0% found this document useful (0 votes)
32 views54 pages

Final Docment - Abreheley....

final project

Uploaded by

kirosseyfu16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views54 pages

Final Docment - Abreheley....

final project

Uploaded by

kirosseyfu16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 54

AKSUM UNIVERSITY

AKSUM UNIVERSITY INSTITUTE OF TECHNOLOGY

(AIT)

FACULTY OF ELECTRICAL AND COMPUTER


ENGINEERING

DEPARTMENT OF ELECTRONICS AND


COMMUNICATION ENGINEERING
HOSTING COMPANY OF INTERSHIP: IN AKU ICT DATA CENTER

PROJEC TTITTLE:DESIGN AND SIMULATION OF LAN USING


CISCO PACKET TRACER IN AKU MAIN CAMPUS

DURATION INTERNSHIP: OCTOBER2023 G.C -JANUARY2024


G.C

Participant Name:
ID.NO: 1.Musie
Fiseha………..............................................................AKU
1104340

2.Teshome
Abrahaley...............................................................AKU
1603876

3.Abreheley
Tsehaye................................................................AKU
1001866
Submitted to: ECE Department

Submission Date: January 2024 G.C

Aksum, Tigray, Ethiopia

DECLARATION
We have declared that, we 5th year electrical and computer engineering department
of electronics and communication engineering have undertaken an internship which is
practical exchange of experience for the theoretical knowledge that we had before
with the company supervisor, advisor, technicians, of computer networking cables
installing in AKU ICT data center for the last 4 months.This report and project are our
original work and result of the effort each individual in the group except where is
stated in the reference.This report is requirement to practical fulfillment for the
accomplishment of four months internship by helping all our belove who help us
directly and indirectly.

We would like to assure with our signature for approval, evaluate and review on it.

Students’ name ID.NO. Signature

1.Musie Fiseha AKU1104340 ___________

2.Teshome Abrahaley AKU1603876


___________

3.Abreheley Tsehaye AKU1001866 ___________

This report and project have been submitted for examination with our signature
approval to the department under the coordination of advisor and co-advisor.

Advisor Name Signature

Inst. Yonatan G. ___________

Co-advisor Name Signature

Inst. Fitaw B. __________


APPROVAL
The undersigned and certified by candidates on the above have fulfilled the condition
of project paper an internship report and project in electrical and computer
engineering department of electronics and communication focus area is approved by
the following who concern it bodies.

Dept. Head Signature Date

__________ ________
____________

Chairman /woman Signature Date

_____________ _________
___________

Supervisor/Advisor Signature Date

_______________ __________
_________

Examiner/invigilator Signature Date

_______________ _________
_________
ACKNOWLEDGEMENT
Above all, we would like to thank great fully for our god who is almighty merciful
supported us spiritually.

Without his blessing and endorsement, this internship program and project would not
have been completed.

Then, we would like to thank our family who supported us on this project
economically as well as ideally.

Next to this we would like to give a great regard and thank to our department for
supporting us ideally and financially (specially, opening computer lab class) for this
internship report and project to develop our practical knowledge and understandings.
And also, we would like to give special thanks to company supervisor (Mr. Abrha and
Gebrehiwot) for the giving advice and all about the working environment AKU ICT
data center and network infrastructure and for the giving network concept of LAN
configuration system of Aksum university and for their guidance, generosity to share
tremendous knowledge for giving continuous motivation from the starting of the
internship until the end of the program.

Consequently, we would have very great full thank for our department supervisor
instructor Yonas Desta, advisor Yonatan G, co advisor Fitaw B, and the faculty.

Finally, we would like to thank for these who supported us directly and indirectly in
order to achieve our internship program and project
EXECUTIVE SUMMARY
This internship program report and project is about four months practical
exchange of experience with companies which is related to his/her field of interest.
After successfully completion, we compiled of our internship work a student is
required what every practice and practical works he has done in this internship. And
also, this report is about to explain what we did and learned during our internship
period with Aksum university ICT development office, in data center & network
infrastructure, network designing and configuration. The main purpose of this
internship is to learn by working in practical environment and to apply the knowledge
acquired during the studied in real world condition and in order to grasp the problems
using the knowledge and skill learned during the academic theoretical process. We
have discussed about major aspects of the campus network, which we observed and
perceived during our internship program. This report is prepared according to the
format given by the IILI. The internship has five classifications. Section one
discusses about the back ground of Aksum University and ICT Development office.
The second section explains the overall internship experience. Section three describes
all about the project we have done. Fourth, the overall benefits we gained during the
internship program. The last section is conclusion and recommendations of the
previous sections i.e. about ICT development office, data center and Spread out
Network system. The most important in an internship program is that the student
should spend their time in a true manner and with the sprit to learn practical
orientation of theoretical study framework. This report is about our internship that we
have under gone at Aksum University ICT data center from October2023G.C –
February2024G.C. During our internship we are able to learn practical aspect of
network and get good working experience.

ABBREVIATION
 AIT Aksum Institute Technolog
 LAN Local Area Network
 ICT Information Computer Techno.
 Inst. Instructor
 WAN Wide Area Network
 MAN. Metropolitan Area Network
 UTP Unshielded Twisted pair
 RJ Register Jack
 IILI Institute Industry LinkageI.
 VLAN Virtual Local Area Network
 CAT5 Category 5 Cable
 CAT6 Category 6Cable
 STP Shielded Twisted pair
 NAT Network address translaion
 PC Personal Computer
 CPT Cisco Packet Tracer

Contents
Declaration......................................................................................................................i
Approval........................................................................................................................ii
Acknowledgement........................................................................................................iii
Executive Summary......................................................................................................iv
ABBREVIATION..........................................................................................................v
CHAPTER ONE............................................................................................................1
Background Information of Aksum university..............................................................1
1.1Brief History of Aksum University.......................................................................1
1.2 Mission.................................................................................................................1
1.3 Vision...................................................................................................................2
1.4 Main Products and Services.................................................................................2
1.5 Main Customers of Aksum University................................................................3
1.6 The overall organizational structure and work flow of Aksum University..........3
1.7 Aim of the data center..........................................................................................4
1.8 Objective of Aksum-ICT......................................................................................4
1.9 General objective..................................................................................................5
1.10 Specific objective...............................................................................................5
1.11 Facilities and Resources ICT Development office of AKU...............................6
1.12 Organizational Governance Structure of ICT....................................................7
Chapter two..................................................................................................................10
The overall internship Experience................................................................................10
2.1 How we get in to the company...............................................................................10
2.2 Performance Over Given Work Task.................................................................11
2.3 Work piece and work tasks we have been executing.........................................11
2.5 How good we have been in performing our tasks..............................................12
2.6 Challenges faced and taken measurement..........................................................13
2.8 Network Infrastructure.......................................................................................14
2.9 Network Criteria.................................................................................................14
2.10 Types of Network Connection.........................................................................15
2.11 Categories of Network...................................................................................16
2.12 Virtual Local Area Network.............................................................................18
2.13 Twisted Pair Cable...........................................................................................23
Chapter THREE...........................................................................................................29
OVER ALL GAINED Benefits...................................................................................29
3.1 Benefits in terms of Practical Skills...................................................................29
3.2 Benefits in terms Upgrading Theoretical Knowledge........................................29
3.3 Benefits in terms of Interpersonal Communication Skills.................................30
3.4 Benefits in terms of Team-playing Skills...........................................................30
3.5 Benefits in terms of Leadership Skills...............................................................31
3.6 Benefits in terms of Understanding about Work Ethics Related Issues.............31
3.7 Benefits in terms of Entrepreneurship Skills......................................................32
Chapter FOUR.............................................................................................................33
PROJECT TITLE: DESIGN AND SIMULATION USING CISCO PACKET
TRACER......................................................................................................................33
4.1 Introduction........................................................................................................33
4.2 Background........................................................................................................33
4.3 Statement of the Problem...................................................................................33
4.4 Statement of Objective.......................................................................................34
4.4.1 General Objective............................................................................................34
4.4.2 Specific Objective...........................................................................................34
4.5 Scope and limitation...........................................................................................34
4.5.1 The Scope of the Project.................................................................................34
4.5.2 Limitation........................................................................................................35
4.6 Significance of the project..................................................................................35
4.7 Review of Related Literature.............................................................................35
4.8 Methodology......................................................................................................35
4.8.1 Data Collection Methodology.........................................................................35
4.8.2 Data Analysis..................................................................................................36
4.8.3 Software & Hardware Requirements..............................................................37
4.9 Result and discussion.........................................................................................40
Chapter five..................................................................................................................41
Conclusion and recommendation.................................................................................41
5.1 Conclusion..........................................................................................................41
5.2 Recommendations..............................................................................................42
References....................................................................................................................43
Appendix.......................................................................................................................44

List of Figures

Figure 1 main customers of AKU..................................................................................3


Figure 2 Overall organizational work flow....................................................................3
Figure 3 governance structure of ICT............................................................................7
Figure 4 AKU network topology.................................................................................13
Figure 5 point to point network
connection…………………………………………..15

Figure 6 multi point network


connection……………………………………………..15

Figure 7 LAN...............................................................................................................15
Figure 8 WAN..............................................................................................................15
Figure 9 MAN..............................................................................................................16
Figure 10 Power dril.....................................................................................................17
Figure 11 Pacth pannel.................................................................................................17
Figure 12 saw...............................................................................................................17
Figure13 Crimper……………………………………………………………….........18

Figure 14 screw............................................................................................................18
Figure 15 rack..................................................................................................................
Figure 16 Switch..........................................................................................................19
Figure 17 Router..........................................................................................................20
Figure 18 Hub..............................................................................................................20
Figure 19 twisted pair cable………………………………………………………. 22

Figure 20 UTP cable…………………………………………………………………22

Figure 21 RJ 45 connector...........................................................................................22
Figure 22 Straight through...........................................................................................23
Figure 23 Cross over:...................................................................................................23
Figure 24 firewall.........................................................................................................28
Figure 25 Network design............................................................................................31
Figure26 Flow of methodology………………………………………………………...

Figure27 Data
analysis…………………………………………………………………..

Figure 28 PING Command..........................................................................................36


CHAPTER ONE

BACKGROUND INFORMATION OF AKSUM UNIVERSITY


1.1Brief History of Aksum University
Aksum University is located in Tigray region, Central Zone and it is about 2.5
kilometers south west from the ancient cradle of civilization town of Axum. The area
is UNESCO’S world heritage site; the possible location of the Ark of convent famed
for its giant granite stele (sometimes called Obelisks). This makes the University a
unique and historic institution. Aksum University is a public university in Ethiopia.
Under the plan for higher education. It is one of the nation’s ten public higher
educational institutions established after the establishment of the first generation
the universities. Because of this, AKU possesses the title of Ethiopia
second generation learning institution which is founded in 2006G.C. The university’s
name is called Aksum University, so named for the Axum town. At its inception, the
university had one campus and three colleges. Later the University added two
campuses which host three colleges and one school. Currently, the university has four
campuses, six colleges and one school which enroll about 12000 students in regular
programs and 8000 in summer and extension programs. It is staffed with 702
academic and 1271 administrative staff.

Furthermore, it is actively engaged in national visions, information technology


endeavors expanding the university’s activity 49 undergraduate and 24 postgraduate
programs with a vision to provide a global perspective for students.

1.2 Mission
The mission of the Aksum University is produces skilled and competent man power
through the provision of quality education, conducting result orientation research
and offering problem solving community service, while offering our employees a
conducive and rewarding working environment that values, recognizes and
appreciates their contribution.
1.3 Vision
By 2030, Aksum University aspires to be a university of first choice for high quality
learning-research environment and a genuine sense of institution in the world
community.

1.4 Main Products and Services


The University, traditionally has two main goals: to create and to disseminate
knowledge. The creation of knowledge is done through the research and its
dissemination, is done through the education. The university is also our customers run
package exchanges, build networks and connect consumers to their favorites shows
and to each other. Our facilities are the foundation for all that. let our facilities be the
foundation for your success. Our data center services are designed for flexibility to
grow as your business grows, and our Interconnection products and connectivity mix
help you optimize your network

The following are the main products and services of Aksum university.

 E-mail service
 Virtual server and storage services
 Wireless network service
 Camera system for surveillance
 E-learning
 Desktop hard ware and soft ware
 IP telephony service
 Secure internet service
1.5 Main Customers of Aksum University
The customers of Aksum University are divided in different groups of actors as linked
to the educational process. Which have classified the customers in internal and
external, emphasizing that the internal customers who are work to the satisfaction of
external customers, besides to this the customers can be classified in primary ones and
secondary ones, based on their location being as internal customers or external ones
and based on the frequency of interaction that the institution has with them too. While
consider that the product of higher education is the education and then, depending on
the role developed by them during the course, the students can be classified as internal
or external.

Figure 1 main customers of Aku

1.6 The overall organizational structure and work flow of Aksum University
Aksum University has to strive to emplace management system that is democratic,
honest, inspiring, transparent, and highly participatory. The University has two core
processes and five support processes. The University’s top management includes the
president, two Vice-presidents, and deans/directors for academic units and seven
process owners. The major focus of the management in terms of governance and
management includes improve efficiency on major administration areas such as
budget utilization, business process (procurement, finance, registrar, etc.) efficiency
and decision- making system in a transparent manner.
Figure 2 Overall organizational work flow

1.7 Aim of the data center


Integrating ICT to the various academic and administrative functions of the
University developing quality learning strategy, system and procedure

 Providing the optimum set of learning technologies


 Providing a reliable, secure and available administrative computing system
 Preparing quality control mechanisms for software purchases.

1.8 Objective of Aksum-ICT


Under the perspectives of ‘Customer, Finance, Internal Business Process, and
Learning and Growth’, Aksum University has identified the following strategic
objectives:
 Improve customers/stake holder satisfaction;
 Improve student’s competency and innovativeness;
 Improve cost effectiveness and enhance internal revenue;
 Increase effectiveness and efficiency of budget utilization;
 Enhance existing teaching methodology and introduce improved ones;
 Supporting discrimination (notably female and disabled) sections and
minimizing academic wastage;
 Improve the quality of academic support service;
 Enhance international linkages and internationalization of education;
 Increase student intake capacity of the university;
 Improve instructional resources and facilities;
 Improve physical infrastructure; and
 Enhance Staff Capacity

1.9 General objective


The objective sets to achieve the vision and mission are

 To lead, manage and develop ICT in the university.


 To provide excellent customer centered services that are responsive to
changing needs of the user.
 To maintain an effective staff development program to ensure that ICT staff
continue to develop the necessary skills to provide high quality services and
support.
 To promote teaching and development with ICT and the development of ICT
skills in all staff and students.
 Setup, operate and maintain dedicated service applications for the different
ICT services.
 Perform proper management of the available ICT resource, including internet
bandwidth.
 Design and development support according to the needs of Aksum university
community tools and establish ICT communication and collaboration between
student, teachers and staff of the university.

1.10 Specific objective


 To interlink the regional government institution with each other and automate
resource by putting in place modern and reliable information.
 To build capacity of using modern technology throughout in the regional and
national level.
 Better development activities undertaking in the company by using methods of
information and communication technology.
 Communication technology infrastructure which may go together with the
civilized world, to provide efficient public service and make a significant
contribution for the materialization of good governance.

1.11 Facilities and Resources ICT Development office of AKU


The office is poised to serve your needs with the following facilities and resources:
 Institutional emails
 Website services
 Video conferencing systems
 Bandwidth optimization solutions
 Virtual Desktop Cloud Computing Infrastructure Open Access Facilities
 Wireless LAN hotspots
 ICT Support and maintenance

Responsibilities of the ICT director directorate

The ICT director directorate shall have the duties and responsibilities to:

 Enhance and expand ICT Infrastructure and services to enable technology-


enhanced education and innovation;
 Digitize and automate operational academic, research, service provision and
administrative business processes;
 Drive ICT human capacity development;
 Maximize business-enabling collaborations and industry linkages;
 Provide ICT technical support and maintenance services to streamline the
operational business processes of the University;
 Develop ICT strategic plan aiming at providing broad rang services and advise
the University Management on matters related to ICT;
 Administer and upgrade the existing network and Internet infrastructure and
provide relevant network-based services;
 Ensures that the university community has sufficient access to ICT Services;
 Provide consultancy, short term training and outreach services to the larger
community in ICT related matters;
 Develop, review and enforce ICT related strategic policies and guidelines;
 Set standards for subcontracting ICT related capital projects, procurements
and administer its implementation;
 Design and implement ways of modernizing teaching and learning facilities
and classrooms;
 Plan the expansion of e-learning services and facilities in various programs of
the University;
 Provide, operate and maintain the ICT infrastructure, systems and solutions to
meet the needs of the administrative, educational, and research programmers
of the University;
 Establish proper ICT governance through an ICT Policy for the university;

1.12 Organizational Governance Structure of ICT

Roles and responsibilities of the ICT director directorate

 Accountable to the university president


 Provide leadership and management to the ICT director
 It insures that, ICT provides, operates and maintains the ICT infrastructure,
systems and solutions to meet the needs of the administrative, educational,
and research programs of the University
 Establish proper ICT governance through an ICT Policy for the university,
planning of ICT projects, managing the portfolio of solutions, systems and
infrastructure, and instituting a Service Management approach to the services
and solutions that the ICT delivers to the university community
 Insures that, the ICT department understands the needs of its customers – the
university and the many departments and programs that it runs, the
teachers, students and administrators, and provides solutions based on this
understanding
 Be an ICT evangelist in the University and its many departments
 Keep up with the ever-changing Information and Communication Technology,
especially identifying new tools and technologies that will move the
University’s Education and Research responsibilities forward

Analyzing business processes of different sections of the university and come up with
automation solution

Roles and responsibilities of Business Applications Development and


Administration

 Automate and facilitate the student-instructor communications


 Automate and facilitate the full life-cycle activities of students and staff (from
enrollment to graduation/resignation/retirement)
 Verify the compatibility, scalability and Integrality the different business
automation application going to be implemented in the University
 Developing and customizing applications

Roles and responsibilities of ICT Infrastructure and Services

 Create and manage the physical layer connectivity of new and existing
campuses, buildings, classrooms, offices and laboratories
 Create and manage the IP layer connectivity
 Plan, implement and manage the Internet connectivity
 Creating acceptable use policy for the network and Internet
 Secure the network from Internal and external threats
 Monitor real time status of the physical and logical connections
 Log and audit network access
 Create and manage application-ready local cloud infrastructure
 Update and patch the operating systems and middleware in data centers
 Plan, implement and manage internal communication and collaboration
platforms (email, portal, unified communications, etc.)
 Plan, implement and manage online and offline backup
 Plan, implement and manage patch management and end point malware
protection for campus users and staff workstations
 Plan, implement and manage central Identity management solution for existing
and new systems to be implemented
Roles and responsibilities of Teaching and Learning Technologies

 Work with the academic departments for course material preparation and
uploading
 Plan, implement and manage E-learning infrastructure
 Plan, implement and manage Digital Library infrastructure
 Create the technical infrastructure within campuses, inter-campuses and inter-
universities for video conferencing and tele-education

Roles and responsibilities of technical support and maintenance

 Single point of contact for ICT related issues, problems, requests


 Provide quick services to its users, provide problem identification, support and
resolution functions to its customers
 Record, monitor problems being reported to ICT, update users on status of
problems, and report on service level metrics for services provided
 Compile a knowledge base of problems and solutions, for use by first level
support personnel
 Track and report on Service Level performance that it achieves and ICT
delivers
 Maintain failed office equipment (printer, ups, computer, laptops, phones,
network devices)
 Perform preventive maintenance regularly
 Keep an inventory of maintained and replaced items
 Prepare depreciation, discarding and replacement plan for equipment

Roles and responsibilities of Training and Consultancy

 Arrange trainings for the ICT team


 Plan Inter-ICT Team knowledge and exchange sharing
 Arrange training for campus users and staff about newly implemented and
developed applications
 Create basic awareness on Internet, security, productivity tools, emerging
technologies and new projects in ICT for the campus users and staff
 Arrange and implement Student Internship programs
 Arrange and implement services for on campus and off campus society
 Create a space for campus society creative activities and projects
 Plan and implement different revenue and business opportunity generation
mechanisms for the ICT
 Plan, implement and manage intuitional website
 Update with the latest web design technologies and techniques
 Integrate websites with existing application on the university structure
 Required Additional staffs to teach and learn
 Network Infrastructure design and implementation

Services:

 Website design and development


 System analysis, Design and Implementation
 Training and Consultancy on various areas
 Prepare and evaluation procurement documents
 Identity card design and printing
CHAPTER TWO

THE OVERALL INTERNSHIP EXPERIENCE

2.1 HOW WE GET IN TO THE COMPANY

We have studied electrical and computer engineering for four years before this our
four months internship at Aksum University and in this time, we have seen many
changes, Transformation Plan and great growth in the University. The university
industry linkage program is planned to create an interaction between universities and
industries, and also create students that have the capability of facing and solving
practical problems. Because of these reasons, Aksum University has given a great
deal of attention to this program in helping students, starting from searching
companies that are willing to be part of this program up to giving essential documents
and schedules. We first choice internship placement and this is given to our
department office of ECE and they check and sent acceptance. So, we get into the
company by giving internship place request letter for our university to company head
office. Then they observe the request letter and they had given their acceptance letter.
When we come back to their company to begin the internship program, we should
bring the acceptance letter of the company. Then we started our internship program in
a given time in the main data center and ICT development.

2.2 Performance Over Given Work Task


Although it is difficult to give evaluation for ourselves, we can surely say that we
tried our best to get concrete knowledge from the internship program. We were
dedicated for the assignments and classes given by our supervisors in network system.
Here it is difficult to mention all of the close follow up we got by our supervisors. To
list some there were reading assignments, simple exercises and other things that were
given to us by our supervisors and we got very good feedback both from the exercises
and from our tutor. As our supervisors told us our overall performances were good.
2.3 Work piece and work tasks we have been executing
During our internship program work tasks which we have been executing:

 Visiting data center and network infrastructures


 Crimping and identifying network cable type
 Configure switches and create LAN
 Configure router
 Install wired LAN
 basic switch configuration and understanding

2.4 Procedures we have taken to perform the task

We have done network cable crimping for wired access point when the network
technicians install.

We had used the following materials /equipment

 Network twisted pair cable (UTP)


 RJ-45 connector
 Crimper
 Power drilling machine
 Trunk

The following procedures were taken to perform the task we have taken.

 Cut the cable using cutter


 We made cable ordered in the color configuration
 Cut the colored equally in both sides
 Insert in to RJ-45 connector to the proper position in both sides
 Crimping RJ-45 using crimper

When we configure the color of the wire in both sides using straight through
configuration the crimping cable and color arrangement code should be ordered as the
following in both sides.

1. White -Orange
2. Orange
3. White- Green
4. Blue
5. White-Blue
6. Green
7. White-Brown
8. Brown

2.5 How good we have been in performing our tasks


During our internship program we work our tasks in enthusiasm, as well as our
company operators was giving answer when we asked a question them. Therefore, we
can say that our task has been performed in moderate manner effectively and
efficiently, and we were punctual when we performed our tasks.

2.6 Challenges faced and taken measurement


During our internship period in the main campus data center, we were faced so many
challenges. The first challenge we encountered were the newness of the profession
availability of the courses we took in field of study. Other challenges that we
encountered during our internship program was that lack of equipment and resources
for installation and designing in the university continuously. There was no lab to get
internet access of online and sometimes the assigned staff members were not
attending on time. So, the things that we had done by that time were taken some
classes by the technicians.
For the matter it had taken us some days while we adjust ourselves with the
professions. The technicians have helped us in great deal to achieve the prerequisites
we have to know first. Then we developed our knowledge regarding this through
reading on the internet and some pdf file by downloading.
Regarding on the lack lab internet, we solved the problem using ICT digital library
and mobile data and for the lack of equipment we solved using by practicing turn by
turn.
2.7 We have been working in AKU ICT data center main section company

During the whole internship we have observed the data center, AKU network
topology, look network cable maintenance, design network infrastructure, switch and
router configuration, VLAN trunk protocol, network installation and architecture.

AKU network topology: AKU used star topology this topology has three layers,
namely core layer, distribution layer, and access layer.

As it is depicted on the following figure logical topology, the overall network fits the
collapsed hierarchical model.

In the core layer, two collapsed core switches are connected through a fiber cable, but
not forming a redundant path. This path is not helpful to sustain activities in case if
failures happen to the network.

The access switches of different number of ports are directly connected with end
devices like pc.

Figure 3 AKU network layers (Star topology)

2.8 Network Infrastructure


Network infrastructure refers to the hardware and software resources of an entire
network that enable network connectivity, communication, operations and
management of a network system Network infrastructure provides the communication
path and services between users, processes, applications, services and external
networks/the Internet.

On the most fundamental level a computer network is an interconnected collection of


devices through a link that are capable of send, receive, store, retrieve and share
information. Now a day a computer network is more than connection of
interconnected devices, it is a resource that enables us to gather, analyze, organize,
and disseminate information that is essential to our profitability.

2.9 Network Criteria


A network must be able to meet a certain number of criteria. The most important of
these are performance, reliability, and security.

2.9.1 Performance: Performance can be measured in many ways, including transit


time and response time. Transit time is the amount of time required for a message to
travel from one device to another. Response time is the elapsed time between an
inquiry and a response. The performance of a network depends on a number of
factors, including the number of users, the type of transmission medium, the
capabilities of the connected hardware, and the efficiency of the software.

2.9.2 Reliability: In addition to accuracy of delivery, network reliability is measured


by the frequency of failure, the time it takes a link to recover from a failure, and the
network's robustness in a catastrophe.

2.9.3 Security: Network security issues include protecting data from unauthorized
access, protecting data from damage and development, and implementing policies and
procedures for recovery from breaches and data losses.

2.10 Types of Network Connection


To communicate computer to one another they should connected through a link, a link
is a communications pathway that transfers data from one device to another. There are
two ways of connections. Namely: point to point and multipoint.

2.10.1 Point to point: point-to-point connection provides a dedicated link between


two devices. The entire capacity of the link is reserved for transmission between those
two devices. Most point-to-point connections use an actual length of wire or cable to
connect the two ends.

Figure 4 point to point connection


2.10.2 Multipoint: A multipoint connection is one in which more than two specific
devices share a single link. In a multipoint environment, the capacity of the channel is
shared, either spatially or temporally. If several devices can use the link
simultaneously, it is a spatially shared connection.

Figure5 Multi point connection

2.11 Categories of Network.


The category into which a network falls is determined by its size according to this
these there are three types called local area network, wide area network and
metropolitan area network.

2.11.1 Local Area Network: Local area networks, generally called LANs, are
privately-owned networks within a single building or campus of up to a few
kilometers in size. They are widely used to connect personal computers and
workstations in company offices and factories to share resources (e.g., printers) and
exchange information. LANs are distinguished from other kinds of networks by three
characteristics:

1. Their size,
2. Their transmission technology, and
3. Their topology.
LANs are restricted in size, which means that the worst-case transmission time is
bounded and known in advance. Knowing this bound makes it possible to use
different kinds of designs that would not otherwise be possible. It also simplifies
network management.

Figure6 LAN

2.11.2 Wide Area Network: A wide area network (WAN) provides long-distance
transmission of data, image, audio, and video information over large geographic areas
that may comprise a country, a continent, or even the whole world.

Figure 7WAN

2.11.3. Metropolitan Area Networks: A metropolitan area network (MAN) is a


network with a size between a LAN and a WAN. It normally covers the area inside a
town or a city. It is designed for customers who need a high-speed connectivity,
normally to the Internet, and have endpoints spread over a city or part of city.
Figure 8 MAN

2.12 Virtual Local Area Network


VLANs logically segment switched networks based on the functions, project teams,
or applications of the organization regardless of the physical location or connections
to the network. All workstations and servers used by a particular workgroup share the
same VLAN, regardless of the physical connection or location. A workstation in a
VLAN group is restricted to communicating with file servers in the same VLAN
group. VLANs function by logically segmenting the network into different broadcast
domains so that packets are only switched between ports that are designated for the
same VLAN. Segmenting a switched LAN as one or more VLANs provides the
following advantages:

 Limits multicast and broadcast flood only to the required segments of the LAN
to save LAN bandwidth
 Provides secured LAN access by limiting traffic to specific LAN segments
Eases management by logically grouping ports across multiple switches

Hard ware components

A, Power drilling: Power drilling is an electrical motor that rotates a replaceable drill
bit to make a hole in wood, plastic, metal with handling, ON/OFF triggers.
Safety rules:

 Check if the switch is in OFF condition


 Loosen the chuck and insert appropriately
 Tighten the chuck

Figure 9 Power drilling

B, Patch panel: A patch panel provides a convenient place to terminate all of


the cables that coming from different rooms in to the wiring closet and the
cables are labeled in the path panel end face plate.

Figure 10 Patch panel

C. Saw: - is used to cut the Trunk.

Figure 11 saw

D. Trunk: Trunk is a networking device or rectangular tube which is used to


protect and route electrical wiring in building, structure, UTP cable mostly.
Fig12 trunk

E. Screw: - is used to build network installation tool to the wall and for tightening
and loosening from the anchored it.

Figure 13screw

F. Rack: - is a tool that used to contain the patch panel and switch and used as
power distribution and shelf. It has a box shape.
Fig14 rack
G. Switch: is a multiport device that broadcasts frames received on one port to
all other ports. All ports are in the same collision domain. Switches are
generally identified as Layer-2 devices, as switches process information stored
in the Data-Link header of a frame (such as MAC addresses in Ethernet).

Figure 15Switch

H. Router: routers are identified as Layer-3 devices, as routers process logical


addressing information in the Network header of a packet (such as IP
addresses).
Figure 16 Router

I. Hub: Hubs are Layer-1 devices that physically connect network devices
together for communication.

Figure 17 Hub

Ethernet Cabling

An Ethernet cable is one of the most popular forms of network cable used on wired
networks. Ethernet cables connect devices on local area networks such as PCs,
routers, and switches. Ethernet cables are physically manufactured in two basic forms
called solid and stranded.

Solid Ethernet cables

 Offer slightly better performance plus improved protection against electrical


interference
 Are more commonly used on business networks wiring inside office walls or
under lab floors to fixed locations

Stranded Ethernet cables


 Are less prone to physical cracks and breaks making them more suitable for
travelers.
 Are more commonly used in home networking and by travelers

Ethernet networks originally used thick or thin coaxial cable, but most installations
currently use unshielded twisted pair (UTP) cabling. The UTP cable contains eight
conductors, arranged in four twisted pairs, and is terminated with an RJ-45 connector.

2.13 Twisted Pair Cable


Twisted pair cable consists of color-coded pairs of insulated copper wires, each with
diameter of 0.4 to 0.8 mm (approximately the diameters of a straight pin). Every two
wires are twisted around each other to form pairs, and all the pairs are encased in a
plastic sheath. The number of pairs in a cable varies, depending on the cable type. So,
all twisted pair cable falls into one of two categories. These are:

 STP (shielded twisted pair)


 UTP (unshielded twisted pair)

Fig18 twisted pair cable

2.13.1 UTP (unshielded twisted pair)

Cabling consists of one or more insulated wire pairs encased in a plastic sheath. As its
name implies, UTP does not contain additional shielding for the twisted pairs. As a
result, UTP is both less expensive and less resistant to noise than STP.
Figure 19UTP cable

There are two types of UTP internet cable namely; straight through and cross over.

Straight through: used to connect different devices (switch to pc, switch to router).

To make UTP internet cable we follow the following step

 Remove the twisted pair cable’s cover like this

Figure 20twisted pair cable

 Straightened the wires.

 Once you've straightened the wires, your next task is to arrange them in the
order they'll be placed into the RJ-45 connector. Working from left to right,
the order of the wires is:

 Orange with a white stripe

 Orange

 Green with a white stripe

 Blue
 Blue with a white stripe

 Green

 Brown with a white stripe

 Brown

Figure 21Straight through

Cross over: - is used to connect the same device (i.e. switch to switch, pc to pc).

The color Can be arranged as:

 WG G WO B WB O WBR BR

Figure 22Cross over:

2.14 RJ-45 connector

We can use RJ-45 and cable cat 6.


Not all RJ-45 connectors are created equally. One reason why CAT-6 cable is much
harder to work with than CAT-5 cable is that CAT-6 is quite a bit thicker. So, it's hard
to get RJ-45 connectors intended for CAT-5 cable to attach properly to CAT-6 cable.
When you're shopping for RJ-45 connectors, make sure the ones you buy are suitable
for CAT-6.

Figure 23RJ 45connector

2.15 Network Security and Firewall

When our LAN connects to the Internet through a router, an opportunity is created for
outsiders to access or disrupt your network. A NAT router provides some protection
because by the very nature of the process, the network behind the router is shielded
from access by outsiders on the internet. However, there are methods by which a
determined hacker can possibly obtain information about your network or at the least
can disrupt your Internet access. A greater degree of protection is provided by a
firewall router.
2.15.1 Security

The world is becoming more interconnected with the advent of the Internet and new
networking technology. There is a large amount of personal, commercial, military,
and government information on networking infrastructures worldwide. Network
security is becoming of great importance because of intellectual property that can be
easily acquired through the internet.

2.15.2 Firewall

A firewall is a network system or group of systems that manages access between two
or more networks. Firewall operations are based on one of three technologies:

Figure 24 firewall

A firewall is a device that protects one network from another while allowing
communication between the two. A firewall incorporates the functions of the NAT
router, while adding features for dealing with a hacker intrusion or attack. Several
known types of intrusion or attack can be recognized when they occur. When an
incident is detected, the firewall can log details of the attempt, and it can optionally
send e-mail to an administrator to report the incident. Using information from the log,
the administrator can take action with the ISP of the hacker. In some type of
instructions, the firewall can fend off(protect) the hacker by discarding all further
packets from the hacker’s IP address from a period of time.
CHAPTER THREE

OVER ALL GAINED BENEFITS

The internship program has offered us variously vast benefits. In addition to the
practical skills acquired from the program, a theoretical knowledge would be caught
on. Besides, we could manage to improve our qualities in terms of interpersonal
communication. During the period of internship, a team spirit had been developed on
matters that needed teamwork. In this internship program, we have gained essential
leadership qualities. The crucial thing got from the internship is the work ethics.
Last the internship program has enabled us to see solutions through problems, i.e. it
has yielded some of valuable entrepreneurship skills in our life.

3.1 Benefits in terms of Practical Skills


Before the internship, our practical knowledge was limited by theories that we
learned before. Despite their educational preparation of a student, school assignments
and projects were to be done by only short-period deadlines. And this methodology
had limited considerably the scope which we might learn from the tasks. As the
evaluations in school are one-or-two-exams-based, emphasis was due merely to class
lectures and few exercises. Unlike the projects in school the projects found throughout
the internship period were based on real-life problems. In this Project, network and
system design had been learned. Small scale network design had taught us high level
network project management. The design encompasses designing the network
topology and configuring the network devices. In this project, we had got to see
switch and router configuration using Cisco Packet Tracer software.

3.2 Benefits in terms Upgrading Theoretical Knowledge


The internship program helped us to strength and complement academic theoretical
knowledge and practical knowledge is combined to compose them to gather.

The internship program was primarily supposed to make students aware of real
working environments. We had the chance of upgrading our theoretical knowledge as
having a time to read books with plenty of time without bothering about exams or test.
The internship program had acquainted us with some Crucial theories needed for each
task. For instance, we had to understand the switch and router configuration.

The most significant part of the theoretical aspect of the internship is its value in
enhancing the learned concepts, for example some ideas about computer networks
from the course Data communication and now we have grabbed some concepts in
computer networking after the internship. The internship program had also let us clear
up `misunderstood concepts during our school attendances. For example, we realize
now our understanding of some details of the network devices and configuration
concepts before the internship was somehow incorrect.

Consequently, our internship experience seems to have obvious significance in


upgrading our theoretical knowledge.

3.3 Benefits in terms of Interpersonal Communication Skills


One of the goals of the Qualified Internship System (QIS) is its role in
improving skills of interpersonal communication. In this regard, this internship helped
us to work up on our personal behavior corresponding to social interaction.
Throughout the internship, we developed professional contacts. Now, we understand
these contacts may be able to help us in the future by acting as a reference for another
office tasks or assist us in securing full-time employment within their company.

The internship was an important occasion to create networking. As no one is


perfectly intelligent of everything, we had to ask different people in their areas of
specialization. This, in turn, enabled us to network with professionals. Moreover, the
internship had opened the opportunity to communicate with different positions in
every area of specialization offices. As a result, it had acquainted us with a variety of
individuals and systems.

The followings are some advantages of communication skill in the intern:

 Improve relationship with other


 To express and share ideas clearly
 To handle and challenges without afraid

3.4 Benefits in terms of Team-playing Skills


The proverb “unity is strength” works quite well in real working environments. Great
national and international projects never come true as one-man work. And nothing
different from this was what we came across a tour work. All works were being done
in teams.

Our internship experience helped us improve our team-playing qualities as all the
tasks given had required teamwork. As a result, we had got this benefit as back bone
our task.

The followings are the benefits we gained as team playing skill in the internship:
 Active participation
 Sharing idea openly and willingly
 Working as problem solver
 Develop friendship and cooperation

3.5 Benefits in terms of Leadership Skills


The internship had been supposed to be important occasion to practice the assets of
leadership.

Indeed, the internship had offered us to grasp leadership virtues such a

 Self-confidence
 Accountability
 Fair assignation of tasks
 Effective communication skill
 Devotion
 Good speaking ability
 Ability to listen others
 Good leadership of optimal solver to problem

3.6 Benefits in terms of Understanding about Work Ethics Related Issues


Ethics is a branch of philosophy that defines morality and determines the meaning and
rational justification of the right way to live, correct values as well as correct ways of
others.

The measure of the performance of any employee professional mainly depends on


his/her compliance to the work ethics. Work ethics were the most significant lesson
we got from the internship. In the internship period, we experienced the essences of
both universal and job-specific ethical standards.

We strived to arrive at the workplace punctually. In addition, we were punctual in


meeting the deadline of a given task.

Obligation for some body as work ethics:

 Punctuality
 Office discipline
 Honesty
 Reliability
 Cooperation
 Accountability
 Keeping secret
 Transparency

3.7 Benefits in terms of Entrepreneurship Skills


The entrepreneur is a risk-taking person who can see solutions from surrounding
cloud of problems or a glut of resources. Indeed, we learnt a lot on improving our
critical thinking and problem-solving skills. The change from school to workplace
itself was another learning opportunity, conditioning us to adapt to work environment.
Consequently, this internship had helped us become a more motivated life-long
learner.

Successful entrepreneurs have to start with these main skills. These are:

 Self -motivation
 Self- confidence and reliance
 Ethics and morals
 Time management
 Finance

The most important we gained from this internship includes:

 Provides work experience in a field of interest


 Creates a springboard theoretical life to practical life
 Provides,” real life” experience at short term commitment
 Strengthen back ground in field of choice
 Creates the potential for future work in the company
CHAPTER FOUR

PROJECT TITLE: DESIGN AND SIMULATION OF LAN


USING CISCO PACKET TRACER
4.1 Introduction
In order to install, design, configure and build a network system, many factors must
be taken into consideration, such as the topology and placement of hosts within the
network, the selection of hardware and software technologies, careful configuration of
each component,

4.2 Design of Local Area Network (LAN)


A critical step in designing our network is defining the network topology. The
topology is the physical and logical layout of the network. We used the star topology
from the four types of network topologies. For this project we will design the project
using packet tracer which is a platform visual simulation tool designed by Cisco
Systems.

Figure 25 Network design


4.3 Statement of the Problem
AKU network system currently lacks of some labeling, redundancy, and the matter of
identifying when and where technical problem like failure of devices occurs unless
they are told by the users. If the network cable is not label in a standard way it is
difficult to maintain when internet access is failed, so it must to label the network
cable from which switch port is it come(insert) and to which computer is it goes(inset)
in order to maintain it easily. Moreover; it is a good idea to provide for a reason that
when a link from a core switch is broken; meanwhile there is no data transferring
from the core switch to the distribution and access switches. As a result; this project
concern to solve the problem by a redundant links at the core layer ensures that
network devices can find alternate paths to send data in the event of a failure. When
Layer 3 devices are placed at the core layer, these redundant links can be used for
load balancing in addition to providing backup.

4.4 Objectives
4.4.1 General Objective
 Design, upgrade, scalable, configure and implement network system in AKU
and fulfill network infrastructure in a certain areas of the university

4.4.2 Specific Objective

 To provide network access and consolidate performance


 To provide network capacity by upgrading the existing before
 To design the LAN topology infrastructure
 To design the network system
 To provide an online data instead of manual data
 To develop secured network in terms of level security
 To identify easily failure that is happened

4.5 Scope and limitation

4.5.1 The Scope of the Project


The scope of our project is focused on designing a network infrastructure and
implementing by applying cisco packet tracer (CPT) to simulate the result with
standard labeling in certain areas of Aksum university compound. Therefore, the
process of our report and project has taken around four months for the completion it.
4.5.2 Limitation
The limitations of a study are its flaws or shortcomings which could be
the result of unavailability of resources, lack of willingness of advisors in the
ICT center, flawed methodology, etc

4.6 Significance of the project


The followings are the major significance of the project we have done.

The present study is significant, because it addresses the network


problems that has occurs

The aim of this project is to allow systems and devices to be able to communicate
with each other and should be able to provide desired information, to reduce isolated
users and workgroups, physical systems and devices should be able to maintain and
provide satisfactory performance.

4.8 Methodology
In this section data collection methodology, design methodology and connectivity
testing of configurations will be presented.

4.8.1 Data Collection Methodology


We have used three types of data gathering methods to collect the relevant
information about the project report, those are:
 Observation: it is used to show and understand the actual working conditions
and systems. So, we have observed the actual working environment of network
system, and then we identified the problems and recommend the solutions.
 Document analysis: we have reviewed some ICT document and literatures from
site.
 Interview: to acquire full idea about the existing network conditions of AKU, we
have used interview methods.

Data collection method


Observation

Literature review

Develop network install & design

Simulating using CPT

Result and conclusion

Fig26 flow of methodology

4.8.2 Data Analysis

Computer

Switch

Router

Cloud
cluster

Server

Figure 27 data analysis

4.8.3 Software & Hardware Requirements


To complete the project, we have used different software’s and hardwires as shown
below.
Software’s used:
 Cisco Packet Tracer: is a software used to develop network system.
 Windows 10: packet tracer was installed and simulation & testing of the
prototype was done on this operating system.
 Microsoft Office: used to write and save the intern and project reports.

Network Design Methodology

 Technologies we use to design the network are:


1. Static Configuration
2. Network Connectivity

Static Host Configuration

used to automatically assign IP addresses.

Network Connectivity

When we connect the network, it must meet the link provided to connect the required
device in order to communicate one another.

1. PING Command
The ping command is the basic command used to check for connectivity between
devices. It can be done on switches, routers or computers. In routers and switches the
command is applied in the privilege mode while on pcs it takes place in the command
prompt interface. The main requirement of a network is for data to travel at the
shortest

available time. As shown below

Figure 28 PING Command


4.9 Result and discussion
Cisco packet tracer (CPT) simulation is preferred to design different network to
evaluate sending message from the sender or source to the receiver or destination
from end user to end user and easily manage the network to check the connection if it
is successfully connected.
As we have tried to state above the project consists different services and protocols
that should be configure in each layer and integrated to have a functional local area
network (LAN). The ping command promote result is obtained by using cisco packet
tracer software application.
Ping command is most power full software part for network engineers to send request
from the source to the destination and wait for response or feedback.
The following are examples of ping command these taken as sample to show the
project we have done is functional.
We ping 192.168.6.3 on switch0 of PC0, it replied successfully with packet sent
message 4, received message 4, lost message 0 and minimum time taken 2min,
maximum time taken 35 min and average time taken 11min.

We ping 192.168.8.3 on switch2 of PC4, it replied successfully with packet sent


message 4, received 4, lost message 0, min time taken 0min, max time taken 2min,
average time taken 0min.
CHAPTER FIVE

CONCLUSION AND RECOMMENDATION

5.1 Conclusion
This internship was good for us because we covered many different fields. We also
learnt new concepts and new ways of working.

In this project we have seen wired or guided local area network which interconnects a
variety of communicating devices (laptop, desktop, printer) within small geographic
area and the installed, designed, configured and implemented project was with three
layers: core, distribution and access layers.

The distribution layer prevents the change that take place in the access layer from
affecting the core layer or to insulate the core from the changes that occur in access
layer by allowing the core layer to be more stable and efficient.

The core layer is designed to operate at maximum packet forwarding efficiency so as


to provide high reliability, low latency, low delay time and low packet lost.

The access layer provides services for the end users or subscribers (these may be
private, public, guest, staff users)

During this internship period we acquired practical experience to complement the


theoretical content of our study for campus Cisco three-layer hierarchical model tasks
and detailed configuration of each layer and network security of main campus data
center.

We got practical work experiences and benefits at main data center of the AKU
Company. Some of the benefits of the internship offered to us include;
 Upgrade our theoretical knowledge at the main compass.
 Networking design by using CPT
 Allow us to both make and develop professional contacts, for our future
job search.
 Assist us in developing greater understanding of our computer network
distribution system.
 The company’s Work flow
 Leadership skill

5.2 Recommendations
The recommendation is a precise idea, comment, criticize, for the positive side to
keep as it was, for the negative side to evaluate as new its drawbacks.

During our internship stay in the site, we were able to see the main data center of the
AKU compass such as networking installation, design and security. The Data Center
is the hub of the University’s computing resources, which are shared by the academic,
research, and administrative communities. These facilities provide a secure,
enterprise-wide, reliable, and redundant infrastructure for the delivery of mission-
critical University systems.

5.2.1 Recommendation for AIT

 It is better to give as a course before the internship


 It is better to have an agreement with different sites and checking the
acceptance before we start the internship

5.2.2 Recommendation for the UIIL

 The UIIL should have good relationship with more private sectors rather than
government controlling sectors
 It should have seminars and workshops for enterprising

5.2.3 Recommendation for the company

 Proper labeling cables should take place so that one can understand easily
 It is better, data should be transmitted by over had transmission line rather
than underground to prevent interruption and fiber breaking up with road
construction
 The company should not be accepted for the internship students if the is no
willing and able to guide properly.
REFERENCES
[1]. John SherwoodSALSA: A Method for Developing the Enterprise Security
Architecture and Strategy, 18 Braemore Road, Hove, East Sussex, BN3 4HB, UK

[2]. From ICT Development Office

[3] Todd Lammel, CCNA Cisco Certified Network Associate Study Guide 6Th
edition, Wiley publishing, Inc.2007.

[4] Campus Network for High Availability Design Guide, Cisco Systems, Inc.,
2008.http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/HA_recovery_
DG/campusRecovery.html

[6] http://www.hardware.com/store/cisco/AIR-LAP1252AG-E-K9 8. Cisco Networking


Academy, CCNA SWITCH Lab Manual Cisco Press, 201

APPENDIX
Weekly Internship Activity

 First week
Literature study area, design, and network infrastructure
Discussion about culture of AKU with the project leader

 Second week
Discussion about the objectives, method and analysis of AKU ICT
Literature study of networking

 Third week
Working of Networking of the study area

 Fourth week
Literature study of previous year

Discussion about the protocol

 Fifth week
Preparation field work
Understanding the strength and weakness of ICT

 Sixth week
Field work AKU ICT campus
Coming to ideal solution of the problem
Analyzing the solution
Starting of the solution

 Seventh week
Field work old register
On progress the solution

 Eighth week
Field work cabling CNR building

Summarizing the solution and observed problem

 Ninth week
Organizing the document
Writing the internship

 Tenth week
Studying and revising the internship

You might also like