SlideShare a Scribd company logo
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
DOI : 10.5121/ijcnc.2015.7107 99
ADHOC MOBILE WIRELESS NETWORK
ENHANCEMENT BASED ON CISCO DEVICES
Mohamed E. Khedr, Mohamed S. Zaghloul and Mohamed I. El-Desouky
Department of Electronics and Communications, Arab Academy for Science, Tech. and
Maritime Transport, Alexandria, Egypt, BOX 1029
ABSTRACT
Adhoc wireless networks become one of the most researchable areas in the studying of routing protocols
depending on the Open System Interconnection (OSI Model). This paper use Cisco devices as a reference
to enhance the performance of the network. This enhancement will be due to high processing, reliability,
average cost, power consumption and accessibility. The aim of this research not only to get the cost down,
it also to choose a time to time device to process the data as rapid as it can. Using NAT, Access List and
DHCP protocols defined in Cisco (Graphical Unit Interface) GUI of the (Command Line Interface) CLI,
the task can be made.
KEYWORDS
Adhoc, Wireless Networks, Cisco Access Points, Adhoc using Cisco devices.
1.INTRODUCTION
Cisco a leading networking company all over the world right now with the highest sales rates all
over the world becomes the first premiere networks company in our time.[1] So, in this paper we
will define, illustrate and configure some of routing protocols,(Domain Name Server) DNS,
(Dynamic Host Configuration Protocol)DHCP and Access List (ACL) and (Network Address
Translation) NAT that can be used during the communication ways with all data packets of
sending and receiving processes. The usage of Cisco real routers and switches will give us an
advance in high data processing. So, our goal can be targeted definitely is the “Time” of sending,
receiving and acknowledgment due to the TCP/IP protocol called by 3 ways hand shake. In
addition use to the encryption and the last step using (Wi-Fi Protected Access) WPA/WPA2
technologies. [2]
2.ILLUSTRATING THE PROBLEM
Our main goal is not to make the adhoc terminal only under the coverage area and always
connected, but also with a very good communication timing during sending and receiving. Our
main problem that there are no coordinators in the schema. this is not a huge problem but can be
define it as advantage, that’s why all intermediate devices will be coordinators for the other end
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
100
devices and replication of the routing tables will be the major aid due to the geographical case of
adhoc terminals movements, though its remains a problem due to adhoc well defined protocol.
High security is the second main goal, but as known wireless networking security is weak a bit,
so this research will consider it step by step.
3.USED NETWORK’S DEVICES
Networks devices are needed in this paper to be selected due to certain specifications for
outdoors, indoors and controllers.
1.Indoors (end points): Aironet 3700 Series (Power over Ethernet) (POE)
Fig.1. Aironet 3700 series
2.Outdoors (Coordinators):Aironet 1532E Series (Power over Ethernet) (POE)
Fig2. Aironet 1532E
3.Controllers (Routers): Catalyst 2800 series with 2 smart serial module, (2.4 and 5.0 GHz)
wireless module and Sim card module
Fig.3. Cisco 2800 Series Catalyst Router
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
101
4.Fast Ethernet and smart serial cables to connect controllers with outdoors
4.ESTIMATED SCHEMA TO DEAL WITH
To illustrate the whole case issue, a simulation software is used called “Cisco packet Tracer
V6.0.1”
Fig4. Whole Schema using simulation Packet Tracer
This whole schema shows how this paper will operate over 3 layers
1- Core Layer (Controllers)
2- Outdoor Coordinator
3- End points
And now it’s the time to prepare the devices for configuration but there are some protocols and
options that can be defined and considered.
5.NETWORK ADDRESS TRANSLATION (NAT):
To go to the Internet a public IP address must be available and it is unique all over the world. If
each host in the world required a unique public IP address, IPs will be run over a few years. But
by using Network Address Translation (NAT) huge number of IPs van be saved. So, NAT can be
defined: “NAT allows a host that does not have a valid registered IP address to communicate with
other hosts through the Internet”. For example a computer is assigned by private IP address of
10.0.0.9 and of course this address cannot be routed on the internet but you can still access the
internet. This is because your router (or modem) translates this address into a public IP address,
123.12.23.1.For example, before routing your data into the internet [3].
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
102
Fig5. NAT Illustration
Of course when a router receives a reply packet destined for 123.12.23.1 it will convert back to
the private IP 10.0.0.9 before sending that packet to source.
Suppose an organization has 500 end points but the Internet Service Provider (ISP) only gives 50
public IP addresses. It means that the organization can only allow 50 hosts to access the internet
at the same time. Here NAT comes to save this case!
One thing that should be noticed in real life, not all of end devices uses internet at the same time.
Using NAT can dynamically assign these 50 public IP addresses to those who really need them at
that time. This is called dynamic NAT.
But the above NAT solution does not solve the problem completely because in some days there
can be more than 50 end points using the network. In this case, only the first 50 people can access
internet, others must wait to their turns.
Another problem is, in fact, ISP only gives much lesser IP addresses than the number 50 because
each public IP is very precious now. To solve the two problems above, another feature of NAT
can be used: NAT Overload or sometimes called Port Address Translation(PAT) PAT permits
multiple devices on a local area network (LAN) to be mapped to a single public IP address with
different port numbers. Therefore, it’s also known as port address translation (PAT). When using
PAT, the router maintains unique source port numbers on the inside global IP address to
distinguish between translations. In the below example, each host is assigned to the same public
which is IP address 123.1.1.1 1 but with different port numbers (from 1000 to 1002).
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
103
Fig6. PAT Example
Table1: PAT Table
Inside Local Inside global
10.0.0.1 123.1.1.1:1000
10.0.0.2 123.1.1.1:1001
10.0.0.3 123.1.1.1:1003
Cisco uses the term inside local for the private IP addresses and inside global for the public IP
addresses replaced by the router. The outside host IP address can also be changed with NAT. The
outside global address represents the outside host with a public IP address that can be used for
routing in the public Internet. NAT will be used while configuring the devices
6.ACCESS LIST CONTROL
Access control lists (ACLs) is equivalent to packets filtering by allowing the coordinator or the
admin to permit or deny IP packets from specific end point of interface. To use ACLs, the system
administrator must first configure ACLs and then apply them to specific interfaces. There are 3
popular types of ACL: Standard, Extended and Named ACLs [4].
And will be used to configure the devices.
7.IEEE 802.11 STANDARDS
At the time, there are 3 foundations effect on wireless LAN standards all over the world [5] and
listed as bellow:
- ITU-R: is responsible for allocation of the RF bands
- IEEE: specifies how RF is modulated to transfer data
- Wi-Fi Alliance: improves the interoperability of wireless products among vendors but the most
popular type of wireless LAN today is based on the IEEE 802.11 standard, which is known
informally as Wi-Fi. Access points can support several or all of the three most popular IEEE
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
104
WLAN standards including 802.11a, 802.11b and 802.11g. WLAN has two basic modes of
operation: Ad-hoc mode In this mode devices send data directly to each other and the
Infrastructure mode and used to Connect to a wired LAN, supports two modes (service sets):
Basic Service Set (BSS): uses only a single AP to create a WLAN and Extended Service Set
(ESS): uses more than one AP to create a WLAN, allows roaming in a larger area than a single
AP. [6]
8.ORTHOGONAL DIVISION MULTIPLEXING (OFDM)
The purpose is to encode a single transmission into multiple subcarriers to save bandwidth.
OFDM selects channels that overlap but do not interfere with each other by selecting the
frequencies of the subcarriers so that at each subcarrier frequency, all other subcarriers do not
contribute to overall waveform. In the picture below, notice that only the peaks of each subcarrier
carry data. [7] At the peak of each of the subcarriers, the other two subcarriers have zero
amplitude.
Fig7. OFDM Sub-carriers
9.DIRECT SEQUENCE SPREAD SPECTRUM (DSSS)
This method transmits the signal over a wider frequency band than required by multiplying the
original user data with a pseudo random spreading code. The result is a wide-band signal which is
very “durable” to noise. Even some bits in this signal are damaged during transmission; some
statistical techniques can recover the original data without the need for retransmission. [8]
Note: Spread spectrum here means the bandwidth used to transfer data is much wider than the
bandwidth needs to transfer that data. Traditional communication systems use narrowband
signal to transfer data because the required bandwidth is minimum but the signal must have
high power to cope with noise.[9] Spread Spectrum does the opposite way when transmitting
the signal with much lower power level (can transmit below the noise level) but with much
wider bandwidth. Even if the noise affects some parts of the signal, the receiver can easily
recover the original data with some algorithms.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
105
Fig8. DSSS wave form [10]
The 2.4 GHz band has a bandwidth of 82 MHz, with a range from 2.402 GHz to 2.483 GHz. In
the USA, this band has 11 different overlapping DSSS channels while in some other countries it
can have up to 14 channels. Channels 1, 6 and 11 have least interference with each other so they
are preferred over other channels.
Fig.9. DSSS Channel Overlapping for Wi-Fi [11]
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
106
10.DEVICES CONFIGURATIONS
Table 2 devices and interfaces IPs
Device/interface IP Address+
Subnet mask
Adhoc 1 15.15.15.15
255.0.0.0
Adhoc 2 15.15.15.16
255.0.0.0
Adhoc 3 15.15.15.17
255.0.0.0
Adhoc 4 15.15.15.18
255.0.0.0
Cont1:fa0/0 10.0.0.1
255.0.0.0
Cont:s0/3/0 12.0.0.1
255.0.0.0
Cont2:fa0/0 13.0.0.1
255.0.0.0
Cont2:s0/1/0 12.0.0.2
255.0.0.0
For Controller 1:
As shown in Appendix A
For Controller 2:
As shown in Appendix B
Coordinator (intermediate access point) Configuration
SSID (System Set Identifier): Coordinator
Key: adhocproject
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
107
Fig.10. SSID and Pass Key
Connection Type: PPPOE (point to point over Ethernet)
Fig.11. PPPOE Connection Type
Wireless Security
SSID (System Set Identifier): Coordinator
Key: adhocproject
Fig.12. SSID and Pass Key after Connection
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
108
Access List Control (ACL)
Fig.13. ACL Configuration
End Point Configuration
1st
End Point IP Address 192.168.1.2
Subnet mask 255.255.255.0
Fig.13. 1st
Adhoc Endpoint
2nd
End Point IP Address 192.168.1.103
Subnet mast 255.255.255.0
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
109
Fig.14. 2nd
Adhoc End Point
3rd End Point IP Address 192.168.1.102
Subnet mast 255.255.255.0
Fig.15. 3rd
Adhoc End Point
4th
End Point IP Address 192.168.1.102
Subnet mast 255.255.255.0
Fig.16. 4th
Adhoc End Point
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
110
CONCLUSIONS
Adhoc wireless network can be especially applied in enterprise business compounds or military
campuses. The desired design was limited into 3 stages (Core Layer, Intermediate Layer and the
Endpoint Layer), in every layer a commands were placed to let the device work probably and use
the right routing protocol (Static routing is used in this paper). So, the 3 layers can communicate
with each other. In the other hand, the adhoc mobile end points don’t need to route the sent
message to the core layer, its waste of time by 66 msec. In our case it just sends the message to
the coordinator and it has the lead to distribute the message to the destination end point.
References
[1] http://www.cisco.com/c/en/us/products/wireless/buyers-guide.html
[2] Sharam Hekmat, Communication Networks, 2011
[3] Robert Faludi, A Practical Guide to networking protocols, Building wireless networks, 2013
[4] Patric egilopacovic, Wireless networking, building AdHoc networks.802.11 a/b/g/n techniques, April
2011.
[5] Yi-Bing Lin & Imrich Chlamtac, Wireless and Mobile network architectures, 2012
[6] Andrew S. Tanenbaum, Computer Networks, Sixth Edition, 2013
[7] Simon Haykin, Communication Systems, fifth edition, 2014
[8] J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach Featuring the Internet,
2014
[9] Andrew S.Tanenbaum, Computer Network, 2012
[10] J. Walrand & P. Varaiya, High-Performance Communication Networks, 2014
[11] Wendell Odom,Cisco CCNA Exam# 200-120 Certification Guide, Cisco Systems, 2014
Appendix A
Controller (Routers) Configuration
For Controller 1:
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname Controller 1
Controller1(config)#interface fastEthernet 0/0
Controller1(config-if)#ip address 10.0.0.1 255.0.0.0
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller1(config-if)#ip address 11.0.0.1 255.0.0.0
Controller1(config-if)#no shutdown
Controller1(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller1(config)#interface serial 0/3/0
Controller1(config-if)#ip address 12.0.0.1 255.0.0.0
Controller1(config-if)#clock rate 64000
Controller1(config-if)#no shutdown
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
111
Controller1(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller1(config)#line console 0
Controller1(config-line)#password adhoc1admin
Controller1(config-line)#login
Controller1(config)#line vty 0 4
Controller1(config-line)#password adhoc1admin
Controller1(config-line)#login
Controller1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2
Appendix B
For Controller 2:
Router>en
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#hostname Controller2
Controller2(config)#interface fastEthernet 0/0
Controller2(config-if)#ip address 13.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
Controller2(config)#interface fastEthernet 0/1
Controller2(config-if)#ip address 14.0.0.1 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up
Controller2(config)#interface serial 0/1/0
Controller2(config-if)#ip address 12.0.0.2 255.0.0.0
Controller2(config-if)#no shutdown
Controller2(config-if)#
%LINK-5-CHANGED: Interface Serial0/3/0, changed state to up
Controller2(config)#line console 0
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#line vty 0 4
Controller2(config-line)#password adhoc1admin
Controller2(config-line)#login
Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015
112
Authors
Mohamed Khedr obtained his B.Sc. degree from the Arab Academy for Science and
Technology, Alexandria, Egypt in 1997, the M.S. degree from same university in 2000, and
the Ph.D. degree from Ottawa University, Ottawa, Canada in 2004, all in Electrical
Engineering.From 1997 to 2000, He was a Graduate Teaching and research assistant at
AAST, Alexandria, Egypt.From 2000 to 2004 He was a Graduate Teaching and research assistant at
Ottawa University, Ottawa, Canada.From 2005 to 2009, he was an assistant Professor at AAST,
Department of Electronic and communications Engineering, Alexandria, Egypt.Since January 2009, He has
been an Associate professor at AAST, Department of Electronic and communications Engineering,
Alexandria, Egypt.Since Fall 2005, has been an Adjunct Professor at Virginia Tech, USA
Mohamed S. Zaghloul was born in 1954 in Alex, Egypt, graduate as electrical
engineer in 1977 has his master from Alexandria University in 1990 has his PhD in
Surface Acoustic wave in 2002 he works as doctor at Arab academy for science and
Technology in electronic and communication department
Mohamed I. El-Desouky was born in 1989 in Alex, Egypt, graduate as electrical,
Electronics and Communications engineer from The Arab Academy for Science,
Technology and Maritime Transport in 2010, has started preparation his master from the
same institute of graduation in 2011.

More Related Content

PDF
Ccna interview questions
Sanjay Thakare
 
PDF
C n practical file
Soumya Behera
 
PDF
CCNA project-report
Sagar Shashank
 
PPTX
Basic networking
ajeeshr3
 
PDF
Network th ITM3
Aram Mohammed
 
PPT
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Eric Vanderburg
 
PDF
CCNA Report
Abhishek Parihari
 
PDF
Top 20 ccna interview questions and answers pdf
Hub4Tech.com
 
Ccna interview questions
Sanjay Thakare
 
C n practical file
Soumya Behera
 
CCNA project-report
Sagar Shashank
 
Basic networking
ajeeshr3
 
Network th ITM3
Aram Mohammed
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Eric Vanderburg
 
CCNA Report
Abhishek Parihari
 
Top 20 ccna interview questions and answers pdf
Hub4Tech.com
 

What's hot (19)

PDF
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
PPT
Ccna Presentation
bcdran
 
PPTX
Local Area Network – Wired LAN
Raj vardhan
 
PPTX
Ecet375 1 a - basic networking concepts
Ralph Ambuehl
 
PDF
Networking Basics
Carlo Fonda
 
PPT
Presentation on basic networking
qshamim07
 
PPT
Networking
Rashmi
 
PPT
Ccna report
Surender Singh
 
PPTX
Fragmentation
Shashwat Shriparv
 
PDF
Ccna notes
Ramesh Kumar
 
DOCX
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Vanitha Joshi
 
PPT
Ipv4 ppt
Sonal Chandel
 
PDF
Ccna 1 4
Vahdet Shehu
 
PPTX
Network Engineer Interview Questions with Answers
Sarmad Ali
 
DOCX
Class-note-data communications-01
Md. Abdur Rahim Khan
 
DOCX
Ccnafile
Shefali Garg
 
PPTX
A presentation on networking and ccna
vivek kumar
 
DOCX
Networking tools
Stephanie Joy Gamuyao
 
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
Ccna Presentation
bcdran
 
Local Area Network – Wired LAN
Raj vardhan
 
Ecet375 1 a - basic networking concepts
Ralph Ambuehl
 
Networking Basics
Carlo Fonda
 
Presentation on basic networking
qshamim07
 
Networking
Rashmi
 
Ccna report
Surender Singh
 
Fragmentation
Shashwat Shriparv
 
Ccna notes
Ramesh Kumar
 
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Vanitha Joshi
 
Ipv4 ppt
Sonal Chandel
 
Ccna 1 4
Vahdet Shehu
 
Network Engineer Interview Questions with Answers
Sarmad Ali
 
Class-note-data communications-01
Md. Abdur Rahim Khan
 
Ccnafile
Shefali Garg
 
A presentation on networking and ccna
vivek kumar
 
Networking tools
Stephanie Joy Gamuyao
 
Ad

Viewers also liked (19)

PDF
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
IJCNCJournal
 
PDF
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
IJCNCJournal
 
PDF
Evaluation of a topological distance
IJCNCJournal
 
PDF
Multipath qos aware routing protocol
IJCNCJournal
 
PDF
Wormhole attack mitigation in manet a
IJCNCJournal
 
PDF
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
IJCNCJournal
 
PDF
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
IJCNCJournal
 
PDF
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
IJCNCJournal
 
PDF
Energy efficient clustering in heterogeneous
IJCNCJournal
 
PDF
Regressive admission control enabled by real time qos measurements
IJCNCJournal
 
PDF
Evaluation of scalability and bandwidth
IJCNCJournal
 
PDF
A novel secure e contents system for multi-media interchange workflows in e-l...
IJCNCJournal
 
PDF
Managing, searching, and accessing iot devices
IJCNCJournal
 
PDF
The improvement of end to end delays in network management system using netwo...
IJCNCJournal
 
PDF
Concepts and evolution of research in the field of wireless sensor networks
IJCNCJournal
 
PDF
Distributed firewalls and ids interoperability checking based on a formal app...
IJCNCJournal
 
PDF
A novel algorithm for tcp timeout
IJCNCJournal
 
PDF
Infrastructure of services for a smart city
IJCNCJournal
 
PDF
Priority scheduling for multipath video transmission in wmsns
IJCNCJournal
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
IJCNCJournal
 
AN OPTIMAL FUZZY LOGIC SYSTEM FOR A NONLINEAR DYNAMIC SYSTEM USING A FUZZY BA...
IJCNCJournal
 
Evaluation of a topological distance
IJCNCJournal
 
Multipath qos aware routing protocol
IJCNCJournal
 
Wormhole attack mitigation in manet a
IJCNCJournal
 
A method of evaluating effect of qo s degradation on multidimensional qoe of ...
IJCNCJournal
 
Performance comparison of coded and uncoded ieee 802.16 d systems under stanf...
IJCNCJournal
 
COST-EFFICIENT RESIDENTIAL ENERGY MANAGEMENT SCHEME FOR INFORMATION-CENTRIC N...
IJCNCJournal
 
Energy efficient clustering in heterogeneous
IJCNCJournal
 
Regressive admission control enabled by real time qos measurements
IJCNCJournal
 
Evaluation of scalability and bandwidth
IJCNCJournal
 
A novel secure e contents system for multi-media interchange workflows in e-l...
IJCNCJournal
 
Managing, searching, and accessing iot devices
IJCNCJournal
 
The improvement of end to end delays in network management system using netwo...
IJCNCJournal
 
Concepts and evolution of research in the field of wireless sensor networks
IJCNCJournal
 
Distributed firewalls and ids interoperability checking based on a formal app...
IJCNCJournal
 
A novel algorithm for tcp timeout
IJCNCJournal
 
Infrastructure of services for a smart city
IJCNCJournal
 
Priority scheduling for multipath video transmission in wmsns
IJCNCJournal
 
Ad

Similar to Adhoc mobile wireless network enhancement based on cisco devices (20)

PDF
Comparative study of various voip applications in 802.11 a wireless network s...
ijmnct
 
PPT
Ccna1 presentation
Shantnu Matharoo
 
PPT
Ccna day1
Sanjeev Jain
 
PPT
C C N A Day1
darulquthni
 
PPT
Ccna day1
Nazmi Deligözoğlu
 
PPT
Ccna day1
Dwi Yulianto
 
PPT
networking1.ppt
ChinmayWaingankar3
 
PPT
Basic networking hardware pre final 1
Sujee Antony
 
DOCX
Networking Related
ZunAib Ali
 
PPTX
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
PPT
2.Introduction to Network Devices.ppt
jaba kumar
 
PDF
The Network Ip Address Scheme
Erin Rivera
 
PDF
Introduction to networking
Mohsen Sarakbi
 
PDF
Siemens Industrial Training
Srinidhi Bheesette
 
PPT
Chapter1ccna
ernestlithur
 
PPT
Chapter1ccna
ernestlithur
 
DOCX
computer network NCC l4dc assingment
David Parker
 
PDF
Computer Networking 2
kiamiel
 
PPTX
Computer networking class 12
LakshyaT
 
PPT
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Soumen Santra
 
Comparative study of various voip applications in 802.11 a wireless network s...
ijmnct
 
Ccna1 presentation
Shantnu Matharoo
 
Ccna day1
Sanjeev Jain
 
C C N A Day1
darulquthni
 
Ccna day1
Dwi Yulianto
 
networking1.ppt
ChinmayWaingankar3
 
Basic networking hardware pre final 1
Sujee Antony
 
Networking Related
ZunAib Ali
 
pppppppppppppppppjjjjjjjjjjjpppppppp.pptx
zeyadosama505
 
2.Introduction to Network Devices.ppt
jaba kumar
 
The Network Ip Address Scheme
Erin Rivera
 
Introduction to networking
Mohsen Sarakbi
 
Siemens Industrial Training
Srinidhi Bheesette
 
Chapter1ccna
ernestlithur
 
Chapter1ccna
ernestlithur
 
computer network NCC l4dc assingment
David Parker
 
Computer Networking 2
kiamiel
 
Computer networking class 12
LakshyaT
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Soumen Santra
 

More from IJCNCJournal (20)

PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
PDF
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
IJCNCJournal
 
PDF
Classification of Network Traffic using Machine Learning Models on the NetML ...
IJCNCJournal
 
PDF
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
PDF
Energy Efficient Virtual MIMO Communication Designed for Cluster based on Coo...
IJCNCJournal
 
PDF
An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless ...
IJCNCJournal
 
PDF
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
PDF
Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Pe...
IJCNCJournal
 
PDF
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
IJCNCJournal
 
PDF
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
PDF
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
PDF
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
PDF
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
IJCNCJournal
 
PDF
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
IJCNCJournal
 
PDF
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
PDF
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
PDF
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
PDF
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
IJCNCJournal
 
Classification of Network Traffic using Machine Learning Models on the NetML ...
IJCNCJournal
 
A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc N...
IJCNCJournal
 
Energy Efficient Virtual MIMO Communication Designed for Cluster based on Coo...
IJCNCJournal
 
An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless ...
IJCNCJournal
 
Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental ...
IJCNCJournal
 
Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Pe...
IJCNCJournal
 
A Framework for Securing Personal Data Shared by Users on the Digital Platforms
IJCNCJournal
 
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 
Enhancement of Quality of Service in Underwater Wireless Sensor Networks
IJCNCJournal
 
Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks
IJCNCJournal
 
Developing a Secure and Transparent Blockchain System for Fintech with Fintru...
IJCNCJournal
 
Visually Image Encryption and Compression using a CNN-Based Autoencoder
IJCNCJournal
 
Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their A...
IJCNCJournal
 
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
IJCNCJournal
 

Recently uploaded (20)

PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Software Development Methodologies in 2025
KodekX
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
The Future of Artificial Intelligence (AI)
Mukul
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 

Adhoc mobile wireless network enhancement based on cisco devices

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 DOI : 10.5121/ijcnc.2015.7107 99 ADHOC MOBILE WIRELESS NETWORK ENHANCEMENT BASED ON CISCO DEVICES Mohamed E. Khedr, Mohamed S. Zaghloul and Mohamed I. El-Desouky Department of Electronics and Communications, Arab Academy for Science, Tech. and Maritime Transport, Alexandria, Egypt, BOX 1029 ABSTRACT Adhoc wireless networks become one of the most researchable areas in the studying of routing protocols depending on the Open System Interconnection (OSI Model). This paper use Cisco devices as a reference to enhance the performance of the network. This enhancement will be due to high processing, reliability, average cost, power consumption and accessibility. The aim of this research not only to get the cost down, it also to choose a time to time device to process the data as rapid as it can. Using NAT, Access List and DHCP protocols defined in Cisco (Graphical Unit Interface) GUI of the (Command Line Interface) CLI, the task can be made. KEYWORDS Adhoc, Wireless Networks, Cisco Access Points, Adhoc using Cisco devices. 1.INTRODUCTION Cisco a leading networking company all over the world right now with the highest sales rates all over the world becomes the first premiere networks company in our time.[1] So, in this paper we will define, illustrate and configure some of routing protocols,(Domain Name Server) DNS, (Dynamic Host Configuration Protocol)DHCP and Access List (ACL) and (Network Address Translation) NAT that can be used during the communication ways with all data packets of sending and receiving processes. The usage of Cisco real routers and switches will give us an advance in high data processing. So, our goal can be targeted definitely is the “Time” of sending, receiving and acknowledgment due to the TCP/IP protocol called by 3 ways hand shake. In addition use to the encryption and the last step using (Wi-Fi Protected Access) WPA/WPA2 technologies. [2] 2.ILLUSTRATING THE PROBLEM Our main goal is not to make the adhoc terminal only under the coverage area and always connected, but also with a very good communication timing during sending and receiving. Our main problem that there are no coordinators in the schema. this is not a huge problem but can be define it as advantage, that’s why all intermediate devices will be coordinators for the other end
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 100 devices and replication of the routing tables will be the major aid due to the geographical case of adhoc terminals movements, though its remains a problem due to adhoc well defined protocol. High security is the second main goal, but as known wireless networking security is weak a bit, so this research will consider it step by step. 3.USED NETWORK’S DEVICES Networks devices are needed in this paper to be selected due to certain specifications for outdoors, indoors and controllers. 1.Indoors (end points): Aironet 3700 Series (Power over Ethernet) (POE) Fig.1. Aironet 3700 series 2.Outdoors (Coordinators):Aironet 1532E Series (Power over Ethernet) (POE) Fig2. Aironet 1532E 3.Controllers (Routers): Catalyst 2800 series with 2 smart serial module, (2.4 and 5.0 GHz) wireless module and Sim card module Fig.3. Cisco 2800 Series Catalyst Router
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 101 4.Fast Ethernet and smart serial cables to connect controllers with outdoors 4.ESTIMATED SCHEMA TO DEAL WITH To illustrate the whole case issue, a simulation software is used called “Cisco packet Tracer V6.0.1” Fig4. Whole Schema using simulation Packet Tracer This whole schema shows how this paper will operate over 3 layers 1- Core Layer (Controllers) 2- Outdoor Coordinator 3- End points And now it’s the time to prepare the devices for configuration but there are some protocols and options that can be defined and considered. 5.NETWORK ADDRESS TRANSLATION (NAT): To go to the Internet a public IP address must be available and it is unique all over the world. If each host in the world required a unique public IP address, IPs will be run over a few years. But by using Network Address Translation (NAT) huge number of IPs van be saved. So, NAT can be defined: “NAT allows a host that does not have a valid registered IP address to communicate with other hosts through the Internet”. For example a computer is assigned by private IP address of 10.0.0.9 and of course this address cannot be routed on the internet but you can still access the internet. This is because your router (or modem) translates this address into a public IP address, 123.12.23.1.For example, before routing your data into the internet [3].
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 102 Fig5. NAT Illustration Of course when a router receives a reply packet destined for 123.12.23.1 it will convert back to the private IP 10.0.0.9 before sending that packet to source. Suppose an organization has 500 end points but the Internet Service Provider (ISP) only gives 50 public IP addresses. It means that the organization can only allow 50 hosts to access the internet at the same time. Here NAT comes to save this case! One thing that should be noticed in real life, not all of end devices uses internet at the same time. Using NAT can dynamically assign these 50 public IP addresses to those who really need them at that time. This is called dynamic NAT. But the above NAT solution does not solve the problem completely because in some days there can be more than 50 end points using the network. In this case, only the first 50 people can access internet, others must wait to their turns. Another problem is, in fact, ISP only gives much lesser IP addresses than the number 50 because each public IP is very precious now. To solve the two problems above, another feature of NAT can be used: NAT Overload or sometimes called Port Address Translation(PAT) PAT permits multiple devices on a local area network (LAN) to be mapped to a single public IP address with different port numbers. Therefore, it’s also known as port address translation (PAT). When using PAT, the router maintains unique source port numbers on the inside global IP address to distinguish between translations. In the below example, each host is assigned to the same public which is IP address 123.1.1.1 1 but with different port numbers (from 1000 to 1002).
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 103 Fig6. PAT Example Table1: PAT Table Inside Local Inside global 10.0.0.1 123.1.1.1:1000 10.0.0.2 123.1.1.1:1001 10.0.0.3 123.1.1.1:1003 Cisco uses the term inside local for the private IP addresses and inside global for the public IP addresses replaced by the router. The outside host IP address can also be changed with NAT. The outside global address represents the outside host with a public IP address that can be used for routing in the public Internet. NAT will be used while configuring the devices 6.ACCESS LIST CONTROL Access control lists (ACLs) is equivalent to packets filtering by allowing the coordinator or the admin to permit or deny IP packets from specific end point of interface. To use ACLs, the system administrator must first configure ACLs and then apply them to specific interfaces. There are 3 popular types of ACL: Standard, Extended and Named ACLs [4]. And will be used to configure the devices. 7.IEEE 802.11 STANDARDS At the time, there are 3 foundations effect on wireless LAN standards all over the world [5] and listed as bellow: - ITU-R: is responsible for allocation of the RF bands - IEEE: specifies how RF is modulated to transfer data - Wi-Fi Alliance: improves the interoperability of wireless products among vendors but the most popular type of wireless LAN today is based on the IEEE 802.11 standard, which is known informally as Wi-Fi. Access points can support several or all of the three most popular IEEE
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 104 WLAN standards including 802.11a, 802.11b and 802.11g. WLAN has two basic modes of operation: Ad-hoc mode In this mode devices send data directly to each other and the Infrastructure mode and used to Connect to a wired LAN, supports two modes (service sets): Basic Service Set (BSS): uses only a single AP to create a WLAN and Extended Service Set (ESS): uses more than one AP to create a WLAN, allows roaming in a larger area than a single AP. [6] 8.ORTHOGONAL DIVISION MULTIPLEXING (OFDM) The purpose is to encode a single transmission into multiple subcarriers to save bandwidth. OFDM selects channels that overlap but do not interfere with each other by selecting the frequencies of the subcarriers so that at each subcarrier frequency, all other subcarriers do not contribute to overall waveform. In the picture below, notice that only the peaks of each subcarrier carry data. [7] At the peak of each of the subcarriers, the other two subcarriers have zero amplitude. Fig7. OFDM Sub-carriers 9.DIRECT SEQUENCE SPREAD SPECTRUM (DSSS) This method transmits the signal over a wider frequency band than required by multiplying the original user data with a pseudo random spreading code. The result is a wide-band signal which is very “durable” to noise. Even some bits in this signal are damaged during transmission; some statistical techniques can recover the original data without the need for retransmission. [8] Note: Spread spectrum here means the bandwidth used to transfer data is much wider than the bandwidth needs to transfer that data. Traditional communication systems use narrowband signal to transfer data because the required bandwidth is minimum but the signal must have high power to cope with noise.[9] Spread Spectrum does the opposite way when transmitting the signal with much lower power level (can transmit below the noise level) but with much wider bandwidth. Even if the noise affects some parts of the signal, the receiver can easily recover the original data with some algorithms.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 105 Fig8. DSSS wave form [10] The 2.4 GHz band has a bandwidth of 82 MHz, with a range from 2.402 GHz to 2.483 GHz. In the USA, this band has 11 different overlapping DSSS channels while in some other countries it can have up to 14 channels. Channels 1, 6 and 11 have least interference with each other so they are preferred over other channels. Fig.9. DSSS Channel Overlapping for Wi-Fi [11]
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 106 10.DEVICES CONFIGURATIONS Table 2 devices and interfaces IPs Device/interface IP Address+ Subnet mask Adhoc 1 15.15.15.15 255.0.0.0 Adhoc 2 15.15.15.16 255.0.0.0 Adhoc 3 15.15.15.17 255.0.0.0 Adhoc 4 15.15.15.18 255.0.0.0 Cont1:fa0/0 10.0.0.1 255.0.0.0 Cont:s0/3/0 12.0.0.1 255.0.0.0 Cont2:fa0/0 13.0.0.1 255.0.0.0 Cont2:s0/1/0 12.0.0.2 255.0.0.0 For Controller 1: As shown in Appendix A For Controller 2: As shown in Appendix B Coordinator (intermediate access point) Configuration SSID (System Set Identifier): Coordinator Key: adhocproject
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 107 Fig.10. SSID and Pass Key Connection Type: PPPOE (point to point over Ethernet) Fig.11. PPPOE Connection Type Wireless Security SSID (System Set Identifier): Coordinator Key: adhocproject Fig.12. SSID and Pass Key after Connection
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 108 Access List Control (ACL) Fig.13. ACL Configuration End Point Configuration 1st End Point IP Address 192.168.1.2 Subnet mask 255.255.255.0 Fig.13. 1st Adhoc Endpoint 2nd End Point IP Address 192.168.1.103 Subnet mast 255.255.255.0
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 109 Fig.14. 2nd Adhoc End Point 3rd End Point IP Address 192.168.1.102 Subnet mast 255.255.255.0 Fig.15. 3rd Adhoc End Point 4th End Point IP Address 192.168.1.102 Subnet mast 255.255.255.0 Fig.16. 4th Adhoc End Point
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 110 CONCLUSIONS Adhoc wireless network can be especially applied in enterprise business compounds or military campuses. The desired design was limited into 3 stages (Core Layer, Intermediate Layer and the Endpoint Layer), in every layer a commands were placed to let the device work probably and use the right routing protocol (Static routing is used in this paper). So, the 3 layers can communicate with each other. In the other hand, the adhoc mobile end points don’t need to route the sent message to the core layer, its waste of time by 66 msec. In our case it just sends the message to the coordinator and it has the lead to distribute the message to the destination end point. References [1] http://www.cisco.com/c/en/us/products/wireless/buyers-guide.html [2] Sharam Hekmat, Communication Networks, 2011 [3] Robert Faludi, A Practical Guide to networking protocols, Building wireless networks, 2013 [4] Patric egilopacovic, Wireless networking, building AdHoc networks.802.11 a/b/g/n techniques, April 2011. [5] Yi-Bing Lin & Imrich Chlamtac, Wireless and Mobile network architectures, 2012 [6] Andrew S. Tanenbaum, Computer Networks, Sixth Edition, 2013 [7] Simon Haykin, Communication Systems, fifth edition, 2014 [8] J. F. Kurose and W. R. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, 2014 [9] Andrew S.Tanenbaum, Computer Network, 2012 [10] J. Walrand & P. Varaiya, High-Performance Communication Networks, 2014 [11] Wendell Odom,Cisco CCNA Exam# 200-120 Certification Guide, Cisco Systems, 2014 Appendix A Controller (Routers) Configuration For Controller 1: Router>en Router#config t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname Controller 1 Controller1(config)#interface fastEthernet 0/0 Controller1(config-if)#ip address 10.0.0.1 255.0.0.0 Controller1(config-if)#no shutdown Controller1(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up Controller1(config-if)#ip address 11.0.0.1 255.0.0.0 Controller1(config-if)#no shutdown Controller1(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up Controller1(config)#interface serial 0/3/0 Controller1(config-if)#ip address 12.0.0.1 255.0.0.0 Controller1(config-if)#clock rate 64000 Controller1(config-if)#no shutdown
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 111 Controller1(config-if)# %LINK-5-CHANGED: Interface Serial0/3/0, changed state to up Controller1(config)#line console 0 Controller1(config-line)#password adhoc1admin Controller1(config-line)#login Controller1(config)#line vty 0 4 Controller1(config-line)#password adhoc1admin Controller1(config-line)#login Controller1(config)#ip route 13.0.0.0 255.0.0.0 12.0.0.2 Appendix B For Controller 2: Router>en Router#config t Enter configuration commands, one per line. End with CNTL/Z. Router(config)#hostname Controller2 Controller2(config)#interface fastEthernet 0/0 Controller2(config-if)#ip address 13.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up Controller2(config)#interface fastEthernet 0/1 Controller2(config-if)#ip address 14.0.0.1 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface FastEthernet0/1, changed state to up Controller2(config)#interface serial 0/1/0 Controller2(config-if)#ip address 12.0.0.2 255.0.0.0 Controller2(config-if)#no shutdown Controller2(config-if)# %LINK-5-CHANGED: Interface Serial0/3/0, changed state to up Controller2(config)#line console 0 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#line vty 0 4 Controller2(config-line)#password adhoc1admin Controller2(config-line)#login Controller2(config)#ip route 10.0.0.0 255.0.0.0 12.0.0.1
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.1, January 2015 112 Authors Mohamed Khedr obtained his B.Sc. degree from the Arab Academy for Science and Technology, Alexandria, Egypt in 1997, the M.S. degree from same university in 2000, and the Ph.D. degree from Ottawa University, Ottawa, Canada in 2004, all in Electrical Engineering.From 1997 to 2000, He was a Graduate Teaching and research assistant at AAST, Alexandria, Egypt.From 2000 to 2004 He was a Graduate Teaching and research assistant at Ottawa University, Ottawa, Canada.From 2005 to 2009, he was an assistant Professor at AAST, Department of Electronic and communications Engineering, Alexandria, Egypt.Since January 2009, He has been an Associate professor at AAST, Department of Electronic and communications Engineering, Alexandria, Egypt.Since Fall 2005, has been an Adjunct Professor at Virginia Tech, USA Mohamed S. Zaghloul was born in 1954 in Alex, Egypt, graduate as electrical engineer in 1977 has his master from Alexandria University in 1990 has his PhD in Surface Acoustic wave in 2002 he works as doctor at Arab academy for science and Technology in electronic and communication department Mohamed I. El-Desouky was born in 1989 in Alex, Egypt, graduate as electrical, Electronics and Communications engineer from The Arab Academy for Science, Technology and Maritime Transport in 2010, has started preparation his master from the same institute of graduation in 2011.