Internship ET TBE
Internship ET TBE
INSTITUTE OF TECHOLOGY
Communication Stream
Internship Report
Prepared by:
2016 E.C
Gondar, Ethiopia
Declaration of the Internship
We are 5th year electrical engineering students that have undertaken our internship experience
leading program in Ethio-Telecom from July 15 to September 11 in 2023 G.C under the
guidance of Mrs. Fikrete B. (academic mentors) and Mr. Berhanu and Mrs. Silenat (Company
Advisors). We certify that our work is made to be original according to the internship report
writing guideline given by the university industry linkage office of the institute. We declare that
this report is our original work and all sources and materials used for the purpose have been
properly acknowledged. And we would like to assure with our signature.
I would like to thank my advisor Mrs. Fikrete my academic advisor for the warm support and
technical advices she gave me. I also want to express sincere gratitude to the whole NOSM team
especially to Mr. Berhanu and Mrs. Silenat my supervisors at Ethio-telecom for their warm and
welcome support. They have been a great mentor by showing us the way and correcting our
mistakes all the way to end.
The primary objective of the internship was to monitor the broadband internet network and
ensure its uninterrupted operation. Throughout the internship, collaboration with the FAN team
was crucial in resolving network issues. When encountering down links, timely reporting to the
FAN team allowed for swift on-site investigation and resolution. This collaborative approach
ensured minimal downtime and enhanced the overall quality of the broadband internet service.
The project and internship report highlights the significance of effective network monitoring and
troubleshooting in maintaining a robust broadband internet network. It also emphasizes the
importance of implementing modern communication solutions, such as VoIP telephony
networks, to optimize internal communication within an organization.
Figure 2.4: Redundant connection of Edge Layer, Core Switch Layer and Access Layer 12
BB Broadband
CS Core Switch
DoS Denial-of-Service
ER Edge Router
PT Packet Tracer
In that particular period, Ethio telecom had been renamed and restructured through different
stages.
First, the management of the service was under the Imperial Court of Menelik II in the
name of the “CENTRAL ADMINISTRATION OF TELEPHONE AND TELEGRAPH
SYSTEM OF ETHIOPIA” from 1890 up to 1907. Mr. Stevenin, a French citizen, was
appointed as the General Manager of the service.
The service was renamed as “THE CENTRAL OFFICE OF POST, TELEGRAPH AND
TELEPHONE (PTT) SYSTEM OF ETHIOPIA” since 1907-1909. It was administered by
Emperor Menilik II’s Advisor, Mr. Al Fred Ilg, a Swiss man.
Then the service was renamed as “MINISTRY OF POST, TELEGRAPH AND
TELEPHONE (PT and T)” in 1910. First, it was administered by Mr. Leo Shafno, a
French citizen and then replaced by the first Ethiopian administrators Lij Gizaw Bezabih,
Lij Beyene Yimer and their successors consecutively.
After the independence from the Italian occupation, the re-established Ministry of PT and T took
over the running of Telephone, Telegraph and Radio communications. It, therefore, rehabilitated
the network of the whole country.
The main purpose of the Board, as stated in its establishment charter of article 5 was “to
rehabilitate, extend, repair and maintain the telecommunication facilities of Ethiopia and to
engage in the business of telecommunication for profit.”
Under the Dergue regime, the Ethiopian telecommunications was renamed as follows:
At this period, the telecommunication services had made a major change of technology ranging
from Automatic to Digital technology.
The telecommunications sector was restructured and two separate independent entities namely
the Ethiopian Telecommunications Authority (ETA) and the Ethiopian Telecommunications
Corporation (ETC) were established by Proclamation No. 49/1996 on November 1996.
In late 2006, the ETC signed an agreement worth US$1.5 billion with
three Chinese companies, ZTE Corporation, Huawei Technologies and the Chinese International
Telecommunication Construction Corporation, to upgrade and expand Ethiopian
telecommunications services. This agreement will increase the number of mobile services from
1.5 million to 7 million, land line telephone services from 1 million to 4 million, and expansion
of the fiber optic network, from the present 4,000 kilometers to 10,000 by 2010. It is part of a
larger US$2.4 billion plan by the Ethiopian government to improve the country's
telecommunications infrastructure.
In 2018, the mobile service business has reached 85% of the country. In February 2018, it was
reported that Ethio telecom had 64.4 million subscribers making it the largest telecommunication
services operator in the continent. The operator runs three terrestrial fiber optic cables with a
capacity of 42 Gbit/s to connect Ethiopia to the rest of the world via Kenya, Djibouti and
Sudan. In August 2019, the company announced that it will install 4G network before other
telecom companies enter the Ethiopian market since the government decided that it will
liberalize the telecom sector.
In May 2021, Ethio telecom launched Telebirr, a mobile service platform. Frehiwot said 21.8
million users signed up with this service, making total transaction of 30.3 birr. On 10 May 2022,
Ethio telecom commenced 5G network for pre-commercial sale in partnership of Huawei
Technology after several months upgrading the predecessor 4G network.
As the major provider of telecommunications services in Ethiopia, Ethio Telecom offers a wide
range of products and services including voice services, data communications, Internet Protocol
television (IPTV), multimedia messaging service (MMS) and content delivery solutions. In
addition to these services, they also offer value-added services such as video conferencing, audio
conferencing and wireless access.
1. Mobile services: Ethio-Telecom offers 2G, 3G, 4G and 5G mobile services in Addis Ababa
city, as well as prepaid and postpaid plans.
Mobile service includes mobile roaming, satellite mobile, GOTA service, business mobile,
machine to machine, Vanity number, Voice, GPRS and SMS new package and hybrid
business mobile
a. Mobile roaming is a service that helps subscribers automatically to make and receive
voice calls, send and receive data, or access other services when travelling outside the
geographical coverage area of Ethio Telecom, by means of using a visited country’s
operator’s network.
b. Satellite Mobile telephone provides similar features of communication services to that
of earthly mobile telephones such as; voice, SMS and low-band width internet access.
It is vital communication tool in remote area and this kind of service needs special
telephone apparatus and SIM
c. Packaged services are a service that could be provided in the form of voice off pick
package, GPRS package and SMS package.
d. Vanity numbers are Mobile numbers which are memorable and easy to dial. Vanity
numbers are classified into four categories based on their easiness to remember.
These are:
Platinum numbers: 0911111111, 0922222222, 0933333333 …
Gold numbers: 0911121314, 0915161718 ….
Silver numbers: 0912345678, 0901234567 ….
Bronze numbers: 0912331233, 0911121112 …….
The tele birr digital financial services namely tele birr sanduq, tele birr Mela and Endekise
were launched in partnership with Dashen Bank in August 2022 to ensure access to financial
services and promote financial inclusion.
Fixed wired broadband internet is a high speed internet service provided through copper or
fiber with different access speed options starting from 3 Mbps. The payment is on fixed
monthly basis irrespective of the volume of usage.
o The service enables you to reliably transfer data, video, and voice via satellite. The services are
availed through broadband.
o Offers connectivity for rural telecom, school net, Wereda-net, Agri-net, distance learning,
telemedicine, as well as a host of corporate and government Companies.
o Is mainly provided where the territorial network is not available or as a backup.
o Elastic Cloud Server (ECS): Elastic Cloud Server (ECS) provides secure, scalable, on-demand
compute resources, enabling you to flexibly deploy applications and workloads.
o Virtual Private Cloud (VPC) allows you to isolate online resources with virtual private
networks. VPC enables your cloud resources to securely communicate with each other, the
internet, and on-premises networks.
o Elastic Cloud Server (ECS) provides secure, scalable, on-demand compute resources, enabling
you to flexibly deploy applications and workloads.
o Bare Metal Server (BMS) provides dedicated physical servers in single-tenant environments.
It provides excellent computing performance and data security for core databases, key
application systems, and high performance computing. It also offers the high scalability of a
cloud-based service.
o And many other cloud and network services.
d. VPN SERVICE
Virtual Private Network (VPN) enables private and public institutions to connect their various
branches and to establish their own private networks. VPN enables you to share information
and activate all information technology systems inside your branches via fixed and mobile
options.
The service is available all over Ethiopia in areas covered by Ethio telecom terrestrial and
mobile network that support data services. Ethio telecom provides VPN services through:
Board of
Directors
Chief Executive
Officer
Chief Finance
Internal Audit
Officer
During 2014 Ethio-telecom total subscribers reached 72 Million achieving 98% of the
subscriber base target and an increase of 8% from the previous budget year. When seen in terms
of service types, Mobile voice subscribers reached 69.5 Million, Data and Internet users 33.9
Million, Fixed Services 853.6 K and Fixed Broadband subscribers reached 618.3K. Telecom
density has reached 66.8%. Among the 774 operators in the world, Ethio telecom is the
2nd largest in subscriber base in Africa and 21st in the world.
It’s through University of Gondar Industrial Linkage persistence we got permission from
Ministry of Education Ethiopia to take apprenticeship in Ethio Telecom for the summer. The first
two days was about division of work place. There were around 3 sections Network, Service
center and Operation and Maintenance. Most of Gondar Students who resided in Addis Ababa
got in Service Center which then also gets divided into Fixed Broadband Service and Wireless
service. Three of us were assigned at TPO section it’s found below Churchill Hotel, Addis
Ababa.
TPO Section works fixed broadband service of the whole country. It manages and troubleshoots
Down links or report to FAN who go outside and fix what seems to be the problem. In this
section there are around five divisions Financial, Service, International, Government, VIP (High
Class Customer). Financial Division monitors the networks of Banks, insurance companies and
such. Service Sector monitors different enterprise networks. High Class Customers pay extra for
ethio telecom to pay close attention to its networks if it’s down more than 24 hours ethio telecom
has to pay amercements.
Internet is a global network connecting millions of computers. The name itself, with the capital
‘I’, stands for ‘International Network’. The whole network is divided into several ASs, making it
easier to manage.
Note: AS Numbers 64512 - to - 65534 are reserved for private use purpose.
five cities. Each city deploys two sets of BR, full-meshed connection. This layer is
mainly responsible for service traffic forwarding and high capacity communication
facilities
• Core layer/deployed in 17 sites: This layer is mainly responsible for service traffic
forwarding, convergence and high capacity communication facilities.
• Edge layer/deployed in 25 sites: Provides information exchange b/n the access and
core network. Used for aggregation of core switches.
• CS Layer/ deployed in 84 sites (75 cities): The core switch layer's function is to
provide high-speed routing and aggregation of network traffic between different
network segments or subnets.
• Access layer is where broadband access devices and ethio telecom’s other networks
(GSM, CDMA, FL-NGN) are connected.
Figure 2.4: Redundant connection of Edge Router layer, Core Switch Layer and
Access Layer
Edge Router (ER): Is a router which is used to route each packet received from lower network
elements to its destination. This router in ET’s network is mainly being used to provide a VPN
service to enterprise customers. But for very few customers internet services are also delivered
with this router, instead of BRAS.
Broadband Remote Access Server (BRAS): Is a network element which has similar purpose as
ER, except here all customers are necessarily registered for internet service.
Core Switch (CS): Is another important network element which is mainly used to distribute links
to the lower network devices (such as MSAGs, DSLAMs, and the like). Customers can also be
directly connected to these devices with a fiber optic cable. This type of service is referred to as
‘Direct Fiber’. It is a network element which is used to define VLANs and QinQ.
QinQ, also known as VLAN stacking or double VLAN, is standardized by IEEE 802.1ad. It
encapsulated the VLAN tag with two layers (double tagging)—an inner tag of a private network
and an outer tag of the public network. As there are increasing users in networks, which require
large numbers of VLAN ID.
Multi-Service Access Gateways (MSAG): Is an access device which is mainly used for network
service distribution purpose. It supports services that can be provided with both optical fiber and
copper cables. This device is found outside ET’s compound located at different sites.
IP-DSLAM and Mini-DSLAM (Digital Subscriber Access Multiplexer): Are network devices
that are found inside ET’s compounds at different sites, which can connect multiple customers to
a high-speed digital communications channel using multiplexing techniques. Customers to be
connected to these devices are required to be near to ET’s compound at the area.
Optical Line Terminal (OLT): Is a device which mainly controls the information float across the
ODN (Optical Distribution Network), going both directions, while being located in a central
office.
Customer Premises Equipment (CPE): Is an access device, usually referred to as modem, located
at customer end for a purpose of connecting the local area network (LAN) to wide area network
(WAN).
It can be used to connect different Autonomous Systems (AS) within Ethiotelecom's network
infrastructure. An Autonomous System is a collection of IP networks that are under a common
administrative control. There are two types of BGPs:
ADSL is capable of providing up to 50 Mbps, and supports voice, video and data.
Digital - No type of communication is transferred in an analog method. All data is purely digital,
and only at the end, modulated to be carried over the line.
Subscriber Line - The data is carried over a single twisted pair copper loop to the subscriber
premises
It works by using a frequency splitter device to split a traditional voice telephone line into two
frequencies
Advantages:
Distance-sensitive
Slower upload speeds
Phone line required
GVDLC cards on MSAGs are used for this providing these services to different customers.
3. Direct Fiber
With GBIC Interface:
4. AiroNet
Designed to connect two or more networks, typically located in different buildings, wireless
bridges deliver high data rates and superior throughput for data-intensive, line-of-sight
applications.
The high-speed links between the wireless bridges deliver throughput at a very high speed for a
fraction of the cost, thus eliminating the need for expensive leased lines or difficult-to-install
fiber-optic cable
I was assigned to work in Service and production division. As I mentioned before it provides
network monitoring from small to big enterprises all over the country. For monitoring the
network we used different tools such as: Net Numen, Secure CRT, PRTG, and Z-Smart TTS. For
organizing the incoming data into readable and simple format we used Microsoft Excel. And for
communicating with FANs or other individuals in the company we used Microsoft Outlook.
Networks are first observed in PRTG software in this tool we could filter down links at specified
time. Then these data will be exported to Excel with necessary information like the MSAG
To troubleshoot a network there are different options. Most of the time the problem is in
Customer Premise Equipment the devise might be off, power may not be available, and the
customer may have turned off the ping access known as ICMP block. Ping is the main method
we use to check network reachability and measures round-trip time.
Step 2: then we identify the customer service PON port of the customer using the command
“show VLAN 1204” there multiple outputs for this command but what we are looking for is
similar to “gpon-onu_0/2/1:4:1”
i. Normal state
Solution: We restart the interface in configure terminal and if it’s still not working ONU
might be offline so it’s better to send case to FAN team to check fiber status.
If the test shows the line to be short we will check if the Customer Premise Equipment is
getting power or not.
If the line is open then the issue will be port problem. Otherwise the card itself is faulty.
CPE and port problem O&M Addis 1 and 2 FAN team at region
MSAG card problem O&M Addis 1 and 2 Core O&M Core team at region
team at zone
This internship has been a peek view of the reality in the world of Electrical Engineering
working condition and overall organizational hierarchy. We almost spend 4 years in theoretical
aspect of Engineering without any exposure to working areas of it. In this internship we got to
know what we should focus on for our future career which skills are important for working with
other people. And also important life advise from our supervisors that is “ Don’t dream about
getting a good job instead imagine how you can solve a problem and become entrepreneur.” We
are so grateful for the times we spent there as it was life changing experience.
In general, it is important to adhere to the rules and regulations established by the company and
refrain from complaining about workloads, tasks, or assignments that may arise in production,
utility, or office settings, especially when we possess strong work ethics and take responsibility
for our assigned tasks. We approached our responsibilities and work ethics with great dedication,
recognizing the importance of aligning them with our personal growth and professional
development.
3.2 Challenges
During this internship program we face many challenges some of them are:
The staff were too busy to show us detail operation of the company
We were not allowed to access the server that has the necessary software to monitor the
network.
4.1 Conclusion
The primary objective of my internship was to monitor the broadband internet network and
ensure smooth customer support. I actively participated in monitoring activities, which included
analyzing network performance, identifying down links, and implementing appropriate solutions
to solve the network issue or communicating the issue with Operations and Maintenance team.
During my internship, I had the opportunity to work with a team of experienced professionals
who provided guidance and support. Collaborating with network engineers and technicians
allowed me to witness firsthand the complexity and intricacies involved in managing a large-
scale telecommunications network.
I am grateful to the management and staff at EthioTelecom for their support and guidance
throughout my internship. The knowledge and experiences gained during this period will
undoubtedly shape my career path and contribute to my professional growth. I am confident that
the skills and insights acquired will enable me to make meaningful contributions to the
telecommunications industry and strive towards building a connected and digitally inclusive
future.
5.1 Introduction
In today's dynamic and interconnected world, the efficient and seamless operation of
telecommunications infrastructure is paramount for organizations to thrive. This is particularly
true for Ethiotelecom as it embarks on a groundbreaking networking project aimed at
revolutionizing its internal communication systems. The integration of Voice over Internet
Protocol (VoIP) telephony within the infrastructure presents an exciting opportunity to enhance
communication capabilities, improve accessibility, and streamline operations within the
Ethiotelecom building. This networking project seeks to not only modernize the
telecommunications framework but also foster a more agile and responsive environment.
This project focuses on one building of Ethiotelecom which is found around Churchil Road,
Piyassa Addis Ababa. This building has to be secure considering they monitor the whole
country’s broadband network. Since Ethiotelecom has a lot of branches around the country with
significant number of employees it needs to have a smooth and cost effective communication
with its own system. For this kind of problem the best solution currently is integrating VoIP
Telephony in to Ethiotelecom’s system.
Voice over Internet Protocol (VOIP) uses the Internet Protocol (IP) to transmit voice as packets
over an IP network. So VoIP can be achieved on any data network that uses IP, like the Internet,
Intranets and Local Area Networks (LAN). Here the voice signal is digitized, compressed and
converted to IP packets and then transmitted over the IP network. The VoIP systems can come in
different forms. Its basic structure is functionally similar to that of PSTN that allows it to
communicate with the second party at the other terminal of the connection which is either a VoIP
system or traditional analog telephone. [3]
Circuit switching is not the most preferred mechanism that is chosen by data networks. That is
because the speed of the internet connection would decrease by a great amount if it had to
maintain a continuous connection to the web page that is being viewed at any given time. So as
an alternative, data networks simply send and recover data as needed. Also, instead of choosing
to route the data over a dedicated channel, the packets of data flow through a hectic network that
consists of various possible routes.
In that case, contrary to circuit switching, packet switching mechanism is quite proficient. It
allows the course of packets through the least crowded and inexpensive lines and liberates the
two computers communicating with each other so that they are free to accept information from
other computers too.[5]
In packet switching, contrary to circuit switching each data knows the final destination address
and the intermediate path is decided by the routers. Data is processed at all intermediate nodes
5.3.1 Justification
Minimize the time wasted by employees due to limited access to traditional
telephones being occupied by others.
Mitigate expenses associated with outdated telephone technology usage.
Establish a robust and secure communication system to safeguard the building against
potential vulnerabilities.
[Amitabh Halder et.al] basically explains what is VoIP, what are its components and
requirements , what are it’s advantages and disadvantages and how can we implement it in our
system. To summarize the research idea: VoIP is a group of technologies for delivery of voice
communication and multimedia sessions over Internet Protocol networks such as Internet.
Instead of being transmitted over circuit switched network like Public Switched Telephone
Network PSTN the digital information is packetized and transmission occurs as IP packets over
packet switched network.[1]
According to this research necessity of IP phones is to save money, portability (it is available all
over the world), flexibility meaning you can just use your conventional phone and a VoIP
converter or VoIP telephone adapter, it is also multi-functional cause it can be used as
videoconferencing.
The project is done using simple network topology to show how it is configured so this simple
topology consists of IP-phone 7960, switch 2960 and router 2811. Although this is just enough to
demonstrate workings of VoIP but it is not sufficient design for any building as it lacks Firewall
or Access Control List in general it’s not secured and not redundant meaning there are multiple
one point failures which can be detrimental for enterprise building.
[Ifeagwu E.N et.al] describes a bit about workflow of VoIP like how it converts voice signal
which is analog into digital in the telephone before being compressed and encoded it into long
strings of IP packets for onward transmission over the underlying IP network to receiver. At
receiving end the received IP packets are reassembled in order before decompressing through
Digital to Analogue Converter to generate the initial signal transmitted.[3] The method this
project uses is simple and not sufficient for an actual building as it’s not redundant and secure.
It’s just Small Office Home Office project. The materials used are one router, switch and 3 IP
phones.
[Nusaiba Binte] describes in depth the workings of VoIP system ,its merits and demerits. The
strength of this research is it mentions how to guard oneself from VoIP risks like Spoofing and
SPIT (Spam over internet telephony). It lists many precautions against threats to mention some
of them: using updated antivirus, use strong password, use firewall at all the time and so on.[5]
The design is more complex than before projects it connects main office, branch office and data
center. It also uses DHCP, EIGRP, VLAN protocols. And WAN Protocol to connect the
branches and DTE Serial cables to connect the routers because of the distance between them.
Although the design looks redundant on the branch side there is still single point failure on the
main router. And despite the advice it gives on precautions against threats it didn’t use any
firewalls.
Use a network simulation software Cisco packet tracer for design and implementation
We have opted to implement this design in Packet Tracer software. Packet Tracer is a cross-
platform visual simulation tool designed by Cisco Systems that allows users to create network
topologies and imitate modern computer networks. Cisco packet tracer is network simulator
software; basically it is used for practicing labs. With the help of this tool we can build our own
network topology, and can practice different scenarios. Also we can use it for testing purpose.
Suppose, if we want to deploy any change in our production network, we can use packet tracer to
first test the required changes and if everything is working fine then we can deploy that changes
into production. Therefore we have opted to exhibit the project in Packet Tracer. For this we
have used Packet Tracer8.2.1
The Cisco Catalyst 2960-S and 2960 Series Switches are the leading Layer 2 edge, providing
improved ease of use, highly secure business operations, improved sustainability, and a
borderless network experience. The Cisco Catalyst 2960-S Series switches include new Cisco
Flex Stack switch stacking capability with 1 and 10 Gigabit connectivity, and Power over
A layer 3 switch, is a switch which can perform a layer 2 tasks like VLAN creation and also acts
as router which performs routing protocol, IP addressing, ACL assignment. We used a layer 3
switch for core layers and distribution layers.
Firewall 5506
It’s physical or software based service that is used to control incoming and outgoing traffic based
on some predefined set of rules and criteria's, it has three zones or areas having different security
levels, by default traffic flow from lower security level to higher level are blocked. The ASA
firewall will be placed between the core/distribution switches and the redundant Server farm
switches to secure any traffic flow between the server farms and the LAN users.
IP-Phone 7960
This is a model of IP phone used for making calls over an IP network, such as the internet. It's
commonly used in office environments and supports features like call forwarding, conference
calls, and voicemail.
These are Cisco router models used for routing data packets between computer networks. They
are often used in businesses to connect different parts of a network and to provide internet
access.
LAP-PT
This could refer to a Lightweight Access Point (LAP) in Packet Tracer, a network simulation
tool. Access points are used to connect wireless devices to a wired network, providing Wi-Fi
access.
Printer-PT
Printers in a network environment allow multiple users to print to a single device and often
support features like wireless printing and scanning.
Smartphone-PT
In the context of Packet Tracer, this would be a simulated smartphone device. Smartphones
today are essential for mobile communication, internet access, and running various applications.
It represents a standard desktop or laptop computer in Packet Tracer. PCs are used for a wide
range of tasks, including web browsing, email, and running various software applications.
WLC-2504
This stands for Wireless LAN Controller 2504, which is a device used to manage and control
wireless access points in a network. It helps in configuring and managing the wireless network
infrastructure.
Server-PT
In Packet Tracer, this would represent a simulated server. Servers are powerful computers that
provide resources like files, applications, and email services to other devices on the network.
1. Static Routing – Static routes are configured on gateway/core routers of each branch and in
main site, to route the traffic from inside network to another branch network. As the next hop (IP
of each branch network) is known this can be used. Since this is a small network using static
routes are simple and easy.
2. Default routing – This is configured on core routers to route the traffic from inside network to
ISP router for unknown traffic (towards internet)
3. Inter VLAN routing – Core routers are configured to route the traffic between different VLAN
in the network. The traffic will reach the core routers from core switch which are connected by
trunk link. All VLAN networks will be shown as directly connected routes in routing table (sub
interfaces are used)
DNS is configured in DNS server. All the hosts in this network are assumed to be connected to
domain. So, each hosts (workstations) have their unique domain name. So, inside users can use
the specific domain name to connect to each host remotely. But computers cannot understand the
name. It should be converted to numbers called IP address. So, DNS server maintains the map of
domain name of each host to its corresponding IP address. Thus, management and complexity of
network can be reduced.
There are 7 different VLANs created across this network. Each VLAN for different floor and
separate VLAN for wireless network in 4th and 3rd floor. This is to remove the uncontrolled
broadcast traffic reaching another network. VLAN also provides a layer of network security and
cost reduction option by logically separating hosts which is connected to the same switch (no
need for additional switches). Here each VLAN is assigned with different IP address subnet.
VTP (VLAN Trunking Protocol) is used here to manage VLANs and maintain consistency
throughout the network. VTP can manage the addition, renaming, deletion of VLANs from a
centralized point without manual intervention thus it reduces the overhead of network
administration.
ACL – Access control lists are used in firewall to filter traffic from outside, reaching the internal
network. This provides security from intruders and to avoid suspicious traffic entering the
network. [4]
Ping is a network utility used to test the reachability and round-trip time (RTT) of a network
device or host. It operates by sending Internet Control Message Protocol (ICMP) echo request
packets to the target device and waiting for an ICMP echo reply. By using ping, we can test the
connectivity and measure the response time between devices in the simulation. This helps
validate the network setup and ensures that the devices can communicate effectively.
DHCP
You can also validate the DHCP configuration by utilizing a PC and switching the network
interface from static to dynamic. When the PC requests an IP address from the DHCP server, it
should receive its own IP address from the IP pool if the configuration is accurate. This will lead
to a DHCP Successful message indicating successful DHCP operation.
IP Phone GUI
In Packet Tracer, we can use the graphical user interface (GUI) of a VoIP IP phone to verify its
configuration and test its functionality. We can visually inspect its configuration settings, check
its registration status, and perform various tests to ensure that it's working as expected in the
simulated network environment.
Portfast and BPDU Guard is configured on the interface in which they are configured
access port or on ports where end devices will be connected to. The commands are:
Spanning-tree portfast
interface <interface_name>
nameif <name>
Extended ACLs provide granular control over network traffic by filtering packets based
on source and destination IP addresses, protocols, ports, and other criteria. They allow or
deny specific types of traffic, helping to enforce network security policies and restrict
access to resources.
- Protection against Network Attacks: Extended ACLs can be used to block traffic
associated with known network attacks, such as Denial-of-Service (DoS) attacks, port
scanning, or malicious traffic patterns. By defining rules to deny such traffic at the
network perimeter, ACLs help protect the network infrastructure and mitigate potential
security risks.
Ping is a valuable network diagnostic tool used to verify connectivity and measure round-trip
time between devices. In our study, the successful ping results confirmed that the network
configuration was functioning correctly, allowing devices to communicate effectively.
5.8.1 Conclusion
In this network simulation project for EthioTelecom, a leading telecommunication provider
company, we have successfully designed and implemented a comprehensive network
infrastructure using a variety of devices.
The successful configuration and testing of DHCP, OSPF, extended ACLs, VoIP, VLANs, inter-
VLAN routing, EtherChannel, PortFast, and BPDU guard demonstrate the network's reliability,
scalability, and security. The simulation results, validated through ping testing and VoIP GUI,
indicate seamless connectivity, efficient resource utilization, and reliable communication across
the network.
The firewall and layer 3 switch play vital roles in network security and traffic management. The
configuration of extended access control lists (ACLs) and the implementation of security zones
ensure robust network security and control over traffic flow. Additionally, the layer 3 switch's
configuration of VLANs and inter-VLAN routing enables efficient communication between
different VLANs.
The Wireless LAN Controller (WLC) is responsible for managing and controlling the wireless
network infrastructure. The successful configuration and testing of the WLC guarantee reliable
wireless communication and seamless integration with other network components.
The server represents a critical component in the network, hosting various services and
applications. Its successful configuration and connectivity testing ensure the availability and
accessibility of network services, contributing to the smooth operation of the organization's
infrastructure.
Overall, this network simulation project for EthioTelecom showcases a well-designed and
functional network infrastructure. The successful implementation of various devices and
configurations ensures robust connectivity, secure data transmission, and efficient resource
management. This simulation provides a solid foundation for EthioTelecom to enhance its
telecommunication services and meet the evolving needs of its employees.
5.8.2 Recommendations
The first thing we recommend is using Softphones. A softphone, also known as a software phone
or VoIP client, is a software application that allows users to make voice and video calls over the
internet using a computer, smartphone, or tablet. Some of the benefits of softphone are:
Integration with Existing Systems: Softphones can integrate with existing phone systems, such as
Private Branch Exchange (PBX) or Session Initiation Protocol (SIP) servers, allowing businesses
to leverage their current infrastructure while benefiting from the features and cost savings
offered by softphones.
For future work on this project implement Quality of Service mechanisms to prioritize and
manage network traffic effectively. Assign appropriate QoS parameters to ensure voice and
video traffic (such as VoIP) receive higher priority and sufficient bandwidth, guaranteeing
optimal performance and call quality.