Arba Minch University: Institute of Technology

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

ARBA MINCH UNIVERSITY

INSTITUTE OF TECHNOLOGY

FACULTY OF COMPUTING AND SOFTWARE


ENGINEERING
DEPARTMENT OF COMPUTER SCIENCE
Internship Report on AMU ICTC
Group Members
Name ID.no
1. Abdi Merera ……………..RAMIT/1539/10
2. Abdirazak Iman…………...RAMIT/1545/10
3. Abdulhafiz Seid ………….. RAMIT/1547/10
4. Aklilu Kawiso……………..RAMIT/1567/10
5. Ali Muhammed……………RAMIT/1571/10
Advisor: Mrs. Yibralem Bugusa Arba Minch Ethiopia
Signature__________ July 2021
Acknowledgment
First of all, we would like to thank our advisor Mrs. Yibralem Bugusa, for the valuable
guidance and advice she gave us. She inspired and implied how we should prepare ourselves for
the practice and find solution for things we face as difficulty, and commented for correction in
this report.

We would like to express our gratitude towards Mr. Wegene for his assistance in this practice,
Also our friends for their kind co-operation and encouragement which help us in completion of
this internship report.

ii
ABSTRACT
This internship report aimed at describing practice program for 4th year computer science students
to prepare them for real world jobs. This practice includes software maintenance, network
installation.

The report will illustrate the things and skills we gained during the practice time. In the busy time
of the semester the Lab assistances were ready to do their best and we are able to cover as much
as possible in the given time.

iii
Contents
ABSTRACT ................................................................................................................................................ iii
CHAPTER ONE ......................................................................................................................................... 1
1. INTRODUCTION............................................................................................................................... 1
1.2 Historical Background of the Company (Center) .......................................................................... 1
1.2.1 Brief history of the company ..................................................................................................... 1
1.2.4 Organizational Chart of the Company .................................................................................... 3
2. Objectives............................................................................................................................................. 3
2.2. specific objectives ......................................................................................................................... 3
3. Methodology ........................................................................................................................................ 4
3.1 Primary data sources .................................................................................................................... 4
3.2 Secondary data source .................................................................................................................. 4
CHAPTER TWO ........................................................................................................................................ 5
2. Network Installation ........................................................................................................................... 5
2.1 Local Area Network .......................................................................................................................... 5
2.2 Wide Area Network .......................................................................................................................... 5
2.3 Protocol .............................................................................................................................................. 5
2.4 Networking Hardware ...................................................................................................................... 5
2.4.1 Cable crimping ........................................................................................................................... 7
2.4.2 file sharing using cross over cable .......................................................................................... 16
CHAPTER THREE .................................................................................................................................. 22
3. Technical aspect of the internship ....................................................................................................... 22
3.1. Knowledge and Acquaintances Acquired .................................................................................... 22
3.2. Technical skills gained ................................................................................................................... 22
CHAPTER FOUR..................................................................................................................................... 23
4.1 Conclusion ................................................................................................................................. 23
4.2. Recommendation............................................................................................................................ 23

iv
CHAPTER ONE

1. INTRODUCTION
An internship program is known by giving students the opportunity to apply their knowledge in
real-world environments. At the same time, we students will also develop skills that will help us
to perform better at the real-world jobs, so based on its aim we have conducted our intern
program report. Therefore, this report describes our experiences as a fourth year Arba Minch
University Intern student at Information and Communication Technology Center (AMU –
ICTC), which is located in the southern Ethiopia of the Southern Nations, Nationalities, and
Peoples Region (SNNPR) about 500 kilometers south of Addis Ababa and is the largest town in
Gamo Zone called Arba Minch.
This internship is a part of the curriculum requirement for half a semester, exactly about 2
months, but due to time constraint after Covid-19 lockdown we were able to practice for 5 days
only. The report generally describes the whole tasks we have been handling, the experience and
benefits we have been gaining, the challenges we have been facing, and measures we have been
taking to overcome them through the internship period at AMU ICT center.
The internship program took five random days due to time constraint with class schedule from
May 9 2021, to June 6, 2021. It generally describes the whole tasks Practice we did, things we
observed, the experience and work benefit we got in the intern program. The challenges we faced
and measures are taken to solve it.
We were able to practice LAN type of a peer to peer network architecture installation in Lab,
Client-Server architecture on Cisco Packet tracer and software maintenances which we observed
and practiced during our internship program.
Generally, it is the overall views of our roles in the ICTC and state recommendations concerning
the program so as to enable the University to correct the problem and to create a conformable
situation for the next generation.

1.2 Historical Background of the Company (Center)


1.2.1 Brief history of the company
Arba Minch University Information and Communication Technology Center started giving
services since 2003 following the implementation of the university’s network infrastructure by
local company named ‘Global Computing System’ (GCS). The ICTC is giving so many services
in all of the university’s campuses. This ICTC has a great contribution to the development and
growth of the university to make it the best competitive university in the country. ICTC staffs are
currently working on a number of projects to enhance the University's ICT services and to
support the delivery of the University's administrative and academic functions in line with the
University's ICT Strategy.

1
The AMU-ICTC provides different kinds of services efficiently and effectively for the
The satisfaction of workstation, employees and students.
The main services are: -
• LAN service
• Internet service
• Central service
• Classroom service
• Workstation (WS) service
• Web service
• Maintenance and Helpdesk Services
The other services of AMU-ICTC such as;
• AMU Ubuntu mirror Antivirus
• Network Enabled Applications Digital library
• E-learning and digital library E-learning facility
• Email Ere source
• Intranet IP based PBX
• Network Enabled Applications Official website
• Student management information service (SMIS) Thin client facilities
• Video conferencing Wireless computing

The following list is the offices in AMU-ICTC who held responsibilities to serve the
good will of the university to the best of them.
➢ ICT-director
➢ ICT-consultancy
➢ System admin. service professional
➢ Assistant system Engineering
➢ Database admin/developer
➢ Network and network security Engineer
➢ Network and network security professional
➢ Senior Network technician
➢ Assistant network development professional
➢ E-learning administer trainer
➢ Customer supply manager
➢ Help desk staff main campus
➢ Senior maintenance technician
➢ Maintenance technician of PCs
➢ Maintenance technician of printers and copies
➢ Classroom technician

2
1.2.4 Organizational Chart of the Company
In Arba Minch University information & communication technology centers have four
main parts depends on the jobs & other supportive careers. These main careers are
operating system and services, network and network security, customer support manager
and project support training.

Figure 1 Overall organization structure and workflow of AMU-ICTC

2. Objectives
2.1. General objectives

✓ To develop the theoretical knowledge with practical skill.

2.2. specific objectives


✓ Installing and maintaining network cables at ICT center.

3
✓ Maintaining software and devising a better way to keep the components of normal
status at ICT center.
✓ To be aspect full confidence in practical environment.
✓ To solve any problem during network installation.

3. Methodology
As we all know, there are two sources of data; primary and secondary data sources.
Therefore, we were using these methods of data collection.

3.1 Primary data sources


The Primary data sources are: 1 Interview, 2 Observation

1) Interview: essential information is gotten from the pragmatic work. This helped us
to accumulate data legitimately from the representatives by posing such huge
numbers of inquiries at the workplace about the organization working framework,
the executive's framework, and what they are doing at a given time. If any unclear
concept from the employees, we can contact our supervisor at any time.
2) Observations: We collected so much information by using this method of data
collection. To understand the confidentiality willingness share of knowledge and
work ethics of the workers we have not asked any question rather than observing
the fact.

3.2 Secondary data source


External source- Different websites related to the company and online resources

4
CHAPTER TWO
2. Network Installation
A network consists of two or more computers that are linked in order to share resources,
exchange files, or allow electronic communications. The computers on a network may be linked
through cables, telephone lines, radio waves, satellites, or infrared light beams.
Two very common types of networks include:
✓ Local Area Network (LAN)
✓ Wide Area Network (WAN)

2.1 Local Area Network


A Local Area Network (LAN) is a high-speed data network that covers a relatively small
geographic area. It typically connects workstations, personal computers, printers, servers, and
other devices. LANs offer computer users many advantages, including shared access to devices
and applications, file exchange between connected users, and communication between users via
electronic mail and other applications

2.2 Wide Area Network


Wide Area Networks (WANs) connect networks in larger geographic areas, such as the United
States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect
this type of global network.

2.3 Protocol
A protocol is a set of rules that governs the communications between computers on a network. In
order for two computers to talk to each other, they must be speaking the same language. Many
different types of network protocols and standards are required to ensure that your computer can
communicate with another computer located on the next desk or half-way around the world.

2.4 Networking Hardware


Hub

• is simple network device and is reflected in their low cost.


• Small hubs with four or five ports (often referred to as workgroup hubs).

5
• Hubs with more ports are available for networks that require greater capacity.
• Computers connect to a hub via a length of twisted-pair cabling.
• In addition to ports for connecting computers, even an inexpensive hub generally
has a port designated as an uplink port that enables the hub to be connected to
another hub to create larger networks.

Switch

Switch looks much like a hub.


Despite their similar appearance, switches are far more efficient than hubs and are far more
desirable for today’s network environments.
Figure 4.3 shows an example of a 32-port Ethernet switch.
If you refer to Figure 4.1, you’ll notice few differences in the appearance of the high-density hub
and this switch
• Also computers connect to a switch via a length of twisted-pair cable.
• Multiple switches are often interconnected to create larger networks.
Despite their similarity in appearance and their identical physical connections to computers,
switches offer significant operational advantages over hubs.

Router

This device is a backbone device for almost all networks. It can be connected to switches and
hubs or it can be connected directly to computers. It is used to forward data packets to another.

6
2.4.1 Cable crimping
The steps to crimp RJ45 are:
• We can use this procedure both for straight through and crossover cable arrangement.
1. Cut the cable by the cutter then
• Strip cable end
• Untwist wire ends
• Arrange wires
• Trim wires to size
• Attach/crimp connector
• Check and test
The need to arrange color arrangement of cables came from the ports of NIC on different
devices.
The different arrangements of ports are the following

For router and PC


For Switch
PIN1. Send
PIN1. Send
PIN2. Send
PIN2. Send
PIN3. Receive
PIN3. Receive
PIN4. DC+
PIN4. DC+
PIN5. DC+
PIN5. DC+
PIN6. Receive PIN6. Receive
PIN7. DC- PIN7. DC-
PIN8. DC- PIN8. DC-

There are 3 types of cable crimping.


1. Straight through
2. Crossover
3. Rollover

7
• Straight through UTP cable: use to connect different network devices like
• Switch to router
• Switch to PC
• Switch to server

Straight through UTP cable


A B

Side A Side B
1. White/orange 1. White/Orange
2. Orange 2. Orange
3. White/green 3. White/Green
4. Blue 4. Blue
5. White/Blue 5. White/Blue
6. Green 6. Green
7. White/Brown 7. White/Brown
8. Brown 8. Brown

➢ Both sides (side A and side B) of cable have wire arrangement with the same color.

8
Crossover UTP cable: use to connect the same types of network devices such as
✓ PC to PC
✓ Switch to switch by using normal port
✓ Router LAN port to switch normal port

Cross over cable order…….

1. White/orange 1. White/Green
2. Orange 2. Green
3. White/green 3. White/Orange
4. Blue 4. Blue
5. White/Blue 5. White/Blue
6. Green 6. Orange
7. White/Brown 7. White/Brown
8. Brown 8. Brown

9
Rollover UTP Cables: Mostly known as Yost Cables. They are most commonly used to
connect to a device’s console port to make programming changes to the device. Unlike crossover
and straight wired cables rollover cables are not intended to carry data but instead create an
interface with the device.

SIDE A SIDE B
1. White/orange 1. Brown
2. Orange 2. White/Brown
3. White/green 3. Green
4. Blue 4. White/Blue
5. White/Blue 5. Blue
6. Green 6. White/Green
7. White/Brown 7. Orange
8. Brown 8. White/orange

Task 1: LAN Configuration

In this task we practiced to install and configure LAN type network with the following
description

Network type: Local Area Network (LAN)

Network Architecture: Peer to peer network

10
Network Topology: Bus topology

For the above specification the required materials are the following.

Cutter:

We use cutter to cut the UTP cable to the needed point.

Cable Tester:

Cable taster is a device we use to check whether the cable is working or not. This device
also uses to check whether the cable is a Cross over or straight through or roll over cable
by its lighting coordinates.

Crimper:

11
This tool uses to connect/ attach the UTP cable with the RJ-45. This tool also have the
cutter and striper on it. It is very useful tool for the networking environment.

RJ-45:

➢ This tool is a port to be plugged on the NIC. It will be attached with the UTP cable using
crimper. “RJ” stands for
Register Jack, it is standardize network interface and “45” refers to the number of interface
standard.

CAT 6 UTP Cable:

➢ The Unshaded Twisted Pair cable is a type of cable we used in this peer-to-peer network
installation. It is a standardized cable for Gigabit Ethernet and other network physical
layers.

Striper:

This tool is uses to cut the upper coat of the UTP to find the inner 8 wires.

Computers:

12
These computers are the nodes which will act as a workstation.

Steps to Crimp UTP Cable


Step 1

Strip the cable 1/2 inch or1.5cm down from the end using cable strippers.
Carefully trim off ripcord.

Step 2 Remove the insulator cover of the cable.

Step 3

Untwist each pair of wires down to the sheathing. If you’re working with CAT-6 wire, cut
the center core down to the cable end.
Layout the side of the wires of this side in this order: white-orange; orange; white-green;
blue; white-blue; green; white-brown; brown.

13
Step 4

Trim all the wires to the same length,

1/2-3/4 in. from the sheath.

Step 5

Insert the wires in the order specified in Step Two above into the RJ-45 plug. The cable
sheath should extend into the plug by about 1/2 in. and will be held in place by the
crimp.

14
Step 6
✓ Crimp the terminal with the appropriate crimping tool.

Step 7

Make sure the wires are in the right order, extend to the front of the plug and make good
contact with the metal contacts in the RJ-45 plug.

Repeat project steps one through four to attach a connector on the other end of the cable
based on the required cable type.

15
2.4.2 file sharing using cross over cable
➢ The main advantage of using the ethernet cable method is faster transfer speeds, at
least faster than your regular flash drives and Wi-Fi.
➢ The following step is used to share file
Step 1: Connect Both PCs With LAN Cable

➢ You can use any LAN cable (crossover or ethernet cable); it doesn’t matter on a modern
computer. Because both of them use the same port and have very few functional differences
Step 2: Enable Network Sharing on Both PCs

➢ Now that you have physically connected both PCs with a LAN cable, we have to turn on
Network Sharing on both computers to exchange files between them. It is a simple process
step-by-step process. Make sure you do this on both PCs.

Once the Control Panel window opens, click on Network and Internet.

16
Then click on network and share center

click on “Change advanced sharing settings”

17
➢ Then you’ll find three networks – Public, Private and All Network. Public Network is for
places like airports and coffee shops, Private network is for an organization or your home
network and All Network comprises of both. To make sure, the setup is flawless, we’ll
recommend you choose “All Networks”

Next, expand All Networks by clicking on the drop-down icon. Here, we need to enable Public
Sharing so that the PCs can access files from each other over the LAN cable. To avoid more
configuration, just Turn off password protected sharing and finally click on save change.

Step 3: Setup Static IP

➢ Now that you have enabled network sharing on both PCs, it’s time to bring both the
computers on to the same network. We will do this by setting a static IP address of the
same class. Just like the previous step, you need to do this on both PCs.

18
The following are the steps
Step 1:Click on the Ethernet link. select “Internet Protocol Version 4 (TCP/IPv4)”,then here
click on the Properties button.

Step 2:Here, you need to configure the two PCs with different IP settings.

On computer 1,2, select the option “Use the following IP address.” and, put the following values
or put your value.but both computer are use different value .

Step 4: Share a folder


Assuming that you have connected the cable properly, enabled the sharing options, and
configured the IP addresses. Now, it is time to send files from one PC to another. For that, you
first need to share the target folder on LAN. I’ll recommend, you can create a new folder on your
desktop, and copy paste all the files that you want to move to another computer in that folder

19
Next, select the folder you want to share and right-click on it. From the context menu, navigate
to “Give access to” and select the option “Specific People.”

In the File Sharing window, choose Everyone from the drop-down menu. Click on
the Add button next to it and finally hit the Share button

20
Task Three: -password cracking using passcape software
➢ password cracking is the process which of recovering passwords from data that have been
stored in or transmitted by a computer system.
How does it work?
Download Windows Password Reset and then you will be needed some steps to follow:

step 1: A blank CD/DVD disk or an empty USB drive to create a reset disk.
step2: An accessible computer on which reset disk will be created.
step3: A good internet connection to download the setup.
step4: Install and Run the setup to get started with Windows 10 password recovery.

Features
✓ Enables and unlocks user accounts.
✓ Disables the password expiry option.
✓ Deletes passwords and other sensitive data from the computer.
✓ Resets and modifies passwords of local users and administrators, domain administrator,
Active Directory users, DSRM account.
✓ Reset Windows Passwords
✓ Remove Windows Passwords
✓ Delete Windows Accounts
✓ Add New User Accounts

21
CHAPTER THREE
3. Technical aspect of the internship
3.1. Knowledge and Acquaintances Acquired
we have gained some skills during the five days of the internship program. Some of them
include: -

✓ We have gained knowledge about how organizational structure looks like and how to
behave in a company.

✓ we have learned how important it is to be punctual!

✓ we have improved my technical and personal skills that we have learned theoretically,
after becoming familiar with new techniques and methods.

✓ we sometimes exercised individual responsibility and develop strong teamwork skills


with the employees.

3.2. Technical skills gained


The following were the technical skills we obtained during my five days of practice in
the real world.

In general, we developed confidence on;

✓ Trying to do practical work without any fear.

✓ Looking for the problem in the field and giving a quick and effective response to
solving it, if any.

✓ Understood how data was collected from different sources.

✓ Forget a computers password without data loss.

✓ Share data through peer to peer connection.

22
CHAPTER FOUR
Conclusion and Recommendation

4.1 Conclusion
After going through the whole period of internship as an intern we have observed so many
professional activities and learned as well. This internship was very fruitful to us because
we had to cover many different fields. We also learned new concepts and new ways of
working. During this internship period, we acquired practical experience to complement
the theoretical content of our study for AMU, Network cable installation and network
cable maintenance. To conclude, we think that this internship was very beneficial to us
as we learned a lot, and it made us discover works in a real-world.

4.2. Recommendation
The company workers are committed to their work and they are sociable, so we
recommend them to continue on it. A session is for Five days, the weather condition of
AMU is hot, as a result, it is difficult to construct wired network configuration in the
afternoon even if we haven’t been able to get that chance. Especially it was difficult in
the afternoon So we recommend to AMIT faculties, the field practice should be applied
in the morning time. In addition to that we have noticed some lack team work or proper
coordination for our program. There was no accountable body for our program other than
our advisor.

Reference

1. www.geekshub.com
2. www.cisco.net
3. www.computercablesore.com

23
24

You might also like