Вы находитесь на странице: 1из 4

Synergy Between MANET And Biological Swarm

Systems
Arunabh Mishra
Sikkim Manipal Institute Of Technology,Sikkim Manipal University,Rangpo,Sikkim -737132

Abstract-A whole new school of thought rooted in through indirect communication between the agents, this being
evolutionary biology are emerging to rattle the narrow the principle of stigmergy. It should be stressed, however, that
assumptions of scientific age and seek to decipher the real the individual agents have no explicit problem solving
lessons from living systems. This paper provides insight knowledge and intelligent behavior arises as a result of the
into the working of biological swarm systems. It attempts actions of societies of such agents[1]
to extend the swarm intelligence approach to solve routing 2)Example I (ant colony)
and control problems in telecommunications. A single ant or bee isn't smart, but their colonies are. The
Initial work in the field of swarm intelligence has shown study of swarm intelligence is providing insights that can help
a similarity between routing requirements of a wireless humans manage complex systems, from truck routing to
communication system and these biological swarm military robots. One key to an ant colony, for example, is that
systems. no one's in charge. No generals command ant warriors. No
The main issue of a wireless network is: managers boss ant workers. The queen plays no role except to
(a) Network topology (b) Quality Of Service(QoS) lay eggs. Even with half a million ants, a colony functions just
(c) Power Requirements fine with no management at all—at least none that we would
Thus network routing and control becomes the recognize. It relies instead upon countless interactions
important factor determining the efficiency of any between individual ants, each of which is following simple
network, which has different heterogeneous nodes having rules of thumb. Scientists describe such a system as self-
different data rates and protocols. organizing.[2]
In this paper we focus on network routing problem and
employ swarm intelligent approaches for its efficient 3)Example II(Bee Hive)
solution. The primary aim of this adaptive swarm In bee hives is a strong hierarchial entreprise model exists
intelligent routing is to provide network routing through with drones,workers and Queen bee. Take for example a
heterogeneous nodes in a manner that will provide the relocation of hive, which exhibits the democratic and
path with minimum error rates and fastest hop. Thus autocratic hierarchy in bees. The scout bees come to a decision
providing the efficient Quality Of Service. by an intelligent voting mechanism, and the site that reaches
the majority votes in minimum time gets selected.[3]
I. INTRODUCTION
1) Swarm Intelligence The same analogy can be applied to routing system in
Swarm Intelligence is a property of systems of unintelligent wireless communication systems,whereby a next node to be
agents of limited individual capabilities exhibiting collectively hopped can be determined by ―bit-ants‖, a node will be
intelligent behavior. An agent in this definition represents an determined using defined detrimental factors and once the
entity capable of sensing its environment and undertaking optimum number has been reached the node gets selected.
simple processing of environmental observations in order to Craig Reynolds a computer animator designed a C++
perform an action chosen from those available to it program that simulated the flocking behaviour of birds.He
gave simple algorithmic instructions to boid
(1) avoid clustering (separation)
(2) Fly in an average directioin of boids (alignment)
(3) Follow the adjacent boid.(cohesion)
Thus he was able to simulate a self organizing model of
schooling and flocking that was actually a swarm
behaviour.[4] Similarly an france based company Air Liquide
developed a computer based model for their transport routing
inspired by foraging behaviour of ants (Linepithema humile),
a species that deposits chemical substances called
pheromones. When a ants go for a foraging they leave a trail
Fig 1 : Food Foraging by ants – a swarm system through chemical substances called pheromones, and the
following foragers follow the route having strongest
. These actions include modification of the environment in pheromones trail.[5] Similarly the algorithm sends the
which the agent operates. Intelligent behavior frequently arises virtual ants over the road maps and updates the data system for
the trails, thus the delivery trucks waiting in the queue follow their effectiveness. Thus the frequently changing topology
the path given by the computer system. increases the control overhead thus causing scarce bandwidth

II. MOBILE AD HOC NETWORK (MANET) Thus there are three different ways to evaluate and compare
The notion of ad-hoc networking refers to the spontaneous performance of mobile ad hoc routing protocols:
formation of a network of computing nodes without reliance (1) Based on analysis[10]
on a specific infrastructure. Typical ad-hoc networks consist (2) Based on simulation results in Network Simulator,
of mobile nodes—ranging from laptops and pocket PCs to OPNET
miniature sensor devices— with widely different computation (3) By analyizing data from real world.
and communication capabilities. Node mobility may be Wireless Routing Protocol In WRP- a table driven or
limited to deployment, as in the case of some sensor networks, proactive routing protocol, guarantees loops freedoms and
or may continue throughout the lifetime of the network, as is avoids temporary routing loops. But since it maintains a four
the case in mobile ad-hoc networks (MANETs). Ad-hoc routing tables hence uses a significant memory and
networks may also be formed by application-level software bandwidth.[13] Optimized Link State Routing(OLSR) It is
agents executing on top of a fixed communication also a proactive routing approach. Each node propagates its
infrastructure. In such networks, node mobility can take the link state information to all other nodes in the network, using
guise of software-agent migration among different hosts, or periodical beacons.[14]
even of autonomous peers (e.g., principals, domains) joining Ad hoc ON Demand Distance Vector Routing(AODV) It uses
or leaving peer-to-peer (P2P) networks formed without the periodic beaconing and sequence numbering procedure of
benefit of a separate, fixed collaboration infrastructure[6] DSDV [15] algorithm. It has potentially less routing overheads
as destination carry only destination address and not the whole
A Mobile Ad Hoc network (MANET) is a collection of routing information (as in DSR).
wireless mobile nodes, which dynamically form a temporary
network, without using any existing network infrastructure or
centralized administration. They are sometimes called IV. SYNERGY BETWEEN COMMUNICATION
infrastructureless networking since the mobile nodes in the NETWORK AND BIOLOGICAL SWARM-AN OVERVIEW
network dynamically establish routing paths between OF SWARM BASED ROUTING
themselvesCurrent typical applications of a MANET include
battlefield coordination and onsite disaster relief Initial work in swarm intelligence has revealed a great deal of
management. synergy between the routing requirements of communication
The emergence of the Mobile Ad Hoc Networking (MANET) networks and certain tasks that exist in biological swarms. For
technology advocates self-organized wireless interconnection instance, a key characteristic of swarm intelligence is the
of communication devices that would either extend or operate ability of agents (ants) to find optimal (or near optimal)
in concert with the wired networking infrastructure or, routing (in food gathering operations for example), where
possibly, evolve to autonomous networks. In particular, in intelligent behavior arises through indirect communications
MANET, any node may compromise the routing protocol between the agents, a phenomenon known as stigmergy.
functionality by disrupting the route discovery process. • Dynamic ―online‖ optimization using local information
• No exchange of global information for routing determination
III. EXISTING ROUTING PROTOCOLS • Inherent scalable nature, resulting in graceful builds and
A large amount of works already exist on network routing. But degradations
the wireless network routing present its very specific problems • Characteristics leading to robustness (fault-tolerance) under
due to its dynamic nature. most contingencies
The node movements, radio interference, addition of new
nodes. Lot of work is being done on swarm intelligent routing
and the best of routing schemes depend on channel
characteristics.
The two popular dynamic routing approaches in wired
networks are Distance Vector Routing and Link state
routing[7]The distance state routing based on Bellman-ford
routing algorithm.In it every router maintains a routing table
where distance information to all reachable hosts is stored.
The distance is calculated on based on metrics such as hop
number, queue length or delay.[8]
In Link state routing algorithm each node periodically Fig 2. Collective ant motion based on pheromones level
notifies its current status to all routers. In it the metrics chosen Swarm-intelligent routing methods will enhance the
are number of hops, link speed and traffic congestion. In wired reliability and timeliness of data transfer within a
networks both the algorithms perform well because of the heterogeneous multi-node wireless communication network.
predictable network properties. Open Shortest Path They will furthermore reduce the overhead in network growth
First(OSPF) is an example of link state routing.[9] But in due to their inherently scalable features
mobile ad- hoc networks their dynamic property deteriorates
A swarm can be seen as a set of non- zero communicating packets waiting to be sent. Once sent a packet is considered to
and distributed autonomous agents each engaged in one or be acknowledged. The time it takes to a packet to move from
more tasks, and with no or little centralized control. one node to a neighboring one depends on its size and on the
Interactions among constituents of swarm results a process of link transmission characteristics. If on packet's arrival there is
self organization that gives rise to interesting/useful behaviors not enough buffer space to hold it, the packet is discarded.
at the system level, such a phenomenon is called as swarm Packets are also discarded because of expired time to live.
Intelligence After transmission, the routing table is updated to be used by
next arriving bit-ants.
1) Swarm Routing
Historically, the routing algorithms used in communication 1) Routing Benchmarks (standard performance metrics)
networks have evolved from static routing in which \good a) Bit Error Rate (BER)
routes" are computed off-line to more dynamic routing in b) Transit Time (Packet Delay) (sec)
which the routes are computed online to take the node The BER measures the Quantity of service that the network
congestion level into account.In the present paper emphasis delivers over a specified time interval. Transit Time gives the
has been laid upon forward routing only.[16] QoS of the network
Routing systems frequently depend upon global information
for their efficient operation. We have two packets (ROUTING AGENTS)
Ant systems do not need such global information, 1. routing packet (more priority)
relying instead upon pheromone traces that are laid 2. data packet
down in the network as the ant, or agent, moves At regular interval every network nodes emits packets with
through the network. randomly selected destination. All packets select their next
Global information is frequently out of date and hop proportional to information stored in routing table ie
transmission of the information required from one probabilities of selecting a link.
node to all others consumes considerable network In this algorithm the routing will be determined by through
bandwidth. complex interactions of network exploration agents called
BIT-ANTS….
V. PROBLEM CHARACTERISTICS AND Step-1-----the nodes launches BIT-ANTS to all
COMMUNICATION NETWORK MODEL destinations at regular time interval.
Routing algorithms have the goal of directing traffic from Step-2-----BIT-ANTS find a route to the destination based
sources to destinations maximizing some measure of network on routing tables.
performance. Often throughput (proportional to Bit Error Step-3-----In the process they update the routing table.
Rate) and packet delay (sec-proportional to transit time) are A packet may discarded at a node due to
the performance measures taken into account. Throughput (a)expired time-to-live(TTL) (b) lack of buffer space
measures the quantity of service that the network has been
able to offer in a certain amount of time, while packet delay A typical routing table:
defines the quality of service produced.Routing decisions can PREVIOUS TRANSIT BER(Hσ)
only be made on the basis of local andapproximate NODE TIME(Ht)
information about the current and the future network states,
with additional constraints posed by the network switching
and transmission technology. For this purpose, every routing
node holds a buffer space where the incoming and the A
outgoing packets are stored.
This buffer is responsible for maintain the dynamic D
routing table which is actually analogous to pheromone level TX B
in biological systems, and is shared resource among all the RX
queues attached to every incoming and outgoing link of the
node. All the traveling packets are subdivided in two classes: E
data and routing packets. All the packets in the same class C
have the same priority, so they are queued and served only on
the basis of a first-in-first-out policy, but routing packets have Fig 3. A typical network with 5 nodes.
a higher priority than data packets.
Each nodes inserts two header Ht and Hσ.
Data packets are fed into the network by applications (i.e., Ht corresponds to transit time
processes sending data packets from origin nodes to Hσ corresponds to Bit Error Rate
destination nodes) whose arrival rate is dictated by a selected The ―BIT-ANTS” are sent in the very beginning of the
probabilistic model. The number of packets to send, their sizes transmission from receiver to transmitter. The bit ants are
and the intervals between them are assigned according to responsible for the initial filling up of the routing tables.
some defined process. A simple flow control mechanism is Subsequently the data packets are transmitted across the
implemented which determines the maximum number of data network.
We define a new quantity, y which is product of Ht and Hσ VII. LIMITATIONS
y= Ht * Hσ The proposed swarm intelligent routing approach to solve
So when a data packet reaches a particular node it observes the routing and control problems in an Ad hoc system does not
routing table for that node. Looks for the minimum value of y takes following factors in consideration:
(=Ht * Hσ) and hops to the next node. The data packet 1) The flexibility of the protocol with the other existing
simultaneously updates the routing table for the new value of protocols.
Ht and Hσ. Similarly this part is repeated for other subsequent 2) The relevant changes will have to be made for
nodes. implementation on wired and wireless system.
Thus the routing table gets dynamically updated while a data 3) The security concerns.
packet traverses from transmitter to receiver, hopping from
one node to other. VIII. CONCLUSION
In this paper the author has described a novel application
HT Hσ DATA of intelligent swarm system. Current existing routing
protocols have been studied and a new protocol based on
biological swarms has been proposed.
ROUTING TABLE FOR NODE
PREVIOUS BIT ERROR PACKET The application presented here is unique, the
NODE RATE DELAY (Hσ) implementation of routing protocols based for MANET . The
(Ht) approach being dynamic in nature can be extended to both
B point to point communication and point to multipoint
C communication systems. The implementation of this model in
D MATLAB has been proposed whereby the simulated models
for routing will have to be implemented. Also the author is
PATH CALCULATION (for >=1 RX and >=1 TX) looking for if the work can be extended to wireless mesh
INTERMEDIATE NODES IN POSSIBLE networks. (IEEE 802.11s)
NODES PATH PATHS
IX. ACKNOWLEDGMENT
I would like to extend my acknowledgement to my Head
1 1 1 Of Department, (Dr) Mr. R. N. Bera who provided me
with invaluable relevant assistance with this work.
2 2 2
3 1 3
2 6
X. REFERENCES
3 2 [1] [Connection Management by Ants: An Application of Mobile Agents in
Network Management Tony White, Bernard Pagurek, Franz Oppacher1
[2] Swarm Theory National GeographicsJuly-
VI. DIAGRAMMATICAL REPRESENTATION: 2007http://nopiedra.wordpress.com
[3] Group decision making in honey bee swarms, Thomas D. Seeley, P.Kirk
Visscher and Kevin M. Passino
A [4] [boids by Craig Reynolds, home page: www.red3d.com/cwr
[5] [www.nutechsolutions.com
[6] [1Security of Emergent Properties in Ad-Hoc Networks
Virgil D. Gligor]
B [7] Andrew S. Tanenbaum, Computer networks,3 rd edition,Prentice Hall]
TX R D. Waitzman, C Partridge, and S Deering, Distance Vector multicast
X routing protocol
[8] [ Yi Lu, Weichao Wang, Yuhui Zhong, Bharat Bhargava, Study of
C Distance Vector Routing protocols for mobile ad hoc networks
[9] J. Moy: OSPF ver2
[10] E Royer , CK Toh A review of current routing protocols for ad hoc
mobile wireless networks
[11] Http//www.isi.edu/nsnam/ns
FIG 2.Three intermediate nodes [12] Http/www.opnet.com
[13] S Murthy, JJ Garcia: a routing protocol for packet radio networks
[14] P Jacquet, P Muhlethaler, T Clausen, A Laouiti, A Qayyum, L. Viennot:
Optimized Link State routing protocol for ad hoc networks
A [15] CE Perkins TJ Watson, Highly Dynamic destination sequenced distance
vector routing
[16] A New Distributed and Adaptive Approach to
R Routing and Load Balancing in Dynamic Communication Networks
TX Martin Heusse,Sylvain Guerin, Dominique Snyersy,,Pascale Kuntz.
X
B

FIG 3.Two intermediate node

Вам также может понравиться