2016
DOI: 10.17485/ijst/2016/v9i27/92429
|View full text |Cite
|
Sign up to set email alerts
|

Effective Utilization of Bandwidth for Mobile Ad Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…To select the new cluster head assistant, the nodes will send their remaining energy and will announce the number of the neighbours in one message. The neighbour node will calculate the scores of the neighbour nodes given the credit according to equation (1). The node that has the highest credit will be selected as the assistant cluster head and it will be announced to the other nodes by a message.…”
Section: Local Phasementioning
confidence: 99%
See 1 more Smart Citation
“…To select the new cluster head assistant, the nodes will send their remaining energy and will announce the number of the neighbours in one message. The neighbour node will calculate the scores of the neighbour nodes given the credit according to equation (1). The node that has the highest credit will be selected as the assistant cluster head and it will be announced to the other nodes by a message.…”
Section: Local Phasementioning
confidence: 99%
“…Ad-hoc networks are a set of mobile nodes that are connected via a wireless channel [1]. Each node can move independently in any direction, and therefore will frequently change its links to other devices [2].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, data on the mobile storage can be transferred using mobile bandwidth specifically by pairing two mobile devices using MAC addresses results efficient use of bandwidth of mobile internet and faster file sharing between them which can maximize the utilization of the specific bandwidth of mobile devices [7]. Meanwhile, a two-layer security is introduced for a secured file sharing.…”
Section: Introductionmentioning
confidence: 99%