SlideShare a Scribd company logo
Friday, April 29, 2016
Workshop on
Wireless Adhoc Networks in Windows7
Setup and Applications
Instructor: Ali Nezhad
School of Engineering Technology and Applied
Science
Department of Information and Communication
Engineering Technology
Computer Systems and Network
1
Introduction
There are two kinds of Wireless Local Area Networks (WLAN); infrastructure and adhoc. You
most probably are familiar with the former and may have even been to our own workshop on
that topic. This workshop is focused on creating and using the latter in a Win7 environment.
Other versions of Windows are almost similarin this regard. It must be saidthat WiFi (IEEE802.11)
is the dominant protocol as far as WLANs are concerned but adhoc networks may be built using
other wireless technologies such as Bluetooth, Zigbee, etc.
Infrastructure vs. adhoc
In an infrastructure WLAN, wireless devices connect to a central device known as a base station
(a.k.a access point among other names). The most familiar example of such a network is your
WiFi network at home. The residential gateway, commonly known as router, is the access point
in your network, which all your wireless devices such as mobile phones, laptops and tablets
connect to in a star formation and can also allow Internet access through a modem connected to
your Internet Service Provider (ISP).
INTERNET
Figure.1 Infrastructure WLAN
2
An adhoc wireless network on the other hand does not rely on a central access point. It allows
wireless devices to directly connect to each other and have the same role. The fact that these
networks do not rely on an infrastructure makes them ideal for extreme conditions such as
exploration, disaster recovery, etc.
In this workshop you will learn how to create an adhoc wireless network using two Win7 laptops
and then use it to share files between them. Furthermore, you will learn how to let one laptop
to connect to the Internet indirectly via the other laptop if it is connected to the Internet. Printer
sharing is another useful application but we will not attempt that.
Figure.2 Adhoc WLAN
IP Addressing and Subnetting
Before we start, let’s talk briefly about IP addresses. In a network, every device needs to be
somehow identified so that information may be delivered to it from other devices exactly like the
mailing system. In fact, a single device may have multiple IP addresses, one for each of its
networking interfaces. At this time, the dominant systemfor this purpose is called IPv4 and each
device in the network is identified by an IPv4 address or simply an IP address. Also, in the same
way that a city is divide up into many postal zones, a big network can be divided into subnetworks
or simply subnets. A subnet has an address of its own as well. In fact, eachIP address is comprised
of two main parts; a subnet ID and a host (meaning the device) ID. You can think of these as the
city name and the house number in a mailing address.
3
An IPv4 address is actually a binary number consisting of 32 bits (1 or 0) and it also has an
equivalent decimal representation consisting of 4 decimal numbers (called octets) separated by
dots. In a big network, routers forwarding information packets only care about the subnet portion
of an IP address not the host portion exactly the same way a mail sorter at a national post office
only cares about the city name not the house numbers. So, how does a router know which part
of an address is the subnet ID and which part is the host ID? The answer is by using a subnet
mask. A subnet mask looks very much like an IP address except it has all 1s in the subnet portion
and all 0s in the host portion. However, we usually use the decimal representation of that.
By default there are only three major groups of IP addresses called classes A, B and C.
A class A address has the default subnet mask of 255.0.0.0 which means the first octet is all 1s
and therefore the first octet in any such address identifies the subnet.
A class B address has the default subnet mask of 255.255.0.0 which means the first and the
second octets are all1s and therefore the first two octets in any suchaddress identify the subnet.
A class Caddress has the default subnet mask of 255.255.255.0 which means the firstthree octets
are all 1s and therefore the first three octets in any such address identify the subnet.
Example:
192.168.1.1 with a subnet mask of 255.255.255.0 is a class C address and the subnet ID is
192.168.1.0.
Note: Two devices that belong to the same network share the same subnet ID and the same
subnet mask. For example, another device in the above network may have an address of
192.168.1.12.
4
Objective
Enable 2 wireless laptops to share their files and also share a single Internet connection.
Procedure
A. Preparations
1- Each group is given 2 laptops. Log into your laptops with the password “wireless”.
2- Take note of the names of your PCs (e.g. CNET324-PC1) by going to
control panel  system & security  system
Computer1_Name: …………………… Computer2_Name: ……………………..
Figure.3 Computer name and other properties
3- Confirm that the wireless interfaces of both PCs are configured to obtain an IP address
automatically not manually. This will allow Windows to properly configure IP addresses
so that both laptops will belong to the same subnet and can communicate.
5
Figure.4 IP addressing mode
B. Create an Adhoc Network
1- On one laptop, do the following:
Control panel  Network & Internet  Manage Wireless Networks  Add  create an adhocnetwork.
Figure.5 Adding a Wireless Network
6
2- Give it a name such as adhoc1 for PC1.
3- Choose the security type. WPA2 is the preferred mode. Provide a security key which you will
remember.
Figure.6 Configuring the name and security mode of the adhoc network
Write your security key here: ……………………
4- At this point you can turn file sharing on or off. We will keep this at its default mode which is on.
C. Join the Adhoc Network
1- On both PCs join the adhoc wireless network. The PC which did not create the adhoc
network will have to provide the password which was configured by the other PC.
7
Figure.7 Connect to the adhoc network
Note: First stop the PCs from automatically joining the CCwGuest, CCwSecure or any other
network. Otherwise, your work may be periodically interrupted as the connection jumps from
your adhoc network to another network automatically.
Figure.8 Prevent automaticconnections
8
2- Launch a command prompt buy running “cmd” from the Windows Start menu.
3- Using the command “ipconfig” Verify that windows has provided both PCs with IP
addresses in the same subnet.
Figure.9 Find the IP address of your wireless interface
What are the IP addresses and the subnet masks of the wireless interfaces of your PCs?
Computer Name: IP Address: Mask:
Computer Name: IP Address: Mask:
9
D. File Sharing
1- In Windows Explorer locate your peer PC under “Network”.
2- Browse the files on the peer PC. You can even stream a video or audio file.
Figure.10 Accessing files on the peer PC
E. Internet Sharing
If one of the devices has an extra networking interface it can allow the peer PC to use that
too. In this experiment we will enable one PC to share the Ethernet interface of the peer PC.
We will then connect that Ethernet interface to the Internet and allow the peer PC to gain
access as well.
Figure.11 Sharing a single Internet connection
Ethernet
10
1- Configure the LAN interface for automatic IP addressing as you did in the preparation
step for the wireless interface.
2- At the same time, share this interface with other devices.
Figure.12 Allow sharing of the wired LAN interface
3- Test that both PCs can access websites on the Internet.
Free Practice
If there is time, feel free to experiment. For instance, join another group and try to
add three or 4 laptops to the same wireless ad hoc network.

More Related Content

What's hot

IP Address
IP AddressIP Address
IP Address
Netwax Lab
 
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor TrainingIP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
Andrew Smith
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
Er Bhagat Sharma
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
Netwax Lab
 
Assigning a static IP Address
Assigning a static IP AddressAssigning a static IP Address
Assigning a static IP Address
juliemae123
 
Ip address
Ip addressIp address
Ip address
Prem Sahu
 
Classes of adressing
Classes of adressingClasses of adressing
Classes of adressing
Harish Godiyal
 
Subnetting
SubnettingSubnetting
Subnetting
selvakumar_b1985
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
muhammad amir
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
Kak Yong
 
Ip addressing
Ip addressingIp addressing
Ip addressing
Tanvir Amin
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
Vivek chan
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
Kushal Sheth
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
Nil Menon
 
Assigning ip adress
Assigning ip adressAssigning ip adress
Assigning ip adress
Hiie XD
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
Amit Kumar , Jaipur Engineers
 
Ip address
Ip addressIp address
Ip address
MdAnikKhan
 
Ip addressing
Ip addressingIp addressing
Ip addressing
sid1322
 

What's hot (20)

IP Address
IP AddressIP Address
IP Address
 
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor TrainingIP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
ELEC - Lecture 2
ELEC - Lecture 2ELEC - Lecture 2
ELEC - Lecture 2
 
Assigning a static IP Address
Assigning a static IP AddressAssigning a static IP Address
Assigning a static IP Address
 
Ip address
Ip addressIp address
Ip address
 
Classes of adressing
Classes of adressingClasses of adressing
Classes of adressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
Assigning ip adress
Assigning ip adressAssigning ip adress
Assigning ip adress
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
 
Ip address
Ip addressIp address
Ip address
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 

Viewers also liked

Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
shashi712
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
Aman Saurabh
 
Manet
ManetManet
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networksSalahuddin Jokhio
 
An Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster AreaAn Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster Area
Naoki Shibata
 
Telecom Acronyms
Telecom AcronymsTelecom Acronyms
Telecom Acronyms
RAD-INFO, Inc.
 
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKSVIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
Siva Subramaniyan
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentationAmit Dovtya
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Madugula Kumar
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)
diaryinc
 
Project thor
Project thorProject thor
Project thor
Prasanna Gautam
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
Ipsita Sharma
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologymathan0071
 
Bluetooth
BluetoothBluetooth
Bluetooth
Raju Kunde
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
ateeq ateeq
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
SANJUU7
 
Mobile adhoc network
Mobile adhoc networkMobile adhoc network
Mobile adhoc network
Subiya Nadar
 
Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)Vivek Kumar
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 

Viewers also liked (20)

Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 
Manet
ManetManet
Manet
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
An Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster AreaAn Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster Area
 
Telecom Acronyms
Telecom AcronymsTelecom Acronyms
Telecom Acronyms
 
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKSVIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)
 
Project thor
Project thorProject thor
Project thor
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Pan seminar
Pan seminarPan seminar
Pan seminar
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Mobile adhoc network
Mobile adhoc networkMobile adhoc network
Mobile adhoc network
 
Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 

Similar to adhoc network workshop

ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
vishweshbhat4
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
smumbahelp
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingKumar
 
Networking slide
Networking slideNetworking slide
Networking slide
Asaduzzaman Kanok
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101
grantsupplies
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
EILLEN IVY PORTUGUEZ
 
Basic networking concept1
Basic networking concept1Basic networking concept1
Basic networking concept1reddydivakara
 
Pears
PearsPears
Pearsthips
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
AKHIL969626
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
Erin Rivera
 
Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
Jumaan Ally Mohamed
 
Class note 4
Class note 4Class note 4
Class note 4
khadijaakterpretty
 
Ip and mac address
Ip and mac address Ip and mac address
Ip and mac address
MH Shihab
 
Assigning A Satic IP Address
Assigning A Satic IP AddressAssigning A Satic IP Address
Assigning A Satic IP Address
Bridget Ann Yap
 
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
RashidFaridChishti
 
Assigning ip address
Assigning ip addressAssigning ip address
Assigning ip address
ralphjamesg
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
YonasBayu1
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
picklesvalery
 

Similar to adhoc network workshop (20)

ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshooting
 
Networking slide
Networking slideNetworking slide
Networking slide
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Basic networking concept1
Basic networking concept1Basic networking concept1
Basic networking concept1
 
Routers
RoutersRouters
Routers
 
Pears
PearsPears
Pears
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
 
Class note 4
Class note 4Class note 4
Class note 4
 
Ip and mac address
Ip and mac address Ip and mac address
Ip and mac address
 
Tcpip Intro
Tcpip IntroTcpip Intro
Tcpip Intro
 
Assigning A Satic IP Address
Assigning A Satic IP AddressAssigning A Satic IP Address
Assigning A Satic IP Address
 
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
 
Assigning ip address
Assigning ip addressAssigning ip address
Assigning ip address
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
 

More from Ali Nezhad

Network programming using python
Network programming using pythonNetwork programming using python
Network programming using python
Ali Nezhad
 
Internet of things
Internet of thingsInternet of things
Internet of things
Ali Nezhad
 
converged Networks
converged Networksconverged Networks
converged NetworksAli Nezhad
 
cnet311 q-bank
cnet311 q-bankcnet311 q-bank
cnet311 q-bankAli Nezhad
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
Ali Nezhad
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3Ali Nezhad
 

More from Ali Nezhad (6)

Network programming using python
Network programming using pythonNetwork programming using python
Network programming using python
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
converged Networks
converged Networksconverged Networks
converged Networks
 
cnet311 q-bank
cnet311 q-bankcnet311 q-bank
cnet311 q-bank
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 

adhoc network workshop

  • 1. Friday, April 29, 2016 Workshop on Wireless Adhoc Networks in Windows7 Setup and Applications Instructor: Ali Nezhad School of Engineering Technology and Applied Science Department of Information and Communication Engineering Technology Computer Systems and Network
  • 2. 1 Introduction There are two kinds of Wireless Local Area Networks (WLAN); infrastructure and adhoc. You most probably are familiar with the former and may have even been to our own workshop on that topic. This workshop is focused on creating and using the latter in a Win7 environment. Other versions of Windows are almost similarin this regard. It must be saidthat WiFi (IEEE802.11) is the dominant protocol as far as WLANs are concerned but adhoc networks may be built using other wireless technologies such as Bluetooth, Zigbee, etc. Infrastructure vs. adhoc In an infrastructure WLAN, wireless devices connect to a central device known as a base station (a.k.a access point among other names). The most familiar example of such a network is your WiFi network at home. The residential gateway, commonly known as router, is the access point in your network, which all your wireless devices such as mobile phones, laptops and tablets connect to in a star formation and can also allow Internet access through a modem connected to your Internet Service Provider (ISP). INTERNET Figure.1 Infrastructure WLAN
  • 3. 2 An adhoc wireless network on the other hand does not rely on a central access point. It allows wireless devices to directly connect to each other and have the same role. The fact that these networks do not rely on an infrastructure makes them ideal for extreme conditions such as exploration, disaster recovery, etc. In this workshop you will learn how to create an adhoc wireless network using two Win7 laptops and then use it to share files between them. Furthermore, you will learn how to let one laptop to connect to the Internet indirectly via the other laptop if it is connected to the Internet. Printer sharing is another useful application but we will not attempt that. Figure.2 Adhoc WLAN IP Addressing and Subnetting Before we start, let’s talk briefly about IP addresses. In a network, every device needs to be somehow identified so that information may be delivered to it from other devices exactly like the mailing system. In fact, a single device may have multiple IP addresses, one for each of its networking interfaces. At this time, the dominant systemfor this purpose is called IPv4 and each device in the network is identified by an IPv4 address or simply an IP address. Also, in the same way that a city is divide up into many postal zones, a big network can be divided into subnetworks or simply subnets. A subnet has an address of its own as well. In fact, eachIP address is comprised of two main parts; a subnet ID and a host (meaning the device) ID. You can think of these as the city name and the house number in a mailing address.
  • 4. 3 An IPv4 address is actually a binary number consisting of 32 bits (1 or 0) and it also has an equivalent decimal representation consisting of 4 decimal numbers (called octets) separated by dots. In a big network, routers forwarding information packets only care about the subnet portion of an IP address not the host portion exactly the same way a mail sorter at a national post office only cares about the city name not the house numbers. So, how does a router know which part of an address is the subnet ID and which part is the host ID? The answer is by using a subnet mask. A subnet mask looks very much like an IP address except it has all 1s in the subnet portion and all 0s in the host portion. However, we usually use the decimal representation of that. By default there are only three major groups of IP addresses called classes A, B and C. A class A address has the default subnet mask of 255.0.0.0 which means the first octet is all 1s and therefore the first octet in any such address identifies the subnet. A class B address has the default subnet mask of 255.255.0.0 which means the first and the second octets are all1s and therefore the first two octets in any suchaddress identify the subnet. A class Caddress has the default subnet mask of 255.255.255.0 which means the firstthree octets are all 1s and therefore the first three octets in any such address identify the subnet. Example: 192.168.1.1 with a subnet mask of 255.255.255.0 is a class C address and the subnet ID is 192.168.1.0. Note: Two devices that belong to the same network share the same subnet ID and the same subnet mask. For example, another device in the above network may have an address of 192.168.1.12.
  • 5. 4 Objective Enable 2 wireless laptops to share their files and also share a single Internet connection. Procedure A. Preparations 1- Each group is given 2 laptops. Log into your laptops with the password “wireless”. 2- Take note of the names of your PCs (e.g. CNET324-PC1) by going to control panel  system & security  system Computer1_Name: …………………… Computer2_Name: …………………….. Figure.3 Computer name and other properties 3- Confirm that the wireless interfaces of both PCs are configured to obtain an IP address automatically not manually. This will allow Windows to properly configure IP addresses so that both laptops will belong to the same subnet and can communicate.
  • 6. 5 Figure.4 IP addressing mode B. Create an Adhoc Network 1- On one laptop, do the following: Control panel  Network & Internet  Manage Wireless Networks  Add  create an adhocnetwork. Figure.5 Adding a Wireless Network
  • 7. 6 2- Give it a name such as adhoc1 for PC1. 3- Choose the security type. WPA2 is the preferred mode. Provide a security key which you will remember. Figure.6 Configuring the name and security mode of the adhoc network Write your security key here: …………………… 4- At this point you can turn file sharing on or off. We will keep this at its default mode which is on. C. Join the Adhoc Network 1- On both PCs join the adhoc wireless network. The PC which did not create the adhoc network will have to provide the password which was configured by the other PC.
  • 8. 7 Figure.7 Connect to the adhoc network Note: First stop the PCs from automatically joining the CCwGuest, CCwSecure or any other network. Otherwise, your work may be periodically interrupted as the connection jumps from your adhoc network to another network automatically. Figure.8 Prevent automaticconnections
  • 9. 8 2- Launch a command prompt buy running “cmd” from the Windows Start menu. 3- Using the command “ipconfig” Verify that windows has provided both PCs with IP addresses in the same subnet. Figure.9 Find the IP address of your wireless interface What are the IP addresses and the subnet masks of the wireless interfaces of your PCs? Computer Name: IP Address: Mask: Computer Name: IP Address: Mask:
  • 10. 9 D. File Sharing 1- In Windows Explorer locate your peer PC under “Network”. 2- Browse the files on the peer PC. You can even stream a video or audio file. Figure.10 Accessing files on the peer PC E. Internet Sharing If one of the devices has an extra networking interface it can allow the peer PC to use that too. In this experiment we will enable one PC to share the Ethernet interface of the peer PC. We will then connect that Ethernet interface to the Internet and allow the peer PC to gain access as well. Figure.11 Sharing a single Internet connection Ethernet
  • 11. 10 1- Configure the LAN interface for automatic IP addressing as you did in the preparation step for the wireless interface. 2- At the same time, share this interface with other devices. Figure.12 Allow sharing of the wired LAN interface 3- Test that both PCs can access websites on the Internet. Free Practice If there is time, feel free to experiment. For instance, join another group and try to add three or 4 laptops to the same wireless ad hoc network.