Internship Report PDF
Internship Report PDF
Internship Report PDF
UNIVERSITY
COLLEGE OF ELECTRICAL AND MECHANICAL ENGINEERNG
Internship Report
SUBMITTED BY:
NO GROUP-Members ID-NO.
June 2019
i
Dedications
This internship report is dedicated to our parents, and all our friends for being with us and
helping us in each and every difficulty we have faced in this internship report completion and
to our teachers and all those who thought us, trained us and polished our abilities at AASTU
ICT DIRECTORATE.
ii
Acknowledgment
First and foremost, our grateful thanks to almighty God for keeping us safe to finish our
internship program healthy and happy. Next the special thank goes to our helpful supervisor
Mr. Yonas Tesfaye, department head of computer engineering. The supervision and support
he gave us truly helped us in the progression and smoothness of the internship program. The
co-operation is much indeed appreciated.
Furthermore we would also like to acknowledge with much appreciation the crucial role of
the members of ICT directorate specially Mr. Daniel and Mr. Tesfaye, who gave the
permission to use all required equipment and the necessary materials to complete our project
on network configuration and computer maintenance Huawei eNSP and cisco packet tracer in
configuration of router and switch and the computers that have to be maintained for practice
purpose. Last but not least, many thanks go to Mr. Daniel who have invested his full effort in
guiding the team in achieving the goal. We have to appreciate the guidance given by other
supervisors.
iii
Executive summary
This report explains the overall internship experience starting with the background of the
internship hosting company that is AASTU ICT Directorate which is located in Addis Ababa
Science and Technology University. The report tries to discuss about the four months stay
experiences, benefits gained from the internship, conclusion and recommendations for the
hosting directorate, it discuss in detail about the trainings that we took in the Directorate, and
the projects that we did during our time as an intern. The report contains Six main chapters.
The first chapter of the report provides about the Directorate, the main services, the main
customers and users, overall organization and workflow of the directorate. The second
chapter describes in which sections of the Directorate we have been working in and the work
we have been executing. The third chapter explain practical gained skill, like configuration
networking devices and architectural design on packet tracer and eNSP, how to create domain
control and Active directory management. The fourth chapter explain our project contribution
we done with system administration team centralized FTP-server management and
Centralized printer server management. The fifth chapter describes the overall knowing and
skill gained from the internship. The final chapter of the report sates recommendation and the
conclusion about the internship. The report also discusses the skills that We gained while we
were an intern by combining the theoretical knowledge that We learnt in class with the
practical work gained from the internship period including develop work ethics, self-
confidence, intercommunication skill, team-work skills and entrepreneurship skill
iv
Table of Content
Declaration ……………………………………………………………………ii
Acknowledgment………………………………………………………………iii
Executive Summary…………………………………………………………. iv
List of Figure…………………………………………………………………. vii
List of Abbreviation……………………………………………………….… viii
CHAPTER ONE……………………………………………………………………………1
1 OVERVIEW OF AASTU ICT DIRECTROTE…….…………………………………………... 1
1.1 Background………………….……………………………………………………….….1
1.2 Mission and vision……………………………………………………………………... 2
1.2.1 Mission……………………………………………………………………………. 2
1.2.2 Vision……………………………………………………………………………. 2
CHAPTER TWO………………………………………………………………….……… 3
2 OVERALL INTERSHIP EXPIRENCE………………………………………………3
2.1 Introduction……………………….………………………………………………….…. 3
2.2 Objective Internship.……………………………………………………………………. 3
2.3 How we get there……………. …………………………………………………………. 3
2.4 Work Section in Directorate….…………………………………………………………. 4
2.5 Network Administration Team…………………………………………………………...4
2.5.1 Task Performed…………………………………………………………………. …...4
2.5.2 What we understand about Enterprise network……………………………………… 5
2.5.3 Hierarchical Design Models………………………………………………………….6
2.5.4 Enterprise Network Devices………………………………………………………….7
2.5.5 Visit of AASTU data center………………………………………………………….10
CHAPTER THREE….……………………………………………………………….……14
3 PRACTICAL GAINED SKILL……………….…………………………………........14
3.1 Network design and Simulation…………………………………………………………14
3.2 Basic configuration on Cisco packet tracer………………………………………….......16
3.2.1 Logical Design of Network on packet tracer………………………………………. 18
3.2.2 Configuration for Router…………………………………………………………….18
3.2.3 Configuration on core Switch……………………………………………………….20
3.2.4 Configuration on Access 1 Switch…………………………………………………. 22
3.2.5 Configuration on Access 2 Switch………………………………………………….23
3.2.6 Basic TCP/IP Command we use for end device…………………………………….24
3.3 Basic configuration on eNSP………………….…………………………………………25
3.3.1 Logical Design of Network on eNSP……………………………………………….26
3.3.2 Configuration for Router…………………………………………………………….26
3.3.3 Configuration on core Switch…………………………………………………….….28
3.3.4 Configuration on Access 1 Switch……………………………………………….….29
3.4 System Administration team…………………………………………….……………….29
3.4.1 Domain Name Service……………………………………………………………….30
3.4.2 Active Directory Management……………………………………………………….30
3.5 challenges we faced during internship period……………………………………………34
CHAPTER FOUR…….…………………………………………….……………………...35
v
Project and Contribution ………………………………………………………………………...35
6.1 Conclusion………………………………………………………………………………48
6.2 Recommendation……………………………………………………………………….48
vi
List of Figures
vii
List of Abbreviations
viii
CHAPTER ONE
1 Overview of AASTU ICT Directorates
1.1 Background
Addis Ababa Science and Technology university is one of the best universities in
Ethiopia. AASTU was founded in 2011 under the Directive of the Council of Ministers No.
216/2011. AASTU is a university in the making, and much of its short-term plans aim at
establishing academic infrastructures and facilities, staff recruitment and manpower
development. AASTU mission is to play as forefront changing actor in the technology
transformation of the country by creating strong linkage with industry. In line with the given
strategic direction of Ethiopian development, the university has a mission to be problem
solver of the industry, leading in the nation research, recognized in continental and
international community. To achieve this mission, the university has given special attention
to strengthen the university – industry linkage.
AASTU ICT Directorates is one of the giant directorates found in AASTU under
Administration of Intuitional development and business with respect to vice president.
AASTU to support the learning, research and community service at its premises. ICT
Directorate is in charge of managing the central ICT infrastructure, the databases, interfaces,
portals and websites.
The service delivery is organized into five categories
Technical support
and maintenance
Application system
ICT infrastructure
development and
and services
administration
AASTU ICT
Directorate
Technology for
Training and
Teaching and
consultancy
Learning
1
For efficient task execution, each part is discharged by specialized team Infrastructure. The
University owns a campus LAN system with standardized datacenter, fiber backbone and
horizontal cabling. Wi-Fi is also available to support mobility. Virtualized servers were also
deployed to host available systems. Currently there is exist up to six different available systems
like; Human Resource Information Management System, Student Service Management
System, Integrated Library Management System, E-learning management System, File sharing
System, Online Help-desk Management System
The AASTU ICT directorate has over all mission to build, deploy and support innovative,
quality and sustainable ICT infrastructure and service that meet the changing ICT needs of
the University.
1.2.2 VISION
The vision of AASTU ICT Directorate is to become a center of excellence in utilizing the
potential of ICT in learning, innovation and education environment for the benefit of AASTU
and the nation’s development as well.
2
CHAPTER TWO
2.1 Introduction
Internship is a field-based practical training experience that prepares trainees for the tasks they
are expected to perform on completion of their programs. The main intention is to produce
practically oriented graduates that meet the required job-related competences of their future
This Internship report is about the skills attained, lessons learnt, challenges, relatedness of
theory covered in class and recommendations during our internship placement at AASTU ICT
directorate from march to June 2019. The report also represents our experiences,
recommendations and benefits of the internship. Internships provide us an opportunity to link
theory with practice, to see the capacity how we can make a solution for real world problem,
to develop both our practical and theoretical knowledge.
✓ provide us to broaden our chance for handling a job and jump starting our careers
✓ To enable us to get hands-on real-life experience
✓ To apply the principles and techniques theoretically learnt into real-life problem-
solving situation
✓ To Strengthen our professional skills and interpersonal communications
2.3 How we get there: - First we gathered information about companies that are available for
the internship. Then we have chosen AASTU ICT Directorate which is the best for our area of
expertise. After that, our University Industry linkage sent a letter for the directorate with
our name on it which they got from our department. Then the directorate called us for an
interview and finally, they send letter of acceptance to the university and they called and
told us that they have accepted our application by giving acceptance letter. And then we
joined the directorate and we have begun our intern work.
3
2.4 Work section in the Directorate
In AASTU ICT directorate the service delivery is organized into five categories. but the one which
we worked us are mainly two, they are:
2.5 Network Administration team: are the teams that are responsible for the smooth
running of the AASTU LAN. Their basic roles include, remote hands, support, and
configuration of hardware for the campus network. They are also responsible for maintaining
and expanding of the campus network. Their job is mainly related with our interest, designing
and architecture of enterprise network which is backbone for today’s business and
communication between different organization. Today information sharing is key, so to
facilitate this the optimization of this network infrastructure is the responsibility of us as
computer engineer.
2.5.1 Tasks performed and work done with Network Administration team
From network administration team different documents that have information about
networking device that currently used in AASTU LAN is given to us and our first task is
reading and understanding that material. The material had full of information about both
cisco and Huawei networking devices, that are used in different design and architecture of
enterprise network.
Enterprise level networks need to be evolving- always. Today, networks are overwhelmed by
huge bandwidth consumption to support more users, data, voice, video conferencing, big data
analysis, cloud, virtualization, automation, internet of things (IoT) and more. In addition,
bring-your-own-device (BYOD) policies increase the complexity for the IT manager to
ensure the variety of devices have the necessary service and security. These increasing
demands are stretching networks beyond their capabilities. To manage these demands, you
need your Enterprise network to do more- for less- and you need it fast.
5
2.5.3 Hierarchical Design Models
The hierarchical network design model breaks the complex flat network into multiple smaller
and more manageable networks. Each level or tier in the hierarchy is focused on a specific set
of roles. This design approach offers network designers a high degree of flexibility to
optimize and select the right network hardware, software, and features to perform specific
roles for the different network layers.
• Core layer: Provides optimal transport between sites and high-performance routing.
Due the criticality of the core layer, the design principles of the core should provide
an appropriate level of resilience that offers the ability to recover quickly and
smoothly after any network failure event with the core block.
• Distribution layer: Provides policy-based connectivity and boundary control
between the access and core layers.
• Access layer: Provides workgroup/user access to the network
Larger enterprise networks implement solutions to ensure minimal network failure, controlled
access and provision for a variety of services to support the day-to-day operations of the
organization. A multi layered architecture is defined to optimize traffic flow apply policies
for traffic management and controlled access to resources as well as maintain network
availability and stable operation through effective isolation and maintenance should problems
in the network occur, without impacting the entire network
6
2.5.4 Enterprise Network Devices
Firewalls: are the most commonly used type of security device in an enterprise network.
used to protect a network from malicious attack and unwanted intrusion. Firewalls are
primarily used to protect one network from another. They are often the first line of
defense in network security. There are several types of firewalls; some run as software
on server computers, some run as stand-alone dedicated appliances, and some work as
just one function of many on a single device. They are commonly implemented between
the LAN and the Internet.
Figure 2 Firewall
Router
Logical Router
Physical Router
7
Logical Switch
Patch panels: A patch panel in a local area network (LAN) is a mounted hardware assembly
that contains ports used to connect and manage incoming and outgoing LAN cables. Patch
panels are usually attached to network racks, either above or below network switches and
take up 1.75 inches of space. Patch cords connect ports in the patch panel to ports in the
switch, which creates permanent port connection to the switch that won’t be interrupted
during moves add and changes. Patch panel perform no other function except for acting
as a connector. A Patch panels can be divided based on the number of ports they
contain, with 48-port, 24-port and 12-port panels among the most
Server: is a computer on the network that is give service to another computer. Servers also
run on the same hardware as a computer does, the only difference is the services and the
programs it provides to the client. Servers often present required services over a network,
both to private users within a huge organization or else to public users. Usual computing
servers are application server, file server, print server, web server, database server, mail
server, gaming server, or various other types of servers. Several systems employ the client /
server network model as well as email services and Web sites. Another model, peer-to-peer
networking enables the entire computers to perform as both server and client as required.
8
Logical server
Physical server
Racks: Rack is a supporting framework that holds hardware modules. In ICT context racks
typically contain servers, hard disk drives and other computing equipment, Racks make it
possible to contain a lot of equipment in small physical foot print without requiring shelving
Figure 7 Rack
There are also different end devices such as computers, laptops, tablets, phones, printers,
Voice over IP(VOIP)and etc
9
2.5.5 Visit of AASTU data center
we have observed the AASTU data center by Mr. Daniel Bayu (Network admin), gives us
clear explanation about the data center facilities of the campus.
Data centers are simply centralized locations where computing and networking equipment is
concentrated for the purpose of collecting, storing, processing, distributing or allowing access
to large amounts of data. AASTU data center is also the place where overall information’s
and data in the university is stored. This data center is found in AASTU in front of
engineering library in ICT directorate, data centers constructed by separating the power
house and data center in different houses. The building structure of this data center is also
different from other rooms buildings. Inside the main room there is labeled floor which is
60cm above the ground for the purpose of installing wire and protective devices.
Inside the data center like fire alarm sensor which is used to detect and warn people
through visual and audio appliances when smoke, fire or other emergencies are present in the
room. These alarms may be activated automatically from smoke or heat sensor and also the
house contain Air conditioning (AC) used to regulates the temperature and humidity. In side
Power system room there is an electric wire which comes from Ethiopia Electric line power
Agency and there is also another data cable comes from Ethiopia telecommunication
corporation as internet service provider for AASTU
There is not only the server are found in data centers it has also, CORE_SWITCHS which is
a product of cisco which generate DHCP. All switches have basic functionality that includes
maintaining a media access control (MAC) address-to-port table, which is used to
intelligently forward frames out the right ports to the intended destinations. There is
redundant core switches to decrease failure in the device.
Fort Gate it is a role gateway to manage data accessibility and to do access list. It also acts
as firmware by blocking unwanted site and manage bandwidth.
AVAYA is a networked device which is used in video conference system and IP telephone
system
Firewall: used for monitoring and controlling of the network traffic between the servers
located inside the DMZ and internal network (client computers). It also performs
different functionalities like routing (determining paths between the user and the internet
server), determining bandwidth input, used as gateway for incoming and outgoing network
and enables to take security issues.
We Understand different network polices and traffic rules performed inside the network
infrastructure of AASTU. E.g. network resources that need to be available to an outside
public user/customer, such as a web, FTP, and Mail servers. You can place these resources
on a separate network behind the firewall, called a demilitarized zone (DMZ). The firewall
allows limited access to the DMZ, but because the DMZ only includes the public servers,
an attack there only affects the servers and does not affect the other inside networks.
Demilitarized zone (DMZ) is either a physical or logical sub network that contains
networks externally connected services which connect to the internet. It provides another
layer of security for LAN
UPS in the power house An uninterruptible power supply (UPS) is a device that allows a
computer to keep running for at least a short time when the primary power source is lost. It
also provides protection from power surges.
11
Figure 9 Chain of server in AASTU Data Center
12
After we visit data center, we see the following Logical design of AASTU LAN
13
CHAPTER THREE
“The network design you choose to implement should fit the communications problem you
are trying to solve” Mr. Daniel and Mr. Adam our supervisors from network Administration
team. We get training about network design and simulation. To develop our training, they
have given as a project to review the buildings in AASTU which already had the network
access and to design it by the group. Also, the information about ethernet port gathering from
college of social and natural science and college of Electrical and Mechanical Engineering.
The ethernet port of each building has its own code that identify its interface on AASTU
LAN architecture.SB3PnNm and CL5PnNm is for social and natural science and electrical
and mechanical engineering college respectively.
After we have finished collecting of ethernet ports We come to physical design of network
for each block. The network design is done by using Visio Microsoft office software
application. When the physical design of network on each room is done the port is identified
as active and deactivate port depending on the data gathered.
14
Let’s see the physical design on Visio.
P1N37-A
Office
STORE
P1N36
P2N26
103
P2N18-A
P2N2-A P2N21-A
P2N4-A
Like this one data is gathered for both blocks and Physical design is done for all floor found
on block. The aim of this task not only gathering data and physical design for the floor, first
since we are beginner we see the interfaces or port by your eye as it is active or deactivate
after that we see when Network administrator remotely enter into Switch and shows as
which port is active and the other one is deactivate. Then the design is done and we come to
network architecture, in this case we focus on real world enterprise network architecture and
design.
We deal with packet tracer for cisco and Enterprise Network simulation Platform (eNSP) for
Huawei. Both packet tracer and eNSP are software platform we use in simulator application
for rapid development of TCP/IP knowledge and familiarity with network operation.
15
Packet tracer is a cross-platform visual simulation tool designed by Cisco Systems that allow
users to create network topologies and imitate modern computer networks. The software
allows users to simulate the configuration of Cisco routers and switches using a simulated
command line interface. Packet Tracer makes use of a drag and drop user interface, allowing
users to add and remove simulated network devices as they see fit packet Tracer allows
students to design complex and large networks, which is often not feasible with physical
hardware, due to costs
It’s time to introduce us to the Cisco Internetwork Operating System (IOS). The IOS is what
runs Cisco routers as well as Cisco’s switches, and it’s also what we use to configure these
devices. We are going to show you how to configure a Cisco IOS device using the Cisco IOS
command-line interface (CLI). You can to configure hostnames, banners, passwords, and
more as well as troubleshoot skillfully using the Cisco IOS. We start by Logical design a
network on cisco packet tracer which have Router as DHCP-server, Core switch, access
switch and computers as end device
Core switch: Create VLAN, Configure names, console password, banners, interfaces and
port- channel for this switch
Access Switch: Create VLAN, Configure name, console password, interface, banners and
port-channel with core switch
1 Administrative Configurations: these are commands that are particularly helpful when
administering your network. We can configure names, banners, console password and
interfaces to our switch or router.
2 Working with DHCP: DHCP is the Dynamic Host Configuration Protocol. It sends IP
information to clients automatically, making configuration of IP addresses on the network
easier and automated. Dynamic Host Configuration Protocol allows properly configured
client computers to obtain IP addresses automatically from a DHCP server. This is done so
that a network administrator does not have to manually configure IP addresses on all the
computers on a network individually. This protocol therefore reduces the amount of system
administration, allowing devices to be added to the network with little or no manual
intervention. We use router as DHCP server in this case and give information the same as
DHCP- server. The IP information obtained might include the following: IP address, Subnet
mask, Gateway list and other advanced option
16
3 Working with creation of sub-interface: one physical interface divided into multiple sub-
interfaces, with one subnet assigned per VLAN, each sub-interface being the default gateway
address for each VLAN/subnet. An encapsulation identifier must be assigned to each sub-
interface to define the VLAN ID of that sub-interface.
4 Working with creation of VLAN routing and configuration on packet tracer: Virtual
LANs (VLANs) offer a method of dividing one physical network into multiple broadcast
domains. However, VLAN-enabled switches cannot, by themselves, forward traffic across
VLAN boundaries. For inter-VLAN communication, a Layer 3 router is required and Port-
channel
Access ports an access port belongs to and carries the traffic of only one VLAN.
Trunk ports: trunks ports can similarly carry multiple VLANs at a time as well.
17
3.2.1 Logical Design of Network on Cisco packet tracer
1 How to Route in different modes: Initial when we enter in to the command line interface of
router or switch on packet tracer we see three types of modes of CLI. These are user exec-
mode privilege mode and Global configuration mode.
18
Step 2 Set Hostname, banner and Configure Console Password
DHCP-server(config)#line console 0
DHCP-server(config-line)#password aastu
DHCP-server(config-line)#login
DHCP-server(config)#service password-encryption
DHCP-server(config)#interface fa0/0
DHCP-server (config-if)#no shutdown
DHCP-server (config-if)#exit
DHCP-server(dhcp-config)#default-router 192.168.1.1
DHCP-server(dhcp-config)#exit
DHCP-server(dhcp-config)#default-router 192.168.2.1
DHCP-server(dhcp-config)#exit
19
Figure 14 CLI show basic configuration and sub-interfaces on router
Switch> enable
Switch # config terminal
Switch (config)#
Core-Switch (config-vlan)#exit
Core-Switch (config)#vlan 20
20
Core-Switch (config-vlan)#exit
Switch(config)#interface fa0/1
Switch(config-if)#switchport mode trunk
On this core switch CLI we create two VLAN, configure two port channels, and interface for
port channel is trunk because it is between switch and switch as well as between switch and
router. Even if on the above picture we do not get all configuration we done on this core
switch by clicking enter button on our computer we can get additional configuration.
21
3.2.4 Configuration on Access 1 Switch
Switch> enable
Switch # config terminal
Switch (config)#
AccessSW1 (config-vlan)#exit
22
Figure 16 show configuration done on Access Switch 1
Access switch found between end device and core switch. The configuration done on this
switch VLAN 10 is created, Port channel is created and interface with end device access.
Even if on the above picture we do not get all configuration we done on this Access switch by
clicking enter button on our computer we can get additional configuration
Switch> enable
Switch # config terminal
Switch (config)#
AccessSW2 (config-vlan)#exit
23
AccessSW2 (config)#interface range fa0/8- 11
AccessSW2 (config-if-range)#channel-group 2 mode passive
AccessSW2 (config-if-range)#exit
AccessSW2 (config)#interface port-channel 2
AccessSW2 (config-if)#switchport mode trunk
Access switch found between end device and core switch. The configuration done on this
switch VLAN 20 is created, Port channel is created and interface with end device access.
Even if on the above picture we do not get all configuration we done on this Access switch by
clicking enter button on our computer we can get additional configuration
Ipconfig and ping are some of our best friends when we deal on the end device as
network administrator. These basic TCP/IP commands can help us to analyze and
troubleshoot various networking issues that might occur. They also offer a certain amount
of configurative ability, as well as the ability to create performance baselines. These
commands are used in the Windows command prompt
1 Ipconfig: displays information, it can also be used to make basic configuration changes
and reset certain facets of DHCP and DNS
2 Ping is used to test connectivity to other hosts; here, command-line results tell you whether
a remote host is “alive” on the network.
24
Figure 17 shows ipconfig and ping response
3 netstat: In computing netstat (network statics) is command-line network utility tool that
displays network connections for the Transmission Control Protocol (both incoming and
outgoing), routing tables and a number of network interface (network interface controller
or software defined network interface) and network protocols statics
Tracer: In computing traceroute and tracert are computer network diagnostic commands
for displaying the route (path) and measuring transit delays of packets across an Internet
protocol (IP) network
Within eNSP also we did the same task even if eNSP is used for Huawei device like
Router and switch configuration. For this also we done DHCP configuration by using
router as DHCP-Server and creating VLAN for switch.
25
On CLI of eNSP we deal with four command line view
The presence of chevrons identifies that the user is currently in the user view whereas square
bracket show that transition to the system view has occurred.
<Huawei>system-view
Enter system view, return user view with Ctrl+Z.
[Huawei]sysname DHCP-server
[DHCP-server]header shell information "Do Not Reboot this router"
[DHCP-server]user-interface console 0
[DHCP-server-ui-console0]authentication-mode password
DHCP-server-ui-console0]set authentication password cipher aastu
26
Step 3 Creating sub-interface for VLAN 10 on router:
[DHCP-server-GigabitEthernet0/0/0]interface g0/0/0.10
[DHCP-server-GigabitEthernet0/0/0.10]dot1q termination vid 10
[DHCP-server-GigabitEthernet0/0/0.10]ip address 192.168.1.1 255.255.255.0
[DHCP-server-GigabitEthernet0/0/0.10]arp broadcast enable
Step 4 Creating sub-interface for VLAN 20 on router:
[DHCP-server-GigabitEthernet0/0/0.10]interface g0/0/0.20
[DHCP-server-GigabitEthernet0/0/0.20]dot1q termination vid 20
[DHCP-server-GigabitEthernet0/0/0.20]ip address 192.168.2.1 255.255.255.0
[DHCP-server-GigabitEthernet0/0/0.20]arp broadcast enable
27
3.3.3 Configuration on core Switch
<Huawei>system-view
[Huawei]sysname CoreS
[CoreS]header shell information "THIS IS CORE SWITCH"
[CoreS]user-interface console 0
[CoreS-ui-console0]authentication-mode password
[CoreS-ui-console0]set authentication password cipher aastu
[CoreS]vlan 10
[CoreS-vlan10]q
[CoreS]vlan 20
[CoreS-vlan20]q
Link aggregation refers to the implementation of port link that act as a direct point-to point
link, between two devices such as peering routers, switches, or a router and switch
combination at each end of link
[CoreS]interface Eth-Trunk 1
[CoreS-Eth-Trunk1]mode lacp
[CoreS]interface Ethernet 0/0/6
[CoreS-Ethernet0/0/6]eth-trunk 1
[CoreS-Ethernet0/0/6]interface Ethernet 0/0/7
[CoreS-Ethernet0/0/7]eth-trunk 1
[CoreS-Ethernet0/0/7]interface Ethernet 0/0/8
[CoreS-Ethernet0/0/8]eth-trunk 1
[CoreS-Ethernet0/0/8]interface Ethernet 0/0/9
[CoreS-Ethernet0/0/9]eth-trunk 1
[CoreS]interface Eth-Trunk 1
[CoreS-Eth-Trunk1]port link-type trunk
[CoreS-Eth-Trunk1]port trunk allow-pass vlan 10
[CoreS]interface Eth-Trunk 2
[CoreS-Eth-Trunk2]mode lacp
[CoreS]interface Ethernet 0/0/10
[CoreS-Ethernet0/0/10]eth-trunk 2
[CoreS-Ethernet0/0/10]interface Ethernet 0/0/11
[CoreS-Ethernet0/0/11]eth-trunk 2
[CoreS-Ethernet0/0/11]interface Ethernet 0/0/12
[CoreS-Ethernet0/0/12]eth-trunk 2
[CoreS-Ethernet0/0/12]interface Ethernet 0/0/13
[CoreS-Ethernet0/0/13]eth-trunk 2
[CoreS]interface Eth-Trunk 2
[CoreS-Eth-Trunk1]port link-type trunk
[CoreS-Eth-Trunk1]port trunk allow-pass vlan 20
28
[CoreS]interface GigabitEthernet 0/0/1
[CoreS-GigabitEthernet0/0/1]port link-type trunk
[CoreS-GigabitEthernet0/0/1]port trunk allow-pass vlan all
<Huawei>system-view
[Huawei]sysname AccesS1
[AccesS1]header shell information "THIS IS ACCESS SWITCH 1 "
[AccesS1]user-interface console 0
[AccesS1-ui-console0]authentication-mode password
[AccesS1-ui-console0]set authentication password cipher aastu
[AccesS1]vlan 10
[AccesS1-vlan10]q
[AccesS1]interface Eth-Trunk 1
[AccesS1-Eth-Trunk1]mode lacp
[AccesS1]interface Ethernet 0/0/6
[AccesS1-Ethernet0/0/6]eth-trunk 1
[AccesS1-Ethernet0/0/6]interface Ethernet 0/0/7
[AccesS1-Ethernet0/0/7]eth-trunk 1
[AccesS1-Ethernet0/0/7]interface Ethernet 0/0/8
[AccesS1-Ethernet0/0/8]eth-trunk 1
[AccesS1-Ethernet0/0/8]interface Ethernet 0/0/9
[AccesS1-Ethernet0/0/9]eth-trunk 1
[AccesS1]interface Eth-Trunk 1
[AccesS1-Eth-Trunk1]port link-type trunk
[AccesS1-Eth-Trunk1]port trunk allow-pass vlan 10
the same configuration with Access switch 1 is done on this access switch 2 and basic
TCP/IP command we use on the end device for eNSP is also the same as packet tracer.
3.4 System Administration team: this team is other part of service delivery team for
AASTU community in ICT directorate. They are mainly responsible for the configuration
and reliable operations of computer systems and different server found in AASTU data
center. They are also responsible to installing all the required applications to support the
campus, and to ensure that all the service is running. On the other hand, they check the
29
Internet connection in the office is working, the mail service is running and processing emails
that are sent and received by all staff within the campus.
From this team we get training about domain name service (DNS) and active directory
management. In addition to this training two projects centralized FTP-server Management
and centralized printer server management is given to us. From these projects we get basic
knowledge and understanding, as well as role of system administrator in real world.
Every computer on the public Internet has a unique numeric address similar to the uniqueness
of a telephone number, which is a string of numbers that is difficult for most people to
remember This string is called the IP address in the case of computer on the network. To
make it easier to find given location on the Internet, the Domain Name System, (DNS), was
invented. DNS was designed as a tree structure, where each named domain is a node in the
tree. The top-most node of the tree is the DNS root domain (.), under which there are
subdomains, such as .com, .edu, .gov, and .mil as shown below.
Active Directory (AD) is a directory service that Microsoft developed for windows
domain networks. Initially, Active Directory was only in charge of centralized domain
management. Active Directory Domain Service (AD DS) is called a domain controller.
It authenticates and authorizes all users and computers in a Windows domain type network—
assigning and enforcing security policies for all computers and installing or updating
software. For example, when a user logs into a computer that is part of a Windows domain,
Active Directory checks the submitted password and determines whether the user is a system
administrator or normal user. Also, it allows management and storage of information,
provides authentication and authorization mechanisms, and establishes a framework to
deploy other related service
30
How we add client to domain controller server
31
Step 3 Two blank space is come so, for computer name we enter the name of client computer
as it is comfortable for us to control and manage central and for the second blank space, we
choose domain and enter domain name of our organization example in our case we use
aastu.edu.et then click ok
STEP 4 Click ok and then the below page is come but it is secure and only system
administrator was entered.
32
We see How Remotely connect to the Kaspersky server and install for client computer and
central manage all aastu desktop computers under one domain name.
33
this is show when remotely we access Kaspersky server on our computer
In generally we see also how central manage all computers found in the organization by
adding into in one domain name. Installing Kaspersky centralized antivirus for all AASTU
desktop computers manage these computers security as client does not have full permission
to install and uninstall the application. Also, we see how Remote Desktop Connection access
the server and other services found in data center.
Inadequate and delay for supervision facilitation. This was generally a weakness on the side
of the university. But at least the University ensured that internships are offering meaningful
learning experiences for their students by providing evaluation sheets which provide feedback
from employers to university. In general, we are not facing such difficult challenges in our
internship period because we are familiarly with the AASTU ICT directorate. But on the
beginning of our internship time when we start to gather data of Ethernet port on the block,
there is a misunderstanding from the block administrator and some employ in the office.
Because at that time we are not get Identity card (ID ) that express us as ICT directorate
employ member. We solve this issue by talking to people decently and in politely way and
after few days we got (ID) and done our work in smoothly and attractive way with our team
34
CHAPTER FOUR
4.1 Introduction
Centralized FTP server is backbone of today communication in this networked world. It use
the concept of standard network protocol used for the transfer of computer files between a
client and server on computer network. FTP is built on a client-server model architecture
using separate control and data connections between the client and the server. Use port 21 for
control connection and port 20 for data connection. To transfer file using FTP, you require to
an FTP server, a user account and FTP client or application. Generally, most FTP servers
require a username and a password in order to make a connection.
A central managed file using FTP system can be thought of as one huge centralized file
transfer system completes with all the visibility, reporting, logging, security, tracking,
integrations with your security architecture, failover and assured delivery features already
built-in by design (as opposed to add-ons). These are enterprise-class solutions upon which
core processes, like the medical billing and payment systems of a hospital, can be built. For
instance, a single implementation may include multiple transfer servers, workflow
automation systems and cloud-based transfer services all under management from a
centralized console.
Nowadays big data transfers make people’s life difficult. During the big data transfer, people
waste so much time. Further-more considering the safety of cloud systems, people prefer to
keep their data at the cloud systems instead of their computers. When backups getting too
much size, their data transfer becomes nearly impossible.
There is also the issues of inefficiency of storage device and we may lost our data on the
computer by natural or man-made problems like stolen our computer, it may randomly
formatted by other people or yourself, there is also the issue of limited space on the computer.
35
4.3 Objective
The general objective of this projects is managing centralized FTP-server for sharing of huge
files between user. The specific objective are as follows:
➢ Using centralized FTP server for huge data transfer and store data
➢ Sharing of centralized files for all user of the server
➢ Solve space limitation problem currently found on computers
➢ Minimize cost of storage and bandwidth for data sharing
4.3.1.1 scope
✓ Explain operation of FTP for transferring data between FTP server and local
machines.
✓ Provide central managed files which only permitted user is used and share
files to others
4.3.1.2 Limitations
Centralized FTP dependent file transfer is not secure, Because FTP uses only
username and password as criteria to access shared files or in some case the user may
enter anonymously without any requirement. As well as the data is transferred without
any encryption so this is limitation of FTP
4.4 Significance
All user of computer that want to share their file central managed with others can use.
Especially company that have work in different place and want to share huge files
with other of its employees. Also, as individual person when someone want to store
its file on FTP server. Web developers also use FTP server
you want to transmit small data; you need small rate bandwidth such as the application of
internet telephony encodes voice at 32 kbps. However, if you have huge files and want to
transmit them, you need more bandwidth. This is more advantages than small rate bandwidth.
Timing is important when you transmit the data. Applications should provide quick data
transferring to save time. For example, real-time applications of internet telephony, virtual
environments, multiplayer games or etc.
4.5 Methodology
To transfer file using FTP, you require to an FTP server, a user account and FTP client or
application. Generally, most FTP servers require a username and a password in order to make
a connection. However, some servers may allow users to connect as anonymous users with no
username or password. FTP is founded on a client-server architecture which clients are
transferring files to a server and receiving files from a server as shown in Figure 2. FTP
period consists two connections which are transmitting standard FTP commands, responses
and transferring the actual data
1 control connection
For sending control information like user identification, password, commands to change the
remote directory, commands to retrieve and store files, etc., FTP makes use of control
connection. The control connection is initiated on port number 21.
37
2 data connection
For sending the actual file, FTP makes use of data connection. A data connection is initiated
on port number 20. FTP sends the control information out-of-band as it uses a separate
control connection. Some protocols send their request and response header lines and the data
in the same TCP connection. For this reason, they are said to send their control information
in-band. HTTP and SMTP are such examples.
Step 1 Request: This request is initiated by the client allowing the file transfer protocol to
begin. Sub-commands used for this step is store, delete, lookup, open and close. Allows client
to interact with the server before they download or upload a file.
Step 2 Response: server will inform the client that it is ready to either receive or send a file.
The sub-commands used in this transaction are ready to send and ready to reactive
Step 3 Transfer: The actual transaction will occur in this step.
Step 4 Terminate: two types of terminate transactions occur at this step these are successful
terminate and unsuccessful terminate
4.5.2 FileZilla
How to use FTP to transfer files between servers and local machines by using FileZilla free
software client
1 username and password login: This is a restrictive method where only users with an
account can access the server. This common when there is a need for users to upload or
download files to and from the server.
FileZilla is a free software, cross-platform FTP application, consisting of FileZilla client and
FileZilla server. client binaries are available for window, Linux, and macOS, server binaries
are available for windows only. Both server and client support FTP and FTPS, unlike some
38
other FTP clients, FileZilla Client does not implement a workaround for an error in the IIS
server which causes file corruption when resuming large file downloads
Central managing file transfer using ftp adds many of the management features
required as file transfer needs grow from occasional and non-critical to high-volume
and mission-critical. Not so obvious from the name, MFT solutions also provide a large
number of security and compliance features that are either unavailable or just too hard
to add on to off-the-shelf FTP products
A central managed file using FTP system can be thought of as huge centralized file transfer
system complete with all the visibility, reporting, logging, security, tracking, integrations
with your security architecture, failover and assured delivery features already built-in by
40
design (as opposed to add-ons). These are enterprise-class solutions upon which core process,
like the medical billing and payment systems of a hospital, can be built. For instance, a single
implementation may include multiple transfer servers, workflow automation systems and
cloud-based transfer services all under management from a centralized console
.
4.6 Conclusion
In general, centralized FTP-server is used to transfer huge files between server and clients.
Since the file is stored central on one place the user can easily access it at any time and any
place. This centralized FTP-server solve space limitation found currently on computers
From three common methods of using FTP to transfer files like, web browser, command line
FTP and Graphical user interface FTP client In our project we use FileZilla which is widely
used in FTP transfer files.
4.7 Recommendation
Even if FTP is the oldest protocol used for many years, FTP was not designed to be a secure
protocol, and has many security weaknesses. So, we recommend sing a different, more secure
protocol that can handle the job, e.g. Security shell File Transfer protocol (SSH) or Secure
copy protocol (SCP).
41
4.8.1 Objective, scope and significance
The main aim of this project is to design a central printing management system.
Specific objective
✓ Cost reduction
✓ Control and monitoring printing central
✓ Improving environmental performance and minimizing environmental impacts
Scope
The scope of this projects: Evaluate the existing printing system to identify weakness and
configure the print server and to know how the system is work theoretically
Limitation: single point of failure (disaster recovery implications) cause over all failures
: Centralized printing makes heavy demands on your network
Significance of central print server
The usage of individual desktop printers will be minimized. They will be removed as the new
central print devices are rolled out, unless an approved business case allows them to be kept
as exceptions.
The components of a central printing management system comprise of both hardware and
software. Each of these components provides set of related functions in the system. The
Figure below describes the various components of a central printing management system.
2 Print servers: The print server is regarded as a network device, software application or a
computer that connect printing device to the clients over a network to administer print
request. It is a device that receives print jobs from clients and sends them to a print device.
3 Print Driver: This is software that converts the print jobs generated by applications into an
appropriate string of commands for a specific print device. The printer driver helps renders
prints jobs into a language the print device can use to reproduce what one intended to print.
Hence, it is often referred to as a translator a print processor.
4 Print clients (work station): A print client is an end user’s device or system that can
initiate a print request to the print server. It could be a computer system, smart phones or
other mobile devices connected via the Internet to the print server within the same Network
as shown in Figure below (copied from en.wikipedia.org/wiki/client-server-model) below.
5 Printer: This is the software interface through which a computer or a client communicates
with the print device. It is a software entity the client prints through. The installation of the
printer depends on it intends purpose. In the case of a remote printing, the printer resides on
the print server. However, if it is local printing or print jobs redirected to a print device, the
43
The central print management system is a printing service that will be activated on a server
print server. This printing service depends on other coexisting services that are been run on
the server. These various services or servers that must exist for print server to function
properly are: Lightweight Directory Access protocol server (LDAP) is a standard application
protocol used over an Internet Protocol (IP) Network for managing and accessing the
distributed directory information services. Domain name System server (DNS) DNS provides
for forward and reverse look up queries. Hence; it resolves an IP address to a computer name
and the hostname to an Internet protocol (IP) address respectively. Dynamic Host
Configuration Protocol (DHCP) This is another auxiliary service that must exist for printing
the interconnectivity between the print server and other auxiliary services within the
network. On boot up, the DHCP client (Workstation) request for an IP configuration, subnet
mask default gateway, DNS server configured for the network. Then the DHCP server will
acknowledge those requests. The DNS client sends a request to resolve the computer name to
IP address. The system administrator creates a username account and gives privileges and
roles. On logging on to the domain, the active directory authorizes the users to inherit this
role to functions within the network. The user sends a print job to the print server through the
software interface and the print server in-turn reply when the job has been printed. User log
into the network print device, active directory authenticates the user and forward reply to the
print server. Print server forward queue job for the print device to release or pull the print
jobs
44
Figure 29 Network architecture of CPMS
Currently since we have no real printer server on our hand, we use software platform called
Papercut to show how we central manage this printer server. using papercut NG/MF software
to manage central print server Papercut NG/MF is a comprehensive print management system
designed to seamlessly monitor and control your resources with easy to use administrative
and user tools that can be securely.
4.12 Conclusion
From this project we concluded the necessary printing system is central printing management
system types especially at this time in large company or campus and other wide places. But
CPMS also have advantages and disadvantages part. We know this project the difference
between central print management system and direct ip printing system/old printing system
and we can select what is the best one from the two-printing system based on cost reduction,
time saving etc. We know also from our projects what is components of CPMS detail and one
of the best types of print management software papercut and know also what is the workflow
process of papercut. accessed from anywhere on the network though a web browser.
4.13 Recommendation
Central print server is Loss of autonomy in local sites, Implementation requires multiple hops
over the network consuming bandwidth and related latency of print times and Single point of
failure (disaster recovery implications). So, we recommend the best systems use to prevent
this limitation for the future.
45
CHAPTER FIVE
For effective operation of any practical work a clear understanding of the theoretical knowledge
is required. Starting from day one we started reading a training material for CISCO and Huawei
devices So, it was very simple for us to upgrade what we learned in the class since their
document was precise and easy to understand. In addition, we were ordered to read some
documents that were helpful for specific tasks to be taken. All over, the projects, that we were
working with the system administration team, also other practical trainings helped us to ask
questions for ourselves and discover new knowledge.
One of the important things we have found from our internship experience is that we have
improved our personal communication skills; from the trainings our mentors gave us we have
how developed the skills communication with our fellow associates.
46
5.5 Leadership Skills
The internship was an important experience to practice the assets of leadership; and because
all our mentors were team leaders, we got the access to know more about leadership. In doing
our project we were able to improve our self-confidence as we had the willingness and
inspiration to face any difficulty in the project; this helped us to grow emotionally to learn
from our failure and success; this in turn, gave us the chance to learn about project
management, the technical approach methodology of a project. Above all we have grasp
leadership skills such as self-confidence, accountability, decision making and so on.
In our internship period we understood that ethics is one of the valuable resources a person
can have in the real world; understanding this fact we tried to get closer to others in more
ethical way so that we can be more beneficiary from them. In our internship period we have
developed both our personal and professional ethics; the former being related with how we
should act towards other people while the other related to the ethics we have to acquire
certain tasks done.
Above all this internship has thought as the entrepreneurship skills; working environment had
been a good starting place to enhance our entrepreneur capabilities. Indeed, we learned a lot
on improving critical thinking and problem-solving skills. The change from school to
workplace itself was another learning opportunity, conditioning us to adapt to change and to
be able to take responsibility.
47
CHAPTER SIX
6.1 Conclusion
In generally this internship program give us a chance not only to work with AASTU ICT
Directorate but also a chance to learn from the good experts. We would like to thank AASTU
ICT Directorate, for introducing us to this great opportunity in which we have developed our
self both theoretical and practical. We also train and learn that anything related to information
communication technology is skill, rather than theory which developed in doing practical like
this in internship period.
Finally, all we can say is that from this internship period in addition to formal academic
knowledge, we were able to get the general experience in every other aspects of life; this
experience were unforgettable and we believe it shaped our personality and behavior by
helping us to be optimistic in our future tasks, to be stronger to overcome challenges and be
successful, to develop critical thinking ability and problem solving skills.
6.2 Recommendation
As we are Product of AASTU and have relationship with directorates beyond this internship
period, from what we observed we recommended the followings main points for directorates
➢ Even if AASTU ICT Directorate are try their best, the demand of AASTU community
for Internet access is not answered. We hear many complain from employ in office
and students when we gather the ethernet port of the blocks. However, we see in
some offices there is many ports but not used, so give it for other office.
➢ Also, there is many ethernet ports damaged in both AASTU Libraries and old
buildings like, Administration, Registral and college of Social and Natural science so
repair these ports and open other interface for users.
48
Reference
[3] Cerf, V. G., & Kahn, R. E. A protocol for packet network intercommunication. IEEE
Transactions on Communications, 22, 5 (1971).
[4] Dag Henning Liodden Sørbø “Increasing the efficiency of a file server by removing
redundant data transfers in popular downloads”
[5] https://en.wikipedia.org/wiki/File_Transfer_Protocol
49