• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

Computer Notes

Library
    • Computer Fundamental
    • Computer Memory
    • DBMS Tutorial
    • Operating System
    • Computer Networking
    • C Programming
    • C++ Programming
    • Java Programming
    • C# Programming
    • SQL Tutorial
    • Management Tutorial
    • Computer Graphics
    • Compiler Design
    • Style Sheet
    • JavaScript Tutorial
    • Html Tutorial
    • Wordpress Tutorial
    • Python Tutorial
    • PHP Tutorial
    • JSP Tutorial
    • AngularJS Tutorial
    • Data Structures
    • E Commerce Tutorial
    • Visual Basic
    • Structs2 Tutorial
    • Digital Electronics
    • Internet Terms
    • Servlet Tutorial
    • Software Engineering
    • Interviews Questions
    • Basic Terms
    • Troubleshooting
Menu

Header Right

Home » Networking » Technologies » What is ad-hoc Network?
Next →
← Prev

What is ad-hoc Network?

By Dinesh Thakur

Another big wireless network category is ad-hoc networks, where the infrastructure is composed as resorts themselves. The latter agreed to play the role of the router to allow the passages of information from one device to another, without these terminals are connected directly.

An ad hoc network is shown in Figure.

Ad hoc network

Contrary to appearances, ad-hoc networks date back several decades. They aim to achieve a communication environment that unfolds without any other infrastructure that mobile themselves. In other words, the mobile can act as a gateway for allowing a mobile communication to another. Two moving too far away from each other to directly communicate can find an intermediate wheel able to act as relays.

The main problem caused by this network comes from the definition of the network topology: how to identify the neighboring nodes and how to get from one node to another node? Two extremes can be compared. The first is that of an ad-hoc network in which all nodes can communicate with all the other involving long-range transmitters. In the second solution, instead, the radio range is as short as possible: in a communication between two nodes, it usually go through several intermediate machines. The advantage of the first solution is the transmission security, since you can go directly from the sender to the receiver, without depending on an intermediate device. Network throughput is minimal, the frequencies that can not be reused. In the second case, if a device fails or is turned off, the network can be cut into two separate subnets, without communication with each other. Obviously, in this case, the overall throughput is optimized, since there may be a high frequency reuse.

The access techniques are the same type as in mobile networks. However, the fact that all portable play the role of BSS and are themselves mobile, new properties should be made to the management of user addresses and control routing.

The solution developed for ad-hoc networks takes to the foundation IP environment. Mobile which acts as gateways – usually all mobile – implement a router in the circuits, so that the problems arising essentially return to the Internet routing problems, the mobility is managed by IP Mobile.

The benefits of ad-hoc networks are their simple extensions, physical coverage and cost. However, to benefit fully, a number of pitfalls to be overcome, such as quality of service and security, because of the mobility of nodes.

MANET (Mobile Ad-hoc Network) is the IETF working group that is concerned with the standardization of ad-hoc protocols running over IP. This group has relied on conventional Internet protocols and improved them so they can work with mobile routers.

Two major protocol families were defined: reactive protocols and proactive protocols:

• Reagents Protocols. The terminals do not maintain routing table but are concerned about it when a show is performing. In this case, it is primarily used to flood techniques to identify mobile that can participate in the transmission.

• Proactive Protocols. Mobile seeks to maintain a consistent routing table, even in the absence of communication.

Ad hoc networks are useful in many cases. They allow to set up networks within a limited period of time, if, for example, earthquake or a meeting with a large number of participants. Another possibility is to extend access to a cell of a wireless network such as WiFi. As shown in Figure, a terminal outside of a cell can connect to another user’s machine located in the cell coverage area. The latter serves as an intermediate router to access the antenna of the cell.

The ad-hoc networks pose many problems because of the mobility of all equipment. The main one is the routing required transferring packets from one point to another point in the network. One of the objectives of MANET group is to propose a solution to this problem. For now, four proposals have emerged, two reagent types and two proactive type. Among other issues, we find the safety, quality of service and mobility management during the call.

Extended coverage through an ad-hoc network

You’ll also like:

  1. Ad-Hoc Networks Routing Protocols
  2. What is build and fix model or ad hoc model? and Explaini its Advantages and Disadvantages
  3. What is a Communication Network? Network Effectiveness Criteria
  4. What is a computer network? Advantages of Network .
  5. Network Using Wan and Network Services
Next →
← Prev
Like/Subscribe us for latest updates     

About Dinesh Thakur
Dinesh ThakurDinesh Thakur holds an B.C.A, MCDBA, MCSD certifications. Dinesh authors the hugely popular Computer Notes blog. Where he writes how-to guides around Computer fundamental , computer software, Computer programming, and web apps.

Dinesh Thakur is a Freelance Writer who helps different clients from all over the globe. Dinesh has written over 500+ blogs, 30+ eBooks, and 10000+ Posts for all types of clients.


For any type of query or something that you think is missing, please feel free to Contact us.


Primary Sidebar

Internet

Internet Terminology

    • Internet - Home
    • Internet - Email
    • Internet - www
    • Internet - Telnet
    • Internet - Architecture
    • Internet - FTP
    • Internet - HTTP
    • Internet - MIME
    • Internet - SMTP
    • Internet - DNS
    • Internet - POP3
    • Internet - Intranet
    • Internet - SNMP
    • Internet - BOOTP
    • Internet - TFTP
    • Internet - URL
    • Internet - NAT
    • Internet - DHCP
    • Internet - Cellular Radio
    • Internet - VSAT
    • Internet - TCP/IP Services
    • Internet - IMAP4
    • Internet - GSM Architecture
    • Internet - VOIP
    • Internet - GSM Features
    • Internet - SSL
    • Internet - Web Server
    • Internet - File Server
    • Internet - NNTP
    • Internet - UUCP
    • Internet - ADSL
    • Internet - FTP
    • Internet - NFS
    • Internet - Videoconferencing
    • Internet - Audio Compression
    • Internet - xDSL
    • Internet - ADSL Protocols
    • Internet - HTTP Cookie
    • Internet - Wireless Principles
    • Internet - X.400
    • Internet - IP Standardization
    • Internet - 4G
    • Internet - CompuServe
    • Internet - Anonymous FTP
    • Internet - File Sharing
    • Internet - WRAN
    • Internet - FQDN
    • Internet - CNAME
    • Internet - Buffering
    • Internet - Cluster Computing
    • Internet - WiMAX
    • Internet - Client/Server
    • Internet - ATM
    • Internet - DSL
    • Internet - GPRS
    • Internet - Transfer rate
    • Network - Cable Modem

Network Server Technique

    • Server - Home
    • Server - Proxy
    • Server - BBS
    • Server - B Channel
    • Server - Process
    • Server - AAL
    • Server - ISDN Features
    • Server - Multicasting
    • Server - Client/Server Benefits
    • Server - Client process
    • Server - Ad-Hoc
    • Server - ISDN Interfaces
    • Server - Guided Transmission
    • Server - SONET
    • Server - ISDN Standards
    • Server - WAP
    • Server - Broadband ISDN

Networking Encryption System

    • Security - Firewall
    • Security - Cryptography
    • Security - Firewall Architectures
    • Security - Network Security Services
    • Security - VPN
    • Security - Security Threats
    • Security - Encryption
    • Security - SHA-1
    • Security - Requirements
    • Security - Digital Signatures
    • Security - Message Authentication
    • Security - MD5
    • Security - Tunneling (VPN)
    • Security - Remote Access Security

Some Other Tutorials

  • Tutorials - QOS
  • Tutorials - CTS
  • Tutorials - LTE
  • Tutorials - CDDI
  • Tutorials - AppleTalk
  • Tutorials - EtherTalk
  • Tutorials - Flooding
  • Tutorials - Tunneling
  • Ethernet - Frame
  • Ethernet - Expansion
  • Ethernet - 10 Mbit/s
  • Ethernet - Local Loop
  • Broadband vs Baseband
  • Wi-Fi vs. Mobile Broadband
  • Optical Source
  • Implementation Wireless Technology
  • Applications of Wifi
  • Wireless Router Installation
  • Networking Your Devices
  • Type of Wi-Fi equipment
  • Multi-point Architectures
  • Frame-level Architecture
  • Circuits, Channels and Multichanneling
  • Single Bit Error Vs Burst Error

Other Links

  • Internet Terminology - PDF Version

Footer

Basic Course

  • Computer Fundamental
  • Computer Networking
  • Operating System
  • Database System
  • Computer Graphics
  • Management System
  • Software Engineering
  • Digital Electronics
  • Electronic Commerce
  • Compiler Design
  • Troubleshooting

Programming

  • Java Programming
  • Structured Query (SQL)
  • C Programming
  • C++ Programming
  • Visual Basic
  • Data Structures
  • Struts 2
  • Java Servlet
  • C# Programming
  • Basic Terms
  • Interviews

World Wide Web

  • Internet
  • Java Script
  • HTML Language
  • Cascading Style Sheet
  • Java Server Pages
  • Wordpress
  • PHP
  • Python Tutorial
  • AngularJS
  • Troubleshooting

 About Us |  Contact Us |  FAQ

Dinesh Thakur is a Technology Columinist and founder of Computer Notes.

Copyright © 2025. All Rights Reserved.

APPLY FOR ONLINE JOB IN BIGGEST CRYPTO COMPANIES
APPLY NOW