Download as pdf or txt
Download as pdf or txt
You are on page 1of 41

lOMoARcPSD|316 514 65

Final lnternship Report

On

"Network Support"

At

Grantha Networks PVT. LTD

Under the supervision of

Mr. Dhananjay Mandal

Submitted By:
Bikas Yadav (R.J.U. Symbol No. 11180003)
BSc.CSIT
Department of Computer Science and Information Technology
University Campus
Ramanand Chowk, Janakpurdham

Submitted To:
Office of the Dean Institute of Science and Technology, Rajarshi Janak University
Janakpurdham, Nepal
Internship report submitted in fulfillment of the requirement for the degree of Bachelor’s in
Computer Science and Information technology (BSc.CSIT) of Rajarshi Janak University
December, 2023
lOMoARcPSD|316 514 65

Date: 25th Dec 2023

SUPERVISOR'S RECOMMENDATION

I hereby recommend that this internship report prepared under my supervision by


Mr. Bikash Yadav is accepted as fulfilling in partial requirements for the degree of
Bachelor of Science in Computer Science and Information Technology. In my best
knowledge, this an original work in Computer Science.

…………………………………….

Mr. Dhananjay Mandal


Supervisor/Lecturer
Department of Computer Science
University Campus

i
lOMoARcPSD|316 514 65

Date: 28, December, 2023

LETTER OF APPROVAL

The undersigned certifies that they have read and recommended to the Department of
Computer Science and Information Technology for acceptance of an internship report
submitted by Mr. Bikash Yadav in partial fulfillment for the degree of Bachelor of
Science in Computer Science and Information Technology (BSc. CSIT), Institute of
Science and Technology, Rajarshi Janak University.

………………………….

External
Department of Computer Science
Rajarshi Janak University

…………………………

Mr. Dhananjay Mandal

Program Coordinator
University Campus

……………………………….

Mr. Dhananjay Mandal

Supervisor

University Campus

ii
ACKNOWLEDGMENT

The internship opportunity I had at Grantha Network PVT.LTD was a great chance
for learning and professional development. I did not only learn Networking but also
got familiar to best industrial practices during my internship period. Therefore, I
consider myself as a very lucky individual as I was provided with an opportunity to
be a part of it.

I would also like to thank my supervisor Mr. Dhananjay Mandal who has
supervised me with the internship as well as this report. Likewise, I would like to
thank principal of our university campus Dr. Saroj Kumar Thakur for his
continuous support and encouragement throughout these years of my bachelor.

I would like to express my gratitude towards my mentor Executive Director Mr.


Sandip Pudasaini and Assistant Director Mr. Kushal Shrestha of Grantha
Networks PVT.LTD who provided me with an opportunity to work as an intern and
helped me to gain knowledge on Networking.

Lastly, I offer my best regards and gratitude to all the staff of the company, our
colleagues and others who supported us in any respect during the completion of the
project.

Thanking You,
Bikash Yadav
R.J.U. Exam Symbol No. 11180003

iii
lOMoARcPSD|316 514 65

LIST OF FIGURES

Fig 1 Organizational hierarchy ......................................................................................... 6

Fig 2 Network Address Design ...................................................................................... 14

Fig 3 Star Topology ....................................................................................................... 19

Fig 4 Switch................................................................................................................... 19

Fig 5 Router ................................................................................................................... 20

iv
lOMoARcPSD|316 514 65

LIST OF TABLES

Table 1 Weekly Log ......................................................................................................12

Table 2 Network Addresses used for each department ................................................... 14

Table 2 Test Cases and Results ..................................................................................... 28

v
lOMoARcPSD|316 514 65

LIST OF ABBREVIATIONS

AAA: Authentication, authorization, and accounting

ACL: Access Control List

CDP: Cisco Discovery Protocol

CMS: Content Management System

DNS: Domain Name System

DRC: Disaster Recovery Centers

GIDC: Government Integrated Data Center

G2B: Government to Business

G2C: Government to Citizen

G2G: Government to Government

ICT: Information and Communication Technology

IP: Internet protocol

IT: Information Technology

SDLC: Synchronous Data Link Control

VLAN: Virtual Local Area Network

vi
lOMoARcPSD|316 514 65

TABLE OF CONTENTS

SUPERVISOR'S RECOMMENDATION .......................................................................... i

LETTER OF APPROVAL ................................................................................................. ii

ACKNOWLEDGMENT.................................................................................................... iii

LIST OF FIGURES ........................................................................................................... iv

LIST OF TABLES .............................................................................................................. v

LIST OF ABBREVIATIONS ............................................................................................ vi

CHAPTER ONE: INTRODUCTION ................................................................................ 1

1.1 Introduction ........................................................................................................... 1

1.2 Problem Statement ................................................................................................. 2

1.3 Objectives .............................................................................................................. 2

1.4 Scope and Limitation ............................................................................................. 3

1.5 Report Organization............................................................................................... 4

CHAPTER TWO: ORGANIZATIONAL DETAILS AND LITERATURE REVIEW ... 5

2.1 Introduction to Organization .................................................................................. 5

2.1.1 Organizational Background .......................................................................... 5

2.1.2 Core objective and mission of the Organization ............................................ 5

2.2 Organizational Hierarchy ....................................................................................... 6

2.3 Working Domains of the Organization ................................................................... 7


lOMoARcPSD|316 514 65

2.4 Description of Intern Department / Unit ................................................................. 9

2.5 Literature Review ................................................................................................ 10

CHAPTER THREE: INTERNSHIP ACTIVITIES ........................................................ 11

3.1 Roles and Responsibilities ................................................................................... 11

3.2 Weekly Log ......................................................................................................... 12

3.3 Description of the Project Involved during Internship .......................................... 13

3.3.1 Network System Requirement .................................................................... 14

3.3.2 Feasibility Study......................................................................................... 15

3.3.3 Network model of the system ..................................................................... 16

3.3.4 Network Design.......................................................................................... 18

3.4 Tasks / Activities Performed ................................................................................ 22

CHAPTER FOUR: CONCLUSION AND LEARNING OUTCOMES .......................... 28

4.1 Conclusion........................................................................................................... 28

4.2 Learning Outcome ............................................................................................... 29

REFERENCES ................................................................................................................. 30

APPENDIX
lOMoARcPSD|316 514 65

CHAPTER ONE: INTRODUCTION


1.1 Introduction

Internship provides the exploration and development of the career for students. It is a
professional learning experience that offers meaningful, practical work related to the
student’s field of study. This report consists of my internship on computer
networking at Grantha Networks PVT.LTD Kupandole, Kathmandu. Grantha
Networks provides various services such as Domain Registration, Email Server, Web
Hosting, Government Network Management (G-Network), Consultant Service,
Human Resource Training, Co- location service, Virtualization and Cloud, Software
Development. Grantha Networks manage or implement high speed network
configuration, design and advice for government agencies. As an intern of
networking team my important responsibility is to understand the system of the
organization. They provide necessary document to get the overview of the system
and team discussion. They assist me to understand all the term and topic of the
system. They assist me to develop network using various simulation tools and assist
me to create VLAN configuration in a network. Due to this internship I got familiar
with the network topology and network device like switch, router, cable etc.

Duties I perform while I was at internship in Grantha Networks PVT.LTD include:


Expanding computer network, Attending to minor internet issues such as, re-
crimping of damaged cable terminators (RJ-45), etc. Generally I participated in to
different networking and network installations such as network expansion and
configuration, Cisco packet tracer configuration and installation, VLAN
configuration using ordinary switch, Internet Protocol (IP) Networking Basics,
Trouble shooting device and network related issue using CDP, Network traffic
filtering and providing security using ACLs.

Beside this, I am also assigned to perform basic task such as installing software such
as anti- virus, Microsoft office, cisco packet tracer, Virtual machine and other
utility application inthe computer lab of the organization.

1
lOMoARcPSD|316 514 65

1.2 Problem Statement

The computer network in any organization is the most important thing that helps
every work to go smoothly inside or outside organization. Small problem within a
network can delay entire work process and can cause a big loss for the organization.
So, it should be solved or fixed as soon as possible.

There are some problems faced during my internship tenure. Those are:-

 Lack of Willingness of employees to show me the overall system.

 Sometimes shortage of electric power also makes us to not let my work successfully.

 The shortage of material like switch, cable, cable tester, RJ45, etc.

 Lack of wise use of resources.

 Network professional workers are sometimes busy due to meeting in organization.

 Slow internet and sometime internet not working.

 VLAN misconfiguration

 Frequent Disconnection and internal Wi-Fi problem

 No UPS device for access switches.

 Connection fluctuation due to path length limitation

 Some cables are being damaged.

2
lOMoARcPSD|316 514 65

1.3 Objectives

The general objective is to design and implement upgraded, scalable and valuable
LAN network services and high speed internet connection for the company. To gain
knowledge of networking and experiences to design efficient and effective network
depending on available resources and have best network in term of coast, speed,
security and scalability is another objective of this project/intern.

The main objectives of this internship are to develop and achieve learning goals, and
to get aclear job/project description for the work experience. The other objectives of
this Internship are as follows:

 To get familiar with networking terms and devices.

 To configure routers, computer and other networking devices in a Network.

 To ensure that all Networking devices are functioning well.

 To design a Network structure for efficient connectivity.

1.4 Scope and Limitation

The main scopes of the internship are listed below:

 It allows us to apply theory knowledge in real practice.

 It allows us to experience the working environment of an IT organization.

 It allows us to study the overall Network system of an organization.

 It allows us to get familiar with different network device.

3
lOMoARcPSD|316 514 65

As we know each and everything has its own limitation. No study can be free
fromimpediments. The major limitations of internship report are as follows:

 All the data’s included in this report are collected from Grantha Networks.

 The organization policy on keeping some matters confidential prevented from


analyzing different activities.
 This study may not be applicable to other organizations of similar nature.

 This study takes into consideration only about general activities and does not
include minor details about each and every activity performed in the organization
due to time constraint
 The time frame to perform an internship was short.

 Most of the studies are based on secondary data.

 I had access to limited number of their internal documents.

4
lOMoARcPSD|316 514 65

1.5 Report Organization

The contents of the report are organized into the following sections:

Chapter 1, discusses the introduction to the project with the objectives to be met.
Also, the scope and limitations of the project are discussed.

Chapter 2, discusses the background study of the organization and literature review.
Organization introduction, hierarchical structure, working domains and department
units are discussed. Studies of various systems and architecture are reviewed in this
section through which the foundation of the project was set up.

In Chapter 3, all the internship activities are described here. It includes roles and
responsibilities during internship, weekly logs maintained during internship,
description of the project involved during internship and activities performed in it.

In Chapter 4, the conclusion of the report and learning outcomes of the internship
are discussed here.

In the end, all the references are mentioned in the APA format.

5
lOMoARcPSD|316 514 65

CHAPTER TWO: ORGANIZATIONAL DETAILS AND


LITERATURE REVIEW

2.1 Introduction to Organization

2.1.1 Organizational Background

Grantha Networks Pvt. Ltd. (Grantha) is an IT service provider founded on 2013 by the group of
technology enthusiasts who have diversified skills, hands-on experiences, in-depth knowledge and
good reputation in Nepali market in the field of Information and Communication Technology (ICT).
We primarily deal with Networks, Systems, Security, Infrastructure, Consulting and Cloud-Based
solutions. We have professionals, highly skilled, experienced and certified industry experts who can
able to design/re-design, optimize, migrate, merge, configure and troubleshoot small to complex
problem. We are committed to provide cost effective, reliable, scalable solutions. We believe and
focus on being service-oriented.

2.1.2 Core objective and mission of the Organization

The core objective and mission of Grantha Networks are as follows:

 Make information technology accessible to the general public and increase.

 Employment through this means.

 Build a knowledge-based society.

 Minimize immediate damage and losses.

 Establish knowledge-based industries.

 Implementation of E-governance in Nepal.

 Improve information knowledge capacity.

6
lOMoARcPSD|316 514 65

2.2 Organizational Hierarchy

Grantha Networks is a private organization who has one main head (Executive
Director) who is accountable for making decisions and supervise, train and oversee
staff from different departments. Under the head of the Grantha Networks, there are
different departments with different responsibilities and duties. Generally, overall
work flow of the Grantha Networks or the organization hierarchy is shown in the
figure below.

7
lOMoARcPSD|316 514 65

2.3 Working Domains of the Organization

Grantha Networks provides wide range of services to government agencies. The


main objectives of Grantha Networks are such as Creating and enhancing
information technology in the general public, creating employment through
technology, creating a Knowledge-Based Society, Establish knowledge-based
industries and implementing electric-governance in Nepal. The main working
domains of the organization are listed below:

i. Email Server

An email server, or simply mail server, is an application or computer in a


network whose sole purpose is to act as a virtual post office. The server stores
incoming mail for distribution to local users and sends out outgoing messages.
Grantha Networks provides centralized email services to government agencies
only.

ii. Government Network Management

Network management is essential as it increases the efficiency and


performance of our IT system, allowing us to detect network issues. Grantha
Networks manage or implement high speed network configuration, design and
advice for government agencies.

iii. Human Resource Training

E-Government is about using the tools and systems made possible by


Information and Communication Technologies (ICTs) to provide better public
services to citizens and businesses. Without providing ICT Training or especially
basic Computer Training to employees of Nepal Government it is difficult to
imagine implementing e-Government in Nepal. So keeping this realistic fact in
mind Grantha Networks is running Basic and Advance Computer Training
Course for e-Government.

iv. Virtualization and cloud services

8
lOMoARcPSD|316 514 65

Cloud computing is a computing model tasked with running workloads


in that environment. Virtualization in cloud computing is used to replace
physical files, servers, networks, files, applications, devices, and
infrastructure with computer-generated versions, which are hosted and
managed by a service provider. Grantha Networks provides Visualization and
Cloud Service to government agencies.

v. Web Hosting

Web hosting is a service that allows organizations and individuals to post


a website or web page onto the Internet. Grantha Networks hosts websites of
government offices and organizations only. It provides hosting service for free of
cost. It provides web space not exceeding to 2GB for website hosting. Website
Security Audit Certificate should be submitted to Grantha Networks while
requesting for hosting the website.

vi. Software Development

Grantha Networks provides Consultancy and Advisory service in the field


of Software development, which is responsible for the development of Software
(Government Enterprise Architecture compliance).

vii. Domain Registration

Grantha Networks .gov.np domain only for government organizations.


Domain registrations under .gov.np are free of cost. Domains are registered in a
first-come-first-serve basis but terms and conditions must apply. Official request
to Grantha Networks should be submitted while requesting for .gov.np domain
registration.

9
lOMoARcPSD|316 514 65

2.4 Description of Intern Department / Unit

During our stay in the organization, I was assigned as Network Support Intern at the IT
department. The IT department mainly focused on works like network management,
software development, web hosting, virtualization and cloud etc. The head of the IT
department is the Assistant Director. As the Grantha Networks is a private organization,
it has specific number of staffs as directed by Executive director of Grantha Networks.
There are six Computer Engineers, one System Administrator, one Computer Operator
and 8 interns including me.

The assistant director is responsible for assisting in development and implementation of


plans and goals for the department. He works with the deputy director to coordinate and
supervise daily operations. Assistant Director is the one undertaking staffing
responsibilities such as hiring, training and evaluating etc.

Computer Engineers are responsible for designing, testing and inspecting all the
software used within an organization’s computer system. They are responsible for
performing routine checks and integrating updates and new features to existing
software and hardware.

System Administrator is responsible for managing, troubleshooting, licensing and


updating hardware and software assets. He is required to maintain records of IT assets
usage. System admins are responsible for implementing data backup and disaster
recovery strategies for different IT systems and SDLC environments. He is also
responsible for network monitoring and analysis, basically all the network management
work is done by sys admins.

Computer Operator is responsible for diagnosing hardware and software malfunction


and takes remedial action. He monitors computer performance and also arranges the
equipment for maintenances and repairs.

10
lOMoARcPSD|316 514 65

2.5 Literature Review

Information technology (IT) is the use of any computers, storage, networking and other
physical devices, infrastructure and processes to create, process, store, secure and
exchange all forms of electronic data. The spread and advancement of the use of
information technology is deepening the government’s reliance on information systems.
The use of information and communication technology has led to the establishment of
national information technology to address policy as well as institutional challenges
with appropriate opportunities through continuous development and dynamism. Mogul,
J., Postel, J. (1985)

Computer Networking is a very vast project in the present developing era of electronics
and communication. Nowadays, computers are used in a wider range. All the
organizations are using multiple computers within their departments to perform their
day to day work. Computer network allows the user to share data, share folders and
files with other users connected in a network. Computer Networking has bound the
world in a very small area with it wide networking processes like LAN, MAN, WAN.
Grant, T. J., ed. (2014). A computer network is a set of computers sharing resources
located on or provided by network nodes. The computers use common communication
protocols over digital interconnections to communicate with each other. These
interconnections are made up of telecommunication network technologies, based on
physically wired, optical, and wireless radio-frequency methods that may be arranged
in a variety of network topologies.

Now a day, Computer network is most important part of an organization. Computer


networks allow businesses and organizations to have a number of computers that share
data and resources even if they are not in the same physical location. Users of these
computers can share programs, information, software, and even hardware like printers
and scanners because the computers are linked through the network. Network devices,
or networking hardware, are physical devices that are required for communication and
interaction between hardware on a computer network. The common network devices
are Hub, Switch, Router, Bridge, Gateway, Modem, Repeater, Access Point, etc. Grant,
T. J., ed. (2014).

11
lOMoARcPSD|316 514 65

CHAPTER THREE: INTERNSHIP ACTIVITIES

3.1 Roles and Responsibilities

Internships, apprenticeships, learner-ships are all terms used to define gaining of work
experience before being employed full-time. Internship means to enable the transfer of
learning and knowledge by applying what I have learned in the classroom to real world.
As a Network Support trainee or intern, my core responsibility was to understand about
the network and gain more hands on practical knowledge in real world using simulation
tools. The basic task I was assigned to perform was installing different software and
applications inthe computer lab of the organization. I was also assigned to fix hardware
issues such as replacing bad keyboards, replacing damaged hard drives etc. My other
responsibilities are listed below:

 Expanding computer network

 Attending to minor internet issues

 Cisco packet tracer configuration and installation

 Basic router setup and switch configuration

 VLAN configuration using ordinary switch

 Troubleshooting device and network related issues using CDP

 Network traffic filtering and providing security using ACLs

 Simple wireless network setup

 AAA configuration to provide security to access network resources

 To learn about DNS and firewall

 To learn about different routing protocols

12
lOMoARcPSD|316 514 65

3.2 Weekly Log

Week Task Performed

First (July 19th – July 26th) Troubleshoot basic Computer hardware and software
problems, installed different applications including
Packet Tracer.
Second (July 27th – Aug 6th) Know about basic networking devices such as router,

switch etc. and their working mechanism.


Third , Fourth Learned about the basic of Packet Tracer, its working
and useful tools needed for performing network
(Aug 8th – Aug 20th)
simulation in packet tracer.
Fifth (Aug 23rd – Aug 28th) Build a simple computer network; know about
different types of cables used for connecting different
types of networking devices
Sixth (Aug 28th – Sep 6th) Basic router setup and its security configuration,
basic serial connection configuration, different
routing protocols, DHCP configuration
Seventh (Sep 7th – Sep 13th) VLAN Configuration (Trunk Encapsulation), Inter-

VLAN Routing, Naming VLAN


Eighth, Ninth Troubleshooting device and different protocols of
network such OSPF
(Sep 14th – Sep 27th)

Tenth, Eleventh Perform network traffic filtering, basic setup of


wireless network, Research on DNS and Firewall
(Sep 28th – Oct 13th )

Twelfth (Oct 14th – Oct 19th) Setup an internet connection for all the office of one
building and create local area network using different
VLANs.

Table 1: Weekly Log

13
lOMoARcPSD|316 514 65

3.3 Description of the Project Involved during Internship

This project is aimed to build network infrastructure for the company in order to
provide fast and efficient service for the company workers, customers and government
officials. Network infrastructure refers to all of the resources of a network that make
network or internet connectivity, management, business operations and communication
possible. Network infrastructure comprises hardware and software, systems and
devices, and it enables computing and communication between users, services,
applications and processes. Anything involved in the network, from servers to wireless
routers, comes together to make up a system’s network infrastructure. Network
infrastructure allows for effective communication and service between users,
applications, services, devices and so forth. Without the right network infrastructure in
place, you may suffer from poor user experience and security issues that can impact
employee productivity, cost you money and damage reputations.

Our project is to build a network infrastructure for the office building. The building has
3 floors. The first floor has three departments (Reception, Store and Logistics), in the
second floor there are three departments (Finance, HR and ABC) and the third floor
hosts the IT and Admin department. The following are the considerations during the
design and implementation of network infrastructure:

There are 3 routers connecting each floor. All the routers are connected to each other
using serial DCE cable. Each floor has one switch placed in respective floor. Each floor
has WI-FI networks connected to laptops and phones. Each department have printer
and each department are in different VLAN. Among the different routing protocols,
OSPF is used to advertise routes. All the devices in the network obtain IP address
dynamically with their respective router configured as the DHCP server. All the
devices in the network communicate with each other. For remote login, SSH is
configured in all the routers.

14
lOMoARcPSD|316 514 65

The network addresses used in each department is given below:

Floor Department VLAN Network Of

First Reception 80 192.168.8.0/24


Store 70 192.168.7.0/24
Logistics 60 192.168.6.0/24

Second Finance 50 192.168.5.0/24


HR 40 192.168.4.0/24
ABC 30 192.168.3.0/24

Third Admin 20 192.168.2.0/24


IT 10 192.168.1.0/24

Table 2: Network Addresses used for each department

3.3.1 Network System Requirement

The Network system requirement consists of functional and non-functional


requirement. Functional requirements define what a system must do, what its features
and functions are. Nonfunctional requirements describe the general properties of a
system. They are also known as quality attributes.

3.3.1.1 Functional requirement

Functional requirements specify what the network must do. Some of functional
requirement of network system are as follow:

 Internet connectivity should be configured for all users, who are accessing the network.

15
lOMoARcPSD|316 514 65

 Two departments should have separate local area networks. Moreover, staff users will be

able to access resources of other department as well.

 Security mechanism should be deployed to restrict laboratory unauthorized user to access


other office’s networks.

3.3.1.2 Non-Functional requirement

Non-functional requirements specify qualities that the network must have.

 Capacity

 Bandwidth

 Speed

 Availability

 Affordability

 Security

3.3.2 Feasibility Study

A feasibility study is an assessment of the practicality of a proposed plan or project. A


feasibility study analyzes the viability of a project to determine whether the project or
venture is likely to succeed.

3.3.2.1 Technical Feasibility

Technical resources like hardware, software, and other technical requirements of the
networksystem are available to the organization.

3.3.2.2 Economical Feasibility

The system is economically feasible. It does not require any addition hardware or
software. Since the interface for this system is developed using the existing resources

16
lOMoARcPSD|316 514 65

and technologies available at Grantha Networks, there is nominal expenditure and


economic feasibility for certain.

3.3.2.3 Operational Feasibility

The system is reliable, maintainable, usable, sustainable, supportable and affordable.

Therefore, this system is operationally feasible.

3.3.2.4 Schedule Feasibility

The system is schedule feasible as the project is completed within its scheduled time.

3.3.3 Network model of the system

3.3.3.1 Network model diagram

Fig 2: Network design diagram

17
lOMoARcPSD|316 514 65

3.3.3.2 Subnetting Issues

Subnetting is dividing a network into many small Networks is known as Subnetting. In


Grantha Networks, network of one department must not be accessed by another
department. In case of the single network, only three steps are required in order to reach
a process i.e. Source Host to Destination Network, Destination Network to Destination
Host and then Destination Host to Process. But in the case of Subnetting four steps are
required for Inter-Network Communication i.e. Source Host to Destination Network,
Destination Network to proper Subnet, then Subnet to Host and finally Host to Process.
Hence, it increases Time complexity. In the case of Subnet, more time is required for
communication or data transfer. In the case of Single Network only two IP addresses
are wasted to represent Network Id and Broadcast address but in case of Subnetting two
IP addresses are wasted for each Subnet. Cost of the overall Network also increases.
Subnetting requires internal routers, Switches, Hubs, Bridges etc. which are very costly.
Subnetting and network management require an experienced network administrator.
This adds to the overall cost as well.

3.3.3.3 Analysis of frequent problem

Despite best efforts to keep things smooth all the time every day, frequent problem
arises in the system. Some of the problems that arise frequently are:

1. Slow Internet Performance: Slow performance is typically due to


congestion, or sometimes poor quality connections that had been damaged. It
is fixed by changing the damaged cables and network devices. The bandwidth
is improved by Changing router locations, Updating routers to the latest
settings and purchasing routers with additional bandwidth lanes.
2. Misconfigurations: Misconfiguration is caused by setting parameters
manually and when it is done wrong. So it is analyzed by testing and
validation.

3. VLAN issues: VLAN issues happen when a VLAN is not configured to the

18
lOMoARcPSD|316 514 65

correct port, which supports its services. It is solved by making sure that cable and
switch port are good. Checking switch interface configuration. Using the command
show interface [interface name-number] to check whether there are CRC errors or
late collisions perceived on the interface. These errors are usually the result of
physical problems such as bad cable or NIC. If two hosts cannot communicate then
checking whether they are in the same VLAN. If they are positioned into different
VLANS then a router is needed to enable communication between the two hosts.

4. Single Workstation Unable to Connect to the Network: It occurs when a


workstation display ―no internet‖ message when opening web browsers.IT is
resolved by eliminating the communication barriers such as a bad cable, poor Wi-
Fi signal, failing network card or incorrect drivers. Ensuring that the workstation's
network adapter is configured with the correct IP, subnet, and DNS servers.

5. Duplicate IP Addresses: It is caused when two device attempt to share a single


IP. This is caused by router’s default DHCP configuration. DHCP try to assign
new device an address at the beginning of subnet, and another device may already
occupy these low-numbered addresses with static IPs. It can be solved by avoiding
IP conflicts by modifying router's configuration to begin assigning DHCP
addresses near the top end of subnet, leaving the lower addresses available for
devices that require static IPs.

3.3.4 Network Design

3.3.4.1 Design of network topology

Network topology refers to the structural arrangement of a network. A network


topology means the manner in which a network is arranged, how the nodes are set
up and connect to each other. Network can be arranged in a number of different
ways, each of the arrangements or topologies have their pros and cons. The choice
of a topology for network is influenced by a number of factors, the most important

19
lOMoARcPSD|316 514 65

being the size and scale of the network as well as cost. However, long-term factors
including configuration management, monitoring, and general performance also
need to be considered.

Star topology is used in this project. It is commonly used topology for the small
business. It is a topology where every node in the network is connected to one
central switch. Every device in the network is directly connected to the switch and
indirectly connected to every other node. The central node has the responsibility of
managing data transmissions across the whole network and acts as a repeater. With
star topologies, computers are connected with a coaxial cable, twisted pair, or
optical fiber cable.

Fig 3: Star topology

20
lOMoARcPSD|316 514 65

3.3.4.2 Choice of Communication Devices/Servers

 Switch

Switches are networking devices operating at layer 2 or a data link layer of the OSI
model. They connect devices in a network and use packet switching to send, receive
or forward data packets or data frames over the network. A switch has many ports, to
which computers are plugged in. When a data frame arrives at any port of a network
switch, it examines the destination address, performs necessary checks and sends the
frame to the corresponding device(s). It supports unicast, multicast as well as
broadcast communications.

Fig 4: Switch

 Router

Routers are networking devices operating at layer 3 or a network layer of the OSI
model. They are responsible for receiving, analyzing, and forwarding data packets
among the connected computer networks. When a data packet arrives, the router
inspects the destinationaddress, consults its routing tables to decide the optimal route
and then transfers the packet along this route. A router, like a switch forwards
packets based on address. It uses the IP address to forward packets. The most
common home routers are used to share a broadband internet connection. The router
has a public IP address and that address is shared with the network. When data
comes through the router it is forwarded to the correct computer.

21
lOMoARcPSD|316 514 65

Fig 5: Router

 Servers

Servers manage the shared resources on the LAN. The server combines hardware
and software to offer (or serve) network resources. The server hardware may be an
ordinary PC or a high-performance unit designed specifically to be a server. The
software running on the server will vary with the type of server. (It is possible
for a LAN to have many different types of servers, each providing different
types of services.) LAN servers often resemble host machines (mainframes or
minicomputers) conceptually and diagrammatically. There is one fundamental
difference between the two: In a host based system, all processing takes places in
the central host machine. Processing is centralized—terminals are totally
dependent on the host device for all processing functions. In the LAN
environment, processing is distributed among all of the intelligent devices—
servers, stations and peripherals. The role of the file server is to provide and
manage a shared storage area on the network.

 Access point

Access point is a networking hardware device that allows other Wi-Fi devices to
connect to a wired network. As a standalone device, the AP may have a wired
connection to a router, but, in a wireless router, it can also be an integral
component of the router itself. An AP is differentiated from a hotspot which is a
physical location where Wi-Fi access is available.

22
lOMoARcPSD|316 514 65

 End device

End device like laptop, pcs, printers, etc. are used and connected through
different cable withrouters and switches.

 Cable/Wire

Cable like coaxial cable, twisted pair cable, Serial DCE, Fiber etc. are used
to connect different end device with switch and routers. Crimping of cable
with Rj-45 is done to thecable to connect to the ports.

3.3.4.3 Protocols need to be configured in devices/servers

1. DHCP protocols: Dynamic Host Configuration Protocol (DHCP) is a


client/server protocol that automatically provides an Internet Protocol (IP) host
with its IP address and other related configuration information such as the subnet
mask and default gateway. Every device on a TCP/IP-based network have a
unique unicast IP address to access the network and its resources. Without
DHCP, IP addresses for new computers or computers that are moved from one
subnet to another must be configured manually. With DHCP, this entire process
is automated and managed centrally. The DHCP server maintains a pool of IP
addresses and leases an address to any DHCP enabled client when it starts up on
the network.

2. OSPF protocols: Open Shortest Path First (OSPF) is a link-state routing


protocol that is used to find the best path between the source and the destination
router using its own Shortest Path First. It is widely used in large organization.
OSPF divides the autonomous systems into areas where the area is a collection
of networks, hosts, and routers. Routers that exist inside the area flood the area
with routing information. Therouters exchange topology information with their
nearest neighbors.

23
lOMoARcPSD|316 514 65

3.4 Tasks / Activities Performed

As an intern of networking team, my important task was to understand the systems of


the organization. They provided necessary document to get the overview of the system
and team discussions. They assist me to understand all the terms and topic of the
system.
My task was configuring routers, switches and other devices. In the later portion of my
internship I was also involved in Research and Development with particular topic such
as switch port security. My responsibility was to monitor daily operational
performance. I installed of software such as, anti-virus, Microsoft office, Packet tracer
and many other utilityapplications in the computer lab of the organization. I also did fix
hardware issues such as, replacing bad keyboards, replacing broken screens, replacing
damaged hard drives, replacing random access memory and so many other hardware
issues. I also attend to internet issues such as, distributing of patch cords, re-crimping of
damaged (RJ45), replacement of damaged switches etc. I did troubleshooting of
different devices and network related issues. I did configure different VLANs in the
network according to the need.

3.4.1 Network Implementation

3.4.1.1 Tools Used


Different hardware tools, software tools and troubleshooting tools are used while
networkimplementation. They are:

1. Hardware tools: Cutters, Scissors, Pliers, Cable Tie Tools, Compression


and CrimpTools, Manual/Automatic Switch Boxes, Network Testers, RJ-45.
2. Software tools: Pnet Lab, SolarWinds Network Performance Monitor.

3. Basic troubleshooting tools: ping, PuTTY, route.

24
lOMoARcPSD|316 514 65

3.4.1.2 Device/Server Configuration Details

1. Switch configuration: Switch configuration is done using different command in


CLI. VLANs allow network administrators to automatically limit access to a specified
group of users by dividing workstations into different isolated LAN segments. The
switch configuration to create vlan is done as below:
Switch>en
Switch#conf t
Switch(config)#int range fa0/2-3
Switch(config-if-range)#switchport mode access
Switch(config-if-range)#switchport access vlan 10

The trunk encaptulation is done as below:

Switch(config-if-range)#int range fa0/1


Switch(config-if-range)#switchport mode trunk

2. Router configuration: Router configuration is done using different command


in CLI. Inter vlan, DHCP routing and OSPF configrations are done in routers. Router
configuration is done as below:
The Gigabit Ethernet interface is enabled by changing its state from administratively
down to administratively up. It is done as below:
Router>en
Router#conf t
Router(config)#int se0/2/0
Router(config-if)#no shut

The command use to change clock rate is as below:


Router(config-if)#clock rate 6400
The network of router is defined as below:
Router(config-if)#int se0/2/0
Router(config-if)#ip address 10.10.10.5 255.255.255.252

25
lOMoARcPSD|316 514 65

Router(config-if)#int se0/2/1

Router(config-if)#ip address 10.10.10.9 255.255.255.252

Inter-vlan routing is done as below:

Router>en
Router#conf t
Router(config)#int gig0/0.30

Router(config-subif)#encapsulation dot1Q 30

Router(config-subif)#ip address 192.168.5.1 255.255.255.0


Router(config-subif)#ex
Router(config)#int gig0/0.40

Router(config-subif)#encapsulation dot1Q 40

Router(config-subif)#ip address 192.168.4.1 255.255.255.0


Router(config-subif)#ex
Router(config)#int gig0/0.50

Router(config-subif)#encapsulation dot1Q 50

Router(config-subif)#ip address 192.168.5.1 255.255.255.0


Router(dhcp-config)#ex
Router(config)#do wr

3.4.1.3 Protocol Configuration Detail

1. OSPF routing configuration: It is a link-state routing protocol that is used to find the
best path between the source and the destination router using its own ShortestPath First.
The OSPF routing configuration is done as below:
Router>en
Router#conf t
Router(config)#router ospf 10

26
lOMoARcPSD|316 514 65

Router(config-router)#network 192.168.8.0 255.255.255.0 area 0

Router(config-router)#network 192.168.7.0 255.255.255.0 area 0

Router(config-router)#network 192.168.6.0 255.255.255.0 area 0

Router(config-router)#network 10.10.10.4 255.255.255.252 area 0

Router(config-router)#network 10.10.10.8 255.255.255.252 area 0


Router(config-router)#do wr
Router(config-router)#ex

2. DHCP server configuration: IT is a client/server protocol that automatically


provides an Internet Protocol (IP) host with its IP address and other related
configuration information such as the subnet mask and default gateway. It maintains a
pool of IP addresses and leases an address to any DHCP enabled client when it starts up
on the network. The DHCP routing configuration is done as below:
Router>en
Router#conf t
Router(config)#service dhcp
Router(config)#ip dhcp pool IT
Router(dhcp-config)#network 192.168.1.0 255.255.255.0

Router(dhcp-config)#default-router 192.168.1.1

Router(dhcp-config)#dns-server 192.168.1.1
Router(dhcp-config)#ex
Router(config)#ip dhcp pool admin

Router(dhcp-config)#network 192.168.2.0 255.255.255.0

Router(dhcp-config)#default-router 192.168.2.1

Router(dhcp-config)#dns-server 192.168.2.1
Router(dhcp-config)#ex
Router(config)#do wr

27
lOMoARcPSD|316 514 65

3.1.4.4 Strategies implemented for QOS

Quality of service (QoS) is the use of mechanisms or technologies that work on a


network to control traffic and ensure the performance of critical applications with
limited network capacity. It enables organizations to adjust their overall network traffic
by prioritizing specific high-performance applications. Cisco supports three main
models for providing QoS service differentiation: best-effort (BE), Differentiated
Services (DiffServ), and Integrated Services (IntServ).

In our project, we have used best-effort (BE). The best-effort (BE) QoS model is
typicallythe default QoS model and does not implement any QoS behaviors to prioritize
traffic before other QoS traffic classes.

3.4.2 Network Testing


The network testing is important because networks are hard to build correctly, and even
networks that appear to work most of the time may have bugs that require intermittent
action, such as re-starting network elements. Sometimes, the bugs prevent all
communication. Sometimes, the bugs prevent the network from carrying the
required load. Sometimes, the bugs expose the network to security violations. The
goal of testing is to find faults in the network in order to correct them.

3.4.2.1 Testing Strategy

Testing is done using ping and traceroute command. A traceroute works by sending
Internet Control Message Protocol (ICMP) packets, and every router involved in
transferring the data gets these packets. It is also done manually by using different show
commands like show vlan, show trunk, show interface, show ip route, etc. Testing is
done through cli using ping to pass the packet from one end device to another. It is done
by testing end-to-end connectivity. These are the steps that are followed:

 Sending a ping from one end of the network to the other end.
 Tracing the route from PC1 to determine where in the path connectivity fails.
 Correcting the network problem where connectivity fails.
 Verifying that end-to-end connectivity is established.

28
lOMoARcPSD|316 514 65

3.4.2.2 Test Cases and Test Results

S.N Test case Expected output Actual output


1 IP address allocated dynamically DHCP request DHCP request

using DHCP server successful successful


2 Packet sent from one VLAN to Failed Failed
another VLAN connected in same
switch
3 Packet sent from one VLAN to Successful Successful
another VLA N in same switch
after configuring inter VLAN
routing
4 Packet sent from one end device to Failed Failed
another end device connecter in
different router in different floor.
5 Packet sent from one end device to Successful Successful
another end device connecter in
different router in different floor
after configuring OSPF routing
protocols.
6 Packet sent from one device to Successful Successful
another device within same VLAN
and same switch
7 Packet sent from one device to Failed Failed
another device within different
VLAN and connected in same
switch
8 Wireless connectivity to end device Successful Successful
after configuring access point.
Table 3: Test cases and results

29
lOMoARcPSD|316 514 65

CHAPTER 4: CONCLUSION AND LEARNING OUTCOMES

4.1 Conclusion
The internship in Grantha Networks PVT.LTD has provided a great opportunity to
enhance knowledge and skills. It helped author to gain the experience of working in
real and practical field and most importantly working in team. Moreover, it
presented an opportunity to work in the project related to author interest and
specialization. The main objective of the internship is learning the things that is
necessary to get yourself into the real field of work. It has given author the
opportunity to understand this industry and how the work is actually done. To
conclude, author found that the internship was very beneficial as a part of
development of career and the experience gained through this would be helpful and
beneficial for the future opportunities

This internship program upgrades author’s practical skills in computer networking.


This internship program helps author to know and understand every aspect of the
outside environment. In fact, what really interesting was author learned how to
create LAN from scratch by working everything step by step, so this enable author to
come up with many important experience and skills. So using this practical
knowledge and skills that author got during internship will help to create soft
environment to get into professional life.

This internship program also allows author to build valuable relationships that might
be important during beginning of professional career. The contacts acquired and
relationships developed will help author find a job after graduation, serve as a
reference on resumes, and even connect them with new opportunities down the road.

30
lOMoARcPSD|316 514 65

4.2 Learning Outcome

Working as a Network Support intern at Grantha Networks, I have gained a lot of


knowledge on computer networking and gained real world experiences by doing
hands on lab on simulationtools and by actually using the devices.

Some of the things that I have learned from my internship at Grantha Networks are as
follows:

 During the internship session I gained the knowledge on configuring


different network devices.
 Gained knowledge on troubleshooting the network

 Developed work habits and attitudes necessary for job success.

 Learned about how to put my knowledge and skills into practice.

 Gained knowledge about workplace culture and their structure.

 I learned how to communicate and build relationships with the people I worked
with.

 As an intern, I discovered it’s essential to be enthusiastic and open to learning


new skills, asking for more work and being curious to learn and ask questions.

 I learned team playing skills is important and knowledge of the team is stronger
than individual person’s knowledge.

31
lOMoARcPSD|316 514 65

REFERENCES

Gillis, A.S. (2021). "What is DHCP (Dynamic Host ConfigurationProtocol)?".


TechTarget: SearchNetworking.

Mogul, J., Postel, J. (1985). Internet Standard Subnetting Procedure.

Postel, J. (1981). Internet Protocol, DARPA Internet Program Protocol Specification.

doi: 10.17487/RFC0791

Farrow, R. (2014). VLAN Security

Moy, J. (1998). OSPF Version 2. Network Working Group, IETF. doi:10.17487/RFC2328

Marcus, P. (1999). ―IP Quality of Service‖. Helsinki University of Technology, Laboratory

of Telecommunications Technology.

Grant, T. J., ed. (2014). Network Topology in Command and Control. Advances inInformation
Security, Privacy, and Ethics. IGI Global. pp. xvii, 228, 250.

32

You might also like