0% found this document useful (0 votes)
47 views21 pages

Wired Networking

The document discusses the history and conceptual framework of wired networks. It provides background on wired networks and describes key elements like devices, cabling, protocols, and networking layers. Major milestones discussed include the development of telegraph networks, telephone networks, Ethernet, fiber optics, and early computer networking projects.

Uploaded by

udokaadie190
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views21 pages

Wired Networking

The document discusses the history and conceptual framework of wired networks. It provides background on wired networks and describes key elements like devices, cabling, protocols, and networking layers. Major milestones discussed include the development of telegraph networks, telephone networks, Ethernet, fiber optics, and early computer networking projects.

Uploaded by

udokaadie190
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUNG OF THE STUDY

The internet is, however, more than just a physical connection of LANs,
internetworking protocols and standards are also needed. Network’s models
serve to organize, unity, and control the hardware and software components
of communication and networking. The Internet has revolutionized many aspects
of our daily lives (Broadband 2020). It has affected the way we do business as
well as the way we spend our leisure time. Count the ways you have use the
internet recently. Perhaps you have sent electronic mail (email) to a business
associate, paid a utility bill, read a newspaper from a distant city, or looked up a
local movie schedule all by using the internet or maybe you researched a medical
topic, booked a hotel reservation, chatted with a fellow trekker or comparison
shopped for a car. The internet is a communication system that has brought a
wealth of information to our fingertips and organized it for out use (Bakardjieva
2009).

Technology has reached its highest peak of development, especially in making life
easier for people. Well implemented technology is faster than human in processing
calculation and is more accurate. Technology has become an important concept in
our life. It assists in connecting communities together. Obviously, people have
started to use technology in every field of life including education, health, the
military, etc. The computer network represents a component, especially on how it
enhances the functional performance in different fields and organizations, such as
companies and schools.

This day’s most organizations build their own LAN infrastructure with
special consideration of security measures to protect their resources from any kind
of attacks (Pollard 2013). Building a well-secured LAN requires designing of
network topology before deciding which physical devices to be purchased or
technologies to deploy. A topology design is defined as the identification of
networks and their interconnection points, the size and the scope of the network,
and the type of interconnecting devices used. Every network requires a structured
planning and designing before deployment it that requires internet access, Internet
connectivity factors should be included into the plan, Includes a practical design
of network internet connectivity backbone (John 2008). Procedures of selecting
equipment’s are added and planning designs their networks. The LAN of BAEC
head quarter interconnects more than 90 computers using various network media.
The previous LAN was not properly working; as a result, the internet service was
interrupted. Hence, the previous LAN was redesigned and up gradated using a
Proxy server of Dell T320, Router: Cisco 2901, and other network media.

Bangladesh Atomic Energy Commission

Bangladesh Atomic Energy Commission (BAEC) was established in 1973 as a


multidisciplinary R&D organization with the view of promoting peaceful uses of
nuclear energy in Bangladesh. From the very beginning of its formation, BAEC
started R&D works in areas covering physical science, bioscience, engineering
and nuclear medicine for human welfare and economic uplift of the country. At
present, the BAEC has grown as the largest organization for scientific and
technological research in Bangladesh.

1.2 OBJECTIVES OF THE STUDY

The main goal of this project is to present a Local Area Network design suitable
for Bangladesh Atomic Energy Commission (BAEC). This research will help
these organization to design a network that employs low-cost solutions without
unacceptable compromises in security or quality.

1.3 SCOPE OF THE STUDY

This is the ability of the network to withstand intense pressure from utilization.
Most times, the networks are mainly crowded by many users that the network
capacity could not handle. It is very important to design a network in such a way
to handle many users without failure. This network is designed for a user
population of 5075. If more users access the network, it will be able to scale.

1.4 MOTIVATION OF THE STUDY

An organization’s computer network performs so many functions, such as


connecting students with the university, faculty, and the library. Most universities
today use the network to provide online education by connecting widely dispersed
students with their professors directly. For this reason, computer networks play a
vital role in the education area by providing efficient communications for the
university environment.
1.5 STATEMENT OF PROBLEM

Universities from these third world countries still need to have good quality and
more secure network equipment with less cost. This is because these schools
aspire to deliver capability in line with the leading prestigious universities despite
low budgets. Therefore, this design will be on Wired Network technology

1.5 LIMITATION OF THE STUDY

The following are the limitations encountered during the period of the project
work.

1. Lack of finance: lack of finance was a problem, throughout the project work
due to the fact that the group members didn’t turn in their quota at the
appropriate time and all this lead to slow frustrating research.
2. The limited time available to collect and analyze data collected. Analysis
was done base on the interview; therefore having results immediately the
entire interviewer were return.
3. The error occurring during data collection arising from those not giving
honest answers. To overcome this, we worked with the specific
correspondents we had built trust with professionally.

1.6 ORGANIZATION OF WORK

The project is organized in five chapters.

With introduction already being explained in chapter 1 and the whole idea of this
research work presentation in chapter one, like objective of the study, statement of
the research area of coverage limitation and definition of terms all this makes up
the chapter one.

Chapter 2; this section deals with the review of study, review of concept theories
upon which this work is built on.

Chapter 3 talks about The methodology at which this research work will be
implemented.

In chapter 4 the system is implemented and presented with its analysis. Functions
of the system and the operation of the system is also, in depth explained for reader
understating and comprehension. The system requirement is also detailed and the
platform at which the system can run on.
Chapter 5 summaries the whole work done and make possible recommendation
and suggest other points to be included into the work for future propose

1.7 DEFINITION OF TERMS

Computer: This is an electronic device that is capable of solving problems by


acting data performing prescribed operations on the data accepted and supplies the
result of the operation.

System: a system is set of components that interact to achieve a common goal. In


another sense, a system is a group of interrelated or intersecting elements forming
a unified whole.

Network: Multiple computers and other devices connected together to share


information

Network topology: A network topology defines how hosts are connected to a


computer network. It characterizes how the PCs and other hosts are organized, and
linked to each other

Wired: Equipped with wires, so as to connect to a power source or to other electric


or electronic
CHAPTER TWO

LITERATURE REVIEW

2.1 CONCEPTUAL FRAMEWORK

A wired network refers to a system where devices are connected using physical
cables, allowing data transmission between them. It forms the backbone of many
modern communication infrastructures, providing reliable and high-speed
connectivity. The conceptual framework of a wired network encompasses various
elements that collaborate to facilitate seamless data transfer and communication.

A conceptual framework for a wired network involves the arrangement and


interconnection of various components. It typically includes elements like devices
(computers, routers, switches), cabling (Ethernet, fiber optics), protocols
(TCP/IP), and networking layers (physical, data link, network, transport). These
components work together to enable data transmission, communication, and
resource sharing within the network.

HISTORY OF WIRED NETWORKING

The history of wired networking traces the evolution of technologies that have
shaped how we communicate and share data over physical connections. Here's an
overview of key milestones:

Late 19th Century: Telegraph and Early Telegraph Networks

- The telegraph, invented by Samuel Morse in the 1830s, marked one of the
earliest forms of wired communication.

- Telegraph networks were established across continents, using copper wires to


transmit Morse code messages over long distances.

Late 19th Century: Telephone Networks

- In 1876, Alexander Graham Bell patented the telephone, leading to the


development of wired voice communication networks.

- Copper wires were used to connect telephones, enabling voice conversations


over long distances.
1960s: Birth of Computer Networking

- The concept of computer networking emerged, as researchers sought ways to


connect computers for data sharing.

- The ARPANET project, initiated by the U.S. Department of Defense's Advanced


Research Projects Agency (ARPA), laid the foundation for packet switching and
the development of the modern internet.

1970s: Ethernet and Local Area Networks (LANs)

- Ethernet, developed by Robert Metcalfe at Xerox PARC in 1973, introduced a


protocol for LANs.

- LANs used coaxial cables to connect computers within a confined area, enabling
resource sharing and collaboration.

1980s: Fiber Optics and High-Speed Transmission

- Fiber optic cables were introduced, offering higher bandwidth and lower signal
degradation compared to traditional copper cables.

- The development of the 10BASE-T Ethernet standard in the mid-1980s enabled


Ethernet connections over twisted-pair cables, increasing LAN speeds.

1990s: Internet Expansion and Broadband

- The commercialization of the internet led to its widespread adoption in the


1990s.

- As demand for higher data speeds grew, Digital Subscriber Line (DSL) and cable
modem technologies brought broadband connectivity to homes and businesses.
2000s: Gigabit Ethernet and Beyond

- Gigabit Ethernet (1000BASE-T) became widely used, providing data rates up to


1 Gbps over copper cables.

- The development of 10 Gbps, 40 Gbps, and 100 Gbps Ethernet standards further
increased network speeds.

2010s: Advances in Networking Technologies

- The adoption of fiber-to-the-home (FTTH) and fiber-to-the-premises (FTTP)


technologies provided ultra-high-speed internet connections to residential users.

- Data centers and cloud computing infrastructure relied on high-speed wired


networks to handle massive data processing and storage demands.

Present and Future: Continuing Evolution

- Today, wired networking continues to evolve with advancements in data


transmission rates, network security, and connectivity.

- Research and development efforts focus on technologies like 5G, 10 Gbps+


Ethernet, and emerging standards for internet of things (IoT) devices.

The history of wired networking reflects a journey of innovation, from the


early telegraph to the modern high-speed, interconnected world. It has
revolutionized the way we communicate, collaborate, and access information
across the globe.

THINGS TO CONSIDER ON WIRED NETWORKING

1. Network Topologies and Architectures: Many studies explore different network


topologies (e.g., star, bus, ring) and architectural designs to optimize performance,
scalability, and fault tolerance. The selection of an appropriate topology often
depends on factors such as network size, traffic patterns, and cost considerations.

2. Cabling and Transmission Mediums: Research often delves into the advantages
and limitations of various cabling options (Ethernet, fiber optics) and their impact
on data transfer speeds, signal quality, and reliability. These studies help in
choosing the right cabling solution for specific network requirements.
3. Performance and Throughput: Multiple works investigate methods to enhance
network performance and throughput. This includes optimizing data transfer rates,
minimizing latency, and managing congestion in high-traffic environments.

4. Security and Encryption: The security of wired networks is a critical concern.


Research addresses encryption methods, intrusion detection systems, and access
control mechanisms to safeguard data from unauthorized access and cyber threats.

5. Quality of Service (QoS): QoS studies focus on ensuring that critical


applications receive the necessary bandwidth and priority, especially in networks
with varying data requirements. These works often propose strategies to prioritize
traffic and allocate resources effectively.

6. Network Management and Monitoring: Researchers often explore techniques


for efficient network management, including network monitoring, fault detection,
and performance optimization. Automation tools and algorithms are developed to
simplify network administration.

7. Energy Efficiency: With environmental concerns gaining importance, studies


investigate methods to reduce energy consumption in wired networks. This
includes optimizing network components' power usage and designing energy-
efficient protocols.

8. IPv6 Adoption: As IPv4 address exhaustion becomes a concern, research looks


into the adoption and migration to IPv6, exploring the challenges and benefits
associated with transitioning to the new protocol.

9. Virtualization and Cloud Integration: The integration of wired networks with


virtualization and cloud technologies is a popular research area. Studies explore
how networks can support the demands of cloud computing and accommodate
virtual machines and applications efficiently.

10. RNetwork Resilience and Redundancy: Given the criticality of network


uptime, research focuses on redundancy strategies, failover mechanisms, and
resilience against network failures. This includes exploring techniques to ensure
continuous operation even in the face of disruptions.
2.1.1 COMPONENTS OF A WIRED NETWORK

1. Devices: Devices in a wired network include computers, servers, routers,


switches, and printers. These devices are interconnected to share resources, such
as files, printers, and internet connections.

2. Cabling: The choice of cabling is crucial for network performance. Ethernet


cables (e.g., Cat5e, Cat6) and fiber optic cables are commonly used. Ethernet
cables are cost-effective and suitable for short to medium distances, while fiber
optic cables offer high-speed data transmission over longer distances.

3. Protocols: Protocols define the rules and conventions for data transmission.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the foundation of
modern wired networks. It ensures reliable data delivery, addressing, and routing.

2.1.2 LAYERS AND INTERACTIONS

1. Physical Layer: This layer deals with the physical connection of devices using
cables. It defines the type of cable, connectors, and signaling. Devices like
switches and hubs operate at this layer, ensuring data is transmitted over the cables
accurately.

2. Data Link Layer: Responsible for framing data into packets and providing error
detection and correction. Ethernet protocols operate here. Switches operate at this
layer, using MAC addresses to forward data only to the intended recipient.

3. Network Layer: This layer involves routing data across different networks.
Routers operate here, forwarding data based on IP addresses. Internet Protocol
(IP) and Internet Control Message Protocol (ICMP) are crucial protocols.

4. Transport Layer: Focuses on end-to-end communication, ensuring data integrity


and reliability. TCP and UDP (User Datagram Protocol) are key protocols. TCP
ensures data delivery with acknowledgment, while UDP is used for faster but less
reliable communication.

5. Application Layer: The topmost layer interacts directly with software


applications. It includes protocols like HTTP (web browsing), FTP (file transfer),
and SMTP (email). Applications use these protocols to communicate over the
network.
In conclusion, a wired network's conceptual framework encompasses
devices, cabling, protocols, and networking layers. These components work
together to enable efficient and secure data transmission, forming the foundation
of modern communication systems. Understanding this framework is essential for
designing, implementing, and maintaining wired networks that meet the demands
of today's interconnected world.

2.2 REVIEW OF RELATED WORKS

NETWORK TOPOLOGIES AND ARCHITECTURES

Numerous studies have explored various network topologies and architectures to


optimize performance, scalability, and fault tolerance. Al-Fares et al. (2008)
introduced the concept of data center networks using a "Fat-Tree" topology, which
efficiently handles high volumes of data traffic. Meanwhile, Tanenbaum's work on
Ethernet (Computer Networks, 2010) underscored the flexibility of star topologies
in local area networks.

CABLING AND TRANSMISSION MEDIUMS

Research often delves into cabling options and their impact on data transfer. The
work of Jensen et al. (2015) evaluated the advantages of fiber optic cables over
copper cables in terms of bandwidth, latency, and resistance to electromagnetic
interference.

PERFORMANCE OPTIMIZATION

Efforts to enhance network performance include studies on data transfer rates and
latency reduction. Zhang et al. (2017) proposed a hybrid approach to improve data
transfer rates by combining multiple wireless channels with wired connections,
resulting in significant throughput gains.

SECURITY AND ENCRYPTION

Security in wired networks is a critical concern. In "A Survey of Network Security


Techniques," Aljawarneh (2018) explored encryption methods and intrusion
detection systems to protect data from unauthorized access.
QUALITY OF SERVICE (QOS)

Ensuring QoS in wired networks is vital. Research by Yoo et al. (2013) focused on
QoS provisioning mechanisms that prioritize traffic flows based on application
requirements, ensuring smooth data delivery even during network congestion.

NETWORK MANAGEMENT AND MONITORING

Network management studies emphasize efficient administration and fault


detection. Nguyen et al. (2019) proposed an AI-driven network monitoring system
that uses machine learning to predict network anomalies and potential failures,
aiding proactive management.

IPV6 ADOPTION

The transition to IPv6 has garnered research attention. Sun et al. (2014) discussed
the challenges and benefits of adopting IPv6 in a study that analyzed factors
influencing IPv6 adoption rates globally.

VIRTUALIZATION AND CLOUD INTEGRATION

Wired networks' integration with virtualization and cloud technologies is explored


in studies like Dorigo et al.'s work (2016), which investigated the design and
management of hybrid cloud networks, enabling seamless resource allocation.

NETWORK RESILIENCE AND REDUNDANCY

Resilience and redundancy strategies are essential for network uptime. The work
of Jiang et al. (2018) proposed a novel approach using Software-Defined
Networking (SDN) to achieve dynamic redundancy for improved network
reliability.
CHAPTER THREE

RESEARCH METHODOLOGY

Methodology” implies more than simply the methods intend to use to collect data.
It is often necessary to include a consideration of the concepts and theories which
underlie the methods.

More over methodology guides the researcher to involve and to be active in my


particular field of enquiry. Right from selecting the topic and carrying out the
whole research work till recommendations; research methodology drives the
researcher and keeps him on the right track. The entire research plan is based on
the concept of right methodology (Foez Md Iqbal Hossain 2013).

Here's a step-by-step approach along with explanations for each stage:

1. Determine Network Requirements:

Identify the purpose of your LAN, the number of devices to be connected, and the
expected data traffic. This will guide your design decisions.

2. Choose Network Topology:

Select a network topology that suits your needs. A common choice is the star
topology, where devices are connected to a central switch or hub.

3. Select Network Devices:

Choose network devices based on your topology. You'll need switches for local
data traffic management and a router to connect your LAN to external networks.

4. Plan Cabling Infrastructure:

Decide on the cabling type. Ethernet cables (Cat5e, Cat6, Cat6a) are commonly
used. Map out cable routes, considering distances, cable lengths, and cable trays if
necessary.

5. Design IP Addressing Scheme:

Plan your IP addressing scheme. Decide whether to use static IP addresses or


DHCP for automatic assignment. Divide IP ranges for different segments if
subnetting is required.
6. Subnetting (If Needed):

If your LAN is large, consider subnetting for better organization and security.
Create separate subnets for different departments or functions.

7. Network Security Measures:

Implement security protocols, including firewalls, intrusion detection systems, and


strong access controls. Consider using VLANs to isolate devices and segments for
enhanced security.

8. Network Services and Servers:

Determine which network services you'll provide, such as file sharing, printer
sharing, and internet access. Set up servers for these services if required.

9. Cable Installation and Management:

Install cables following your planned routes. Use cable management techniques to
prevent tangling and ensure neatness. Label cables for easy identification.

10. Documentation:

Create comprehensive documentation that includes network diagrams, IP


addresses, device configurations, and contact information for network
administrators.

11. Testing and Optimization:

Before deployment, thoroughly test the LAN's connectivity, performance, and


security. Monitor traffic using network monitoring tools and optimize
configurations as needed.
Figure.1: LAN Connection of BAEC Head Quarter
CHAPTER FOUR

SYSTEM IMPLEMENTATION

4.1 HARDWARE SELECTION

LAN Related Device Selection

Router Model 2901; I am using Cisco router. It is reliable and trusted to IT


Community. Bandwidth is a factor for router as well and 2900 series router
required MBPSA Duplex operations easily choose a Cisco router supports upgrade
IOS version will enable to enjoy some good facilities. Switch Model 2960; i also
use Cisco manageable switch for their backbone. It is tested and performs well for
IT backbone. Cable & Connector; Choosing good brand cable. Now days Cat-6
cables are most popular. It will be best for LAN wearing (it has really good sailed
protection). The RJ 45 and is 8 - Position modular connector that looks like a large
phone plug. Servers; Server Selection is important for each server services. Many
reputed ISP in Bangladesh runs with brand servers. Need to choose a brand which
spare parts are available local support for the brand is essential.

Figure.2: Local Area Network (LAN) Diagram at BAEC Head Quarter.


Configuration

Configuring Router

I install the routers hardware properly before configuring and commissioning. I


install all hardware properly to avoid damage. I read all supplied manual properly
before installing router. I Take a PC/Laptop with terminal emulator software
(Hyper Terminal for windows mini com for Linux).The PC should have at least a
standard communication port (Com-1) connect Router’s console to Pc’s
communication port using console cable. I Turn on Pc’s and router power switch.
Terminal will display router’s booting information. I have successfully booted
router and configure using setup facility the router is now configured properly
with initial configuration and ready to use.

Configure Server

Proxy Server satisfies web browser’s query by sending requested web page. Proxy
does two main operations. First operation is to reduce internet bandwidth charges.
And the second option is to limit web access to authorized user/PC. Users
configure their web browser’s to use the proxy server instead of going to the
internet directly [20]. When a user sends any web request, proxy takes the request.
Proxy is the only service, which heavily uses CPU, memory and storage
simultaneously. We Installing Operating System and then configuration
following:

Operating System

Buying operating system (OS) in Bangladesh is really a big headache. There are
very few commercial operating systems. All commercial operating systems
supports are not also available locally. So, I need to depend on foreign support we
choose OS Centos-6.5 which includes squid with its entire options precompiled.
Server OS should have a large amount of hardware support. Compare with your
operating systems hardware compatibilities List (HCL), before choosing the OS.
Installation Media; Install Linux operating system from any comfortable media
like CD ROM, Hard disk including all network installation method. Installing OS;
I have chosen Centos-6.5 Linux operating system. All other versions
installation is almost same. I cover Centos-6.5 installation step by step.

a) Disk Partition Setup.

b) Boot loader configures.

c) Firewall configure manual.

d) Set root Password.

e) Package group selection automatically.

f) Escape boot diskette creation.

g) Video card configurations.

h) Configuring monitor.

i) Installation complete then reboot the system.

Network configuration is Linux; I configure Linux server to enjoy networking


features. Linux Networking Facility by default Linux support network, when I
will install a system, Networking facility will be installed. Moreover, is a stalled
system without a NIC card Networking will be available with to interface. IO
helps to run all Network related services when other NIC is not available I can
check/control network by “Network” service script nicely
(/etc/rc,d/init.d/network). Use the following command connected to start/stop
network Service.

[root@ns1 root] # Service network stop. [root@ns1 root] # Service network start.
[root@ns1 root] # Service network status. Determining IP address; now a day’s
commonly all Pc’s come with a NIC, when Linux is installed this first device is
called “eth0” second one is “eth1” and so on. We can determine the IP address of
these interfaces using “ifconfig”

[root@snmp root] # if config.

Assigning IP address using “if config”. We can assign an IP address on “eth0”


interface using the” if config” command. This is the most common method.

[root@snmp root] # if config eth0 10.0.0.100 net mask 255.255.255.0 up.


The “up” at the end of the command activates the interface after assigning the IP.
But this procedure is not permanent. When you will reboot the system the IP
setting will be lost. To make this IP permanent, you need to change the script file
for the particular interface. All files will be found in “/etc/sysconfig /network-
scripts” directory. Now restart the “network” service to take effect. I need to
restart the network service each time makes any type of change into these files.
[root@nsl root] # service network restart use “ ifconfig” command to see the
change. It will show the new IP setting. [root@snmp root] # if config. Assigning
IP address using “netconfig”, I can also do it automatically using some graphical
utility. “netgonfig” is a beautiful utility that I can use to edit those files
automatically. It will offer to fill up essential fields.
CHAPTER FIVE

CONCLUSION AND RECOMMENDATION

5.1 CONCLUSION

This Research Paper proposed a secure design for network and system in Linux
and windows environment using the latest technology. We should have an
understanding with communication models, network service & architecture,
media, devices and protocol suites. I am expected to have network service. Every
network requires a regular maintenance such as storage maintenance, remote
resource access, user management, log management and some other management.
Monitoring is a regular task for all network system. It is mandatory when the
system is dedicated to public service to make a user friendly and dependable
monitoring system. After applying our proposed design, deployment and
implemented highly reliable local area network mechanism. Therefore, all the
mechanisms thoroughly discussed in this paper to work well together and provide
strong Local Area Network (LAN) system at BAEC Head Quarter.

RECOMMENDATION

In Future, I will extend my Local Area Network by adding Access Point (AP) and
Wi-Fi devices. I will add more network devices to service the end user who are
working at BAEC Head Quarter.
REFERENCES

[1] P. Wijuntunga, "LOCAL AREA NETWORKS (LANS) AND THEIR


APPLICATION IN LIBRARIES," The
Central Library University of Colombo, Colombo 3, Sri Lanka,
[Online]. Available: http://web.simmons.edu.
[2] P. M. &. B. B. Baird, An Experiment in Computer Conferencing Using a
Local Area Network, Electronic Library,
June 1987.
[3] E. &. T. L. Flower, Setting Up a Public Use Local Area Network, Wilson
Library Bulletin, 63 (1): 45-47,
September 88.
[4] WIKIPEDIA, "Local area network," June 2007.
[Online]. Available:
https://en.wikipedia.org/wiki/Local_area_network.
[5] A. Broadband, "Importance Of Internet Technology For Easy Life," 16
March 2020. [Online]. Available:
https://asianetbroadband.in/importance-of-internet-technology-for-easy-life.
[Accessed 16 March 2020].
[6] M. Bakardjieva, "The Internet in Everyday Life," 29 July 2009. [Online].
Available: https://people.ucalgary.ca.
[Accessed 29 July 2009].
[7] M. Bakardjieva, Internet Society: The Internet in Everyday Life,
University of Calgary, Canada: SAGE
Publications Ltd, May 31, 2012.
[8] R. Singh, "10 Ways Internet Changed our Lives Positively - Here all we
Explained," 7 July 2018. [Online].
Available: https://www.pdevice.com. [Accessed 7 July 2018].
[9] W. H. Seifedine Kadry, "DESIGN AND IMPLEMENTATION OF
SYSTEM AND," Journal of Theoretical and
Applied Information Technology, 2005 - 2008.
[10] D. G. Mukesh Kumar Mishra, "Security Analysis in Open Source Linux
Network," International Journal of
Engineering Research & Technology (IJERT), vol. 2, no. 8, 2013.
[11] D. G. Mukesh Kumar Mishra, "Security Analysis in Open Source Linux
Network," International Journal of
Engineering Research & Technology (IJERT), vol. 2, no. 8, 2013.
[12] M. u. m. I. M. S. A. Foez Md Iqbal Hossain, "Hybrid Wireless Mesh
Network," BRAC UNIVERSITY, Dhaka,
2013.
[13] J. Pollard, "Network infrastructure security basics," [Online]. Available:
https://help.returnpath.com.
[14] D. Tutorial, "DCN - Network LAN Technologies,"
[Online]. Available:
https://www.tutorialspoint.com/data_communication_computer_network/network
_lan_technologies.htm.
[15] I. D. T. a. Information, "LAN Topologies
(Networking)," [Online].
Available: https://what-when-
how.com/networking/lan-topologies-networking.
[16] W. X. Y. BIAN, Computer network planning and design of the second
edition, Machinery Industry Press,
November 1, 2015.
[17] W. John, On Measurement and Analysis of Internet Backbone Traffic,
Göteborg, Sweden: Chalmers Reproservice,
2008.
[18] S. Tech, "CAT6 UTP -Data Cable," 2017. [Online]. Available:
https://www.stl.tech/optical-interconnect-products.
[Accessed 2017].
[19] Kordz, "RJ45 CAT6 Field Termination Connector & Strain Relief,"
https://static1.squarespace.com. [Accessed 2019].
[20] R. Hat, "Red Hat Satellite 5.8 Proxy Installation Guide," 1 February
https://access.redhat.com/documentation. [Accessed 1 February 2017].
[21] Z. Technology,
"Z9_CentOS_Installation_Guide_AAv7_3.3_20141003.docx,"
Available: https://zerodownsoftware.com. [Accessed 3 October 2014].

You might also like