Download Summer/Winter Internship and more Thesis Computer Science in PDF only on Docsity!
INTERNSHIP REPORT
On “Infocom Data Center ONGC”
UNDERTAKEN AT:
OIL AND NATURAL GAS CORPORATION (ONGC),
ASSAM ASSET, NAZIRA
Dist. Sivasagar (Assam) SUBMITTED BY: Rupankar Lahon, Reg.No:202300189, B. Tech CSE(Ai&Ds), Department of Artificial Intelligence and Data Science,SMIT,Sikkim,India INTERNSHIP PERIOD: 26. 05. 2025 TO 30. 06. 2025
NETWORKING
Overview of Networking:
Networking refers to the practice of connecting computers and other devices together to share resources, exchange data, and ensure communication. In an enterprise like ONGC , networking plays a crucial role in maintaining real-time communication, managing vast databases, and ensuring operational continuity across multiple departments and geographic locations. Throughout my internship at ONGC - Infocom Services , I was introduced to a wide range of networking concepts, tools, and devices. I learned both theoretical foundations and gained practical insights into how modern corporate networks are built, configured, and maintained. 1.OSI 7-Layer Architecture: The OS I model (Open Systems Interconnection) is a 7-layer reference model that standardizes communication functions of a network:
- Physical Layer – Transmission of raw bitstream via cables and devices.
- Data Link Layer – MAC addressing and frame delivery (Switching).
- Network Layer – Logical addressing and routing (IP).
- Transport Layer – Reliable data transmission (TCP/UDP).
- Session Layer – Establishes, maintains, and ends communication sessions.
- Presentation Layer – Data translation, encryption, and compression.
- Application Layer – End-user interface (HTTP, FTP, DNS, etc.).
Understanding this model helped me troubleshoot and understand communication flows from hardware to applications. 2. Layer 2 and Layer 3 Switches: Layer 2 Switch: Operates at the Data Link Layer. Uses MAC addresses to forward traffic within the same network (LAN). Layer 3 Switc h : Functions like a router. Operates at the Network Layer and routes packets based on IP addresses, often used for inter-VLAN routing. Both switches are used in enterprise setups to ensure proper data flow and segmentation.
- MAC Addressing and IP Addressing
- MAC Address (Media Access Control): A permanent, hardware- based identifier for network interfaces.
- IP Address (Internet Protocol): A logical address assigned to devices for identification and location in a network. Both are essential for device communication at different layers. 4 .Network Cables and Fiber Optics
- Cat6 Ethernet Cables: Commonly used in LAN environments; supports data transfer speeds up to 1 Gbps over 100 meters.
- Fiber Optic Cables: o Multimode (MM): Supports shorter distances, ideal for internal building connections. o Single-mode (SM): Used for longer distance transmission, such as between buildings or across cities. I observed real-world cabling setups, patch panel connections, and termination practices.
- Enhances security by isolating departments or groups.
- Allows efficient IP address management.
- Cisco Packet Tracer Cisco Packet Tracer is a powerful network simulation tool developed by Cisco. It allows students and professionals to design, configure, and troubleshoot virtual network environments. What It Is : A simulation software that mimics real Cisco hardware and network behaviour in a virtual environment, often used for training and certifications. What We Can Do With It :
- Create network topologies with routers, switches, firewalls, PCs, servers, and cables.
- Configure devices using CLI (Command Line Interface).
- Practice VLANs, Routing, DHCP, NAT, and Subnetting.
- Test connectivity with ping, traceroute, and packet flow analysis.
- Simulate real-time or step-by-step packet movement. Why It’s Useful :
- No need for physical hardware.
- Ideal for practicing before real deployments.
- Enables visual learning of packet flow and device behaviour.
- Encourages experimentation without real-world consequences. During my internship, I used Cisco Packet Tracer to simulate real ONGC network scenarios and practice switch/router configurations before applying them in the actual network.
Server Overview of Servers: Servers are the backbone of any enterprise IT infrastructure. They are powerful machines or virtual instances designed to manage network resources, run applications, store and process data, and provide services to client devices and users across the network. In a large organization like ONGC , servers are responsible for handling critical operations such as user authentication, IP address assignment, security enforcement, software updates, database management, virtualization, and more. 1.Domain Server A Domain Server is the backbone of a centralized network environment where user authentication, security policies, and resource management are handled in a structured manner.
- It hosts the Active Directory Domain Services (AD DS) role, allowing systems to join a domain.
- Ensures centralized control over user credentials, access permissions, and device enrolments.
- Active Directory (AD) Server The Active Directory Server is responsible for authenticating and authorizing users and computers in a Windows domain network.
- Maintains a directory database of users, groups, computers, printers, and other network objects.
- Provides Group Policy Management to enforce security, software deployment, and configurations.
- Detects failures, bandwidth bottlenecks, and outages in real- time.
- Generates alerts for abnormal behaviour or policy violations.
- Examples include SolarWinds, PRTG, or Nagios.
- SOC (Security Operations Center) and ISOC (Industrial SOC)
- SOC: Centralized unit where security professionals monitor, detect, analyze, and respond to cybersecurity incidents. o Uses tools like SIEM (Security Information and Event Management). o Protects IT infrastructure from threats, vulnerabilities, and attacks.
- ISOC: Tailored for Industrial Control Systems (ICS) or SCADA environments. o Focuses on OT (Operational Technology) security. o Handles threats specific to industrial processes and physical infrastructure.
- Array Load Balancer An Array Load Balancer distributes incoming network traffic across multiple servers to improve responsiveness and reliability.
- Prevents overload on any single server.
- Supports SSL offloading, session persistence, and health monitoring.
- Increases uptime and ensures scalability for web-based services.
- NAC (Network Access Control) NAC enforces security policies on devices attempting to connect to the network.
- Authenticates and evaluates devices before granting access.
- Ensures compliance with antivirus, patches, or software policies.
- Quarantines or blocks non-compliant devices automatically.
- Antivirus Servers These servers centrally manage antivirus software across the organization.
- Push updates to all endpoint devices.
- Monitor threats, quarantines, and infections in real-time.
- Generate security reports and enforce virus scanning schedules.
- Firewall A Firewall is a security system that monitors and controls incoming and outgoing network traffic.
- Can be hardware-based or software-based.
- Implements rules for traffic filtering, intrusion detection/prevention, and VPN services.
- Segments the network and protects internal systems from external threats.
- Proxy Server A Proxy Server acts as an intermediary between user devices and the internet.
- Masks internal IP addresses for anonymity and security.
- Caches frequently visited content to reduce load times and bandwidth usage.
- Enforces web usage policies (block certain sites, monitor activity).
- Implementation of L2 and L3 switches enables VLAN segmentation and efficient routing.
- Storage Systems
- Centralized NAS (Network Attached Storage) are used for data storage and backup.
- Supports high-speed read/write operations with redundancy.
- Power Management
- Equipped with UPS (Uninterruptible Power Supplies) to ensure uninterrupted power supply.
- Power Distribution Units (PDUs) in each rack for controlled and monitored power flow.
- Cooling and Environmental Controls
- Centralised air conditioners to maintain room temperature.
- Raised floors and cold aisle containment are used for effective airflow management. Security and Monitoring a. Physical Security
- Restricted access using biometric/password authentication.
- 24/7 surveillance using CCTV and entry logs.
- Fire suppression systems for fire safety. b. Cybersecurity Controls
- Firewalls, antivirus servers, intrusion detection/prevention systems (IDS/IPS).
- Implementation of Network Access Control (NAC) and role- based access.
- Integration with SOC (Security Operations Center) for real-time monitoring of network events and threat mitigation. Operational Functions and Responsibilities
- Server Maintenance: Regular updates via WSUS, antivirus scans, and performance checks.
- User Management: Using Active Directory for provisioning, authentication, and access policies.
- Network Monitoring: Real-time performance and fault analysis using dedicated tools.
- Patch Management: Ensuring all systems are updated against vulnerabilities. Full Stack Web Development Project: IT Management Portal
- Project Overview: The IT Management Portal is a modular, web-based application designed to centralize and streamline the management of IT
- CSS3: Custom stylesheets (assetstyle.css, contract.css, serverstyle.css, style.css) for a modern, dark-themed, responsive UI.
- JavaScript (Vanilla): Handles dynamic rendering, form submissions, and API communication. B. Backend
- Node.js: JavaScript runtime for server-side logic.
- Express.js: RESTful API framework.
- Sequelize ORM: Object-Relational Mapping for MySQL database operations.
- CORS: Middleware for cross-origin requests. C. Database
- MySQL: Relational database for storing all IT data.
- Sequelize Models: Define schema and validation for each entity (Asset, Contract, Server, etc.).
- Modules & Features A. Dashboard (DEVELOPED.html)
- Navigation Cards: Each IT function (Assets, Contracts, Servers, Network, Helpdesk, etc.) is represented as a card with an SVG icon, title, and description.
- Responsive Grid: Adapts to all screen sizes for easy navigation.
- Consistent Theme: All modules share a unified look and feel.
C. Contracts Management
- CRUD Operations: Add, edit, and delete contracts.
- Fields: SI No, Vendor Name, GeM Contract, Regular Contract, Period, Value, Nomination, Regular, Subject, OEM/OES, Remarks.
- Table View: Contracts are listed in a table with serial numbers and action buttons.
- Consistent UI: Matches the asset management module for a seamless experience.
D. Server Management
- Server Grid: Displays all servers/applications as cards with names and statuses.
- Server Details: Clicking a server card opens a detailed view (server-details.html) showing all technical and management details for each server, including: o Sr. No, Rack No, Location, Server IP, Hostname, OS, Serial No, iDRAC/ILO, Make, Model, RAM, Storage, Processors, VM details, Managed By, Maintained By, Device Location, Remarks.
- Data Structure: Server and application data are managed via JavaScript objects for easy extension.
- Status Indicators: Cards can show server status (active, inactive, maintenance) with color-coded badges.