Networking Internship Documentation (1) (1) - Pages-Merged
Networking Internship Documentation (1) (1) - Pages-Merged
INTERNSHIP
(On-Site/Virtual)
ANDHRA PRADESH
STATE COUNCIL OF HIGHER EDUCATION
(A STATUTORY BODY OF GOVERNMENT OF ANDHRA PRADESH)
PROGRAM BOOK FOR
LONG-TERMINTERNSHIP
(Onsite/Virtual)
Allamsetty Bhavitha
21FE1A0507
2024-2025
An Internship Report on
Networking
Submitted in accordance with the requirement for the degree of
BACHELOR OF TECHNOLOGY
In
Submitted by
ALLAMSETTY BHAVITHA
(21FE1A0507)
External Examiner
4
Certificate from Intern Organization
5
Acknowledgements
The satisfaction that accompanies the successful completion of any task would be
incomplete without the mention of people whose ceaseless cooperation made it possible,
whose constant guidance and encouragement crown all efforts with success.
We also express our sincere thanks to our beloved Chairman Dr. LAVU RATHAIAH
for providing support and stimulating the environment for developing the project.
We also place our floral gratitude to all other teaching and lab technicians for their
constant support and advice throughout the project.
6
Contents
1 Student Declaration
2 Certificate from Intern Organization
3 Acknowledgements
4 Executive Summary
5 Overview of the Organization
6 Internship Part
7 Networking Fundamentals
8 Network Layer
9 Application Layer
10 Switching Concepts
11 Redundancy in Network Design
12 Network Monitoring and Maintenance
13 WLAN Concepts
14 OSPF and its Configuration
15 NAT Concepts
16 Network Management
17 Network Design and Troubleshooting
18 Outcomes Description
7
CHAPTER 1: EXECUTIVE SUMMARY
In essence, networking facilitates the sharing of resources, data, and services, empowering
individuals and organizations to collaborate, communicate, and innovate on a global scale. One
of the key components of networking is protocols, which are sets of rules and conventions
governing how data is transmitted and received across a network. Protocols define everything
from the format of data packets to the procedures for error detection and correction.
The evolution of networking has been marked by significant milestones, which laid the
groundwork for the internet, to the proliferation of high-speed broadband and wireless
technologies in recent decades. Today, networking continues to advance at a rapid pace, driven
by innovations such as cloud computing, 5G wireless networks, and the Internet of Things (IoT).
These developments promise to revolutionize how we connect, communicate, and interact with
the world around us, ushering in an era of unprecedented connectivity and digital transformation.
8
CHAPTER 2: OVERVIEW OF THE ORGANIZATION
Cisco Systems, Inc. is a multinational technology headquartered in San Jose, California, USA.
Founded in 1984 by Leonard Bosack and Sandy Lerner, Cisco has grown into one of the world's
largest and most influential networking hardware, software, and services companies. Cisco's vision
centers around enabling the seamless connectivity of people, devices, applications, and data to drive
innovation, productivity, and sustainable growth. The company aims to be the global leader in
networking solutions, empowering individuals, businesses, and communities to thrive in a digitally
connected world.
Vision:
Cisco Systems, Inc. envisions a digitally connected world where people, devices, applications,
and data seamlessly interact to drive innovation, productivity, and sustainable growth. As a global
leader in networking solutions, Cisco is committed to empowering individuals, businesses, and
communities to thrive in this interconnected landscape. The company's vision encompasses a future
where connectivity is ubiquitous, reliable, and secure, fostering collaboration, creativity, and
prosperity across all sectors of society.
9
CHAPTER3: INTERNSHIP PART
The significance of networking extends beyond individual benefits to encompass broader societal
and economic impacts. Networking plays a crucial role in driving innovation, fostering
collaboration, and accelerating economic growth. By facilitating the exchange of knowledge,
expertise, and resources, networking enables individuals and organizations to leverage collective
intelligence and tackle complex challenges more effectively. In an increasingly interconnected and
interdependent world, networking serves as a catalyst for positive change, driving progress and
prosperity for individuals, organizations, and society as a whole.
10
ACTIVITY LOG FOR THE FIRST WEEK
Day Person
In-
& Brief description of the daily Learning Outcome Charge
Activity
Date Signature
11
WEEKLY REPORT
WEEK–1 (From Dt ……………. to Dt.................... )
Detailed Report:
This week's focus was on enhancing our understanding of networking fundamentals, including
network components, topologies, security measures, Cisco IOS, and protocol suites. We delved into
the basic concepts, hardware elements, and layout configurations of networks, while also exploring
critical security measures and Cisco's operating system. Through this exploration, we aim to
strengthen our expertise in networking essentials to better support our organizational objectives.
12
ACTIVITY LOG FOR THE SECOND WEEK
13
WEEKLY REPORT
WEEK–2 (From Dt ……………. to Dt .................... )
Detailed Report:
This week was dedicated to immersing ourselves in the intricacies of networking, focusing on
fundamental concepts and technologies essential for understanding modern networks. Our
exploration began with an in-depth study of reference models like OSI and TCP/IP, providing us
with structured frameworks to conceptualize and troubleshoot network architectures effectively.
We explored the physical layer of networking, learning about hardware transmission mechanisms
and the diverse types of cables crucial for establishing network connectivity. Overall, this week's
deep dive into networking concepts and technologies provided us with a robust foundation to
navigate the complexities of modern network environments and drive our organizational objectives
forward.
• Reference models: Frameworks for network architecture include the OSI model and TCP/IP
model.
• Data Encapsulation and Access: Data packaging for transmission and protocol- based data
regulation.
• Physical layer and Cable Types: Hardware transmission mechanisms and various cable
types.
• Datalink Layer and Protocols: Data transfer regulation and protocols like Ethernet and Wi-
Fi.
• Ethernet Switching: Control for local network connectivity and switch configuration
management.
14
15
ACTIVITY LOG FOR THE THIRD WEEK
16
WEEKLY REPORT
WEEK–3 (From Dt ……………. to Dt.................... )
Detailed Report:
This week was dedicated to a comprehensive exploration of key networking concepts and
technologies essential for understanding modern network infrastructures. We began by delving into
the network layer, where we focused on understanding its role in routing and forwarding data
packets across networks. Additionally, we examined the evolution of Internet Protocol (IP)
standards, contrasting IPv4 and IPv6 addressing schemes, and exploring the transition to the newer
IPv6 protocol to address the limitations of IPv4. Moving on, we deepened our understanding of the
transport layer, where we explored the functionality of the Transmission Control Protocol (TCP)
and the User Datagram Protocol(UDP),understanding their differences and applications in data
transfer. Finally, we discussed the session and presentation layers, focusing on communication
session management and data representation, respectively. Through hands-on exercises and
theoretical discussions, we enhanced our knowledge and skills in networking fundamentals, laying
a solid foundation for future exploration and application in our professional endeavors.
• Network Layer and Routing: It monitors the routing of data packets across networks.
• IPV4 and IPv6 addressing: IPv4 uses 32-bit addresses and IPv6 uses 128-bit
addresses.
• Transport Layer Protocols: TCP and UDP ensures data transmission among two parties.
17
ACTIVITY LOG FOR THE FOURTH WEEK
18
WEEKLY REPORT
WEEK–4 (From Dt ……………. to Dt.................... )
Detailed Report:
This week's focus was on delving into crucial networking concepts and security measures essential
for understanding and safeguarding modern network infrastructures. We commenced by exploring
the application layer, delving into its protocols and user interface interactions vital for enabling
communication between software applications. Additionally, we delved into network attacks,
understanding the various forms of unauthorized intrusion attempts and breaches that pose threats
to network integrity and data security. Moreover, we discussed port numbers as endpoint identifiers
and their role in protocol differentiation. Lastly, we examined security threats and vulnerabilities,
assessing risks to network integrity and potential exploits. Through theoretical discussions and
practical exercises, we deepened our understanding of networking fundamentals and security
principles, equipping ourselves with essential knowledge to address network challenges effectively.
• Firewall and its types: Network barriers filtering traffic for enhanced protection.
19
20
ACTIVITY LOG FOR THE FIFTH WEEK
Implement InterVLAN
Day–5 Hands-on InterVLAN Routing Routing in a network
environment
21
WEEKLY REPORT
WEEK–5 (From Dt ……………. to Dt.................... )
Detailed Report:
This week was dedicated to understanding fundamental switching concepts, VLANs, and
InterVLAN routing. We began by delving into the basics of switching, grasping concepts such as
MAC addresses, frames, and the operation of Layer 2 switches. Moving forward, we explored the
concept of VLANs, learning how they provide logical segmentation within a network for improved
scalability, security, and management. Through hands-on exercises, we gained practical experience
in configuring VLANs on network devices and understanding their role in network segmentation.
By the end of the week, we had acquired a solid understanding of switching fundamentals, VLAN
configuration, and InterVLAN routing principles, laying a strong foundation for more advanced
networking concepts.
VLAN’s:
VLAN’s, or Virtual Local Area Networks, are a fundamental concept in network design that allow
for logical segmentation of a physical network into multiple isolated broadcast domains. This
segmentation provides several benefits, including enhanced security, improved performance, and
simplified network management. By dividing a single physical network into multiple VLAN’s,
organizations can isolate different departments, users, or functions while still sharing the same
physical infrastructure. This isolation prevents broadcast traffic from traversing unnecessary parts
of the network, reducing network congestion and improving overall performance.
22
ACTIVITY LOG FOR THE SIXTH WEEK
Day Person
In-
Learning Outcome
& Brief description of the daily Charge
Activity
Date Signature
23
WEEKLY REPORT
WEEK–6 (From Dt ……………. to Dt ................... )
Redundancy in Networking:
Redundancy in networking refers to the practice of deploying duplicate components or paths within
a network infrastructure to ensure continuous operation and minimize the risk of downtime. It is a
critical aspect of network design aimed at improving reliability, fault tolerance, and availability.
2. Redundant Paths: Redundant paths involve creating multiple physical or logical connections
between network devices to ensure continuous connectivity in case of link failures. Protocols like
Spanning Tree Protocol (STP) and Link Aggregation (EtherChannel) are commonly used to
manage redundant paths and prevent network loops.
3. Redundant Services: Redundant services involve replicating critical network services, such as
DHCP servers, DNS servers, and firewalls, across multiple devices or locations to provide backup
and ensure service availability in case of service failures.
24
ACTIVITY LOG FOR THE SEVENTH WEEK
Day Person
In-
Learning Outcome
& Brief description of the daily Charge
Activity
Date Signature
25
WEEKLY REPORT
WEEK–7 (From Dt ……………. to Dt ................... )
• Designing networks for high availability by implementing redundancy at various levels, such
as device, link, and service redundancy.
• Configuring redundancy protocols like HSRP, VRRP, and GLBP to provide fail over and load
balancing capabilities for critical network services.
• Learning network monitoring and maintenance strategies to proactively identify and address
potential issues, ensuring continuous operation and minimizing downtime.
• Developing disaster recovery plans and procedures to mitigate the impact of network failures
and minimize downtime during unexpected events.
• Implementing network resilience techniques such as network segmentation, load balancing,
and geographic redundancy to enhance fault tolerance and ensure continuous service
availability.
• Utilizing network virtualization technologies such as Virtual Routing and Forwarding (VRF)
and Virtual Private LAN Service (VPLS) to create isolated network domains and enhance
network scalability, security, and resource utilization.
26
ACTIVITY LOG FOR THE EIGHTH WEEK
27
WEEKLY REPORT
WEEK–8 (From Dt ……………. to Dt ................... )
• Implementing Layer 2 security measures such as port security and VLAN access control to
protect the network from unauthorized access and attacks.
• Configuring Wireless LANs (WLANs) for secure deployment, considering architecture,
standards, and security considerations to ensure data confidentiality and integrity.
• Understanding routing concepts and configuring routers for static and dynamic routing
protocols like OSPF to efficiently route traffic between network segments and ensure optimal
network performance.
• Deploying network access control mechanisms such as IEEE 802.1X authentication and MAC
address filtering to enforce security policies and control access to the network.
• Configuring advanced routing features such as route redistribution and route summarization
to optimize routing efficiency and reduce routing table size, enhancing network scalability
and performance.
• Implementing Quality of Service (QoS) policies to prioritize and manage network traffic
effectively, ensuring optimal performance for critical applications and services while
maintaining network responsiveness and stability.
28
29
ACTIVITY LOG FOR THE NINTH WEEK
30
WEEKLY REPORT
WEEK–9 (From Dt ……………. to Dt ................... )
Detailed Report:
This week, our focus was on delving into essential networking protocols and cyber security
concepts. We began by exploring OSPF (Open Shortest Path First), understanding its features,
characteristics, and components, which play a crucial role in dynamic routing. Additionally, we
delved into OSPFv2 configuration, mastering techniques for configuring OSPF on routers to
optimize network performance. Moreover, we discussed cryptography, exploring data encryption
methods to ensure secure communication and data protection. Lastly, we introduced Access Control
Lists (ACLs), understanding their role in network access control and security policy enforcement.
Through theoretical discussions and hands- on exercises, we deepened our understanding of
networking protocols and cyber security principles, equipping ourselves with essential knowledge
to address network challenges effectively.
- Features and Characteristics: OSPF's dynamic routing capabilities and its role in efficient
network routing.
- Components: Examination of OSPF components such as routers, areas, and Link State
Advertisements (LSAs).
- Configuration: Mastery over OSPFv2 configuration commands for optimizing network
performance.
31
ACTIVITY LOG FOR THE TENTH WEEK
32
WEEKLY REPORT
WEEK–10 (From Dt ……………. to Dt.................... )
Network Address Translation (NAT): NAT is a crucial networking concept that facilitates
communication between private and public networks by translating private IP addresses to public
ones and vice-versa.
Types of NAT: Various types of NAT include the static NAT, dynamic NAT, and PAT (Port
Address Translation). Static NAT provides one-to-one mapping between private and public IP
addresses, while dynamic NAT dynamically assigns public IP addresses from a pool to private IP
addresses. PAT, on the other hand, maps multiple private IP addresses to a single public IP address
using different port numbers.
Access Control Lists (ACL): ACL’s serve as essential tools in network security, controlling access
to network resources based on predefined rules.
Implementation: ACLs are implemented at router interfaces or switch ports, where they intercept
and inspect packets traversing the network. By configuring ACLs, administrators can define permit
or deny statements to allow or block specific types of traffic, effectively controlling network access
and enforcing security policies. Regular monitoring and maintenance of ACL configurations are
essential to ensure network security remains robust and aligned with organizational security
policies.
33
ACTIVITY LOG FOR THE ELEVENTH WEEK
34
WEEKLY REPORT
WEEK–11 (From Dt ……………. to Dt ....................)
- VPN Types: Remote access VPNs allow secure individual connections to corporate networks,
while site-to-site VPNs enable secure communication between different locations over the internet.
- QoS Principles: Prioritization ensures critical applications receive needed bandwidth and
latency, while bandwidth management prevents congestion, ensuring optimal performance for all
network traffic.
- QoS Models: Differentiated Services (DiffServ) categorize and prioritize traffic based on
service levels, while Integrated Services (IntServ) establish explicit paths and resource reservations
for each traffic flow, ensuring consistent performance with more overhead.
- Network Administration: Involves monitoring, configuring, and maintaining network
devices and resources to ensure optimal performance and security, including tasks like traffic
monitoring, device configuration, security management, troubleshooting, and network upgrades.
- Device Discovery: Protocols like CDP and LLDP identify and gather information about
neighboring network devices, operating at the data link layer to advertise device presence and
capabilities, aiding in device management, inventory tracking, and troubleshooting.
- SNMP Functionality: SNMP allows remote monitoring and management of network devices,
collecting device statistics, configuring settings, and receiving alerts, operating with manager-
agent architecture for data collection and analysis.
35
ACTIVITY LOG FOR THE TWELFTH WEEK
36
WEEKLY REPORT
WEEK–12 (From Dt ……………. to Dt ................... )
Detailed Report:
This week's focus was on delving into essential networking concepts and practices, encompassing
NTP operation, network design, switch and router hardware, network troubleshooting,
troubleshooting tools, and network automation. We began by exploring NTP operation, gaining
insights into its role in synchronizing time across network devices, ensuring accurate timestamps
for events and transactions. Moreover, we explored the concept of network automation, recognizing
its potential in streamlining network management tasks and improving operational efficiency.
Through theoretical discussions and hands-on exercises, we enhanced our knowledge and skills in
networking fundamentals, equipping ourselves with essential tools and techniques to address
network challenges effectively.
Network design: Network design involves planning and implementing network architectures to
meet organizational requirements efficiently. It encompasses various elements such as topology,
addressing, routing, and security. It begins with understanding business objectives and user
requirements, followed by determining the appropriate network topology and selecting hardware
and software components. Design considerations also include redundancy, fault tolerance, and
disaster recovery planning to minimize downtime and ensure continuity of operations.
Network troubleshooting: Network troubleshooting is the process of diagnosing and resolving
network issues to maintain optimal performance and reliability. It involves identifying problems,
analyzing symptoms, and implementing solutions to restore network functionality. Troubleshooting
techniques include isolating the scope of the issue, testing connectivity, and analyzing network
traffic using diagnostic tools like ping, trace route, and packet sniffers. Troubleshooting often
follows a systematic approach, starting with gathering information about the problem, identifying
potential causes, and testing hypotheses to isolate the root cause.
37
38
CHAPTER5: OUTCOMES DESCRIPTION
The outcomes description for all the weeks combined are as follows:
• Learn to design, configure, and troubleshoot VLANs and InterVLAN routing to segment and
optimize network traffic effectively.
• Acquire skills in configuring Layer 2 security measures, including port security, VLAN access
control, and network access control mechanisms, to protect the network from unauthorized
access and attacks.
• Master the deployment and management of wireless LANs (WLANs), including WLAN
architecture, standards, security considerations, and configuration best practices.
• Understand routing concepts and configuration, including static and dynamic routing
protocols like OSPF, to efficiently route traffic between network segments and optimize
network performance.
• Explore advanced networking topics such as network virtualization, Quality of Service (QoS)
implementation, disaster recovery planning, and network monitoring and maintenance
strategies.
• Gain hands-on experience through practical lab exercises and real-world scenarios to reinforce
theoretical concepts and develop practical skills in network design, configuration, and
troubleshooting.
39