MTTTTTTTT
MTTTTTTTT
DECLARATION
This is to certify that the internship report entitled of Dilla University Information
Communication and Technology, prepared by the students listed below are accepted in terms of
quality & forms and the report has been prepared under my guidance. I also confirm that the
report is prepared based on the daily and monthly reports that we submitted.
Student Name Signature
1.Metekia Worku -------------------------
2.Salia Hussein -------------------------
3.Robel Alamrow -------------------------
4. Aynalem Gebabo -------------------------
This Report has been submitted for examination with my approval as a university advisor.
Project Advisor Signature
Melat T. ------------------------
`
ACKNOWLEDGEMENT
First and for most, we are extremely grateful to the DUICT, for giving us the opportunity to
carry out this internship, which is an integral part of the curriculum in Dilla University.
Secondly, we would like to express earnest gratitude and regards to our report advisor Mrs.
Melat in the Depart- ment of Electrical and Computer Engineering, for being the corner stone of
this report. It was her perpetual motivation and guidance during the period of doubts and
uncertainties that has helped us to carry on with this Report. Finally, we extend our gratefulness
to one and all that are directly or indirectly involved in the successful completion of this
Internships report work.
EXECUTIVE SUMMARY
This report introduces several new concepts and terms that will be used through the internship
program and practical application of Electrical & computer Engineering. The internship program
is mainly concerned in communication engineering to create productive, skilled and well-
educated generation. The report is an outcome of the practice that we conducted during the
internship period at Dilla University Information Communication Technology. This bring to us a
great opportunity to realize our theoretical knowledge by practical works, which we gained for
the last four years of study in Dilla University. The purpose of this report is to put in paper the
work experience that we had performed and the knowledge obtained from performing specific
tasks while working in a professional environment in this program. we developed theoretical
knowledge through practical work. This thing makes us to be active and confidential. This report
is divided in to different parts starting from briefly describing the background of Dilla University
Information Communication Technology, including its history, objective, vision, mission and
any others. While the other part is describing the overall internship experience, we had gained
during the practical periods, includ- ing the procedure used while preforming task. Finally, this
report includes the benefits that we gained from our internship program in terms of improving
practical skills, interpersonal commu- nication skills, team playing skills, leadership skills,
upgrading theoretical knowledge, work ethics and finalized by conclusions and recommendation
and quality.
Table of Contents
DECLARATION.................................................................................................................................................................i
ACKNOWLEDGEMENT..................................................................................................................................................ii
EXECUTIVE SUMMARY...............................................................................................................................................iii
LIST OF TABLES...........................................................................................................................................................vii
LIST OF FIGURES.........................................................................................................................................................viii
ABBREVIATIONS...........................................................................................................................................................ix
CHAPTER ONE...............................................................................................................................................................1
GENERAL DESCRIPTION OF THE ORGANIZATION..........................................................................................1
1.1 History......................................................................................................................................................................1
1.2 Mission.....................................................................................................................................................................1
1.3 Vision........................................................................................................................................................................1
1.4 Core values...............................................................................................................................................................2
1.5 The main service of DUICT.....................................................................................................................................2
1.6 Main customers and end user of DUICT..................................................................................................................2
CHAPTER TWO..............................................................................................................................................................6
INTERNSHIP EXPERIENCE........................................................................................................................................6
2.1 How did we get in to the company...........................................................................................................................6
2.2 Section of the company we have been working.......................................................................................................6
2.3 How does the workflow looks like in the company.................................................................................................6
2.4 Tasks we have been executing..................................................................................................................................7
2.4.1 Physical components of network.......................................................................................................................7
2.4.2 Network configuration and Installation.............................................................................................................9
2.5 What procedures we have been using while performing your work tasks.............................................................13
2.5.1 How to wire Ethernet cables............................................................................................................................13
2.5.2 Troubleshooting using CMD command..........................................................................................................14
2.5.3 Network Infrastructure Failure Re-installation................................................................................................14
2.5.4 What Function Can Get Form OTDR Device.................................................................................................16
2.6 How we are good in performing our task...............................................................................................................17
2.7 Problem encountered during internship..................................................................................................................17
LIST OF TABLES
Table 1. 1: Overall Organization Work Flow................................................................................................4
Table 2. 1: Color and wire function for UTP cable.....................................................................................10
LIST OF FIGURES
Figure 1 Firewall.........................................................................................................................................................................7
Figure 2 Cisco Router.................................................................................................................................................................7
Figure 3 Switches........................................................................................................................................................................8
Figure 4: UTP Cable...................................................................................................................................................................9
Figure 5 : RJ-45........................................................................................................................................................................11
Figure 6 : crimpers....................................................................................................................................................................12
Figure 7 : keystone jack............................................................................................................................................................12
Figure 8 : punch down tool.......................................................................................................................................................13
Figure 9 : Tester........................................................................................................................................................................13
Figure 10 : damaged network infrastructure.............................................................................................................................15
Figure 11 : fixing the damaged network infrastructure............................................................................................................16
Figure 12 : fixed network infrastructure...................................................................................................................................16
Figure 13 : OTDR Device.........................................................................................................................................................17
Figure 14 Denial of Service attack to a Mobile IP network.....................................................................................................34
Figure 15 IPSec Architecture....................................................................................................................................................41
Figure 16 - ESP in Transport Mode and Tunnel Mode............................................................................................................43
Figure 17 SecMIP tunneling.....................................................................................................................................................44
Figure 18 - Route Optimization in MIPv6................................................................................................................................45
ABBREVIATIONS
DUICT- Dilla University Information Communication and Technology
PC- Personal Computer
UTP- Unshielded Twisted Pair Cable
RJ-45- Register Jack-45
LAN- Local Area Network
WAN- Wide Area Network
CMD- Command Prompt
NOC- Network Operation Center
LED- Light Emitting Diode
OTDR- Optical Time Domain Reflectometer
DHCP- Dynamic Host Control Protocol
MAC- Media Access Control
IP- Internet Protocol
ECE- Electrical and computer
VoIP-Voice Over Internet Protocol
MbPs-Megabit per second
GbPs-Gigabyte per second
ACL- Access Control List
NAT- Network Address Translation
TTC-NTK-Teacher and Teaching College Network
WAP-Wireless Access Point
MAC- Media Access Control
E.C- Ethiopian Calendar
TCP- Transport Control Protocol
HTTP- Hyper Text Terminal protocol
NO- Number
CHAPTER ONE
GENERAL DESCRIPTION OF THE ORGANIZATION
1.1 History
Dilla University is the 1996’s Dilla College of Teachers’ Education and Health Sciences with
Faculty of Teachers’ Education and Faculty of Health Sciences. However, in 2001, the College
was included in the newly emerging University – Debub University. In 2004, Dilla College once
again went through another phase and sprung in to a full- fledged University by the councils of
minister’s regulation No 129/04 [1]. ICT center of Dilla University was established in 2006 as a
computer center, by deploying dialup connection, out-reaching management offices. Lack of
professionals characterizes the center, where instructors from mathematics and physics
departments were assigned to manage and coordinate the office. It was later in 2007 that an
optical fiber installation was activated, exploring almost all the buildings of the time. Despite the
launched developments, its functionality and perpetuity were obstructed for lack of
documentation to refer, and the temporary instability due to institutional partitioning from the
Debub University. Ever since its establishment, the center has been working closely with
different sections of the university to create awareness of ICT, giving training for some staff
members of the University, and most importantly to expand network and Internet facilities for
the University community. The office is currently established as an ICT Directorate office level
with one director four team leaders, 21 professionals and 8 technical supportive staffs [2].
1.2 Mission
Develop high-tech ICT infrastructure and provide superior quality services whereby the teaching,
learning, research, and administrative activities of the university are carried out by utilizing the
resources and services efficiently and effectively.
1.3 Vision
To become a dynamic Directorate of ICT Excellence center propelling Dilla University to
be one of top ten Universities of East Africa in 2013 EC.
Ensure that ICT is fully integrated into every operations of the University in order to speed
up and improve quality of activities of Dilla University.
ICT Directorate
Infrastructure and
Teaches and Support and Training and
Service Team
Learning Tech- Maintenance Consultancy
nologies Team
3 Teaching Newly Implemented Plan, implement and man- Work with the academic
and applications age E-learning and Digital departments for course
Learning Questions about the infrastructure. material preparation and
Technologie new system from uploading.
s Team user and ICT team. Create the technical in-
frastructure within cam-
puses, inter-campuses
and inter-universities
for video conferencing
and tele education.
CHAPTER TWO
INTERNSHIP EXPERIENCE
As a rule of school of Technology at Dilla University the student has the right to elect the place
for internship program. This internship program is set to enhance the practical education of the
student. In case we elect the best company that provides enough work. Since we have enough
information about DU ICT we have interested to be in this company. As a result, the institute
appreciates us to find the company nearby offering legal institutional requesting letter to host us
for required periods by assigning supervisors and making the necessary follow up.
2.2 Section of the company we have been working
Shown above DU ICT Directorate there is four teams and those work together for ICT
directorate with a different staff. From those teams we have joined the Infrastructure and
Services Team, which is Network installation, configuration, management and maintenance.
The main purpose we have been there in DU ICT is we were very interested to participate in the
Network installation of the companies’ project. Since the company provides the project to us, we
are assigned to perform in the Network Installation we worked with them for four months.
The main activity given to us in the company is designing and installing network. This network
is done for different areas in Dilla University. This network installation is done for DU offices.
This Network design was to interconnect the whole DU offices in Dilla University (Odaya’a).
Since we are two, after the whole description of the network. The main activity is designing,
installing of local area Network (LAN) for these DU community.
2.3 How does the workflow looks like in the company
DU ICT is the magnificent institution that provides inconvincible services for DU communities
the ICT DU is leaded by bureau of DU ICT directorate. These bureaus have different
professionals. These employees (professionals) are the accessories of this company.
DU ICT is created to developed country-based technologies. This ICT section facilitates the
utilization of computers to increase their productive activity and to avoid wastage of a time. This
section also gives basic computer skills how they use computers, maintaining computers,
automation
and how to transfer information from one section to another section by using networking. Most of the
staffs in this section are graduates in Computer Science and Information Technology.
2.4 Tasks we have been executing
In this company we have been executing many tasks.
We are executing two tasks: -
Physical components of network
Network configuration and Installation
2.4.1 Physical components of network
Network Device
A. Firewall is a network security system that monitors and controls incoming and outgoing net-
work traffic based on predetermined security rules. A firewall typically establishes a barrier
between a trusted internal network and untrusted external network, such as the Internet [3].
B. Router is a networking device that forwards data packets between computer networks. A
router is connects to two or more data lines from different IP networks [4].
Figure 1 Firewall
Switch is networking hardware that connects devices on a computer network by using packet
switching to receive and forward data to the destination device. A network switch is a multi- port
network bridge that uses MAC addresses to forward data at the data link layer (layer two) of the OSI
model. Some switches can also forward data at the network layer (layer three) by additionally
incorporating routing functionality [6].
C. Wireless Router is a device that performs the functions of a router also includes the func-
Figure 3access
tions of a wireless access point. It is used to provide Switches
to the internet or a private
com- puter network. Depending on the manufacture and model. It can function in a wired
local area network, in a wireless-only LAN, or in a mixed wired and wireless network [7].
Cables and connecters
Coaxial and twisted-pair cables use electrical signals over copper to transmit data.
Fiberoptic cables use light signals to transmit data. These cables differ in bandwidth, size,
and cost.
Two types of cables can be made: a straight-through cable and a crossover cable.
A straight-through cable is the most common cable type. The wiring scheme is the
same on both sides.
A crossover cable uses both wiring schemes. T568A on one end of the cable and
T568B on the other end of the same cable.
Fiber-optic cables are broadly classified into two types:
a) Single-mode fiber (SMF) - Uses lasers to send a single ray of light that can travel
hundreds of kilometers.
b) Multimode fiber (MMF) - Uses LEDs to send multiple light signals that can travel
up to 550 meters. Twisted-pair is the most popular type of cabling used in LANs
today.
2.4.2 Network configuration and Installation
In network configuration and installation, there are so many tasks been executed using the
following hardware and software devices: -
a) PUTTY Software:
we used this software to look the attached port number and it help as to configure
switches.
b) DRILLER:
we used this material to drill the wall in order to connect the trunk and node to
wall.
c) TRUNKING:
We used the material as both protection and organization of multiple running
cables. Due to health and safety reasons, cables should ways be kept tidy and
organized, a cable Trunking will achieve this by eliminating any possible
tripping hazards.
d) Cat-6 Cable:
We transmit data between different devices using cat-6 UTP cables. It data rate is
up to 10Gbps and data transmits up to 100M.
2. Orange 2. Orange
4. Blue 4. Blue
6. Green 6. Green
8. Brown 8. Brown
Figure 5 : RJ-45
f) CRIMPER:
Crimper is a device used to conjoin two pieces of metal by deforming one or
both in a way that causes them to hold each other.
We were used the crimper to make different standard Ethernet cable for DU staff
the purpose of internet service.
i) TESTER:
We did test cable a lot of times and it helps as to check the cable we make is
correct or not and length of the cable.
Figure 9 : Tester
2.5 What procedures we have been using while performing your work tasks
2.5.1 How to wire Ethernet cables
a. First, we prepared the necessary material that was useful for executing the task such as
Cuter, RJ-45, Tester, Crimper and Cable.
b. Asking the required Ethernet cable length was how long.
c. Then we cut the required cable (Cat-6) length from the cable box and striped off about 2
inches of the Ethernet cable sheath in both ends.
d. Untwist the paired thin cables then we aligned the colors according the given instruction
(crossover or straight through).
e. Trimmed all wires to the same length then we inserted the wires in to the RJ-45 plug- we
make sure because each wire is fully inserted to the front of the RJ-45 plug and in the
correct order.
f. The sheath of the Ethernet cable should extend into the plug by about 1/2” and it would
been held in place by the crimp.
g. We crimped the RJ-45 plug with the crimper tool.
h. At the other end side of the cable the same procedure would been followed and finally we
would test the cable was correct or not.
a. We would bound up with as all the necessary toolkits when we want to solve the problem
occurred on the DU offices.
b. Then we looked the problem or failure was from the end side of the user or from the net-
work distributed side (data center). If the problem was from the user side, we looked the
PC/computer settings.
c. We clicked the network connection icon then click on the “open network and sharing
cen- ter” => click on the Ethernet and “enable” the setting and click on the “properties”
and we check the IP version it should been on the “TCP/IPv4” and the click on the
“properties” and click on “obtain IP address assigned automatically”.
d. After that if the network not worked, we solved using CMD command
ipconfig /all
ipconfig /release
ipconfig /renew
Finally, the PC/computer restarted the network connection and it got the ip address automatically
(DHCP) from the core router then the computer states browse internet.
As shown in the figure below the network infrastructure was failed due to the re-new project in
the DU all buildings. Using the necessary toolkits such as cutter, crimper, RJ-45, Keystone,
puncher, Cat-6 cable, Tester and Trunk went to the office to fix the problems.
Figure
Figure2.1013: damagednetwork
: damaged networkinfrastructure
infrastructure
We saw how hardly damaged the cable and determined the enough length of cable used to
connect the broken-down wires inside the trunk. On the one side of the stumped wire were made
RJ- 45(male) at the same time made the keystone (female) to attach both on the one side of the
cable. We used to interconnect the cables which is broken. Soon afterward, we made the same
work but opposite in direction that means punched the keystone on the wire stumped at other
side of the wall and we make the RJ-45 on other side of the cable we used to inter connect the
wires with checking the labeling carefully.
the return pulses is measured and integrated as a function of time, and plotted as a function of
fiber length [9].
Practical attachment is used to give students practical exposal of work in different organization.
During this period student is expect to attend the work of the organization like any regular em-
ployee and perform any activities that the organization gives for him/her. The organization also
expected to make maximum effort to utilize the student’s knowledge and practical skill.
We are truly gratified that we had so many experiences from this internship program. At the time
of apparent, we had many unconquerable things for our future. Our Advisor was communicating
with us at any time about what to do and what to add on our task.
2.7 Problem encountered during internship
Everybody can face a challenge while performing any tasks so is it. We faced so many problems
that challenges our work but these difficulties did not stop us from executing our tasks. Among
many difficulties and measures taken, these are some of them: -
Interpersonal communication skill and Weather condition: On the first month of the
intern- ship time difficult to communicate inter personally with networking team staffs.
Because each person has its own personal behavior due to this it difficult to inter
communicate easily. In addition, as we know the weather condition in Dilla is hot mostly
in afternoon. Due to this challenge the workflow of our internship time is mismatched.
Shortage of chairs for internship students: for first time when we started the job there was
enough chairs however, after two months some students moved from the Main campus
ICT to Odaya campus ICT because of this shortage of chairs was on.
Shortage of network maintenance equipment: The abundance of network equipment is
used for making Ethernet cable, network maintenance and network installation are not
enough such as crimper, cutter, puncher, driller and etc.
Less awareness of DU staff on the network: These challenges caused when the staff does
not have well knowledge about how to use network and how to solve easy user side prob-
lems. As example, one day we went to the finance office to solve problem but when we
get there and we found cause then unplugged of network cable to motherboard.
should not unplug the patch cord, which connect the patch panel and layer two switch in
the rack. Moreover, we locked the unlocked racks.
This issue is concerned with the stole network device and computers. Such kind of chal-
lenges or problems are the major problems of Dilla University and higher officials of
DUICT solve it. Most of the time such problems happened at offices in the second floor
because those offices not secured because of their movable cornices. For this reason, the
thief can easily remove the cornices and steal the device. We try to solve this problem by
locking the unlocked racks and as an idea we inform they change their offices from
second floor to first floor or ground floor.
CHAPTER THREE
OVER ALL BENEFIT GAINED FROM INTERNSHIP PROGRAM
To handle information
To persuade people
We learnt that one full system should work efficiently with union of so many professionals by
collaborating with each other in order to make good and fantastic work. We were able to
improve how to communicate colleagues and we greatly understand that interpersonal skill is the
most val- uable quality in electrical engineering department. Finally, what we have observed
were to com- municate effectively, it is essential that you choose the suitable medium. Selecting
the right com- munication channel.
3.4.1 In what way did we develop our team playing skill in DUICT
Avoid internal politics and be loyal to the team.
Value interdependence as it is the most certain way of being a good team player and re-
members not to give up under dire circumstances but just to refocus on your thinking.
Get along with others and support them; recognize and accept their strengths,
weaknesses, and you can then wear the mantle of a good team player.
3.5 Leadership skills
Leadership means controlling or managing the overall activities of the institution or the pro-
ject. For example, the project manager controls the activities that are done at a given building.
Generally, leader ship is all about confidence, self-esteem, trust and professionalism to lead and
mange a given business or project.
In our internship period we have done some tasks which were related more of with leadership
and management. We were responsible to control and supervise some activity and this helps us
to develop our leadership skill. We have a good experience from our internship program in terms
of improving our leadership skill.
Material management: We have been practically able to see how networking materials are man-
aged in a way that is efficient and wastage reducing. Managing networking materials starts from
the time it is taken from the store to it is implemented in building.
Human labor management: We have seen how each worker was organized to execute its task.
Human labor management takes special attention among other resource managements, because
of human labors are dynamic.
The main Leadership qualities we have developed from this organization: -
Integrity
Honesty
Courage
Commitment
Passion
Confidence
Positivity
Wisdom
Determination
DILLA UNIVERSITY Page 27
INTERNSHIP REPORT ECE [2023]
Sensitivity.
Consider some of the following tips for how to become a better leader and think about ways that
you can implement these strategies in your daily life.
A. Learn More about Your Leadership Style
Understanding your current leadership style is essential. What are your strengths? Which areas
need some improvement? One way to start assessing your skills is to take this leadership style
quiz to get a general idea of how you lead. Once you have completed the quiz, read about the
major characteristics of your dominant style. Are these qualities helping or hindering your
leadership? Once you've determined which areas need some work, you can begin looking for
ways to improve your leadership abilities.
B. Encourage Creativity
Intellectual stimulation is one of the hallmarks of transformational leadership. Followers need to
be encouraged to express their creativity. Effective leaders should offer new challenges with
ample support to achieve these goals. One way to foster creativity is to offer challenges to group
mem- bers, making sure that the goals are within the grasp of their abilities. The purpose of this
type of exercise is to get people to stretch their limits, but to not become discouraged by barriers
to success.
C. Serve as a Role Model
Idealized influence is another of the four key components of transformational leadership. Trans-
formational leaders exemplify the behaviors and characteristics that they encourage in their fol-
lowers. They walk the walk and talk the talk. As a result, group members admire these leaders
and work to emulate these behaviors. If you want to become a better leader, work on modeling
the qualities that you would like to see in your team members.
D. Be Passionate
Would you look to someone for guidance and leadership if they did not truly care about the goals
of the group? Of course not! Great leaders are not just focused on getting group members to
finish tasks; they have a genuine passion and enthusiasm for the projects they work on. Start by
thinking of different ways that you can express your zeal. Let people know that you care about
their pro- gress. When one person shares something with the rest of the group, be sure to tell
them how much you appreciate such contributions.
without dwelling on the challenges that inevitably come up in any job. It is the enthusiastic em-
ployee who creates an environment of good will and who provides a positive role model for
others. A positive attitude is something that is most valued by supervisors and co-workers and
that also makes the job more pleasant and fun to go to each day.
3.6.4 Adaptability
Employers seek employees who are adaptable and maintain flexibility in completing tasks in an
ever-changing workplace. Being open to change and improvements provides an opportunity to
complete work assignments in a more efficient manner while offering additional benefits to the
corporation, the customer, and even the employee. While oftentimes employees complain that
changes in the workplace don’t make sense or makes their work harder, oftentimes these com-
plaints are due to a lack of flexibility.
Adaptability also means adapting to the personality and work habits of co-workers and
supervisors. Each person possesses their own set or strengths and adapting personal behaviors to
accommodate others is part of what it takes to work effectively as a team. By viewing change as
an opportunity to complete work assignments in a more efficient manner, adapting to change can
be a positive experience. New strategies, ideas, priorities, and work habits can foster a belief
among workers that management and staff are both committed to making the workplace a better
place to work.
3.6.5 Honesty and Integrity
Employers value employees who maintain a sense of honesty and integrity above all else. Good
relationships are built on trust. When working for an employer they want to know that they can
trust what you say and what you do. Successful businesses work to gain the trust of customers
and maintain the attitude that “the customer is always right”. It is the responsibility of each
person to use their own individual sense of moral and ethical behavior when working with and
serving others within the scope of their job.
3.7 Entrepreneurship skills
Entrepreneurship is a key driver of economic growth and job creation. It provides many
people career opportunities that better fit their preferences than waged employment. During
internship period some companies select some students and employ them after graduation.
After the completion of intern ship, we are more motivated to become a network administrator
and manage huge networks after graduation. Generally, intern ship give confidence to us “we can
do well a given work effectively and efficiently” after graduation.
In general internship is very essential for students to be having confidence in their field
of study and to effectively and efficiently carry their responsibility after graduation.
3.8Project on security issues with mobile IP
3.9 3.8.1 Abstract
With a rapid growth in wireless technology in recent years, Mobile IP has become very important
for consumers and businesses by providing mobility based on IP addresses using several
applications, which keep the employees connected with each others with critical information. In
mobile IP the node can change its location by maintaining the same IP address and keep connected
to the internet, which solves the issue of terminating the communication once it moves.
Since Mobile IP uses open airwaves as a transmission medium, it is subject to the many security
threats that are routed in mobile IP network .Protecting mobile IP from threats and attacks is one
of the most challenging task now days. IPSec is a standard security protocol solution for TCP/IP
network that provides security through Authentication, Encryption and data integrity services.
Mobile IP data traffic can be secured by combining with IP Security (IPSec) protocol.
Security is always important in any network communication, especially with mobile IP networks,
because mobile devices are using wireless communication that is less secure than a wired
network.
The problem investigated in this project is about the security issues with mobile IP, especially
due to using a registration system process and then forwarding the messages across an unsecured
network.
3.8.3 objective
What is Mobile IP ?
What are the common security threats that faced mobile IP networks?
What are the methods and suggestions to improve the security performance of Mobile IP?
What is IPSec?
What are the differences between MIPv4 and MIPv6?
The methodology of this project is theoretical investigation, by studying different articles and
comparing different approaches in how to combine IPSec with mobile IP to come up with the
best solution to secure mobile IP.
Our goal in this project is to achieve a good solution to secure mobile IP. In order to accomplish
this, it involves first hand analysis of the security issues that face mobile IP networks, the
operation of the mobile IP and find out which points the attackers might break through.
In the beginning, the internet was created as an Advanced Research Projects Agency Network
(ARPANET), it was essentially designed to share information between ARPA researchers. So it was
designed as an open and flexible network but not to be secure. When the internet was exposed to
the public, connecting millions of computers, it is inevitably subject to security threats such as
denial of service, replay attack and session hijacking. For this reason security technologies such as
cryptography, authentication and firewalls were developed to defend against the threats.
The known security threats can be classified in several types: denial of service, packet sniffing,
address impersonation and session hijacking [10].
Packet sniffing
Packet sniffing is computer software or computer hardware which connects to the network and
eavesdrops on the traffic. The sniffer captures the packets and tries to analyze and decode them
[10] Packet sniffing can be used in a good way, where it is used by the network administrator to
monitor the network and analyze the network traffic.
Information confidentiality is compromised if IP packets are caught in clear text. Many services
and protocols on the internet such as FTP, Telnet and POP send data in clear text (plain text).
The packet sniffer also can do what is called a replay attack where it replays the sniffed packets
to a computer at the same connection [11].
Denial Of service
In this type of attacks the attacker sends and floods a huge number of requests to the computer
server which causes an overload to the server. The server will not be accessible to the legitimate
users, so this makes the server no longer functional [12]. A new type of Denial of Service attacks
has been developed, known as Distributed Denial of Service (DDoS). In this attack the attacker
uses multiple computers to flood a huge number of requests. (DDoS) is hard to stop because the
attack is coming from a vast number of computers [12].
Address Impersonation
Impersonation attacks happen when the attacker can use some modifying tools to set any desired
IP address in the packet .Every host on the network has unique IP address which identifies it. In
the IP packet, two parts of information that must be in clear text, which are the source and
destination IP addresses.
Therefore the IP address is the identity in network layer for which no authentication is provided
for these network addresses [13].
Session Hijacking
The attacker gains unauthorized access to a session between two nodes and intercepts the packets
it between them where it usually flows in clear text. The attacker sniffs the packets and then it
can easily be altered and discarded. In the end the attacker can take over the whole session [13].
A various number of technologies have been developed to defend networks from security threats.
These technologies provide confidentiality, integrity and authentication. The classic technologies
are cryptography, key management, authentication, auditing and firewall. These technologies are
considered the basic blocks for the current security solutions.
Cryptography provides privacy and confidentiality to the information exchange by using
encryption. Encryption is the transformation of data from readable form (Plaintext) to unreadable
form (ciphertext). This process ensures privacy by keeping the information hidden to any
intruder. Decryption is the reverse process of encryption which is transforming back the
ciphertext to plaintext.
There are two methods of cryptosystems: symmetric and asymmetric. In symmetric
cryptosystems, one key (public key) is used to encrypt the data for example DES, 3DES, AES.
In asymmetric cryptosystems two key are used, one key is used to encrypt the data (public key)
and another one to decrypt the data (private key) for example RSA [14].
A symmetric key is usually used to encrypt messages while an asymmetric key is used for digital
DILLA UNIVERSITY Page 37
INTERNSHIP REPORT ECE [2023]
Authentication is the process of making sure that the message is coming from an authentic
source and going to an authentic destination.
Key Management
Key management is the process of managing the cryptographic keys. It includes the key
generation, key exchange and key distribution. Keys should be changed frequently to ensure
security.
The known key exchange algorithm that is usually used the Diffie-Hellman key algorithm which
allows two nodes to exchange a secret key over an insecure network.
Firewall
A firewall is either hardware or software that used to enforce access control policy between
networks. The firewall simply filters the incoming packets, where it rejects any unauthorized
packets. Another type provides proxy services, data verification and authenticates service
requests [15].
Auditing
Auditing is a mechanism used to log system activities. It has become an important technology in
network security. Intrusion detection system (IDS) is one of these technologies, IDS is software
or hardware device passively listens to the network traffic and when the IDS detects malicious
traffic, it sends an alert to the management station [16].
3.8.7 Mobile IP
IP routing is based on the IP address, which uniquely identities a node‟s point of attachment
to the internet [17]. When a device moves from its home network and enters a new network
(foreign network), it has to change its IP address and re-establish a new TCP connection. If
communication with this moving device occurs at that time, the communication has to be
disconnected until a new IP address of a moving device is obtained. To solve this mobility issue,
a working group within the Internet Engineering Task Force (IETF) proposed a solution, which
is called Mobile IP Protocol.
3.8.7.1 Introduction
Security is one of the most challenging tasks in mobile IP network. Mobile IP allows mobile
users to change their network attachment frequently without losing their connection, which gives
many advantages to users. However, the mobility of communication devices and characteristics
of the wireless channel introduce many security issues. Security issues for Mobile IP are
considered when the mobile device registers its care-of address to the home agent, this
registration messages requires an authentication. This chapter will introduce the common
security threats that face mobile IP networks as well as the method and suggestion to improve the
security performance of mobile IP.
3.8.8 Security issues with mobile IP
A Denial-of-Service Attack
A Denial-of-service attack (DoS) is raised up once the attackers prevent the authorized users from
getting their work done [18]. This kind of attack usually takes the following steps:
1. By sending a large number of requests over the internet. These many requests make the
target device to run below the optimum speeds till it become unavailable.
2. The other way is to intercept the communication between two devices on the network
directly. For example, attacker can use the techniques of redirection to make the data not
reach the authorized user.In the case of Mobile IP, the denial of service attack happens once
the attacker starts to manipulate the registration of a care of address for particular mobile device,
figure 4.1 illustrated Denial of Service‟s manipulated registrations. Such a manipulation of
registration leads to two issues:
In this kind of attack, the attacker generally needs to be in the middle between the two
corresponding hosts in order to cut off their traffic. With a Mobile IP network, the attacker can
attack the network from anywhere, if a mobile device is connected on the foreign network, it is
mandatory to use the registration method to inform its home agent of its current care-of address
to which home agent will intercept and tunnel all the traffic destined to the mobile device‟s
home address. So the attacker can generate a manipulated register request message declaring
with its own IP address as the care-of address for a mobile device to the home agent. So all
traffic transmitted to the Mobile device goes to the attacker instead.
In order to protect the Mobile network from this kind of attacks, strong authentications are
required in all registration traffic exchange by a mobile device and its home IP agent.
Authentication mechanism insures that that traffic is going to the mobile device that should
receive it, not anybody else. Mobile IP allows a mobile device and home agent to use and agree
with any authentication algorithms they agreed. However, all implementation of mobile IP
supports the default algorithm MD5 which can provide the strong authentication that is needed.
Passive Eavesdropping
The attacker in passive eavesdropping needs to access to the traffic in order this to happen; this
can happen in different ways. An attacker can get access to a network and connect a host to the
network. In case of a shared Ethernet, all traffic on the same segment may be a victim of
eavesdropping. Sometimes a thief is able to receive packets transmitted by radio signals if he is
close enough to the wireless network.
The best solution would be to use the end to end encryption method on all traffic, this makes
eavesdropping attacks impossible.
Reply Attack
Using Authentication, a mobile device can prevent the denial of service attack as we mentioned
in previous sections. However it cannot protect mobile devices from a reply attack, because the
attacker can have a copy of the valid registration request message, buffer it, and then reply it
later on by registering a manipulated care-of address for the mobile device.
To prevent this kind of attack, the mobile device has to generate a unique value for identification
As such, the stored registration request message by the attacker will be defined as out of date from
the respective home agent.
Mobile IP defines two ways to set identification field. The first one uses timestamp, where the
mobile device uses an estimate date and time of day in the identification field. The second method
uses a random number. In this method, the mobile device and home agent declare the value which
is entered in the identification field accordingly. A message will be rejected if either device receives
a registration message with identification field that not match the expected value and this message
will be ignored in the case of the mobile device.
Session Stealing
Session Stealing is a type of theft of information attacks the same as passive eavesdropping, but
in different steps:
The attacker waits for the mobile device to authenticate and register with its home agent
and starts application sessions.
The attacker eavesdrops on the mobile device to see if any interesting conversation traffic
comes through.
The attacker then floods the mobile device with malicious packets.
The attacker steals the session by intercepting the packet that is going to the mobile
device then the attacker send their own packets that appear to have come from the mobile
device.
The user of the mobile device might not notice that the session has been stolen because there is
no sign that something like this has happened. The protection against session stealing is the same
as passive eavesdropping by providing end to end encryption with authentication.
Tunnel Spoofing
The tunnel to the home network or foreign network may be used to hide malicious packets and get
them to pass through the firewall.As registration method is a key role of Mobile IP, Mobile IP has
some basic security solutions. Mobile IP requires authentication for registration methods between
the mobile device and the home agent. Moreover, Mobile IP uses identification fields and
timestamp to protect registration from any attacks.
Weak levels of security may be used between users in environment such as “campus”, since
these services are not high added value or not primarily of commercial nature. A protection
against manipulated attempts could be:
Home Agent assures the care-of address of mobile device is correct, because the allowed
care-of address relates to a well known IP address.
When a mobile device attaches to the foreign network, it sends a registration request with
password to the home agent.
The weak security approach that was discussed in the previous section is not suitable any more.
Both now have to agree on a stronger level of security policy where mobile IP authenticates any
binding message or authenticates information received about a mobile device. Trusted servers
and private and public keys are used, but they slow down the operation.
The main purpose of using tunneling techniques instead of source routing is that tunneling relates
to fewer security threats. Attacker can use a manipulated care-of address as a destination in a
loose source route. This will make the correspondent node reverse the source route and send the
message to the manipulated care of address. So the mobile device is disconnected from
communicating with his correspondent node. This issue can be solved by proper use of
authentication [19].
Avoiding Route Optimization:
When a mobile device is communicating with a correspondent node from a foreign network, all
its packets must be forwarded through its home agent, this is called triangle routing which can
results in significant degrading of performance.[20]Route optimization to mobile IP has been
recently proposed, allowing the home agent to inform the correspondent node with the mobile
device‟s care of address, thus correspondent node can communicate directly with mobile device
without passing the home agent, which results in less delay and resource consumption. However
the main issue with route optimization is security. A network administrator configures a secret
key to authenticate between the mobile device and its correspondent node, but with a large
numbers of mobile devices, it is not practical to configure keys between a mobile device and
every other correspondent node. In the case of triangle routing, it‟s conceivable to configure a
key between mobile device and its home agent.
Using Firewall:
A firewall is used to prevent unwanted access to network services. The firewall monitors the
traffic going through the network and decides on the basis of defined rules whether certain
packets are allowed through or not. In this way it tries to prevent unauthorized access. Typically,
a firewall can not prevent the exploitation of vulnerability in the network service if the
communication partner can access it . There are several kinds of firewall, mainly in the following
three categories:
Packet filtering: It is the oldest network filtering device, introduced on routers. The
simple filtering data packet uses the network addresses as basic function of the firewall.
It looks at each packet independently and compares it to a list of preconfigured rules. The
issue with packet filtering is that it is hard to configure correctly and they cannot keep
private IP address invisible to public IP addresses.
Stateful Inspection: This stateful filtering is an advanced form of packet filtering. It has
two main improvements over packet filtering, session table to track all connections and
recognition of dynamic application. This make statetful inspection better in protect the
internal network from unwanted external access.
Proxy filter: A proxy firewall is a firewall which is based dedicated proxy and circuit
level proxy recourse as filter modules. These filter modules implement rules by
deciding what data is transferred to the actual communication party. In this way it tries
to proxy firewall its own network (segment) to protect against unauthorized access, but
can also make a conversion of the data cache of certain content, and exercise all other
functions that are particular to a proxy.
In summary, we can say that firewalls provide good security and flexibility for mobile IP by
using the firewall categories described above.
IPSec (Internet Security protocol) is defined by IETF as a framework of open standards for
ensuring private communications over IP networks protected by the use of cryptographic security
services.
In the next chapter we will discuss in detail how IPSec works and what the issues does it handle
and how can it solve these problems.
The IPSec suite is an end-to-end security scheme working in the IP layer, used to provide privacy
and authentication services. IPSec suite provides security algorithms with general framework that
allows using the appropriate security algorithms for the communication. IPSec is widely used as a
means of secure communication through the internet [21].
IPsec developed by the Internet Engineering Task Force (IETF) to secure the packet exchange.
It contains three main protocols: the ESP Protocol, AH Protocol and the IKE Internet Key
Exchange, where they provide confidentiality, data origin Authentication, connectionless
Integrity to the communication [22]
Tunnel mode
In tunnel mode the whole IP packet is encrypted and protected, in this case the IP header is hidden because
the tunnel mode encapsulates it, a new IP header will be added to be forwarded. These IP addresses that
are inserted in new headers will be configured in the two end devices.
Tunnel can be used with either AH or ESP or both, and in tunnel mode an additional 20 bytes will be
added to the original packet (the new IP header) [25].
Transport mode
In this mode only the IP payload is encrypted, and the IP header is left without encryption
The disadvantage of this mode is that the source and destination addresses are visible and not protected
whereas the advantage is that a few bits are added to the packet. Transport mode can be used with ESP or
AH or both [25].
Torsten. B and Marc suggest that the idea is to design a new deployment architecture taking the best
features of the existing protocols. SecMIP is one of these designs, which stands for Secured Mobile IP.
This design is called screened-subnet firewall where the private network is isolated from the outside
network (internet) by a demilitarized zone (DMZ). The firewall between the DMZ and the private network
is the only entry to the private network [26].
This architecture simplifies the security management where all the traffic will pass through the firewall,
the home agent device is placed inside the private network and all mobile IP nodes must
be placed outside (in the DMZ).This provides privacy and protection to the internal network from attacks
coming from the internet.
The mobile IP node has to authenticate itself to the firewall and this authentication is done by the IPSec
protocol. This authentication can be configured with a shared secret or RSA keys. SecMIP uses IPSec
tunnel by protecting the mobile IP tunnel where it passes through the insecure outside network (Internet),
whereas inside the private network the tunnel is not important. SecMIP uses ISAKMP/Oakley and SKIP,
the two are used to provide security for key exchange [27].ISAKMP is preferred over the SKIP.
send the response to the mobile device. By using this feature, scalability and redundancy can be
provided to the network by keeping track of several home agents.
Security, Both Mipv6 and Mipv4 provide data security by using a Virtual Private Network (VPN)
solution. Once the mobile device travels outside its home network and connects to the foreign
network; Mipv4 uses IPSec v4 (Internet Protocol Security) and the VPN Solution. Mipv6 uses
IPSec v6 and the VPN solution.
Route Optimization, When the mobile device leaves its own network and connects to another
network , it gets a new care-of address and then informs the home agent of this address, then the
home agent records the new Care-of address in its binding table. MIPv6 has a direct routing packet
feature that routes between mobile device and the correspondent nodes that existed on the IPv6
network. All packets destined to the mobile device home address will be intercepted by the home
agent which then tunnels them to its Care-of address. In the case of MIPv4 traffic between
correspondent nodes and the mobile device must go through the home agent. In the case of MIPv6
the correspondent node caches the Care-of address by using route optimization MIPv6 and then
transfers
the packets directly to the mobile device as it shown in the figure 6.1 [28].
Mobile IP provides network mobility solution over the internet. This paper‟s study focus on the security
aspect in mobile IP and provides a lot of suggestions and methods to improve security in mobile IP. In this
report we firstly described wireless network security threats and security technology, we also investigated
mobile security threats and different security solutions that can be applied to Mobile IP with emphasis on
IPSec to provide the security solution for Mobile IP. Mobility feature and IPSec were not built on IPv4
protocol; they were designed as an extension to IPv4 standard. Mobile IP was an extension of the IPv4
standard under the name “Mobile IPv4” to support mobility.
IPSec manages connections and can guarantee both encryption and data integrity through protocols of
Authentication Header (AH), Encapsulated Security Payload (ESP) and Internet Key Exchange (IKE). The
powerful way to secure mobile IP is by combining it with IPSec protocol; even though there are some
limitations such as, IPSec does not stop traffic analysis and it use strong authentication for machines, not
users. These limitations can be studied in future work.
IPSec is not the only protocol that deal with securing mobile IP, there are several security protocols such as AAA
protocol (Authentication, Authorization and Accounting) and Public Key Infrastructure protocol that provide strong
management. With a combination of these protocols with IPSec, we get more security and protection for
mobile IP.
IPv6 was developed because the number of possible address entries in IPv4 is limited. In mobile IPv6, IPSec is a
mandatory feature that is required to provide data security and services for communication in IPv6 network. The
main difference between Mobile IPv4 and Mobile IPv6 is that Mobile IPv6 is not an add-on feature of IPv6, it is
built into the base of IPv6 which makes it more efficient and easier to implement. Mobile IPv6 introduces
different security threats that continue to get attention and should be studied in future work.
troubleshooting long or ten-fifteen minutes taken. Due to this time wasted for the other
works in DUICT.
Solution for such problem: in order to solve such type of problems remove the first
num- ber that are attached at end user node and rewrite by using parkers or reattach the
new identifier number that is matched to the number attached at the patch panel port
number. However, to solve this problem permeant the DU to reinstall the mismatched
ports. Be- cause it simplifies the workload and reduce the time wasted to, five-eight
minutes take to troubleshoot. This leads the workers to expend their time to work another.
Vlan Mismatch: this problem was happened in two causes. The first cause physical
config- uration process of network device like routers and switches. During configuration
time if the ad- minister mismatched the vlan, such problems are happened. In our
internship time such vlan mis- match problem is happened. As example, the access switch
at mechanical department in first floor student lab. The switch is in vlan 80 but the core
switch, which the fiber is connected, is in vlan 90, because of this vlan mismatch problem
is happened so we can’t access the internet through this switch. The other cause was
using the UTP cable from building to building for internet access but in this case if the
vlan in the first building is not allowed in the other building the vlan mismatch happened.
This causes the whole staff member in the building out of service, due to that the service
needed from that department cut or the teachers who uploads the students grade online is
impos- sible.
Solution:
(solution for example) in order to solve such problems, we reconfigured the switch by using computer through
console cable at vlan 90 which is matched to core switch. After reconfiguration we can access an internet. In
addition, when us- ing UTP cable for building to building connection to allow the vlan of the first building in the
other buildings by configuration.
Network device communication problems: this problem is encounter if we use the network device
that are manufactured in different companies. This means network devices that are pro- duced in
different companies are operating system are different, as a result cannot communicate easily with
each other and when first time connect each other takes time to read each other. As an example, if the
core switch at the ground floor, which support switch fiber port, is the manufacture of cisco and the
access switch in the first and second floor offices are the product of Alcatel and other companies, it
cannot easily communicate each other.
Broken fiber cables: Moreover, the other main problem was the broken fiber and use
of very long length UTP cable. The optical fiber cables, which installed underground
damaged or failed because of reconstruction process of the building in DU. Caused when
very heavy artillery cars moved over optical cable and excavating. This causes the
buildings to be out of any network service or access. Due to this, they used very long
length UTP cable such work would change network topology and it minimize the quality
of service.
Solution:
The primary solution is to fix the fiber cable. Detecting the broken fiber place is the first step using detecting
device, which called OTDR (Optical Time Domain Reflectometer). Then splicing the fiber by two methods, by
mechanical or by fusion methods and reuse it. From the two methods the fusion splice is the pre- ferred because
cost per splice is cheaper, lower insertion loss (less than 0.1 dB), lower reflectance, very high performance,
strong, reliable and weather proof joint.in general, it is cost-effective and time-effective. And the other solution
is, if the fiber broken harshly damaged between the data center and the building other method to be used. It is to
cascade or to split in to two from the fiber in the nearest building. All the above solutions are the primary method
because of the transfer rate is greater than other cable. If we see the differences the UTP cables used to
communicate building to building the theoretically maximum data transfer rate is 100 Mbps but if the fiber cable
fixed and used for transfer (communication) the theoretically maximum data transfer rate is 1Gbps.
This means the fiber cable 10 times faster than UTP cable or it transfer 1Gega byte data in a second but the UTP
cables needs 10 or greater seconds to transfer, time wasted and it reduces the quality of service.
Therefore, the fiber cables much preferred than using UTP cables due to speed, time and quality service.
CHAPTER FOUR
CONCLUSION AND RECOMMENDATION
4.1 Conclusions
DUICT is the network service provider for Dilla University communities and provide multi service for the
customers in the wired networks or wireless networks. It is still on the way to provide a much more quality of
service, secured, and fast service for users. Internship is the basic to be a competent for every student living in
this globalized world there is knowledge at every work com- pany the same as that of at universities. We got
more knowledge related to field from this company and the working behavior, in general as we already explained
it so far what we got from this in- ternship. It has been an ideal place and program to grasp experiences,
upgrading theoretical knowledge and practical skill and to widen perspective view during designing or technical
practi- cal activities. This program provides the opportunity to have relation with some intelligent person and
technician. In addition to that, it creates an opportunity to get the information about the indus- try-working
environment and related issues. The internship makes defiantly after graduation the ability of creating good
interpersonal communication skill with industry workers for better achievements of intentional goal. After going
through the whole period of internship, we have observed so many professional activities and learnt as well. This
internship was very fruitful to us because we had to cover many different fields. We have been working in
networking department, maintenance of the company, which concerns about making Ethernet cables, developing
a network infrastructure and maintenance of networking infrastructure for Dilla University communities. While
we perform troubleshooting and configuration tasks, we become familiar with devices like routers, switches,
software’s, crimper, cutter, tester etc. in general, we got our best practical skills from the company.
We get good communication skills from employees with their personality, creativity and management bodies.
In addition, we also learnt new concept and ways of working.
4.2 Recommendation
DUICT service provided mainly focus on the increasing the coverage of network for DU staff
(for office worker and for teachers) only. Due to this case, the students could not get access to
internet easily and they could not update their knowledge to the global. Therefore, as
recommendation the DUICT or the university to care about the students and as much as possible
they must provide wireless (Wi-Fi) access with fast connective in different locations of the
campus for example at Click Park, at front of Library and beside the coverage improving the
quality of service provided. Moreover, we recommended that to use sufficient and separate the
networking equipment like cutter, crimper, RJ-45, cables. This means that some DU departments
such as ECE and Computer Science are borrowing the equipment’s used for teaching purpose at
that time the DUICT network workers are out of work until the equipment’s retrieve. Therefore,
the company or DUICT to buy more network equipment’s and separate the equipment is used by
others or departments to buy their own materials.
References