My Intern1-Recovered
My Intern1-Recovered
on
“IT operator”
at
in
Submitted by:
Submitted To
This is to certify that this internship report entitled “IT Operator” prepared by
Kansiram Kandel in partial fulfillment of the requirements for the degree of B.ed in
Information, Communication & Technology Education has been well studied. In our
opinion, it is satisfactory in the scope and quality as an internship report for the required
degree.
……………………………….. ………………………………..
Mr. Meghraj Acharya Dr. Khimananda Neupane
…………………………. ………………………………..
Mr. Parshu Ram Upadhayaya External Supervisor
Supervisor
i
i
Company Letter
Acknowledgment
I convey my sincere gratitude to Mr. Jeet Bahadur Chhetri (Principal) and of Shree
Sainamaina Memorial School without whom doing an internship would have been
impossible. I would also like to thank my internship mentor and all the other employees of
Shree Sainamaima Memorial School for providing their help and guidance during my
internship period. I would also like to thank all the other generic mentors of my internship
under whose guidance I completed my internship program.
I would like to express my sincere thanks to the department of information and
communication technology, Butwal Multiple Campus for providing me, this opportunity to
explore my interests and ideas in the field of computer science and information technology
through this program. I would like to thank my supervisor Mr. Parshuram Sharma for his
kind support, coordination, and valuable supervision.
Finally, an honorable mention goes to my family for their understanding and supporting me
in completing this Internship. Without the help of the particulars that are mentioned above,
I would not have been able to complete this internship.
Sincerely,
Kansiram Kandel
ii
Abstract
This paper presents a report for accomplishing an internship for the partial fulfillment of
the requirement for the degree of Bachelor of Information and Communication
Technology awarded by Tribhuvan University. The report mainly focused on System
Maintenance, Security Management, System Monitoring Technical Support. The
internship was conducted from Mangsir 15th, 2079 to Falgun 30th, 2079.
The report mainly deals with Operating and monitoring computer system, installing
vSpace server using Ncomputing devices and supporting hardware equipment;
performing checks to verify systems are stable; performs system backups and hardware
preventive maintenance; troubleshoots system operating problems and determines the
cause of system interruptions, installing and updating antivirus software, ensuring the
computer systems and networks are secure by monitoring access control and monitoring
servers to ensure they are running smoothly.
The job profile that is mentioned here is totally based on practical workings that have
conducted during my internship in this organization. As per the rule of the university, the
duration of the internship was 10 weeks and during this period, I learned about the
organizational function that helped me accomplish my program.
iii
List of Figures
iv
List of Tables
v
Table of Contents
Company Letter........................................................................................................................................i
Acknowledgement..................................................................................................................................ii
Abstract..................................................................................................................................................iii
List of Figures........................................................................................................................................iv
List of Tables...........................................................................................................................................v
List of Abbreviations.............................................................................................................................vi
Chapter 1: Introduction
1
1.1 Internship Description..............................................................................................1
1.3 Objectives.................................................................................................................2
2.4.1 History..............................................................................................................5
3.3.1 Placement.........................................................................................................11
vi
3.3.2 Duration............................................................................................................11
3.3.3.1 Single User and Dual User Monitor Installation on vSpace Server..........12
3.4.1 My Contributions.............................................................................................14
References……………………………………………………………………………….16
Appendix…………………………………………………………………………………17
vii
List of Abbreviations
BIOS Basic Input Output System
CEO Chief Executive Officer
CPU Central Processing Unit
ICT Information and Communication Technology
IT Information Technology
KVM Kernel-based Virtual Machine
OS Operating System
PC Personnel Computer
PCI Peripheral Component Interconnect
RAM Random Access Memory
VDI Virtual Desktop Infrastructure
viii
Chapter 1: Introduction
1
System downtime: One of the most significant problems that IT operations teams face is
system downtime, which can result in lost productivity, revenue, and customer
dissatisfaction. Downtime can be caused by hardware failures, software bugs, network
issues, and human errors.
Security breaches: Security breaches are a growing concern for IT operations teams.
Cyberattacks can result in data breaches, system downtime, and reputational damage. IT
operations teams need to constantly monitor the IT infrastructure for security
vulnerabilities and take appropriate measures to protect against potential threats.
Lack of Automation: Manual processes can be time-consuming and prone to errors. IT
operations teams may face the challenge of automating their processes to improve
efficiency and reduce errors. However, this requires investment in new technologies and
training for team members.
Lack of visibility: Lack of visibility into the IT infrastructure can make it challenging for
IT operations teams to identify issues and troubleshoot them effectively. This problem
can be addressed by implementing monitoring tools and creating dashboards that provide
real-time insights into system performance.
Skills Shortage: The IT industry is constantly evolving, and IT operations teams need to
keep up with the latest technologies and trends. However, there is a shortage of skilled IT
professionals, which can make it challenging for organizations to recruit and retain
qualified IT operations staff.
At all, these problems can have a significant impact on an organization's IT operations
and require a proactive approach to address and mitigate their impact.
1.3 Objectives
The objective of an IT operator in an organization is to ensure the smooth functioning of
the organization's IT infrastructure, which is essential for the efficient running of daily
well-functioning. operations of various software and hardware resources used in an
organization. Some of the key objectives of an IT operator in a company include:
To ensure availability of IT infrastructure
To ensure security and data protection
To provide technical support to end-users
To implement and maintain IT systems and applications
To collaborate with other IT professionals
2
1.4 Scope and Limitation
The scope and limitation of an IT operator can vary depending on the organization they
work for and their specific role within that organization. However, generally speaking, an
IT operator is responsible for maintaining the hardware, software, and network
infrastructure of an organization's IT systems. So, the role and responsibility of an IT
Operator is crucial for the smooth functioning and durability of the IT related
infrastructure of organization.
The scope of an IT operator's responsibilities may include tasks such as:
1. Managing and monitoring network and server infrastructure, including routers,
switches, firewalls, and servers.
2. Installing, configuring, and maintaining computer hardware, software, and
peripherals.
3. Troubleshooting and resolving technical issues related to hardware, software, and
network connectivity.
4. Providing technical support to end-users, including responding to help desk
support, providing remote support, and assisting with hardware and software
issues.
5. Ensuring the security of the organization's IT systems, including monitoring for
potential security breaches and implementing security protocols and procedures.
The limitations of an IT operator may depend on their level of training and expertise, as
well as the resources available within their organization.
Limitations of an IT Operator
Not having the authority for major changes
Limited in ability to provide specialized support in complex issues
In summary, an IT operator's scope and limitation are primarily determined by their role
within an organization, their level of training and expertise, and the resources available to
them.
3
Chapter 2: Organization Detail and Literature Review
4
NComputing, based in San Mateo, California, is a privately held for-profit company with
offices in the United States, Singapore, UK, Germany, India, Korea, and Poland; and
resellers around the world.
2.4.1 History
Founding
In 2003, Young Song, a former VP at eMachines, met German entrepreneur Klaus Maier
(formerly CEO of hydrapark), who had spent more than ten years developing the core
software on which NComputing is based. They formed a team to develop the
complementary hardware in Korea, while the software was written in Poland and Russia.
After they successfully launched the product and reached $10 million revenue in two
years, the two founders decided to move its headquarters to Silicon Valley. Stephen
Dukker, former chairman of eMachines, joined NComputing in August 2006, to lead the
company together.
Financing
Dukker introduced NComputing to venture capitalists and technology journalists in
September 2006 at DEMOfall 06. By October 2006, NComputing had raised $8 million
5
from Scale Venture Partners (formerly known as BA Venture Partners). In January 2008,
the company raised a $28 million series B round of financing, led by Silicon Valley
venture capital firm Menlo Ventures with participation from Scale Venture Partners and
South Korea's Daehong Technew Corp. In April 2012, the company raised a $21.8
million series C round of financing led by Questmark Partners with participation from
existing investors. In 2017, original NComputing Co., Ltd, a Korean corporation, became
the ultimate holding company for all other subsidiaries and had raised $6 million from
MDI VC (Telkom Indonesia VC in Jakarta), Pinnacle Ventures (Menlo Park, United
States), and Bokwang Ventrues (Seoul, Korea) for accelerating South Asia region's
growth and boost enterprise VDI software products.
6
Windows 8 SP1 (64-bit), Windows Server 2012 R2, Windows 10, Windows Server 2016
and Windows Server 2019.
vSpace Server software utilizes Microsoft Remote Desktop Services features to host user
sessions.
7
issues given historical inequalities in accessing education, jobs and other opportunities
for students of color. In Hispanic Serving Institutions (HSIs) there is a growing emphasis
on students’ post-graduate career success, fueled by goals ranging from diversifying the
workforce (Sansone et al., 2019) to a commitment towards enhancing the social mobility
of Latinx students (Martinez & Santiago, 2020).1 Although a robust body of literature
exists on the unique cultural features of HSIs and Latinx student outcomes in HSIs
(Garcia et al., 2019; Nunez, 2014), the experiences of Latinx students with the world of
work (e.g., Nuñez & Sansone, 2016) and career development (e.g, Leal-Muniz &
Constantine, 2005; Risco & Duffy, 2011), the literature on internship programs in HSIs
is not as well developed. This is a critical issue facing the field of work-based learning
(WBL), internships and HIPs, as it is possible that the design, implementation and
ultimate effects of college internships may (or should) vary according to the unique
institutional contexts of MSIs and students’ racial identities and cultural backgrounds.
This idea is based on research demonstrating that a “one-size-fits-all” approach to
teaching and learning, student affairs, and career development ignores both historic and
structural inequalities while also overlooking the unique needs, circumstances and
potentials of a diverse student body. For instance, research on culturally relevant
pedagogy underscores the need to reject deficit-oriented frames and acknowledge
marginalized students’ experiences (Ladson-Billings, 1995), and on the racialized (and
discriminatory) nature of institutional practices and the allocation of resources (Harper,
2009; Ray, 2019), demonstrate how policies, practices and thus student experiences in
higher education are decidedly not “innocent” or race-neutral. This is especially true for
Latinx students, as the evidence indicates that students of color often opt out of
internships and related career development opportunities due to preconceived concerns
about ethnic and racial discrimination, misalignment with college major and employer
expectations, and the suitability of employer culture for Latinx populations (Berríos-
Allison, 2005; Leal-Muniz & Constantine, 2005; Poon, 2014; Sweeney & Villarejo,
2013).
8
Chapter 3: Internship Activities
organizations and personal use alike. Computer revolutionizes the way of study while
making education smoother and quicker. It also connects us to different sources, which
show us different ways to understand a particular topic or idea. In general, a computer has
helped the education world and also has changed the way we work & learn. Hence to
provide access of computer to all student the Vspace server is very helpful and very
useful.
9
troubleshooting hardware and software issues, performing updates and patches, and
troubleshooting network connectivity issues.
5. Performing backups and disaster recovery: The IT operator is responsible for
performing regular backups of the vSpace server data and ensuring that disaster
recovery procedures are in place in case of a server failure or other disaster.
At conclusion we can say that an IT operator plays a critical role in managing a vSpace
server, ensuring that it is running efficiently and securely, and providing support to users
who are accessing virtual desktops and applications through the server.
10
5 8th week
Installing firewalls and antivirus software
3.3.2 Duration
The standard internship period fixed by the University (TU) is six credit hours, which is
equivalent to ten weeks or two months and 10 days. However, internship period was 3
months.
Office Hour: 12pm –4pm
Start Week: 01 December, 2022
Ending Week: 14 March, 2023
11
3.3.3.1 Single User and Dual User Monitor Installation on vSpace Server
Figure 3.3.3.1: Working structure on Single & Dual monitor on vSpace server.
13
got the opportunity to learn so much skills related to information technology operation
including vSpace server management.
3.4.1 My Contributions
1. Installation and configuration of the vSpace Server software on a physical server or
host computer. http://www.ncomputing.com/softwaredownload
2. Managing user accounts and permissions, including creating, modifying, and deleting
user accounts.
To add a user follow the steps below:
i. Login with the credentials at www.ncomputing.com .
ii. Click on the Management Portal tab
iii. Click on Manage Users
To set roles and permissions
i. Just in the same way we added the Users, we add Roles. Click in
the Roles button.
ii. Then, click +ADD
iii. Enter a description for the new role and select the desired permissions
and click Save
3. Configuring the virtual desktop environment, Ncomputing devices, network settings,
and peripherals such as printers and scanners.
To auto-connect configuration
a. join the preferred server to a connection Group. (Device Setup > Connection
Settings > Create New Group [button] > New host IP > Save)
4. Monitoring and optimizing system performance, including resource utilization, disk
space, and network bandwidth.
5. Troubleshooting issues that arise in the vSpace environment, such as connectivity
problems or performance issues.
6. Applying software updates and patches to ensure the vSpace environment remains
secure and up to date.
a) Turn on the device.
b) Click on Device Setup
c) Click on the Update Tab
d) On the Manual Update section, click on Update Now.
In Summary, vSpace Server Management is critical to ensuring the smooth and reliable
operation of a virtual desktop environment, enabling users to access their virtual desktops
from any device and location while minimizing the IT support required.
14
Chapter 4: Conclusion and Learning Outcomes
15
References
16
Appendix
17