Professional Documents
Culture Documents
Copy Internship Report On Networking 1
Copy Internship Report On Networking 1
Submitted by
Submitted to:ECE
Submission Date / /
Declaration
This Declaration is made regarding the internship report which has been prepared and drafted by
Tizazu Habtamu and Kaleb Kebede for the completion of internship period, from April 2021 to
July 2021 in SNNPR Science and Information Technology Bureau . We also declare that no
chapter of this manuscript, either in whole or in partis copied from any other document
Tizazu Habtamu / /
Kaleb Kebede / /
Confirmed by:
Name ofSignatureDate
Mr.Wogderess Semunigus / /
i|Page
ii | P a g e
ACKNOWLEDGMENT
First of all we would like thank Bule Hora University’s University Industry Linkage and
Department of Electrical and Computer Engineering for giving us a chance to participate in three
months internship period by accepting our request to be placed at. SNNPR Science and
Information Technology Bureau. We are so grateful to the internship placement SNNPR Science
and Information Technology Bureau for successfully arranging the internship program and
providing what we needed.Weconvey our sincere gratitude to our hosting company
supervisorMr.Ashenafi Yohannes for his exemplary guidance, constant encouragement, and
careful monitoring throughout the internship was so great that, even our most profound gratitude
is not enough.We also would like to thank our university supervisor Mr.Motuma Bekele whose
guidance, encouragement and suggestion.
iii | P a g e
List of Acronyms
CITA.........................................communication and information technology agency
RJ45…...............................................................................................registered jack 45
PC...................................................................................................personal computer
iv | P a g e
Lists of figures
pages
Figure 1.1 work flow of the company...................................................................................................................3
v|Page
Table of Contents
DECLARATION I
vi | P a g e
ACKNOWLEDGMENT III
LIST OF ACRONYMS IV
CHAPTER ONE___________________________________________________1
1. INTRODUCTION________________________________________________1
CHAPTER TWO__________________________________________________4
2.5.2 Router: - 9
2.5.4 Servers______________________________________________________10
VISIO SOFTWARE________________________________________________11
vii | P a g e
Summery: 12
a) Software Requirement___________________________________________20
b) Hardware Requirement__________________________________________21
3.9.5 Configuration_________________________________________________23
3.9.6 Verification__________________________________________________25
viii | P a g e
a. Practical Skills________________________________________________26
d. Time management_____________________________________________27
f. Leadership Skills______________________________________________28
CHAPTER FIVE__________________________________________________32
5.1 Conclusion 32
5.2 Recommendation_______________________________________________32
5.3 References____________________________________________________33
APPENDICES____________________________________________________34
SWITCH CONFIGURATION________________________________________34
ix | P a g e
CHAPTER ONE
1. Introduction
SNNPR Science and Information Technology Bureau was established in 2008 E.C to foster the
social and the economic development and building good governance in the region under the
proclamation number 133\2003 of the state. It is necessary to produce a human resource having
adequate professional knowledge and skill in the information and communication technology
that enables to further strengthen the democratic administration Sectors, the public and the
government, having gained adequate, current and quality information to be able to provide their
service provision in qualitative and speedy way through developing and expanding the
information and communication technology in the region
Mission
Developing CIT in everywhere among the community of the region to improve their living
standard and Develop the support of CIT for the government and for the people of the nation.
Improving the ability of using information technology in the region & developmental faction and
optimize its contribution to the social and economic development of the region. To develop or
make familiar society with technology, deploy and use ICT and also optimize its contribution to
improve the live hood, development and in addition good governance of the region.
Vision
The Dream of SNNPRS in the future is to see the region has rapid growth and developedICT
based Technology and become active participant in world competition to the country. It also
create awareness and support in expanding private companies in the region and see the people
of SNNPRS with enhanced altitude of preparation and self-reliance in solving it development
challenges by their own capacity
1|Page
To interlink the regional government institutions with each other and automate resources by
putting in place where modern and reliable information.
To build capacity of using modern technology throughout in the regional and national level.
Develop the necessary legal framework for application of ICT and design and implement
appropriate security for prevention of unlawful practices.
Promote the use of ICT for modernizing the civil and public services to enhance its efficiency
and effectiveness for service delivery; so as to promote good governance and reduce wastage of
resources.
The agency provides different kinds of services efficiently and effectively for the satisfaction of
clients and consumers.
2|Page
Regional Council
Regional government
Governmental sectors`
Hotels and Resorts
As a governmental organization SNNPRS ICT Agency ruled by regional council that held along
all organization that exists in the region. According to the rule ICT Agency have one main head
of the agency that is accountable for the head of the region. Under the head of agency there are
different departments with different profession and tasks. Generally, over all work flow of the
agency is looks like figure1 below. This figure shows all department heads are accountable for
the main head of ICT Agency and the other team members are submitted to the head of their
department
3|Page
CHAPTER TWO
OVER ALL EXPERIENCE GAINeD FROM THE INTERNSHIP
We have chosen the organization because it is one of the leading ICT and information
technology companies in the region and in the country, as well as a leading institution that
provides practical training to students from various universities in the country by providing
necessary equipment And because the institution has rooms that are directly related to the subject
we are taking and also it is located a short distance from our home city.
During our stay in the organization, we have chosen networking from the various sectors offered
to us as an alternative, and the reason is Because of our eagerness to put into practice the
network technology we have seen at the theory level because it is one of the sections of the
organization that provides adequate functional training in the organization.
The networking unit of the organization divides the work into several stages. These operations
are arranged in stages as follows they receive internet service from a service provider and
manage using different switches. Deploy the managed network to the various offices of the
office as needed. These include monitoring the network and repairing it in the event of a
malfunction, as well as setting up a data center and providing and receiving information to the
recipient in a timely manner.
Once we were in the company and selected the networking unit, the task we were given was to
take the floor plan of one of the buildings of the company and set up an internet connection for
each office and create local area network with different VLANs
4|Page
2.4.1 Methodology
For the achievement of our internship we used different approach as the hardness of the project.
Accordingly, the following procedure was used to overcome our difficulty and lastly, we
achieved our project in a good and best manner. Some methods are as listed as follow:
Measurement
a) Observation
This is the first thing to start our project by surveying the overall design of the agency which we
aimed to do project or to upgrade current existing LAN design in to new design which solves the
problems listed in the statement of problem of the project. And we physically vested around the
agencies site or bureaus and collect some information to do our next task.
Freehand sketch
The next step before going to design on Visio software in this step we draw the design of agency
on the paper.
b) Measurement
In this step we measured each and every room lengths in addition to cable length from server
room to each access switch. Then from access switch to nodes or end users.
c) Counting
Counting is method which we used to count number of nodes in each room which are functional
and non-functional and number of users how many user is there to solve problem of network
availability of the personals. Then finally we put theProposed Network materials and in the
following table
5|Page
1 Router 1
2 Core switch 2
3 Access switch 8
4 Cable 33732.97
5 Server 3
6 RJ-45 572
7 Patch panel 9
8 Access point 1
9 Trunk(40x25)
10 Rack 6U 7
11 Rack 42U 1
12 Trunk 60x40
13 Wall out let 143
14 Fisher 499
Drawing on Visio software
After finishing collecting all the information about the site we go to do drawing by using visio
software.
Drilling machine
Fishery
Screw
RJ 45
Cutter
Crimper
meter
Figure 2.1 materialsused
6|Page
TOOLS USED
Printing paper
Laptop or computer for document preparation and design drawing
Measurement meter for sketch designing of proposed network installation project
Pen and pencil
Flash memory for remote data storage
2.5.1 SWITCH: -
is a networking device that records the IP and MAC addresses in a table of all the devices
connected to it. Thus, when a packet is put onto the wire by one device, the switch reads the
destination address information to determine if the destination device is connected to it. If it is,
the switch forwards the packet only to the destination device, sparing the other devices
connected to it from having to read and deal with the traffic. If the switch does not recognize the
destination device, then the switch sends the packet to everything connected to it, thereby
requiring the devices to decide for themselves whether or not packet is for them.
A switch has multiple ports when compared to bridge. It can perform error checking before
forwarding data. Switches are very efficient by forwarding good/error free packets selectively to
correct devices only. Switches can support both layer 2 (based on MAC Address) and layer 3
(Based on IP address) depending on the type of switch.
2.5.2 Router: -
Is a networking device, commonly specialized hardware that forwards data packets between
computer networks .This creates an overlay internetwork, as a router is connected to two or more
data lines from different networks. When a data packet comes in one of the lines, the router reads
7|Page
Properties of router
A router, like a switch forwards packets based on address. It uses the IP address to forward
packets. This allows the network to go across different protocols.
Routers forward packets based on software while a switch (Layer 3 for example) forwards using
hardware called ASIC (Application Specific Integrated Circuits)
Routers support different WAN technologies but switches do not. The most common home use
for routers is to share a broadband internet connection. The router has a public IP address and
that address is shared with the network. When data comes through the router it is forwarded to
the correct computer.
8|Page
Figure 2.4 Rj 45
2.5.4 Servers:
Servers manage the shared resources on the LAN. The server combines hardware and software to
offer (or serve) network resources. The server hardware may be an ordinary PC or a high-
performance unit designed specifically to be a server. The software running on the server will
vary with the type of server. (It is possible for a LAN to have many different types of servers,
each providing for different types of services.) LAN servers often resemble host machines
(mainframes or minicomputers) conceptually and diagrammatically. There is one fundamental
difference between the two: In a host based system, all processing takes places in the central host
machine. Processing is centralized—terminals are totally dependent on the host device for all
processing functions.
A LAN server resembles a host machine in that it also provides shared functions. In the LAN
environment, processing is distributed among all of the intelligent devices—servers, stations and
peripherals. All LANs typically have at least one type of server — print server File Server. The
role of the fileserver is to provide and manage a shared storage area on the network. Although
each computer on the LAN could create and control its own files and then make those files
available to others, it is preferable to provide a centralized storage and management facility.
Using a file server ensures shared files will be available to users when needed. File management
allows multiple users access to files. The file server controls simultaneous access to files,
enforces access rights and restrictions, and provides a directory structure that recognizes file
names and supports the grouping of files. While the primary function of a file server is to
manage the shared storage device(s), it also perform
9|Page
This software helps us to develop design of LAN network on computer like we have done it on
paper.it safe software to do network installation because there is on lack of materials for
installation like physical installation.
Some of the challenges we have faced while performing our work tasks are:-
Since the internship is during covid-19 pandemic our activities are limited and we cannot able
To make our internship time suitable and smart we have tried to find a solution for the above
mentioned challenges. As one of the goals of internship program is to make students solution
maker about problems that exist around different company we have taken the following
measures
10 | P a g e
Summery:
This project is aimed improve and upgrade the existing network infrastructure of the company in
order to provide fast and efficient service for the company workers, customers and government
officials by replacing and adding some equipment Typically, a LAN encompasses computers and
peripherals connected to a server within a small geographic area such as an office building,
home, school that is restricted to smaller physical areas
Network design and installation is concerned on how can interconnect the computers in
organization, how to enable the communication between the device and how to share the
resource between them.
Resources are not wisely used, e.g. access switch, core switch, servers,Rj45
A network that is too complex or difficult to maintain cannot function effectively and efficiently.
By considering the problem listed above and using all technical knowledge’s of networking to
solve all the existing problems
11 | P a g e
Finally having knowledge of networking and experiences implementing to design efficient and
Effective network depending on available resource and have best network in term of coast,
To Improve the network's fault tolerance, security, and high speed connection.
To design a LAN network in terms of topology, type of cabling and related coast.
To design fastest network depending on the increasing number of user and devices.
To increase the efficiency of the worker as well as the overall productivity of the
company by making resources and services available to users easily whenever needed.
The project requirements and detail stakeholders needs to develop formal solutions and
document all SNNPR ICT agency goals.This research and discussion that help the project
12 | P a g e
We believe the design process is a collaboration that fuses our creative strengths with
your In-depth understanding to produce the project that exceeds expectation [3]
NO 7 2 3 1 1
3.5.2 The Proposed network resources with qualitative explanation
Table 3.2 Proposed Network Infrastructures with qualitative e Explanation
13 | P a g e
And I add additional two core switch placed in the incubation server room to make each access
switch independent, finally I install a wireless access point.
The proposed network is differing from the existing one by so many aspects listed below:
The first and the main thing is each access switch is independent
14 | P a g e
A logical design is virtual design involves arranging data into a series of logical relationships.
Hierarchal network involves three division of layer. These are access layer,
Distribution layer and layer. Fig below explains the existing and proposed logical design
15 | P a g e
The network we propose is surely Scalable or capable of a system, network, or process to handle
a growing amount of work, or its potential to be enlarged to accommodate that growth on the
incubation center.
B. Network security
Network security is any activity designed to protect the usability and integrity of your network
and data. It includes both hardware and software technologies. Effective network security
manages access to the network. It targets a variety of threats and stops them from entering or
spreading on your network. The network on the incubation center is total dependent on the server
room which is on the agency building. There is no firewall a device in network security system
that monitors and controls incoming and outgoing network traffic based on predetermined
security rules. For this reason network is not secure. In addition to this the company needs to
implement some additional network securities like:
Application security
Website security
16 | P a g e
C. Video conferencing
A video conference is a live, visual connection between two or more people residing in separate
locations for the purpose of communication. At its simplest, video conferencing provides
transmission of static images and text between two locations.
We proposed Video conferencing because of the following advantages: Higher productivity and
efficiency by eliminating time and space barriers, video conference can be conducted to
communicate with colleagues, customers and partners anytime, anywhere.
D. Network security
There is no UPS (Uninterruptible Power Supply) on the existing network a device that provides
battery backup when the electrical power fails or drops to an unacceptable voltage level. We
recommend ups for each for switches which are now on the incubation center
The core layer is literally the core of the network. At the top of the hierarchy, the core layer is
responsible for transporting large amounts of traffic both reliably and quickly. The only purpose
of the network’s core layer is to switch traffic as fast as possible. The traffic transported across
the core is common to a majority of users. However, remember that user data is processed at the
distribution layer, which forwards the requests to the core if needed. If there is a failure in the
core, every single user can be affected. Therefore, fault tolerance at this layer is an issue. The
core is likely to see large volumes of traffic, so speed and latency are driving concerns here.
Let’s start with some things we don’t want to do:
Don’t do anything to slow down traffic. This includes using access lists, routing between Virtual
local area networks (VLANs) and implementing packet filtering.
Avoid expanding the core (i.e., adding routers) when the internetwork grows.
Becomes an issue in the core, give preference to upgrades over expansion. Now, there are a few
things that I want to do as I design the core:
17 | P a g e
Fast and redundant data-link connectivity is no help if your routing tables are shot!
The distribution layer is sometimes referred to as the workgroup layer and is the communication
point between the access layer and the core. The primary functions of the distribution layer are to
provide routing, filtering, and WAN access and to determine how packets can access the core, if
needed. The distribution layer must determine the fastest way that network service requests are
handled for example, how a file request is forwarded to a server. After the distribution layer
determines the best path, it forwards the request to the core layer if necessary. The core layer
then quickly transports the request to the correct service. The distribution layer is the place to
implement policies for the network. Here you can exercise considerable flexibility in defining
network operation. There are several actions that generally should be done at the distribution
layer:
Routing
Implementing security and network policies, including address translation and firewalls
The access layer controls user and workgroup access to internetwork resources. The access layer
is sometimes referred to as the desktop layer. The network resources most users need The
following are some of the functions to be included at the access layer: will be available locally.
The distribution layer handles any traffic for remote services.
18 | P a g e
4. Identify configuration required on cisco switches create VLANs and inter VLANs routing
5. Identify configuration required on windows 2008 DHCP server to provide dynamic IP address to
users belonging to respective VLANs from the specific network address range.
6. Identify configuration required on the cisco switches for DHCP specific design.
7. The users in all the departments should be able to access each other receiving appropriate IP
addresses from DHCP server.
Software Requirement
Cisco Packet Tracer is multi-tasking network simulation software that can be used to perform
and analyze various network activities such as implementation of different topologies, selection
of optimum path based on various routing algorithms, creation of appropriate servers, sub
netting, and analysis of various network configuration and troubleshooting commands. In order
to start communication between end user devices and to design a network, we need to select
appropriate networking devices like routers, switches, and hubs and make physical connection
by connecting cables to serial and fast Ethernet ports from the component list of packet tracer.
Networking devices are costly so it is better to perform first on packet tracer to understand the
concept and behavior of the network.
Hardware Requirement
Access Switch
UTP CAT6A
Computer
DHCP server
19 | P a g e
The Star Topology is a network topology in which all the clients or machines on the network are
connected through a central device known as switch. Each workstation has a cable that goes
from the network card to the hub or switch device. One of the major benefits of the star topology
is that a break in the cable causes only the workstation that is connected to the cable to go down,
not the entire network as it is with the bus topology The reason why this topology is preferred;-
20 | P a g e
Network adds, moves, and changes are achieved with ease by just configuring a port into the
appropriate VLAN.
A group of users that need an unusually high level of security can be put into its own VLAN so
that users outside of that VLAN can’t communicate with the group’s users.
As a logical grouping of users by function, VLANs can be considered independent from their
physical or geographic locations.
10 ADMIN
ICT
20
FINANCE
30
3.9.5 Configuration
a) Configuring IP address DHCP
DHCP (Dynamic Host Configuration Protocol) is a protocol used to provide quick, automatic,
and central management for the distribution of IP addresses within a network.
DHCP is also used to configure the proper subnet mask, default gateway, and DNS server
information on the device.
pool Admin
start ip 192.168.1.10
dns-server 0.0.0.0
21 | P a g e
start ip 192.168.1.10
default-router 192.168.1.1
dns-server 0.0.0.0
pool Finance
start ip 192.168.2.10
default-router 192.168.1.1
dns-server 0.0.0.0
Trucking has been made on the distribution switch as well as the access switches because it is
mandatory to pass VLAN information between the switches. We used the encapsulation dot1q
command in sub interface range configuration mode to apply VLAN id to the sub interfaces.
The 2960 switch only runs the IEEE 802.1q encapsulation method. To configure trunking on
FastEthernet port, use the interface command switchport mode trunk.
The following switch output shows the trunk configuration on interfaces Fa0/4 as set to trunk:
C) Routing Configuration
By default, only hosts that are members of the same VLAN can communicate. To change this
and allow inter-VLAN communication, you need a router or a layer 3 switch. I’m going to start
with the router approach.
R1(config)#interface fastEthernet
R1(config-if)#exit
22 | P a g e
R1(config-subif)#exit
R1(config-subif)#exit
3.9.6 Verification
23 | P a g e
Figure 3.3 Ping command in ascending order for all vlans in the project
Internships provide we an opportunity to link theory with practice to see the capacity how I can
make a solution for real world problem to develop both our practical and theoretical knowledge.
The Internship Program allows me an opportunity to understand the Unique environmental
conditions associated with a particular level of government such as regional local administration
and the nonprofit sector. It provides me the career with demonstrated academic competence and
a hands-on experience in the public sector. It gives me an opportunity to do business in group.
A. PRACTICAL SKILLS
During our practice work, from day to day we tried to learn something new from which we
possess new knowledge/skills.
24 | P a g e
In developing our project, we have practiced a lot of theories that previously we had been
learning in the class for three consecutive years.
From our practical works, in terms of local area networking design, we have learned from
where the company’s’ network project start, where it ends, how and when, to do it.
From our internship project work wehave learned each and every devices that are used to
install Local Area Network
Above all, from our internship practice we have upgraded our network configuration skills.
For doing any practical work, theoretical knowledge is the stepping stone for it. As a result:-
Wehave upgraded our theoretical knowledge by reading courses that we have learned in the
previous class, so many times over and over.
This internship has changed our professional level which will be helpful in our activities inside
the company and outside our working station. The knowledge we gained from the course and
from internship period will enhance our personal skill. We have tried to coordinating the theory
(which we have learned from the course) and practice (during internship). As a result we feel that
our quality of work improved and contributing more in the organization for the development of
the existing networkstructure. Some of these areas where we have developed ourselves are
mentioned below:
D. TIME MANAGEMENT
We are now very much competent to proper time management and effective implementation of
activities which will help us from the course of sustainable project management. Moreover, our
supervisor oriented us to time management and encourages to attendee timely in office and
completed all activities within time frame.
25 | P a g e
Under this topic we try to present the importance of executing personal task in a team. This
means that each member of the team must be responsible for the whole team success and failure.
So, we learned to be more responsible as individual and as a team. Team playing skills we
gained from the internship program includes:-
Sharing of information between team members. From our internship program we gained the way
of sharing information, knowledge, and experience to take the initiative to keep other team
members informed. That means a team players must share all relevant information to its
members.
We have learned that one team member must care about what the team members are doing and
their contribution to its success. We understood that the knowledge of team is stronger than the
individual persons’ knowledge and it is more effective. We understood even in the future the
knowledge of team is important if we share information and work together
F. LEADERSHIP SKILLS
The internship is an important occasion to practice the assets of leadership. We have increased a
lot about leadership and we saw how important it is for a successful project.
In doing our project, we were able to improve our self-confidence as we have the willingness and
inspiration to face any difficulty in the project. The project helped to grow emotionally and learn
from failure and success. This, in turn, gave us a chance to learn project management, the
technical approach and methodology of a project.
26 | P a g e
When we first joined the ICT agency, our supervisor gave us orientation on how we should act in
SNNPR ICT agency. And every day we took time to have decent character in our team. Because,
we understood the fact that the more we get close to others in ethical way the more we get
benefit
Defined as “how does one person successfully take advantage of a work opportunity, while
Another, equally knowledgeable person does not.” Or “it is the capacity and willingness to
Develop, organize, and manage a business venture along with any of its risks in order to achieve
Profit.” An entrepreneur to be a great entrepreneur must have the following personal skills:
Optimistic thinker
Willingness to take risk
Must have a vision
Motivated to lead
Overcoming fear of failure
The ability to identify consumer’s “pain points”
Endurance
27 | P a g e
Those people we take different ideas on how to be an entrepreneur alone with in our money or
Even when we are working in a company. It helps to us to be optimist in our future task and to
Thinkpositively and also OSTICA working environment had been a good starting place to
enhance our Entrepreneur capabilities. Indeed, we learned a lot on improving critical thinking
and problem solving Skills. The change from school to workplace itself was another learning
opportunity,conditioning us to adapt to change and to be able to take responsibility.
From our internship program, we have improved our personal communication skills as one of the
most important thing. When we were in the campus, most of the communications that we used
are between level hood/colleagues and it’s via informal way. Besides that, informal
ourcommunication is mostly limited to close friends or our level hood. As a result, there is no
more respect between us. On the top of that we didn’t make good team communication while we
were in the campus. In this internship period, we have improved our ways of communication,
and developed new formal communication skill. With the help of our associates, we have found
many options to develop these skills.
When we first joined the ICT agency, our supervisor gave us orientation on how we should act in
ICT agency. And every day we took time to have decent character in our team. Because, we
understood the fact that the more we get close to others in ethical way the more we get benefit
from them. When we reach working place the SNNPRS enroll their workers under this two
forms of ethics
Personal ethics: These types of ethics include how someone should act towards other people. It is
highly influenced by our cultural, social, religion and personal thoughts. Some of such ethics
includes: Concern for the wellbeing of others, Honesty, Fairness, Tolerance, Open mindedness,
and Positive thinking.
Professional ethics: include an ethics that a certain task does require. It is an important character
that governs every employee. Disobeying such ethics has consequences. Some of these ethics
are; Punctuality, Office disciplines, Reliability, Honesty, Cooperation, Impartiality, Transparency
28 | P a g e
N.ENTERPRENURSHIP SKILL
The SNNPRS-CITA working environment had been a good starting place to enhance our
entrepreneur capabilities. Indeed, we learned a lot on improving critical thinking and problem-
solving skills. The change from school to workplace itself was another learning opportunity,
conditioning us to adapt to change and to be able to take responsibility.
All in all, we can say that from this internship period in addition to formal academic knowledge
wewere able to gain general purpose life experiences in other aspects. These experiences are
unforgettable and we believe that it shaped our personality and behavior like:-
CHAPTER FIVE
5.1 CONCLUSION
Internship Program helps us to know several things. The program upgrades our practical skills in
electrical and computer engineering. This internship program helps us to know and understand
every aspect of the outside environment. In fact what really interesting was we learn how to
create LAN from the scratch by working on everything step by step, so this enable us to come up
with many important experience and skills. So using this practical knowledge and skills thatwe
got during internship have helpedus to create a soft environment to engage into our own
business in future.
In this internship program we tried to create a good relationship with employees and ask several
questions what is not clear. The other thing we got from this internship program is how to
manage work through this also we have increased our self-confidence, work ethics and how to
work cooperatively with others in the offices, from this we have learnt good values and
principles like politeness , respecting others ,giving decision, punctuality ,fulfilling
responsibilities, giving a good attention to others and like. So we concluded that the internship is
29 | P a g e
5.2 RECOMMENDATION
In our internship program we have tried to observe different things but we tried to give some
recommendation about the program. As we know this Internship program are essential to all
electrical and computer students not only electrical students but also essential to all university
student to know the practical world and to adopt the outside environment. But the company has a
poor attention to this program.
The company willingness of this program is good because it can create awareness for young
computer graduate student by supporting them in aspect and create smooth business environment
for those have creative knowledge and skills. But it is not good because all employees are not
interested to show everything and every work in detail because of less knowledge about that
internship peoples need. In our thinking we want to recommend them they must be upgrade their
knowledge about internship program for the student, the company and to our country.
we want to say something about company adviser Mr Ashenafi Yohannes. He is very gentle man
to guide and advice to internship students.
5.3 REFERENCES
internet
CNNA tutorials
CNNA BOOK
30 | P a g e
APPENDICES
SWITCH CONFIGURATION
a) Swich one (SW1)
Switch>enable
Switch#config terminal
Switch(config)#hostname SW1
SW1(config)#vlan 10
SW1(config-vlan)#exit
SW1(config-if-range)#do write
SW1(config-if-range)#end
Switch>enable
31 | P a g e
Switch(config)#hostname SW2
SW2(config)#vlan 20
SW2(config-vlan)#exit
SW2(config-if-range)#do write
SW2(config-if-range)#end
Switch>enable
Switch#config terminal
Switch(config)#hostname SW3
SW3(config)#vlan 30
SW3(config-vlan)#exit
SW3(config-if-range)#switchport access
SW3(config-if-range)#do write
SW3(config-if-range)#end
Switch>enable
Switch#config terminal
Switch(config)#hostname SW4
32 | P a g e
SW4(config-vlan)#exit
SW4(config)#vlan 20
SW4(config-vlan)# exit
SW4(config)#vlan 30
SW4(config-vlan)#exit
SW4(config-if)# exit
SW4(config-if)#exit
SW4(config-if)#exit
ROUTER CONFIGURATION
Router>enable
Router#config terminal
Router(config)#hostname R1
33 | P a g e
R1(config-if)#exit
R1(config-subif)#encapsulation dot1Q 10
R1(config-subif)#exit
R1(config-subif)#encapsulation dot1Q 20
R1(config-subif)#exit
R1(config-subif)#encapsulation dot1Q 30
R1(config-subif)#exit
34 | P a g e