Вы находитесь на странице: 1из 8

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 02

65

A Model for Least Distance Protocol in MANET Using Artificial Intelligence Search Techniques
Khondker Shajadul Hasan1, Radia Abdul Wahab2, Munawwar Mahmud Sohul2
1

School of Computer Science, University of Oklahoma 110 W. Boyd St., Norman, OK 73019, USA

shajadul@ou.edu

Department of Computer Science & Engineering, North South University Bashundhara, Dhaka, Bangladesh radiaraian@northsouth.edu,mmsohul@northsouth.edu

Abstract - As mobile adhoc networks operate with nodes carrying small amount of energy, reducing energy consumption is a major issue in adhoc networks. The paper discusses a protocol along with its implementation which incorporates Artificial intelligence search techniques, namely A* search and Dijkstras algorithm to reduce the distance traversed by both the data and the control information. The transmission path is determined by the means of A* search, which gives the shortest path possible. This greatly reduces the distance traversed. This paper also focuses on the performance of this protocol compared with swarm intelligence which is another artificial intelligence protocol implemented by MANET (mobile adhoc network). A collection of proposed transmission protocols characteristics has been presented in this paper. An extensive empirical study has been carried out to validate the protocols performance. Keywords: Mobile Adhoc Networks, Multi-hopping, Grid
system, A* search, Dijkstras Algorithm, Swarm intelligence, Path cost.

wireless nodes can dynamically communicate with one another. This paper designs such a protocol and then explains the characteristics of that protocol. Later in the paper it shows how the performance would vary when different numbers of nodes are put into consideration. An adhoc network is one that does not have an infrastructure. Each of the nodes work together to form the network. The main characteristics of MANET are that nodes of the network can communicate wirelessly, there is no fixed centralized infrastructure and that nodes are not required to remain in set positions. They can join and leave the network are at any time and change position within the network. The chief advantages of having a MANET based communication is that; there is no need of separate base station, its easy to deploy, it is reconfigurable (adaptable to topology changes), it can be utilized where there is no infrastructure; for instance in emergency disaster situations, and lastly it is robust. However, there are drawbacks as well. Such as, since it is distributed it is hard to control, it has lower capacity, higher packet delay and more severe jitter. Even more, nodes use limited battery and also network maintenance is expensive. This paper studies how artificial intelligence search techniques can greatly reduce the distance that the data needs to travel during transmission. The paper is organized beginning with a little background of MANET, A* search and Dijkstras algorithm. Then it discusses the design of a protocol which uses these algorithms to reduce the path traversed. The paper then proceeds and compares the performance of this protocol with swarm intelligence and other protocols [2].

1. Introduction
Adhoc networks consist of nodes that communicate with each other. However, a node has limited CPU capacity, storage capacity, bandwidth, and battery power. Therefore, the chosen protocol should take all these into consideration. In infrastructure based network, the wireless network uses a specific piece of hardware which is called the base station or the central unit. The base station is connected to a wired network. As a result the wireless devices communicate with these base stations and these base stations communicate with the rest of the network. In a situation where there is no such base station or even if there is one, it is out of range; mobile nodes can still form a fully connected wireless network by operating in adhoc mode [1]. An adhoc network is therefore a wireless network formed by wireless nodes without any help of infrastructure. In such a network the

2. Background
As adhoc networks lacks infrastructure, each nodes need to work together to form the network to communicate with each other. A node can be a laptop or a PDA or any IJENS

117902-4545 IJECS-IJENS April 2011 IJENS

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 02 other communication device. The network is characterized for the absence of base station. Furthermore, the nodes are able to leave or enter or move around the network randomly. The nodes act as routers, and also play an important role in the discovery and maintenance of the routes from source to destination or between nodes. This is the toughest challenge in designing such networks. For instance, if a link breakage occurs, the network has to operate by building new routes. The technique that is usually used is known as multi-hopping. Multi-hopping increases the overall network performances. By multi-hopping one node is able to deliver data on behalf of another one to a determined destination. It also adds to the transmission range of the node. Dijkstras algorithm finds the shortest path between node X and all the other nodes. The idea is to explore and visit all other nodes one at a time as they become visible (sorting according to the lowest path cost from the initial node X) and updating shortest path between that node and the initial node X until all the nodes have been explored. In this way a node can communicate with all the other nodes in the network. A* search is a graphical search algorithm that finds the least cost path from a given initial node to one goal node. It uses distance plus cost heuristics function (denoted by f(x)) to determine the order in which the search visits the nodes in the tree. The distance plus cost heuristic function is a sum of two functions; the path cost function g(x) and an admissible heuristic (estimate) of: F(x)= g(x) +h(x) g2(x) +h2(x) >g1(x)+h1(x) So, A* search chooses route 1. Here, Figure 1 demonstrates the A* search procedure.

66

always choose the path with the highest concentration of pheromones. Mobile Ad-Hoc Network (MANET) has significant different characteristics than other wired or wireless networks. Existing networking protocols cannot work in this new environment without considerable modification. This research is to study new and existing protocols for MANET. Research has shown that TCP performs poorly over MANET due to temporary link failure and frequent route changes. One solution is to effectively detect such events and put TCP sender into a "sleep" mode until the route has recovered. In this project, we study various mechanisms to detect and to respond to such events. We have explored a new approach to improve performance by detecting and responding to out-of-order packet delivery events, which are the results of frequent route changes.

3. The Protocol
All communication takes place in two stages. In the first stage route and specifications are determined and is usually referred as the control information. The second stage is the actual flow of information referred to as the transmission. In our project we would take care of the first stage (control stage) by using Dijkstras algorithm and the second stage (transmission stage) using the A* search. There are many search techniques in artificial intelligence out of which the Dijkstras search is one that is most efficient in finding the shortest path to all the other nodes in the network. That is why Dijkstras search is used for sending the control information, as that way the control information can find the most efficient path to reach all the nodes in the network. The control message in our case mostly comprises of node position information as in MANET the position of the nodes is always changing dynamically without any definite order. Our work is to find the efficient path within the dynamic environment [3]. A* search on the other hand finds the shortest path to the goal node. That way we can find the most efficient path for sending our transmission message from the source node to the destination node. However, it requires information (heuristics) that we would be already gathering in the first stage using Dijkstras algorithm. Essentially what A* search does is that it chooses the least cost path to the node which is closest to the destination. Therefore if path cost to a node is g(x) and distance from destination of that node is h(x); A* search chooses the path using the following function. A to C; A to D; g(x)=1 h(x)=1 f(x)= g(x)+h(x) f(1)=1+1=2 g(x)=2 h(x)=2 f(x)= g(x)+h(x) f(2)=2+2=4

Figure 1. Demonstrating A* search technique.

Here, the distance to the goal is h(x). The path cost g(x) is the cost from the starting node to the current node. h(x) the admissible heuristic in routing should be the straight line distance to the node. Swarm intelligence is an artificial intelligence search technique which involves the data traversing the path that is most frequently traversed. It imitates ants which follows pheromones. Ants will

Therefore, node A takes Route 1

117902-4545 IJECS-IJENS April 2011 IJENS

IJENS

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 02 This is how A* search will operate to find the path with the least path cost, to make the transmission process most efficient. Now we would have to look into how node C or node D would ever know where node B is. This would need to be processed as all the nodes are moving around dynamically. Therefore we introduce Dijkstras search in the process. Through Dijkstras search Node B would be able to inform each and every node in the network about its position. Dijkstras search finds the least possible path to every other node in the network. It can be illustrated as follows. In Figure 2, essentially, what happens is that, whenever the node chooses the next node, it always looks for the shortest distance it can go to reach a new node from any available leaf nodes. That way it finds the least distance to reach every other node in the network. This is how the destination nodes in our project would communicate their position to the rest of the network in the shortest possible path and hence the most efficient way [3].

67

the nodes; and that will be enough. Once we start using the coordinate system, it will be very easy for us to calculate the distance values, simply using the formula: D = [(x1-x2)2+(y1-y2)2+(z1-z2)2]

However, right now for making our demonstration simple, we will look into two dimensional space, only dealing with the xy-plane (z=0). The path costs are given in the above diagram. Now first node B would let every other node in the network know its position. It will follow the path below, using Dijkstras Algorithm. Therefore the destination node takes 5 steps to reach all the nodes in the network using Dijkstras Algorithm. Likewise all the other nodes will do the same to make its position known to all the other nodes in the network. Then the routing table will be constructed. Though the actual format of the routing table will be our concern in the next section, for this section we will show only some details. Node A can now start the transmission. It can choose among 3 routes: Route 1: A to C to B Route 2: A to D to E to B Route 3: A to D to F to B The path costs are shown below: B E =1 E F =3 B C =2 F D =4 D A =5 D E =6 A C =7

Figure 2. Demonstration of Dijkstras Algorithm to find the least distance to every other node on the network.

Heuristic values h(x) of all the nodes are as follows: A: h(x) = 9 B: h(x) = 0 C: h(x) = 3 D: h(x) = 7 E: h(x) = 1 F: h(x) = 3 In case of more than 1 path, the least value is taken into consideration. Now when Node A starts to make a selection it can choose from 3 routes; route 1, route 2 and route 3. For Route 1: f(x)=g(x)+h(x) f(x)=7+2=9 For Route 2: f(x)=5+7=12 For Route 3: f(x)=5+8=13 Therefore, even if the initial path cost g(x) is greater in route 1, node A would choose route 1 because the total path is least as f(x) is least in route 1. That is how our MANET would function. 3.1 Ladder diagrams

Now we will talk about how the position of each node will be recorded and manipulated. For that we can use a grid system; which will use the Cartesian coordinate axis xyz. We need the entire 3 axis to determine the position as in most cases the MANET will occupy a three dimensional space. Later on we can use the three coordinate values to determine the pin point position of

Figure 3. Demonstration of how the A*search will work on the nodes in the adhoc network.

Data communication requires at least two devices working together. One requires to send and the other to receive. For that reason the communication system IJENS

117902-4545 IJECS-IJENS April 2011 IJENS

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 02 requires flow control and error control mechanisms. These mechanisms can be demonstrated by the following ladder diagrams.

68

Once the shortest path is determined the destination node will respond to the path request by sending the reply via the A* search determined path. Now the source node and destination node is ready to transmit and receive data. Therefore once the path is determined transmission can be two ways. The transmitted data would be numbered and thereby the ACKs would also be numbered in order to keep record of data received and data lost. The serial number enables more than one data packet to be transmitted at a time.

3.2

Block diagrams

Figure 4. Ladder diagram to show initiation of the communication.

Therefore the location information is requested via Dijkstras algorithm and the reply is also done by Dijkstras algorithm. Once the mobile node is located, now the path determination begins. This is done by A* search. The transmission path is determined by the means of A* search, which gives the shortest path possible.

The block diagram shows the steps that the protocol would follow to operate efficiently. Once initialized the network would first figure out the whereabouts of the source and destination node. This would be done by Dijkstras algorithm and then the data transmission would be done via A* search. Throughout the progress of the communication the network would check if the node location had crossed beyond the border of the particular grid that it was in. If crossed, the location would be determined all over again from the beginning. Else the route would be continued.

Figure 6. Block diagram to demonstrate signal flow.

4. Characteristics of the protocol


This proposed protocol has the following characteristics i. ii.
Figure 5. Ladder diagram for demonstrating the full communication.

The protocol works for MANETs (Mobile Adhoc Networks) For distributing position information the protocol uses Dijkstras algorithm instead of broadcasting to decrease the bandwidth required and increase the efficiency. IJENS

117902-4545 IJECS-IJENS April 2011 IJENS

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 02

69

vi. Multi-hopping is allowed in this mobile adhoc network. Decisions regarding multi-hopping is done based on A* search. vii. Information regarding intermediate node arrangement is stored for a small duration equal to nx where x is the packet duration and n is a small number bigger than but close to 1. viii. The protocol functions in the network layer of the OSI model.
Figure 7. Distribute location by Dijkstras algorithm.

iii. For actual transmission of data and planning the hop by hop route; the protocol uses A*search algorithm

Figure 10. Multi-hopping is done for communication.

ix. Based on the following aspects the protocol needs to be modified.


Figure 8. Sending data by A* search. iv. In case of using A* search, the heuristic value h(x) is

not chosen to be the straight line distance between the intermediate node and the destination node; rather it is the hop by hop distance between the intermediate node and the destination node. This increases the validity of the A* search.

a. b. c. d. e. f. x.

Network size/ scalability Geographical area Topology rate of change Quality of service Energy constrained operation Limited physical security

v.

Region of consideration is minimized as much as possible. Generally the region of consideration is the circle with the straight line joining the source and destination node as diameter. However for more sophisticated networks the elliptical region is taken into consideration with the major axis as the line joining the source and destination node and the minor very small. Later on if nodes are not available within that elliptical region the minor axis is increased.

The protocol works as a reactive-on-demand routing protocol. It discovers routes based on demand. xi. It discards high values of h(x), thereby limiting the region of consideration as well as reducing work load for calculations. xii. The source node knows the complete route to the destination xiii. No route is cached for future use, for more than the frame time or small multiples of the frame time. xiv. Routing loops are automatically prevented by discarding high values of h(x).

Figure 11. Loops are prevented by the protocol.

xv.

Figure 9. Region of consideration might be manipulated.

The routing is not chosen by the number of hops by rather the least distance. Therefore, a path with greater number of hops but lesser distance is chosen, after problems regarding radio range are overcome. xvi. The protocol mainly focuses on energy efficiency; adoptable by least distance.

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 02 xvii. The protocol starts functioning when there are two or more intermediate nodes between the source and destination. xviii. In case of position determination the protocol uses the Cartesian coordinate system. xix. We are assuming no congestion, hence multipath is not required.

70

diagram shows how the distance traversed varies with different number of nodes and with different protocols.

250 200 150 100 50 0 1 2 3 4 5 6 7 8 9 10


Figure 14. Least distance protocol with 100 nodes.
least distance100 nodes other protocols100 nodes

Figure 12. Grid system is used for location.

250 200 150 100 50 0 1 2 3 4 5 6 7 8 9 10


Figure 15. Least distance protocol with 1000 nodes.
least distance

xx.

A grid system is used to round-up distance measurements. Plus, this makes the system quazi static as the rounded values or routes do not change as long as the node stays within the specific grid. xxi. Part of this protocol can be integrated with other protocols to increase the distance efficiency of any adhoc network.

other protocol100 nodes

5. Results of Empirical Studies


This section contains the results of the empirical studies of the proposed protocol. Now we will show how the least distance varies when the adhoc network works with different number of nodes, 10, 100 and 1000 nodes. It can be seen that with 10 nodes even though the distance traversed remain limited, the value shows certain increment and decrement. However, overall the A* search shows a lot lesser distance traversed than other protocols.

250 200 150 100 50 0 1 2 3 4 5 6 7 8 9 10


Figure 13. Least distance protocol with 10 nodes.
least distance 10 nodes other protocol-10 nodes

Next we will show how the least distance varies when the adhoc network works with different number of nodes, 10, 100 and 1000 nodes. With 10 nodes the least distance varies considerably. However, increasing the number of nodes stabilizes the distance that the data needs to traverse. The following diagram shows how the distance traversed varies with different number of nodes and with different protocols.

250 200 150 100 50 0 1 2 3 4 5 6 7 8 9 10

least distance 10 nodes other protocol10 nodes least distance100 nodes other protocols100 nodes least distance other protocol100 nodes

With 10 nodes the least distance varies considerably. However, increasing the number of nodes stablizes the distance that the data needs to traverse. The following

Figure 16. Different numbers of nodes are compared.

Now we will determine how the situation changes with different protocols. First let us see what happens when we have very few nodes, like 10 nodes. IJENS

117902-4545 IJECS-IJENS April 2011 IJENS

International Journal of Electric Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 02

71

200 150 100 50 0 1 2 3 4 5 6 7 8 9 10

A*protocol swarm intelligence other

250 200 150 100 50 0 1 3 5 7 9

A*protocol

swarm intelligence other

A*protocol

Figure 17. Implementing different protocols with 10 nodes.

Figure 20. Different distance traversed by 100 nodes. nodes

We can see that in this situation A* protocol shows minimum distance at all times. Swarm intelligence shows occasional minimum distances but sometimes it gives unpredictably high distances. As these are under the curve for the A* protocol is the least, it indicates that A* protocol allows least total distance traversed. Swarm intelligence does show occasional efficient short paths but is unpredictable at times, overall, the A* protocol shows least path in all the situations. Now let us increase the number of nodes to 100 nodes [3].
A*protocol

In this situation the results are similar, A* protocol shows least distance at all times, swarm intelligence shows occasional short path, but sometimes the distance traversed is high. However, the variation is that, the distance traversed by the A* protocol stabilizes stabil to a minimum. Now lets see what happens with 1000 nodes 250 200 150 100
swarm intelligence other

A*protocol

200 150 100 50 0 1 3 5 7 9

swarm intelligence other

50 0 1 2 3 4 5 6 7 8 9 10

A*protocol
Figure 21. Distance traversed by protocols with 1000 100 nodes

Figure 18. Demonstrating distance traversed for different protocols with 10 nodes.

A*protocol

250 200 150 100 50 0 1 2 3 4 5 6 7 8 9 10

A*protocol swarm intelligence other

250 200 150 100 50 0 1 3 5 7 9

swarm intelligence other

A*protocol

nodes Figure 22. Distance traversed by data for 1000 nodes.

Figure 19. Different protocols for 100 nodes nodes.

In n this situation the A* search shows minimum distance compared to all the other situations. If we compare the different scenarios we see that no matter what the number of nodes might be, A* search always guarantees

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 02 least distance. Sometimes other protocols show comparable results but most of the time they are way up in terms of distance traversed.

72

[8] Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Prentice Hall, 2003. [9] Morgan Kaufmann, Computer networks: A Systems Approach, 3rd edition 2003, ISBN: 1-55860-832-X. [10] Association, National Marine Electronics. NMEA 0183 Standard.(2003). Retrieved 24 May 2008, from http://www.nmea.org /pub/0183/index.html [11] F. Wang and Y. Zhang, Improving TCP Performance over Mobile Ad-Hoc Networks with Out-of-Order Detection and Response, 3rd ACM Int'l Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02), June 2002. [12] C. E. Perkins and E. M. Royer, Ad-hoc On-Demand Distance Vector Routing, Proceedings of 2nd IEEE workshop on Mobile Computing Systems and Applications, February 1999, pages 90-100. [13] Y. Gadallah, A Comparative Study of Routing Strategies for Wireless Sensor Networks: Are MANET Protocols Good Fit?, Proceedings of the 5th International Conference on Ad Hoc Networks and Wireless, Ottawa, Canada, August 2006. [14] A. Arora et al, "Exscal: Elements of an Extreme scale Wireless Sensor Network", Proceedings of the 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, pages 102-108, Hong Kong, August 2005. [15] J. Broch, D.A. Maltz, D.B. Johnson, Y.C. Hu, and J. Jetcheva, A Performance Comparison of Multi-hop Wireless Ad hoc Network Routing Protocols, In Proceedings of ACM/IEEE MOBICOM, Dallas, TX, October 1998. [16] Samir R. Das, Charles E. Perkins, and Elizabeth M. Royer, Performance Comparison of Two on Demand Routing Protocols for Ad hoc Networks, In Proceedings of the IEEE INFOCOM, Tel-Aviv, Israel, March 2000. [17] Byung-Gon Chun and Mary Baker, Evaluation of Packet Scheduling Algorithms in Mobile Ad Hoc Networks, Mobile Computing and Communications Review, 6, No. 3. [18] H.L. Chen, Two Hops Backup Routing Protocol in Mobile Ad hoc Networks, Parallel and Distributed Systems, 2005. Proceedings. 11th International Conference on Issue Date: 20-22 July 2005 Volume: 2 On page(s): 600 - 604, 2, ISSN: 1521-9097.

6. Conclusion
The core advantages of having a MANET based communication is that there is no need of separate base station, its easy to deploy, it is reconfigurable (adaptable to topology changes), it can be utilized where there is no infrastructure (emergency disaster situations), and lastly it is robust. Based on all the above findings we can conclude that A* search is indeed an efficient way to reduce path in mobile adhoc networks. Swarm intelligence does show occasional efficient short paths but is unpredictable at times, overall, the A* protocol shows least path in all the situations. A* protocol does give the minimum distance for the data to travel. Therefore using A* search and Dijkstras algorithm energy efficient MANETs can be constructed. This protocol can be used partly or fully to increase the efficiency by decreasing the path traversed our adhoc networks. Further work can be done by studying the time efficiency and security of adhoc networks using A* search.

References
[1] Wibling, Oscar. Ad Hoc Routing Protocol Validation. Sep. 2005. http://www.it.uu.se/research/ publications/lic/2005-004/2005-004.pdf [2] Boursier, Dahlen, Marie-Francoise, Marin, and Nethi. Cross-layer approach in mobile as hoc routing. 17 Dec. 2004. http://kom.aau.dk/group/04gr997/report/ 16.11.2004/ Report.pdf [3] Wahab, Radia, Hasan, Khondker, Sohul, Munawwar, Design of a Least Distance Protocol Using Search Techniques, HPCS-10, Orlando, Florida, USA, July 2010. [4] Mustafa S. Fawad , Mustafa Atika. Efficient Distance Computation Between Natural Quadrics. Aug. 2006. http://jatit.org/volumes/ research-papers/ volume-2-2.pdf [5] Arteconi, Hales, Babaoglu. Broadcasting at the Critical Threshold in Peer-to-Peer, Networks. Mar. 2007. http://www.cs.unibo.it/pub/TR/UBLCS/2006/ 2006-22.pdf [6] Behrouz A. Forouzan, Data Communications & Networking, 4th edition 2006, Tata MGH. [7] James F. Kurose and Keith W. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, Third Edition, Addison Wesley, 2005.

117902-4545 IJECS-IJENS April 2011 IJENS

IJENS

Вам также может понравиться