0% found this document useful (0 votes)
66 views15 pages

Implementation of Local Area Network LAN Build A S

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views15 pages

Implementation of Local Area Network LAN Build A S

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Implementation of Local Area Network (LAN) & Build a Secure

LAN System for BAEC Head Quarter


DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

Research Journal of Computer Science and Engineering


Review Article Open Access
Implementation of Local Area Network (LAN) & Build a Secure LAN
System for BAEC Head Quarter
Osman Goni1* and Md. Abu Shameem2
1
Engineer, Computer System and Network Division (CSND), Institute of Computer Science (ICS),
Bangladesh Atomic Energy Commission, E-12/A, Agargaon, Sher-e-Bangla Nagar, Dhaka-1207,
Bangladesh
2
Principal Engineer, Computer System and Network Division (CSND), Institute of Computer Science
(ICS), Bangladesh Atomic Energy Commission, E-12/A, Agargaon, Sher-e-Bangla Nagar, Dhaka-
1207, Bangladesh

*Corresponding Author: Osman Goni, Engineer, Computer System and Network Division (CSND),
Institute of Computer Science (ICS), Bangladesh Atomic Energy Commission, E-12/A, Agargaon,
Sher-e-Bangla Nagar, Dhaka-1207, Bangladesh

Received Date: Apr 03, 2021 / Accepted Date: May 15, 2021/ Published Date: Jun 05, 2021
Abstract
Network security is the process of taking physical and software preventative measures to protect the
underlying networking infrastructure from unauthorized access, misuse, malfunction, modification,
destruction, or improper disclosure, thereby creating a secure platform for computers, users, and programs
to perform their permitted critical functions within a secure environment. A local area network (LAN) is a
computer network within a small geographical area such as a home, school, computer laboratory, office
building or group of buildings. A LAN is composed of inter-connected workstations and personal computers
which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage
devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates
and the lack of any need for leased communication lines. A data network is an interconnected system of
computers, peripherals and software over which data files and messages are sent and received. LAN is only
one type of computer network. LAN define is Data com system allowing a number of independent devices
to communicate directly with each other, within a moderately sized geographic area over a physical
communications channel of moderate data rates. Fiber-optic communication is a method of transmitting
information from one place to another by sending pulses of infrared light through an optical fiber. The light
is a form of carrier wave that is modulated to carry information. Fiber is preferred over electrical cabling
when high bandwidth, long distance, or immunity to electromagnetic interference is required. This type of
communication can transmit voice, video, and telemetry through local area networks or across long
distances. Optical fiber is used by many telecommunications companies to transmit telephone signals,
Internet communication, and cable television signals. Researchers at Bell Labs have reached a record
bandwidth distance product of over 100 petabit × kilometers per second using fiber optic communication.
Communication between remote parties can be achieved through a process called Networking, involving
the connection of computers, media and networking devices. When we talk about networks, we need to
keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of
this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy
Commission) Head Quarter and implement security measures to protect network resources and system
services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is
to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.

Page: 1
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

Keywords: LAN, Secure LAN, BTCL, UTP, RJ-45, Bandwidth, Wavelength, ISP, Firewall, BAEC

Cite this article as: Osman Goni, Abu Shameem. 2021. Implementation of Local Area Network (LAN)
& Build a Secure LAN System for BAEC Head Quarter. Res J Comput Sci Eng. 2: 01-15.

Copyright: This is an open-access article distributed under the terms of the Creative Commons
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium,
provided the original author and source are credited. Copyright © 2021; Osman Goni
topic, booked a hotel reservation, chatted with a
Introduction fellow trekker or comparison shopped for a car.
The internet is a communication system that has
brought a wealth of information to our fingertips
A local area network (LAN) is a collection of
and organized it for out use [6-8]. The internet is
devices connected together in one physical
a structured, organized system. Bangladesh
location, such as a building, office, or home [1].
Atomic Energy Commission is a scientific
A LAN can be small or large, ranging from a
research organization and regulatory body
home network with one user to an enterprise
of Bangladesh. Its main objective is to promote
network with thousands of users and devices in
use of atomic energy for peaceful purposes. It
an office or school. A local area network (LAN)
was established on 27 February 1973. So, it is
is a group of computers and associated devices
important to Design, Deployment and
that share a common communications line or
Implementation of Local Area Network (LAN)
wireless link [2]. Usually, the server has
at BAEC Head Quarter.
applications and data storage that are shared in
common by multiple computer users. A local Bangladesh Atomic Energy Commission
area network may serve as few as two or three
Bangladesh Atomic Energy Commission
users (for example, in a home network) [3].
(BAEC) was established in 1973 as a
Networks are divided into two main categories:
multidisciplinary R&D organization with the
Local Area Networks (LANs) and Wide Area
view of promoting peaceful uses of nuclear
Networks (WANs). These two types of
energy in Bangladesh. From the very beginning
networks have different characteristics and
of its formation, BAEC started R&D works in
different functionalities. In general, a LAN is a
areas covering physical science, bioscience,
collection of computers and peripheral devices
engineering and nuclear medicine for human
in a limited area such as a building or campus
welfare and economic uplift of the country. At
[4]. A LAN is usually under the domain of a
present, the BAEC has grown as the largest
single organization such as an institutional or
organization for scientific and technological
department. The internet is, however, more than
research in Bangladesh.
just a physical connection of LANs,
internetworking protocols and standards are also Bangladesh Tele Communication Company
needed. Network’s models serve to organize, Limited
unity, and control the hardware and software
BTCL or Bangladesh Telecommunications
components of communication and networking.
Company Limited is the largest
The Internet has revolutionized many aspects of
telecommunications company in Bangladesh.
our daily lives [5]. It has affected the way we do
The company was founded as the Bangladesh
business as well as the way we spend our leisure
Telegraph & Telephone Board (BTTB)
time. Count the ways you have use the internet
following Bangladesh's independence in 1971.
recently. Perhaps you have sent electronic mail
On July 1, 2008 the BTTB became a public
(email) to a business associate, paid a utility bill,
limited company and was renamed as BTCL.
read a newspaper from a distant city, or looked
BTCL provides land-line telephone services in
up a local movie schedule all by using the
Bangladesh's urban areas, including domestic
internet or maybe you researched a medical

Page: 2
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

long-distance calling and international services fabric called networks, these networks mainly
as well as internet services. In 2004, the rely on essential physical components and
Bangladesh Government issued a number of software to operate efficiently. The present
PSTN licenses to private companies, but they analytical study seeks to understand both the
were barred from providing services in the basic components of the operation of local
lucrative Dhaka market (which accounts for the networks and to recognize and define the role of
majority of the nationwide market). The each of the means of communication adopted
monopoly held by BTCL was broken when within the local network in order to construct
other operators started to receive licenses from and operate the LAN.
2007 [9].
Research Background
Optical Fiber Network
Networks
Fiber optic internet cable is increasingly
A network is a set of devices (often referred to
popular. This is due to the higher speeds and
as nodes) connected by communication links. A
bandwidth it can provide compared to standard
node can be a computer, printer, or any other
Ethernet or Wi-Fi signals delivered via coaxial
device capable of sending and/or receiving data
or even copper wire from street-level
generated by other nodes on the network.
exchanges. This means that fiber networking is
a far better choice where high speeds are Optical Fiber Cable
advantageous or for particularly intensive data
A fiber-optic cable, also known as an optical-
transfer needs. Fiber optic bandwidth is usually
fiber cable, is an assembly similar to an
significantly higher than a typical Ethernet
electrical cable, but containing one or more
connection. Fiber is also safe to use in high-
optical fibers that are used to carry light. The
voltage locations, and in areas where flammable
optical fiber elements are typically individually
gases or other harsh chemicals or weather
coated with plastic layers and contained in a
conditions are likely to be a factor. This can be
protective tube suitable for the environment
another important factor in choosing fiber optic
where the cable is used. Different types of
cables for broadband delivery and telecoms as
cable[1] are used for different applications, for
opposed to standard Ethernet.
example, long distance telecommunication, or
Local Area Networks providing a high-speed data connection between
different parts of a building.
Local area networks, generally called LANs, are
privately-owned networks within a single Unshielded Twisted Pair (UTP) Cable
building or campus of up to a few kilometers in
Cable is the medium through which information
size. They are widely used to connect personal
usually moves from one network device to
computers and workstations in company offices
another. Unshielded twisted pair (UTP) is the
and factories to share resources (e.g., printers)
most popular and is generally the best option for
and exchange information. The Local Area
Local Area networks (See figure 1).
Network (LAN) is one of the most important
types of information networks in providing
communication within a limited community
such as universities and institutions. The LAN
consists of an interconnected group of
computers and other communication devices,
which are connected to each other through an
integrated engineering system. They are
distributed within relatively small geographical
areas and characterized by high speed and lack
Figure 1: Unshielded twisted pair.
of errors in communication. Thus, the local area
networks are a mixture of interrelated devices,
equipment and institutions, where they form a

Page: 3
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

The quality of UTP may vary from telephone- with any other socket standards which are
grade wire to extremely high-speed cable. The visually similar, but electrically incompatible.
cable has four pairs of wires inside the jacket. It also prevents accidental disconnection.
Each pair is twisted with a different number of
twists per inch to help eliminate interference Bandwidth and Window of Fiber Optic
from adjacent pairs and other electrical devices. Cable
The tighter the twisting, the higher the
supported transmission rate and the greater the In May 2002, the ITU-T organization divided
cost per foot. The EIA/TIA (Electronic Industry the fiber optical communication system into six
Association/Telecommunication Industry bands as O, E, S, C, L and U6. Multi-mode
Association) has established standards of UTP optical fiber at 850nm is known as the first
and rated six categories of wire (additional window, single-mode optical fiber at O band is
categories are emerging) [10]. referred to as the second band. C band is called
as the third window, L band is the fourth
Table1: UTP Cable additional categories. window and E band is the fifth window. The
Category Speed Use following table shows the wavelength bands for
1 1 Mbps Voice Only both multimode fiber optic cable and single-
(Telephone Wire) mode fiber optic cable [11].
2 4 Mbps Local Talk &
Telephone (Rarely
Table 2: Fiber Optic Wavelength.
used)
3 16 Mbps 10BaseT Ethernet Freq Wi Wav Freq
4 20 Mbps Token Ring (Rarely uency ndow elength uency
used) band range range
5 100 Mbps 100BaseT Ethernet (nm) (THz)
(2 pair)
850(770-
1000 Gigabit Ethernet / 1 /
910)
Mbps (4
Original 1260- 237.9-
pair) 2
band 1360 220.4
5e 1,000 Gigabit Ethernet Extende 1360- 220.4-
Mbps 5
d band 1460 205.3
6 10,000 Gigabit Ethernet Short
Mbps 1460- 205.3-
wavelen /
1530 195.9
gth band
RJ45 Connector Conventi
1530- 195.9-
onal 3
Most standard Ethernet data cables have a core 1565 191.6
band
consisting of four twisted-pair wire strands,
Longer
making eight individual wires in total. Male 1565- 191.6-
wavelen 4
RJ45 plugs separate and correctly terminate 1625 184.5
gth band
these eight individual wires. In other words,
Ultralen
RJ45 wiring is based on an 8P8C (8 position, 8
gth 1625- 184.5-
contact) configuration. Standard RJ45 is /
wavelen 1675 179.0
defined as a mechanically-keyed variant on a
gth band
generic 8P8C body. Mechanically keyed
essentially means that RJ45 connectors also
include an additional tab. This extra tab is The frequency range in the table above refers
designed to prevent them from being mated to the frequency of light. According to the

Page: 4
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

formula, speed = wavelength x frequency, we cable and wavelength has been displayed as
can easily figure out the frequency of light. Its follow:
relation to the transmission loss of fiber optic

Figure 2: Optical Transmission Windows and wavelength.


In the early days of fiber optic communication, Optical Fiber Cable at OSI Model
the LED was employed as a light source due to
The interface between an optical fiber and a
its low price. Multi-mode fiber optic cables
twisted pair Cable can be at different layers of
that operate at 850nm and 1300nm became the
the OSI model. At the Physical layer a media
first choice for building small network, while
converter can be used. It will transform the
single-mode optical fiber cables, working at
electrical Ethernet signal to Ethernet over
1310nm and 1550nm with laser as the light
fiber. At the data link layer, a layer 2 (Ethernet)
source were the foundation for constructing
switch can be used with copper and fiber
large network. If there were more windows
interfaces. At the network layer a router can be
available for single-mode optic cable, one fiber
used with an optical (fiber) interface and a
optic cable would achieve ultra-high-speed
copper (RJ45) interface. Conversion at the
transmission by transmitting signals at
physical layer is a signal conversion. At the
different wavelength at the same time by
data link layer Ethernet packets will be
employing WDM (wavelength division
switched or retransmitted at a different
multiplexing) technology, thus maximizing the
interface. At the network layer routing of IP
potential of single mode fiber. Telephone and
packets to a different interface will take place.
network and be using at the same time via
ADSL (asymmetric digital subscriber line) Internet
modem. That’s because voice and data use
The Internet is a worldwide
different frequency. And this principle is
telecommunications system that provides
similar with WDM and ADSL technology,
connectivity for millions of other, smaller
which are usually applied in main networks
networks; therefore, the Internet is often
that require higher bandwidth [12].
referred to as a network of networks. It allows
computer users to communicate with each
other across distance and computer platforms.

Page: 5
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

Internet Service Provider Security Services


An Internet service provider (ISP) is an It is a processing or communication service
organization that provides a myriad of services that is provided by a system to give a specific
for accessing, using, or participating in the kind of production to system resources.
Internet. Internet service providers can be Security services implement security policies
organized in various forms, such as and are implemented by security mechanisms.
commercial, community-owned, non-profit, or Security Services are Confidentiality,
otherwise privately owned. Authentication, Peer Entity Authentication,
Data Origin Authentication, Integrity,
Network Security
Connection Oriented Integrity [15].
Network Security Essential
Basic Technologies of Computer Network
Network security has become more important Security
to personal computer users, organizations, and
The basic technologies of computer network
the military. With the advent of the internet,
securities are Firewall technology, Data
security became a major concern and the
encryption technology, Intrusion detection
history of security allows a better
technology, Anti-virus technology [16].
understanding of the emergence of security
technology. The internet structure itself Types of Attacks
allowed for many security threats to occur. The
4 Types of Attacks 1) Interception: Watches
architecture of the internet, when modified can
packets 2) Interruption: Steals or disturbs the
reduce the possible attacks that can be sent
data 3) Modification: Changes the data 4)
across the network. Knowing the attack
Fabrication: Sends another message apart from
methods, allows for the appropriate security to
original but having the same sender’s name
emerge. Many businesses secure themselves
[17].
from the internet by means of firewalls and
encryption mechanisms. The businesses create Security Protocols
an “intranet” to remain connected to the
a) Secure Socket Layer
internet but secured from possible threats. The
entire field of network security is vast and in It is used in secure exchange of information
an evolutionary stage. The range of study between web browser and web server. It gives
encompasses a brief history dating back to 2 security services. 1. Authentication 2.
internet’s beginnings and the current Confidentiality It has five layers:
development in network security. In order to
understand the research being performed Application Layer
today, background knowledge of the internet, Secure Socket Layer
its vulnerabilities, attack methods through the Transport Layer
internet, and security technology is important Internet Layer
and therefore they are reviewed [13]. When Data Link Layer
developing a secure network, the following Physical Layer
need to be considered: 1. Access- Authorized Transport Layer uses HMAC
users are provided the means to communicate
to and from a particular network 2. SSL have 3 sub protocols. Handshake
Confidentiality- Information in the network protocol- Connection Establishment. Record
remains private 3. Authentication - Ensure the protocol -Actual message protocol. Alert
users of the network are who they say they are Protocol - If client/ server detects error other
4. Integrity - Ensure the message has not been party discloses the connection and the secret
modified in transit 5. Non‐repudiation - Ensure key is deleted.
the user does not refute that he used the
network [14].

Page: 6
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

Computer Network Information Security by examining those ports are not commonly
Policy used. In addition, once a virus into a computer
system, the monitoring program can
Set up a firewall
automatically alarm, some of the function can
Firewalls are an important means to ensure automatically shut down the port, effectively
network security, network management prevent hacker intrusion [18].
applications through the use of technology,
IP addresses are correct hidden PC
packet filtering technology and agent
technology, effectively control network access IP address of the hacker and virus attacks must
permissions, comprehensive data to external have a condition that is on the network and
restrictions and discrimination [18]. information attacks must have a real IP address
to be a hacker to obtain the user's IP address
Access control
mainly through the use of network technology
Security policy and security model based on to detect host information view, some of the
access control body set access permissions, traditional hackers and virus attacks, Flop
such as to the identity of the user, password overflow attacks and so must obtain address as
authentication, in order to gain the true identity preconditions. Therefore, the user should use a
of the user, to facilitate tracing network computer system when hiding your IP address,
behavior [18]. using a proxy server is the most common way
to hide IP address, a hacker can only detect the
Strengthening Intrusion Detection
proxy server IP address, but cannot get the
Network intrusion detection is a real-time user's real IP address You cannot find the real
network detection system can effectively IP address will not be able to attack, effective
compensate for the lack of firewalls and other maintenance of computer information and
protective means [19]. network security [18].
Information encrypted Authentication technology
Information technology is the key encryption Authentication should include at least
technology to achieve information security, verification protocol and license agreement. A
help strengthen security, through a particular variety of network applications and computer
encryption algorithm translated the important systems are needed to confirm the legality
plaintext cipher text, so unauthorized users can through authentication, and then determine its
not directly read the raw data, even if the data personal data and specific permissions. For
file is lost or stolen, as long as difficult to crack authentication system, the legitimate user's
the key, so it will not lead to the leakage of identity is easy to be someone else pretending
confidential information, which greatly ensure to be its most important technical indicators
information security [18]. [18].
Close some not commonly used services and Timely installation of Vulnerability Patch
ports
Vulnerability can be utilized during the attack
From the theory in terms of computer security, weaknesses can be software, hardware,
computer systems were more port system is procedural shortcomings, functional design or
also more secure. For using the computer in the improper configuration. University of
process, especially when the operating system Wisconsin Miller gives a research report on
is installed in inadvertently will not have to today's popular operating systems and
install some service functions and ports, it will applications, noting that the software cannot be
not only occupy a certain system information without flaws and loopholes [18].
and also reduce the security of computer
systems sex. In addition, in order to understand
the use of the user interface can be installed
port monitoring program. It can be determined

Page: 7
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

File encryption and digital signature theft, interception or destruction primary


technology technologies. Depending on the role, file
encryption and digital signature technology is
File encryption and digital signature
mainly divided into data transmission, data
technology is to improve the security and
storage, data integrity of the three kinds of
confidentiality of information systems and
discrimination [18].
data, one of the secrets to prevent external data

Send message of information

Hash function

The sender private key encryption

Internet

Abstract formed expressly MD

MD Comparison
Figure 3: Usually, the digital signing process MD means Encryption key.
Data integrity identification technology is Authorization, Auditing, Confidentiality,
mainly involved in the transmission of Integrity [19].
information, access, processing of data related
Security in Linux Networks
to the identity and to verify the contents, to
confidentiality requirements, including general The Linux operating system is built with
identification passwords, keys, identity, data security features, as it provides the file access
items of the system by Comparative validation permission mechanism, which prevents the
object input feature value meets the preset unauthorized users in gaining access to the files
parameters, to achieve data security [18]. [20].
Security Services and Processes Firewalls
Security is fundamentally about protecting A firewall is one of the most widely used
assets. Security is a path, not a destination. As solutions for the Internet world. All traffic inside
we analyze our infrastructure and applications, to outside and vice versa, must pass through the
we identify potential threats and understand that firewall. Different types of firewalls have
each threat presents a degree of risk. Security is different types of rules and security policies.
about risk management and implementing The authorized traffic will be sent based only on
effective countermeasures. Security services local policies. The firewall itself is protected,
and processes depends on: Authentication,

Page: 8
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

i.e.; it uses a trusted hardware and operating


system [21].
Methodology
“Methodology” implies more than simply the
methods intend to use to collect data. It is often
necessary to include a consideration of the
concepts and theories which underlie the
methods.
More over methodology guides the researcher to
involve and to be active in my particular field of
enquiry. Right from selecting the topic and
carrying out the whole research work till
recommendations; research methodology drives
the researcher and keeps him on the right track.
The entire research plan is based on the concept
of right methodology [22]. Implementation
In my research paper, the methodology is Design, planning & deployment of LAN at
following: BAEC Head Quarter
Fiber optical Communication is a method of
transmitting information from one place to
another by sending pulses of light through an
optical fiber [23]. The light forms an
electromagnetic carrier wave that is modulated
to carry information.

Figure 4: Optical fiber connection From BTCL to BAEC Head Quartet.

Page: 9
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

This day’s most organizations build their own LAN infrastructure with special consideration of security
measures to protect their resources from any kind of attacks [24]. Building a well-secured LAN requires
designing of network topology before deciding which physical devices to be purchased or technologies
to deploy [25]. A topology design is defined as the identification of networks and their interconnection
points, the size and the scope of the network, and the type of interconnecting devices used [26]. Every
network requires a structured planning and designing before deployment it that requires internet access
[27], Internet connectivity factors should be included into the plan, Includes a practical design of network
internet connectivity backbone [28]. Procedures of selecting equipment’s are added and planning designs
their networks. The LAN of BAEC head quarter interconnects more than 90 computers using various
network media. The previous LAN was not properly working; as a result, the internet service was
interrupted. Hence, the previous LAN was redesigned and up gradated using a Proxy server of Dell T320,
Router: Cisco 2901, and other network media. Currently, internet service is smoothly running at
BAECHQ.

Figure 5: LAN Connection of BAEC Head Quarter.

Page: 10
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

Hardware Selection
LAN Related Device Selection
Router Model 2901; we are using Cisco router. It is reliable and trusted to IT Community. Bandwidth
is a factor for router as well and 2900 series router required MBPSA Duplex operations easily choose
a Cisco router supports upgrade IOS version will enable to enjoy some good facilities. Switch Model
2960; we also use Cisco manageable switch for their backbone. It is tested and performs well for IT
backbone. Cable & Connector; Choosing good brand cable. Now days Cat-6 cables are most popular
[29]. It will be best for LAN wearing (it has really good sailed protection). The RJ 45 and is 8 - Position
modular connector that looks like a large phone plug [30]. Servers; Server Selection is important for
each server services. Many reputed ISP in Bangladesh runs with brand servers. Need to choose a brand
which spare parts are available local support for the brand is essential.

Figure 6: Local Area Network (LAN) Diagram at BAEC Head Quarter.


Configuration hardware properly to avoid damage. We Read
all supplied manual properly before installing
Configuring Router router. We Take a PC/Laptop with terminal
emulator software (Hyper Terminal for
We install the routers hardware properly before windows minicom for Linux). The PC should
configuring and commissioning. We install all have at least a standard communication port
(Com-1) connect Router’s console to Pc’s

Page: 11
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

communication port using console cable. We d) Set root Password.


Turn on Pc’s and router power switch. Terminal e) Package group selection automatically.
will display router’s booting information. We f) Escape boot diskette creation.
have successfully booted router and configure g) Video card configurations.
using setup facility the router is now configured h) Configuring monitor.
properly with initial configuration and ready i) Installation complete then reboot the system.
touse.
Network configuration is Linux; we configure
Configure Server Linux server to enjoy networking features.
Linux Networking Facility by default Linux
Proxy Server satisfies web browser’s query by support network, when will install a system,
sending requested web page. Proxy does two Networking facility will be installed. Moreover,
main operations. First operation is to reduce is a stalled system without a NIC card
internet bandwidth charges. And the second Networking will be available with to interface.
option is to limit web access to authorized IO helps to run all Network related services
user/PC. Users configure their web browser’s to when other NIC is not available we can
use the proxy server instead of going to the check/control network by “Network” service
internet directly [31]. When a user sends any script nicely (/etc/rc,d/init.d/network). Use the
web request, proxy takes the request. Proxy is following command connected to start/stop
the only service, which heavily uses CPU, network Service.
memory and storage simultaneously. We
Installing Operating System and then [root@ns1 root] # Service network stop.
configuration following: [root@ns1 root] # Service network start.
[root@ns1 root] # Service network status.
Operating System Determining IP address; now a day’s
commonly all Pc’s come with a NIC, when
Buying operating system (OS) in Bangladesh is Linux is installed this first device is called
really a big headache. There are very few “eth0” second one is “eth1” and so on. We can
commercial operating systems. All commercial determine the IP address of these interfaces
operating systems supports are not also using “ifconfig”
available locally. So, we need to depend on
foreign support we choose OS Centos-6.5 [root@snmp root] # if config.
which includes squid with its entire options
precompiled [32]. Server OS should have a Assigning IP address using “if config”. We can
large amount of hardware support. Compare assign an IP address on “eth0” interface using
with your operating systems hardware the” if config” command. This is the most
compatibilities List (HCL), before choosing the common method.
OS. Installation Media; Install Linux operating
system from any comfortable media like CD [root@snmp root] # if config eth0 10.0.0.100
ROM, Hard disk including all network net mask 255.255.255.0 up.
installation method. Installing OS; we have
chosenCentos-6.5 Linux operating system. All The “up” at the end of the command activates
other versions installation is almost same. We the interface after assigning the IP. But this
cover Centos-6.5 installation step bystep. procedure is not permanent. When you will
reboot the system the IP setting will be lost. To
a) Disk Partition Setup. make this IP permanent, you need to change the
b) Boot loader configures. script file for the particular interface. All files
c) Firewall configure manual. will be found in “/etc/sysconfig /network-

Page: 12
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

scripts” directory. Now restart the “network” network requires a regular maintenance such as
service to take effect. We need to restart the storage maintenance, remote resource access,
network service each time makes any type of user management, log management and some
change into these files. [root@nsl root] # other management. Monitoring is a regular task
service network restart use “if config” for all network system. It is mandatory when
command to see the change. It will show the the system is dedicated to public service to
new IP setting. [root@snmp root] # if config. make a user friendly and dependable
Assigning IP address using “netconfig”, we can monitoring system. After applying our
also do it automatically using some graphical proposed design, deployment and implemented
utility. “netgonfig” is a beautiful utility that we highly reliable local area network mechanism.
can use to edit those files automatically. It will Therefore, all the mechanisms thoroughly
offer to fill up essential fields. discussed in this paper to work well together
and provide strong Local Area Network (LAN)
Result system at BAEC Head Quarter.

Bangladesh Atomic Energy Commission References


(BAEC) is the largest scientific organization in
Bangladesh. If we want to connect international 1. Wijuntunga, Pradeepa. LOCAL AREA
network, we have to setup Local Area Network. NETWORKS (LANS) AND THEIR
For this in my paper, we have shown and APPLICATION IN LIBRARIES. [Online] The
practically configured Local Area Network at Central Library University of Colombo,
Bangladesh Atomic Energy Commission and Colombo 3, Sri Lanka.
build a secure LAN System. We smoothly http://web.simmons.edu.
installed Local Area Network (LAN) 2. Baird, Patricia M, Borer, Beatrice. 1987. An
networking with secure system at BAEC HQ. Experiment in Computer Conferencing Using a
As a result of this LAN network, Bangladesh Local Area Network. s.l.: Electronic Library.
Atomic Energy Commission Head Quarter is 3. Flower, Eric, Thulstrup, Lisa. Setting Up a
getting a high-speed internet service with Public Use Local Area Network. s.l.: Wilson
security. Library Bulletin, 63: 45-47.
4. WIKIPEDIA. Local area network. 2007.
Future work https://en.wikipedia.org/wiki/Local_area_netw
ork.
In Future, we extended our Local Area Network 5. Broadband, Asianet. Importance of Internet
by adding Access Point (AP) and Wi-Fi Technology for Easy Life. [Online] March 16,
devices. We add more network devices to 2020. [Cited: March 16, 2020.]
service the end user who are working at BAEC https://asianetbroadband.in/importance-of-
Head Quarter. internet-technology-for-easy-life.
6. Bakardjieva, Maria. The Internet in Everyday
Conclusion Life. 2009. [Cited: July 29, 2009.]
https://people.ucalgary.ca.
7. Internet Society: The Internet in Everyday
This Research Paper proposed a secure design
Life. University of Calgary, Canada: SAGE
for network and system in Linux and windows
Publications Ltd, May 31, 2012.
environment using the latest technology. We
8. Singh, Rakesh. 10 Ways Internet Changed
should have an understanding with
our Lives Positively - Here all we Explained.
communication models, network service &
[Online] July 7, 2018. [Cited: July 7, 2018.]
architecture, media, devices and protocol suites.
https://www.pdevice.com.
We are expected to have network service. Every

Page: 13
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

9. WIKIPEDIA. [Online] 21. Mukesh Kumar Mishra, Dinesh Goyal.


https://en.wikipedia.org/wiki/BTCL. 2013. International Journal of Engineering
10. Technology, Florida Center for Research & Technology (IJERT). 2.
Instructional. Cabling, Florida Department of 22. Foez Md Iqbal Hossain, Misbah uddin md
Education. [Online] 1997-2013. Imran, Md. Saleh Ahmed. 2013. Hybrid
https://fcit.usf.edu/network/chap4/chap4.htm. Wireless Mesh Network. Dhaka: BRAC
11. Moris. 2012. The Bandwidth and Window UNIVERSITY.
of Fiber Optic Cable. 23. Hui, Rongqing. Introduction to Fiber-Optic
https://community.fs.com/blog/the-bandwidth- Communications. Kansas: Academic Press,
and-window-of-fiber-optic-cable.html. 2019.
12. The Bandwidth and Window of Fiber Optic 24. Pollard, John. Network infrastructure
Cable. [Online] September 18, 2012. security basics. [Online]
https://community.fs.com/blog/the-bandwidth- https://help.returnpath.com.
and-window-of-fiber-optic-cable.html. 25. Tutorial, DCN. DCN - Network LAN
13. Ajala Funmilola, Akanbi Oluwafemi. 2015. Technologies. [Online]
Review of Computer Network Security System. https://www.tutorialspoint.com/data_communi
Network and Complex Systems. 40-46. cation_computer_network/network_lan_techn
14. Network Security. Priyank Sanghavi, ologies.htm.
Kreena Mehta, Shikha Soni. 8, August 2013, 26. Information, In Depth Tutorials and. LAN
International Journal of Scientific and Research Topologies (Networking). [Online]
Publications. 3: 1-5. https://what-when-how.com/networking/lan-
15. Significances and Issues of Network topologies-networking.
Security. Dr. B V Ramana Murthy, Prof. Vuppu 27. BIAN, WU XUE YI. 2015. Computer
Padmakar, Ms. A. Vasavi. 2014. International network planning and design of the second
Journal of Advanced Research in Computer and edition. s.l.: Machinery Industry Press.
Communication Engineering. 3: 6922-6929. 28. John, Wolfgang. 2008. On Measurement
16. Analysis and research of computer network and Analysis of Internet Backbone Traffic.
security. Shan, Jie. 7, 2014, Journal of Göteborg, Sweden: Chalmers Reproservice.
Chemical and Pharmaceutical Research. 6: 874- 29. Tech, Sterlite. CAT6 UTP -Data Cable.
877. [Online] 2017. https://www.stl.tech/optical-
17. A Survey on Network Security. Sridevi, C. interconnect-products.
5, 2017, Global Journal of Computer Science 30. Kordz. RJ45 CAT6 Field Termination
and Technology: Network, Web & Security. 17. Connector & Strain Relief. [Online] 2019.
18. The Security and Protection Strategy Study https://static1.squarespace.com.
of Computer Network Information. Junyan Shi, 31. Hat, Red. Red Hat Satellite 5.8 Proxy
Juanjuan Li1. China: s.n., 2016. 2nd Installation Guide. [Online] February 1, 2017.
International Conference on Electronics, [Cited: February 1, 2017.]
Network and Computer Engineering (ICENCE https://access.redhat.com/documentation.
2016). 32. Technology, ZeroNines.
19. DESIGN AND IMPLEMENTATION OF Z9_CentOS_Installation_Guide_AAv7_3.3_2
SYSTEM AND. Seifedine Kadry, Wassim 0141003.docx. [Online] October 3, 2014.
Hassan. 2005 - 2008, Journal of Theoretical and [Cited: October 3, 2014.]
Applied Information Technology. https://zerodownsoftware.com.
20. Security Analysis in Open-Source Linux
Network. Mukesh Kumar Mishra, Dinesh
Goyal. 8, 2013, International Journal of
Engineering Research & Technology (IJERT).
2.

Page: 14
www.raftpubs.com
Implementation of Local Area Network (LAN) & Build a Secure
LAN System for BAEC Head Quarter
DOI: https://doi.org/10.36811/rjcse.2021.110003 RJCSE: June: 2021: Page No: 01-15

Biography

Osman Goni was born at Chandpur,


Bangladesh in 25th September 1982. He has
completed his Diploma-in-Computer
Engineering and obtained 3rd place from
Bangladesh Technical Education Board
(BTEB) and B.Sc. in Computer Science &
Engineering from the Department of Computer
Science and Engineering of World University
of Bangladesh (WUB) and M.Sc. in Computer
Science & Engineering from the Department of
Computer Science and Engineering of
Jagannath University (JnU) in Bangladesh.
Currently he is working as an Engineer
(Assistant Engineer, Computer Science and
Engineering) at the institute of Computer
Science in Bangladesh Atomic Energy
Commission. He is member of Institution of
Diploma Engineers, Bangladesh (IDEB) and
associate member The Institution of Engineers,
Bangladesh (IEB) and associate member
Bangladesh Computer Society (BCS). His
research interests include Computer Hardware
and Networking, artificial intelligence and
Robotics, Cyber Security, E-Commerce etc.

Md. Abu Shameem was born in Bhairab,


Kishoregonj, Bangladesh in 1969. He was
completed Bachelor of Science in electronics &
telecommunications engineering from the
department of electronics &
telecommunications engineering Prime
University, Mirpur, Dhaka and Master of
Science in telecommunications engineering
from the department of electronics &
communications engineering East West
University, Dhaka. He worked as a senior
instructor in department of youth development
from January’1994 to December’ 1995.
Currently he is working as a principal engineer
& divisional head of computer system &
networking division at the institute of computer
science in Bangladesh atomic energy
commission. His research interest includes
communication engineering, networking &
security system, server administration and
instrumentation & control system etc.

Page: 15
www.raftpubs.com

You might also like