0% found this document useful (0 votes)
9 views

Meris

Uploaded by

Tesfayesus
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Meris

Uploaded by

Tesfayesus
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 39

Internship Report 4

A Report on Internship Work At

By
MERON FEKADU ID: RET1389/02
COMPUTER ENGINEERING

Department of Electrical and Computer Engineering


Arba Minch Technology of Institute, AMU
02/ 26/2014

1
Internship Report 4

Acknowledgements
I take this opportunity to express my deepest gratitude and appreciation to all those
people who made this internship easier with words of encouragement, motivation and
helped towards the successful completion of this internship period.
Most of the initial ideas for the project emanated from discussions with our guide Ato
Miftuh Mohammed and I would like to express my sincere gratitude for his motivating
suggestions, help and lots of moral support and contribution is great fully acknowledged.
And his exemplary guidance, monitoring and constant encouragement throughout the
intern time. My thanks also go to Ato Tekeste Berhan Chief Executive officer of
Cybersoft PLC for his support and advice during the time.
I also want to express a deep sense of gratitude to Ato Fekadu, Network engineer at
Cybersoft for his valuable information and guidance. I would like to thank all other staff
members for their valuable teaching and advice which made me to finish this project
successfully.

2
Internship Report 4

List of Figures
Figure 1. System Environment ………………………………………………………….16
Figure 2.Mesh Network………………………………………………………………….26
Figure 3.Star Network……………………………………………………………………27
Figure 4.Bus Network…………………………………………………............................28
Figure 5.Ring Network…………………………………………………………………..28
Figure 6. Hybrid Network ……………………………………………………………….29

List of Tables
Table 1. Use of VMware Workstation…………………………………………………...24

3
Internship Report 4

Table of Contents
Acknowledgements ............................................................................................................. 2
List of Figures ..................................................................................................................... 3
List of Tables ...................................................................................................................... 3
Chapter I.............................................................................................................................. 6
1. Introduction ..................................................................................................................... 6
1.1 Background of Cybersoft plc. ....................................................................................... 6
1.2 Organizational Structure and Core Business ................................................................ 7
1.2.1 Reliable Partner .......................................................................................................... 8
1.3 Staff Profile ................................................................................................................. 12
Chapter II .......................................................................................................................... 13
2.1 SRS Document Preparation ........................................................................................ 13
2.1.1 Purpose..................................................................................................................... 14
2.1.2 Project Scope and Limitation ................................................................................... 15
2.1.3 Overview .................................................................................................................. 15
2.2 Product Perspective and Features ............................................................................... 15
2.2.1 Operating Environment ............................................................................................ 16
2.3 User Classes and Characteristics ................................................................................ 17
2.4 Design and Implementation ........................................................................................ 18
2.6 Use Cases .................................................................................................................... 19
2.7 Specific Requirements ................................................................................................ 20
2.7.1 Functional Requirement ........................................................................................... 20
2.7.2 External Interface Requirement ............................................................................... 21
2.8 VMware Workstation.................................................................................................. 21
2.8.1 What is VMware Workstation ................................................................................. 21
2.8.2 How is VMware workstation used? ......................................................................... 22
2.8.3 Hoe does VMware workstation work? .................................................................... 23
2.8.4 Key Features ............................................................................................................ 23
2.8.5 Why use VMware Workstation? .............................................................................. 24
Chapter III ......................................................................................................................... 26
3.1 Networking ................................................................................................................. 26
3.2 Physical Topology ...................................................................................................... 26
3.3 Network categories ..................................................................................................... 30
3.4 Networking Devices .................................................................................................... 31
4
Internship Report 4

3.5 Knowledge and Acquaintances acquired .................................................................... 33


3.5.1 Advantages in terms of improving practical skills................................................... 33
3.5.2 Advantages in terms of managing skills and upgrading theoretical advantage ....... 34
3.5.3 Acquaintances Acquired .......................................................................................... 34
3.5.4 Advantages in terms of understanding about work ethics and related issue ............ 35
Chapter IV ......................................................................................................................... 36
4.1 Problems encountered during the internship period ................................................... 36
4.2. General suggestion &comment to the company ........................................................ 36
4.3 Conclusion .................................................................................................................. 38
4.4 References ................................................................................................................... 39

5
Internship Report 4

Chapter I
1. Introduction
1.1 Background of Cybersoft plc.

The history of Cybersoft plc. will take us more than fifteen years. Most of
Cybersoft’s founding members have been working together for a decade and
half, starting from their under graduate college years. In early 1996, they
decided to establish a company that will grow to be a leading ICT solution
provide initially in Ethiopia, later in Africa and eventually to become a
distinct global information and communication technology (ICT) hub. In this
spirit, they made the necessary preparations leading to the incorporation of
Cybersoft in 1998.
Cybersoft is now the leading IT Company in the private sector in Ethiopia,
with the largest market share in the supply of indigenous software solutions.
Cybersoft has successfully delivered its advanced consultancy and IT
solutions to about 240 Ethiopian Government institutions and some private
companies. It is also ready to deploy its advanced enterprise resources
planning (ERP) solutions.

Basic Information
Legal company name……………………………. Cybersoft plc.
State of incorporation ………………………………Private limited company
Ownership of Cybersoft………………………….Fully Ethiopian owned
Current number of employees……………………90+ Employees
Sales and service locations……………………….Headquarters
Current customer base ………………………About 250 Ethiopian Institutions
plus International clients
Business and market focus…………… Consultancy, software development
and network solution
6
Internship Report 4

Research and development………………………..software development


Chief executive officer…………………………….Tekeste Berhan Habtu
Place and year of establishment……………Addis Ababa, Ethiopia 1998

1.1.2 Mission and Vision


 To be distinct IT solutions provider in Ethiopia, and eventually in
Africa.
 To provide holistic world class IT solutions to its valued clients.
 To build capable employees that continuously improve their
competence to create their future through collaboration and team
work, and thereby to assure their own career development and growth,
as well as the development and growth of their clients, Cybersoft and
society at large.
 To attain reasonable return on shareholder and stakeholder
investments.

1.2 Organizational Structure and Core Business

Cybersoft had actually presented an ICT vision and strategy for Ethiopian the
former Ethiopian science and technology communication and to the Ethiopian
information technology professionals association in 2003 and 2005. This is
testimony that Cybersoft has been highly familiar with and that it has
participated in the Ethiopian Government ICT strategy, ICT policies and ICT
development etc. It’s a great resource base for its failure undertakings in
Ethiopia, in any other African state, or in the developing world. In particular,
Cybersoft developed its single sign on, E-Government information and
collaboration portal under a unified communication solution and is ready for
implementations as a distinct Millennium Development Goal (MDG) solution.
Cybersoft is dedicated to advance ICT accelerated social development and
economic growth in Ethiopia, Africa and the developing world. Its capabilities
and competences deliver the following solution and services.
7
Internship Report 4

Unified communications solutions under a service oriented network


architecture (SONA) over n-tiered network infrastructure.
 Internet, Intranet and Extranet network engineering (LAN, MAN,
WAN) beginning with studies and requirement analysis, design,
configuration, installation.
 High speed data, wireless LAN/voice over wireless LAN, voice over
IP solutions, as well as administration as an opinion.
 Voice/video conferencing, video surveillance solution.
Software development including
 Study of existence system (situation analysis)
 Requirements analysis documentation (RAD)
 Development of appropriate implementation strategies and/or
blueprint.
 Systems design and development.

1.2.1Reliable Partner
Cybersoft has many hundreds of man years of experience in the:
 Study of the existing systems of large institutions.
 Preparation of requirements analysis documentation.
 Preparation of ICT strategy documents for the short, medium,
and long term.
 Preparation of blueprints or road maps.
 Implementation of unified communication solutions, LAN and
WAN.
 Development and implementation of client server, web based
and components of e-application, including E-Government
related solutions that run in about 250 Ethiopian Government
Institutions, public enterprises and private companies.

8
Internship Report 4

All its aforementioned experience has been largely with in the context of the
Ethiopian government reform program as well as their sub-programs, which were
supported by the World Bank and IMF, i.e.
 Justice system reform program
 Civil service reform program
 Budget and finance reform program (Budget management and
expenditure management program)
 Urban development reform program
 District level decentralization reform program
Cybersoft has dully studied and successfully designed and implemented many integrated
information systems as per the Ethiopian Government reform programs such as the
justice reform program, the civil service reform program, and the budget and finance
reform program, to mention a few:
1. ERP solution
Cybersoft had undertaken an earlier version single sign web based integrated
management information system (MIS) for the Ethiopian information and
communications development agency with detailed system, requirement analysis,
development and deployment including training. Many other IMIS projects were
also studied, designed and implemented for a significant number of government
ministries agencies, enterprises etc. including network design, installation and
configuration and testing for some of them. This has recently been upgraded to an
ERP solution.
2. Knowledge Management system
Records, archive and library systems that have been implemented at the national
archives and library agency (NALA) as well as twenty other federal institutions
including at ministries, agencies, the documents authentication and registration
office (DARO).

9
Internship Report 4

3. Civil Service Information System


Civil service information system (CSIS) as per the Ethiopian government civil service
reform program for the civil service commission of the Benishangul Gumuze national
state. The human capital management component of the CSIS had earlier been
implemented at the ministry of federal affairs and later rolled out to a number of other
government and/or public institutions including the ministry of works and urban
development, Berhanena Selam printing press, Ethiopian postal service, Ethiopian
Information and communication Technology Developer Agency (EICTDS), Nefas Silk
Paints Factory (NSPF), National Alcohol and Liquor Factory (NALF), Education
Material Production and Distribution Enterprise(EMPDE), Water Works Design and
supervision Enterprise (WWDSE), Asela Malt Factory(AMF) etc. The system study,
requirements definition and systems design of the CSIS, as per the Ethiopian government
civil service reform program, was first completed for the Amhara National Regional state
(ANRS) by early 2004 and subsequently for the government of the National Regional
state of Tigrai(GNRST), by 2006.
4. Social Security Information System
A civil registration and vital statistics system that has been implemented at two pilot
regions in Ethiopia.
A pension Admin system for the Federal Social Security Agency and for the Ethiopian
Postal services that handles, respectively, the federal civil, military and undertaking
pensioners as well as those of the Addis Ababa city administration. This is expected to be
rolled out to all regions of Ethiopia in the near future.
5. Higher Education Information System (HEIS)
The higher education information system has been implemented in five universities. Four
of the universities have the latest UCIS version 3.0 i.e. Addis Ababa university, Mekele
university, Jimma university and Arbaminch university while Bahirdar university only
has the first UCI version 1.0. This has recently been upgraded to a higher level version.

10
Internship Report 4

From the foregoing, we’ll note that Cybersoft’s advantages include the following:
 Over thirteen years’ experience in delivery of IT solutions, since its
establishment in 1998.
 Highly qualified human capital engaged in the development of
advanced software and network solutions along with qualified
implementation teams.
 Many successful references in government automation at all levels
federal, regional district and even community as well as for
enterprises, industries and factories.
 Experience in large scale IT project management and
implementations.
 High level partnership and commitment to the success of its
customers.
 High level customer satisfaction and occasional delight.
 Experience in long term customer support.
 Stable consulting team.
 Better price/performance solutions.
 Highly competitive.
In July, 2004 Cybersoft won the best Award for its Ethiopian Airlines website at the
exhibition that was organized by ICT focus. And also Cybersoft was nominated for the
world technology Award in New York, in 2002.

11
Internship Report 4

1.3 Staff Profile


Cybersoft’s core staffs are mostly university graduates (with gold medal, very great
distinction, great distinction or distinction) in ICT, at undergraduate and/or post graduate
levels. Currently, it has about seventy-five high level permanent professional staff with
advanced knowledge in state of the art information technology. The number of
professionals is projected to soon grow to over one hundred. It has also about fifty
administrative and support staffs as well as about forty virtual ICT partners that help
mitigate the brain drain in to a brain gain. For a company of its size, Cybersoft has been
equipped with a very high level intellectual capital, by international standards

12
Internship Report 4

Chapter II
2. Work Responsibilities and Assignments
In my hosting company my position given from our guide was first to prepare
a software requirement specification document which will enable to develop our new
desktop application. The reason to choose these project was among the various means of
signing a contractual agreement the management requirement information system is most
simple, cost effective and resolve conflicts. In simple terms, the system is the practice of
keeping the data or information of the clients in DB. The focus behind the system is to
ensure the contractual agreement will be handled by Cybersoft on the specific time they
do have agreed.

2.1 SRS Document Preparation


SRS document is the software requirement specification document that provides a
reference validation of the final product. And if we prepare the SRS document with high
quality this will be the prerequisite for high quality software. Because of the high quality
of the SRS document it will reduce the development of lost.
The components include functionality, performance, external interface and attributes. So
in order to gain high quality software we have to make sure we are preparing a good SRS
document that includes:-
 Complete
 Unambiguous
 Verifiable
 Correct
 Consistent
 Modifiable
The SRS document is helpful for the administrator, developer and the tester etc. The SRS
document will provide a generalized idea about the product.

13
Internship Report 4

The audiences who will use the product are:-


 Administrator
Administrator will get the brief idea of the total functionality of the overall product.
Administrator will have the clear idea of different components of the products and how
these various components will interact with each other.
 Developer
Developers will make suitable design choices based on the requirements assumptions and
constraints. They will get the work flow of the software which would help them in
developing software in later stage.
 Tester
They can test various components of the software and check whether these components
are giving the desired output as intended.

2.1.1 Purpose
This SRS document is planned to be used by Cybersoft, to whom the projects going to be
implemented. The purpose of this document is to present the detail description of all
requirements to be included in the requirement management system and also explain the
purpose of feature of the system, the operational environment and design implementation
constraints, what the system will do and the interface of the system, and also the
document is intended to create a communication between the stakeholders, system
analyzer and the developer of the system.
The system will be designed to maximize the software requirement management
efficiency to resolve the conflicts between Cybersoft and its clients, by maximizing the
management system and the production of the company meeting customer satisfaction.
More specifically this system is planned to facilitate communication between interested
groups.
To generalize the purpose of the SRS document
 The software is for the automation of company management.
 The software includes maintaining client’s detail.
 Providing and maintaining all kinds’ services for the client.

14
Internship Report 4

2.1.2 Project Scope and Limitation


The system is specifically intended to be used by Cybersoft software vendor. The system
will manage starting from the contractual agreement between the client and Cybersoft
software vendor all the necessary steps up to the production of new software product. The
system will facilitate communication between the analyzer, designer, developers and the
clients. The system excludes the process after the production of the software, because
there is limitation of time to request any changes arise from the client side.
 The proposed software product is the management requirement information
system (MRIS). The system will be used to get the information from the clients
and storing data.
 The current system in use is a paper based system. It’s too slow and can’t provide
updated lists of clients within a reasonable time frame.
 The intensions of the system are to reduce time waste and increase the number of
clients that can be treated accurately.

2.1.3 Overview
 This software requirement specification document is the requirements work
product that formally specifies management requirement information system.
 The objective of this document therefore is to formally describe the system’s high
level requirements including functional requirement, non-functional requirement
and constraints.
 These include a general description of the product, user characteristics, general
constraints and any assumptions for this system.

2.2 Product Perspective and Features


The Cybersoft management requirement information system is carried out for the projects
that are going to be implemented for monitoring the management system of new software
product. The system is very useful to manage changes that are requested from the client
before the system is released. Request time is the main factor for the acceptance or
15
Internship Report 4

rejection of changes in the requirements. And also the system a self-contained that
manages activities of the company as client information, various stakeholders are
involved in the company client information system.
The system functions can be described as follows:-
Registration
 When a new client is admitted. The administrator will create a new
account.
 Client project number will be given.
 The client’s information such as address, telephone, fax number, and
other information entered in to the computer system.

2.2.1 Operating Environment


The Cybersoft management requirement information system will operate if and only if
the system is installed on the computer because our system is a desktop application i.e.
we can’t find it browsing from the internet.

Fig .1 System Environments

16
Internship Report 4

The system has three active actors and one client. The analysis engineer will collect the
data and prepare the SRS document. The prepared document will post pond to the
designer, then after the designer will design the graphical user interface then finally the
developing team by getting the SRS document and the database will develop the new
software product

2.3 User Classes and Characteristics


 Analysis user class
The system analysis will gather important information from the customer site or
from the internet and mainly from the clients this will enable the analysis engineer
to prepare the SRS document and they will analyze the collected data to
conceptualize what exactly needs to be done, so the SRS document will be
prepared.
Step by Step Description
1. The analysis engineer gathers the information from the client.
2. They also collect the data from the customer of the client.
3. They can also get additional information from the internet.
4. The analysis will analyze the collected data.
5. The analysis will order the collected data.
6. Then they will lay out the functional requirement of the system from the
gathered data.
7. Finally they will make a good SRS document using the SRS document content
from the system.
 Designer user class
The system designer will design the functional and non-functional requirement of
the system using the SRS document from the system analysis. And they will also
design every necessary graphical user interface that will fit best for the project.

17
Internship Report 4

 Developer user class


The developer will change the designed data into new software production. As it’s
a desktop application the developers can show every necessary information for
the client that’s going to make a contract with Cybersoft.
Step by Step Description
1. The developer must take the designed data from the designer and implement.
2. And will work on the graphical user interface of the system to make it easily
understandable by the client.
3. Finally they will attach the system with user interface.
 Tester user class
The system tester will taste the software in which whether it’s working
appropriately or not. The team also tests the new software products regarding the
performance of software and with the traceability of customer requirement.
 Client user class
Clients are those who want to make a deal with Cybersoft for any type of software
solution.

2.4 Design and Implementation


1. The system design and code implementation follows the Microsoft visual
studio.
2. The system shall use the SQL server to create the database.
3. The system developed uses desktop application format.
4. The system shall provide a simple way to be accessed by the clients there
shouldn’t be any complexity.

2.5 Assumptions and Dependencies


Assumption1. The system will only work by the client’s user name and password.
Assumption2. It’s assumed that the company will have enough trained staff to
take care of the system.

18
Internship Report 4

Dependency1. The system operation depends only for those who can access
because of that it’s a desktop application format.
Dependency2. The system operation depends on the availability of the clients and
also their performance how to go through the system.

2.6 Use Cases


Use Case 1. Installation
Primary actor: - User
Precondition: - Desktop application
Main scenario: - System asks the user for the home directory in which all the
working files will be created, user also asked for the initial login and password.
Use Case 2. Login
Primary actor: - User
Precondition: --
Main scenario:-
 Start the application user prompted for login and password.
 User gives the login and password.
 System does authentication.
 Main screen is displayed.
Alternative scenario: - Authorization fails
 Prompt the user that he/she typed the wrong password.
 Allow him/her to re-enter the password, give three chances.
Use Case 3. Change Password
Primary actor: - User
Precondition: - user logged in
Main scenario: -
 User initiates the password change command.
 User is prompt for old password, new password and confirm password.
 System does authentication.

19
Internship Report 4

 New password is registered with the system


Alternative scenario: - Authorization fails
 Prompt the user that he/she typed the wrong password.
 Allow him/her to re-enter the attributes, give three chances.

2.7 Specific Requirements

2.7.1 Functional Requirement


Functional Requirements1. The system will manage all the client information
including the address, detail information about the client for example if any problem
arise during the project, if we have full information about the client there will be a
contact person so by discussing the problem will be solved.
Functional Requirements2. The problem will handle the contractual agreement
like when did the contract made the date, by which it was signed and when the project
will be finalized so different phases of the contract could be handled.
Functional Requirements 3. The system will manage the software project, in
which the way how to use the software system.
Functional Requirements 4. The system will handle the system user by creating
new account for the clients and make a brief description of the role of the system.
Functional Requirements 5. The system will also check the progress of the project
every time what do mean by status tracking.
Functional Requirements 6. The system is intended to control the changes that
may be requested from the client.
Functional Requirements 7. Use case generation.

20
Internship Report 4

2.7.2 External Interface Requirement


 User Interface
 The software provides good graphical interface for the user any
administrator can operate on the system, performing the require task such
as create, update and so on.
 Allows the developer to do their work more efficiently.
 Allows user to view quick reports in the company.
 The system provides a help link on the display that helps for the developer
how to use the system.
 Hardware Interface
 Operating system…………..window 7
 Hard disk……………………..40GB
 Software Interface
No software interface.
 Communication Interface
Window

2.8 VMware Workstation


Besides developing the MRIS my duty during the internship period was creating a new
virtual machine by using the VMware workstation. I will try to give a detail description
about VMware workstation.

2.8.1 What is VMware Workstation


VMware workstation is powerful desktop virtualization software for software
developers/testers and IT professionals that runs multiple operating systems
simultaneously on a single physical pc.

21
Internship Report 4

Users can run windows, Linux, Netware or Solaris x86 in fully networked, portable
virtual machines no rebooting or hard drive partitioning required.
VMware workstation delivers excellent performance and advanced features such as
memory optimization and the ability to manage multi-tier configurations and multiple
snapshots.

With millions of customers and dozens of major product awards over the last six years,
VMware workstation is a proven technology that improves productivity and flexibility.
VMware workstation has become the indispensable tool for software developers and IT
professionals worldwide.

2.8.2 How is VMware workstation used?


The powerful and flexible virtualization properties and features of VMware workstation
enable a wide range of solutions for a diverse set of users, individuals and organizations
use VMware workstation to:-
 Improve team collaboration
The portability and hardware independent property of virtual machines, coupled
with new features in VMware workstations lets users easily share development
environments and prepackaged testing configurations without risk.
 Introduce virtual infrastructure to an enterprise
Virtual machines created in workstation can be deployed to the other desktop and
server virtualization platforms offered by VMware. Introducing VMware
workstation virtualization to the desktop is an ideal first step to transforming your
physical IT infrastructure into virtual infrastructure.

22
Internship Report 4

2.8.3 Hoe does VMware workstation work?


VMware workstation works by creating fully isolated secure virtual machines that
encapsulate an operating system and its applications. The VMware virtualization layer
maps the physical hardware resources to the virtual machine’s resources, so each virtual
machine has its own CPU, memory, disks and I/O devices and is the full equivalent of a
standard x86 machine. VMware workstation installs onto the host operating system and
provides broad hardware support by inheriting device support from the host.

2.8.4 Key Features


 The only desktop virtual machine software that runs on both windows and Linux
host operating systems allows users to create two-processor virtual machines and
supports certain 64-bit host and guest operating systems and 64-bit extended
processors.
 Broader device support, better performance and more powerful functionality than
any other desktop virtual machine software.
 Powerful virtual networking options with NAT devices, DHCP server and
multiple network switches let you connect virtual machines to each other, the host
machine and public networks.
 Share folders drag and drop operations and copying and pasting between guest
and host.
 Get the full functionality of native program debugging in a virtual machine with
support for both user and kernel-level debuggers.
 Each virtual machine has configurable memory size, disks and I/O devices and
also supports for CD, floppy, USB, DVD and CD-ROM devices.
 Virtual machines are isolated from each other, ensuring that if one crashes, the
other virtual machines and the host machines are unaffected.
 A virtual machine is a set of portable hardware independent files that can easily
be shared.
 Support for new 32-bit guest and new 64-bit host operating systems.
 Support for a class of streaming USB devices, including webcams and speakers.

23
Internship Report 4

2.8.5 Why use VMware Workstation?


USAGE SCENARIOS BENEFITS
Streamline software development and  Accelerate development/test cycles
testing and reduce time to market.
 Develop and test multiple operating  Reduce hardware costs by 50-60%
systems and application in a single
pc.
 Connect virtual machines to  Reduce costly configuration and
simulate and test multi-tier set-up time by 25-55%
configurations.
 Use multiple snapshots and  Improve project quality with more
debugging support to facilitate rigorous testing.
testing.
 Archive test environments on file  Ensure that users always test from a
servers where they can easily ” clean” state.
(restored) shared.

 Configure and test desktops and 


Enhance productivity of IT professionals
Increase operations efficiency by up
servers as virtual machines before to 50%.

 Test new multi-tier applications, 


deploying them to production.
Reduce time needed to test new
application updates and operating software and improve quality of

 Host legacy application with virtual 


system patches on a single pc. deployments.
Eliminate risk to production
machines, thus facilitating networks by creating isolated
operating system migrations and virtual test networks.

 Create a virtual library of end-user 


eliminating the need to port legacy.
Complete operating system
configurations on a shared device. migration projects with minimal


end-user disruption.
Accelerate help desk resolution of


end-user problems.
Facilitate computer based training and Reduce hardware needed in

 Package and deploy classroom 


software demos classroom.
Decrease time required to prepare

 Allow students to experiment with 


material in virtual machines. for a new class.
Ensure that students always start
multiple operating systems, from a “clean” state.
applications and tools in secure,
isolated virtual machine.

24
Internship Report 4

 Configure virtual machines to  More stable demos and reduced


“undo” all changes at shutdown.

setup time and hardware costs.
Demo complex or multi-tier
configurations on a single laptop.

Table1. Use of VMware workstation

25
Internship Report 4

Chapter III

3.1 Networking
Beside the software development Cybersoft is playing the greatest roll in the network
solution field. The company gives almost all kinds of networking services including
designing, installing and configuring data and voice networks on both local and wide area
networks. Beside these the company also works on upgrading an existing network after
the completion of any network installation the company made, it also gives short term
training to the end users. Consultancy is the other service the company gives regarding
networking.
The first and foremost task in the networking is to prepare the bid document. That is to go
to the site and take important measurements and drawing of the floor plan of the place
where the network is going to be installed. During the site visit some other primary
decisions like locating the appropriate locations for the servers, routers, switches and
other networking equipment, node allocation, selection of backbone root and selection of
equipment is also decided.
Then the suitable physical logical topology will be chosen according to the structure the
site and certain criteria set by the company like number of nodes needed the number of
servers and switches available and so on.

3.2 Physical Topology


Refers to the way in which a network is laid out physically. The topology of a network is
the geometric representation of the relationship of all the links and linking devices
(nodes).

26
Internship Report 4

I. Mesh
Every device has dedicated point to point link to every other device. Dedicated means
that the link carries traffic only between the two devices it connects.
Advantages
 Robust: - if one fails the other will not fail.
 No data traffic.
 Fault identification.
 There is the advantage of privacy or security.
Disadvantage
 Installation and reconnection are difficult.
 The sheer bulk of the wiring can be greater than the available space (in walls,
ceiling or floors)
 Expensive
E.g. used in the connection of telephone regional offices connected to every other
regional office.

Figure 1. Mesh Network


II. Star
Each device has a dedicated point to point link only to central controller (Hub). Doesn’t
allow direct traffic between devices.
Advantage
 Less expensive
 Robustness
 It’s easy to install and reconfigure

27
Internship Report 4

 Easy fault identification and fault isolation


Disadvantage
 If the hub goes down, the whole system is dead.
 Cabling is required than other topologies (ring or bus)

Figure 2. Stark Network


III. Bus
One long cable acts as a backbone to link all the devices in a network. Nodes are
connected to the bus cable by drop lines and taps.
All drop line is a connection running between the device and the main cable. A tap is a
connector that either splices in to the main cable or punctures the sheathing of a cable to
create a contact with the metallic core.
Advantages
 Easy for the installation.
 Use less cabling than mesh or star.
Disadvantage
 Difficult reconnection and fault isolation.
 Difficult to add new devices
 Signal reflection at the taps can cause degradation in quality.
Adding a new device may require modification or replacement. And it was one of the
first topologies used early design of LANs.

28
Internship Report 4

Figure 4. Bus Network


IV. Ring
Each device has a dedicated point to point connection with only two devices on either
side of it.
In a simple ring, a break in the ring such as disabled station can disable the entire
network. This can be resolved by using a dual ring or a switch capable of clothing off the
break.
Advantages
 Easy to install.
 Fault isolation is simplified
Disadvantage
 Unidirectional traffic.
 Less popular previously used in IBM.

Figure 5. Ring Network

29
Internship Report 4

V. Hybrid
The combination of two topologies, e.g. star and bus.

Figure 6. Hybrid Network

3.3 Network categories


I. LAN (local area network)
 Size is limited to a few kms.
 Links the devices in a single office, buildings or campus.
 Designed to allow resources to be shared between personal
computers or workstations.
II. WAN (wide area network)
 Provides long distance transmission of data, image, audio and
video information large areas, country or the world.
 Switched WAN connects the end system, which usually comprise
a router, that connects to another LAN or WAN.
 Point to point WAN a line leased from a telephone or cable TV
provider that connects computers to internet.
III. MAN (Metropolitan area network)
 It’s a network with a size between LAN and WAN.
 Covers the area inside town or city.
 High speed connectivity.

30
Internship Report 4

 All materials and devices we used in network project was


 Switches
 Routers
 Cables
 UTP
 Conduits
 Patch panel

3.4 Networking Devices


1. Hub
Are simple devices that direct data packages to all devices connected to the hub. And
there are two types:-
 Passive: - doesn’t provide a pathway for the electrical signals to
travel along.
 Active: - provides a path for data signals, regenerates the signal
before it forwards to all of the connected devices.
2. A multi station access unit (MSAU)
Used by creating a token ring LAN. Token ring network is a local area network.
Connects a group of computers in ring or star.
Prevent collision of data between two computers.
3. Switches
Are the connectivity points of an Ethernet network, the same like hub.
Devices connect via twisted pair cabling, one cable for each device.
The difference between hubs and switches is in how the devices deal with data that
they receive.
4. Bridges
 Used to divide larger networks in to smaller sections.
 The data will pass through the bridge if and only if the data is intended
otherwise fail.

31
Internship Report 4

5. Router
Is a device that forwards data packets between computer networks, creating an
overlay inter network.
It is connected to two or more data lines from different networks. It can route
data it receives from one network on to another.
When a router receives a packet of data, it reads the header of the packet to
determine the destination address.
The router can get the information for the routing table.
 Static routing: - routes and route information are entered in to the
routing tables manually. Time consuming task but errors are
common.
 Dynamic routing:- routers use special routing protocols to
communicate. The protocols enable the routers to pass on
information about themselves to other routers so that the other
routers can build routing tables.

6. Gateway
It’s any device that translates one data format to another.
 A router that translates data from one network protocol to another.
 A bridge that converts between networking system.
 A software application that converts between to dissimilar form.
7. CSU/DSU (channel service unit/digital data service unit)
 It’s a device that converts the digital signal format used on LAN’s
into one used on WAN’s.
 Necessary because the networking technologies used on WAN’s are
different from those used on LAN’s.
8. NIC (Network interface cards)
 Are devices that enable computers to connect to the network.
9. Wireless access points

32
Internship Report 4

 Are transmitter and receiver (transceiver) device used to create a


WAN.
 Are typically a separate network device with a built in antenna,
transmitter and adapter.
 Use the wireless infrastructure network mode to provide a connection
point between WLANs and a wired Ethernet LAN.

3.5 Knowledge and Acquaintances acquired


In the real world environment, analytical skills are not enough. Students must have both
interpersonal and leadership abilities. By efficiently using internships beside the
education, students will increase their theoretical knowledge in to practical skill and
make themselves extremely important to the job market, as per the day can increase the
efficiency of their business as well as to their employers.
The internship had provided me to the opportunity to gain hands on work experience that
I just can’t get in the classroom. The time I spent in Cybersoft plc. has helped me in
improving my practical skills, theoretical knowledge, interpersonal communication skill,
team playing skills and work ethics.

3.5.1Advantages in terms of improving


practical skills
By the time when I joined Cybersoft plc. it was really difficult to write a program for
some task even though we took the courses it wasn’t that much helpful to do it by myself
the main reason here is that the course doesn’t go far more than it’s theoretical parts. But
thanks to the very cooperate workers in Cybersoft. They helped me to have the knowhow
to work deeply in the programming part. The developers the greatest roll in informing me
about the field.

33
Internship Report 4

At the same time the networking work was also new for me. But the people that work on
the field were very kindly helpful in making me informed about many of the concepts
regarding the field even though I do have spent much of my time in the developers team
of the company.
Soon after, I was able to develop software. The knowledge and skill I have before and
after the internship it’s totally incomparable. During the time I spent there I knew how
new software can be developed.

3.5.2Advantages in terms of managing skills


and upgrading theoretical advantage
As I have been participating more of the time in the developer’s team and I have got a
great knowledge about it throughout the intern time I spent in my hosting company. And
beside I’ve got the ability how to manage each time which thing could become at the first
place and which one will proceed. And at all the management skill award me to visualize
every work on the specified time.
When practically working on things that we had never been engaged previously, our
theoretical knowledge will also be upgraded simultaneously.
Things will be more memorized when they are done practically. So, during my internship
I developed my theoretical knowledge when I did the practical works. This practice has
made me to have a strong base theoretical and practical aspect of knowledge.

3.5.3 Acquaintances Acquired


During my internship period I worked with one of my classmate, working there as an
intern, has greatly facilitated the improvement of my as a team. Generally I have
improved my team playing skill with a great deal. And I have become fully aware that
working in teams gives strength, ability and guides doing things deeply. And beside these
working as a team is the key point in our company to gain the maximum possible output
than working individually.

34
Internship Report 4

The major work responsible the one that I was participating during my internship
program is that for each and every works will be handled in collaboration. So what I had
learnt in this internship is that doing things in a team makes things easier to solve. The
work nature of the company by itself supports and recommends making every task in a
group.

3.5.4Advantages in terms of understanding


about work ethics and related issue
Every company has its own rules and regulations governing the day to day activities of its
employees. Respecting those rules and regulations is the first task of any employee within
the company. But there are also some work ethics usually not covered under the rules and
regulations. These work ethics are thoughts to benefit any person morally after fulfilling
them. This may include respect, communication, interactions and how one gets along
with others. Work ethics are the easiest way to demonstrate who and how a person is.
Work ethics involves such characteristics as honesty and accountability.
What i have seen in my hosting company and makes me surprise was the self-
management policy. Everyone will carry out his/her responsibility by themselves no one
will be looking for these because of these everyone is self-organized and work freely
Those was the things I kept in mind while performing my job and also the behavior of the
co-workers there and their advice has greatly helped me in advancing my idea towards
the working ethics will gain in great respect and honor from the co-workers in return.
And giving respect for the work ethics means giving a respect for one self. The more
ethical worker one is the more he/she get respected.
According to this I have finalized the last 4 months being on ethical worker. For this to
happen the contribution of the workers around me was not measurable. Working with
ethical workers had made me to be an ethical worker.

35
Internship Report 4

Chapter IV

4.1 Problems encountered during the internship period


The first challenge I encountered during my internship period was being new for the
professions available regarding the courses I took in my field of study. For this matter it
has took me long time while I adjust myself with the professions. The workers the
especially my advisor helped me in a great deal to accomplish the prerequisites I have to
know first. Then through time I had advanced my knowledge regarding the professions
through browsing the internet and reading PDF and other helpful books I have got from
the company in different times.
The other challenge I counted beside the profession that I have tried to explain previously
was to adapt myself to the enter company workers. Since the environment was definitely
new I spent some of the working days without having significant conversations with the
workers. Through time I make myself communicable among the workers.

4.2. General suggestion &comment to the company


The hosting company that I have belonging during my internship period was really
amazing even though it is my first time to be participating in the real world the company
did remarkable jobs than I heard about other companies. Why I said these starts from the
owner of the company because when someone took a part as a leader he must not make it
personal and do not rush in to for personal attack in the other hand he has to change or
modify his own position when he found other person’s idea is better and more
convincing. The owner of the company was like any ordinary employees working under
other organizations and companies. But due to their strong motivation combined with
their knowledge and experience in the field it had enabled them to control and manage
such a profitable company.

36
Internship Report 4

The motivation and struggle made by the owner of the company in establishing the
company at time has become an assurance for many of its employees today.
This was my reason to say the company was remarkable. Beside these to make the
company more better is that if they can make branch offices in different place outside
Addis Ababa cause these is helpful and make the company profitable than before. I also
observed in the department of human resource there is a problem of allocation. Some
non-qualified workers assigned on some tasks that were not related with their professions
what I recommend here is that an employee specialized on certain field should only
engaged on his/her specialization not on others. So these are the things that I recommend
for my hosting company to make it better.

37
Internship Report 4

4.3 Conclusion
This internship program has passed me priceless knowledge and experience. And enabled
me to know about the basic concepts of the sections I have been participating. The
software development section has enabled me to be confident in participating on each
stages of the development.
The other parts of the internship experience that I give them a great value are the different
social and professional skills that I gained from the workers and the work environment.
As included in this report with a brief explanation, I developed many valuable personal
and professional skills. These skills include: Interpersonal communication skill, work
ethics related skills. Generally I want to appreciate the role of the internship in
introducing students with practical work experience.

38
Internship Report 4

4.4 References

 www.cybersoft-intel.com
1. Web resources

 www.vmware.com
 www.google.com

 Entity Framework 4.1 code first


2. Video tutorials

 Train signal SQL server


3. Andrew Stellman and Jennifer Greene (2010), Head First C# ,chapter I 1-38
4. James F.Kurose and Keith W.Ross (2000), computer networking, 22-54.
5. William Stallings (2003), data and computer communications, 69-91
6. VMware, Inc. (2013), Getting started with VMware Workstation, 7-34.

39

You might also like