SlideShare a Scribd company logo
1 of 14
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
DOI : 10.5121/ijcnc.2015.7107 99
ADHOC MOBILE WIRELESS NETWORK
ENHANCEMENT BASED ON CISCO DEVICES
Mohamed E. Khedr, Mohamed S. Zaghloul and Mohamed I. El-Desouky
Department of Electronics and Communications, Arab Academy for Science, Tech. and
Maritime Transport, Alexandria, Egypt, BOX 1029
ABSTRACT
Adhoc wireless networks become one of the most researchable areas in the studying of routing protocols
depending on the Open System Interconnection (OSI Model). This paper use Cisco devices as a reference
to enhance the performance of the network. This enhancement will be due to high processing, reliability,
average cost, power consumption and accessibility. The aim of this research not only to get the cost down,
it also to choose a time to time device to process the data as rapid as it can. Using NAT, Access List and
DHCP protocols defined in Cisco (Graphical Unit Interface) GUI of the (Command Line Interface) CLI,
the task can be made.
KEYWORDS
Adhoc, Wireless Networks, Cisco Access Points, Adhoc using Cisco devices.
1.INTRODUCTION
Cisco a leading networking company all over the world right now with the highest sales rates all
over the world becomes the first premiere networks company in our time.[1] So, in this paper we
will define, illustrate and configure some of routing protocols,(Domain Name Server) DNS,
(Dynamic Host Configuration Protocol)DHCP and Access List (ACL) and (Network Address
Translation) NAT that can be used during the communication ways with all data packets of
sending and receiving processes. The usage of Cisco real routers and switches will give us an
advance in high data processing. So, our goal can be targeted definitely is the “Time” of sending,
receiving and acknowledgment due to the TCP/IP protocol called by 3 ways hand shake. In
addition use to the encryption and the last step using (Wi-Fi Protected Access) WPA/WPA2
technologies. [2]
2.ILLUSTRATING THE PROBLEM
Our main goal is not to make the adhoc terminal only under the coverage area and always
connected, but also with a very good communication timing during sending and receiving. Our
main problem that there are no coordinators in the schema. this is not a huge problem but can be
define it as advantage, that’s why all intermediate devices will be coordinators for the other end
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
100
devices and replication of the routing tables will be the major aid due to the geographical case of
adhoc terminals movements, though its remains a problem due to adhoc well defined protocol.
High security is the second main goal, but as known wireless networking security is weak a bit,
so this research will consider it step by step.
3.USED NETWORK’S DEVICES
Networks devices are needed in this paper to be selected due to certain specifications for
outdoors, indoors and controllers.
1.Indoors (end points): Aironet 3700 Series (Power over Ethernet) (POE)
Fig.1. Aironet 3700 series
2.Outdoors (Coordinators):Aironet 1532E Series (Power over Ethernet) (POE)
Fig2. Aironet 1532E
3.Controllers (Routers): Catalyst 2800 series with 2 smart serial module, (2.4 and 5.0 GHz)
wireless module and Sim card module
Fig.3. Cisco 2800 Series Catalyst Router
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
101
4.Fast Ethernet and smart serial cables to connect controllers with outdoors
4.ESTIMATED SCHEMA TO DEAL WITH
To illustrate the whole case issue, a simulation software is used called “Cisco packet Tracer
V6.0.1”
Fig4. Whole Schema using simulation Packet Tracer
This whole schema shows how this paper will operate over 3 layers
1- Core Layer (Controllers)
2- Outdoor Coordinator
3- End points
And now it’s the time to prepare the devices for configuration but there are some protocols and
options that can be defined and considered.
5.NETWORK ADDRESS TRANSLATION (NAT):
To go to the Internet a public IP address must be available and it is unique all over the world. If
each host in the world required a unique public IP address, IPs will be run over a few years. But
by using Network Address Translation (NAT) huge number of IPs van be saved. So, NAT can be
defined: “NAT allows a host that does not have a valid registered IP address to communicate with
other hosts through the Internet”. For example a computer is assigned by private IP address of
10.0.0.9 and of course this address cannot be routed on the internet but you can still access the
internet. This is because your router (or modem) translates this address into a public IP address,
123.12.23.1.For example, before routing your data into the internet [3].
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
102
Fig5. NAT Illustration
Of course when a router receives a reply packet destined for 123.12.23.1 it will convert back to
the private IP 10.0.0.9 before sending that packet to source.
Suppose an organization has 500 end points but the Internet Service Provider (ISP) only gives 50
public IP addresses. It means that the organization can only allow 50 hosts to access the internet
at the same time. Here NAT comes to save this case!
One thing that should be noticed in real life, not all of end devices uses internet at the same time.
Using NAT can dynamically assign these 50 public IP addresses to those who really need them at
that time. This is called dynamic NAT.
But the above NAT solution does not solve the problem completely because in some days there
can be more than 50 end points using the network. In this case, only the first 50 people can access
internet, others must wait to their turns.
Another problem is, in fact, ISP only gives much lesser IP addresses than the number 50 because
each public IP is very precious now. To solve the two problems above, another feature of NAT
can be used: NAT Overload or sometimes called Port Address Translation(PAT) PAT permits
multiple devices on a local area network (LAN) to be mapped to a single public IP address with
different port numbers. Therefore, it’s also known as port address translation (PAT). When using
PAT, the router maintains unique source port numbers on the inside global IP address to
distinguish between translations. In the below example, each host is assigned to the same public
which is IP address 123.1.1.1 1 but with different port numbers (from 1000 to 1002).
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
103
Fig6. PAT Example
Table1: PAT Table
Inside Local Inside global
10.0.0.1 123.1.1.1:1000
10.0.0.2 123.1.1.1:1001
10.0.0.3 123.1.1.1:1003
Cisco uses the term inside local for the private IP addresses and inside global for the public IP
addresses replaced by the router. The outside host IP address can also be changed with NAT. The
outside global address represents the outside host with a public IP address that can be used for
routing in the public Internet. NAT will be used while configuring the devices
6.ACCESS LIST CONTROL
Access control lists (ACLs) is equivalent to packets filtering by allowing the coordinator or the
admin to permit or deny IP packets from specific end point of interface. To use ACLs, the system
administrator must first configure ACLs and then apply them to specific interfaces. There are 3
popular types of ACL: Standard, Extended and Named ACLs [4].
And will be used to configure the devices.
7.IEEE 802.11 STANDARDS
At the time, there are 3 foundations effect on wireless LAN standards all over the world [5] and
listed as bellow:
- ITU-R: is responsible for allocation of the RF bands
- IEEE: specifies how RF is modulated to transfer data
- Wi-Fi Alliance: improves the interoperability of wireless products among vendors but the most
popular type of wireless LAN today is based on the IEEE 802.11 standard, which is known
informally as Wi-Fi. Access points can support several or all of the three most popular IEEE
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
104
WLAN standards including 802.11a, 802.11b and 802.11g. WLAN has two basic modes of
operation: Ad-hoc mode In this mode devices send data directly to each other and the
Infrastructure mode and used to Connect to a wired LAN, supports two modes (service sets):
Basic Service Set (BSS): uses only a single AP to create a WLAN and Extended Service Set
(ESS): uses more than one AP to create a WLAN, allows roaming in a larger area than a single
AP. [6]
8.ORTHOGONAL DIVISION MULTIPLEXING (OFDM)
The purpose is to encode a single transmission into multiple subcarriers to save bandwidth.
OFDM selects channels that overlap but do not interfere with each other by selecting the
frequencies of the subcarriers so that at each subcarrier frequency, all other subcarriers do not
contribute to overall waveform. In the picture below, notice that only the peaks of each subcarrier
carry data. [7] At the peak of each of the subcarriers, the other two subcarriers have zero
amplitude.
Fig7. OFDM Sub-carriers
9.DIRECT SEQUENCE SPREAD SPECTRUM (DSSS)
This method transmits the signal over a wider frequency band than required by multiplying the
original user data with a pseudo random spreading code. The result is a wide-band signal which is
very “durable” to noise. Even some bits in this signal are damaged during transmission; some
statistical techniques can recover the original data without the need for retransmission. [8]
Note: Spread spectrum here means the bandwidth used to transfer data is much wider than the
bandwidth needs to transfer that data. Traditional communication systems use narrowband
signal to transfer data because the required bandwidth is minimum but the signal must have
high power to cope with noise.[9] Spread Spectrum does the opposite way when transmitting
the signal with much lower power level (can transmit below the noise level) but with much
wider bandwidth. Even if the noise affects some parts of the signal, the receiver can easily
recover the original data with some algorithms.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
105
Fig8. DSSS wave form [10]
The 2.4 GHz band has a bandwidth of 82 MHz, with a range from 2.402 GHz to 2.483 GHz. In
the USA, this band has 11 different overlapping DSSS channels while in some other countries it
can have up to 14 channels. Channels 1, 6 and 11 have least interference with each other so they
are preferred over other channels.
Fig.9. DSSS Channel Overlapping for Wi-Fi [11]
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
106
10.DEVICES CONFIGURATIONS
Table 2 devices and interfaces IPs
Device/interface IP Address+
Subnet mask
Adhoc 1 15.15.15.15
255.0.0.0
Adhoc 2 15.15.15.16
255.0.0.0
Adhoc 3 15.15.15.17
255.0.0.0
Adhoc 4 15.15.15.18
255.0.0.0
Cont1:fa0/0 10.0.0.1
255.0.0.0
Cont:s0/3/0 12.0.0.1
255.0.0.0
Cont2:fa0/0 13.0.0.1
255.0.0.0
Cont2:s0/1/0 12.0.0.2
255.0.0.0
For Controller 1:
As shown in Appendix A
For Controller 2:
As shown in Appendix B
Coordinator (intermediate access point) Configuration
SSID (System Set Identifier): Coordinator
Key: adhocproject
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
107
Fig.10. SSID and Pass Key
Connection Type: PPPOE (point to point over Ethernet)
Fig.11. PPPOE Connection Type
Wireless Security
SSID (System Set Identifier): Coordinator
Key: adhocproject
Fig.12. SSID and Pass Key after Connection
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
108
Access List Control (ACL)
Fig.13. ACL Configuration
End Point Configuration
1st
End Point IP Address 192.168.1.2
Subnet mask 255.255.255.0
Fig.13. 1st
Adhoc Endpoint
2nd
End Point IP Address 192.168.1.103
Subnet mast 255.255.255.0
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
109
Fig.14. 2nd
Adhoc End Point
3rd End Point IP Address 192.168.1.102
Subnet mast 255.255.255.0
Fig.15. 3rd
Adhoc End Point
4th
End Point IP Address 192.168.1.102
Subnet mast 255.255.255.0
Fig.16. 4th
Adhoc End Point
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
110
CONCLUSIONS
Adhoc wireless network can be especially applied in enterprise business compounds or military
campuses. The desired design was limited into 3 stages (Core Layer, Intermediate Layer and the
Endpoint Layer), in every layer a commands were placed to let the device work probably and use
the right routing protocol (Static routing is used in this paper). So, the 3 layers can communicate
with each other. In the other hand, the adhoc mobile end points don’t need to route the sent
message to the core layer, its waste of time by 66 msec. In our case it just sends the message to
the coordinator and it has the lead to distribute the message to the destination end point.
References
[1] http://www.cisco.com/c/en/us/products/wireless/buyers-guide.html
[2] Sharam Hekmat, Communication Networks, 2011
[3] Robert Faludi, A Practical Guide to networking protocols, Building wireless networks, 2013
[4] Patric egilopacovic, Wireless networking, building AdHoc networks.802.11 a/b/g/n techniques, April
2011.
[5] Yi-Bing Lin & Imrich Chlamtac, Wireless and Mobile network architectures, 2012
[6] Andrew S. Tanenbaum, Computer Networks, Sixth Edition, 2013
[7] Simon Haykin, Communication Systems, fifth edition, 2014
[8] J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach Featuring the Internet,
2014
[9] Andrew S.Tanenbaum, Computer Network, 2012
[10] J. Walrand & P. Varaiya, High-Performance Communication Networks, 2014
[11] Wendell Odom,Cisco CCNA Exam# 200-120 Certification Guide, Cisco Systems, 2014
Appendix A
Controller (Routers) Configuration
For Controller 1:
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname Controller 1
Controller1(config)#interface fastEthernet 0/0
Controller1(config-if)#ip address 10.0.0.1 255.0.0.0
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller1(config-if)#ip address 11.0.0.1 255.0.0.0
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller1(config)#interface serial 0/3/0
Controller1(config-if)#ip address 12.0.0.1 255.0.0.0
Controller1(config-if)#clock rate 64000
Controller1(config-if)#no shutdown
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
111
Controller1(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller1(config)#line console 0
Controller1(config-line)#password adhoc1admin
Controller1(config-line)#login
Controller1(config)#line vty 0 4
Controller1(config-line)#password adhoc1admin
Controller1(config-line)#login
Controller1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2
Appendix B
For Controller 2:
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname Controller2
Controller2(config)#interface fastEthernet 0/0
Controller2(config-if)#ip address 13.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller2(config)#interface fastEthernet 0/1
Controller2(config-if)#ip address 14.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller2(config)#interface serial 0/1/0
Controller2(config-if)#ip address 12.0.0.2 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller2(config)#line console 0
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#line vty 0 4
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
112
Authors
Mohamed Khedr obtained his B.Sc. degree from the Arab Academy for Science and
Technology, Alexandria, Egypt in 1997, the M.S. degree from same university in 2000, and
the Ph.D. degree from Ottawa University, Ottawa, Canada in 2004, all in Electrical
Engineering.From 1997 to 2000, He was a Graduate Teaching and research assistant at
AAST, Alexandria, Egypt.From 2000 to 2004 He was a Graduate Teaching and research assistant at
Ottawa University, Ottawa, Canada.From 2005 to 2009, he was an assistant Professor at AAST,
Department of Electronic and communications Engineering, Alexandria, Egypt.Since January 2009, He has
been an Associate professor at AAST, Department of Electronic and communications Engineering,
Alexandria, Egypt.Since Fall 2005, has been an Adjunct Professor at Virginia Tech, USA
Mohamed S. Zaghloul was born in 1954 in Alex, Egypt, graduate as electrical
engineer in 1977 has his master from Alexandria University in 1990 has his PhD in
Surface Acoustic wave in 2002 he works as doctor at Arab academy for science and
Technology in electronic and communication department
Mohamed I. El-Desouky was born in 1989 in Alex, Egypt, graduate as electrical,
Electronics and Communications engineer from The Arab Academy for Science,
Technology and Maritime Transport in 2010, has started preparation his master from the
same institute of graduation in 2011.

More Related Content

What's hot

Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LANRaj vardhan
 
Ecet375 1 a - basic networking concepts
Ecet375   1 a - basic networking conceptsEcet375   1 a - basic networking concepts
Ecet375 1 a - basic networking conceptsRalph Ambuehl
 
Networking Basics
Networking BasicsNetworking Basics
Networking BasicsCarlo Fonda
 
Presentation on basic networking
Presentation on basic networkingPresentation on basic networking
Presentation on basic networkingqshamim07
 
Networking
NetworkingNetworking
NetworkingRashmi
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Sarmad Ali
 
A presentation on networking and ccna
A presentation on networking and ccnaA presentation on networking and ccna
A presentation on networking and ccnavivek kumar
 

What's hot (20)

Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
Ecet375 1 a - basic networking concepts
Ecet375   1 a - basic networking conceptsEcet375   1 a - basic networking concepts
Ecet375 1 a - basic networking concepts
 
CCNA
CCNACCNA
CCNA
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Presentation on basic networking
Presentation on basic networkingPresentation on basic networking
Presentation on basic networking
 
Networking
NetworkingNetworking
Networking
 
Ccna report
Ccna reportCcna report
Ccna report
 
Fragmentation
FragmentationFragmentation
Fragmentation
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
Ccna training report
Ccna training reportCcna training report
Ccna training report
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 
Ccna 1 4
Ccna 1  4Ccna 1  4
Ccna 1 4
 
Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers Network Engineer Interview Questions with Answers
Network Engineer Interview Questions with Answers
 
Class-note-data communications-01
Class-note-data communications-01Class-note-data communications-01
Class-note-data communications-01
 
Ccnafile
CcnafileCcnafile
Ccnafile
 
A presentation on networking and ccna
A presentation on networking and ccnaA presentation on networking and ccna
A presentation on networking and ccna
 
Networking tools
Networking toolsNetworking tools
Networking tools
 

Viewers also liked

THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...IJCNCJournal
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distanceIJCNCJournal
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocolIJCNCJournal
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet aIJCNCJournal
 
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...IJCNCJournal
 
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...IJCNCJournal
 
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...IJCNCJournal
 
Energy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousEnergy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousIJCNCJournal
 
Regressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsRegressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsIJCNCJournal
 
Evaluation of scalability and bandwidth
Evaluation of scalability and bandwidthEvaluation of scalability and bandwidth
Evaluation of scalability and bandwidthIJCNCJournal
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...IJCNCJournal
 
Managing, searching, and accessing iot devices
Managing, searching, and accessing iot devicesManaging, searching, and accessing iot devices
Managing, searching, and accessing iot devicesIJCNCJournal
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
 
Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...IJCNCJournal
 
A novel algorithm for tcp timeout
A novel algorithm for tcp timeoutA novel algorithm for tcp timeout
A novel algorithm for tcp timeoutIJCNCJournal
 
Infrastructure of services for a smart city
Infrastructure of services for a smart cityInfrastructure of services for a smart city
Infrastructure of services for a smart cityIJCNCJournal
 
Priority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsPriority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsIJCNCJournal
 

Viewers also liked (19)

THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
 
Evaluation of a topological distance
Evaluation of a topological distanceEvaluation of a topological distance
Evaluation of a topological distance
 
Multipath qos aware routing protocol
Multipath qos aware routing protocolMultipath qos aware routing protocol
Multipath qos aware routing protocol
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet a
 
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...A method of evaluating effect of qo s degradation on multidimensional qoe of ...
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
 
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
 
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
 
Energy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneousEnergy efficient clustering in heterogeneous
Energy efficient clustering in heterogeneous
 
Regressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurementsRegressive admission control enabled by real time qos measurements
Regressive admission control enabled by real time qos measurements
 
Evaluation of scalability and bandwidth
Evaluation of scalability and bandwidthEvaluation of scalability and bandwidth
Evaluation of scalability and bandwidth
 
A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...A novel secure e contents system for multi-media interchange workflows in e-l...
A novel secure e contents system for multi-media interchange workflows in e-l...
 
Managing, searching, and accessing iot devices
Managing, searching, and accessing iot devicesManaging, searching, and accessing iot devices
Managing, searching, and accessing iot devices
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
 
Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...Distributed firewalls and ids interoperability checking based on a formal app...
Distributed firewalls and ids interoperability checking based on a formal app...
 
A novel algorithm for tcp timeout
A novel algorithm for tcp timeoutA novel algorithm for tcp timeout
A novel algorithm for tcp timeout
 
Infrastructure of services for a smart city
Infrastructure of services for a smart cityInfrastructure of services for a smart city
Infrastructure of services for a smart city
 
Priority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsnsPriority scheduling for multipath video transmission in wmsns
Priority scheduling for multipath video transmission in wmsns
 

Similar to Adhoc mobile wireless network enhancement based on cisco devices

Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...ijmnct
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Networking Related
Networking RelatedNetworking Related
Networking RelatedZunAib Ali
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxzeyadosama505
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networkingMohsen Sarakbi
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
Computer Networking 2
Computer Networking 2Computer Networking 2
Computer Networking 2kiamiel
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 

Similar to Adhoc mobile wireless network enhancement based on cisco devices (20)

Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Ccna1 presentation
Ccna1 presentationCcna1 presentation
Ccna1 presentation
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Networking Related
Networking RelatedNetworking Related
Networking Related
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptxpppppppppppppppppjjjjjjjjjjjpppppppp.pptx
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Introduction to networking
Introduction to networkingIntroduction to networking
Introduction to networking
 
Siemens Industrial Training
Siemens Industrial TrainingSiemens Industrial Training
Siemens Industrial Training
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
Chapter1ccna
Chapter1ccnaChapter1ccna
Chapter1ccna
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
Computer Networking 2
Computer Networking 2Computer Networking 2
Computer Networking 2
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 

More from IJCNCJournal

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 

More from IJCNCJournal (20)

Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Adhoc mobile wireless network enhancement based on cisco devices

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 DOI : 10.5121/ijcnc.2015.7107 99 ADHOC MOBILE WIRELESS NETWORK ENHANCEMENT BASED ON CISCO DEVICES Mohamed E. Khedr, Mohamed S. Zaghloul and Mohamed I. El-Desouky Department of Electronics and Communications, Arab Academy for Science, Tech. and Maritime Transport, Alexandria, Egypt, BOX 1029 ABSTRACT Adhoc wireless networks become one of the most researchable areas in the studying of routing protocols depending on the Open System Interconnection (OSI Model). This paper use Cisco devices as a reference to enhance the performance of the network. This enhancement will be due to high processing, reliability, average cost, power consumption and accessibility. The aim of this research not only to get the cost down, it also to choose a time to time device to process the data as rapid as it can. Using NAT, Access List and DHCP protocols defined in Cisco (Graphical Unit Interface) GUI of the (Command Line Interface) CLI, the task can be made. KEYWORDS Adhoc, Wireless Networks, Cisco Access Points, Adhoc using Cisco devices. 1.INTRODUCTION Cisco a leading networking company all over the world right now with the highest sales rates all over the world becomes the first premiere networks company in our time.[1] So, in this paper we will define, illustrate and configure some of routing protocols,(Domain Name Server) DNS, (Dynamic Host Configuration Protocol)DHCP and Access List (ACL) and (Network Address Translation) NAT that can be used during the communication ways with all data packets of sending and receiving processes. The usage of Cisco real routers and switches will give us an advance in high data processing. So, our goal can be targeted definitely is the “Time” of sending, receiving and acknowledgment due to the TCP/IP protocol called by 3 ways hand shake. In addition use to the encryption and the last step using (Wi-Fi Protected Access) WPA/WPA2 technologies. [2] 2.ILLUSTRATING THE PROBLEM Our main goal is not to make the adhoc terminal only under the coverage area and always connected, but also with a very good communication timing during sending and receiving. Our main problem that there are no coordinators in the schema. this is not a huge problem but can be define it as advantage, that’s why all intermediate devices will be coordinators for the other end
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 100 devices and replication of the routing tables will be the major aid due to the geographical case of adhoc terminals movements, though its remains a problem due to adhoc well defined protocol. High security is the second main goal, but as known wireless networking security is weak a bit, so this research will consider it step by step. 3.USED NETWORK’S DEVICES Networks devices are needed in this paper to be selected due to certain specifications for outdoors, indoors and controllers. 1.Indoors (end points): Aironet 3700 Series (Power over Ethernet) (POE) Fig.1. Aironet 3700 series 2.Outdoors (Coordinators):Aironet 1532E Series (Power over Ethernet) (POE) Fig2. Aironet 1532E 3.Controllers (Routers): Catalyst 2800 series with 2 smart serial module, (2.4 and 5.0 GHz) wireless module and Sim card module Fig.3. Cisco 2800 Series Catalyst Router
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 101 4.Fast Ethernet and smart serial cables to connect controllers with outdoors 4.ESTIMATED SCHEMA TO DEAL WITH To illustrate the whole case issue, a simulation software is used called “Cisco packet Tracer V6.0.1” Fig4. Whole Schema using simulation Packet Tracer This whole schema shows how this paper will operate over 3 layers 1- Core Layer (Controllers) 2- Outdoor Coordinator 3- End points And now it’s the time to prepare the devices for configuration but there are some protocols and options that can be defined and considered. 5.NETWORK ADDRESS TRANSLATION (NAT): To go to the Internet a public IP address must be available and it is unique all over the world. If each host in the world required a unique public IP address, IPs will be run over a few years. But by using Network Address Translation (NAT) huge number of IPs van be saved. So, NAT can be defined: “NAT allows a host that does not have a valid registered IP address to communicate with other hosts through the Internet”. For example a computer is assigned by private IP address of 10.0.0.9 and of course this address cannot be routed on the internet but you can still access the internet. This is because your router (or modem) translates this address into a public IP address, 123.12.23.1.For example, before routing your data into the internet [3].
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 102 Fig5. NAT Illustration Of course when a router receives a reply packet destined for 123.12.23.1 it will convert back to the private IP 10.0.0.9 before sending that packet to source. Suppose an organization has 500 end points but the Internet Service Provider (ISP) only gives 50 public IP addresses. It means that the organization can only allow 50 hosts to access the internet at the same time. Here NAT comes to save this case! One thing that should be noticed in real life, not all of end devices uses internet at the same time. Using NAT can dynamically assign these 50 public IP addresses to those who really need them at that time. This is called dynamic NAT. But the above NAT solution does not solve the problem completely because in some days there can be more than 50 end points using the network. In this case, only the first 50 people can access internet, others must wait to their turns. Another problem is, in fact, ISP only gives much lesser IP addresses than the number 50 because each public IP is very precious now. To solve the two problems above, another feature of NAT can be used: NAT Overload or sometimes called Port Address Translation(PAT) PAT permits multiple devices on a local area network (LAN) to be mapped to a single public IP address with different port numbers. Therefore, it’s also known as port address translation (PAT). When using PAT, the router maintains unique source port numbers on the inside global IP address to distinguish between translations. In the below example, each host is assigned to the same public which is IP address 123.1.1.1 1 but with different port numbers (from 1000 to 1002).
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 103 Fig6. PAT Example Table1: PAT Table Inside Local Inside global 10.0.0.1 123.1.1.1:1000 10.0.0.2 123.1.1.1:1001 10.0.0.3 123.1.1.1:1003 Cisco uses the term inside local for the private IP addresses and inside global for the public IP addresses replaced by the router. The outside host IP address can also be changed with NAT. The outside global address represents the outside host with a public IP address that can be used for routing in the public Internet. NAT will be used while configuring the devices 6.ACCESS LIST CONTROL Access control lists (ACLs) is equivalent to packets filtering by allowing the coordinator or the admin to permit or deny IP packets from specific end point of interface. To use ACLs, the system administrator must first configure ACLs and then apply them to specific interfaces. There are 3 popular types of ACL: Standard, Extended and Named ACLs [4]. And will be used to configure the devices. 7.IEEE 802.11 STANDARDS At the time, there are 3 foundations effect on wireless LAN standards all over the world [5] and listed as bellow: - ITU-R: is responsible for allocation of the RF bands - IEEE: specifies how RF is modulated to transfer data - Wi-Fi Alliance: improves the interoperability of wireless products among vendors but the most popular type of wireless LAN today is based on the IEEE 802.11 standard, which is known informally as Wi-Fi. Access points can support several or all of the three most popular IEEE
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 104 WLAN standards including 802.11a, 802.11b and 802.11g. WLAN has two basic modes of operation: Ad-hoc mode In this mode devices send data directly to each other and the Infrastructure mode and used to Connect to a wired LAN, supports two modes (service sets): Basic Service Set (BSS): uses only a single AP to create a WLAN and Extended Service Set (ESS): uses more than one AP to create a WLAN, allows roaming in a larger area than a single AP. [6] 8.ORTHOGONAL DIVISION MULTIPLEXING (OFDM) The purpose is to encode a single transmission into multiple subcarriers to save bandwidth. OFDM selects channels that overlap but do not interfere with each other by selecting the frequencies of the subcarriers so that at each subcarrier frequency, all other subcarriers do not contribute to overall waveform. In the picture below, notice that only the peaks of each subcarrier carry data. [7] At the peak of each of the subcarriers, the other two subcarriers have zero amplitude. Fig7. OFDM Sub-carriers 9.DIRECT SEQUENCE SPREAD SPECTRUM (DSSS) This method transmits the signal over a wider frequency band than required by multiplying the original user data with a pseudo random spreading code. The result is a wide-band signal which is very “durable” to noise. Even some bits in this signal are damaged during transmission; some statistical techniques can recover the original data without the need for retransmission. [8] Note: Spread spectrum here means the bandwidth used to transfer data is much wider than the bandwidth needs to transfer that data. Traditional communication systems use narrowband signal to transfer data because the required bandwidth is minimum but the signal must have high power to cope with noise.[9] Spread Spectrum does the opposite way when transmitting the signal with much lower power level (can transmit below the noise level) but with much wider bandwidth. Even if the noise affects some parts of the signal, the receiver can easily recover the original data with some algorithms.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 105 Fig8. DSSS wave form [10] The 2.4 GHz band has a bandwidth of 82 MHz, with a range from 2.402 GHz to 2.483 GHz. In the USA, this band has 11 different overlapping DSSS channels while in some other countries it can have up to 14 channels. Channels 1, 6 and 11 have least interference with each other so they are preferred over other channels. Fig.9. DSSS Channel Overlapping for Wi-Fi [11]
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 106 10.DEVICES CONFIGURATIONS Table 2 devices and interfaces IPs Device/interface IP Address+ Subnet mask Adhoc 1 15.15.15.15 255.0.0.0 Adhoc 2 15.15.15.16 255.0.0.0 Adhoc 3 15.15.15.17 255.0.0.0 Adhoc 4 15.15.15.18 255.0.0.0 Cont1:fa0/0 10.0.0.1 255.0.0.0 Cont:s0/3/0 12.0.0.1 255.0.0.0 Cont2:fa0/0 13.0.0.1 255.0.0.0 Cont2:s0/1/0 12.0.0.2 255.0.0.0 For Controller 1: As shown in Appendix A For Controller 2: As shown in Appendix B Coordinator (intermediate access point) Configuration SSID (System Set Identifier): Coordinator Key: adhocproject
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 107 Fig.10. SSID and Pass Key Connection Type: PPPOE (point to point over Ethernet) Fig.11. PPPOE Connection Type Wireless Security SSID (System Set Identifier): Coordinator Key: adhocproject Fig.12. SSID and Pass Key after Connection
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 108 Access List Control (ACL) Fig.13. ACL Configuration End Point Configuration 1st End Point IP Address 192.168.1.2 Subnet mask 255.255.255.0 Fig.13. 1st Adhoc Endpoint 2nd End Point IP Address 192.168.1.103 Subnet mast 255.255.255.0
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 109 Fig.14. 2nd Adhoc End Point 3rd End Point IP Address 192.168.1.102 Subnet mast 255.255.255.0 Fig.15. 3rd Adhoc End Point 4th End Point IP Address 192.168.1.102 Subnet mast 255.255.255.0 Fig.16. 4th Adhoc End Point
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 110 CONCLUSIONS Adhoc wireless network can be especially applied in enterprise business compounds or military campuses. The desired design was limited into 3 stages (Core Layer, Intermediate Layer and the Endpoint Layer), in every layer a commands were placed to let the device work probably and use the right routing protocol (Static routing is used in this paper). So, the 3 layers can communicate with each other. In the other hand, the adhoc mobile end points don’t need to route the sent message to the core layer, its waste of time by 66 msec. In our case it just sends the message to the coordinator and it has the lead to distribute the message to the destination end point. References [1] http://www.cisco.com/c/en/us/products/wireless/buyers-guide.html [2] Sharam Hekmat, Communication Networks, 2011 [3] Robert Faludi, A Practical Guide to networking protocols, Building wireless networks, 2013 [4] Patric egilopacovic, Wireless networking, building AdHoc networks.802.11 a/b/g/n techniques, April 2011. [5] Yi-Bing Lin & Imrich Chlamtac, Wireless and Mobile network architectures, 2012 [6] Andrew S. Tanenbaum, Computer Networks, Sixth Edition, 2013 [7] Simon Haykin, Communication Systems, fifth edition, 2014 [8] J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, 2014 [9] Andrew S.Tanenbaum, Computer Network, 2012 [10] J. Walrand & P. Varaiya, High-Performance Communication Networks, 2014 [11] Wendell Odom,Cisco CCNA Exam# 200-120 Certification Guide, Cisco Systems, 2014 Appendix A Controller (Routers) Configuration For Controller 1: Router>en Router#config t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname Controller 1 Controller1(config)#interface fastEthernet 0/0 Controller1(config-if)#ip address 10.0.0.1 255.0.0.0 Controller1(config-if)#no shutdown Controller1(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up Controller1(config-if)#ip address 11.0.0.1 255.0.0.0 Controller1(config-if)#no shutdown Controller1(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up Controller1(config)#interface serial 0/3/0 Controller1(config-if)#ip address 12.0.0.1 255.0.0.0 Controller1(config-if)#clock rate 64000 Controller1(config-if)#no shutdown
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 111 Controller1(config-if)# %LINK-5-CHANGED: Interface Serial0/3/0, changed state to up Controller1(config)#line console 0 Controller1(config-line)#password adhoc1admin Controller1(config-line)#login Controller1(config)#line vty 0 4 Controller1(config-line)#password adhoc1admin Controller1(config-line)#login Controller1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2 Appendix B For Controller 2: Router>en Router#config t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname Controller2 Controller2(config)#interface fastEthernet 0/0 Controller2(config-if)#ip address 13.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up Controller2(config)#interface fastEthernet 0/1 Controller2(config-if)#ip address 14.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up Controller2(config)#interface serial 0/1/0 Controller2(config-if)#ip address 12.0.0.2 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface Serial0/3/0, changed state to up Controller2(config)#line console 0 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#line vty 0 4 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 112 Authors Mohamed Khedr obtained his B.Sc. degree from the Arab Academy for Science and Technology, Alexandria, Egypt in 1997, the M.S. degree from same university in 2000, and the Ph.D. degree from Ottawa University, Ottawa, Canada in 2004, all in Electrical Engineering.From 1997 to 2000, He was a Graduate Teaching and research assistant at AAST, Alexandria, Egypt.From 2000 to 2004 He was a Graduate Teaching and research assistant at Ottawa University, Ottawa, Canada.From 2005 to 2009, he was an assistant Professor at AAST, Department of Electronic and communications Engineering, Alexandria, Egypt.Since January 2009, He has been an Associate professor at AAST, Department of Electronic and communications Engineering, Alexandria, Egypt.Since Fall 2005, has been an Adjunct Professor at Virginia Tech, USA Mohamed S. Zaghloul was born in 1954 in Alex, Egypt, graduate as electrical engineer in 1977 has his master from Alexandria University in 1990 has his PhD in Surface Acoustic wave in 2002 he works as doctor at Arab academy for science and Technology in electronic and communication department Mohamed I. El-Desouky was born in 1989 in Alex, Egypt, graduate as electrical, Electronics and Communications engineer from The Arab Academy for Science, Technology and Maritime Transport in 2010, has started preparation his master from the same institute of graduation in 2011.