“TWO PROCESSES BASED ROUTING ALGORITHM” FOR ANT COLONY OPTIMIZATION USING SWARM INTELLLIGENCE

advertisement
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 3, March 2013
ISSN 2319 - 4847
“TWO PROCESSES BASED ROUTING
ALGORITHM” FOR ANT COLONY
OPTIMIZATION USING SWARM
INTELLLIGENCE
Nishtha Jatana1, Dishant Gosain2 , Mehak Ahuja3, Ishita Kathuria4, Sahil Puri5
1
Assistant professor, Department of Computer Science and Engineering,
Maharaja Surajmal Institute of Technology, New Delhi, India
2,3,4,5
Student, Department of Computer Science and Engineering,
Maharaja Surajmal Institute of Technology, New Delhi, India
ABSTRACT
Swarm intelligence is the collective and organized behavior of decentralized systems, natural or artificial. ant colony. ACO
methods find its applications in problems that need to find paths to goals. In this paper, we propose an algorithm that can
improve performance of ACO. The proposed algorithm consists of two agents: the data agent and the routing agent where the
routing agent is responsible to prepare the routing table from the given source to destination and the data agent transfers the
data along that path. The earlier algorithms do this task with a common agent which also carries the data. This increases the
frame size of the packet and hence the time to process the packet at each node for extracting routing information.
Keywords: Swarm intelligence, MANETs, Routing, Ant Colony Optimization, AntNet, Ant Based Control
1. INTRODUCTION
Many social insect societies like ants, fishes, bees and birds, in spite of their simplicity as individuals, depict a complex
and often intelligent social behavior [1]. They form distributed decentralized autonomous systems which can
accomplish tasks that in some cases far exceed the capabilities of an individual insect. Thus, Swarm intelligence (SI) is
artificial intelligence based on the collective behaviour of decentralized, self-organized systems which allows them to
coordinate the activities and engage in collective problem-solving and decision-making.
Mobile Ad Hoc Networks [25] are networks which are composed of numerous mobile nodes which can connect to a
network or disconnect from the network anytime. These mobile nodes basically make wireless connections to connect to
the network. Routing is the task of forwarding the data packets from a source node to a required destination. This task
of forwarding is particularly hard in Mobile Ad Hoc Networks as the nodes are not fixed. Thus, algorithms used to
manage such network should be adaptive and self organizing.
Swarm intelligence aims at simplifying the behavior of this routing task in mobile ad hoc networks by taking
inspiration from natural patterns depicted by insect societies like ants etc.
2. PRINCIPLE OF SWARM INTELLIGENCE
The main principle which is used in these interactions is known as stigmergy or communicating using the
environment. Ant lays down pheromone on trails followed by it[26].
Pheromone is a potent hormone which can be sensed by ants as they travel along trails. It attracts ants and therefore
ants tend to follow trails that have high pheromone concentrations. This causes an autocatalytic reaction, i.e., one that
is accelerated by it [1][5]. Ants attracted by the pheromone will lay more of the same on the same trail, causing even
more ants to be attracted.
Volume 2, Issue 3, March 2013
Page 269
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 3, March 2013
ISSN 2319 - 4847
.
Fig1. Process used by ants to find shortest distance to food (i.e. destination) using pheromone
3. SWARM INTELLIGENCE IN MANETS
Routing is the task of forwarding the data packets from a source node to a required destination. Nowadays as the
networks are becoming more complicated, algorithms having self organizing and self configuring capabilities are
desired. This enables them to adapt to new situations in terms of traffic, services and many more. MANET is one such
complex network as discussed in [1].
Mobile Ad Hoc Networks are networks in which all nodes are mobile and communicate with each other via wireless
connections and other communication networks as discussed in [2]. Nodes can join or leave at any time. All nodes are
equal and there is no centralized control or overview. There are many algorithms like Antnet ,Ant based Control that
are used for routing.
3.1 TYPES OF MANET ALGORITHMS
MANET algorithms are divided into three types:
1. Table-driven are purely proactive: All nodes try to maintain routes to all other nodes at all times[23]. This
means that they need to keep track of all topology changes, which can be difficult if there are a lot of nodes or if
they are very mobile.
2.
3.
Demand-driven algorithms are purely reactive: Nodes only gather routing information when a data session to a
new destination starts, or when a route which is in use fails[27].
Hybrid: Combination of proactive and reactive algorithm [7].
3.2 PROCESS OF ROUTING USING SWARM INTELLIGENCE
In routing algorithms, routing information is gathered using a stigmergic process using various agents like forward
agent and backward agent. An ant(forward ant) going from its source s to a destination d collects information about
the quality of the path it follows (e.g. end-to-end delay), and, retracing its way back from d to s, uses this to update the
routing information(backward ant) at intermediate nodes as discussed in [10].
Routing information is expressed in the form of tables. Each node has its own routing table/Pheromone Table Ti. Table
Ti at node i is a matrix, where each entry Tind € R of the table is a value indicating the estimated goodness/Pheromone
value of going from i over neighbor n to reach destination d.
These table entries play the role of stigmergic variables in the learning process: an ant agent sampling a path to its
destination d makes a stochastic routing decision at each node, giving higher probability to decisions with high
goodness, while an ant retracing its way back from d to s updates the table entries influencing the routing of other
ants[24].
Data packets are routed more or less in the same way as ant packets are routed stochastically, choosing with a higher
probability those links associated with higher pheromone values as discussed in [6].
3.3 DATA-DRIVEN PATH SET UP
When a source node s starts a communication session with a destination node d, and it does not have routing
information for d available, it broadcasts a reactive forward ant[22]. If information is available, the ant chooses its next
hop n with the probability Pnd which depends on the relative goodness of n as a next hop, expressed in the pheromone
variable:
Volume 2, Issue 3, March 2013
Page 270
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 3, March 2013
ISSN 2319 - 4847
(1)
Each forward ant keeps a list P = [1; 2; : : : ; d] of the nodes it has visited. Upon arrival at the destination d, it is
converted into a backward ant, which travels back to the source retracing P. Once the backward ant makes it back to the
source, a full path is set up and the source can start sending data. If the backward ant does not arrive for some reason, a
timer runs out at the source, and the whole process is started again.
3.4 TABLE-DRIVEN PATH SET UP
Proactive forward ants are used to update the information about currently used paths and to try to find new and better
path [8].
The pheromone diffusion is implemented using short messages, broadcast periodically and asynchronously by the nodes
to all their neighbors. In these messages, the sending node n places a list of destinations it has information about,
including for each of these destinations d the best pheromone value Tnm*d ; m* € Nnd, which n has available for d[11].
A node i receiving the message from n first of all registers that n is its neighbor. Then, for each destination d listed in
the message, it derives an estimate of the goodness of going from i to d over n, combining the cost of hopping from i to
n with the reported pheromone value T nmd [28].
3.5 LINK FAILURE
When a node i discovers the disappearance of a neighbor n, it takes a number of actions:
1. In the first place, i registers that n is no longer a neighbor, and removes all associated entries from its pheromone
table [13].
2. Next, i broadcast a link failure notification message. This message contains a list of the destinations to which i lost
its best path, and the new best pheromone to this destination (if it still has entries for the destination).
4. ALGORITHM 1: ANTNET
In the AntNet algorithm, routing is determined by means of very complex interactions of forward and backward
network exploration agents (“ants”)[16]. The idea behind this sub-division of agents is to allow the backward ants to
utilize the useful information gathered by the forward ants on their trip from source to destination.
Based on this principle, no node routing updates are performed by the forward ants. Their only purpose is to carry data
and report network delay conditions to the backward ants, in the form of trip times between each network node. The
backward ants inherit this raw data and use it to update the routing table of the nodes as discussed in [4].
5. ALGORITHM 2: ANT BASED CONTROL
This algorithm shares many key features with AntNet, but has important differences.
5.1 SIMILARITY
1. The basic principle shared is the use of a multitude of agents interacting using stigmergy [19]. The algorithm is
adaptive and exhibits robustness under various network conditions.
2. The routing table of every node is the same as in AntNet algorithm.
5.2 DISSIMILARITY
1. The update philosophy of the routing table is slightly different though[20]. There is only one class of ants, which
is launched from the sources to various destinations at regular time intervals. The ants perform the table
updating simultaneously.
So, although network traffic is less the delay increases as the forward ant which carries the data has to update the tables
also.
6. PROPOSED ALGORITHM:TWO PROCESS BASED ROUTING
We propose a two process based policy where we introduced two agents.
DATA AGENT: Carries the data.
ROUTING AGENT: Consists of forward and backward. These ants controls and guides the data agents. It ensures
better performance[12]. Thus reducing congestion in network and improving network bandwidth utilization.
6.1 INFORMATION BOOTSTRAPPING
MONTE CARLO : Ants try out complete paths from source to destination. The estimated goodness values for
routing decisions recorded are the result of the direct experiences of the ants[17].
BOOTSTRAPPING : Nodes estimate the cost-to-go of a path by combining the cost estimates made by neighboring
nodes and the cost to go to those neighboring nodes, rather than by the direct sampling of a full path[18].
Volume 2, Issue 3, March 2013
Page 271
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 3, March 2013
ISSN 2319 - 4847
We attempt to combine the best of both learning methods.
6.2 ALGORITHM AND FLOWCHART
If(routing agent)
{
if (forward ant)
{
1. Get the next node based on the current node value
2. if (the link is available and no loop caused) then
{
2.1 Update forward ant with network status(stack)
2.2 Send forward ant to the next node
}
3. else if(no such link exist)
{
1.1. Create backward ant and load contents of forward ant to backward ant.
1.2. Send backward ant towards source along the same path as forward ant.
}
} //end-if for forward ant
if (backward ant)
{
1. if (current node is source node)
{
1.1. Store path and kill backward ant
1.2. Update routing table
}
2. else
{
2.1. Forward backward ant on to link available on backward ant stack.
2.2. Update routing table.
}
3. if (next node is not available)
3.1. Kill backward ant
} //end-if for backward ant
} //end-if for routing agent
If(data agent)
{
forward the data packet to the destination using routing table
}
Fig 2: Flowchart of two agent based routing
Volume 2, Issue 3, March 2013
Page 272
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 3, March 2013
ISSN 2319 - 4847
7. CONCLUSION
Current kind of network scenarios demands complex routing techniques like in MANETs etc.
Table1. Comparison of different Ant Colony optimization Algorithms
Carry
data
Algorithm
Calculate
network
parameters
Update
routing
table
Forward Ant
Antnet
Backward Ant
Ant
Based
Control
Two
Process
Based
Forward Ant
Routin
g
Agent
Forward
Ant
Backward
Ant
Data Agent
With these kind of features, two process based routing technique is the best routing technique amongst the other two, as
it has separate agent to prepare the routing table with the help of forward and backward ant, and a separate agent to
carry the data[21]. When the entry in the routing table already exists, data process will simply carry the data to the
destination without making the use of routing process. This therefore reduces the network congestion and so helps in fast
routing. Therefore, two process based routing is most optimal for routing [30].
REFERENCES
[1] Gianni Di Caro, Frederick Ducatelle and Luca Maria.Gianni Di Caro “Swarm Intelligence for Routing in mobile
Ad-hoc networks”, IEEE,(2005)
[2] I. Kassabalidis, M.A. El-Sharkawi, R. J. Marks II, P. Arabshahi, A.A. Gray. Gambardella, “Swarm Intelligence for
Routing in Communication Networks”. University of Washington Seattle,WA, 98195.(2003)
[3] J. Kephart and D. Chess. “ The vision of autonomic computing”, IEEE Computer magazine, 36(1), 2003.
[4] M. Dorigo, G. Di Caro, and L. M. Gambardella. “Ant algorithms for discrete optimization”. Artificial Life,
5(2):137–172, 1999.
[5] G.Di Caro and M.Dorigo. “AntNet: Distributed stigmergetic control for communications networks”, J. of Artificial
Intelligence Research, 9:317–365, 1998.
[6] R. Schoonderwoerd, O. Holland, J. Bruten, and L. Rothkrantz,” Ant-based load balancing in telecommunications
networks”. Adaptive Behavior, 5(2):169–207, 1996.
[7] E.M. Royer and C.-K. Toh. “A review of current routing protocols for ad hoc mobile wireless networks”. IEEE
Personal Communications, 1999.
[8] A. Colorni, M. Dorigo, and V. Maniezzo, "An investigation of some properties of an ant algorithm", Proc. Parallel
Problem Solving from Nature Conference (PPSN92), Brussels, Belgium, pp.509-520, 1992.
[9] C. Perkins and P. Bhagwat. “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile
computers.” Conference on Communications Architectures, Protocols and Applications, 1994, ACM iSIGCOMM’94
[10] P. J. Angeline ,”Using selection to improve particle swarm optimization”. IEEE International Conference on
Evolutionary Computation, Anchorage, AK, USA,1998
[11] Y. Gu, S. Li and C. Shao, “The research of traffic control and synergistic inductive based on ant colony
algorithm,” System Simulation Journal. Vol. 20 (10), pp. 2754-2756, 2008.
[12] H. Liu, “Best Running-Path arithmetic of vehicles in intelligent transport system,” Beijing Technology and
Business University Journal (Natural Science Edition).Vol. 24 (1), pp. 53-55, 2006.
[13] B.Duan,”Ant Colony Algorithm and its application,” Beijing:Science Press,2005,pp. 114-117.
[14] Dorigo M and StützleT,”Ant Colony Optimization,” Cambridge:MIT Press, 2004, pp. 105-127.
[15] Bonabeau E, Dorigo M and Theraulaz G,”Inspiration for optimization from social insect behavior,” Nature. Vol.
406 (6), pp. 39 – 42, 2000.
[16] G. Huang, X. GAO and S. Jin,”Study and application on shortest path search problem based on ant algorithm,”
Computer Engineering and Applications. Vol. 43(13), pp. 233-235, 2007.
Volume 2, Issue 3, March 2013
Page 273
International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Web Site: www.ijaiem.org Email: editor@ijaiem.org, editorijaiem@gmail.com
Volume 2, Issue 3, March 2013
ISSN 2319 - 4847
[17] R.Yang and H.Hao,”Improved ant colony algorithm in physical distribution routing problem solution,”Journal of
Chengde Petroleum College. Vol. 11(6), pp. 53-56,2009.
[18] D.B. Johnson and D.A. Maltz. “Mobile Computing”,chapter Dynamic Source Routing in Ad Hoc Wireless
Networks, pages 153–181. Kluwer, 1996.
[19] A. Bandura : “Social Foundations of Thought and Action: A Social Cognitive Theory”. Englewood Cliffs, NJ:
Prentice-Hall.,.1986
[20] A. Bavelas , “Communication patterns in task-oriented groups”. Journal of the Acoustical Society of America, 22,
727–730.,1950
[21] C.E. Perkins and E.M. Royer. “Ad-hoc on-demand distance vector routing.” In Proc. of the 2nd IEEE Workshop on
Mobile Computing Systems and Applications, 1999.
[22] N. Higashi and H. Iba “Particle swarm optimization with gaussian mutation”. Proc. IEEE Swarm Intelligence
Symposium 2003, Indianapolis, IN, USA, pp. 72–79., 2003
[23] Scalable Network Technologies, Inc., Culver City, CA, USA. “Qualnet Simulator”, Version 3.6, 2003.
[24] R. C. Eberhart and Y. Shi: “Comparing inertia weights and constriction factors in particle swarm
optimization”. Proc. CEC 2000, San Diego, CA, pp. 84–88.,2000
[25] R.S. Sutton and A.G. Barto. “Reinforcement Learning: An Introduction”. MIT Press, 1998.
[26] G. Theraulaz and E. Bonabeau.” A brief history of Stigmergy. Artificial Life”, Special Issue on Stigmergy, 5:97–
116, 1999.
[27] Oyebisi T.O and Ojesanmi O.A. “Development of congestion control scheme for wireless Mobile network” in the
Journal of Theoretical and Applied Information Technology, 2005- 2008
[28] T. E. Mahmoud, M. E. Khaled and M.A. Mohamed, “Performance Analysis and Estimation of call Admission
Control parameters in wireless Integrated Voice and data networks”.
[29] Fang Yang ,Bor Jiunn Hwang “Admission Control for Multi-services Traffic in Hierarchical MobileIPv6
Networks using Fuzzy Inference System” The International conference on Mobile Technology, Application
&System 2008, ACM 978-1-60558-089-0
[30] T. Sirin, “A Measurement-Based Prioritization Scheme for Handovers in Mobile Cellul ar Networks”, IEEE JSAC
Volume 2, Issue 3, March 2013
Page 274
Download