Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 38

WACHEMO UNIVERSITY

DURAME CAMPUS

DEPARTEMENT OF INFORMATION
TECHNOLOGY

INTERNERSHIP
IN ETHIOPIA FEDERAL POLICE (EFP)
Teshome Gebeyehu
Date 02/05/2016ec
Title Internship practice on Networking

• I dedicate internship
report titled On Prepared By Teshome
Gebeyehu
Networking ID 2127

Company Name Ethiopia Federal


Police (EFP)

Start of Intership Dec 08,2023

Submision Date Dec 28,2023

Departement Information
Technology

Unversity WCU Durame


Campus
ACKNOWLEDGMENTS
 First and foremost, we express our deepest
gratitude to our Almighty God for granting us the
strength and guidance throughout this endeavor.
 A say thanks to our dedicated advisor Mr.Teshome ,
whose guidance and insights in shaping this report.
 We would also like to acknowledge the valuable
contributions and thanks to network technicians Mr.
Yidnekachew
 Finally, our heartfelt thanks go to Mr. Elias, the head
of the Information Technology Department, for his
leadership and support.
EXECUTIVE SUMMARY

• The internship at Ethiopia Federal Police


served as an introduction to the intricacies of
the working environment in the context of
networking. guiding me on how to interact
with coworkers and teammates in a manner
that aligns with the dynamic nature of
networking within the banking industry and
How to Configuare.
INTRODUCTION
• An internship is a professional learning
experience that offers meaningful, practical
work related to a student’s field of study or
career interest. An internship gives a student
the opportunity for career exploration and
development, and to learn new skills.
BACKGROUND
• In 1913, during the reign of
Emperor MINILIC II, Ethiopian
police were first established
in our history.
• The police force was known
as the "city guard".
• A modern police facility was
re-established. The police
force is run by British citizens,
and it is found in every book
in the grace of the Regadere
General under the heading
"POLICENAGIZE," published in
1972.
CONT....
• After the fall of the royal
government in 1974, the
military junta - Do it - came
to power: Act No. 10/1974
for the security and
protection of the country;
Yet no provisions were
included in the police's
corporate affairs.
• A separate police
department mandate was
not issued until Deder
collapsed in 1991.
VISION, MISSION AND CORE VALUES

• Vision • Mission
• For 2028, he will be • Preventing crime in
assigned to five of advance and ensuring
Africa's best police peace, security and the
facilities; proven supremacy of the law
professional competence;
• Building a professional
inclusiveness and the
nature of a modern police force
police service loyal to the • Prevent crime , and
people investigate crime if
committed
Core values
Ethiopia's federal police have four values:
 Professional qualifications
 Fullness
 Honoring The Majority
 Respecting human rights
OBJECTIVE
• General Objective • Specific Objective
 Gain Practical  Apply Classroom Theories to
Networking Experience Real-World Scenarios
 Enhance Technical Proficiency.
 Understand Banking System
Networking Challenges.
 Develop Professional Work
Ethic.
METHODOLOGY
• Physical Devices & Tools Used During Internship
Program.
 Network interface Card (NIC):is a network adapter that is used
to connect the computer to the network.

 Hub:connects multiple wires coming from different branches.


 Switch:Unlike Hubs switches are smart enough they store MAC-
Address of a device and they use this MAC-Address to filter
data. It is operated in data link layer. the destination device.
Physical Devices & Tools Used
ROUTER
 is a networking device that routes data
packets based on their IP addresses.
 It is operated in the network Layer.
Physical Devices & Tools Used
• Firewall:is a network security device that
monitors and either blocks or allows traffic
based on a set of rules.They are commonly
implemented between the LAN and the
Internet.
• Server:is a special computer on the network
that gives service to another computer. In
simple term server is a device that many
different clients (users) can access it.
Interconnections (Cables and Connectors)

• These are communication channels used to


interconnect nodes on a computer network.
 Twisted Pair Cable:is a high-speed cable that
transmits the data over 1Gbps or more.
Twisted Pair Cable Arrangement
Straight Through-Cable
Arrangement Cross Over Cable Arrangement

Pin Id Side A Side B Pin Id Side A Side B

1 White-Orange White-Orange 1 White-Orange White-Green

2 Orange Orange 2 Orange Green

3 White-Green White-Green 3 White-Green White-Orange

4 Blue Blue 4 Blue Blue

5 White-Blue White-Blue 5 White-Blue White-Blue

6 Green Green 6 Green Orange

7 White-Brown White-Brown 7 White-Brown White-Brown

8 Brown Brown 8 Brown Brown


Installation Tools
• Installation tools make the network installation
easier and manageable.
 Trunk: cable trunk is used to protect cables from
damage and to hide unsightly cables from view.
 Driller: is a machine that help to drill the wall for
installing the trunk over the wall. It is the primary
tool used to install the trunk over the wall.
Installation Tools
• Node Frame: is a connection point or an endpoint
for data transmissions. In general, data from
network switch to workstation transmit via UTP
cable lastly to node.
• Tester: is a device designed to measure and test
existing LAN connection. It also helps to test the
strength and connectivity of a particular type of
cable.
• Puncher: punch down tool, also called a krone tool,
is a tool that we used during our installation period.
Installation Tools
• Crimper: is a device used to conjoin two
pieces of metal by deforming one or both in a
way that caused them to hold each other.
• Screw Driver: is a tool usually hand-operated,
for turning screws with slotted heads.
• Keystone Jack: jacks or optical connectors into
a keystone wall plate, surface mount box or
patch panel.
• This device is also known as RJ45 Female.
Container Tools
• Network Rack Cabinets
 is a metal frame that holds, organizes,
secures and protects various computer
network devices and server hardware
devices.
Patch Panel
• is a collection of many ports on one panel,
with each of the ports connected via a patch
cable to another port elsewhere in the house.
It allows for easy management of the wired
network and better organization.
Work task i have been executing
Procedures Used to Complete Task 1
• STEP 1: Prepare like cable, RJ45 connector,
keystone jack, crimper, puncher and cutter.
• STEP 2:Strip the cable and unwind the wires.
• STEP 3: Bring the wires in the correct order and
cut the wires straight.
• STEP 4:To push the wires into the RJ45 connector.
• STEP 5:Plugin the cable connector into the
crimping tool and press the tool together twice.
• STEP 6:The last step of the task is to test the cable
Deployment Software
• System Requirements. • Knowledge required
• Personal Computer • IP sub netting.
• Cisco packet tracer. • VLAN.
• Net cad Account. • Routing.
• Router. • DHCP.
• Switch.
Creating VLAN
• A VLAN is a virtual local area network that
groups devices from different physical LANs
into a logical subnetwork(logical divided).
• First, we need to create a network topology
that connects the floor and the ground floor
of the building using switches and routers.
Procedures Used to Complete Task 2
• During the internship the company gave me a project. A
project is about VPN , proxy server, proxy server is a
system or router that provides a gateway between users
and the internet. Therefore, it helps prevent cyber
attackers from entering a private network. It is a server,
referred to as an “intermediary” because it goes
between end-users and the web pages they visit online.
• This project is run on Ubuntu. The project was new
concept for me even I had no idea about proxy server
and Ubuntu operating system so it helps me to learn
new things like squid proxy server, samba file sharing
and what proxy itself.
Cont..
• When I was doing this project I have used these
hardware and software requirement
• System requirement
• Virtual machine
• Processor 2.0Ghz
• Ubuntu server 22.04
• RAM 4-8GB
• Free disk 10GB
• The main purpose of proxy server for security.
• The role of proxy server on security is hide the IP address
of the user computer or end device by giving its own IP
address to web server so the attacker cannot the IP
Cont...
• Advantage of proxy server are catching and
protecting the user from attacker.
• It is controlled by network admins .so we were the
admin of our project
• we can control the user what they have to use when
using the network and we can block unwanted
websites from the network
• we can limit the speed of the internet as they need
• we can access and deny the network by hours
How a Proxy Works
• Because a proxy server has its own IP address, it acts
as a go-between for a computer and the internet.
Your computer knows this address, and when you
send a request on the internet, it is routed to the
proxy, which then gets the response from the web
server and forwards the data from the page to your
computer’s browser, like Chrome, Safari, Firefox, or
Microsoft Edge.
Deployment of the our project
• When I was doing my project I have used the squid
proxy server and samba file.
• Squid proxy
• Squid is a full-featured web proxy cache server
application which provides proxy and cache services
for Hyper Text Transport Protocol (HTTP), File Transfer
Protocol (FTP) , and other popular network protocols.
• Samba
• File and Printer Sharing Services. Using the Server
Message Block (SMB) protocol to facilitate the sharing
of files, folders, volumes, and the sharing of printers
throughout the network.
Full network topology of proxy
• The network topology we used at the project is this :-
DHCP Configuration.
• Dynamic Host Configuration Protocol
(DHCP) is a network management protocol
that enables automatic.
DAILY ACTIVITIES
Day /Week Activity

Week one Onboarding and Introduction

Week Two Network Infrastructure Familiarization

Week Three Documentation and Reporting


LEARNING AND SKILLS ACQUIRED
• Technical Proficiency
 Network Protocols and Configuration.
 Security Measures Implementation.
 Installing RJ45.
• Collaboration and Teamwork
 Effective Team Collaboration
 Knowledge Transfer
 sharing insights and lessons
ACHIEVEMENTS AND CONTRIBUTIONS

Implementation of Network Enhancements


Knowledge Transfer and Collaboration
 Effective Knowledge Transfer
 Collaborative Problem-Solving
CHALLENGES AND SOLUTIONS
Challange Solutions
 Network Infrastructure • Conduct current network
Modernization. infrastructure to identify
• Outdated network outdated components.
infrastructure may limit EFP • Use upgrade network to
limit. network hardware to support
 Network Security. higher data traffic .
 Deploy robust security
In Faces increasing
measures such as firewall
Cybersecurity threats related
data encryption and strong
to data protection and
access controls to safeguards
ccomplicance.
the netork.
FUTURE RECOMMENDATIONS

 Continuous Network Monitoring.


 Investment in Advanced Networking
Technologies.
 Employee Training Programs
 Collaboration with External Experts
CONCLUSION
• My internship experience at Ethiopia Federal
Policeas a networking intern has been
incredibly valuable and rewarding. Throughout
the internship, I had the opportunity to apply
my theoretical knowledge to practical
scenarios in real environment, networking
infrastructure.
THANKS ALL!

You might also like