Debre Tabor University
Gafat Institution of Technology
Department of Information Technology
A
Seminar Report for 2nd Round
On
AD HOC NETWORK
By: 4th year
Group 3 Students Section - 2
NAME ID-NO
1. BAMLAK TIZAZU --------------------------------------- 1034
2. BIFTU TINNTI ------------------------------------------- 0313
3. DESALEGN TIBEBU ----------------------------------- 1135
4. NEJAT ABDU -------------------------------------------- 0730
5. YOHANNES AREGAY --------------------------------- 1022
Submitted to - Dr. Daniel M.
Submission Date - May 13, 2025
Debre Tabor Ethiopia
Seminar Report
Table of Contents
List of Figures ............................................................................................................................................. II
Abstract ..................................................................................................................................................... III
1. Introduction ......................................................................................................................................... 1
1.1. Ad hoc Networks Introduction ...................................................................................................1
2. Wireless Network Architectures ........................................................................................................ 2
2.1. Standalone architecture (Ad hoc mode) ....................................................................................2
2.2. Centrally Coordinated Architecture (Infrastructure mode) ...................................................3
3. Ad Hoc Networks and the Internet ....................................................................................................4
4. Roles and Configurations in Ad Hoc Networks (Example: Bluetooth PAN) .................................5
4.1. Network Access Points ..................................................................................................................... 5
4.2. Group Ad-hoc Networks ..................................................................................................................5
4.3. Defined Roles (PAN Profile) ............................................................................................................ 6
5. Ad hoc Wireless Network Setup .........................................................................................................6
5.1. Windows Vista Setup .................................................................................................................. 6
5.2. Windows XP Setup ...........................................................................................................................9
1. Access Wireless Network Settings: .................................................................................................... 9
2. Add Ad Hoc Network: ........................................................................................................................ 9
3. Configure Network Details: ..............................................................................................................10
4. Finished: ............................................................................................................................................. 10
5.3. IP Address Configuration (Manual - Optional) .......................................................................... 11
6. Advantages and Disadvantages ........................................................................................................12
6.1. Advantages ................................................................................................................................. 12
6.2. Disadvantage ..............................................................................................................................12
Conclusion ..................................................................................................................................................13
References .................................................................................................................................................. 14
AD HOC NETWORK I
Seminar Report
List of Figures
Figure 2.1: Ad hoc mode wireless network ------------------------------------------------------- 2
Figure 2.2: Infrastructure mode wireless network ----------------------------------------------- 3
Figure 4.1: Network Access Point bridging Bluetooth to a LAN ----------------------------- 5
Figure 5.1: Selecting Ad Hoc Network Setup in Vista ----------------------------------------- 7
Figure 5.2: Network and Sharing Center Link --------------------------------------------------- 7
Figure 5.3: Ad Hoc Network Information Window --------------------------------------------- 8
Figure 5.4: Setting Network Name and Security ------------------------------------------------ 8
Figure 5.5: Network Ready to Use Window ----------------------------------------------------- 9
Figure 5.6: Accessing Advanced Wireless Settings in XP ------------------------------------- 9
Figure 5.7: Adding a Preferred Network in XP ------------------------------------------------- 10
Figure 5.8: Configuring Ad Hoc Network Details in XP -------------------------------------- 10
Figure 5.9: Ad Hoc Network Added in XP ------------------------------------------------------ 11
Figure 5.10: Manual IP Configuration Window ------------------------------------------------ 11
AD HOC NETWORK II
Seminar Report
Abstract
Wireless ad hoc networks (also referred to as packet radio networks and multi-hop radio
networks) consist of mobile nodes communicating over a shared wireless channel. Contrary to
cellular networks, where the nodes are restricted to communicate with a set of carefully placed
base stations, in wireless ad hoc networks there are no base stations; any two nodes are allowed
to communicate directly if they are close enough, and nodes must use multi-hop routing to
deliver their packets to distant destinations. The lack of wired infrastructure, the nature of the
wireless channel, and the mobility of the nodes create many challenging problems in the link,
network, and higher layers of the OSI hierarchy. On the other hand, the lack of wired
infrastructure and their topology make these networks ideal for many applications, from personal
area networks, to search and rescue operations, to massive networks of millions of sensors. It is
therefore expected that, once all the technological issues are solved, wireless ad hoc networks
will become an integral part of our society's communication network infrastructure.
AD HOC NETWORK III
Seminar Report
1. Introduction
1.1. Ad hoc Networks Introduction
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary
network without the use of existing network infra-structure or centralized administration. Due to
the limited transmission range of wireless network interfaces, multiple network hops may be
needed for one node to exchange data with another across the network. In such a network, each
mobile node operates not only as a host but also as a router, forwarding packets for other mobile
nodes in the network, that may not be within the direct reach wireless transmission range of each
other. Each node participates in an ad hoc routing protocol that allows it to discover multi hop
paths through the network to any other node. The idea of an ad hoc network is sometimes also
called an infrastructure-less networking, since the mobile nodes in the network dynamically
establish routing among themselves to form their own network on the fly.
Some examples of the possible use of ad hoc networks include students using laptop computers
to participate in an interactive lecture, business associates sharing information during a meeting,
soldiers relaying information for situational awareness on the battlefield, and emergency disaster
relief personnel coordinating efforts after a hurricane or earthquake.
AD HOC NETWORK 1
Seminar Report
2. Wireless Network Architectures
In planning the wireless network, we will have to determine which wireless network architecture
to adopt in the network environment. There are two architectures available, namely standalone
and centrally coordinated wireless network.
2.1. Standalone architecture (Ad hoc mode)
Figure 2.1: Ad hoc mode wireless network
By using ad hoc mode, all devices in the wireless network are directly communicating with each
other in peer-to-peer communication mode. No access point (routers/switches) is required for
communication between devices.
For setting up ad hoc mode, we need to manually configure the wireless adaptors of all devices
to be at ad hoc mode instead of infrastructure mode, and all adaptors must use the same channel
name and same SSID for making the connection active.
Ad hoc mode is most suitable for small group of devices and all of these devices must be
physically present in close proximity with each other. The performance of network suffers while
the number of devices grows. Disconnections of random device may occur frequently and also,
ad hoc mode can be a tough job for network administrator to manage the network. Ad hoc mode
has another limitation is that, ad hoc mode networks cannot bridge to wired local area network
and also cannot access internet if without the installation of special gateways.
However, Ad hoc mode works fine in small environment. Because ad hoc mode does not need
any extra access point (routers/switches), therefore it reduces the cost. Ad hoc can be very useful
AD HOC NETWORK 2
Seminar Report
as a backup option for time being if network based on centrally coordinated wireless network
(infrastructure mode) and access points are malfunctioning.
An ad hoc mode uses the integrated functionality of each adaptor to enable wireless services and
security authentication. The characteristics of an Ad hoc wireless network are listed as below:
All access points in the network operate independently and has own configuration file.
Access point is responsible for the encryption and decryption.
The network configuration is static and does not respond to changing network conditions.
2.2. Centrally Coordinated Architecture (Infrastructure mode)
Figure 2.2: Infrastructure mode wireless network
The other architecture in wireless network is centrally coordinated (infrastructure mode). All
devices are connected to wireless network with the help of Access Point (AP). Wireless APs are
usually routers or switches which are connected to internet by broadband modem.
Infrastructure mode deployments are more suitable for larger organizations or facility. This kind
of deployment helps to simplify network management, and allows the facility to address
operational concerns. And resiliency is also assured while more users can get connected to the
network subsequently.
The infrastructure mode provides improved security, ease of management, and much more
scalability and stability. However, the infrastructure mode incurs extra cost in deploying access
points such as routers or switches.
An infrastructure mode wireless network has the characteristics as below:
AD HOC NETWORK 3
Seminar Report
The wireless centralized controller coordinates the activity of access point.
The controller is able to monitor and control the wireless network by automatically
reconfiguring the access point parameters in order to maintain the health of the network.
The wireless network can be easily expanded or reduced by adding or removing access
points and the network can be reconfigured by the controller based on the changes in RF
footprint.
Tasks such as user authentication, fault tolerance, control of configuration, policy
enforcement and expansion of network are done by the wireless network controller.
Redundant access points can be deployed in separate locations to maintain control in the
event of an access point or switch failure.
3. Ad Hoc Networks and the Internet
The growth of the Internet in the early 1990's, combined with cheaper computing and radio
equipment (e.g., IEEE 802.11 wireless LAN and Bluetooth devices), saw an increasing focus of
the research and engineering community on ad hoc networks. In 1997, the Internet Engineering
Task Force (IETF) established the Mobile Ad Hoc Networks (MANET) Working Group to
create and standardize new routing protocols (i.e., rules for finding a path between two Internet
nodes) that cope with the dynamics and multi-hop paths present in ad hoc networks. Today, not
only are there the handful of routing protocols published by the MANET WG, but more than 50
protocols proposed for varying scenarios.
With publicly available routing protocols and nearly all new laptops and handheld computers
being equipped with wireless capabilities, businesses are starting to realize the potential of
commercial ad hoc network applications. Companies such as Mesh Networks, Green Packet,
Packet Hop and Fire-tide are offering products and solutions based on ad hoc networking
technology, with applications such as Law Enforcement, Intelligent Transport Systems,
Community Networking and Home Networks in mind.
However, the commercial technology available today is still a long way from the full potential of
ad hoc networks. Fundamental problems must still be solved before ad hoc networks can fully
enable a ubiquitous computing and communications environment.
AD HOC NETWORK 4
Seminar Report
Based on my observation, an ad hoc network is a wireless network connection without a central
node. The network is dispersed which requires no base station (Router). Using the Network
Setup, devices such as PSP, Laptops, and other portable gaming consoles can search, share and
link each other within range without using a router or a hub.
4. Roles and Configurations in Ad Hoc Networks (Example:
Bluetooth PAN)
Specific profiles and roles define how devices interact within certain ad hoc network
implementations, such as the Bluetooth Personal Area Network (PAN) profile.
4.1. Network Access Points
In some scenarios, a device acts as a bridge between the ad hoc network and another network. A
network access point (NAP) is a device that contains one or more Bluetooth radio devices and
acts as a bridge, proxy, or a router between a network (e.g., Ethernet, GSM) and the Bluetooth ad
hoc network. Each network access point can allow one or more computing devices (PAN Users)
to gain access to it, and each of these computing devices will potentially have access to the
resources of the bridged network. Network access points can provide access to other network
technologies such as ISDN, Home PNA, Cable Modems, and cell phones.
Figure 4.1: Network Access Point bridging Bluetooth to a LAN
4.2. Group Ad-hoc Networks
Group ad-hoc networking (GN) is a collection of mobile hosts that co-operatively create an ad-
hoc wireless network without the use of additional networking hardware or infrastructure. In
AD HOC NETWORK 5
Seminar Report
addition, the PAN profile focuses on simple personal ad-hoc networking scenarios consisting of
a single Bluetooth piconet with connections between two or more Bluetooth devices.
4.3. Defined Roles (PAN Profile)
The following roles are defined for the PAN profile:
Network Access Point (NAP) and NAP service: A Bluetooth device that supports the
NAP service provides features similar to an Ethernet bridge. It forwards Ethernet packets
between connected Bluetooth devices (PAN Users) and potentially another network
medium using Layer 2 bridging or Layer 3 routing. The NAP and PAN User exchange
data using the Bluetooth Network Encapsulation Protocol (BNEP).
Group Ad-hoc Network (GN) and GN service: A Bluetooth device supporting the GN
service forwards Ethernet packets between connected Bluetooth devices (PAN Users) as
needed within the ad hoc group. GN devices exchange data using BNEP but do not
provide access to external networks. They are intended for temporary information
exchange within the group.
PAN User (PANU): This is the Bluetooth device that uses either the NAP or the GN
service. A PANU supports the client role for both NAP and GN services.
The presentation of this profile assumes each device has a single Bluetooth radio.
5. Ad hoc Wireless Network Setup
This section provides a step-by-step guide for setting up a basic ad hoc wireless network using
built-in Windows features, primarily for file sharing or temporary internet connection sharing
between nearby computers. This example uses automatic IP address configuration initially,
followed by manual configuration if needed.
5.1. Windows Vista Setup
1. Launching Setup a Network or connection Window
Choose "Set up a wireless ad hoc (computer-to-computer) network Set up a temporary network
for sharing files or an Internet connection".
AD HOC NETWORK 6
Seminar Report
Figure 5.1: Selecting Ad Hoc Network Setup in Vista
There are several ways to access this Window, here they are:
i. Right-Click the Wireless Network Icon in the Taskbar's Notification Area > Connect to a
Network > At the Bottom, Click the Setup a Connection or Network.
ii. Right-Click the Wireless Network Icon from the Notification Are > Network and Sharing
Center > In the Left Pane, choose Setup a Connection or Network link.
iii. Start Menu > Connect to Button > At the Bottom, Click the Setup a Connection or
Network link.
iv. Using the New Control Panel View: Start Menu > Control Panel > View network status
and tasks > In the Left Pane, choose Setup a Connection or Network link.
Figure 5.2: Network and Sharing Center Link
2. Creating Ad hoc Network Window
AD HOC NETWORK 7
Seminar Report
Figure 5.3: Ad Hoc Network Information Window
"Set up a wireless ad hoc network An ad hoc network (sometimes called a computer-to-computer
network) is a temporary network used for sharing files, presentations, or an Internet connection
among multiple computers and devices. Computers and devices in ad hoc networks must be
within 30 feet of each other.If you're currently Connected to a wireless network, you might be
disconnected when you set up this network.".
Click Next Button to Start Creating Ad hoc Network.
3. Configure Network Name and Security:
Enter a Network Name (SSID), choose a security type (No authentication (Open), WEP, or
WPA2-Personal), and set a Security Key (password) if security is enabled. Save the network if
desired.
Figure 5.4: Setting Network Name and Security
4. Complete Setup:
Click Next. The network is created
AD HOC NETWORK 8
Seminar Report
Figure 5.5: Network Ready to Use Window
The ad hoc network becomes active when at least one other device connects to it.
5.2. Windows XP Setup
1. Access Wireless Network Settings:
Right-Click the Wireless Network Icon > Choose View Network Wireless Networks
In the Left Pane > Click "Change advanced settings" link
Figure 5.6: Accessing Advanced Wireless Settings in XP
2. Add Ad Hoc Network:
Make sure that you are using Windows to configure your wireless network settings and click
the Add Button.
AD HOC NETWORK 9
Seminar Report
Figure 5.7: Adding a Preferred Network in XP
3. Configure Network Details:
Enter the Network Name (SSID). Set Network Authentication and Data Encryption (e.g.,
Open/WEP or WPA-PSK/TKIP). Enter the Network key if required. Crucially, check the box
"This is a computer-to-computer (ad hoc) network; wireless access points are not used." Click
OK.
Figure 5.8: Configuring Ad Hoc Network Details in XP
4. Finished:
The network is added to the preferred list.
AD HOC NETWORK 10
Seminar Report
Figure 5.9: Ad Hoc Network Added in XP
5.3. IP Address Configuration (Manual - Optional)
If automatic configuration (APIPA - 169.254.x.x) doesn't work or specific IPs are needed:
I. Open Network Connections: Run ncpa.cpl or Control ncpa.cpl.
II. Configure TCP/IP: Right-Click Wireless Network Connection > Properties > Internet
Protocol Version 4 (TCP/IPv4) > Properties.
III. Set Manual IP: Select "Use the following IP address:" and enter unique IP addresses and
a common subnet mask for each computer in the ad hoc network.
Figure 5.10: Manual IP Configuration Window
Example Class C Configuration:
Table 5.1: Example Manual IP Addresses
Device Computer A Computer B Computer C
IP Address 192.168.0.1 192.168.0.2 192.168.0.3
Subnet 255.255.255.0 255.255.255.0 255.255.255.0
Mask
Valid Range for this example: 192.168.0.1 - 192.168.0.254.
AD HOC NETWORK 11
Seminar Report
IV. Connect:
On other devices, find the ad hoc network name, click Connect, and enter the passphrase
if security was set up.
6. Advantages and Disadvantages
6.1. Advantages
Easy to setup: Often uses built-in OS features; no additional software may be needed.
Can be free if hardware is present.
Hardware Availability: Most modern laptops and many devices include Wi-Fi
capabilities. USB Wi-Fi adapters are relatively inexpensive.
Portability and Mobility: Enables network creation anywhere without relying on existing
infrastructure.
Reduced Infrastructure: No need for physical wires or dedicated devices like routers or
hubs, reducing cost and complexity for temporary setups.
6.2. Disadvantage
Internet Sharing Dependency: If sharing an internet connection via one computer (acting
as a gateway), that computer must remain powered on for others to access the internet.
Routers in infrastructure mode handle this independently.
Scalability and Performance: Performance tends to degrade as the number of devices
increases. Managing larger ad hoc networks can be difficult.
Limited Range: Devices generally need to be in close proximity (e.g., within ~30 feet / 10
meters, though this varies).
Bridging Complexity: Connecting an ad hoc network to a wired LAN or the broader
internet typically requires a dedicated gateway configuration.
Security: While options like WPA2-Personal exist, simpler ad hoc setups (Open or WEP)
are less secure. Centralized management of security policies is absent.
If you'll share or connect other computers and devices to the Internet. The computer that is
connected to the Internet (Gateway) must always be turned on. Unlike using a router, you can
turn off any computers in the network.
AD HOC NETWORK 12
Seminar Report
Conclusion
Wireless ad hoc networks represent a transformative approach to networking, enabling flexible,
infrastructure-less communication among mobile devices. Their ability to dynamically form
temporary networks without centralized administration makes them ideal for scenarios such as
disaster recovery, battlefield communications, and spontaneous collaborations in educational or
professional settings. Despite their advantages, including ease of setup, portability, and reduced
infrastructure costs, ad hoc networks face challenges such as limited scalability, performance
degradation with increased device counts, and complexities in bridging to external networks like
the internet. Security remains a critical concern, particularly in simpler configurations,
necessitating robust protocols to ensure data integrity and confidentiality. Ongoing research,
standardization efforts by groups like the IETF MANET Working Group, and commercial
advancements by companies such as Mesh Networks and Firetide are addressing these
challenges. As technological hurdles are overcome, ad hoc networks are poised to become a
cornerstone of ubiquitous computing and communication, seamlessly integrating into our
society's network infrastructure.
AD HOC NETWORK 13
Seminar Report
References
IETF Mobile Ad Hoc Networks (MANET) Working Group. (n.d.). MANET Charter.
Retrieved from https://datatracker.ietf.org/wg/manet/charter/
Bluetooth Special Interest Group. (2001). Bluetooth Personal Area Network (PAN)
Profile. Bluetooth Specification Documents.
Corson, S., & Macker, J. (1999). Mobile Ad Hoc Networking (MANET): Routing
Protocol Performance Issues and Evaluation Considerations. RFC 2501, Internet
Engineering Task Force. DOI:10.17487/RFC2501
Toh, C.-K. (2002). Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice
Hall.
Conti, M., & Giordano, S. (2014). Mobile Ad Hoc Networking: The Cutting Edge
Directions. IEEE Communications Magazine, 52(6), 76-83.
DOI:10.1109/MCOM.2014.6829946
Microsoft. (2007). Setting Up an Ad Hoc Network in Windows Vista. Microsoft Support
Documentation.
Microsoft. (2003). Configuring Wireless Ad Hoc Networks in Windows XP. Microsoft
Support Documentation.
Mesh Networks. (n.d.). Ad Hoc Networking Solutions. Retrieved from company archives
(accessed via web archive, original site discontinued).
Green Packet. (2010). White Paper: Ad Hoc Networking for Community Broadband.
Green Packet Solutions.
Perkins, C. E. (2001). Ad Hoc Networking. Addison-Wesley Professional.
AD HOC NETWORK 14