Ant-DYMO: A Bio-Inspired Algorithm for MANETS

Similar documents
ANALYSIS OF ANTHOCNET AND AODV PERFORMANCE USING NS2

A Review of Ant Colony based Routing Algorithm in Wireless Ad-hoc Networks

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

AODV-PA: AODV with Path Accumulation

Routing Protocols in MANET: Comparative Study

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

2013, IJARCSSE All Rights Reserved Page 85

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Adhoc Network Routing Optimization and Performance Analysis of ACO Based Routing Protocol

Performance Analysis of Three Routing Protocols for Varying MANET Size

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET)

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Routing Protocols in MANETs

The Efficient Ant Routing Protocol for MANET

IMPLEMENTATION OF DYMO ROUTING PROTOCOL

Figure 1: Ad-Hoc routing protocols.

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Power aware Multi-path Routing Protocol for MANETS

Performance Evaluation of Various Routing Protocols in MANET

MANET routing protocols based on swarm intelligence

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Performance Analysis and Enhancement of Routing Protocol in Manet

ANT INTELLIGENCE ROUTING

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Estimate the Routing Protocols for Internet of Things

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Maharishi Markandeshwar University

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

International Journal of Modern Trends in Engineering and Research e-issn: p-issn:

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

AntHocNet: an Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

A Review of On-Demand Routing Protocols for Mobile Ad-Hoc Networks

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Impact of Node Density and Mobility on Scalable Routing Protocols in Mobile Ad-Hoc Networks

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Performance Evaluation of AODV and DSR routing protocols in MANET

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

The Effects of Route Information Initialization on Two On-demand Routing Algorithms for wireless Ad Hoc Networks *

Analysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio

Performance Analysis of MANET Routing Protocols OLSR and AODV

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Performance evaluation of AODV, DSDV and AntHocNet in video transmission

MANET Routing Protocols Based on Ant Colony Optimization

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

Research Paper GNANAMANOHARAN ET AL., INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGY E-ISSN

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

AWERProcedia Information Technology & Computer Science

A Survey of Routing Protocol in MANET

Enhanced AODV for Providing QoS of Multimedia Application in MANET

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

Impact of Hello Interval on Performance of AODV Protocol

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

A Performance Comparison of MDSDV with AODV and DSDV Routing Protocols

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

Performance Comparison of AODV and AOMDV Routing Protocols in Mobile Ad Hoc Networks

THE EXTENDED CLUSTERING AD HOC ROUTING PROTOCOL (ECRP)

Performance Evaluation of Routing Protocols for MAC Layer Models

Performance of Routing Protocols in Very Large-Scale Mobile Wireless Ad Hoc Networks

Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Mitigating Superfluous Flooding of Control Packets MANET

A NOVEL APPROACH OF AODV FOR STABILITY AND ENERGY EFFICIENT ROUTING FOR MANET USING IPV6

Dynamic AODV Backup Routing in Dense Mobile Ad-Hoc Networks *

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes

Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Comparative study and Performance Analysis of FSR, ZRP and AODV Routing Protocols for MANET

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

Transcription:

21 17th International Conference on Telecommunications Ant-: A Bio-Inspired Algorithm for MANETS José Alex Pontes Martins Universidade Vale do Acaraú (UVA) Sobral, Brazil 62.4 37 Email: alexmartins@larces.uece.br Sergio Luis O. B. Correia Computer Science Department State University of Ceara (UECE) Fortaleza, Brazil 6.74 Email: sergio@larces.uece.br Joaquim Celestino Júnior Graduate Program in Computer Science State University of Ceara (UECE) Fortaleza, Brazil 6.74 Email: celestino@larces.uece.br Abstract Mobile ad hoc networks are a set of wireless mobile devices that communicate without fixed infrastructure, forming temporary networks dynamically. Each node in such a network is more than a data receiver/sender, it is also a router that forwards data packets to its proper destination. The main characteristics of ad hoc networks are frequent change in the network topology, limited power of its links and restriction on the bandwidth. A routing protocol for ad hoc networks is composed of a routing algorithm with a set of rules that monitor the operation of the network. Thus, the nodes participating in the network have an important role in the management of resources in ad hoc networks. Ant-based routing is an efficient routing scheme based on the behavior of foraging ants. The study of the collective behavior of ants shows that they are able to find the shortest path from the nest to a food source, using a particular mode of communication by the means of a chemical substance called pheromones. This work uses a mechanism from collective intelligence applied to ad hoc networks, in particular the application of ants for routing in ad hoc networks. We have brought some characteristics from the Dynamic MANET On-demand Routing protocol and other MANET protocols in order to propose the new routing algorithm, called Ant-. We compare Ant- with, and we show that our proposition has improved the packet loss and the end-to-end delay. I. INTRODUCTION A commonly used way to differentiate routing protocols for mobile ad hoc networks (MANETs) is based on how the routing information is acquired and maintained by the mobile nodes [1]. This classification system divides the routing protocols into three categories: proactive (DSDV [2]), reactive (AODV [3], DSR [4], [5]) and hybrid (ZRP [6]) protocols. The former two groups proactive and reactive have clear limitations. Proactive protocols maintain updated information on the whole network topology. If on the one hand routes are always available, on the other hand the costs to make it so can be too high, as a lot of control traffic is required, hence reducing the effective network capacity for data communication. As opposed to proactive protocols, the reactive ones do not suffer with the control traffic problem, as they work ondemand, maintaining only needed routes. When a route for an unknown destination is needed, a route discovery mechanism is then started. The problem with this approach is that the route request process might take a long time, making this kind of protocol not suitable for certain existing applications, such as real-time multimedia transmissions. Mobile agents making use of the ant colony optimization metaheuristic (ACO) [7] have been shown to be both suitable for and efficient in the task of mapping the network topology, as well as improving its connectivity. The present paper proposes the application of the ACO technique to the Dynamic MANET On-demand Routing () protocol, in order to create the Ant-. The remainder of this paper is divided as follows: section II presents the related work; section III gives a brief description of the protocol; section IV explains our Ant- proposal; section V details the simulation environment, such as scenario, metrics and the Ant- settings, as well as presents and discusses the obtained simulation results; and finally, section VI concludes this paper, giving insights into the envisioned future works with Ant-. II. RELATED WORK Ant-Colony Based Routing Algorithm (ARA) [8] is a reactive MANET routing protocol that uses the ACO metaheuristic [9]. ARA s artificial pheromone model is probabilistic and based on the number of hops. Through a search procedure, a forward ant (FANT) will create a pheromone trail from the source to the destination. A backward ant (BANT) does the reverse path, i.e. after a FANT reaches its destination, it is destroyed and a BANT is created, is sent to the source node, and finds its way to the destination by the means of a procedure similar to that of the FANT. It then creates the pheromone trail, or if it already exists, it increases the pheromone level on the path. The data packets also enforce the pheromone level on the path they are passing through. Ant On-Demand Distance Vector Routing (Ant-AODV) [1] is a hybrid routing algorithm for MANETs based upon AODV, not changing any of its native characteristics. AODV does the reactive part and an ant-based approach does the proactive one. The main goal of the ant algorithm here is to continuously create routes in the attempt to reduce the and the network latency, increasing the probability of finding routes more quickly, when required. Ant-AODV s artificial pheromone model is based on the number of hops and its 978-1-4244-5247-7/9/$26. 29 IEEE 748

goal is to discover the network topology, without any other specific functions, as opposed to most ACO algorithms [7]. Ant Dynamic Source Routing (Ant-DSR) [11] is a reactive protocol that implements a proactive route optimization method through the constant verification of cached routes. This approach increases the probability of a given cached route express the network reality. III. THE PROTOCOL Dynamic MANET On-demand Routing () [5] is a reactive routing protocol under development by the Mobile Ad hoc Networks Working Group from IETF and is intended for use by mobile routers in wireless, multi-hop networks. It offers adaption for topology changes and determines unicast routes on-demand. Its main activities are the route discovery and route maintenance mechanisms, achieved through its route requisition (RREQ), route reply (RREP) and route error (RRER) messages. It employs sequence numbers to ensure loop freedom [12] and also to avoid the dissemination of ancient routing information, and its basic operation consists of sending RREQ messages through the network for finding the routes it needs. The intermediate nodes receiving a RREQ message store the route for the node that originated it and then reforward the RREQ. The destination node, upon receiving a RREQ message, replies with a unicast RREP one. The same way, every intermediate node receiving a RREP message stores the route for the node that originated it. To adapt to topology changes, after receiving a packet that should be sent to a link that is no longer available, the node notifies the message sender by sending back a RERR message. IF the source node still wants to send packets to given destination, a new route discovery process is to be initiated. The protocol works with source routing, meaning nodes read the routing messages to acquire knowledge on the paths involved in the search process, as well as write in the search packet the necessary hops needed to reach its destination. This methods clearly increases the size of the routing packets, with the intention of reducing the number of retransmissions. IV. ANT- PROPOSAL Ant- is a hybrid protocol that uses an ant-based approach in its proactive phase while [5] is the basis for the reactive one. That way it was possible to improve the latency and increase the network connectivity. A. Definitions Definition 1. Ant- defines two types of artificial ants: explorer ant (EANT), responsible for creating routes to its source and search ant (ARREQ), responsible for searching for a specific destination. Similar to the BANTs of other algorithms [8], [1], the EANTs carry the information on the destination node and create (or enforce) pheromone trails along the way. The EANTs carry the address of the source node and also a list containing every intermediate node it has passed by. Algorithm 1 describes in a simplistic way how the EANTs are processed. Algorithm 1: Simplified processing of a received EANT if EANT TTL > then else end create/update entry for EANT s last hop in node s pheromone table add node address to EANT s list of hops broadcast EANT to neighbors discard EANT ARREQ has characteristics from other algorithms FANTs and RREQs [5], [8]. Its main goal is to search for a specific destination, and it inherits the format of s RREQ, adding a probabilistic search mechanism that takes into account the level of pheromones on the paths. Definition 2. The transition probability of the ant located at the node i to the node j as the next hop is defined by Equation (1). τ(i, j) if s N i p(i, j) = τ(i, s) (1) s N i otherwise In Equation (1), N i is the set of 1-hop neighbors of i and τ(i, j) is the pheromone level on the link e(i, j). The transition probability p(i, j) is part of Equation (2). j N i p(i, j) = 1 (2) Definition 3. The pheromone update rules. When an EANT pass by a link e(i, j), the pheromone level on the link τ(i, j) is updated according to Equations (3) and (4). τ(i, j) = τ(i, j) + τ(i, j) (3) τ(i, j) = α Distance(i, j) (4) τ(i, j) = (1 q) τ(i, j) (5) In Equation (3), τ(i, j) is the increment to the pheromone level on the link from i to j, and it is calculated according to Equation (4). In Equation (4), α is an adjustable parameter that represents the influence of the distance in number of hops from i to j over the pheromone level. Equation (5) models the pheromone evaporation scheme, similar to the real ants, where the pheromone level reduces with time. Ant- initializes parameter α = 1. q is configured through the evaporation f actor parameter, described in section V-C. 749

B. Basic protocol design Ant- is a hybrid and multi-hop algorithm. Nodes acquire information on their neighborhood by the limited flooding of Hello messages, as defined in [5]. Based on the received responses, each node creates its routing probability table [13], [14], similar to ACO s pheromone table, which replaces the traditional node routing table. C. Routes exploration After the beginning of the simulations, each node containing an EANT will broadcast it to its neighbors. A node receiving an EANT for the first time will create an entry in its routing table. Here, the essential information is mostly taken from the received EANT, and are: destination the node that generated the EANT; next hop the last node visited by the EANT, taken from its list of hops; pheromone level the amount of pheromone over the link e(current node, destination), calculated according to Equations (3) and (4). After adding the entry, the EANT is then broadcasted to the node s neighbors. This process is illustrated in Algorithm 1, and the EANT s cycle lasts during the whole simulation time. D. Route discovery When a node S wants to send packets to a destination D not present in its routing table, it creates an ARREQ with its address and broadcasts it to its neighbors, and the scheme described in Figure 1 will be followed. node adds its address to the ARREQ s route record node adds an entry in its routing table; ARREQ s source as the destination, and the last hop becomes the next hop for this route; pheromone level updated; ARREQ s hopcount incremented by one node forwards this ARREQ to its neighbors is the destination listed in the routing table? yes no no node selects a route probabilistically based on its routing/pheromone table node creates a RREP and sends it back to the message source, telling the chosen route start is this the message destination? RREP is created and sent back to the message source, as in Fig. 1. E. Route maintenance yes ARREQ is received no ARREQ processing yes duplicated? processed as s duplicated RREQs and discarded The route maintenance phase is responsible for improving the quality of the existing routes. Some algorithms generate TABLE I SIMULATION CONFIGURATION PARAMETERS Scenario Parameter (a) (b) MAC 82.11 82.11 Mobility model R. Waypoint R. Waypoint Simulation time 6s 6s Transport protocol UDP UDP Traffic application CBR CBR Scenario dimension 1m x 1m 1m x 1m Number of nodes 5 2 Number of connections 1 5 Pause time [, 6] [, 6] Speed 1m/s, 2m/s 1m/s, 2m/s Packet size 512 bytes 512 bytes Transmission interval,25s,25s specific packets for this task, but Ant- needs no special packets for this, and the reasons are two: the EANTs keep providing routes all the time, increasing the probabilities of quickly finding an alternate path in case of route errors; the data packets mimicking the behavior of real ants will enforce the pheromone trail of the selected path. This mechanism is similar to the one in [8]. The other maintenance procedures are natives of. A. Simulation Environment V. SIMULATION AND RESULTS The simulation environment chosen for evaluating the and Ant- protocols was the ns-2 network simulator [15] in its version 2.34, and the implementation used as basis for implementing Ant- was UM [16]. B. Scenario and metrics Ant- and were evaluated in two scenarios and had their performance compared with respect to four metrics:, delivery rate, loss rate and routing overhead. Table I shows the settings for the two proposed scenarios, and the results are discussed in section V-E. Each simulation was repeated 1 times and a confidence interval of 95% was used. C. Ant- configurable parameters 1) eants percentage : This parameter defines the percentage of ants to be inserted into the network, taking into account the number of nodes in the simulation. The ants are then placed into random nodes selected by a uniform random number generator. For each simulation run we have the ants placed in different nodes. The simulations carried out showed that a number of ants bigger than 3% increases considerably the overhead without improving the descovery of destinations at the same rate. 75

Parameter TABLE II ANT- SETTINGS Value eants percentage.3 (3%) eants history 12 hops evaporation factor.5 eants route expiration time 1s eant interval 1s 2) eants history : This parameter defines the number of nodes an ant can visit and store into its list of hops working pretty much like the TTL of a packet before being discarded. It allows control of the quality of the transmitted information, mainly regarding topology changes, as very long paths have a bigger probability of containing invalid routes. 3) evaporation factor : This parameter is responsible for controlling the simulation of the evaporation process of real ants. See parameter q in Equation (5). 4) eants route expiration time : This parameter indicates how long an inactive route discovered by an EANT takes to expire. 5) eant interval : This is the periodic interval for the evaporation mechanism to be performed. D. Parameters settings For the simulations, the Ant- protocol was configured as shown in Table II. E. Simulation Results 1) End-to-end delay: End-to-end delay is related to the average time it takes from when the packet is in the router buffer waiting for a route until its delivery to the destination. That way, it comprises every network delay, such as latency, buffer delay and retransmissions. According to Figure 2, Figure 3, Figure 4 and Figure 5, the Ant- protocol takes less time, in average, to deliver its packets. Figure 2 shows a gain of about 16.5% of Ant- over, with a max gain of 35% in the pause time 1s. In Figure 3, the average gain was of about 1%, with max value of 17% in the pause time of 6s. Most of the individual gains happened in the first 4 seconds of pause, which shows that the Ant- protocol performs better than in networks with more mobility. This result was expected, as the EANTs are working on mapping the network topology before routes are requested, which increases the probability of finding needed routes in less time. 2) Delivery rate: This is one of the most important metrics while evaluating a routing protocol, as it shows how it performs in terms of effective data delivery. Figure 6, Figure 7, Figure 8 and Figure 9 show that the Ant- protocol performs better than at delivering data packets in the proposed scenarios, mainly in scenarios with up to 4 seconds of pause. The biggest gains of Ant- over are of 11%, 8%, 13.4% and 12.3%, and happen respectively at Figure 6 with s of pause time, Figure 7 with 2s of pause time, Figure 8 with 1s of pause time and finally Figure 9 with 1s of pause time. 3) Loss rate: The loss rate describes the sum of all packets discarded for any reason, such as error, collision and exceeded time, for instance. The extra overhead generated by the Ant- control traffic can be clearly observed in Figure 1, Figure 11, Figure 12 and Figure 13. When the scenario has less nodes, as in Figures 1 and 11, the loss rate in Ant- is nearly the same observed with. However, when the number of nodes is larger, as in Figure 12 and Figure 13, the loss rate increases in most cases, situation caused by an also larger number of ants and the extra overhead they add to the network. The loss rates of Ant- in relation to are in average 18, 6%, 9, 2%, 4, 5% and 17, 45%, observed respectively in Figure 1, Figure 11, Figure 12 and Figure 13. 4) Routing overhead: This is the most vulnerable point of the Ant- protocol, as can be observed in Figure 14, Figure 15, Figure 16 and Figure 17. Two are the main reasons for this increased overhead, the extra traffic generated directly by the EANTS and the retransmissions created indirectly by the caching mechanism that may provide outdated or inexisting paths, due to the changes in the network topology. Ant- had in average a routing overhead of about 15% greater than..5.4.3.2.1 1 2 3 4 5 6 Fig. 2. A. Final Analysis A- Delay with 2 nodes x 5 connections x 1m/s VI. CONCLUSION AND FUTURE WORK The figures from section V confirmed the following results, already expected by our study: Ant- had a better delivery rate, in average; it also delivered the data in less time; extra overhead was expected in the Ant- protocol and its effects were also confirmed in both the delivery rate and the traffic flow generated above s but still less than a purely proactive protocol, as the number of ants making the proactive phase is somewhat controlled. 751

.5 A- 1 A-.4 8.3.2 6 4.1 2 1 2 3 4 5 6 1 2 3 4 5 6 Fig. 3. Delay with 2 nodes x 5 connections x 2m/s Fig. 6. Delivery with 2 nodes x 5 connections x 1m/s.9.8 A- 1 8 A-.7.6.5.4.3.2 6 4 2.1 1 2 3 4 5 6 Fig. 4. 2 Delay with 5 nodes x 15 connections x 1m/s A- 1 2 3 4 5 6 Fig. 7. 1 8 Delivery with 2 nodes x 5 connections x 1m/s A- 1.5 1 6 4 2.5 1 2 3 4 5 6 1 2 3 4 5 6 Fig. 8. Delivery with 5 nodes x 15 connections x 2m/s Fig. 5. Delay with 5 nodes x 15 connections x 2m/s In overall, the Ant- protocol has been shown to be superior to regarding the effective packet delivery in a smaller amount of time. It was also shown that it is possible to directly influence its performance by tuning its configuration parameters. B. Future work The design and implementation of the Ant- protocol had the distance measured in number of hops as the only quality metric. The authors envision to improve their current Ant- proposal by making it work in a multiobjective way, adding also other metrics to work together, such as link quality that could be measured by the power prediction, 752

1 A- 1 A- 8 8 6 4 6 4 2 2 1 2 3 4 5 6 Fig. 9. Delivery with 5 nodes x 15 connections x 2m/s 1 2 3 4 5 6 Fig. 12. Loss with 5 nodes x 15 connections x 2m/s 1 A- 1 A- 8 8 6 4 6 4 2 2 1 2 3 4 5 6 Fig. 1. Loss with 2 nodes x 5 connections x 1m/s 1 2 3 4 5 6 Fig. 13. Loss with 5 nodes x 15 connections x 2m/s 1 A- 16 14 A- 8 12 6 4 overhead (packets) 1 8 6 2 4 2 1 2 3 4 5 6 Fig. 11. Loss with 2 nodes x 5 connections x 1m/s Fig. 14. 1 2 3 4 5 6 Routing overhead with 2 nodes x 5 connections x 1m/s buffer size or congestion prediction, as an example. REFERENCES [1] C. Liu and J. Kaiser, A survey of mobile ad hoc network routing protocols, University of Magdeburg, 25. [2] C. Perkins and P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, ACM SIG- COMM Computer Communication Review, vol. 24, no. 4, pp. 234 244, 1994. [3] C. Perkins, E. Belding-Royer, and S. Das, RFC3561: ad hoc on-demand distance vector (AODV) routing, Internet RFCs, 23. [4] D. Johnson, Y. Hu, and D. Maltz, RFC4728: The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4, 27. [5] I. Chakeres and C. Perkins, Dynamic MANET On-demand () Routing draft-ietf-manet-dymo-17, Dynamic MANET On-demand () Routing draft-ietf-manet-dymo-17, Internet Engineering Task Force, Mar. 29. [Online]. Available: http://tools.ietf.org/html/ draft-ietf-manet-dymo-17 [6] Z. Haas, M. Pearlman, and P. Samar, The zone routing protocol (ZRP) 753

overhead (packets) Fig. 15. 12 1 8 6 4 2 1 2 3 4 5 6 A- Routing overhead with 2 nodes x 5 connections x 1m/s based routing protocol for mobile ad hoc networks, In in Proceedings of IEEE Globecom, 22. [11] M. Aissani, M. Fenouche, H. Sadour, and A. Mellouk, Ant-DSR: cache maintenance based routing protocol for mobile ad-hoc networks, in Telecommunications, 27. AICT 27. The Third Advanced International Conference on, 27, pp. 35 35. [12] C. Perkins and E. Royer, Ad-hoc on-demand distance vector routing, in proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, vol. 2. Citeseer, 1999, pp. 9 1. [13] E. Bonabeau, M. Dorigo, and G. Theraulaz, Swarm intelligence: from natural to artificial systems. Oxford University Press, USA, 1999. [14] X. Yang, L. Layuan, and C. Chuanhui, Application Research Based Ant Colony Optimization for MANET, in Wireless Communications, Networking and Mobile Computing, 26. WiCOM 26. International Conference on, 26, pp. 1 4. [15] N. Simulator, 2 (NS2), URL: http://www. isi. edu/nsnam, 25. [16] P. Ruiz and F. Ros, UM A implementation for real world and simulation, URL http://masimum. dif. um. es, 25. 16 14 A- 12 overhead (packets) 1 8 6 4 2 1 2 3 4 5 6 Fig. 16. Routing overhead with 5 nodes x 15 connections x 2m/s 16 14 A- 12 overhead (packets) 1 8 6 4 2 1 2 3 4 5 6 Fig. 17. Routing overhead with 5 nodes x 15 connections x 2m/s for ad hoc networks, draft-ietf-manet-zone-zrp-4.txt, 22. [7] M. Dorigo and T. Stützle, Ant Colony Optimization (Bradford Books). The MIT Press, July 24. [8] M. Gunes, U. Sorges, and I. Bouazizi, ARA-the ant-colony based routing algorithm for MANETs, in proceedings of the ICPP international Workshop on ad hoc networks (IWAHN). Citeseer, 22. [9] C. Blum and D. Merkle, Swarm intelligence: introduction and applications. Springer-Verlag New York Inc, 28. [1] S. Marwaha, C. Khong, and T. Srinivasan, Ant-Aodv - Mobile agents 754