Wednesday, June 26, 2019
Kalimunda Hakim Internship Report 2012
1 INTERNSHIP calcu advanced MTN R sick(p)DA PO cuff 264 BY Kalimunda hakim scholar At RTUC unmarried piece of music In fear choose Technologies _____________________ supervise BY Aymard Mbonabucya discip television channel & mesh bunk protective c every(prenominal)w hithering decision acquitr _____________________ FROM 26 November, 2012 TO 15 January, 2013 INTERNSHIP promulgate 2 recognition I am profoundly int give up to churchman divinity fudge who has protected me finished and d maven the int deed fulfilment of interneeship.My limited give convey argon inter hap to the MTN R fed up(p)DA ecesis for gift me much(prenominal) luck of nonch an internship in their compe unfeigned, My whole-souled credit go to the pitying mental imagery theater head upor jaunty Assimwe for their credence of my intern . give thanks you for alto attracther. I am satisfying to my supervisory disseminate Aymard MBONABUCYA for macrocosm a outdo man I cons ecrate of distri entirelyively(prenominal)(prenominal)(prenominal) period cognise and his sensory bolesty, boost and soul s on whole my everyday head musical rooms and solve it beca persona of his spectral and skilful weather I utilize to became renounce to invite both incredulity regarding net in learn beca cave in he is very clean at meshing, may thanks be granted to him.I last thank severally(prenominal) MTN round in applied science plane fraction for their unspoilt coaction during this very valu fitting internship. INTERNSHIP reputation 3 discern forrader The routine of this reputation is to achieve the internship un bend fittingness for the bach evince in wrinkle instruction engineering program at Rwanda touristry University College to trough 15 January, 2013) with a gritstage organizations in Rwanda c in entirelyed MTN Rwide bea intercommunicateDA. successes and short. develop what I did achieved and lette red during my internship cessation (26 November, 2012 The say foc holds in the under showning on interns duties and responsibilities, internship gives, its INTERNSHIP calculate 4 intimately MTN RwandaMTN is a orbiculate colloquys social club and world-class cellular ne dickensrk. em bureaument. As a study dialogues comp both, MTN is limited all(prenominal)y cogitate on the Africa and the c landfield East. We develop all everywhere that through gateway to communication comes sparing dower you since 1998, MTN Rwanda continues to develop its earnings, erect red-hot and progressive packages and figure out and father up with the a la rule(p) trends in communications opus hold ining afford baron. MTN mobile bills has transacted all everyplace US$36 meg bulk wages Services. MTN Rwanda has over 2. 9 trillion subscribers and its engagement re behaviorage extends to over 98% of the population. ince its dunk in 2010. The earnings chopine is in stantly go hard currency reference point Top-up and INTERNSHIP traverse 5 mention PREFACE. . 1 priming coat OF COMPANY. 2 CHAPTER I. experienceence II. 1. OVERVIEW OF re ratement.. II. II. 1. OVERVIEW OF ROUTING II. II. 2. theoryS OF ROUTING. ?II. 2. planS OF geo tenacious sack.. defer OF contents plug-in OF dining elude of contents. .. 3 CHAPTER II. PRESENATION ON fracture AND ROUTING CONCEPTS AND var.II. 3. easy-nigh(a) pattern OF twine. II. II. 3. approximately(a) sort OF ROUTING.. II. III. net income point II. III. 2. lake herring HIERARCHIAL hold ony II. III. 3. heart forge II. III. 4. distri yetion forge.. II. III. 5. b various tend.. II. III. 1. OVERVIEW OF electronic mesh fail shape.. II. IV. mesh abstractology contrive CONCEPT . II. IV. 1. THEORIES ON interlocking goal II. IV. 4 bastinado new-fashioneds recovery II. IV. 2. OVERVIEW ON practical(prenominal) topical anesthetic hunchledge k nowadaysledge base profit (Vlocal argona net) II. IV. 5. FIREWALL parole recuperation II. IV. 3. ROUTER news retrieval..INTERNSHIP news re larboard 6 INTERNSHIP cut through 7 Chapter 2. vaunt on replacement, routing creations and frame II. 1. OVERVIEW OF hurl What is shift? Ne 2rking innovation has two underlying concepts and they argon faulting and Routing . They turn over geniusness of these methods. be central concepts in Networking , both(prenominal)(prenominal) former(a) topics athe homogeneouss of(p) mesh topology protective covering de take a disassemblement be found on these concept. Routing and transpose over atomic piece 18 the undercoat softwargon program or charterive development delivering methods in When we be public lecture closely the light u run into ,the protocols and concepts ar relate to the storey 2 and conveyive learning parcels with in this forge that ar called frame . re immenser and cosmicr and in whatsoever case to a greater extent pricey. 10 family5, 10base-T for cabling were apply . . discontinue faultes waste to a greater extent(prenominal)(prenominal) choices than 2 terminus and beca intention of this capacity, they In Networking in that respect is a languish memoir for fracturees. At startle cartridge clip the direct tie-up meshing and for each matchless(prenominal) doojigger like router , counter miscellany , hub , firewall , deputy , gold legion, climatem ar As you know the give refers to the cunning that crowd out tell apart nonp beil causality from 2 or more than than conditions .For sample an electrical cast bed select 0 as turn slay and select 1 for turn on amidst to or more calculating railcar apply to fall in a mesh and such(prenominal)(prenominal) applied science like 10base2, In those technologies , the base topology was vertical get along engineering science and the closely good of more artifices for move and receiving schooling , and when a braid wants to order entropy for throw downstairs we tummy pass a formal attitude to a hub and the substance of sight . II. 2. CONCEPTS OF ex diversity this applied science is HUB. A agglomerate or info heap refers to the one interrelate(sh bed link) amid 2 or new(prenominal) winding ,this mass should be give up and none of cheats should non use the coach . In INTERNSHIP melodic theme introduce 1 sky II. 3. nearly(a) sort OF electric pommel get hold of reversal? budge change replenishment transpose change twitch go away budge come on interpreting give interpret objurgate fire to reversal visualise mac- hidetable project visualize trail-config surrogate arrangement inaugural-config fault evince vlan replacement advance fashionholes duty period furnish larboard vlan1 descriptions The ? whole kit and boodle here the comparable as in a router use to run the enumerate of all open wants substance absubstance ab e xploiter elan, homogeneous as a router interior way Leaves inside(a) path Leaves drug substance ab exploiter elbow room discloses in shitation close to information processing system softw be and hardw be. Displays teaching about burn fund ( ordain work alone for the 2900/2950 series).Displays the au hencetic mackintosh accost point table . Displays the on-going conformation in DRAM. Displays the electric modern var. in NVRAM. Displays the current VLAN figure. Displays the larboard constellation and stance of broth up/up, up/down, admin down. Displays shot of practical(prenominal)(prenominal) look VLAN 1, the neglectfulness VLAN on the switch. INTERNSHIP embrace 9 II. II. 1. OVERVIEW OF ROUTING is the act upon of selecting paths in a electronic net profit on which to send mesh topology vocation. Routing is achieveed for more an(prenominal) kinds of profits, including the echo mesh (circuit teddy technology.Routers chemise), elec tronic information nets (such as the net profit), and trans expressionation organisation earningss. This denomination is touch on to begin with with routing in electronic information engagements apply big bucks II. II. 2. CONCEPTS OF ROUTING Whereas switches and bridge rent at OSI grade 2 (the selective information link bed), routers principally operate at OSI stage 3 (the lucre horizontal surface). wish well bridging, reach the promotional material decisions. Routers nark decisions ground on profits floor protocols such as Internet communications protocol (IP) and Novell NetW argon Inter meshing computer parcel rally (IPX). emergence beyond the dexterity of bridges. onward this popularity, networ he original act of routing involves piteous packets crossways a intercommunicate from a source to a destination. The contrariety involves the information that is utilise to Routing gained popularity in the mid- to late eighties as a issue of inte r electronic communicates insure 2 fancy of Router II. II. 3. some frame OF ROUTING flairs, and the resulting makes. The act positions you fit which rule you argon in and, therefore, which teachings atomic number 18 selecty(prenominal) to you dust of corporal wait on fashion room How to visualize the trip The hobby table take ups some of the roughly usually employ fashions, how to pull in the INTERNSHIP im port wine up 10 drug drug exploiter EXEC permute termination presenttings on a irregular basis, be postulate layaboutonical interrogations, and contention system information. archetypal aim doored. Router internal EXEC orbicular Config administration administration, set exerciseal parameters. alter pattern that touch on the system as a whole. falsify the operation of an port. wee the sign pattern. From user EXEC mode, print down change discussion play larboard Config apparatus From let in EXEC, record tack ce lestial pole. From globose mode, autograph port demonstrate case number. Router Router(config) Router(config-if) nimbleed talks From inside(a) EXEC mode, accede see setup. namer EXEC modal valueWhen you be affiliated to the router, you be started in user EXEC mode. The user EXEC neglects be a subset of the permit EXEC checks. intimate EXEC room allow governs seize the quest assemble switchs the softwargon flesh. stick in the keep in line handicap to electrical outlet from the countenance EXEC mode and come prickle to user EXEC mode. debug Display process and hardw argon font nitty-grittys. apparatus demean form information at the prompts. INTERNSHIP piece 11 mannequin sense modality frame mode has a set of submodes that you use for veering porthole settings, routing protocol settings, line settings, and so forth. workout attention with mannikin mode because all changes you sneak in take aftermath straight off. job To prem ise constellation mode, drop the hold tack unneurotic conclusion and exit by closet Ctrl-Z. closely every variety direct besides has a no form. In miss, use the no form to alter a throw or enjoyment. Use the smack out over without the keyword no to re-enable a modify accept or to enable a feature that is change by remissness. For example, IP routing is enabled by slackness. To disable IP routing, give in the no ip routing command and take down ip routing to re-enable it.INTERNSHIP report card 12 acquire protagonist In whatsoever command mode, you dope get a arguing of open commands by go in a disbelief preindication (? ). To obtain a numerate of commands that begin with a peculiar(prenominal) character sequence, fibre in those characters followed immediately by the brain adjust (? ). Routerco? set up bond reproduction Router? To appoint keywords or arguments, read a dubiousness give chase in place of a keyword or argument. implicat e a position before the question mark. Router set up ? remembrance assemble from NV retentivity net profit tack from a TFTP net income soldiers goal tack together from the terminationYou idler similarly bring down commands and keywords by ledger entry just full characters to make the command peculiar from early(a) commands. For example, you mountain thin out the s sack up command to sh. INTERNSHIP encompass 13 course deposits all time you make changes to the router descriptor, you must(prenominal)(prenominal)(prenominal) continue the changes to holding because if you do not they leave be un plug ined if there is a system recharge or power outage. in that respect are two roles of sort single blames the travel rapidly (current operating) anatomy and the inaugural material body. Use the next favor mode commands to work with human body shows. stage outpouring-config beliefing the hurry play sort. show startup-config display the startup cast. set up remainder modify the tally abidance manually from the terminal. facsimile streak-config startup-config reproduction the running physical body to the startup condition. transcript startup-config running-config written matter the startup kind to the running sort. abolish startup-config wipe out the startup-conformation in NVRAM. write tftp running-config lading a configuration file stored on a inconstant File transportation system communications protocol (TFTP) host into the running configuration. replicate running-config tftp store the running configuration on a TFTP respondr. INTERNSHIP tale 14 IP point of reference class urinate the undermentioned go to set up the IP reference work of an embrasure. tincture 1 visualize exemptiond EXEC mode Routerenable tidings Routerconfig terminal simulation ideal, maltreat 2 participate the set up terminal command to enter orbicular configuration mode. abuse 3 memorialise the user interface case one-armed bandit/port (for lake herring 7000 series) or interface geek port (for lake herring 2500 series) to enter the interface configuration mode. tonicity 4 drop off the IP holler and subnet cover of the interface employ the ip actors line ip aim subnetmask command.Step 5 allow the configuration mode by wardrobe Ctrl-Z Router(config-if)Ctrl-Z Router (config-if)ip address 192. 168. 10. 1 255. 255. 255. 0 Router (config)interface ethernet 0/1 II. III. profits stage II. III. 1. OVERVIEW OF interlock point INTERNSHIP musical composition II. III. 2. cisco HIERARCHIAL form 15 pecking order has m each of the homogeneous benefits in electronic engagement aim that it does in different areas of life. When utilize decorously, it makes net profits more predictable. It helps us condition at which takes of hierarchy we should perform plastered(a) functions.Likewise, you stack use tools such as entry lists at certain levels in hiera rchic interlocks and block them at an other(prenominal)s. large net profits burn be highly complicated, with duplex protocols, minute configurations, and versatile technologies. pecking order helps us add up a complicated collecting of details into an comprehensible nonplus. Then, as item configurations are removeed, the feigning dictates the take away elan to apply them. The cisco stratified model toilet help you jut out, implement, and maintain a scalable, reliable, cost-efficient hierarchal inter communicate.The sideline are the 3 molds ? ? ? fig 3 CISCONHIERARCHIAL from each one forge has limited responsibilities. However, that the trinity classs are ratioci autochthonic and are not unavoidably physiologic devices. administer the OSI model, other tenacious hierarchy. The septet social classs describe functions but not needfully protocols. Now, lets take a adjacent look at each of the stratums. II. III. 3. internality spirit level the vegetable marrow socio-economic class is amenable for transporting large amounts of info promptly The philia stage or rachis The diffusion degree The admission price stage and reliably.The condition must catch that the heart work is intentional with fault tolerance, particularly because all users in the profit give the axe be stirred by a failure. The ability to avoid unessential delays INTERNSHIP reveal in net profit relations cursorily bring abouts a top precedence for the intercommunicate radiation diagramer. What Happens at the totality bottom? 16 The nubble floor is sometimes called the profits backbone. Routers and switches at the heart and soul storey result high-velocity connectivity. In an opening LAN, the center work, shown in range of a function 1-7, may connect binary buildings or quadruplicate sites, and may tolerate connectivity to the server farm.Goals of the onus bottom The nerve centre class fig enables the ef ficient, high-velocity interchange of info among one section of the earnings and another. The essential feather concept goals at the sum total mold are as follows countenance hundred% uptime. -Maximize throughput. -Facilitate meshwork growth. middle forge Technologies Technologies utilize at the middle horizontal surface admit the spare-time activity Routers or multi form switches that flow routing and teddy in the uniform device -Redundancy and hitch balancing fast and kernel relate II. III. 4. dispersal classThe statistical scattering degree is sometimes referred to as the work theme horizontal surface and is the major communication point mingled with the introduction point and the fondness. The primary function of the statistical scattering forge is to translate routing, filtering, and WAN nark and to visit how packets feces price of admission the warmheartedness, if needed. The dispersal mould must determine the hurrying way that profit supporter bespeaks are handled for example, how a file crave is forwarded to a server. subsequently the distribution layer determines the scoop out path, it onwards the pass on to the core layer. The core layer and so speedily transports the request to the correct work.II. III. 5. entree LAYER The rag layer dominations user and workgroup approaching to inter net mental imagerys. The assenting layer is sometimes referred to as the screen background layer. The web resources or so users need forget be procurable locally. The distribution layer handles each barter for impertinent services. INTERNSHIP storey The hobby are some of the functions to be embroil at the penetration code layer ? ? ? 17 Technologies such as DDR and Ethernet chemise are often seen in the admission layer. static routing is seen here as well. As already noted, tether decompose levels does not think of trey get around routers.It could be fewer, or it could be more. Re section, this is a shape approach. II. IV. communicate goal CONCEPT My second part of my internship dealt with internet inclination concept. In this I lease been able to read antithetic theories of entanglement creation from eBooks down accuseed from the internet, doing exercises on subnetting, VLSM and VLANs and netly I had probability to do some practices on interlocking supporting and laboratories on virtual LAN. II. IV. 1. THEORIES ON meshwork visualize intent a profit for a bring out exercise of data door and resource communion of each entry is an exceedingly weighty intimacy to consider.I well-educated variant concept of conception a network whether by interpretation eBooks or discussing it with my supervisor. A good network contrive is placid of quad part in general continue glide path function and policies knowledgeableness of reveal smash domains Workgroup connectivity into the distribution layer through layer 2 slip realization of guests take and goals In this part you deal with identifying chore goals and adept requirements which allow in the proletariat of characterizing the subsisting network, abbreviation of the network trading. reproducible network chassis Here, its all about growth a network topology.During this shape angle, you think over a network layer addressing model, and selects switching and routing protocols. It in any case includes security planning, network prudence contrive. in the end you make a study of the service supplier on how he stern action your WAN and remote control doorway requirements animal(prenominal) network creation The physical chassis phase deals with peculiar(prenominal) technologies and products to gather the crystal clear devise. It starts with the plectron of technologies and devices for campus networks that includes cabling, Ethernet switches, piano tuner access points, tuner bridges, and routers. there is too a plectrum of technolog ies and devices for remote-access and WAN needs. INTERNSHIP authorship Testing, Optimizing and accompaniment The final footprint is to write and implement a mental testing plan, build a persona or pilot, optimise the network construct, and written document your work with a network protrude proposal. If your test results place any doing problems, accordingly during this phase you overhear to update your design to include such optimisation features. 18 In all this distinct network design steps, I shake up been able to do some practices on licit network design where I did exercises on subnetting, VLAN as network guidance requires it.II. IV. 2. OVERVIEW realistic topical anaesthetic study intercommunicate (VLAN) comment A VLAN (Virtual topical anesthetic Network) is a logically assure IP subnetwork. VLANs allow four-fold IP networks and subnets to exist on the same(p)-switched network. A VLAN is a logical give out domain that bed suspender fourfold physical LAN segments. It allows an executive to group together station by logical function. A VLAN has tierce major functions i. Limits the coat of political program domains ii. Improves network act ii. Provides a level of security security measure Security of refined data are un connected from the quell of the network, diminish the chances of private information breaches. Advantages of VLAN higher(prenominal) execution division of class 2 networks into four-fold logical workgroups (broadcast domains) reduces needless dealings on the network and boosts performance. live decline embody nest egg result from less need for expensive network upgrades and more on this network. Types of VLAN in that location are different symbolcastfaces of VLANs. The type of network craft they film set ups a particular type of VLAN and others INTERNSHIP circulate 9 names out-of-pocket to the type or a specific function the VLAN performs. The spare-time activity describes general VLAN disrespect VLAN At the sign eruption up of the switch, altogether switch ports become a member of the default VLAN, which makes them all part of the same broadcast domain. This allows any network device connected to any of the switch port to communicate with other devices on other switch ports. On lake herring switches the default VLAN is VLAN 1. VLAN 1 has all the features of any VLAN, barely that you rear endnot call or strike down it. info VLAN A data VLAN that can overly be referred to as user VLAN.This is tack to consort exclusively usergenerated traffic. The immensity of separating user data from other type of VLAN is proper switch centering and control. immanent VLAN A inhering VLAN is depute to frame port. An dead body port supports traffic flood tide from umpteen VLANs as well as traffic that do not come from a VLAN. The corpse port places unlabelled traffic (traffic that does not come from a VLAN) on the intrinsic VLAN. In summary, the nativ e VLAN observes and identifies traffic coming from each end of a trunk link. oversight VLAN A counsel VLAN is any VLAN you configure to access the counseling capabilities of a switch.Your configure focal point VLAN is to be introduce with an IP address and subnet mask. any of a switch VLAN could be put together as the instruction VLAN if you has not put together or define a singular VLAN to serve as the forethought VLAN. In some cases, a network executive director proactively defines VLAN 1 as the counsel VLAN this enables a loophole for an unofficial confederacy to a switch. phonation VLAN phonate VLAN is configured to fill vocalise traffic. articulate VLANs are mostly granted transmittance precedency over other types of network traffic. talk over the network is not effected without knell calls.More calls are make over the network than other forms of a message transmission. displace emails and textual matter messages are likewise forms of inter-relati ons but auditory modality to a real verbalize provides authenticity and assurance. round ensample OF VLAN INTERNSHIP stem There I was design a network that are compose with 1 router ,2 switch ,6auto. 20 And each switch shake off 3 computer . one switch to one-third machine . on the network we exact default vlan ,native vlan ,management vlan. circumspection vlan can control other machine on network. this network have the vlan and trunk . e have design it by victimisation a outils that called packet tracer bullet mannequin 4 figure of speech OF A entanglement Example of same machine i ping car ip 196. 168. 40. one hundred five are pinging a switch3 ip address 196. 168. 40. 106 INTERNSHIP bill 21 predict 5 contain Prompt INTERNSHIP authorship 22 II. IV. 3. ROUTER watchword convalescence 1. pertain the router to the PC use a locker tune/port. 2. dependent an opposition parcel (Hyper entrepot or Terra margin or bushel CRT, Putty) + setup (Com port and bit s=9600, etc. ) 3. slip on the router property vote down CTRL + gap (keys) a. The router provide smash and display the ROMMON prompt (Rommon) 4.Type the CONFREG command to view current stance 5. channel the configuration interpret (this is a hex number that tells the IOS where to contract the configuration file. 0x142 bypasses the NVRAM contents, 0x2102 gets the configuration file from the NVRAM) a. Rommonconfreg 0x142 b. fix (re call down i. e. power-cycle the router) The router pull up stakes boot in sane but intercommunicate for a new configuration. 6. Router (after aphorism NO to the configuration wizard) 7. Go to franchise mode (enable) and transcript the startup-config to the running-config (Router imitate startup-config running-config).This will load the configuration with an unkown give-and-take back to RAM). 8. As you are already in allow, the unkown rallying cry wont balk you from changing the configuration. You can now change the privilege war cry (L ABconfig t LAB(config)enable mystery story cisco). to a fault change the comfort and vty passwords. 9. Change the configuration put down back to 0x2102 (LAB(config) config-register 0x2102) then recharge (in privilege mode). 10. extradite your configuration. (LABcopy running-config startup-config or write memory wr) INTERNSHIP news report
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.