• Tidak ada hasil yang ditemukan

SUBMITTED BY - dspace.daffodilvarsity.edu.bd:8080

N/A
N/A
Protected

Academic year: 2023

Membagikan "SUBMITTED BY - dspace.daffodilvarsity.edu.bd:8080"

Copied!
44
0
0

Teks penuh

If any of the departments want to communicate with other departments, then apply inter VLAN. In the first chapter of this report discuss computer network and security, the background of this report and the purpose of the study. Finally, discuss the benefits and features of the proposed network and the difference between the existing network and the proposed network.

Air Voice Global Technologies Ltd serves both home and business users in a particular city. Air Voice Global Technologies Ltd is a leading rural internet service provider and IT solutions company in Bangladesh. Air Voice Global technologies started their journey with the aim of providing very high level software and technical support.

Air Voice Global technology Limited guarantees its well-founded security to provide the customer with the best FACILITY in the Area. Global Air Voice technologies enable Point to Point and Point to Multi-Point Data connectivity. The mission of Air Global technology Limited is to provide and provide high quality services to a limited number of customers.

It is a family with all customers and dedicated staff of Air Global Technologies Limited.

Daily Task and Activities 11

Client Site Survey 11-12

Presentation with venue also representative of these locations, which cannot be searched for emerging situations and other likely productions[1]. Take along additional intelligence, where are the VIPs and what kind of events are approaching. What kind of events are these and will we need superior wireless services or to turn off the Wi-Fi due to exhibitors' gadgets consecutively on the same frequencies[1].

DHCP Server 14

VLAN 15

Security of the Network 16

Once a rule is matched, no further comparison takes place and that rule will be executed[8]. There is an implicit deny at the end of every ACL, i.e. if no condition or rule matches, the packet will be discarded. Provides security as the administrator can configure the access list as needed and deny the unwanted packets from entering the network.

Provides control over the traffic as it can allow or deny depending on the need of the network[8]. A virtual private network, or VPN, is an encrypted connection over the Internet from a device to a network. It prevents unauthorized persons from eavesdropping on traffic and allows the user to carry out work remotely.

Site-to-site VPN is used when distance makes it impractical to have direct network connections between these offices. A VPN works by using the shared public infrastructure while maintaining privacy through a Remote Access VPN securely connects a device outside the corporate office. Advances in VPN technology have made it possible to perform security checks on endpoints to make sure they meet a certain posture before connecting.

In computer networks, MAC Filtering refers to a security access control method where the MAC address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network allows and denies network access to specific devices through the use of blacklists and whitelists. While restricting network access through the use of lists is straightforward, an individual person is not identified by a MAC address, but only by a device, so an authorized person would need to have a whitelist entry for each device that he or she will use to access the network[9].

Device Configuration 17

RF Survey 18

Final Step to setup 19

WiFi Speed test and analysis 19-21

When I worked in Air Voice Global, technology facilitated me to discover the real working life and how a foreign company operates. The internship program also helped me improve my technical skills through intensive use of MS Excel. I know that Excel has many applications and can be used for many purposes, but I had the prospect of using it in real life. So this internship also helped me and get exposed to the real use of Excel at the corporate level.

Air Voice Global Limited's existing network follows the two-tier network model which consists of two tiers: the Accessi tier and the Core tier. In the figure, Fiber@Home and Earth communications provide the bandwidth for the organization. These lines are connected to the Mikrotik cloud core router with a fiber optic line.

The Base Layer includes the most expensive routers, the largest and fastest routers with the highest model numbers, and the Core Layer is labored as the backbone of networks[10]. The core is aggregating that traffic from across the distribution layer to the devices, so it must be capable of forwarding large amounts of data rapidly. Needs more manpower to allocate resources to other branches • Consumes time to communicate with other branches.

This internship at Air Voice Global Limited offers the opportunity to test focus on an individual career before making permanent commitments. This also gave me the right space to gain this experience and knowledge that is related to the theoretical background and that we learned in the university courses. At Fonds Bangladesh, working with vendors like Aruba, Netgear Wireless gave me practical and technical knowledge of Wi-Fi technology.

In Air voice Global Limited, I have learned to arch to investigate a site, to provide the appropriate solution about Wi-Fi and how to deploy a new Wi-Fi network. This internship experience will help me to become a better provider in the field of telecommunications and have also learned a lot of new concepts and a new way of working. I have learned how to work in a team and I often needed to meet a skilled person to solve some problems. Especially the IT area in the business network sector is an enormous area of ​​knowledge and technology.

The time limit is many of the features that could not be discussed in current reports. 2] Learn more about mikrotik, available at “ https://systemzone.net/mikrotik-router-basic-configuration- using-winbox ” last accessed at 13:00.

Skill 22

Air Voice Network Structure 23-28

Core Layer 24

Access layer 25

Features of Existing Network 26

This whole experience like network monitoring, investigation and field operation has been very useful for the future life which surprises me. Networking is an excessive way to start a career in network engineering, and several routine networking as a stepping stone into other network engineering fields such as network administrator, cloud networking. However, networking itself is an excessive career, highly skilled and experienced network engineers are among the highest paid positions[11].

Formulating the report on the real experience gained in a short period of only three months is not an easy task. It is therefore a very short time to acquire all the relevant information and knowledge about corporate network information technology.

Referensi

Dokumen terkait

www.henley.ac.uk Leadership, Organisations and Behaviour Dr Bernd Vogel Associate Professor of Leadership and Organisational Behaviour Director Henley Centre for Engaging