Wednesday, February 20, 2019
Kalimunda Hakim Internship Report 2012
1 INTERNSHIP describe MTN RWANDA PO BOX 264 BY Kalimunda Hakim Student At RTUC Bachelor In Business discipline Technologies _____________________ SUPERVISED BY Aymard Mbonabucya nurture & Network Security Administrator _____________________ FROM 26 November, 2012 TO 15 January, 2013 INTERNSHIP REPORT 2 ACKNOWLEDGEMENT I am deeply intended to almighty god who has protected me through the whole period of internship.My special thanks argon reference worked to the MTN RWANDA administration for giving me such op lookunity of passing an internship in their comp most(prenominal), My sincere acknowledgement go to the Human resource Director cheery Assimwe for their acceptance of my intern . Thank you for on the whole. I am grateful to my supervisor Aymard MBONABUCYA for being a best man I contribute forever known and his waysty, encouragement and understanding s on any my periodical questions and answer it beca grammatical case of his spiritual and technical sup porthole I ut ilize to became clean-handed to ask any question regarding web because he is very dangerous at cyberspaceing, may thanks be given to him.I finally thank all MTN staff in technology department for their good coaction during this very important internship. INTERNSHIP REPORT 3 PREFACE The purpose of this chronicle is to fulfill the internship requirement for the Bachelor degree in Business Information Technology program at Rwanda Tourism University College to till 15 January, 2013) with a private organizations in Rwanda called MTN RWANDA. successes and short. explain what I did achieved and learned during my internship period (26 November, 2012 The depict focuses generally on interns duties and responsibilities, internship results, its INTERNSHIP REPORT 4 well-nigh MTN RwandaMTN is a global communications company and world-class cellular entanglement. empowerment. As a major communications company, MTN is specifically focuse on the Africa and the mall East. We believe that through entrance m bingley to communication comes economic Serving you since 1998, MTN Rwanda continues to protract its lucre, offer new and innovative packages and services and keep up with the modish trends in communications while maintaining affordability. MTN Mobile Money has transacted over US$36 trillion Bulk Payment Services. MTN Rwanda has over 2. 9 million subscribers and its entanglement coverage extends to over 98% of the population. ince its launch in 2010. The fee platform is now offering Cash Power Top-up and INTERNSHIP REPORT 5 ACKNOWLEDGEMENT PREFACE. . 1 BACKGROUND OF COMPANY. 2 CHAPTER I. INTRODUCTION II. 1. OVERVIEW OF shimmy.. II. II. 1. OVERVIEW OF ROUTING II. II. 2. notionS OF ROUTING. ?II. 2. CONCEPTS OF change by reversal.. TABLE OF CONTENTS TABLE OF CONTENTS. .. 3 CHAPTER II. PRESENATION ON SWITCHING AND ROUTING CONCEPTS AND CONFIGURATIONII. 3. close to CONFIGURATION OF SWITCHING. II. II. 3. SOME CONFIGURATION OF ROUTING.. II. III. net work II. III. 2. CISCO HIERARCHIAL LAYER II. III. 3. CORE LAYER II. III. 4. DISTRIBUTION LAYER.. II. III. 5. ACCESS LAYER.. II. III. 1. OVERVIEW OF communicate LAYER.. II. IV. earnings DESIGN CONCEPT . II. IV. 1. THEORIES ON NETWORK DESIGN II. IV. 4 SWITCH PASSWORD retrieval II. IV. 2. OVERVIEW ON VIRTUAL local anaesthetic AREA NETWORK (VLAN) II. IV. 5. FIREWALL PASSWORD recovery II. IV. 3. ROUTER PASSWORD RECOVERY..INTERNSHIP REPORT 6 INTERNSHIP REPORT 7 Chapter 2. demo on electric selling, routing concepts and compliance II. 1. OVERVIEW OF SWITCH What is put together over? Networking concept has two grassroots concepts and they argon work shift and Routing . They utilise one of these methods. argon fundamental concepts in Networking ,other topics like engagement security argon based on these concept. Routing and Switching ar the base packet or entropy delivering methods in When we are talking about the chemiseing ,the protocols and concepts are related to the form 2 and data packets with in this forge that are called frame . re spaciousr and bigger and to a fault more than than expensive. 10base5, 10base-T for cabling were apply . . Better shift keyes have more choices than 2 chequer and because of this capacity, they In Networking t here is a long narration for switches. At first time the direct connection engagement and severally device like router , switch , hub , firewall , proxy , cash allotr, elanm are As you know the switch refers to the device that eject select one condition from 2 or more conditions .For example an electrical switch can select 0 as turn off and select 1 for turn on between to or more computer used to make a network and such technology like 10base2, In those technologies , the base topology was BUS Technology and the virtually advanced of more devices for sending and receiving data , and when a device wants to send data for flesh below we can see a logical view to a hub and the meaning of bus . II. 2. CONC EPTS OF SWITCHING this technology is HUB. A bus or data bus refers to the one link(shared link) between 2 or another(prenominal) device ,this bus should be empty and none of devices should not use the bus . In INTERNSHIP REPORT FIGURE 1 SWITCH II. 3. SOME CONFIGURATION OF SWITCHING Command switch? switchenable switch switch handicap switch go along switch salute version switchshow flash switchshow mac- wieldtable switchshow running-config switchshow startup-config switchshow vlan switchshow interfaces switchshow interface vlan1 descriptions The ? works here the corresponding as in a router Used to get the list of all available verifys drug user mode, alike as a router Privileged mode Leaves franchised mode Leaves user mode Displays information about software product and hardware. Displays information about flash memory ( go away work only for the 2900/2950 series).Displays the contemporary MAC address furtherance table . Displays the current class in DRAM. Displays the curr ent manakin in NVRAM. Displays the current VLAN human body. Displays the interface configuration and precondition of line up/up, up/down, admin down. Displays setting of virtual interface VLAN 1, the oversight option VLAN on the switch. INTERNSHIP REPORT 9 II. II. 1. OVERVIEW OF ROUTING is the action of selecting paths in a network along which to send network affair. Routing is performed for many kinds of networks, including the telephone network (circuit switching technology.Routers switching), electronic data networks (such as the Internet), and transportation networks. This article is concerned primarily with routing in electronic data networks using packet II. II. 2. CONCEPTS OF ROUTING Whereas switches and bridges see at OSI Layer 2 (the data link spirit level), routers primarily snuff it at OSI Layer 3 (the network floor). Like bridging, make the forwarding decisions. Routers make decisions based on network layer protocols such as Internet Protocol (IP) and Novell N etWare Internetwork Packet Exchange (IPX). growing beyond the talent of bridges. Before this popularity, networ he primary act of routing involves moving packets across a network from a source to a destination. The difference involves the information that is used to Routing gained popularity in the mid- to late 1980s as a result of internetworks go through 2 Image of Router II. II. 3. SOME CONFIGURATION OF ROUTING modes, and the resulting breathe ins. The prompt helps you identify which mode you are in and, therefore, which commands are available to you Mode of Operation practice Mode How to innovate the Prompt The following table describes some of the virtually greensly used modes, how to encipher the INTERNSHIP REPORT 10User EXEC Change term settings on a temporary basis, perform basic tests, and list system information. prototypal level entryed. Router Privileged EXEC Global Config System administration, set operating parameters. diversify configuration that affect the system as a whole. Modify the functioning of an interface. Create the initial configuration. From user EXEC mode, come out enable word of honor command Interface Config Setup From perkd EXEC, enter piece terminal. From global mode, enter interface graphic symbol number. Router Router(config) Router(config-if) Prompted dialog From prerogatived EXEC mode, enter command setup. User EXEC ModeWhen you are connected to the router, you are started in user EXEC mode. The user EXEC commands are a subset of the privileged EXEC commands. Privileged EXEC Mode Privileged commands accuse the following tack together Changes the software configuration. Enter the command disable to cronk from the privileged EXEC mode and return to user EXEC mode. Debug Display process and hardware event messages. Setup Enter configuration information at the prompts. INTERNSHIP REPORT 11 class Mode Configuration mode has a set of submodes that you use for modifying interface settings, routing proto col settings, line settings, and so forth.Use wariness with configuration mode because all changes you enter take effect immediately. tuberosity To enter configuration mode, enter the command configure terminal and exit by pressing Ctrl-Z. Almost every configuration command too has a no form. In general, use the no form to disable a feature or function. Use the command without the keyword no to re-enable a handicapped feature or to enable a feature that is disabled by default. For example, IP routing is enabled by default. To disable IP routing, enter the no ip routing command and enter ip routing to re-enable it.INTERNSHIP REPORT 12 get Help In any command mode, you can get a list of available commands by entering a question remember (? ). To obtain a list of commands that begin with a particular character sequence, type in those characters followed immediately by the question mark (? ). Routerco? configure connect copy Router? To list keywords or arguments, enter a question mark in place of a keyword or argument. acknowledge a space before the question mark. Routerconfigure ? memory Configure from NV memory network Configure from a TFTP network host terminal Configure from the terminalYou can overly thin out commands and keywords by entering barely enough characters to make the command unique from other commands. For example, you can abbreviate the show command to sh. INTERNSHIP REPORT 13 Configuration Files Any time you make changes to the router configuration, you moldiness save the changes to memory because if you do not they will be lost if there is a system reload or power outage. There are two types of configuration excites the running (current operating) configuration and the startup configuration. Use the following privileged mode commands to work with configuration files. show running-config display the running configuration. show startup-config display the startup configuration. configure terminal modify the running configuration m anually from the terminal. copy running-config startup-config copy the running configuration to the startup configuration. copy startup-config running-config copy the startup configuration to the running configuration. erase startup-config erase the startup-configuration in NVRAM. copy tftp running-config load a configuration file stored on a Trivial File point Protocol (TFTP) server into the running configuration. copy running-config tftp store the running configuration on a TFTP server. INTERNSHIP REPORT 14 IP Address Configuration Take the following gaits to configure the IP address of an interface. timbre 1 Enter privileged EXEC mode Routerenable password Routerconfig terminal font Example, Step 2 Enter the configure terminal command to enter global configuration mode. Step 3 Enter the interface type slot/port (for Cisco 7000 series) or interface type port (for Cisco 2500 series) to enter the interface configuration mode. Step 4 Enter the IP address and subnet mask of the interface using the ip address ipaddress subnetmask command.Step 5 Exit the configuration mode by pressing Ctrl-Z Router(config-if)Ctrl-Z Router (config-if)ip address 192. 168. 10. 1 255. 255. 255. 0 Router (config)interface ethernet 0/1 II. III. NETWORK LAYER II. III. 1. OVERVIEW OF NETWORK LAYER INTERNSHIP REPORT II. III. 2. CISCO HIERARCHIAL LAYER 15 hierarchy has many of the same benefits in network determination that it does in other areas of life. When used properly, it makes networks more predictable. It helps us define at which levels of pecking order we should perform certain functions.Likewise, you can use tools such as portal lists at certain levels in hierarchical networks and avoid them at others. large networks can be exceedingly complicated, with octuple protocols, detailed configurations, and diverse technologies. Hierarchy helps us summarize a complex collection of details into an intelligible model. Then, as specific configurations are needed, the mode l dictates the appropriate manner to reserve them. The Cisco hierarchical model can help you public figure, implement, and maintain a scalable, reliable, cost-effective hierarchical internetwork.The following are the three layers ? ? ? FIGURE 3 CISCONHIERARCHIAL Each layer has specific responsibilities. However, that the three layers are logical and are not necessarily physical devices. Consider the OSI model, another logical hierarchy. The 7 layers describe functions but not necessarily protocols. Now, lets take a proximate look at each of the layers. II. III. 3. CORE LAYER the karyon layer is responsible for transporting large amounts of data quickly The impression layer or Backbone The Distribution layer The Access layer and reliably.The fancyer must ensure that the core layer is designed with fault tolerance, especially because all users in the network can be affected by a failure. The ability to avoid needless delays INTERNSHIP REPORT in network concern quickly become s a top priority for the network designer. What Happens at the Core Layer? 16 The core layer is sometimes called the network backbone. Routers and switches at the core layer provide high-speed connectivity. In an enterprise LAN, the core layer, shown in Figure 1-7, may connect multiple buildings or multiple sites, and may provide connectivity to the server farm.Goals of the Core Layer The core layer design enables the efficient, high-speed transfer of data between one plane section of the network and another. The primary design goals at the core layer are as follows Provide 100% uptime. -Maximize throughput. -Facilitate network growth. Core Layer Technologies Technologies used at the core layer let in the following Routers or multilayer switches that heighten routing and switching in the same device -Redundancy and load balancing high-velocity and aggregate links II. III. 4. DISTRIBUTION LAYERThe distribution layer is sometimes referred to as the workgroup layer and is the majo r communication point between the rise to power layer and the core. The primary function of the distribution layer is to provide routing, filtering, and WAN access and to contain how packets can access the core, if needed. The distribution layer must determine the fastest way that network service collects are handled for example, how a file request is forwarded to a server. After the distribution layer determines the best path, it send the request to the core layer. The core layer then quickly transports the request to the correct service.II. III. 5. ACCESS LAYER The access layer controls user and workgroup access to internetwork resources. The access layer is sometimes referred to as the desktop layer. The network resources most users need will be available locally. The distribution layer handles any traffic for remote services. INTERNSHIP REPORT The following are some of the functions to be included at the access layer ? ? ? 17 Technologies such as DDR and Ethernet switching a re frequently seen in the access layer. Static routing is seen here as well. As already noted, three separate levels does not imply three separate routers.It could be fewer, or it could be more. Remember, this is a mould approach. II. IV. NETWORK DESIGN CONCEPT My second part of my internship dealt with network design concept. In this I have been able to read different theories of network design from eBooks downloaded from the internet, doing exercises on subnetting, VLSM and VLANs and finally I had opportunity to do some practices on network documentation and laboratories on virtual LAN. II. IV. 1. THEORIES ON NETWORK DESIGN Designing a network for a better cognitive operation of data access and resource sharing of any institution is an extremely important thing to consider.I learned different concept of designing a network whether by reading eBooks or discussing it with my supervisor. A good network design is composed of four parts in general go on access control and policies C reation of separate collision domains Workgroup connectivity into the distribution layer through layer 2 switching Identification of customers needs and goals In this part you deal with identifying business goals and technical requirements which include the task of characterizing the existing network, analysis of the network traffic. Logical network design Here, its all about developing a network topology.During this variety, you project a network layer addressing model, and selects switching and routing protocols. It also includes security planning, network trouble design. Finally you make a study of the service provider on how he can meet your WAN and remote access requirements Physical network design The physical design phase deals with specific technologies and products to sincereize the logical design. It starts with the selection of technologies and devices for campus networks that includes cabling, Ethernet switches, wireless access points, wireless bridges, and routers.T here is also a selection of technologies and devices for remote-access and WAN needs. INTERNSHIP REPORT Testing, Optimizing and Documentation The final step is to write and implement a test plan, build a exemplar or pilot, optimize the network design, and document your work with a network design proposal. If your test results indicate any performance problems, then during this phase you have to update your design to include such optimization features. 18 In all this different network design steps, I have been able to do some practices on logical network design where I did exercises on subnetting, VLAN as network centering requires it.II. IV. 2. OVERVIEW VIRTUAL LOCAL AREA NETWORK (VLAN) Definition A VLAN (Virtual Local Network) is a logically separate IP subnetwork. VLANs allow multiple IP networks and subnets to exist on the same-switched network. A VLAN is a logical diffuse domain that can sweep up multiple physical LAN segments. It allows an executive to group together statio n by logical function. A VLAN has three major functions i. Limits the size of broadcast domains ii. Improves network performance ii. Provides a level of securitySecurity Security of sensitive data are separated from the rest of the network, decreasing the chances of confidential information breaches. Advantages of VLAN higher(prenominal) performance Division of Layer 2 networks into multiple logical workgroups (broadcast domains) reduces unnecessary traffic on the network and boosts performance. Cost reduction Cost savings result from less need for expensive network upgrades and more on this network. Types of VLAN There are different types of VLANs. The type of network traffic they hold defines a particular type of VLAN and others INTERNSHIP REPORT 9 names collect to the type or a specific function the VLAN performs. The following describes common VLAN Default VLAN At the initial boot up of the switch, All switch ports become a member of the default VLAN, which makes them all p art of the same broadcast domain. This allows any network device connected to any of the switch port to communicate with other devices on other switch ports. On Cisco switches the default VLAN is VLAN 1. VLAN 1 has all the features of any VLAN, except that you cannot name or delete it. Data VLAN A data VLAN that can also be referred to as user VLAN.This is configured to carry only usergenerated traffic. The brilliance of separating user data from other type of VLAN is proper switch heed and control. Native VLAN A native VLAN is assigned to ashes port. An trunk port supports traffic coming from many VLANs as well as traffic that do not come from a VLAN. The trunk port places unlabeled traffic (traffic that does not come from a VLAN) on the native VLAN. In summary, the native VLAN observes and identifies traffic coming from each end of a trunk link. Management VLAN A management VLAN is any VLAN you configure to access the management capabilities of a switch.Your configured managem ent VLAN is to be assign with an IP address and subnet mask. Any of a switch VLAN could be configured as the management VLAN if you has not configured or define a unique VLAN to serve as the management VLAN. In some cases, a network administrator proactively defines VLAN 1 as the management VLAN this enables a loophole for an unauthorized connection to a switch. Voice VLAN Voice VLAN is configured to carry voice traffic. Voice VLANs are mostly given transmission priority over other types of network traffic. Communication over the network is not complete without phone calls.More calls are made over the network than other forms of a message transmission. send emails and text messages are also forms of inter-relations but listening to a real voice provides legitimacy and assurance. SOME EXAMPLE OF VLAN INTERNSHIP REPORT There I was design a network that are composed with 1 router ,2 switch ,6machine. 20 And each switch have 3 computer . one switch to three machine . on the network we h ave default vlan ,native vlan ,management vlan. Management vlan can control other machine on network. this network have the vlan and trunk . e have design it by using a outils that called packet tracer FIGURE 4 DESIGN OF A NETWORK Example of same machine i ping railroad car ip 196. 168. 40. 105 are pinging a switch3 ip address 196. 168. 40. 106 INTERNSHIP REPORT 21 FIGURE 5 Command Prompt INTERNSHIP REPORT 22 II. IV. 3. ROUTER PASSWORD RECOVERY 1. Connect the router to the PC using a storage locker cable/port. 2. Open an emulation software (Hyper terminal or Terra Term or Secure CRT, Putty) + setup (Com port and bits=9600, etc. ) 3. Switch on the router HOLDING DOWN CTRL + BREAK (keys) a. The router will boot and display the ROMMON prompt (Rommon) 4.Type the CONFREG command to view current status 5. Change the configuration file (this is a hexadecimal number that tells the IOS where to fetch the configuration file. 0x142 bypasses the NVRAM contents, 0x2102 gets the configuratio n file from the NVRAM) a. Rommonconfreg 0x142 b. Reset (reboot i. e. power-cycle the router) The router will boot in normal but communicate for a new configuration. 6. Router (after saying NO to the configuration wizard) 7. Go to privilege mode (enable) and copy the startup-config to the running-config (Routercopy startup-config running-config).This will load the configuration with an unkown password back to RAM). 8. As you are already in privilege, the unkown password wont prevent you from changing the configuration. You can now change the privilege password (LABconfig t LAB(config)enable secret cisco). Also change the condole with and vty passwords. 9. Change the configuration register back to 0x2102 (LAB(config) config-register 0x2102) then reload (in privilege mode). 10. Save your configuration. (LABcopy running-config startup-config or write memory wr) INTERNSHIP REPORT
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment