SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
DOI : 10.5121/ijcnc.2015.7205 59
WIRELESS ADHOC MULTI ACCESS NETWORKS
OPTIMIZATION USING OSPF ROUTING
PROTOCOL BASED ON CISCO DEVICES.
Mohamed E. Khedr, Mohamed S. Zaghlouland Mohamed I. El-Desouky
Department of Electronics and Communications, Arab Academy for Science, Tech. and
Maritime Transport, Alexandria, Egypt, BOX 1029
ABSTRACT
One of the most attractive field for research for researchers and authors so the Wireless adhoc networks.
So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing
protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands.
Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the
Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access
wireless networks. This paper will use OSPF routing protocol because of its average administrative
distance with all routing protocols.
KEYWORDS
Adhoc, Wireless Networks, Cisco Access Points, Adhoc using Cisco devices.
1.INTRODUCTION:
Fig1. Default Administrative Distance
The OSPF routing protocol history is designed especially on the links state (Link speed) over
view due to Djkstra algorithm. It began to operate in the world in 1987 then the released was been
made.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
60
Fig2. OSPF Development timeline
2. ILLUSTRATING THE PROBLEM:
This paper aim is actually to make all end devices under coverage area and under control. adhoc
network of multi-access end devices major issue is the time delay and Packets which dropped
during the transmission process. OSPF Routing Protocol can be handled in this paper because of
its high signal transmission ratio, average administrative routing protocol distance, high
authentication and encryption algorithm that already defined. OSPF primary feature is the using
of the links speed only however all other protocols used the hops as primary feature. This will
gain much more accurate results in the Adhoc wireless networking case.
3.OSPF working phenomena:
OSPF invented to correct the wrong paths made by RIP Routing Protocol. Whichinvented by the
routing table entry algorithm called BelmmanFord (Hops Theory).[1]Note that Network Layer
(Layer3) on the Open System Interconnection (OSI) model will be ussed. The packet
encapsulation in the sending criteria must be defined as OSPF Message Encapsulation packet
header contains router ID, area ID and Type code for OSPF packet type.
Fig3. Encapsulation OSPF Message
Internet Protocol (IP) packet header contains source IP address, destination IP address and
protocol field set to 89.[2] The data link frame header contains source Multi Access Card (MAC)
address and Destination MAC address. There are 5 types of packet messages for the OSPF listed
as bellow.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
61
Fig.4 OSPF Packets Type
OSPF not only good due to administrative distance but also it is very good in the authentication
andencryption purposes for important data. Routers will only accept routing information from
other routers that have been configured with the same password or authentication information
Fig.5 Showing Authentication
4. USED NETWORK’S DEVICES:
It is urgent to use network devices in this research, that’s why routing must be made using high
speed, reliable routers. This options are only exists in cisco devices. So a 3X 2600 series cisco
routers (2621XM) routers with 2 -38db antennas will be used to make sure the coverage are is
good enough and can cover about 1Km.[3]
Fig.6. Cisco 2800 Series Catalyst Router
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
62
5. DESIGNED SCHEMA TO WORK ON:
This schema is designed using Cisco packet tracer simulator. We will use 3 2611xm routers as
mentioned. The 3 routers connected directly by smart serial interfaces not wirelessly (to check the
connection first).[4] The DCE interfaces used only to establish the connection with the universal
rate of 64000 bit/sec. every router have its own network of end devices. Ip configuration as listed
below and as shown and configured in Appendix A, B and C:
Table1: Schema Design
Device/interface IP Address+
Subnet mask
Device/interface IP Address+
Subnet mask
Adhoc 1 172.16.1.18
255.255.255.192
R3/Lo0 10.3.3.3
255.255.255.255
Adhoc 2 10.10.10.2
255.255.255.0
R3/S0/0/0 192.168.10.5
255.255.255.252
Adhoc 3 172.16.1.35
255.255.255.248
R3/S0/0/1 192.168.10.10
255.255.255.252
R1/Lo0 10.1.1.1
255.255.255.255
R1 – R2 Cost 64 Kbps
R1/S0/0/0 192.168.10.1
255.255.255.252
R2-R3 Cost 128 Kbps
R1/S0/0/1 192.168.10.6
255.255.255.252
R1-R3 Cost 256 Kbps
R2/Lo0 10.2.2.2
255.255.255.255
R1 LAN 172.16.1.16
255.255.255.192
R2/S0/0/0 192.168.10.2
255.255.255.252
R2 LAN 10.10.10.0
255.255.255.0
R2/S0/0/1 192.168.10.9
255.255.255.252
R3 LAN 172.16.1.32
255.255.255.248
Fig7. OSPF Path cost (a)
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
63
6. OSPFPATH COST METRIC
Usually there is a difference in actual bandwidth and the used bandwidth [5].So, the actual speed
can be determined using the bandwidth. The main Reason is the routing table has best path
information. The show interface command will display interface’s bandwidth. Serial links used as
shown in as bellow figure.
Fig8. OSPF Path Cost (b)
7. CONFIGURATION OF OSPF ROUTER
Configuration the path cost of a must be configured in link both sides of a serial link should be
configured with the samebandwidth. Commands used to modify bandwidth valueBandwidth
command
Router(config-if)#bandwidth 64
Fig9. OSPF bandwidth configuration
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
64
Fig10. OSPF bandwidth configuration
Editing the Cost of the link linking between bandwidth command and the ipospf path cot
command. Ipospf cost command. Sets cost to a specific value then the calculated OSPF Cost
already calculated.[6]
Fig11. Equivalent commands of bandwidth and ip PSPF commands
8. OSPF AND MULTI-ACCESS NETWORKS
Differences in Multi-access Networks, Point-to-point.[7]Broadcast Multi-access, Non
broadcastMulti-access (NBMA), Point-to-multipoint and virtual links.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
65
Fig12. OSPF Network types used
2 challenges presented by multi-access networks, multiple adjacencies and Extensive Link State
Advertisement (LSA) flooding.[8]
Fig13. No. Of Growth of paths
an acknowledgement of receipt must be sent back to transmitting router due to flooding of LSA
and . [9]
Fig14. LSA Flooding Scenario
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
66
Solution to LSA flooding issue is the use of designated router (DR) and Backup designated router
(BDR). The DR & BDR selection is Routers are elected to send and receive LSA.[10]
Fig15. DR/BDR Listens.
Various DR routers send LSAs through multicast ip address of 224.0.0.6 to DR & BDRrouters
,DR forward LSA via multicast address 224.0.0.5 to all other routers.[11]
Fig16. DR sends LSAs
9.CONCLUSIONS
Using OSPF in Multi-access networks of wireless Adhoc with cisco solutions products like
routers, switches and access points; it can be easy to make the entire network under coverage with
minimum time delay and legacy. In this paper, Appling on real life network as it is and with all
right configurations of OSPF on routers, we were able to decrease the time delay and legacy from
22mSec to only 12mSec. This will define a revolution in the adhoc networking in fields of time
based like military services.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
67
REFERENCES
[1] http://www.cisco.com/c/en/us/products/wireless/buyers-guide.html
[2] SharamHekmat, Communication Networks, 2011
[3] Robert Faludi, A Practical Guide to networking protocols, Building wireless networks, 2013
[4] Patricegilopacovic, Wireless networking, building AdHoc networks.802.11 a/b/g/n techniques, April
2011.
[5] Yi-Bing Lin &ImrichChlamtac, Wireless and Mobile network architectures, 2012
[6] Andrew S. Tanenbaum, Computer Networks, Sixth Edition, 2013
[7] Simon Haykin, Communication Systems, fifth edition, 2014
[8] J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach Featuring the Internet,
2014
[9] Andrew S.Tanenbaum, Computer Network, 2012
[10] J. Walrand& P. Varaiya, High-Performance Communication Networks, 2014
[11] Wendell Odom,Cisco CCNA Exam# 200-120 Certification Guide, Cisco Systems, 2014
Appendix A
Controller (Routers) Configuration
For Controller 1:
Router>enable
Router#configure terminal
Router(config)#hostname Base 1
Controller1(config)#interface fastEthernet 0/0
Controller1(config-if)#ip address 172.16.1.18 255.255.255.192
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller1(config-if)#ip address 11.0.0.1 255.0.0.0
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller1(config)#interface serial 0/3/0
Controller1(config-if)#ip address 12.0.0.1 255.0.0.0
Controller1(config-if)#clock rate 64000
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller1(config)#line console 0
Controller1(config-line)#password adhoc1admin
Controller1(config-line)#login
Controller1(config)#line vty 0 4
Controller1(config-line)#password adhoc1admin
Controller1(config-line)#login
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
68
Controller1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2
Appendix B
For Controller 2:
Router>enable
Router#configure terminal
Router(config)#hostname Base2
Controller2(config)#interface fastEthernet 0/0
Controller2(config-if)#ip address 13.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller2(config)#interface fastEthernet 0/1
Controller2(config-if)#ip address 14.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller2(config)#interface serial 0/1/0
Controller2(config-if)#ip address 12.0.0.2 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller2(config)#line console 0
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#line vty 0 4
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
Appendix C
For Controller 3:
Router>enable
Router#configure terminal
Router(config)#hostname Base3
Controller2(config)#interface fastEthernet 0/0
Controller2(config-if)#ip address 14.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller2(config)#interface fastEthernet 0/1
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015
69
Controller2(config-if)#ip address 15.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller2(config)#interface serial 0/1/0
Controller2(config-if)#ip address 12.0.0.3 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller2(config)#line console 0
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#line vty 0 4
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
Authors
Mohamed Khedr obtained his B.Sc. degree from the Arab Academy for Science and
Technology, Alexandria, Egypt in 1997, the M.S. degree from same university in 2000, and
the Ph.D. degree from Ottawa University, Ottawa, Canada in 2004, all in Electrical
Engineering.From 1997 to 2000, He was a Graduate Teaching and research assistant at
AAST, Alexandria, Egypt.From 2000 to 2004 He was a Graduate Teaching and research assistant at
Ottawa University, Ottawa, Canada. From 2005 to 2009, he was an assistant Professor at AAST,
Department of Electronic and communications Engineering, Alexandria, Egypt. Since January 2009, He
has been an Associate professor at AAST, Department of Electronic and communications Engineering,
Alexandria, Egypt.Since Fall 2005, has been an Adjunct Professor at Virginia Tech, USA.
Mohamed S. Zaghloul was born in 1954 in Alex, Egypt, graduate as electrical engineer in
1977 has his master from Alexandria University in 1990 has his PhD in Surface Acoustic
wave in 2002 he works as doctor at Arab academy for science and Technology in electronic
and communication department
.
Mohamed I. El-Desoukywas born in 1989 in Alex, Egypt, graduate as electrical, Electronics
and Communications engineer from The Arab Academy for Science, Technology and
Maritime Transport in 2010, has started preparation his master from the same institute of
graduation in 2011.

More Related Content

What's hot

477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلاییmorteza zilaie bouri
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical Layer
IOSR Journals
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
Nil Menon
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
Abdisalam A. Mohamed
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
CSCJournals
 
Ethernet Compliance Testing at Toradex
Ethernet Compliance Testing at ToradexEthernet Compliance Testing at Toradex
Ethernet Compliance Testing at Toradex
Toradex
 
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
IJCI JOURNAL
 
Sdh/pdh/sonet
Sdh/pdh/sonetSdh/pdh/sonet
Sdh/pdh/sonet
LEKHRAJ .
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial Modulation
Sachin Talakeri
 
Cr33562566
Cr33562566Cr33562566
Cr33562566
IJERA Editor
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
vtunotesbysree
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
ijmnct
 
Fc
FcFc
Introductin sdh-pdh
Introductin sdh-pdhIntroductin sdh-pdh
Introductin sdh-pdh
Kevin Llêrênã
 
Communication Performance Over A Gigabit Ethernet Network
Communication Performance Over A Gigabit Ethernet NetworkCommunication Performance Over A Gigabit Ethernet Network
Communication Performance Over A Gigabit Ethernet Network
IJERA Editor
 
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSA REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
IJCSIT Journal
 

What's hot (19)

Ijebea14 238
Ijebea14 238Ijebea14 238
Ijebea14 238
 
IJSTEV2I12120
IJSTEV2I12120IJSTEV2I12120
IJSTEV2I12120
 
477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی477818. paper(92-97)ctts زیلایی
477818. paper(92-97)ctts زیلایی
 
Simulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical LayerSimulation of IEEE 802.16e Physical Layer
Simulation of IEEE 802.16e Physical Layer
 
CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6CCNA 1 Routing and Switching v5.0 Chapter 6
CCNA 1 Routing and Switching v5.0 Chapter 6
 
35d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b8935d70683c4fd405d89db4a5287aa4b89
35d70683c4fd405d89db4a5287aa4b89
 
Ch5
Ch5Ch5
Ch5
 
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
Analysis of WiMAX Physical Layer Using Spatial Multiplexing Under Different F...
 
Ethernet Compliance Testing at Toradex
Ethernet Compliance Testing at ToradexEthernet Compliance Testing at Toradex
Ethernet Compliance Testing at Toradex
 
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
The Performance Evaluation of IEEE 802.16 Physical Layer in the Basis of Bit ...
 
Sdh/pdh/sonet
Sdh/pdh/sonetSdh/pdh/sonet
Sdh/pdh/sonet
 
Design of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial ModulationDesign of 4x4 optical MIMO using spatial Modulation
Design of 4x4 optical MIMO using spatial Modulation
 
Cr33562566
Cr33562566Cr33562566
Cr33562566
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...Comparative study of various voip applications in 802.11 a wireless network s...
Comparative study of various voip applications in 802.11 a wireless network s...
 
Fc
FcFc
Fc
 
Introductin sdh-pdh
Introductin sdh-pdhIntroductin sdh-pdh
Introductin sdh-pdh
 
Communication Performance Over A Gigabit Ethernet Network
Communication Performance Over A Gigabit Ethernet NetworkCommunication Performance Over A Gigabit Ethernet Network
Communication Performance Over A Gigabit Ethernet Network
 
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKSA REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
A REVIEW ON TECHNIQUES FOR INCREASING CONNECTIVITY AND LIFE OF ZIGBEE NETWORKS
 

Viewers also liked

PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
IJCNCJournal
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...
IJCNCJournal
 
Par petal ant routing algorithm for
Par  petal ant routing algorithm forPar  petal ant routing algorithm for
Par petal ant routing algorithm for
IJCNCJournal
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
IJCNCJournal
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
IJCNCJournal
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
IJCNCJournal
 
Extending network lifetime of wireless sensor
Extending network lifetime of wireless sensorExtending network lifetime of wireless sensor
Extending network lifetime of wireless sensor
IJCNCJournal
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
IJCNCJournal
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteed
IJCNCJournal
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
IJCNCJournal
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on text
IJCNCJournal
 
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
IJCNCJournal
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
IJCNCJournal
 
Correlating objective factors with video
Correlating objective factors with videoCorrelating objective factors with video
Correlating objective factors with video
IJCNCJournal
 
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
IJCNCJournal
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip traffic
IJCNCJournal
 
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
IJCNCJournal
 
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
IJCNCJournal
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGS
IJCNCJournal
 

Viewers also liked (19)

PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERPERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVER
 
Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...Impact of network quality deterioration on user’s perceived operability and l...
Impact of network quality deterioration on user’s perceived operability and l...
 
Par petal ant routing algorithm for
Par  petal ant routing algorithm forPar  petal ant routing algorithm for
Par petal ant routing algorithm for
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 
Energy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh networkEnergy efficiency cross layer protocol for wireless mesh network
Energy efficiency cross layer protocol for wireless mesh network
 
Extending network lifetime of wireless sensor
Extending network lifetime of wireless sensorExtending network lifetime of wireless sensor
Extending network lifetime of wireless sensor
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
Bandwidth guaranteed
Bandwidth guaranteedBandwidth guaranteed
Bandwidth guaranteed
 
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
MODELING AND DESIGNING RESOURCE EFFICIENT DISTRIBUTED MANET MANAGEMENT SYSTEM...
 
White space steganography on text
White space steganography on textWhite space steganography on text
White space steganography on text
 
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
 
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATIONA MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
A MASS BALANCING THEOREM FOR THE ECONOMICAL NETWORK FLOW MAXIMISATION
 
Correlating objective factors with video
Correlating objective factors with videoCorrelating objective factors with video
Correlating objective factors with video
 
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
MODELING, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF MOBILITY LOAD BALANCING ...
 
Dynamic routing of ip traffic
Dynamic routing of ip trafficDynamic routing of ip traffic
Dynamic routing of ip traffic
 
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
GPS SYSTEMS LITERATURE: INACCURACY FACTORS AND EFFECTIVE SOLUTIONS
 
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
HANDOVER OPTIMIZATION BASED ON MEDIA INDEPENDENT HANDOVER IN NEW NETWORKS NGWN
 
A MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGSA MIDDLEWARE FOR THE INTERNET OF THINGS
A MIDDLEWARE FOR THE INTERNET OF THINGS
 

Similar to Wireless adhoc multi access networks

IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET Journal
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangAnil Nembang
 
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET Journal
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
IJCNCJournal
 
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
nooriasukmaningtyas
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET Journal
 
OSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfOSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdf
KOLOYOYO
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A survey
IJRES Journal
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
IJMER
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
caijjournal
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
ijscmcj
 
Comparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET SimulationComparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET Simulation
iosrjce
 
H010634043
H010634043H010634043
H010634043
IOSR Journals
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 

Similar to Wireless adhoc multi access networks (20)

IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
 
OSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil NembangOSPF (Open Shortest Path First) Case Study: Anil Nembang
OSPF (Open Shortest Path First) Case Study: Anil Nembang
 
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD CodeIRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
IRJET- Performance Analysis of IP Over Optical CDMA System based on RD Code
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...Performance investigations of internet protocol versions for mobile Ad-hoc ne...
Performance investigations of internet protocol versions for mobile Ad-hoc ne...
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
OSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdfOSPF EIGRP & RIP comparision.pdf
OSPF EIGRP & RIP comparision.pdf
 
Network on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A surveyNetwork on Chip Architecture and Routing Techniques: A survey
Network on Chip Architecture and Routing Techniques: A survey
 
Zigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart CampusZigbee Based Wireless Sensor Networks for Smart Campus
Zigbee Based Wireless Sensor Networks for Smart Campus
 
Performance evaluation of qos in
Performance evaluation of qos inPerformance evaluation of qos in
Performance evaluation of qos in
 
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOTIMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
IMPLEMENTATION OF NETWORK DESIGN FOR UNIVERSITIES WITH IOT
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
 
Comparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET SimulationComparative Study between OSPF and MPLS network using OPNET Simulation
Comparative Study between OSPF and MPLS network using OPNET Simulation
 
H010634043
H010634043H010634043
H010634043
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 

More from IJCNCJournal

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
IJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
IJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
IJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
IJCNCJournal
 

More from IJCNCJournal (20)

Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing ProtocolImproved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 

Recently uploaded

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 

Recently uploaded (20)

The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 

Wireless adhoc multi access networks

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 DOI : 10.5121/ijcnc.2015.7205 59 WIRELESS ADHOC MULTI ACCESS NETWORKS OPTIMIZATION USING OSPF ROUTING PROTOCOL BASED ON CISCO DEVICES. Mohamed E. Khedr, Mohamed S. Zaghlouland Mohamed I. El-Desouky Department of Electronics and Communications, Arab Academy for Science, Tech. and Maritime Transport, Alexandria, Egypt, BOX 1029 ABSTRACT One of the most attractive field for research for researchers and authors so the Wireless adhoc networks. So, this paper will describe the background and basic features of Open Short Path First (OSPF) routing protocol due to multi-access networks. Explaining and practice on the OSPF configuration commands. Describe, modify and calculate the metric (Cost) used by OSPF due to adhoc networks. Illustrating the Election parameters made by DR/BDR (Designated and Back Designated) Routers used in multi-access wireless networks. This paper will use OSPF routing protocol because of its average administrative distance with all routing protocols. KEYWORDS Adhoc, Wireless Networks, Cisco Access Points, Adhoc using Cisco devices. 1.INTRODUCTION: Fig1. Default Administrative Distance The OSPF routing protocol history is designed especially on the links state (Link speed) over view due to Djkstra algorithm. It began to operate in the world in 1987 then the released was been made.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 60 Fig2. OSPF Development timeline 2. ILLUSTRATING THE PROBLEM: This paper aim is actually to make all end devices under coverage area and under control. adhoc network of multi-access end devices major issue is the time delay and Packets which dropped during the transmission process. OSPF Routing Protocol can be handled in this paper because of its high signal transmission ratio, average administrative routing protocol distance, high authentication and encryption algorithm that already defined. OSPF primary feature is the using of the links speed only however all other protocols used the hops as primary feature. This will gain much more accurate results in the Adhoc wireless networking case. 3.OSPF working phenomena: OSPF invented to correct the wrong paths made by RIP Routing Protocol. Whichinvented by the routing table entry algorithm called BelmmanFord (Hops Theory).[1]Note that Network Layer (Layer3) on the Open System Interconnection (OSI) model will be ussed. The packet encapsulation in the sending criteria must be defined as OSPF Message Encapsulation packet header contains router ID, area ID and Type code for OSPF packet type. Fig3. Encapsulation OSPF Message Internet Protocol (IP) packet header contains source IP address, destination IP address and protocol field set to 89.[2] The data link frame header contains source Multi Access Card (MAC) address and Destination MAC address. There are 5 types of packet messages for the OSPF listed as bellow.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 61 Fig.4 OSPF Packets Type OSPF not only good due to administrative distance but also it is very good in the authentication andencryption purposes for important data. Routers will only accept routing information from other routers that have been configured with the same password or authentication information Fig.5 Showing Authentication 4. USED NETWORK’S DEVICES: It is urgent to use network devices in this research, that’s why routing must be made using high speed, reliable routers. This options are only exists in cisco devices. So a 3X 2600 series cisco routers (2621XM) routers with 2 -38db antennas will be used to make sure the coverage are is good enough and can cover about 1Km.[3] Fig.6. Cisco 2800 Series Catalyst Router
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 62 5. DESIGNED SCHEMA TO WORK ON: This schema is designed using Cisco packet tracer simulator. We will use 3 2611xm routers as mentioned. The 3 routers connected directly by smart serial interfaces not wirelessly (to check the connection first).[4] The DCE interfaces used only to establish the connection with the universal rate of 64000 bit/sec. every router have its own network of end devices. Ip configuration as listed below and as shown and configured in Appendix A, B and C: Table1: Schema Design Device/interface IP Address+ Subnet mask Device/interface IP Address+ Subnet mask Adhoc 1 172.16.1.18 255.255.255.192 R3/Lo0 10.3.3.3 255.255.255.255 Adhoc 2 10.10.10.2 255.255.255.0 R3/S0/0/0 192.168.10.5 255.255.255.252 Adhoc 3 172.16.1.35 255.255.255.248 R3/S0/0/1 192.168.10.10 255.255.255.252 R1/Lo0 10.1.1.1 255.255.255.255 R1 – R2 Cost 64 Kbps R1/S0/0/0 192.168.10.1 255.255.255.252 R2-R3 Cost 128 Kbps R1/S0/0/1 192.168.10.6 255.255.255.252 R1-R3 Cost 256 Kbps R2/Lo0 10.2.2.2 255.255.255.255 R1 LAN 172.16.1.16 255.255.255.192 R2/S0/0/0 192.168.10.2 255.255.255.252 R2 LAN 10.10.10.0 255.255.255.0 R2/S0/0/1 192.168.10.9 255.255.255.252 R3 LAN 172.16.1.32 255.255.255.248 Fig7. OSPF Path cost (a)
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 63 6. OSPFPATH COST METRIC Usually there is a difference in actual bandwidth and the used bandwidth [5].So, the actual speed can be determined using the bandwidth. The main Reason is the routing table has best path information. The show interface command will display interface’s bandwidth. Serial links used as shown in as bellow figure. Fig8. OSPF Path Cost (b) 7. CONFIGURATION OF OSPF ROUTER Configuration the path cost of a must be configured in link both sides of a serial link should be configured with the samebandwidth. Commands used to modify bandwidth valueBandwidth command Router(config-if)#bandwidth 64 Fig9. OSPF bandwidth configuration
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 64 Fig10. OSPF bandwidth configuration Editing the Cost of the link linking between bandwidth command and the ipospf path cot command. Ipospf cost command. Sets cost to a specific value then the calculated OSPF Cost already calculated.[6] Fig11. Equivalent commands of bandwidth and ip PSPF commands 8. OSPF AND MULTI-ACCESS NETWORKS Differences in Multi-access Networks, Point-to-point.[7]Broadcast Multi-access, Non broadcastMulti-access (NBMA), Point-to-multipoint and virtual links.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 65 Fig12. OSPF Network types used 2 challenges presented by multi-access networks, multiple adjacencies and Extensive Link State Advertisement (LSA) flooding.[8] Fig13. No. Of Growth of paths an acknowledgement of receipt must be sent back to transmitting router due to flooding of LSA and . [9] Fig14. LSA Flooding Scenario
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 66 Solution to LSA flooding issue is the use of designated router (DR) and Backup designated router (BDR). The DR & BDR selection is Routers are elected to send and receive LSA.[10] Fig15. DR/BDR Listens. Various DR routers send LSAs through multicast ip address of 224.0.0.6 to DR & BDRrouters ,DR forward LSA via multicast address 224.0.0.5 to all other routers.[11] Fig16. DR sends LSAs 9.CONCLUSIONS Using OSPF in Multi-access networks of wireless Adhoc with cisco solutions products like routers, switches and access points; it can be easy to make the entire network under coverage with minimum time delay and legacy. In this paper, Appling on real life network as it is and with all right configurations of OSPF on routers, we were able to decrease the time delay and legacy from 22mSec to only 12mSec. This will define a revolution in the adhoc networking in fields of time based like military services.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 67 REFERENCES [1] http://www.cisco.com/c/en/us/products/wireless/buyers-guide.html [2] SharamHekmat, Communication Networks, 2011 [3] Robert Faludi, A Practical Guide to networking protocols, Building wireless networks, 2013 [4] Patricegilopacovic, Wireless networking, building AdHoc networks.802.11 a/b/g/n techniques, April 2011. [5] Yi-Bing Lin &ImrichChlamtac, Wireless and Mobile network architectures, 2012 [6] Andrew S. Tanenbaum, Computer Networks, Sixth Edition, 2013 [7] Simon Haykin, Communication Systems, fifth edition, 2014 [8] J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, 2014 [9] Andrew S.Tanenbaum, Computer Network, 2012 [10] J. Walrand& P. Varaiya, High-Performance Communication Networks, 2014 [11] Wendell Odom,Cisco CCNA Exam# 200-120 Certification Guide, Cisco Systems, 2014 Appendix A Controller (Routers) Configuration For Controller 1: Router>enable Router#configure terminal Router(config)#hostname Base 1 Controller1(config)#interface fastEthernet 0/0 Controller1(config-if)#ip address 172.16.1.18 255.255.255.192 Controller1(config-if)#no shutdown Controller1(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up Controller1(config-if)#ip address 11.0.0.1 255.0.0.0 Controller1(config-if)#no shutdown Controller1(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up Controller1(config)#interface serial 0/3/0 Controller1(config-if)#ip address 12.0.0.1 255.0.0.0 Controller1(config-if)#clock rate 64000 Controller1(config-if)#no shutdown Controller1(config-if)# %LINK-5-CHANGED: Interface Serial0/3/0, changed state to up Controller1(config)#line console 0 Controller1(config-line)#password adhoc1admin Controller1(config-line)#login Controller1(config)#line vty 0 4 Controller1(config-line)#password adhoc1admin Controller1(config-line)#login
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 68 Controller1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2 Appendix B For Controller 2: Router>enable Router#configure terminal Router(config)#hostname Base2 Controller2(config)#interface fastEthernet 0/0 Controller2(config-if)#ip address 13.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up Controller2(config)#interface fastEthernet 0/1 Controller2(config-if)#ip address 14.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up Controller2(config)#interface serial 0/1/0 Controller2(config-if)#ip address 12.0.0.2 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface Serial0/3/0, changed state to up Controller2(config)#line console 0 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#line vty 0 4 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1 Appendix C For Controller 3: Router>enable Router#configure terminal Router(config)#hostname Base3 Controller2(config)#interface fastEthernet 0/0 Controller2(config-if)#ip address 14.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up Controller2(config)#interface fastEthernet 0/1
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.2, March 2015 69 Controller2(config-if)#ip address 15.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up Controller2(config)#interface serial 0/1/0 Controller2(config-if)#ip address 12.0.0.3 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface Serial0/3/0, changed state to up Controller2(config)#line console 0 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#line vty 0 4 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1 Authors Mohamed Khedr obtained his B.Sc. degree from the Arab Academy for Science and Technology, Alexandria, Egypt in 1997, the M.S. degree from same university in 2000, and the Ph.D. degree from Ottawa University, Ottawa, Canada in 2004, all in Electrical Engineering.From 1997 to 2000, He was a Graduate Teaching and research assistant at AAST, Alexandria, Egypt.From 2000 to 2004 He was a Graduate Teaching and research assistant at Ottawa University, Ottawa, Canada. From 2005 to 2009, he was an assistant Professor at AAST, Department of Electronic and communications Engineering, Alexandria, Egypt. Since January 2009, He has been an Associate professor at AAST, Department of Electronic and communications Engineering, Alexandria, Egypt.Since Fall 2005, has been an Adjunct Professor at Virginia Tech, USA. Mohamed S. Zaghloul was born in 1954 in Alex, Egypt, graduate as electrical engineer in 1977 has his master from Alexandria University in 1990 has his PhD in Surface Acoustic wave in 2002 he works as doctor at Arab academy for science and Technology in electronic and communication department . Mohamed I. El-Desoukywas born in 1989 in Alex, Egypt, graduate as electrical, Electronics and Communications engineer from The Arab Academy for Science, Technology and Maritime Transport in 2010, has started preparation his master from the same institute of graduation in 2011.