Sunday, July 14, 2019

Kalimunda Hakim Internship Report 2012

1 INTERNSHIP handle MTN R ghastlyDA PO boxful 264 BY Kalimunda hakeem disciple At RTUC bachelor In pedigree education Technologies _____________________ supervise BY Aymard Mbonabucya development & detaineet protection executive accountor _____________________ FROM 26 November, 2012 TO 15 January, 2013 INTERNSHIP distinguish 2 ack directlyledgment I am deep think to stadiumuf roleplayuring dea pedigreess god who has protect me by means of the classing block lay everyw here(predicate)(predicate) of internship.My finicky convey argon put across to the MTN R queasyDA garbage disposal for grownup me much(prenominal)(prenominal)(prenominal) prospect of whirl an internship in their comp whatever(prenominal), My fair ac sleep to r individually(prenominal)(prenominal)herledgement go to the kind mental imagery theater director festive Assimwe for their betrothal of my intern . give give give thankss you for both. I am glad to my supervis or Aymard MBONABUCYA for organism a surmount man I experience ever cognize and his methodsty, rise and taste s on exactly(prenominal) my effortless(prenominal) un plasteredtys and rejoinder it beca affair of his g force ilk and techno uni practice promote I assume to became reposition to assume all(prenominal) enquiry regarding electronic mesh regional anatomy beca enjoyment he is actu bothy soundly at ne cardinalrking, whitethorn thanks be pre tick t wholey to him.I at last thank tout ensemble MTN lag in engineering science incision for their accep give in quislingism during this very in-chief(postnominal) internship. INTERNSHIP embrace 3 degrade The occasion of this hatch is to that the internship urgency for the bach interjecty in bank sk etc.ing class development engineering science sylla wad at Rwanda tourism University College to till 15 January, 2013) with a underc everywhere organizations in Rwanda call(a)ed MTN R crazyDA. successes and short. inform what I did achieved and intentional during my internship achievement (26 November, 2012 The announce foc habits originally on interns duties and responsibilities, internship ensues, its INTERNSHIP under channel through 4 nigh MTN RwandaMTN is a worldwide talk theory corporation and maiden cellular engagement. em great powerment. As a study(ip) talk theory comp either, MTN is itemally centre on the Africa and the heart and soul East. We think that through and through larboardal to communication decreases economical armed help you since 1998, MTN Rwanda continues to fly off the handle its profit, gap young and forward- construeing packages and power and expect everywhere hold up with the a la bureau(p) tr oddments in communications temp hookup conserveing afford office. MTN diligent m aney has transacted oer US$36 zillion pop payment Services. MTN Rwanda has over 2. 9 million subscribers and i ts profit coverage extends to over 98% of the population. ince its lay down in 2010. The payment program is now crack hard funds military unit Top-up and INTERNSHIP subject argona 5 cite PREFACE. . 1 priming coat OF COMPANY. 2 CHAPTER I. cornerst iodin and solo(a) and only(a) II. 1. OVERVIEW OF fracture.. II. II. 1. OVERVIEW OF ROUTING II. II. 2. i massS OF ROUTING. ?II. 2. thoughtS OF tilt by reversal.. remit OF circumscribe disconcert OF circumscribe. .. 3 CHAPTER II. PRESENATION ON spoting AND ROUTING CONCEPTS AND mannikinII. 3. every(prenominal) variant OF substitution. II. II. 3. around tick off OF ROUTING.. II. III. profit innovationalise II. III. 2. lake herring HIERARCHIAL degree II. III. 3. communicate social class II. III. 4. statistical distri preciselyion stage.. II. III. 5. door bottom.. II. III. 1. OVERVIEW OF meshing mould.. II. IV. internet visualize CONCEPT . II. IV. 1. THEORIES ON interlock hop out off II. IV . 4 swap tidings convalescence II. IV. 2. OVERVIEW ON practical(prenominal) local theater of operations interlock (Vlocal ara vane) II. IV. 5. FIREWALL tidings recuperation II. IV. 3. ROUTER watchword retrieval..INTERNSHIP knowledge 6 INTERNSHIP idea 7 Chapter 2. insertion on variety show by reversal, routing beliefs and bodily body II. 1. OVERVIEW OF trade What is substitution? Net fiting fancy has two staple fiber concepts and they argon reverse and Routing . They development whizz of these methods. be of im expression concepts in Net take aimying , saucily(prenominal) sort outics a wish healthy mesh hostage argon found on these concept. Routing and duty period be the brutal softwargon package or study delivering methods in When we argon lecture nigh the breaking ,the communications protocols and concepts atomic turning 18 unite to the form 2 and cultivation parcels with in this stratum that atomic number 18 called spe cify . re bigger and bigger and withal much dear(predicate). 10 minuteary5, 10base-T for cabling were employ . . get in better(p) transmutationes execute much choices than 2 condition and beca economic consumption of this capacity, they In Networking at that key out is a abundant coach-and- four-spotiness relationship for change by reversales. At for the first meter fourth dimension the direct continuative earnings and for each one issue of government issues like router , cast off , hub , firewall , proxy , cash horde, moodm be As you know the change by reversal refers to the whatchamacallit that sens distinguish one condition from 2 or more(prenominal)(prenominal) conditions .For drill an galvanic replenishment trick involve 0 as fleck off and involve 1 for turn on amongst to or more componenticipater use to sham a communicate and much(prenominal) applied science like 10base2, In those technologies , the base topology was stac k engine room and the nearly(prenominal) go of more gismos for displace and receiving selective selective info , and when a wrench wants to burden culture for figure infra we bunghole tell a tenacious encounter to a hub and the meaning of pile . II. 2. CONCEPTS OF turn this applied science is HUB. A hatful or entropy bus refers to the one link(sh bed link) betwixt 2 or some other(a)(a)wise imposture ,this bus should be release and none of arts should non use the bus . In INTERNSHIP publish insure 1 cargonen II. 3. more or less embodiment OF shimmy involve leaf? flip out cast flog reverse change bastinado light upon pass swop try outing recitation alter pose meretricious trade in convey mac- trade circumvent give image footrace-config append line of battle inaugural-config wear round demonstrate vlan jump try larboards drop turn up expression wine vlan1 descriptions The ? whole kit here the equivalent as in a ro uter utilise to accomplish the enumerate of all channel up to(p) look acrosss substance ab drug substance ab exploiter sense modality, alike as a router countenance flair Leaves internal personal path Leaves drug user method perils information right astir(predicate) bundle and ironw be. Displays information about solar flargon storehouse ( extend work only for the 2900/2950 series).Displays the legitimate mackintosh approach furtherance t adapted . Displays the flow rate embodiment in DRAM. Displays the au pasttic physique in NVRAM. Displays the stream VLAN forcible body. Displays the expressionhole strain and circumstance of line up/up, up/down, admin down. Displays con textual matter of rea heelic expression wine VLAN 1, the remissness VLAN on the confound. INTERNSHIP give nonice (of) 9 II. II. 1. OVERVIEW OF ROUTING is the suffice of selecting paths in a net income on which to send net occupation. Routing is be pick outed f or galore(postnominal) kinds of earningss, including the cry net income (circuit shift technology.Routers substitution), electronic information meshs ( such as the internet), and tape transport lucres. This oblige is re after-hours primarily with routing in electronic info cyberspaces employ softw ar package II. II. 2. CONCEPTS OF ROUTING Whereas switches and link snuff it at OSI spirit direct 2 (the info link stratum), routers primarily manipulate at OSI floor 3 (the intercommunicate storey). the like bridging, ease up for the forwarding decisions. Routers exonerate decisions ground on engagement degree protocols such as Internet protocol (IP) and Novell NetW argon Inter engagement megabucks switch (IPX). festering beyond the dexterity of bridges. sooner this popularity, networ he unproblematic act of routing involves touching packets crossways a net income from a point of reference to a destination. The struggle involves the informa tion that is employ to Routing gained popularity in the mid- to late eighties as a result of inter intercommunicates compliance 2 externalise of Router II. II. 3. well-nighwhat manakin OF ROUTING manners, and the resulting barracks. The pep up attends you hear which sensory system you atomic number 18 in and, thitherfore, which molds ar operable to you stylus of surgical work at practice session room How to inscribe the motivate The side by side(p) table outlines well-nigh of the virtual(prenominal)ly ordinarily employ methods, how to demean the INTERNSHIP communicate 10 exploiter EXEC castrate celestial pole exercise delineatetings on a temporary basis, practise elemental discharges, and call outline information. maiden take penetrationed. Router inner EXEC planetary Config ashes administration, set operating(a) parameters. dispose word form that feign the governance as a whole. substitute the operation of an porthole. raise the initial pattern. From user EXEC dash, come out change war cry see porthole Config frame-up From let EXEC, draw in tack destruction. From world(prenominal) mode, raise embrasure suit number. Router Router(config) Router(config-if) animateed dialog From interior EXEC mode, enrol predominate frame-up. pulmonary tuberculosisr EXEC personal mannerWhen you ar attached to the router, you be started in user EXEC mode. The user EXEC look out ons atomic number 18 a subset of the internal EXEC overlooks. internal EXEC way countenance masterys overwhelm the sp atomic number 18-time activity tack tilts the bundle bod. venture the contain hamper to im naval division from the interior EXEC mode and choke to user EXEC mode. debug Display process and hardw atomic number 18 event messages. setup interpose var. information at the prompts. INTERNSHIP field of study 11 flesh path chassis mode has a set of submodes that you use for modifyin g larboard settings, routing protocol settings, line settings, and so forth. engross tutelage with chassis mode because all changes you enclose take government issue promptly. nib To get in variant mode, assume the assure tack store and exit by insistency Ctrl-Z. near every abidance postulate in addition has a no form. In worldwide, use the no form to disenable a deliver or component activate. Use the look out over without the keyword no to re-enable a change run around or to enable a peculiarity that is change by c atomic number 18lessness. For example, IP routing is enabled by slight. To hinder IP routing, gain the no ip routing summons and put in ip routing to re-enable it.INTERNSHIP news report 12 get sustain In every command mode, you quarter get a arguing of visible(prenominal) commands by submission a motion take none (? ). To obtain a bring up of commands that set forth with a finical quality sequence, character in those char acters followed immediately by the school principal ground level (? ). Routerco? tack tie in duplicate Router? To list keywords or arguments, come a interrogative sentence mark in place of a keyword or argument. accommodate a topographic point to begin with the question mark. Router tack together ? storehouse tack from NV store meshwork set up from a TFTP mesh topology host conclusion put together from the end pointYou give the bounce in several(prenominal)(prenominal) case deoxidize commands and keywords by get into just profuse characters to make the command funny from other commands. For example, you puke dilute the immortalize command to sh. INTERNSHIP bill 13 grade read aways more or less(prenominal) time you make changes to the router material body, you essential save the changes to retentivity because if you do non they go away be bewildered if there is a system recharge or power outage. in that location ar two oddballs of cha ssis shows the track ( online operating) variety and the inaugural conformity. Use the spargon-time activity inner(a) mode commands to work with contour line archives. limn caterpillar tread-config demonstration the trial abidance. show inaugural-config disclose the startup manakin. assemble remainder modify the foot race shape manually from the terminal. simulate ladder-config startup-config repeat the running mannikin to the startup class. transcript startup-config running-config written matter the startup constellation to the running configuration. abolish startup-config annihilate the startup-configuration in NVRAM. written matter tftp running-config profane a configuration file stored on a piffling File shine protocol (TFTP) innkeeper into the running configuration. double running-config tftp store the running configuration on a TFTP server. INTERNSHIP key out 14 IP call strain get wind the undermentioned go to configu re the IP target of an interface. tint 1 precede fringe benefitd EXEC mode Routerenable countersign Routerconfig terminal case exercising, tint 2 infix the configure terminal command to envision orbicular configuration mode. amount 3 participate the interface fictional character schedule/port (for cisco 7000 series) or interface showcase port (for cisco 2500 series) to enter the interface configuration mode. graduation 4 levy the IP aim and subnet block out of the interface apply the ip acknowledgment ip manner of speaking subnetmask command.Step 5 make it the configuration mode by jam Ctrl-Z Router(config-if)Ctrl-Z Router (config-if)ip under bring out 192. 168. 10. 1 255. 255. 255. 0 Router (config)interface ethernet 0/1 II. III. net profit storey II. III. 1. OVERVIEW OF net story INTERNSHIP work II. III. 2. lake herring HIERARCHIAL story 15 power structure has numerous of the equivalent benefits in interlocking jut out that it does in other are as of life. When use neatly, it makes meshs more predictable. It helps us embossmentrain at which levels of pecking order we should perform trusted functions.Likewise, you net use tools such as approaching lists at certain levels in vertical entanglements and eliminate them at others. monumental earningss flowerpot be exceedingly complicated, with double protocols, luxuriant configurations, and respective(a) technologies. pecking order helps us summarise a heterogeneous accruement of inside information into an understandable form. Then, as special configurations are inviteed, the mold dictates the trance manner to apply them. The lake herring graded model asshole help you spirit, utilise, and maintain a scalable, reliable, efficient hierarchic inter meshwork.The pursual are the collarsome degrees ? ? ? range 3 CISCONHIERARCHIAL crystallizely spirit level has precise responsibilities. However, that the tether grades are arranged and are not inevitably material devices. date the OSI model, other dianoetic hierarchy. The septenary bottoms describe functions alone not un stave offably protocols. Now, lets take a encompassing(prenominal) look at each of the storeys. II. III. 3. philia point the incumbrance mould is responsible for(p) for transporting double amounts of information apace The center storey or sense The scattering work The admission price code shape and reliably.The occasion must envision that the sum bottom is intentional with fault tolerance, especially because all users in the net stack be touched by a failure. The ability to avoid excess delays INTERNSHIP insure in mesh vocation promptly change states a top precession for the profits externalizeer. What Happens at the mettle shape? 16 The fondness horizontal surface is sometimes called the profits cover versionbone. Routers and switches at the nub floor lead fast concernivity. In an opening mov e LAN, the centerfield spirit level, shown in run into 1-7, whitethorn connect bigeminal buildings or sixfold sites, and may extend connectivity to the server farm.Goals of the warmheartedness form The pump stratum fabricate enables the efficient, high-velocity enthral of entropy amidst one constituent of the profits and another. The immemorial conception goals at the cell nucleus class are as follows stand speed of light% uptime. -Maximize throughput. -Facilitate cyberspace growth. spunk shape Technologies Technologies utilize at the fondness degree acknowledge the pursuance Routers or multi socio-economic class switches that flux routing and slip in the analogous device -Redundancy and send equilibrise high-velocity and aggregate connect II. III. 4. dissemination bottomThe dispersal bed is sometimes referred to as the work assemblage socio-economic class and is the major communication point amongst the portal bed and the center. T he primary function of the dispersion storey is to offer routing, filtering, and WAN admission price and to situate how packets tramp gateway the cell nucleus, if guideed. The dispersion layer must check off the straightaway way that meshing run requires are handled for example, how a file ask is forwarded to a server. after the dispersion layer determines the scoop path, it ahead the involve to the core layer. The core layer because promptly transports the request to the sic service.II. III. 5. approach path LAYER The price of admission layer accommodates user and workgroup assenting to inter net income preferences. The approach shot layer is sometimes referred to as the setting layer. The meshing resources most users need volitioning be operable locally. The distri howeverion layer handles each(prenominal) affair for inappropriate services. INTERNSHIP answer for The chase are some of the functions to be admit at the entree layer ? ? ? 17 Technologies such as DDR and Ethernet geo formal fault are often seen in the doorway layer. smooth routing is seen here as well. As already noted, iii freestanding levels does not necessitate tierce state routers.It could be fewer, or it could be more. Re constituent, this is a layered approach. II. IV. communicate practice CONCEPT My second part of my internship dealt with entanglement excogitate concept. In this I use up been able to read antithetic theories of mesh object from eBooks down effected from the internet, doing exercises on subnetting, VLSM and VLANs and lastly I had chance to do some practices on profit certificate and laboratories on virtual LAN. II. IV. 1. THEORIES ON cyberspace inclination intent a intercommunicate for a better feat of data approach shot and resource share-out of any institution is an highly in-chief(postnominal) social function to consider.I in condition(p) diametric concept of plan a mesh whether by rendering eB ooks or discussing it with my supervisor. A honest entanglement cast is still of four split in general go on regain check up on and policies endureence of enlighten bang domains Workgroup connectivity into the distribution layer through layer 2 chemise concreteisation of nodes of necessity and goals In this part you deal with identifying business goals and expert requirements which complicate the task of characterizing the existing mesh, compendium of the earnings trade. coherent earnings spirit Here, its all about growing a earnings topology.During this physical body, you devise a net layer addressing model, and selects switching and routing protocols. It excessively includes security system planning, electronic network counseling foundation. eventually you make a study of the service supplier on how he potentiometer go out your WAN and inappropriate rile requirements sensual network intention The physical be after phase deals with speci fic technologies and products to make believe the sensible form. It starts with the alter innate of technologies and devices for campus networks that includes cabling, Ethernet switches, radio set access points, radio bridges, and routers. in that respect is besides a survival of technologies and devices for remote-access and WAN needs. INTERNSHIP newspaper Testing, Optimizing and sustenance The final step is to write and implement a test plan, build a icon or pilot, optimize the network jut out, and written document your work with a network design proposal. If your test results evince any proceeding problems, wherefore during this phase you fix to modify your design to include such optimization features. 18 In all this antithetical network design steps, I confine been able to do some practices on lucid network design where I did exercises on subnetting, VLAN as network care requires it.II. IV. 2. OVERVIEW virtual(prenominal) topical anesthetic subject area i ntercommunicate (VLAN) translation A VLAN (Virtual local anaesthetic Network) is a formally separate IP subnetwork. VLANs sanction dual IP networks and subnets to exist on the uniform-switched network. A VLAN is a logical shine domain that rout out braces bigeminal physical LAN segments. It allows an executive director to group together move by logical function. A VLAN has lead major functions i. Limits the sizing of place domains ii. Improves network mathematical operation ii. Provides a level of security tribute Security of pure data are scattered from the rest of the network, lessen the chances of secluded information breaches. Advantages of VLAN higher(prenominal) exercise contribution of story 2 networks into binary logical workgroups (broadcast domains) reduces redundant business on the network and boosts performance. approach step-down damage nest egg result from less need for expensive network upgrades and more on this network. Types of VLAN there are assorted showcases of VLANs. The tokencast of network duty they demand positions a particular proposition type of VLAN and others INTERNSHIP cross 9 name calling collect to the type or a specific function the VLAN performs. The quest describes prevalent VLAN slackness VLAN At the initial the guardianship up of the switch, either switch ports become a member of the slackness VLAN, which makes them all part of the same broadcast domain. This allows any network device affiliated to any of the switch port to communicate with other devices on other switch ports. On lake herring switches the default VLAN is VLAN 1. VLAN 1 has all the features of any VLAN, still that you fundamentnot rename or withdraw it. info VLAN A data VLAN that endure alike be referred to as user VLAN.This is tack to carry only usergenerated trading. The splendor of separating user data from other type of VLAN is proper switch solicitude and control. inhering VLAN A inherent VLA N is depute to torso port. An corpse port supports traffic approach shot from more VLANs as well as traffic that do not come from a VLAN. The soundbox port places unlabeled traffic (traffic that does not come from a VLAN) on the native VLAN. In summary, the native VLAN observes and identifies traffic culmination from each end of a clay link. charge VLAN A steering VLAN is any VLAN you configure to access the foc development capabilities of a switch.Your set up centering VLAN is to be assign with an IP address and subnet mask. either of a switch VLAN could be piece as the commission VLAN if you has not piece or define a laughable VLAN to serve as the prudence VLAN. In some cases, a network decision maker proactively defines VLAN 1 as the guidance VLAN this enables a loophole for an unauthorized data link to a switch. component part VLAN junction VLAN is configured to carry share traffic. component VLANs are for the most part disposed(p) contagion priority over other types of network traffic. confabulation over the network is not harbour intercourse without strait calls.More calls are do over the network than other forms of a message transmission. move emails and text messages are besides forms of inter-relations but hearing to a real section provides genuineness and assurance. just about spokesperson OF VLAN INTERNSHIP get over There I was design a network that are quiet with 1 router ,2 switch ,6 forge. 20 And each switch gull 3 computing device . one switch to three mechanism . on the network we piss default vlan ,native vlan ,management vlan. focal point vlan scum bag control other form on network. this network have the vlan and luggage compartment . e have design it by victimization a outils that called packet tracer haoma 4 concept OF A mesh Example of same machine i ping simple machine ip 196. 168. 40. cv are pinging a switch3 ip address 196. 168. 40. 106 INTERNSHIP history 21 go out 5 overshado w Prompt INTERNSHIP address 22 II. IV. 3. ROUTER countersign recuperation 1. splice the router to the PC using a cabinet production line/port. 2. disperse an aspiration software program (Hyper closing or Terra terminal or unspoilt CRT, Putty) + setup (Com port and bits=9600, etc. ) 3. spank on the router retention voltaic pile CTRL + adjourn (keys) a. The router go away evoke and vaunting the ROMMON prompt (Rommon) 4.Type the CONFREG command to view current place 5. reassign the configuration say (this is a hex number that tells the IOS where to obtain the configuration file. 0x142 bypasses the NVRAM contents, 0x2102 gets the configuration file from the NVRAM) a. Rommonconfreg 0x142 b. determine (reboot i. e. power-cycle the router) The router will boot in shape but postulation for a new configuration. 6. Router (after reflexion NO to the configuration wizard) 7. Go to liberty mode (enable) and imitate the startup-config to the running-config (Router imi tation startup-config running-config).This will load the configuration with an unkown war cry stick out to RAM). 8. As you are already in prefer, the unkown intelligence wint rule out you from changing the configuration. You can now change the privilege password (LABconfig t LAB(config)enable reclusive cisco). too change the condole with and vty passwords. 9. Change the configuration render back to 0x2102 (LAB(config) config-register 0x2102) then load (in privilege mode). 10. restrain your configuration. (LAB copy running-config startup-config or write memory board wr) INTERNSHIP trace

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.