Skip to content
Step by Step Internet 馃寪 Guides for learning to surf the Net

How to create and configure a wireless AD HOC network to share the Internet? step by step guide

UPDATED ✅ Do you need to create and configure an AD-HOC wireless network to share the Internet? ⭐ ENTER HERE ⭐ and discover how to do it ✅ EASY and FAST

WiFi AD HOC networks are the most used in homes and also in companies with small numbers of integrating devices. It has the great advantage that they can share resources and their assembly is very fast.

Thanks to this kind of decentralized network we can access the different nodes in a direct way without having to resort to a structure managed by a router. In this way, the data information that comes and goes through the members of the network is very active.

We will show you the different components that an AD HOC network has and we will also teach you how to configure one of these networks in a secure way, showing you the advantages and disadvantages that it has.

What is a WiFi AD HOC network and what can it be used for?

An AD HOC network is a type of wireless network that is characterized by being point to point and where its nodes can communicate with each other without depending on a fixed infrastructure as long as each one of the components of the network has the same hierarchical level.

That is, since there is no structure or anything, we will not need routers or access points for communication to arise between receiving and sending data between these nodes.

When there is a wireless AD HOC network, its components communicate with each other carrying and bringing the information that exists in the network, making it a very dynamic way of forwarding data.

This kind of networks handle IEEE 802.11 type standards. If other devices need to be connected, these nodes can be quickly integrated into an AD HOC network and belong to it with a certain range.

wireless AD HOC networks It is mainly used in home networks where no further installation complexity is needed.

They are also used when there are civil or natural emergencies of different scales, because they are easy to implement and since they do not have a managed structure, the nodes can work perfectly.

It is widely used when you need to share information or files between the different computers or devices that belong to the wireless network.

Although it is true that they do not have access to the Internet, this can be solved by applying cards that adapt to the AD HOC mode configuration connected through the same username or SSID, or through Tethering or USB tethering.

We will see these issues, Internet connection, at the end of this post.

What are the necessary components to create an AD HOC network?

What are the necessary components to create an AD HOC network

The elements that we need to be able to build an AD HOC network are the following:

  • Network interface card, like any network, each node needs to have these cards in order to access the support of the specific wired network scheme.
  • For those wireless networks, what we will need will be wireless network cards to be able to connect to each other.
  • Workstations, which can be computers or mobile devices, which we will call network nodes in the future.
  • Shared resources, it is generally the main purpose of an AD HOC network, and it is to share the different peripheral resources between the members of the network, for example, a printer.

What are the advantages and disadvantages of wireless AD HOC connections?

Like any decentralized network structure, it has advantages and disadvantages, which we mention below:


The advantages of this type of network are the following:

  • Are from easy armed, the configuration simply has to be done on each node in a very simple way. Windows offers the possibility in a few steps to configure each computer.
  • I know can share files and data in a faster way since being all interconnected does not require an administration process to go to a leader or master and from there return that information or file to another node.
  • It can share internet connection with other devices, making this an important advantage since with very few resources we can get some computer to work as a modem for the others.
  • Initially, They are cheaper than other managed networks, that is, they do not need extra expenses such as certain wiring for the connection with the router.


Among the disadvantages of this network we can name the following:

  • Since the nodes are interrelated, when one disconnects probably the network is disarmed or at least the nodes that are within reach of the one that disconnected.
  • Security is very low in this type of networksince as all the nodes are connected to each other, if an intruder enters any of those nodes, they can easily belong to the AD HOC network as a whole.
  • Shared elements in this kind of wireless networks is also a problem since they require all users or nodes to have access to the hardware or the file to be shared. For this, it is necessary to have accounts enabled on each of these devices in order to access the hardware or file that is needed.
  • Antennas, with this element we will gain signal and avoid interference between nearby devices.

Steps to securely configure a wireless AD HOC network

Steps to securely configure a wireless AD HOC network

Next, we will show the steps that we need to do to configure a wireless network with AD HOC characteristics.

Installation of wireless network cards

If our computers do not have these boards installed, we will have to do so so that they can communicate through radio waves.

Address settings

In order to configure the NICs that we will have in each of our work teams, we will have to carry out the following steps:

  • we choose “Start”
  • We look for the option “Control Panel”
  • and we choose “Network connections”
  • At this moment all the NICs will appear, we select the one that corresponds and we right click

Creation of the network

At this moment, a window will appear with a menu in which we will have to:

  • search option “Properties”
  • we seek “App”
  • we choose “Wireless networks”
  • We add the AD HOC network that we want to have
  • Next, we choose “To accept”

Choosing the name of the AD HOC network

  • We choose the SSID, which is the name that we will give to the network
  • It will ask us if we need to connect even if the network is not broadcasting, which we will choose no for greater security
  • We look for the option “Network Authentication”
  • and we choose “Data Encryption”in which we can put disabled
  • We activate the option “This is an AD HOC computer-to-computer network. No wireless access points are used”
  • We click on “Accept”

Creation of IP in the network

In this step we are going to generate different IPs for each member of the network, for this we will follow these steps:

  • We choose to activate “Use Windows to configure my wireless network settings”
  • We look for our network with the name we gave it, that is, our SSID
  • We choose the tab “General”
  • What we will do at this time is create IP manually since we will not have DHCP servers
  • We select “Use the following IP address”
  • We write the IP address and the subnet mask
  • Next, we select “Use the following DNS addresses” for which we will write a default mask, for example 255.255.0

Network connection

The last step we have left is to connect to the AD HOC network that we have created:

  • We go to the taskbar and right click on the wireless network
  • We select the option “See all”
  • We choose the network that we have created
  • We click on “Connect”

What are the best alternatives to AD HOC to share the Internet?

What are the best alternatives to AD HOC to share the Internet

When we want to transmit the Internet in the AD HOC network, we can convert one of the nodes into a modem and thus obtain as a result that each component of the network has access to the Internet.

There are different ways, of which we will mention 2 below:


With this mechanism we can turn any member of a network into an Internet transmitter, turning it into a gateway.

In order to configure an iPhone mobile device as Tethering, we will have to follow these options:

  • We select “Setting”
  • We click on “Cellular Data”
  • we choose “Share internet” and activate this option

If our device is Android, we will do these steps:

  • We’ll go to “Settings”
  • We choose the option “Plus”
  • We click on “Wireless and networks”
  • We look for the option “Share Internet and WiFi hotspot”
  • we choose “Create WiFi Access Point”

If we want to configure our computer with a Windows operating system, we will do this guide:

  • We select “Start”
  • we choose “Setting”
  • We click on “Internet network”
  • We select “Mobile wireless coverage area”
  • We look for the option “Share my Internet connection with other devices” and we click on it
  • We choose the name of the network and its access password
  • we choose “Save”

USB tether

Converting a device through a USB anchor means that we will connect our mobile device with a computer through a cable so that it can act as a modem.

To do this, we will carry out these steps on our mobile with the Android operating system:

  • We select “Settings”
  • We click on “Plus”
  • We look for the option “Connections”
  • We select “Shared Internet and modem”
  • We click on the option “Shared Connections”
  • Finally we press “To accept”

For Apple brand devices we only have to take into account that our iTunes is connected with the latest updated version.


We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active requests your consent to use your personal data for these purposes: Personalized ads and content, ad and content measurement, audience insights and product development. Storing or accessing information on a device Your personal data will be processed and information on your device (cookies, unique identifiers and other device data) may be stored, accessed and shared with third party vendors or used specifically by this website or application. Some providers may process your personal data on the basis of a legitimate interest, which you can object to by managing your choices below. Look for a link at the bottom of this page or in our privacy policy to revoke consent.
Save settings
Cookies settings