Report 1
Report 1
IT Support Representative AT
INTERNSHIP REPORT
by
Shahil Ghale
Registeration No . 6-2-355-6-2019
Submitted to
Everest College
Mentors Recommendation
ii
Tribhuvan University
Faculty of Humanities and Social Sciences
Everest College
MENTOR'S RECOMMENDATION
…………………………..
Supervisor
iii
Tribhuvan University
Faculty of Humanities and Social Sciences
Everest College
SUPERVISOR’S RECOMMENDATION
…………………………….
SIGNATURE
Mr. Kamal Pathak.
Supervisor / BCA Co-ordinator
Everest College
iv
Tribhuvan University
Faculty of Humanities and Social Sciences
Everest College
LETTER OF APPROVAL
This is to certify that this internship report prepared by SHAHIL GHALE entitled “IT
……………………………………….… ………………………….…………….
Mr. Baburam Chapagain Mr. Kamal Pathak
Assistant Director Supervisor / BCA Co-ordinator.
Everest College
Everest College
……………………………………….. ……..…………………………………
v
ACKNOWLEDGEMENT
First of all, I would like to thank Mr. Sushan Patel and Mr. Rajesh Chaudhary for their
expert advice and guidance throughout this internship as a supervisor and mentor . I
would also like to extend my gratitude to my family for their constant support throughout
the journey . Finally, I would like to thank my friends, colleagues for their words of
encouragement.
Shahil Ghale
Registeration No:- 6-2-355-6-2019
Roll No:- 35502015
Date:- 23rd May , 2024
vi
ABSTRACT
This report provides the detailed overview of the learning experience gained during the
internship period and project that the author has worked on. In this report, detailed
explanation of all the works carried out during the internship and their learning outcomes
are provided. Moreover, this report provides the description of the company and my role
in the company as a IT Support Representative Intern. Although I am employed by
Websurfer Nepal Communication System Private Limited, it is important to note that my
referral originated from Kalash Services Private Limited. Kalash Services is an
outsourcing company affiliated with various other ISPs and operates in conjunction with
other companies. Consequently, despite my employment at Websurfer Nepal, the primary
operations, including our CEO and head office, are managed by Kalash Services.
Likewise, this report contains the surficial explanation about the core networking that
have been done during the internship session. Provision of the weekly log which contains
the task and activities that I have done during every week of the internship period. All of
the learning outcomes from the internship session evidence to proof of my internship
session are given in this report.
vii
TABLE OF CONTENTS
ACKNOWLEDGEMENT ......................................................................................................... vi
viii
APPENDIX .............................................................................................................................. 33
ix
LIST OF FIGURES
x
LIST OF TABLES
x
LIST OF ABBREVIATIONS
AP Access point
Net Network
SM Station Machine
xi
CHAPTER 1: INTRODUCTION
1.1 Introduction
An Internet Service Provider (ISP) is an entity that offers services facilitating internet
access, utilization, and participation. ISPs can take on various forms, including commercial,
community- owned , non- profit, or privately- owned . Internet services typically provided
by ISPs can include Internet access, Internet transit, domain name registration, web
hosting, Use net services, and colocation.
An ISP typically serves as the access point or gateway that provides a user access to
everything available on the internet. Such a network can also be called as an eyeball
network. This network is often referred to as an "eyeball network" due to its role in
providing users with the "eyes" to see and interact with the online world.
Enterprise support (ITSR) in an Internet Service Provider (ISP) context refers to the
specialized services and assistance provided by the ISP to businesses and large
organizations that have unique and often complex networking requirements. IT Support
Representative work in offices providing general support to managers and customers.
They assist in the planning and administration of an organization’s daily operations and
ensure customer enquiries and issues are resolved in a timely manner. IT Support officer
handle fiber as well as wireless link-related problems. Fiber and wireless problems related
to:
Initially, these issues are assessed by the corporate department's IT Support Officer
Representative. If not resolved by the ITSR , fiber-related problems escalate to the fiber
1
department, while wireless-related issues are forwarded to the operations department
WSN comprises various technical departments, including NOC, monitoring, and call
support. The call support branch is further divided into two sections: retail and enterprise
support. As an intern, my role was primarily within the enterprise support and monitoring
department. This involved assisting various organizations, such as banks, hotels, and
microfinance institutions, who were clients of the ISP. The company had already gathered
the necessary data for troubleshooting, making problem-solving more efficient and data-
driven.
1.3 Objectives
The main objectives of the internship are to provide network support to corporate clients,
monitor their intranet, and troubleshoot issues occurring in both their intranet and internet
services
2
To monitor all trunks and nodes of the network
To analyze the technologies used in this industry and provides support online.
To setup wireless and optical fiber devices remotely and accessibly.
To observes traffic on specific path and link and upgrade the bandwidth
accordingly.
To learn about configuring a Mikrotik router, bridge configuration, DNS
configuration, DHCP configuration, and hotspot configuration.
To explore the activities within the IT department, such as sub-netting, switch
commands, and troubleshooting.
Network Monitoring:
Network support officers monitor the link using various monitoring tools like
nagios, podnms, cacti, and more .This included proactive monitoring, identifying
network-related issues, and providing prompt solutions to ensure optimal network
performance I constantly monitor the status of pods to determine if they are
operational or down.
Configuring Mikrotik router:
Network support officers provide essential support configured MikroTik routers to
meet the specific needs and requirements of the projects. This involved setting up
and fine-tuning router settings for network efficiency and security.
3
Every study has some limitations. The following are the major limitations of the study:
One should be in WSN network to access the link and for remote access VPN is
used as WebSurfer server.
It takes a lot of time and effort to conduct research and study on networking and to
learn how the network operates.
The study relies on access to specialized equipment, software, and experienced
mentors, which may not be universally available.
Networking is a rapidly changing field, and the study's findings may become
outdated as technology advances.
1: Introduction
The first chapter of report contains the brief introduction of the project the problem
statements and how it solves those problems the objectives of the project what are the
limitations and scope of the project.
2: Introduction to organization
The second chapter contains to organization details. The hierarchy of the organization,
different domain that the organization works upon. The numbers of intern and the
domains they work upon.
The third chapter provides a concise overview of the background in the networking
domain, explaining the rationale behind its development. It also covers related
networking applications and highlights the differences between these and the working
mechanisms behind it using various softwares.
4
4: Internship Activities
The fourth chapter discusses the roles and responsibilities that the intern will be needing
to fulfil in the intern time period. The weekly log table contains all the record of the work
done in a week.
This chapter contains the conclusion presenting what are the works that are executed
from the perspective of intern , and what are the skill you gained during these 12 weeks .
The learning outcome from the intern period and how does it implement it in actual real
world environment.
5
CHAPTER 2: INTRODUCTION TO ORGANIZATION
Websurfer Nepal (WSN )is an ISP, which offers Internet and Intranet connections via
different services mediums such as VSAT, Fiber Optics and wireless radio modems.WSN
offers abroad spectrum of Internet backbone to a wide range of value-added broadband
enabled application and satellite IP VPN services for corporate customers who require
high performance continuous access services and bandwidth-on-demand broadband
services (Websurfer-Nepal, 2021).
The company provides affordable, reliable and the fastest fiber internet and wireless
internet in Kathmandu valley and all other major cities in Nepal. Companies 'fiber optic
cable Internet has reached everywhere in the cities to provide the fastest ever Internet in
valley and Websurfer Nepal continually strives to provide value for money and an
excellent service to all people, companies and organizations in Nepal.
The solutions company provider are from a Comprehensive Wireless Internet Service to
6
give a fast connection on a dedicated Network between locations and connection to the
outside world via the own dedicated VSAT Systems .After the winning research and
implementation on wireless internet , now Websurfer Nepal also has fiber optic cable
internet around the Kathmandu Valley. Company also provides Intranet services, Dialup
Internet, Cable Internet, Wireless Hotspots, Wireless Internet. The company has a unique
and open approach and has created the business model required by the clients. WSN
believes on providing the new and affordable services to customers as the company's
success depends on customer's satisfaction.
7
2.2 Organizational Hierarchy
Organization consists of different level of employees works under the organizational
motives and goals. It consists different departments and each department have its own job
to do. Websurfer Nepal Communication System Pvt.Ltd has its own management system,
which works within its structure.
8
2.3 Working Domains of Organizational
Websurfer Communications focuses on delivering a wide range of high-quality internet
and telecommunication services, ensuring strong continuous infrastructure development,
and adoption of new technologies to enhance connectivity and digital transformation in
Nepal. Some of its major working domains are related to :
2.3.3 Networking :
A professional web presence is, for every business in the growth stage, a vital element for
success and for a sustainable growth. Cross-device optimisation Custom designing and
implementing network infrastructures tailored to the specific needs of businesses. This
includes setting up LAN (Local Area Networks), WAN (Wide Area Networks), and
MAN (Metropolitan Area Networks).Description of Intern Unit. Implementing VPN
9
solutions to provide secure, encrypted remote access for employees working off-site,
ensuring data privacy and security.
Number of Interns : 3
- Technician
- Client Support
- Data Monitoring
10
WSN consists of different technical departments like NOC, monitoring , callsupport etc.
Call support is divided into two departments : retail and enterprise support department.I
worked as an intern in the enterprise support department where we had to deal with
different clients of different organizations using internet and Intranet of the WSN which
includes Banks , Hotels , Micro-finances , Hydropower companies, Securities companies
etc. The Enterprise Department works for corporate clients only ,if any other home user’s
issue came it will be forwarded to retail support .We have to look after the client’s link
and need to troubleshoot if any issue arise. If the issue is not resolved by support
department, further it will be forwarded to concerned department if there is any physical
issue and need to send technical team for support at client end. Furthermore, the
enterprise support and monitoring department played a vital role in ensuring the
uninterrupted flow of data and communication for our corporate clients. This was
particularly crucial for financial institutions, where even a minor disruption could have
significant implications. In the monitoring aspect of the department, we employed
advanced tools and techniques to proactively identify potential issues, allowing us to take
preventive measures before they could impact our clients' operations. This proactive
approach not only improved the overall network reliability but also enhanced client
satisfaction.
11
CHAPTER 3: BACKGROUND STUDY AND LITERATURE
REVIEW
Additionally, the study reviews related applications within the industry, comparing their
functionalities and benefits to those of WebSurfer's offerings, and highlights the
distinctive features that provide WebSurfer with a competitive edge. This background
study aims to provide a foundational understanding of the company's position and the
factors driving its development strategies.
The review covers scholarly articles, industry reports, and case studies to provide a robust
understanding of current trends and best practices in enterprise development. It also
includes a comparison of WebSurfer’s solutions with other leading applications in the
industry, highlighting unique features and advantages. This review aims to identify gaps
in the existing literature and suggest areas for further research, ultimately supporting the
development of innovative strategies for WebSurfer’s continued growth and success.
12
CHAPTER 4: INTERNSHIP ACTIVITIES
13
4.2 Weekly log
The internship period lasted for 3 months. During the internship period various task were
performed with different learning opportunities. All those tasks and activities were
maintained in the weekly log. The main purpose of maintaining this log was to learn
about time management and complete them within a given time under guidance of the
mentor. The weekly log was mandatory in Websurfer and the log was signed by the
mentor after the confirmation and demo of the task that was assigned for a week.
The below table shows the weekly log of the internship period which lasted for 3 months
i.e. 12 weeks:
14
Date Day NAME OF THE TOPIC/MODULE COMPLETED
3rd 21/12/23 1 Introduction of Wireless Mediums (AP, SM).
week 22/12/23 2 Training by Wireless team.
23/12/23 3 Configuration of wireless devices.
24/12/23 4 Observed senior network engineer who was troubleshooting
network issues.
25/12/23 5 Learned about the importance of documenting network
troubleshooting steps and procedures.
15
Date Day NAME OF THE TOPIC/MODULE COMPLETED
6th 5/1/24 1 Accessing Router and Switches using SecureCRT
week 6/1/24 2 Accessing Router and Switches using Telnet
7/1/24 3 Comprehensive basic knowledge about VLANs.
8/1/24 4 Research on VPNs and learned about the advantages and
disadvantages of different VPN types and protocols
9/1/24 5 Finding all the connected clients through certain VLAN .
16
Date Day NAME OF THE TOPIC/MODULE COMPLETED
9th 24/1/24 1 Monitoring the distribution Points.
week 25/1/24 2 Monitoring the distribution Ports.
26/1/24 3 Managing and Monitoring the graphs for traffic.
27/1/24 4 Checking the Bandwidth manager (172.20.0.100) ip .
28/1/24 5 Testing its peering connectivity.
17
Date Day NAME OF THE TOPIC/MODULE COMPLETED
12th 13/2/24 1 Accomplished tasks included client management.
week 14/2/24 2 Proactive network monitoring under continuous supervisor
oversight.
15/2/24 3 I was assigned task to monitor the podnms to monitor the
point of distribution link, p2p link.
18/2/24 4 Monitoring the Portoutage down links where various
Dedicated and corporate organization recent down links are
to be lookfter and troubleshoot the issue.
20/2/24 5 Assigned to update new client and new pod in our
monitoring system .
18
Date Day NAME OF THE TOPIC/MODULE COMPLETED
15th 3/3/24 1 Site observation
week 4/3/24 2 Site observation
5/3/24 3 Site observation
7/3/24 4 Site observation
9/3/24 5 Site observation
19
4.3 Description of project involved during internship
Within a time period of three months, I was tasked with monitoring and troubleshooting
network issues for different organizations.
4.3.1 B roker :
During my internship period, I configured MikroTik routers for various broker offices,
including Sundhara Securities, Vision Securities, Indira Securities, Milkyway Share
Broker Company Limited, etc. My responsibilities included setting up bonding,
configuring public and VLAN networks, and establishing routing. I also implemented
essential firewall rules, such as NAT, port forwarding, and website blocking.
Additionally, I proactively resolved any issues that arose in the broker offices, ensuring
the smooth operation of CDS and intranet services, as well as internet connectivity. I
encountered an issue where intranet services were not functioning across various broker
braches, despite P2Preachablility.
4.3.2 Bank :
During my internship, I was tasked with testing new branch links and troubleshooting
network problems for banks. I conducted link tests for banks like Citizen Bank Devighat
Nuwakot FTTX, Kumari Bank Lakeside, RBB-Dhangadhi, NIC ASIA Laghubitta Bittiya
Sanstha Ltd, Tripura-Branch-fttx, etc. My approach involved verifying P2P reachability.
If P2P was reachable, I coordinated with the head office to ensure the link's functionality.
In cases where P2P was not reachable, I investigated missing VLANs or peering
configurations, promptly addressing them on switches or routers and establishing peering
connections when necessary.
20
Mikrotik is done by the company staff as per customer requirement. I configured a
MikroTik router, which involved setting up VLANs, implementing public access, enabling
masquerade, and configuring port forwarding. There are mainly 5 ports /10ports Mikrotik
are used and they are configured either using winbox or entering the IP address of the
Mikrotik as shown in the below figure using winbox.
21
'brigeInternet' bridge. This setup allows us to provide internet access to our customers
using the assigned public IP address.
Figure 8 : Interface
In the above figure, you can see the interface list menu, which displays information about
all available interface lists on the router. I have customized the interface names to align
with user requirements
Figure 9: Bridging
22
Figure 10 : Bridge Ports
In the above figures, bridging is done on the port where every Ethernet is defining their
own work . Mainly bridging is done to protect from loop and to inter connect many LAN
as a single LAN.
In this way the Mikrotik router is configured and there are other processes also which is
confidential and therefore cannot be shown in the report.
Monitoring Network
- Tools used
Network Management System is software that is used to deliver, discover, monitor and
maintain computer networks. The NMS systems used in the organization are:
23
Nagios
Nagios monitors entire IT infrastructure to ensure systems, applications, services, and
business processes are functioning properly. In the event of a failure,Nagios can alert
technical staff of the problem, allowing them to begin remediation processes before
outages affect business processes, end-users, or customers.
Nagios has been used in the organization for the purpose of monitoring, reporting
availability and the employees must update IP address of devices to be monitored. It is
used for wireless devices, server monitoring and port monitoring of routers and switches.
Figure 12 : Wireless AP
24
Figure 13 : Wireless SM
25
Cacti
Cacti is a complete network graphing solution designed to harness the power of RRD
Tool's data storage and graphing functionality. Cacti provides a fast poller , advanced
graph templating , multiple data acquisition methods, and user management features
out of the box. All of this is wrapped in an intuitive, easy to use interface that makes
sense for LAN-sized installations up to complex networks with thousands of devices.
Cacti has been used for traffic monitoring of routers, switches and server’s port
POD NMS
PODNMS is used for monitoring all the network PODs as well as creating availability
reports. The PODNMS application used in the organization is horizon openNMS.
26
2) Secure CRT
It is an application which is used to remotely access routers and switches using telnet and
SSH protocol.
27
Figure 19 : Port Brief Command
28
4) Telnet
Telnet is a network protocol used to virtually access a computer and to provide a two –
way , collaborative and text-based communication channel between two machines. It
follows a user command Transmission Control Protocol / Internet Protocol ( TCP/IP)
networking protocol for creating remote sessions . It helps to monitored the device like
Routers and Switches remotely.
Figure 21 : Telnet
29
Chapter 5: CONCLUSION AND LEARNING OUTCOMES
5.1 Conclusion
In conclusion , my internship experience has been a valuable journey that has provided
me with a deeper understanding of the field and allowed me to develop and refine
essential skills. I have learned how to configure network equipment, troubleshoot
connectivity issues, and effectively handle client inquiries. These skills have not only
improved my technical abilities but have also improved my communication and
teamwork skills. Throughout the internship, I have gained hands-on experience in
network monitoring, client communication, and problem-solving, which have been
instrumental in my professional growth. At the end, the internship period was highly
productive and gave the opportunity to put theoretical knowledge learned in class into
practice. Looking ahead, I aim to continue developing my technical proficiency and
further enhance my problem-solving abilities. Additionally, I plan to expand my
knowledge in areas such as cyber security and network optimization to stay current in this
dynamic field.
30
To add vlan and do peering.
To follow the organization culture and the discipline that must be maintained once
you are in the organization.
Developing the interpersonal, managerial and entrepreneurial skills that are crucial in
all professionals and employees career development.
Learned to work under extreme pressure and time constraint, which has helped in
building self-confidence.
The importance of time and punctuality.
31
REFERENCES
32
APPENDIX
33
Figure 23 : Adding VLAN.
34
Figure 25 : Monitoring Port Outage Links ( Zabbix ).
35
36
37