Premium Content

Access "Ad hoc network creation: Overcoming personal wi-fi hotspot competition"

Lisa Phifer, Wireless Expert Published: 10 Oct 2012

In an environment with both computers and smartphones, how will Wi-Fi systems cope with ad hoc network creation?   In a recent Wi-Fi trial I was running, there was ad hoc network creation from smartphones, in particular, early iPhones). How can we overcome this problem?   Business wireless LANs are facing increased RF competition from consumer electronic devices that form their own little Wi-Fi networks. Two very common examples include printers that support peer-to-peer print job submission by Wi-Fi clients and smartphones that support "personal wi-fi hotspot" 3G/4G Internet connection sharing. Do you have a question for our experts? Submit your question directly to our editors at Historically, printers have advertised 802.11 ad hoc mode SSIDs; these are now being gradually replaced by Wi-Fi Direct. True ad hoc mode SSIDs are trivial for a Wireless IPS or WLAN with built-in rogue AP scanning to detect and correctly classify. Even manual scanning tools like NetStumbler can easily spot ad hoc mode SSIDs. Dealing with ad hoc network... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

    • Three enterprise cellular options by David Jacobs, Contributor

      When building a more complex WLAN for mobile devices is not a viable choice, there are a few enterprise cellular options that can extend coverage.

More Premium Content Accessible For Free

  • How to manage and monitor the converged network

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...