Implementation of Local Area Network LAN Build A S
Implementation of Local Area Network LAN Build A S
*Corresponding Author: Osman Goni, Engineer, Computer System and Network Division (CSND),
Institute of Computer Science (ICS), Bangladesh Atomic Energy Commission, E-12/A, Agargaon,
Sher-e-Bangla Nagar, Dhaka-1207, Bangladesh
Received Date: Apr 03, 2021 / Accepted Date: May 15, 2021/ Published Date: Jun 05, 2021
Abstract
Network security is the process of taking physical and software preventative measures to protect the
underlying networking infrastructure from unauthorized access, misuse, malfunction, modification,
destruction, or improper disclosure, thereby creating a secure platform for computers, users, and programs
to perform their permitted critical functions within a secure environment. A local area network (LAN) is a
computer network within a small geographical area such as a home, school, computer laboratory, office
building or group of buildings. A LAN is composed of inter-connected workstations and personal computers
which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage
devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates
and the lack of any need for leased communication lines. A data network is an interconnected system of
computers, peripherals and software over which data files and messages are sent and received. LAN is only
one type of computer network. LAN define is Data com system allowing a number of independent devices
to communicate directly with each other, within a moderately sized geographic area over a physical
communications channel of moderate data rates. Fiber-optic communication is a method of transmitting
information from one place to another by sending pulses of infrared light through an optical fiber. The light
is a form of carrier wave that is modulated to carry information. Fiber is preferred over electrical cabling
when high bandwidth, long distance, or immunity to electromagnetic interference is required. This type of
communication can transmit voice, video, and telemetry through local area networks or across long
distances. Optical fiber is used by many telecommunications companies to transmit telephone signals,
Internet communication, and cable television signals. Researchers at Bell Labs have reached a record
bandwidth distance product of over 100 petabit × kilometers per second using fiber optic communication.
Communication between remote parties can be achieved through a process called Networking, involving
the connection of computers, media and networking devices. When we talk about networks, we need to
keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of
this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy
Commission) Head Quarter and implement security measures to protect network resources and system
services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is
to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.
Page: 1
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
Keywords: LAN, Secure LAN, BTCL, UTP, RJ-45, Bandwidth, Wavelength, ISP, Firewall, BAEC
Cite this article as: Osman Goni, Abu Shameem. 2021. Implementation of Local Area Network (LAN)
& Build a Secure LAN System for BAEC Head Quarter. Res J Comput Sci Eng. 2: 01-15.
Copyright: This is an open-access article distributed under the terms of the Creative Commons
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium,
provided the original author and source are credited. Copyright © 2021; Osman Goni
topic, booked a hotel reservation, chatted with a
Introduction fellow trekker or comparison shopped for a car.
The internet is a communication system that has
brought a wealth of information to our fingertips
A local area network (LAN) is a collection of
and organized it for out use [6-8]. The internet is
devices connected together in one physical
a structured, organized system. Bangladesh
location, such as a building, office, or home [1].
Atomic Energy Commission is a scientific
A LAN can be small or large, ranging from a
research organization and regulatory body
home network with one user to an enterprise
of Bangladesh. Its main objective is to promote
network with thousands of users and devices in
use of atomic energy for peaceful purposes. It
an office or school. A local area network (LAN)
was established on 27 February 1973. So, it is
is a group of computers and associated devices
important to Design, Deployment and
that share a common communications line or
Implementation of Local Area Network (LAN)
wireless link [2]. Usually, the server has
at BAEC Head Quarter.
applications and data storage that are shared in
common by multiple computer users. A local Bangladesh Atomic Energy Commission
area network may serve as few as two or three
Bangladesh Atomic Energy Commission
users (for example, in a home network) [3].
(BAEC) was established in 1973 as a
Networks are divided into two main categories:
multidisciplinary R&D organization with the
Local Area Networks (LANs) and Wide Area
view of promoting peaceful uses of nuclear
Networks (WANs). These two types of
energy in Bangladesh. From the very beginning
networks have different characteristics and
of its formation, BAEC started R&D works in
different functionalities. In general, a LAN is a
areas covering physical science, bioscience,
collection of computers and peripheral devices
engineering and nuclear medicine for human
in a limited area such as a building or campus
welfare and economic uplift of the country. At
[4]. A LAN is usually under the domain of a
present, the BAEC has grown as the largest
single organization such as an institutional or
organization for scientific and technological
department. The internet is, however, more than
research in Bangladesh.
just a physical connection of LANs,
internetworking protocols and standards are also Bangladesh Tele Communication Company
needed. Network’s models serve to organize, Limited
unity, and control the hardware and software
BTCL or Bangladesh Telecommunications
components of communication and networking.
Company Limited is the largest
The Internet has revolutionized many aspects of
telecommunications company in Bangladesh.
our daily lives [5]. It has affected the way we do
The company was founded as the Bangladesh
business as well as the way we spend our leisure
Telegraph & Telephone Board (BTTB)
time. Count the ways you have use the internet
following Bangladesh's independence in 1971.
recently. Perhaps you have sent electronic mail
On July 1, 2008 the BTTB became a public
(email) to a business associate, paid a utility bill,
limited company and was renamed as BTCL.
read a newspaper from a distant city, or looked
BTCL provides land-line telephone services in
up a local movie schedule all by using the
Bangladesh's urban areas, including domestic
internet or maybe you researched a medical
Page: 2
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
long-distance calling and international services fabric called networks, these networks mainly
as well as internet services. In 2004, the rely on essential physical components and
Bangladesh Government issued a number of software to operate efficiently. The present
PSTN licenses to private companies, but they analytical study seeks to understand both the
were barred from providing services in the basic components of the operation of local
lucrative Dhaka market (which accounts for the networks and to recognize and define the role of
majority of the nationwide market). The each of the means of communication adopted
monopoly held by BTCL was broken when within the local network in order to construct
other operators started to receive licenses from and operate the LAN.
2007 [9].
Research Background
Optical Fiber Network
Networks
Fiber optic internet cable is increasingly
A network is a set of devices (often referred to
popular. This is due to the higher speeds and
as nodes) connected by communication links. A
bandwidth it can provide compared to standard
node can be a computer, printer, or any other
Ethernet or Wi-Fi signals delivered via coaxial
device capable of sending and/or receiving data
or even copper wire from street-level
generated by other nodes on the network.
exchanges. This means that fiber networking is
a far better choice where high speeds are Optical Fiber Cable
advantageous or for particularly intensive data
A fiber-optic cable, also known as an optical-
transfer needs. Fiber optic bandwidth is usually
fiber cable, is an assembly similar to an
significantly higher than a typical Ethernet
electrical cable, but containing one or more
connection. Fiber is also safe to use in high-
optical fibers that are used to carry light. The
voltage locations, and in areas where flammable
optical fiber elements are typically individually
gases or other harsh chemicals or weather
coated with plastic layers and contained in a
conditions are likely to be a factor. This can be
protective tube suitable for the environment
another important factor in choosing fiber optic
where the cable is used. Different types of
cables for broadband delivery and telecoms as
cable[1] are used for different applications, for
opposed to standard Ethernet.
example, long distance telecommunication, or
Local Area Networks providing a high-speed data connection between
different parts of a building.
Local area networks, generally called LANs, are
privately-owned networks within a single Unshielded Twisted Pair (UTP) Cable
building or campus of up to a few kilometers in
Cable is the medium through which information
size. They are widely used to connect personal
usually moves from one network device to
computers and workstations in company offices
another. Unshielded twisted pair (UTP) is the
and factories to share resources (e.g., printers)
most popular and is generally the best option for
and exchange information. The Local Area
Local Area networks (See figure 1).
Network (LAN) is one of the most important
types of information networks in providing
communication within a limited community
such as universities and institutions. The LAN
consists of an interconnected group of
computers and other communication devices,
which are connected to each other through an
integrated engineering system. They are
distributed within relatively small geographical
areas and characterized by high speed and lack
Figure 1: Unshielded twisted pair.
of errors in communication. Thus, the local area
networks are a mixture of interrelated devices,
equipment and institutions, where they form a
Page: 3
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
The quality of UTP may vary from telephone- with any other socket standards which are
grade wire to extremely high-speed cable. The visually similar, but electrically incompatible.
cable has four pairs of wires inside the jacket. It also prevents accidental disconnection.
Each pair is twisted with a different number of
twists per inch to help eliminate interference Bandwidth and Window of Fiber Optic
from adjacent pairs and other electrical devices. Cable
The tighter the twisting, the higher the
supported transmission rate and the greater the In May 2002, the ITU-T organization divided
cost per foot. The EIA/TIA (Electronic Industry the fiber optical communication system into six
Association/Telecommunication Industry bands as O, E, S, C, L and U6. Multi-mode
Association) has established standards of UTP optical fiber at 850nm is known as the first
and rated six categories of wire (additional window, single-mode optical fiber at O band is
categories are emerging) [10]. referred to as the second band. C band is called
as the third window, L band is the fourth
Table1: UTP Cable additional categories. window and E band is the fifth window. The
Category Speed Use following table shows the wavelength bands for
1 1 Mbps Voice Only both multimode fiber optic cable and single-
(Telephone Wire) mode fiber optic cable [11].
2 4 Mbps Local Talk &
Telephone (Rarely
Table 2: Fiber Optic Wavelength.
used)
3 16 Mbps 10BaseT Ethernet Freq Wi Wav Freq
4 20 Mbps Token Ring (Rarely uency ndow elength uency
used) band range range
5 100 Mbps 100BaseT Ethernet (nm) (THz)
(2 pair)
850(770-
1000 Gigabit Ethernet / 1 /
910)
Mbps (4
Original 1260- 237.9-
pair) 2
band 1360 220.4
5e 1,000 Gigabit Ethernet Extende 1360- 220.4-
Mbps 5
d band 1460 205.3
6 10,000 Gigabit Ethernet Short
Mbps 1460- 205.3-
wavelen /
1530 195.9
gth band
RJ45 Connector Conventi
1530- 195.9-
onal 3
Most standard Ethernet data cables have a core 1565 191.6
band
consisting of four twisted-pair wire strands,
Longer
making eight individual wires in total. Male 1565- 191.6-
wavelen 4
RJ45 plugs separate and correctly terminate 1625 184.5
gth band
these eight individual wires. In other words,
Ultralen
RJ45 wiring is based on an 8P8C (8 position, 8
gth 1625- 184.5-
contact) configuration. Standard RJ45 is /
wavelen 1675 179.0
defined as a mechanically-keyed variant on a
gth band
generic 8P8C body. Mechanically keyed
essentially means that RJ45 connectors also
include an additional tab. This extra tab is The frequency range in the table above refers
designed to prevent them from being mated to the frequency of light. According to the
Page: 4
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
formula, speed = wavelength x frequency, we cable and wavelength has been displayed as
can easily figure out the frequency of light. Its follow:
relation to the transmission loss of fiber optic
Page: 5
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
Page: 6
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
Computer Network Information Security by examining those ports are not commonly
Policy used. In addition, once a virus into a computer
system, the monitoring program can
Set up a firewall
automatically alarm, some of the function can
Firewalls are an important means to ensure automatically shut down the port, effectively
network security, network management prevent hacker intrusion [18].
applications through the use of technology,
IP addresses are correct hidden PC
packet filtering technology and agent
technology, effectively control network access IP address of the hacker and virus attacks must
permissions, comprehensive data to external have a condition that is on the network and
restrictions and discrimination [18]. information attacks must have a real IP address
to be a hacker to obtain the user's IP address
Access control
mainly through the use of network technology
Security policy and security model based on to detect host information view, some of the
access control body set access permissions, traditional hackers and virus attacks, Flop
such as to the identity of the user, password overflow attacks and so must obtain address as
authentication, in order to gain the true identity preconditions. Therefore, the user should use a
of the user, to facilitate tracing network computer system when hiding your IP address,
behavior [18]. using a proxy server is the most common way
to hide IP address, a hacker can only detect the
Strengthening Intrusion Detection
proxy server IP address, but cannot get the
Network intrusion detection is a real-time user's real IP address You cannot find the real
network detection system can effectively IP address will not be able to attack, effective
compensate for the lack of firewalls and other maintenance of computer information and
protective means [19]. network security [18].
Information encrypted Authentication technology
Information technology is the key encryption Authentication should include at least
technology to achieve information security, verification protocol and license agreement. A
help strengthen security, through a particular variety of network applications and computer
encryption algorithm translated the important systems are needed to confirm the legality
plaintext cipher text, so unauthorized users can through authentication, and then determine its
not directly read the raw data, even if the data personal data and specific permissions. For
file is lost or stolen, as long as difficult to crack authentication system, the legitimate user's
the key, so it will not lead to the leakage of identity is easy to be someone else pretending
confidential information, which greatly ensure to be its most important technical indicators
information security [18]. [18].
Close some not commonly used services and Timely installation of Vulnerability Patch
ports
Vulnerability can be utilized during the attack
From the theory in terms of computer security, weaknesses can be software, hardware,
computer systems were more port system is procedural shortcomings, functional design or
also more secure. For using the computer in the improper configuration. University of
process, especially when the operating system Wisconsin Miller gives a research report on
is installed in inadvertently will not have to today's popular operating systems and
install some service functions and ports, it will applications, noting that the software cannot be
not only occupy a certain system information without flaws and loopholes [18].
and also reduce the security of computer
systems sex. In addition, in order to understand
the use of the user interface can be installed
port monitoring program. It can be determined
Page: 7
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
Hash function
Internet
MD Comparison
Figure 3: Usually, the digital signing process MD means Encryption key.
Data integrity identification technology is Authorization, Auditing, Confidentiality,
mainly involved in the transmission of Integrity [19].
information, access, processing of data related
Security in Linux Networks
to the identity and to verify the contents, to
confidentiality requirements, including general The Linux operating system is built with
identification passwords, keys, identity, data security features, as it provides the file access
items of the system by Comparative validation permission mechanism, which prevents the
object input feature value meets the preset unauthorized users in gaining access to the files
parameters, to achieve data security [18]. [20].
Security Services and Processes Firewalls
Security is fundamentally about protecting A firewall is one of the most widely used
assets. Security is a path, not a destination. As solutions for the Internet world. All traffic inside
we analyze our infrastructure and applications, to outside and vice versa, must pass through the
we identify potential threats and understand that firewall. Different types of firewalls have
each threat presents a degree of risk. Security is different types of rules and security policies.
about risk management and implementing The authorized traffic will be sent based only on
effective countermeasures. Security services local policies. The firewall itself is protected,
and processes depends on: Authentication,
Page: 8
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
Page: 9
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
This day’s most organizations build their own LAN infrastructure with special consideration of security
measures to protect their resources from any kind of attacks [24]. Building a well-secured LAN requires
designing of network topology before deciding which physical devices to be purchased or technologies
to deploy [25]. A topology design is defined as the identification of networks and their interconnection
points, the size and the scope of the network, and the type of interconnecting devices used [26]. Every
network requires a structured planning and designing before deployment it that requires internet access
[27], Internet connectivity factors should be included into the plan, Includes a practical design of network
internet connectivity backbone [28]. Procedures of selecting equipment’s are added and planning designs
their networks. The LAN of BAEC head quarter interconnects more than 90 computers using various
network media. The previous LAN was not properly working; as a result, the internet service was
interrupted. Hence, the previous LAN was redesigned and up gradated using a Proxy server of Dell T320,
Router: Cisco 2901, and other network media. Currently, internet service is smoothly running at
BAECHQ.
Page: 10
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
Hardware Selection
LAN Related Device Selection
Router Model 2901; we are using Cisco router. It is reliable and trusted to IT Community. Bandwidth
is a factor for router as well and 2900 series router required MBPSA Duplex operations easily choose
a Cisco router supports upgrade IOS version will enable to enjoy some good facilities. Switch Model
2960; we also use Cisco manageable switch for their backbone. It is tested and performs well for IT
backbone. Cable & Connector; Choosing good brand cable. Now days Cat-6 cables are most popular
[29]. It will be best for LAN wearing (it has really good sailed protection). The RJ 45 and is 8 - Position
modular connector that looks like a large phone plug [30]. Servers; Server Selection is important for
each server services. Many reputed ISP in Bangladesh runs with brand servers. Need to choose a brand
which spare parts are available local support for the brand is essential.
Page: 11
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
Page: 12
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
scripts” directory. Now restart the “network” network requires a regular maintenance such as
service to take effect. We need to restart the storage maintenance, remote resource access,
network service each time makes any type of user management, log management and some
change into these files. [root@nsl root] # other management. Monitoring is a regular task
service network restart use “if config” for all network system. It is mandatory when
command to see the change. It will show the the system is dedicated to public service to
new IP setting. [root@snmp root] # if config. make a user friendly and dependable
Assigning IP address using “netconfig”, we can monitoring system. After applying our
also do it automatically using some graphical proposed design, deployment and implemented
utility. “netgonfig” is a beautiful utility that we highly reliable local area network mechanism.
can use to edit those files automatically. It will Therefore, all the mechanisms thoroughly
offer to fill up essential fields. discussed in this paper to work well together
and provide strong Local Area Network (LAN)
Result system at BAEC Head Quarter.
Page: 13
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
Page: 14
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15
Biography
Page: 15
www.raftpubs.com