scholarly journals Design, Deployment and Implementation of Local Area Network (LAN) at BAEC Head Quarter

Author(s):  
Osman Goni

A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of interconnected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system.

2018 ◽  
Vol 1 (1) ◽  
Author(s):  
Hongyan Han

The 21st century is the information age, information has become an important strategic resource for social development, social information has become the development trend of the world today and the core, and information security in the information society will play a very important role. With the continuous development of computer networks, global information has become the trend of human development. However, because the computer network has the form of connection diversity, terminal distribution inhomogeneity and network openness, interconnection and other characteristics, resulting in the network vulnerable to hackers, malware and other malicious attacks, the former will cause unpredictable impact on the user , While the latter often causes the system to crash. Whether in the local area network or in the wide area network, there are natural and man-made and many other factors of vulnerability and potential threats. Therefore, the network security measures should be able to all aspects of a variety of threats and vulnerabilities, so as to ensure the confidentiality of network information, integrity and availability.  A t t h e beginning of this article, the beginning of this article, through the analysis of hacker behavior and typical attacks, summarizes the inevitable reasons for the existence of network security vulnerabilities, and summarizes the status of computer network security, as well as the specifi c concepts, classifi cation and limitations of vulnerability scanning technology. The focus of this paper is to improve the original system of the theme module, and the original system to add some features to make it more perfect function. Finally, the shortcomings of the system and some suggestions for further improvement and expansion are put forward.


2020 ◽  
Author(s):  
Sasqia Ismi Aulia ◽  

This study aims to design a LAN network for data backup systems that are in accordance with certain aspects such as the selection of network design, network hardware, network transmission media, network connection devices, and network operating systems. Data is the most important thing for everyone, data can usually be reused even though it has not been used for some time, and therefore data storage is a serious problem that must be considered. Data on the server computer is very important to be maintained so that a backup process is needed on that data to another computer that is used as a backup in the event of damage to the hardware and software of the server computer. FTP is one of the solutions to the problems faced above,where FTP can be used to process the download and upload between the server and client computers. This design uses the Autobot system. The expected benefit in designing this LAN is that the existing network at SMP Negeri 6 Pekanbaru is not only used by employees and employees but can be used and enjoyed by teachers and students to access the internet anywhere as long as it is still within the scope of the SMP Negeri 6 area Pekanbaru.


Author(s):  
Reymon M Santiañez ◽  
Benedict M Sollano

The goal of this study was to create the Local Area Network Based Archiving System, a cross-platform development system for electronic information storage, security, preservation, and retention. The system incorporates capabilities such as data storage for long-term preservation and retrieval, file searching and retrieval, security features such as user account information system and account access privilege levels, and an email-like messaging system. The researchers developed the Local Area Network Based Archiving System using the Agile Software Development Methodology to keep up with the stakeholders' ever-changing needs. After each iteration of the work cycle, this methodology employs a process of frequent feedback. Features are added or refined in each iteration to ensure that the study meets its goals and expectations. The developed system received an overall average weighted mean of 4.53 in the evaluation summary, which is considered excellent. The strongest point of the system, according to the respondents' responses, was its content, which received the highest average mean among the five major categories in the system evaluation. The system's mobile responsiveness was a huge plus, as it considerably aided accessibility. The system should also be deployed, according to the respondents, because it will provide a powerful answer to the ongoing challenges with storing, managing, securing, and retrieving electronic files. As a result, the researchers concluded that a Local Area Network Based Archiving System is required for the efficient operation of an electronic  file storage system. Having centralized electronic file storage and retrieval system not only saves time and money in the long run but also allows for disaster recovery and business continuity.


2013 ◽  
Vol 397-400 ◽  
pp. 2090-2093
Author(s):  
An Hong Tian ◽  
Cheng Biao Fu

Due to the problem of network structure, security, redundant path in traditional network, this can be solved by Virtual Local Area Network (VLAN) technology. As the network laboratory in colleges and universities is not perfect because of high cost, a virtual simulation tools named Packet Tracer has been introduced to computer network experimental curriculum, this paper put forwards the detail design scheme by the example of VLAN with three switches, and provides the experiment and theoretical analysis and simulation verification .The practice has proved this method not only deepens students comprehension of network, but also cultivates the students' actual comprehensive ability.


2019 ◽  
Vol 7 (01) ◽  
pp. 31
Author(s):  
Martanto Martanto

Data is a very important need for an Education institute, one of them is SMK Persatuan Ummat Islam. Because data is an important asset that must be protected and protected by its security. For this reason, a media is needed that can store data that are important and valuable assets so that they are guaranteed security and maintenance. Data processing is connected to the local area network (LAN) of SMK Persatuan Ummat Islam. Storage media with good and reliable performance will certainly greatly assist agencies for data storage in improving information access services at educational institutions. It is very important to secure data from the server so that it is necessary to backup the data by adding software or hardware as a backup server computer. To be guaranteed the data backup process periodically requires an application that can backup data automatically from the server or client. NAS4Free is a server with a Linux-based operating system that is very specialized to handle data storage centrally, so that it becomes one of the very good solutions to be implemented, because by using one media as a center of data storage can reduce the risk of data loss or data damage. And can restore (restore) data if the computer is damaged. So that the hope can facilitate the work of educators and education staff in improving services in educational institutions using data backup in ensuring the security and maintenance of data which are important and valuable assets


Author(s):  
Göran Pulkkis

In a wired local area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003). The fast development of wireless technologies implies that wireless communications will become ubiquitous in homes, offices, and enterprises. In order to conserve power and frequency spectrum, the wireless device computation overhead is most often reduced. The conventional security design thus uses smaller keys, weak message integrity protocols, and weak or one-way authentication protocols (Hardjono & Dondeti, 2005). WLAN security thus requires a more reliable protection of data communication between WLAN units and strong access management mechanisms.


2008 ◽  
pp. 1349-1360
Author(s):  
Göran Pulkkis ◽  
Kaj Grahn ◽  
Jonny Karlsson

In a wired local-area network (LAN), the network ports and cables are mostly contained inside a building. Therefore, a hacker must defeat physical security measures, such as security personnel, identity cards, and door locks, to be able to physically access the LAN. However, the penetration capability of electromagnetic waves exposes the data-transmission medium of a wireless LAN (WLAN) to potential intruders (Potter & Fleck, 2003).


1999 ◽  
Vol 9 ◽  
pp. 23-28 ◽  
Author(s):  
Chris Brown

Talking Drum is an interactive computer network music installation designed for the diffusion of cyclically repeating rhythms produced by four electronically synchronized instruments separated by distances up to 50 feet (16 m). The reverberant character of the performance space and the distance-related time-delays between stations combine with the speed and rhythms of the music to create a complex, multifocal mix that audiences explore by moving independently through the installation. The software uses Afro-Cuban musical concepts as a model for creating an interactive drum machine. It implements a simple genetic algorithm to mediate the interaction between pre-composed and improvised rhythms.


1992 ◽  
Vol 26 (5-6) ◽  
pp. 1375-1380
Author(s):  
M. Bongards ◽  
J. Braun ◽  
H. A. Feyen

So far only very large sewage treatment plants (STP) are equipped with real process computers. High investment costs and complicated handling prevented their application in medium-sized and smaller STPs. Meanwhile Personal Computers became so efficient and reliable that they can be used for automatic control of industrial processes. In this paper the successful enlargement of the central STP of Stolberg-Steinfurt for 120,000 inhabitant equivalents is described. In the central facility seven linked personal computers co-operate in a local area network (LAN) for monitoring and optimization of different processes. They are connected with seven programmable controllers in outstations on site. The data transfer between the central control room and the outstations takes place using RS 232 C interfaces. Because of the use of common office computers in combination with industrially proved controllers the operators very soon accepted the system. After one year of operating experience they assess the system as a valuable tool.


2012 ◽  
Vol 532-533 ◽  
pp. 1517-1521
Author(s):  
Jia Li ◽  
Li Gan ◽  
Fang Fang Du

As the daughter of modern wireless communication technology & computer network technology, Wireless Local Area Network(WLAN) is being used widely in many areas. It is well known that WLAN has the advantages such as simple network configuration, high transmission rate, good extensibility and mobility, and convenience to carry, etc. However, its security mechanism is not perfect to guarantee its security because of some design flaws in safety precautions. The application of AES in WLAN improves its data confidentiality. The work presented in this paper focuses on present AES encryption algorithm security problem and optimization of its S Box. The improved algorithm this paper put forward in WLAN, is proved to be efficient.


Sign in / Sign up

Export Citation Format

Share Document