Implementationof Local Area Network LANand Builda Secure LANSystemfor Atomic Energy Research Establishment AERE3 Volume 8 Issue 2 Osman
Implementationof Local Area Network LANand Builda Secure LANSystemfor Atomic Energy Research Establishment AERE3 Volume 8 Issue 2 Osman
net/publication/359892877
Implementation of Local Area Network (LAN) and Build a Secure LAN System for
Atomic Energy Research Establishment (AERE)
CITATIONS READS
7 3,310
1 author:
Osman Goni
Institute of Computer Science (ICS), Atomic Energy Research Establishment
13 PUBLICATIONS 15 CITATIONS
SEE PROFILE
All content following this page was uploaded by Osman Goni on 12 April 2022.
Abstract - We live in age of modern science. Computer that makes this hardware work, and also ensures that the
Network is the best innovation of Modern science. A local area information between these computers is exchanged without
network (LAN) is a computer network within a small any loss or distortion. In short, it encompasses the whole
geographical area such as a home, school, computer gamut of hardware and software component that make a
laboratory, office building or group of buildings. A LAN is
composed of inter-connected workstations and personal
computer network operate [3]. A local area network (LAN)
computers which are each capable of accessing and sharing is a collection of devices connected together in one physical
data and devices, such as printers, scanners and data storage location, such as a building, office, or home [4]. A LAN can
devices, anywhere on the LAN. LANs are characterized by be small or large, ranging from a home network with one
higher communication and data transfer rates and the lack of user to an enterprise network with thousands of users and
any need for leased communication lines. A high-quality and devices in an office or school. A local area network (LAN)
correctly dimensioned network infrastructure is essential for is a group of computers and associated devices that share a
all well- functional IT system. A Local Area Network based common communications line or wireless link [5]. Usually,
network can ensure high speed as well as high quality the server has applications and data storage that are shared
network. To fulfill the current requirements of AERE (Atomic
Energy Research Establishment) considering its smooth
in common by multiple computer users. A local area
operation of high speed internet service, LAN based network is network may serve as few as two or three users (for
the state-of-the-art network solution. A LAN network design example, in a home network) [6]. Networks are divided into
refers to the specialized processes leading to a successful two main categories: Local Area Networks (LANs) and
installation and operation of a network which includes Wide Area Networks (WANs). These two types of
determining the type of communication system(s) which will networks have different characteristics and different
be carried over the network, the geographic layout, the functionalities. In general, a LAN is a collection of
transmission equipment required and the fiber network over computers and peripheral devices in a limited area such as a
which it will operate. The purpose of this Network is to design building or campus [7]. A LAN is usually under the domain
a Local Area Network (LAN) for AERE (Atomic Energy
Research Establishment) and implement security measures to
of a single organization such as an institutional or
protect network resources and system services. To do so, I will department. The internet is, however, more than just a
deal with the physical and logical design of a LAN. The goal of physical connection of LANs, internetworking protocols
this Network is to examine of the Local Area Network set up and standards are also needed. Network’s models serve to
for AERE and build a secure LAN system. organize, unity, and control the hardware and software
components of communication and networking. The
Key words: Secure LAN, Operating Wavelength, Route Internet has revolutionized many aspects of our daily lives
Planning, Planning & Deployment, Network Design, AERE [8]. It has affected the way we do business as well as the
way we spend our leisure time. Count the ways you have
use the internet recently. Perhaps you have sent electronic
1. Introduction mail (email) to a business associate, paid a utility bill, read a
A Computer Network is an arrangement that enables two or newspaper from a distant city, or looked up a local movie
more computers to communicate (“talk”) to each other, schedule all by using the internet or maybe you researched a
sharing resources, information and services [1]. Information medical topic, booked a hotel reservation, chatted with a
is no. of use unless it is available at the time and place fellow trekker or comparison shopped for a car. The
where it is required. This is especially true into day’s internet is a communication system that has brought a
scenario where the competition is very tough. Networking wealth of information to our fingertips and organized it for
of a computer is the best means to manage information. out use [9] [10] [11]. The internet is a structured, organized
Very often we come across the phrase “This state has very system. Bangladesh Atomic Energy Commission is a
good network roads” [2]. This is basically implying that it is scientific research organization and regulatory body
possible to reach every nook and corner of the state fast, of Bangladesh. Its main objective is to promote use of
easily, and comfortably. Same analogy can be extended to atomic energy for peaceful purposes. It was established on
networks of computers. Network of computers implies 27 February 1973. So it is important to Design, Deployment
linking computers through some kind of a communication and Implementation of Local Area Network (LAN) at
links. This does not mean simply connecting the computers AERE (Atomic Energy Research Establishment).
through some wires, instead it also includes the software
1
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020
2. Research Back Ground three nuclear medical centers [14]. Atomic Energy Research
Establishment was established in 1975 at Ganakbari, Savar
3. Local Area Network Upazila, Dhaka District. It was placed under the
Like any other data communication network, a local area administration of Bangladesh Atomic Energy Commission,
network is composed of three basic hardware elements: a which had been facing manpower shortages since the
transmission medium, often twisted pair, coaxial cable, or Independence of Bangladesh in 1971 [15].
fiber optics; a mechanism for control of transmission over
the medium; and an interface to the network for the host 6. Bangladesh Telecommunication Company Limited
computers or other devices-the nodes of the network-that BTCL or Bangladesh Telecommunication Company
are connected to the network. In addition, local area Limited is the largest telecommunications company
networks share with long-haul packet communication in Bangladesh. The company was founded as
networks a fourth basic element: a set of software protocols, the Bangladesh Telegraph & Telephone Board (BTTB)
Bangladesh's independence in 1971. On July 1, 2008 the
implemented in the host computers or other devices
BTTB became a public limited company and was renamed
connected to the networks, which control the transmission as BTCL [16].
of information from one host or device to another via the
hardware elements of the network. These software 7. Transmission Windows
protocols function at various levels, from low level packet Optical fiber transmission uses wavelengths that are in the
transport protocols to high-level application protocols, and near-infrared portion of the spectrum, just above the visible,
are an integral part of both local area networks and their and thus undetectable to the unaided eye. Typical optical
close relatives, long-haul packet communication networks. transmission wavelengths are 850 nm, 1310 nm, and 1550
This combined hardware-software approach to nm. Both lasers and LEDs are used to transmit light through
communication serves to distinguish networks, as discussed optical fiber. Lasers are usually used for 1310- or 1550-nm
in this paper, from other arrangements of data single-mode applications. LEDs are used for 850- or 1300-
communication hardware [12]. nm multimode applications [17].
2
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020
9. Optical Fiber and Local Area Network Design equipment installation and startup. Finally, I consider
documentation, maintenance and planning for restoration in
Next I consider actual component selection, placement, event of an outage.
installation practices, testing, troubleshooting and network
My existing local area network (LAN) consists of computer their margin was sufficient to meet our data throughput rate
network that interconnects computers situated in different requirements. I provide 10 Mbps internet bandwidth from
buildings at AERE using network media. Inside LAN, our BTCL for high speed broadband internet services. I select
employees are offered a computer network design applying Multi mode fiber (MF), four core cable for our network to
metallic structured cabling CAT6. This cabling enables data cover all ICT services, such as voice, video, data, wireless
transfer up to 100 Mbps. The network backbone is then access, security, surveillance and building automation.
customized using optical links. I perform dimensioning of
active elements, such as switches and routers, to ensure 10. Optical Fiber Route Planning & Deployment from
3
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020
BTCL to AERE and LAN Setup placement of the cable plant is determined by the physical
locations from ICS to CAD building along the route. The
In the next step, I start planning the route of optical fiber route distance is 500 meter and I deploy the cable in the
from ICS (Institute of Computer science) to CAD (Central underground. Furthermore, as always premises and outside
administration Department) to determine exactly where the plant installations are different so I consider them
cable plant and hardware will be located having decided to separately.
use fiber optics and chosen equipment appropriate for the
application. As every installation is unique, the actual
Figure.3: Optical fiber and Local Area Network Design & Deployment at AERE.
history dating back to internet’s beginnings and the current
Final planning for the deployment is a critical phase of any development in network security. In order to understand the
work as it involves coordinating activates of many people research being performed today, background knowledge of
the internet, its vulnerabilities, attack methods through the
[18]. I develop a checklist based on the design path for internet, and security technology is important and therefore
smooth installation. they are reviewed [19]. When developing a secure network,
the following need to be considered: 1. Access– Authorized
11 Network Security users are provided the means to communicate to and from a
particular network 2. Confidentiality– Information in the
11.1 Network Security Essential network remains private 3. Authentication – Ensure the
Network security has become more important to personal users of the network are who they say they are 4. Integrity –
computer users, organizations, and the military. With the Ensure the message has not been modified in transit 5. Non‐
advent of the internet, security became a major concern and repudiation – Ensure the user does not refute that he used
the history of security allows a better understanding of the the network [20].
emergence of security technology. The internet structure
itself allowed for many security threats to occur. The 11.2 Security Services
architecture of the internet, when modified can reduce the It is a processing or communication service that is provided
possible attacks that can be sent across the network. by a system to give a specific kind of production to system
Knowing the attack methods, allows for the appropriate resources. Security services implement security policies and
security to emerge. Many businesses secure themselves are implemented by security mechanisms. Security Services
from the internet by means of firewalls and encryption are Confidentiality, Authentication, Peer Entity
mechanisms. The businesses create an “intranet” to remain Authentication, Data Origin Authentication, Integrity,
connected to the internet but secured from possible threats. Connection Oriented Integrity [21].
The entire field of network security is vast and in an
evolutionary stage. The range of study encompasses a brief
4
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020
File encryption and digital signature technology is firewalls have different types of rules and security policies.
to improve the security and confidentiality of information The authorized traffic will be sent based only on local
systems and data, one of the secrets to prevent external data policies. The firewall itself is protected, i.e.; it uses a trusted
theft, interception or destruction primary technologies. hardware and operating system [27].
Depending on the role, file encryption and digital signature
technology is mainly divided into data transmission, data 13. Configuration
storage, data integrity of the three kinds of discrimination
[24].
Hash function
Internet
MD Comparison
13.3 Operating System The “up” at the end of the command activates the interface
Buying operating system (OS) in Bangladesh is after assigning the IP. But this procedure is not permanent.
really a big headache. There are very few commercial When I will reboot the system the IP setting will be lost. To
operating systems. All commercial operating systems make this IP permanent, I need to change the script file for
supports are not also available locally. So, I need to depend the particular interface. All files will be found in
on foreign support we choose OS Centos-6.5 which “/etc/sysconfig /network-scripts” directory. Now restart the
includes squid with its entire options precompiled. Server “network” service to take effect. I need to restart the
OS should have a large amount of hardware support. network service each time makes any type of change into
Compare with My operating systems hardware these files. [root@nsl root] # service network restart use “
compatibilities List (HCL), before choosing the OS. ifconfig” command to see the change. It will show the new
Installation Media; Install Linux operating system from any IP setting. [root@snmp root] # if config. Assigning IP
comfortable media like CD ROM, Hard disk including all address using “netconfig”, we can also do it automatically
network installation method. Installing OS; I have using some graphical utility. “netgonfig” is a beautiful
chosenCentos-6.5 Linux operating system. All other utility that we can use to edit those files automatically. It
versions installation is almost same. I cover Centos-6.5 will offer to fill up essential fields.
installation step by step.
[1] B. Ratha, "Local Area Network," School of Library and Information 2018].
Science, Devi Ahilya University, Indore, [Online]. Available:
http://www.clib.dauniv.ac.in/E-Lecture/Local_Area_Network.pdf.
[3] T. F. O. Association, "Guide To Fiber Optic Network Design," FOA
[2] S. Nimkarde, "What computer networks are and how to actually Technical Bulletin, 2019. [Online]. Available:
understand them," What computer networks are and how to actually https://www.thefoa.org/tech/guides/DesG.pdf. [Accessed 12
understand them, 14 September 2018. [Online]. Available: December 2018].
https://www.freecodecamp.org/news/computer-networks-and-how-to-
actually-understand-them-c1401908172d/. [Accessed 14 September
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020
8
View publication stats