Copyright

Ch 7: Ad-Hoc Wireless Networks

About This Chapter

If you need to improve your understanding of ad-hoc wireless networks for academic, professional or personal purposes, then this chapter is for you. Inside, you'll find simple lessons and quizzes that can be reviewed whenever your schedule allows.

Ad-Hoc Wireless Networks - Chapter Summary

For an overview of ad-hoc wireless networks, take a look at this series of engaging computer science networks. After defining the functions, applications and advantages/disadvantages of mobile ad-hoc networks, you'll learn how to perform a variety of actions within these networks, including managing keys, setting up security standards and resolving problems with traffic. To make sure you fully understand these wireless network concepts, we've included short lesson quizzes along with a comprehensive chapter exam. These resources are available any time that's convenient, and when you're finished with the chapter, you should be able to:

  • Explain the functions of ad-hoc networks
  • Discuss the pros, cons and applications of mobile ad-hoc networks
  • Compare a variety of routing protocols for mobile ad-hoc networks
  • Evaluate security issues related to mobile ad-hoc networks
  • Manage keys and set up security standards for mobile ad-hoc networks
  • Resolve traffic problems, layer misbehaviors and route tapering in this network type

9 Lessons in Chapter 7: Ad-Hoc Wireless Networks
Test your knowledge with a 30-question chapter practice test
What is an Ad-Hoc Network?

1. What is an Ad-Hoc Network?

An ad-hoc network allows devices in the same local area to connect directly instead of going through a router or server. In this lesson, you'll learn more about what an ad-hoc network is, how it works, and its pros and cons.

Mobile Ad-Hoc Networks: Applications, Advantages & Disadvantages

2. Mobile Ad-Hoc Networks: Applications, Advantages & Disadvantages

This lesson describes a MANET (Mobile Ad-hoc Network) and how it works, giving an insight into various applications, advantages, and disadvantages of a MANET.

Protocols for Routing Mobile Ad-Hoc Networks: Proactive, Reactive, Hybrid

3. Protocols for Routing Mobile Ad-Hoc Networks: Proactive, Reactive, Hybrid

Mobile Ad-Hoc Networks (MANETs) are infrastructure-less and wireless. They are composed of mobile nodes which change on the go which traditional routing protocols are not equipped to handle sufficiently. This lesson gives an insight into the basics of MANET routing protocols.

Security Issues with Mobile Ad-Hoc Networks

4. Security Issues with Mobile Ad-Hoc Networks

In this lesson we will understand the nature of Mobile Ad-Hoc Networks and examine the security issues that arise with such topology. Various security mechanisms will be examined.

Managing Keys in Mobile Ad-Hoc Networks

5. Managing Keys in Mobile Ad-Hoc Networks

In this lesson we will understand the significance of key management in a Mobile Adhoc Network. We will understand the different types of keys employed in the system and the different key management techniques used to ensure data security.

Setting up Security Standards in Mobile Ad-Hoc Networks

6. Setting up Security Standards in Mobile Ad-Hoc Networks

This course examines the difference between ad-hoc wireless and traditional wireless networks. It then identifies how this core difference makes the ad-hoc wireless network more susceptible to risk. Risks will be introduced, followed by standards that can be applied to the design and implementation of the ad-hoc wireless network to effectively address these risks.

Resolving Traffic Problems in Mobile Ad-Hoc Networks

7. Resolving Traffic Problems in Mobile Ad-Hoc Networks

Mobile Ad-Hoc Networks (MANET), by their nature, can cause congestion and loss of data. This lesson will define MANETs and outline some of the issues involved in resolving traffic problems.

Layer Misbehavior in Mobile Ad-Hoc Networks

8. Layer Misbehavior in Mobile Ad-Hoc Networks

MAC layer misbehavior is common in mobile ad hoc networks and this lesson gives an overview of layer misbehavior, its causes, methods of detection and correction.

Route Tampering in Ad-Hoc Networks

9. Route Tampering in Ad-Hoc Networks

Ad-hoc networks are self-configuring and use routing algorithms to transmit data. This lesson will cover types of routing algorithms, tampering attacks that can occur, and some solution measures that can be taken to mitigate those attacks.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support