SlideShare a Scribd company logo
1 of 11
Friday, April 29, 2016
Workshop on
Wireless Adhoc Networks in Windows7
Setup and Applications
Instructor: Ali Nezhad
School of Engineering Technology and Applied
Science
Department of Information and Communication
Engineering Technology
Computer Systems and Network
1
Introduction
There are two kinds of Wireless Local Area Networks (WLAN); infrastructure and adhoc. You
most probably are familiar with the former and may have even been to our own workshop on
that topic. This workshop is focused on creating and using the latter in a Win7 environment.
Other versions of Windows are almost similarin this regard. It must be saidthat WiFi (IEEE802.11)
is the dominant protocol as far as WLANs are concerned but adhoc networks may be built using
other wireless technologies such as Bluetooth, Zigbee, etc.
Infrastructure vs. adhoc
In an infrastructure WLAN, wireless devices connect to a central device known as a base station
(a.k.a access point among other names). The most familiar example of such a network is your
WiFi network at home. The residential gateway, commonly known as router, is the access point
in your network, which all your wireless devices such as mobile phones, laptops and tablets
connect to in a star formation and can also allow Internet access through a modem connected to
your Internet Service Provider (ISP).
INTERNET
Figure.1 Infrastructure WLAN
2
An adhoc wireless network on the other hand does not rely on a central access point. It allows
wireless devices to directly connect to each other and have the same role. The fact that these
networks do not rely on an infrastructure makes them ideal for extreme conditions such as
exploration, disaster recovery, etc.
In this workshop you will learn how to create an adhoc wireless network using two Win7 laptops
and then use it to share files between them. Furthermore, you will learn how to let one laptop
to connect to the Internet indirectly via the other laptop if it is connected to the Internet. Printer
sharing is another useful application but we will not attempt that.
Figure.2 Adhoc WLAN
IP Addressing and Subnetting
Before we start, let’s talk briefly about IP addresses. In a network, every device needs to be
somehow identified so that information may be delivered to it from other devices exactly like the
mailing system. In fact, a single device may have multiple IP addresses, one for each of its
networking interfaces. At this time, the dominant systemfor this purpose is called IPv4 and each
device in the network is identified by an IPv4 address or simply an IP address. Also, in the same
way that a city is divide up into many postal zones, a big network can be divided into subnetworks
or simply subnets. A subnet has an address of its own as well. In fact, eachIP address is comprised
of two main parts; a subnet ID and a host (meaning the device) ID. You can think of these as the
city name and the house number in a mailing address.
3
An IPv4 address is actually a binary number consisting of 32 bits (1 or 0) and it also has an
equivalent decimal representation consisting of 4 decimal numbers (called octets) separated by
dots. In a big network, routers forwarding information packets only care about the subnet portion
of an IP address not the host portion exactly the same way a mail sorter at a national post office
only cares about the city name not the house numbers. So, how does a router know which part
of an address is the subnet ID and which part is the host ID? The answer is by using a subnet
mask. A subnet mask looks very much like an IP address except it has all 1s in the subnet portion
and all 0s in the host portion. However, we usually use the decimal representation of that.
By default there are only three major groups of IP addresses called classes A, B and C.
A class A address has the default subnet mask of 255.0.0.0 which means the first octet is all 1s
and therefore the first octet in any such address identifies the subnet.
A class B address has the default subnet mask of 255.255.0.0 which means the first and the
second octets are all1s and therefore the first two octets in any suchaddress identify the subnet.
A class Caddress has the default subnet mask of 255.255.255.0 which means the firstthree octets
are all 1s and therefore the first three octets in any such address identify the subnet.
Example:
192.168.1.1 with a subnet mask of 255.255.255.0 is a class C address and the subnet ID is
192.168.1.0.
Note: Two devices that belong to the same network share the same subnet ID and the same
subnet mask. For example, another device in the above network may have an address of
192.168.1.12.
4
Objective
Enable 2 wireless laptops to share their files and also share a single Internet connection.
Procedure
A. Preparations
1- Each group is given 2 laptops. Log into your laptops with the password “wireless”.
2- Take note of the names of your PCs (e.g. CNET324-PC1) by going to
control panel  system & security  system
Computer1_Name: …………………… Computer2_Name: ……………………..
Figure.3 Computer name and other properties
3- Confirm that the wireless interfaces of both PCs are configured to obtain an IP address
automatically not manually. This will allow Windows to properly configure IP addresses
so that both laptops will belong to the same subnet and can communicate.
5
Figure.4 IP addressing mode
B. Create an Adhoc Network
1- On one laptop, do the following:
Control panel  Network & Internet  Manage Wireless Networks  Add  create an adhocnetwork.
Figure.5 Adding a Wireless Network
6
2- Give it a name such as adhoc1 for PC1.
3- Choose the security type. WPA2 is the preferred mode. Provide a security key which you will
remember.
Figure.6 Configuring the name and security mode of the adhoc network
Write your security key here: ……………………
4- At this point you can turn file sharing on or off. We will keep this at its default mode which is on.
C. Join the Adhoc Network
1- On both PCs join the adhoc wireless network. The PC which did not create the adhoc
network will have to provide the password which was configured by the other PC.
7
Figure.7 Connect to the adhoc network
Note: First stop the PCs from automatically joining the CCwGuest, CCwSecure or any other
network. Otherwise, your work may be periodically interrupted as the connection jumps from
your adhoc network to another network automatically.
Figure.8 Prevent automaticconnections
8
2- Launch a command prompt buy running “cmd” from the Windows Start menu.
3- Using the command “ipconfig” Verify that windows has provided both PCs with IP
addresses in the same subnet.
Figure.9 Find the IP address of your wireless interface
What are the IP addresses and the subnet masks of the wireless interfaces of your PCs?
Computer Name: IP Address: Mask:
Computer Name: IP Address: Mask:
9
D. File Sharing
1- In Windows Explorer locate your peer PC under “Network”.
2- Browse the files on the peer PC. You can even stream a video or audio file.
Figure.10 Accessing files on the peer PC
E. Internet Sharing
If one of the devices has an extra networking interface it can allow the peer PC to use that
too. In this experiment we will enable one PC to share the Ethernet interface of the peer PC.
We will then connect that Ethernet interface to the Internet and allow the peer PC to gain
access as well.
Figure.11 Sharing a single Internet connection
Ethernet
10
1- Configure the LAN interface for automatic IP addressing as you did in the preparation
step for the wireless interface.
2- At the same time, share this interface with other devices.
Figure.12 Allow sharing of the wired LAN interface
3- Test that both PCs can access websites on the Internet.
Free Practice
If there is time, feel free to experiment. For instance, join another group and try to
add three or 4 laptops to the same wireless ad hoc network.

More Related Content

What's hot

IP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor TrainingIP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor TrainingAndrew Smith
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless TechnologyNetwax Lab
 
Assigning a static IP Address
Assigning a static IP AddressAssigning a static IP Address
Assigning a static IP Addressjuliemae123
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentationmuhammad amir
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of networkKak Yong
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingVivek chan
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8Nil Menon
 
Assigning ip adress
Assigning ip adressAssigning ip adress
Assigning ip adressHiie XD
 
Ip addressing
Ip addressingIp addressing
Ip addressingsid1322
 

What's hot (20)

IP Address
IP AddressIP Address
IP Address
 
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor TrainingIP Addressing - chapter 7 of Free CCNA1 Instructor Training
IP Addressing - chapter 7 of Free CCNA1 Instructor Training
 
iP Address ,
 iP Address , iP Address ,
iP Address ,
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
ELEC - Lecture 2
ELEC - Lecture 2ELEC - Lecture 2
ELEC - Lecture 2
 
Assigning a static IP Address
Assigning a static IP AddressAssigning a static IP Address
Assigning a static IP Address
 
Ip address
Ip addressIp address
Ip address
 
Classes of adressing
Classes of adressingClasses of adressing
Classes of adressing
 
Subnetting
SubnettingSubnetting
Subnetting
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Configuration and testing of network
Configuration and testing of networkConfiguration and testing of network
Configuration and testing of network
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8CCNA 1 Routing and Switching v5.0 Chapter 8
CCNA 1 Routing and Switching v5.0 Chapter 8
 
Assigning ip adress
Assigning ip adressAssigning ip adress
Assigning ip adress
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
 
Ip address
Ip addressIp address
Ip address
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 

Viewers also liked

Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc networkAman Saurabh
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networksSalahuddin Jokhio
 
An Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster AreaAn Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster AreaNaoki Shibata
 
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKSVIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKSSiva Subramaniyan
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentationAmit Dovtya
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)diaryinc
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologymathan0071
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETateeq ateeq
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loopSANJUU7
 
Mobile adhoc network
Mobile adhoc networkMobile adhoc network
Mobile adhoc networkSubiya Nadar
 
Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)Vivek Kumar
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 

Viewers also liked (20)

Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 
Manet
ManetManet
Manet
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
An Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster AreaAn Endorsement Based Mobile Payment System for A Disaster Area
An Endorsement Based Mobile Payment System for A Disaster Area
 
Telecom Acronyms
Telecom AcronymsTelecom Acronyms
Telecom Acronyms
 
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKSVIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
VIRTUAL SURROUNDING FACE GEOCASTING IN WIRELESS AND ADHOC SENSOR NETWORKS
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)
 
Project thor
Project thorProject thor
Project thor
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Pan seminar
Pan seminarPan seminar
Pan seminar
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Mobile adhoc network
Mobile adhoc networkMobile adhoc network
Mobile adhoc network
 
Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)Local multipoint distribution service(lmds)
Local multipoint distribution service(lmds)
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 

Similar to adhoc network workshop

Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networkssmumbahelp
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingKumar
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101grantsupplies
 
Basic networking concept1
Basic networking concept1Basic networking concept1
Basic networking concept1reddydivakara
 
Pears
PearsPears
Pearsthips
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address SchemeErin Rivera
 
Ip and mac address
Ip and mac address Ip and mac address
Ip and mac address MH Shihab
 
Assigning A Satic IP Address
Assigning A Satic IP AddressAssigning A Satic IP Address
Assigning A Satic IP AddressBridget Ann Yap
 
Assigning ip address
Assigning ip addressAssigning ip address
Assigning ip addressralphjamesg
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...YonasBayu1
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxpicklesvalery
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Serious_SamSoul
 

Similar to adhoc network workshop (20)

ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Tcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshootingTcpip networking basics_and_troubleshooting
Tcpip networking basics_and_troubleshooting
 
Networking slide
Networking slideNetworking slide
Networking slide
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Basic networking concept1
Basic networking concept1Basic networking concept1
Basic networking concept1
 
Routers
RoutersRouters
Routers
 
Pears
PearsPears
Pears
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
The Network Ip Address Scheme
The Network Ip Address SchemeThe Network Ip Address Scheme
The Network Ip Address Scheme
 
Digital network lecturer2
Digital network  lecturer2Digital network  lecturer2
Digital network lecturer2
 
Class note 4
Class note 4Class note 4
Class note 4
 
Ip and mac address
Ip and mac address Ip and mac address
Ip and mac address
 
Tcpip Intro
Tcpip IntroTcpip Intro
Tcpip Intro
 
Assigning A Satic IP Address
Assigning A Satic IP AddressAssigning A Satic IP Address
Assigning A Satic IP Address
 
Assigning ip address
Assigning ip addressAssigning ip address
Assigning ip address
 
How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...How does the internet work converted General (Your) Affiliate Link: https://w...
How does the internet work converted General (Your) Affiliate Link: https://w...
 
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docxSupportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
Supportive Security Policies in SOHOTopic SUPPORTIVE SECURI.docx
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
 

More from Ali Nezhad

Network programming using python
Network programming using pythonNetwork programming using python
Network programming using pythonAli Nezhad
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAli Nezhad
 
converged Networks
converged Networksconverged Networks
converged NetworksAli Nezhad
 
cnet311 q-bank
cnet311 q-bankcnet311 q-bank
cnet311 q-bankAli Nezhad
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnettingAli Nezhad
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3Ali Nezhad
 

More from Ali Nezhad (6)

Network programming using python
Network programming using pythonNetwork programming using python
Network programming using python
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
converged Networks
converged Networksconverged Networks
converged Networks
 
cnet311 q-bank
cnet311 q-bankcnet311 q-bank
cnet311 q-bank
 
IP Addressing and subnetting
IP Addressing and subnettingIP Addressing and subnetting
IP Addressing and subnetting
 
Setting up a WiFi Network v3
Setting up a WiFi Network v3Setting up a WiFi Network v3
Setting up a WiFi Network v3
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

adhoc network workshop

  • 1. Friday, April 29, 2016 Workshop on Wireless Adhoc Networks in Windows7 Setup and Applications Instructor: Ali Nezhad School of Engineering Technology and Applied Science Department of Information and Communication Engineering Technology Computer Systems and Network
  • 2. 1 Introduction There are two kinds of Wireless Local Area Networks (WLAN); infrastructure and adhoc. You most probably are familiar with the former and may have even been to our own workshop on that topic. This workshop is focused on creating and using the latter in a Win7 environment. Other versions of Windows are almost similarin this regard. It must be saidthat WiFi (IEEE802.11) is the dominant protocol as far as WLANs are concerned but adhoc networks may be built using other wireless technologies such as Bluetooth, Zigbee, etc. Infrastructure vs. adhoc In an infrastructure WLAN, wireless devices connect to a central device known as a base station (a.k.a access point among other names). The most familiar example of such a network is your WiFi network at home. The residential gateway, commonly known as router, is the access point in your network, which all your wireless devices such as mobile phones, laptops and tablets connect to in a star formation and can also allow Internet access through a modem connected to your Internet Service Provider (ISP). INTERNET Figure.1 Infrastructure WLAN
  • 3. 2 An adhoc wireless network on the other hand does not rely on a central access point. It allows wireless devices to directly connect to each other and have the same role. The fact that these networks do not rely on an infrastructure makes them ideal for extreme conditions such as exploration, disaster recovery, etc. In this workshop you will learn how to create an adhoc wireless network using two Win7 laptops and then use it to share files between them. Furthermore, you will learn how to let one laptop to connect to the Internet indirectly via the other laptop if it is connected to the Internet. Printer sharing is another useful application but we will not attempt that. Figure.2 Adhoc WLAN IP Addressing and Subnetting Before we start, let’s talk briefly about IP addresses. In a network, every device needs to be somehow identified so that information may be delivered to it from other devices exactly like the mailing system. In fact, a single device may have multiple IP addresses, one for each of its networking interfaces. At this time, the dominant systemfor this purpose is called IPv4 and each device in the network is identified by an IPv4 address or simply an IP address. Also, in the same way that a city is divide up into many postal zones, a big network can be divided into subnetworks or simply subnets. A subnet has an address of its own as well. In fact, eachIP address is comprised of two main parts; a subnet ID and a host (meaning the device) ID. You can think of these as the city name and the house number in a mailing address.
  • 4. 3 An IPv4 address is actually a binary number consisting of 32 bits (1 or 0) and it also has an equivalent decimal representation consisting of 4 decimal numbers (called octets) separated by dots. In a big network, routers forwarding information packets only care about the subnet portion of an IP address not the host portion exactly the same way a mail sorter at a national post office only cares about the city name not the house numbers. So, how does a router know which part of an address is the subnet ID and which part is the host ID? The answer is by using a subnet mask. A subnet mask looks very much like an IP address except it has all 1s in the subnet portion and all 0s in the host portion. However, we usually use the decimal representation of that. By default there are only three major groups of IP addresses called classes A, B and C. A class A address has the default subnet mask of 255.0.0.0 which means the first octet is all 1s and therefore the first octet in any such address identifies the subnet. A class B address has the default subnet mask of 255.255.0.0 which means the first and the second octets are all1s and therefore the first two octets in any suchaddress identify the subnet. A class Caddress has the default subnet mask of 255.255.255.0 which means the firstthree octets are all 1s and therefore the first three octets in any such address identify the subnet. Example: 192.168.1.1 with a subnet mask of 255.255.255.0 is a class C address and the subnet ID is 192.168.1.0. Note: Two devices that belong to the same network share the same subnet ID and the same subnet mask. For example, another device in the above network may have an address of 192.168.1.12.
  • 5. 4 Objective Enable 2 wireless laptops to share their files and also share a single Internet connection. Procedure A. Preparations 1- Each group is given 2 laptops. Log into your laptops with the password “wireless”. 2- Take note of the names of your PCs (e.g. CNET324-PC1) by going to control panel  system & security  system Computer1_Name: …………………… Computer2_Name: …………………….. Figure.3 Computer name and other properties 3- Confirm that the wireless interfaces of both PCs are configured to obtain an IP address automatically not manually. This will allow Windows to properly configure IP addresses so that both laptops will belong to the same subnet and can communicate.
  • 6. 5 Figure.4 IP addressing mode B. Create an Adhoc Network 1- On one laptop, do the following: Control panel  Network & Internet  Manage Wireless Networks  Add  create an adhocnetwork. Figure.5 Adding a Wireless Network
  • 7. 6 2- Give it a name such as adhoc1 for PC1. 3- Choose the security type. WPA2 is the preferred mode. Provide a security key which you will remember. Figure.6 Configuring the name and security mode of the adhoc network Write your security key here: …………………… 4- At this point you can turn file sharing on or off. We will keep this at its default mode which is on. C. Join the Adhoc Network 1- On both PCs join the adhoc wireless network. The PC which did not create the adhoc network will have to provide the password which was configured by the other PC.
  • 8. 7 Figure.7 Connect to the adhoc network Note: First stop the PCs from automatically joining the CCwGuest, CCwSecure or any other network. Otherwise, your work may be periodically interrupted as the connection jumps from your adhoc network to another network automatically. Figure.8 Prevent automaticconnections
  • 9. 8 2- Launch a command prompt buy running “cmd” from the Windows Start menu. 3- Using the command “ipconfig” Verify that windows has provided both PCs with IP addresses in the same subnet. Figure.9 Find the IP address of your wireless interface What are the IP addresses and the subnet masks of the wireless interfaces of your PCs? Computer Name: IP Address: Mask: Computer Name: IP Address: Mask:
  • 10. 9 D. File Sharing 1- In Windows Explorer locate your peer PC under “Network”. 2- Browse the files on the peer PC. You can even stream a video or audio file. Figure.10 Accessing files on the peer PC E. Internet Sharing If one of the devices has an extra networking interface it can allow the peer PC to use that too. In this experiment we will enable one PC to share the Ethernet interface of the peer PC. We will then connect that Ethernet interface to the Internet and allow the peer PC to gain access as well. Figure.11 Sharing a single Internet connection Ethernet
  • 11. 10 1- Configure the LAN interface for automatic IP addressing as you did in the preparation step for the wireless interface. 2- At the same time, share this interface with other devices. Figure.12 Allow sharing of the wired LAN interface 3- Test that both PCs can access websites on the Internet. Free Practice If there is time, feel free to experiment. For instance, join another group and try to add three or 4 laptops to the same wireless ad hoc network.