Arba Minch University: Institute of Technology
Arba Minch University: Institute of Technology
INSTITUTE OF TECHNOLOGY
We would like to express our gratitude towards Mr. Wegene for his assistance in this practice,
Also our friends for their kind co-operation and encouragement which help us in completion of
this internship report.
ii
ABSTRACT
This internship report aimed at describing practice program for 4th year computer science students
to prepare them for real world jobs. This practice includes software maintenance, network
installation.
The report will illustrate the things and skills we gained during the practice time. In the busy time
of the semester the Lab assistances were ready to do their best and we are able to cover as much
as possible in the given time.
iii
Contents
ABSTRACT ................................................................................................................................................ iii
CHAPTER ONE ......................................................................................................................................... 1
1. INTRODUCTION............................................................................................................................... 1
1.2 Historical Background of the Company (Center) .......................................................................... 1
1.2.1 Brief history of the company ..................................................................................................... 1
1.2.4 Organizational Chart of the Company .................................................................................... 3
2. Objectives............................................................................................................................................. 3
2.2. specific objectives ......................................................................................................................... 3
3. Methodology ........................................................................................................................................ 4
3.1 Primary data sources .................................................................................................................... 4
3.2 Secondary data source .................................................................................................................. 4
CHAPTER TWO ........................................................................................................................................ 5
2. Network Installation ........................................................................................................................... 5
2.1 Local Area Network .......................................................................................................................... 5
2.2 Wide Area Network .......................................................................................................................... 5
2.3 Protocol .............................................................................................................................................. 5
2.4 Networking Hardware ...................................................................................................................... 5
2.4.1 Cable crimping ........................................................................................................................... 7
2.4.2 file sharing using cross over cable .......................................................................................... 16
CHAPTER THREE .................................................................................................................................. 22
3. Technical aspect of the internship ....................................................................................................... 22
3.1. Knowledge and Acquaintances Acquired .................................................................................... 22
3.2. Technical skills gained ................................................................................................................... 22
CHAPTER FOUR..................................................................................................................................... 23
4.1 Conclusion ................................................................................................................................. 23
4.2. Recommendation............................................................................................................................ 23
iv
CHAPTER ONE
1. INTRODUCTION
An internship program is known by giving students the opportunity to apply their knowledge in
real-world environments. At the same time, we students will also develop skills that will help us
to perform better at the real-world jobs, so based on its aim we have conducted our intern
program report. Therefore, this report describes our experiences as a fourth year Arba Minch
University Intern student at Information and Communication Technology Center (AMU –
ICTC), which is located in the southern Ethiopia of the Southern Nations, Nationalities, and
Peoples Region (SNNPR) about 500 kilometers south of Addis Ababa and is the largest town in
Gamo Zone called Arba Minch.
This internship is a part of the curriculum requirement for half a semester, exactly about 2
months, but due to time constraint after Covid-19 lockdown we were able to practice for 5 days
only. The report generally describes the whole tasks we have been handling, the experience and
benefits we have been gaining, the challenges we have been facing, and measures we have been
taking to overcome them through the internship period at AMU ICT center.
The internship program took five random days due to time constraint with class schedule from
May 9 2021, to June 6, 2021. It generally describes the whole tasks Practice we did, things we
observed, the experience and work benefit we got in the intern program. The challenges we faced
and measures are taken to solve it.
We were able to practice LAN type of a peer to peer network architecture installation in Lab,
Client-Server architecture on Cisco Packet tracer and software maintenances which we observed
and practiced during our internship program.
Generally, it is the overall views of our roles in the ICTC and state recommendations concerning
the program so as to enable the University to correct the problem and to create a conformable
situation for the next generation.
1
The AMU-ICTC provides different kinds of services efficiently and effectively for the
The satisfaction of workstation, employees and students.
The main services are: -
• LAN service
• Internet service
• Central service
• Classroom service
• Workstation (WS) service
• Web service
• Maintenance and Helpdesk Services
The other services of AMU-ICTC such as;
• AMU Ubuntu mirror Antivirus
• Network Enabled Applications Digital library
• E-learning and digital library E-learning facility
• Email Ere source
• Intranet IP based PBX
• Network Enabled Applications Official website
• Student management information service (SMIS) Thin client facilities
• Video conferencing Wireless computing
The following list is the offices in AMU-ICTC who held responsibilities to serve the
good will of the university to the best of them.
➢ ICT-director
➢ ICT-consultancy
➢ System admin. service professional
➢ Assistant system Engineering
➢ Database admin/developer
➢ Network and network security Engineer
➢ Network and network security professional
➢ Senior Network technician
➢ Assistant network development professional
➢ E-learning administer trainer
➢ Customer supply manager
➢ Help desk staff main campus
➢ Senior maintenance technician
➢ Maintenance technician of PCs
➢ Maintenance technician of printers and copies
➢ Classroom technician
2
1.2.4 Organizational Chart of the Company
In Arba Minch University information & communication technology centers have four
main parts depends on the jobs & other supportive careers. These main careers are
operating system and services, network and network security, customer support manager
and project support training.
2. Objectives
2.1. General objectives
3
✓ Maintaining software and devising a better way to keep the components of normal
status at ICT center.
✓ To be aspect full confidence in practical environment.
✓ To solve any problem during network installation.
3. Methodology
As we all know, there are two sources of data; primary and secondary data sources.
Therefore, we were using these methods of data collection.
1) Interview: essential information is gotten from the pragmatic work. This helped us
to accumulate data legitimately from the representatives by posing such huge
numbers of inquiries at the workplace about the organization working framework,
the executive's framework, and what they are doing at a given time. If any unclear
concept from the employees, we can contact our supervisor at any time.
2) Observations: We collected so much information by using this method of data
collection. To understand the confidentiality willingness share of knowledge and
work ethics of the workers we have not asked any question rather than observing
the fact.
4
CHAPTER TWO
2. Network Installation
A network consists of two or more computers that are linked in order to share resources,
exchange files, or allow electronic communications. The computers on a network may be linked
through cables, telephone lines, radio waves, satellites, or infrared light beams.
Two very common types of networks include:
✓ Local Area Network (LAN)
✓ Wide Area Network (WAN)
2.3 Protocol
A protocol is a set of rules that governs the communications between computers on a network. In
order for two computers to talk to each other, they must be speaking the same language. Many
different types of network protocols and standards are required to ensure that your computer can
communicate with another computer located on the next desk or half-way around the world.
5
• Hubs with more ports are available for networks that require greater capacity.
• Computers connect to a hub via a length of twisted-pair cabling.
• In addition to ports for connecting computers, even an inexpensive hub generally
has a port designated as an uplink port that enables the hub to be connected to
another hub to create larger networks.
Switch
Router
This device is a backbone device for almost all networks. It can be connected to switches and
hubs or it can be connected directly to computers. It is used to forward data packets to another.
6
2.4.1 Cable crimping
The steps to crimp RJ45 are:
• We can use this procedure both for straight through and crossover cable arrangement.
1. Cut the cable by the cutter then
• Strip cable end
• Untwist wire ends
• Arrange wires
• Trim wires to size
• Attach/crimp connector
• Check and test
The need to arrange color arrangement of cables came from the ports of NIC on different
devices.
The different arrangements of ports are the following
7
• Straight through UTP cable: use to connect different network devices like
• Switch to router
• Switch to PC
• Switch to server
Side A Side B
1. White/orange 1. White/Orange
2. Orange 2. Orange
3. White/green 3. White/Green
4. Blue 4. Blue
5. White/Blue 5. White/Blue
6. Green 6. Green
7. White/Brown 7. White/Brown
8. Brown 8. Brown
➢ Both sides (side A and side B) of cable have wire arrangement with the same color.
8
Crossover UTP cable: use to connect the same types of network devices such as
✓ PC to PC
✓ Switch to switch by using normal port
✓ Router LAN port to switch normal port
1. White/orange 1. White/Green
2. Orange 2. Green
3. White/green 3. White/Orange
4. Blue 4. Blue
5. White/Blue 5. White/Blue
6. Green 6. Orange
7. White/Brown 7. White/Brown
8. Brown 8. Brown
9
Rollover UTP Cables: Mostly known as Yost Cables. They are most commonly used to
connect to a device’s console port to make programming changes to the device. Unlike crossover
and straight wired cables rollover cables are not intended to carry data but instead create an
interface with the device.
SIDE A SIDE B
1. White/orange 1. Brown
2. Orange 2. White/Brown
3. White/green 3. Green
4. Blue 4. White/Blue
5. White/Blue 5. Blue
6. Green 6. White/Green
7. White/Brown 7. Orange
8. Brown 8. White/orange
In this task we practiced to install and configure LAN type network with the following
description
10
Network Topology: Bus topology
For the above specification the required materials are the following.
Cutter:
Cable Tester:
Cable taster is a device we use to check whether the cable is working or not. This device
also uses to check whether the cable is a Cross over or straight through or roll over cable
by its lighting coordinates.
Crimper:
11
This tool uses to connect/ attach the UTP cable with the RJ-45. This tool also have the
cutter and striper on it. It is very useful tool for the networking environment.
RJ-45:
➢ This tool is a port to be plugged on the NIC. It will be attached with the UTP cable using
crimper. “RJ” stands for
Register Jack, it is standardize network interface and “45” refers to the number of interface
standard.
➢ The Unshaded Twisted Pair cable is a type of cable we used in this peer-to-peer network
installation. It is a standardized cable for Gigabit Ethernet and other network physical
layers.
Striper:
This tool is uses to cut the upper coat of the UTP to find the inner 8 wires.
Computers:
12
These computers are the nodes which will act as a workstation.
Strip the cable 1/2 inch or1.5cm down from the end using cable strippers.
Carefully trim off ripcord.
Step 3
Untwist each pair of wires down to the sheathing. If you’re working with CAT-6 wire, cut
the center core down to the cable end.
Layout the side of the wires of this side in this order: white-orange; orange; white-green;
blue; white-blue; green; white-brown; brown.
13
Step 4
Step 5
Insert the wires in the order specified in Step Two above into the RJ-45 plug. The cable
sheath should extend into the plug by about 1/2 in. and will be held in place by the
crimp.
14
Step 6
✓ Crimp the terminal with the appropriate crimping tool.
Step 7
Make sure the wires are in the right order, extend to the front of the plug and make good
contact with the metal contacts in the RJ-45 plug.
Repeat project steps one through four to attach a connector on the other end of the cable
based on the required cable type.
15
2.4.2 file sharing using cross over cable
➢ The main advantage of using the ethernet cable method is faster transfer speeds, at
least faster than your regular flash drives and Wi-Fi.
➢ The following step is used to share file
Step 1: Connect Both PCs With LAN Cable
➢ You can use any LAN cable (crossover or ethernet cable); it doesn’t matter on a modern
computer. Because both of them use the same port and have very few functional differences
Step 2: Enable Network Sharing on Both PCs
➢ Now that you have physically connected both PCs with a LAN cable, we have to turn on
Network Sharing on both computers to exchange files between them. It is a simple process
step-by-step process. Make sure you do this on both PCs.
Once the Control Panel window opens, click on Network and Internet.
16
Then click on network and share center
17
➢ Then you’ll find three networks – Public, Private and All Network. Public Network is for
places like airports and coffee shops, Private network is for an organization or your home
network and All Network comprises of both. To make sure, the setup is flawless, we’ll
recommend you choose “All Networks”
Next, expand All Networks by clicking on the drop-down icon. Here, we need to enable Public
Sharing so that the PCs can access files from each other over the LAN cable. To avoid more
configuration, just Turn off password protected sharing and finally click on save change.
➢ Now that you have enabled network sharing on both PCs, it’s time to bring both the
computers on to the same network. We will do this by setting a static IP address of the
same class. Just like the previous step, you need to do this on both PCs.
18
The following are the steps
Step 1:Click on the Ethernet link. select “Internet Protocol Version 4 (TCP/IPv4)”,then here
click on the Properties button.
Step 2:Here, you need to configure the two PCs with different IP settings.
On computer 1,2, select the option “Use the following IP address.” and, put the following values
or put your value.but both computer are use different value .
19
Next, select the folder you want to share and right-click on it. From the context menu, navigate
to “Give access to” and select the option “Specific People.”
In the File Sharing window, choose Everyone from the drop-down menu. Click on
the Add button next to it and finally hit the Share button
20
Task Three: -password cracking using passcape software
➢ password cracking is the process which of recovering passwords from data that have been
stored in or transmitted by a computer system.
How does it work?
Download Windows Password Reset and then you will be needed some steps to follow:
step 1: A blank CD/DVD disk or an empty USB drive to create a reset disk.
step2: An accessible computer on which reset disk will be created.
step3: A good internet connection to download the setup.
step4: Install and Run the setup to get started with Windows 10 password recovery.
Features
✓ Enables and unlocks user accounts.
✓ Disables the password expiry option.
✓ Deletes passwords and other sensitive data from the computer.
✓ Resets and modifies passwords of local users and administrators, domain administrator,
Active Directory users, DSRM account.
✓ Reset Windows Passwords
✓ Remove Windows Passwords
✓ Delete Windows Accounts
✓ Add New User Accounts
21
CHAPTER THREE
3. Technical aspect of the internship
3.1. Knowledge and Acquaintances Acquired
we have gained some skills during the five days of the internship program. Some of them
include: -
✓ We have gained knowledge about how organizational structure looks like and how to
behave in a company.
✓ we have improved my technical and personal skills that we have learned theoretically,
after becoming familiar with new techniques and methods.
✓ Looking for the problem in the field and giving a quick and effective response to
solving it, if any.
22
CHAPTER FOUR
Conclusion and Recommendation
4.1 Conclusion
After going through the whole period of internship as an intern we have observed so many
professional activities and learned as well. This internship was very fruitful to us because
we had to cover many different fields. We also learned new concepts and new ways of
working. During this internship period, we acquired practical experience to complement
the theoretical content of our study for AMU, Network cable installation and network
cable maintenance. To conclude, we think that this internship was very beneficial to us
as we learned a lot, and it made us discover works in a real-world.
4.2. Recommendation
The company workers are committed to their work and they are sociable, so we
recommend them to continue on it. A session is for Five days, the weather condition of
AMU is hot, as a result, it is difficult to construct wired network configuration in the
afternoon even if we haven’t been able to get that chance. Especially it was difficult in
the afternoon So we recommend to AMIT faculties, the field practice should be applied
in the morning time. In addition to that we have noticed some lack team work or proper
coordination for our program. There was no accountable body for our program other than
our advisor.
Reference
1. www.geekshub.com
2. www.cisco.net
3. www.computercablesore.com
23
24