Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Ad-Hoc and Infrastructure mode

Posted on 2007-04-09
3
344 Views
Last Modified: 2010-04-24
What is Ad-hoc and infrastructure mode?  Also, when would you use each?  Are there other modes?
0
Comment
Question by:al4629740
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
jekl2000 earned 400 total points
ID: 18876439
Ad-hoc is also called peer to peer.  This basically allows several laptops (for example) to communicate with each other.  If one of them had an internet connection and was using ICS (Internet connection sharing) then the ad-hoc users could use the internet access of the one or jsut share files between one another.

Infrastructure mode, is having an Access Point where all (laptops for example)
connect to and provides a bridge to a wired network.
0
 
LVL 3

Assisted Solution

by:Comply
Comply earned 100 total points
ID: 18878790
Its when no router is used. You connect to a computer that has internet access, Or when you want to share files or folders.

This is where wireless is great to have. You don't need a hub or switch.
0
 
LVL 11

Assisted Solution

by:jekl2000
jekl2000 earned 400 total points
ID: 18879330
Its when no router is used

Router: Meaning a router with built in wireless Access Point functions
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Bandwidth issues? 5 42
Use packet tracer to verify anyconnect VPN 11 60
Cisco 3800 series and WISM2 1 30
What Accesspoint 7 21
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question