems ............................................ 18
Figure 3.3 Enhanced AKU main campus network systems ......................................... 19
Figure 3.4 Communication between the same VLANs ............................................... 21
vii
CHAPTER ONE
BACKGROUND INFORMATION of AKSUM
UNIVERSITY
1.1 Brief History of AKU
Aksum University is a public higher educational institution located in the city of
Aksum (approximately 1024 kilometers away from the capital city of Addis Ababa,
recognized for its historical significance and heritage sites), Tigray, Ethiopia. Aksum
University is one of the public higher educational institutions of Ethiopia, established
in 1999 E.C.
The university has four campuses: the main campus, Referral campus, Shire campus,
and Adwa campus. It offers a variety of undergraduate and postgraduate programs,
with a focus on providing a global perspective to its approximately 12,000 students in
regular programs and 8,000 students in summer and extension programs. The
university is supported by a staff of 702 academic and 1,271 administrative personnel.
Aksum University is actively involved in national initiatives and emphasizes the use
of information technology to enhance its educational activities. It offers a diverse
range of 49 undergraduate and 24 postgraduate programs, aiming to provide a
comprehensive educational experience for its students.
Vision
Aksum University aims to establish itself as the preferred university for students
seeking a high-quality learning and research environment, along with a strong sense
of community. The university takes charge of overseeing and organizing information
resources within the institution, and it assumes a leadership role in the field of ICT to
ensure the efficient utilization of technology for academic and business purposes.
Moreover, Aksum University seeks to elevate its status and reputation, aspiring to
become one of the leading universities. It aims to achieve this through the creation of an
exceptional learning and research environment, fostering entrepreneurship, and establishing
partnerships with national and international institutions.
The customers of Aksum University can be categorized into various groups based on
their involvement in the educational process.
1.5 The overall organizational structure and work flow of Aksum University
Aksum University has a well-defined organizational structure that facilitates effective
management and decision-making. The structure comprises various departments,
faculties, administrative units, and support services. The hierarchical arrangement
2
ensures clear lines of authority, efficient communication, and coordination among
different units and personnel. And it also follows a well-defined workflow to ensure
efficient operations and the delivery of quality services. The workflow encompasses
various departments and units, including academic departments, administrative
offices, and support services. To ensures smooth functioning and effective
coordination among different entities within the university, a system that support
processes are established.
The primary process in AKU's ICT inventory management system begins with the
store head and progresses down to the lower-level storekeeper as well.
Specific objective
3
responsibilities of key personnel, establishes policies and procedures, and promotes
accountability and transparency in ICT operations.
4
Roles and responsibilities of business Applications Development and
administration team
Work with the academic departments for course material preparation and
uploading.
Plan, implement and manage E-learning and digital library infrastructure.
Create the technical infrastructure within campuses, inter-campuses and
inter universities for video conferencing and tele-education.
Roles and responsibilities of technical support and maintenance team
5
CHAPTER TWO
THE OVER ALL INTERNSHIP EXPERIENCE
2.1 How We Got into the Company
We studied electrical and computer engineering for four years before participating in
a three-month internship in Aksum University. We were searching for a company that
can provide us the necessary knowledge we need in respect to our field of study and
help us to integrate the theoretical knowledge we have with practical work. We found
the AKU ICT directorate a convenient place for us so we submitted a request letter,
which then they reviewed and granted us their acceptance.
The primary objective of our internship in Aksum University ICT Data Center was to
gain practical knowledge and contribute some values to the network infrastructure.
Our internship primarily focused on the main data center and ICT development.
Methods: inquire the maintenance team personnel and observe the infrastructure to
collect data.
Methods: Conduct research on industry best practices and standards for network
design. Consider factors such as scalability, reliability, security, and cost-
6
effectiveness. Collaborate with the ICT team to gather requirements and align the
proposed design with the university's needs.
Documentation:
Procedure: Document the processes made during the internship, and prepare a
comprehensive report.
Methods: Attend regular group members meetings; work with the ICT team when
they are performing tasks like managing the data center and also with cabling and
maintenance. seek guidance and explanation when needed by asking questions.
Communicate findings, recommendations, and implementation plans in a clear and
concise manner.
By reflecting on our performance and the lessons learned, we are better equipped to
face future challenges and contribute positively to success of projects. We will
continue to build on our strengths, address areas for improvement, and strive for
excellence in our profession.
7
2.4 Challenges we have been facing while performing our tasks
Limited Experience: we had lack of experience regarding on working with real-world
network implementations and it made it challenging to understand and apply network design
principles effectively.
Ineffective collaboration, lack of communication, problem solving, time management and
documenting skills.
5. Seeking Guidance: by asking for advice and clarifications on our subjects from
our mentors.
8
collapsed hierarchical model. At the top of the network, a firewall is employed for
routing and network security purposes. To minimize costs, an internal router is not
used, as the firewall fulfills both functions.
The firewall is connected to the internet via a fiber link. In the DMZ (Demilitarized
Zone), the mail and web servers are directly connected to the firewall through a public
switch, allowing them to be accessed from the internet creating the separation
between internal network and external network. Conversely, servers in the server
farm, including DNS, File, and Application servers, are grouped together and can only
be accessed from the local area network (LAN). These servers are connected to the
collapsed core switches.
However, it is worth noting that the current network architecture lacks redundancy as
the distribution switches has just one path from the core switch. In the event of
network failures, this setup may not adequately sustain network activities.
9
CHAPTER THREE
The design of the campus network at Aksum University was initiated in 2005 E.C by
the ICT center team. The primarily utilized topology is a star topology due to its
convenience of design in current case.
The transition to a hybrid star ring topology offers several advantages over the
existing star topology. The property of the ring topology enhances fault tolerance by
eliminating single points of failure and providing redundancy through multiple paths.
This ensures uninterrupted network connectivity and minimizes the impact of link or
device failures. And the property of the star topology improves scalability, allowing
for seamless expansion and accommodating the university's growing user base and
increasing network traffic.
To facilitate this transition, careful consideration has been given to the redundancy
and resiliency. Measures are incorporated into the design to ensure high availability
and minimize network disruptions. Necessary techniques are also applied to maintain
its performance.
10
to one of the distributors failed the whole connection of the blocks in access layer
which is connected to it fails without having backup network feed. The existing star
topology has limitations in terms redundancy options, lacks resilience in case of
network failures, and network segmentation necessitating the need for improvement.
The main objective of this project is to design LAN topology of Aksum University
main campus by designing a hybrid of star & ring topology and utilize the necessary
techniques for its optimum performance.
Limited redundancy on access switches: due to budget constraints, it was noy feasible
to implement redundant paths for each access switch within the network
infrastructure. As a result in the event of failure on a specific access switch link, there
may be a temporary loss of connectivity until the issue is resolved.
11
Insufficient security mechanisms: Given the projects time constraints, it was not
possible to implement robust security mechanisms to their full extent. The
deployment of advanced security measures, such as comprehensive access control
was beyond our projects scope.
The star topology has been the traditional choice for LAN designs, but recent studies
have highlighted its limitation in terms of single point failures. In response, the ring
star topology has emerged as a promising alternative. The ring topology offers
redundancy and fault tolerance by providing multiple links between switches ensuring
uninterrupted connectivity. It’s also scalable, allowing for easy integration of new
switches as the network grows.
Virtual local area networks (VLANs) have gained attention in LAN design for their
ability to enhance network segmentation reducing broadcast traffic, optimizing
bandwidth utilization security, simplifying network management and efficiency (1).
3.8 Methodology
Data Gathering Methodology
12
Online research: we reviewed some related helpful information and technologies on
the internet.
Interview: we collected the required information from the team members of the ICT
center who work on the infrastructure of the network closely through questioning.
Design procedure and approach
13
Technology used
1. Switching Technology: Cisco catalyst switches are employed to form the access,
distribution, and core layers of the network infrastructure. These switches support
comprehensive features, such as VLANs to enhance performance and manage
network traffic effectively.
3. Network security: access control mechanism was implemented to protect the LAN
from unauthorized access and network attack by segmented the network into VLANS.
Requirement of Equipment
Hardware requirement
Pc
Flash drive
Software Requirement
Network Overview
14
occur when there are redundant or multiple paths between switches or routers in a network.
And if not properly managed, these redundant paths can create loops.
One of the consequences of loops is broadcast storms. When a device broadcasts a frame,
such as an Address Resolution Protocol (ARP) request, in a looped network, the frame
circulates indefinitely being continuously forwarded by switches onto all available paths
resulting in a broadcast storm. This can lead to network congestion, decreased overall
network performance.
Switches use MAC address tables to determine the destination port for forwarding frames. In
a looped network, a switch receives a frame with a destination MAC address that it has
already learned on multiple ports. As the frame circulates through the loop, the switch keeps
updating its MAC table with conflicting information, which leads to instability and incorrect
forwarding decisions (2) (1)
To prevent loops and mitigate their impact, network protocols like Spanning Tree Protocol
(STP) and its variants (RSTP, MSTP) are used. These protocols detect and block redundant
paths, allowing only one active path while blocking others to prevent loops. By eliminating
loops, STP ensures stable and reliable network operation.
Root Bridge Selection: Each switch in the network participates in the STP process
and exchanges Bridge Protocol Data Units (BPDU) messages to determine the root
bridge.
The root bridge is the reference point for path calculations in the spanning tree.
Switches compare the Bridge IDs (a combination of bridge priority and MAC
address) in the BPDU messages to elect the root bridge. Thus; the switch with the
lowest Bridge ID becomes the root bridge (3).
After the root bridge is elected, each switch determines its root port, which is the port
with the best path to reach the root bridge.
The path cost is calculated based on the cumulative link costs from the switch to the
root bridge.
Each switch then selects designated ports for each network segment, which are the
ports providing the shortest path to the root bridge.
15
Redundant ports, which would create alternate paths and potential loops, are blocked
by STP. These blocked ports are in a listening state and do not forward data (4).
Port States:
Blocking: Blocked ports receive BPDU messages but not forwarding data. They
prevent loops by blocking redundant paths.
Listening: Ports in the listening state prepare to participate in the spanning tree. They
do not forward data but still receive BPDU messages.
Learning: Ports in the learning state start populating the MAC address table by
learning source MAC addresses. They do not forward data yet.
Forwarding: Ports in the forwarding state actively participate in data forwarding and
forwarding BPDU messages. They are part of the active path for data transmission.
When a link fails, STP recalculates the spanning tree by determining new root ports
and designated ports.
Convergence time refers to the time required for the spanning tree to stabilize after a
change.
STP convergence can take several seconds, during which network traffic might
experience disruptions or delays.
Limitations of STP:
STP has a slow convergence time, which means it takes time to recalculate the
spanning tree if there are changes in the network, such as link failures or new
switches.
16
RSTP maintains backward compatibility with STP, allowing switches running RSTP
to interoperate with switches running STP.
RSTP Operation:
RSTP introduces new port states (discarding, learning, and forwarding) to enhance the
convergence process.
RSTP uses a faster convergence algorithm, which reduces the time required to
transition ports to the forwarding state when there are changes in the network.
RSTP introduces the concept of edge ports, which are designated as non-participating
in the STP and immediately transition to the forwarding state when connected devices
are detected (5)
RSTP introduces new port states to enhance the convergence process and improve
network responsiveness.
Discarding: Similar to STP's blocking state, discarding ports do not forward data but
still receive and process BPDU messages. They prevent loops by blocking redundant
paths.
Learning: Learning ports start populating the MAC address table by learning source
MAC addresses. They do not forward data yet.
RSTP introduces the concepts of alternate ports and backup ports to provide backup
paths and improve network resiliency.
Alternate ports are non-designated ports that are placed in a backup role for the root
port. They are ready to transition to the forwarding state if the current root port fails.
Backup ports are backup designated ports for a particular segment. They are placed in
a backup role and are ready to take over the forwarding role if the current designated
port fails (3).
17
Simulation process
The use of simulation in Cisco Packet Tracer provided us valuable platform for
network design, prototyping, training, and troubleshooting. It offers a safe and
efficient way to experiment with network configurations, validate designs, and
enhance understanding of networking concepts, ultimately leading to more robust and
optimized network implementations. This simulation allows us to visualize and test
the network configuration before implementing it in a real-world scenario.
18
Figure 3.3 Enhanced AKU main campus network systems
Choose the core switch as the root bridge for each of VLANs that we have and adjust
the RSTP priorities accordingly.
5. Configure VLANS
6. Configure DHCP
We enabled port fast to allow the ports to bypass the spanning tree delay and directly
transition to forwarding state. And BPDUguard for additional security to prevent from
19
unauthorized networking device connecting to the port and cause possible loop in the
non trunking access links.
BPDU Guard will set a port in an errdisable state if a BPDU is received indicating
there is networking device connected. BPDU Guard should be enabled on any port
with Port Fast enabled.
We shut down a path from the core switch to a distribution switch and the distribution
switch still gets connectivity through another alternate route.
We did a real time simulation test to observe data communication from one end
device to another.
The VLAN also provides scalability and flexibility to accommodate future growth
and changing network requirement. Additional VLANs can be easily created to
support new user groups or services, ensuring the network remains adaptable. It also
20
simplifies network administration tasks by providing logical grouping easier to exert
security measures separately.
We did a successful ping test to see if PCs which are in the same VLANs are able to
communicate. And successful ping tests that indicate hosts in different VLANs are not
communicating.
We observed real time packet transmission from one client to another in the same VLAN,
how fast the topology converges in case of link failure, how fast a pc gets active when
connected to port fast enabled port and how the link shuts down when a switch is connected
to a port guard enabled port.
21
CHAPTER FOUR
22
confidence in our abilities to guide and motivate others, setting a foundation for future
leadership roles.
23
CHAPTER FIVE
This internship fostered the development of critical thinking, such as problem solving,
team work. Communication and collaboration with the data center teams to
understand the requirements and translating them into design also sharpened our skill
in usage of industry standard protocols and technologies. The experience gained
during this internship will undoubtedly serve as a solid foundation for future uses in
the fields of network infrastructure.
Our project of designing enhanced LAN for the main campus transformed the star
topology to hybrid of ring and star while implementing VLANs and necessary
techniques. The hybrid star ring topology introduced redundancy and increased
network availability by providing alternate paths and rapid network convergence
during link failures. The VLAN configuration enabled efficient network
segmentation, isolating different user groups and services, and preventing
unauthorized access.
5.2 Recommendation
Based on our experiences gained from our internship and project the following
recommendations are provided for further over all enhancement of the VLAN.
One of the key recommendations for improving the internship experience within the
data center is Implementation of structured mentor ship program. This can be
24
designed to match interns with mentors based on their specific areas of interest,
allowing for targeted guidance and support.
Dedicated training and feedback sessions, plenty of hands on exercises would create
robust learning environment for interns, empowering them to develop essential skills,
deepen their knowledge, and prepare for future careers.
To facilitate continues learning, the data center should establish a resource library or
online platform specifically intended for interns. This repository could include
relevant technical documentation, research papers and online courses that interns can
access to supplement their learning experience and provide discussion platforms.
Regular updates and additions to the resource library should be made to ensure access
to latest information.
These initiatives will not only enhance the interns’ learning experience but also
contribute to the overall growth and development of the data center.
Deploying advanced network monitoring and analysis tools, performance testing tools
to gain deeper insights into VLAN performance, traffic patterns, and security events is
crucial. Then utilizing network analysis to proactively identify and resolve
performance bottlenecks, optimize traffic flows, deploying quality of service
protocols and improve overall network efficiency would have benefits immensely.
25
Network security audits and advanced security mechanisms
Periodic network security audits should be conducted to assess the effectiveness of the
VLAN based security measures and identifying any potential weaknesses. This will
help maintain a robust security posture and ensure the protection of the sensitive data
and resources. Additionally, ongoing training and awareness programs for network
users and administrators should be implemented to promote best practices and
proactive security measures.
Careful planning and maintaining of access control lists and firewall rules needs to be
implemented to restrict and control the flow of traffic between VLANs. keeping up
with advanced security technologies such as intrusion detection and prevention
systems, network segmentation with virtual firewalls, network access control
solutions to address evolving future requirements is beneficial as well.
26
REFERENCE
1. Behrouz A. Forouzan. Data Communications and Networking, Fourth Edition. s.l. :
McGraw-Hill companies., 2007.
2. Balchunas, Aaron. spanning tree version 3.1.3. s.l. : ([email protected]).
3. acadamy, cisco. Campus Network for High Availability Design Guide, . s.l. : ccan Cisco
Systems, Inc., , 2008.
4. buor.z. Data Communication and Computer Network . s.l. : www.tutorialspoint.com.
5. tour.tg. Cisco Networking Academy, CCNA SWITCH Lab .
27
Appendix
Configuration commands
Switch# conf t
Set the core switch to be the root bridge for each VLANs for centralized control.
Switch# conf t
Switch(config)# end
2. Configure port fast and port guard on access switches at necessary ports.
Switch(config-if-range) # end
Switch# conf t
Switch(config-if-range) # end
Check if the switches are operating RSTP using the show command.
3. Configure DHCP
Conf t
Sevice dhcp
28
exit
Conf t
Interface vlan 5
No shutdown
Exit
Conf t
Interface vlan 10
No shutdown
Exit
Conf t
Interface vlan 20
No shutdown
Exit
Conf t
Interface vlan 30
No shutdown
Exit
Conf t
Interface vlan 40
29
No shutdown
Exit
Conf t
Default-router 192.168.5.1
Dns-server 8.8.8.8
Exit
Conf t
Default-router 192.168.10.0
Dns-server 8.8.8.8
Exit
Conf t
Default-router 192.168.20.0
Dns-server 8.8.8.8
Exit
Conf t
30
Default-router 192.168.30.0
Dns-server 8.8.8.8
Exit
Default-router 192.168.40.0
Dns-server 8.8.8.8
Exit
Conf t
Interface vlan 5
Ip helper-address 192.168.5.1
Exit
Conf t
Interface vlan 10
Ip helper-address 192.168.10.1
exit
Conf t
Interface vlan 20
Ip helper-address 192.168.20.1
exit
Conf t
Interface vlan 30
Ip helper-address 192.168.5.1
31
exit
Conf t
Interface vlan 40
Ip helper-address 192.168.5.1
exit
switch(config)# vlan 5
switch(config-vlan) # exit
switch(config-if-range) # end
switch(config-if-range) # end
Follow the same procedure to configure trunk interfaces on access switches as well.
32
33