SlideShare a Scribd company logo
1 of 22
OPTIMIZATION IN ANTNET ROUTING
          ALGORITHM




         Vinay
         Kumar
BACKGROUND
• What is Routing?
 Routing is the process of selecting paths in a network to send data packets.
 It fully affects the throughput, reliability, and congestion of the network.


• What is an ideal routing algorithm?
 An algorithm which can deliver a packet from source to its destination with
  min. amount of delay.
 It must be adaptive and intelligent to make decisions according to
  circumstances.
BACKGROUND…
•   Routing algorithms
   OSPF, RIP, BGP are some routing algorithms in use.
   Not sufficient to tackle the complexity of networks.
   Not adaptive, not intelligent and fault intolerant.
INTRODUCTION
•   Ant is a common insect found in your home.
•   Its foraging behavior
 Discovers shortest path to a food source.
 Shares the info to other ants by stigmergy.
 Stigmergy is a form of indirect communication used by ant for problem solving activity.
 It drops pheromone through the way it goes. It follows the backtrack path with maximum
  pheromones. That path is actually the shortest path.
INTRODUCTION…
•   Ant Colony Optimization [ACO] – A family of optimization algorithms based on real ant
    behavior.
•   AntNet Routing Algorithm
 A routing algorithm based on ACO
 A group of artificial ants (agents) create the shortest path between a pair of nodes.
 They update the routing tables.
 Data packets are directed towards destination using the updated routing table.
DATA STRUCTURE MAINTAINED AT EACH NODE

1. Routing table [Tk] –
 It contains the information specifying which is the next node should be taken in order to
  reach a destination.
 Row represents all adjacent nodes to current node.
 Column represents all possible destinations in the network.
 Table entry is represented by Pnd ,
           Where Pnd = goodness of choosing n as next node in order to reach destination d
                                            OR
                      Pheromone concentration along the link from current node to next node
                      n for destination d
DATA STRUCTURE MAINTAINED AT EACH NODE
2. Local traffic statistics
•   It follows the traffic fluctuations as seen by current node
•   Stored as an array                  where each entry contains,
       µd=estimated mean
       σ2=estimated variance
       Wd=moving observation window
            for a destination node d.
ANTNET ROUTING ALGORITHM
•   The operation involves two types of agents-
 Forward agents [Fs->d] who gather information about the state of network.
 Backward agents [Bd->s] who use the collected information from Fs->d to update the routing
  tables of routers on their path.
ANTNET ROUTING ALGORITHM
•   Fs->d is launched towards destination d to discover a shortest and least-cost path at
    regular time intervals.
•   Fs->d maintain a stack which stores –
 Identifier of every visited node i
 Time elapsed in arriving at node i from originating node
At any node i, Fs->d selects the next adjacent node j by using the probability value,
ANTNET ROUTING ALGORITHM
•   If Fs->d reaches an already visited node(cycle) then the information of this node is popped
    from the stack.
•   If cycle is greater than half the Fs->d lifetime then the Fs->d is destroyed.
•   When Fs->d reaches the destination node d then a backward agent Bd->s is created.
•   Fs->d transfers its stack information to Bd->s and dies.
•   Bd->s starts from d towards s following the same path as Fs->d by popping the stack at each
    node.
•   As Bd->s reaches a node ,it updates both the data structure of the node.
UPDATING LOCAL TRAFFIC STATISTICS
•   The estimated mean and variance are updated as follows-

                            id   id   ( o i  d   id )




                   id   id   (( o i  d   id )   id )
                    2         2                                 2   2




Where,     Oi->d is the observed ant’s trip time from node i to destination d
           η weighs the number of most recent samples that will really affect average
UPDATING ROUTING TABLE
•   If Bd->s arrives at a node i from a node f ,then the entry in the routing table is updated by
    the formula-
                       Pifd  Pifd  r (1  Pifd )
           Where r is reinforcement value depending on tables of node i, Ti and Mi
•   Simultaneously, the pheromone value for nodes other than f is decreased so that total
    sum of probability still comes 1.

                              Pind  Pind  rPind , n  f
•   As soon as Bd->s finishes, the data packet can be sent into the network according to
    updates routing tables..
LIMITATIONS
•   Stagnation is the major problem in antnet algorithm. If a link z keeps good condition for a
    long time, then its probability value will be high thus leading to more and more packets to
    be sent via link z. It reduces the probability of other links.
•   Stagnation is very critical problem because-
 Link z may lose its optimality.
 If network gets failed, then link z may become unavailable.
 Other long paths may become optimal which otherwise should not.
OPTIMIZATION
Optimization operation is performed on Routing table -
• The column wise values in the table are picked up and a sorting algorithm is executed on
these values.
• The sorted values ranging from higher to lower are stored in a temporary array.
• The difference d, amongst the adjacent values is calculated and is compared to some
threshold value say pm.
• If the difference d is less than pm then those values are selected and comparison amongst
the adjacent values is continued until difference is greater than pm.
• Otherwise at the very first occurrence of difference greater than pm , the comparison is
stopped and the corresponding values in the array are selected.
• The interfaces corresponding to these values are stored in a new routing table which will
have the same structure as the original one, but obviously, the new table will have less
number of rows.
WORKING
WORKING…
                                              Destination nodes

                                E               G                 F                A
              A                 .25             .39               .8               .34
Next nodes




              C                 .45             .32               0                .34
              D                 .17             .11               .1               .20
              F                 .13             .28               .1               .12



             Ist column                     Assumption: pm =0.1 & Node B Routing table shown

                          .45         .25                .17              .13




                                        {.45} is selected
WORKING
                                             Destination nodes
                                 E              G                   F          A
              A                  .25            .39                 .8         .34
Next nodes




              C                  .45            .32                 0          .34
              D                  .17            .11                 .1         .20
              F                  .13            .28                 .1         .12

             IInd column

                           .39         .32               .28             .11




                                        {.39,.32,.28} is selected
WORKING
                                                Destination nodes
                                 E               G                  F        A
             A                   .25             .39                .8       .34
Next nodes




             C                   .45             .32                0        .34
             D                   .17             .11                .1       .20
             F                   .13             .28                .1       .12

             IIIrd column

                            .8         .1                      .1        0




                                            {.8} is selected
WORKING
                                             Destination nodes

                                 E           G                   F           A
             A                   .25         .39                 .8          .34
Next nodes




             C                   .45         .32                 0           .34
             D                   .17         .11                 .1          .20
             F                   .13         .28                 .1          .12

             IVth column

                           .34         .34               .20          0.12




                                        {.34,.34} is selected
WORKING


                            E              G              F              A
Next nodes




             A                             .39            .8             .34
             C              .45            .32                           .34
             F                             .28



                 Result- Thus, more than one optimal paths if exist are identified.
CONCLUSIONS
•   We find more than one optimal outgoing path.
•   It can explore new and better paths even if network topologies change frequently.
•   The problem of stagnation is resolved.
•   The throughput of network is improved.
REFERENCES
[1] Shuchita Upadhyaya and Richa Setiya , “Identifying multiple optimal paths in Antnet Routing
Algorithm with negligible overhead,” IJCSNS International Journal of Computer
Science and Network Security, VOL.9 No.2, February 2009


[2] F. Tekiner, F. Z. Ghassemlooy and S. Al-khayatt, “The Antnet Routing Algorithm – A
 Modified Version”


[3] soe.northumbria.ac.uk




                            Thanks …. Any Questions?

More Related Content

What's hot

VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015vtunotesbysree
 
microprocessor Questions with solution
microprocessor Questions with solutionmicroprocessor Questions with solution
microprocessor Questions with solutiondit
 
Instruction set (prasenjit dey)
Instruction set (prasenjit dey)Instruction set (prasenjit dey)
Instruction set (prasenjit dey)Prasenjit Dey
 
SOLUTION MANUAL OF COMPUTER ORGANIZATION BY CARL HAMACHER, ZVONKO VRANESIC & ...
SOLUTION MANUAL OF COMPUTER ORGANIZATION BY CARL HAMACHER, ZVONKO VRANESIC & ...SOLUTION MANUAL OF COMPUTER ORGANIZATION BY CARL HAMACHER, ZVONKO VRANESIC & ...
SOLUTION MANUAL OF COMPUTER ORGANIZATION BY CARL HAMACHER, ZVONKO VRANESIC & ...vtunotesbysree
 
Chapter 2 instructions language of the computer
Chapter 2 instructions language of the computerChapter 2 instructions language of the computer
Chapter 2 instructions language of the computerBATMUNHMUNHZAYA
 
SDR channelizer by sooraj
SDR channelizer by soorajSDR channelizer by sooraj
SDR channelizer by soorajsooraj yadav
 
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...Hsien-Hsin Sean Lee, Ph.D.
 
Code generation in Compiler Design
Code generation in Compiler DesignCode generation in Compiler Design
Code generation in Compiler DesignKuppusamy P
 
17443 microprocessor
17443   microprocessor17443   microprocessor
17443 microprocessorsoni_nits
 
Code generator
Code generatorCode generator
Code generatorTech_MX
 
Computer Organization And Architecture lab manual
Computer Organization And Architecture lab manualComputer Organization And Architecture lab manual
Computer Organization And Architecture lab manualNitesh Dubey
 
Lec17 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Me...
Lec17 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Me...Lec17 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Me...
Lec17 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Me...Hsien-Hsin Sean Lee, Ph.D.
 
Lec15 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- EPIC VLIW
Lec15 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- EPIC VLIWLec15 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- EPIC VLIW
Lec15 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- EPIC VLIWHsien-Hsin Sean Lee, Ph.D.
 
Microprocessor and Microcontroller Lab Manual
Microprocessor and Microcontroller Lab ManualMicroprocessor and Microcontroller Lab Manual
Microprocessor and Microcontroller Lab ManualSanthosh Kumar
 
Ebc7fc8ba9801f03982acec158fa751744ca copie
Ebc7fc8ba9801f03982acec158fa751744ca   copieEbc7fc8ba9801f03982acec158fa751744ca   copie
Ebc7fc8ba9801f03982acec158fa751744ca copieSourour Kanzari
 
Emulating a Combo Organ Using Faust
Emulating a Combo Organ Using FaustEmulating a Combo Organ Using Faust
Emulating a Combo Organ Using FaustSampo Savolainen
 

What's hot (20)

VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
VTU 4TH SEM CSE MICROPROCESSORS SOLVED PAPERS OF JUNE-2014 & JUNE-2015
 
microprocessor Questions with solution
microprocessor Questions with solutionmicroprocessor Questions with solution
microprocessor Questions with solution
 
Instruction set (prasenjit dey)
Instruction set (prasenjit dey)Instruction set (prasenjit dey)
Instruction set (prasenjit dey)
 
SOLUTION MANUAL OF COMPUTER ORGANIZATION BY CARL HAMACHER, ZVONKO VRANESIC & ...
SOLUTION MANUAL OF COMPUTER ORGANIZATION BY CARL HAMACHER, ZVONKO VRANESIC & ...SOLUTION MANUAL OF COMPUTER ORGANIZATION BY CARL HAMACHER, ZVONKO VRANESIC & ...
SOLUTION MANUAL OF COMPUTER ORGANIZATION BY CARL HAMACHER, ZVONKO VRANESIC & ...
 
Chapter 2 instructions language of the computer
Chapter 2 instructions language of the computerChapter 2 instructions language of the computer
Chapter 2 instructions language of the computer
 
SDR channelizer by sooraj
SDR channelizer by soorajSDR channelizer by sooraj
SDR channelizer by sooraj
 
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...
Lec6 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- Instruction...
 
Code generation in Compiler Design
Code generation in Compiler DesignCode generation in Compiler Design
Code generation in Compiler Design
 
17443 microprocessor
17443   microprocessor17443   microprocessor
17443 microprocessor
 
Code generator
Code generatorCode generator
Code generator
 
Logic Fe Tcom
Logic Fe TcomLogic Fe Tcom
Logic Fe Tcom
 
Computer Organization And Architecture lab manual
Computer Organization And Architecture lab manualComputer Organization And Architecture lab manual
Computer Organization And Architecture lab manual
 
Lec17 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Me...
Lec17 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Me...Lec17 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Me...
Lec17 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Me...
 
Dld ppt
Dld  pptDld  ppt
Dld ppt
 
Lec15 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- EPIC VLIW
Lec15 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- EPIC VLIWLec15 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- EPIC VLIW
Lec15 Computer Architecture by Hsien-Hsin Sean Lee Georgia Tech -- EPIC VLIW
 
Matlab workshop
Matlab workshopMatlab workshop
Matlab workshop
 
Code optimization
Code optimizationCode optimization
Code optimization
 
Microprocessor and Microcontroller Lab Manual
Microprocessor and Microcontroller Lab ManualMicroprocessor and Microcontroller Lab Manual
Microprocessor and Microcontroller Lab Manual
 
Ebc7fc8ba9801f03982acec158fa751744ca copie
Ebc7fc8ba9801f03982acec158fa751744ca   copieEbc7fc8ba9801f03982acec158fa751744ca   copie
Ebc7fc8ba9801f03982acec158fa751744ca copie
 
Emulating a Combo Organ Using Faust
Emulating a Combo Organ Using FaustEmulating a Combo Organ Using Faust
Emulating a Combo Organ Using Faust
 

Similar to An optimization in antnet routing algorithm

Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot NetworksRelay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot NetworksMd Mahbubur Rahman
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection NetworkHeman Pathak
 
Chapter 4 combinational circuit
Chapter 4 combinational circuit Chapter 4 combinational circuit
Chapter 4 combinational circuit GulAhmad16
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptxHirazNor
 
IMPLEMENTATION OF SDC - SDF ARCHITECTURE FOR RADIX-4 FFT
IMPLEMENTATION OF SDC - SDF ARCHITECTURE FOR RADIX-4 FFT IMPLEMENTATION OF SDC - SDF ARCHITECTURE FOR RADIX-4 FFT
IMPLEMENTATION OF SDC - SDF ARCHITECTURE FOR RADIX-4 FFT VLSICS Design
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Artificial intelligence in the design of microstrip antenna
Artificial intelligence in the design of microstrip antennaArtificial intelligence in the design of microstrip antenna
Artificial intelligence in the design of microstrip antennaRaj Kumar Thenua
 
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGNAN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGNEEIJ journal
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdfmrcopyxerox
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmMOHIT AGARWAL
 

Similar to An optimization in antnet routing algorithm (20)

Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot NetworksRelay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
 
8
88
8
 
Interconnection Network
Interconnection NetworkInterconnection Network
Interconnection Network
 
Chapter 4 combinational circuit
Chapter 4 combinational circuit Chapter 4 combinational circuit
Chapter 4 combinational circuit
 
11.ppt
11.ppt11.ppt
11.ppt
 
Ofdm.pptx
Ofdm.pptxOfdm.pptx
Ofdm.pptx
 
IAP presentation-1.pptx
IAP presentation-1.pptxIAP presentation-1.pptx
IAP presentation-1.pptx
 
100 103
100 103100 103
100 103
 
IMPLEMENTATION OF SDC - SDF ARCHITECTURE FOR RADIX-4 FFT
IMPLEMENTATION OF SDC - SDF ARCHITECTURE FOR RADIX-4 FFT IMPLEMENTATION OF SDC - SDF ARCHITECTURE FOR RADIX-4 FFT
IMPLEMENTATION OF SDC - SDF ARCHITECTURE FOR RADIX-4 FFT
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Artificial intelligence in the design of microstrip antenna
Artificial intelligence in the design of microstrip antennaArtificial intelligence in the design of microstrip antenna
Artificial intelligence in the design of microstrip antenna
 
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGNAN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
AN EFFICIENT BASE-4 LEADING ZERO DETECTOR DESIGN
 
Gu2512391243
Gu2512391243Gu2512391243
Gu2512391243
 
Gu2512391243
Gu2512391243Gu2512391243
Gu2512391243
 
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
4af46e43-4dc7-4b54-ba8b-3a2594bb5269 j.pdf
 
Distance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing AlgorithmDistance Vector & Link state Routing Algorithm
Distance Vector & Link state Routing Algorithm
 
12.Digital Logic.pdf
12.Digital Logic.pdf12.Digital Logic.pdf
12.Digital Logic.pdf
 
ECE 565 FInal Project
ECE 565 FInal ProjectECE 565 FInal Project
ECE 565 FInal Project
 
Lp2520162020
Lp2520162020Lp2520162020
Lp2520162020
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

An optimization in antnet routing algorithm

  • 1. OPTIMIZATION IN ANTNET ROUTING ALGORITHM Vinay Kumar
  • 2. BACKGROUND • What is Routing?  Routing is the process of selecting paths in a network to send data packets.  It fully affects the throughput, reliability, and congestion of the network. • What is an ideal routing algorithm?  An algorithm which can deliver a packet from source to its destination with min. amount of delay.  It must be adaptive and intelligent to make decisions according to circumstances.
  • 3. BACKGROUND… • Routing algorithms  OSPF, RIP, BGP are some routing algorithms in use.  Not sufficient to tackle the complexity of networks.  Not adaptive, not intelligent and fault intolerant.
  • 4. INTRODUCTION • Ant is a common insect found in your home. • Its foraging behavior  Discovers shortest path to a food source.  Shares the info to other ants by stigmergy.  Stigmergy is a form of indirect communication used by ant for problem solving activity.  It drops pheromone through the way it goes. It follows the backtrack path with maximum pheromones. That path is actually the shortest path.
  • 5. INTRODUCTION… • Ant Colony Optimization [ACO] – A family of optimization algorithms based on real ant behavior. • AntNet Routing Algorithm  A routing algorithm based on ACO  A group of artificial ants (agents) create the shortest path between a pair of nodes.  They update the routing tables.  Data packets are directed towards destination using the updated routing table.
  • 6. DATA STRUCTURE MAINTAINED AT EACH NODE 1. Routing table [Tk] –  It contains the information specifying which is the next node should be taken in order to reach a destination.  Row represents all adjacent nodes to current node.  Column represents all possible destinations in the network.  Table entry is represented by Pnd , Where Pnd = goodness of choosing n as next node in order to reach destination d OR Pheromone concentration along the link from current node to next node n for destination d
  • 7. DATA STRUCTURE MAINTAINED AT EACH NODE 2. Local traffic statistics • It follows the traffic fluctuations as seen by current node • Stored as an array where each entry contains,  µd=estimated mean  σ2=estimated variance  Wd=moving observation window for a destination node d.
  • 8. ANTNET ROUTING ALGORITHM • The operation involves two types of agents-  Forward agents [Fs->d] who gather information about the state of network.  Backward agents [Bd->s] who use the collected information from Fs->d to update the routing tables of routers on their path.
  • 9. ANTNET ROUTING ALGORITHM • Fs->d is launched towards destination d to discover a shortest and least-cost path at regular time intervals. • Fs->d maintain a stack which stores –  Identifier of every visited node i  Time elapsed in arriving at node i from originating node At any node i, Fs->d selects the next adjacent node j by using the probability value,
  • 10. ANTNET ROUTING ALGORITHM • If Fs->d reaches an already visited node(cycle) then the information of this node is popped from the stack. • If cycle is greater than half the Fs->d lifetime then the Fs->d is destroyed. • When Fs->d reaches the destination node d then a backward agent Bd->s is created. • Fs->d transfers its stack information to Bd->s and dies. • Bd->s starts from d towards s following the same path as Fs->d by popping the stack at each node. • As Bd->s reaches a node ,it updates both the data structure of the node.
  • 11. UPDATING LOCAL TRAFFIC STATISTICS • The estimated mean and variance are updated as follows-  id   id   ( o i  d   id )  id   id   (( o i  d   id )   id ) 2 2 2 2 Where, Oi->d is the observed ant’s trip time from node i to destination d η weighs the number of most recent samples that will really affect average
  • 12. UPDATING ROUTING TABLE • If Bd->s arrives at a node i from a node f ,then the entry in the routing table is updated by the formula- Pifd  Pifd  r (1  Pifd ) Where r is reinforcement value depending on tables of node i, Ti and Mi • Simultaneously, the pheromone value for nodes other than f is decreased so that total sum of probability still comes 1. Pind  Pind  rPind , n  f • As soon as Bd->s finishes, the data packet can be sent into the network according to updates routing tables..
  • 13. LIMITATIONS • Stagnation is the major problem in antnet algorithm. If a link z keeps good condition for a long time, then its probability value will be high thus leading to more and more packets to be sent via link z. It reduces the probability of other links. • Stagnation is very critical problem because-  Link z may lose its optimality.  If network gets failed, then link z may become unavailable.  Other long paths may become optimal which otherwise should not.
  • 14. OPTIMIZATION Optimization operation is performed on Routing table - • The column wise values in the table are picked up and a sorting algorithm is executed on these values. • The sorted values ranging from higher to lower are stored in a temporary array. • The difference d, amongst the adjacent values is calculated and is compared to some threshold value say pm. • If the difference d is less than pm then those values are selected and comparison amongst the adjacent values is continued until difference is greater than pm. • Otherwise at the very first occurrence of difference greater than pm , the comparison is stopped and the corresponding values in the array are selected. • The interfaces corresponding to these values are stored in a new routing table which will have the same structure as the original one, but obviously, the new table will have less number of rows.
  • 16. WORKING… Destination nodes E G F A A .25 .39 .8 .34 Next nodes C .45 .32 0 .34 D .17 .11 .1 .20 F .13 .28 .1 .12 Ist column Assumption: pm =0.1 & Node B Routing table shown .45 .25 .17 .13 {.45} is selected
  • 17. WORKING Destination nodes E G F A A .25 .39 .8 .34 Next nodes C .45 .32 0 .34 D .17 .11 .1 .20 F .13 .28 .1 .12 IInd column .39 .32 .28 .11 {.39,.32,.28} is selected
  • 18. WORKING Destination nodes E G F A A .25 .39 .8 .34 Next nodes C .45 .32 0 .34 D .17 .11 .1 .20 F .13 .28 .1 .12 IIIrd column .8 .1 .1 0 {.8} is selected
  • 19. WORKING Destination nodes E G F A A .25 .39 .8 .34 Next nodes C .45 .32 0 .34 D .17 .11 .1 .20 F .13 .28 .1 .12 IVth column .34 .34 .20 0.12 {.34,.34} is selected
  • 20. WORKING E G F A Next nodes A .39 .8 .34 C .45 .32 .34 F .28 Result- Thus, more than one optimal paths if exist are identified.
  • 21. CONCLUSIONS • We find more than one optimal outgoing path. • It can explore new and better paths even if network topologies change frequently. • The problem of stagnation is resolved. • The throughput of network is improved.
  • 22. REFERENCES [1] Shuchita Upadhyaya and Richa Setiya , “Identifying multiple optimal paths in Antnet Routing Algorithm with negligible overhead,” IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.2, February 2009 [2] F. Tekiner, F. Z. Ghassemlooy and S. Al-khayatt, “The Antnet Routing Algorithm – A Modified Version” [3] soe.northumbria.ac.uk Thanks …. Any Questions?