SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                             Volume 1, Issue 1, March 2012




                Adhoc Network Routing Optimization and
             Performance Analysis of ACO Based Routing
                                                        Protocol

                                                        Anubhuti Verma



   Abstract— Ant Colony Optimization is based on the                     MANETs. One interesting research area in MANET is
capability of real ant colonies of finding the shortest path from        routing. In MANETs the transmission range of nodes is
nest to food source by depositing and following the trail of             limited so the nodes in MANETs act as both hosts and
pheromone on the path. Pheromone is a chemical deposited on              routers. The routing protocol for MANETs needs to be
ground by the ants while walking and it affect their moving
                                                                         flexible enough to adapt to the continuously changing
decisions based on the intensity. The main components for ACO
optimization are: set of software agent (artificial ant), use of         network topologies, and to support bandwidth
memory and strategies of collective and distributed learning.            management and energy management as the nodes are
Many ACO algorithms were designed and implemented for TSP                power constrained.
which was very successful in finding optimal tour.                       Recently, nature’s self-organizing systems (Swarm
In MANET routing is a challenging issue because of                       Intelligence) [3] such as ant colony optimization
dynamically changing network topology which needs to be                  algorithms [1] are proved to be efficient in developing
addressed. In this paper we analyze an ACO based routing                 routing algorithm for MANET.                Ant Colony
algorithm inspired by the foraging behavior of ants, to route            Optimization (ACO) is based on the capability of real
packets through shorter and feasible routes. Each ant while
                                                                         ant colonies of finding the shortest path from nest to
moving towards destination collects information about the time
length, congestion status and address of each visited node of the        food source [1]. The ants coordinate their activities via
followed path. During backward travel, local network traffic             stigmergy (a form of indirect communication mediated
model and routing table is modified by ant based on the                  by modifications of the environment). Ant uses
goodness of the followed path. The protocol is capable of                pheromone to communicate with other ants. Pheromone
discovering path for dynamic changing topology and varying               is a chemical deposited on ground by the ants while
traffic over the network and gives high redundancy and fault             walking and it affect their moving decisions based on the
tolerance. Analysis shows that the proposed ACO based routing            intensity. In this paper ACO based network routing
protocol gives performance improvement over other routing
                                                                         algorithm is analyzed inspired by the foraging behavior
protocol by continuously checking for better paths in the
network with less overhead.
                                                                         of the ants, to route packets through shorter and feasible
                                                                         routes.
  Index Terms— ACO, MANET, Routing Protocol                              The remainder of this paper is organized as follows. In
                                                                         section 2 we describe related work. The algorithm is
                       1. INTRODUCTION                                   described in section 3. In section 4, performance
                                                                         analysis of the algorithm is done. Finally a conclusion is
A mobile ad hoc network (MANET) is an infrastructure less                given in section 5.
networks consisting of mobile nodes, with constantly
changing topologies, the nodes are mobile and they
communicates through a wireless medium. Due to                                            2. RELATED WORK
infrastructure less and dynamic nature of such networks,
there is requirement of new set of networking strategies                 In this section we describe related literature. In 2.1 a
which is to be implemented for efficient end-to-end                      short introduction to MANET routing algorithms is
communication. This, along with the diverse application of               given, and
these networks in many different scenarios such as battlefield            in 2.2 we give an overview of Ant Colony Optimization.
and disaster recovery, has seen Mobile Ad Hoc Networks                   Then in 2.3 we describe the basic elements of ANT
(MANETs) being researched by many different                              based routing.
organizations and academia. MANETs employ the
traditional TCP/IP structure to provide end-to-end
communication between the nodes. However, due to their                   2.1 ROUTING IN MANET
mobility and the limited resource in wireless networks, each
layer in the TCP/IP model requires redefinition or                       In recent years several protocols have been proposed to
modifications to function efficiently in                                 address the routing problem in MANETs. These

                                                                                                                                        1
                                               All Rights Reserved © 2012 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                        Volume 1, Issue 1, March 2012



protocols can be characterized as proactive, reactive or            2.3 ANT BASED ROUTING
hybrid based on their design approach. Proactive routing
                                                                    The basic idea behind ACO algorithms for routing [8] is
protocol maintains global topology information in the
                                                                    the acquisition of routing information through sampling
form of tables at every node E.g. DSDV [6]. In reactive
                                                                    of paths using agents, which are called ants. An ant going
protocol node only gather routing information E.g.
                                                                    from source node s to destination node d collects
AODV [5]. Reactive algorithms are in general more
                                                                    information about the quality of the path (e.g. end-to-end
scalable since they are never prepared for disrupted
                                                                    delay, number of hops, etc.), and uses this on its way back
events. Hybrid protocols make use of both proactive and
                                                                    from d to s to update the routing information at the
reactive protocol to achieve better performance E.g.
                                                                    intermediate nodes.
ZRP [7].
                                                                    The routing tables contain for each destination a vector
                                                                    of real-valued entries, one for each known neighbor
2.2 OVERVIEW OF ANT COLONY OPTIMIZATION
                                                                    node. These entries are a measure of the goodness of
Ant Colony Optimization (ACO) takes inspiration from                going over that neighbor on the way to the destination.
the behavior of the real ant colony. These ants deposit             They are termed pheromone variables, and are
pheromone on the ground in order to mark some                       continually updated according to path quality values
favorable path to reach the food source that should be              calculated by the ants. The ant searches for a number of
followed by other member of the colony. Ant colony                  paths at each node each with an estimated measure of
optimization exploits similar mechanism for solving                 quality. In turn, the ants use the routing tables at each
optimization problems. The algorithm can find the                   node to stochastically choose a next hop, giving higher
optimum solution by generating artificial ants. As the              probability to those links which are associated with
real ants search their environment for food, the artificial         higher pheromone values.
ants search the solution space. The pheromone                       This process of ant agent in routing is very similar to the
trail-laying and trail-following behavior of some ant               pheromone lying and following behavior of real ant
species is investigated by several experiments. One                 colonies. The pheromone information is used for routing
                                                                    data packets, choosing with higher probability those
                                                                    links associated with higher pheromone values. In this
                                                                    way data for same destination are spread over multiple
                                                                    paths (but with more packets going over the best paths).


                                                                    3. ACO ROUTING ALGORITHM FOR MANET


           i                 ii                 iii                 The ACO algorithm is designed to help solve the
brilliant experiment was designed and run by Goss [4].              problem in mobile ad hoc network. Many different ACO
                                                                    based routing algorithms have been proposed and
Figure 1: (i) Initially ants choose path randomly (ii) Ant          designed so far to tackle the problem of routing in
choosing shorter path will reach first (iii) Pheromone              MANET. The ACO technique for routing in MANETs
deposited more quickly on shorter path, number of ants              uses stigmergy (indirect communication by modifying
keep on increasing on sorter path.                                  the environment) process to determine the best possible
                                                                    routes from a source node to a destination node.
                                                                    Artificial ants are placed at each node and they mark
These studies have given insight into the foraging                  their trails with pheromone as they move within the
behavior of ants showing that they are always able to               network. The level of concentration of pheromone on a
determine, over time, the shortest path from their nest to          trail depends upon the quality of the path.
a food source and also adapt easily adapt to path
disruptions that may occur. This phenomenon can be                  The proposed algorithm is a modification of AntNet
explained using Figures (i) to (iii). While moving ants             algorithm [9] because AntNet has been designed for
deposit pheromone on their path which evaporates over               fixed network and we are going to use it in ad-hoc
time. The ants are attracted towards a higher                       network, where the topology is highly dynamic. Thus, a
concentration of pheromone which enables them to                    neighbor discovery protocol is added in route
choose shortest paths since these would retain a higher             maintenance phase to deal with mobility. Other phases
concentration each time than longer Ants choose                     follow the procedure given in AntNet.
whether to turn left or right with equal probability. The
ant that choose the shorter path by chance will acquire a           3.1 NODE DATA STRUCTURE
path between the nest and food that is faster and will              AntNet is an ACO algorithm for data network routing
reach the destination first than those taking the                   proposed by Gianni Di Caro and Marco Dorigo [2].
alternative path as in Figure (ii). This path will have             Mobile agents (artificial ants) act concurrently and
higher pheromone concentration and number of ant will               independently, and communicate in an indirect way
keep increasing as shown in Figure (iii).                           (stigmergically), through the pheromones they read and
                                                                    write locally on the nodes. Each network node k stores
                                                                    two data structures:


                                                                                                                                   2
International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                         Volume 1, Issue 1, March 2012

1) Routing table                                                     detected and all the nodes until this recurrent node are
For each possible destination d and for each neighbor                deleted from the ants memory.
node     n,         stores    a   probability    value               4) When the destination node d is reached, the agent
    expressing the goodness of choosing n as next node               Fs→d generates backward ant Bd→s, transfers to it all of its
when the destination node is d:                                      memory, and is deleted.
                                                                     5) The backward ant takes the same path as that of its
                                                                     corresponding forward ant, but in the opposite direction.
                                                                     6) Arriving at a node i coming from a neighbor node, the
                      where d [1, N]                                 backward ant updates the local model of the traffic Mi
Nk = neighbor (k) Probability value     represents the               and the pheromone matrix Ti, for all the entries
pheromone concentration along the link from node k to                corresponding to the destination node d.
neighbor node n for destination node d.                               • Update traffic model Mi
                                                                      The estimated mean and variance are updated as
2) Traffic model Mk                                                  follows:
Mk (µd, σd2, Wd) is a statistical model of the traffic
situation over the network as seen by node k. It is
described by the sample mean µd and the variance σd2
computed over the trip times experienced by the
artificial ants, and by a moving observation window Wd                 Where        is the observed ant's trip time from node i
used to store the best value Wbest_d of the artificial ants'           to destination d. The factor ς weighs the number of
trip time.                                                             most recent samples that will really affect the average.
                                                                       • Update pheromone matrix Ti
3.2 ACO ALGORITHM                                                        The backward ant Bd→s moving from node f to node i
1) At regular intervals ∆t from every network node s, a                  increases the pheromone values τifd’
forward ant Fs→d is launched toward a destination d to
discover a feasible, low-cost path to that node and to
investigate the load status of the network along the path.
If fsd is a measure (in bits or in number of packets) of the
data flow s→d, then the probability of creating at node s
a forward ant with node d as destination is


                                                                     3.3 NEIGHBOR DISCOVERY PROTOCOL
                                                                     This protocol works in parallel with the ACO Algorithm
                                                                     and its aim is to maintain a list with available neighbors
While travelling toward their destination nodes, the                 to forward packets. It works as follows:
forward ants keep memory of their paths and of the                        1. Every node broadcasts, with periodicity
traffic conditions found. The identifier of every visited                      HELLO_INTERVAL, a message to all
node i and the time elapsed since the launching time to                        neighbors indicating that is available to forward
arrive at this i-th node are stored in a memory stack.                         packets.
2) At each node i, each forward ant headed toward a                       2. Also with periodicity HELLO_INTERVAL,
destination d selects the node j to move to, with a                            every node checks if its neighbors are still
probability Pijd computed as normalized sum of the                             available. If the node k has not received any
pheromone τijd with a heuristic value ηij taking into                          HELLO message from neighbor n and current
account the length of the j-th link queue of the current                       time is greater than the expire time, neighbor n
node i:                                                                        is deleted from the list. Furthermore, all entries
                                                                               in the routing table related to this neighbor are
                                                                               also erased.
                                                                          3. Nodes are constantly listening. When a node k
                                                                               receives a HELLO message from node n, it first
                                                                               checks if that neighbor n is already in the list. If
                                                                               not, the new neighbor n is added to the list, and
                                                                               the routing table Tk is updated, adding an entry
                                                                               for every destination d with an associated
                                                                               probability Pnd that is initialized to a minimum
                                                                               value.
The value of α weighs the importance of the heuristic
value with respect to the pheromone values.
                                                                                    4. EXPERIMENTAL RESULTS
3) If a cycle is detected, the cycle's nodes are removed
and all the memory about them is deleted. When an ant                The protocol is simulated in NS-2. The metric for
reaches a node that is already in its memory, a cycle is             goodness of a selected path is assumed to be hop count.
                                                                     The protocol constructs the probabilistic routing tables,
                                                                                                                                    3
                                          All Rights Reserved © 2012 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                 Volume 1, Issue 1, March 2012



    where better paths among all available paths have higher
    pheromone concentration. Thus, a path consisting of a
    series of links with highest pheromone values is always
    the favorable path between any source destination pair.
    The protocol also calculates next best path having lower
    pheromone value which would be helpful in selecting
    next best alternative path in case of link failures, without
    additional overheads.
    The simulation modeled a network of 12 mobile nodes
    places randomly. Considering a single session in which
    they will be found in this arrangement. The channel
    capacity is 2Mb/s. simulation time is 11.2s, the time                                              Next hop
    which the algorithm takes to converge. The time interval                                   7            5            3            1
                                                                                Dest
    at which forward ants are launched is 0.03s.                                 .
                                                                                 0          0.148759     0.773045     0.070153     0.008043


    The table 1 to 9 represent the resulting routing tables at                   1          0.000000     0.000000     0.000000     1.000000

    nodes 0 to 8 for an arbitrary topology. The first column                     3          0.051738     0.000002     0.948258     0.000001
    represents the destination node. The other columns are
    the next hop neighbor for corresponding destination.                         4          0.096252     0.867587     0.031585     0.004575
    The pheromone value, which indicates the probability of
                                                                                 5          0.118359     0.775141     0.106500     0.000000
    chosing corresponding next node by the packet for tha
    destination.                                                                 6          0.422056     0.015825     0.562082     0.000037


                                                                                 7          0.814397     0.000337     0.185266     0.000000

                                                         Next hop                8          0.028491     0.905406     0.062376     0.003726
                  Next hop
                                                         hop
      Dest.
                  hop5                          Dest.        2                   9          0.397596     0.275681     0.323983     0.002739
       0          1.000000                       0       1.000000
       1          1.000000                       2       1.000000               10          0.661876     0.051746     0.286060     0.000318
       2          1.000000                       3       1.000000
       3          1.000000                       4       1.000000               11          0.768465     0.023789     0.207734     0.000012

       5          1.000000                       5       1.000000
       6          1.000000                       6       1.000000
       7          1.000000                       7       1.000000                    Table 3: Routing table at Node 2
       8          1.000000                       8       1.000000
       9          1.000000                       9       1.000000
       10         1.000000                       10      1.000000
       11         1.000000                       11      1.000000


Table1:Routing table at Node 0          Table2: Routing table at Node
1                                                                                                       Next hop
                                                                                                        hop
                                                                                                   7            6            2
                                                                                     Dest
                                                                                       0      0.181896     0.350873     0.467231


                                                                                       1      0.163355     0.003541     0.833103


                                                                                       2      0.090559     0.000004     0.909436


                                                                                       4      0.234556     0.483971     0.281473

                             Next hop                                                  5      0.103101     0.505072     0.391827

                  Dest.
                             hop5
                                                                                       6      0.043832     0.915430     0.040738
                   0         1.000000
                   1         1.000000                                                  7      0.815368     0.093947     0.090685
                   2         1.000000
                   3         1.000000                                                  8      0.130459     0.458348     0.411193
                   4         1.000000
                   5         1.000000                                                  9      0.259107     0.650321     0.090572
                   6         1.000000
                   7         1.000000                                                10       0.483465     0.412383     0.104152
                   9         1.000000
                   10        1.000000                                                11       0.627195     0.219325     0.153480

                   11        1.000000


              Table5: Routing table at Node 4                                        Table 4: Routing table at Node 3


                                                                                                                                              4
International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                                                    Volume 1, Issue 1, March 2012




                                              Next hop
           9             8           6        hop
                                                4            2            0                                                      Next hop
Dist.
                                                                                                                                 hop
 0      0.000000      0.000000    0.000000    0.000000    0.000000     0.999999                                         10             9         7          5          3
                                                                                                              Dest
                                                                                                               .
 1      0.043916      0.000127    0.136472    0.000127    0.819231     0.000127                                0      0.076955     0.172125   0.008356   0.729907   0.012657

 2      0.062009      0.000000    0.140939    0.000000    0.797052     0.000000                                1      0.016061     0.145939   0.161019   0.085261   0.591721

 3      0.310379      0.000008    0.465300    0.000008    0.224296     0.000008                                2      0.002451     0.108759   0.212591   0.043728   0.632471

 4      0.000000      0.000000    0.000000    1.000000    0.000000     0.000000                                3      0.000139     0.000000   0.111298   0.000000   0.888562

 6      0.373372      0.000000    0.596386    0.000000    0.030242     0.000000                                4      0.001381     0.307327   0.004176   0.666984   0.020131

 7      0.324202      0.000001    0.331045    0.000001    0.344750     0.000001                                5      0.050645     0.302448   0.000068   0.646315   0.000523

 8      0.000000      0.999999    0.000000    0.000000    0.000000     0.000000                                7      0.002219     0.000005   0.701497   0.000000   0.296278

 9      0.908237      0.000000    0.073511    0.000000    0.018252     0.000000                                8      0.051266     0.056839   0.021544   0.862462   0.007889

10      0.715963      0.000001    0.189954    0.000001    0.094082     0.000001                                9      0.082513     0.906571   0.010490   0.010490   0.000001

11      0.485468      0.000056    0.173503    0.000056    0.340861     0.000056                                10     0.742717     0.187890   0.069197   0.000001   0.000194


                                                                                                               11     0.373550     0.013431   0.594944   0.000052   0.018023


               Table 6: Routing table at Node 5
                                                                                                                     Table 7: Routing table at Node 6




                                  Next hop
                          11             6        3              2
               Dest
                .
                0      0.303749    0.345789    0.234074    0.116388


                1      0.004259    0.142377    0.409604    0.443761


                2      0.000012    0.091400    0.464665    0.443924
                                                                                                              Next hop
                3      0.000014    0.116202    0.831522    0.052262
                                                                                                     Dest.         5
                4      0.256849    0.372338    0.065490    0.305323                                   0        1.000000
                                                                                                      1        1.000000
                5      0.276445    0.270299    0.284796    0.168460                                   2        1.000000
                                                                                                      3        1.000000
                6      0.219529    0.593945    0.130406    0.056120                                   4        1.000000
                                                                                                      5        1.000000
                8      0.130434    0.204408    0.474848    0.190310                                   6        1.000000
                                                                                                      7        1.000000
                9      0.750064    0.205366    0.043878    0.000692
                                                                                                      9        1.000000
                                                                                                      10       1.000000
               10      0.978475    0.001516    0.019996    0.000012
                                                                                                      11       1.000000
               11      1.000000    0.000000    0.000000    0.000000

                                                                                              Table 9: Routing table at Node 8
                             Table 8: Routing table at Node 7



                                                                                                                                                                           5
                                                                     All Rights Reserved © 2012 IJARCET
International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                           Volume 1, Issue 1, March 2012



                                                                       sent around the network for route maintenance and
                                                                       discovery.




              5. PERFORMANCE ANALYSIS

The performance of the algorithm is evaluated in
different scenarios. The performance of the algorithm is
also compared to an existing algorithm AODV.
A simulation setting was created with 12 mobile nodes
randomly placed to form an ad hoc network. The nodes                Figure 3: Average End-to-End Delay measured against
move with a maximum velocity of 10m/s. The metrics                    varying Pause times of mobile nodes
chosen to evaluate the efficiency and effectiveness of
protocol were
     1) Packet Delivery Ratio- The ratio of the number
          of packets delivered to the destination to the
          number of packets generated by sources.
     2) Average End-to-End Delay- This is the average
          time taken by a data packet to travel from the
          source to the destination.
     3) Control Overhead- The control overhead is the
          total number of routing packets transmitted for
          the entire simulation time.                                  Figure 4: Routing Control Overhead measured against
The performance comparison of ACO Algorithm with                       varying Pause times of mobile nodes
AODV is carried out in an increasingly dynamic
environment. We vary the node mobility by decreasing the                                      6. CONCLUSION
node pause time. The lower the pause time the higher the
mobility.
                                                                       The protocol implementation has been successfully
In Figure 2, the packet delivery ratio is measured at
                                                                       carried out in ns-2. The protocol implementation shows
varying pause time, both algorithms show improved
                                                                       superior performance. The adaptive and probabilistic
performance. Their performance actually alternates,
                                                                       behavior is depicted in the resulting routing tables. The
AODV starts out better but ACO Algorithm finishes with
                                                                       experiments generated correct routing tables for all
higher delivery ratio for longer pause times.
                                                                       topologies simulated. In this paper an improvement on
Figure 3, shows that AODV experiences a higher                         previously proposed AntNet Algorithm is done for
end-to-end delay than ACO Algorithm. The delay in ACO                  routing in MANET. It uses neighbor discovery protocol
Algorithm is usually significant at the start of the simulation        for route maintenance and handle link failures in the
because of the initial search for routes. Intermediate nodes           network. The efficiency of the protocol is compared to
in AODV are able to respond to route requests thus saving              an existing protocol. It gives a better approach to find
the time for path discovery. In ACO Algorithm, the source              best route based to the current traffic load and network
node has to wait till it gets a BANT sent by the destination.          condition.
                                                                       There are many of directions in which the current work
                                                                       can be extended. As the protocol is resource intensive
                                                                       algorithm. An obvious extension of the current work
                                                                       would be a variant of the algorithm that has lesser routing
                                                                       overhead and memory requirements.



                                                                                            REFERENCES


                                                                       [1] “Ant Colony Optimization”, Marco DArigo and Thomas
                                                                            Stutzle,                      MIT Press Landon, England
                                                                       [2] “Artificial Ants as a Computation Intelligence Technique”
Figure 2: Packet Delivery Ratio measured against                            Macro Dorigo, Mauro Birattari, and Thomas STUTZLE,
varying Pause times of mobile node                                          Technical report No. TR/IRIDIA/2006-023 September 2006
                                                                       [3] M. D. E. Bonabeau and G. Theraulaz. “Swarm
                                                                            Intelligence:From natural to artifical systems”. Oxford
In Figure 4, ACO Algorithm experiences quite a bit of                       University Press, New York, NY, 1999.
overhead due to different control packets that have to be              [4] J.-L. Deneubourg, S. Aron, S. Goss, and J.-M. Pasteels, “The
                                                                            selforganizing exploratory pattern of the Argentine ant,”
                                                                            Journal of Insect Behavior, vol. 3, p. 159, 1990.


                                                                                                                                      6
International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                               Volume 1, Issue 1, March 2012

[5] C. Perkins and E. M. Royer. “Ad–hoc on-demand distance
    vector routing”. In Proceedings of 2nd IEEE Workshop on
    Mobile Computing Systems and Applications,
[6] C. Perkins and P. Bhagwat. “Highly Dynamic
    Destination-Sequenced Distance-Vector Routing (DSDV) for
    Mobile Computers”. In ACM SIGCOMM’ 94 Conference on
    Communications Architectures, Protocols and Applications.
[7] Z. J. Haas. A new Routing Protocol for Reconfigurable Wireless
    Networks. In Proceedings of IEEE International Conference on
    Universal Personal Communication, Atlanta, GA, October
    1997.
[8] G. Di Caro. Ant Colony Optimization and its application to
    adaptive routing in telecommunication networks. PhD thesis,
    Facult_e des Sciences Appliqu_ees, Universit_e Libre de
    Bruxelles, Brussels, Belgium, 2004.
[9] G. Di Caro and M. Dorigo. AntNet: Distributed stigmergetic
    control for communications networks. Journal of Artificial
    Intelligence Research (JAIR),1998.


                   Anubhuti Verma received her M.Tech degree in
                   Information Technology from Univesity School
                   of Information Technology, Guru Govind Singh
                   Indraprastha University, Delhi. She is Assistant
                   Professor in Deptt. Of Information Technology,
                   NIET, Greater Noida. Her major area of interest
                   include mobile computing and Network routing.
                   She has published four research papers in
                   national and international conferences.




                                                                                                                                          7
                                               All Rights Reserved © 2012 IJARCET

Weitere ähnliche Inhalte

Was ist angesagt?

The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Sciencetheijes
 
Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...dlogumorappur
 
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORK
C OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORKC OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORK
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORKIJCI JOURNAL
 
Based on pause time comparative analysis made among bee ant colony optimized ...
Based on pause time comparative analysis made among bee ant colony optimized ...Based on pause time comparative analysis made among bee ant colony optimized ...
Based on pause time comparative analysis made among bee ant colony optimized ...Alexander Decker
 
Zone based ant colony routing in manet by kumar bharagava (comp.sc. engg)
Zone based ant colony routing in manet by  kumar bharagava (comp.sc. engg)Zone based ant colony routing in manet by  kumar bharagava (comp.sc. engg)
Zone based ant colony routing in manet by kumar bharagava (comp.sc. engg)kumar65
 
Performance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsPerformance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsIOSR Journals
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksijujournal
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...ijujournal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkIOSR Journals
 

Was ist angesagt? (17)

The International Journal of Engineering and Science
The International Journal of Engineering and ScienceThe International Journal of Engineering and Science
The International Journal of Engineering and Science
 
Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...Performance measured in wireless ad hoc networks using multicost parameters b...
Performance measured in wireless ad hoc networks using multicost parameters b...
 
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORK
C OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORKC OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORK
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORK
 
Based on pause time comparative analysis made among bee ant colony optimized ...
Based on pause time comparative analysis made among bee ant colony optimized ...Based on pause time comparative analysis made among bee ant colony optimized ...
Based on pause time comparative analysis made among bee ant colony optimized ...
 
Fp3610261032
Fp3610261032Fp3610261032
Fp3610261032
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
Zone based ant colony routing in manet by kumar bharagava (comp.sc. engg)
Zone based ant colony routing in manet by  kumar bharagava (comp.sc. engg)Zone based ant colony routing in manet by  kumar bharagava (comp.sc. engg)
Zone based ant colony routing in manet by kumar bharagava (comp.sc. engg)
 
Ijcta2011020605
Ijcta2011020605Ijcta2011020605
Ijcta2011020605
 
Performance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer ModelsPerformance Evaluation of Routing Protocols for MAC Layer Models
Performance Evaluation of Routing Protocols for MAC Layer Models
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Performance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networksPerformance comparison of routing protocols in mobile ad hoc networks
Performance comparison of routing protocols in mobile ad hoc networks
 
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...P ERFORMANCE C OMPARISON OF  R OUTING  P ROTOCOLS IN  M OBILE  A D  H OC  N E...
P ERFORMANCE C OMPARISON OF R OUTING P ROTOCOLS IN M OBILE A D H OC N E...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
498 503
498 503498 503
498 503
 
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc NetworkLink Stability and Energy Aware routing Protocol for Mobile Adhoc Network
Link Stability and Energy Aware routing Protocol for Mobile Adhoc Network
 
213 221
213 221213 221
213 221
 

Andere mochten auch (9)

51 54
51 5451 54
51 54
 
Pdf
PdfPdf
Pdf
 
167 169
167 169167 169
167 169
 
370 374
370 374370 374
370 374
 
17 51-1-pb
17 51-1-pb17 51-1-pb
17 51-1-pb
 
341 345
341 345341 345
341 345
 
92 97
92 9792 97
92 97
 
346 351
346 351346 351
346 351
 
182 185
182 185182 185
182 185
 

Ähnlich wie 13 48-1-pb

Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Editor Jacotech
 
Implementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for ManetImplementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for ManetIRJET Journal
 
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2
A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2 A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2 IJCI JOURNAL
 
Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...IOSR Journals
 
A novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsA novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsIJCNCJournal
 
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORK
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORKPERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORK
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORKKhushbooGupta145
 
Paper id 2120147
Paper id 2120147Paper id 2120147
Paper id 2120147IJRAT
 
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBORouting Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBOIJERA Editor
 
A swarm intelligence-based unicast routing protocol for hybrid ad hoc networks
A swarm intelligence-based unicast routing protocol for hybrid ad hoc networksA swarm intelligence-based unicast routing protocol for hybrid ad hoc networks
A swarm intelligence-based unicast routing protocol for hybrid ad hoc networksMarc Manthey
 
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...IJCNCJournal
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemIOSR Journals
 
Zone based ant colony routing in manet by kumar bharagava (comp.sc. engg)
Zone based ant colony routing in manet by  kumar bharagava (comp.sc. engg)Zone based ant colony routing in manet by  kumar bharagava (comp.sc. engg)
Zone based ant colony routing in manet by kumar bharagava (comp.sc. engg)kumar65
 
Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...IJRES Journal
 

Ähnlich wie 13 48-1-pb (20)

102 104
102 104102 104
102 104
 
Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...Ant colony optimization based routing algorithm in various wireless sensor ne...
Ant colony optimization based routing algorithm in various wireless sensor ne...
 
Ant
AntAnt
Ant
 
Implementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for ManetImplementation of Optimized Ant Based Routing Algorithm for Manet
Implementation of Optimized Ant Based Routing Algorithm for Manet
 
F0943236
F0943236F0943236
F0943236
 
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2
A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2 A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2
 
Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...Comparison of different Ant based techniques for identification of shortest p...
Comparison of different Ant based techniques for identification of shortest p...
 
L1102017479
L1102017479L1102017479
L1102017479
 
A novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manetsA novel hierarchical ant based qos aware intelligent routing scheme for manets
A novel hierarchical ant based qos aware intelligent routing scheme for manets
 
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORK
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORKPERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORK
PERFORMANCE ANALYSIS OF ANTHOCNET ROUTING PROTOCOL FOR HYBRID AD HOC NETWORK
 
Paper id 2120147
Paper id 2120147Paper id 2120147
Paper id 2120147
 
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBORouting Enhancement of MANETs using Hybrid Protocol Combined with PBO
Routing Enhancement of MANETs using Hybrid Protocol Combined with PBO
 
A swarm intelligence-based unicast routing protocol for hybrid ad hoc networks
A swarm intelligence-based unicast routing protocol for hybrid ad hoc networksA swarm intelligence-based unicast routing protocol for hybrid ad hoc networks
A swarm intelligence-based unicast routing protocol for hybrid ad hoc networks
 
K017426872
K017426872K017426872
K017426872
 
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
AN EFFICIENT ANT BASED QOS AWARE INTELLIGENT TEMPORALLY ORDERED ROUTING ALGOR...
 
I010525057
I010525057I010525057
I010525057
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
Zone based ant colony routing in manet by kumar bharagava (comp.sc. engg)
Zone based ant colony routing in manet by  kumar bharagava (comp.sc. engg)Zone based ant colony routing in manet by  kumar bharagava (comp.sc. engg)
Zone based ant colony routing in manet by kumar bharagava (comp.sc. engg)
 
Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...Optimal Data Collection from a Network using Probability Collectives (Swarm B...
Optimal Data Collection from a Network using Probability Collectives (Swarm B...
 

Mehr von Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Mehr von Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Kürzlich hochgeladen

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Kürzlich hochgeladen (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

13 48-1-pb

  • 1. International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 1, March 2012 Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol Anubhuti Verma Abstract— Ant Colony Optimization is based on the MANETs. One interesting research area in MANET is capability of real ant colonies of finding the shortest path from routing. In MANETs the transmission range of nodes is nest to food source by depositing and following the trail of limited so the nodes in MANETs act as both hosts and pheromone on the path. Pheromone is a chemical deposited on routers. The routing protocol for MANETs needs to be ground by the ants while walking and it affect their moving flexible enough to adapt to the continuously changing decisions based on the intensity. The main components for ACO optimization are: set of software agent (artificial ant), use of network topologies, and to support bandwidth memory and strategies of collective and distributed learning. management and energy management as the nodes are Many ACO algorithms were designed and implemented for TSP power constrained. which was very successful in finding optimal tour. Recently, nature’s self-organizing systems (Swarm In MANET routing is a challenging issue because of Intelligence) [3] such as ant colony optimization dynamically changing network topology which needs to be algorithms [1] are proved to be efficient in developing addressed. In this paper we analyze an ACO based routing routing algorithm for MANET. Ant Colony algorithm inspired by the foraging behavior of ants, to route Optimization (ACO) is based on the capability of real packets through shorter and feasible routes. Each ant while ant colonies of finding the shortest path from nest to moving towards destination collects information about the time length, congestion status and address of each visited node of the food source [1]. The ants coordinate their activities via followed path. During backward travel, local network traffic stigmergy (a form of indirect communication mediated model and routing table is modified by ant based on the by modifications of the environment). Ant uses goodness of the followed path. The protocol is capable of pheromone to communicate with other ants. Pheromone discovering path for dynamic changing topology and varying is a chemical deposited on ground by the ants while traffic over the network and gives high redundancy and fault walking and it affect their moving decisions based on the tolerance. Analysis shows that the proposed ACO based routing intensity. In this paper ACO based network routing protocol gives performance improvement over other routing algorithm is analyzed inspired by the foraging behavior protocol by continuously checking for better paths in the network with less overhead. of the ants, to route packets through shorter and feasible routes. Index Terms— ACO, MANET, Routing Protocol The remainder of this paper is organized as follows. In section 2 we describe related work. The algorithm is 1. INTRODUCTION described in section 3. In section 4, performance analysis of the algorithm is done. Finally a conclusion is A mobile ad hoc network (MANET) is an infrastructure less given in section 5. networks consisting of mobile nodes, with constantly changing topologies, the nodes are mobile and they communicates through a wireless medium. Due to 2. RELATED WORK infrastructure less and dynamic nature of such networks, there is requirement of new set of networking strategies In this section we describe related literature. In 2.1 a which is to be implemented for efficient end-to-end short introduction to MANET routing algorithms is communication. This, along with the diverse application of given, and these networks in many different scenarios such as battlefield in 2.2 we give an overview of Ant Colony Optimization. and disaster recovery, has seen Mobile Ad Hoc Networks Then in 2.3 we describe the basic elements of ANT (MANETs) being researched by many different based routing. organizations and academia. MANETs employ the traditional TCP/IP structure to provide end-to-end communication between the nodes. However, due to their 2.1 ROUTING IN MANET mobility and the limited resource in wireless networks, each layer in the TCP/IP model requires redefinition or In recent years several protocols have been proposed to modifications to function efficiently in address the routing problem in MANETs. These 1 All Rights Reserved © 2012 IJARCET
  • 2. International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 1, March 2012 protocols can be characterized as proactive, reactive or 2.3 ANT BASED ROUTING hybrid based on their design approach. Proactive routing The basic idea behind ACO algorithms for routing [8] is protocol maintains global topology information in the the acquisition of routing information through sampling form of tables at every node E.g. DSDV [6]. In reactive of paths using agents, which are called ants. An ant going protocol node only gather routing information E.g. from source node s to destination node d collects AODV [5]. Reactive algorithms are in general more information about the quality of the path (e.g. end-to-end scalable since they are never prepared for disrupted delay, number of hops, etc.), and uses this on its way back events. Hybrid protocols make use of both proactive and from d to s to update the routing information at the reactive protocol to achieve better performance E.g. intermediate nodes. ZRP [7]. The routing tables contain for each destination a vector of real-valued entries, one for each known neighbor 2.2 OVERVIEW OF ANT COLONY OPTIMIZATION node. These entries are a measure of the goodness of Ant Colony Optimization (ACO) takes inspiration from going over that neighbor on the way to the destination. the behavior of the real ant colony. These ants deposit They are termed pheromone variables, and are pheromone on the ground in order to mark some continually updated according to path quality values favorable path to reach the food source that should be calculated by the ants. The ant searches for a number of followed by other member of the colony. Ant colony paths at each node each with an estimated measure of optimization exploits similar mechanism for solving quality. In turn, the ants use the routing tables at each optimization problems. The algorithm can find the node to stochastically choose a next hop, giving higher optimum solution by generating artificial ants. As the probability to those links which are associated with real ants search their environment for food, the artificial higher pheromone values. ants search the solution space. The pheromone This process of ant agent in routing is very similar to the trail-laying and trail-following behavior of some ant pheromone lying and following behavior of real ant species is investigated by several experiments. One colonies. The pheromone information is used for routing data packets, choosing with higher probability those links associated with higher pheromone values. In this way data for same destination are spread over multiple paths (but with more packets going over the best paths). 3. ACO ROUTING ALGORITHM FOR MANET i ii iii The ACO algorithm is designed to help solve the brilliant experiment was designed and run by Goss [4]. problem in mobile ad hoc network. Many different ACO based routing algorithms have been proposed and Figure 1: (i) Initially ants choose path randomly (ii) Ant designed so far to tackle the problem of routing in choosing shorter path will reach first (iii) Pheromone MANET. The ACO technique for routing in MANETs deposited more quickly on shorter path, number of ants uses stigmergy (indirect communication by modifying keep on increasing on sorter path. the environment) process to determine the best possible routes from a source node to a destination node. Artificial ants are placed at each node and they mark These studies have given insight into the foraging their trails with pheromone as they move within the behavior of ants showing that they are always able to network. The level of concentration of pheromone on a determine, over time, the shortest path from their nest to trail depends upon the quality of the path. a food source and also adapt easily adapt to path disruptions that may occur. This phenomenon can be The proposed algorithm is a modification of AntNet explained using Figures (i) to (iii). While moving ants algorithm [9] because AntNet has been designed for deposit pheromone on their path which evaporates over fixed network and we are going to use it in ad-hoc time. The ants are attracted towards a higher network, where the topology is highly dynamic. Thus, a concentration of pheromone which enables them to neighbor discovery protocol is added in route choose shortest paths since these would retain a higher maintenance phase to deal with mobility. Other phases concentration each time than longer Ants choose follow the procedure given in AntNet. whether to turn left or right with equal probability. The ant that choose the shorter path by chance will acquire a 3.1 NODE DATA STRUCTURE path between the nest and food that is faster and will AntNet is an ACO algorithm for data network routing reach the destination first than those taking the proposed by Gianni Di Caro and Marco Dorigo [2]. alternative path as in Figure (ii). This path will have Mobile agents (artificial ants) act concurrently and higher pheromone concentration and number of ant will independently, and communicate in an indirect way keep increasing as shown in Figure (iii). (stigmergically), through the pheromones they read and write locally on the nodes. Each network node k stores two data structures: 2
  • 3. International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 1, March 2012 1) Routing table detected and all the nodes until this recurrent node are For each possible destination d and for each neighbor deleted from the ants memory. node n, stores a probability value 4) When the destination node d is reached, the agent expressing the goodness of choosing n as next node Fs→d generates backward ant Bd→s, transfers to it all of its when the destination node is d: memory, and is deleted. 5) The backward ant takes the same path as that of its corresponding forward ant, but in the opposite direction. 6) Arriving at a node i coming from a neighbor node, the where d [1, N] backward ant updates the local model of the traffic Mi Nk = neighbor (k) Probability value represents the and the pheromone matrix Ti, for all the entries pheromone concentration along the link from node k to corresponding to the destination node d. neighbor node n for destination node d. • Update traffic model Mi The estimated mean and variance are updated as 2) Traffic model Mk follows: Mk (µd, σd2, Wd) is a statistical model of the traffic situation over the network as seen by node k. It is described by the sample mean µd and the variance σd2 computed over the trip times experienced by the artificial ants, and by a moving observation window Wd Where is the observed ant's trip time from node i used to store the best value Wbest_d of the artificial ants' to destination d. The factor ς weighs the number of trip time. most recent samples that will really affect the average. • Update pheromone matrix Ti 3.2 ACO ALGORITHM The backward ant Bd→s moving from node f to node i 1) At regular intervals ∆t from every network node s, a increases the pheromone values τifd’ forward ant Fs→d is launched toward a destination d to discover a feasible, low-cost path to that node and to investigate the load status of the network along the path. If fsd is a measure (in bits or in number of packets) of the data flow s→d, then the probability of creating at node s a forward ant with node d as destination is 3.3 NEIGHBOR DISCOVERY PROTOCOL This protocol works in parallel with the ACO Algorithm and its aim is to maintain a list with available neighbors While travelling toward their destination nodes, the to forward packets. It works as follows: forward ants keep memory of their paths and of the 1. Every node broadcasts, with periodicity traffic conditions found. The identifier of every visited HELLO_INTERVAL, a message to all node i and the time elapsed since the launching time to neighbors indicating that is available to forward arrive at this i-th node are stored in a memory stack. packets. 2) At each node i, each forward ant headed toward a 2. Also with periodicity HELLO_INTERVAL, destination d selects the node j to move to, with a every node checks if its neighbors are still probability Pijd computed as normalized sum of the available. If the node k has not received any pheromone τijd with a heuristic value ηij taking into HELLO message from neighbor n and current account the length of the j-th link queue of the current time is greater than the expire time, neighbor n node i: is deleted from the list. Furthermore, all entries in the routing table related to this neighbor are also erased. 3. Nodes are constantly listening. When a node k receives a HELLO message from node n, it first checks if that neighbor n is already in the list. If not, the new neighbor n is added to the list, and the routing table Tk is updated, adding an entry for every destination d with an associated probability Pnd that is initialized to a minimum value. The value of α weighs the importance of the heuristic value with respect to the pheromone values. 4. EXPERIMENTAL RESULTS 3) If a cycle is detected, the cycle's nodes are removed and all the memory about them is deleted. When an ant The protocol is simulated in NS-2. The metric for reaches a node that is already in its memory, a cycle is goodness of a selected path is assumed to be hop count. The protocol constructs the probabilistic routing tables, 3 All Rights Reserved © 2012 IJARCET
  • 4. International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 1, March 2012 where better paths among all available paths have higher pheromone concentration. Thus, a path consisting of a series of links with highest pheromone values is always the favorable path between any source destination pair. The protocol also calculates next best path having lower pheromone value which would be helpful in selecting next best alternative path in case of link failures, without additional overheads. The simulation modeled a network of 12 mobile nodes places randomly. Considering a single session in which they will be found in this arrangement. The channel capacity is 2Mb/s. simulation time is 11.2s, the time Next hop which the algorithm takes to converge. The time interval 7 5 3 1 Dest at which forward ants are launched is 0.03s. . 0 0.148759 0.773045 0.070153 0.008043 The table 1 to 9 represent the resulting routing tables at 1 0.000000 0.000000 0.000000 1.000000 nodes 0 to 8 for an arbitrary topology. The first column 3 0.051738 0.000002 0.948258 0.000001 represents the destination node. The other columns are the next hop neighbor for corresponding destination. 4 0.096252 0.867587 0.031585 0.004575 The pheromone value, which indicates the probability of 5 0.118359 0.775141 0.106500 0.000000 chosing corresponding next node by the packet for tha destination. 6 0.422056 0.015825 0.562082 0.000037 7 0.814397 0.000337 0.185266 0.000000 Next hop 8 0.028491 0.905406 0.062376 0.003726 Next hop hop Dest. hop5 Dest. 2 9 0.397596 0.275681 0.323983 0.002739 0 1.000000 0 1.000000 1 1.000000 2 1.000000 10 0.661876 0.051746 0.286060 0.000318 2 1.000000 3 1.000000 3 1.000000 4 1.000000 11 0.768465 0.023789 0.207734 0.000012 5 1.000000 5 1.000000 6 1.000000 6 1.000000 7 1.000000 7 1.000000 Table 3: Routing table at Node 2 8 1.000000 8 1.000000 9 1.000000 9 1.000000 10 1.000000 10 1.000000 11 1.000000 11 1.000000 Table1:Routing table at Node 0 Table2: Routing table at Node 1 Next hop hop 7 6 2 Dest 0 0.181896 0.350873 0.467231 1 0.163355 0.003541 0.833103 2 0.090559 0.000004 0.909436 4 0.234556 0.483971 0.281473 Next hop 5 0.103101 0.505072 0.391827 Dest. hop5 6 0.043832 0.915430 0.040738 0 1.000000 1 1.000000 7 0.815368 0.093947 0.090685 2 1.000000 3 1.000000 8 0.130459 0.458348 0.411193 4 1.000000 5 1.000000 9 0.259107 0.650321 0.090572 6 1.000000 7 1.000000 10 0.483465 0.412383 0.104152 9 1.000000 10 1.000000 11 0.627195 0.219325 0.153480 11 1.000000 Table5: Routing table at Node 4 Table 4: Routing table at Node 3 4
  • 5. International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 1, March 2012 Next hop 9 8 6 hop 4 2 0 Next hop Dist. hop 0 0.000000 0.000000 0.000000 0.000000 0.000000 0.999999 10 9 7 5 3 Dest . 1 0.043916 0.000127 0.136472 0.000127 0.819231 0.000127 0 0.076955 0.172125 0.008356 0.729907 0.012657 2 0.062009 0.000000 0.140939 0.000000 0.797052 0.000000 1 0.016061 0.145939 0.161019 0.085261 0.591721 3 0.310379 0.000008 0.465300 0.000008 0.224296 0.000008 2 0.002451 0.108759 0.212591 0.043728 0.632471 4 0.000000 0.000000 0.000000 1.000000 0.000000 0.000000 3 0.000139 0.000000 0.111298 0.000000 0.888562 6 0.373372 0.000000 0.596386 0.000000 0.030242 0.000000 4 0.001381 0.307327 0.004176 0.666984 0.020131 7 0.324202 0.000001 0.331045 0.000001 0.344750 0.000001 5 0.050645 0.302448 0.000068 0.646315 0.000523 8 0.000000 0.999999 0.000000 0.000000 0.000000 0.000000 7 0.002219 0.000005 0.701497 0.000000 0.296278 9 0.908237 0.000000 0.073511 0.000000 0.018252 0.000000 8 0.051266 0.056839 0.021544 0.862462 0.007889 10 0.715963 0.000001 0.189954 0.000001 0.094082 0.000001 9 0.082513 0.906571 0.010490 0.010490 0.000001 11 0.485468 0.000056 0.173503 0.000056 0.340861 0.000056 10 0.742717 0.187890 0.069197 0.000001 0.000194 11 0.373550 0.013431 0.594944 0.000052 0.018023 Table 6: Routing table at Node 5 Table 7: Routing table at Node 6 Next hop 11 6 3 2 Dest . 0 0.303749 0.345789 0.234074 0.116388 1 0.004259 0.142377 0.409604 0.443761 2 0.000012 0.091400 0.464665 0.443924 Next hop 3 0.000014 0.116202 0.831522 0.052262 Dest. 5 4 0.256849 0.372338 0.065490 0.305323 0 1.000000 1 1.000000 5 0.276445 0.270299 0.284796 0.168460 2 1.000000 3 1.000000 6 0.219529 0.593945 0.130406 0.056120 4 1.000000 5 1.000000 8 0.130434 0.204408 0.474848 0.190310 6 1.000000 7 1.000000 9 0.750064 0.205366 0.043878 0.000692 9 1.000000 10 1.000000 10 0.978475 0.001516 0.019996 0.000012 11 1.000000 11 1.000000 0.000000 0.000000 0.000000 Table 9: Routing table at Node 8 Table 8: Routing table at Node 7 5 All Rights Reserved © 2012 IJARCET
  • 6. International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 1, March 2012 sent around the network for route maintenance and discovery. 5. PERFORMANCE ANALYSIS The performance of the algorithm is evaluated in different scenarios. The performance of the algorithm is also compared to an existing algorithm AODV. A simulation setting was created with 12 mobile nodes randomly placed to form an ad hoc network. The nodes Figure 3: Average End-to-End Delay measured against move with a maximum velocity of 10m/s. The metrics varying Pause times of mobile nodes chosen to evaluate the efficiency and effectiveness of protocol were 1) Packet Delivery Ratio- The ratio of the number of packets delivered to the destination to the number of packets generated by sources. 2) Average End-to-End Delay- This is the average time taken by a data packet to travel from the source to the destination. 3) Control Overhead- The control overhead is the total number of routing packets transmitted for the entire simulation time. Figure 4: Routing Control Overhead measured against The performance comparison of ACO Algorithm with varying Pause times of mobile nodes AODV is carried out in an increasingly dynamic environment. We vary the node mobility by decreasing the 6. CONCLUSION node pause time. The lower the pause time the higher the mobility. The protocol implementation has been successfully In Figure 2, the packet delivery ratio is measured at carried out in ns-2. The protocol implementation shows varying pause time, both algorithms show improved superior performance. The adaptive and probabilistic performance. Their performance actually alternates, behavior is depicted in the resulting routing tables. The AODV starts out better but ACO Algorithm finishes with experiments generated correct routing tables for all higher delivery ratio for longer pause times. topologies simulated. In this paper an improvement on Figure 3, shows that AODV experiences a higher previously proposed AntNet Algorithm is done for end-to-end delay than ACO Algorithm. The delay in ACO routing in MANET. It uses neighbor discovery protocol Algorithm is usually significant at the start of the simulation for route maintenance and handle link failures in the because of the initial search for routes. Intermediate nodes network. The efficiency of the protocol is compared to in AODV are able to respond to route requests thus saving an existing protocol. It gives a better approach to find the time for path discovery. In ACO Algorithm, the source best route based to the current traffic load and network node has to wait till it gets a BANT sent by the destination. condition. There are many of directions in which the current work can be extended. As the protocol is resource intensive algorithm. An obvious extension of the current work would be a variant of the algorithm that has lesser routing overhead and memory requirements. REFERENCES [1] “Ant Colony Optimization”, Marco DArigo and Thomas Stutzle, MIT Press Landon, England [2] “Artificial Ants as a Computation Intelligence Technique” Figure 2: Packet Delivery Ratio measured against Macro Dorigo, Mauro Birattari, and Thomas STUTZLE, varying Pause times of mobile node Technical report No. TR/IRIDIA/2006-023 September 2006 [3] M. D. E. Bonabeau and G. Theraulaz. “Swarm Intelligence:From natural to artifical systems”. Oxford In Figure 4, ACO Algorithm experiences quite a bit of University Press, New York, NY, 1999. overhead due to different control packets that have to be [4] J.-L. Deneubourg, S. Aron, S. Goss, and J.-M. Pasteels, “The selforganizing exploratory pattern of the Argentine ant,” Journal of Insect Behavior, vol. 3, p. 159, 1990. 6
  • 7. International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 1, March 2012 [5] C. Perkins and E. M. Royer. “Ad–hoc on-demand distance vector routing”. In Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications, [6] C. Perkins and P. Bhagwat. “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”. In ACM SIGCOMM’ 94 Conference on Communications Architectures, Protocols and Applications. [7] Z. J. Haas. A new Routing Protocol for Reconfigurable Wireless Networks. In Proceedings of IEEE International Conference on Universal Personal Communication, Atlanta, GA, October 1997. [8] G. Di Caro. Ant Colony Optimization and its application to adaptive routing in telecommunication networks. PhD thesis, Facult_e des Sciences Appliqu_ees, Universit_e Libre de Bruxelles, Brussels, Belgium, 2004. [9] G. Di Caro and M. Dorigo. AntNet: Distributed stigmergetic control for communications networks. Journal of Artificial Intelligence Research (JAIR),1998. Anubhuti Verma received her M.Tech degree in Information Technology from Univesity School of Information Technology, Guru Govind Singh Indraprastha University, Delhi. She is Assistant Professor in Deptt. Of Information Technology, NIET, Greater Noida. Her major area of interest include mobile computing and Network routing. She has published four research papers in national and international conferences. 7 All Rights Reserved © 2012 IJARCET