Internship Report PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 57

ADDIS ABABA SCIENCE AND TECHNOLOGY

UNIVERSITY
COLLEGE OF ELECTRICAL AND MECHANICAL ENGINEERNG

DEPARTMENT OF COMPUTER ENGINEERING

Internship Report

SUBMITTED BY:
NO GROUP-Members ID-NO.

1 Habtam Atanaw ETS 0531/08

2 Kelbesa Ejeta ETS 0652/08

3 Tesfaye Fikadu ETS 1072/08

June 2019

Addis Ababa Ethiopia

i
Dedications

This internship report is dedicated to our parents, and all our friends for being with us and
helping us in each and every difficulty we have faced in this internship report completion and
to our teachers and all those who thought us, trained us and polished our abilities at AASTU
ICT DIRECTORATE.

Approval of the internship report


We, hereby declare that this internship report is submitted to the partial fulfillment of the
internship program during the last four months starting from march to June . Any part of this
report has not been reported or copied from any report of the university and others.

ii
Acknowledgment
First and foremost, our grateful thanks to almighty God for keeping us safe to finish our
internship program healthy and happy. Next the special thank goes to our helpful supervisor
Mr. Yonas Tesfaye, department head of computer engineering. The supervision and support
he gave us truly helped us in the progression and smoothness of the internship program. The
co-operation is much indeed appreciated.

Furthermore we would also like to acknowledge with much appreciation the crucial role of
the members of ICT directorate specially Mr. Daniel and Mr. Tesfaye, who gave the
permission to use all required equipment and the necessary materials to complete our project
on network configuration and computer maintenance Huawei eNSP and cisco packet tracer in
configuration of router and switch and the computers that have to be maintained for practice
purpose. Last but not least, many thanks go to Mr. Daniel who have invested his full effort in
guiding the team in achieving the goal. We have to appreciate the guidance given by other
supervisors.

iii
Executive summary

This report explains the overall internship experience starting with the background of the
internship hosting company that is AASTU ICT Directorate which is located in Addis Ababa
Science and Technology University. The report tries to discuss about the four months stay
experiences, benefits gained from the internship, conclusion and recommendations for the
hosting directorate, it discuss in detail about the trainings that we took in the Directorate, and
the projects that we did during our time as an intern. The report contains Six main chapters.
The first chapter of the report provides about the Directorate, the main services, the main
customers and users, overall organization and workflow of the directorate. The second
chapter describes in which sections of the Directorate we have been working in and the work
we have been executing. The third chapter explain practical gained skill, like configuration
networking devices and architectural design on packet tracer and eNSP, how to create domain
control and Active directory management. The fourth chapter explain our project contribution
we done with system administration team centralized FTP-server management and
Centralized printer server management. The fifth chapter describes the overall knowing and
skill gained from the internship. The final chapter of the report sates recommendation and the
conclusion about the internship. The report also discusses the skills that We gained while we
were an intern by combining the theoretical knowledge that We learnt in class with the
practical work gained from the internship period including develop work ethics, self-
confidence, intercommunication skill, team-work skills and entrepreneurship skill

iv
Table of Content
Declaration ……………………………………………………………………ii
Acknowledgment………………………………………………………………iii
Executive Summary…………………………………………………………. iv
List of Figure…………………………………………………………………. vii
List of Abbreviation……………………………………………………….… viii
CHAPTER ONE……………………………………………………………………………1
1 OVERVIEW OF AASTU ICT DIRECTROTE…….…………………………………………... 1
1.1 Background………………….……………………………………………………….….1
1.2 Mission and vision……………………………………………………………………... 2
1.2.1 Mission……………………………………………………………………………. 2
1.2.2 Vision……………………………………………………………………………. 2
CHAPTER TWO………………………………………………………………….……… 3
2 OVERALL INTERSHIP EXPIRENCE………………………………………………3
2.1 Introduction……………………….………………………………………………….…. 3
2.2 Objective Internship.……………………………………………………………………. 3
2.3 How we get there……………. …………………………………………………………. 3
2.4 Work Section in Directorate….…………………………………………………………. 4
2.5 Network Administration Team…………………………………………………………...4
2.5.1 Task Performed…………………………………………………………………. …...4
2.5.2 What we understand about Enterprise network……………………………………… 5
2.5.3 Hierarchical Design Models………………………………………………………….6
2.5.4 Enterprise Network Devices………………………………………………………….7
2.5.5 Visit of AASTU data center………………………………………………………….10
CHAPTER THREE….……………………………………………………………….……14
3 PRACTICAL GAINED SKILL……………….…………………………………........14
3.1 Network design and Simulation…………………………………………………………14
3.2 Basic configuration on Cisco packet tracer………………………………………….......16
3.2.1 Logical Design of Network on packet tracer………………………………………. 18
3.2.2 Configuration for Router…………………………………………………………….18
3.2.3 Configuration on core Switch……………………………………………………….20
3.2.4 Configuration on Access 1 Switch…………………………………………………. 22
3.2.5 Configuration on Access 2 Switch………………………………………………….23
3.2.6 Basic TCP/IP Command we use for end device…………………………………….24
3.3 Basic configuration on eNSP………………….…………………………………………25
3.3.1 Logical Design of Network on eNSP……………………………………………….26
3.3.2 Configuration for Router…………………………………………………………….26
3.3.3 Configuration on core Switch…………………………………………………….….28
3.3.4 Configuration on Access 1 Switch……………………………………………….….29
3.4 System Administration team…………………………………………….……………….29
3.4.1 Domain Name Service……………………………………………………………….30
3.4.2 Active Directory Management……………………………………………………….30
3.5 challenges we faced during internship period……………………………………………34
CHAPTER FOUR…….…………………………………………….……………………...35

v
Project and Contribution ………………………………………………………………………...35

4 Centralized FTP-server and Printer server Management………………………………...35


4.1Introduction…………………………………………………………………35
4.2 Problem statement……………………………………………………………………….35
4.3 Objective…………………………………………………………………………………36
4.3.1 Scope and limitation………………………………………………………………………....36
4.4 Literature Review……………………………………………………………………….36
4.5 Methodology…………………………………………………………………………….37
4.5.1 Basic Operations of FTP…………………………………………………………….37
4.5.2 FileZilla………………………………………………………………………………38
4.6 Conclusion……………………………………………………………………………….41
4.7 Recommendation…………………………………………………………………………41
4.8 Project 2: Centralized Printer Server Management……………………41
4.8.1 Objective, scope and significance……………………………………………………42
4.9 Components of central printing management system…………………………………………….42
4.10 Overview of Network Architecture of CPMS……………………………………….43
4.11 Overview of network printing process………………………………………………44
4.12 Conclusion……………………………………………………………………………45
4.13 Recommendation…………………………………………………………………….45
CHAPTER FIVE……………………………………………………………………….46
5 Overall Benefits Gained from Internship…………………………………………….46
5.1 Practical skills…………………………………………………………………………. .46
5.2 Upgrading theoretical Knowledge……………………………………………………….46
5.3 Interpersonal Communications Skills……………………………………………………46
5.4 Team Playing Skills……………………………………………………………………...46
5.5 Leadership Skills…………………………………………………………………………47
5.6 Work ethics………………………………………………………………………………47
5.7 Entrepreneurship skills…………………………………………………………………...47
CHAPTER SIX…………….………………………………………………………………………...48

6 CONCLUSION AND RECOMMANDATION…………………………………………………48

6.1 Conclusion………………………………………………………………………………48

6.2 Recommendation……………………………………………………………………….48

6.3 Reference ……………………………………………………………………….………49

vi
List of Figures

Figure 1 Enterprise Network Basic Architecture


Figure 2 Firewall
Figure 3 Logical and Physical Router
Figure 4 Logical and Physical switch
Figure 5 Patch panel
Figure 6 Logical and Physical Server
Figure 7 Rack
Figure 8 Chain of server in AASTU Data Center
Figure 9 Logical design of AASTU LAN
Figure 10 First floor physical design
Figure 11 sub-interface of vlan
Figure 12 Logical design of Network on packet tracer
Figure 13 CLI show basic configuration and sub-interfaces on router
Figure 14 show CLI configuration of core switch
Figure 15 show configuration done on Access Switch 1
Figure 16 show CLI configuration done on Access switch 2
Figure 17 shows ipconfig and ping response
Figure 18 tracert
Figure 19 Logical design of Network on eNSP
Figure 20 shows CLI of router on eNSP
Figure 21 Domain Name System Hierarchy
Figure 22 Data Transfer
Figure 23 Control and data connection
Figure 24 Configuration of FileZilla
Figure 25 show when you want to create new site
Figure 26 show ComputerEng. Site is created
Figure 27 Components of a central printing management system
Figure 28 Print clients communicating with server
Figure 29 Network architecture of CPMS

vii
List of Abbreviations

AASTU………………... Addis Ababa Science and Technology University


AC…………………….... Air conditioner
BYOD………………....... Bring-Your-Own-Device
CLI……………………...Command Line Interface
DC………………………Domain Controller
DHCP…………………. Dynamic Host configuration protocol
DMZ………………. …. Demilitarized Zone
DNS…………………… Domain Name System
eNSP……………………enterprise Network Simulation Platform
FTP……………. ……… File Transfer Protocol
HTTP…………………… Hypertext Terminal protocol
ICT……………………… Information Communication Technology
IOT……………………… Internet Of Things
IP………………………. Internet Protocol
IT………………………. Information Technology
LAN…………………… Local Area Network
MAC…………………… Media Access Control
MFT……………. ……… Managed File Transfer
RFC……………... …… Request For Comments
SFTP……………. …..… Secured File Transfer Protocol
SIMS……………………. Student Information Management System
SMTP……………. ……. Simple Mail Transfer Protocol
SSL……………… ……. Simple Secure Layer
SSH…………………… Secured SHell
TCP…………………... Transmission Control Protocol
TLS…………………. Transport Layer Security
UPS……………. ……. Uninterruptible Power Supply
VLAN………….…........ Virtual Local Area Network
VOIP………….............. Voice Over Internet Protocol
WLANs…………….… Wide Area Network

viii
CHAPTER ONE
1 Overview of AASTU ICT Directorates

1.1 Background
Addis Ababa Science and Technology university is one of the best universities in
Ethiopia. AASTU was founded in 2011 under the Directive of the Council of Ministers No.
216/2011. AASTU is a university in the making, and much of its short-term plans aim at
establishing academic infrastructures and facilities, staff recruitment and manpower
development. AASTU mission is to play as forefront changing actor in the technology
transformation of the country by creating strong linkage with industry. In line with the given
strategic direction of Ethiopian development, the university has a mission to be problem
solver of the industry, leading in the nation research, recognized in continental and
international community. To achieve this mission, the university has given special attention
to strengthen the university – industry linkage.

AASTU ICT Directorates is one of the giant directorates found in AASTU under
Administration of Intuitional development and business with respect to vice president.
AASTU to support the learning, research and community service at its premises. ICT
Directorate is in charge of managing the central ICT infrastructure, the databases, interfaces,
portals and websites.
The service delivery is organized into five categories

Technical support
and maintenance

Application system
ICT infrastructure
development and
and services
administration
AASTU ICT
Directorate

Technology for
Training and
Teaching and
consultancy
Learning

Diagram1. AASTU ICT Directorate work flow of the section

1
For efficient task execution, each part is discharged by specialized team Infrastructure. The
University owns a campus LAN system with standardized datacenter, fiber backbone and
horizontal cabling. Wi-Fi is also available to support mobility. Virtualized servers were also
deployed to host available systems. Currently there is exist up to six different available systems
like; Human Resource Information Management System, Student Service Management
System, Integrated Library Management System, E-learning management System, File sharing
System, Online Help-desk Management System

1.2 MISSION and VISION


1.2 .1 MISSION

The AASTU ICT directorate has over all mission to build, deploy and support innovative,
quality and sustainable ICT infrastructure and service that meet the changing ICT needs of
the University.

1.2.2 VISION

The vision of AASTU ICT Directorate is to become a center of excellence in utilizing the
potential of ICT in learning, innovation and education environment for the benefit of AASTU
and the nation’s development as well.

2
CHAPTER TWO

2 Over all Internship Experience

2.1 Introduction

Internship is a field-based practical training experience that prepares trainees for the tasks they
are expected to perform on completion of their programs. The main intention is to produce
practically oriented graduates that meet the required job-related competences of their future
This Internship report is about the skills attained, lessons learnt, challenges, relatedness of
theory covered in class and recommendations during our internship placement at AASTU ICT
directorate from march to June 2019. The report also represents our experiences,
recommendations and benefits of the internship. Internships provide us an opportunity to link
theory with practice, to see the capacity how we can make a solution for real world problem,
to develop both our practical and theoretical knowledge.

2.2 Objectives of internship

✓ provide us to broaden our chance for handling a job and jump starting our careers
✓ To enable us to get hands-on real-life experience
✓ To apply the principles and techniques theoretically learnt into real-life problem-
solving situation
✓ To Strengthen our professional skills and interpersonal communications

2.3 How we get there: - First we gathered information about companies that are available for
the internship. Then we have chosen AASTU ICT Directorate which is the best for our area of
expertise. After that, our University Industry linkage sent a letter for the directorate with
our name on it which they got from our department. Then the directorate called us for an
interview and finally, they send letter of acceptance to the university and they called and
told us that they have accepted our application by giving acceptance letter. And then we
joined the directorate and we have begun our intern work.

3
2.4 Work section in the Directorate

In AASTU ICT directorate the service delivery is organized into five categories. but the one which
we worked us are mainly two, they are:

➢ ICT infrastructure and services team


➢ Training and consultancy team
ICT infrastructure and services team: Inside this team there are, network administration and
system administration team. Training and Consultancy is a very interesting team which give
training and the overall professional advice to every universities academic official’s including
teachers and also for internship student who need their help.

2.5 Network Administration team: are the teams that are responsible for the smooth
running of the AASTU LAN. Their basic roles include, remote hands, support, and
configuration of hardware for the campus network. They are also responsible for maintaining
and expanding of the campus network. Their job is mainly related with our interest, designing
and architecture of enterprise network which is backbone for today’s business and
communication between different organization. Today information sharing is key, so to
facilitate this the optimization of this network infrastructure is the responsibility of us as
computer engineer.

2.5.1 Tasks performed and work done with Network Administration team

From network administration team different documents that have information about
networking device that currently used in AASTU LAN is given to us and our first task is
reading and understanding that material. The material had full of information about both
cisco and Huawei networking devices, that are used in different design and architecture of
enterprise network.

The main objectives of our first task is:

➢ understanding theoretical what is enterprise network mean


➢ Identifying and choosing types of network device we have to use depends on
our company requirement as network administrator
To relate theoretical what we understand about networking into reality we visit AASTU data
center and see different networking devices and also, we see logical design of currently used
AASTU LAN
4
2.5.2 What we understand about enterprise network as Network Admin.

The enterprise network originally represents the interconnection of systems belonging to a


given functional group or organization to primally enable the sharing of resource such as
email, and the evolution towards applications that enable collaboration between users.
Enterprise networks can be found today present within various industries from office
environments to large energy finance and government-based industries, which often comprise
of enterprise networks that span multiple physical locations.

Enterprise level networks need to be evolving- always. Today, networks are overwhelmed by
huge bandwidth consumption to support more users, data, voice, video conferencing, big data
analysis, cloud, virtualization, automation, internet of things (IoT) and more. In addition,
bring-your-own-device (BYOD) policies increase the complexity for the IT manager to
ensure the variety of devices have the necessary service and security. These increasing
demands are stretching networks beyond their capabilities. To manage these demands, you
need your Enterprise network to do more- for less- and you need it fast.

Figure 1 Enterprise Network Basic Architecture

5
2.5.3 Hierarchical Design Models

The hierarchical network design model breaks the complex flat network into multiple smaller
and more manageable networks. Each level or tier in the hierarchy is focused on a specific set
of roles. This design approach offers network designers a high degree of flexibility to
optimize and select the right network hardware, software, and features to perform specific
roles for the different network layers.

A typical hierarchical enterprise network design include is:

A server farm or server cluster is a collection of computer server – usually maintained by an


organization to supply server functionality far beyond the capability of a single machine.
Server farms often consist of thousands of computers which require a large amount of power
to run and to keep cool. At the optimum performance level, a server farm has enormous costs
(both financial and environmental) associated with it. Server farms often have backup
servers, which can take over the function of primary servers in the event of a primary-server
failure. Server farms are typically collocated with the network switches and/or routers which
enable communication between the different parts of the cluster and the users of the cluster.
Server farmers typically mount the computers, routers, power supplies, and related
electronics on 19-inch racks in a server room or data center.

• Core layer: Provides optimal transport between sites and high-performance routing.
Due the criticality of the core layer, the design principles of the core should provide
an appropriate level of resilience that offers the ability to recover quickly and
smoothly after any network failure event with the core block.
• Distribution layer: Provides policy-based connectivity and boundary control
between the access and core layers.
• Access layer: Provides workgroup/user access to the network

Larger enterprise networks implement solutions to ensure minimal network failure, controlled
access and provision for a variety of services to support the day-to-day operations of the
organization. A multi layered architecture is defined to optimize traffic flow apply policies
for traffic management and controlled access to resources as well as maintain network
availability and stable operation through effective isolation and maintenance should problems
in the network occur, without impacting the entire network

6
2.5.4 Enterprise Network Devices

Firewalls: are the most commonly used type of security device in an enterprise network.
used to protect a network from malicious attack and unwanted intrusion. Firewalls are
primarily used to protect one network from another. They are often the first line of
defense in network security. There are several types of firewalls; some run as software
on server computers, some run as stand-alone dedicated appliances, and some work as
just one function of many on a single device. They are commonly implemented between
the LAN and the Internet.

Figure 2 Firewall

Router

A router is a three-layer device that routes packets based on their logical


addresses (host-to-host addressing). A router normally connects LANs and WANs in the
Internet and has a routing table that is used for making decisions about the route.

Logical Router

Physical Router

Figure 3 Logical and Physical Router

Switch : is a computer networking device that connects devices on a computer


network by using packet switching to receive, process, and forward data to the destination
device.

7
Logical Switch

Figure 4 Logical and Physical switch

Patch panels: A patch panel in a local area network (LAN) is a mounted hardware assembly
that contains ports used to connect and manage incoming and outgoing LAN cables. Patch
panels are usually attached to network racks, either above or below network switches and
take up 1.75 inches of space. Patch cords connect ports in the patch panel to ports in the
switch, which creates permanent port connection to the switch that won’t be interrupted
during moves add and changes. Patch panel perform no other function except for acting
as a connector. A Patch panels can be divided based on the number of ports they
contain, with 48-port, 24-port and 12-port panels among the most

Figure 5 Patch panel

Server: is a computer on the network that is give service to another computer. Servers also
run on the same hardware as a computer does, the only difference is the services and the
programs it provides to the client. Servers often present required services over a network,
both to private users within a huge organization or else to public users. Usual computing
servers are application server, file server, print server, web server, database server, mail
server, gaming server, or various other types of servers. Several systems employ the client /
server network model as well as email services and Web sites. Another model, peer-to-peer
networking enables the entire computers to perform as both server and client as required.

8
Logical server

Physical server

Figure 6 Logical and Physical Server

Racks: Rack is a supporting framework that holds hardware modules. In ICT context racks
typically contain servers, hard disk drives and other computing equipment, Racks make it
possible to contain a lot of equipment in small physical foot print without requiring shelving

Figure 7 Rack

There are also different end devices such as computers, laptops, tablets, phones, printers,
Voice over IP(VOIP)and etc

9
2.5.5 Visit of AASTU data center

we have observed the AASTU data center by Mr. Daniel Bayu (Network admin), gives us
clear explanation about the data center facilities of the campus.

Data centers are simply centralized locations where computing and networking equipment is
concentrated for the purpose of collecting, storing, processing, distributing or allowing access
to large amounts of data. AASTU data center is also the place where overall information’s
and data in the university is stored. This data center is found in AASTU in front of
engineering library in ICT directorate, data centers constructed by separating the power
house and data center in different houses. The building structure of this data center is also
different from other rooms buildings. Inside the main room there is labeled floor which is
60cm above the ground for the purpose of installing wire and protective devices.

Inside the data center like fire alarm sensor which is used to detect and warn people
through visual and audio appliances when smoke, fire or other emergencies are present in the
room. These alarms may be activated automatically from smoke or heat sensor and also the
house contain Air conditioning (AC) used to regulates the temperature and humidity. In side
Power system room there is an electric wire which comes from Ethiopia Electric line power
Agency and there is also another data cable comes from Ethiopia telecommunication
corporation as internet service provider for AASTU

Different device we see in AASTU data center

As shown below the rack is contain different server like,

1 VERTUAL(ESXI) SERVER: A virtual server is a server that shares hardware and


software resources with other operating systems (OS), versus dedicated servers. It is cost-
effective and provide faster resource control and used to facilitate centralized
management for enterprise desktops and data center applications

2 DC &DNS-SERVER: domain controller (DC) is a server that responds to security


authentication requests within a Windows Server domain. It is a server on a Microsoft
Windows or Windows NT network that is responsible for allowing host access to
Windows domain resources. A DNS server is used to manages, maintains and processes
Internet domain names and their associated records. In other words, a DNS server is the
primary component that implements the DNS (Domain Name System) protocol and
provisions domain name resolution services to Web hosts and clients on an IP-based
network.

3 SIMS_SERVER (Student Information management system server) is used to hold


student information during registration, and used to record grades for each student before
and after graduation. This is called registrar system.

4 E-LEARNING_SERVER is a networking device that transfers data between an


Ethernet local area network and a computer. it is used to give online learning, online
buying this also called procurement system

5 WEB-SERVER is a program that uses HTTP (Hypertext Transfer Protocol) to serve


the files that form Web pages to users, in response to their requests, which are forwarded
by their computers' HTTps clients. e.g www.aastu.com can be served by this type of
server.
10
6 ETHERNET SERVER: this server provides communication between university to
university in order to share resources within a single fiber optics.

There is not only the server are found in data centers it has also, CORE_SWITCHS which is
a product of cisco which generate DHCP. All switches have basic functionality that includes
maintaining a media access control (MAC) address-to-port table, which is used to
intelligently forward frames out the right ports to the intended destinations. There is
redundant core switches to decrease failure in the device.

WIRELESS_CONTROLLER is used to control the outdoor and indoor device in the


network operation in our building or university. In AASTU, it can manage above 5000 access
point.

Fort Gate it is a role gateway to manage data accessibility and to do access list. It also acts
as firmware by blocking unwanted site and manage bandwidth.

AVAYA is a networked device which is used in video conference system and IP telephone
system

Firewall: used for monitoring and controlling of the network traffic between the servers
located inside the DMZ and internal network (client computers). It also performs
different functionalities like routing (determining paths between the user and the internet
server), determining bandwidth input, used as gateway for incoming and outgoing network
and enables to take security issues.

We Understand different network polices and traffic rules performed inside the network
infrastructure of AASTU. E.g. network resources that need to be available to an outside
public user/customer, such as a web, FTP, and Mail servers. You can place these resources
on a separate network behind the firewall, called a demilitarized zone (DMZ). The firewall
allows limited access to the DMZ, but because the DMZ only includes the public servers,
an attack there only affects the servers and does not affect the other inside networks.
Demilitarized zone (DMZ) is either a physical or logical sub network that contains
networks externally connected services which connect to the internet. It provides another
layer of security for LAN

UPS in the power house An uninterruptible power supply (UPS) is a device that allows a
computer to keep running for at least a short time when the primary power source is lost. It
also provides protection from power surges.

11
Figure 9 Chain of server in AASTU Data Center

12
After we visit data center, we see the following Logical design of AASTU LAN

Figure 10 Logical design of AASTU LAN

13
CHAPTER THREE

PRACTICAL GAINED SKILL

3.1 Network design and Simulation

“The network design you choose to implement should fit the communications problem you
are trying to solve” Mr. Daniel and Mr. Adam our supervisors from network Administration
team. We get training about network design and simulation. To develop our training, they
have given as a project to review the buildings in AASTU which already had the network
access and to design it by the group. Also, the information about ethernet port gathering from
college of social and natural science and college of Electrical and Mechanical Engineering.
The ethernet port of each building has its own code that identify its interface on AASTU
LAN architecture.SB3PnNm and CL5PnNm is for social and natural science and electrical
and mechanical engineering college respectively.

After we have finished collecting of ethernet ports We come to physical design of network
for each block. The network design is done by using Visio Microsoft office software
application. When the physical design of network on each room is done the port is identified
as active and deactivate port depending on the data gathered.

14
Let’s see the physical design on Visio.

P1N15-D P2N12 P2N11 P1N45-D P1N44-D P2N33 P2N34 P2N35 P2N30


P1N39-D P1N24 P1N23 P1N22 P1N21 P2N32-A
P1N46-D P2N29
P1N43-D All D P1N20
P1N14-A
P2N10
P1N16-D
P1N42-D P1N25 P1N31-D
P1N19
P2N1-D
P2N13-A P1N16 P1N17 P1N18
107 108 P1N47-D P1N48-D Lab+109 110 111 112 P1N26 P1N27 P2N28
P1N38-D

P1N37-A
Office
STORE

421 sq. ft.


106

P1N36
P2N26

105 P2N24 P2N25-A


104
P2N5-A

103
P2N18-A
P2N2-A P2N21-A
P2N4-A

P2N6 P2N9 P2N23-A


P2N20-A
P2N19-A
P2N3-A MAIN P2N22-A
GATE

PnNn-for Active Ports

PnNn-For Deactive ports

Figure 11 First floor physical design

Like this one data is gathered for both blocks and Physical design is done for all floor found
on block. The aim of this task not only gathering data and physical design for the floor, first
since we are beginner we see the interfaces or port by your eye as it is active or deactivate
after that we see when Network administrator remotely enter into Switch and shows as
which port is active and the other one is deactivate. Then the design is done and we come to
network architecture, in this case we focus on real world enterprise network architecture and
design.

Logical design and simulation of Network on Packet tracer and eNSP

We deal with packet tracer for cisco and Enterprise Network simulation Platform (eNSP) for
Huawei. Both packet tracer and eNSP are software platform we use in simulator application
for rapid development of TCP/IP knowledge and familiarity with network operation.

15
Packet tracer is a cross-platform visual simulation tool designed by Cisco Systems that allow
users to create network topologies and imitate modern computer networks. The software
allows users to simulate the configuration of Cisco routers and switches using a simulated
command line interface. Packet Tracer makes use of a drag and drop user interface, allowing
users to add and remove simulated network devices as they see fit packet Tracer allows
students to design complex and large networks, which is often not feasible with physical
hardware, due to costs

3.2 Basic configuration on Cisco packet tracer

It’s time to introduce us to the Cisco Internetwork Operating System (IOS). The IOS is what
runs Cisco routers as well as Cisco’s switches, and it’s also what we use to configure these
devices. We are going to show you how to configure a Cisco IOS device using the Cisco IOS
command-line interface (CLI). You can to configure hostnames, banners, passwords, and
more as well as troubleshoot skillfully using the Cisco IOS. We start by Logical design a
network on cisco packet tracer which have Router as DHCP-server, Core switch, access
switch and computers as end device

Requirement: Use router as DHCP-server, configure modes, names, console password,


banners and interfaces on router, Create Sub-interface for VLAN and IP pool

Core switch: Create VLAN, Configure names, console password, banners, interfaces and
port- channel for this switch

Access Switch: Create VLAN, Configure name, console password, interface, banners and
port-channel with core switch

Basic concept needed to configure

1 Administrative Configurations: these are commands that are particularly helpful when
administering your network. We can configure names, banners, console password and
interfaces to our switch or router.

2 Working with DHCP: DHCP is the Dynamic Host Configuration Protocol. It sends IP
information to clients automatically, making configuration of IP addresses on the network
easier and automated. Dynamic Host Configuration Protocol allows properly configured
client computers to obtain IP addresses automatically from a DHCP server. This is done so
that a network administrator does not have to manually configure IP addresses on all the
computers on a network individually. This protocol therefore reduces the amount of system
administration, allowing devices to be added to the network with little or no manual
intervention. We use router as DHCP server in this case and give information the same as
DHCP- server. The IP information obtained might include the following: IP address, Subnet
mask, Gateway list and other advanced option

16
3 Working with creation of sub-interface: one physical interface divided into multiple sub-
interfaces, with one subnet assigned per VLAN, each sub-interface being the default gateway
address for each VLAN/subnet. An encapsulation identifier must be assigned to each sub-
interface to define the VLAN ID of that sub-interface.

Figure 12 Sub-interface for VLANS

4 Working with creation of VLAN routing and configuration on packet tracer: Virtual
LANs (VLANs) offer a method of dividing one physical network into multiple broadcast
domains. However, VLAN-enabled switches cannot, by themselves, forward traffic across
VLAN boundaries. For inter-VLAN communication, a Layer 3 router is required and Port-
channel

Access ports an access port belongs to and carries the traffic of only one VLAN.

Trunk ports: trunks ports can similarly carry multiple VLANs at a time as well.

5 Working with port-channel: A port channel is an aggregation of multiple physical


interfaces that creates a logical interface. You can bundle up to eight individuals
active links into a port channel to provide increased bandwidth and redundancy.

17
3.2.1 Logical Design of Network on Cisco packet tracer

Figure 13 Logical design of Network on packet tracer

3.2.2 Configuration for Router

1 How to Route in different modes: Initial when we enter in to the command line interface of
router or switch on packet tracer we see three types of modes of CLI. These are user exec-
mode privilege mode and Global configuration mode.

Step 1 Route between the mode respectively

User exec mode Limited to basic monitoring commands


Privileged exec mode Provides access to all other router commands
Global configuration mode Commands that affect the entire system

Router> enable……………. // user exec-mode


Router# config terminal…. // Privilege mode
Router(config)#..................// global mode

18
Step 2 Set Hostname, banner and Configure Console Password

Router(config)# hostname DHCP-server…………. // to set the identity of the router

DHCP-server(config)#banner motd "Dangerous Router do not Login"….

DHCP-server(config)#line console 0

DHCP-server(config-line)#password aastu
DHCP-server(config-line)#login
DHCP-server(config)#service password-encryption

Step 3 configuring interface for Router

DHCP-server(config)#interface fa0/0
DHCP-server (config-if)#no shutdown
DHCP-server (config-if)#exit

Step 4 Creating sub-interface for VLAN 10 on router:


DHCP-server (config)#interface fa0/0.10
DHCP-server (config-subif)#encapsulation dot1Q 10
DHCP-server (config-subif)#ip address 192.168.1.1 mask 255.255.255.0
DHCP-server (config-subif)#exit

Step 5 Creating sub-interface for VLAN 20 on router:


DHCP-server (config)#interface fa0/0.20
DHCP-server (config-subif)#encapsulation dot1Q 20
DHCP-server (config-subif)#ip address 192.168.2.1 mask 255.255.255.0
DHCP-server (config-subif)#exit

Step 6 Creating IP DHCP pool for both vlan on router:

DHCP-server(config)#ip dhcp pool vlan10

DHCP-server(dhcp-config)#network 192.168.1.0 mask 255.255.255.0

DHCP-server(dhcp-config)#default-router 192.168.1.1

DHCP-server(dhcp-config)#exit

DHCP-server(config)#ip dhcp excluded-address 192.168.1.1 192.168.1.5

DHCP-server(config)#ip dhcp pool Vlan20

DHCP-server(dhcp-config)#network 192.168.2.0 mask 255.255.255.0

DHCP-server(dhcp-config)#default-router 192.168.2.1

DHCP-server(dhcp-config)#exit

19
Figure 14 CLI show basic configuration and sub-interfaces on router

3.2.3 Configuration on core Switch

Step 1 Switch in different mode respectively depends on command

Switch> enable
Switch # config terminal
Switch (config)#

Step 2 Set Hostname and Configure Console Password

Switch(config)# hostname Core-Switch

Core-Switch (config)#line console 0

Core-Switch (config-line)#password aastu


Core-Switch (config-line)#login
Core-Switch (config)#service password-encryption

Step 3 Create and Configure VLAN on core-switch

Core-Switch #config terminal


Core-Switch (config)#vlan 10

Core-Switch (config-vlan)#exit

Core-Switch (config)#vlan 20

20
Core-Switch (config-vlan)#exit

Step 4 Assign Ports to Different VLANs and Ethernet channel Configuration:

Core-Switch (config)#interface range fa0/4- 7


Core-Switch (config-if-range)#channel-group 1 mode active
Core-Switch (config-if-range)#exit
Core-Switch (config)#interface port-channel 1
Core-Switch (config-if)#switchport mode trunk

Core-Switch(config-if)#switchport trunk allowed vlan 10

Core-Switch (config)#interface range fa0/8- 11


Core-Switch (config-if-range)#channel-group 2mode active
Core-Switch (config-if-range)#exit
Core-Switch (config)#interface port-channel 2
Core-Switch (config-if)#switchport mode trunk

Core-Switch(config-if)#switchport trunk allowed vlan 20

Switch(config)#interface fa0/1
Switch(config-if)#switchport mode trunk

Core-Switch(config-if)#switchport trunk allowed vlan all

Figure 15 show CLI configuration of core switch

On this core switch CLI we create two VLAN, configure two port channels, and interface for
port channel is trunk because it is between switch and switch as well as between switch and
router. Even if on the above picture we do not get all configuration we done on this core
switch by clicking enter button on our computer we can get additional configuration.

21
3.2.4 Configuration on Access 1 Switch

Step 1 Switch in different mode respectively depends on command

Switch> enable
Switch # config terminal
Switch (config)#

Step 2 Set Hostname and Configure Console Password

Switch(config)# hostname AccessSW1

AccessSW1 (config)#line console 0

AccessSW1 (config-line)#password aastu


AccessSW1 (config-line)#login
AccessSW1 (config)#service password-encryption

Step 3 Create and Configure VLAN on AccessSW1

AccessSW1 #config terminal


AccessSW1 (config)#vlan 10

AccessSW1 (config-vlan)#exit

Step 4 Assign Ports to Different VLANs and Ethernet channel Configuration:

AccessSW1 (config)#interface range fa0/4- 7


AccessSW1 (config-if-range)#channel-group 1 mode passive
AccessSW1 (config-if-range)#exit
AccessSW1 (config)#interface port-channel 1
AccessSW1 (config-if)#switchport mode trunk

AccessSW1 (config-if)#switchport trunk allowed vlan 10

AccessSW1 (config)#interface fa0/1


AccessSW1 (config-if)#switchport mode access
AccessSW1 (config-if)#switchport access vlan 10
AccessSW1 (config-if)#exit
AccessSW1 (config)#interface fa0/2
AccessSW1 (config-if)#switchport mode access
AccessSW1 (config-if)#switchport access vlan 10
AccessSW1 (config-if)#exit
AccessSW1 (config)#interface fa0/3
AccessSW1 (config-if)#switchport mode access

AccessSW1 (config-if)#switchport access vlan 10

22
Figure 16 show configuration done on Access Switch 1

Access switch found between end device and core switch. The configuration done on this
switch VLAN 10 is created, Port channel is created and interface with end device access.
Even if on the above picture we do not get all configuration we done on this Access switch by
clicking enter button on our computer we can get additional configuration

3.2.5 Configuration on Access Switch 2

Step 1 Switch in different mode respectively depends on command

Switch> enable
Switch # config terminal
Switch (config)#

Step 2 Set Hostname and Configure Console Password

Switch(config)# hostname AccessSW2

AccessSW2 (config)#line console 0

AccessSW2 (config-line)#password aastu


AccessSW2 (config-line)#login
AccessSW2 (config)#service password-encryption

Step 3 Create and Configure VLAN on AccessSW2

AccessSW2 #config terminal


AccessSW2(config)#vlan 20

AccessSW2 (config-vlan)#exit

Step 4 Assign Ports to Different VLANs and Ethernet channel Configuration:

23
AccessSW2 (config)#interface range fa0/8- 11
AccessSW2 (config-if-range)#channel-group 2 mode passive
AccessSW2 (config-if-range)#exit
AccessSW2 (config)#interface port-channel 2
AccessSW2 (config-if)#switchport mode trunk

AccessSW2 (config-if)#switchport trunk allowed vlan 20

AccessSW2 (config)#interface fa0/1


AccessSW2 (config-if)#switchport mode access
AccessSW2 (config-if)#switchport access vlan 20
AccessSW2 (config-if)#exit
AccessSW2 (config)#interface fa0/2
AccessSW2 (config-if)#switchport mode access
AccessSW2 (config-if)#switchport access vlan 20
AccessSW2 (config-if)#exit
AccessSW2 (config)#interface fa0/3
AccessSW2 (config-if)#switchport mode access

AccessSW2 (config-if)#switchport access vlan 20

Access switch found between end device and core switch. The configuration done on this
switch VLAN 20 is created, Port channel is created and interface with end device access.
Even if on the above picture we do not get all configuration we done on this Access switch by
clicking enter button on our computer we can get additional configuration

3.2.6 Basic TCP/IP Command we use for end device

Ipconfig and ping are some of our best friends when we deal on the end device as
network administrator. These basic TCP/IP commands can help us to analyze and
troubleshoot various networking issues that might occur. They also offer a certain amount
of configurative ability, as well as the ability to create performance baselines. These
commands are used in the Windows command prompt

1 Ipconfig: displays information, it can also be used to make basic configuration changes
and reset certain facets of DHCP and DNS

2 Ping is used to test connectivity to other hosts; here, command-line results tell you whether
a remote host is “alive” on the network.

24
Figure 17 shows ipconfig and ping response

3 netstat: In computing netstat (network statics) is command-line network utility tool that
displays network connections for the Transmission Control Protocol (both incoming and
outgoing), routing tables and a number of network interface (network interface controller
or software defined network interface) and network protocols statics

Tracer: In computing traceroute and tracert are computer network diagnostic commands
for displaying the route (path) and measuring transit delays of packets across an Internet
protocol (IP) network

3.3 Basic configuration on eNSP

Working with eNSP

eNSP (Enterprise Network Simulation Platform) is a free, extensible, graphical network


simulation tool platform provided by Huawei. Mainly do hardware simulation for
enterprise network routers, switches, and perfect present a real device scene support
large-scale network simulation also make us Cando experimental test and learn network
technology in the case of that there is no real device

The implementation of Huawei devices in an enterprise network requires a level of


knowledge and capability in the navigation of the versatile routing platform. The
startup/boot process is the initial phase of operation for any administrator accessing
Huawei based products. Following the initial startup procedure an option for auto-
configuration is comes and the process can be terminated by selecting the Yes option at
the given prompt.

Within eNSP also we did the same task even if eNSP is used for Huawei device like
Router and switch configuration. For this also we done DHCP configuration by using
router as DHCP-Server and creating VLAN for switch.
25
On CLI of eNSP we deal with four command line view

➢ User view: View running status and statics of the device


➢ System view: set the system parameters of the device
➢ Interface view: Configure interface parameters
➢ Protocol view: Configure most routing protocol parameters

The presence of chevrons identifies that the user is currently in the user view whereas square
bracket show that transition to the system view has occurred.

3.3.1 Logical design of Network on eNSP

Figure 19 Logical design of Network on eNSP

3.3.2 Configuration on Router

Step 1 Set Sysname , Configure Console Password and banner

<Huawei>system-view
Enter system view, return user view with Ctrl+Z.
[Huawei]sysname DHCP-server
[DHCP-server]header shell information "Do Not Reboot this router"
[DHCP-server]user-interface console 0
[DHCP-server-ui-console0]authentication-mode password
DHCP-server-ui-console0]set authentication password cipher aastu

Step 2 configuring interface for Router

[DHCP-server]interface GigabitEthernet 0/0/0


[DHCP-server-GigabitEthernet0/0/0]undo shutdown

In order to allow communication over a single trunk interface, it is necessary to logically


segment the physical link using sub-interfaces Each sub-interface must be assigned an ip
address in the same network segment as the VLAN that it is created for as well as 802.1Q
encapsulation to allow for VLAN association as traffic is routed between VLANs

26
Step 3 Creating sub-interface for VLAN 10 on router:

[DHCP-server-GigabitEthernet0/0/0]interface g0/0/0.10
[DHCP-server-GigabitEthernet0/0/0.10]dot1q termination vid 10
[DHCP-server-GigabitEthernet0/0/0.10]ip address 192.168.1.1 255.255.255.0
[DHCP-server-GigabitEthernet0/0/0.10]arp broadcast enable
Step 4 Creating sub-interface for VLAN 20 on router:
[DHCP-server-GigabitEthernet0/0/0.10]interface g0/0/0.20
[DHCP-server-GigabitEthernet0/0/0.20]dot1q termination vid 20
[DHCP-server-GigabitEthernet0/0/0.20]ip address 192.168.2.1 255.255.255.0
[DHCP-server-GigabitEthernet0/0/0.20]arp broadcast enable

Step 5 Creating IP DHCP pool for both VLAN on router


The DHCP service is not enabled by default enable the DHCP service on the routers and then
create a global IP address pool. Create an address pool named pool10 for VLAN 10 and
address pool named pool20 for VLAN 20. Configure attributes for pool10 and pool20
individual address range, gateway, dns-list and IP lease period.
[DHCP-server]dhcp enable
[DHCP-server]ip pool pool10
[DHCP-server-ip-pool-pool10]network 192.168.1.0 mask 24
[DHCP-server-ip-pool-pool10]gateway-list 192.168.1.1
DHCP-server-ip-pool-pool10]lease day 2
[DHCP-server-ip-pool-pool10]dns-list 8.8.8.8
[DHCP-server-ip-pool-pool10]excluded-ip-address 192.168.1.20 192.168.1.30
[DHCP-server]interface GigabitEthernet 0/0/0.10
[DHCP-server-GigabitEthernet0/0/0.10]dhcp select global

Pool20 for VLAN 20


[DHCP-server]ip pool pool20
[DHCP-server-ip-pool-pool20]network 192.168.2.0 mask 24
[DHCP-server-ip-pool-pool20]gateway-list 192.168.2.1
DHCP-server-ip-pool-pool20]lease day 1
[DHCP-server-ip-pool-pool20]dns-list 4.4.2.2
[DHCP-server-ip-pool-pool20]excluded-ip-address 192.168.2.21
[DHCP-server]interface GigabitEthernet 0/0/0.20
[DHCP-server-GigabitEthernet0/0/0.20]dhcp select global

Figure 20 shows CLI of router on eNSP

27
3.3.3 Configuration on core Switch

Step 1 Set Sysname , banner and Configure Console Password

<Huawei>system-view
[Huawei]sysname CoreS
[CoreS]header shell information "THIS IS CORE SWITCH"
[CoreS]user-interface console 0
[CoreS-ui-console0]authentication-mode password
[CoreS-ui-console0]set authentication password cipher aastu

Step 3 Create and Configure VLAN on core-switch

[CoreS]vlan 10
[CoreS-vlan10]q
[CoreS]vlan 20
[CoreS-vlan20]q

Link aggregation refers to the implementation of port link that act as a direct point-to point
link, between two devices such as peering routers, switches, or a router and switch
combination at each end of link

Step 4 Assign interface to Different VLANs and Link aggregation Configuration:

[CoreS]interface Eth-Trunk 1
[CoreS-Eth-Trunk1]mode lacp
[CoreS]interface Ethernet 0/0/6
[CoreS-Ethernet0/0/6]eth-trunk 1
[CoreS-Ethernet0/0/6]interface Ethernet 0/0/7
[CoreS-Ethernet0/0/7]eth-trunk 1
[CoreS-Ethernet0/0/7]interface Ethernet 0/0/8
[CoreS-Ethernet0/0/8]eth-trunk 1
[CoreS-Ethernet0/0/8]interface Ethernet 0/0/9
[CoreS-Ethernet0/0/9]eth-trunk 1
[CoreS]interface Eth-Trunk 1
[CoreS-Eth-Trunk1]port link-type trunk
[CoreS-Eth-Trunk1]port trunk allow-pass vlan 10
[CoreS]interface Eth-Trunk 2
[CoreS-Eth-Trunk2]mode lacp
[CoreS]interface Ethernet 0/0/10
[CoreS-Ethernet0/0/10]eth-trunk 2
[CoreS-Ethernet0/0/10]interface Ethernet 0/0/11
[CoreS-Ethernet0/0/11]eth-trunk 2
[CoreS-Ethernet0/0/11]interface Ethernet 0/0/12
[CoreS-Ethernet0/0/12]eth-trunk 2
[CoreS-Ethernet0/0/12]interface Ethernet 0/0/13
[CoreS-Ethernet0/0/13]eth-trunk 2
[CoreS]interface Eth-Trunk 2
[CoreS-Eth-Trunk1]port link-type trunk
[CoreS-Eth-Trunk1]port trunk allow-pass vlan 20
28
[CoreS]interface GigabitEthernet 0/0/1
[CoreS-GigabitEthernet0/0/1]port link-type trunk
[CoreS-GigabitEthernet0/0/1]port trunk allow-pass vlan all

3.3.4 Configuration on Access 1 Switch

Step 1 Set Sysname , banner and Configure Console Password

<Huawei>system-view
[Huawei]sysname AccesS1
[AccesS1]header shell information "THIS IS ACCESS SWITCH 1 "
[AccesS1]user-interface console 0
[AccesS1-ui-console0]authentication-mode password
[AccesS1-ui-console0]set authentication password cipher aastu

Step 2 Create and Configure VLAN on Access-switch1

[AccesS1]vlan 10
[AccesS1-vlan10]q

Step 3 Assign interface to Different VLANs and Link aggregation Configuration:

[AccesS1]interface Eth-Trunk 1
[AccesS1-Eth-Trunk1]mode lacp
[AccesS1]interface Ethernet 0/0/6
[AccesS1-Ethernet0/0/6]eth-trunk 1
[AccesS1-Ethernet0/0/6]interface Ethernet 0/0/7
[AccesS1-Ethernet0/0/7]eth-trunk 1
[AccesS1-Ethernet0/0/7]interface Ethernet 0/0/8
[AccesS1-Ethernet0/0/8]eth-trunk 1
[AccesS1-Ethernet0/0/8]interface Ethernet 0/0/9
[AccesS1-Ethernet0/0/9]eth-trunk 1
[AccesS1]interface Eth-Trunk 1
[AccesS1-Eth-Trunk1]port link-type trunk
[AccesS1-Eth-Trunk1]port trunk allow-pass vlan 10

the same configuration with Access switch 1 is done on this access switch 2 and basic
TCP/IP command we use on the end device for eNSP is also the same as packet tracer.

3.4 System Administration team: this team is other part of service delivery team for
AASTU community in ICT directorate. They are mainly responsible for the configuration
and reliable operations of computer systems and different server found in AASTU data
center. They are also responsible to installing all the required applications to support the
campus, and to ensure that all the service is running. On the other hand, they check the
29
Internet connection in the office is working, the mail service is running and processing emails
that are sent and received by all staff within the campus.
From this team we get training about domain name service (DNS) and active directory
management. In addition to this training two projects centralized FTP-server Management
and centralized printer server management is given to us. From these projects we get basic
knowledge and understanding, as well as role of system administrator in real world.

3.4.1 Domain Name Services

Every computer on the public Internet has a unique numeric address similar to the uniqueness
of a telephone number, which is a string of numbers that is difficult for most people to
remember This string is called the IP address in the case of computer on the network. To
make it easier to find given location on the Internet, the Domain Name System, (DNS), was
invented. DNS was designed as a tree structure, where each named domain is a node in the
tree. The top-most node of the tree is the DNS root domain (.), under which there are
subdomains, such as .com, .edu, .gov, and .mil as shown below.

Figure21 Domain Name System Hierarchy

3.4.2 Active Directory Management

Active Directory (AD) is a directory service that Microsoft developed for windows
domain networks. Initially, Active Directory was only in charge of centralized domain
management. Active Directory Domain Service (AD DS) is called a domain controller.
It authenticates and authorizes all users and computers in a Windows domain type network—
assigning and enforcing security policies for all computers and installing or updating
software. For example, when a user logs into a computer that is part of a Windows domain,
Active Directory checks the submitted password and determines whether the user is a system
administrator or normal user. Also, it allows management and storage of information,
provides authentication and authorization mechanisms, and establishes a framework to
deploy other related service

30
How we add client to domain controller server

Step 1 control panel->system then click change setting

Step 2 system properties-> [computer Name] click change button

31
Step 3 Two blank space is come so, for computer name we enter the name of client computer
as it is comfortable for us to control and manage central and for the second blank space, we
choose domain and enter domain name of our organization example in our case we use
aastu.edu.et then click ok

STEP 4 Click ok and then the below page is come but it is secure and only system
administrator was entered.

32
We see How Remotely connect to the Kaspersky server and install for client computer and
central manage all aastu desktop computers under one domain name.

1 Click on desktop bar.


2 Search for remote desktop connection and click
3 then Inter IP address of server (10.2.3.21 for AASTU) user of the computer and click
connect.

4 Then inter the credential (password) and click ok.

6 At this time, it is connecting

33
this is show when remotely we access Kaspersky server on our computer

In generally we see also how central manage all computers found in the organization by
adding into in one domain name. Installing Kaspersky centralized antivirus for all AASTU
desktop computers manage these computers security as client does not have full permission
to install and uninstall the application. Also, we see how Remote Desktop Connection access
the server and other services found in data center.

3.4 challenges we faced during internship period

Inadequate and delay for supervision facilitation. This was generally a weakness on the side
of the university. But at least the University ensured that internships are offering meaningful
learning experiences for their students by providing evaluation sheets which provide feedback
from employers to university. In general, we are not facing such difficult challenges in our
internship period because we are familiarly with the AASTU ICT directorate. But on the
beginning of our internship time when we start to gather data of Ethernet port on the block,
there is a misunderstanding from the block administrator and some employ in the office.
Because at that time we are not get Identity card (ID ) that express us as ICT directorate
employ member. We solve this issue by talking to people decently and in politely way and
after few days we got (ID) and done our work in smoothly and attractive way with our team

34
CHAPTER FOUR

PROJECT AND CONTRIBUTION

4 Centralized FTP-server management and Centralized Printer server management

4.1 Introduction

Centralized FTP server is backbone of today communication in this networked world. It use
the concept of standard network protocol used for the transfer of computer files between a
client and server on computer network. FTP is built on a client-server model architecture
using separate control and data connections between the client and the server. Use port 21 for
control connection and port 20 for data connection. To transfer file using FTP, you require to
an FTP server, a user account and FTP client or application. Generally, most FTP servers
require a username and a password in order to make a connection.

A central managed file using FTP system can be thought of as one huge centralized file
transfer system completes with all the visibility, reporting, logging, security, tracking,
integrations with your security architecture, failover and assured delivery features already
built-in by design (as opposed to add-ons). These are enterprise-class solutions upon which
core processes, like the medical billing and payment systems of a hospital, can be built. For
instance, a single implementation may include multiple transfer servers, workflow
automation systems and cloud-based transfer services all under management from a
centralized console.

4.2 Problem statement

Nowadays big data transfers make people’s life difficult. During the big data transfer, people
waste so much time. Further-more considering the safety of cloud systems, people prefer to
keep their data at the cloud systems instead of their computers. When backups getting too
much size, their data transfer becomes nearly impossible.

There is also the issues of inefficiency of storage device and we may lost our data on the
computer by natural or man-made problems like stolen our computer, it may randomly
formatted by other people or yourself, there is also the issue of limited space on the computer.

35
4.3 Objective

The general objective of this projects is managing centralized FTP-server for sharing of huge
files between user. The specific objective are as follows:

➢ Using centralized FTP server for huge data transfer and store data
➢ Sharing of centralized files for all user of the server
➢ Solve space limitation problem currently found on computers
➢ Minimize cost of storage and bandwidth for data sharing

4.3.1 Scope and limitation

4.3.1.1 scope
✓ Explain operation of FTP for transferring data between FTP server and local
machines.
✓ Provide central managed files which only permitted user is used and share
files to others

4.3.1.2 Limitations

Centralized FTP dependent file transfer is not secure, Because FTP uses only
username and password as criteria to access shared files or in some case the user may
enter anonymously without any requirement. As well as the data is transferred without
any encryption so this is limitation of FTP

4.4 Significance

All user of computer that want to share their file central managed with others can use.
Especially company that have work in different place and want to share huge files
with other of its employees. Also, as individual person when someone want to store
its file on FTP server. Web developers also use FTP server

4.5 Literature Review

A server is a system that responds to requirements across a computer network to


make available, or assist to provide, a network examination. Servers also run on the same
hardware as a computer does, the only difference is the services and the programs it
provides to the client. In many situations, computers offer many services and it has series
of servers in sequence. Servers generally work as client-server architecture.
36
File Transfer Protocol is archetypal network protocol worn to transfer files as of
single host to another host in intemperance of a TCP-predestined network, like Internet.
FTP is assembling on client-server propose as well as utilize separate categorize plus data
connections amongst the consumer with the server. Data is transferred by some applications
such as electronic mail, file transfer, web documents, so bandwidth and timing are important
things for data transfer.

Figure 22 Data Transfer

you want to transmit small data; you need small rate bandwidth such as the application of
internet telephony encodes voice at 32 kbps. However, if you have huge files and want to
transmit them, you need more bandwidth. This is more advantages than small rate bandwidth.
Timing is important when you transmit the data. Applications should provide quick data
transferring to save time. For example, real-time applications of internet telephony, virtual
environments, multiplayer games or etc.

4.5 Methodology

4.5.1 Basic Operations of FTP

To transfer file using FTP, you require to an FTP server, a user account and FTP client or
application. Generally, most FTP servers require a username and a password in order to make
a connection. However, some servers may allow users to connect as anonymous users with no
username or password. FTP is founded on a client-server architecture which clients are
transferring files to a server and receiving files from a server as shown in Figure 2. FTP
period consists two connections which are transmitting standard FTP commands, responses
and transferring the actual data

1 control connection
For sending control information like user identification, password, commands to change the
remote directory, commands to retrieve and store files, etc., FTP makes use of control
connection. The control connection is initiated on port number 21.
37
2 data connection
For sending the actual file, FTP makes use of data connection. A data connection is initiated
on port number 20. FTP sends the control information out-of-band as it uses a separate
control connection. Some protocols send their request and response header lines and the data
in the same TCP connection. For this reason, they are said to send their control information
in-band. HTTP and SMTP are such examples.

Figure 23 Control and data connection


FTP communication process
FTP needs four steps to make communication between FTP server and FTP client

Step 1 Request: This request is initiated by the client allowing the file transfer protocol to
begin. Sub-commands used for this step is store, delete, lookup, open and close. Allows client
to interact with the server before they download or upload a file.

Step 2 Response: server will inform the client that it is ready to either receive or send a file.
The sub-commands used in this transaction are ready to send and ready to reactive
Step 3 Transfer: The actual transaction will occur in this step.

Step 4 Terminate: two types of terminate transactions occur at this step these are successful
terminate and unsuccessful terminate

4.5.2 FileZilla

How to use FTP to transfer files between servers and local machines by using FileZilla free
software client

The common methods of making an FTP connection using FileZilla are;

1 username and password login: This is a restrictive method where only users with an
account can access the server. This common when there is a need for users to upload or
download files to and from the server.

FileZilla is a free software, cross-platform FTP application, consisting of FileZilla client and
FileZilla server. client binaries are available for window, Linux, and macOS, server binaries
are available for windows only. Both server and client support FTP and FTPS, unlike some

38
other FTP clients, FileZilla Client does not implement a workaround for an error in the IIS
server which causes file corruption when resuming large file downloads

Step 1 Configuring FileZilla FTP client

Figure 24 Configuration of FileZilla

Step 2. Click File and then Site Manager.

Figure 25 show when you want to create new site

Step 3. Click on New Site.


step 4. Type the following information into the fields provided:
(1) Site Name: ComputerEng.
(2) Host:192.168.56.1 as host we use IP address of computer on which server is found
(3) Protocol: FTP – File Transfer Protocol
(4) Encryption: Require implicit FTP over TLS
39
(5) Logon Type: Normal
(6) User: ftp-user
(7) Password: user password
(8) Click “Connect” to access your ftp directory

Figure 26 show ComputerEng. Site is created


Uploading files using FileZilla client:
1. Start the FileZilla FTP client. Connect to the server you just configured.
2. To upload files to the server, select all files you wish to upload from the window on the left
and right-click on mouse, and then select Upload.
Downloading files to your computer using FileZilla client:
3. To download* files from the server to your computer, select all files you wish to download
from the window on the right.
4. In the left window, select the location on your computer where you wish to save the files.
5. Right-click on mouse, and then select Download.

Central managing file transfer using ftp adds many of the management features
required as file transfer needs grow from occasional and non-critical to high-volume
and mission-critical. Not so obvious from the name, MFT solutions also provide a large
number of security and compliance features that are either unavailable or just too hard
to add on to off-the-shelf FTP products

A central managed file using FTP system can be thought of as huge centralized file transfer
system complete with all the visibility, reporting, logging, security, tracking, integrations
with your security architecture, failover and assured delivery features already built-in by
40
design (as opposed to add-ons). These are enterprise-class solutions upon which core process,
like the medical billing and payment systems of a hospital, can be built. For instance, a single
implementation may include multiple transfer servers, workflow automation systems and
cloud-based transfer services all under management from a centralized console

.
4.6 Conclusion

In general, centralized FTP-server is used to transfer huge files between server and clients.
Since the file is stored central on one place the user can easily access it at any time and any
place. This centralized FTP-server solve space limitation found currently on computers

From three common methods of using FTP to transfer files like, web browser, command line
FTP and Graphical user interface FTP client In our project we use FileZilla which is widely
used in FTP transfer files.

4.7 Recommendation

Even if FTP is the oldest protocol used for many years, FTP was not designed to be a secure
protocol, and has many security weaknesses. So, we recommend sing a different, more secure
protocol that can handle the job, e.g. Security shell File Transfer protocol (SSH) or Secure
copy protocol (SCP).

4.8 Project 2: Centralized Printer Server Management

Centralized printing is an approach to managing print requirements in a company with a


number of different locations. A print server, which uses software to manage all requests for
printing from individual sites and users, is based in a central location. Print requests from
users reach the print server via a network. Printers are also connected to the print server via a
network. A central location makes it easier for administrators to manage and prioritize print
requests and reduces your hardware, software and support costs.

Central printing management system (CPMS) is an innovative technology specializing in the


development of print and documents management solution. It is a service offered to
streamline the use of printing device, minimize the cost associated with printing and control
of printing to boost productivity. It also improves document security and environmental
sustainability by drastically reducing the number of printing devices within the organization

41
4.8.1 Objective, scope and significance

The main aim of this project is to design a central printing management system.

Specific objective

✓ Cost reduction
✓ Control and monitoring printing central
✓ Improving environmental performance and minimizing environmental impacts
Scope
The scope of this projects: Evaluate the existing printing system to identify weakness and
configure the print server and to know how the system is work theoretically
Limitation: single point of failure (disaster recovery implications) cause over all failures
: Centralized printing makes heavy demands on your network
Significance of central print server
The usage of individual desktop printers will be minimized. They will be removed as the new
central print devices are rolled out, unless an approved business case allows them to be kept
as exceptions.

• Reduce power usage


• Allow ease of central management and maintenance thereby improving reliability
• Cash savings through a reduction in overall print/copy costs.

4.9 Components of central printing management system

The components of a central printing management system comprise of both hardware and
software. Each of these components provides set of related functions in the system. The
Figure below describes the various components of a central printing management system.

Figure 27: Components of a central printing management system


42
1 Multifunctional printing devices: A multifunctional print device is a hardware device that
is used for printing purposes. The resolution of print device is measure in dots per inch (DPI).
The clarity of the printing device depends on the resolution. Hence, the higher the dots per
inch (DPI), the greater the resolution. The print device is often referred to as multifunction
units.

2 Print servers: The print server is regarded as a network device, software application or a
computer that connect printing device to the clients over a network to administer print
request. It is a device that receives print jobs from clients and sends them to a print device.

3 Print Driver: This is software that converts the print jobs generated by applications into an
appropriate string of commands for a specific print device. The printer driver helps renders
prints jobs into a language the print device can use to reproduce what one intended to print.
Hence, it is often referred to as a translator a print processor.

4 Print clients (work station): A print client is an end user’s device or system that can
initiate a print request to the print server. It could be a computer system, smart phones or
other mobile devices connected via the Internet to the print server within the same Network
as shown in Figure below (copied from en.wikipedia.org/wiki/client-server-model) below.

Figure 28 : Print clients communicating with server

5 Printer: This is the software interface through which a computer or a client communicates

with the print device. It is a software entity the client prints through. The installation of the

printer depends on it intends purpose. In the case of a remote printing, the printer resides on

the print server. However, if it is local printing or print jobs redirected to a print device, the

printer resides on the print client or workstation.

4.10 Overview of Network Architecture of CPMS

43
The central print management system is a printing service that will be activated on a server

print server. This printing service depends on other coexisting services that are been run on

the server. These various services or servers that must exist for print server to function

properly are: Lightweight Directory Access protocol server (LDAP) is a standard application

protocol used over an Internet Protocol (IP) Network for managing and accessing the

distributed directory information services. Domain name System server (DNS) DNS provides

for forward and reverse look up queries. Hence; it resolves an IP address to a computer name

and the hostname to an Internet protocol (IP) address respectively. Dynamic Host

Configuration Protocol (DHCP) This is another auxiliary service that must exist for printing

services to functions properly within the network.

4.11 Overview of network printing process

the interconnectivity between the print server and other auxiliary services within the

network. On boot up, the DHCP client (Workstation) request for an IP configuration, subnet

mask default gateway, DNS server configured for the network. Then the DHCP server will

acknowledge those requests. The DNS client sends a request to resolve the computer name to

IP address. The system administrator creates a username account and gives privileges and

roles. On logging on to the domain, the active directory authorizes the users to inherit this

role to functions within the network. The user sends a print job to the print server through the

software interface and the print server in-turn reply when the job has been printed. User log

into the network print device, active directory authenticates the user and forward reply to the

print server. Print server forward queue job for the print device to release or pull the print

jobs

44
Figure 29 Network architecture of CPMS

Currently since we have no real printer server on our hand, we use software platform called
Papercut to show how we central manage this printer server. using papercut NG/MF software
to manage central print server Papercut NG/MF is a comprehensive print management system
designed to seamlessly monitor and control your resources with easy to use administrative
and user tools that can be securely.
4.12 Conclusion
From this project we concluded the necessary printing system is central printing management
system types especially at this time in large company or campus and other wide places. But
CPMS also have advantages and disadvantages part. We know this project the difference
between central print management system and direct ip printing system/old printing system
and we can select what is the best one from the two-printing system based on cost reduction,
time saving etc. We know also from our projects what is components of CPMS detail and one
of the best types of print management software papercut and know also what is the workflow
process of papercut. accessed from anywhere on the network though a web browser.
4.13 Recommendation
Central print server is Loss of autonomy in local sites, Implementation requires multiple hops
over the network consuming bandwidth and related latency of print times and Single point of
failure (disaster recovery implications). So, we recommend the best systems use to prevent
this limitation for the future.

45
CHAPTER FIVE

5 Overall Benefits Gained from internship

5.1 Practical Skills


One of the major benefits of our internship was developing our practical skills and operating
on real devices; that is, we have got a free access to some of the enterprise networking devices
that we were learning in the class in the past years. For example, we enter into Access switch
by using console port and see different interface that found on them. We can also configure
router, switch and other end devices on packet tracer and eNSP, software platforms used for
simulation and logical design of enterprise network. which we started experiencing a real-world
phenomenon of enterprise networking. In addition to this we learn how central controller
services in the organization by using domain name of the organization on the controller server.

5.2 Upgrading Theoretical Knowledge

For effective operation of any practical work a clear understanding of the theoretical knowledge
is required. Starting from day one we started reading a training material for CISCO and Huawei
devices So, it was very simple for us to upgrade what we learned in the class since their
document was precise and easy to understand. In addition, we were ordered to read some
documents that were helpful for specific tasks to be taken. All over, the projects, that we were
working with the system administration team, also other practical trainings helped us to ask
questions for ourselves and discover new knowledge.

5.3 Interpersonal Communication Skills

One of the important things we have found from our internship experience is that we have
improved our personal communication skills; from the trainings our mentors gave us we have
how developed the skills communication with our fellow associates.

5.4 Team Playing Skills


This skill was not that much difficult to adapt since we have already done some projects and
assignments as a team in the past four years of university stay. The additional skills we
learned through the internship are that the knowledge of a team is stronger and more effective
than individual person’s effort. Again, we learned the importance of sharing information and
knowledge between the team.

46
5.5 Leadership Skills

The internship was an important experience to practice the assets of leadership; and because
all our mentors were team leaders, we got the access to know more about leadership. In doing
our project we were able to improve our self-confidence as we had the willingness and
inspiration to face any difficulty in the project; this helped us to grow emotionally to learn
from our failure and success; this in turn, gave us the chance to learn about project
management, the technical approach methodology of a project. Above all we have grasp
leadership skills such as self-confidence, accountability, decision making and so on.

5.6 Work Ethics

In our internship period we understood that ethics is one of the valuable resources a person
can have in the real world; understanding this fact we tried to get closer to others in more
ethical way so that we can be more beneficiary from them. In our internship period we have
developed both our personal and professional ethics; the former being related with how we
should act towards other people while the other related to the ethics we have to acquire
certain tasks done.

5.7 Entrepreneurship skill

Above all this internship has thought as the entrepreneurship skills; working environment had
been a good starting place to enhance our entrepreneur capabilities. Indeed, we learned a lot
on improving critical thinking and problem-solving skills. The change from school to
workplace itself was another learning opportunity, conditioning us to adapt to change and to
be able to take responsibility.

47
CHAPTER SIX

6 Conclusion and Recommendation

6.1 Conclusion

In generally this internship program give us a chance not only to work with AASTU ICT
Directorate but also a chance to learn from the good experts. We would like to thank AASTU
ICT Directorate, for introducing us to this great opportunity in which we have developed our
self both theoretical and practical. We also train and learn that anything related to information
communication technology is skill, rather than theory which developed in doing practical like
this in internship period.

Finally, all we can say is that from this internship period in addition to formal academic
knowledge, we were able to get the general experience in every other aspects of life; this
experience were unforgettable and we believe it shaped our personality and behavior by
helping us to be optimistic in our future tasks, to be stronger to overcome challenges and be
successful, to develop critical thinking ability and problem solving skills.

6.2 Recommendation

As we are Product of AASTU and have relationship with directorates beyond this internship
period, from what we observed we recommended the followings main points for directorates

➢ Even if AASTU ICT Directorate are try their best, the demand of AASTU community
for Internet access is not answered. We hear many complain from employ in office
and students when we gather the ethernet port of the blocks. However, we see in
some offices there is many ports but not used, so give it for other office.
➢ Also, there is many ethernet ports damaged in both AASTU Libraries and old
buildings like, Administration, Registral and college of Social and Natural science so
repair these ports and open other interface for users.

48
Reference

[1] AASTU LAN infrastructure design document


[2] CCNA and HCNA routing and switching study guide

[3] Cerf, V. G., & Kahn, R. E. A protocol for packet network intercommunication. IEEE
Transactions on Communications, 22, 5 (1971).
[4] Dag Henning Liodden Sørbø “Increasing the efficiency of a file server by removing
redundant data transfers in popular downloads”
[5] https://en.wikipedia.org/wiki/File_Transfer_Protocol

49

You might also like