Reengineering MANET Routing Using Ant Co PDF
Reengineering MANET Routing Using Ant Co PDF
Ebenezer K. Gavua
Comp. Science Department, Koforidua Technical University
Box KF 981, KTU, Koforidua
ABSTRACT
A wireless network topology that comprise heterogeneous
routing paths without the supported of any preliminary
network infrastructure is known as a Mobile Ad Hoc
Network. Therefore, the nodes have the capacity to forward
packets to nodes. Furthermore, MANET properties, namely;
dynamic topology, nodal mobility, provide a large degree of
freedom and the ability to self-organize give them an urge
over other network architectures and topologies. For that
matter, designing and developing secure routing algorithms
becomes a daunting task for the researcher. To this end, this
paper seek to compare preexisting and proposed routing
algorithm for MANET based on the mechanism of the ant
system , hence Ant Colony Optimization frame would be
adopted. It is notable that MANET bandwidth, radio
propagation, energy supply, etc. Different MAC protocols
have proposed for adhoc networks. In this research, a new
algorithm based on the Ant Colony Optimization algorithm
framework is proposed. The proposed Ant Colony Fig. 1: A Pictorial Representation of Ant Colony
Optimization algorithm known as Optimized Multicast Optimization Algorithms (Anibrika et al., 2020; Dorigo et
Routing Algorithm was implemented with the aid of MANET al., 2006)
simulation in Mathlab and a performance comparison was
carried out. The study compared, the propriety protocol 1.2 Problem Statement
AODV, with the proposed algorithm. It was observed the Mobile devices engaged in MANET communication have the
proposed protocol outperformed AODV under the quantitative potential to connect to wireless networks. The tendency of
metrics used. such mobile devices to connect to wireless networks is termed
as Mobile Ad-hoc NETworks (Jha, 2010; Kumar et al, 2013).
General Terms These networks are infrastructureless in nature. Because they
Routing Protocols, Energy-Efficiency, Wireless Routing. Ant lack infrastructure as their “building block”, a MANET could
Colony Optimization. be deployed with lower power costs. Due to the nature
MANET, routing in such networks are bedeviled with
Keywords numerous challenges. These challenges are worsened the
Ants, Algorithm, Nodes, Pheromone, Routing. unpredictable nature of nodal communication especially in
finding the shortest routes from source to destination. Several
1. INTRODUCTION algorithm were proposed to address such challenges. One
Applications such as emergency disaster relief to networking class of such algorithms is termed Ant Colony Optimization
laptops in a conference room rely on Mobile Ad Hoc (ACO) algorithms, (Dorigo et al., 2006). ACOs aside their
Networks for operability. Despite MANET challenges, several ability to address routing challenges in MANET are also
optimization models to address these routing algorithms were energy-efficient as they turn conserve the energy of the nodes
proposed in the past, each (routing algorithm) is primarily engaged in routing within MANET. The ant algorithm is
responsible for determining the minimum routes to reach the iterative, probabilistic meta-heuristic which are intended to
destination from the source as described in (Perkins and provide optimal solutions to combinatorial optimization
Bhagwat, 1994; Jacquet et al., 2001). Also, extensive research problems most importantly in MANETs (Tonk, 2012). In
were out in the area of energy-efficient routing algorithms. searching for food, ants exchange information through
Find below the conceptual view of using ACO algorithms in pheromone deposits, which is a mark of their respective route
modelling routing problems (Royer et al., 2001; Patel and from their nests to a food source and that also attracts more
Kamboj, 2015), see Fig. 1. ants to access the route. In some cases, a dynamic problem
38
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
might occur, demanding a change over time where the routing. Furthermore, each pheromone table has a routing
algorithm need to monitor by keeping track of the critical entry for each neighbor node, demonstrating the probability of
updates and consistently optimize the algorithm so as to using that neighbor’s node as the next hop. The choice of a
generate efficient solutions. The ant algorithm has several node choice is probabilistic while route creation is
striking characteristics such as its dynamism, robustness, deterministic Dorigo et al., 2006 ; Nand and Shama, 2011). A
adaption and its decentralized nature during node processing further explanation in Fig. 3 is found below:
(Tonk, 2012; Singh, 2013). These characteristics for dynamic
routing in modern wireless networks as in the case of
MANETs. To this end, this paper investigates Ant Colony
Optimization algorithms and their application to MANETs as
well as design a new multicast MANET routing algorithm that
is energy-efficient. Finally, a comparative study through
simulation would be carried out between AODV and the
proposed algorithm for MANET.
2. LITERATURE REVIEW
2.1 Ant-Based Control Algorithms
Research work in the past had focused on Swarm Intelligent
routing algorithms as described (Dorigo et al., 2006). Initially,
this algorithm was applied to circuit switched networks, like
the telephony network. However, the ABC algorithm was
later modeled analytically in (Singh, 2013). Again, a critical
component of this design (ABC) is the congestion-free
mechanism introduced stop calls from dropping
intermittently. In (Subramani A and Krishnan A, 2011), the
network topology and its routing updates are theoretically
modeled by means of a graph. Furthermore, each available
node is indicated by a total capacity Ci, a spare capacity Si and
an equally important routing table R𝑖. A link in the form of
(i,j) exemplifies, a vector quantity of unique pheromone
values Tij,d , which implies that, each destination d, represents
the tendency of a node traversing from i to j (Nand and
Shama, 2011). For this reasoning, the probabilistic values in
the routing table are rationalized as the ant traverses the node.
This is influenced by the pheromone trails and its intensities. Fig. 3. ABC model for pheromone update
This is furthermore explained in Fig 2.0 below. 2.3 AntNet Algorithm
According to (DiCaro and Dorigo, 2006; Shukla et al., 2013),
it is important to develop an improved algorithm influenced
by pheromone updates whereby an ant colony move
systematically in a food search process. It involves, the use of
stochastic decision making with local policy, which is once an
ant develops a possible solution to the problem. The ants
evaluate possibilities of the solution and leaves pheromone
trails (memory buffer) on the path about the connection the
ants established. Finally, this specialized information would
now be used to determine the forward-bias movements of
future ants (Rafiq et al., 2013). In the same vein (Atsushi
Iwata et al., 1999) described the traditional ACO algorithm
employed using a fixed amount of pheromone as means of
updating the pheromone table. (Atsushi Iwata et al., 1999),
however developed an adaptive adjustment strategy for the
pheromone introduced, making a relatively uniform
pheromone distribution based on probabilities. This strategy
can deal effectively with the confusion of expanding the ants’
search and finding optimal solution algorithms, for finding the
local optimal solution (Dorigo, 2006).
39
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
quantitative measurement (Dorigo, 2006; Anibrika et al., 3.3 A Scenario of the Simulation
2020).
Algorithm
2.5 Mobile Ad-Hoc Networks
The topographic structure is completely infrastructureless.
This phenomenon has created numerous challenges for
MANET research, since the ultimate aim of the routing
mechanism is unclear due to several challenges such as
limited bandwidth, power, and latency (Atsushi Iwata et al.,
1999; M. Bergamo; Jha, 2010; Chlamtac et al., 2003). The
diagram in Fig. 4 below, explains further.
3. SIMULATION STUDY
3.1 Introduction
The use of real life measurements is certainly costly (Chiang
et al., 1997). Therefore, the best approach to adopt is a
simulated environment.
3.2 Mobility
Nodal mobility are explained by the models known as
Mobility Models. Also, simulating mobility model is intended
to reveal the discrete nature of the routing algorithm. It shows
how well the algorithm can perform when subjected to certain Fig. 5. Flowchart of the simulation OMRA algorithm
conditions. It can also be used for inter-group communication
during the simulation stage (Arun and Shweta, 2016; Anibrika
et al., 2020; V. Davies; Tan et al., 2002).
40
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
41
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
42
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
i. Random Way Point: ii. End to End Delay for Mobility Models
A node selects a random position with the parameters (x, y).
This point becomes the destination point. Velocity (V) is
chosen by computing the distributed range of parameters
[minspeed, maxspeed]. This process is repeated based on the
destination and speed.
ii. Random Walk
It enables the nodes to freely move about selecting a speed
and a direction value in constant time intervals (Δt).
iii. Random Direction
The nodes choose an arbitrary direction within the specific
range [0, 2∏]. Again, the nodes’ velocity is chosen
consistently from the specified range [minspeed, maxspeed].
43
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
iv. Throughput for Mobility Models with Time vi. Packet Delivery Ratio for Mobility Models with Time
4.1 Conclusions/Recommendations
The three mobility models that is Random Waypoint Model,
Random Walk Model and Boundless Simulation Area
OMRA’s performance with the three mobility models over a Mobility Model and their impact was demonstrated through
certain time produced that were obtained for node speed of simulation using
50m/s (50 meters per second) and Mean Delay is
demonstrated in fig. 14,15 and 16 respectively. Throughput, End-to-End Delay, Packet Delivery Ratio and
Mean Delay are the major quantitative metrics that
In fig. 14 above, it is evident that, the Random Waypoint characterize network latency within a network. These network
(4330000 bps) and Random Walk (4430000) are relatively metrics have been examined through simulation.
similar with specific reference to Throughput whereas the
Throughput for Random Waypoint is comparatively stable. The output of the simulation results showed clearly that each
The Throughput for Random Walk portrays quite a steady mobility model was able to outperform the other two in
decline for a time period. However, the End-to-End Delay, as respect of one of the quantitative metrics mentioned above.
explained in fig. 15 below, is the lowest in terms of Random By considering the three parameters as a whole, it was clear
Waypoint, but the highest for Boundless Simulation Area that, the performance of Boundless Simulation Area seems
(3950000), especially when it is being used for the simulation. not to perform better than the remaining two mobility models.
This is because, it provided a better packet delivery, at the
From the results shown in fig. 16, random waypoint (0.8 secs) expense of lower Throughput and higher End-to-End Delay
seems to outperform the other two mobility models under and so far as Random Walk and Random Waypoint is
consideration. It rather it exhibited low throughput and high considered, OMRA especially with regards to Random
end-to-end delay. The Random walk value of 1 secs provided Waypoint Mobility is able to provide better Throughput with
better Packet Delivery Ratio than random waypoint mobility low End-to-End Delay.
model.
However, concerning Packet Delivery Ratio, the Random
v. End to End Delay for Mobility Models Walk is able to outperform that of the Random Waypoint
Mobility Model .It is also evident from the simulation results
that OMRA’s performance under the various quantitative
metrics differ from one type of mobility model to another.
5. REFERENCES
[1]. Perkins and Bhagwat, 1994] Charles E. Perkins and Pravin
Bhagwat, Highly dynamic destination-sequenced
distance-vector routing (DSDV) for mobile computers.
In ACM SIGCOMM'94 Conference on Communications
Architectures, Protocols and Applications, pp. 234-244,
1994.
[2]. Royer at al., 2001] Elizabeth M. Royer, P. M. Melliar-
Smith, Louise E. Moser. An Analysis of the Optimum
Node Density for Ad hoc Mobile Networks. Proceedings
of the IEEE International Conference on
Communications, Helsinki, Finland, 2001.
[3]. Patel, R.; Kamboj, P. Investigation of Network Simulation
Tools and Comparison Study: NS3 vs NS2. J. Netw.
Commun. Emerg. Technol. JNCET 2015, 5, 137–142
[4]. Jha RK, Limkar SV, Dr. Dalal UD, A Performance
Fig. 15. End to End Delay for Mobility Model with Time
Comparison of Routing Protocols (DSR and TORA) for
44
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
Security Issue in MANET (Mobile Ad Hoc Networks), [11]. Rafiq M, Manoj Kumar, Ahmed S, Comparative
International Journal of Computer Applications, Special Analysis of Energy Efficient Routing Protocols in
Issue on “Mobile Ad-hoc Networks” MANETs, 2010, MANET, International Journal of Computer
pp. 78-83. Applications, 2013, 82(5), pp. 1-6.
[5]. Sunil Kumar, Mishra R, Krishna Kumar, Singh BM, An [12]. [Atsushi Iwata et al., 1999] Atsushi Iwata, Ching-Chuan
Inspection of Mobility Models Routine on Routing Chiang, Guangyu Pei, Mario Gerla, and Tsu Wei Chen.
Protocols in Ad Hoc Network, International Journal of Scalable routing strategies for ad hoc wireless networks.
Engineering and Innovative Technology (IJEIT), 2013, Tech. Rep., Department of Computer Science University
2(8), pp. 269-274. of California, Los Angeles, 1999.
[6]. Tonk G, Kashyap I, Tyagi SS, Performance Comparison [13]. M. Bergamo. System design specification for mobile
of Ad-Hoc Network Routing Protocols using NS-2, multimedia wireless network (MMWN). Technical
International Journal of Innovative Technology and report, DARPA project, 1996.
Exploring Engineering (IJITEE), 2012 1(1), pp. 53-57.
[14]. [Chiang et al., 1997] Ching-Chuan Chiang, Hsiao-Kuang
[7]. Singh P, Bhola A, Jha CK, Simulation based Behavioral Wu, Winston Liu, and Mario Gerla. Routing in clustered
Study of AODV, DSR, OLSR and TORA Routing multihop, mobile wireless networks with fading channel.
Protocols in Manet, International Journal of Computer Tech. Rep., University of California at Los Angeles
Applications, 2013, 67(23), pp. 23-26. Computer Science Department, 1997.
[8]. Nand P, Dr. Sharma SC, Performance Study of Broadcast [15]. [Chlamtac et al., 2003] Chlamtac, M. Conti and J. J.-N.
based Mobile Adhoc Routing Protocols AODV, DSR Liu. Mobile ad hoc networking: imperatives and
and DYMO, International Journal of Security and its challenges. Ad Hoc Networks, Vol. (1), pages 13–64,
Applications, 2011, 5(1), pp. 53-64. 2003.
[9]. Subramani A, Krishnan A, Node Mobility Tracking in [16]. V. Davies. Evaluating mobility models within an ad hoc
Mobile Ad-Hoc Networks in their Geographical Position network. Master’s thesis, Colorado School of Mines,
(Dynamic Networks), International Journal of Soft 2000.
Computing and Engineering (IJSCE), ISSN: 2231-2307,
2011, 1(5), pp. 36-40. [17]. D.S.Tan, S. Zhou, J. Ho, J.S. Mehta, H. Tanabe. Design
and Evaluation of an Individually Simulated Mobility
[10]. Shukla AK, Jha CK, Sharma D, An Estimation of Model in Wireless Ad Hoc Networks. Communication
Routing Protocols in Mobility Models Used for Ad Hoc Networks and Distributed Systems Modeling and
Networks: Simulation Study, International Conference Simulation Conference, San Antonio, 2002.
on Advances in Computer Application (ICACA-2013),
Proceedings Published in International Journal of [18]. M. Dorigo, M. Birattari and T. Stutzle, "Ant colony
Computer Applications (IJCA) (975-8887), pp. 21-27. optimization," in IEEE Computational Intelligence
Magazine, vol. 1, no. 4, pp. 28-39, Nov. 2006, DOI:
10.1109/MCI.2006.329691
IJCATM : www.ijcaonline.org 45