Wired Networking
Wired Networking
INTRODUCTION
The internet is, however, more than just a physical connection of LANs,
internetworking protocols and standards are also needed. Network’s models
serve to organize, unity, and control the hardware and software components
of communication and networking. The Internet has revolutionized many aspects
of our daily lives (Broadband 2020). It has affected the way we do business as
well as the way we spend our leisure time. Count the ways you have use the
internet recently. Perhaps you have sent electronic mail (email) to a business
associate, paid a utility bill, read a newspaper from a distant city, or looked up a
local movie schedule all by using the internet or maybe you researched a medical
topic, booked a hotel reservation, chatted with a fellow trekker or comparison
shopped for a car. The internet is a communication system that has brought a
wealth of information to our fingertips and organized it for out use (Bakardjieva
2009).
Technology has reached its highest peak of development, especially in making life
easier for people. Well implemented technology is faster than human in processing
calculation and is more accurate. Technology has become an important concept in
our life. It assists in connecting communities together. Obviously, people have
started to use technology in every field of life including education, health, the
military, etc. The computer network represents a component, especially on how it
enhances the functional performance in different fields and organizations, such as
companies and schools.
This day’s most organizations build their own LAN infrastructure with
special consideration of security measures to protect their resources from any kind
of attacks (Pollard 2013). Building a well-secured LAN requires designing of
network topology before deciding which physical devices to be purchased or
technologies to deploy. A topology design is defined as the identification of
networks and their interconnection points, the size and the scope of the network,
and the type of interconnecting devices used. Every network requires a structured
planning and designing before deployment it that requires internet access, Internet
connectivity factors should be included into the plan, Includes a practical design
of network internet connectivity backbone (John 2008). Procedures of selecting
equipment’s are added and planning designs their networks. The LAN of BAEC
head quarter interconnects more than 90 computers using various network media.
The previous LAN was not properly working; as a result, the internet service was
interrupted. Hence, the previous LAN was redesigned and up gradated using a
Proxy server of Dell T320, Router: Cisco 2901, and other network media.
The main goal of this project is to present a Local Area Network design suitable
for Bangladesh Atomic Energy Commission (BAEC). This research will help
these organization to design a network that employs low-cost solutions without
unacceptable compromises in security or quality.
This is the ability of the network to withstand intense pressure from utilization.
Most times, the networks are mainly crowded by many users that the network
capacity could not handle. It is very important to design a network in such a way
to handle many users without failure. This network is designed for a user
population of 5075. If more users access the network, it will be able to scale.
Universities from these third world countries still need to have good quality and
more secure network equipment with less cost. This is because these schools
aspire to deliver capability in line with the leading prestigious universities despite
low budgets. Therefore, this design will be on Wired Network technology
The following are the limitations encountered during the period of the project
work.
1. Lack of finance: lack of finance was a problem, throughout the project work
due to the fact that the group members didn’t turn in their quota at the
appropriate time and all this lead to slow frustrating research.
2. The limited time available to collect and analyze data collected. Analysis
was done base on the interview; therefore having results immediately the
entire interviewer were return.
3. The error occurring during data collection arising from those not giving
honest answers. To overcome this, we worked with the specific
correspondents we had built trust with professionally.
With introduction already being explained in chapter 1 and the whole idea of this
research work presentation in chapter one, like objective of the study, statement of
the research area of coverage limitation and definition of terms all this makes up
the chapter one.
Chapter 2; this section deals with the review of study, review of concept theories
upon which this work is built on.
Chapter 3 talks about The methodology at which this research work will be
implemented.
In chapter 4 the system is implemented and presented with its analysis. Functions
of the system and the operation of the system is also, in depth explained for reader
understating and comprehension. The system requirement is also detailed and the
platform at which the system can run on.
Chapter 5 summaries the whole work done and make possible recommendation
and suggest other points to be included into the work for future propose
LITERATURE REVIEW
A wired network refers to a system where devices are connected using physical
cables, allowing data transmission between them. It forms the backbone of many
modern communication infrastructures, providing reliable and high-speed
connectivity. The conceptual framework of a wired network encompasses various
elements that collaborate to facilitate seamless data transfer and communication.
The history of wired networking traces the evolution of technologies that have
shaped how we communicate and share data over physical connections. Here's an
overview of key milestones:
- The telegraph, invented by Samuel Morse in the 1830s, marked one of the
earliest forms of wired communication.
- LANs used coaxial cables to connect computers within a confined area, enabling
resource sharing and collaboration.
- Fiber optic cables were introduced, offering higher bandwidth and lower signal
degradation compared to traditional copper cables.
- As demand for higher data speeds grew, Digital Subscriber Line (DSL) and cable
modem technologies brought broadband connectivity to homes and businesses.
2000s: Gigabit Ethernet and Beyond
- The development of 10 Gbps, 40 Gbps, and 100 Gbps Ethernet standards further
increased network speeds.
2. Cabling and Transmission Mediums: Research often delves into the advantages
and limitations of various cabling options (Ethernet, fiber optics) and their impact
on data transfer speeds, signal quality, and reliability. These studies help in
choosing the right cabling solution for specific network requirements.
3. Performance and Throughput: Multiple works investigate methods to enhance
network performance and throughput. This includes optimizing data transfer rates,
minimizing latency, and managing congestion in high-traffic environments.
3. Protocols: Protocols define the rules and conventions for data transmission.
TCP/IP (Transmission Control Protocol/Internet Protocol) is the foundation of
modern wired networks. It ensures reliable data delivery, addressing, and routing.
1. Physical Layer: This layer deals with the physical connection of devices using
cables. It defines the type of cable, connectors, and signaling. Devices like
switches and hubs operate at this layer, ensuring data is transmitted over the cables
accurately.
2. Data Link Layer: Responsible for framing data into packets and providing error
detection and correction. Ethernet protocols operate here. Switches operate at this
layer, using MAC addresses to forward data only to the intended recipient.
3. Network Layer: This layer involves routing data across different networks.
Routers operate here, forwarding data based on IP addresses. Internet Protocol
(IP) and Internet Control Message Protocol (ICMP) are crucial protocols.
Research often delves into cabling options and their impact on data transfer. The
work of Jensen et al. (2015) evaluated the advantages of fiber optic cables over
copper cables in terms of bandwidth, latency, and resistance to electromagnetic
interference.
PERFORMANCE OPTIMIZATION
Efforts to enhance network performance include studies on data transfer rates and
latency reduction. Zhang et al. (2017) proposed a hybrid approach to improve data
transfer rates by combining multiple wireless channels with wired connections,
resulting in significant throughput gains.
Ensuring QoS in wired networks is vital. Research by Yoo et al. (2013) focused on
QoS provisioning mechanisms that prioritize traffic flows based on application
requirements, ensuring smooth data delivery even during network congestion.
IPV6 ADOPTION
The transition to IPv6 has garnered research attention. Sun et al. (2014) discussed
the challenges and benefits of adopting IPv6 in a study that analyzed factors
influencing IPv6 adoption rates globally.
Resilience and redundancy strategies are essential for network uptime. The work
of Jiang et al. (2018) proposed a novel approach using Software-Defined
Networking (SDN) to achieve dynamic redundancy for improved network
reliability.
CHAPTER THREE
RESEARCH METHODOLOGY
Methodology” implies more than simply the methods intend to use to collect data.
It is often necessary to include a consideration of the concepts and theories which
underlie the methods.
Identify the purpose of your LAN, the number of devices to be connected, and the
expected data traffic. This will guide your design decisions.
Select a network topology that suits your needs. A common choice is the star
topology, where devices are connected to a central switch or hub.
Choose network devices based on your topology. You'll need switches for local
data traffic management and a router to connect your LAN to external networks.
Decide on the cabling type. Ethernet cables (Cat5e, Cat6, Cat6a) are commonly
used. Map out cable routes, considering distances, cable lengths, and cable trays if
necessary.
If your LAN is large, consider subnetting for better organization and security.
Create separate subnets for different departments or functions.
Determine which network services you'll provide, such as file sharing, printer
sharing, and internet access. Set up servers for these services if required.
Install cables following your planned routes. Use cable management techniques to
prevent tangling and ensure neatness. Label cables for easy identification.
10. Documentation:
SYSTEM IMPLEMENTATION
Configuring Router
Configure Server
Proxy Server satisfies web browser’s query by sending requested web page. Proxy
does two main operations. First operation is to reduce internet bandwidth charges.
And the second option is to limit web access to authorized user/PC. Users
configure their web browser’s to use the proxy server instead of going to the
internet directly [20]. When a user sends any web request, proxy takes the request.
Proxy is the only service, which heavily uses CPU, memory and storage
simultaneously. We Installing Operating System and then configuration
following:
Operating System
Buying operating system (OS) in Bangladesh is really a big headache. There are
very few commercial operating systems. All commercial operating systems
supports are not also available locally. So, I need to depend on foreign support we
choose OS Centos-6.5 which includes squid with its entire options precompiled.
Server OS should have a large amount of hardware support. Compare with your
operating systems hardware compatibilities List (HCL), before choosing the OS.
Installation Media; Install Linux operating system from any comfortable media
like CD ROM, Hard disk including all network installation method. Installing OS;
I have chosen Centos-6.5 Linux operating system. All other versions
installation is almost same. I cover Centos-6.5 installation step by step.
h) Configuring monitor.
[root@ns1 root] # Service network stop. [root@ns1 root] # Service network start.
[root@ns1 root] # Service network status. Determining IP address; now a day’s
commonly all Pc’s come with a NIC, when Linux is installed this first device is
called “eth0” second one is “eth1” and so on. We can determine the IP address of
these interfaces using “ifconfig”
5.1 CONCLUSION
This Research Paper proposed a secure design for network and system in Linux
and windows environment using the latest technology. We should have an
understanding with communication models, network service & architecture,
media, devices and protocol suites. I am expected to have network service. Every
network requires a regular maintenance such as storage maintenance, remote
resource access, user management, log management and some other management.
Monitoring is a regular task for all network system. It is mandatory when the
system is dedicated to public service to make a user friendly and dependable
monitoring system. After applying our proposed design, deployment and
implemented highly reliable local area network mechanism. Therefore, all the
mechanisms thoroughly discussed in this paper to work well together and provide
strong Local Area Network (LAN) system at BAEC Head Quarter.
RECOMMENDATION
In Future, I will extend my Local Area Network by adding Access Point (AP) and
Wi-Fi devices. I will add more network devices to service the end user who are
working at BAEC Head Quarter.
REFERENCES