Documente Academic
Documente Profesional
Documente Cultură
NTRODUCTION
BACKGROUND OF CISCO
CISCO is an integrated networking service
it established in 2003e.c as academy with a design & attainable capacity of
some budget at each year respectively.
This is particularly convenient for enterprise engaged in networking and
administration & training activities.
MAIN SERVICES
installation and adminstration in the university
E-learning
#Manage video
conference
#Control elibrary service
Application
administration
#give training
service in KIOT
for student and
worker
Interventions.
(Measures that should be
taken so that the Obstacles
are removed or overcome)
Implementation Activities
KIOT SERVERS
an application (software) capable of accepting requests
from the client and giving responses accordingly.
serv
er
Web server
computers that deliver (serves up) Web pages
used to host websites, but there are other uses such as gaming, data
storage, running enterprise applications, handling email, FTP, or other web
uses.
File server
attached to a network that has the primary purpose of providing a
location for shared disk access
FTP(File transfer protocol) used to transfer computer file from one
host to another,such asd by internet.
Application server
a program that handles all application operations between users and an organization's
backend business applications or databases.
high performans and high avelablity
Proxy server
that acts as an intermediary for requests from clients
seeking resources from other servers
Used to Monitoring and filtering
Benefits of Internship
PROJECT WORK
WIRELESS MAXIMAIZATION AND SECURITY
Potential Network Connectivity Problems in
KIOT:
LAN terminators are not connected
properly.
The LAN interface has the wrong IP
address.
The same IP address is used by another
system.
The routing table is configured incorrectly.
The LAN cable is defective.
The LAN segment is too long.
The /etc/hosts file is configured
incorrectly.
Secure the AP
Define Access Point, WEP
Able to configure AP
Maximize Wi-Fi coverage in KIOT
Able to connect Infrastructure Mode And Ad-Hoc Mode
Service set identifier (SSID)
A simple code that identifies the WLAN.
Clients must be configured with the correct SSID
to access their WLAN.
Media access control (MAC)
MAC address filtering restricts WLAN access to
computers that are on a list you create for each
access point on your WLAN.
Wired equivalent privacy (WEP)
Encryption and authentication scheme that
protects WLAN data streams between clients and
access points (AP) this was discovered to have
flaw.
clientA
AP
client B
-+
Client A
Client B
Client C
Maximaize RF coverage
Ifaccess points are too far apart, then some users will be associating with the
wirless LAN atsomething less than the maximum data rate.
For example, users close to an 802.11b access point may be operating at
11Mbps.
CONCLUSION
wireless networks are preferred by most
people, because there is also a greater
usage of mobile devices, such as laptops,
mobile phones, tablets.
It has strengthened my technical based
and enabled me to integrate theory with
engineering practice
We developed good confidence that will
make me familiar to the work place or
position in my futurity
We have understood both office and site
works in a satisfied way.
In general the internship was important in
getting many experiences, knowledge and
RECOMMENDATIONS
The wireless AP is not secure and not setting in
proper position or place.
Wrong cable installation
They should organize their material
management before used as networking purpose
They should work for minimum waste during
cutting and installing
They should be volunteer to answer questions
when some questions raised from the interns.
We would like to recommend that the Electrical
engineering department add software course
(network security, network administration, and
Cisco packet tracer etc.) to their undergraduate
curriculum.