DBR
DBR
2017
FACULITY OF TECHNOLOGY
COMMUNICATION STREAM
NAME ID
DECLARATION
I am Lakachew Adane a student of DebreTabor University I have completed my internship
report that is Debre Markos University for Academic year of 2016/17G.C. All the report
informations written in this report are obtained from what I have seen in my Internship period
and from reading different books of the company, and the Company project working manuals.
All the report is done by me except those documents which are mentioned in the reference.
Approved by:-
Name Signature Date
1. .. .. ..
Acknowledgement
First of all I would like to thanks my GOD that helps me in all aspects from the start to the ends.
He was the first adviser of me during the internship period and before that and forever.
Secondly ,I would like to thanks Mr. Bikis ALebachew head of electrical and computer
engineering in Debre Tabor university, he gives great support for me to out the internship in
Debre Markos university. And also,. Iam are also grateful to our school mentor mr,Addisu, for
his comments and suggestions while he came in the first round mentoring.
The other one is my entire department lecturer that helps me to upgrade my theoretical
knowledge in the field of study. And also I would like to thanks the institute that prepares
internship program that the student practices their theoretical knowledge in the real world. I
would like to express my profound sense of gratitude to my supervisors mr.Gashaw.
Weldegebriel (The University ICT Director) for their immense interest, invaluable guidance and
moral support and constant encouragement during the Internship work.
My deepest thanks to Mr. Belayneh Mamo and Mr. Tadele for their invaluable teaching and
guidance throughout my stay at DMU ICT. I am also indebted to all the members of ICT center,
for providing help whenever needed in my Practical Assignment.
At last but not least, we like forward our acknowledgement to the whole employees of the hosted
company for their friendly attribute and appreciation throughout the project.
Contents
DECLARATION ............................................................................................................................ ii
2.3 Overall System Components found in DMU ICT Center working world. ........................... 9
Chapter Three................................................................................................................................ 15
4.2 Project Title: improve design performance, Reliable and Secure network for DMU. ........ 35
1 Conclusion ................................................................................................................................. 53
2 Recommendations .................................................................................................................. 53
3 Reference ................................................................................................................................... 54
LIST OF TABLES
Table 1:- :- Orders of wires at the RJ_45...................................................................................... 10
Table 2:- straight through cable color arrangement ...................................................................... 12
Table 3:- cross over cooler of cable arrangement ......................................................................... 13
Table 4:- UTP Cable categories .................................................................................................... 29
Table 5:- UTP cable types and their use. ...................................................................................... 29
LIST OF FIGURE
Figure 1 Organizational structure. .................................................................................................. 4
RJ Registered Jack
Pc personal computer
CAT6 Category- 6 Ethernet cable
Executive Summary
The internship program report is necessary part of the BSc program, & every student has to do
internship of 4 months in any organizational related to his /her field of interest. After successfull
completion of the internship work a student is required to write whatever practices & practical
work he has done in his internship work.
Internship was my first step in practical life, through which I learnt a lot and it has aided me in
being well equipped with valuable experience that would help me once I enter the professional
life after the completion my studies.
This report is the collection of my observation and experience during the internship period at
DMU ICT center from October 2016 to mid of February 2017.The internship has also prepared
me for my future career. The experience has taught me responsibility, team work and how to
handle problems occurring. Even though the nature of the work was quite basic as an internee,
nevertheless I got to see what practical life is.
HAPTER ONE
1. CAMPANY BACKGROUND
The teaching learning process of the university began in 2007. Currently the university is
organized into 18 offices and 6 Colleges and 1 school with over 598 (302 academic staff, 146
permanent and 150 contract supportive staff). This time (2010/11) the previous Education
College opened in 2007 was dividend in to two (Social Science and Humanity, and Natural and
Computational Science Colleges). The six Colleges are Social Science and Humanity, Natural
and Computational Science, Business and Economics, Agriculture and Natural Resource, Health
Science, Technology, and one school i.e. school of Law.
Mission
The mission of the Debre Markos University is to contribute substantially for social, cultural,
economic, political, scientific and technological development of the nation; through the
provision of high quality education, active engagement in research and outreach activities for the
betterment of life, while offering our employees a conducive and rewarding working
environment that values, recognizes and appreciates their contributions.
Vision
The vision of the Debre Markos University is to become one of the ten premier research
universities in Africa in 2025 recognized for its quality education, research and outreach
activities.
The customers of Debre Markos University are divided in different groups of actors, who are
linked to the educational process being the main: current students, potential students, employees,
employers, government and industry. Which have classified the customers in internal and
external, emphasizing that the internal customer who are work to the satisfaction of external
customers Besides, to the authors the customers can be classified in primary ones and secondary
ones, based on their location being as internal customers or external ones and based on the
frequency of interaction that the institution has with them too. While consider that the product of
higher education is the education and then, depending on the role developed by them during the
course, the students can be classified as internal or external.
5. Ensuring coordination and continuing of the ICT efforts initiated and planned at DMU
6. Ensuring that the financial and other resources required initiating and implementing ICT
projects are in place.
7. Since the idea of utilizing ICTs as a strategic tool is at infant stage in the university, the
directorate coordinates its efforts and contributions towards the introduction and adoption of
ICTs in the University.
8. Coordinates the introduction and wider application of ICTs across all Units of DMU as an
institution.
Developing ICT projects for different colleges and directorates to give efficient services
Ethio
telecommunicatio
n
Router
Server
Switch
Master Technolog
library y Faculty ICT DIRECTORATE
OFFICE(BLOCK-27)
Software testing
Also it provides the application such as:
o Office machinery Maintenance
o Hardware Maintenance
o Network installation
o Network Security
o ICT training
o Video Conference
Software installing
This company gives the installing software services for different offices and students. Some of
the software that company can be installing is as follows:-
Anti-virus
Word-office
Any types of windows
Accounting software (like Peachtree)
Any Engineering software (like Auto-cad, Eagle point etc.)
Software testing
Under this method the company will check whether the installed software will expire or not,
when it is expired it will be updated. In addition to this, the company will add extra things, if it
will need. The above indicated software could be tested under this topic.
We have tried to mention in our topic the company could maintain their own office machineries
as well as the other sectors and so on. The maintained machines are described below:-
Printer
Copy machine
Scanner
Rural connectivity, give like maintenance and short training. In addition, they give
technicians supportive for sector zone and all wereda. Example. Supervisor
The company could be give service concerning desktop and PC hardware maintenance for their
own sectors and other sectors as well as for private people. As we tried to explain above
maintaining hardware for the desktop and PC are one of the services that the company gives for
the students, teachers as well as office workers.
Network installation
Since this company would give multiservice for all society, all sector in that zone and non-
governmental organization. This network installation expansion is highly necessary for
everybody who wants to use it. .
ICT training
DMU ICT Company could help people who live in that zone without any payment to give short
basic computer training course. Internet service, give for any sector wereda and individual
person.
CHAPTER TWO
Different electrical equipments and control automation systems by inter-relating with the
Theoretical knowledge and to upgrade our technology. Internships will provide us the
Opportunity to test their interest in a particular career before permanent commitments is made.
Apart from this it has the following advantages:
We will develop skills and techniques directly applicable to the careers we hold.
Internships will provide us the opportunity to develop attitudes conducive to effective
interpersonal relationships.
Internships will provide us to have depth knowledge of the formal functional activities of
a participating organization.
Internship programs will help to develop problem solving skills.
In general, an Internship is thought of as a program which "narrows the gap" between the
academic environment and a future work environment. Many employers prefer students who
have previous work experience and the Internship provides to have those experiences.Students
that participate in an Internship program are generally more confident and more qualified when
seeking in the future employment.
2.3 Overall System Components found in DMU ICT Center working world.
outlet has two standards: namely standard A and standard B. It has been also seen that 2 pairs of
wires (white orange, orange, white green and green) are used to test the presence of adapter with
in a computer. There are two types of connections in the case of NW installation. These are:
straight through and cross over. Straight through is used to connect different devices (e.g.
computer with printer) and cross over is used to connect similar devices (e.g. computer to
computer). But for now straight through connection is our issue. The placement of colors in both
connections is shown in table 1 below.
Cabling
Labeling
During this task meaning that network installation I did network cabling system
Cabling
Cables are used to connect one network device to other network devices or to connect two or
more computers to share printer, scanner etc. Different types of network cables like
Coaxialcable, Optical fiber cable, Twisted Pair cables are used depending on the network's
topology, protocol and size. The devices can be separated by a few meters (e.g. via Ethernet) or
nearly unlimited distances (e.g. via the interconnections of the Internet).There are several types
of cable which are commonly used with LANs. In some cases, a network will utilize only one
type of cable, other networks will use a variety of cable types. The type of cable chosen for a
network is related to the network's topology, protocol, and size. Understanding the characteristics
of different types of cable and how they relate to other aspects of a network is necessary for the
development of a successful network.
An Optical fiber cable consists of a center glass core surrounded by several layers of protective
material. The outer insulating jacket is made of Teflon or PVC to prevent interference. It is
expensive but has higher bandwidth and can transmit data over longer distances.
Coaxial lines confine the electromagnetic wave to area inside the cable, between the center
conductor and the shield. The transmission of energy in the line occurs totally through the
dielectric inside the cable between the conductors. The most common use for coaxial cables is
for television and other signals with bandwidth of multiple megahertz.
Twisted pair cabling is a form of wiring in which pairs of wires (the forward and return
conductors of a single circuit) are twisted together for the purposes of cancelling out
electromagnetic interference (EMI) from other wire pairs and from external sources. This type of
cable is used for home and corporate Ethernet networks.
Depending on devices they connect to share data by twisted pair cable, cabling of twisted pair
cabling is divided into two major parts:
Straight through
Crossover
Straight through
Straight through cable is a type of twisted pair copper wire cable for LAN use for which the RJ-
45 connectors at each end have the same pin out. The wires on the cable are crossed over so that
they receive signal pins on the connector on one end are connected to the transmit signal pins on
the connector on the other end. Straight-through cable is used to connect computers and other
end-user devices (e.g., printers) to networking devices such as hubs and switches. It can also be
used to directly connect like devices (e.g., two hubs or two switches) if the cable is plugged
intoan uplink port on one (but not both) of the devices.
Brown 8 8 Brown
Cross over cable is a type of twisted pair copper wire cable for LAN use for which the second
and third pairs on one end of the cable will be reversed on the other end. Cross over cabling is
used as a backbone cable to connect two or more switches in LAN, or connect two isolated hosts
to create a mini-LAN. Crossover cable is used to connect two like devices without the use of an
uplink port.
Two computers
Two routers
Two switch
Two PC
Green 2 2 Green
Blue 4 4 Blue
Orange 6 6 Orange
Brown 8 8 Brown
Labeling
Labeling is the process of giving the proper number existing on the switches or Patch Panel
correspondingly to the ports, i.e. the out let of the cable rising from the switches or hubs. It is
very important to give labels to the cables. Labels make the network troubleshooting less painful.
In case of problem, no need to trace every cable end to end. Each end of cable should be labeled;
the label should give information about where the cable is connected to.
To verify that the performance of the installed the network meet with the specifieddesign
intent through a series of tests and adjustment
Chapter Three
The other one is the maintenance part .In these sections we have try to identify the problem of
the computer and how to solve the problem. And also during this task we have try to know which
parts of the computer is sensitive to damage and we are try to know how to fix this problem. For
example when we push the on/off button the computer, then the computer starts working. After
some minutes the computer turn off .if this types of problem is occurred repeatedly on the
computer, we have to check directly to the fan area. This types of problem occurs when the hole
of the fan are closed by waste materials like dust. So we have to clean the area. Usually, the
problem of the computer is either the hard ware part or the software part. In most case, problem
occurs in computer is in its software part. we have also learned that how to format computers and
install softwares on the computer. But we havent maintained computer that much. AsI
mentioned earlier (in chapter two), in maintenance part mostly the only thing that we didis
checking whether the computer function or not. So we havent got that much enough knowledge
because all the computers are normal. But the main thing that I gained from the maintenance part
is full of confidence to open the computer to maintain for todays and future job market. But I
would like thanks to my campus and my Internship University for their contributions on me to
develop my theoretical knowledge that I gained in classes to apply in the real world.
To verify that the performance of the installed the equipment/systems meet with the
specified design intent through a series of tests and adjustments
To capture and record performance data of the whole installation as the baseline for
future operation and maintenance.
The other objective is that, students have theoretical knowledge that gains in the class when they
are in their campus.as we all know, theoretical knowledge is not enough to allow graduates to
perform at a higher level and for the development of one country. I mean that, in the real world
environment, analytical skills are not enough. Students must have both interpersonal
andleadership abilities. By efficiently using internships, students will increase their skills and
makethem valuable to the job market.
In general technical task is used to develop analytical knowledge of the student in the real world
and also to show what look like the real world.
In general the objectives of the technical task according to the University are:
In the ICT department the networking portion was one of the subsections under my hosting
company (DMU ICT). I have been participating and have got a great knowledge about it during
the four months I spent as an intern there. I will give the priority for it to describe the work flow
and procedures undertaking in a complete networking project.
Using previous theoretical knowledge & also reading some references with hard copies
and internet related to networking
Routers
Switches
Access points
Servers
Trunk
Rj45 connector
patch panel
Hummer= is used to beat the screws and to widen the transmission hole for UTP cable.
Patch panel= is a device used to forward the data received from switch to node.
2. It has been continued to the physical design according to the lay out.
4. It has been selected one office for the rank to hung 180 centimeters high from the floor.
5. It has been measured the dimensions for the trunk to be 65 cm high from the floor.
6. It has been penetrated the trunk to fasten with the wall through screws.
7. It has been drilled the wall according to the given dots on the wall.
9. Finally, it has been fastened the trunk, node and rank properly with the wall.
Punching procedures
4. It has been punched the wires at the UTP cable patch panel similar to the outlet
Observation
As it has been seen in the building NW installation converting theoretical concepts to practical
aspect is too much easy. It has been also observed that working practically is much easier than
theoretical. Since every activity is in the same ones smartness. The same is true it has been seen
that punching technique is somewhat difficult than trunk leveling. Since wires should be
carefully stripped and punched properly to their appropriate position. especially when it has been
inserted to RJ-45. Generally, it has been seen that any failure in the connection can be easily
maintained by checking at the patch panel punching, at the node outlet connection, and at the
RJ_45 connection.
Server room: - a data center might consist of several server rooms, each of which is used for
separate applications and services. A server room is the physical space that houses all the data
running through the computer network of a business or organization. It is a room used to store,
power and operate computer servers and their associated components. This room is part of a data
center, which typical houses several physical servers lined up together in different form factors,
such as rack mounted, or in tower or blade enclosures.
A server room provides the operational and environmental components and services to operate
enterprise class servers. The servers housed in a server room usually include basic CPU
components and lack any display or input device. They can all be centrally accessed and
managed through a server administrator system, which is typically found outside the server
room.
A server room is designed to provide a continuous and redundant supply of electrical power,
backup/alternate power, lighting and air conditioning, and is monitored by one or more server
administrators. Design a server room must be safe, spacious and computer friendly for the entire
IT team. Putting together a safe and accessible data center for the storing of technology and files
is essential in creating a hub for IT infrastructure and operations.
Network switches:-are telecommunication device that receives a message from any device
connected to it and then transmits the message only to the device for which the message was
meant. This makes the switch a more intelligent device than a hub (which receives a message
and then transmits it to all the other devices on its network). The network switch plays an
integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized
A networking switch is also the central device in a wired or wireless LAN. It receives signal
from each computer on the network via Ethernet cables in a wired network or radio waves in
wireless LAN. In both cases the networking switch directs traffic across the LAN enabling the
computers to talk to each other and share resources.
Server
1 proxy server
To speed up access to resources (using caching). Web proxies are commonly used to
cache web pages from a web server.
To prevent downloading the same content multiple times (and save bandwidth).
Access enhancement/restriction
Is a computer server that hosts a network service for providing responses to queries against a
directory service? It maps a human-recognizable identifier to a system-internal, often numeric
Mail Server
A mail server is a computer that serves as an electronic post office for email. Mail exchanged
across networks is passed between mail servers that run specially designed software. This
software is built around agreed-upon, standardized protocols for handling mail messages and any
data files (such as images, multimedia or documents) that might be attached to them. a mail
server is the computerized equivalent of your friendly neighborhood mailman. Every email that
is sent passes through a series of mail servers along its way to its intended recipient. Although it
may seem like a message is sent instantly - zipping from one PC to another in the blink of an
eye- the reality is that a complex series of transfers takes place. Without this series of mail
servers, you would only be able to send emails to people whose email address domains matched
your own - i.e., you could only send messages from one example.com account to another
example.com account.
I. Outgoing mail servers: - Outgoing mail servers are known as SMTP, or Simple Mail
II. Incoming mail servers: - Incoming mail servers come in two main varieties.
1. POP3 (Post Office Protocol, version 3) servers are best known for storing sent and received
messages on PCs' local hard drives.
2. IMAP (Internet Message Access Protocol) servers always store copies of messages on servers.
Most POP3servers can store messages on servers, too, which is a lot more.
Web Server
A web server is simply a computer program that dispenses web pages as they are requested. The
machine the program runs on is usually also called a server, and the two references are
interchangeable in everyday conversation. When someone sits down at a computer and enters an
address into an internet browser like Internet Explorer or Firefox, the browser sends a request off
into the internet asking to view the web page found at that address.
The web server is the program or machine that responds to that request, and delivers the content
of the page back to the user. This can be done because every computer or device that connects to
the internet has a uniquely identifying number, called an Internet Protocol address, or IP address
for short. This address is what allows computers to find one another and communicate across the
network.in brief, the process works as follows. Every web page on the internet also has a unique
address called a Uniform Resource Locator, or URL.
The web servers can also handle data requests for other protocols not covered here, like SMTP
for email, or FTP for file transfer and storage, it is their ability to respond to web page requests
that is the underlying force keeping the entire World Wide Web up and running.
Trunk: - Trunk is one of the main network installations instrument that casted on the body of
civil structures. Main Features of Computer Network Cable Trucking System are:
Drill machine
Fisher(expedition pipe)
Trunk
Screw driver
Pilon
Rj-45 connector: - are only slightly smaller RJ45 is a standard type of connector for network
cables. RJ45 connectors are most commonly seen with Ethernet cables and networks.RJ45
connectors feature eight pins to which the wire strands of a cable interface electrically. Standard
RJ-45 pin outs define the arrangement of the individual wires needed when attaching connectors
to a cable. Several other kinds of connectors closely resemble RJ45 and can be easily confused
for each other. The RJ-11 connectors used with telephone cables, for example,(narrower) than
RJ-45 connectors.
Punch down tool: - a punch down tool is a small hand tool used by Telecommunication and
network technicians. It is used for inserting wire into insulation displacement connectors on
punch down blocks, patch panels and surface mount boxes (also known as biscuit jacks).
Most punch down tools are of the impact type, consisting of a handle, an internal spring
mechanism, and a removable slotted blade. To use the punch down tool, a wire is pre-positioned
into a slotted post, and then the punch down tool is pressed down on top of the wire, over the
post. Once the required pressure is reached, the internal spring is triggered, and the blade pushes
the wire into the slot, cutting the insulation, and securing the wire. For light -duty use, there are
also less expensive punch down tools with fixed blades and no impact mechanism.
The trimming blade cutting edge works against the plastic insulating post. Krone blades require a
separate scissor-like mechanism for trimming the wire.
Network cable tester:-a cable tester is used to verify that all of the intended connections exist
and that there are no unintended connections in the cable being tested. When an intended
connection is missing it is said to be "open". When an unintended connection exists it is said to
be a "short" (as in short circuit). If a connection "goes to the wrong place" it is said to be "Miss
wired" (the connection has two faults: it is open to the correct contact and shorted to an incorrect
contact).
Generally, the testing is done in two phases. The first phase, called the opens test makes sure
each of the intended connections is good. The second phase, called the shorts test makes sure
there are no unintended connections.
UTP patch panel: - provides a convenient place to terminate all of the cable runs coming from
different rooms into the wiring closet. Of course, one could skip the patch panel and just connect
all RJ-45Connectors directly into the hub, but one may miss the following advantages:
You can label the patch panel so you know which room the cable run goes to. Putting the labels
on the cables is tougher to read than labels on a patch panel and also there is risk of having the
cable labels fall off. A patch panel is a step up from a punch-down block. Each of those
connectors is wired to an RJ-45 on the front. The RJ-45 on the front provides a spot to plug in a
patch cable that goes to the hub. UTP patch panels facilitate a world-class installation for data
centers and telecommunications rooms by offering an attractive appearance combined with
flexible labeling and color coding options.
CAT6 UTP cables:-The most common copper network media is unshielded twisted pair (UTP)
cable. UTP in Ethernet consists of eight wires twisted into four color-coded pairs and then
wound inside a cable jacket. The colored pairs identify the wires for proper connection at the
terminals.
The twisting of pairs in UTP cable is part of the cable engineering design. When wires carry
electrical current, they can create an electromagnetic field that can cause interference on other
wires in the cable. Because each wire in the pair carries current in the opposite direction, keeping
them close together with twisting will cause the magnetic fields on the wire pair to cancel each
other. This magnetic interference from wires within the cable is called crosstalk. The rate of
twisting in each pair of wires is different so that each pair self-cancels and reduces crosstalk to a
minimum.
Straight-through Both ends are the same, either Connects a network host to a
Crossover cable One end 568A and the other Directly connects like devices,
such as two hosts, two
568B. It does not matter
Switches, or two routers. Also
which end goes to which used to directly connect a host
to a router.
device.
port.
1 = orange/white
2 = orange
3 = green/white
4 = blue
5 = blue/white
6 = green
7 = brown/white
8 = brown
Internship is the beginning of the road that will take me to the point I want to be at after my
graduation. Internship is a practice I need to perform, because it prepares me for the business life
that I aim at.
The visitations I made on the previously started networks had given me a clear vision about the
field. The knowledge and skill I have before and after the internship is totally incomparable.
During the time I spent there I know how to design a network layout for a given working site and
accordingly how to make the cost analysis for the design made.
Internship program regarding improving leadership is that, directing successful leadership results
in the employee growth and development with new skills and capabilities that enables to increase
the productivity. I have seen this while doing some group tasks with my friend working with me
and other workers. Accordingly I have improved my leadership capabilities during the four
risks, both personal and financial, and then to do everything possible to get the odds in your
favour.
Contributions
My contribution to the University is I install networks to the intended room of the block. During
the installation time I record all the installation materials in paper because if failure is exist
another time I have to use the paper in order to identify the material being properly installed or
not.
Chapter four
4.2 Project Title: improve design performance, Reliable and Secure network for DMU.
Universities are facing new challenges with the emerging global economy characterized by the
importance of providing faster communication services and improving the productivity and
effectiveness of individuals. New challenges such as provides an information network that
supports the demands and diversification of university issues. A new network architecture, which
is a set of design principles for build a network, is one of the pillar bases. It is the cornerstone
that enables the universitys faculty, researchers, students, administrators, and staff to discover,
learn, reach out, and serve society.
This project focuses on the network architecture definitions and fundamental components. Three
most important characteristics of high-quality architecture are that: its open network
architecture; its service-oriented characteristics and is an IP network based on packets. There are
four important components in the architecture, which are: Services and Network Management,
Network Control, Core Switching and Edge Access.
The development of models and strategies to control networking installation is the vital for the
community, the sector of that company as well as for the worlds. One important reason was that
influencing the network variables such as Arrangement of Lab computer, Cabling layout
,Functionality of computer Placement of switch ,Placement of wall jack, Settlement of extension
network cable ,Unwanted material From this project report, we see that there are factors that
need to be controlled in network installation .
The introduction and rapid spread of Information and Communications Technologies (ICTs),
such as the World Wide Web, e-mail, telephones, fiber optics and satellites is revolutionizing the
way in which societies interact, conduct their businesses, compete in international markets and
set their economic and human development agendas. This fact leads to the establishment of
DMU ICT in order to full fill the gap that happens due to information communication technology
and to create an economic community whose capacity of making decision based on information
and knowledge is developed in. In general and the DMU ICT, in particular has made the
Information and Communication Technology as one of strategic priorities. The government has
fully recognized Information and Communication Technology as a development strategy in the
fight against poverty and backwardness and to bring about fast and sustainable development.
4.4.2Specific objective
To design and install network for large as well as small building.
To increase the performance network.
To minimize wastage of cable.
Literature review
Reading CISCO books, articles, forums, journals, papers, simulation tools
related to the subject matter
System comparison
Analysis and Comparing the previous network system and the new network
system
Primary Data
Secondary Data
Router configuration
Router>
Router>ena
Router>enable
Router#config t
Router#config terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#HOST NAME R1
^
% Invalid input detected at '^' marker.
Router(config)#HOSTNAME R1
R1(config)#int
R1(config)#interface f0/0
R1(config-if)#ip addre
R1(config-if)#ip address 192.168.1.254
% Incomplete command.
R1(config-if)#ip address 192.168.1.254 255.255.255.0
R1(config-if)#no shut
R1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R1(config-if)#
R1(config-if)#
R1(config-if)#^Z
R1#
%SYS-5-CONFIG_I: Configured from console by console
R1#
R1#
R1#
R1#show ip brief
^
SW1(config)#
SW1(config)#ip default gateway 192.168.1.254
^
% Invalid input detected at '^' marker.
SW1(config)#ip default gateway 192.168.1.254 255.255.255.0
^
% Invalid input detected at '^' marker.
SW1(config)#?
Configure commands:
access-list Add an access list entry
banner Define a login banner
boot Boot Commands
cdp Global CDP configuration subcommands
clock Configure time-of-day clock
crypto Encryption module
do To run exec commands in config mode
enable Modify enable password parameters
end Exit from configure mode
exit Exit from configure mode
hostname Set system's network name
interface Select an interface to configure
ip Global IP configuration subcommands
line Configure a terminal line
logging Modify message logging facilities
mac MAC configuration
mac-address-table Configure the MAC address table
no Negate a command or set its defaults
port-channel EtherChannel configuration
privilege Command privilege parameters
service Modify use of network based services
snmp-server Modify SNMP engine parameters
SW1#
SW1#show run
Building configuration...
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface Vlan1
ip address 192.168.1.253 255.255.255.0
shutdown
!
ip default-gateway 192.168.1.254
!
!
!
!
line con 0
!
line vty 0 4
login
line vty 5 15
login
!
!
end
SW1#
SW1#
SW1#comfig t
^
% Invalid input detected at '^' marker.
SW1#
SW1#config t
Enter configuration commands, one per line. End with CNTL/Z.
SW1(config)#int VLAN 1
SW1(config-if)#no shut down
SW1(config-if)#
%LINK-5-CHANGED: Interface Vlan1, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up
SW1(config-if)#
SW1(config-if)#
SW1 con0 is now available
Press RETURN to get started.
PC CONFIGURATION
As I describe from the portion of organizational and project back ground portion Debre Markos
University network infrastructure was originally designed and implemented in 2003 and it was
fully operational in 2004.This LAN was implemented only in the limited area of the campus.
Thus till no such internship project or final year project done within the university by any one.
But design and installation of local area network system have done over limited area of the
university with the help of local contractor or local professional. Hence the designed and the
installation of system well not secured well no use its good performance and cover very limited
areas. Thus this project will provide the secured local area network infrastructure design and
install of the Debre Markos University that can be implemented with modification and addition
of some design considerations.
Chapter five
1 Conclusion
After going through the whole period of internship as an intern Ive observed so many
professional activities and learnt as well. This internship was very fruitful to me because I had to
cover many different fields. I also learnt new concepts and new ways of working. During this
internship period I acquired practical experience to complement the theoretical content of my
study for campus networking system tasks, wireless local area network (WLAN) and network
security of main campus data center. To conclude, I think that this internship was very beneficial
to me as I learnt a lot, and it made me discover work's in a real world.
2 Recommendations
The Data Center is the hub of the Universitys computing resources, which are shared by the
academic, research, and administrative communities. These facilities provide a secure,
enterprise-wide, reliable, and redundant infrastructure for the delivery of mission-critical
University systems. As per earns observation some suggestion for the improvement of the
situation are given below:
Access floors: One of the key predesigned considerations that affect almost every aspect of
success within a data center environment is the access floor, or raised floor as it is often
referred to. This infrastructure is every bit as important to cooling, equipment support,
grounding, and electrical and communications connectivity as the building structure supporting
it. Main campus data center uses class room building, the building should be maintained in
standard data center designed way. Optimizes airflow and heat dissipation allowing the
computing equipment to run more efficiently, so the data center should be installed raised floor
in standard way.
Cable Management: All data cabling should be under the floor, both ends of the cable should be
labeled and tagged for proper identification.
The data center hardware identification should be with the appropriate, fully qualified server
names, and all equipments within the cabinets. If implement in this way the hardware is easily
identifiable.
The data center should be protected in building grounding and lightning protection system.
ICT Development Office must configure FTP protocol for the retrieve of files based onFTP
protocol.
Training program should be started for both academic and administrator staff.
3 Reference
[1] Behrouz A. forouzan Data communication and networking 4th Edition.
[2] Comer, D. Internetworking with TCPlIp, Volume 1: Principles, Protocols, and Architecture.
Upper Saddle River, NJ: Prentice Hall, 2000.
[3] Agrawal D. and Zeng, Q. Introduction to Wireless and Mobile Systems. Pacific Grove, CA,
NJ: Brooks/Cole Thomson Learning, 2003.
[4] Garcia, A. and Widjaja, I, Communication Networks. New York, NY:McGraw-Hill, 2003.
[5] Keiser, G. Local Area Networks. New York, NY: McGraw-Hill, 2002.
[6] Kumar A., Manjunath, D., and Kuri, 1. Communication Networking. San
Francisco, CA: Morgan, Kaufmans, 2004.
[9] http://www.youtube.com