0% found this document useful (0 votes)
62 views29 pages

Hunegnaw Mez 1

This document is a report on a practical internship conducted at the Bank of Abyssinia in Merawi, Amhara, Ethiopia. The intern helped with application support, network support, and cable management tasks. Key activities included fixing software issues, arranging and crimping cables, and punching cables into network nodes. The intern was unable to provide ATM support due to technical issues. The report describes the bank's structure and the intern's objectives. It also discusses data collection methods, challenges faced, and strengths and weaknesses observed at the bank.

Uploaded by

kidusbelete019
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views29 pages

Hunegnaw Mez 1

This document is a report on a practical internship conducted at the Bank of Abyssinia in Merawi, Amhara, Ethiopia. The intern helped with application support, network support, and cable management tasks. Key activities included fixing software issues, arranging and crimping cables, and punching cables into network nodes. The intern was unable to provide ATM support due to technical issues. The report describes the bank's structure and the intern's objectives. It also discusses data collection methods, challenges faced, and strengths and weaknesses observed at the bank.

Uploaded by

kidusbelete019
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

HARAMAYA UNIVERSITY

COLLEGE OF COMPUTING AN INFORMATICS

DEPARTMENT OF COMPUTER SCIENCE


Report on the practical attachment in COMPUTER SCIENCE

Prepared by

Name of the student: hunegnaw mezgebu

ID NO:1485/13

In campus Advisor: B ahar(Mcs.)

Organizatio n supervisor: L uel (Mcs.)

Report submitted to: computer science department

Date 25/2/2023
HARAMAYA UNIVERSITY

COLLAGE OF COMPUTING AND INFORMATICS

DEPARTMENT OF COMPUTER SCIENCE

Report on the Practical Attachment in COMPUTER SCIENCE

Prepared by:

Name of the student: Hunegnaw Mezgebu

ID. NO: 1485/13

Organization that hosted the student

Name: Bank Of Abyssinia

Region: Amhara

District: Merawi

Town: Merawi

The supervisor in the organization

Name: Luel(Mcs.)

Declaration

i
I therefore certify that all materials and data in this Practical attachment document are
obtained and presented in compliance with guidelines of computer science department.

I also declare that, this work entirely original and has never been presented or used by any other
departments

Student Name hunegnaw mezgebu

Signature __________________

Date ______________________

As an authorized Advisor, I have approved the submission of this Practical Attachment document.

Advisor Name_________________

Signature __________________

Date ______________________

Acknowledgement

First of all, I thank God that help me to take this internship and complete it successfully. Then the
hosting organization that help me to have this wonderful experience in their care the bank of Abyssinia.
And, I owe special debt of gratitude to my internship Coordinator Mr.Luel Amare, Department of branch
Support, constant support and guidance throughout the course of my work and other staff member.

ii
Lastly, we offer our regards and blessings to all of those who supported us in any respect during the
completion of the apparent ship project.

Abstract

This internship is conducted in order to have both the academic and the working environment
experience in 45 days of time that held at the bank of Abyssinia. In this report we will discover the
practical environment, the challenges, things I experienced and observed. And also, about
Bank Of Abyssinia. background history up to their strength and weakness. The method I used tocollect
data and how I conduct them into discussion and the form the result the gained some experience and
knowledge and at last but list the conclusion and recommendation.

iii
Abbreviation

ATM------------------------------------------------ Automated Teller Machine

EJ-------------------------------------------------- electronic journal

FDI -------------------------------------------------Fraudulent Device Inhibitor

FDK------------------------------------------------ Function Display Key

ICT-------------------------------------------------Information Communication Technology

iv
IMCRW--------------------------------------------Card Reader/Writer

IT---------------------------------------------------Information Technology

MEEI-----------------------------------------------Media Exit/Entry indicator

RJ-45---------------------------------------------- Registered jack

SWIFT--------------------------------------------Society for Worldwide Interbank Financial

Telecommunications

TACACS----------------------------------------- Terminal Access Controller Access-Control System

Triple A------------------------------------------- Authentication, Authorization, and Accounting

UTP------------------------------------------------ Unshielded Twisted Pair

UTP-----------------------------------------------Unshielded twisted pair cable

Table of Contents
CHAPTER ONE ...............................................................................................................................................
1
Introduction ..................................................................................................................................................
1
Background ...................................................................................................................................................
2
Vision .............................................................................................................................................................
2
Mission:- .......................................................................................................................................................
2

v
.............................................................................................
2
Organizational Structure of BOA ..................................................................................................................
3 Statement of the problem ............................................................................................................................
3
1.6 Tasks .......................................................................................................................................................
4
1.6.4 Networking support............................................................................................................................ 4
1.7 Task completed ...................................................................................................................................... 4
1.7.1 Application support ........................................................................................................................... 4
Application support is a section that mostly focuses on fixing the software in the bank's faulty
computers. ....................................................................................................................................................
4
1. 7.2Network support .................................................................................................................................. 4
1.7. 2.1Cable arranging,crimping and
punching,...................................................................................... 5
Crimping cable to RJ-45 ............................................................................................................................. 5
Punch UTP cable in to node ....................................................................................................................... 7
1.8. Task not completed
............................................................................................................................... 9
1. 8.1ATM support ........................................................................................................................................ 9
What are ATMs? .......................................................................................................................................... 9
Hardware Devices attached to the ATMs ................................................................................................ 10
fig: Using ping Command! ....................................................................................................................... 18
1.9 Objective of the Internship ................................................................................................................. 19
CHAPTER TWO..................................................................................................................................... 19
2.1 Method of Data Collection ............................................................................................................. 19
2.2 Method of problem analysis ........................................................................................................... 19
2.3 Difficulty in internship .................................................................................................................... 20
2.4 Strength and Weakness of boa ....................................................................................................... 20
2.4.1 Strength of the organization ........................................................................................................ 20

vi
2.4.2 Weakness of the organization ..................................................................................................... 20
CHAPTER THREE ............................................................................................................................ 21
3.1 RESULT ....................................................................................................................................... 21
3.3 Conclusion .....................................................................................................................................
21
3.4 Recommendation ......................................................................................................................... 22
3.4.1 For BOA .................................................................................................................................... 22
3.4.2 For Haramaya university college computing and informatics, Department of .................. 22

coputer science. ................................................................................................................................. 22

Table of figure

Figure 1 .........................................................................................................................................................
5
Figure 2 .........................................................................................................................................................
6
Figure 3 .........................................................................................................................................................
6
Figure 4 .........................................................................................................................................................
7
Figure 5 .........................................................................................................................................................
7
Figure 6 .........................................................................................................................................................
8
Figure 7 .........................................................................................................................................................
9 Figure 8 .......................................................................................................................................................
10

vii
Figure 9 .......................................................................................................................................................
14 Figure 10
..................................................................................................................................................... 16
Figure 11 .....................................................................................................................................................
16
Figure 12 .....................................................................................................................................................
18

viii
CHAPTER ONE

Introduction

This internship is needed to have an orientation to the world of work and the inclusion of work
integrated learning that is given by our university and held at the bank of Abyssinia
Department of Information Communication and Technology Support Unit. And covers 45
days of time learning and practicing numerous knowledge and skills about basic hardware
network installation that is distributing wired and wireless network, some basic computer
knowledge, and basic things about ATM machine form the ICT room to different branches of
bank of Abyssinia within the range of the district. Furthermore, I conclude the report with the
pros and cons of the organization as I was an intern.

1
Background

The Bank of Abyssinia (BOA) was open for business in 1996 with enthused initiation and
determination.The name Abyssinia resembles bravery and character which is the core attributes
of BOA. Motto of the bank is‘’ The Choice for All”.

Vision:-
To become the leading commercial bank in East Africa by the year 2030

Mission:-
Provide excellent financial services through competent, motivated employees and digital
technology in order to maximize value to all stakeholders.

1.3.3 Values of the organization customer


satisfaction

nship

Organizational Structure of BOA

2
Bank of Abissiniya

Function Based organozational Structure

Statement of the problem


One of the most important features of technical and vocational education and training(internship)
is its orientation towards the world of work and the inclusion of workintegrated learning. There
are several concerns being raised by the department and form those the major ones are the
problems faced when a branch is out of a service and also when the ATM machines are out of
service. This has become a problem worrying for the management staff and for the customer on
that particular branch. As the reason for the problems are many, this report intended to show the
encounter them and other things I have learn during the internship time.

1.6 Tasks
Before getting into the tasks that I have completed and not completed let us see what are the tasks
that are done (responsibility) of the computer science support unit.

1.6.4 Networking support


3
Network related supports are: -

• New branch opening


• Network expansion request
• Network wall outlet installation
• Network cable crimping and installation
• 3G/4G configuration
• New router configuration
• Existing router troubleshooting
• Switch configuration
• Triple A configuration
• TACACS+ configuration

1.7 Task completed


Form the above departments I have practical involved: -

1.7.1 Application support

Application support is a section that mostly focuses on fixing the software in the bank's faulty
computers.

Like,
• Formatting pcs
• Installing software
• Sharing printers
• New OS installation

1. 7.2Network support
Is responsible for network installation for newly opened branches and repairing network related
problems in the company.

And the tasks are: -

1.7.2.1Cable arranging,crimping and punching,

Crimping cable to RJ-45


4
We used UTP cables to connect devices to networking equipment such as routers or

switches. We crimped RJ45 cable in straight through and cross over arrangement.

Straight through cable arrangement

The color arrangement (code) of straight through cable to RJ-45must has the same cable

arrangement in two ends. We use this type of cable to connect different materials like pc to switch,
pc to router.

1) white-orange
2) orange
3) white-green
4) Blue
5) white-blue
6) Green
7) white-brown
8) brown

The steps of straight through cable color arranging and crimping diagrammatically as follow.

Step 1: we strip the cable jacket about some inches down from the end. Step 2:

we spread the four pairs of twisted wire apart

Figure 2 Step 2

Step 3: Untwist the wire pairs and neatly align them in the T568B orientation. Be sure not to
untwist them any farther down the cable than where the jacket begins; we want to leave as much
of the cable twisted as possible.

5
Figure 3 Step 3

Step 4: we cut the wires as straight carefully.

Step 5: we carefully insert the wires all the way into the modular connector, making sure that each
wire passes through the appropriate guides inside the connector.

Figure 4 Step 5

Step 6: we push the connector inside the crimping tool and squeeze the crimper Step 7:

we repeat steps 1-6 for the other end of the cable.

Step 8: To make sure we have successfully terminated each end of the cable, use a cable tester to
test each pin. When we are all done the connectors should look like this:

6
Figure 5 Step 8 Cross over cable arrangement

For crossover cable arrangement step 1 with step 3 and step 2 with step 6 in the list above. We
use this cable to connect the same device like switch to switch, pc to pc.

This gives:

1) white-green
2) green
3) white-orange
4) Blue
5) white-blue
6) Orange
7) white-brown
8) Brown

This code is for only one end of RJ45. The other end should be straight through arrangement.

Punch UTP cable in to node


Steps to punch down UTP cables in to node.

1. First we have included everything you will need to find the materials, tools and info on how to
terminate punch down jack.

Figure 10

2. We make sure the stripper is adjusted properly on a scrap piece of cable.

7
3. . Straighten the pairs out completely and lay them over the top of the module with the order of
the color pattern for wiring.

Figure 6 step3

4. Keeping the pairs as twisted as possible press the wire into the correct groove with our

thumbs.

5. Using a punch down tool punch the wires down into the blades built into the jack

8
.

Figure 12

Figure 8 Step 5

1.8 Task not completed


Form the above departments these tasks are tasks that I have observed but I did not get a chance
to practice it by a various reason for example not having a prior knowledge, because of time
constraint and so on.

1.8.1ATM support
Is in charge of physically or remotely administering the ATMs that are situated in the kolfe district.

What are ATMs?


Customers can carry out simple financial transactions using an automated teller machine (ATM),
an electronic banking facility, which allows customers to complete basic transactions without the
assistance of a branch representative or teller. Anybody with an ATM card can withdraw money
from any ATM.

Hardware Devices attached to the ATMs


• Media Exit/Entry indicator (MEEI): light indicators
• Card Reader/Writer (IMCRW)
• FDK (Function Display Key)
• Touch Screen o Electric journal
• Receipt Printer
• Card Capture Tray
• Cash acceptor
9
• Currency Cassettes
• Reject BIN
• Envelope Depository
• Cash Handler (Dispenser and Presenter)
• ATM Safe& Combination Lock
• FDI (Fraudulent Device Inhibitor)
• PC Core

Figure 13

Figure 9 parts of ATM

in the network model,we have all the elements visible to us at a time, so we can assign them IP addresses
easily, but the same Bob will be difficult to do on a group of computers, at different locations.

It becomes easy to make further changes in the network if is network model is available. He can have a
look on the settings and the implementations already done on it and so can modify it. the same Bob is
really hectic to be done on actual network and can result the introduction of errors in it.

network can be easily understood for its structure,characteristics and configuration from the network
model. In the absence of this, each network element will need to be visited at different locations and
checked for its configuration.

10
Any organi9ation first prepares anetwork model, before actual set up. "he main things like number of
departments, add number of computers in each department etc. are taken care of while preparing the
network model. after the network model is ready, the organization can easily estimate the cost required
to have such network, the type of network elements re8uired and the number of these, thereby avoiding
the wastage.

• Cabling:

different network elements needed to be connected by different types of cables. in actual, mistake can
be done while connecting different elements with wrong type of cables and on the wrong interfaces as
well. =at a network model provides the types of cables and the detail of interfaces on which they should
be connected, which helps a lot while its actual implementation.

Configiration of network:

A lot of computers, routers and switches connected together can7t be called a network. Configuration is
to be done on each network element that decides the Page

VLAN(Virtual Local Area Networks ACL(Access

Control List) both standard and extended ACL

implementation

DNS (Domain Name Space)

HTTP

DNS

DHCP server

Configuration of routers, switches, servers, access points and PC7s.


1ere in the figure, the complete model is shown which has been constructed in the proBect. Each part of
the organi9ation has been given a different background color andaccording to the configuration done on
it.

working of network. 'll that configuration is already done in the network model. It is easy to do the
configuration on the model itself than to do the same on the actual network first time. "his will cause a
lot of time waste and errors as well. When we have a network model, we can easily see the configuration
done in the model and can implement the same on the actual network. "his reduces the errors and saves
the time.

11
Routing protocols:

When ever a group of elements are connected in a network, a routing protocol must be used in order to
tell each network element the way or path to use for transmitting a packet from a particular source to the
destination. "he routing protocols are also implemented in a communication model much easily. "he
software used for the development of the proBect is cisco packet tracer whose opening window is shown
below in the figure. "his work area is used to prepare the network model. 1ere we can select the necessary
hardware needed to prepare the model and also can alter its properties such as, we can add interfaces to
the routers, wireless 4'N cards to the computers.

fig Cisco packet Tracer

before coming to the proBect, here are some main points that demonstrate the features of packet tracer,
which will be re8uired later to operate the proBect. When ever we place the cursor on the terminal, the
packet tracer shows its IP address allocated, gateway,and all other properties which are assigned to it
when it works within a network.Page

12
Figure 14

before coming to the proBect, here are some main points that demonstrate the features of packet tracer,
which will be re8uired later to operate the proBect. When ever we place the cursor on the terminal, the
packet tracer shows its IP address allocated, gateway,and all other properties which are assigned to it
when it works within a network

13
Figure 15

when ever any computer in the communication model is selected, packet tracer shows the
window, shown in the figure below. "his window basically shows the options that any computer
have.

e.g command prompt, option to allocate IP address etc. we can use any of the service to ensure
that the terminal connected is working correctly in the network

Below is the example given to check if one computer is communicating to another. "his is done
by using ping command in the command prompt. typing the keyword ping and then the IP
address shows the result. "he reply is shown from the address to which we wanted to
communicate, if they are connected in right manner, or not blocked explicitly, otherwise, failure
is shown

Figure 16

Figure 17
fig: Using ping Command!

14
1.8.2 Network support

Is responsible for network installation for newly opened branches and repairing network related

problems in the company.

The tasks that I observed are: -

• 3G/4G configuration

• New router configuration

• Existing router troubleshooting

• Switch configuration

• Triple A configuration

• TACACS+ configuration

1.9 Objective of the Internship


1.9.1 General objective

The general objective of the internship is to have the real world working experiences apart from
the academic knowledge.

1.9.2 Specific objective

• To have the communication skill that needed in the working environment.

• To know the professional behavior and knowledge

• To develop and learn new computer skills

• To get an opportunity to interact with stake holders and potential employers.

15
CHAPTER TWO
2.1 Method of Data Collection
To collect primary data the researcher will be used mainly two types of data collection methods.
The data was collected by questioning to the employees and unstructured interview for manager.
The questions were used to collected data from respondents that are permanent employees of the
organization. On the other hand, the secondary data will be collected by reviewing and observing
the company's manual, different documents and other written material. The data I was collected
were that within the district of CBE Kolfe what was the mandate of the IS Support.

2.2 Method of problem analysis


As discussed before the of having problem of like a branch and an ATM machine being out of
service is have been given a headache for both the stakeholders of the bank and the customer that
is mainly caused by two factors:

• Not having enough power or getting too much power

• Ethiotelecommnuication not being cooperative as much as needed

2.3 Difficulty in internship The


difficulties are:

• The working environment is not easy to adapt, some of the employees are too busy to

guide me about the activities they are doing.

• Transport and working overtime.

• And sometimes the Electric power is sometimes off for short or almost for a long time,

also network was a major problem to us.


16
2.4 Strength and Weakness of boa
The bank of Abyssinia is governmental organization that has its strength and weakness

side that speed up and retard the bank over all work process respectively.

2.4.1 Strength of the organization


• Strong corporation between management and employees

• By innovating new technology increase its profitability from time to time

• Good efficiency and ethical conduct of staffs

• The organization makes good relationship with other local banks

• It’s given training for its employees to improve their profession

• The bank has qualified and experienced management who done the activity of the bank
very well.

2.4.2 Weakness of the organization


• Some workers of the bank not give service to the customer properly does not take all

windows.

• Weak information and file management of some workers

• Sometimes there is big connection problem that makes customer angry

• There is some inefficiency material like chair tables and computers for only trailing
staffs.

• Some of the employees are playing and talking about betting at the work time

17
CHAPTER THREE

3.1 RESULT
This report conducted under boa district which has 71 branches and a total number of 111
ATM machines from which 86 NCR ATMs and 25 Diebold ATMs and about
60% of the calls for the IS support are concerned Application Support and
Maintenance Support. And about 25% are

concerned with Networking Support, also the other 15% is concerned with ATM Support.

3.2 Discussion

As the result shows that every day a cs support employee will face for the simple
computer problems like upgrading window to core like network being out of service
which will stop any service that the bank gives to his customers. and the reason behind
it is:

• The majority employee of BOA has a little or no computer knowledge (experiences).

• Not getting enough power or having a power fluctuation.

• Miscommunication between Ethiotelecom and BOA

When I was in application support and network support at first, my experience was simple
and very similar to what I had learned in class. However, once I moved on to maintenance
and ATM support, it became more difficult to identify and know what the hardware
components are because we hadn't learned about them.

3.3 Conclusion
This practical internship is conducted at Bank of Abyssinia specially at the IT support
bureau to know every working day of this bureau employees and how the theoretically
learned courses are applying the real world. In the internship period I have learned,
observed and practiced almost quite enough to know what skill should
I have to develop Problems Faced by the IT Support unit Application and
Maintenance Support Networking Support ATM Support 16 in the working

18
environment what kind of challenge to except and how to encounter them which is the main
purpose of this internship. And I mentioned the background history, mission, vision, show
the chart of BOA Activities that I observe and practiced and how I collect my data and
show them in pie chart.

3.4 Recommendation

3.4.1 For BOA • The banks should facilitate proper and continuous training courses for their
employees in so they can have basic computer knowledge beyond typing.

• Having enough number of IT professional in order to decrease the


workload.

• Rewarding the employees in order to motivate other in their working


environment.

• The continuous training and workshops are important to empower and


strengthen the capacity of employee

3.4.2 For Haramaya university college computing and informatics, Department of

coputer science.
• Create favorable practical program for students.

• And making the learning teaching interesting by creating rewarding environment


and having a practical session a lot.

• Inviting some successful mentors to the university to share their experiences.

19
Reference
• My observation • Official page of BOA https://www.bankofabyssinia.com

Bank of Abyssinia - EverybodyWiki Bios & Wiki

20

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy