Download as pdf or txt
Download as pdf or txt
You are on page 1of 48

UNIVERSITY OF GONDAR INSTITUTE OF

TECHNOLOGY
DEPARTEMENT OF ELECTRICAL AND COMPUTER
ENGINEERING
STREAM: COMMUNICATION ENGINEERING
HOSTING COMPANY: UNIVERSITY OF GONDAR DATA
CENTER
TITLE: INTERNSHIP REPORTS AND PROJECT ON
DESIGNING NETWORK OF SERVERS FOR ASSIGNING
IP ADDRESS AUTOMATICALLY AND CONTROLLING
INTERNET OF THINGS
1. Dessie Fikir................................................... GUR/4371/08
2. Destaye Sisay……………………………….GUR/4375/08
3. Elmie Mosie..………………………………..GUR/4390/08
4. Delie Dires……………………….………….GUR/4352/08
5. Tazeb Abebe…………………………….…..GUR/4924/08
Advisor: Mr.Mekashaw d
January 16/6/2012 E.C
Gondar, Ethiopia
Final Internship Report And Project 2012 E.C

APPROVAL PAGE
We, 5𝑡ℎ Electrical and Computer Engineering (focus area communication engineering)
students have under taken our internship experience in University of Gondar ICT main data
center.

The under signed, declare this Report is our original work and all sources of materials used
for the project have been fully acknowledged.

Submitted by:

Name

Dessie Fikir ________________ ________________


Signature Date
Destaye Sisay ________________ ________________
Signature Date
Elmie Mosie ______________ ________________
Signature Date
Delie Diress ________________ ________________
Signature Date
Tazeb Abebe ________________ ________________
Signature Date
Approved by:
________________ ________________ ________________
Advisor Signature Date
________________ ________________ ________________
Examiner 1 Signature Date
________________ ________________ ________________
Examiner 2 Signature Date
________________ ________________ ________________
Focus area coordinator Signature Date
________________ ________________ ________________
Department head Signature Date

University of Gondar, IOT, Department of ECE Page i


Final Internship Report And Project 2012 E.C

ACKNOWLEDGEMENT
First, thanks to our GOD for his blessing and helping throughout our entire internship
training. In addition, thank you for our university to get this internship and to develop our
practical skills. We would like to thanks specially acknowledge to Mr.Jossy (company
supervisor), for advising and teaching us all about the working environment of UOG ICT
center and network infrastructure, for giving general networking concept of the University
of Gondar LAN, for his guidance, generosity to share his tremendous knowledge, for
giving continuous and unlimited motivation from the starting of the internship until the end
of the program and for giving work flow, background and history of the University.
Moreover, thanks to Mr.Aderagew his helping on basic computer skills and maintenance.
We would like to thank to our advisor Mr.Mekashaw for his unlimited help by project
simulation and a detail preparation of documentation format.

University of Gondar, IOT, Department of ECE Page ii


Final Internship Report And Project 2012 E.C

ABSTRACT
Our documentation paper contains several chapters these are background of the internship
company that means background of university of Gondar ICT data center, overall
internship experience gained from the company, overall benefits gained from the
internship, and finally a project on designing of servers for automatic IP address assigning
for the users and controlling of internet of things. In this paper, there is a detail report of
the tasks of the internship experience; our internship experience has focused on software
and hardware installation of networking academy.

In this document there is a project on designing of a server for automatic IP address


assigning and controlling of internet of things using Packet Tracer 7.2.1, the project will
solve the problem of the distribution switch, which means most of the network designs are
lack of a separate servers for only IP address assigning, the automatic IP address is
implemented on the distribution switch, this leads to the distribution switch busy, because
the distribution switch is processed many tasks in addition to DHCP pool defining. Thus
instead of defining a DHCP pool on distribution switch that is better designing a separate
server in order to decrease the task on the distribution switch. In addition to this the project
covers the controlling of Internet of things, those controlling of internet of things are
controlling the security camera based on motion detector and controlling the different
internet of things based on the level of smoke detector.

University of Gondar, IOT, Department of ECE Page iii


Final Internship Report And Project 2012 E.C

Contents
APPROVAL PAGE ............................................................................................................. i
ACKNOWLEDGEMENT .................................................................................................. ii
ABSTRACT ....................................................................................................................... iii
LISTS OF FIGURE ........................................................................................................... vi
LISTS OF ACCRONYM AND ABBREBIATION ......................................................... vii
CHAPTER ONE ................................................................................................................. 1
1. INTRODUCTION ....................................................................................................... 1
1.1. Brief history of university of Gondar and ICT Center ............................................ 1
1.2. Mission, vision and objectives of the company ...................................................... 2
1.2.1. Vision .................................................................................................................... 2
1.2.2. Mission ................................................................................................................. 2
1.2.3. Objective of the Company ................................................................................ 2
1.3. Main product and services....................................................................................... 2
1.3.1. Highly Available and Secure Internet service .................................................. 2
1.3.2. E-mail Services ................................................................................................. 2
1.3.3. IP Telephony Service........................................................................................ 3
1.3.4. Virtualized Server and Storage Services ........................................................... 3
1.3.5. Wireless Network Services ................................................................................ 3
1.3.6. Camera system .................................................................................................. 4
1.3.7. Video Conference and Smart class room Solutions .......................................... 4
1.3.8. The Smart class room ........................................................................................ 5
1.3.9. ICT training team.............................................................................................. 5
1.4. Main customer or end user ...................................................................................... 7
1.5. Organizational structure and work flow ................................................................... 8
1.5.1. Organization structure ...................................................................................... 8
1.5.2. Work flow .......................................................................................................... 9
CHAPTER TWO .............................................................................................................. 10
2. OVER ALL INTERNSHIP EXPERIENCE .............................................................. 10
2.1. The section of the company we have been working ............................................. 10
2.1.1. Hardware overview......................................................................................... 10

University of Gondar, IOT, Department of ECE Page iv


Final Internship Report And Project 2012 E.C

2.1.2. Network architecture of UOG overview ........................................................ 12


2.2. Work flow in the network infrastructure theme .................................................... 13
2.3. Task we have been exercising and executing........................................................ 13
2.4. Procedures to perform tasks .................................................................................. 14
2.4.1. Configure switches and create VLAN ............................................................ 14
2.4.2. Configure router ............................................................................................. 15
2.4.3. Configure routing on router ............................................................................ 15
2.5. Procedures we have been following while performing our tasks.......................... 16
2.6. The challenges we have been facing while performing our work task .................. 16
2.7. The measures we have taken in order to overcome our work task ....................... 16
CHAPTER THREE .......................................................................................................... 17
3. INTERNSHIP PROJECT .......................................................................................... 17
3.1. Project title ............................................................................................................ 17
3.2. Summary of the project ......................................................................................... 17
3.3. Problem statement ................................................................................................. 17
3.4. Objective ................................................................................................................ 17
3.4.1. General objective ............................................................................................. 17
3.4.2. Specific objective ............................................................................................ 17
3.5. Methodology and system design ........................................................................... 18
3.5.1. Network architecture process methodology ................................................... 18
3.5.2. Communication language ............................................................................... 19
3.5.3. Network component with their description .................................................... 19
3.6. Followed Methodology Steps ............................................................................... 21
3.7. Literature review ................................................................................................... 22
3.7.1. Review of network.......................................................................................... 22
3.7.2. Review of Cisco packet tracer lab and related works ..................................... 22
3.8. System design ........................................................................................................ 22
3.8.2. Server configuration ....................................................................................... 22
3.8.3. Controlling of IOT .......................................................................................... 23
3.8.4. Control the IOT using the level of smoke detector ........................................ 23
3.8.5. Security and management ............................................................................... 23

University of Gondar, IOT, Department of ECE Page v


Final Internship Report And Project 2012 E.C

3.8.6. Simulation result and discussion ..................................................................... 24


CHAPTER FOUR ............................................................................................................. 31
4. OVER ALL BENEFIT GAINED FROM THE INTERNSHIP .................................... 31
4.1. Theoretical knowledge ........................................................................................... 31
4.2. Improving Practical Skills ..................................................................................... 31
4.3. Improving Industrial Problem Solving Capability ................................................ 32
4.4. Improving Team Playing Skill .............................................................................. 32
4.6. Understanding Work Ethics .................................................................................. 33
4.7. Entrepreneurship Skills ......................................................................................... 33
CHAPTER FIVE .............................................................................................................. 34
5. CONCLUSION AND RECOMMENDATION ............................................................ 34
5.1. Conclusion.............................................................................................................. 34
5.2. Recommendation .................................................................................................... 34
REFERENCES ................................................................................................................. 35
APPENDICES ................................................................................................................. viii

LISTS OF FIGURE
Figure 1.1 IP Telephony Service ........................................................................................ 3
Figure 1.2 Indoor access-point and Outdoor access-point [4] ........................................... 4
Figure 1.3 Security camera ................................................................................................. 4
Figure 1.4 Smart class room ............................................................................................... 5
Figure 1.5 Main customer or end user [6].......................................................................... 7
Figure 1.6 Organizational structure .................................................................................... 8
Figure 1.7 UOG ICT Section [6] ........................................................................................ 9
Figure 2.1 Access switch [7] ............................................................................................. 10
Figure 2.2 Multilayer switch [7] ....................................................................................... 11
Figure 2.3 Router [8]......................................................................................................... 11
Figure 2.4 Path of UOG network ...................................................................................... 12
Figure 2.5 Network architecture of UoG [11] .................................................................. 13
Figure 2.6 Work flow in the network infrastructure theme .............................................. 13

University of Gondar, IOT, Department of ECE Page vi


Final Internship Report And Project 2012 E.C

Figure 3.1 Network architecture methodology ................................................................. 18


Figure 3.2 Copper cross-over cable .................................................................................. 20
Figure 3.3 Project methodology flow chart ...................................................................... 21
Figure 3.4 Our network design topology .......................................................................... 24
Figure 3.5 Change the email server address to DNS ........................................................ 25
Figure 3.6 Change the IoTserver address to DNS ............................................................ 25
Figure 3.7 Register the email of the user to email server ................................................. 26
Figure 3.8 DHCP server .................................................................................................... 26
Figure 3.9 IP address is assigned automatically to PCs .................................................... 27
Figure 3.10 Register the IoT address to server ................................................................. 27
Figure 3.11 Control IoT using IoT monitor ...................................................................... 27
Figure 3.12 Controlling IoT using DNS ........................................................................... 28
Figure 3.13 Smoke detector level less than 0.5 then IoT are off ..................................... 28
Figure 3.14 Smoke detector level greater than 0.5 then IoT are on .................................. 29
Figure 3.15 motion detector off security camera is off .................................................... 29
Figure 3.16 Motion detector on security camera is on...................................................... 29
Figure 3.17 IP telephony ringing ...................................................................................... 30
Figure 3.18 Creating email in PC ..................................................................................... 30
Figure 3.19 Transferring message from one PC to PC ..................................................... 30

LISTS OF ACCRONYM AND ABBREBIATION


ARP………………………………………….…Address Resolution Protocol
DHCP.......................................................…….....Dynamic Host configuration Protocol
DNS……………………………………….…….Domain name system
EIGRP…………………………………………...Enhanced interior getaway
ICT…………………………………………........Information Communication Technology
IOT……………………………………………....Internet of things
IP………………………………………...............Internet protocol
LAN………………………………………….….Local Area Network
MAC…………………………………………….Media access control

University of Gondar, IOT, Department of ECE Page vii


Final Internship Report And Project 2012 E.C

MS………………………………………………Microsoft
NIC……………………………………………...Network interface card
OSPF…………………………………………....Open shortest path first
PC…………………………………………….…Personal computer
QOS……………………………………………..Quality of Service
QPM…………………………………………….QOS Policy Manager
RJ-45………………………………………….....Registered Jack
RIP……………………………………................Routing information protocol
RU……………………………………………….Rack Unit
SQL………………………………………………Structure query language
SSH………………………………………………Secure shell
SSP……………………………………………….Security Services Processor
TELNET……………………………………….…Terminal network
UCS……………………………………………....Unified Computing System Manager
UTP…………………….. …………………….....Unshielded twisted pair
VLAN…………………………………………....Virtual local area network
VOIP………………………………………….….Voice over internet protocol
VPN……………………………………………...Virtual Private Network
VRRP………………………………………… …Virtual Router Redundancy Protocol
VTP…………………………………………… ...Virtual Trunking Protocol
WCS……………………………………………...Wireless Control System
WLC………………………………………….......War over Ethernet
WLC…………………………..………………….Wireless LAN Controller

University of Gondar, IOT, Department of ECE Page viii


Final Internship Report And Project 2012 E.C

CHAPTER ONE

1. INTRODUCTION
1.1. Brief history of university of Gondar and ICT Center
University of Gondar was initially established as Public Health College and Training Center
in 1954. Then four campuses are built in sequential which are Maraki, Atse Tewdros, Fasil and
Tseda, which is 20km far at city of Gondar. In recent time’s information and communication,
technology is becoming a tool for every activity; the university uses this technology for
assuring the core objectives [1].

University of Gondar is one of the Universities in Ethiopia having more than 60 years of age.
However, the main core processes i.e. teaching and Learning, Community service and research
processes were not supported by automated ICT systems. In addition to that, even though the
university purchases so many ICT equipment with lots of investments. There was no one
responsible visionary process or department to coordinate this task. Having this in mind the
top management decided to establish the ICT Coordinating office, which is led by one
instructor from the Health bioinformatics department. According to the human resource
structure of ministry of education, the office hired two professionals and transferred another
two professionals from other departments making the total staff of ICT to 5 (five). The duties
were restricted in giving maintenance service of the health college Network infrastructure,
which is done by Ministry of education, and maintenance service of computers. As the
University expands its services, investments were made on the purchase of ICT equipment and
the office hired seven help desk technicians in contractual level to follow up the healthiness of
all the ICT equipment by trying to reach the maintenance services in all campuses of the
University. Start from the last four years the university invests more than hundred million Birr
for different ICT related projects to achieve the vision “MOVEING UNIVERSITY OF
GONDAR TO E-UNIVERSITY”. Based on the new University ICT structure we have
recruited more than 46 new professional to make sustainable the existing and coming ICT
Infrastructure [2].

University of Gondar, IOT, Department of ECE Page 1


Final Internship Report And Project 2012 E.C

1.2. Mission, vision and objectives of the company

1.2.1. Vision

The vision of University of Gondar is to be the leading societal problem solving university in
the country by 2020 and moving University of Gondar To E-University.

1.2.2. Mission

Through collaboration and professionalism, to visualize, build up, implement, utilize and
manage appropriate information system in order to provide integrated, coordinated
Customer–focused quality ICT services to University of Gondar in line with its vision,
mission and objectives.

1.2.3. Objective of the Company

The overall objective of ICT Development office lies on addressing the key ICT needs in
University Gondar. These includes:-

Build and administrate communication infrastructure.


Automation of business processes.
Develop digital content and advanced research facilities.

1.3. Main product and services

1.3.1. Highly Available and Secure Internet service


The University has two upstream connections to the service provider; one with 100Mbps
connection that gives internet service to the CMHS campus and another 50Mbps connection
that enables the other campuses get internet connectivity. The connection is secured with
redundant Firewalls and redundant iron port web security appliances, which are thoroughly
being, monitored [3].

1.3.2. E-mail Services


The university staffs have an exchange based university email address (@uog.edu.et) that is
highly available and secured using a redundant iron port mail security appliance.

University of Gondar, IOT, Department of ECE Page 2


Final Internship Report And Project 2012 E.C

1.3.3. IP Telephony Service

The university’s telephony system uses the underlying IP data infrastructure. Our 1Gbps access
level connectivity helps us deploy a telephony system which makes our university a pioneer in
using this unified communication technology. In addition to the telephony services, the
multipurpose phones deliver Call Accounting Services, Voice Mail Services, Fax Services,
Video and Audio Conferencing Services, contact services and Mobility services [3].

Figure 1.1 IP Telephony Service

1.3.4. Virtualized Server and Storage Services


Our data center is equipped with the latest Cisco UCS blade servers with about 180 terabytes
of Network Application Storage Area Network that currently hosts more than 20 Virtualized
servers and storage services with a high scalability to afford the needs of the university for the
coming 20 years. The data center also is ready to share its e-library service once the universities
are connected for Ethernet Project.

1.3.5. Wireless Network Services

There are 345 Wireless Access Points using Indoor, Outdoor and Mesh connection types.
Almost all campuses have their hot spots a wireless network available. Most student
dormitories have the wireless access that helps students get access to the e-library system and
other network services. Staff apartments have also wireless network services at their living
rooms [4].

University of Gondar, IOT, Department of ECE Page 3


Final Internship Report And Project 2012 E.C

Figure 1.2 Indoor access-point and Outdoor access-point [4]

1.3.6. Camera system


The surveillance cameras installed are controlling the data center. The access door of the
datacenter, that asks a card and a fingerprint to be opened, is also worth mentioning. Our
monitoring and management servers are meticulously looking after all the above services.
These include CSM, LMS, QPM, MARS, ACS for the LAN and Security Devices; Iron Port
MSA for managing the WSAs and ESAs; Cisco WLC and WCS for managing Wireless
Network; DCNM, Cisco UCS, VM Ware Centre Server, and Net App’s On Command System
Manager for managing our Data Center Services. The Main Data Center is supplied with
redundant 100KVA APC UPSs and a dedicated 200KVA generator which insures 24/7 service
delivery. The data center is also being monitored and managed for out of range environmental
conditions by different environmental sensors like smoke sensors, water sensors, temperature
sensors that alert the administrator to take action [5].

Figure 1.3 Security camera

1.3.7. Video Conference and Smart class room Solutions

This section is responsible for centrally managing the Digital signage, smart class room and
video conferencing services, which includes managing the contents to be displayed on the

University of Gondar, IOT, Department of ECE Page 4


Final Internship Report And Project 2012 E.C

screen and signage’s and Big Sony screens, to ensure the operations of all this equipment’s on a
continues basis.

1.3.8. The Smart classroom


A smart classroom is a classroom that is equipped with computer and audiovisual equipment,
allowing the Instructors to teach using a wide variety of media, totally have many smart class
rooms in four campuses with the older one used by the CHMS staffs to teach students at the
surgery room. Each classroom is fitted the following:

 Room Speakers, Double LCD Display Screens


 White Smart Board
 Laptop Connections for Guest Speakers
 Infrared sensing video camera and mike for recording the speaker only
 HDX System-High Definition Central processing unit to integrate the information from
the smart board to be displayed to the screens

Figure 1.4 Smart classroom

1.3.9. ICT training team


Training is one of the prominent figures in the ICT Directorate office as there are a lot of
training for users and staffs to be given to optimally utilize all the services given by the office.
The milestone has been studying the training needs both for the ICT team members and the
university community to smoothed usage of the ICT services since it’s commencement
following the new ICT Structure studied and developed by Ministry of Education (MOE) in
2005. Since then many training were organized and delivered by the milestone.

University of Gondar, IOT, Department of ECE Page 5


Final Internship Report And Project 2012 E.C

Work activities:

Identifying training and development needs within an organization through job


analysis.
Conduct training plan producing training materials courses.
Managing the delivery of training.
Conducting and facilitating ICT training.
Creating team knowledge delivery.

Done works:

Training for UoG student service on basic computer skill.


Training basic computer skills
Training for UoG secretary on Basic computer maintenance and internet usage.
Cisco Training.
Training for Public and international affairs directorate staff members on IP phones.
website content administration, Access and Use internet, using social media, fax server
using email, video conferencing and display management and computer and basic
office machine maintenance.

Training courses to be given:

 Cisco Academy training,


 Microsoft Academy training,
 Training on Basic computer skills,
 Basic computer and office machine maintenance training,
 Access and using Internet (wired and wireless) training,
 Using Email training,
 Fax service training
 Using Database
 IP phone training
 Smart interactive whiteboard system training

University of Gondar, IOT, Department of ECE Page 6


Final Internship Report And Project 2012 E.C

1.4. Main customer or end user

The customers of Gondar University are divided in different groups of actors, who are linked
to the educational process being the main: current students, potential students, employees,
employers, government and industry. Which have classified the customers in internal and
external, emphasizing that the internal customer who is work to the satisfaction of external
customers. Besides, to the authors the customers can be classified in primary ones and
secondary ones, based on their location being as internal customers or external ones and based
on the frequency of interaction that the institution has with them too. While consider that the
product of higher education is the education and then, depending on the role developed by
them during the course, the students can be classified as internal or external [6].

Customer

Internal External

Secondary Secondary
Primary
Students Primary Government
Employee
(As educational Students Industry
(Educator)
partners) partners

Figure 1.5 Main customer or end user [6]

University of Gondar, IOT, Department of ECE Page 7


Final Internship Report And Project 2012 E.C

1.5. Organizational structure and work flow

1.5.1. Organization structure

University Of Gondar

INSTITUTE OF TECHNOLOGY COLLEGE OF NATURAL


&COMPUTITIONAL
Electrical and computer engineering
SCIENCE
Mechanical engineering Applied biology
Civil engineering Applied mathematics
Hydraulic engineering Applied physics
Biomedical engineering Geology and sport
Construction management engineer science
Architecture engineering Computer science
Industrial engineering FACALITY OF
Chemical engineering AGRICULTURE
Natural resource
COLLEGE OF BUSINESS AND Management
ECONOMICS Plant Science
Agricultural economy
Accounting and finance Rural development and
Economics Agricultural extension
Business Management Natural resource
Tourism management management
Heritage management
Marketing and management FACALITY OF
Logistics VETERNARY MEDICINE
COLLEGE OF SOCIAL SCIENCE AND
HUMANITIES Animal product and
Social psychology extension
Social work Epidemiology and
Clinical psychology public health
Population and production health Para clinical studies
Sociology
SCHOOL OF EDUCATION
Development anthropology
COLLEGE OF MEDICENE AND Special need
HEALTH SCIENCE
SCHOOL OF LAW
Public health
Medicine
Pharmacy
Biomedical and laboratory science
Nursing
Figure 1.6 Organizational structure

University of Gondar, IOT, Department of ECE Page 8


Final Internship Report And Project 2012 E.C

1.5.2. Work flow


Gondar University has to strive to emplace management system that is democratic, honest,
inspiring, transparent, and highly participatory. The University has two core processes and five
support processes. The University’s top management includes the president, four Vice
presidents, and deans/directors for academic units and process owners. The major focus of the
management in terms of governance and management includes improve efficiency on major
administration areas such as budget utilization, business process (procurement, finance,
registrar etc.) efficiency and decision making system in a transparent manner. IT supported
decision making is one of the areas under governance and management which UOG will give
special attention [6].

UOG-
President

UOG-ICT

Nettwork and Training and System and


communicatio software Technical
E-learning
n section developement support section
section
section

Figure 1.7 UOG ICT Section [6]

University of Gondar, IOT, Department of ECE Page 9


Final Internship Report And Project 2012 E.C

CHAPTER TWO

2. OVER ALL INTERNSHIP EXPERIENCE


2.1. The section of the company we have been working
We have been doing our internship program in the Gondar University ICT Development office
specifically in The Network Infrastructure team Tewdros campus data center. During the first
month internship period, we have seen overview of hardware components of network in the
data center, university of Gondar Atse Tewdros campus network architecture, security camera
control room and video smart classroom. After overview and analyze hardware components
we have been doing network installation.

2.1.1. Hardware overview


Layer 2 switch: It determines how to handle incoming data frames by using its MAC address
table. A switch builds its MAC address table by recording the MAC addresses of the nodes
connected to each of its ports [7].

Figure 2.1 Access switch [7]


Distribution switch (Layer 3): It uses IP address information. Instead of MAC addresses are
associated with each of its ports; a Layer 3 switch determines which IP addresses are associated
with its interfaces. This allows the Layer 3 switch to direct traffic throughout the network based
on IP address information. It performs routing protocol; open shortest path first (OSPF). UOG
uses this type of switches instead of routers. Because it acts as a router and the cost is chipper
than router [7].

University of Gondar, IOT, Department of ECE Page 10


Final Internship Report And Project 2012 E.C

Figure 2.2 Multilayer switch [7]


Core switch: is a high-capacity switch generally positioned within the backbone or physical
core of a network. Core switches serve as the gateway to a wide area network (WAN) or the
Internet - they provide the final aggregation point for the network and allow multiple
aggregation modules to work together. UoG uses cisco catalyst 6504-E switch.

Router: has access to the network layer address or logical address (IP address). It contains a
routing table that enables it to make decisions about the route i.e. to determine which of several
possible paths between the source and destination is the best for a particular transmission [8].

Figure 2.3 Router [8]


Wireless controller (WLC): the network administrator or network operations center uses a
wireless LAN controller in combination with different protocols to manage LWAP in large
quantities. The WLAN controller automatically handles the configuration of wireless access-
points.

UTP cable: the most common networking media. It consists of four pairs of thin, copper wires
covered in color-coded plastic insulation that are twisted together. The wire pairs are then
covered with a plastic outer jacket. UTP cables are of small diameter and it does not need
grounding. Since there is no shielding for UTP cabling, relies only on the cancellation to avoid
noise. The connector used is called RJ-45 connector [9].

University of Gondar, IOT, Department of ECE Page 11


Final Internship Report And Project 2012 E.C

Fiber optic cable: There are two types of fiber optic cable those are single mode and multi-
mode optical fibers. A single-mode optical fiber (SMF) is an optical fiber designed to carry
light only directly down the fiber - the transverse mode. Single mode is generally yellow, with
a blue connector, and a longer transmission distance. Single-mode fiber cable works better for
longer distances. Multimode fiber, the term “multimode” refers to the fact that the light takes
multiple paths (modes) through the glass fiber core, as opposed to “single-mode” where the
light takes a single path [10].

Patch panel: A patch panel provides a convenient place to terminate all of the cable that
coming from different rooms into the wiring closet. The cables are label in the patch panel and
at the end of the cable, which are found at the faceplate.

2.1.2. Network architecture of UOG overview


The building block components of UOG network architecture are based on the recommended
cisco hierarchical model, which is a layered approach network design, access layer, distribution
layer and core layer. The principal advantages of this model are its hierarchical structure and
its modularity [11]. The path of UOG network is as follows;

Tele (ISP Firewall WAN VSS Core switch


provider)

End user Access switch Distribution


switch

Figure 2.4 Path of UOG network

University of Gondar, IOT, Department of ECE Page 12


Final Internship Report And Project 2012 E.C

Figure 2.5 Network architecture of UoG [11]

2.2. Work flow in the network infrastructure theme

Network infrastructure team leader

Network System administrator


Administrator

Network team leader Security team leader Management team


leader

Figure 2.6 Workflow in the network infrastructure theme

2.3. Task we have been exercising and executing

After applying our internship practice in university of Gondar information and communication
data center, we and our friends were visiting the network installation and architectures i.e.

University of Gondar, IOT, Department of ECE Page 13


Final Internship Report And Project 2012 E.C

observations of the connection of cables from router to access switch and access switch to the
pcs or end users. In addition, we were discussed with our supervisors Mr.Jossy that what we
are going to acquired and take an experience from the internship program. Moreover, we were
chosen the networking installation courses after communicating with our supervisor, because
we had interests on networking academy. Some of the daily tasks we were executed in the
networking section are as follows:

 Visiting data center room and whole network architecture


 The secretes behind the working of Internet
 The encapsulation and decapsulation process of OSI layer models
 Data transfer from one computer to another using network cable
 Configuring the access switch for the sake of communication between computers
using console cable on Putty software
 Configure the same Vlan communication using two switches
 Configure inter-Vlan communication using router and switches
 Vlan identifications on MARAKI campus
 View indoor and outdoor wireless access points
 Network cable crimping and identifying types of network cable
 Configure wireless network device
 Configure different types of routing protocol
 Basic computer training such as MS word, Excel, and Power point
 Internal hardware parts of computer
 Inter-connections of internal parts of computer

2.4. Procedures to perform tasks

2.4.1. Configure switches and create VLAN

We have done configuration of access switch and creation of VLAN by connecting switches
with PC by console cable and configure it on the software called putty. When we configured
the switch, we have used the following procedures:-

 Connect switch with PC by console cable


 Open putty software

University of Gondar, IOT, Department of ECE Page 14


Final Internship Report And Project 2012 E.C

 Select a connection type SSH and click open


 Assign a hostname
 Create VLAN
 Give name for VLAN
 assign IP address
 Assign access and trunk port
 Save the configuration

2.4.2. Configure router


We have done configuration of router by connecting switches with PC by console cable and
configure it on the software called putty. The procedures are:-

 Connect router with PC by console cable


 Open putty software
 Select a connection type SSH and click open
 Giving name for the router
 Assign IP address for each physical interface
 Assign IP DHCP pool
 Assign network
 Assign default router
 Assign DNS server

2.4.3. Configure routing on router


Protocols can fall into two groups: static routing and dynamic routing. Static routing is simply
the process of manually entering routes into a device’s routing table via a configuration file
that is loaded when the routing device starts up. In static routing, all the changes in the logical
network need to be manually done by the system administrator. Those are explained as follows;
RIP: is a standardized vector distance routing protocol and uses a form of distance as hop
count metric. It is a distance vector.
OSPF: is based on link-state technology by using SPF algorithm, which calculates the shortest
path. Has no limitation due to hops, can handle Variable Length Subnet Masks.

University of Gondar, IOT, Department of ECE Page 15


Final Internship Report And Project 2012 E.C

EIGRP: keeps neighboring routing tables and it only exchange information that it neighbor
would not contains.

2.5. Procedures we have been following while performing our tasks

Procedures we have been using during our internship period in UoG, main campus data
center performing our tasks are:-

Analyze each network hardware equipment’s in data center


Identified the three layer Campus hierarchical network model
Analyze Cisco switch command
Configuration of distribution layer switch
Configuration of access layer switch

2.6. The challenges we have been facing while performing our work task

We can truly say that during our internship with UOG data center that we was challenged, and
through all those challenges we grew as a person as well as a student. Not only was the work
that we was doing beneficial to get knowledge. However, it also made us have to work hard to
get it right knowledge. The first challenge is the network architecture in the data center is
complex, hence we cannot understand easily. The second challenge is that we cannot easily
analyze the intermediate network configuration between data center and Tseda campus.

2.7. The measures we have taken in order to overcome our work task

Our challenges were overcome by different approaches those are:-Observe and analyze the
architectures by relating what we have learnt theoretically First, asking the supervisor Mr.
Jossy the name of each device, and second, we understand the information exchange and
general working of the architecture.

University of Gondar, IOT, Department of ECE Page 16


Final Internship Report And Project 2012 E.C

CHAPTER THREE

3. INTERNSHIP PROJECT
3.1. Project title

Designing network of servers for assigning IP address automatically and controlling internet
of things.

3.2. Summary of the project

Our project is a designing of a network for reducing the work of the distribution switch by
preparing a DHCP server in order to assigning or forwarding an ip address for the end users.
That means the defining of IP DHCP pool is implemented on a separate servers i.e the DHCP
pool is not defined on the distribution switch. In addition to, this our project is solve the manual
control of home, work and industry appliances instead that controls using ip address.

3.3. Problem statement

Currently most of the network topology designing system specially university of Gondar
network architecture is lack of separate servers for forwarding ip addresses for each end users
and new users ,and in university of Gondar network topology the core is only one i.e there is
no a reserve core for redundancy (reducing fault). Moreover most of the home, work and
industry appliance system is done manually.

3.4. Objective

3.4.1. General objective


Designing of a network topology for preparing servers for automatic IP addresses assigning
and controlling internet of things.

3.4.2. Specific objective

To understand how the server forwards the ip address for any new user (DHCP server)
How to use one switch for different internet services i.e. concepts of Vlan
To know how to convert the IP addresses (doted decimal form) to DNS (language form
i.e. the humans can understand easily)

University of Gondar, IOT, Department of ECE Page 17


Final Internship Report And Project 2012 E.C

To know how to control different home, work and industry IoT using IP addresses

3.5. Methodology and system design

3.5.1. Network architecture process methodology

Our network architecture design methodology is servers that received a network from outside
such as tele and the core, which received data from the server and deliver a packet across the
distribution switch and then the distribution switch which connect the network between the
core and the access and perform a routing protocol between the access and the core, And then
then from the distribution switch the server (DHCP server), which is used to deliver
automatically the IP addresses for end users, and the access switches used to associate the mac
address of the end device to the IP address or logical addresses that delivered by the server
finally there are different end devices those are pcs, smart phones laptops and internet of things
that are controlling by the address of the server on the core of the network design.

Servers Servers Google Servers

Cores

DHCP Server Switch Distribution

Access
switches

IP telephony, PCs, smart phones, Laptops, and different types of


internet of things

Figure 3.1 Network architecture methodology

Software requirement
Cisco packet tracer version 7.2.1
Hardware requirement
Server
2911 router

University of Gondar, IOT, Department of ECE Page 18


Final Internship Report And Project 2012 E.C

3560 multilayer switch (8)


2960 switch
Copper cross-over and straight-through cable
Access point-PT-N
Laptop
IoT
Smart phone

3.5.2. Communication language

OSPF: OSPF is defined in RFC 2328 which is an interior Gateway Protocol used to distribute
routing information within an AS (Autonomous System).

3.5.3. Network component with their description

Servers: A server is a computer program that provides a service to another computer programs
(and its user). In a data center, the physical computer that a server program runs in is also
frequently referred to as a server. That machine may be a dedicated server or it may be used
for other purposes as well. Servers are often categorized in terms of their purpose. A Web
server, for example, is a computer program that serves requested HTML pages or files. Here
are a few other types of servers, among a great number of other possibilities: An application
server is a program in a computer in a distributed network that provides the business logic for
an application program [12].

A blade server is a server chassis housing multiple thin, modular electronic circuit boards,
known as server blades. A file server is a computer responsible for the central storage and
management of data files so that other computers on the same network can access them. A
policy server is a security component of a policy-based network that provides authorization
services and facilitates tracking and control of files.

Router: A router is a networking device that forwards data packets between computers
networks. Routers perform the traffic directing functions on the Internet.

Layer 3 switch: A multilayer switch (MLS) is a computer-networking device that switches on


OSI layer 2 like an ordinary network switch and provides extra functions on higher OSI layers.

University of Gondar, IOT, Department of ECE Page 19


Final Internship Report And Project 2012 E.C

Access switch: A network switch (also called switching hub, bridging hub, officially MAC
bridge is a computer networking device that connects devices together on a computer network
by using packet switching to receive, process, and forward data to the destination device.

Internet of things: Internet of things are a material or devices, they can be operated manually
or authomatically.Authomatically means controlling the status of the material services either
using sensor or IP protocol. However, in our project we are using an IP addresses and different
programs to control them. Some of the services are - security camera, window, smoke detector,
door, light, fire sprinklers etc.

Crossover cable: An Ethernet crossover cable is a crossover cable for Ethernet used to connect
computing devices together directly. It is most often used to connect two devices of the same
type: e.g., two computers (via their network interface controllers) or two switches [13].

Figure 3.2 Copper crossover cable

Copper straight through cable: Straight-through cables get their name from how they are
made. Out of the eight pins that exist on both ends of an Ethernet cable, each pin connects to
the same pin on the opposite side [13].

Figure 3.3 Copper straight through cable

University of Gondar, IOT, Department of ECE Page 20


Final Internship Report And Project 2012 E.C

3.6. Followed Methodology Steps


We have done this project by searching different data regarding our project. The
methodology that we followed is listed below;

Start

Literature review

Problem identification

Data collection

Studying and collecting the required


materials (software devices)

Determine the specification of the


collected material (software devices)

Designing the network


architecture

Configuring the code for


each network components

Develop simulation

Testing

End

Figure 3.4 Project methodology flow chart

University of Gondar, IOT, Department of ECE Page 21


Final Internship Report And Project 2012 E.C

3.7. Literature review

3.7.1. Review of network

Network topology is the geometric representation of relationship of all the links connecting
the devices or nodes. Network topology represent in two ways one is physical topology that
define the way in which a network is physically laid out and other one is logical topology that
defines how data actually flow through the network. In this paper we have discuss how to
design bus, star and mesh topology network and provide interfacing and simulation between
ends using packet tracer software [14].

Cisco Packet Tracer (CPT) is multi-tasking network simulation software to perform and
analyze various network activities such as implementation of different topologies, select
optimum path based on various routing algorithms, create DNS and DHCP server, sub netting,
analyze various network configuration and troubleshooting commands. In order to start
communication between end user devices and to design a network, we need to select
appropriate networking devices like routers, switches, hubs and make physical Connection by
connection cables to serial and fast Ethernet ports from the component list of packet tracer.
Networking devices are costly so it is better to perform first on packet tracer to understand the
concept and behavior of networking.

3.7.2. Review of Cisco packet tracer lab and related works

Packet Tracer – Create a Simple Network Using Packet Tracer. Build a Simple Network in the
Logical Topology Workspace, Configure the Network Devices, and Test connectivity between
network devices then Save the File and Close Packet Tracer. Configure the Cisco.com server
as a DNS server to provide domain name to IPv4 address resolution. Still in the Services tab,
select DNS from the services listed in the left pane. The related work is designing of campus
networks in 2006 by university of Gondar ICT teams [15].

3.8. System design

3.8.2. Server configuration

DNS server: to name the IP address, which means the ip address is changed by language that
easily understand by human being. Name the WEB, IoT, and email server.

University of Gondar, IOT, Department of ECE Page 22


Final Internship Report And Project 2012 E.C

EMAIL server: the email server is used to register the email address of the user
DHCP server: used to assign IP addresses for the user automatically. As you see from the
figure above first give the pool name (the Vlan name) that we want to give the IP address, and
then give the IP addresses on the required fields that are default gateway, DNS server, start IP
address, subnetmask and number of users then click add. After finishing this, we can view the
IP addresses on the end users (pc), by setting the request on DHCP.

Concepts of Vlan: Vlan is using of one switch for different internet services. For instance we
can use from port 1 to 10 for YouTube, from 11 to 15 for security camera and from 16 to 24
for VOIP by giving different networks for each services.

3.8.3. Controlling of IOT

IOT are service devices they can be either home or work. Those devices are controlling using
the IP addresses as:-
 Connect the to the switch and access point (wireless switch)
 They are given the IP address by the server
 Associate (register) all the IOT to the IOT server

Then we can control the IOT by two options:-


1) By clicking the IOT monitor on the user, give the address of IOT server i.e, giving the user
name and password.
2) By clicking browser on the user give the address of IOT (searching by IP address or domain
name) i.e, giving the user name and password.

3.8.4. Control the IOT using the level of smoke detector

Control different internet of things by using the level of smoke detector the program is written
in the condition of the IOT server using if clause. If the level of smoke detector is greater than
or equal to some value the IOT will be on state else they will be off state.

3.8.5. Security and management


Telnet: used to access the switch and router remotely the password is plain of text, thus the
security is weak compare to SSH.
SSH: used to remote access as telnet but its security is very highest the password is

University of Gondar, IOT, Department of ECE Page 23


Final Internship Report And Project 2012 E.C

encrypted. Most of the time the admins are used SSH management.
Access-list: used to restrict or denied ordinary users to remote access the switch or router.

3.8.6. Simulation result and discussion


In our network, design we are used the network architecture of three-hierarchy layer of the
device, those are core, distribution and access. In the core we design different servers those are
DNS server used to name the IP addresses, WEB server to browse different sites, IOT server
used to register the address of different internet of things and EMAIL server to send and receive
texts between users. The core is multilayer switch, because multilayer switch is better fast than
router, and we have used two multilayer switch on the core in case reducing the fault
(redundancy), i.e. if one switch is shutdown, the next switch will keeping the communication
(connection). On each distribution we use a DHCP server that forwarding the address for end
device this work is our project objective ,the DHCP server take the work of distribution switch,
that means reduce the load of the switch. Thus, the DHCP server is reserved only the IP address
forwarding in each distribution switch (in each campus).

Figure 3.5 Our network design topology

University of Gondar, IOT, Department of ECE Page 24


Final Internship Report And Project 2012 E.C

Figure 3.6 Change the email server address to DNS

Figure 3.7 Change the IoTserver address to DNS

University of Gondar, IOT, Department of ECE Page 25


Final Internship Report And Project 2012 E.C

Figure 3.8 Register the email of the user to email server

Figure 3.9 DHCP server

University of Gondar, IOT, Department of ECE Page 26


Final Internship Report And Project 2012 E.C

Figure 3.10 IP address is assigned automatically to PCs

Figure 3.11 Register the IoT address to server

Figure 3.12 Control IoT using IoT monitor

University of Gondar, IOT, Department of ECE Page 27


Final Internship Report And Project 2012 E.C

Figure 3.13 Controlling IoT using DNS

Figure 3.14 Smoke detector level less than 0.5 then IoT are off

University of Gondar, IOT, Department of ECE Page 28


Final Internship Report And Project 2012 E.C

Figure 3.15 Smoke detector level greater than 0.5 then IoT are on

Figure 3.16 motion detector off security camera is off

Figure 3.17 Motion detector on security camera is on

University of Gondar, IOT, Department of ECE Page 29


Final Internship Report And Project 2012 E.C

Figure 3.18 IP telephony ringing

Figure 3.19 Creating email in PC

Figure 3.20 Transferring message from one PC to PC

University of Gondar, IOT, Department of ECE Page 30


Final Internship Report And Project 2012 E.C

CHAPTER FOUR
4. OVER ALL BENEFIT GAINED FROM THE INTERNSHIP
Internships are the link between theoretical knowledge and concepts learned in the classroom
setting and real time industry applications. Generally, we are confident to say something, to
suggest our opinion for every question or idea those are forwarded to us; it is nothing but due
to the skill that we have developed throughout the Internship program. Getting experience is a
great way to build confidence. The following are the main benefits we gain from the program
& the work we have done are:-

 Applying Theoretical Knowledge


 Improving practical skills
 Improving Industrial problem solving capability
 Improving Team playing Skill
 Improving Leadership skills
 Understanding about work ethics
 Entrepreneurship skills

4.1. Theoretical knowledge


The academicals theoretical and practical knowledge is combined and practiced in order to
compose them together throughout the intern. An internship can be seen as the pinnacle (the
most successful point) of our aim of education and give us the chance to use the skills we have
learned in the classroom to apply on a real-world setting. It is a chance to prove the worth of
our qualifications and to show that we can perform in the role we have been given. The
internship program upgrades both theoretical knowledge and practical skills.

4.2. Improving Practical Skills


Most educational programs are focused on theoretical part. Students have to acquire a lot of
theoretical knowledge, though the gap between theory and practice may be rather broad. Even
trying to imitate the atmosphere of real working environment is helpful for improving one’s
living standards and developing one’s practical skills. Even if one’s job is difficult to related
one’s professional sphere if we have a certain working experience we will be sure of one’s

University of Gondar, IOT, Department of ECE Page 31


Final Internship Report And Project 2012 E.C

abilities and skills. At the same time, receiving practical skills might be helpful for enhancing
the effectiveness of the working process and adapting challenges. The internship program was
an excellent opportunity for us to gain some hands on experience in our field. We acquired
many new skills and developed many skills like:

Adaptability
Motivation to work
Willing to grow and learn
Strong self-confidence
Professionalism skills
Analytical skills

4.3. Improving Industrial Problem Solving Capability


Problem solving in networking means troubleshooting, and we had learned how to troubleshoot
problems following some sequences. In networking, there is a concept called OSI layer and
the layers are, starting from the lower Seven, acquire problem solving skills and how to assess
and analyze situations correctly.

1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

Therefore, in troubleshooting, we start examining from the Physical layer and we go up


examining if the problem persists.

4.4. Improving Team Playing Skill


Team playing skill is upgraded throughout the internship since it is a great time to get together
with our fellows as a result the way collaborating with the fellows are highly developed.
Therefore, the internship was highly important for us to develop the team playing skill and
relationship building.

University of Gondar, IOT, Department of ECE Page 32


Final Internship Report And Project 2012 E.C

4.5. Improving Leadership Skills

Leadership is a process of leading the careers of the company. Problems in the company come
in management; program and problems in different period time can be easily solved. Thus, a
person who is in the position of leadership seeks optimal solution to the problems and should
be smart enough to manage those individuals whom he/she is leading.

4.6. Understanding Work Ethics


Ethics is a branch of philosophy that defines morality and determines the meaning and rational
justification of the right way to live, correct values as well as correct ways of treating others.
As workers wear made to specialize in different fields, specific codes of conduct were expected
from each worker. There are two common types of ethics. These are personal ethics and
Professional ethics

Personal Ethics: All human beings as rational creatures are expected to exhibit certain personal
principles of ethics. These principles of personal ethics are values, which are expected to be
possessed by all individuals in their life, and contribute a lot for a smooth interaction among
individuals and peaceful coexistence of a society.

Professional Ethics: Professional ethics refers to the standards or a set of moral principles for
regulating behaviors of a certain defined profession. In order to consider that an activity to be a
profession, it should be carried out by one who has advanced education, knowledge, and skills.

4.7. Entrepreneurship Skills


As we are a technology student rather than depending on governmental job, there is,
opportunities to open broad door and develop our interested goal. There are many skills
entrepreneur must have before opening their doors for working. Successful entrepreneurs have
to start with these main skills. The most important skills we gained from this internship
include:-

 Self-motivation
 Self- confidence
 Ethics and morals
 Provides work experience

University of Gondar, IOT, Department of ECE Page 33


Final Internship Report And Project 2012 E.C

CHAPTER FIVE
5. CONCLUSION AND RECOMMENDATION
5.1. Conclusion
This internship report contains the overall experiences that we gain from the internship
program. We concluded that the program is very good to upgrade the theoretical knowledge
into practical skill. On the internship period, we have understand so many skills that was the
job environment and what it meant to be a worker, what and why ethics we need to have at the
work place and outside. Again, we have seen the real working conditions and understand what
services are deliver from UoG ICT center, what is the process, cares to be taken, objective,
mission, vision and practical skills. It was also very effective in developing team playing,
interpersonal and leadership skills.

Generally we are successfully worked different practical works specially network installation
those are network crimping, Vlan identification in different campuses, in addition to network
installation we were work on computer maintenance. By observing the problem of UOG,
network architectures we are developed the network design on preparing servers for different
application in networking system and forwarding or assigning an IP addresses for the end users,
and in addition to this this project will solve the manual control of different appliances in home,
work and industries.

5.2. Recommendation
We strongly recommended that training program should be started for both academic and
administrator staff Cable management, all data cables should be under the floor, both ends of
the cable should be labeled and tagged for proper identification. We recommend for the future
network designers that the authentication in routing protocol can be configured, this
authentication is used to prevent hacking because most of the time the internet or network is
hacked by hackers, and they hack the routing configuration using Wire shark capturing.

University of Gondar, IOT, Department of ECE Page 34


Final Internship Report And Project 2012 E.C

REFERENCES

[1] "Bckground of university of Gondar," [Online]. Available: http://www.uog.edu.et.


[2] "University of Gondar ICT center," [Online]. Available: http://www.uog.edu.et.
[3] "main product services of UOG data center," [Online]. Available:
http://www.uog.edu.et.
[4] W. Admin, "Wireless network," 2012.
[5] "Final Internship Report Presentation from UOG ICT directorate," [Online]. Available:
http://www.uog.edu.et.
[6] D. ICT, Interviewee, Work flow of UOG data center. [Interview]. 2012.
[7] "cisco hardware devices," [Online]. Available:
http://www.hardware.com/store/cisco/AIRLAP1252AG-.
[8] "Types of network devices," [Online]. Available: http://www.solvethenet.com.
[9] "Select Best Ethernet Cable (Cat5/5e/6/6a) for Your Network," Admin, June 13, 2017.
[10] C. F, "Network Cabling Types: Choosing The Right Structured Cabling Infrastructure,"
October 27, 2017.
[11] "Network Architecture of UOG Overview".
[12] T. Lammle, "CCNA Cisco Certified Network Associate Study Guide 6th edition,
Wiley".
[13] "Ethernet physical layer," [Online]. Available: http://www.wikepedia.com.
[14] D. R. Budhathoki, "Computer network".
[15] Network Design Requirements: Analysis and Design Principles.
[16] "Cisco system, Inc," [Online]. Available: http://www.cisco.com/c/en/us/td/docs/ios-
xml/ios/iproute_pi/configuration/15-s/iri-15-s-book/ip6-route-static.pdf..

University of Gondar, IOT, Department of ECE Page 35


Final Internship Report And Project 2012 E.C

APPENDICES
Routing configuration

DIS1 (config) #ip routing


DIS1 (config) #router ospf 1
OSPF process 1 cannot start. There must be at least one "up" IP interface
DIS1 (config-router) #network 1.1.1.0 0.0.0.255 area 0
DIS1 (config-router) #network 5.5.5.0 0.0.0.255 area 0
DIS1 (config-router) #network 7.7.7.0 0.0.0.255 area 0
DIS1 (config-router) #network 9.9.9.0 0.0.0.255 area 0
DIS1 (config-router) #network 11.11.11.0 0.0.0.255 area 0
DIS1 (config-router) #network 40.40.40.0 0.0.0.255 area 0
DIS1 (config-router) #network 20.20.20.0 0.0.0.255 area 0
DIS1 (config-router) #ex
SVI configuration

DIS1 (config) #interface Vlan 2


DIS1 (config-if) #
%LINK-5-CHANGED: Interface Vlan2, changed state to up
DIS1 (config-if) #ip add
DIS1 (config-if) #ip address 192.168.40.1 255.255.255.0
DIS1 (config-if) #interface Vlan 3
DIS1 (config-if) #
%LINK-5-CHANGED: Interface Vlan3, changed state to up
DIS1 (config-if) #ip address 192.168.42.1 255.255.255.0
DIS1 (config-if) #interface Vlan 4
DIS1 (config-if) #
%LINK-5-CHANGED: Interface Vlan4, changed state to up
DIS1 (config-if) #ip address 192.168.44.1 255.255.255.0
DIS1 (config-if) #interface Vlan 5
DIS1 (config-if) #
%LINK-5-CHANGED: Interface Vlan5, changed state to up

University of Gondar, IOT, Department of ECE Page viii


Final Internship Report And Project 2012 E.C

Internship Report and Project 2012 E.C


UNIVERSITY OF GONDAR ICT DATA CENTER Page x
DIS1 (config-if) #ip address 192.168.50.1 255.255.255.0
DIS1 (config-if) #ex
Telnet configuration

DIS1 (config) #ip domain-name ccna.com


DIS1 (config) #crypto key generate rsa
the name for the keys will be: DIS1.ccna.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.
How many bits in the modulus [512]: 1024
% generating 1024-bit RSA keys, keys will be non-exportable... [OK]
DIS1 (config) #use
*Mar 1 0:27:27.729: %SSH-5-ENABLED: SSH 1.99 has been enabled
DIS1 (config) #username dis1admin se
DIS1 (config) #username dis1admin secret 123456
DIS1 (config) #line vty 0 15
DIS1 (config-line) #login lo
DIS1 (config-line) #login local
DIS1 (config-line) #transport input telnet
DIS1 (config-line) #
DIS1 (config-line) #exit
DIS1 (config) #
SSH configuration

core1 (config) #ip domain-name ccna.com


core1 (config) #crypto key generate rsa
the name for the keys will be: core1.ccna.com
Choose the size of the key modulus in the range of 360 to 2048 for your
General Purpose Keys. Choosing a key modulus greater than 512 may take
a few minutes.

University of Gondar, IOT, Department of ECE Page ix


Final Internship Report And Project 2012 E.C

How many bits in the modulus [512]: 1024


Internship Report and Project 2012 E.C
UNIVERSITY OF GONDAR ICT DATA CENTER Page xi
% generating 1024 bit RSA keys, keys will be non-exportable... [OK]
*Mar 1 0:27:27.729: %SSH-5-ENABLED: SSH 1.99 has been enabled
core1 (config) #username admin secret 123456
core1 (config) #line vty 0 15
core1 (config-line) #login lo
core1 (config-line) #login local
core1 (config-line) #transport input ssh
core1 (config-line) #exit
core1 (config) #
Access-list configuration

DIS4 (config) #access-list 100 deny tcp 192.168.11.0 0.0.0.255 any eq telnet
DIS4 (config) #access-list 100 deny tcp 192.168.12.0 0.0.0.255 any eq telnet
DIS4 (config) #access-list 100 deny tcp 192.168.13.0 0.0.0.255 any eq telnet
DIS4 (config) #access-list 100 deny tcp 192.168.15.0 0.0.0.255 any eq telnet
DIS4 (config) #access-list 100 permit tcp 192.168.14.0 0.0.0.0 any eq telnet
DIS4 (config) #access-list 100 permit ip any any
DIS4 (config) #interface Vlan 17
DIS4 (config-if) #ip access-group 100 in
DIS4 (config-if) #interface Vlan 18
DIS4 (config-if) #ip access-group 100 in
DIS4 (config-if) #interface Vlan 19
DIS4 (config-if) #ip access-group 100 in
DIS4 (config-if) #interface Vlan 20
DIS4 (config-if) #ip access-group 100 in
DIS4 (config-if) #ex
DIS4 (config) #

University of Gondar, IOT, Department of ECE Page x


Final Internship Report And Project 2012 E.C

University of Gondar, IOT, Department of ECE Page xi

You might also like