Final Docment - Abreheley....
Final Docment - Abreheley....
(AIT)
Participant Name:
ID.NO: 1.Musie
Fiseha………..............................................................AKU
1104340
2.Teshome
Abrahaley...............................................................AKU
1603876
3.Abreheley
Tsehaye................................................................AKU
1001866
Submitted to: ECE Department
DECLARATION
We have declared that, we 5th year electrical and computer engineering department
of electronics and communication engineering have undertaken an internship which is
practical exchange of experience for the theoretical knowledge that we had before
with the company supervisor, advisor, technicians, of computer networking cables
installing in AKU ICT data center for the last 4 months.This report and project are our
original work and result of the effort each individual in the group except where is
stated in the reference.This report is requirement to practical fulfillment for the
accomplishment of four months internship by helping all our belove who help us
directly and indirectly.
We would like to assure with our signature for approval, evaluate and review on it.
This report and project have been submitted for examination with our signature
approval to the department under the coordination of advisor and co-advisor.
__________ ________
____________
_____________ _________
___________
_______________ __________
_________
_______________ _________
_________
ACKNOWLEDGEMENT
Above all, we would like to thank great fully for our god who is almighty merciful
supported us spiritually.
Without his blessing and endorsement, this internship program and project would not
have been completed.
Then, we would like to thank our family who supported us on this project
economically as well as ideally.
Next to this we would like to give a great regard and thank to our department for
supporting us ideally and financially (specially, opening computer lab class) for this
internship report and project to develop our practical knowledge and understandings.
And also, we would like to give special thanks to company supervisor (Mr. Abrha and
Gebrehiwot) for the giving advice and all about the working environment AKU ICT
data center and network infrastructure and for the giving network concept of LAN
configuration system of Aksum university and for their guidance, generosity to share
tremendous knowledge for giving continuous motivation from the starting of the
internship until the end of the program.
Consequently, we would have very great full thank for our department supervisor
instructor Yonas Desta, advisor Yonatan G, co advisor Fitaw B, and the faculty.
Finally, we would like to thank for these who supported us directly and indirectly in
order to achieve our internship program and project
EXECUTIVE SUMMARY
This internship program report and project is about four months practical
exchange of experience with companies which is related to his/her field of interest.
After successfully completion, we compiled of our internship work a student is
required what every practice and practical works he has done in this internship. And
also, this report is about to explain what we did and learned during our internship
period with Aksum university ICT development office, in data center & network
infrastructure, network designing and configuration. The main purpose of this
internship is to learn by working in practical environment and to apply the knowledge
acquired during the studied in real world condition and in order to grasp the problems
using the knowledge and skill learned during the academic theoretical process. We
have discussed about major aspects of the campus network, which we observed and
perceived during our internship program. This report is prepared according to the
format given by the IILI. The internship has five classifications. Section one
discusses about the back ground of Aksum University and ICT Development office.
The second section explains the overall internship experience. Section three describes
all about the project we have done. Fourth, the overall benefits we gained during the
internship program. The last section is conclusion and recommendations of the
previous sections i.e. about ICT development office, data center and Spread out
Network system. The most important in an internship program is that the student
should spend their time in a true manner and with the sprit to learn practical
orientation of theoretical study framework. This report is about our internship that we
have under gone at Aksum University ICT data center from October2023G.C –
February2024G.C. During our internship we are able to learn practical aspect of
network and get good working experience.
ABBREVIATION
AIT Aksum Institute Technolog
LAN Local Area Network
ICT Information Computer Techno.
Inst. Instructor
WAN Wide Area Network
MAN. Metropolitan Area Network
UTP Unshielded Twisted pair
RJ Register Jack
IILI Institute Industry LinkageI.
VLAN Virtual Local Area Network
CAT5 Category 5 Cable
CAT6 Category 6Cable
STP Shielded Twisted pair
NAT Network address translaion
PC Personal Computer
CPT Cisco Packet Tracer
Contents
Declaration......................................................................................................................i
Approval........................................................................................................................ii
Acknowledgement........................................................................................................iii
Executive Summary......................................................................................................iv
ABBREVIATION..........................................................................................................v
CHAPTER ONE............................................................................................................1
Background Information of Aksum university..............................................................1
1.1Brief History of Aksum University.......................................................................1
1.2 Mission.................................................................................................................1
1.3 Vision...................................................................................................................2
1.4 Main Products and Services.................................................................................2
1.5 Main Customers of Aksum University................................................................3
1.6 The overall organizational structure and work flow of Aksum University..........3
1.7 Aim of the data center..........................................................................................4
1.8 Objective of Aksum-ICT......................................................................................4
1.9 General objective..................................................................................................5
1.10 Specific objective...............................................................................................5
1.11 Facilities and Resources ICT Development office of AKU...............................6
1.12 Organizational Governance Structure of ICT....................................................7
Chapter two..................................................................................................................10
The overall internship Experience................................................................................10
2.1 How we get in to the company...............................................................................10
2.2 Performance Over Given Work Task.................................................................11
2.3 Work piece and work tasks we have been executing.........................................11
2.5 How good we have been in performing our tasks..............................................12
2.6 Challenges faced and taken measurement..........................................................13
2.8 Network Infrastructure.......................................................................................14
2.9 Network Criteria.................................................................................................14
2.10 Types of Network Connection.........................................................................15
2.11 Categories of Network...................................................................................16
2.12 Virtual Local Area Network.............................................................................18
2.13 Twisted Pair Cable...........................................................................................23
Chapter THREE...........................................................................................................29
OVER ALL GAINED Benefits...................................................................................29
3.1 Benefits in terms of Practical Skills...................................................................29
3.2 Benefits in terms Upgrading Theoretical Knowledge........................................29
3.3 Benefits in terms of Interpersonal Communication Skills.................................30
3.4 Benefits in terms of Team-playing Skills...........................................................30
3.5 Benefits in terms of Leadership Skills...............................................................31
3.6 Benefits in terms of Understanding about Work Ethics Related Issues.............31
3.7 Benefits in terms of Entrepreneurship Skills......................................................32
Chapter FOUR.............................................................................................................33
PROJECT TITLE: DESIGN AND SIMULATION USING CISCO PACKET
TRACER......................................................................................................................33
4.1 Introduction........................................................................................................33
4.2 Background........................................................................................................33
4.3 Statement of the Problem...................................................................................33
4.4 Statement of Objective.......................................................................................34
4.4.1 General Objective............................................................................................34
4.4.2 Specific Objective...........................................................................................34
4.5 Scope and limitation...........................................................................................34
4.5.1 The Scope of the Project.................................................................................34
4.5.2 Limitation........................................................................................................35
4.6 Significance of the project..................................................................................35
4.7 Review of Related Literature.............................................................................35
4.8 Methodology......................................................................................................35
4.8.1 Data Collection Methodology.........................................................................35
4.8.2 Data Analysis..................................................................................................36
4.8.3 Software & Hardware Requirements..............................................................37
4.9 Result and discussion.........................................................................................40
Chapter five..................................................................................................................41
Conclusion and recommendation.................................................................................41
5.1 Conclusion..........................................................................................................41
5.2 Recommendations..............................................................................................42
References....................................................................................................................43
Appendix.......................................................................................................................44
List of Figures
Figure 7 LAN...............................................................................................................15
Figure 8 WAN..............................................................................................................15
Figure 9 MAN..............................................................................................................16
Figure 10 Power dril.....................................................................................................17
Figure 11 Pacth pannel.................................................................................................17
Figure 12 saw...............................................................................................................17
Figure13 Crimper……………………………………………………………….........18
Figure 14 screw............................................................................................................18
Figure 15 rack..................................................................................................................
Figure 16 Switch..........................................................................................................19
Figure 17 Router..........................................................................................................20
Figure 18 Hub..............................................................................................................20
Figure 19 twisted pair cable………………………………………………………. 22
Figure 21 RJ 45 connector...........................................................................................22
Figure 22 Straight through...........................................................................................23
Figure 23 Cross over:...................................................................................................23
Figure 24 firewall.........................................................................................................28
Figure 25 Network design............................................................................................31
Figure26 Flow of methodology………………………………………………………...
Figure27 Data
analysis…………………………………………………………………..
1.2 Mission
The mission of the Aksum University is produces skilled and competent man power
through the provision of quality education, conducting result orientation research
and offering problem solving community service, while offering our employees a
conducive and rewarding working environment that values, recognizes and
appreciates their contribution.
1.3 Vision
By 2030, Aksum University aspires to be a university of first choice for high quality
learning-research environment and a genuine sense of institution in the world
community.
The following are the main products and services of Aksum university.
E-mail service
Virtual server and storage services
Wireless network service
Camera system for surveillance
E-learning
Desktop hard ware and soft ware
IP telephony service
Secure internet service
1.5 Main Customers of Aksum University
The customers of Aksum University are divided in different groups of actors as linked
to the educational process. Which have classified the customers in internal and
external, emphasizing that the internal customers who are work to the satisfaction of
external customers, besides to this the customers can be classified in primary ones and
secondary ones, based on their location being as internal customers or external ones
and based on the frequency of interaction that the institution has with them too. While
consider that the product of higher education is the education and then, depending on
the role developed by them during the course, the students can be classified as internal
or external.
1.6 The overall organizational structure and work flow of Aksum University
Aksum University has to strive to emplace management system that is democratic,
honest, inspiring, transparent, and highly participatory. The University has two core
processes and five support processes. The University’s top management includes the
president, two Vice-presidents, and deans/directors for academic units and seven
process owners. The major focus of the management in terms of governance and
management includes improve efficiency on major administration areas such as
budget utilization, business process (procurement, finance, registrar, etc.) efficiency
and decision- making system in a transparent manner.
Figure 2 Overall organizational work flow
The ICT director directorate shall have the duties and responsibilities to:
Analyzing business processes of different sections of the university and come up with
automation solution
Create and manage the physical layer connectivity of new and existing
campuses, buildings, classrooms, offices and laboratories
Create and manage the IP layer connectivity
Plan, implement and manage the Internet connectivity
Creating acceptable use policy for the network and Internet
Secure the network from Internal and external threats
Monitor real time status of the physical and logical connections
Log and audit network access
Create and manage application-ready local cloud infrastructure
Update and patch the operating systems and middleware in data centers
Plan, implement and manage internal communication and collaboration
platforms (email, portal, unified communications, etc.)
Plan, implement and manage online and offline backup
Plan, implement and manage patch management and end point malware
protection for campus users and staff workstations
Plan, implement and manage central Identity management solution for existing
and new systems to be implemented
Roles and responsibilities of Teaching and Learning Technologies
Work with the academic departments for course material preparation and
uploading
Plan, implement and manage E-learning infrastructure
Plan, implement and manage Digital Library infrastructure
Create the technical infrastructure within campuses, inter-campuses and inter-
universities for video conferencing and tele-education
Services:
We have studied electrical and computer engineering for four years before this our
four months internship at Aksum University and in this time, we have seen many
changes, Transformation Plan and great growth in the University. The university
industry linkage program is planned to create an interaction between universities and
industries, and also create students that have the capability of facing and solving
practical problems. Because of these reasons, Aksum University has given a great
deal of attention to this program in helping students, starting from searching
companies that are willing to be part of this program up to giving essential documents
and schedules. We first choice internship placement and this is given to our
department office of ECE and they check and sent acceptance. So, we get into the
company by giving internship place request letter for our university to company head
office. Then they observe the request letter and they had given their acceptance letter.
When we come back to their company to begin the internship program, we should
bring the acceptance letter of the company. Then we started our internship program in
a given time in the main data center and ICT development.
We have done network cable crimping for wired access point when the network
technicians install.
The following procedures were taken to perform the task we have taken.
When we configure the color of the wire in both sides using straight through
configuration the crimping cable and color arrangement code should be ordered as the
following in both sides.
1. White -Orange
2. Orange
3. White- Green
4. Blue
5. White-Blue
6. Green
7. White-Brown
8. Brown
During the whole internship we have observed the data center, AKU network
topology, look network cable maintenance, design network infrastructure, switch and
router configuration, VLAN trunk protocol, network installation and architecture.
AKU network topology: AKU used star topology this topology has three layers,
namely core layer, distribution layer, and access layer.
As it is depicted on the following figure logical topology, the overall network fits the
collapsed hierarchical model.
In the core layer, two collapsed core switches are connected through a fiber cable, but
not forming a redundant path. This path is not helpful to sustain activities in case if
failures happen to the network.
The access switches of different number of ports are directly connected with end
devices like pc.
2.9.3 Security: Network security issues include protecting data from unauthorized
access, protecting data from damage and development, and implementing policies and
procedures for recovery from breaches and data losses.
2.11.1 Local Area Network: Local area networks, generally called LANs, are
privately-owned networks within a single building or campus of up to a few
kilometers in size. They are widely used to connect personal computers and
workstations in company offices and factories to share resources (e.g., printers) and
exchange information. LANs are distinguished from other kinds of networks by three
characteristics:
1. Their size,
2. Their transmission technology, and
3. Their topology.
LANs are restricted in size, which means that the worst-case transmission time is
bounded and known in advance. Knowing this bound makes it possible to use
different kinds of designs that would not otherwise be possible. It also simplifies
network management.
Figure6 LAN
2.11.2 Wide Area Network: A wide area network (WAN) provides long-distance
transmission of data, image, audio, and video information over large geographic areas
that may comprise a country, a continent, or even the whole world.
Figure 7WAN
Limits multicast and broadcast flood only to the required segments of the LAN
to save LAN bandwidth
Provides secured LAN access by limiting traffic to specific LAN segments
Eases management by logically grouping ports across multiple switches
A, Power drilling: Power drilling is an electrical motor that rotates a replaceable drill
bit to make a hole in wood, plastic, metal with handling, ON/OFF triggers.
Safety rules:
Figure 11 saw
E. Screw: - is used to build network installation tool to the wall and for tightening
and loosening from the anchored it.
Figure 13screw
F. Rack: - is a tool that used to contain the patch panel and switch and used as
power distribution and shelf. It has a box shape.
Fig14 rack
G. Switch: is a multiport device that broadcasts frames received on one port to
all other ports. All ports are in the same collision domain. Switches are
generally identified as Layer-2 devices, as switches process information stored
in the Data-Link header of a frame (such as MAC addresses in Ethernet).
Figure 15Switch
I. Hub: Hubs are Layer-1 devices that physically connect network devices
together for communication.
Figure 17 Hub
Ethernet Cabling
An Ethernet cable is one of the most popular forms of network cable used on wired
networks. Ethernet cables connect devices on local area networks such as PCs,
routers, and switches. Ethernet cables are physically manufactured in two basic forms
called solid and stranded.
Ethernet networks originally used thick or thin coaxial cable, but most installations
currently use unshielded twisted pair (UTP) cabling. The UTP cable contains eight
conductors, arranged in four twisted pairs, and is terminated with an RJ-45 connector.
Cabling consists of one or more insulated wire pairs encased in a plastic sheath. As its
name implies, UTP does not contain additional shielding for the twisted pairs. As a
result, UTP is both less expensive and less resistant to noise than STP.
Figure 19UTP cable
There are two types of UTP internet cable namely; straight through and cross over.
Straight through: used to connect different devices (switch to pc, switch to router).
Once you've straightened the wires, your next task is to arrange them in the
order they'll be placed into the RJ-45 connector. Working from left to right,
the order of the wires is:
Orange
Blue
Blue with a white stripe
Green
Brown
Cross over: - is used to connect the same device (i.e. switch to switch, pc to pc).
WG G WO B WB O WBR BR
When our LAN connects to the Internet through a router, an opportunity is created for
outsiders to access or disrupt your network. A NAT router provides some protection
because by the very nature of the process, the network behind the router is shielded
from access by outsiders on the internet. However, there are methods by which a
determined hacker can possibly obtain information about your network or at the least
can disrupt your Internet access. A greater degree of protection is provided by a
firewall router.
2.15.1 Security
The world is becoming more interconnected with the advent of the Internet and new
networking technology. There is a large amount of personal, commercial, military,
and government information on networking infrastructures worldwide. Network
security is becoming of great importance because of intellectual property that can be
easily acquired through the internet.
2.15.2 Firewall
A firewall is a network system or group of systems that manages access between two
or more networks. Firewall operations are based on one of three technologies:
Figure 24 firewall
A firewall is a device that protects one network from another while allowing
communication between the two. A firewall incorporates the functions of the NAT
router, while adding features for dealing with a hacker intrusion or attack. Several
known types of intrusion or attack can be recognized when they occur. When an
incident is detected, the firewall can log details of the attempt, and it can optionally
send e-mail to an administrator to report the incident. Using information from the log,
the administrator can take action with the ISP of the hacker. In some type of
instructions, the firewall can fend off(protect) the hacker by discarding all further
packets from the hacker’s IP address from a period of time.
CHAPTER THREE
The internship program has offered us variously vast benefits. In addition to the
practical skills acquired from the program, a theoretical knowledge would be caught
on. Besides, we could manage to improve our qualities in terms of interpersonal
communication. During the period of internship, a team spirit had been developed on
matters that needed teamwork. In this internship program, we have gained essential
leadership qualities. The crucial thing got from the internship is the work ethics.
Last the internship program has enabled us to see solutions through problems, i.e. it
has yielded some of valuable entrepreneurship skills in our life.
The internship program was primarily supposed to make students aware of real
working environments. We had the chance of upgrading our theoretical knowledge as
having a time to read books with plenty of time without bothering about exams or test.
The internship program had acquainted us with some Crucial theories needed for each
task. For instance, we had to understand the switch and router configuration.
The most significant part of the theoretical aspect of the internship is its value in
enhancing the learned concepts, for example some ideas about computer networks
from the course Data communication and now we have grabbed some concepts in
computer networking after the internship. The internship program had also let us clear
up `misunderstood concepts during our school attendances. For example, we realize
now our understanding of some details of the network devices and configuration
concepts before the internship was somehow incorrect.
Our internship experience helped us improve our team-playing qualities as all the
tasks given had required teamwork. As a result, we had got this benefit as back bone
our task.
The followings are the benefits we gained as team playing skill in the internship:
Active participation
Sharing idea openly and willingly
Working as problem solver
Develop friendship and cooperation
Self-confidence
Accountability
Fair assignation of tasks
Effective communication skill
Devotion
Good speaking ability
Ability to listen others
Good leadership of optimal solver to problem
Punctuality
Office discipline
Honesty
Reliability
Cooperation
Accountability
Keeping secret
Transparency
Successful entrepreneurs have to start with these main skills. These are:
Self -motivation
Self- confidence and reliance
Ethics and morals
Time management
Finance
4.4 Objectives
4.4.1 General Objective
Design, upgrade, scalable, configure and implement network system in AKU
and fulfill network infrastructure in a certain areas of the university
The aim of this project is to allow systems and devices to be able to communicate
with each other and should be able to provide desired information, to reduce isolated
users and workgroups, physical systems and devices should be able to maintain and
provide satisfactory performance.
4.8 Methodology
In this section data collection methodology, design methodology and connectivity
testing of configurations will be presented.
Literature review
Computer
Switch
Router
Cloud
cluster
Server
Network Connectivity
When we connect the network, it must meet the link provided to connect the required
device in order to communicate one another.
1. PING Command
The ping command is the basic command used to check for connectivity between
devices. It can be done on switches, routers or computers. In routers and switches the
command is applied in the privilege mode while on pcs it takes place in the command
prompt interface. The main requirement of a network is for data to travel at the
shortest
5.1 Conclusion
This internship was good for us because we covered many different fields. We also
learnt new concepts and new ways of working.
In this project we have seen wired or guided local area network which interconnects a
variety of communicating devices (laptop, desktop, printer) within small geographic
area and the installed, designed, configured and implemented project was with three
layers: core, distribution and access layers.
The distribution layer prevents the change that take place in the access layer from
affecting the core layer or to insulate the core from the changes that occur in access
layer by allowing the core layer to be more stable and efficient.
The access layer provides services for the end users or subscribers (these may be
private, public, guest, staff users)
We got practical work experiences and benefits at main data center of the AKU
Company. Some of the benefits of the internship offered to us include;
Upgrade our theoretical knowledge at the main compass.
Networking design by using CPT
Allow us to both make and develop professional contacts, for our future
job search.
Assist us in developing greater understanding of our computer network
distribution system.
The company’s Work flow
Leadership skill
5.2 Recommendations
The recommendation is a precise idea, comment, criticize, for the positive side to
keep as it was, for the negative side to evaluate as new its drawbacks.
During our internship stay in the site, we were able to see the main data center of the
AKU compass such as networking installation, design and security. The Data Center
is the hub of the University’s computing resources, which are shared by the academic,
research, and administrative communities. These facilities provide a secure,
enterprise-wide, reliable, and redundant infrastructure for the delivery of mission-
critical University systems.
The UIIL should have good relationship with more private sectors rather than
government controlling sectors
It should have seminars and workshops for enterprising
Proper labeling cables should take place so that one can understand easily
It is better, data should be transmitted by over had transmission line rather
than underground to prevent interruption and fiber breaking up with road
construction
The company should not be accepted for the internship students if the is no
willing and able to guide properly.
REFERENCES
[1]. John SherwoodSALSA: A Method for Developing the Enterprise Security
Architecture and Strategy, 18 Braemore Road, Hove, East Sussex, BN3 4HB, UK
[3] Todd Lammel, CCNA Cisco Certified Network Associate Study Guide 6Th
edition, Wiley publishing, Inc.2007.
[4] Campus Network for High Availability Design Guide, Cisco Systems, Inc.,
2008.http://www.cisco.com/en/US/docs/solutions/Enterprise/Campus/HA_recovery_
DG/campusRecovery.html
APPENDIX
Weekly Internship Activity
First week
Literature study area, design, and network infrastructure
Discussion about culture of AKU with the project leader
Second week
Discussion about the objectives, method and analysis of AKU ICT
Literature study of networking
Third week
Working of Networking of the study area
Fourth week
Literature study of previous year
Fifth week
Preparation field work
Understanding the strength and weakness of ICT
Sixth week
Field work AKU ICT campus
Coming to ideal solution of the problem
Analyzing the solution
Starting of the solution
Seventh week
Field work old register
On progress the solution
Eighth week
Field work cabling CNR building
Ninth week
Organizing the document
Writing the internship
Tenth week
Studying and revising the internship