Você está na página 1de 14

SUMMER INTERNSHIP REPORT

Submitted by
SARAVANAN.T
17MCA0022
MASTER OF COMPUTER APPLICATIONS

DEPARTMENT OF COMPUTER APPLICATIONS (PG)

Dr. SNS RAJALAKSHMI COLLEGE OF ARTS & SCIENCE


(AUTONOMOUS)
Re-Accredited with ‘A’ Grade by NAAC
Affiliated to Bharathiar University
COIMBATORE – 641049.

OCTOBER - 2018
Dr. SNS RAJALAKSHMI COLLEGE OF ARTS & SCIENCE
(AUTONOMOUS)
Re-accredited with ‘A’ Grade by NAAC,
Affiliated to Bharathiar University,
COIMBATORE-641049

2018-2019
Certified that this Bonafide record Work done by
SARAVANAN.T
17MCA0022
SUMMER INTERNSHIP REPORT

GUIDE HOD

Submitted for MCA Degree V Semester Examination on 25/07/2018

INTERNAL EXAMINER EXTERNAL EXAMINER


INTRODUCTION:
The industrial training is very useful to acquire knowledge from the various department of the company
and also it is useful like, management skills and organization the firm. Through the training creates job
opportunity for each of us uses to get job preference. Therefore the training is useful for the academic and
personally helped to the various things. For many, the process of recruiting and hiring is a drain on company
resources. One solution: Appeal to tomorrow's staff members when they're looking for internships, and all you
have to do is choose the best of the bunch when it comes time to hire.

OBJECTIVE OF THE TRAINING


 To know about the nature of the organization

 To study the various department and the function of the organization

 To get particular working knowledge in the organization

 To know about the official pattern and production activities of the Organization
 Speaking of additional manpower, setting up an internship program allows you to take advantage
of short-term support.

NEED AND SCOPE OF TRAINGING:

SCOPE OF THE TRAINING:

The industrial training creates good relationship between common public, employees, higher officer,
manager etc... this knowledge are utilized for the development of academic knowledge. The ongoing
globalization process is replete with threats from the completers. At the same time one should also relies that it.

LIMITATION OF THE TRAINNING:

The training period covert only the 10 days therefore we cannot gather entire knowledge about the
organization the training is useful for the academic and personally helped to the various things.

HISTORY OF THE COMPANY

Blue mount technologies private limited is established in 2010(previously known as software


developing industries) with a team of experienced engineers. The office is situated at mettupalayam main road
i.e., 13kms from the Coimbatore city.

The company was started in the aim to make and service in the field of software projects to develop.
You can give orders and get to know about your enquiries at any time in this office. The office is working for
weekly 5 days and 8 hours per day.
The directors of the company are

 Karthick
 Shankar

All the bank transactions of the organization are deals with the federal bank ltd., kannarpalayam branch,
karamadai. The turnover of the company during the year was approximately rs.12 lakhs.

COMPANY PROFILE

NAME OF THE COMPAN : BLUE MOUNT TECHNOLOGIES

REGISTER OFFICE : METTUPALAYAM ROAD,

COIMBATORE – 641031.

TELEPHONE NO : 9047776573

E-MAIL : bluemounttechnologies@gmail.com

TURNOVER : 10 LAKHS

NATURE OF BUSINESS : OWN MANUFACTURER

YEAR OF ESTABLISHMENT : 2010

LEGAL STATUS OF FIRM : PRIVATE LIMITED COMPANY

TOTAL NO OF EMPLOYEES : 8 TO 13 PEOPLE

COMPANY CEO : MR. KARTHICK


MISSION:
 Act with honesty and integrity.

 Treat people with respect.

 Conduct all business lawfully.

DESCRIPTION:
An office manager is responsible for monitoring and reviewing systems, usually focusing on specific
outcomes such as improved timescales, turnover, output, sales, etc. they may supervise of manage a team of
administrators, allocation roles, recruiting and training, and issuing assignments and projects.

PROJECT HANDLING:

WHAT IS A COMPUTER NETWORK?


A computer network is the connection of computer systems (hardware and software) and accessories
for the purpose of resource sharing and ease of communication. A computer network can be large enough to
accommodate millions of computers and accessories (Internet) it can also be as small as 2 computers. Mean
while, a local area network is a type of computer network that is confined to a limited geographical area like
SNS campus, homes, cyber cafes, coffee shops etc. the number of computers in a LAN can be just 2 and can
also be as much as a few hundreds (sometimes thousands).
Basically, creating a connection (with a cable, Bluetooth, Wi-Fi) between two computer devices defines a
computer network.

NETWORK ANALYSIS AND DESIGN


Before creating anything (in this case a network of computers) it is necessary to design a logical
representation of the project to make sure it is workable. Then next, consider its feasibility. To do this, you want
to consider the financial implications of creating a network, the manpower, the importance and necessity, the
cost of maintenance and so on.
In the design phase; deciding what topology you want to use is necessary as well as, what kind of cables you
would need and what network devices you need to purchase. These would be discussed in details hereafter.
Bear in mind that, we are trying to simulate a network where the staff can share network resources and
communicate efficiently but most importantly safely, we would also attempt to make provisions for guests to
connect to the network but in a limited capacity to avoid security compromise with the application of clients’
authentication system.

NETWORK TOPOLOGY
Topologies in computer networks refer to the physical arrangement of computers and the network devices.
There are various topology types. Viz; bus topology (linear), star topology, ring topology, hierarchical star
topology (extended star topology).
1.1 Star topology

1.2 Linear topology

1.3 Extended star topology

1.4 Ring topology

For the purpose of this project, the extended star topology would be implemented for the following reasons;
 Security

 Ease of expansion

 Cheaper to maintain even though it costs more to set up due to purchase of so many hardware devices.
NETWORK DEVICES
ROUTER: a router traditionally translates network packets from one network to another. In other words it
receives information from the internet, and transfers it to the right recipient on the LAN. Here the router used
has the capability of implementing the adaptive security appliances (ASA) capabilities and other security
policies.

SWITCH: A switch does almost the same job the router. It distributes packets to peripherals. But most
importantly it serves as a central connection point for cables from workstations, other switches etc.

WIRELESS ACCESS POINT: The wireless access point serves as an extension of the LAN to devices that
cannot connect to the network by the use of cables. The WAP becomes the part of the network that visitors are
allowed to connect to with limited security but with some security too.

CABLES: The cables to be used here would be majorly, the unshielded twisted pair CAT5 (CAT5 UTP)
because of its speed, and relatively low cost as well as reliability. If there would be a need for running cables
externally (exposed) then the shielded CAT5 twisted pair cables would be employed. The RJ45 would be used
in terminating the cables.

NETWORK DIAGRAM
From the network diagram above we see that the local area network is linked with the internet (the external)
through the Internet Service Provider (ISP) (examples of ISPs; MTN GLO) the connection comes into the local
network through the cisco router that has ASA (Adaptive security Appliance) enabled. The ASA would be
discussed later. The connection flows through to the core switch which serves as a central connection point for
other workstation switches. Obviously there are three departments in this simulated network and one public
wireless access point.

SECURITY OF THE NETWORK


For the sake of growth and well-being, owners as well as managers of a company need to pay special
attention to the security system of their computer network. Network security is concerned with the protection of
network resources and services from natural and human caused disasters. To do so, the security designer has to
look carefully at the vulnerability of the network system and design security measures to protect disaster on the
company.
Furthermore, it is important to note that switch ports are gateways to a network. Therefore it is necessary to keep
them secure. Unused ports must be monitored regularly if need be, they must be shut down. For the purpose of
this network, the unused ports are shut down. Security must be configured on open ports to avoid spoofing,
sniffing and MAC address flooding.

TYPES OF PROJECTS AND TRAINING IN BMT:


 Web design
Web design encompasses many different skills and disciplines in the production and
maintenance of websites. The different areas of web design include web graphic design, interface
design, authoring, including standardised code and proprietary software. User experience design and
search engine optimization. Web designers use both vector and raster graphics editors to create web-
formatted imagery or design prototypes.
 Networking
A computer network or data network, is a digital telecommunications network allows nodes to
share resources. In computer networks, computing devices exchange data with each other
using connections between nodes. These data links are established over cable media such as
wires or optic cables, or wireless media.
 Mobile app
A Mobile app is a computer program designed to run on a mobile device such as a phone or
tablet or watch. Mobile applications often stand in contrast to desktop applications which run on
desktop computers, and with web applications which run in mobile web browsers rather than directly
on the mobile device. mobile apps were originally offered for general productivity and information
retrieval, including email, calendar, contacts, the stock market and weather information.
Market research firm gartner predicted that 102 billion apps would be downloaded in 2013, which
would generate 26 billion in the US, the google play and apple stores alone generated 5 billion.
 Software development
Software development is the process of conceiving, specifying, designing, programming,
documenting, testing and bug fixing involved in creating and maintaining applications, frameworks, or
other software components. Software development is a process of writing and maintaining the source
code, but in a broader sense, it includes all that is involved between the conception of the desired
software through to the final manifestation of the software, sometimes in a planned and structured
process. A software development process methodology, model or life cycle is a framework that is used
to structure plan and control the process of developing information systems.
o Gathering requirements
o Design for the software
o Analyzing the problems
o Implementation coding
o Market research
o Testing the software
o Deployment and maintenance

SALES DEPARTMENT:
The main function of this department is deal with terms and records relating to sale of finished
Software Projects marketing and advertisement etc…, the work of the sales department include receipt checking
and recording of the customer maintenance sales journal and ledger preparation, submission and follow up of
bills, statements of customer maintenance and collection of outstanding bills, preparation of sales statistics
Sales is done in two ways
 Local Project Sales

 Online Project Sales

Local sales are done with in the city. Local are divided Into 3 types. By preparing director invoice the product
sale made to the customers directly.
In Online sales, as per the requirement of the agents the required yarn is to be sent. In department sales, agents
sell the products through their accounts to head office.

In the sales department all credit and cash sale will be recorded. The are adopting two types sale such as
 Cash sales
 Credit sales

ACCOUNTS DEPARTMENTS:
BLUE MOUNT TECHNOLOGIES has computerized its accounting system and hence the work load
of the accounts departments’ staff has been reduced and volume of work is turned out easy and with greater
accuracy than manual accounting system.
Depreciation has been provider on the written down value method on all the assets except electrical machinery
which has been calculated on straight line method. The company maintains various accounting records as
follows.
 Credit & Debit Voucher

 Cash Book

 Bank Book

 Purchase and Sales Journal

 General Journal and Ledger

 Debtors Ledger

 Employee Cost Account

FINANCE DEPARTMENT:
Finance department is needed to pay salaries to employees and also for staffs. The finance can be
borrowed, from shareholders, banks and other financial institutions also from the internal and external sources.
The firm arises fund from bank also. The firm maintains the fund by proper utilization for necessary things. The
finance department is under control of managing directors.

ACCEPT THE PAYMENT AS,


 Credit card

 Debit card

 Paytm

COMPUTER DEPARTMENT:
BLUE MOUNT TECHNOLOGIES uses LAN [Local Area Networking] system of computer it uses
“CLIPPER” and “FOXPRO” language and also program languages. Most of the important activities of the
concerns are computerized up to the data-computer are introduced in purchase departments. Account
department, personal department, sales department and stores department. Each and every department will enter
and records the transaction on the department terminal. The recorded information’s are stored EDP [Electronic
Data Processing].
Daily statement, weekly statement, monthly statements for all units are prepared with the use of
computer consumption of times reduced and jobs are done very accurately.

MAINTENANCE ` DEPARTMENT:
Software maintenance in software engineering is the modification of a software product after delivery
to correct faults, to improve performance or other attributes. A common perception of maintenance is that it
merely involves fixing defects.
Maintenance department function is saving the collection of documents and project details and customer
details in safety .They are maintenance two types.
 PAPER DOCUMENTARY
 DIGITALIS DOCUMENTARY

QUALITY DEPARTMENT:
Quality can be defined as fulfilling specification or customer requirement, without any defect. A
product is said to be high in quality if it is functioning as expected and reliable. Quality control refers to
activities to ensure that produced items are fulfilling the highest possible quality. Most of software tools to
control quality are statistical techniques quality. Control techniques can be classified into basic, intermediate,
and advance level, but there is no consensus among researchers in the classification. After shot blasting the
casting was send to initial inspection for surface defects as broken are recorded in initial inspection register.

QUALITY CHECKING:
Functional testing types include:
 Alpha testing,
 Acceptance testing,
 Ad-hoc testing,
 Accessibility testing,
 Beta testing,
 Back-end testing,
 Browser compatibility testing.
Non- Functional testing types include:
 Performance testing,
 Load testing,
 Stress testing,
 Volume testing,
 Security testing,
 Compatibility testing,
 Install testing,
 Recovery testing,
 Reliability testing,
 Compliance testing.
CONCLUSION:
After complete my industrial training, I had been exposed to an IT technician and programmer working
life. throughout my internship, I could understand more about the definition of an IT technician and programmer
and prepare myself to become a responsible and innovative technician and programmer in future. Along my
training period, I realize that observation is a main element to find out the root cause of a problem. Not only for
my project but daily activities too. During my project, I cooperate with my colleagues and operators to
determine the problems.

The training had undergone by me in BLUE MOUNT TECHNOLOGIES was very useful and if
enriched my practical knowledge in organization management studies. I could observe that the employer
employee relationship is cordial and there is also a good working environment prevailing inside the
organization. Also come to know that there is no question of striker lockout the management is giving more
weight at age for. The labor health, we I fare and safety facility. I underfoot form training that managing firm is
very difficult task which should be technically done and at the same time the employees should be ensured of
health and peaceful environments inside the company. Throughout the industrial training, I found that several
things are important.
WORK DIARY

DATE DEPARTMENT TRAINING UNDERGONE


0-1 DAY VIEW OF INDUSTERY We are view about the Blue mount
(/5/2018 - /5/2018) technologies
1-2 DAY PROFILE To know about profile of the
(/5/2018 - /5/2018) company
2-3 DAY ORGANISATION To know about the organization
(/5/2018 - /5/2018) chart
3-4 DAY DEPARTMENTS To know about overall functions of
(/5/2018 - /5/2018) departments
4-5 DAY NETWORK DESIGNING Aware of the Network designing
(/5/2018 - /5/2018) and collection of network design
tables from various moduls
5-6 DAY PROJECTS AND To known about the on going
(/5/2018 - /5/2018) DEVELOPMENT projects details and customer
details.
6-7 DAY PRODUCTION AND TESTING Production department take care of
(/5/2018 - /5/2018) the production planning and
Software testing in which deals
with customer sathishfication.
7-8 DAY MAINTENANCE DEPARTMENT To manage estimation and
(/5/2018 - /5/2018) planning, scheduling, cost control
and budget management.
8-9 DAY FINANCE Familiarized with the industy’s
(/5/2018 - /5/2018) accounting process covering
1.sales register and purchase
register
2.ledger balance
3.trial balance
4.profit and loss account
5.balance sheet
9-10 DAY QUALITY CONTROL To know about quality checking
(/5/2018 - /5/2018) department process.
9-10 DAY SALES Became aware of the sales process
(/5/2018 - /5/2018) undertaken by industry.

Você também pode gostar