0% found this document useful (0 votes)
42 views9 pages

Implementationof Local Area Network LANand Builda Secure LANSystemfor Atomic Energy Research Establishment AERE3 Volume 8 Issue 2 Osman

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views9 pages

Implementationof Local Area Network LANand Builda Secure LANSystemfor Atomic Energy Research Establishment AERE3 Volume 8 Issue 2 Osman

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/359892877

Implementation of Local Area Network (LAN) and Build a Secure LAN System for
Atomic Energy Research Establishment (AERE)

Article · April 2022

CITATIONS READS

7 3,310

1 author:

Osman Goni
Institute of Computer Science (ICS), Atomic Energy Research Establishment
13 PUBLICATIONS 15 CITATIONS

SEE PROFILE

All content following this page was uploaded by Osman Goni on 12 April 2022.

The user has requested enhancement of the downloaded file.


International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020

Implementation of Local Area Network (LAN) and


Build a Secure LAN System for Atomic Energy
Research Establishment (AERE)
Osman Goni

Abstract - We live in age of modern science. Computer that makes this hardware work, and also ensures that the
Network is the best innovation of Modern science. A local area information between these computers is exchanged without
network (LAN) is a computer network within a small any loss or distortion. In short, it encompasses the whole
geographical area such as a home, school, computer gamut of hardware and software component that make a
laboratory, office building or group of buildings. A LAN is
composed of inter-connected workstations and personal
computer network operate [3]. A local area network (LAN)
computers which are each capable of accessing and sharing is a collection of devices connected together in one physical
data and devices, such as printers, scanners and data storage location, such as a building, office, or home [4]. A LAN can
devices, anywhere on the LAN. LANs are characterized by be small or large, ranging from a home network with one
higher communication and data transfer rates and the lack of user to an enterprise network with thousands of users and
any need for leased communication lines. A high-quality and devices in an office or school. A local area network (LAN)
correctly dimensioned network infrastructure is essential for is a group of computers and associated devices that share a
all well- functional IT system. A Local Area Network based common communications line or wireless link [5]. Usually,
network can ensure high speed as well as high quality the server has applications and data storage that are shared
network. To fulfill the current requirements of AERE (Atomic
Energy Research Establishment) considering its smooth
in common by multiple computer users. A local area
operation of high speed internet service, LAN based network is network may serve as few as two or three users (for
the state-of-the-art network solution. A LAN network design example, in a home network) [6]. Networks are divided into
refers to the specialized processes leading to a successful two main categories: Local Area Networks (LANs) and
installation and operation of a network which includes Wide Area Networks (WANs). These two types of
determining the type of communication system(s) which will networks have different characteristics and different
be carried over the network, the geographic layout, the functionalities. In general, a LAN is a collection of
transmission equipment required and the fiber network over computers and peripheral devices in a limited area such as a
which it will operate. The purpose of this Network is to design building or campus [7]. A LAN is usually under the domain
a Local Area Network (LAN) for AERE (Atomic Energy
Research Establishment) and implement security measures to
of a single organization such as an institutional or
protect network resources and system services. To do so, I will department. The internet is, however, more than just a
deal with the physical and logical design of a LAN. The goal of physical connection of LANs, internetworking protocols
this Network is to examine of the Local Area Network set up and standards are also needed. Network’s models serve to
for AERE and build a secure LAN system. organize, unity, and control the hardware and software
components of communication and networking. The
Key words: Secure LAN, Operating Wavelength, Route Internet has revolutionized many aspects of our daily lives
Planning, Planning & Deployment, Network Design, AERE [8]. It has affected the way we do business as well as the
way we spend our leisure time. Count the ways you have
use the internet recently. Perhaps you have sent electronic
1. Introduction mail (email) to a business associate, paid a utility bill, read a
A Computer Network is an arrangement that enables two or newspaper from a distant city, or looked up a local movie
more computers to communicate (“talk”) to each other, schedule all by using the internet or maybe you researched a
sharing resources, information and services [1]. Information medical topic, booked a hotel reservation, chatted with a
is no. of use unless it is available at the time and place fellow trekker or comparison shopped for a car. The
where it is required. This is especially true into day’s internet is a communication system that has brought a
scenario where the competition is very tough. Networking wealth of information to our fingertips and organized it for
of a computer is the best means to manage information. out use [9] [10] [11]. The internet is a structured, organized
Very often we come across the phrase “This state has very system. Bangladesh Atomic Energy Commission is a
good network roads” [2]. This is basically implying that it is scientific research organization and regulatory body
possible to reach every nook and corner of the state fast, of Bangladesh. Its main objective is to promote use of
easily, and comfortably. Same analogy can be extended to atomic energy for peaceful purposes. It was established on
networks of computers. Network of computers implies 27 February 1973. So it is important to Design, Deployment
linking computers through some kind of a communication and Implementation of Local Area Network (LAN) at
links. This does not mean simply connecting the computers AERE (Atomic Energy Research Establishment).
through some wires, instead it also includes the software

1
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020

2. Research Back Ground three nuclear medical centers [14]. Atomic Energy Research
Establishment was established in 1975 at Ganakbari, Savar
3. Local Area Network Upazila, Dhaka District. It was placed under the
Like any other data communication network, a local area administration of Bangladesh Atomic Energy Commission,
network is composed of three basic hardware elements: a which had been facing manpower shortages since the
transmission medium, often twisted pair, coaxial cable, or Independence of Bangladesh in 1971 [15].
fiber optics; a mechanism for control of transmission over
the medium; and an interface to the network for the host 6. Bangladesh Telecommunication Company Limited
computers or other devices-the nodes of the network-that BTCL or Bangladesh Telecommunication Company
are connected to the network. In addition, local area Limited is the largest telecommunications company
networks share with long-haul packet communication in Bangladesh. The company was founded as
networks a fourth basic element: a set of software protocols, the Bangladesh Telegraph & Telephone Board (BTTB)
Bangladesh's independence in 1971. On July 1, 2008 the
implemented in the host computers or other devices
BTTB became a public limited company and was renamed
connected to the networks, which control the transmission as BTCL [16].
of information from one host or device to another via the
hardware elements of the network. These software 7. Transmission Windows
protocols function at various levels, from low level packet Optical fiber transmission uses wavelengths that are in the
transport protocols to high-level application protocols, and near-infrared portion of the spectrum, just above the visible,
are an integral part of both local area networks and their and thus undetectable to the unaided eye. Typical optical
close relatives, long-haul packet communication networks. transmission wavelengths are 850 nm, 1310 nm, and 1550
This combined hardware-software approach to nm. Both lasers and LEDs are used to transmit light through
communication serves to distinguish networks, as discussed optical fiber. Lasers are usually used for 1310- or 1550-nm
in this paper, from other arrangements of data single-mode applications. LEDs are used for 850- or 1300-
communication hardware [12]. nm multimode applications [17].

4. Optical Fiber Table.1: Fiber Optic Wavelength


An optical fiber is a flexible, transparent fiber made Window Operating Wavelength
by drawing glass (silica) or plastic to a diameter slightly 800-900 nm 850 nm
thicker than that of a human hair . Optical fibers are used 1250-1350 nm 1310 nm
most often as a means to transmit light between the two 1500-1600 nm 1550 nm
ends of the fiber and find wide usage in fiber-optic
communications, where they permit transmission over 8. Methodology
longer distances and at higher bandwidths (data transfer Methodology is a system that how the process is gone. In
rates) than electrical cables. Fibers are used instead my research paper, I have practically shown The Local
of metal wires because signals travel along them with Area Network with secure system. The following Block
less loss; in addition, fibers are immune to electromagnetic diagram is showing in my research paper methodology:
interference, a problem from which metal wires
suffer. Fibers are also used for illumination and imaging,
and are often wrapped in bundles so they may be used to
carry light into, or images out of confined spaces, as in the
case of a fiberscope. Specially designed fibers are also used
for a variety of other applications, some of them being fiber
optic sensors and fiber lasers [13].

5. Atomic Energy Research Establishment (AERE)


President Sheikh Mujibur Rahman ordered the
establishment of an atomic research institute in 27 January
1973. Most of the research centers and educational
institutions of Pakistan Atomic Energy Commission were in
West Pakistan. After the Bangladesh Liberation war,
Bangladesh only possessed were Atomic Energy Centre in
Dhaka, Bangladesh Institute of Nuclear Agriculture and
Figure.1: Block Diagram of whole system Methodology.

2
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020

9. Optical Fiber and Local Area Network Design equipment installation and startup. Finally, I consider
documentation, maintenance and planning for restoration in
Next I consider actual component selection, placement, event of an outage.
installation practices, testing, troubleshooting and network

Figure.2: Local Area Network Design at AERE.

My existing local area network (LAN) consists of computer their margin was sufficient to meet our data throughput rate
network that interconnects computers situated in different requirements. I provide 10 Mbps internet bandwidth from
buildings at AERE using network media. Inside LAN, our BTCL for high speed broadband internet services. I select
employees are offered a computer network design applying Multi mode fiber (MF), four core cable for our network to
metallic structured cabling CAT6. This cabling enables data cover all ICT services, such as voice, video, data, wireless
transfer up to 100 Mbps. The network backbone is then access, security, surveillance and building automation.
customized using optical links. I perform dimensioning of
active elements, such as switches and routers, to ensure 10. Optical Fiber Route Planning & Deployment from

3
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020

BTCL to AERE and LAN Setup placement of the cable plant is determined by the physical
locations from ICS to CAD building along the route. The
In the next step, I start planning the route of optical fiber route distance is 500 meter and I deploy the cable in the
from ICS (Institute of Computer science) to CAD (Central underground. Furthermore, as always premises and outside
administration Department) to determine exactly where the plant installations are different so I consider them
cable plant and hardware will be located having decided to separately.
use fiber optics and chosen equipment appropriate for the
application. As every installation is unique, the actual

Figure.3: Optical fiber and Local Area Network Design & Deployment at AERE.
history dating back to internet’s beginnings and the current
Final planning for the deployment is a critical phase of any development in network security. In order to understand the
work as it involves coordinating activates of many people research being performed today, background knowledge of
the internet, its vulnerabilities, attack methods through the
[18]. I develop a checklist based on the design path for internet, and security technology is important and therefore
smooth installation. they are reviewed [19]. When developing a secure network,
the following need to be considered: 1. Access– Authorized
11 Network Security users are provided the means to communicate to and from a
particular network 2. Confidentiality– Information in the
11.1 Network Security Essential network remains private 3. Authentication – Ensure the
Network security has become more important to personal users of the network are who they say they are 4. Integrity –
computer users, organizations, and the military. With the Ensure the message has not been modified in transit 5. Non‐
advent of the internet, security became a major concern and repudiation – Ensure the user does not refute that he used
the history of security allows a better understanding of the the network [20].
emergence of security technology. The internet structure
itself allowed for many security threats to occur. The 11.2 Security Services
architecture of the internet, when modified can reduce the It is a processing or communication service that is provided
possible attacks that can be sent across the network. by a system to give a specific kind of production to system
Knowing the attack methods, allows for the appropriate resources. Security services implement security policies and
security to emerge. Many businesses secure themselves are implemented by security mechanisms. Security Services
from the internet by means of firewalls and encryption are Confidentiality, Authentication, Peer Entity
mechanisms. The businesses create an “intranet” to remain Authentication, Data Origin Authentication, Integrity,
connected to the internet but secured from possible threats. Connection Oriented Integrity [21].
The entire field of network security is vast and in an
evolutionary stage. The range of study encompasses a brief

4
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020

11.3 Basic Technologies of Computer Information technology is the key encryption


Network Security technology to achieve information security, help strengthen
The basic technologies of computer network security, through a particular encryption algorithm
securities are Firewall technology, Data encryption translated the important plaintext cipher text, so
technology, Intrusion detection technology, Anti-virus unauthorized users can not directly read the raw data, even
technology [22] if the data file is lost or stolen, as long as difficult to crack
the key, so it will not lead to the leakage of confidential
11.4 Types of Attacks information, which greatly ensure information security [24].
4 Types of Attacks 1) Interception: Watches 12.5 Close some not commonly used services
packets 2) Interruption: Steals or disturbs the data 3) and ports
Modification: Changes the data 4) Fabrication: Sends From the theory in terms of computer security,
another message apart from original but having the same computer systems were more port system is also more
sender name [23]. secure. For using the computer in the process, especially
when the operating system is installed in inadvertently will
not have to install some service functions and ports, it will
11.5 Security Protocols not only occupy a certain system information and also
a) Secure Socket Layer reduce the security of computer systems sex. In addition, in
It is used in secure exchange of order to understand the use of the user interface can be
information between web browser and web server. It gives installed port monitoring program. It can be determined by
2 security services. 1. Authentication 2. Confidentiality It examining those ports are not commonly used. In addition,
has five layers: once a virus into a computer system, the monitoring
program can automatically alarm, some of the function can
automatically shut down the port, effectively prevent hacker
Application Layer intrusion [24].
Secure Socket Layer 12.6 IP addresses are correct hidden PC
Transport Layer IP address of the hacker and virus attacks must
have a condition that is on the network and information
Internet Layer
attacks must have a real IP address to be a hacker to obtain
Data Link Layer the user's IP address mainly through the use of network
Physical Layer technology to detect host information view, some of the
traditional hackers and virus attacks, Flop overflow attacks
and so must obtain address as preconditions. Therefore, the
b) Transport Layer uses HMAC user should use a computer system when hiding your IP
SSL have 3 sub protocol. Handshake protocol– address, using a proxy server is the most common way to
Connection Establishment. Record protocol –Actual hide IP address, a hacker can only detect the proxy server
message protocol. Alert Protocol - If client/ server detects IP address, but cannot get the user's real IP address You
error other party discloses the connection and the secret key cannot find the real IP address will not be able to attack,
is deleted. effective maintenance of computer information and network
security [24].
12.7 Authentication technology
12 Computer Network Information Security Policy Authentication should include at least verification
12.1 Set up a firewall protocol and license agreement. A variety of network
Firewalls are an important means to applications and computer systems are needed to confirm
ensure network security, network management applications the legality through authentication, and then determine its
through the use of technology, packet filtering technology personal data and specific permissions. For authentication
and agent technology, effectively control network access system, the legitimate user's identity is easy to be someone
permissions, comprehensive data to external restrictions else pretending to be its most important technical indicators
and discrimination [24]. [24].
12.2 Access control 12.8 Timely installation of Vulnerability
Security policy and security model based Patch
on access control body set access permissions, such as to Vulnerability can be utilized during the attack
the identity of the user, password authentication, in order to weaknesses can be software, hardware, procedural
gain the true identity of the user, to facilitate tracing shortcomings, functional design or improper configuration.
network behavior [24]. University of Wisconsin Miller gives a research report on
12.3 Strengthening Intrusion Detection today's popular operating systems and applications, noting
Network intrusion detection is a real-time network that the software cannot be without flaws and loopholes
detection system can effectively compensate for the lack of [24].
firewalls and other protective means [24]. 12.9 File encryption and digital signature
12.4 Information encrypted technology
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020

File encryption and digital signature technology is firewalls have different types of rules and security policies.
to improve the security and confidentiality of information The authorized traffic will be sent based only on local
systems and data, one of the secrets to prevent external data policies. The firewall itself is protected, i.e.; it uses a trusted
theft, interception or destruction primary technologies. hardware and operating system [27].
Depending on the role, file encryption and digital signature
technology is mainly divided into data transmission, data 13. Configuration
storage, data integrity of the three kinds of discrimination
[24].

Send message of information

Hash function

The sender private key encryption

Internet

Abstract formed expressly MD

MD Comparison

Figure.4: Usually the digital signing process MD means


13.1 Configuring Router
Encryption key
I install the routers hardware properly before configuring
Data integrity identification technology is mainly involved
and commissioning. I install all hardware properly to avoid
in the transmission of information, access, processing of
damage. I Read all supplied manual properly before
data related to the identity and to verify the contents, to
installing router. I Take a PC/Laptop with terminal
confidentiality requirements, including general
emulator software (Hyper Terminal for windows mini com
identification passwords, keys, identity, data items of the
for Linux). The PC should have at least a standard
system by Comparative validation object input feature
communication port (Com-1) connect Router’s console to
value meets the preset parameters, to achieve data security
Pc’s communication port using console cable. I Turn on
[24].
Pc’s and router power switch. Terminal will display
router’s booting information. I have successfully booted
router and configure using setup facility the router is now
12.10 Security Services and Processes
configured properly with initial configuration and ready to
Security is fundamentally about protecting assets.
use.
Security is a path, not a destination. As we analyze our
infrastructure and applications, we identify potential threats
and understand that each threat presents a degree of risk.
13.2 Configure Server
Security is about risk management and implementing
effective countermeasures. Security services and processes
Proxy Server satisfies web browser’s query by sending
depends on: Authentication, Authorization, Auditing,
requested web page. Proxy does two main operations. First
Confidentiality, Integrity [25].
operation is to reduce internet bandwidth charges. And the
second option is to limit web access to authorized user/PC.
12.11 Security in Linux Networks
Users configure their web browser’s to use the proxy server
The Linux operating system is built with security
instead of going to the internet directly. When a user sends
features, as it provides the file access permission
any web request, proxy takes the request. Proxy is the only
mechanism, which prevents the unauthorized users in
service, which heavily uses CPU, memory and storage
gaining access to the files [26].
simultaneously. I Installing Operating System and then
configuration following:
12.12 Firewalls
A firewall is one of the most widely used solutions
for the Internet world. All traffic inside to outside and vice
versa, must pass through the firewall. Different types of
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020

13.3 Operating System The “up” at the end of the command activates the interface
Buying operating system (OS) in Bangladesh is after assigning the IP. But this procedure is not permanent.
really a big headache. There are very few commercial When I will reboot the system the IP setting will be lost. To
operating systems. All commercial operating systems make this IP permanent, I need to change the script file for
supports are not also available locally. So, I need to depend the particular interface. All files will be found in
on foreign support we choose OS Centos-6.5 which “/etc/sysconfig /network-scripts” directory. Now restart the
includes squid with its entire options precompiled. Server “network” service to take effect. I need to restart the
OS should have a large amount of hardware support. network service each time makes any type of change into
Compare with My operating systems hardware these files. [root@nsl root] # service network restart use “
compatibilities List (HCL), before choosing the OS. ifconfig” command to see the change. It will show the new
Installation Media; Install Linux operating system from any IP setting. [root@snmp root] # if config. Assigning IP
comfortable media like CD ROM, Hard disk including all address using “netconfig”, we can also do it automatically
network installation method. Installing OS; I have using some graphical utility. “netgonfig” is a beautiful
chosenCentos-6.5 Linux operating system. All other utility that we can use to edit those files automatically. It
versions installation is almost same. I cover Centos-6.5 will offer to fill up essential fields.
installation step by step.

# Disk Partition Setup. 14 Result


# Boot loader configures. My LAN networking at AERE smoothly installed.
# Firewall configure manual. As a result of this LAN network, Atomic Energy Research
# Set root Password. Establishment (AERE) is getting a high speed internet
# Package group selection automatically. service with Secure LAN System.
# Escape boot diskette creation.
# Video card configurations. 15 Future Work
# Configuring monitor. In Future, I will extend my Local Area
# Installation complete then reboot the system. Network by adding Access Point (AP) and Wi-Fi devices. I
will add more network devices to service the end user who
Network configuration is Linux; I configure Linux server to are working at Atomic Energy Research Establishment. I
enjoy networking features. Linux Networking Facility by will always update AERE LAN System to secure and
default Linux support network, when I will install a system, protect any kind of attacks.
Networking facility will be installed. Moreover, is a stalled
system without a NIC card Networking will be available
with to interface. IO helps to run all Network related
services when other NIC is not available we can
check/control network by “Network” service script nicely 16. Conclusion
(/etc/rc,d/init.d/network). Use the following command Today, optical fiber network is the smart network
connected to start/stop network Service. option for high-performance and it can provide cost-
effective hybrid network architectures as well [28].
Furthermore, optical fiber networks are more energy-
[root@ns1 root] # Service network stop. [root@ns1 root] # efficient and environmentally friendly [29]. In this work, I
Service network start. [root@ns1 root] # Service network primarily focus on the unique aspects of optical fiber cable
status. Determining IP address; now a day’s commonly all plant design and deployment and Local Area Network with
Pc’s come with a NIC, when Linux is installed this first Security system only. Our optical fiber network design and
device is called “eth0” second one is “eth1” and so on. I can its deployment and LAN Secure Systems has been
determine the IP address of these interfaces using “ifconfig”
[root@snmp root] # if config. completed. As a result of this optical fiber network and
Assigning IP address using “if config”. We can assign an IP Secure LAN System, Central Administration Division
address on “eth0” interface using the” if config” command. (CAD) of Atomic Energy Research Establishment (AERE)
This is the most common method. is getting a high speed internet service with Secure LAN
[root@snmp root] # if config eth0 10.0.0.100 net mask System.
255.255.255.0 up.

[1] B. Ratha, "Local Area Network," School of Library and Information 2018].
Science, Devi Ahilya University, Indore, [Online]. Available:
http://www.clib.dauniv.ac.in/E-Lecture/Local_Area_Network.pdf.
[3] T. F. O. Association, "Guide To Fiber Optic Network Design," FOA
[2] S. Nimkarde, "What computer networks are and how to actually Technical Bulletin, 2019. [Online]. Available:
understand them," What computer networks are and how to actually https://www.thefoa.org/tech/guides/DesG.pdf. [Accessed 12
understand them, 14 September 2018. [Online]. Available: December 2018].
https://www.freecodecamp.org/news/computer-networks-and-how-to-
actually-understand-them-c1401908172d/. [Accessed 14 September
International Journal of Modern Communication Technologies & Research (IJMCTR)
ISSN: 2321-0850, Volume-8, Issue-7, July- December 2020

[4] P. Wijuntunga, "LOCAL AREA NETWORKS (LANS) AND THEIR https://www.corning.com/catalog/coc/documents/brochures/LAN-737-


APPLICATION IN LIBRARIES," The Central Library University of EN.pdf. [Accessed 1 March 2019].
Colombo, Colombo 3, Sri Lanka, [Online]. Available:
http://web.simmons.edu. [19 A. O. Ajala Funmilola, "Review of Computer Network Security
] System," Network and Complex Systems, pp. 40-46, 2015.
[5] P. M. &. B. B. Baird, An Experiment in Computer Conferencing
Using a Local Area Network, Electronic Library, June 1987. [20 K. M. S. S. Priyank Sanghavi, "Network Security," International
] Journal of Scientific and Research Publications, vol. 3, no. 8, pp. 1-5,
[6] E. &. T. L. Flower, Setting Up a Public Use Local Area Network,
August 2013.
Wilson Library Bulletin, 63 (1): 45-47, September 88.
[21 P. V. P. M. A. V. Dr. B V Ramana Murthy, "Significances and Issues
[7] WIKIPEDIA, "Local area network," June 2007. [Online]. Available: ] of Network Security," International Journal of Advanced Research in
https://en.wikipedia.org/wiki/Local_area_network. Computer and Communication Engineering, vol. 3, no. 6, pp. 6922-
6929, June 2014.
[8] A. Broadband, "Importance Of Internet Technology For Easy Life,"
[22 J. Shan, "Analysis and research of computer network security,"
16 March 2020. [Online]. Available:
] Journal of Chemical and Pharmaceutical Research, vol. 6, no. 7, pp.
https://asianetbroadband.in/importance-of-internet-technology-for-
874-877, 2014.
easy-life. [Accessed 16 March 2020].
[23 C. Sridevi, "A Survey on Network Security," Global Journal of
[9] M. Bakardjieva, "The Internet in Everyday Life," 29 July 2009.
] Computer Science and Technology: ENetwork, Web & Security, vol.
[Online]. Available: https://people.ucalgary.ca. [Accessed 29 July
17, no. 5, 2017.
2009].
[24 J. L. Junyan Shi, "The Security and Protection Strategy Study of
[10 M. Bakardjieva, Internet Society: The Internet in Everyday Life,
] Computer Network Information," in 2nd International Conference on
] University of Calgary, Canada: SAGE Publications Ltd, May 31,
Electronics, Network and Computer Engineering (ICENCE 2016),
2012.
China, 2016.
[11 R. Singh, "10 Ways Internet Changed our Lives Positively – Here all
[25 W. H. Seifedine Kadry, "DESIGN AND IMPLEMENTATION OF
] we Explained," 7 July 2018. [Online]. Available:
] SYSTEM AND," Journal of Theoretical and Applied Information
https://www.pdevice.com. [Accessed 7 July 2018].
Technology, 2005 - 2008.
[12 K. T. P. D. p. W. DAVID D. CLARK, "An Introduction to Local Area
[26 D. G. Mukesh Kumar Mishra, "Security Analysis in Open Source
] Networks," THE IEEE, vol. 66, no. 11, 1978.
] Linux Network," International Journal of Engineering Research &
[13 Wikipedia, "Optical fiber," Wikipedia, [Online]. Available: Technology (IJERT), vol. 2, no. 8, 2013.
] https://en.wikipedia.org/wiki/Optical_fiber. [27 D. G. Mukesh Kumar Mishra, "Security Analysis in Open Source
] Linux Network," International Journal of Engineering Research &
[14 T. D. Star, "Forty one years of Bangladesh Atomic Energy Technology (IJERT), vol. 2, no. 8, 2013.
] Commission," 1 March 2014. [Online]. Available:
https://en.wikipedia.org/wiki/Atomic_Energy_Research_Establishmen [28 T. John Hoover, "Cabling Installation and maintenance," Tellabs, 3
t_(Bangladesh). [Accessed 17 December 2017]. ] February 2020. [Online]. Available:
https://www.cablinginstall.com/connectivity/article/14092858/tellabs-
[15 M. M. S. Haque, " "Atomic Energy Research Establishment"," 15 passive-optical-lans-smart-buildings-made-simple. [Accessed 3
] December 2017. [Online]. Available: en.banglapedia.org.. February 2020].
[16 T. N. Nation, ""BTTB, BSCCL turned into public limited company"," [29 J. M. H. E. Balagangadhar G. Bathula, "Green Networks: Energy
] 1 July 2008. [Online]. Available: https://en.wikipedia.org/wiki/BTCL. ] Efficient Design for Optical Networks," Green Networks: Energy
[Accessed 2010 February 2010]. Efficient Design for Optical Networks, 19 June 2009.
[17 N. Massa, Fiber Optic Telecommunication, University of Connecticut
] , 2000.

[18 C. O. C. LLC, "Understanding Fiber Optics & Local Area Networks,"


] Corning Optical Communications LLC , 1 March 2019. [Online].
Available:
Department of Computer Science and Engineering of
World University of Bangladesh (WUB) and M.Sc.in
Biography: Computer Science & Engineering from the Department of
Computer Science and Engineering of Jagannath University
(JnU) in Bangladesh. Currently he is working as an
Engineer (Assistant Engineer, Computer Science and
Engineering) at the institute of Computer Science in
Bangladesh Atomic Energy Commission. He is member of
Institution of Diploma Engineers, Bangladesh (IDEB) and
associate member The Institution of Engineers, Bangladesh
(IEB) and associate member Bangladesh Computer Society
(BCS). His research interests include Computer Hardware
and Networking, artificial intelligence and Robotics, Cyber
Security, E-Commerce etc.

Osman Goni was born at Chandpur, Bangladesh in 25th


September 1982. He has completed his Diploma-in-
Computer Engineering and obtained 3 rd place from
Bangladesh Technical Education Board (BTEB) and
B.Sc.in Computer Science & Engineering from the

8
View publication stats

You might also like