SlideShare a Scribd company logo
1 of 24
INTERNSHIP REPORT
January- February 2016
Student Muhammad TalhaBashir (SSUET, 101)
Program Bachelors in Computer Science , Bachelors in Computer Engineering
Department Information Systems
Supervisor Sir Ghulam Muhammad
Co- Supervisor Mam Mehar Afroz
Table of Contents
TABLE OF CONTENTS ......................................................................................................................................................................2
INTERNSHIP OBJECTIVES................................................................................................................................................................3
INTRODUCTION ...............................................................................................................................................................................4
DESCRIPTION OF THE INTERNSHIP ..............................................................................................................................................5
 REMOTE ASSISTANCEBY MICROSOFT SCCM 2012 .................................................................................................................6
 VMWARE WITH IT’S FEATURES .............................................................................................................................................10
 HYPERVISOR WITH IT’S FEATURES ..........................................................................................................................................11
 HOW TO BREAK MAC ADDRESS FILTERING............................................................................................................................15
 ROUTER AND SWITCH DIFFERENCE ...................................................................................................................................19
 RESETTING A CISCO SWITCH TO DEFAULT...............................................................................................................................21
 CONCLUSION....................................................................................................................................................................22
REFLECTION ON THE INTERNSHIP..............................................................................................................................................23
 THEFUNCTIONING AND WORKING CONDITIONS OF AGOVERNMENTAL ORGANIZATION.............................................................23
 THEINFLUENCEON FUTURE CAREER PLANS.............................................................................................................................23
CONCLUSION ..................................................................................................................................................................................24
InternshipObjectives
The reason I choose to follow an internship is because I wanted to benefit from the experience.
I wanted a new challenge and to learn, improve and develop new sets of skills. During my
internship 2 major competencies are central: Working as a Helpdesk Troubleshooting
Personnel, performing duties and activities and analyzing them from different perspectives. As
working as a Helpdesk Troubleshooting Personnel, where I have to be able to perform realistic
troubleshooting.
Next, I participated in different sessions, in which the first steps were taken in the development
of our personality. The objective was to elaborate ourselves and work for the National interest
of the State of Pakistan. Besides this, to also recognize our duties honestly to the family,
friends, other people, work organizations and most importantly to the humanity.
At last this internship has given me new insights and motivation to pursue a career inside
Pakistan. To prepare myself for my future career I can improve several things. I can work on my
communication skills so that I am able to present and express myself more confidently. I could
perform certain tasks in research better if I have more experience in the research
methodologies.
Introduction
This report is a short description of my four weeks internship carried out as compulsory
component of the BSCS. Since my I am interested in Computer Networking and especially of
Troubleshooting, the work was concentrated on the Hardware tasks, Troubleshooting and
Theoretical tasks.
At the beginning of the internship I formulated several learning goals, which I wanted to
achieve:
 to understand the functioning and working conditions of a governmental organization
 to see what is like to work in a professional environment
 to see if this kind of work is a possibility for my future career
 to use my gained skills and knowledge
 to see what skills and knowledge I still need to work in a professional environment
 to learn about research methodologies (field methods/methods to analyze data)
 to get fieldwork experience/collect data in an environment unknown for me
 to get experience in working with persons from another culture
 to enhance my communication skills
 to build a network
This internship report contains my activities that have contributed to achieve a number of my
stated goals. In the following chapter a description of the organization Pakistan State Oil
Company LTD. and the activities is given. After this a reflection on my functioning, the
unexpected circumstances and the learning goals achieved during the internship are described.
Finally I give a conclusion on the internship experience according to my learning goals.
Descriptionof the Internship
Almost every project contains a part of exploring things in the field. This could be exploring
softwares, working environment and troubleshooting etc. Because of too much busyness of the
staff this work is much less and could be increased in much amount which would also become
manageable by me but rather then that given amount of work was still very exploring and
interesting.
An overview of the tasks is as below,
 To explore features and working of Microsoft System Center Configuration Manager
(SCCM) 2012 and prepare a presentation on what I explore.
 To learn troubleshooting using Microsoft System Center Configuration Manager (SCCM)
2012 and solve daily issues being figured out in PSO house.
 To explore VMWare and Hypervisor and prepare report on what I explore.
 To explore “How to break MAC Address Filtering”, “Difference between Routers and
Switches” and “How to reset password on a switch” and formulate the answers in the
form of assignment.
 To make initial installations and configurations on new desktop machines.
 To learn concepts of Computer Networking related to the course of “Cisco Certified
Network Associate (CCNA)”.
 Remote Assistance by Microsoft SCCM 2012
 VMWare with it’s Features
 On July 12, 2011 at the VMware Cloud Infrastructure Launch Event in San Francisco,CA VMware CEO
Paul Maritz and CTO Steve Herrod announced an all new version of vSphere – vSphere 5. Along with
vSphere 5 came a new version of vCloud Director (version 1.5), vShield (now version 5), a new vSphere
Storage Appliance (VSA), and tons of new features.
 I was one of the ~30 people that attended this launch event live and I was also one of the beta testers of the
productso I know, firsthand, how many new features are in vSphere 5. While the listis long and impressive,
in the interestof time,you may want a succinctlistof the features that are mostmeaningful to you, as a
VMware Admin. To provide that, let’s now cover the top 5 new features of vSphere 5 that you need to care
mostabout.
1. vCenter Linux-based virtual appliance and the vSphere Web Client
 Included with vCenter in vSphere 5 is the new version of vCenter that can be installed as a Linux-based
virtual appliance – called the vCenter Server Appliance (vCSA). This is something thatVMware has
been talking aboutfor a long time but now it is reality. With the new vCSA, you don’tneed to buy a
Windows Server OS license to install vCenter on nor do you have to take the time to install Windows
Server and then install vCenter. The vCenter appliance has a built-in local database or itcan support
remote databases to store vCenter data (but SQL Server is not yet supported for that). This appliance
option for vCenter makes getting vCenter up and running quick and easy.
 Another piece of vCenter 5 is the option to use the vSphere Web Clientinstead of the vSphere Client.
However, you should know thatthe vSphere Web Clientdoesn’tdo 100% of the things that the
traditional Windows vSphere Clientdoes so you still have to keep the traditional version installed and
available.The new vSphere Web clientis,however, very visually appealing and easyto use.Plus,it
doesn’trequire anyinstallation on the client side (butit does require Adobe Flash).
 To get started with the vSphere Web client, you do, however, have to install the vSphere Client Web
(Server). This is simplyan installation thatis done on the vCenter server. Once completed,you have to
authorize the vCenter server to talk to the web client(justa couple of clicks of the mouse) and then you
can pointyour remote web browser to the server with this URL https://vcenter5:9443/vsphere-client.
2. vSphere Storage Appliance (VSA)
 Another big piece of the vSphere 5 product launch was the announcementofthe new VMware
vSphere Storage Appliance (or VSA). Those of us who have used software-based storage
appliances before are very familiar with the term “VSA” (or virtual SAN appliance).While VMware’s
new option doesn’trequire any hardware,it doesn’tquite work like traditional VSAs either.
 The new VMware VSA is actually made up of two or three virtual machines spread across two or
three ESXi 5 servers.These virtual machines work together to presentthe local storage on that
hostas NFS storage to the ESXi servers.The four things that make it unique compared to other
VSAs are:
1) It’s fully supported by VMware for advanced features like vMotion, svMotion, VMHA, FT,
and DRS.
2) It’s super-easyto install and use with vSphere
3) The storage data that is stored locally is fully redundantand spread across other hosts
such that if any single hostis lost,that data is still available on other hosts.
4) It is fully managed from within the vSphere Client
 You should also know thatit is not included with vSphere but is an additional cost.It also needs to
be installed on “vanilla ESXi hosts” (servers thathave had no configuration or very little
configuration done to them).
3. Storage Distributed Resource Scheduler (SDRS)
 One of the mostpowerful new features of vSphere (included onlyin vSphereEnterprise Plus)
combines the monitoring ofstorage latencywith VMware’s popular distributed resource scheduler
(DRS). With SDRS, latency of vSpheredatastores is monitored and ifa VM isn’treceiving the
performance thatit needs,that VM’s virtual disk will be svMotion’ed over to another data store
where it can get better performance.
4. Profile-Driven Storage
 With profile-drive storage,new in vSphere 5 Enterprise Plus,you can ensure application service
levels match available storage performance.Virtual machines can be pre-defined to receive a
certain level of performance and then when the VM is created or powered on, it will be placed on
storage that offers it the correct performance needs for the VM/app.
5. Auto-Deploy
 With vSphere 5 auto-deploy, you can provision new ESXi hosts amazinglyfast.With this new
method,the physical server boots over the network using PXE/gPXE, contacts the auto-deploy
server, and loads ESXi into memory.Then, the auto-deployserver works with the vCenter server to
get the new ESXi hostproperly configured (according to hostprofiles and new vSphere 5 answer
files).With auto-deployin vSphere 5, you can deploytens or hundreds ofESXi servers faster than
ever before possible.For more information,watch this presentation on vSphere 5 auto-deploy.
 Bonus Notes
 With the introduction of vSphere 5, also came the introduction ofa new licensing model.From the
momentthatthis was announced in the private VMware briefing I attended, this new pricing model
has been an emotional and contentious topic.With vSphere 5, customers will purchase the same
licenses based on the number ofCPU sockets thatthey want to licenses.Whatis new is that each
of those licenses will be entitled to a certain amountof pooled vRAM. This new measurement
(pooled vRAM) is the total amountof configured virtual memory,of powered on virtual machines,
across all hosts connected to the same vCenter. While this wasn’tthe per-VM pricing that many
anticipated,this is still a move to a “the more you use,the more you pay”-model.For more detailed
information on this model,see myarticle Opinion:What you need to know aboutvSphere 5's new
pricing model.
 With vSphere 5, there is no more “ESX Server”. Just as VMware promised in the past,the ESX
Server productwith a service console is gone and now only ESXi Server is available.
 Summary
 vSphere 5’s features are strong and unique in the marketplace.For large enterprises,features like
storage DRS and profile-driving storage will be huge.For the SMB, the VSA and Linux-based
vCenter virtual appliance are the big benefits.While the costto use vSphere 5 may be in question
due to the vRAM pooled pricing,with so many new features it may be a hard release to pass up!
 Hypervisor with it’s Features
 A hypervisor or virtual machine monitor (VMM) isa piece of computersoftware,
firmware orhardware that createsandruns virtual machines.
 A computeronwhicha hypervisorisrunningone ormore virtual machinesisdefinedas
a hostmachine.Each virtual machine iscalleda guestmachine.The hypervisorpresents
the guestoperatingsystemswitha virtual operating platform andmanagesthe
executionof the guestoperatingsystems.Multiple instances of avarietyof operating
systemsmayshare the virtualizedhardware resources.
1) Type-1, native or bare-metal hypervisors
 These hypervisorsrundirectlyonthe host'shardware to control the hardware and to
manage guestoperatingsystems.Forthisreason, theyare sometimescalled bare
metal hypervisors.A guestoperatingsystemrunsasa process onthe host.The first
hypervisors,whichIBMdevelopedinthe 1960s, were native hypervisors.[2]
These
includedthe testsoftware SIMMON and the CP/CMS operatingsystem(the
predecessorof IBM's z/VM). Modern equivalentsinclude Oracle VM Server for
SPARC, Oracle VM Server for x86, the Citrix XenServer, VMware ESX/ESXi and
Microsoft Hyper-V 2008/2012.
2) Type-2 or Hosted Hypervisors
 These hypervisorsrunona conventionaloperatingsystemjustasothercomputer
programsdo. Type-2hypervisorsabstractguestoperatingsystemsfromthe host
operatingsystem. VMware Workstation,VMware Player, Virtual Box and QEMU are
examplesof type-2hypervisors.
 However,the distinctionbetweenthesetwotypesisnotnecessarilyclear.
Linux's Kernel-based Virtual Machine (KVM) and FreeBSD's bhyve are kernel
modules[3]
that effectivelyconvertthe hostoperatingsystemtoa type-1
hypervisor.[4]
Nevertheless,since Linuxdistributions andFreeBSDare still general-
purpose operatingsystems,withotherapplicationscompetingforVMresources,KVM
and bhyve canalso be categorizedastype-2hypervisors.
 Microsoft'sHyper-V isoftenrunon topof WindowsServerfull installation.Thiswould
make it type-2inthisscenario.
 In 2012, a US software developmentcompanycalled LinuxWorks proposedatype-0
(zero) hypervisor—one withnokernel oroperatingsystem whatsoever—whichmight
not be entirelypossible.
 Operating system support
 Several factorsledtoa resurgence around2005 in the use of virtualization technology
among Unix, Linux, and other Unix-like operatingsystems.
 Expandinghardware capabilities,allowingeachsinglemachine todomore simultaneous
work
 Effortsto control costs andto simplifymanagementthroughconsolidationof servers
 The needto control large multiprocessor and cluster installations,forexample
in server farms and render farms
 The improvedsecurity,reliability,anddevice independence possible fromhypervisor
architectures
 The abilitytorun complex,OS-dependentapplicationsindifferenthardware orOS
environments
 Major Unix vendors,including Sun Microsystems, HP, IBM, and SGI, have beenselling
virtualizedhardwaresince before 2000. These have generallybeenlarge,expensive
systems (inthe multimillion-dollarrange atthe highend),althoughvirtualizationhas
alsobeenavailable onsome low- andmid-range systems,suchas
IBM's pSeries servers,Sun/Oracle'sT-seriesCool Threadsserversand HP
Superdome seriesmachines.
 Although Solaris hasalwaysbeenthe onlyguestdomainOSofficiallysupportedby
Sun/Oracle ontheir Logical Domains hypervisor,asof late 2006, Linux (Ubuntuand
Gentoo),and FreeBSD have beenportedtorun on topof the hypervisor(andcanall
run simultaneouslyonthe same processor,asfullyvirtualizedindependentguestOSes).
WindRiver"Carrier Grade Linux" alsoruns onSun's Hypervisor Full virtualization
on SPARC processorsprovedstraightforward:since itsinceptioninthe mid-1980sSun
deliberatelykeptthe SPARCarchitecture cleanof artifactsthatwouldhave impeded
virtualization.(Comparewithvirtualizationonx86 processorsbelow.)
 HP callsitstechnology tohostmultiple OStechnologyonits Itanium poweredsystems
"IntegrityVirtual Machines"(IntegrityVM).Itaniumcanrun HP-UX, Linux,Windows
andOpenVMS. Exceptfor OpenVMS,tobe supportedina laterrelease,these
environmentsare alsosupportedasvirtual serversonHP'sIntegrityVMplatform.The
HP-UX operatingsystemhoststhe IntegrityVMhypervisorlayerthatallowsformany
importantfeaturesof HP-UXto be takenadvantage of and providesmajor
differentiationbetweenthisplatformandothercommodityplatforms - suchas
processorhotswap,memoryhot swap,anddynamickernel updateswithoutsystem
reboot.While itheavilyleveragesHP-UX,the IntegrityVMhypervisorisreallyahybrid
that runson bare-metal while guestsare executing.Runningnormal HP-UXapplications
on an IntegrityVMhostis heavily discouraged,because IntegrityVMimplementsits
ownmemorymanagement,schedulingandI/Opoliciesthatare tunedforvirtual
machinesandare notas effective fornormal applications.HPalsoprovidesmore rigid
partitioningof theirIntegrityandHP9000 systemsbywayof VPARand nPar technology,
the formerofferingsharedresource partitioningandthe latterofferingcomplete I/O
and processingisolation.The flexibilityof virtual serverenvironment(VSE) hasgiven
wayto its use more frequentlyinnewerdeployments.
 IBM providesvirtualizationpartitiontechnologyknownas logical partitioning (LPAR)
on System/390, zSeries, pSeries and iSeries systems.ForIBM's PowerSystems,the
PowerHypervisor(PowerVM) functionsasanative (bare-metal)hypervisorinfirmware
and providesisolationbetweenLPARs.Processorcapacity isprovidedtoLPARsineither
a dedicatedfashionoronan entitlementbasiswhere unusedcapacityisharvestedand
can be re-allocatedtobusyworkloads.Groupsof LPARscan have theirprocessor
capacitymanagedas if theywere ina "pool" - IBM refers tothiscapabilityasMultiple
Shared-ProcessorPools(MSPPs) andimplementsitinserverswith
the POWER6 processor.LPARand MSPP capacityallocationscanbe dynamically
changed.Memoryis allocatedtoeach LPAR(at LPAR initiationordynamically) andis
address-controlledbythe POWERHypervisor.Forreal-mode addressingbyoperating
systems(AIX,Linux,IBMi),the POWER processors(POWER4 onwards) have designed
virtualizationcapabilitieswhere ahardware address-offsetisevaluatedwiththe OS
address-offsettoarrive atthe physical memoryaddress.Input/output(I/O) adapters
can be exclusively"owned"byLPARsorsharedby LPARsthroughan appliance partition
knownas the Virtual I/OServer(VIOS).The PowerHypervisorprovidesforhighlevelsof
reliability,availabilityandserviceability(RAS) byfacilitatinghotadd/replace of many
parts (model dependent:processors,memory,I/Oadapters,blowers,powerunits,disks,
systemcontrollers,etc.) Itis interestingtonote thatbecause thisPowerVMhypervisor
isintegral andpart of everysingle POWERsystemIBMhasmade since the POWER4
systems,thateverybenchmarkeverrunonthose systemsistechnicallyvirtualizedand
as the benchmarkresultsindicate thisvirtualizationworksextremelywell.Furthermore,
it isextremelysecure andinfactto date there has neverbeenasingle reportedsecurity
flawreportedinthe PowerVMhypervisoritself.
 Similartrendshave occurredwithx86/x86-64 serverplatforms,where open-
source projectssuchas Xen have ledvirtualizationefforts.These include hypervisors
builtonLinux and Solariskernelsaswell ascustomkernels.Since these technologies
span fromlarge systemsdowntodesktops,theyare describedinthe nextsection.
 Security implications
 The use of hypervisortechnologyby malware and rootkits installingthemselvesasa
hypervisorbelowthe operatingsystemcanmake themmore difficulttodetectbecause
the malware couldinterceptanyoperationsof the operatingsystem(suchassomeone
enteringapassword) withoutthe anti-malwaresoftwarenecessarilydetectingit(since
the malware runsbelow the entire operatingsystem).Implementationof the concept
has allegedlyoccurredinthe Subvert laboratoryrootkit(developedjointly
by Microsoft andUniversity of Michigan researchersaswell asin the Blue Pill
malware package.However,suchassertionshave beendisputedbyotherswhoclaim
that itwouldbe possible todetectthe presence of ahypervisor-basedrootkit.
 In 2009, researchersfromMicrosoftand North Carolina State University demonstrated
a hypervisor-layeranti-rootkitcalled hook safe thatcan provide genericprotection
againstkernel-mode rootkits.
 How To Break MAC address filtering
MAC Address:
A media access control address (MAC address), also called physical address, is a unique
identifier assigned to network interfaces for communications on the physical network segment.
MAC addresses are used as a network address for most IEEE 802 network technologies,
including Ethernet and Wi-Fi. Logically, MAC addresses are used in the media access control
protocol sublayer of the OSI reference model.
MAC addresses are most often assigned by the manufacturer of a network interface controller
(NIC) and are stored in its hardware, such as the card's read-only memory or some other
firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the
manufacturer's registered identification number and may be referred to as the burned-in address
(BIA). It may also be known as an Ethernet hardware address (EHA), hardware address or
physical address. This can be contrasted to a programmed address, where the host device issues
commands to the NIC to use an arbitrary address.
A network node may have multiple NICs and each NIC must have a unique MAC address.
MAC addresses are formed according to the rules of one of three numbering name spaces
managed by the Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and
EUI-64. The IEEE claims trademarks on the names EUI-48 and EUI-64, in which EUI is an
abbreviation for Extended Unique Identifier.
How To Check Your MAC Address:
Windows NT, 2000, XP, Vista, Windows 7:
1. Click Start then Run (in Windows 7, Start and type in the Search Programs and Files
box.)
2. Enter: cmd
3. Enter: ipconfig /all
If the output scrolls off your screen, and it will on Vista and Windows 7, use: ipconfig
/all | more
4. The Physical Address is your MAC address; it will look like 00-15-E9-2B-99-3C. You
will have a physical address for each network connection that you have.
This the ipconfig output on Windows XP. This XP computer has two network
connections -- an Ethernet connection, labeled Local Area Connection, and a wireless
connection, labeled Wireless Network Connection.
MAC Filtering:
To prevent any unwanted device to connect to your internet connection MAC Filtering
is done. This allows only the certain MAC Address to access to the network. This is done to
provide some security to your network but this filtering can be break and the method to do this is
known as “MAC Address Spoofing”.
MAC Address Spoofing:
MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC)
address of a network interface on a networked device. The MAC address is hard-coded on a
network interface controller (NIC) and cannot be changed. However, there are tools which can
make an operating system believe that the NIC has the MAC address of a user's choosing. The
process of masking a MAC address is known as MAC spoofing. Essentially, MAC spoofing
entails changing a computer's identity, for any reason, and it is relatively easy.
The changing of the assigned MAC address may allow the bypassing of access control lists on
servers or routers, either hiding a computer on a network or allowing it to impersonate another
network device. MAC spoofing is done for legitimate and illicit purposes alike.
How To change MAC address?
To change MAC Address Windows users can use Macshift and Linux users can use the
Macchanger command. The following print screen shows how to change a MAC address in
Linux. You can find a print screens for both Windows and Linux on the Macshift and
Macchanger pages.
Change MAC address in Linux (Ubuntu):
Let's take a look at the details. If you go with the Macchanger utility in Linux (Ubuntu), you can
use it as follows in your terminal window:
sudomacchanger -m 12:34:56:12:34:56 [adapter name]
Sudo tells the computer that you are executing the command as the administrator. Macchanger is
the utility to change your MAC address. Option -m is to be used together with the MAC address
parameter followed by the name of the network interface for which you wish to change the MAC
address. The name of the wireless interface (rausb0, wlan0, wifi0, etc.) can be found by typing
iwconfig.
If you get the can’t change MAC: interface up or not permission: Device or resource busy
message when executing machinery, you need to disable the device first. That can be done by
typing the sudoifconfig [adapter name] down command, where the [adapter name] is the name
of your network interface again. Do not forget to enable the interface back after changing the
MAC address. You can verify your new MAC by typing sudoifconfig [adapter name].
Macchanger is a Linux-based tool for network adapter MAC address modification. This print
screen shows how to change MAC address of your network adapter.
Now you are free to authenticate and associate into your desired network.
Change MAC address in Windows:
Changing your MAC address in Windows is even easier. You can use for example the Macshift
utility.
Macshift is a Windows-based tool which allows you to change your MAC address. Execute the
command line to change your MAC address. Verify results in ipconfig /all.
 ROUTER and SWITCH Difference
Used for
Router
Connecting two or more networks
Switch
Connecting two or more nodes in the
same network or different network
Function
Directs data in a network. Passes
data between home computers, and
between computers and the modem.
Allow to connect multiple device and
port can be manage, Vlan can create
security also can apply
Used in (LAN,
MAN, WAN)
LAN, WAN LAN
Transmission
Type
At Initial Level Broadcast then Uni-
cast & Multicast
First broadcast; then unicast & multicast
as needed.
Data
Transmission
form
Packet
Frame (L2 Switch) Frame & Packet (L3
switch)
Layer Network Layer (Layer 3 devices)
Data Link Layer. Network switches
operate at Layer 2 of the OSI model.
Ports 2/4/8 Switch is multi port Bridge. 24/48 ports
Device Type Networking device
Active Device (With Software) &
Networking device
Table
Store IP address in Routing table and
maintain address at its own.
Switches use content accessible memory
CAM table which is typically accessed
by ASIC (Application Specific integrated
chips).
Transmission
Mode
Full duplex Half/Full duplex
Broadcast
Domain
In Router, every port has its own
Broadcast domain.
Switch has one broadcast domain [unless
VLAN implemented]
Definition
A router is a networking device that
connects a local network to other
local networks. At the Distribution
Layer of the network, routers direct
traffic and perform other functions
critical to efficient network
operation.
A network switch is a computer
networking device that is used to connect
many devices together on a computer
network. A switch is considered more
advanced than a hub because a switch
will on send msg to device that needs or
request it
Device
Category
Intelligent Device Intelligent Device
Bandwidth
sharing
Bandwidth sharing is Dynamic
(Enables either static or dynamic
bandwidth sharing for modular cable
interfaces. The default percent-value
is 0. The percent-value range is 1-
96.)
There is no sharing port can be 10, 100,
1000 and 10000 Mbps individual
Speed
1-10 Mbps (Wireless); 100 Mbps
(Wired)
10/100 Mbps, 1 Gbps
Routing
Decision
Take faster routing decisions
Take more time for complicated routing
decisions
NAT (Network
Address
Translation)
Routers can perform NAT Switches cannot perform NAT
Faster
In a different network environment
(MAN/ WAN), a router is faster than
an L3 switch.
In a LAN environment, an L3 switch is
faster than a router (built in switching
hardware)
Features
Firewall VPN Dynamic handling of
Bandwidth
Priority range On/Off setting of port
VLAN Port mirroring
Examples
Linksys WRT54GL Juniper MX &
EX series Cisco 3900, 2900, 1900
Alcatel's OmniSwitch 9000; Cisco
Catalyst switch 4500 and 6500 (10 Gbps)
Address used
for data
transmission
Uses IP address Uses MAC address
 Resetting a Cisco Switch to Default
 Connect the console cable to your PC
The first step is to connect a console cable to the COM port of your workstation to gain access to
the switch. If your workstation doesn't have a COM port, you'll need a Serial to USB adapter
 Download Putty and Start a Serial Connection
There are several software productsthatwill allow youtodothis,butI recommendusingPutty.
It isthe mostacceptedandeasiesttouse in myopinion.
To gain accessto the console launchPuttyandselectthe Serial radiusbutton.
 Double Check Serial Settings
To connectto a Ciscodevice viaaSerial sessionafew settingsneedtobe confirmed.
COMPort - (be sure the COMnumberiscorrect, if you are usingausb adapteritmay not default
to usingCOM1. It couldbe COM3 or 4, You'll needtoconfirmby lookingindevice manager)
Data Bits - set to 8
StopBits - setto 1
Parity - setto None
FlowControl - setto None
Once the settingsare confirmedclickOpen,whichstartsthe session.
 Plug in the Console cable
Nowwiththe terminal windowsopen,plugthe consolecable intothe console portof the switch
typicallylocatedonthe backand labeledconsole.
 Hold the mode button on the form of the switch
Before poweringonthe switchholdthe mode buttonlocatedatthe frontof the switchonthe
leftside.
 Power on the switch
CiscoSwitchesdonothave an onoff switch,theyare simplypoweredonbysupplyingpowerto
them.Atthisnow while stillholdingthe mode buttondown,pluginthe powercable.
 Release mode button once it boots
Once characters are displayedonthe screenrelease the mode button.
 Press ctrl + pausebreak on the keyboard
While the bootprocessisinorder hitctrl+pausebreakonyourkeyboard.If youare usinga
laptopmayneedto use ausbkeyboardto hitthese keys.
 Enter the following commands
Switch:flash_init
Switch:dirflash:
Switch:flash:config.textflash:config.backup
Switch:boot
 Rename Configuration files & Remove passwords
Wouldyoulike toenterthe inital configurationdialog?no
Switch> enable
SW1#renameflash:config.backupconfig.text
SW1#copy flash:config.textsystem:running-config
SW1#configterminal
SW1(config)#noenablesecret.
SW1(config)#exit
SW1(config)#wr
 Conclusion
You nowhave gainedaccessto the switchand successfullyreturnedittofactorydefault.You
may alsowantto delete the vlan.datfile asitisnot removedinthe processof deletingthe start
up or runningconfig.
Reflectionon the Internship
In this chapter I reflect on the internship. Regarding my learning goals I shortly discuss my
experiences if I have achieved my goal, whether I experienced difficulties and what I think I
have to improve.
 The functioning and working conditions of a governmental organization
At the beginning I did not have any experience of working within a Governmental
Organization. I understand better the functioning like the organization structure and
setting up projects. Trying to operate as a profitable organization I saw the importance
of financial support and personal capacity. There was often uncertainty whether and
when projects could start. In the first instance the dependence and uncertainty was
annoying, but it forced me to be flexible and to see what other things I could do.
 The influence on future career plans
Through this internship, I have seen what elements of my career I like and I got
enthusiastic again to continue in Computer Sciences. I have found out that part of the
work should contain practical work as I did this much less in the internship.
Conclusion
On the whole, this internship was a useful experience. I have gained new knowledge, skills and
met many new people. I achieved several of my learning goals, however for some the
conditions did not permit. I got insight into professional practice. I learned the different facets
of working within a Governmental Organization. I experienced that IT, as in everyorganization,
is an important factor for the progress of that organization. Related to my study I learned more
about Computer Networking and the problems faced in it. There is still a lot to discover and to
improve. Furthermore I experienced that it is of importance that the education is objective and
that you have to be aware of the view of other people. The internship was also good to find out
what my strengths and weaknesses are. This helped me to define what skills and knowledge I
have to improve in the coming time. It would be better that the knowledge level of the
language is sufficient to contribute fully to projects. After my bachelors I think that I could start
my working career. However I could perform certain tasks in research better if I practice/know
more the research methodologies applied in certain studies. It would also be better if I can
present and express myself more confidently. At last this internship has given me new insights
and motivation to pursue a career in Computer Sciences.

More Related Content

What's hot (20)

Li Fi Technology
Li Fi TechnologyLi Fi Technology
Li Fi Technology
 
Wi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen MominWi fi ppt project by Mubeen Momin
Wi fi ppt project by Mubeen Momin
 
SIWES PRESENTATION
SIWES PRESENTATIONSIWES PRESENTATION
SIWES PRESENTATION
 
Femtocell ppt
Femtocell pptFemtocell ppt
Femtocell ppt
 
Li fi and its application
Li fi and its applicationLi fi and its application
Li fi and its application
 
PIXIE DUST
PIXIE DUSTPIXIE DUST
PIXIE DUST
 
Industry 4.0 and Smart Factory
Industry 4.0 and Smart FactoryIndustry 4.0 and Smart Factory
Industry 4.0 and Smart Factory
 
Li-Fi seminar report
Li-Fi seminar reportLi-Fi seminar report
Li-Fi seminar report
 
LI-FI
LI-FILI-FI
LI-FI
 
wireless electricity seminar report
wireless electricity seminar reportwireless electricity seminar report
wireless electricity seminar report
 
free space laser communication
free space laser communicationfree space laser communication
free space laser communication
 
HART protocol for network data communication
HART protocol for network data communicationHART protocol for network data communication
HART protocol for network data communication
 
Industry 4.0
Industry 4.0Industry 4.0
Industry 4.0
 
Energy efficiency data center overview
Energy efficiency data center overviewEnergy efficiency data center overview
Energy efficiency data center overview
 
LIFI
LIFILIFI
LIFI
 
X-Max Technology ppt
X-Max Technology pptX-Max Technology ppt
X-Max Technology ppt
 
Wireless technology from 0G to 7.5G
Wireless technology from 0G to 7.5GWireless technology from 0G to 7.5G
Wireless technology from 0G to 7.5G
 
5G Technology
5G Technology5G Technology
5G Technology
 
Cloud computing for smart grid applications
Cloud computing for smart grid applicationsCloud computing for smart grid applications
Cloud computing for smart grid applications
 
Light tree
Light treeLight tree
Light tree
 

Viewers also liked

My Internship Document part1
My Internship Document part1My Internship Document part1
My Internship Document part1Shashi_S_S
 
Internship report about Research and deployment ISA Server 2006
Internship report about Research and deployment ISA Server 2006Internship report about Research and deployment ISA Server 2006
Internship report about Research and deployment ISA Server 2006Vũ Vương
 
Task tracking system
Task tracking systemTask tracking system
Task tracking systemMaulik Thaker
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship reportkaahwa Armstrong
 
Tipos de la conducta
Tipos de la conductaTipos de la conducta
Tipos de la conductaGladys López
 
Ecuaciones diferenciales en Derivadas parciales
Ecuaciones diferenciales en Derivadas parcialesEcuaciones diferenciales en Derivadas parciales
Ecuaciones diferenciales en Derivadas parcialesEdwin SB
 
Ryan Marasigan Resume New
Ryan Marasigan Resume NewRyan Marasigan Resume New
Ryan Marasigan Resume NewRyan Marasigan
 
IRC SF Spring 06 Newsletter
IRC SF Spring 06 NewsletterIRC SF Spring 06 Newsletter
IRC SF Spring 06 NewsletterAlina Potts, MPH
 
Corporate blog sinnvoll einsetzen
Corporate blog sinnvoll einsetzenCorporate blog sinnvoll einsetzen
Corporate blog sinnvoll einsetzen7alps
 
Wordpress website development for Furniture designer & manufacturer in UK
Wordpress website development for Furniture designer & manufacturer in UKWordpress website development for Furniture designer & manufacturer in UK
Wordpress website development for Furniture designer & manufacturer in UKInfigic Digital Solutions
 

Viewers also liked (18)

Internship Report
Internship ReportInternship Report
Internship Report
 
My Internship Document part1
My Internship Document part1My Internship Document part1
My Internship Document part1
 
Project_Report
Project_ReportProject_Report
Project_Report
 
internship report covert
internship report covertinternship report covert
internship report covert
 
Internship final report 2017
Internship final report 2017Internship final report 2017
Internship final report 2017
 
Internship report about Research and deployment ISA Server 2006
Internship report about Research and deployment ISA Server 2006Internship report about Research and deployment ISA Server 2006
Internship report about Research and deployment ISA Server 2006
 
Task tracking system
Task tracking systemTask tracking system
Task tracking system
 
computer science internship report
computer science  internship reportcomputer science  internship report
computer science internship report
 
Employee Time and Task Tracking System
Employee Time and Task Tracking SystemEmployee Time and Task Tracking System
Employee Time and Task Tracking System
 
Tipos de la conducta
Tipos de la conductaTipos de la conducta
Tipos de la conducta
 
Ecuaciones diferenciales en Derivadas parciales
Ecuaciones diferenciales en Derivadas parcialesEcuaciones diferenciales en Derivadas parciales
Ecuaciones diferenciales en Derivadas parciales
 
Ryan Marasigan Resume New
Ryan Marasigan Resume NewRyan Marasigan Resume New
Ryan Marasigan Resume New
 
IRC SF Spring 06 Newsletter
IRC SF Spring 06 NewsletterIRC SF Spring 06 Newsletter
IRC SF Spring 06 Newsletter
 
Advance ecommerce Website Development
Advance ecommerce Website DevelopmentAdvance ecommerce Website Development
Advance ecommerce Website Development
 
Grandview JULY 2016
Grandview JULY 2016Grandview JULY 2016
Grandview JULY 2016
 
FinalCV
FinalCVFinalCV
FinalCV
 
Corporate blog sinnvoll einsetzen
Corporate blog sinnvoll einsetzenCorporate blog sinnvoll einsetzen
Corporate blog sinnvoll einsetzen
 
Wordpress website development for Furniture designer & manufacturer in UK
Wordpress website development for Furniture designer & manufacturer in UKWordpress website development for Furniture designer & manufacturer in UK
Wordpress website development for Furniture designer & manufacturer in UK
 

Similar to INTERNSHIP REPORT

HDinsight Workshop - Prerequisite Activity
HDinsight Workshop - Prerequisite ActivityHDinsight Workshop - Prerequisite Activity
HDinsight Workshop - Prerequisite ActivityIdan Tohami
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features Cireson
 
Hol 1940-01-net pdf-en
Hol 1940-01-net pdf-enHol 1940-01-net pdf-en
Hol 1940-01-net pdf-endborsan
 
Migrating Existing ASP.NET Web Applications to Microsoft Azure
Migrating Existing ASP.NET Web Applications to Microsoft AzureMigrating Existing ASP.NET Web Applications to Microsoft Azure
Migrating Existing ASP.NET Web Applications to Microsoft AzureIlyas F ☁☁☁
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Concentrated Technology
 
Microsoft azure interview questions
Microsoft azure interview questionsMicrosoft azure interview questions
Microsoft azure interview questionspkmsexchange
 
NET Event - Migrating WinForm
NET Event - Migrating WinFormNET Event - Migrating WinForm
NET Event - Migrating WinFormRaffaele Garofalo
 
A report on mvc using the information
A report on mvc using the informationA report on mvc using the information
A report on mvc using the informationToushik Paul
 
STSADM Automating SharePoint Administration - Tech Ed South East Asia 2008 wi...
STSADM Automating SharePoint Administration - Tech Ed South East Asia 2008 wi...STSADM Automating SharePoint Administration - Tech Ed South East Asia 2008 wi...
STSADM Automating SharePoint Administration - Tech Ed South East Asia 2008 wi...Joel Oleson
 
Global Advertising, Inc.
Global Advertising, Inc.Global Advertising, Inc.
Global Advertising, Inc.Nicole Wells
 
Windows Server 2008 Management
Windows Server 2008 ManagementWindows Server 2008 Management
Windows Server 2008 ManagementHi-Techpoint
 
Windows Server 2008 Management
Windows Server 2008 ManagementWindows Server 2008 Management
Windows Server 2008 ManagementHi-Techpoint
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShellConcentrated Technology
 
15 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 201815 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 2018Mercury Solutions
 
2009 10-08 soa-og_itil_does service in it service rhyme with service as in so...
2009 10-08 soa-og_itil_does service in it service rhyme with service as in so...2009 10-08 soa-og_itil_does service in it service rhyme with service as in so...
2009 10-08 soa-og_itil_does service in it service rhyme with service as in so...Peter Rosenberg
 
Sql interview question part 9
Sql interview question part 9Sql interview question part 9
Sql interview question part 9kaashiv1
 
Sql interview-question-part-9
Sql interview-question-part-9Sql interview-question-part-9
Sql interview-question-part-9kaashiv1
 
AzureDevOps_Developer.pdf
AzureDevOps_Developer.pdfAzureDevOps_Developer.pdf
AzureDevOps_Developer.pdfkmani5
 

Similar to INTERNSHIP REPORT (20)

HDinsight Workshop - Prerequisite Activity
HDinsight Workshop - Prerequisite ActivityHDinsight Workshop - Prerequisite Activity
HDinsight Workshop - Prerequisite Activity
 
The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features  The Most Underutilized Configuration Management Features
The Most Underutilized Configuration Management Features
 
Hol 1940-01-net pdf-en
Hol 1940-01-net pdf-enHol 1940-01-net pdf-en
Hol 1940-01-net pdf-en
 
Migrating Existing ASP.NET Web Applications to Microsoft Azure
Migrating Existing ASP.NET Web Applications to Microsoft AzureMigrating Existing ASP.NET Web Applications to Microsoft Azure
Migrating Existing ASP.NET Web Applications to Microsoft Azure
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
 
Microsoft azure interview questions
Microsoft azure interview questionsMicrosoft azure interview questions
Microsoft azure interview questions
 
NET Event - Migrating WinForm
NET Event - Migrating WinFormNET Event - Migrating WinForm
NET Event - Migrating WinForm
 
A report on mvc using the information
A report on mvc using the informationA report on mvc using the information
A report on mvc using the information
 
STSADM Automating SharePoint Administration - Tech Ed South East Asia 2008 wi...
STSADM Automating SharePoint Administration - Tech Ed South East Asia 2008 wi...STSADM Automating SharePoint Administration - Tech Ed South East Asia 2008 wi...
STSADM Automating SharePoint Administration - Tech Ed South East Asia 2008 wi...
 
Global Advertising, Inc.
Global Advertising, Inc.Global Advertising, Inc.
Global Advertising, Inc.
 
Windows Server 2008 Management
Windows Server 2008 ManagementWindows Server 2008 Management
Windows Server 2008 Management
 
Windows Server 2008 Management
Windows Server 2008 ManagementWindows Server 2008 Management
Windows Server 2008 Management
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShell
 
15 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 201815 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 2018
 
2009 10-08 soa-og_itil_does service in it service rhyme with service as in so...
2009 10-08 soa-og_itil_does service in it service rhyme with service as in so...2009 10-08 soa-og_itil_does service in it service rhyme with service as in so...
2009 10-08 soa-og_itil_does service in it service rhyme with service as in so...
 
Ebook9
Ebook9Ebook9
Ebook9
 
Sql interview question part 9
Sql interview question part 9Sql interview question part 9
Sql interview question part 9
 
Ebook9
Ebook9Ebook9
Ebook9
 
Sql interview-question-part-9
Sql interview-question-part-9Sql interview-question-part-9
Sql interview-question-part-9
 
AzureDevOps_Developer.pdf
AzureDevOps_Developer.pdfAzureDevOps_Developer.pdf
AzureDevOps_Developer.pdf
 

INTERNSHIP REPORT

  • 1. INTERNSHIP REPORT January- February 2016 Student Muhammad TalhaBashir (SSUET, 101) Program Bachelors in Computer Science , Bachelors in Computer Engineering Department Information Systems Supervisor Sir Ghulam Muhammad Co- Supervisor Mam Mehar Afroz
  • 2. Table of Contents TABLE OF CONTENTS ......................................................................................................................................................................2 INTERNSHIP OBJECTIVES................................................................................................................................................................3 INTRODUCTION ...............................................................................................................................................................................4 DESCRIPTION OF THE INTERNSHIP ..............................................................................................................................................5  REMOTE ASSISTANCEBY MICROSOFT SCCM 2012 .................................................................................................................6  VMWARE WITH IT’S FEATURES .............................................................................................................................................10  HYPERVISOR WITH IT’S FEATURES ..........................................................................................................................................11  HOW TO BREAK MAC ADDRESS FILTERING............................................................................................................................15  ROUTER AND SWITCH DIFFERENCE ...................................................................................................................................19  RESETTING A CISCO SWITCH TO DEFAULT...............................................................................................................................21  CONCLUSION....................................................................................................................................................................22 REFLECTION ON THE INTERNSHIP..............................................................................................................................................23  THEFUNCTIONING AND WORKING CONDITIONS OF AGOVERNMENTAL ORGANIZATION.............................................................23  THEINFLUENCEON FUTURE CAREER PLANS.............................................................................................................................23 CONCLUSION ..................................................................................................................................................................................24
  • 3. InternshipObjectives The reason I choose to follow an internship is because I wanted to benefit from the experience. I wanted a new challenge and to learn, improve and develop new sets of skills. During my internship 2 major competencies are central: Working as a Helpdesk Troubleshooting Personnel, performing duties and activities and analyzing them from different perspectives. As working as a Helpdesk Troubleshooting Personnel, where I have to be able to perform realistic troubleshooting. Next, I participated in different sessions, in which the first steps were taken in the development of our personality. The objective was to elaborate ourselves and work for the National interest of the State of Pakistan. Besides this, to also recognize our duties honestly to the family, friends, other people, work organizations and most importantly to the humanity. At last this internship has given me new insights and motivation to pursue a career inside Pakistan. To prepare myself for my future career I can improve several things. I can work on my communication skills so that I am able to present and express myself more confidently. I could perform certain tasks in research better if I have more experience in the research methodologies.
  • 4. Introduction This report is a short description of my four weeks internship carried out as compulsory component of the BSCS. Since my I am interested in Computer Networking and especially of Troubleshooting, the work was concentrated on the Hardware tasks, Troubleshooting and Theoretical tasks. At the beginning of the internship I formulated several learning goals, which I wanted to achieve:  to understand the functioning and working conditions of a governmental organization  to see what is like to work in a professional environment  to see if this kind of work is a possibility for my future career  to use my gained skills and knowledge  to see what skills and knowledge I still need to work in a professional environment  to learn about research methodologies (field methods/methods to analyze data)  to get fieldwork experience/collect data in an environment unknown for me  to get experience in working with persons from another culture  to enhance my communication skills  to build a network This internship report contains my activities that have contributed to achieve a number of my stated goals. In the following chapter a description of the organization Pakistan State Oil Company LTD. and the activities is given. After this a reflection on my functioning, the unexpected circumstances and the learning goals achieved during the internship are described. Finally I give a conclusion on the internship experience according to my learning goals.
  • 5. Descriptionof the Internship Almost every project contains a part of exploring things in the field. This could be exploring softwares, working environment and troubleshooting etc. Because of too much busyness of the staff this work is much less and could be increased in much amount which would also become manageable by me but rather then that given amount of work was still very exploring and interesting. An overview of the tasks is as below,  To explore features and working of Microsoft System Center Configuration Manager (SCCM) 2012 and prepare a presentation on what I explore.  To learn troubleshooting using Microsoft System Center Configuration Manager (SCCM) 2012 and solve daily issues being figured out in PSO house.  To explore VMWare and Hypervisor and prepare report on what I explore.  To explore “How to break MAC Address Filtering”, “Difference between Routers and Switches” and “How to reset password on a switch” and formulate the answers in the form of assignment.  To make initial installations and configurations on new desktop machines.  To learn concepts of Computer Networking related to the course of “Cisco Certified Network Associate (CCNA)”.
  • 6.  Remote Assistance by Microsoft SCCM 2012
  • 7.
  • 8.
  • 9.
  • 10.  VMWare with it’s Features  On July 12, 2011 at the VMware Cloud Infrastructure Launch Event in San Francisco,CA VMware CEO Paul Maritz and CTO Steve Herrod announced an all new version of vSphere – vSphere 5. Along with vSphere 5 came a new version of vCloud Director (version 1.5), vShield (now version 5), a new vSphere Storage Appliance (VSA), and tons of new features.  I was one of the ~30 people that attended this launch event live and I was also one of the beta testers of the productso I know, firsthand, how many new features are in vSphere 5. While the listis long and impressive, in the interestof time,you may want a succinctlistof the features that are mostmeaningful to you, as a VMware Admin. To provide that, let’s now cover the top 5 new features of vSphere 5 that you need to care mostabout. 1. vCenter Linux-based virtual appliance and the vSphere Web Client  Included with vCenter in vSphere 5 is the new version of vCenter that can be installed as a Linux-based virtual appliance – called the vCenter Server Appliance (vCSA). This is something thatVMware has been talking aboutfor a long time but now it is reality. With the new vCSA, you don’tneed to buy a Windows Server OS license to install vCenter on nor do you have to take the time to install Windows Server and then install vCenter. The vCenter appliance has a built-in local database or itcan support remote databases to store vCenter data (but SQL Server is not yet supported for that). This appliance option for vCenter makes getting vCenter up and running quick and easy.  Another piece of vCenter 5 is the option to use the vSphere Web Clientinstead of the vSphere Client. However, you should know thatthe vSphere Web Clientdoesn’tdo 100% of the things that the traditional Windows vSphere Clientdoes so you still have to keep the traditional version installed and available.The new vSphere Web clientis,however, very visually appealing and easyto use.Plus,it doesn’trequire anyinstallation on the client side (butit does require Adobe Flash).  To get started with the vSphere Web client, you do, however, have to install the vSphere Client Web (Server). This is simplyan installation thatis done on the vCenter server. Once completed,you have to authorize the vCenter server to talk to the web client(justa couple of clicks of the mouse) and then you can pointyour remote web browser to the server with this URL https://vcenter5:9443/vsphere-client. 2. vSphere Storage Appliance (VSA)  Another big piece of the vSphere 5 product launch was the announcementofthe new VMware vSphere Storage Appliance (or VSA). Those of us who have used software-based storage appliances before are very familiar with the term “VSA” (or virtual SAN appliance).While VMware’s new option doesn’trequire any hardware,it doesn’tquite work like traditional VSAs either.  The new VMware VSA is actually made up of two or three virtual machines spread across two or three ESXi 5 servers.These virtual machines work together to presentthe local storage on that hostas NFS storage to the ESXi servers.The four things that make it unique compared to other VSAs are: 1) It’s fully supported by VMware for advanced features like vMotion, svMotion, VMHA, FT, and DRS. 2) It’s super-easyto install and use with vSphere 3) The storage data that is stored locally is fully redundantand spread across other hosts such that if any single hostis lost,that data is still available on other hosts. 4) It is fully managed from within the vSphere Client  You should also know thatit is not included with vSphere but is an additional cost.It also needs to be installed on “vanilla ESXi hosts” (servers thathave had no configuration or very little configuration done to them).
  • 11. 3. Storage Distributed Resource Scheduler (SDRS)  One of the mostpowerful new features of vSphere (included onlyin vSphereEnterprise Plus) combines the monitoring ofstorage latencywith VMware’s popular distributed resource scheduler (DRS). With SDRS, latency of vSpheredatastores is monitored and ifa VM isn’treceiving the performance thatit needs,that VM’s virtual disk will be svMotion’ed over to another data store where it can get better performance. 4. Profile-Driven Storage  With profile-drive storage,new in vSphere 5 Enterprise Plus,you can ensure application service levels match available storage performance.Virtual machines can be pre-defined to receive a certain level of performance and then when the VM is created or powered on, it will be placed on storage that offers it the correct performance needs for the VM/app. 5. Auto-Deploy  With vSphere 5 auto-deploy, you can provision new ESXi hosts amazinglyfast.With this new method,the physical server boots over the network using PXE/gPXE, contacts the auto-deploy server, and loads ESXi into memory.Then, the auto-deployserver works with the vCenter server to get the new ESXi hostproperly configured (according to hostprofiles and new vSphere 5 answer files).With auto-deployin vSphere 5, you can deploytens or hundreds ofESXi servers faster than ever before possible.For more information,watch this presentation on vSphere 5 auto-deploy.  Bonus Notes  With the introduction of vSphere 5, also came the introduction ofa new licensing model.From the momentthatthis was announced in the private VMware briefing I attended, this new pricing model has been an emotional and contentious topic.With vSphere 5, customers will purchase the same licenses based on the number ofCPU sockets thatthey want to licenses.Whatis new is that each of those licenses will be entitled to a certain amountof pooled vRAM. This new measurement (pooled vRAM) is the total amountof configured virtual memory,of powered on virtual machines, across all hosts connected to the same vCenter. While this wasn’tthe per-VM pricing that many anticipated,this is still a move to a “the more you use,the more you pay”-model.For more detailed information on this model,see myarticle Opinion:What you need to know aboutvSphere 5's new pricing model.  With vSphere 5, there is no more “ESX Server”. Just as VMware promised in the past,the ESX Server productwith a service console is gone and now only ESXi Server is available.  Summary  vSphere 5’s features are strong and unique in the marketplace.For large enterprises,features like storage DRS and profile-driving storage will be huge.For the SMB, the VSA and Linux-based vCenter virtual appliance are the big benefits.While the costto use vSphere 5 may be in question due to the vRAM pooled pricing,with so many new features it may be a hard release to pass up!  Hypervisor with it’s Features  A hypervisor or virtual machine monitor (VMM) isa piece of computersoftware, firmware orhardware that createsandruns virtual machines.
  • 12.  A computeronwhicha hypervisorisrunningone ormore virtual machinesisdefinedas a hostmachine.Each virtual machine iscalleda guestmachine.The hypervisorpresents the guestoperatingsystemswitha virtual operating platform andmanagesthe executionof the guestoperatingsystems.Multiple instances of avarietyof operating systemsmayshare the virtualizedhardware resources. 1) Type-1, native or bare-metal hypervisors  These hypervisorsrundirectlyonthe host'shardware to control the hardware and to manage guestoperatingsystems.Forthisreason, theyare sometimescalled bare metal hypervisors.A guestoperatingsystemrunsasa process onthe host.The first hypervisors,whichIBMdevelopedinthe 1960s, were native hypervisors.[2] These includedthe testsoftware SIMMON and the CP/CMS operatingsystem(the predecessorof IBM's z/VM). Modern equivalentsinclude Oracle VM Server for SPARC, Oracle VM Server for x86, the Citrix XenServer, VMware ESX/ESXi and Microsoft Hyper-V 2008/2012. 2) Type-2 or Hosted Hypervisors  These hypervisorsrunona conventionaloperatingsystemjustasothercomputer programsdo. Type-2hypervisorsabstractguestoperatingsystemsfromthe host operatingsystem. VMware Workstation,VMware Player, Virtual Box and QEMU are examplesof type-2hypervisors.  However,the distinctionbetweenthesetwotypesisnotnecessarilyclear. Linux's Kernel-based Virtual Machine (KVM) and FreeBSD's bhyve are kernel modules[3] that effectivelyconvertthe hostoperatingsystemtoa type-1 hypervisor.[4] Nevertheless,since Linuxdistributions andFreeBSDare still general- purpose operatingsystems,withotherapplicationscompetingforVMresources,KVM and bhyve canalso be categorizedastype-2hypervisors.  Microsoft'sHyper-V isoftenrunon topof WindowsServerfull installation.Thiswould make it type-2inthisscenario.  In 2012, a US software developmentcompanycalled LinuxWorks proposedatype-0 (zero) hypervisor—one withnokernel oroperatingsystem whatsoever—whichmight not be entirelypossible.  Operating system support  Several factorsledtoa resurgence around2005 in the use of virtualization technology among Unix, Linux, and other Unix-like operatingsystems.  Expandinghardware capabilities,allowingeachsinglemachine todomore simultaneous work  Effortsto control costs andto simplifymanagementthroughconsolidationof servers  The needto control large multiprocessor and cluster installations,forexample in server farms and render farms
  • 13.  The improvedsecurity,reliability,anddevice independence possible fromhypervisor architectures  The abilitytorun complex,OS-dependentapplicationsindifferenthardware orOS environments  Major Unix vendors,including Sun Microsystems, HP, IBM, and SGI, have beenselling virtualizedhardwaresince before 2000. These have generallybeenlarge,expensive systems (inthe multimillion-dollarrange atthe highend),althoughvirtualizationhas alsobeenavailable onsome low- andmid-range systems,suchas IBM's pSeries servers,Sun/Oracle'sT-seriesCool Threadsserversand HP Superdome seriesmachines.  Although Solaris hasalwaysbeenthe onlyguestdomainOSofficiallysupportedby Sun/Oracle ontheir Logical Domains hypervisor,asof late 2006, Linux (Ubuntuand Gentoo),and FreeBSD have beenportedtorun on topof the hypervisor(andcanall run simultaneouslyonthe same processor,asfullyvirtualizedindependentguestOSes). WindRiver"Carrier Grade Linux" alsoruns onSun's Hypervisor Full virtualization on SPARC processorsprovedstraightforward:since itsinceptioninthe mid-1980sSun deliberatelykeptthe SPARCarchitecture cleanof artifactsthatwouldhave impeded virtualization.(Comparewithvirtualizationonx86 processorsbelow.)  HP callsitstechnology tohostmultiple OStechnologyonits Itanium poweredsystems "IntegrityVirtual Machines"(IntegrityVM).Itaniumcanrun HP-UX, Linux,Windows andOpenVMS. Exceptfor OpenVMS,tobe supportedina laterrelease,these environmentsare alsosupportedasvirtual serversonHP'sIntegrityVMplatform.The HP-UX operatingsystemhoststhe IntegrityVMhypervisorlayerthatallowsformany importantfeaturesof HP-UXto be takenadvantage of and providesmajor differentiationbetweenthisplatformandothercommodityplatforms - suchas processorhotswap,memoryhot swap,anddynamickernel updateswithoutsystem reboot.While itheavilyleveragesHP-UX,the IntegrityVMhypervisorisreallyahybrid that runson bare-metal while guestsare executing.Runningnormal HP-UXapplications on an IntegrityVMhostis heavily discouraged,because IntegrityVMimplementsits ownmemorymanagement,schedulingandI/Opoliciesthatare tunedforvirtual machinesandare notas effective fornormal applications.HPalsoprovidesmore rigid partitioningof theirIntegrityandHP9000 systemsbywayof VPARand nPar technology, the formerofferingsharedresource partitioningandthe latterofferingcomplete I/O and processingisolation.The flexibilityof virtual serverenvironment(VSE) hasgiven wayto its use more frequentlyinnewerdeployments.  IBM providesvirtualizationpartitiontechnologyknownas logical partitioning (LPAR) on System/390, zSeries, pSeries and iSeries systems.ForIBM's PowerSystems,the PowerHypervisor(PowerVM) functionsasanative (bare-metal)hypervisorinfirmware and providesisolationbetweenLPARs.Processorcapacity isprovidedtoLPARsineither a dedicatedfashionoronan entitlementbasiswhere unusedcapacityisharvestedand can be re-allocatedtobusyworkloads.Groupsof LPARscan have theirprocessor
  • 14. capacitymanagedas if theywere ina "pool" - IBM refers tothiscapabilityasMultiple Shared-ProcessorPools(MSPPs) andimplementsitinserverswith the POWER6 processor.LPARand MSPP capacityallocationscanbe dynamically changed.Memoryis allocatedtoeach LPAR(at LPAR initiationordynamically) andis address-controlledbythe POWERHypervisor.Forreal-mode addressingbyoperating systems(AIX,Linux,IBMi),the POWER processors(POWER4 onwards) have designed virtualizationcapabilitieswhere ahardware address-offsetisevaluatedwiththe OS address-offsettoarrive atthe physical memoryaddress.Input/output(I/O) adapters can be exclusively"owned"byLPARsorsharedby LPARsthroughan appliance partition knownas the Virtual I/OServer(VIOS).The PowerHypervisorprovidesforhighlevelsof reliability,availabilityandserviceability(RAS) byfacilitatinghotadd/replace of many parts (model dependent:processors,memory,I/Oadapters,blowers,powerunits,disks, systemcontrollers,etc.) Itis interestingtonote thatbecause thisPowerVMhypervisor isintegral andpart of everysingle POWERsystemIBMhasmade since the POWER4 systems,thateverybenchmarkeverrunonthose systemsistechnicallyvirtualizedand as the benchmarkresultsindicate thisvirtualizationworksextremelywell.Furthermore, it isextremelysecure andinfactto date there has neverbeenasingle reportedsecurity flawreportedinthe PowerVMhypervisoritself.  Similartrendshave occurredwithx86/x86-64 serverplatforms,where open- source projectssuchas Xen have ledvirtualizationefforts.These include hypervisors builtonLinux and Solariskernelsaswell ascustomkernels.Since these technologies span fromlarge systemsdowntodesktops,theyare describedinthe nextsection.  Security implications  The use of hypervisortechnologyby malware and rootkits installingthemselvesasa hypervisorbelowthe operatingsystemcanmake themmore difficulttodetectbecause the malware couldinterceptanyoperationsof the operatingsystem(suchassomeone enteringapassword) withoutthe anti-malwaresoftwarenecessarilydetectingit(since the malware runsbelow the entire operatingsystem).Implementationof the concept has allegedlyoccurredinthe Subvert laboratoryrootkit(developedjointly by Microsoft andUniversity of Michigan researchersaswell asin the Blue Pill malware package.However,suchassertionshave beendisputedbyotherswhoclaim that itwouldbe possible todetectthe presence of ahypervisor-basedrootkit.  In 2009, researchersfromMicrosoftand North Carolina State University demonstrated a hypervisor-layeranti-rootkitcalled hook safe thatcan provide genericprotection againstkernel-mode rootkits.
  • 15.  How To Break MAC address filtering MAC Address: A media access control address (MAC address), also called physical address, is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and Wi-Fi. Logically, MAC addresses are used in the media access control protocol sublayer of the OSI reference model. MAC addresses are most often assigned by the manufacturer of a network interface controller (NIC) and are stored in its hardware, such as the card's read-only memory or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address (BIA). It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. This can be contrasted to a programmed address, where the host device issues commands to the NIC to use an arbitrary address. A network node may have multiple NICs and each NIC must have a unique MAC address. MAC addresses are formed according to the rules of one of three numbering name spaces managed by the Institute of Electrical and Electronics Engineers (IEEE): MAC-48, EUI-48, and EUI-64. The IEEE claims trademarks on the names EUI-48 and EUI-64, in which EUI is an abbreviation for Extended Unique Identifier. How To Check Your MAC Address: Windows NT, 2000, XP, Vista, Windows 7: 1. Click Start then Run (in Windows 7, Start and type in the Search Programs and Files box.) 2. Enter: cmd 3. Enter: ipconfig /all If the output scrolls off your screen, and it will on Vista and Windows 7, use: ipconfig /all | more 4. The Physical Address is your MAC address; it will look like 00-15-E9-2B-99-3C. You will have a physical address for each network connection that you have.
  • 16. This the ipconfig output on Windows XP. This XP computer has two network connections -- an Ethernet connection, labeled Local Area Connection, and a wireless connection, labeled Wireless Network Connection. MAC Filtering: To prevent any unwanted device to connect to your internet connection MAC Filtering is done. This allows only the certain MAC Address to access to the network. This is done to provide some security to your network but this filtering can be break and the method to do this is known as “MAC Address Spoofing”.
  • 17. MAC Address Spoofing: MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address is hard-coded on a network interface controller (NIC) and cannot be changed. However, there are tools which can make an operating system believe that the NIC has the MAC address of a user's choosing. The process of masking a MAC address is known as MAC spoofing. Essentially, MAC spoofing entails changing a computer's identity, for any reason, and it is relatively easy. The changing of the assigned MAC address may allow the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another network device. MAC spoofing is done for legitimate and illicit purposes alike. How To change MAC address? To change MAC Address Windows users can use Macshift and Linux users can use the Macchanger command. The following print screen shows how to change a MAC address in Linux. You can find a print screens for both Windows and Linux on the Macshift and Macchanger pages. Change MAC address in Linux (Ubuntu): Let's take a look at the details. If you go with the Macchanger utility in Linux (Ubuntu), you can use it as follows in your terminal window: sudomacchanger -m 12:34:56:12:34:56 [adapter name] Sudo tells the computer that you are executing the command as the administrator. Macchanger is the utility to change your MAC address. Option -m is to be used together with the MAC address parameter followed by the name of the network interface for which you wish to change the MAC address. The name of the wireless interface (rausb0, wlan0, wifi0, etc.) can be found by typing iwconfig. If you get the can’t change MAC: interface up or not permission: Device or resource busy message when executing machinery, you need to disable the device first. That can be done by typing the sudoifconfig [adapter name] down command, where the [adapter name] is the name of your network interface again. Do not forget to enable the interface back after changing the MAC address. You can verify your new MAC by typing sudoifconfig [adapter name].
  • 18. Macchanger is a Linux-based tool for network adapter MAC address modification. This print screen shows how to change MAC address of your network adapter. Now you are free to authenticate and associate into your desired network. Change MAC address in Windows: Changing your MAC address in Windows is even easier. You can use for example the Macshift utility. Macshift is a Windows-based tool which allows you to change your MAC address. Execute the command line to change your MAC address. Verify results in ipconfig /all.
  • 19.  ROUTER and SWITCH Difference Used for Router Connecting two or more networks Switch Connecting two or more nodes in the same network or different network Function Directs data in a network. Passes data between home computers, and between computers and the modem. Allow to connect multiple device and port can be manage, Vlan can create security also can apply Used in (LAN, MAN, WAN) LAN, WAN LAN Transmission Type At Initial Level Broadcast then Uni- cast & Multicast First broadcast; then unicast & multicast as needed. Data Transmission form Packet Frame (L2 Switch) Frame & Packet (L3 switch) Layer Network Layer (Layer 3 devices) Data Link Layer. Network switches operate at Layer 2 of the OSI model. Ports 2/4/8 Switch is multi port Bridge. 24/48 ports Device Type Networking device Active Device (With Software) & Networking device Table Store IP address in Routing table and maintain address at its own. Switches use content accessible memory CAM table which is typically accessed by ASIC (Application Specific integrated chips). Transmission Mode Full duplex Half/Full duplex Broadcast Domain In Router, every port has its own Broadcast domain. Switch has one broadcast domain [unless VLAN implemented] Definition A router is a networking device that connects a local network to other local networks. At the Distribution Layer of the network, routers direct traffic and perform other functions critical to efficient network operation. A network switch is a computer networking device that is used to connect many devices together on a computer network. A switch is considered more advanced than a hub because a switch will on send msg to device that needs or request it Device Category Intelligent Device Intelligent Device Bandwidth sharing Bandwidth sharing is Dynamic (Enables either static or dynamic bandwidth sharing for modular cable interfaces. The default percent-value is 0. The percent-value range is 1- 96.) There is no sharing port can be 10, 100, 1000 and 10000 Mbps individual
  • 20. Speed 1-10 Mbps (Wireless); 100 Mbps (Wired) 10/100 Mbps, 1 Gbps Routing Decision Take faster routing decisions Take more time for complicated routing decisions NAT (Network Address Translation) Routers can perform NAT Switches cannot perform NAT Faster In a different network environment (MAN/ WAN), a router is faster than an L3 switch. In a LAN environment, an L3 switch is faster than a router (built in switching hardware) Features Firewall VPN Dynamic handling of Bandwidth Priority range On/Off setting of port VLAN Port mirroring Examples Linksys WRT54GL Juniper MX & EX series Cisco 3900, 2900, 1900 Alcatel's OmniSwitch 9000; Cisco Catalyst switch 4500 and 6500 (10 Gbps) Address used for data transmission Uses IP address Uses MAC address
  • 21.  Resetting a Cisco Switch to Default  Connect the console cable to your PC The first step is to connect a console cable to the COM port of your workstation to gain access to the switch. If your workstation doesn't have a COM port, you'll need a Serial to USB adapter  Download Putty and Start a Serial Connection There are several software productsthatwill allow youtodothis,butI recommendusingPutty. It isthe mostacceptedandeasiesttouse in myopinion. To gain accessto the console launchPuttyandselectthe Serial radiusbutton.  Double Check Serial Settings To connectto a Ciscodevice viaaSerial sessionafew settingsneedtobe confirmed. COMPort - (be sure the COMnumberiscorrect, if you are usingausb adapteritmay not default to usingCOM1. It couldbe COM3 or 4, You'll needtoconfirmby lookingindevice manager) Data Bits - set to 8 StopBits - setto 1 Parity - setto None FlowControl - setto None Once the settingsare confirmedclickOpen,whichstartsthe session.  Plug in the Console cable Nowwiththe terminal windowsopen,plugthe consolecable intothe console portof the switch typicallylocatedonthe backand labeledconsole.  Hold the mode button on the form of the switch Before poweringonthe switchholdthe mode buttonlocatedatthe frontof the switchonthe leftside.  Power on the switch CiscoSwitchesdonothave an onoff switch,theyare simplypoweredonbysupplyingpowerto them.Atthisnow while stillholdingthe mode buttondown,pluginthe powercable.  Release mode button once it boots Once characters are displayedonthe screenrelease the mode button.  Press ctrl + pausebreak on the keyboard While the bootprocessisinorder hitctrl+pausebreakonyourkeyboard.If youare usinga laptopmayneedto use ausbkeyboardto hitthese keys.
  • 22.  Enter the following commands Switch:flash_init Switch:dirflash: Switch:flash:config.textflash:config.backup Switch:boot  Rename Configuration files & Remove passwords Wouldyoulike toenterthe inital configurationdialog?no Switch> enable SW1#renameflash:config.backupconfig.text SW1#copy flash:config.textsystem:running-config SW1#configterminal SW1(config)#noenablesecret. SW1(config)#exit SW1(config)#wr  Conclusion You nowhave gainedaccessto the switchand successfullyreturnedittofactorydefault.You may alsowantto delete the vlan.datfile asitisnot removedinthe processof deletingthe start up or runningconfig.
  • 23. Reflectionon the Internship In this chapter I reflect on the internship. Regarding my learning goals I shortly discuss my experiences if I have achieved my goal, whether I experienced difficulties and what I think I have to improve.  The functioning and working conditions of a governmental organization At the beginning I did not have any experience of working within a Governmental Organization. I understand better the functioning like the organization structure and setting up projects. Trying to operate as a profitable organization I saw the importance of financial support and personal capacity. There was often uncertainty whether and when projects could start. In the first instance the dependence and uncertainty was annoying, but it forced me to be flexible and to see what other things I could do.  The influence on future career plans Through this internship, I have seen what elements of my career I like and I got enthusiastic again to continue in Computer Sciences. I have found out that part of the work should contain practical work as I did this much less in the internship.
  • 24. Conclusion On the whole, this internship was a useful experience. I have gained new knowledge, skills and met many new people. I achieved several of my learning goals, however for some the conditions did not permit. I got insight into professional practice. I learned the different facets of working within a Governmental Organization. I experienced that IT, as in everyorganization, is an important factor for the progress of that organization. Related to my study I learned more about Computer Networking and the problems faced in it. There is still a lot to discover and to improve. Furthermore I experienced that it is of importance that the education is objective and that you have to be aware of the view of other people. The internship was also good to find out what my strengths and weaknesses are. This helped me to define what skills and knowledge I have to improve in the coming time. It would be better that the knowledge level of the language is sufficient to contribute fully to projects. After my bachelors I think that I could start my working career. However I could perform certain tasks in research better if I practice/know more the research methodologies applied in certain studies. It would also be better if I can present and express myself more confidently. At last this internship has given me new insights and motivation to pursue a career in Computer Sciences.