Report Today PDF
Report Today PDF
Report Today PDF
ON
BY
NESREDIN
ID: RAMIT/1782/08
NESREDIN HAMZA
+251942817925 [email protected]
Executive Summary
This internship is a part of the curriculum requirement for one semester, exactly about 4 months,
from October 17, 2019, up to February 03-, 2020 G.C. It generally describes the whole tasks I
have been handling, the experience and benefits I have been gaining, the challenges I have been
facing, and measures I have been taking to overcome them through the internship period at AMU
ICT center
I had discussed the Network Installation system, Video Conferencing configuration, and
Maintenances which I observed and practiced during my internship program.
Generally, it is the overall views of my roles in the company and state recommendations
concerning the program so as to enable the University to correct the problem and to create a
conformable situation for the next generation.
For a better understanding of the report, the report has been divided into five Chapters. Chapter
one is an introduction to the overall view of the hosting company (AMU ICT center). Chapter
two is dealing with the works, responsibilities, and assignments. I have been undertaking the
internship programs. Chapter three discussed the Technical aspects of the internship program.
Finally, in Chapter four, about how to design an enterprise network within logical packet tracer
simulation and chapter five, general comments and conclusion and Recommendation of the
previous Chapters are revealed.
Contents
Executive Summary .....................................................................................................................i
LIST OF FINGERS.................................................................................................................... iv
LIST OF TABLES ...................................................................................................................... v
CHAPTER ONE ......................................................................................................................... 1
1.1 Introduction ....................................................................................................................... 1
1.2 Historical Background of the Company ............................................................................. 1
1.2.1 Brief history of the company ....................................................................................... 1
1.2.2 The main products or services of the AMU ICTC ........................................................ 2
1.2.3 Staff Profile of AMU-ICTC ........................................................................................ 3
1.2.4 Organizational Chart of the Company ......................................................................... 4
i
CHAPTER TWO ........................................................................................................................ 5
2. 1 work, responsibilities and assignments .............................................................................. 5
2.2 Main Campus New finance building Network Cabling System Installation ........................ 5
2.1.0 Network cabling systems installation........................................................................... 5
2.1.1 Precondition of NCS Installation ................................................................................. 5
3. Networking Hardware ........................................................................................................ 8
4. Intranet .............................................................................................................................. 10
5. Internet .............................................................................................................................. 10
6. Main Campus Network maintenance.................................................................................. 10
CHAPTER THREE ................................................................................................................... 11
3.1 technical aspect of the internship ..................................................................................... 11
3.1.2 Objectives ................................................................................................................ 11
3.2 Statement of the problem ................................................................................................. 11
3.3 Methods and Procedures .................................................................................................. 11
3.3.1 Methods .................................................................................................................... 11
3.3.2 Procedures ................................................................................................................ 12
3.4 Technical tasks/products ..............................................................................................
15
3.5 Knowledge and Acquaintances
Acquired ..................................................................... 16 CHAPTER
FOUR ................................................................................................................. 18
4.1 Project Scope and Network requirements ......................................................................... 18
4.2 Network Design strategy ............................................................................................ 18
4.2.1 Developing security design strategy .......................................................................... 18
4.3 Hardware quantity analysis (Main and branch locations) .................................................. 20
4.4 TCP/IP Subnet Design ..................................................................................................... 20
4.5 TCP/IP Design and Table for Main and Branch Locations (LAN, WAN) ......................... 21
4.6 Topology diagram with IP addressing. ............................................................................. 22
4.7 Expected budget .............................................................................................................. 24
CHAPTER FIVE ...................................................................................................................... 25
4.1 Summary ..................................................................................................................... 25
4.2 Conclusion .................................................................................................................. 25
4.4 Recommendation ......................................................................................................... 26
ii
References ................................................................................................................................ 27
Appendixes ............................................................................................................................... 28
Appendix A approval sheet.................................................................................................... 28
Appendix B: sample internship work photos .......................................................................... 29
LIST OF FINGERS
iii
LIST OF TABLES
iv
v
CHAPTER ONE
1.1 Introduction
An internship program is known by giving students the opportunity to apply their
knowledge in real-world environments. At the same time, we students will also develop
skills that will help us to perform better at the real world jobs, so based on its aim I have
conducted my intern program. Therefore this report describes my experiences as a
fifthyear Arba Minch University Intern student at the company called the Arba Minch
university Information and Communication Technology Center (AMU – ICTC), which is
located in the southern Ethiopia Gamo Zone of the Southern Nations, Nationalities, and
Peoples Region about 500 kilometers south of Addis Ababa and is the largest town in
Gamo Zone called Arba minch.
The internship is part of the curriculum requirement for one semester means that for 4
months, from October 13, 2006, to February 30, 2006. It generally describes the whole
tasks I did in the intern program, the experience and practice work benefits I got, the
challenges faced and measures are taken to solve it.
Currently, information and communication technology is important to develop national
with national as well as a country with country and continent with continent come to the
same information shared with at the same time in the world.
It has AMU-ICT center Staff Profile, but now they accept more fresh workers. This is the
old profile of ICT. They listed in the table below their own job types.
1 ICT-director 1
2 ICT-consultancy 2
3 System admin. service professional 3
4 Assistant system Engineering 2
5 Database admin/developer 2
6 Network and network security Engineer 2
7 Network and network security professional 2
8 Senior Network technician 4
9 Assistant network develop professional 2
10 E-learning administer trainer 2
3
11 Customer supply manager 1
12 Help desk staff main campus 4
13 Senior maintenance technician 2
14 Maintenance technician of PCs 6
15 Maintenance technician of printers and copies 4
16 Classroom technician 4
4
CHAPTER TWO
A network consists of two or more computers that are linked in order to share resources,
exchange files, or allow electronic communications. The computers on a network may be
linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
Two very common types of networks include:
5
A Local Area Network (LAN) is a high-speed data network that covers a relatively mall
geographic area. It typically connects workstations, personal computers, printers, servers,
and other devices. LANs offer computer users many advantages, including shared access
to devices and applications, file exchange between connected users, and communication
between users via electronic mail and other applications Wide Area Network
Wide Area Networks (WANs) connect networks in larger geographic areas, such as the
United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be
used to connect this type of global network.
Protocol
A protocol is a set of rules that governs the communications between computers on a
network. In order for two computers to talk to each other, they must be speaking the same
language. Many different types of network protocols and standards are required to ensure
that your computer can communicate with another computer located on the next desk or
half-way around the world. The OSI (Open Systems Interconnection) Reference Model
defines some of the networking protocols. However, can be simplified into the following
forms with their identify some of the common protocols.
Table 2 protocols
6
OSI Layer Name Common Protocols
7 Application
6 Presentation HTTP / FTP /SMTP /DNS
5 Session
4 Transport TCP | SPX
3 Network IP | IPX
2 Data Link Ethernet
1 Physical
OSI model related to common network protocols
Table 1 illustrates how some of the major protocols would correlate to the OSI model in
order to communicate via the Internet. In this model, there are four layers, including:
Ethernet (Physical/Data Link Layers)
IP/IPX (Network Layer)
TCP/SPX (Transport Layer)
HTTP, FTP, Telnet, SMTP, and DNS(combined Session/Presentation/Application Layers)
The Internet has revolutionized many aspects of our daily lives. It has affected the way
we do business as well as the way we spend our leisure time. The Internet is a
7
communication system that has brought a wealth of information to our fingertips and
organized it for our use.
DNS - Domain Name System - translates network address (such as IP addresses) into terms
understood by humans (such as Domain Names)
FTP - File Transfer Protocol - a protocol that is used to transfer and manipulate files on
the Internet.
HTTP – Hypertext Transfer Protocol - An Internet-based protocol for sending and
receiving Webpages.
SMTP - Simple Mail Transfer Protocol - A protocol for e-mail messages on the Intern
3. Networking Hardware
Networking hardware includes all computers, peripherals, interface cards and other
equipment needed to perform data-processing and communications within the network.
a. Firewalls
A firewall is a system or group of systems that enforces an access control policy between
two networks. The actual means by which this is accomplished varies widely, but in
principle, the firewall can be thought of as a pair of mechanisms: one which exists to
block traffic, and the other which exists to permit traffic. Some firewalls place a greater
emphasis on blocking traffic, while others emphasize permitting traffic. The firewall uses
rules to filter traffic into and out of the private network, to protect the private network
users and data from malevolent hackers.
b. Workstations
Computers that humans use are broadly categorized as workstations. A typical
Workstation is a computer that is configured with a network interface card, networking
software, and the appropriate cables. c. Switches
A Switch is a network device that typically operates at the Data Link layer (Layer 2) of
the OSI model. A switch performs the its job by examining the Data Link Layer (Layer
2) data packet and forwarding the packet to other devices based on Layer 2 addresses
(MAC Addresses). Switches function of using Data Link Layer (Layer 2) addressing
system, also known as MAC addresses.
4. Intranet
With the advancements made in browser-based software for the Internet, many private
organizations are implementing intranets. An intranet is a private network utilizing
Internet-type tools, but available only within that organization. For large organizations,
an intranet provides an easy access mode to corporate information for employees.
9
5. Internet
The Internet is a system of linked networks that are worldwide in scope and facilitate data
communication services such as remote login, file transfer, electronic mail, the World
Wide Web and newsgroups. With the meteoric rise in demand for connectivity, the
Internet has become a communications highway for millions of users. The Internet was
initially restricted to military and academic institutions, but now it is a full-fledged
conduit for any and all forms of information and commerce. Internet websites now
provide personal, educational, political and economic resources to every corner of the
planet.
6. Main Campus Network maintenance
Network maintenance is to keep the network available within service and at acceptable
performance network connection levels. Network Maintenance is also resolving and
repair network problems, Identify the problem, find ways to isolate the cause and to
correct the problem and finally, prevent it from any hurt or damage. There are two types
of network cable maintenance: preventative maintenance and post-fault maintenance.
10
CHAPTER THREE
3.1.2 Objectives
To boost the working capability of the employers of the A Information and Communication
Technology (ICT) Agency by;
3.3.1 Methods
As we all know, there are two sources of data; primary and secondary data sources. Therefore, I was
using these methods of data collection.
11
2 Observations: I collected so much information by using this method of data collection. To
understand the confidentiality willingness share of knowledge and work ethics of the workers I
have not asked any question rather than observing the fact. This method helped me to judge and
draw the best conclusion about the facts.
External source- Different websites related to the company and online resources.
3.3.2 Procedures
Tester
Stripper
J-45
Strip the cable 1/2 in. down from the end using cable strippers.
Carefully trim off ripcord.
12
Step 2
Step 3
Untwist each pair of wires down to the sheathing. If you’re working with CAT-6 wire, cut
the center core down to the cable end.
Layout the side of the wire by side in this order: white-orange; orange; white-green; blue;
white-blue; green; white-brown; brown.
13
Step 4
Trim all the wires to the same length, 1/2-3/4 in. from the sheath.
Step 5
Insert the wires in the order specified in Step Two above into the RJ-45 plug. The cable
sheath should extend into the plug by about 1/2 in. and will be held in place by the crimp.
Step 5’
Step 6
14
Crimp the terminal with the appropriate crimping tool.
Step 7
Make sure the wires are in the right order, extend to the front of the plug and make good contact
with the metal contacts in the RJ-45 plug.
Repeat project steps one through four to attach a connector on the other end of the cable.
I have gained knowledge about how organizational structure looks like and how to behave in a
company.
15
I have learned about working processes and principles in industries.
I had improved my technical and personal skills that I had learned theoretically, after becoming
familiar with new techniques and methods.
I sometimes exercised individual responsibility and develop strong teamwork skills with the
employees.
Develop knowledge on how we fix the problem to and different books related to our
As successful entrepreneurship, I have to work closely with people. This is critical to be able
to build a great relationship with the team, customers, suppliers, some holders and more.
From this field practice I had grasped the following type of interpersonal skills:
Improving my interpersonal communications with others who are strangers both my friends and co-
workers of the hosting company, Arbaminch -ICT agency. I have met different groups at the
company beginning from the guards up to higher officials & managers so that I can face various
personalities. Finally, I have learned how to adapt to the different cultures and be able to value
differences regardless of age, position or whatever category.
Politeness in order to live with peaceful Co-existence and to implement fruitful work.
Ethics.
Knowledge.
CHAPTER FOUR
In most countries around the world, there are many enterprises that represent the main
gates for entrance and exit. Because of the importance of these places, each country
takes many necessary measures to provide them with the best technology. Enterprises
are the most sensitive places around the world because they represent these gates.
Technology plays many different roles to protect and represent a high quality of
services for these places. Computer networking is the most crucial part of modern
airports because this new technology takes the most important responsibilities, rather
than people doing the tasks as in previous decades.
1) Firewalls
Firewalls are the first step toward a high-security level and a primary
mechanism for the design presented here. These devices are a well-known security
system for any computer network. They are used for controlling the packets and data
that create a zone inside and outside the network. The firewall allows for a higher
degree of trust for the system behind it, as externs hosts generally excluded. In
standard configuration, firewalls will trust the inside activity, and the configuration of
the device will give a low level of security because of the trusted people inside the
organization. Otherwise, the outside activity like internet connections or the
connections that establish out the local network will be untested. Therefore, the
network administrates team responsible for managing the network inside an
organization will give a high level of security for the outside connections inside,
18
some of these levels reach 100% of security. For that reason, these firewalls filtered
packets from hosts the outside and deny any untrusted connection depending on
created rules. Exchanging the information inside and outside the network. The local
network has been configured to limit the access from outside, this task has been
assigned to the by the proxy server which has already been installed for the Airport
network. The ruleset of the project’s firewalls follows a design structure that reflects
security for each position [5].
2. The second firewall was placed in the Flight Management Database Server
as shown in figure 1.
3. This firewall was attached to one of the flight management switch ports.
As a result of this design, the security level for all network and specifically in the
Flight Management Department was increased dramatically because of the security
policy which installed for each firewall the first result of the design was filtering the
transmitted data through the internet. Each device inside the airport’s network can be
accessed through any website from the Internet because the outside security level was
set up with zero security level. Otherwise, the inside network set up with a high-
security level to prevent the outside activities from entering the local network. As a
final result, this will protect the inside network from any hackers and untrusted
connections as shown in figure management strategy [6].
19
Figure 6 IP calculator
4.5 TCP/IP Design and Table for Main and Branch Locations (LAN, WAN)
The TCP and IP design seems like to the following screenshot of cisco packet tracer
20
Figure7FigureTCP/InDesign
21
4.6 Topology diagram with IP addressing.
The network is connected to the internet with a Firewall and the servers are in a DMZ
(Demilitarized Zone). In this way, the outside world can access the servers but cannot
access the internal network and Wireless Access Points are also used for accommodating
employees’ smartphones/laptops.
Devices to be used
951 routers for Internet Connectivity.
23
The same mistake was made for access points, however, since APs are not available in
NETSIM, no problem
Table 3 budget
24
CHAPTER FIVE
Summary and conclusions
4.1 Summary
This report is about to explain what we did and learned during our internship period with
AMMA ICTC, Network maintenance in AMMA Network cable installation. As the main
purpose of the internship is to learn by working in a practical environment and to apply
the knowledge acquired during the studies in a real-world scenario in order to solve the
problems using the knowledge and skill learned during the academic process. We have
discussed the AMMA network, which WE observed and perceived during my internship
program. This report is divided into four sections. Section one will discuss the
background of AMMA. In section two the work tasks during the internship programs.
Section three the technical aspects of the internship program. Conclusion of the previous
sections which about AMMA-ICT, network maintenance in AMMA network cable
installation. The most important in an internship program is that the student should spend
their time in a true manner and with the spirit to learn practical orientation of theoretical
study framework. This report is about our internship that we have undergone at AMMA
ICT from Jun 3, 2009, to August 30-, 2009. During my internship, we are able to learn
the practical aspect of the network and get good working experience.
4.2 Conclusion
After going through the whole period of internship as an intern we have observed so
many professional activities and learned as well. This internship was very fruitful to us
because we had to cover many different fields. We also learned new concepts and new
ways of working. During this internship period, we acquired practical experience to
complement the theoretical content of our study for AMMA, Network cable installation,
network cable maintenance and wireless local area network (WLAN) and installation. To
conclude, we think that this internship was very beneficial to us as we learned a lot, and it
made us discover work's in a real-world
25
4.4 Recommendation
The company workers are committed to their work and they are sociable, so I recommend them to
continue on it. A session is for four-month, the weather condition of AMU is hot, as a result, it is
difficult to construct wired network configuration and also difficult to arrive on time. Especially it
was difficult in the afternoon So I recommend to Arba mich university engineering faculty and
technology department of electrical and computing, the field practice should be applied in another
different course. The duration of time in filed practice was enough as much as possible we
recommend that filed practice should be extended from four-month to five and above a month in
order to get better knowledge. The network bandwidth of the AMU ICT center is very weak. As a
result, I recommend the AMU ICT center to use a better bandwidth. As I have seen the server
room of the ICT center the server was placed at the ground, so it is easy to attract by natural
disaster and the human factor. So we recommend that it should be placed above one flower of the
building and far from a human being.
26
References
[3 K. A. S. Madhu Sharma, "Analyzing the Data Center Efficiency by using PUE to make Data
] Centers More Energy Efficient by Reducing the Electrical Consumption and Exploring New
Strategies," Procedia Computer Science, vol. 48, no. c, pp. 14-148, 2015.
[4 [Online]. Available:
] https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Campus/campover.html#wp7088
86.
[6 ]. home.html.
]
27
Appendixes
Approval Letter
___________________
Appendix B: sample internship work photos