Vous êtes sur la page 1sur 54

i

Certification
This is to testify the following report was carried by the student Bongajum
Raymond Fanyuy and was supervised by Mr. Ngolah Kenneth under the control of
the school.

Supervisor

Mr. Ngolah Kenneth

Sign………….
ii

Dedication
I dedicate this piece of work to my lovely parents Mr. /Mrs. Bongajum and to God
almighty for this grace, care and guidance throughout my internship.
iii

Declaration
This is to testify that Bongajum Raymond Fanyuy carried out an internship
program at speed-net and came out with the following report on setting up a
network in a small business or home.

Student

Bongajum Raymond fanyuy

Sign……………….
iv

Acknowledgement
I will love to give my sincere gratitude to all who have made immersed
contribution to ensure I go through with my internship program to a success.

Firstly, The almighty God for his grace and guidance throughout the internship
program, my supervisor, my parents and classmates.
v

ABSTRACT
An Internship is a period of time during which a student or new graduate gets
practical experience in his or her field of study. This is to make the student or
graduate be familiar with the difficulties (problems) and realities faced by people
in the job market. During this period the student is expected to write a report on a
particular topic. In this light, my research topic “COMPUTER NETWORKING”
case study SPEED-NET CYBER CAFÉ head office at Malingo-Buea

Computer Networking is the interconnection of two or more network devices


(computers (nodes), router, cables, switch, modems etc.) with the purpose of
sharing resources using a known protocol.

Network trouble shooting is all about checking a network device or a working


network for any problem and if any, then giving the possible solution for that
problem.

Networking in Africa is growing to have its grounds and expand their various
networks. During my internship I studied the various network devices and how
they interconnected to form a network. And also the challenges faced by the
organizations to maintain and expand its networks. I came across the various
challenges faced by the intern and the organization and made recommendations.
vi

LIST OF ABRIVIATIONS

RJ-45: Registered jack- 45.

LAN: Local Area Network.

MAN: Metropolitan Area Network.

WAN: Wide Area Network.

PAN: Personal Area Network.

DNS: Domain Name Server.

IP: Internet Protocol.

DHCP: Dynamic Host Transfer Configuration Protocol.

SNMP: Simple Management Protocol.

UDP: Users Datagram Protocol.

FTP: File Transfer Protocol.

TFTP: Trivial File Transfer Protocol.

AP: Access Point.

WAP: Wireless Access Point.

PING: Packet Internet Groper

OSI: Open System Interconnection.

NAT: Network Address Translation


vii

SFTP: Secure File Transfer Protocol.

SSH: Secure Shell

IANA: Internet Assigned Number Authority.

IPv4: Internet Protocol Version 4.

IPv6: Internet Protocol Version 6.

UTP: Unshielded Twisted Pair.

CMD: command prompt.

SSID: Service set identifier.


viii

LIST OF FIGURES
Figure 1: showing a router and the ports.

Fig 2: Bus network.

Fig: 3: Ring network.

Fig: 4: Star Network.

Fig 5: Token ring network.

Fig 6: Natural Network.

Fig 7: Straight through.

Fig 8: crossover.
ix

LIST OF TABLES
Table 1: showing services offered in speed-net

Table2: showing network devices and uses.

Table 4: The OSI reference model:


x

Table of Contents
Certification ................................................................................................................i
Dedication ................................................................................................................. ii
Declaration ............................................................................................................... iii
Acknowledgement ................................................................................................... iv
ABSTRACT ...............................................................................................................v
LIST OF ABRIVIATIONS...................................................................................... vi
LIST OF FIGURES ............................................................................................... viii
LIST OF TABLES ................................................................................................... ix
CHAPTER ONE ........................................................................................................1
INTRODUCTION .....................................................................................................1
1.1.Presentation of Company and Description of Its Main Activities ...................................................... 1
1.2.Description of Department Of Focus .................................................................................................. 4
1.3.Objectives of Internship. ..................................................................................................................... 5
1.4. Definition of Terms............................................................................................................................ 6
1.5.Synopsis: ............................................................................................................................................. 6

CHAPTER TWO .......................................................................................................8


LITERATURE REVIEW ..........................................................................................8
2.1. Conceptual Framework: ..................................................................................................................... 8
2.2. Theoretical Framework: ................................................................................................................... 18

CHAPTER THREE .................................................................................................24


INTERNSHIP ACTIVITIES ...................................................................................24
3.1 Main Activities in the department of focus ....................................................................................... 24
3.2 Practical Activities on Area Of Focus: ............................................................................................. 26

CHAPTER FOUR ....................................................................................................38


DATA PRESENTATION AND ANALYSIS .........................................................38
4.1 Compares between Theory And Practice .......................................................................................... 38
4.2. Challenges encounter: ...................................................................................................................... 39
xi

CHAPTER FIVE .....................................................................................................40


RECOMMENDATIONS AND CONLUSION .......................................................40
5.1 Recommendations: ........................................................................................................................... 40
5.2. Conclusion: ...................................................................................................................................... 41

REFERENCES: .......................................................................................................43
1

CHAPTER ONE

INTRODUCTION

1.1 Presentation of Company and Description of Its Main Activities

General Overview of Speed-Net Cyber Café:


Speed-net cyber café is a private enterprise with a labour force of about 6 persons,

managing two separate branches with about 20 computers, 2 printers, 1

photocopier, and a faxing and scanning machine in each branch. The two branches

are all located in Fako division Buea the regional headquarters of the south west

region, Address Malingo: Promise land Building, Lady L Street Malingo, Molyko,

and Buea. And the other is located at, Limbe Quarters: Faith and Hope Cite Limbe

Quarters Checkpoint, Molyko, Buea.

Company Objectives / Statement of Mission:


In order to promote the development of Information and Communications

Technology (ICT) in Buea, to provide citizens and visitors an easy way to access

the Internet, as well as to broaden the use and application of ICT here in Buea, the

SPEED-Net IT Solutions commenced the Wireless Broadband System "SPEED-

Net Hotspot" service in September 2014. This service will provide citizens and

visitors with wireless Internet access within Buea. The Wireless Broadband System

uses Wi-Fi technology. It is a short-distance wireless communication technology


2

allowing Wi-Fi enabled equipment, within the service coverage area, to wirelessly

connect to the Internet for web browsing as well as email communication, etc.

Legal Status:
Speed-net is a fully incorporated enterprise under Cameroon law. In the very recent

past, the enterprise has updated its status in order to comply with the provisions of

OHADA TREATY, which is a harmonized business law system common to most

of the French speaking African countries.

Brief History:
The present day Speed-net cyber cafe´ started performing its works by running a

cyber, designing websites, sales of accessories and printing and photocopying of

documents and after a few years the management saw the need for a hotspot as

there was evolution in technology, the hotspot services were put into place

September 2014 till date it has been extended all around the neighborhood of

Malingo, Limbe quarters and Biaka areas.

Services and Products:


To increase the Speed-Net IT Solution hotspot coverage, and reduce the risk of

service interruption, providing SPEED-Net Free backup hotspots service with no

additional budget. The SPEED-Net IT SOLUTION hotspots service name (SSID)

is SPEED-Net HOTSPOT. Now there are many hotspots both indoor and outdoor,
3

with a maximum download speeds up to 20Mbps.The services are classified as

follows;

Service One Service Two Service Three

•Fast Internet Connections •Sales of Desktops and •Web Designing

•WIFI-Hotspot Desktop Accessories •Website Hosting

•International Calls •Sales of Laptops and •Buying of Software

•Typing and Printing Laptop Accessories •Graphic Designing

•Clean Photocopy (Black •Desktops and Laptop

and White/ Colour) Repairs

•Scanning •Software Installation

•Stationeries •Mobile Phone Decoding

•Network installation and Flashing

Table 1: showing services offered in speed-net


4

1.2 Description of Department Of Focus


With the movement of Cameroon from an analog system to a digital system of

technology and now in the Android system, Speed-Net being a promising and

expanding private venture needed a well-organized network system and better

computer units. As a result, this department was created. Speed-Net named this

department as SPEED-NET CYBER CAFÉ. This department is governed by the

network Administrator Mbiachem Bekecheng (manager of Speed-Net).

Functions of the Networking Department:

The function of this department is as follows;

 Maintain and install all computer systems of Speed-net.

 Manages and maintain the network system of Speed-net.

 Controls all electrical and digital devices of the Speed-net.

 Keep records and statistics of the Speed-net.

 And also to handle the problems of clients that visit Speed-net.

This department is more involved in networking of all types, which made the

system so interesting; And Computer Networking was my focal point as it was

fully implemented at Speed-Net Cyber.


5

1.3 Objectives of Internship.


The main objective of my internship is to help me blend the theoretical knowledge

acquired through lectures with practical knowledge and to understand limitations

in practical application of knowledge of information technology through the

internship, I was expected to:

 Gain working experience in a real-world workplace environment.

 Have diverse learning experience.

 Work in a team and to collaborate with people with diverse background.

 Broaden my social and cultural experience, and to develop my social and

cultural values.

 Prepare for my life-long career over the years, internship has gained grounds

as it is a focal and integral part of studies in most professional fields of

studies. Hence, Interns are expected to exhibit professionalism at all times

during the internship experience. This professionalism should be evident in

their interactions with clients, co-workers, and supervisors. Interns are

expected to apply their knowledge, skills, and abilities in the performance of

all duties, to behave ethically, and to follow all rules and policies of the

institution they work in.


6

1.4 Definition of Terms.

 Computer network: Computer Networking is the interconnection of two or


more network devices (computers (nodes), router, cables, switch, modems
etc.) with the purpose of sharing resources using a known protocol.
 WAP: In computer networking, a wireless access point (WAP) is a

networking hardware device that allows a Wi-Fi compliant device to connect

to a wired network.

 Router: A router is a networking device that forwards data packets between

computer networks. Routers perform the traffic directing functions on the

Internet. A data packet is typically forwarded from one router to another

through the networks that constitute the internetwork until it

reaches its destination node.

 MikroTik Router OS: is the operating system of MikroTik Router BOARD

hardware. It can also be installed on a PC and will turn it into a router with

all the necessary features - routing, firewall, bandwidth management,

wireless access point, backhaul link, hotspot gateway, VPN server and more.

1.5 Synopsis:
This report, caries a complete presentation of my internship program at speed-net

cyber café. Chapter one focuses on the presentation of the company. Some if not

all of what one may wish to know about the company would be seen there.
7

In chapter two I wrote on what I was mainly taught but in theory. All my activities

carried out during my internship period are seen in chapter three. Chapter four is

just comparing between chapters two and three that is conceptual frame work.

While in chapter five I just concluded and gave recommendations.


8

CHAPTER TWO

LITERATURE REVIEW

2.1 Conceptual Framework:


A computer network is a group of computer systems and other computing
hardware devices that are linked together through communication channels to
facilitate communication and resource-sharing among a wide range of users.
Networks are commonly categorized based on their characteristics.
A network has three layers of components: application software, network
software, and network hardware. Application software consists of computer
programs that interface with network users and permit the sharing of
information, such as files, graphics, and video, and resources, such as printers and
disks. One type of application software is called client-server. Client computers
send requests for information or requests to use resources to other computers,
called servers that control data and applications. Another type of application
software is called peer-to-peer. In a peer-to-peer network, computers send
messages and requests directly to one another without a server intermediary.

Network software consists of computer programs that establish protocols, or rules,

for computers to talk to one another. These protocols are carried out by sending

and receiving formatted instructions of data called packets. Protocols make logical

connections between network applications, direct the movement of packets through

the physical network, and minimize the possibility of collisions between packets

sent at the same time.


9

Network hardware is made up of the physical components that connect computers.

Two important components are the transmission media that carry the computer's

signals, typically on wires or fiber-optic cables, and the network adapter, which

accesses the physical media that link computers, receives packets from network

software, and transmits instructions and requests to other computers. Transmitted

information is in the form of binary digits, or bits (1s and 0s), which the computer's

electronic circuit can process.

Network devices and their uses;


DEVICE USES

Routers This is used for routing of packets from and to the

network users.

Switch It links the router, severs, computers and other network

devices.

Cables Its used for the interconnection of two device for

resource sharing.

Modem As its name (modulator demodulator) Used to send

digital signals over analogue lines and vice versa,

Computer Also called nodes are used as user interface where we

use and manage the network.


10

Table2: showing network devices and uses.

Types of computer networks;

One way to categorize the different types of computer network designs is by the

geographical area they cover. Thus, LAN and WAN were the original categories of

area networks, while the others have gradually emerged over many years of

technology evolution. They include: MAN, PAN, CAN, SAN, etc.

1- Local Area Networks (LAN): A LAN connects network devices over a

relatively short distance (within a room, a building, nearby buildings). In addition

to operating in a limited space, LANs are also typically owned, controlled, and

managed by a single person or organization. They also tend to use certain

connectivity technologies, namely Ethernet, FDDI and Token Ring. Data transfer

speeds over a local area network can reach up to 10 Mbps (such as for an Ethernet

network), 1 Gbps (as with FDDI or Gigabit Ethernet) and 10Gbps (such as for 10

Gigabit Ethernet). A local area network can reach as many as 100, or even 1000

users.

2- Wide Area Network (WAN): A WAN covers a large geographic area such as a

country, a continent, or even whole of the world. It is built by interconnecting two

or more LANs that can be many miles apart. To cover great distances, WANs may

transmit data over high-speed phone lines or wireless links such as satellites. To

make a WAN, one can connect many LANs together using devices such as bridges,
11

routers, gateways. The world’s most popular WAN is Internet. Most WANs (like

the Internet) are not owned by any one organization. WANs tend to use technology

like ATM, Frame Relay and X.25 for connectivity over the longer distances.

3- Metropolitan area network (MAN) is a network that interconnects users with

computer resources in a geographic area or region larger than that covered by even

a large LAN but smaller than the area covered by a WAN. A MAN spans a

physical area larger than a LAN but smaller than a WAN, such as a city. It is

typically owned and operated by a single entity such as a government body or a

large corporation.

4- A Campus Area Network is a network spanning multiple LANs but smaller

than a MAN, such as on a university.

5- A Storage Area Network connects data storage servers through high-speed

technologies. It provides a high-speed infrastructure to move data between storage

devices.

6- A Personal Area Network (PAN) is a network that is used for communicating

among computers and computing devices (including telephones and Personal

Digital Assistants (PDA) in close proximity of around a few meters within a room.

It can be wired or wireless.


12

Types of Network Topology:


Bus Network Topology: it is a local area network in which all nodes are

connected to a main communications line (bus). On a bus network, each node

monitors activity on the line. Messages are detected by all nodes but are accepted

only by the node(s) to which they are addressed. Because a bus network relies on a

common data “highway,” a malfunctioning node simply ceases to communicate; it

doesn't disrupt operation as it might on a ring network, in which messages are

passed from one node to the next. To avoid collisions that occur when two or more

nodes try to use the line at the same time, bus networks commonly rely on collision

detection or Token Passing to regulate traffic.

Fig 2: Bus network, source: http//www.computerhope.com

1. Ring Network: It is a local area network in which devices (nodes) are

connected in a closed loop, or ring. Messages in a ring network pass in one

direction, from node to node. As a message travels around the ring, each

node examines the destination address attached to the message. If the

address is the same as the address assigned to the node, the node accepts the

message; otherwise, it regenerates the signal and passes the message along

to the next node in the circle. Such regeneration allows a ring network to
13

cover larger distances than star and bus networks. It can also be designed to

bypass any malfunctioning or failed node. Because of the closed loop,

however, new nodes can be difficult to add.

Fig: 3: Ring network, source:http://www.computerhope.com.

2. Star Network: it is a local area network in which each device (node) is

connected to a central computer in a star-shaped configuration (topology);

commonly, a network consisting of a central computer (the hub) surrounded

by terminals. In a star network, messages pass directly from a node to the

central computer, which handles any further routing (as to another node) that

might be necessary. A star network is reliable in the sense that a node can

fail without affecting any other node on the network. Its weakness, however,

is that failure of the central computer results in a shutdown of the entire

network. And because each node is individually wired to the hub, cabling

costs can be high.


14

Fig: 4: Star Network, source: http//www.computerhope.com

3. Token Ring Network: it is a local area network formed in a ring (closed loop)

topology that uses token passing as a means of regulating traffic on the line. On a

token ring network, a token governing the right to transmit is passed from one

station to the next in a physical circle. If a station has information to transmit, it

“seizes” the token, marks it as being in use, and inserts the information. The

“busy” token, plus message, is then passed around the circle, copied when it

arrives at its destination, and eventually returned to the sender. The sender

removes the attached message and then passes the free token to the next station in

line.

Fig 5: Token ring network, source: http//www.computerhope.com


15

4. Neural Network: it is a highly interconnected network of information-

processing elements that mimics the connectivity and functioning of the

human brain. Neural networks address problems that are often difficult for

traditional computers to solve, such as speech and pattern recognition. They

also provide some insight into the way the human brain works. One of the

most significant strengths of neural networks is their ability to learn from a

limited set of examples.

Fig 6: Neural Network, source: http/www.computerhope.com

IP Addressing.

An IP address is a 32-bit address that consists of two components.

 One component is the network portion of the address, consisting of the

network bits. The network bits make up the left portion of the address. The

second component is the host portion of the address, consisting of the host

bits. The host bits make up the right portion of the address. They consist of

the remaining bits not included with the network bits.


16

The network portion of the address is separated from the host portion of the

address by a mask.

 The mask simply indicates how many bits are used for the network portion,

leaving the remaining bits for the host portion.

 A 24-bit mask indicates that the first 24 bits of the address are network bits,

and the remaining 8 bits are host bits.

 A 16-bit mask indicates that the first 16 bits of the address are network bits,

and the remaining 16 bits are host bits.

Class full IP Addressing and its Shortcomings

Three main classes of IP addresses do exist they are as follows;

 Class A networks:

1. First octet values range from 1 through 126. First octet starts with bit 0.

2. Network mask is 8 bits, written /8 or 255.0.0.0.

3. 1.0.0.0 Through 126.0.0.0 is class A networks with 16777214 hosts each.

 Class B networks

1. First octet values range from 128 through 191. First octet starts with

binary pattern 10.

2. Network mask is 16 bits, written /16 or 255.255.0.0.

3. 128.0.0.0 Through 191.255.0.0 are class B networks, with 65534 hosts

each.
17

 Class C networks

1. First octet values range from 192 through 223.

2. First octet starts with binary pattern 110.

3. Network mask is 24 bits, written /24 or 255.255.255.0.

4. 192.0.0.0 Through 223.255.255.0 are class C networks, with 254

hosts each.

Two additional classes and reserved addresses

 Class D addresses

1. First octet values range from 224 through 239.

2. First octet starts with binary pattern 1110.

3. Class D addresses are multicast addresses, which will not be

discussed in this tutorial.

 Class E addresses

1. Essentially everything that’s left.

2. Experimental class, which will not be discussed in this report.

 Reserved addresses

1. Is the default IP addressed, and it is used to specify a default route.


18

2. Addresses beginning with 127 are reserved for internal loopback addresses.

It is common to see 127.0.0.1 used as the internal loopback address on many

devices. Try pinging this address on a PC or Unix station.

2.2 Theoretical Framework:


Olivier Bonaventure states that: Computer networks are used to allow several hosts

to exchange information between them.

A computer network is a set of independent computer systems connected by

Telecommunication links for the purpose of sharing information and resources.

The individual computers on the network are referred to as nodes, hosts, or end

systems and they range from PDAs (personal digital assistants) and tiny laptops to

the massively parallel supercomputers (Definition according to G. Michael

Schneider of the Macalester College and Judith L. Gersting of the University of

Hawaii, Hilo)

A network is an interconnection of devices in other to communicate and share

resources. These are techniques, physical connections, and computer programs

used to link two or more computers. Network users are able to share files, printers,

and other resources; send electronic messages; and run programs on other

computer. (According to Microsoft Encarta 2006)

According to Olivier Bonaventure, Computer networks are used to allow several

hosts to exchange information between them. To allow any host to send messages
19

to any other host in the network, the easiest solution is to organize them as a full-

mesh, with a direct and dedicated link between each pair of hosts. Such a physical

topology is sometimes used, especially when high performance and high

redundancy is required for a small number of hosts. However, it has two major

drawbacks:

 For a network containing n hosts, each host must have n-1 physical

interfaces. In practice, the number of physical interfaces on a node will limit

the size of a full-mesh network that can be built for a network containing n

𝑛∗(𝑛−1)
hosts,
2

Links are required. This is possible when there are a few nodes in the same

room, but rarely when they are located several kilometers apart.

Formula to determine number of hosts on a given network


Given that there are N host bits in an address, the number of hosts for that

network is 2n - 2. Two addresses are subtracted for the network address and

the broadcast address.

 8 host bits: 28 - 2 = 254 hosts

 16 host bits: 216 - 2 = 65534 hosts

 24 host bits: 224 - 2 = 16777214 host


20

Public addresses:
 Most IP addresses are public addresses. Public addresses are registered as

belonging to a specific organization.

 Internet Service Providers (ISP) and extremely large organizations in the

U.S. obtain blocks of public addresses from the American Registry for

Internet Numbers. Other organizations obtain public addresses from their

ISPs.

 There are ARIN counterparts in other parts of the world, and all of these

regional registration authorities are subject to the global Internet Assigned

Numbers Authority.

 Public IP addresses are routed across the Internet, so that hosts with public

addresses may freely communicate with one another globally.

 No organization is permitted to use public addresses that are not registered

with that organization!

Private addresses:
 RFC 1918 designates the following as private addresses.

 Class A range: 10.0.0.0 through 10.255.255.255.

 Class B range: 172.16.0.0 through 172.31.255.255.

 Class C range: 192.168.0.0 through 192.168.255.255.


21

 Private addresses may be used by any organization, without any

requirement for registration.

 Because private addresses are ambiguous - can’t tell where they’re coming

from or going to because anyone can use them - private addresses are not

permitted to be routed across the Internet.

 ISPs block private addresses from being routed across their infrastructure.

 Note: The use of private addresses, network address translation (NAT), and

proxy servers solved the IP address shortage problem for the short and

medium terms. The projected long-term solution is IPv6.

The OSI Model


The International Standards Organization (ISO) has developed a reference model

for network design called the Open Systems Interconnection (OSI). It proposes

seven-layer architecture for networks, as summarized by the figure bellow. Each

layer is characterized by a set of standard protocols which specify its behavior.


22

Layer Name Data Unit Main Function

7 Application Message Mutually-agreeable meaning of

application data(common semantics).

6 Presentation Message Mutually-agreeable binary representation

ofapplication data (common syntax).

5 Session Message Negotiation of the establishment and

termination of connections (sessions).

4 Transport Message Efficient and cost-effective transportation

of data across the network.

3 Network Packet Routing of data packets within the

network and across multiple networks.

2 Data Link Frame Provision of a reliable communication

line to the network layer.

1 Physical Bit Transmission of raw data bits over

Communication lines.

Table 3: The OSI reference model:


23

Each of the seven layers of the OSI model hides the implementation details of the

lower layers from the upper layers. Well-defined protocols and interfaces for each

of the layers make it possible for the layer to be designed and implemented in

isolation from the other layers. Except for the physical layer, which is implemented

in hardware, all other layers are implemented in software.1 For example; each of

these layers may be implemented as a set of routines which communicate with the

layer above and the layer below it via parameters passed in function calls.

Alternatively, each layer may be implemented as a task (in a multi-tasking

environment) which communicates with other tasks by message passing.


24

CHAPTER THREE

INTERNSHIP ACTIVITIES
Internship program was carried out for two months. My activities were spread to

the various departments of the company. While there I was given lesson on

computer networking since my background in it was not the best, and the intern

was finally shown how to do and did the computer networking practically. In this

light I did so many things which are explained detail below.

My activities at Speed-Net were widely spread to all the corners and they were

classified into two that is theory and practical section as the intern was given a

lesson by the manager of Speed-Net on all the various aspects of Computer

Networking.

3.1 Main Activities in the department of focus

Theoretical Activities on Area of Focus:


I was given lessons on Computer Networking by the manager, on:

 Network devices (Router, switch, cables, modem, RJ-45, Access points,

computers Inkjet printer) how they are interconnected to form a network.

 We were told were the various devices were made use of in the OSI (Open

System Interconnection) layers which they operate.

 We were also given a lesson on IP addressing and the various IP versions

and IP classes.
25

 We were given a clue on the various protocols that are involved in

networking.

 We were told of the various cables used in network (Shielded Twisted pair,

Unshielded Twisted pair and coaxial, optic fibers). The main one being the

unshielded twisted pair which all exists in different categories.

 we were also told that the cables (UTP) are color coded and exist in pairs as

they are called. The colored pairs are ORANGE-WHITE and ORANGE,

GREEN-WHITE and GREEN, BLUE-WHITE and BLUE, BROWN-

WHITE and BROWN. These cables can be arranged into two ways which

are straight through and Cross Over.

 Final lesson was to crimp the cables, I was told that you use a networking

tool called Crimping tool that is having two heads of RJ connector, that is

8P8C and 6P6C where you place the connectors to crimp.


26

3.2 Practical Activities on Area Of Focus:


At Speed-net we were shown and I did so many things using the various network

devices for configuring, managing, and troubling shooting them. The interns’

activities are as follow:

CABLING:
A cable is network device that links two components in a network. I was given

unshielded twisted pair cat5e, this cable is color coded with four pairs of cables

twisted in the order Orange-White and Orange, Green-White and Green, Blue-

White and Blue, Brown-White and Brown. The UTP has two ways of connecting it

depending on the network device you want to connect together and it’s done as

follows:

 Straight Through UTP:

This cabling technique is used to connect dissimilar network components that is

Router to switch, switch to a node (computer) etc, this are the steps the intern used

to crimp the cable for straight through:

First I cut the cable to the length I want using my crimping tool, then the intern cut

the outer layer to make the four pairs of cables inside clear such that I can crimp

without any fault. Next the intern separated the pairs and made them straight, here

for me to archive a straight through UTP, the colors arranged as follow: Orange-

White and Orange, Green-White and Blue, Blue-White and Green, Brown-White
27

and Brown then I fit it into the RJ-45 head making sure that the cables reach the

end of the RJ-45 then place it in the 8P8c port of the crimping tool then I crimp

and repeat the same process to the other end of the cable.

Fig 7: Straight through, source: http//www.computerhope.com

 Crossover UTP:

This is used to connect similar network devices together. And to obtain such I

simply interchange the position of the one ends of the straight through UTP then

the other end remains unchanged. The two pairs I swap are orange-white, orange

and green-white, green. And I had the arrangement as this, Green-White and Green

Orange-White and Blue, Blue-White and Orange, Brown-White and Brown, and

then I put it in the RJ-45 connector and crimp. Finally I used a cable tester to

confirm and they were all good to use.


28

Fig 8: crossover, source: http//www.computerhope.com

I reset and configured Routers:


 I was given a Net Gear and a D-link router by the manager to reset and login

into it and configure the SSID of the router, IP address, Password, and to

turn off DHCP. What I did was I reset by using a small pin that can enter the

hole set aside by the company that manufacture the router. I press down the

reset button for about ten seconds or more until the router reboots then it's ok

to use because it’s now set to its default settings.

 The next thing I did was to connect it to a Computer using a straight through

UTP cable and open CMD and run it, then I typed ipconfig then I was given

the IP address of the machine, its subnet mask, and its gateway which is the

IP address of the router, then I copied and opened a browser then I typed it

on the URL and it opened up the routers interface were I was asked to login.
29

 The default login details are admin for username and admin for password.

Then I saw what I had to configure and I went ahead and finished up the

configuration.

Trouble shooting at the other branch office Limbe Quarter:


 I was called by the manager to go check and solve the network problem at

the other cyber. When I got there the branch manager told me the machines

three in number are unable to connect to the server. I had to check the cable

for any fault but they were connected well and it was showing that there is

connectivity but yet the machines were not able to communicate with the

serve. The next thing I did was I opened command prompt and typed

ipconfig then I was given the IP address of the machine, subnet mask and

Default gateway of the network there I saw that the machine was assigned an

IP address that was different from the default gateway. To solve the problem

I had to put the machines in the same network by assigning IP addresses,

subnet mask and the DNS statically then machines were able to

communicate with the server and browser again.


30

Removing and mounting a pole at Biaka junction:


I and some other interns were show a very long pole by the manager, to dig

it out and carry to Biaka were an extension of the network was to be

mounted.

 I and the others had to use a coffee spade to dig the pole out.

 Next the pole was carried on our heads to the point where it’s to be mounted.

 There we had to dig a deep hole about 160cm and then planted the pole.

 I and other intern were given AP to configure; this was done in groups cause

there where two AP’s that the manager asked use to configure.

 In the interns group the AP was then connected using the POE (power over

Ethernet), and reset and then connected to the computer and then opened

CMD and run ipconfig so as to get the IP address of the AP which is then

copied and ran on the URL of the browser where the interface pops out

asking for username and password, and since it was an ubiquity device, the

username was admin and the password was ubnt. Then an interface was

given out that we had to change the SSID, the IP address, the frequency and

unchecked the air max and the two were configured as access point.

 The final point was were the AP were to be mounted up and adjusted

following the direction of the repeated until a solid network was established
31

then the AP were tied well such that wind cannot shark them then we

connected via them and browsed with no stress.

Mikrotik Router Broad Configuration for Hotspot:


I was given a system unit to download and install Mikrotik router broad OS and

configure hotspot in it so that it can generate usernames and passwords for the

clients coming there to connect to it and have access to the network. This was done

using the steps below:

 First I searched for the mikrotik router OS in the mikrotik website

downloaded and installed it unto the pc and it was easy to install. Since it

was an ISO file I used software called Rufus to make a bootable flash drive

using the mikrotik Router OS. Then I used it to install the PC.

 After the installation, I used a D-link router and turns off the DHCP and then

changed the SSID of the router to the one the manager gave. Then used a

local area network and plugged it into the NIC port, and the router into

another of the Pc with the Mikrotik router OS, where the router is acting as

an access point.

 Then to access the Mikrotik router OS and carry out the configuration, I had

to download another software called Win box.

 I installed the Win box and run it a window popup and I connected to the

SSID of the router that was acting as an access point, automatically the IP
32

address of the Mikrotik router OS appeared and via it I connected and was in

the Mikrotik Router OS were the step by step setup was done as follows:

 Step 1: Configure internet access on the router

Add Router IP Address:

 Change the IP to match your network configuration

1. Click on the IP Menu

2. Click on the Addresses Menu

3. Click "+"

4. Enter the IP Address you wish to assign to the router; this will be the outward

facing IP, so make sure to select the Ethernet interface that will give the router

internet access.

5. Click on "Apply.

 Configure Upstream DNS Server:

You can easily make use of Open DNS to implement simple filtering, or use your

own DNS servers if needed.

1. Click on the IP Menu

2. Click on the DNS Menu

3. Enter your desired DNS server - here the intern used Google's DNS

4. Click on "Apply"
33

 Configure Default Route:

1. Click on IP

2. Click on Routes

3. Click on "+"

4. Enter 0.0.0.0/0 as the destination address

5. Enter 10.0.0.1 as the Gateway

 Test:

Check if you can ping a public IP address like 8.8.8.8

1. Click on Tools

2. Click on Ping

3. Enter a publicly available address

4. Click Start

 Step 2: Install User Manager and Hotspot

If you plan to use a stand-alone Radius Server, you may skip this step.

Download the firmware package from Mikrotik

Extract the zip file on your local drive

1. Make sure that the version of the file matches the version and architecture of

your device

2. Open the Files window on win box


34

3. Drag the "user-manager-X.X-xxxxxx.npk" to the files window.

4. Do the same for "hotspot-X.X-xxxxxx.npk".

5. Reboot the router (/system reboot).

 Step 3: Configure interfaces

First, the intern needs to configure two Bridge interfaces. The first one will be a

loopback interface. I have found in the past that if you use the normal loopback

address (127.0.0.1), or one of the other static addresses, for the Radius

(Usermanager) server, you may experience some difficulties.

1. Create Loopback Bridge

1. Click on the "Bridge" menu

2. Click on "+"

3. Enter "Loopback" for the bridge name

4. Click "Apply".

2. Add Loopback Bridge IP Address

Here I used any unused private IP range for this; it is used simply as an

interface to run the RADIUS server on.

1. Click on the IP Menu

2. Click on the Addresses menu

3. Click the "+" button

4. Enter "10.10.0.1/32" as the IP Address


35

5. Select the "Loopback" Interface

6. Click "OK"

3. Create Hotspot Bridge

If you are planning to run the hotspot on a single interface you may skip this step.

1. Click on the "Bridge" menu

2. Click on "+"

3. Enter "Hotspot" for the bridge name

4. Click "Apply"

4. Add Hotspot Bridge IP Address

I made use of the private 192.168.0.1/24 range for the hotspot network, but you

can use whatever is suitable in your setup.

1. Click on the IP Menu

2. Click on the Addresses menu

3. Click the "+" button

4. Enter "192.168.0.1/24" as the IP Address

5. Select the "Hotspot" Interface

6. Click "OK"
36

5. Add Hotspot Ports to Bridge

If you would like multiple interfaces to have access to the hotspot, you can repeat

this process, only changing the interface each time.

If you are running on a Router BOARD 750 or similar, you will need to add the

ports that you AP's are connected to, to the bridge.

1. Click on the "Bridge" menu

2. Click on the "Ports" Tab

3. Click on the "+"

4. Select the interface you want to add to the hotspot, in my case it is "wlan1"

5. Select the "Hotspot" bridge

6. Click "OK

 Configure the Access Point

If you are using a Router BOARD 750 or similar, you will not be using this

section.

You may choose to implement security on your access point, but since this is a

captive portal, you should not need to use any security. /interface wireless set

1. Click on the "Wireless" Menu

2. Double click on the Wireless Interface that you will be using

3. Set the mode to "ap-bridge"

4. Set the band to 2Ghz-B/G (or otherwise if needs be)


37

5. Change the SSID to "Hotspot", or whatever suits you.

6. Click "OK"

 Configure the Hotspot

1. Click on the "IP" menu. If this option is not available refer to step 2

2. Click on the "Hotspot" item

3. Click on "Hotspot Setup". This will start the Hotspot Setup Wizard

 The Hotspot Wizard

1. Select the Hotspot Bridge as the Hotspot Interface

2. Click Next until you


38

CHAPTER FOUR

DATA PRESENTATION AND ANALYSIS

4.1 Compares between Theory And Practice


There are a lot of compares’ between what I was thought in school and what I
did during my internship.

Differences between theory and practical:


Theory
 Study is in details and less practice is involved.
 In school I was given the definitions and basics of network
 More of lectures and notes but less or no practice.
Practice
 Study is in brief, but more practice is involved.
 On internship, I was thought on how to apply the theory I learned from
school.
 Less lectures and more practice.
In school I was taught so many things that I could apply, so many lectures
were taken, some of which I saw them as irrelevant but on internship I was
able to relate the theory in school with the necessary practice. And those
which I saw as irrelevant were somehow useful.

Similarities:
Both theory and practice are all teaching the same thing
Both help in building up skills
Both need each other to be effective.
39

4.2 Challenges encounter:

Company Challenges
Some of the challenges faced by the company are constituted as follows.
 The company is facing a shortage of labour force due to the resignation
of workers.
 Suffering from a slow network due to network congestion
 The company has only one network administrator that takes care of the
connection problems, and if any fault and he is not there that problems
will be there till he comes.
 The speed-Net cyber is facing serious competition which is a big
challenge as there have to be upgrade of devices from time to time.
 There is the challenge of hackers as they will always want to make use
of the service without paying for them.

Interns Challenges:
Some of the challenges experienced during my stay in Speed-net constituted
the following;
 Transportation was a major problem as I was far from place of
internship.
 Too much rain fall and bad climatic conditions, that made it hard to go
out to the field for antenna installations.
 Some of the facilitators were not willing to cooperate. Hence they
refused to answer some of my questions and deprive me from useful
information.
40

CHAPTER FIVE

RECOMMENDATIONS AND CONLUSION

5.1 Recommendations:
The problems faced by Speed-net management, due to increasing technology

and clients interactions with the workers of the enterprise, my recommendations

are as follows;

 The hotspot signals should be extended so as to attract many users in

different areas around Buea.

 Some of the computers should be changed because they are too old

and as a result they affect connection.

 The enterprise should try and increase the bandwidth of the

company’s network.

 The management should put a strict rule as regarding client and staffs

relation cause for security purposes.

 The network devices should be regularly checked and readjusted for

proper and effective performance.

 The management of should make provision for a bath so that clients

and staffs can use when they are press.


41

 For the interns who will like to do their internship in networking make

sure you own a laptop that will easy your learning and gives you maximum

usage of the software that you will come across.

5.2 Conclusion:
In conclusion the internship was a good and serious one. I learned so many things.

Some of the benefits I gain are as follows:

 It has enabled me to have a relevant working experience.

 It has assisted me enormously in relating classroom work and field work and

also how some of the mistakes made should be corrected.

 It has oriented me practically and has enlightened me on how to interact vis-à-

vis with work and colleagues. Hence it has increased my chances of picking a

job in the job market.

 It facilitated me in creating more contacts (new friends) and reunion with

classmates and friends we have departed for long.

The internship made me to gain a lot of experience.

During my stay in Speed-Net, I had so many experiences. This experience also

gave me some good lessons.


42

Negative Experienced.
 Most of the workers were always late for work.

 Male staffs always attend to female interns than male interns.

 Some staffs absent themselves from work.

Positive Experienced.
 I had the opportunity to work with computer Network engineers.

 I gained so many working experienced.

 I was able to manage and use very complicated software for configuring

networks.

 I had the chance to actually touch, see, feel and use the various network

devices.
43

REFERENCES:

1- www.speed-net.cm, Brief history of speed-net, July 23th 2016, 11:00am.

2- www.google.com(wikipedia), Network Devices, August 20th 2016.

3- http://searchnetworking.techtarget.com/definition/OSI, OSI (Open

Systems Inter connection), December 2nd 2016,

Time 2:46pm

4- J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down

Approach Featuring the Internet. 3th edition 2008

15- JEAN ANDREW, CompTIA A+, A guide to Managing and maintaining,

Troubleshooting, 5th Edition 2009.

6 www.tutorialspoint.com, "Understanding IP Addressing: Everything You

Ever Wanted to Know," White Paper, july 31st 2001.

7- http://wirelessconnect.eu, basic mikrotik router os configuration winbox,

August 15 2016.

8- www.tutorialspoint.com, "Introduction to Internet," Internetworking

Technology july 31st 2001.

9- www.tutorialspoint.com, computer fundamentals, March 09th 2018,

8:22pm.

10- http://www.binaryheartbeat.net, setting-up-mikrotik-hotspot, 09th march

2018.

Vous aimerez peut-être aussi