REDUCING THE RESOURCE INTENSITY IN ANTNET FOR MOBILE AD-HOC NETWORKS

被引:0
|
作者
Rao, D. N. Mallikarjuna [1 ]
Prasad, V. Kamakshi [2 ]
机构
[1] Jyothishmathi Inst Technol & Sci, Karimnagar, Andhra Pradesh, India
[2] Jawaharlal Nehru Technol Univ, CSE & Addit Controller, Hyderabad, Andhra Pradesh, India
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
AntNet(1) is one of the approaches to adaptive learning of routing tables in wide are best-effort datagram networks. The AmNet algorithm, as proposed by Di Caro and Dorigo is resource intensive algorithm. In this algorithm two types of ants are generated viz. Forward ant and Backward ants. While traveling from a source to a destination the forward ants store their paths and of traffic conditions they encounter. After reaching the destination the forward ant transfers its memory to the backward ant and dies. The: backward ant retraces the path traversed by the forward ant and updates the routing tables in the path. Since the mobile adhoc networks are dynamic and every effort should be made to reduce the resource intensity. We have made an effort to reduce the resource intensity in the basic AmNet algorithm. We propose three methods. The first method experiments with not generating a backward ant for every forward ant, instead we collect a set of forward ants and generate a subset of backward ants by choosing the best trip times among the received forward ants. In the second method we update the routing tables with the help of forward ants without generating backward ants. In the third method we update the routing table only at the destination node. Since every node is a destination for all other nodes, routing table at every node gets updated. In this method also no backward ants are generated. At the end we compare our results with the basic AmNet algorithm results.
引用
收藏
页码:216 / +
页数:2
相关论文
共 50 条
  • [21] Connectivity Service for Mobile Ad-Hoc Networks
    Cornejo, Alejandro
    Lynch, Nancy
    SASOW 2008: SECOND IEEE INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS, PROCEEDINGS, 2008, : 292 - 297
  • [22] On trust establishment in mobile ad-hoc networks
    Eschenauer, L
    Gligor, VD
    Baras, J
    SECURITY PROTOCOLS, 2004, 2845 : 47 - 62
  • [23] Reliability Evaluation of Mobile Ad-hoc Networks
    Choudhary, Anil
    Roy, O. P.
    Tuithung, T.
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (05): : 207 - 220
  • [24] Network forensics on mobile ad-hoc networks
    Otaka, Akira
    Takagi, Tsuyoshi
    Takahashi, Osamu
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
  • [25] A dynamic hierarchical radio resource allocation scheme for mobile Ad-hoc networks
    Holland, O
    Fan, Q
    Aghvami, AH
    2004 IEEE 15TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 1005 - 1010
  • [26] Group Monitoring in Mobile Ad-Hoc Networks
    Gaba, Albana
    Voulgaris, Spyros
    van Steen, Maarten
    NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 441 - 451
  • [27] Quantifying trust in mobile ad-hoc networks
    Virendra, M
    Jadliwala, M
    Chandrasekaran, M
    Upadhyaya, S
    2005 International Conference on Integration of Knowledge Intensive Multi-Agent Systems: KIMAS'05: MODELING, EXPLORATION, AND ENGINEERING, 2005, : 65 - 70
  • [28] A PERCOLATION MODEL OF MOBILE AD-HOC NETWORKS
    Mohammadi, Hossein
    Oskoee, Ehsan Nedaaee
    Afsharchi, Mohsen
    Yazdani, Nasser
    Sahimi, Muhammad
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2009, 20 (12): : 1871 - 1902
  • [29] Cluster Maintenance in Mobile Ad-hoc Networks
    Lan Wang
    Stephan Olariu
    Cluster Computing, 2005, 8 : 111 - 118
  • [30] SECURITY IN MULTICAST MOBILE AD-HOC NETWORKS
    Visu, P.
    Chembian, W. T.
    Koteeswaran, S.
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 38 - 44