An Internship Report Example
An Internship Report Example
1.1 Introduction
● Consists of a part-time or full-time work schedule that includes no more than 25%
clerical or administrative duties.
● Orients the student to the organization, its culture and proposed work assignment.
1
1.2. Problem Statement
The first day of doing new things in new environment is not an easy task because of new
responsibility that is not routinely done but I tried all my best for that the following are some of
the problems encountered during my internship period. Any job will have challenges, but after
two months of my own internship experience, I've found that there is common intern challenge
in my internship as below:
Because interns are just glad to get a foot in the door, at my internship place sometime they used
to take advantage of me as intern by giving me very long hours of dull repetitive work which
required to work even in the weekend in order to meet the deadline.
Solution: I tried to keep my long-term career goals clearly in mind to make it all feel worth the
effort and I used to persist in order to make my work satisfactory to my supervisor.
2
1.3. Objectives
As partial fulfillment of the requirements for the Degree of Bachelor of Computer Application
(B.C.A) prescribed by Tribhuvan University (T.U), I was assigned to Bardibas Smart Network
Pvt. Ltd. for eight-week internship program. The primary objective of the internship is to
generate a thorough understanding of the workplace relationship, performing of the activities and
engaging oneself in the working environment. In a way, it was more to get practical implication
of all the studies, theories that I had acquired so far. This would help me to create a way towards
growth in my academic as well as personal career development. Apart from general objectives,
the specific objectives are highlighted below:
● To gain real work experience and provide meaningful assistance to the company. They
don’t want to be gophers!
● To receive an orientation to the company for which they are interning. This introduces
the student to the company’s mission and goals and provides them with information
about company rules, regulations and procedures. It also introduces the intern to fellow
employees who they can go to in the future with questions.
3
1.4. Scope and Limitation
Scope
Computer Hardware and Networking is one of the highest paying and fastest-growing areas of
the IT sector. Before exploring Hardware and Networking courses, let’s first take a look at the
roles and responsibilities you can expect to fulfill as a professional in this domain:
● Providing support to the staff in the office related to any technical issues
● Installing and configuring various network devices such as routers, switches, VPNs, etc.
After completing any of the above-mentioned Hardware and Networking courses, some of the
job profiles you can choose from are:
● Systems Engineer
● Design Engineer
● Network Set-Up Engineer
● LAN, NAS, SAN Expert
● Field Service Engineer
● Networking Engineer
● IT Administrator
● Technical Support Manager
● Networking Security Engineer
4
Limitations:
● Security Issues
Data & information held on a network is open to many people across the world, and can
easily be accessed illegally. In addition, when information is sent over the network from
one place to another, it can be tapped or listened to by unauthorized parties.
The initial cost of buying network hardware & software is very high.
Large networks such as the Internet have chat rooms and messaging services. These
enable underage children to meet peers and adults on the net, some of whom may have
bad intentions. Access to pornographic and other negative material on the Internet has
made the fight against social problems such as HIV/AIDS, bad sexual behavior, and drug
abuse more complicated.
The Internet makes it easy for terrorists and drug traffickers to operate. This is because
they use information networks for their business communications.
● Over-reliance on Networks
Most organizations have done away with manual operations. This means that, all
business processes, and the society depend on computer networks. Therefore, if by any
chance the network fails or goes down, then many systems in the society will stop
working.
5
1.5. Report Organization
The report is organized in a systematic and scientific way as Chapter 1 introduce the project/work done
during the internship. Chapter 2 will introduce a technical description about the related concepts of the
organization. Chapter 3 is about fundamental theories, general concepts and terminologies related to the
internship project & literature review of the projects during internship. Chapter 4 gives a specific
description about roles and responsibilities, weekly log(Technical Details of Activities), description of the
project involved during interns and tasks and activities performed during the period . The conclusion and
learning outcomes will be given in Chapter 5.
6
Chapter 2: Introduction to Organization
7
2.2. Organizational Hierarchy
IV. Network & System Department.: Among them the Network and System
Department is the most significant Department. of Bardibas Smart Network Limited.
Normally for any THE COMPANY, the responsibility of the Network & System
Department. is additional. They have done the most perceptive and imperative task of
the network. There is one System Admin, Assistant System Admin & Network Admin
and their tasks were different by person respectively. Worked in the Network &
Customer monitoring section and experienced lots of things about network maintenance
and customer support.
8
IV. HR Department.: An HR department provides all Employees services and
provides all types of letters as like an appointment letter. They maintain all the
employees’ requirement and increment their salary and giving their bonus. This
Department giving the job circular and check the applicant CV and provide their
appointment letter.
9
2.3. Working Domains of Organization
Computer Networking has always been one of the most demanding career profiles. And with the
various technological advancements, the Networking field is becoming extremely vast. I have
decided on the particular domain in Networking to make my career domains objective as:
PC ‘B’
Massage for ‘E’
PCMassage
‘C’ for ‘E’
Massage for ‘E’
PC ‘A’
Switch
Massage for ‘E’
PC ‘D’
PC ‘E’
10
VoIP
VoIP, or Voice over Internet Protocol, is a technology that allows you to make calls over the
internet instead of traditional phone lines or cellular connections. Although its name suggests
that it only enables voice calls, modern VoIP services are far more capable and can offer video
calls, file transfer, group calls, and much more. It's also referred to as IP telephony or internet
telephony.
Fig.2.3.2: VoIP
11
Security
Network security encompasses all the steps taken to protect the integrity of a computer
network and the data within it. Network security is important because it keeps sensitive
data safe from cyber-attacks and ensures the network is usable and trustworthy.
12
Data Center
A data center is a physical location that stores computing machines and their related hardware
equipment. It contains the computing infrastructure that IT systems require, such as servers, data
storage drives, and network equipment. It is the physical facility that stores any company’s
digital data.
13
2.4. Description of Intern Department/Unit
Prime function
Collaborates with assigned company or organization external to the university in order to gain
working knowledge and develop career‐specific skills appropriate to the student’s area of
study. We provides professional level support to assigned organization, assisting with projects,
research and analysis, procedural studies, and planning.
Responsibilities
Serves in an intern capacity for a specified division, program or organization external to the
university, which may include the following duties and responsibilities:
Performs tasks related to specific function/program assigned.
Develops work plans in accordance with program/organizational objectives.
Assembles and analyzes statistical data and makes interpretations for application to area of assignment.
14
Knowledge, skills and abilities
Knowledge of issues pertaining to area of assignment
Knowledge of management principles and practices
Knowledge of program coordination
Knowledge of basic project management
Skill in organizing resources and establishing priorities
Skill in planning, organization, coordination of activities
Skill in establishing and maintaining effective working relationships
Skill in both verbal and written communication
Skill in the use of personal computer and related software applications
Minimum qualifications
Currently admitted to a graduate degree program at Tribhuvan University
Maintain a 3.0 cumulative GPA for all TU graduate credit courses
Must enroll in at least 1 credit hour during each fall and spring semester during the appointment
15
Chapter 3: Background Study and Literature Review
Computer Hardware
Computer hardware includes the physical parts of a computer, such as the case,[1] Central
Processing Unit (CPU), Random Access Memory (RAM), monitor, mouse, keyboard,
computer data storage, graphics card, sound card, speakers and motherboard.
By contrast, software is the set of instructions that can be stored and run by hardware.
Hardware is so-termed because it is "hard" or rigid with respect to changes, whereas
software is "soft" because it is easy to change.
Networking hardware, also known as network equipment or computer networking devices, are
electronic devices which are required for communication and interaction between devices on a
computer network. Specifically, they mediate data transmission in a computer network. Units
which are the last receiver or generate data are called hosts, end systems or data terminal
equipment.
Computer network
A computer network is a set of computers sharing resources located on or provided by network
nodes. The computers use common communication protocols over digital interconnections to
communicate with each other. These interconnections are made up of telecommunication
network technologies, based on physically wired, optical, and wireless radio-frequency methods
that may be arranged in a variety of network topologies.
The nodes of a computer network can include personal computers, servers, networking hardware,
or other specialized or general-purpose hosts. They are identified by network addresses, and may
have hostnames. Hostnames serve as memorable labels for the nodes, rarely changed after initial
assignment. Network addresses serve for locating and identifying the nodes by communication
protocols such as the Internet Protocol.
Computer networks may be classified by many criteria, including the transmission medium used
to carry signals, bandwidth, communications protocols to organize network traffic, the network
size, the topology, traffic control mechanism, and organizational intent. Computer networks
support many applications and services, such as access to the World Wide Web, digital video,
digital audio, shared use of application and storage servers, printers, and fax machines, and use
of email and instant messaging applications.
16
Fig.3.1.1: Computer hardware.
17
Computer network
A computer network is a system that connects two or more computing devices, allowing them
to transmit, exchange, or share data and resources. These networks can be established using
either wired cables or wireless (Wi-Fi) connections. A computer network comprises multiple
independent computers connected through hardware and software. The primary purpose of a
network is to facilitate communication, data sharing, and resource utilization among connected
devices.
A computer network is a system that connects numerous independent computers in order to share
information (data) and resources. The integration of computers and other different devices allows
users to communicate more easily.
A computer network is a collection of two or more computer systems that are linked together. A
network connection can be established using either cable or wireless media. Hardware and
software are used to connect computers and tools in any network.
A computer network consists of various kinds of nodes. Servers, networking hardware, personal
computers, and other specialized or general-purpose hosts can all be nodes in a computer
network. Host names and network addresses are used to identify them.
18
Fig.3.1.2: Computer Network
19
A Basic Communication Model
1.Message: The core asset of any data communication system is the message. It refers to the data
or information that needs to be transmitted. Messages can take various forms, such as text files,
audio files, video files, and more.
2.Sender: The sender plays a crucial role in data communication. It is the device responsible for
initiating the communication process. Senders can be computers, mobile phones, laptops, video
cameras, workstations, or any other transmitting device.
3.Receiver: The receiver is the destination where the message sent by the sender ultimately
arrives. It is the device responsible for receiving and processing the transmitted data. Similar to
the sender, receivers can be computers, mobile phones, workstations, etc.
4.Transmission Medium: The transmission medium acts as the bridge between the sender and
receiver. It provides the physical path through which data or messages travel from the sender to
the receiver.
20
DHCP SERVER
A DHCP Server is a network server that automatically provides and assigns IP addresses, default
gateways and other network parameters to client devices. It relies on the standard protocol
known as Dynamic Host Configuration Protocol or DHCP to respond to broadcast queries by
clients.
A DHCP server issues unique IP addresses and automatically configures another network
information. In most homes and small businesses, the router acts as the DHCP server. In large
networks, a single computer might take on that role.
To make this work, a device (the client) requests an IP address from a router (the host). Then, the
host assigns an available IP address so that the client can communicate on the network.
When a device is turned on and connected to a network that has a DHCP server, it sends a
request to the server, called a DHCPDISCOVER request.
After the DISCOVER packet reaches the DHCP server, the server holds on to an IP address that
the device can use, then offers the client the address with a DHCPOFFER packet.
Once the offer has been made for the chosen IP address, the device responds to the DHCP server
with a DHCPREQUEST packet to accept it. Then, the server sends an ACK to confirm that the
device has that specific IP address and to define the amount of time that the device can use the
address before getting a new one.
If the server decides that the device cannot have the IP address, it will send a NACK.
21
VLAN
Virtual LAN (VLAN) is a concept in which we can divide the devices logically on layer 2 (data
link layer). Generally, layer 3 devices divide the broadcast domain but the broadcast domain can
be divided by switches using the concept of VLAN.
A broadcast domain is a network segment in which if a device broadcast a packet then all the
devices in the same broadcast domain will receive it. The devices in the same broadcast domain
will receive all the broadcast packets but it is limited to switches only as routers don’t forward
out the broadcast packet. To forward out the packets to different VLAN (from one VLAN to
another) or broadcast domains, inter VLAN routing is needed. Through VLAN, different small-
size sub-networks are created which are comparatively easy to handle.
Advantage of VLAN
22
SECURITY OF THE NETWORK
A network access control list (ACL) is made up of rules that either allow access to a computer
environment or deny it. In a way, an ACL is like a guest list at an exclusive club. Only those on
the list are allowed in the doors. This enables administrators to ensure that, unless the proper
credentials are presented by the device, it cannot gain access.
ACL features: –
1. The set of rules defined are matched serial wise i.e. matching starts with the first line,
then 2nd, then 3rd, and so on.
2. The packets are matched only until it matches the rule. Once a rule is matched then no
further comparison takes place and that rule will be performed.
3. There is an implicit denial at the end of every ACL, i.e., if no condition or rule matches
then the packet will be discarded.
Advantage of ACL: -
23
VPN
VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected
network connection when using public networks. VPNs encrypt your internet traffic and disguise
your online identity. This makes it more difficult for third parties to track your activities online
and steal data. The encryption takes place in real time.
A VPN hides your IP address by letting the network redirect it through a specially configured
remote server run by a VPN host. This means that if you surf online with a VPN, the VPN server
becomes the source of your data. This means your Internet Service Provider (THE COMPANY)
and other third parties cannot see which websites you visit or what data you send and receive
online. A VPN works like a filter that turns all your data into "gibberish". Even if someone were
to get their hands on your data, it would be useless.
A VPN connection disguises your data traffic online and protects it from external access.
Unencrypted data can be viewed by anyone who has network access and wants to see it. With a
VPN, hackers and cyber criminals can’t decipher this data.
24
SECURITY OF THE NETWORK
MAC-binding means binding the media access control (MAC) address to a device's Internet
Protocol (IP) address. Think about this as putting a nametag on every device that connects to a
network. So, if there is a change to either the MAC address or the device's IP address, you will
not be able to connect to that network. With MAC-binding, the internet network can identify and
communicate with the right device, making data transfer seamless and efficient.
MAC-binding allows you to "bind" an IP address to a MAC address. After the binding, network
administrators can restrict access to their network, only allowing connections from devices with
specific MAC addresses.
2. More Control MAC-binding gives network administrators more control over their network:
it enables them to choose who communicates on the network, block or restrict access to only
certain devices, and limit access to sensitive data.
25
3.2. Literature Review
Hardware Upgrade
When using computer hardware, an upgrade means adding new or additional hardware to a
computer that improves its performance, increases its capacity, or adds new features. For
example, a user could perform a hardware upgrade to replace the hard drive with a faster one or a
Solid-State Drive (SSD) to get a boost in performance. The user may also install more Random
Access Memory (RAM) so the computer can store additional temporary data, or retrieve such
data at a faster rate. The user may add a USB 3.0 expansion card to fully use USB 3.0 devices, or
could upgrade the Graphics Processing Unit (GPU) for cleaner, more advanced graphics, or more
monitors. Performing such hardware upgrades may be necessary for aged computers to meet a
new, or updated program's system requirements.
In large organizations, hardware upgrades are handled by administrators who are also in charge
of keeping networks running smoothly. They replace network devices like servers, routers and
storage devices based on new demands and capacities.
26
Chapter 4: Internship Activities
A network intern's roles are attending meetings, taking minutes, and performing research at the
supervisor's request. They assist the other staff with the proper operation of the system and assist
in new device certification. A network internship is a program that teaches you how to set up,
develop, and maintain computer networks within an organization or between organizations. A
network intern's roles are attending meetings, taking minutes, and performing research at the
supervisor's request. They assist the other staff with the proper operation of the system and assist
in new device certification. A network intern also works with senior network engineers to
troubleshoot and build a proof of concept labs, build test scripts for network automation, and
verify and validate configurations. Network interns need analytical skills, excellent
communications, and multitasking skills. They must also have basic math skills as well
as attention to detail. To become a networking intern, you must have at least a high school
diploma then an associate or bachelor's degree in computer science or computer engineering. The
average annual pay for a networking intern is $72,517.
27
4.2 Weekly log (Technical Details of Activities)
Table: 4.2.1
Fig: 4.2.2
28
DATE DAY NAME OF THE TOPIC COMPLETED
rd
3 WEEK
2080/8/28 Thursday Creating a LAN network from home
2080/8/29 Friday Configuration od IP
2080/8/30 Saturday Cabling standard (TIA/EIA)
2080/9/1 Sunday Introduction to internet
2080/9/3 Tuesday Understanding internet,website,web request
2080/9/4 Wednesday Understanding client side web technologies vs
server side technology
Table: 4.2.3
Table: 4.2.4
29
DATE DAY NAME OF THE TOPIC COMPLETED
th
5 WEEK
2080/9/12 Thursday Introduction to a data controller inn depth
2080/9/13 Friday Project session at Gautam Hotel Lalgadh
2080/9/14 Saturday Purpose of networking
2080/9/15 Sunday Analog and digital signal Modulation
2080/9/17 Tuesday The direction of Communication Flow
2080/9/18 Wednesday Types of Networks
Table: 4.2.5
Table: 4.2.6
30
DATE DAY NAME OF THE TOPIC COMPLETED
th
7 WEEK
2080/9/26 Thursday Communication Protocol
2080/9/27 Friday TCP/IP Protocol
2080/9/28 Saturday SMTP Protocol
2080/9/29 Sunday POP3 Protocol
2080/10/1 Monday FTP Protocol
2080/10/2 Tuesday HTTP Protocol
Table: 4.2.4
31
4.3. Description of the Project Involved During Interns
When I started my internship in Bardibas Smart Network, I was totally new to the
environment. But I was always enthusiastic to learn about new things. As a fresher, I felt
challenges how this huge amount of data is monitored and kept on running. But day by day, I
was habituated and felt self-confident. Therefore, it was hard and challenging for me to adapt
with this daily routine. Although it is always difficult and challenging to learn new things but
I think that, I was able to face with these challenges.
As an intern, my goal was to find out if there was any problematic case with data of any kind.
If there was such case, I tried to do some background check if any other data is missing.
Sometimes I tried to come up with suggestions with existing system and its improvement. As
there were large data set it was not always easy to come up with a shorter way to solve the
problems.
32
4.4. Tasks / Activities Performed
The Internet is provided through a variety of channels, including cable, DSL, fiber optics, dial-
up, and wireless, with most the company offering all options. Most large telecommunication
companies, such as mobile and cable companies, are the company.
The Company make it possible for their customers to surf the web, shop online, conduct
business, and connect with family and friends—all for a fee. It also provide other services,
including email services, domain registration, web hosting, and browser packages.
The company also be referred to as an information service provider, a storage service provider,
an Internet network service provider (INSP), or any combination of these three based on the
services offered by the company.
An Internet service provider is a company that provides web access to businesses and consumers.
IT also provides other services such as email services, domain registration, web hosting, and
browser services.
The company is considered to be an information service provider, storage service provider,
Internet network service provider (INSP), or a mix of all of them.
Internet use has evolved from only those with university or government accounts having access
to nearly everyone having access, whether it’s paid or free.
Access has gone from dial-up connections to high-speed broadband technology.
33
Chapter 5: Conclusion and Learning Outcomes
5.1. Conclusion
During my Internship, I had been exposed to a Hardware and Networking studying/learning life
to explore market space for my future career development. Throughout my internship, I could
understand more about the definition of an IT and Networking and prepare myself to become a
responsible and innovative technician and programmer in future. Along my internship period, I
realize that observation is a main element to find out the root cause of a problem. Not only for
my project but daily activities too. During my project, I cooperate with my colleagues,
supervisor and mentor to determine the problems. Moreover, the project indirectly helps me to
learn independently, discipline myself, be considerate/patient, self-trust, take initiative and the
ability to solve problems. Besides, my communication skill is strengthening as well when
communicating with others. During my internship period, I have received criticism and advice
from mentor, when mistakes were made. However, those advices are useful guidance for me to
change myself and avoid myself making the same mistakes again. Apart from that, I had also
developed my Hardware & Networking skills through various training/learning that I had done.
In sum, the activities that I had learned during educational training really are useful for me in
future to face challenges in a working environment. Throughout the internship phase, I found
that several things are important:
Time Management
As overall students of IT are always racing against tight timeline and packed schedule, a proper
time management will minimize facing overdue deadlines. An effective time management allows
us to do our assignment efficiently and meet our schedules. Scheduling avoids time wastage and
allows us to plan ahead, and gaining more as a result.
Friends Interactions
In learning environment, teamwork is vital. Thus, communicating and sharing is much needed in
the learning & working environment of internship. Therefore, we should be respecting each and
consult with our friends instead of being alone. This is because working/learning together as a
team is easier in reaching our targets, rather than operating individually.
I would like to once again appreciate everyone who has made my educational training a superb
experience.
34
5.2. Learning Outcome
35
References
https://www.wikipedia.org
https://www.geeksforgeeks.org
https://www.atikaschool.org
https://www.coursehero.com
https://www.indeed.com
https://www.researchgate.net
https://www.core.ac.uk
https://www.academia.edu
https://www.slideshare.net
https://www.utwente.nl
https://www.bsmart.network.com
https://www.leverageedu.com
https://www.googlescholar.com
36