Académique Documents
Professionnel Documents
Culture Documents
Certification
This is to testify the following report was carried by the student Bongajum
Raymond Fanyuy and was supervised by Mr. Ngolah Kenneth under the control of
the school.
Supervisor
Sign………….
ii
Dedication
I dedicate this piece of work to my lovely parents Mr. /Mrs. Bongajum and to God
almighty for this grace, care and guidance throughout my internship.
iii
Declaration
This is to testify that Bongajum Raymond Fanyuy carried out an internship
program at speed-net and came out with the following report on setting up a
network in a small business or home.
Student
Sign……………….
iv
Acknowledgement
I will love to give my sincere gratitude to all who have made immersed
contribution to ensure I go through with my internship program to a success.
Firstly, The almighty God for his grace and guidance throughout the internship
program, my supervisor, my parents and classmates.
v
ABSTRACT
An Internship is a period of time during which a student or new graduate gets
practical experience in his or her field of study. This is to make the student or
graduate be familiar with the difficulties (problems) and realities faced by people
in the job market. During this period the student is expected to write a report on a
particular topic. In this light, my research topic “COMPUTER NETWORKING”
case study SPEED-NET CYBER CAFÉ head office at Malingo-Buea
Networking in Africa is growing to have its grounds and expand their various
networks. During my internship I studied the various network devices and how
they interconnected to form a network. And also the challenges faced by the
organizations to maintain and expand its networks. I came across the various
challenges faced by the intern and the organization and made recommendations.
vi
LIST OF ABRIVIATIONS
LIST OF FIGURES
Figure 1: showing a router and the ports.
Fig 8: crossover.
ix
LIST OF TABLES
Table 1: showing services offered in speed-net
Table of Contents
Certification ................................................................................................................i
Dedication ................................................................................................................. ii
Declaration ............................................................................................................... iii
Acknowledgement ................................................................................................... iv
ABSTRACT ...............................................................................................................v
LIST OF ABRIVIATIONS...................................................................................... vi
LIST OF FIGURES ............................................................................................... viii
LIST OF TABLES ................................................................................................... ix
CHAPTER ONE ........................................................................................................1
INTRODUCTION .....................................................................................................1
1.1.Presentation of Company and Description of Its Main Activities ...................................................... 1
1.2.Description of Department Of Focus .................................................................................................. 4
1.3.Objectives of Internship. ..................................................................................................................... 5
1.4. Definition of Terms............................................................................................................................ 6
1.5.Synopsis: ............................................................................................................................................. 6
REFERENCES: .......................................................................................................43
1
CHAPTER ONE
INTRODUCTION
photocopier, and a faxing and scanning machine in each branch. The two branches
are all located in Fako division Buea the regional headquarters of the south west
region, Address Malingo: Promise land Building, Lady L Street Malingo, Molyko,
and Buea. And the other is located at, Limbe Quarters: Faith and Hope Cite Limbe
Technology (ICT) in Buea, to provide citizens and visitors an easy way to access
the Internet, as well as to broaden the use and application of ICT here in Buea, the
Net Hotspot" service in September 2014. This service will provide citizens and
visitors with wireless Internet access within Buea. The Wireless Broadband System
allowing Wi-Fi enabled equipment, within the service coverage area, to wirelessly
connect to the Internet for web browsing as well as email communication, etc.
Legal Status:
Speed-net is a fully incorporated enterprise under Cameroon law. In the very recent
past, the enterprise has updated its status in order to comply with the provisions of
Brief History:
The present day Speed-net cyber cafe´ started performing its works by running a
documents and after a few years the management saw the need for a hotspot as
there was evolution in technology, the hotspot services were put into place
September 2014 till date it has been extended all around the neighborhood of
is SPEED-Net HOTSPOT. Now there are many hotspots both indoor and outdoor,
3
follows;
technology and now in the Android system, Speed-Net being a promising and
computer units. As a result, this department was created. Speed-Net named this
This department is more involved in networking of all types, which made the
cultural values.
Prepare for my life-long career over the years, internship has gained grounds
all duties, to behave ethically, and to follow all rules and policies of the
to a wired network.
hardware. It can also be installed on a PC and will turn it into a router with
wireless access point, backhaul link, hotspot gateway, VPN server and more.
1.5 Synopsis:
This report, caries a complete presentation of my internship program at speed-net
cyber café. Chapter one focuses on the presentation of the company. Some if not
all of what one may wish to know about the company would be seen there.
7
In chapter two I wrote on what I was mainly taught but in theory. All my activities
carried out during my internship period are seen in chapter three. Chapter four is
just comparing between chapters two and three that is conceptual frame work.
CHAPTER TWO
LITERATURE REVIEW
for computers to talk to one another. These protocols are carried out by sending
and receiving formatted instructions of data called packets. Protocols make logical
the physical network, and minimize the possibility of collisions between packets
Two important components are the transmission media that carry the computer's
signals, typically on wires or fiber-optic cables, and the network adapter, which
accesses the physical media that link computers, receives packets from network
information is in the form of binary digits, or bits (1s and 0s), which the computer's
network users.
devices.
resource sharing.
One way to categorize the different types of computer network designs is by the
geographical area they cover. Thus, LAN and WAN were the original categories of
area networks, while the others have gradually emerged over many years of
to operating in a limited space, LANs are also typically owned, controlled, and
connectivity technologies, namely Ethernet, FDDI and Token Ring. Data transfer
speeds over a local area network can reach up to 10 Mbps (such as for an Ethernet
network), 1 Gbps (as with FDDI or Gigabit Ethernet) and 10Gbps (such as for 10
Gigabit Ethernet). A local area network can reach as many as 100, or even 1000
users.
2- Wide Area Network (WAN): A WAN covers a large geographic area such as a
or more LANs that can be many miles apart. To cover great distances, WANs may
transmit data over high-speed phone lines or wireless links such as satellites. To
make a WAN, one can connect many LANs together using devices such as bridges,
11
routers, gateways. The world’s most popular WAN is Internet. Most WANs (like
the Internet) are not owned by any one organization. WANs tend to use technology
like ATM, Frame Relay and X.25 for connectivity over the longer distances.
computer resources in a geographic area or region larger than that covered by even
a large LAN but smaller than the area covered by a WAN. A MAN spans a
physical area larger than a LAN but smaller than a WAN, such as a city. It is
large corporation.
devices.
Digital Assistants (PDA) in close proximity of around a few meters within a room.
monitors activity on the line. Messages are detected by all nodes but are accepted
only by the node(s) to which they are addressed. Because a bus network relies on a
passed from one node to the next. To avoid collisions that occur when two or more
nodes try to use the line at the same time, bus networks commonly rely on collision
direction, from node to node. As a message travels around the ring, each
address is the same as the address assigned to the node, the node accepts the
message; otherwise, it regenerates the signal and passes the message along
to the next node in the circle. Such regeneration allows a ring network to
13
cover larger distances than star and bus networks. It can also be designed to
central computer, which handles any further routing (as to another node) that
might be necessary. A star network is reliable in the sense that a node can
fail without affecting any other node on the network. Its weakness, however,
network. And because each node is individually wired to the hub, cabling
3. Token Ring Network: it is a local area network formed in a ring (closed loop)
topology that uses token passing as a means of regulating traffic on the line. On a
token ring network, a token governing the right to transmit is passed from one
“seizes” the token, marks it as being in use, and inserts the information. The
“busy” token, plus message, is then passed around the circle, copied when it
arrives at its destination, and eventually returned to the sender. The sender
removes the attached message and then passes the free token to the next station in
line.
human brain. Neural networks address problems that are often difficult for
also provide some insight into the way the human brain works. One of the
IP Addressing.
network bits. The network bits make up the left portion of the address. The
second component is the host portion of the address, consisting of the host
bits. The host bits make up the right portion of the address. They consist of
The network portion of the address is separated from the host portion of the
address by a mask.
The mask simply indicates how many bits are used for the network portion,
A 24-bit mask indicates that the first 24 bits of the address are network bits,
A 16-bit mask indicates that the first 16 bits of the address are network bits,
Class A networks:
1. First octet values range from 1 through 126. First octet starts with bit 0.
Class B networks
1. First octet values range from 128 through 191. First octet starts with
each.
17
Class C networks
hosts each.
Class D addresses
Class E addresses
Reserved addresses
2. Addresses beginning with 127 are reserved for internal loopback addresses.
The individual computers on the network are referred to as nodes, hosts, or end
systems and they range from PDAs (personal digital assistants) and tiny laptops to
Hawaii, Hilo)
used to link two or more computers. Network users are able to share files, printers,
and other resources; send electronic messages; and run programs on other
hosts to exchange information between them. To allow any host to send messages
19
to any other host in the network, the easiest solution is to organize them as a full-
mesh, with a direct and dedicated link between each pair of hosts. Such a physical
redundancy is required for a small number of hosts. However, it has two major
drawbacks:
For a network containing n hosts, each host must have n-1 physical
the size of a full-mesh network that can be built for a network containing n
𝑛∗(𝑛−1)
hosts,
2
Links are required. This is possible when there are a few nodes in the same
room, but rarely when they are located several kilometers apart.
network is 2n - 2. Two addresses are subtracted for the network address and
Public addresses:
Most IP addresses are public addresses. Public addresses are registered as
U.S. obtain blocks of public addresses from the American Registry for
ISPs.
There are ARIN counterparts in other parts of the world, and all of these
Numbers Authority.
Public IP addresses are routed across the Internet, so that hosts with public
Private addresses:
RFC 1918 designates the following as private addresses.
Because private addresses are ambiguous - can’t tell where they’re coming
from or going to because anyone can use them - private addresses are not
ISPs block private addresses from being routed across their infrastructure.
Note: The use of private addresses, network address translation (NAT), and
proxy servers solved the IP address shortage problem for the short and
for network design called the Open Systems Interconnection (OSI). It proposes
Communication lines.
Each of the seven layers of the OSI model hides the implementation details of the
lower layers from the upper layers. Well-defined protocols and interfaces for each
of the layers make it possible for the layer to be designed and implemented in
isolation from the other layers. Except for the physical layer, which is implemented
in hardware, all other layers are implemented in software.1 For example; each of
these layers may be implemented as a set of routines which communicate with the
layer above and the layer below it via parameters passed in function calls.
CHAPTER THREE
INTERNSHIP ACTIVITIES
Internship program was carried out for two months. My activities were spread to
the various departments of the company. While there I was given lesson on
computer networking since my background in it was not the best, and the intern
was finally shown how to do and did the computer networking practically. In this
My activities at Speed-Net were widely spread to all the corners and they were
classified into two that is theory and practical section as the intern was given a
Networking.
We were told were the various devices were made use of in the OSI (Open
and IP classes.
25
networking.
We were told of the various cables used in network (Shielded Twisted pair,
Unshielded Twisted pair and coaxial, optic fibers). The main one being the
we were also told that the cables (UTP) are color coded and exist in pairs as
they are called. The colored pairs are ORANGE-WHITE and ORANGE,
WHITE and BROWN. These cables can be arranged into two ways which
Final lesson was to crimp the cables, I was told that you use a networking
tool called Crimping tool that is having two heads of RJ connector, that is
devices for configuring, managing, and troubling shooting them. The interns’
CABLING:
A cable is network device that links two components in a network. I was given
unshielded twisted pair cat5e, this cable is color coded with four pairs of cables
twisted in the order Orange-White and Orange, Green-White and Green, Blue-
White and Blue, Brown-White and Brown. The UTP has two ways of connecting it
depending on the network device you want to connect together and it’s done as
follows:
Router to switch, switch to a node (computer) etc, this are the steps the intern used
First I cut the cable to the length I want using my crimping tool, then the intern cut
the outer layer to make the four pairs of cables inside clear such that I can crimp
without any fault. Next the intern separated the pairs and made them straight, here
for me to archive a straight through UTP, the colors arranged as follow: Orange-
White and Orange, Green-White and Blue, Blue-White and Green, Brown-White
27
and Brown then I fit it into the RJ-45 head making sure that the cables reach the
end of the RJ-45 then place it in the 8P8c port of the crimping tool then I crimp
and repeat the same process to the other end of the cable.
Crossover UTP:
This is used to connect similar network devices together. And to obtain such I
simply interchange the position of the one ends of the straight through UTP then
the other end remains unchanged. The two pairs I swap are orange-white, orange
and green-white, green. And I had the arrangement as this, Green-White and Green
Orange-White and Blue, Blue-White and Orange, Brown-White and Brown, and
then I put it in the RJ-45 connector and crimp. Finally I used a cable tester to
into it and configure the SSID of the router, IP address, Password, and to
turn off DHCP. What I did was I reset by using a small pin that can enter the
hole set aside by the company that manufacture the router. I press down the
reset button for about ten seconds or more until the router reboots then it's ok
The next thing I did was to connect it to a Computer using a straight through
UTP cable and open CMD and run it, then I typed ipconfig then I was given
the IP address of the machine, its subnet mask, and its gateway which is the
IP address of the router, then I copied and opened a browser then I typed it
on the URL and it opened up the routers interface were I was asked to login.
29
The default login details are admin for username and admin for password.
Then I saw what I had to configure and I went ahead and finished up the
configuration.
the other cyber. When I got there the branch manager told me the machines
three in number are unable to connect to the server. I had to check the cable
for any fault but they were connected well and it was showing that there is
connectivity but yet the machines were not able to communicate with the
serve. The next thing I did was I opened command prompt and typed
ipconfig then I was given the IP address of the machine, subnet mask and
Default gateway of the network there I saw that the machine was assigned an
IP address that was different from the default gateway. To solve the problem
subnet mask and the DNS statically then machines were able to
mounted.
I and the others had to use a coffee spade to dig the pole out.
Next the pole was carried on our heads to the point where it’s to be mounted.
There we had to dig a deep hole about 160cm and then planted the pole.
I and other intern were given AP to configure; this was done in groups cause
there where two AP’s that the manager asked use to configure.
In the interns group the AP was then connected using the POE (power over
Ethernet), and reset and then connected to the computer and then opened
CMD and run ipconfig so as to get the IP address of the AP which is then
copied and ran on the URL of the browser where the interface pops out
asking for username and password, and since it was an ubiquity device, the
username was admin and the password was ubnt. Then an interface was
given out that we had to change the SSID, the IP address, the frequency and
unchecked the air max and the two were configured as access point.
The final point was were the AP were to be mounted up and adjusted
following the direction of the repeated until a solid network was established
31
then the AP were tied well such that wind cannot shark them then we
configure hotspot in it so that it can generate usernames and passwords for the
clients coming there to connect to it and have access to the network. This was done
downloaded and installed it unto the pc and it was easy to install. Since it
was an ISO file I used software called Rufus to make a bootable flash drive
using the mikrotik Router OS. Then I used it to install the PC.
After the installation, I used a D-link router and turns off the DHCP and then
changed the SSID of the router to the one the manager gave. Then used a
local area network and plugged it into the NIC port, and the router into
another of the Pc with the Mikrotik router OS, where the router is acting as
an access point.
Then to access the Mikrotik router OS and carry out the configuration, I had
I installed the Win box and run it a window popup and I connected to the
SSID of the router that was acting as an access point, automatically the IP
32
address of the Mikrotik router OS appeared and via it I connected and was in
the Mikrotik Router OS were the step by step setup was done as follows:
3. Click "+"
4. Enter the IP Address you wish to assign to the router; this will be the outward
facing IP, so make sure to select the Ethernet interface that will give the router
internet access.
5. Click on "Apply.
You can easily make use of Open DNS to implement simple filtering, or use your
3. Enter your desired DNS server - here the intern used Google's DNS
4. Click on "Apply"
33
1. Click on IP
2. Click on Routes
3. Click on "+"
Test:
1. Click on Tools
2. Click on Ping
4. Click Start
If you plan to use a stand-alone Radius Server, you may skip this step.
1. Make sure that the version of the file matches the version and architecture of
your device
First, the intern needs to configure two Bridge interfaces. The first one will be a
loopback interface. I have found in the past that if you use the normal loopback
address (127.0.0.1), or one of the other static addresses, for the Radius
2. Click on "+"
4. Click "Apply".
Here I used any unused private IP range for this; it is used simply as an
6. Click "OK"
If you are planning to run the hotspot on a single interface you may skip this step.
2. Click on "+"
4. Click "Apply"
I made use of the private 192.168.0.1/24 range for the hotspot network, but you
6. Click "OK"
36
If you would like multiple interfaces to have access to the hotspot, you can repeat
If you are running on a Router BOARD 750 or similar, you will need to add the
4. Select the interface you want to add to the hotspot, in my case it is "wlan1"
6. Click "OK
If you are using a Router BOARD 750 or similar, you will not be using this
section.
You may choose to implement security on your access point, but since this is a
captive portal, you should not need to use any security. /interface wireless set
6. Click "OK"
1. Click on the "IP" menu. If this option is not available refer to step 2
3. Click on "Hotspot Setup". This will start the Hotspot Setup Wizard
CHAPTER FOUR
Similarities:
Both theory and practice are all teaching the same thing
Both help in building up skills
Both need each other to be effective.
39
Company Challenges
Some of the challenges faced by the company are constituted as follows.
The company is facing a shortage of labour force due to the resignation
of workers.
Suffering from a slow network due to network congestion
The company has only one network administrator that takes care of the
connection problems, and if any fault and he is not there that problems
will be there till he comes.
The speed-Net cyber is facing serious competition which is a big
challenge as there have to be upgrade of devices from time to time.
There is the challenge of hackers as they will always want to make use
of the service without paying for them.
Interns Challenges:
Some of the challenges experienced during my stay in Speed-net constituted
the following;
Transportation was a major problem as I was far from place of
internship.
Too much rain fall and bad climatic conditions, that made it hard to go
out to the field for antenna installations.
Some of the facilitators were not willing to cooperate. Hence they
refused to answer some of my questions and deprive me from useful
information.
40
CHAPTER FIVE
5.1 Recommendations:
The problems faced by Speed-net management, due to increasing technology
are as follows;
Some of the computers should be changed because they are too old
company’s network.
The management should put a strict rule as regarding client and staffs
For the interns who will like to do their internship in networking make
sure you own a laptop that will easy your learning and gives you maximum
5.2 Conclusion:
In conclusion the internship was a good and serious one. I learned so many things.
It has assisted me enormously in relating classroom work and field work and
vis with work and colleagues. Hence it has increased my chances of picking a
Negative Experienced.
Most of the workers were always late for work.
Positive Experienced.
I had the opportunity to work with computer Network engineers.
I was able to manage and use very complicated software for configuring
networks.
I had the chance to actually touch, see, feel and use the various network
devices.
43
REFERENCES:
Time 2:46pm
August 15 2016.
8:22pm.
2018.