Intern Report On Networking

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 47

lOMoARcPSD|28772237

lOMoARcPSD|28772

Final lnternship Report


On

"Network Support"
At

Sunrise Bank Limited


Under the supervision of

Mr.Saugat Raj Gautam

Submitted By:
Md Anbarul Raeen (T.U. Symbol No.

21113/075) BSc. CSIT

Department of Computer Science and Information Technology

Asian College Of Higher Studies

Ekantakuna, Kathmandu

Submitted to

Office of the Dean Institute of Science and Technology, Trihhuvan University

Kirtipur, Nepal

Internship report submitted in fulfillment of the requirement for the degree of bachelor's in
computer science and information technology (BSc. CSIT) of Tribhuvan University (TU)

August, 2023
lOMoARcPSD|28772237

SUPERVISOR'S RECOMMENDATION

I hereby recommend that this internship report prepared under my supervision by


Md.Anbarul Raeen is accepted as fulfilling in partial requirements for the degree of
Bachelor of Science in Computer Science and Information Technology. In my best
knowledge, this an original work in Computer Science.

…………………………………….
Mr. Saugat R. Gautam
Internal Supervisor
Asian College Of Higher Studies
Ekantakuna,Kathmandu.

i
lOMoARcPSD|28772237

LETTER OF APPROVAL

This is to certify that this internship report prepared by Md.Anbarul Raeen in partial fulfillment of
the requirement for the degree of B.Sc. in Computer Science and Information Technology of
Tribhuvan University be processed for the evaluation.

………………………… …………………………..

Mr. pranaya Nakarmi Mr. Saugat Raj Gautam


Bsc. CSIT Coordinator Intern Supervisor
Asian College of Higher Studies Asian College of Higher Studies
Ekantakuna, Kathmandu Ekantakuna, Kathmandu

………………………… …………………………..

Mr. Jitendra Kumar Sah Mr. xxxxxxx xxxxxx


Branch Manager External Examiner
Sunrise Bank Limited Tribhuvan University
Janakpur-8, Dhanusha Kirtipur, Kathmandu

ii
lOMoARcPSD|28772237

ACKNOWLEDGMENT

The internship opportunity I had at Sunrise Bank Limited was a great chance for learning
and professional development. I did not only learn Networking but also got familiar to best
industrial practices during my internship period. Therefore, I consider myself as a very lucky
individual as I was provided with an opportunity to be a part of it.

I would also like to thank my supervisor Mr. Saugat raj Gautam who has supervised me
with the internship as well as this report. Likewise, I would like to thank Coordinator of our
college Mr. Pranaya Nikarmi for his continuous support and encouragement throughout
these years of my bachelor.

I would like to express my gratitude towards my mentor Branch Manager Mr.Jitendra


Kumar Sah of Sunrise Bank Limited who provided me with an opportunity to work as an
intern and helped me to gain knowledge on Networking.

Finally, my thanks and appreciations go to each and every one of my colleagues and the
entire Sunrise Bank Limited team, who irrespective of the situation, always encouraged and
supported me to prepare this report.

Thanking You.
Md. Anbarul Raeen
T.U. Exam Symbol No. 21113/075

iii
lOMoARcPSD|28772237

LIST OF FIGURES

Fig 1 Organizational hierarchy...........................................................................................11

Fig 2 Network Address Design..........................................................................................14

Fig 3 Star Topology............................................................................................................24

Fig 4 Switch.......................................................................................................................24

Fig 5 Router........................................................................................................................25

iv
lOMoARcPSD|28772237

LIST OF TABLES

Table 1 Weekly Log...........................................................................................................17

Table 2 Network Addresses used for each department......................................................19

Table 2 Test Cases and Results.........................................................................................31

v
lOMoARcPSD|28772237

LIST OF ABBREVIATIONS

AAA: Authentication, authorization, and accounting

SRBL: Sunrise Bank Limited

ACL: Access Control List

CDP: Cisco Discovery Protocol

CMS: Content Management System

DNS: Domain Name System

DRC: Disaster Recovery Centers

GIDC: Government Integrated Data Center

G2B: Government to Business

G2C: Government to Citizen

G2G: Government to Government

ICT: Information and Communication Technology

IP: Internet protocol

IT: Information Technology

OPMCM: Office of Prime Minister and Council of Ministers

SDLC: Synchronous Data Link Control

VLAN: virtual local area network

vi
lOMoARcPSD|28772237

TABLE OF CONTENTS

SUPERVISOR'S RECOMMENDATION.............................................................................i

LETTER OF APPROVAL.....................................................................................................ii

ACKNOWLEDGMENT........................................................................................................iii

LIST OF FIGURES................................................................................................................iv

LIST OF TABLES...................................................................................................................v

LIST OF ABBREVIATIONS................................................................................................vi

CHAPTER ONE: INTRODUCTION....................................................................................1

Introduction...................................................................................................................................1

Problem Statement........................................................................................................................2

Objectives......................................................................................................................................2

Scope and Limitation.....................................................................................................................3

Report Organization......................................................................................................................4

CHAPTER TWO: ORGANIZATIONAL DETAILS AND LITERATURE REVIEW....5

Introduction to Organization.........................................................................................................5

Organizational Background...........................................................................................................5

Core objective and mission of the Organization......................................................................5

Product and Services.....................................................................................................................6

Deposits...................................................................................................................................6

Fixed Account........................................................................................................................6

Saving Account.......................................................................................................................6

Current Account......................................................................................................................7

Loans and Advances................................................................................................................7

Locker 8
vii
lOMoARcPSD|28772237

SRBL Branches and Network..................................................................................9

SWOT Analysis of SBRL.............................................................................................10

Organizational Hierarchy...............................................................................................10

Working Domains of the Organization.......................................................................................11

Description of Intern Department / Unit.....................................................................................14

Literature Review........................................................................................................................15

CHAPTER THREE: INTERNSHIP ACTIVITIES...........................................................16

Roles and Responsibilities...........................................................................................................16

Weekly Log.................................................................................................................................17

Description of the Project Involved during Internship................................................................18

Network System Requirement.....................................................................................................19

Non-Functional Requirement......................................................................................................20

Network Design Diagram............................................................................................................21

Subnnetting Issues.......................................................................................................................22

Design of Network Topology......................................................................................................23

Tasks / Activities Performed.......................................................................................................27

CHAPTER FOUR: CONCLUSION AND LEARNING OUTCOMES...........................32

Conclusion...................................................................................................................................32

Learning Outcome................................................................................................................33

REFERENCES......................................................................................................................34

APPENDIX

viii
lOMoARcPSD|28772237

ix
lOMoARcPSD|28772237

CHAPTER ONE: INTRODUCTION

Introduction

Internship provides the exploration and development of the career for students. It is a
professional learning experience that offers meaningful, practical work related to the
student’s field of study. This report consists of my internship on computer networking at
Sunrise Bank Limited, Janakpur, Dhanusha. Sunrise Bank Limited provides various services
such as Domain Registration, Email Server, Web Hosting, Government Network
Management (G-Network), Consultant Service, Human Resource Training, Co- location
service, Virtualization and Cloud, Software Development. Sunrise Bank manage or
implement high speed network configuration, design and advice for Public. As an intern of
networking team my important responsibility is to understand the system of the organization.
They provide necessary document to get the overview of the system and team discussion.
They assist me to understand all the term and topic of the system. They assist me to develop
network using various simulation tools and assist me to create VLAN configuration in a
network. Due to this internship I got familiar with the network topology and network device
like switch, router, cable etc.

Duties I perform while I was at internship in National information technology center include:
Expanding computer network, Attending to minor internet issues such as, re-crimping of
damaged cable terminators (RJ-45), etc. Generally I participated in to different networking
and network installations such as network expansion and configuration, Cisco packet tracer
configuration and installation, VLAN configuration using ordinary switch, Internet Protocol
(IP) Networking Basics, Trouble shooting device and network related issue using CDP,
Network traffic filtering and providing security using ACLs.

Beside this, I am also assigned to perform basic task such as installing software such as anti-
virus, Microsoft office, Cisco packet tracer, Virtual machine and other utility application in
the computer lab of the organization. I am also assigned to fix hardware issues such as
replacing bad keyboards and mouse, replacing damaged hard drives and Random access
memory.

1
lOMoARcPSD|28772237

Problem Statement

The computer network in any organization is the most important thing that helps every work
to go smoothly inside or outside organization. Small problem within a network can delay
entire work process and can cause a big loss for the organization. So, it should be solved or
fixed as soon as possible.

There are some problems faced during my internship tenure. Those are:-

 Lack of Willingness of employees to show me the overall system.


 Sometimes shortage of electric power also makes us to not let my work
successfully.
 The shortage of material like switch, cable, cable tester, RJ45, etc.
 Lack of wise use of resources.
 Network professional workers are sometimes busy due to meeting in
organization.
 Slow internet and sometime internet not working.
 VLAN Misconfiguration
 Frequent Disconnection and internal Wi-Fi problem
 No UPS device for access switches.
 Connection fluctuation due to path length limitation
 Some cables are being damaged.

Objectives

The general objective is to design and implement upgraded, scalable and valuable LAN
network services and high speed internet connection for the company. To gain knowledge of
networking and experiences to design efficient and effective network depending on available
resources and have best network in term of coast, speed, security and scalability is another
objective of this project/intern.

The main objectives of this internship are to develop and achieve learning goals, and to get a
clear job/project description for the work experience. The other objectives of this Internship
are as follows:

2
lOMoARcPSD|28772237

 To get familiar with networking terms and devices.


 To configure routers, computer and other networking devices in a
Network.
 To ensure that all Networking devices are functioning well.
 To design a Network structure for efficient connectivity.

Scope and Limitation

The main scopes of the internship are listed below:

 It allows us to apply theory knowledge in real practice.


 It allows us to study the overall Network system of an organization.
 It allows us to get familiar with different network device.

As we know each and everything has its own limitation. No study can be free from
impediments. The major limitations of internship report are as follows:

 All the data’s included in this report are collected from Sunrise Bank.
 The organization policy on keeping some matters confidential prevented from analyzing
different activities.
 This study may not be applicable to other organizations of similar nature.
 This study takes into consideration only about general activities and does not include
minor details about each and every activity performed in the organization due to time
constraint
 The time frame to perform an internship was short.
 Most of the studies are based on secondary data.
 I had access to limited number of their internal documents.

3
lOMoARcPSD|28772237

Report Organization

The contents of the report are organized into the following sections:

Chapter 1, discusses the introduction to the project with the objectives to be met. Also, the
scope and limitations of the project are discussed.

Chapter 2, discusses the background study of the organization and literature review.
Organization introduction, hierarchical structure, working domains and department units are
discussed. Studies of various systems and architecture are reviewed in this section through
which the foundation of the project was set up.

In Chapter 3, all the internship activities are described here. It includes roles and
responsibilities during internship, weekly logs maintained during internship, description of
the project involved during internship and activities performed in it.

In Chapter 4, the conclusion of the report and learning outcomes of the internship are
discussed here.

In the end, all the references are mentioned in the APA format.

4
lOMoARcPSD|28772237

CHAPTER TWO: ORGANIZATIONAL DETAILS AND


LITERATURE REVIEW

Introduction to Organization

Organizational Background

Sunrise Bank Limited was established in 12 Oct 2007. Sunrise Bank Limited is a
commercial bank in Nepal. The bank is an ‘A’ class commercial bank
licensed by Nepal Rastra Bank and has branches all across the nation with its
head office in Kathmandu which provides entire commercial banking services.

The bank's shares are publicly traded as an 'A' category company in the Nepal
Stock Exchange. The bank currently has 116 branches, 29 branchless banking
units, 4 extension counters and 121 ATM terminals. The bank has been
maintaining correspondent relationships with various international banks from
various countries to facilitate trade, remittance and other cross border services.
Through these correspondents the bank is able to provide services in any major
currencies in the world.
Sunrise Bank Nepal Ltd. provides personal and business banking products and services. Its personal
banking products and services include savings deposits, fixed deposits, and loans; and business
banking products and services include loans and advances, demand loans, fixed term loans, import
loans, overdraft loans, short term pledge loans, export financing, hire purchase, deprived sector
loans, SME loans, loan against bank guarantee, loan against government bonds, loan against shares,
loan against fixed deposits of other banks, consortium loans, and gold loans. The company also
provides locker, Internet banking, remit, and mobile banking services, as well as Visa debit cards.

The core objective and mission of Sunrise Bank Limited are as follows:
Sunrise bank vision to "you and us…..Together we built". And mission to
Establish Sunrise bank as a lead bank in their entire branch location national
5
lOMoARcPSD|28772237

wide.
 To continuously expand Banks operation in systematic manner,
 To become a major innovative Bank and provide top of the
 To build an HR team that continuously supplements the growth of the
organization,

Product and Services


SRBL generates significant revenues through credit creation and the funds from
deposits are used for credit creation. As such, the major products of SRBL are

 Deposits
 Loans and Advances

Along with these products, other services that significantly contribute for SRBL’s revenue
generation and customer retention include:

 Suryodaya Remit
 Locker
 Branchless Banking
 Internet Banking
 Mobile Banking
 Sunrise Visa Debit Card
 Extension Counter

Deposits
Deposits are the major sources of fund in SRBL. Deposit is the amount placed by
individuals and corporate groups in the bank for safekeeping and is subject to
withdrawal on the demand of the depositor or at the time of maturity of stated
period. Deposits are the major liability for any banks and in case of liquidation,
deposits are settled first and foremost. Deposits are facilitated through variety of
accounts and they are:
6
lOMoARcPSD|28772237

Fixed Account
A fixed account requires the depositor to deposit a fixed sum of money for a
fixed period of time. A penal interest is charged in case of withdrawal of fixed
deposit prior maturity. The interest is paid on quarterly basis. Fixed account can
be opened by individuals, minors, clubs, societies, associations and trusts.

Saving Account

A saving account is an interest bearing account. In SRBL, interest is calculated on


daily balance and credited to the account on quarterly basis. The minimum
balance for saving account depends on the nature of saving account. Such balance
is subject to any incidental charges that SRBL specifies during the period. To
keep the records of savings and transactions as well as to be updated with the
status of the account, a passbook is provided to the depositor. The types of saving
account in SRBL are:

 Normal Savings
 Sunrise Payroll Savings
 Sunrise Bal Bachat
 Sunrise Share Dhani
 Sunrise Pink Bachat
 USD/GBP Saving
 Sunrise Senior Citizen
 Sunrise Bisesh Bachat
 Euro Saving Account
 Sunrise Mahabachat

Current Account

A current account is non-interest bearing account. Only the corporate bodies can
open a current account. It is especially designed for corporate bodies that are
indulged in frequent transactions. SRBL provides the current account holder with
cheque book. A semiannual statement is sent to keep track of the transactions
carried out by the account holder. Additionally, the bank may provide the

7
lOMoARcPSD|28772237

statement daily, weekly or monthly as per the request made.

Loans and Advances


SRBL provides wide range of loan products for both individual and corporate. It is
themajor source for income earning of the bank. Dome of the loan products are

a) Term Loan
Sunrise bank term loan is a long term loan and is generally available for acquiring
or purchasing machinery, equipment, land and building. The tenure of repayment
of the loan is based on the project's duration and the estimated/ existing cash flow.

b) Overdraft Loan
Sunrise bank offer overdraft loan to finance your daily working capital
requirement and to support your stock build up.

c) Sunrise Ghar Karja


This loan is basically focused for those who dreams to own their home. The
interest are highly competitive. The interest rate ranges from 8.50% to 13%.

d) Sunrise Sajilo Karja


Sunrise Sajilo Karja can be disbursed for social, personal, business purposes.This
flexible loan allows the borrower to fulfill all personal financial requirements. We
offer loans in line with the clients' repayment capacity and the usage of the loan.

e) Krishi Karja
Sunrise Krishi Karja is one of its kinds in banking fraternity targeted mainly to
lower and middle class individuals engaged in agricultural occupation, based on
agro trading/ industries and other that are related to agricultural sectors.

f) Other Loans

Sunrise Bank Limited provides the facilities of other various loans to its
customers. They are Export Finance Deprived Sector Loans, Loan Against Bank
Guarantee,Loan Against Shares, Consortium Loan, Demand Loan, Import Loan,
Short Term Pledge Loan,Hire Purchase,Sunrise Sme Loan,Loan Against
Government Bonds,Loan Against Fixed Deposits Of Other Commercial Banks.
8
lOMoARcPSD|28772237

Suryodaya Remit
It is an electronic online cash exchange result of the bank intended to
encourage exchange of assets by Nepalese exiles working/living in remote
nations and in addition for residential exchange of assets. Suryodaya transmit
is secured by method for VeriSign and computerized authentications mapped
to every client independently. It is quick, moderate and secure.

Locker
Sunrise Safe Deposit Locker is facility furnished to the individual and
institutional customers who prefer to safe deposit precious gems & jewelries and
important documents to evade the probability of increasing theft, burglary and
fire. The Safe Deposit Locker has been the first choice for the safest custody of
the valuable goods with flexibility of time to store and take away when required.
The Bank has varied sizes of Safe Deposit Locker to select from. Lockers facility
can be availed from selective Branches of the Bank.

Branchless banking
Branchless saving money is a practical channel for conveying budgetary
administrations without depending on the customary bank branches. Branchless
managing an account gives essential keeping money benefits through NIBL
specialists having Bio-metric POS devices (with unique mark scanner).

Internet banking
Web based keeping money otherwise called web saving money e-managing an
account or virtual banking, E-saving money or virtual saving money, is an
electronic installment framework that empowers clients of bank or other monetary
organization to lead a scope of budgetary exchanges through the monetary
institution’s site.

Mobile banking
Mobile banking is a service provided by a bank or other financial institution that
allows its customers to conduct a range of financial transactions remotely using a
mobile device such as a mobile phone or tablet, and using software usually called
9
lOMoARcPSD|28772237

an app, provided by the financial instutions for the purpose. Mobile banking is
usually available on 24hour basis.some financial institutions have restrictions on
which accounts may be accessed through mobile banking as well as a limit on the
amount that can be transacted.

Extension counter
There are no inflexible rules, but banks for the most part open augmentation
counters in spots like colleges, large government or private foundations and so on
with the end goal of conveying fundamental saving money administrations at their
doorstep, even however opening a branch may not be a feasible proposition.
Therefore, the expansion counters would by and large capacity from littler
premises and with less number of representatives, for rendering just essential
keeping money services.so, as a rule the accompanying administrations for the
most part would not be accessible:

SRBL Branches and Networks


SRBL have totaled 122 Branch networks including branches inside and outside
the valley which does operational activities of the banks. Corporate office located
at Gairidhara, Kathmandu does all the management activities. There are 6
Extension Counters & 40 ATM locations inside Kathmandu valley and 26
outside Kathmandu Valley.

SWOT Analysis of SRBL

SWOT is the acronym for Strength, Weakness, Opportunity and Threats. A


SWOT analysis summarizes the Internal and external factor of an organization
that are most likely to influence the strategic development. Strength is the positive
Internal characteristics that the organization can exploit to achieve its goals.
Weakness is the Internal characteristics that might inhibit or restrict the
organizations performance. An opportunity is the condition in the general
environment that if exploited effectively, helps a company achieve its targeted
objectives. A threat is a condition in the general environment that may hinder a
company’s efforts to achieve its mission. The Internal environment provides
strength and weaknesses whereas the external environment possesses
10
lOMoARcPSD|28772237

opportunities and threats to the organization. Thus, the organization uses its
strength to grab opportunities and minimize threats and weaknesses.

Organizational Hierarchy

SRBL is a Private organization ruled under the Ministry of Communication and Information
Technology. SRBL has one main head (Branch Manager) who is accountable for making
decisions and supervise, train and oversee staff from different departments. Under the head
of the SRBL, there are different departments with different responsibilities and duties.
Generally, overall work flow of the SRBL or the organization hierarchy is shown in the
figure below..

Fig 1: Organizational Hierarchy

11
lOMoARcPSD|28772237

Working Domains of the Organization

SRBL provides wide range of services to the citizens. The main objectives of Sunrise Bank
Limited (SRBL) are such as Creating and enhancing information technology in the general
public, creating employment through technology, creating a Knowledge-Based Society,
Establish knowledge-based industries and implementing electric-governance in Nepal. The
main working domains of the organization are listed below:

i. Email Server

An email server, or simply mail server, is an application or computer in a network


whose sole purpose is to act as a virtual post office. The server stores incoming mail for
distribution to local users and sends out outgoing messages. SRBL provides centralized
email services to government agencies only.

ii. Government Network Management

Network management is essential as it increases the efficiency and performance


of our IT system, allowing us to detect network issues. SRBL manage or implement high
speed network configuration, design and advice for government agencies.

iii. Human Resource Training

E-Government is about using the tools and systems made possible by Information
and Communication Technologies (ICTs) to provide better public services to citizens and
businesses. Without providing ICT Training or especially basic Computer Training to
employees of Nepal Government it is difficult to imagine implementing e-Government in
Nepal. So keeping this realistic fact in mind SRBL is running Basic and Advance
Computer Training Course for e-Government.

iv. Virtualization and cloud services


12
lOMoARcPSD|28772237

Cloud computing is a computing model tasked with running workloads in that


environment. Virtualization in cloud computing is used to replace physical files, servers,
networks, files, applications, devices, and infrastructure with computer-generated

versions, which are hosted and managed by a service provider. SRBL provides
Visualization and Cloud Service to government agencies.

v. Web Hosting

Web hosting is a service that allows organizations and individuals to post a


website or web page onto the Internet. SRBL hosts websites of government offices and
organizations only. It provides hosting service for free of cost. It provides web space not
exceeding to 2GB for website hosting. Website Security Audit Certificate should be
submitted to SRBL while requesting for hosting the website.

vi. Software Development

SRBL provides Consultancy and Advisory service in the field of Software


development, which is responsible for the development of Software (Government
Enterprise Architecture compliance).

13
lOMoARcPSD|28772237

Description of Intern Department / Unit

During our stay in the organization, I was assigned as Network Support Intern at the IT
department. Beside IT department, SRBL also consists of Electric Department and
Administration, Planning & Human Resource Department. The IT department mainly
focused on works like network management, software development, web hosting,
virtualization and cloud etc. The head of the IT department is the Assistant Director. As the
SRBL is a Private organization, it has specific number of staffs as directed by Ministry of
Communication and Technology. There are six Computer Engineers, one System
Administrator, one Computer Operator and 8 interns including me.

The assistant director is responsible for assisting in development and implementation of plans
and goals for the department. He works with the deputy director to coordinate and supervise
daily operations. Assistant Director is the one undertaking staffing responsibilities such as
hiring, training and evaluating etc.

Computer Engineers are responsible for designing, testing and inspecting all the software
used within an organization’s computer system. They are responsible for performing routine
checks and integrating updates and new features to existing software and hardware.
14
lOMoARcPSD|28772237

System Administrator is responsible for managing, troubleshooting, licensing and updating


hardware and software assets. He is required to maintain records of IT assets usage. Sys
admins are responsible for implementing data backup and disaster recovery strategies for
different IT systems and SDLC environments. He is also responsible for network monitoring
and analysis, basically all the network management work is done by sys admins.

Computer Operator is responsible for diagnosing hardware and software malfunction and
takes remedial action. He monitors computer performance and also arranges the equipment
for maintenances and repairs.

Literature Review

Information technology (IT) is the use of any computers, storage, networking and other
physical devices, infrastructure and processes to create, process, store, secure and exchange
all forms of electronic data. The spread and advancement of the use of information
technology is deepening the government’s reliance on information systems. The use of
information and communication technology has led to the establishment of national
information technology to address policy as well as institutional challenges with appropriate
opportunities through continuous development and dynamism. Mogul, J., Postel, J. (1985)

Computer Networking is a very vast project in the present developing era of electronics and
communication. Now days, computers are used in a wider range. All the organizations are
using multiple computers within their departments to perform their day to day work.
Computer network allows the user to share data, share folders and files with other users
connected in a network. Computer Networking has bound the world in a very small area with
it wide networking processes like LAN, MAN, WAN. Grant, T. J., ed. (2014). A computer
network is a set of computers sharing resources located on or provided by network nodes.
The computers use common communication protocols over digital interconnections to

15
lOMoARcPSD|28772237

communicate with each other. These interconnections are made up of telecommunication


network technologies, based on physically wired, optical, and wireless radio-frequency
methods that may be arranged in a variety of network topologies.

Now a day, Computer network is most important part of an organization. Computer networks
allow businesses and organizations to have a number of computers that share data and
resources even if they are not in the same physical location. Users of these computers can
share programs, information, software, and even hardware like printers and scanners because
the computers are linked through the network. Network devices, or networking hardware, are
physical devices that are required for communication and interaction between hardware on a
computer network. The common network devices are Hub, Switch, Router, Bridge, Gateway,
Modem, Repeater, Access Point, etc. Grant, T. J., ed. (2014).

CHAPTER THREE: INTERNSHIP ACTIVITIES

Roles and Responsibilities

Internships, apprenticeships, learner-ships are all terms used to define gaining of work
experience before being employed full-time. Internship means to enable the transfer of
learning and knowledge by applying what I have learned in the classroom to real world. As a
Network Support trainee or intern, my core responsibility was to understand about the
network and gain more hands on practical knowledge in real world using simulation tools.
The basic task I was assigned to perform was installing different software and applications in
the computer lab of the organization. I was also assigned to fix hardware issues such as
replacing bad keyboards, replacing damaged hard drives etc. My other responsibilities are
listed below:

 Expanding computer network

 Attending to minor internet issues

16
lOMoARcPSD|28772237

 Cisco packet tracer configuration and installation

 Basic router setup and switch configuration

 VLAN configuration using ordinary switch

 Troubleshooting device and network related issues using CDP

 Network traffic filtering and providing security using ACLs

 Simple wireless network setup

 AAA configuration to provide security to access network resources

 To learn about DNS and firewall

 To learn about different routing protocols

Weekly Timetable

Date Weeks Activity


(June 12th First Troubleshoot basic computer hardware and
– June software installed different applications including
22th) Packet Tracer.
(June 25th Second Know about basic networking devices such as
– July 4th) router, switches etc and their mechanism.

(July 5th – Third Learned about the basic of Packet Tracer, its
July 13th) working and useful tools need for performing
networking simulation in packet tracer.

(July 15th Fourth Build a simple computer


– July 23th network
)
(July26th – Fifth Know about different types of cables use for
Aug 3rd) connecting different types of networking devices.

17
lOMoARcPSD|28772237

(Aug 5nd – Sixth Basic router setup and its security configuration,
Aug 13th ) basic serial connection configuration, different
routing protocols, DHCP configuration.
(Aug 15th – Aug 21st ) Seventh VLAN configuration (Trunk Encapsulation), Inter-
VLAN routing, naming VLAN.

(Aug 23rd – Sept 1st ) Eight Troubleshooting device and different protocols of
network such OSPF.

(Sept 4th – Ninth Perform network traffic faltering, basic setup of


Sept 11th ) wireless network, research on DNS and firewall.

(Sept 7th – Tenth Setup on internet connection for all the office of
Sept 11th) one building and create local area network using
different VLANs.

(Sept 12th – Sept 19th ) Elevent Reporting using Google Analytics, Sprout
h Social, Twitter Analytics, SocialBro, Mention

Table 1: Weekly Log

Description of the Project Involved during Internship

This project is aimed to build network infrastructure for the company in order to provide fast
and efficient service for the company workers, customers and government officials. Network
infrastructure refers to all of the resources of a network that make network or internet
connectivity, management, business operations and communication possible. Network
infrastructure comprises hardware and software, systems and devices, and it enables
computing and communication between users, services, applications and processes. Anything
involved in the network, from servers to wireless routers, comes together to make up a
system’s network infrastructure. Network infrastructure allows for effective communication
and service between users, applications, services, devices and so forth. Without the right
network infrastructure in place, you may suffer from poor user experience and security issues
that can impact employee productivity, cost you money and damage reputations.

18
lOMoARcPSD|28772237

Our project is to build a network infrastructure for the office building. The building has 3
floors. The first floor has three departments (Reception, Store and Logistics), in the second
floor there are three departments (Finance, HR and ABC) and the third floor hosts the IT and
Admin department. The following are the considerations during the design and
implementation of network infrastructure:

There are 3 routers connecting each floor. All the routers are connected to each other using
serial DCE cable. Each floor has one switch placed in respective floor. Each floor has WI-FI
networks connected to laptops and phones. Each department have printer and each
department are in different VLAN. Among the different routing protocols, OSPF is used to
advertise routes. All the devices in the network obtain IP address dynamically with their
respective router configured as the DHCP server. All the devices in the network
communicate with each other. For remote login, SSH is configured in all the routers.

The network addresses used in each department is given below:

Floor Department VLAN Network Of

First Reception 80 192.168.8.0/24


Store 70 192.168.7.0/24
Logistics 60 192.168.6.0/24

Second Finance 50 192.168.5.0/24


HR 40 192.168.4.0/24
ABC 30 192.168.3.0/24

Third Admin 20 192.168.2.0/24

19
lOMoARcPSD|28772237

IT 10 192.168.1.0/24

Table 2: Network Addresses used for each


department

Network System Requirement

The Network system requirement consists of functional and non-functional requirement.


Functional requirements define what a system must do, what its features and functions are.
Nonfunctional requirements describe the general properties of a system. They are also known
as quality attributes.

Functional requirement

Functional requirements specify what the network must do. Some of functional requirement
of network system are as follow:

 Internet connectivity should be configured for all users, who are accessing
the network.
 Two departments should have separate local area networks. Moreover, staff users will be
able to access resources of other department as well.

 Security mechanism should be deployed to restrict laboratory


unauthorized user to access
other office’s networks.

Non-Functional requirement
Non-functional requirements specify qualities that the network must have.
 Capacity
 Bandwidth
 Speed
 Availability
 Affordability
 Security

20
lOMoARcPSD|28772237

Feasibility Study

A feasibility study is an assessment of the practicality of a proposed plan or project. A


feasibility study analyzes the viability of a project to determine whether the project or
venture is likely to succeed.

Technical Feasibility
Technical resources like hardware, software, and other technical requirements of the network
system are available to the organization.

Economical Feasibility
The system is economically feasible. It does not require any addition hardware or software.
Since the interface for this system is developed using the existing resources and technologies
available at SRBL, there is nominal expenditure and economic feasibility for certain.

Operational Feasibility
The system is reliable, maintainable, usable, sustainable, supportable and affordable.
Therefore, this system is operationally feasible

Schedule Feasibility
The system is schedule feasible as the project is completed within its
scheduled time.

Network model diagram

21
lOMoARcPSD|28772237

Fig 2: Network design diagram

22
lOMoARcPSD|28772237

Subnetting issues
Subnetting is dividing a network into many small Networks is known as Subnetting. In
SRBL, network of one department must not be accessed by another department. In case of
the single network, only three steps are required in order to reach a process i.e. Source Host
to Destination Network, Destination Network to Destination Host and then Destination Host
to Process. But in the case of Subnetting four steps are required for Inter-Network
Communication i.e. Source Host to Destination Network, Destination Network to proper
Subnet, then Subnet to Host and finally Host to Process. Hence, it increases Time
complexity. In the case of Subnet, more time is required for communication or data transfer.
In the case of Single Network only two IP addresses are wasted to represent Network Id and
Broadcast address but in case of Subnetting two IP addresses are wasted for each Subnet.
Cost of the overall Network also increases. Subnetting requires internal routers, Switches,
Hubs, Bridges etc. which are very costly. Subnetting and network management require an
experienced network administrator. This adds to the overall cost as well.

Analysis of frequent problem


Despite best efforts to keep things smooth all the time every day, frequent problem arises in
the system. Some of the problems that arise frequently are:

1. Slow Internet Performance: Slow performance is typically due to congestion, or


sometimes poor quality connections that had been damaged. It is fixed by changing
the damaged cables and network devices. The bandwidth is improved by Changing
router locations, Updating routers to the latest settings and purchasing routers with
additional bandwidth lanes.
2. Misconfigurations: Misconfiguration is caused by setting parameters manually and
when it is done wrong. So it is analyzed by testing and validation.
3. VLAN issues: VLAN issues happen when a VLAN is not configured to the correct
port, which supports its services. It is solved by making sure that cable and switch
port are good. Checking switch interface configuration. Using the command show
interface [interface name-number] to check whether there are CRC errors or late
collisions perceived on the interface. These errors are usually the result of physical

problems such as bad cable or NIC. If two hosts cannot communicate then checking
whether they are in the same VLAN. If they are positioned into different VLANS
then a router is needed to enable communication between the two hosts.

23
lOMoARcPSD|28772237

4. Single Workstation Unable to Connect to the Network: It occurs when a


workstation display ―no internet‖ message when opening web browsers.IT is resolved
by eliminating the communication barriers such as a bad cable, poor Wi-Fi signal,
failing network card or incorrect drivers. Ensuring that the workstation's network
adapter is configured with the correct IP, subnet, and DNS servers.
5. Duplicate IP Addresses: It is caused when two device attempt to share a single IP.
This is caused by router’s default DHCP configuration. DHCP try to assign new
device an address at the beginning of subnet, and another device may already occupy
these low-numbered addresses with static IPs. It can be solved by avoiding IP
conflicts by modifying router's configuration to begin assigning DHCP addresses near
the top end of subnet, leaving the lower addresses available for devices that require
static IPs.

Network Design

Design of network topology

Network topology refers to the structural arrangement of a network. A network topology


means the manner in which a network is arranged, how the nodes are set up and connect to
each other. Network can be arranged in a number of different ways, each of the arrangements
or topologies have their pros and cons. The choice of a topology for network is influenced by
a number of factors, the most important being the size and scale of the network as well as
cost. However, long-term factors including configuration management, monitoring, and
general performance also need to be considered.

Star topology is used in this project. It is commonly used topology for the small business. It
is a topology where every node in the network is connected to one central switch. Every
device in the network is directly connected to the switch and indirectly connected to every
other node. The central node has the responsibility of managing data transmissions across the

whole network and acts as a repeater. With star topologies, computers are connected with a
coaxial cable, twisted pair, or optical fiber cable.

24
lOMoARcPSD|28772237

Fig 3: Star topology

Choice of Communication Devices/Servers

 Switch
Switches are networking devices operating at layer 2 or a data link layer of the OSI model.
They connect devices in a network and use packet switching to send, receive or forward data
packets or data frames over the network. A switch has many ports, to which computers are
plugged in. When a data frame arrives at any port of a network switch, it examines the
destination address, performs necessary checks and sends the frame to the corresponding
device(s). It supports unicast, multicast as well as broadcast communications.

Fig 4: Switch

 Router
Routers are networking devices operating at layer 3 or a network layer of the OSI model.
They are responsible for receiving, analyzing, and forwarding data packets among the
25
lOMoARcPSD|28772237

connected computer networks. When a data packet arrives, the router inspects the destination
address, consults its routing tables to decide the optimal route and then transfers the packet
along this route. A router, like a switch forwards packets based on address. It uses the IP
address to forward packets. The most common home routers are used to share a broadband
internet connection. The router has a public IP address and that address is shared with the
network. When data comes through the router it is forwarded to the correct computer.

Fig 5: Router

 Servers
Servers manage the shared resources on the LAN. The server combines hardware and
software to offer (or serve) network resources. The server hardware may be an ordinary PC
or a high-performance unit designed specifically to be a server. The software running on the
server will vary with the type of server. (It is possible for a LAN to have many different
types of servers, each providing different types of services.) LAN servers often
resemble host machines (mainframes or minicomputers) conceptually and diagrammatically.
There is one fundamental difference between the two: In a host based system, all processing
takes places in the central host machine. Processing is centralized—terminals are totally
dependent on the host device for all processing functions. In the LAN environment,
processing is distributed among all of the intelligent devices—servers, stations and
peripherals. The role of the file server is to provide and manage a shared storage area on the
network.

 Access point

Access point is a networking hardware device that allows other Wi-Fi devices to connect to a
wired network. As a standalone device, the AP may have a wired connection to a router, but,
in a wireless router, it can also be an integral component of the router itself. An AP is
differentiated from a hotspot which is a physical location where Wi-Fi access is available.
26
lOMoARcPSD|28772237

 End device

End device like laptop, pcs, printers, etc. are used and connected through different cable with
routers and switches.

 Cable/Wire

Cable like coaxial cable, twisted pair cable, Serial DCE, Fiber etc. are used to connect
different end device with switch and routers. Crimping of cable with Rj-45 is done to the
cable to connect to the ports.

Protocols need to be configured in devices/servers

1. DHCP protocols: Dynamic Host Configuration Protocol (DHCP) is a client/server


protocol that automatically provides an Internet Protocol (IP) host with its IP address
and other related configuration information such as the subnet mask and default
gateway. Every device on a TCP/IP-based network have a unique unicast IP address
to access the network and its resources. Without DHCP, IP addresses for new
computers or computers that are moved from one subnet to another must be
configured manually. With DHCP, this entire process is automated and managed
centrally. The DHCP server maintains a pool of IP addresses and leases an address to
any DHCP enabled client when it starts up on the network.
2. OSPF protocols: Open Shortest Path First (OSPF) is a link-state routing protocol that
is used to find the best path between the source and the destination router using its
own Shortest Path First. It is widely used in large organization. OSPF divides the
autonomous systems into areas where the area is a collection of networks, hosts, and

routers. Routers that exist inside the area flood the area with routing
information. The routers exchange topology information with their
nearest neighbors.

27
lOMoARcPSD|28772237

Tasks / Activities Performed

As an intern of networking team, my important task was to understand the systems of the
organization. They provided necessary document to get the overview of the system and team
discussions. They assist me to understand all the terms and topic of the system.
My task was configuring routers, switches and other devices. In the later portion of my
internship I was also involved in Research and Development with particular topic such as
switch port security. My responsibility was to monitor daily operational performance. I
installed of software such as, anti-virus, Microsoft office, Packet tracer and many other utility
applications in the computer lab of the organization. I also did fix hardware issues such as,
replacing bad keyboards, replacing broken screens, replacing damaged hard drives, replacing
random access memory and so many other hardware issues. I also attend to internet issues
such as, distributing of patch cords, re-crimping of damaged (RJ45), replacement of damaged
switches etc. I did troubleshooting of different devices and network related issues. I did
configure different VLANs in the network according to the need.

Network Implementation

Tools Used
Different hardware tools, software tools and troubleshooting tools are used
while network implementation. They are:

1. Hardware tools: Cutters, Scissors, Pliers, Cable Tie Tools, Compression and Crimp
Tools, Manual/Automatic Switch Boxes, Network Testers, RJ-45.
2. Software tools: GN53, Packet tracer, SolarWinds Network
Performance Monitor.
3. Basic troubleshooting tools: ping, PuTTY, route.

Device/Server Configuration Details

1. Switch configuration: Switch configuration is done using different command in CLI.


VLANs allow network administrators to automatically limit access to a specified
group of users by dividing workstations into different isolated LAN segments. The

28
lOMoARcPSD|28772237

switch configuration to create vlan is done as below:


Switch>en
Switch#conf t
Switch(config)#int range fa0/2-3
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 10
The trunk encaptulation is done as below:
Switch(config-if-range)#int range fa0/1
Switch(config-if-range)#switchport mode trunk

2. Router configuration: Router configuration is done using different command in


CLI. Inter vlan, DHCP routing and OSPF configrations are done in routers. Router
configuration is done as below:
The Gigabit Ethernet interface is enabled by changing its state from administratively
down to administratively up. It is done as below:
Router>en
Router#conf t
Router(config)#int se0/2/0
Router(config-if)#no sh

The command use to change clock rate is as below:


Router(config-if)#clock rate 64000
The network of router is defined as below:
Router(config-if)#int se0/2/0
Router(config-if)#ip address 10.10.10.5 255.255.255.252
Router(config-if)#int se0/2/1
Router(config-if)#ip address 10.10.10.9 255.255.255.252
Inter-vlan routing is done as below:
Router>en
Router#conf t
Router(config)#int gig0/0.30
Router(config-subif)#encapsulation dot1Q 30
Router(config-subif)#ip address 192.168.5.1 255.255.255.0
Router(config-subif)#ex

29
lOMoARcPSD|28772237

Router(config)#int gig0/0.40
Router(config-subif)#encapsulation dot1Q 40
Router(config-subif)#ip address 192.168.4.1 255.255.255.0
Router(config-subif)#ex
Router(config)#int gig0/0.50
Router(config-subif)#encapsulation dot1Q 50
Router(config-subif)#ip address 192.168.5.1 255.255.255.0
Router(dhcp-config)#ex
Router(config)#do wr

Protocol Configuration Detail

1. OSPF routing configuration: It is a link-state routing protocol that is used to find


the best path between the source and the destination router using its own Shortest
Path First. The OSPF routing configuration is done as below:
Router>en
Router#conf t
Router(config)#router ospf 10
Router(config-router)#network 192.168.8.0 255.255.255.0 area 0
Router(config-router)#network 192.168.7.0 255.255.255.0 area 0
Router(config-router)#network 192.168.6.0 255.255.255.0 area 0
Router(config-router)#network 10.10.10.4 255.255.255.252 area 0
Router(config-router)#network 10.10.10.8 255.255.255.252 area 0
Router(config-router)#do wr
Router(config-router)#ex

2. DHCP server configuration: IT is a client/server protocol that automatically


provides an Internet Protocol (IP) host with its IP address and other related
configuration information such as the subnet mask and default gateway. It maintains a
pool of IP addresses and leases an address to any DHCP enabled client when it starts
up on the network. The DHCP routing configuration is done as below:
Router>en
Router#conf t

30
lOMoARcPSD|28772237

Router(config)#service dhcp
Router(config)#ip dhcp pool IT
Router(dhcp-config)#network 192.168.1.0 255.255.255.0
Router(dhcp-config)#default-router 192.168.1.1
Router(dhcp-config)#dns-server 192.168.1.1
Router(dhcp-config)#ex
Router(config)#ip dhcp pool admin
Router(dhcp-config)#network 192.168.2.0 255.255.255.0
Router(dhcp-config)#default-router 192.168.2.1
Router(dhcp-config)#dns-server 192.168.2.1
Router(dhcp-config)#ex
Router(config)#do wr

3.1.4.4 Strategies implemented for QOS

Quality of service (QoS) is the use of mechanisms or technologies that work


on a network to control traffic and ensure the performance of critical
applications with limited network

capacity. It enables organizations to adjust their overall network traffic by prioritizing


specific high-performance applications. Cisco supports three main models for providing QoS
service differentiation: best-effort (BE), Differentiated Services (DiffServ), and Integrated
Services (IntServ).

In our project, we have used best-effort (BE). The best-effort (BE) QoS model is typically
the default QoS model and does not implement any QoS behaviors to prioritize traffic before
other QoS traffic classes.

Network Testing
The network testing is important because networks are hard to build correctly, and even
networks that appear to work most of the time may have bugs that require intermittent action,
such as re-starting network elements. Sometimes, the bugs prevent all
communication. Sometimes, the bugs prevent the network from carrying the required
load. Sometimes, the bugs expose the network to security violations. The goal of testing is
to find faults in the network in order to correct them.

Testing Strategy
31
lOMoARcPSD|28772237

Testing is done using ping and traceroute command. A traceroute works by sending Internet
Control Message Protocol (ICMP) packets, and every router involved in transferring the data
gets these packets. It is also done manually by using different show commands like show
vlan, show trunk, show interface, show ip route, etc. Testing is done through cli using ping to
pass the packet from one end device to another. It is done by testing end-to-end connectivity.
These are the steps that are followed:

 Sending a ping from one end of the network to the other end.
 Tracing the route from PC1 to determine where in the path
connectivity fails.
 Correcting the network problem where connectivity fails.
 Verifying that end-to-end connectivity is established.
Test Cases and Test Results

S Test case E A
. x c
N p t
e u
ct a
e l
d o
o u
ut t
p p
ut u
t
1 IP address allocated dynamically D D
H H
using DHCP server
C C
P request P request
s s
u u
c c
c c
es e
sf s
ul s
f
u
l
2 Packet sent from one VLAN to F F
ai a
another VLAN connected in same
le il
switch d e
d
32
lOMoARcPSD|28772237

3 Packet sent from one VLAN to S S


u u
another VLA N in same switch c c
after configuring inter VLAN c c
es e
routing sf s
ul s
f
u
l
4 Packet sent from one end device to F F
ai a
another end device connecter in le il
different router in different floor. d e
d
5 Packet sent from one end device to S S
u u
another end device connecter in
c c
different router in different floor c c
es e
after configuring OSPF routing sf s
protocols. ul s
f
u
l
6 Packet sent from one device to S S
u u
another device within same VLAN
c c
and same switch c c
es e
sf s
ul s
f
u
l
7 Packet sent from one device to F F
ai a
another device within different le il
VLAN and connected in same d e
d
switch
8 Wireless connectivity to end device S S
u u
after configuring access point.
c c
c c
es e
sf s
ul s
f
u

33
lOMoARcPSD|28772237

Table 3: Test cases and results

CHAPTER 4: CONCLUSION AND LEARNING


OUTCOMES

Conclusion

The internship in Sunrise Bank Limited (SRBL) has provided a great opportunity to
enhance knowledge and skills. It helped author to gain the experience of working in real and
practical field and most importantly working in team. Moreover, it presented an opportunity
to work in the project related to author interest and specialization. The main objective of the
internship is learning the things that is necessary to get yourself into the real field of work. It
has given author the opportunity to understand this industry and how the work is actually
done. To conclude, author found that the internship was very beneficial as a part of
development of career and the experience gained through this would be helpful and
beneficial for the future opportunities

This internship program upgrades author’s practical skills in computer networking. This
internship program helps author to know and understand every aspect of the outside
environment. In fact, what really interesting was author learned how to create LAN from
scratch by working everything step by step, so this enable author to come up with many
important experience and skills. So using this practical knowledge and skills that author got
during internship will help to create soft environment to get into professional life.

This internship program also allows author to build valuable relationships that might be
important during beginning of professional career. The contacts acquired and relationships
developed will help author find a job after graduation, serve as a reference on resumes, and
even connect them with new opportunities down the road.

34
lOMoARcPSD|28772237

Learning Outcome

Working as a Network Support intern at SRBL, I have gained a lot of knowledge on


computer networking and gained real world experiences by doing hands on lab on simulation
tools and by actually using the devices.

Some of the things that I have learned from my internship at SRBL are as
follows:

 During the internship session I gained the knowledge on configuring different


network devices.
 Gained knowledge on troubleshooting the network
 Developed work habits and attitudes necessary for job success.
 Learned about how to put my knowledge and skills into practice.
 Gained knowledge about workplace culture and their structure.
 I learned how to communicate and build relationships with the people
I worked with.
 As an intern, I discovered it’s essential to be enthusiastic and open
to learning new
skills, asking for more work and being curious to learn and ask
questions.
 I learned team playing skills is important and knowledge of the team
is stronger than
individual person’s knowledge.

35
lOMoARcPSD|28772237

REFERENCES

Gillis, A.S. (2021). "What is DHCP (Dynamic Host Configuration

Protocol)?". TechTarget: SearchNetworking.

Mogul, J., Postel, J. (1985). Internet Standard Subnetting Procedure.

Postel, J. (1981). Internet Protocol, DARPA Internet Program Protocol


Specification.

doi: 10.17487/RFC0791

Farrow, R. (2014). VLAN Security

Moy, J. (1998). OSPF Version 2. Network Working Group, IETF.


doi:10.17487/RFC2328

Marcus, P. (1999). ―IP Quality of Service‖. Helsinki University of


Technology, Laboratory

of Telecommunications Technology.

Grant, T. J., ed. (2014). Network Topology in Command and Control. Advances in

Information Security, Privacy, and Ethics. IGI Global. pp. xvii, 228, 250.

36
lOMoARcPSD|28772237

37

You might also like