The 802.11 standard defines two modes of operation: Infrastructure mode, where all stations communicate through...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
an access point, and ad-hoc mode, where stations communicate directly without the help of an intermediary. Ad-hoc mode can be useful for temporary peer-to-peer applications, such as when two laptop users want to exchange files over Wi-Fi.
Most businesses discourage use of ad-hoc mode because they prefer to enforce corporate security policy at the access point and gateway or switch connected to the access point. Users that communicate directly over ad-hoc mode essentially bypass those security measures. Ad-hoc mode can even be used as an attack method. For example, a Windows XP PC that previously associated to an access point with a given name (SSID) can be tricked into automatically re-associating in Ad-hoc mode to an attacker's laptop that advertises that SSID. You avoid this attack by configuring XP (or any other wireless client software) to associate to preferred SSIDs in infrastructure mode only.
On the other hand, several vendors are now using ad-hoc mode as the foundation for building wireless mesh networks. Mesh networks have many applications, including outdoor metropolitan networks and mobile ad-hoc networks (MANETs). To learn more about Ad-hoc mode and its use in mesh networks, visit this NIST resource page. A standard for mesh networks is now under development, designated IEEE 802.11s.
In short, ad-hoc mode has many constructive uses, but unless you have a specific reason for enabling, your safest best today is to disable ad-hoc mode to prevent unwanted or risky associations.
Related Q&A from Lisa Phifer
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.continue reading
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.