Networking Internship
Networking Internship
Tribhuvan University
Faculty of Humanities and Social Sciences
An Internship REPORT
Submitted to
Department of BCA
DOTI MULTIPLE CAMPUS
Submitted by
Name: Rahul Saud
BCA 7th sem
1
lOMoARcPSD|39611779
Tribhuvan University
Faculty of Humanities and Social Sciences
Supervisor’s Recommendation
I hereby recommend that this project prepared under my supervision by RAHUL SAUD entitled
“Internship on networking” in partial fulfillment of the requirements for the degree of Bachelor of Computer
Application is recommended for the final evaluation.
SIGNATURE
Name:-
SUPERVISOR
Academic Designation Teacher
Department BCA
DOTI MULTIPLE CAMPUS SILGADHI DOTI .
2
lOMoARcPSD|39611779
Tribhuvan University
Faculty of Humanities and Social Sciences
Letter of Approval
This is to certify that the project prepared by Mr. Rahul Saud entitled "Internsip on Networking at Purwichauki Rural
Muncipality" in partial fulfillment of the requirement for the degree if Bachelor in Computer Application has seen well
studied. In our opinion it is satisfactory for the required degree.
…………………….. ……………………………..
project supervisor coordinator
…………………………...
internship Mentor …………………………...
Extrnal Examiner
Mr. Ganesh Bishworkma (Lecturer, FOHSS, TU )
It officer
Purwichauki Rural Muncipality
3
ACKNOWLEDGMENT
First of all, I would like to express my gratitude to………………………, Mr. …………….. who took
confidence in me and provided me with the opportunity to work as an Intern at Purwichauki rural
municipality. I am so thankful to the team and the guidance and I had a amazing experience being the part
of the team.
Successfully completion of any type of project requires help from a number of persons. I have also taken
help from different people for the preparation of this report. Now there is a little effort to show my deep
gratitude to those helpful personnel.
I convey my sincere gratitude to my Academic supervisor Lalit Panta sir, without his kind direction and
proper guidance this study would have been a little success. In every phase of the project his supervision
and guidance shaped this report to complete perfection.
I express my gratitude to Ganesh Bishkorwma for the complete guidance and mentor ship of the project.
Finally I would like to thank each and every one of my colleagues and the Happy Hues Production
family, who always encouraged and support me throughout the project.
Thanking,
Rahul Saud
TABLE OF CONTENT
DECELARATION I
EXECUTIVE SUMMARY II
LIST OF ACRONYMS IV
CHAPTER ONE 1
1.CHAPTER 1: INTRODUCTION 1
1.3 Duration 3
1 . 4 . Problem Statement 4
1.5 Objective 4
Materials used 7
Router: - 9
Servers: 10
Software applications 11
VISIO SOFTWARE 11
CHAPTER THREE 12
General objective 13
Specific Objectives 13
Literature Review 14
Project Requirements 20
a) Software Requirement 20
b) Hardware Requirement 21
Network Design 21
Configuration 23
Verification 25
CHAPTER FOUR 26
a. Practical Skills 26
b. Upgrading Theoretical Knowledge 27
d. Time management: 27
f. Leadership Skills 28
CHAPTER FIVE 32
Conclusion 32
Recommendation 32
References 33
APPENDICES 34
SWITCH CONFIGURATION 34
List of Acronyms
CITA.........................................communication and information technology agency
RJ45…...............................................................................................registered jack 45
PC...................................................................................................personal computer
1. Introduction
1.1Introduction to Networking
Computer networking refers to interconnected computing devices that can exchange data and share resources
with each other. These networked devices use a system of rules, called communications protocols, to transmit
information over physical or wireless technologies.
How does a computer network work?
Nodes and links are the basic building blocks in computer networking. A network node may be data
communication equipment (DCE) such as a modem, hub or, switch, or data terminal equipment (DTE) such
as two or more computers and printers. A link refers to the transmission media connecting two nodes. Links
may be physical, like cable wires or optical fibers, or free space used by wireless networks.
In a working computer network, nodes follow a set of rules or protocols that define how to send and receive
electronic data via the links. The computer network architecture defines the design of these physical and
logical components. It provides the specifications for the network’s physical components, functional
organization, protocols, and procedures.
1.3 Duration
We have chosen the municipality because it is this rural municipality like networking requires a
robust connectivity infrastructure including roads, bridges and telecommunication networked to
connect its scattered village, and communicates. Just as networking relives on communication
system to enable data exchange. It needs reliable communication channels such as mobile
networks, internet connectivity and postal services to facilitate communication and information
sharing infrastructure like cell tower, satellite communication system and community
information centers act as network devices, enabling the flow of information and services to
remote area.
During our stay in the municipality, we have chosen networking from the various sectors offered
to us as an alternative, and the reason is Because of our eagerness to put into practice the
network technology we have seen at the theory level because it is one of the sections of the
organization that provides adequate functional training in the organization.
The networking unit of the organization divides the work into several stages. These operations
are arranged in stages as follows they receive internet service from a service provider and
manage using different switches. Deploy the managed network to the various offices of the
office as needed. These include monitoring the network and repairing it in the event of a
malfunction, as well as setting up a data center and providing and receiving information to the
recipient in a timely manner.
MATERIALS AND METHODOLOGY USED
Methodology
For the achievement of our internship we used different approach as the hardness of the project.
Accordingly, the following procedure was used to overcome our difficulty and lastly, we
achieved our project in a good and best manner. Some methods are as listed as follow:
➢ Measurement
a) Observation
This is the first thing to start our project by surveying the overall design of the agency which we
aimed to do project or to upgrade current existing LAN design in to new design which solves the
problems listed in the statement of problem of the project. And we physically vested around the
agencies site or bureaus and collect some information to do our next task.
Freehand sketch
The next step before going to design on Visio software in this step we draw the design of agency
on the paper.
b) Measurement
In this step we measured each and every room lengths in addition to cable length from server
room to each access switch. Then from access switch to nodes or end users.
c) Counting
Counting is method which we used to count number of nodes in each room which are functional
and non-functional and number of users how many user is there to solve problem of network
availability of the personals. Then finally we put theProposed Network materials and in the
following table
1 Router 1
2 Core switch 2
3 Access switch 8
4 Cable 33732.97
5 Server 3
6 RJ-45 572
7 Patch panel 9
8 Access point 1
9 Trunk(40x25)
10 Rack 6U 7
11 Rack 42U 1
12 Trunk 60x40
13 Wall out let 143
14 Fisher 499
Drawing on Visio software
After finishing collecting all the information about the site we go to do drawing by using visio
software.
MATERIALS USED
used are:
➢ Drilling machine
➢ Fishery
➢ Screw
➢ RJ 45
➢ Cutter
➢ Crimper
➢ meter
Figure 2.1 materialsused
TOOLS USED
➢ Printing paper
➢ Laptop or computer for document preparation and design drawing
➢ Measurement meter for sketch designing of proposed network installation project
➢ Pen and pencil
➢ Flash memory for remote data storage
SWITCH: -
is a networking device that records the IP and MAC addresses in a table of all the devices
connected to it. Thus, when a packet is put onto the wire by one device, the switch reads the
destination address information to determine if the destination device is connected to it. If it is,
the switch forwards the packet only to the destination device, sparing the other devices
connected to it from having to read and deal with the traffic. If the switch does not recognize the
destination device, then the switch sends the packet to everything connected to it, thereby
requiring the devices to decide for themselves whether or not packet is for them.
Figure: switch
Properties of switch:
A switch has multiple ports when compared to bridge. It can perform error checking before forwarding
data. Switches are very efficient by forwarding good/error free packets selectively to correct devices
only. Switches can support both layer 2 (based on MAC Address) and layer 3 (Based on IP address)
depending on the type of switch.
Router: -
Is a networking device, commonly specialized hardware that forwards data packets between
computer networks .This creates an overlay internetwork, as a router is connected to two or more
data lines from different networks. When a data packet comes in one of the lines, the router reads
the address information in the packet to determine its ultimate destination. Then, using
information in its routing table or routing policy, it directs the packet to the next network on its
journey. Routers perform the traffic directing functions on the Internet. A data packet is typically
forwarded from one router to another through the networks that constitute the internetwork until
it reaches its destination node.
Properties of router
A router, like a switch forwards packets based on address. It uses the IP address to forward
packets. This allows the network to go across different protocols.
Routers forward packets based on software while a switch (Layer 3 for example) forwards using
hardware called ASIC (Application Specific Integrated Circuits)
Routers support different WAN technologies but switches do not. The most common home use
for routers is to share a broadband internet connection. The router has a public IP address and
that address is shared with the network. When data comes through the router it is forwarded to
the correct computer.
Registered jack-45 (RJ45)
In wired networks, the most common form of cable connector is the RJ45. Every computer with
networking capabilities has an RJ45 port. This is sometimes called a "network port" or an
"Ethernet port." connects the Unshielded Twisted Pair (UTP)or the Shielded Twisted Pair(STP)
cable. Registered jack-45 (RJ45) refers to a cable termination specification that specifies
physical male and female connectors and the pin assignments of wires-in telephone cables and
other networks that use RJ45 connections.RJ45 (telecommunications) a connector used for
modem connection
Figure 2.4 Rj 45
Server:
Servers manage the shared resources on the LAN. The server combines hardware and software to
offer (or serve) network resources. The server hardware may be an ordinary PC or a high-
performance unit designed specifically to be a server. The software running on the server will vary
with the type of server. (It is possible for a LAN to have many different types of servers, each
providing for different types of services.) LAN servers often resemble host machines (mainframes or
minicomputers) conceptually and diagrammatically. There is one fundamental difference between the
two: In a host based system, all processing takes places in the central host machine. Processing is
centralized—terminals are totally dependent on the host device for all processing functions.
A LAN server resembles a host machine in that it also provides shared functions. In the LAN
environment, processing is distributed among all of the intelligent devices—servers, stations and
peripherals. All LANs typically have at least one type of server — print server File Server. The
role of the fileserver is to provide and manage a shared storage area on the network. Although
each computer on the LAN could create and control its own files and then make those files
available to others, it is preferable to provide a centralized storage and management facility.
Using a file server ensures shared files will be available to users when needed. File management
allows multiple users access to files. The file server controls simultaneous access to files,
enforces access rights and restrictions, and provides a directory structure that recognizes file
names and supports the grouping of files. While the primary function of a file server is to
manage the shared storage device(s), it also perform
.
SOFTWARE APPLICATIONS
This software helps us to develop design of LAN network on computer like we have done it on
paper.it safe software to do network installation because there is on lack of materials for
installation like physical installation.
Some of the challenges we have faced while performing our work tasks are:-
➢ Since the internship is during covid-19 pandemic our activities are limited and we cannot
To make our internship time suitable and smart we have tried to find a solution for the above
mentioned challenges. As one of the goals of internship program is to make students solution
maker about problems that exist around different company we have taken the following
measures
Summary:
This project is aimed improve and upgrade the existing network infrastructure of the company in
order to provide fast and efficient service for the company workers, customers and government
officials by replacing and adding some equipment Typically, a LAN encompasses computers and
peripherals connected to a server within a small geographic area such as an office building,
home, school that is restricted to smaller physical areas
Network design and installation is concerned on how can interconnect the computers in
organization, how to enable the communication between the device and how to share the
resource between them.
➢ Resources are not wisely used, e.g. access switch, core switch, servers,Rj45
➢ A network that is too complex or difficult to maintain cannot function effectively and efficiently.
➢ By considering the problem listed above and using all technical knowledge’s of networking to
solve all the existing problems
General objective
To design and implement upgraded, scalable and valuable LAN network services and high speed
Internet connection for the company.
Finally having knowledge of networking and experiences implementing to design efficient and
Effective network depending on available resource and have best network in term of coast,
Specific Objectives:
Specific objectives of this project are:
➢ To Design the scalable LAN network For the increasing number of user
➢ To improve the network's fault tolerance, security, and high speed connection.
➢ To design a LAN network in terms of topology, type of cabling and related coast.
➢ To design fastest network depending on the increasing number of user and devices.
➢ To increase the efficiency of the worker as well as the overall productivity of the
company by making resources and services available to users easily whenever needed.
LITERATURE REVIEW
The project requirements and detail stakeholders needs to develop formal solutions and
document all SNNPR ICT agency goals. This research and discussion that help the project
process go smoothly and ensure that we have all the requirements, needs and “wish list” items
identified[1]
We believe the design process is a collaboration that fuses our creative strengths with
your In-depth understanding to produce the project that exceeds expectation [3]
NO 7 2 3 1 1
The Proposed network resources with qualitative explanation
Table 3.2 Proposed Network Infrastructures with qualitative e Explanation
And I add additional two core switch placed in the incubation server room to make each access
switch independent, finally I install a wireless access point.
The proposed network is differing from the existing one by so many aspects listed below:
➢ The first and the main thing is each access switch is independent
A logical design is virtual design involves arranging data into a series of logical relationships.
Hierarchal network involves three division of layer. These are access layer,
Distribution layer and layer. Fig below explains the existing and proposed logical design
The network we propose is surely Scalable or capable of a system, network, or process to handle
a growing amount of work, or its potential to be enlarged to accommodate that growth on the
incubation center.
lOMoARcPSD|39611779
Network security
Network security is any activity designed to protect the usability and integrity of your network
and data. It includes both hardware and software technologies. Effective network security
manages access to the network. It targets a variety of threats and stops them from entering or
spreading on your network. The network on the incubation center is total dependent on the server
room which is on the agency building. There is no firewall a device in network security system
that monitors and controls incoming and outgoing network traffic based on predetermined
security rules. For this reason network is not secure. In addition to this the company needs to
implement some additional network securities like:
➢ Application security
➢ Website security
➢ Wireless security
B. Video conferencing
A video conference is a live, visual connection between two or more people residing in separate
locations for the purpose of communication. At its simplest, video conferencing provides
transmission of static images and text between two locations.
We proposed Video conferencing because of the following advantages: Higher productivity and
efficiency by eliminating time and space barriers, video conference can be conducted to
communicate with colleagues, customers and partners anytime, anywhere.
C. Network security
There is no UPS (Uninterruptible Power Supply) on the existing network a device that provides
battery backup when the electrical power fails or drops to an unacceptable voltage level. We
recommend ups for each for switches which are now on the incubation center
The core layer is literally the core of the network. At the top of the hierarchy, the core layer is
responsible for transporting large amounts of traffic both reliably and quickly. The only purpose
lOMoARcPSD|39611779
of the network’s core layer is to switch traffic as fast as possible. The traffic transported across
the core is common to a majority of users. However, remember that user data is processed at the
distribution layer, which forwards the requests to the core if needed. If there is a failure in the
core, every single user can be affected. Therefore, fault tolerance at this layer is an issue. The
core is likely to see large volumes of traffic, so speed and latency are driving concerns here.
Let’s start with some things we don’t want to do:
➢ Don’t do anything to slow down traffic. This includes using access lists, routing between Virtual
local area networks (VLANs) and implementing packet filtering.
➢ Avoid expanding the core (i.e., adding routers) when the internetwork grows.
➢ Becomes an issue in the core, give preference to upgrades over expansion. Now, there are a few
things that I want to do as I design the core:
➢ Design with speed in mind. The core should have very little latency.
➢ Fast and redundant data-link connectivity is no help if your routing tables are shot!
The distribution layer is sometimes referred to as the workgroup layer and is the communication
point between the access layer and the core. The primary functions of the distribution layer are to
provide routing, filtering, and WAN access and to determine how packets can access the core, if
needed. The distribution layer must determine the fastest way that network service requests are
handled for example, how a file request is forwarded to a server. After the distribution layer
determines the best path, it forwards the request to the core layer if necessary. The core layer
then quickly transports the request to the correct service. The distribution layer is the place to
implement policies for the network. Here you can exercise considerable flexibility in defining
network operation. There are several actions that generally should be done at the distribution
layer:
lOMoARcPSD|39611779
➢ Routing
➢ Implementing security and network policies, including address translation and firewalls
The access layer controls user and workgroup access to internetwork resources. The access layer
is sometimes referred to as the desktop layer. The network resources most users need The
following are some of the functions to be included at the access layer: will be available locally.
The distribution layer handles any traffic for remote services.
PROJECT REQUIREMENTS
4. Identify configuration required on cisco switches create VLANs and inter VLANs routing
5. Identify configuration required on windows 2008 DHCP server to provide dynamic IP address to
users belonging to respective VLANs from the specific network address range.
6. Identify configuration required on the Cisco switches for DHCP specific design.
7. The users in all the departments should be able to access each other receiving appropriate IP
addresses from DHCP server.
lOMoARcPSD|39611779
Software Requirement
Cisco Packet Tracer is multi-tasking network simulation software that can be used to perform
and analyze various network activities such as implementation of different topologies, selection
of optimum path based on various routing algorithms, creation of appropriate servers, sub
netting, and analysis of various network configuration and troubleshooting commands. In order
to start communication between end user devices and to design a network, we need to select
appropriate networking devices like routers, switches, and hubs and make physical connection
by connecting cables to serial and fast Ethernet ports from the component list of packet tracer.
Networking devices are costly so it is better to perform first on packet tracer to understand the
concept and behavior of the network.
Hardware Requirement
➢ Access Switch
➢ UTP CAT6A
➢ Computer
➢ DHCP server
Network Design
For interconnectivity of components, network topology describe the physical and logical
appearance and interconnection between arrangement of computers, cables and other
components in a data communication network and how it can be used for taking a packet from
one device and sending it through the network to another device on a different network. A
network topology is the physical layout of computers, cables, and other components on a
network. There are a number of different network topologies, and a network may be built using
multiple topologies.
lOMoARcPSD|39611779
The Star Topology is a network topology in which all the clients or machines on the network are
connected through a central device known as switch. Each workstation has a cable that goes from
the network card to the hub or switch device. One of the major benefits of the star topology is
that a break in the cable causes only the workstation that is connected to the cable to go down,
not the entire network as it is with the bus topology The reason why this topology is preferred;-
Vlan 20-------------------192.168.2.0/24
Vlan 30--------------------192.168.3.0/24
domain, meaning that frames broadcast onto the network are only switched between the ports
logically grouped within the same VLAN. VLANs simplify network management:-
➢ Network adds, moves, and changes are achieved with ease by just configuring a port into the
appropriate VLAN.
➢ A group of users that need an unusually high level of security can be put into its own VLAN so
that users outside of that VLAN can’t communicate with the group’s users.
➢ As a logical grouping of users by function, VLANs can be considered independent from their
28
lOMoARcPSD|39611779
10 ADMIN
ICT
20
FINANCE
30
Configuration
a) Configuring IP address DHCP
DHCP (Dynamic Host Configuration Protocol) is a protocol used to provide quick, automatic,
and central management for the distribution of IP addresses within a network.
DHCP is also used to configure the proper subnet mask, default gateway, and DNS server
information on the device.
pool Admin
start ip 192.168.1.10
dns-server 0.0.0.0
pool ICT
start ip 192.168.1.10
default-router 192.168.1.1
Dns-server
0.0.0.0 pool
Finance
start ip 192.168.2.10
29
lOMoARcPSD|39611779
default-router 192.168.1.1
dns-server 0.0.0.0
Trucking has been made on the distribution switch as well as the access switches because it is
mandatory to pass VLAN information between the switches. We used the encapsulation dot1q
command in sub interface range configuration mode to apply VLAN id to the sub interfaces.
The 2960 switch only runs the IEEE 802.1q encapsulation method. To configure trunking on
FastEthernet port, use the interface command switchport mode trunk.
The following switch output shows the trunk configuration on interfaces Fa0/4 as set to trunk:
C) Routing Configuration
By default, only hosts that are members of the same VLAN can communicate. To change this
and allow inter-VLAN communication, you need a router or a layer 3 switch. I’m going to start
with the router approach.
R1(config)#interface fastEthernet
R1(config-if)#exit
R1(config-subif)#encapsulation dot1Q 10
R1(config-subif)#exit
30
lOMoARcPSD|39611779
CHAPTER FOUR
Internships provide we an opportunity to link theory with practice to see the capacity how I can
make a solution for real world problem to develop both our practical and theoretical knowledge.
The Internship Program allows me an opportunity to understand the Unique environmental
conditions associated with a particular level of government such as regional local administration
and the nonprofit sector. It provides me the career with demonstrated academic competence and
a hands-on experience in the public sector. It gives me an opportunity to do business in group.
A. PRACTICAL SKILLS
During our practice work, from day to day we tried to learn something new from which we
possess new knowledge/skills.
➢ In developing our project, we have practiced a lot of theories that previously we had been
learning in the class for three consecutive years.
➢ From our practical works, in terms of local area networking design, we have learned from
where the company’s’ network project start, where it ends, how and when, to do it.
➢ From our internship project work wehave learned each and every devices that are used to
install Local Area Network
➢ Above all, from our internship practice we have upgraded our network configuration skills.
31
lOMoARcPSD|39611779
32
lOMoARcPSD|39611779
For doing any practical work, theoretical knowledge is the stepping stone for it. As a result:-
Wehave upgraded our theoretical knowledge by reading courses that we have learned in the
previous class, so many times over and over.
This internship has changed our professional level which will be helpful in our activities inside
the company and outside our working station. The knowledge we gained from the course and
from internship period will enhance our personal skill. We have tried to coordinating the theory
(which we have learned from the course) and practice (during internship). As a result we feel that
our quality of work improved and contributing more in the organization for the development of
the existing network structure. Some of these areas where we have developed ourselves are
mentioned below:
C. TIME MANAGEMENT
We are now very much competent to proper time management and effective implementation of
activities which will help us from the course of sustainable project management. Moreover, our
supervisor oriented us to time management and encourages to attendee timely in office and
completed all activities within time frame.
We are able to implement 95% of the activities without delay. Monthly and Weekly work plan,
displayed board furnished with time line of activities in font of desk, day to day activities follow
up helped all of the team member to successfully completion of activities within time
33
lOMoARcPSD|39611779
Under this topic we try to present the importance of executing personal task in a team. This
means that each member of the team must be responsible for the whole team success and failure.
So, we learned to be more responsible as individual and as a team. Team playing skills we
gained from the internship program includes:-
Sharing of information between team members. From our internship program we gained the way
of sharing information, knowledge, and experience to take the initiative to keep other team
members informed. That means a team players must share all relevant information to its
members.
We have learned that one team member must care about what the team members are doing and
their contribution to its success. We understood that the knowledge of team is stronger than the
individual persons’ knowledge and it is more effective. We understood even in the future the
knowledge of team is important if we share information and work together
E. LEADERSHIP SKILLS
The internship is an important occasion to practice the assets of leadership. We have increased a
lot about leadership and we saw how important it is for a successful project.
In doing our project, we were able to improve our self-confidence as we have the willingness and
inspiration to face any difficulty in the project. The project helped to grow emotionally and learn
from failure and success. This, in turn, gave us a chance to learn project management, the
technical approach and methodology of a project.
34
lOMoARcPSD|39611779
Understood that to work in companies respecting the work ethics is the main criteria of workers.
Each
When we first joined the ICT agency, our supervisor gave us orientation on how we should act in
SNNPR ICT agency. And every day we took time to have decent character in our team. Because,
we understood the fact that the more we get close to others in ethical way the more we get
benefit
Defined as “how does one person successfully take advantage of a work opportunity, while
Another, equally knowledgeable person does not.” Or “it is the capacity and willingness to
Develop, organize, and manage a business venture along with any of its risks in order to achieve
Profit.” An entrepreneur to be a great entrepreneur must have the following personal skills:
➢ Optimistic thinker
➢ Willingness to take risk
➢ Must have a vision
➢ Motivated to lead
➢ Overcoming fear of failure
➢ The ability to identify consumer’s “pain points”
➢ Endurance
35
lOMoARcPSD|39611779
During in our internship time we have an opportunity to meet with different people and from
Those people we take different ideas on how to be an entrepreneur alone with in our money or
Even when we are working in a company. It helps to us to be optimist in our future task and to
Think positively and also OSTICA working environment had been a good starting place to
enhance our Entrepreneur capabilities. Indeed, we learned a lot on improving critical thinking
and problem solving Skills. The change from school to workplace itself was another learning
opportunity, conditioning us to adapt to change and to be able to take responsibility.
From our internship program, we have improved our personal communication skills as one of the
most important thing. When we were in the campus, most of the communications that we used
are between level hood/colleagues and it’s via informal way. Besides that, informal our
communication is mostly limited to close friends or our level hood. As a result, there is no more
respect between us. On the top of that we didn’t make good team communication while we were
in the campus. In this internship period, we have improved our ways of communication, and
developed new formal communication skill. With the help of our associates, we have found
many options to develop these skills.
When we first joined the ICT agency, our supervisor gave us orientation on how we should act in
ICT agency. And every day we took time to have decent character in our team. Because, we
understood the fact that the more we get close to others in ethical way the more we get benefit
from them. When we reach working place the SNNPRS enroll their workers under this two
forms of ethics
➢ Personal ethics: These types of ethics include how someone should act towards other people. It is
highly influenced by our cultural, social, religion and personal thoughts. Some of such ethics
includes: Concern for the wellbeing of others, Honesty, Fairness, Tolerance, Open mindedness,
and Positive thinking.
➢ Professional ethics: include an ethics that a certain task does require. It is an important character
that governs every employee. Disobeying such ethics has consequences. Some of these ethics
are; Punctuality, Office disciplines, Reliability, Honesty, Cooperation, Impartiality,
Transparency
36
lOMoARcPSD|39611779
N.ENTERPRENURSHIP SKILL
The SNNPRS-CITA working environment had been a good starting place to enhance our
entrepreneur capabilities. Indeed, we learned a lot on improving critical thinking and problem-
solving skills. The change from school to workplace itself was another learning opportunity,
conditioning us to adapt to change and to be able to take responsibility.
➢ All in all, we can say that from this internship period in addition to formal academic knowledge
wewere able to gain general purpose life experiences in other aspects. These experiences are
unforgettable and we believe that it shaped our personality and behavior like:-
CHAPTER FIVE
CONCLUSION AND
RECOMMENDATION
CONCLUSION
Internship Program helps us to know several things. The program upgrades our practical skills in
electrical and computer engineering. This internship program helps us to know and understand
every aspect of the outside environment. In fact what really interesting was we learn how to
create LAN from the scratch by working on everything step by step, so this enable us to come up
with many important experience and skills. So using this practical knowledge and skills thatwe
got during internship have helpedus to create a soft environment to engage into our own
business in future.
In this internship program we tried to create a good relationship with employees and ask several
questions what is not clear. The other thing we got from this internship program is how to
manage work through this also we have increased our self-confidence, work ethics and how to
work cooperatively with others in the offices, from this we have learnt good values and
principles like politeness , respecting others ,giving decision, punctuality ,fulfilling
responsibilities, giving a good attention to others and like. So we concluded that the internship is
37
lOMoARcPSD|39611779
good opportunity to the student to have enough knowledge that help student in the future, and its
good opportunity to know work environment and to prepares themselves for the future goal and
to have a good Aim before graduation.
RECOMMENDATION
In our internship program we have tried to observe different things but we tried to give some
recommendation about the program. As we know this Internship program are essential to all
electrical and computer students not only electrical students but also essential to all university
student to know the practical world and to adopt the outside environment. But the company has a
poor attention to this program.
The company willingness of this program is good because it can create awareness for young
computer graduate student by supporting them in aspect and create smooth business environment
for those have creative knowledge and skills. But it is not good because all employees are not
interested to show everything and every work in detail because of less knowledge about that
internship peoples need. In our thinking we want to recommend them they must be upgrade their
knowledge about internship program for the student, the company and to our country.
we want to say something about company adviser Mr Ashenafi Yohannes. He is very gentle man
to guide and advice to internship students.
REFERENCES
internet
CNNA tutorials
CNNA BOOK
38
lOMoARcPSD|39611779
APPENDICES
SWITCH CONFIGURATION
a) Swich one (SW1)
Switch>enable
Switch#config terminal
Switch(config)#hostname SW1
SW1(config)#vlan 10
SW1(config-vlan)#exit
SW1(config-if-range)#do write
SW1(config-if-range)#end
Switch>enable
Switch#config terminal
Switch(config)#hostname SW2
SW2(config)#vlan 20
SW2(config-vlan)#exit
SW2(config-if-range)#do write
SW2(config-if-range)#end
39
lOMoARcPSD|39611779
Switch>enable
Switch#config terminal
Switch(config)#hostname SW3
SW3(config)#vlan 30
SW3(config-vlan)#exit
SW3(config-if-range)#switchport access
SW3(config-if-range)#do write
SW3(config-if-range)#end
Switch>enable
Switch#config terminal
Switch(config)#hostname SW4
SW4(config)#vlan 10
SW4(config-vlan)#exit
SW4(config)#vlan 20
SW4(config-vlan)# exit
SW4(config)#vlan 30
SW4(config-vlan)#exit
40
lOMoARcPSD|39611779
SW4(config-if)# exit
SW4(config-if)#exit
SW4(config-if)#exit
ROUTER CONFIGURATION
Router>enable
Router#config terminal
Router(config)#hostname R1
41
lOMoARcPSD|39611779
R1(config-if)#no shutdown
R1(config-if)#exit
R1(config-subif)#encapsulation dot1Q 10
R1(config-subif)#exit
R1(config-subif)#encapsulation dot1Q 20
R1(config-subif)#exit
R1(config-subif)#encapsulation dot1Q 30
R1(config-subif)#exit
42