Aparent
Aparent
Student’s 2 0 2 1
1
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Declaration
We are 4th year computer science(CS) and Information technology (IT) students have
undertaken our internship experience in CBE (commercial Bank of Ethiopia) In Debre
MarcosDistrictfor a period of two months (from October 01/02/2013 E.C – November
30/03/2013 E.C) under the guidance of Mr. AbebayehuTefera(Internship Program Mentor) and
Mr. Melkamu Alemayehu (company Supervisor). We certify that our work is original and
compiled according to the internship report writing guideline given by the Company.
Approved by:
2
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Acknowledgments
First of all, we would like to thank to almighty GOD. Second, would like to thank Bahir Dar
Institute of technology (BiT) that feeds us a knowledge that makes us to enjoy this chance. Next,
we thank to head officer of the Company Mr.Workiye Alemu allowing us to work in CBE
(Commercial Bank of Ethiopia) In Gondar District and also we would like to give special thanks
for companupervisor, Mr.Solomon Worku. Internship Program Mentor
Mr.AbebayehuTeferaalways give a support for in-depth discussions about various problems.
3
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Executive summary
In this report we are going to discuss the internship program that we were in the commercial
bank of Ethiopia for two months starting from October to November. The main purpose of this
report is to briefly describe what we have gotten in our practical attachment period. In this
period, the report is prepared based on the daily and weekly reports that they submitted.
And we have developed knowledge that we get before in the University by theoretical lessons in
network installation. The company uses Avid system for media communication we also see this
system how it is work and we are going to discuss in detail what we have seen in the data center
of this company. Generally, in this report we are going to discuss about Network installation and
the current system of the company or which is called Avid system that we were faced in this
organization.
4
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Lists of acronyms
CBE- Commercial bank of Ethiopia.
ATM- Automated teller machine.
POS- Point of sale.
RJ45-Register jack
ICT-information communication technology.
5
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Content
Lists of acronyms.....................................................................................................................................5
List of Figures...........................................................................................................................................8
CHAPTER ONE..............................................................................................................................................9
Introduction.............................................................................................................................................9
Vision.....................................................................................................................................................11
Mission..................................................................................................................................................11
Values....................................................................................................................................................11
Router....................................................................................................................................................14
Dynamic routing....................................................................................................................................15
Static routing.........................................................................................................................................15
Switch....................................................................................................................................................15
punch down...........................................................................................................................................16
UTP cable...............................................................................................................................................17
Cable Crimper........................................................................................................................................17
Cable Tester...........................................................................................................................................19
6
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Drill........................................................................................................................................................19
Cable Trunk............................................................................................................................................19
Rack.......................................................................................................................................................20
UPS........................................................................................................................................................20
Wall outlet.............................................................................................................................................21
Screw.....................................................................................................................................................21
Flshrue...................................................................................................................................................22
RJ45.......................................................................................................................................................22
CHAPTER TWO...........................................................................................................................................22
Troubleshooting RAM............................................................................................................................29
A hard disk drive is a sealed unit that a PC uses for nonvolatile data storage.......................................30
Conclusion.............................................................................................................................................33
7
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Recommendation..................................................................................................................................33
CHAPTER THREE........................................................................................................................................33
General objective..................................................................................................................................34
Specific objective...................................................................................................................................34
Methodology.........................................................................................................................................34
CHAPTER FOUR..........................................................................................................................................35
Conclusion.............................................................................................................................................35
References.............................................................................................................................................36
8
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
List of Figures
Figure 1 managed switch...........................................................................................................................16
Figure 2 punch down................................................................................................................................17
figure 3 UTP cable......................................................................................................................................17
Figure 4 Cable Crimper.............................................................................................................................19
Figure 5 Drilling machine...........................................................................................................................20
Figure 6 Trunk............................................................................................................................................20
Figure 7 Rack.............................................................................................................................................21
Figure 9 Wall outlet...................................................................................................................................21
Figure 10 Screw........................................................................................................................................22
Figure 11 Flshrue.......................................................................................................................................22
Figure 12 RJ45...........................................................................................................................................22
Figure 13 POS machine..............................................................................................................................25
Figure 14 ATM system...............................................................................................................................26
Figure 15 ATM cassette.............................................................................................................................27
9
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
CHAPTER ONE
Introduction
This topic covers the over view of our internship hosting company CBE (Commercial Bank of
Ethiopia) In Gondar District. It briefly discusses about our host company including its
establishment, background, vision, mission, values and product or service. The second section
shows our overall internship experience. Starting from how we have got from the company, it
includes all our interaction with the company, skills that we improved or upgraded and
problems. The third section focuses on our overall summary of the projects. This section
discusses. The last section contains our conclusion and recommendation.
As known Internship program give the students to apply their knowledge in real world
environments. At the same time, it helps us to develop useful skills to improve our knowledge
or ability and to perform it. In a better way at the real word job environments so based on its
aim we have conducted our intern program. This report describes our experiences as a 4th year
students in CBE (Commercial Bank of Ethiopia) In Gondar District which is located in Gondar
Bliko Keble 2. The Internship is part of the curriculum requirement for two months, from
October \1\2013 to November \30\2013 E.C. It generally describes the whole tasks we did in
our stay in the organization, the experience, benefits we got, the challenges faced & the
solution we were taken.
10
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Vision
To become a World-class commercial bank by the year 2025.
Mission
We are committed to best realize stakeholders’ needs through enhanced financial intermediation
globally and supporting national development priorities, by deploying highly motivated, skilled
and disciplined employees as well as state-of-the-art technology. We strongly believe that
winning the public confidence is the basis of our success.
Values
Corporate Citizenship
11
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
We value the importance of our role in national development endeavor and step-up for
commitment.
We abide by the law of Ethiopia and other countries in which we do business.
We care about society's welfare and the environment.
Customer Satisfaction
We are committed to offer quality service to our customers' and aspire to be branded with quality
in the minds of our customers and the general public.
Innovation
We encourage new ideas that can improve customers' experience and the Bank's performance.
Teamwork
We recognize the importance of teamwork for our success.we respect diversity of viewpoints.
Integrity
We understand that the sustainability of our business depends on our ability to maintain and
build up the public's confidence.
12
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
13
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
14
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
11. Screw
12. Flshrue
13. RJ45
Router
A router is a device that forwards data packets along networks. A router is connected to
at least two networks, commonly two LANs or WANs or a LAN and its ISP’s network.
Routers are located at gateways, the places where two or more networks connect.
There are two types of router those are Dynamic and Static router.
Dynamic routing
Is a networking technique that provides optimal data routing. Unlike static routing, dynamic
routing enables routers to select paths according to real-time logical network layout
changes.Dynamic routing uses multiple algorithms and protocols. The most popular are Routing
Information Protocol (RIP) and Open Shortest Path First (OSPF).Dynamic routing protocols
allow routers to share information about the network with other routers to allow them to select
the best path to reach a destination.
Static routing
Static routes are one way we can communicate to remote networks. In production networks,
static routes are mainly configured when routing from a particular network to a stubnetwork.
stub networks are networks that can only be accessed through one point or one interface.
15
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
▪ It causes minimal load in the CPU of the router & generates no traffic to the other
routers.
▪ It is suitable to configure on a small network.
One of the most significant advantages is its predictability. It means if you change the design and
layout of your system or suffer from network failure, then static routes don’t change.
Switch
We use Switches to connect numerous devices together on the same network.
Local area network (LAN) switches are used for controlling and directing the data
flow to networked resources, at the level of the access layer. A switch is
sometimes referred to as a network bridge.
Types of Switch:
punchdown
It is a small hand tool used by telecommunication and network technician. It used for
inserting wire into insulation displacement connectors on patch panel.
16
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
UTP cable
In our field practice we use UTP(unshielded twisted pair) cable used for transferring high
speed data communications and its data transfer rate is 10Gbps Ethernet speeds can be
reached without sacrificing the max cable length of 100 meters.
17
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Cable Crimper
It is a device used to conjoin two pieces of metal by deforming one or both of them in a way that
causes them to hold each other. It is used to peel cable cover and used to cut cable with equal
position. It is also used to add a connector to the end of a cable.
There are steps to crimp cable .
Step 4. Arrange the wires in a raw, placing them into the position, running from right to left.
Step 6. Insert the wires into the RJ-45 connector, making sure that they stay aligned and each
color goes into its appropriate channel.
18
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Step 7. Use the crimping tool to crimp the RJ-45 connector to the cable by pressing the jacket
and cable into the connector.
Step 8. Finally use cable tester that your cable is working properly when both ends are crimped.
Cable Tester
Cable tester is used to check whether the cable is working properly or not. It has light indicator if
the cable is works properly the whole numbers that are written on the tester are bright by order
otherwise it becomes dark if not.
Drill
It is machine is used to create holes on different objects. We have used this machine to create
hole on the wall and that holds the rack on the wall.
19
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Cable Trunk
It a device used holds UTP cable. The purpose of the trunk is preventing cables from any
damage.
Figure6 Trunk
Rack
A rack is a metal frame used to hold various hardware devices such as switches, fiber optics
patch panel, cable and other electronic equipment. Network furniture that can be attached
vertically, stacked on top of one another. Or it is a container that contains router, switch, server
and UPS devices.
20
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Figure 7 Rack
UPS
Uninterruptible power supply (UPS) is a type of power supply system that contains a battery to
maintain power to provide power to electronics in the event of a power surge or outage.
Wall outlet
It is Intermediate connector between two devices.
21
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Figure9 Screw
Flshrue
Flshrues are used to cover the screw and to prevent hole of the wall.
Figure10Flshrue
RJ45
RJ45 (A register jack (RJ)): is a standardized physical network interface for connecting
telecommunications or data equipment. "45” refer to the number of the interface standard. Each
RJ45 connector has eight pins. Ethernet cable has eight wires with eight different colors. Each
pins of RJ45 must be match with each colors of Ethernet cable to transfer data.
Figure11 RJ45
22
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
CHAPTER TWO
23
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
We have to gained full confidence to make different activities & also the main things in every
activities means to achieve a goal we understand that every person respect others and made
different questions legally and respects method smoothly
Generally we were experience’s the following aspects
Understand the constraints of working life and functional
relationship within and between organizations.
Develop work attitude like self confidence
Be oriented toward work proses
The most difficult challenge when we are stay in the CBE is time.
because breaking time of the organization is only 1 hour shortage of
internship month.
24
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Arrange wires
2. POS machine
A point of sale terminal (POS terminal) is an electronic device used to process card payments at
retail location.
A POS terminal generally does the following: reads the information off a customer’s credit or
debit card.
We use modem profile application for checking whether the machine is working properly or not.
If the machine is working we also check the version of the machine and install the new version.
3. ATM system
We have control the ATM system that included by the Gonder district. And now commonly 4
cases happen on the machine.
Case1. Cash related issue:-It is the problem that occurs when shortage of money in the ATM.
Case2. Dispenser: It the hard ware problem
Case3. In replacement:-It is the problem that occurs when the ATM in repair.
25
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Case4. Network (Los of communication):-It is the problem that occurs when less connection or
slow power.
If there is any case happens on the ATM machine we use phones for calling the ATM machine
located branch.
And we also know the ATM machine has 4 cassettes and the cassette must be configuring before
inserting birr in to the machine and the machine check the cassette is working depend on the
cassette configured.
26
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
27
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
28
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
29
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Troubleshooting RAM
The RAM is in essence the active workspace of the computer, in which your programs run and
your content is created.
If your system’s RAM is not working correctly, then you will likely see one of several symptoms
when using your computer.
Random Application Crashes: If programs randomly quit unexpectedly, and the
generated crash report shows different potential reasons for the crash, this may indicate
bad memory.
Random Pauses
Data corruption
Computer cannot boot
Computer restarts randomly
Attempts to install a new program repeatedly fail for unknown reasons.
If the computer shows Random access memory faulty symptoms we solved by replacing the
RAM.
A hard disk drive is a sealed unit that a PC uses for nonvolatile data storage.
30
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
31
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Everything we used to think about leadership is changed in this internship period. we have
noticed that leadership needs many skills. During the time of internship period we have
improved the Following leadership skill
Self Esteem
we used to make someone feel important; we gain their willingness to work .By:
• Asking their advice
• Show reverence for a person's knowledge by repeating a statement of theirs that
will reflect positively on them.
Become a Good Listener-we stay alert in our posture and in our facial expression.
we try to avoid distractions.
Being waiting until the person finished expressing his/her idea
Planning
Through planning, we decide a course of action to achieve goals and accomplish objectives.
Planning prepares us for how to perform in the event certain things happen.
Motivating
Our team members at all levels must feel they are needed. we cannot motivate our team
members if they do not feel essential to the process and our plan.
Disciplining -The better we know an individual, the better job we can do of disciplining
him. With some people, we necessitate to be compact, or even challenging.
32
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
Conclusion
CBE plays a vital role in the economic development of a country. They accumulate the idle
savings of the people and make them available for investment. It also create new demand
deposits in the process of granting loans and purchasing investment securities. They facilitate
trade both inside and outside the country by accepting deposits, making business loans, and
offering basic investment products.
Recommendation
We recommend for CBE as follows:
To change the working system not comfort for customers.
Expand asset and deposit of CBE.
Since profit and loan advance is less significant to growth, the bank better improve its
profit and loan and advancement.
33
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
CHAPTERTHREE
34
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
General objective
The general objective of the project is to analyze the role of CBE towards the development of
Ethiopian company.
Specific objective
To study the role of CBE profitability, asset loan and advancement, deposit, investment,
reserve and capital on the Ethiopian company.
To assess the long run relationship between role played by CBE on the Ethiopia economy.
Methodology
Interviewing: - we collect data from workers about the problem faced during
their work. (I.e. also, we can collect data through interview from agency
worker).
35
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
CHAPTERFOUR
Conclusion
We also use this most reliable fact finding technique when faller happens on computer hardware
or software and in network installation and when there is new network installation.
During two month internship period we tried to see how to know maintenance problem of RAM,
HDD and PS and we learned how to fix such related problems and how to check the pose
machine and insert the cash into ATM machine.
In addition to this we see how to design physical network by using CISCO networking
equipment’s such as switch, router, rack, trunk, UTP cable, wall outlet, etc…
36
4th Year computer science and information technology M a y 1 3 ,
Student’s 2 0 2 1
References
1. ^"Commercial Bank of Ethiopia Profile 2014/15". Archived from the original on 31 December 2014.
2. https://en.wikipedia.org/wiki/Commercial_Bank_of_Ethiopia
3. Internet access
4. www.google.com
5. www.CBE.com.et
6. https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/how-
to-set-up-router.html
37