Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Internship Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

Internship Report

By

AKHTAR HUSSAIN
ECI-IT-15-038

Department Name
HIET

Organization Name
NTC

Supervisor Name
Engr. Zaheer

Faculty of Engineering Sciences and Technology


Hamdard Institute of Engineering and Technology
Hamdard University, Main Campus, Karachi, Pakistan

i
LETTER OF UNDERTAKING BY THE INTERN

I, ID No. hereby agree and understand that:


a) I will communicate regularly with my Internship advisor during the Internship program
period.

b) I will submit the progress reports and other documents (internship plan, supervisor
contact details…etc.) on time and according to the prescribed form and content.

c) I will complete and submit my Internship report, in the prescribed form and content, by
the deadlines specified.

Intern’s Name:

Date & Signature:

ii
Faculty of Engineering Sciences and
Technology

Hamdard Institute of Engineering and


Technology

Hamdard University, Main Campus, Karachi.

CERTIFICATE
This is certify that student of Hamdard University has successfully completed month Internship
under the direction of assigned supervisor from 19 July 2019 to 30 august 2019 at NTC. During
the period of his internship program with us he found punctual, hardworking and inquisitive.

(Intern’s Name / Roll No) (Supervisor Name and Signature)

(Company Stamp)

iii
ACKNOWLEDGEMENTS

All praises and thanks to Almighty ”ALLAH”, the most merciful, the most gracious, the source
of knowledge and wisdom endowed to mankind, who conferred us with the power of mind and
capability to take this project to the exciting ocean of knowledge. All respects are for our most
beloved Holy Prophet “Hazrat MUHAMMAD (Peace Be Upon Him)”, whose personality will
always be source of guidance for humanity.

Acknowledgement is due to Hamdard Institute of Engineering and Technology and NTC


for support of this Internship.

We wish to express our appreciation to our Engr. Zaheer who served as our major advisor. We
would like to express our heartiest gratitude for their keen guidance, sincere help and friendly
manner which inspires us to do well in the project and makes it a reality.

v
Table of Contents
Title Page i
Letter of Undertaking ii
Certificate iii
Acknowledgements iv
1. INTRODUCTION 1

2. INTERNSHIP DESCRIPTION 2
OSI Model Layers 2
Subnetting 9
Static and Dynamic Routing 10
RIP Routing Protocol
OSPF Routing Protocol
6. CONCLUSIONS / RECOMMENDATIONS 15

vi
1. INTRODUCTION
NTC was formed in 1996 by telecom reorganization act through which Pakistan
Telecommunication Corporation (formerly Pakistan Telephone and Telegraph Department)
was split into two companies, National Telecommunication Corporation (NTC) and Pakistan
Telecommunication Company Limited (PTCL). NTC provides telecom services to all
government departments and at residencies of government employees across Pakistan.

The government of Pakistan established National Telecommunication Corporation (NTC) in


January 1996 under the Telecom Reorganization Act 1996. The main objective was to have an
infrastructure independent of all other operators that can be used for the purpose of government
communication and as an alternative support for the operators entering the market.

NTC started to concentrate on developing its own infrastructure. Within few years, it aligned
itself with emerging technological advancements by deploying Fiber Optic Systems in the long
haul (4,117 Km) and metropolitan areas (1,517 Km) along with around 150,000 digital lines
exchanges. First cloud based Tier-III National Data Center was also established by NTC in
record period of five months. It will help the Government in e-governance, e-health and e-
commerce. In order to keep itself abreast with technological advancements, NTC prepared a
comprehensive plan to migrate its legacy TDM exchanges with latest IP based Next Generation
Network (NGN) technology. Through this migration project, approx. 127,693 Telephone and
15,000 Broadband ports have been developed which makes 42% replacement of TDM network.
NTC also initiated and played role in strategically important projects such as Safe City
Islamabad, Pakistan Educational Research Network (PERN), positioning of PAKSAT to secure
and occupy the allocated Space Slot (2003), induction of GPON Technology and MPLS were
also successfully implemented.

In pursuance to its mandate and conformity with Telecom Policy 2015, and to provide the latest
ICT services to its subscribers, explored possibilities to enhance subscriber base for revenue
generation, NTC signed agreements with CMOs, PTCL, DHA, Nayatel, Multinet, Supernet,
Vmware etc. under Public Private Partnership. Moreover, Enterprise Resource Planning (ERP),
Security Systems, Office Automation and biometric attendance have also been made
operational to enhance efficiency and transparency.

2 INTERNSHIP DESCRIPTION

vi
i
OSI Model Layers:
Physical Layer:
It is responsible for sending bits from one computer to another. This layer deals with the
hardware of networks such as cabling. The major protocols used by this layer include
Bluetooth, PON, OTN, DSL.

Datalink layer:
This layer receives data from the physical layer and compiles it into a transform form called
framing or frame. The protocols are used by the Data Link Layer include: ARP, CSLIP,
HDLC, ATM.

Network Layer:
This is the most important layer of the OSI model, which performs real time processing and
transfers data from nodes to nodes. Routers and switches are the devices used for this layer.
The network layer assists the following protocols: Internet Protocol (IPv4), Internet Protocol
(IPv6), IPX, AppleTalk, ICMP, IPSec and IGMP.

Transport Layer:
The transport layer works on two determined communication modes: Connection oriented and
connectionless. This layer transmits data from source to destination node. It uses the most
important protocols of OSI protocol family, which are: Transmission Control Protocol (TCP),
UDP, SPX, DCCP and SCTP.

Session Layer:
The session layer creates a session between the source and the destination nodes and terminates

vi
ii
sessions on completion of the communication process. The protocols used are: PPTP, SAP,
L2TP and NetBIOS.

Presentation Layer:
The presentation layer is responsible for translation, compression, and encryption. The
following are the presentation layer protocols: XDR, TLS, SSL and MIME.

Application Layer:
This layer works at the user end to interact with user applications. Deal with file transfer, access
& management. Enable user to access the network. This layer uses following protocols: HTTP,
SMTP, DHCP, FTP, Telnet, SNMP and SMPP.

Devices used in each layer are….

 Physical Layer :
Hubs, Repeaters, Cables, Fibers, Wireless.
 Datalink Layer:
Bridges, Modems, Network cards, 2-layer switches.
 Network Layer:
Routers, Brouters , 3-layer switches.
 Transport Layer:
Gateways , Firewalls.
 Session Layer:
Gateways, Firewalls, PC’s.
 Presentation Layer :
Gateways, Firewalls, PC’s.
ix
 Application Layer:
Gateways, Firewalls, all end devices like PC’s, Servers.

Public IP Addresses and Private IP Addresses:


Public IP addresses will be issued by an Internet Service Provider and will have number
ranges from 1 to 191 in the first octet , with the exception of the private address ranges
that start at 10.0.0 for Class A private networks and 172.16.0 for the Class B private
addresses.

Ranges Of Public IP Addresses:


The following ranges are reserved by the Internet Assigned Numbers Authority (IANA)
for use as private IPV4 :
CLASS ADDRESS RANGE DEFAULT SUBNET

MASK

CLASS A 10.0.0.0 - 10.255.255.255 255.0.0.0

CLASS B 172.16.0.0 – 172.31.255.255 255.255.0.0

CLASS C 192.168.255.255 – 192.168.255.255 255.255.255.0

Difference Of Switch and Hub:


A Hub is a networking device that allows one to connect multiple PCs to a single network.
Hubs may be based on Ethernet, Firewire, or USB connections. A switch is a control unit that
turns the flow of electricity on or off in a circuit. It may also be used to route information
patterns in streaming electronic data sent over networks. In the context of a network, a switch
is a computer networking device that connects network segments.

Key Differences Between Hub and Switch:

x
1. The hub operates on the physical layer of the OSI while a switch works on the datalink
layer of the OSI.

2. Hub shares the bandwidth between the ports. On the other hand, in a switch, the dedicated
bandwidth is provided to the ports.

3. The number of ports that can connect to the device is significantly more abundant in switch
while it is less in a hub.

4. A hub can have a single collision domain whereas in switch different ports have different
collision domain. As a consequence, the hub introduces more collision than the switch.

5. The half-duplex transmission mode is used in the hub. As against, the switch transmits the
data in the full-duplex mode.

6. A switch provides filtering of frames so that only the dedicated device receives the
forwarded frame. Conversely, there is no such concept of filtering is used in the hub and
it forwards a frame to each port.

Repeater:

Repeater is a powerful network device which is used to regenerate the signals, when they travel
over a longer distance, so that the strength of the signal remains the same. Repeaters are used
to establish Ethernet network. Hence repeaters are capable of carrying electric as well as light
signals.

Repeaters are also known as signal boosters.

Bridges:
xi
A bridge is a type of computer network device that provides interconnection with other bridge
networks that use the same protocol. Bridge devices work at the data link layer of the Open
System Interconnect (OSI) model, connecting two different networks together and providing
communication between them.

Modem:

A modem is a hardware device that converts data into a format suitable for a transmission
medium so that it can be transmitted from computer to computer. A modem modulates one or
more carrier wave signals to encode digital information for transmission
and demodulates signals to decode the transmitted information.

Router:

A router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. Data sent through the internet,
such as a web page or email, is in the form of data packets. A packet is
typically forwarded from one router to another router through the networks that constitute
an internetwork (e.g. the Internet) until it reaches its destination node.

xi
i
How We Access the Internet:

To connect to an internet we need :

 Public IP.
 Physical Connectivity

Pakistan is connected to world through 5 fibre:

1. I-ME-WE: india-middle east-western europe.


2. SEA-ME-WE 3: South East Asia–Middle East–Western Europe.
3. SEA-ME-WE 4: South East Asia–Middle East–Western Europe.
4. SEA-ME-WE 5: South East Asia–Middle East–Western Europe.

TWL: Transworld.

IANA:

The Internet Assigned Numbers Authority (IANA) is a function of ICANN, a nonprofit


private American corporation that oversees global IP address allocation, autonomous
system number allocation, root zone management in the Domain Name System (DNS), media
types, and other Internet Protocol-related symbols and Internet numbers. IANA is broadly
responsible for the allocation of globally unique names and numbers that are used in Internet
protocols that are published as Request for Comments documents. These documents describe
methods, behaviors, research, or innovations applicable to the working of the Internet and
Internet-connected systems.

IP Addresses:

IANA delegates allocations of IP address blocks to regional Internet registries (RIRs). Each
RIR allocates addresses for a different area of the world. Collectively the RIRs have created
the Number Resource Organization formed as a body to represent their collective interests and
ensure that policy statements are coordinated globally.

The RIRs divide their allocated address pools into smaller blocks and delegate them to Internet
service providers and other organizations in their operating regions. Since the introduction of
the CIDR system, IANA has typically allocated address space in the size of /8 prefix blocks
for IPv4 and /23 to /12 prefix blocks from the 2000::/3 IPv6 block to requesting regional

xi
ii
registries as needed. Since the exhaustion of the Internet Protocol Version 4 address space, no
further IPv4 address space is allocated by IANA.

Domain Names:

IANA administers the data in the root nameservers, which form the top of the
hierarchical Domain name system (DNS) tree. This task involves liaising with top-level
domain"Registrar-of-Record"s, the root name server operators, and ICANN's policy making
apparatus.

Subnetting:
Subnetting is the practice of dividing a network into two or more smaller networks. It increases
routing efficiency, enhances the security of the network and reduces the size of the broadcast
domain.

 Purpose Of Subnetting:
The main purpose of subnetting is to help relieve network congestion. Congestion used to be a
bigger problem than it is today because it was more common for networks to use hubs than
switches. When nodes on a network are connected through a hub, the entire network acts as a
single collision domain.

How Switch Works:


If we have computers connected to our switch we can concentrate on how does switch really
work. Every device has hardcoded physical address called MAC Address. Again, if computer
sends the IP packet to another device, it encapsulates the packet with frame using destination
MAC address of device B and own MAC address as source and then sends it out. When frame

xi
v
arrives at device B, it is stripped and IP packet is received but before it gets there it traverses
the ethernet switches.

Switching Process:

When a frame arrives to a switch, the switch needs to direct the frame out through the right
port, this redirection is called switching. When a frame enters into the switch port, the switch
checks the dynamic table in memory which stores Physical Port and MAC address pairs.
Switch then knows which port to use to forward the frame.

Static and Dynamic Routing:


Static routing is when you statically configure arouter to send traffic for particular destinations
in preconfigured directions. Dynamic routing is when you use a routing protocol such as
OSPF, ISIS, EIGRP, and/or BGP to figure out what paths traffic should take.

Static Routing:
Static routing is a form of routing that occurs when a router uses a manually-
configured routing entry, rather than information from a dynamic routing traffic.

 Static routing causes very little load on the CPU of the router, and produces no traffic to
other routers.
 Static routing leaves the network administrator with full control over the routing behavior
of the network.
 Static Routing Is very easy to configure on a small networks.

x
v
Dynamic Routing:
Dynamic routing is a networking technique that provides optimal data routing. In dynamic
routing, the routing protocol operating on the router is responsible for the creation, maintenance
and updating of the dynamic routing table.

Dynamic routing uses multiple algorithms and protocols. The most popular are Routing
Information Protocol (RIP) and Open Shortest Path First (OSPF).

 The router delivers and receives the routing messages on the router interfaces.
 The routing messages and information are shared with other routers, which use exactly the same
routing protocol.
 Routers swap the routing information to discover data about remote networks.

RIP Routing Protocol:

The Routing Information Protocol (RIP) is one of the oldest distance-vector routing protocols
which employ the hop count as a routing metric. RIP prevents routing loops by implementing
a limit on the number of hops allowed in a path from source to destination. RIP is a Distance
Vector protocol and uses the Bellmann-Ford algorithm for determining the best route.

 The largest number of hops allowed for RIP is 15, which limits the size of networks
that RIP can support.

 RIP implements the split horizon , route poisoning and holddown mechanisms to
prevent incorrect routing information from being propagated.

 In RIPv1 routers broadcast updates with their routing table every 30 seconds.

x
vi
 In most networking environments, RIP is not the preferred choice for routing as its time
to converge and scalability are poor compared to EIGRP, OSPF, or IS-IS. However, it
is easy to configure, because RIP does not require any parameters, unlike other
protocols.

RIPV1 Messages:
RIP defined two types of messages:
1. Request Message: Asking a neighbouring RIPv1 enabled router to send its routing
table.

2. Response Message: Carries the routing table of a router.

OSPF Routing Protocol:


Open Shortest Path First (OSPF) is a routing protocol for Internet Protocol (IP) networks. It
uses a link state routing (LSR) algorithm and falls into the group of interior
gateway protocols (IGPs), operating within a single autonomous system (AS).

x
vi
i
Open Shortest Path First (OSPF) was designed as an interior gateway protocol (IGP), for use
in an autonomous system such as a local area network (LAN). It implements Dijkstra's
algorithm, also known as the shortest path first (SPF) algorithm.

OSPF Topology and Router Type:

OSPF Topology:
OSPF topology divides an autonomous system into one or multiple logical areas. all areas are
connected to AREA 0. AREA 0 is a backbone area.

Router Type:
Internal Router: all interfaces on an internal router belong to the same ospf area.
Area Border Router (ABR) : An ABR belongs to two or more area, one of which must be
backbone area. An ABR is used to connect the backbone areas and non-backbone areas. It can
be physically or logically connected to the backbone area.

Backbone Router: At least one interface on a backbone router belongs to the backbone area.
Internal routers in AREA 0 and all ABRs are backbone routers.

AS Boundary Router (ASBR): An ASBR exchanging routing information with other ASs.
An ASBR does not necessarily reside on the border of an AS. It can be internal router or an
ABR. An OSPF device that has imported external routing information will become an ASBR.

Network Type:
OSPF supports the following network types:
 Boadcast: Network type use with Ethernet or Fibre Distributed Data Interface (FDDI) link
layer protocols.
 Point To Point (P2P): Network type used with PPP or HDLC link layer protocols.

x
vi
ii
 Non-Broadcast Multi-Access: Network type used with frame relay (FR) or X 25 link layer
protocols.
 Point To Multipoint: Network type that requires manual configuration.

Conclusion:

Now at the end I would like to conclude my experience in NTC. That was my first ever
internship at any Govt. organization and this was such a great experience I gain lot of
knowledge about communication and Networking that will be helpful for me in future. Being
an engineer I simply got a direction for my future by this internship.

Finally I would like to thanks all staff of NTC for such a kindness and help me in every possible
way without any kind of hesitation.

xi
x

You might also like