Rural Communication Development Using Mobile Ad-Hoc Network: Agent and Sensors
Rural Communication Development Using Mobile Ad-Hoc Network: Agent and Sensors
Ad-hoc Network
Agent and Sensors
Asia Pacific Institute of Information Technology, Panipat, Haryana
Staffordshire University, UK
1
Prob . v j be the probability of visiting the node vj
Long route Destination
then, the equation can be represented as:
Pi , j
Probability of visiting node v j Prob . v j
Short route Pi , j
j Si
Source
Whereas, if node vjis not the one-step neighbor of
node vithen, the probability of visiting vj becomes 0. This
Fig 2.1 - Longer and shorter path from source to destination.
means that the ants can only travel to their one-step
neighboring nodes.
In figure 2.1, assume that there are two paths from
source (nest) to destination (food). Say, a group of n ants, If
j Si then, Prob . v j = 0
travelling from source to destination, reach the first
intersection. Lets assume that (n/2) number of ants chose
The probabilities choosing the next hope must
the longer path and the other (n/2) number of ants chose the
satisfy the constraint:
shorter path. While returning back, ants again have to make
the decision to choose the route back home. Since, the path Prob . v j
chosen by the ants is shorter, ants traveling from shorter j S i = 1, provided that i1, S
path will deposit pheromone on the shorter path more
rapidly while traveling back and forth, compared to the ants
An ant deposits a constant amount of pheromone
choosing the longer route. Whereas, the pheromone trail of
longer path diffuses away with time, decreasing its chances (say, P ) each time it travels via edge. So, while
to be chosen by new ants.Eventually, the pheromone
intensity on shorter path will be higher than that of transiting from node
v i to v j , the pheromone
alternative longer path and all the ants will chose the shorter
path. (Dorigo, Maniezzo, & Colorni, 1996) concentration on the edge e(i, j) changes as follows:
2
(FANT) andbackward ant (BANT) are used for this purpose. from destination to source. After, the sender receives the
FANT is an agent which helps in tracking the source node BANT from the destination nodes, the route is formed and
whereas;BANT helps in tracking the destination node. transmission of data packets is possible.(Subha & Anitha,
FANT is a small packet which stores a unique sequence 2009)
number, used along with the source address, by the nodes to
identify the duplicate. Duplicate packets are destroyed by Fig 3.1 (a), shows the process of route discovery where
the nodes. each nodes broadcast FANT to one-hop neighboring nodes
until it reaches destination. In Fig 3.1 (b), BANT is
FANT is first broadcasted to all the one-hop neighbors transmitted back to source node creating multiple routes for
and if the destination is not found the neighbors forward the data transmission which shows that AAMM supports the
FANT to their neighbors and so on. The whole process goes multi-path routing.
on until the destination is found. Each node also stores the
recently forwarded packet details in its buffer to prevent the 4.2 Route Maintenance
loops. A node which receives the FANT for the very first
Once the routes are formed between source and
time, adds a record in the routing table. The record consists
destination using FANT and BANT agents, the second phase
of 3 attributes viz. destination address, next hop and
of algorithm will be to improve the routes during the
pheromone value. Source address of FANT is interpreted as
transmission of packets. AAMM algorithm does not need to
the destination address, the previous node is interpreted as
transmit special packets to maintain the network traffic. The
next node and the pheromone value is calculated using the
data packets transmitted by end-users are enough to perform
number of nodes the FANT travelled to reach that particular
the route maintenance. The pheromone values for the path
node.
keeps on changing as the data packets travel via the path
updating the artificial pheromone concentration based on
equation (i). Similarly, the pheromone concentration for a
route also decreases with time using equation (ii). This way,
1 the data packets behave like natural agents (ants) and keep
4
optimizing the routes as they travel in network and the most
optimal path is opted by data packets with the time.
After the FANT reaches the destination, the information Alternative link is searched using the routing table, and
is extracted and the FANT is destroyed. The destination upon the discovery of alternative link the data packets are
node creates a BANT and sends it back to the source node. forwarded via alternative path. Else, neighboring hops are
BANT travels in network similar to FANT, creating routes informed for local transmission. Using neighboring hops
ensures that unsuccessful data packets are re-routed using
3
neighboring nodes instead of original sending nodes The algorithm, on comparison, proved to be better than the
reducing the delay in process. In case both the alternatives similar existing algorithms like ARA and AODV in terms of
do not work, and the transmitting node receives the negative dynamicity, error handling and reducing overhead. The
acknowledgement (NACK), the new route discovery phase algorithm proposed is robust, dynamic, scalable and flexible
is initiated.This approach of local transmission saves end-to- and thus, can be used in Rural Communication and defense
end delivery time. sector with high degree of reliability.
7. LITERATURE REVIEW
5. COMPARISON WITH SIMILAR EXISTING ALGORITHMS
Table 4 List of the research paper used ( (J.A. Freebseryser, 2001)
Table 4 Comparison of AAMM with ARA and AODV (Sethi & Udgata,
2010) TITLE AUTHO YEAR CONCLUSION
R
AAMM ARA AODV Wireless Lu Han October explains what is
Ad-hoc 8, 2004 Mobile Ad-hoc
Local Transmission Yes No No Networks networks and its
Pheromone update Yes Yes No character
mechanism The Ant System: Marco 1996 The research paper
Optimization by a Dorigo explains the way ant
Multipath transmission Yes Yes No
colony of colonies function.
Automatic New route Yes No No cooperating agents
discovery Mobile Ad hoc Kavita 2007 demonstrate the
Networks: Taneja R. challenges and Future
Challenges and B. Patel of the system
Future
Table 4 shows the comparison of AAMM with similar Swarm intelligence Gianni Di 2005 The Paper explains
nature of algorithms namely Ad-hoc On-Demand Distance for routing in Caro the routing algorithm
Vector Routing (AODVC) and Ant colony based Routing mobile ad hoc for the system.
networks
Algorithm (ARA).AAMM provides the local transmission
facility which saves the end-to-end delivery time in 8. REFERENCE
network. In a dynamic nature of network such as MOBILE
AD-HOC NETWORK with high node mobility, the Bing Wu, J. C. (2006). A Survey on Attacks and
frequency of failure of links is high. Thus, with the local Countermeasures in mobile addhoc network.
transmission mechanism AAMM proves to be better in WIRELESS/MOBILE NETWORK SECURITY , 2-6.
cutting down the network overhead compared to other two
G.Varaprasad. (2005). New security algorithm for mobile
algorithms. AAMM also has an upper hand on automatic
adhoc networks using zonal routing protocol. ieee
route discovery as it uses the new kind of ants namely
journal. 2-4.
Update Ants (UANT) for preventing the network from being
saturated. The pheromone update mechanism and multi path Haas, Z. J. (2002). Secure Routing for Mobile Ad hoc
transmission are present in dynamic algorithms like AAMM Networks. distributed Network and simulation
and ARA but not in traditional algorithms like AODV.(Sethi conference , 1-2.
& Udgata, 2010)Presence of all these features makes
AAMM an appropriate routing algorithm for MOBILE AD- J.A. Freebseryser, B. L. (2001). A DoD perspective on
HOC NETWORK with reduced overhead and high . mobile ad hoc networks. Ad hc networking ,
reliability.
29-51.
6. CONCLUSION
Pietro Michiardi, R. M. (2010). Ad hoc networks security.
The paper introduced the new approach for routing in Security in Networks , 1-2.
MOBILE AD-HOC NETWORK blending together the
widely used ant colony optimization meta-heuristic and Shuyao Yu. (2010). A security architecture for Mobile Ad
some intelligent techniques like local transmission and Hoc Networks. Security Architecture, 2-4.
automatic route discovery using UANT. Introduction of the
new artificially intelligent techniques in existing approach
Image Reference:
like ACO resulted in the modeling of the new multi-agent
based algorithm which can be implemented in Rural Q.Fang. (n.d.). Retrieved from
Communication MOBILE AD-HOC NETWORK for http://graphics.stanford.edu/projects/lgl/papers/fzg-
transmission of critical Rural Communication information. lscptea-2003/image.gif
4
5