SlideShare a Scribd company logo
1 of 12
Download to read offline
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 156
An Ant Algorithm for Solving QoS Multicast Routing Problem
A. Younes a_y_hamed@yahoo.com
Computer Science Department,
Faculty of Science, Sohag University,
Sohag, Egypt
Abstract
Many applications require send information from a source to multiple destinations through a
communication network. To support these applications, it is necessary to determine a multicast
tree of minimal cost to connect the source node to the destination nodes subject to delay
constraints. Based on the Ant System algorithm, we present an ant algorithm to find the multicast
tree that minimizes the total cost. In the proposed algorithm, the k shortest paths from the source
node to the destination nodes are used for genotype representation. By comparing the results
The expermintal results show that the algorithm can find optimal solution quickly and has a good
scalability.
Keywords: Multimedia Communication; Multicast Routing; Multicast Tree; Ant Colony
Algorithms; Bandwidth, Delay and Cost.
1. INTRODUCTION
The QoS multicast routing (QMR) problem concerns the search of optimal routing trees in the
distributed network, where messages or information are sent from the source node to all
destination nodes, while meeting all QoS requirements. This problem is NP completes [1]. Over
the past decades, many unconstrained or simple constrained multicast routing algorithms have
been developed. Typical approaches include (1) applying Dijkstra algorithm to find the shortest
path, (2) seeking the minimum network cost using Steiner tree routing algorithm, and (3) finding
multicast trees that the paths between source node and the destination nodes are connected and
their cost is minimized. A state of the art review and analysis can be found, see [1]- [3].
There are many studies that apply genetic algorithms (GA) and ant algorithms to solve the QMR
problems (with different types of QoS constraints) are increasing. In [4] ā€“ [7], a heuristic GA is
used to solve the QMR problems. The algorithm acquires the solution by representing a multicast
tree as a chromosome so as to save the coding spaces and reduce the decoding operations
(compared with the binary coding mechanism). However, these approaches cannot be expanded.
If one or more nodes are added into the network, the system needs to scan all nodes again to
acquire the optimum solution. That is, previous network information cannot be transferred to the
expanded network.
A number of efficient heuristic algorithms given in [7] ā€“ [9], consider a number of rigid QoS
criteria, such as bandwidth, delay, delay constraint, and packet loss rate. Chu [10], presented a
model that treats these constraints separately, add more constraints such as delay jitter and
packet loss rate, and take network expansion into account.
In [11], an efficient algorithm based on ant system is used for generating a low-cost multicast tree
subject to delay constraints. The algorithm starts with a backup-paths-set from the source node to
each destination nodes using Dijkstra Kth shortest path algorithm. Then transform the formed
procedure of the multicast tree to the Graph, and use AS to the QoS problems: when a ant move
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 157
from the node i to the node j depend on the corresponding probabilities function, and update the
Pheromone on Graph when every iteration finished.
In the last years, the genetic algorithms (GA) are gaining an increasing interest for solving
complex problems in the networking field, as network design [13] and unicast routing [14]. GA for
multicast routing without constraints was presented by [15] and [16], while authors in [17] and [18]
addressed the constrained problem taking into account the QoS level provided for real-time
applications in single multicast sessions. Luca and Lugi [19], presented an approach for group
multicast routing by genetic algorithm. Chen [12], proposed a new multicast routing optimization
algorithm based on Genetic Algorithms, which find the low-cost multicasting tree with bandwidth
and delay constraints.
In this paper, we propose an efficient algorithm based on ant system for generating a low-cost
multicast tree subject to delay constraints. The proposed algorithm uses a genetic algorithm given
in [4], to find the kth
shortest paths from the source node to each destination nodes. Then we use
the Ant System to solve the QoS problems: when an Ant moves through a shortest path it
depends on the corresponding probabilities function and update Pheromone on that path after
finishing each iteration. The experimental results show the comparison between the proposed ant
algorithm and the genetic algorithm, [12]. Simulation results show our algorithm has features of
well performance of cost, fast convergence and stable delay.
The rest of the paper is organized as follows: Section 2 presents the problem description and
formulation. Sections 3 describe our Ant-System based QOS multicasting algorithm followed by
time complexity of the algorithm. Simulation results and comparison with other reported heuristics
are presented in Section4. Section 5 concludes the paper.
2. PROBLEM DESCRIPTION AND FORMULATION
A network is usually represented as a weighted directed graph G=(N,E), where N denotes the set
of nodes and E denotes the set of communication links connecting the nodes. |N| and |E| denote
the number of nodes and links in the network respectively. We consider the multicast routing
problem with bandwidth and delay constraints from one source node to multi-destination nodes.
Let NuuunX m āˆˆ= }......,,,{ 210 be a set of from source to destination nodes of the multicast
tree. Where n0 is source node, and U= {u1 , u2 ā€¦ um } denotes a set of destination nodes.
Multicast tree T= (NT , ET ), where NT āŠ†N, ET āŠ†E, there exists the path PT (n0 , d) from source
node n0 to each destination node dāˆˆļ€ U in T. e(i,j) is a link from node i N to node j N. Three
non-negative real value functions are associated with each link e(e E): cost C(e), delay D(e),
and available bandwidth B(e). The link cost function, C(e), may be either monetary cost or any
measure of the resource utilization, which must be optimized. The link delay, D(e), is considered
to be the sum of switching, queuing, transmission, and propagation delays. The link
bandwidth, B(e), is the residual bandwidth of the physical or logical link. The link delay and
bandwidth functions, D(e) and B(e), define the criteria that must be constrained.
The cost of the path PT is defined as the sum of the cost of all links in that path and can be given
by
)1()()( āˆ‘āˆˆ
=
TPe
T eCPC
The total cost of the tree T is defined as the sum of the cost of all links in that tree and can be
given by
)2()()( āˆ‘āˆˆ
=
TEe
eCTC
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 158
The total delay of the path PT(n0,d) is simply the sum of the delay of all links along PT(n0,d):
)3(),()(
),( 0
āˆ‘āˆˆ
āˆˆ=
dnPe
T
T
UdeDPD
The delay of multicast tree T is the maximum value of delay in the path from source node n0 to
each destination node dāˆˆU.
)4()),(max()(
),( 0
āˆ‘āˆˆ
āˆˆ=
dnPe
T
T
UdPDTD
The bandwidth of the path PT(n0,d) is defined as the minimum available residual bandwidth at any
link along the path:
)5()),(min()( TT PeeBPB āˆˆ=
The bandwidth of the tree T is defined as the minimum available residual bandwidth at any link
along the tree:
)6()),(min()( TEeeBTB āˆˆ=
Assume the minimum bandwidth constraint of multicast tree is B, and the maximum delay
constraint id is D, given a multicast demand R, then, the problem of bandwidth-delay constrained
multicast routing is to find a multicast tree T, satisfying:
1. Bandwidth constraint: B (T) = B.
2. Delay constraint: D (T) = D.
Suppose S(R) is the set, S(R) satisfies the conditions
above, then, the multicast tree T which we find is:
C (T) = min (C (Ts), Ts S(R))
3. THE PROPOSED ANT ALGORITHM
Assuming n0 is source node, and U= {u1, u2 ā€¦ um} denotes a set of destination nodes, the
smallest bandwidth constraint, and by the algorithm for finding the k shortest paths in reference
[4], we can find the candidate route set from source node to each destination node i (i.e. Pi ={p1,
p2,ā€¦ā€¦ā€¦.,pn}). The proposed ant algorithm can be performed as the following steps:
Algorithm: Ant algorithm for multicast routing
1. Initialize network nodes.
a. Define the source node s and the destination nodes U= {u1, u2 ā€¦ um}
b. Set NC =0 (NC is a loop counter.), and put m ants to s
2. For each destination node ui āˆˆ U,
3. Let Pi be the set of the shortest paths for the destination node ui ( by using [4]).
4. Assign an initial value ;0=kĻ„ to the pheromone intensity of every pk, k=1,2,ā€¦n,
5. Begin the first tour;
6. Let m ants move from s to ui on Pi equally (the ants number in each path pk is equal).
7. Compute the pheromone amount left by x ants at pk ( kĻ„āˆ† ) by using the following equation:
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 159
)7(;* x
C
Q
k
total
k =āˆ†Ļ„
Where Ck is the cost of the path pk and is computed by Eq. (1).
8. Update the local pheromone ;kĻ„
)(;)( 81 total
kkk Ļ„āˆ†+Ļ„Ļāˆ’=Ļ„
Where Ļ (0, 1] is the evaporation rate.
9. Begin a new tour
10. Set NC=NC+1;
11. Compute the corresponding probabilities function fk for each pk as follows:
ļ£“
ļ£“
ļ£³
ļ£“ļ£“
ļ£²
ļ£±
āˆˆ
= āˆ‘āˆˆ
otherwise
nk
f
nj
jj
kk
k
0
)9(;
][*][
][*][
Ī²Ī±
Ī²Ī±
Ī·Ļ„
Ī·Ļ„
Where
k
k
d
1
=Ī· ; dk is computed by using Eq. (3), and Ī±, Ī² denote the information accumulated
during the movement of ants and the different effects of factors in the path selection.
12. Compute kĻ„āˆ† by using Eq. (7)
13. Update the global pheromone kĻ„ by using Eq. (8)
14. Repeat from step 9 until NCmax
15. Compare between the values of kĻ„ to get the best path for the destination ui (pui).
16. End For
17. Collect the all best path (pui) to get the multicast tree.
4. EXPERIMENTAL RESULTS
In this section, we show the effectiveness of the above algorithm by applying it on two examples
and compare the results which obtained by the proposed ant algorithm with the results of which
obtained by [12].
The parameters setting in the proposed algorithm as follows: ants number m = 30, 5.0=Ļ ,
Ī±=Ī²=1, and NCmax=20 (iteration numbers).
4.1 First Example
We consider a network with 8 nodes taken from [12]. Each link represented by a triple-group (B,
D, C), given its value randomly as shown in Fig. 1.
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 160
FIGURE 1: Network Topology Structure
Assuming the source node n0 is node 1, destination node set U= {4, 5, 7, 8} as shown in the
above figure. By the algorithm for finding the k shortest paths in reference [4] with smallest
bandwidth constraint B=10, we can find the candidate route set from source node 1 to each
destination node, as shown in Table 1.
Destination node The shortest paths
4
1 2 8 7 6 4
1 3 4
1 5 6 4
1 2 4
1 5 6 7 8 2 4
5
1 5
1 2 4 6 5
1 2 8 7 6 5
1 3 4 6 5
7
1 3 4 2 8 7
1 3 4 6 7
1 2 4 6 7
1 2 8 7
1 5 6 7
1 5 6 4 2 8 7
8
1 5 6 4 2 8
1 3 4 2 8
1 3 4 6 7 8
1 5 6 7 8
1 2 8
1 2 4 6 7 8
TABLE 1: The candidate route set from source node 1 to each destination node
We find the multicast tree as shown in Fig.2 with cost=41.
1
6
3
4
7
2
8
(12,2,6
(13,3,4)
(8,3,6)
(10,3,6)
(10,2,4)
(12,2,6)
(15,2,8)
(13,2,6)
(15,3,6)
(9,3,4)
(10,1,5)
(12,3,4)
(9,1,3)
5
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 161
FIGURE 2: The Multicast Tree obtained by the proposed Ant Algorithm
Figure 3(a, b, c, and d)) shows the number of ants on each path of the destination 4, 5, 7, and 8
respectively.
The following figures show the best path which represents the candidate route from the source
node 1 to the destination nodes. The horizontal axis represents the tour number and the vertical
axis represents the number of ants.
FIGURE 3(a): The iteration number and the number of Ants for the destination 4.
1
6
3
4
7
2
8
5
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 162
FIGURE 3(b): The iteration number and the number of Ants for the destination 5.
The best path for the destination node (7)
0
2
4
6
8
10
12
14
16
18
1 2 3 4 5 6 7 8 9 1011121314151617181920
Antsnumber
path 1-3-4-2-8-7
path 1-3-4-6-7
path 1-2-4-6-7
path 1-2-8-7
path 1-5-6-7
path 1-5-6-4-2-8-7
Iterations
FIGURE 3(c): The iteration number and the number of Ants for the destination 7.
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 163
The best path for the destination node (8)
0
5
10
15
20
25
30
35
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Antsnumber
path 1-5-6-4-2-8
path 1-3-4-2-8
path 1-3-4-6-7-8
path 1-5-6-7-8
path 1-2-8
path 1-2-4-6-7-8
Iterations
FIGURE 3(d): The iteration number and the number of Ants for the destination 8.
From the above figures, if we consider the figure 3(d) as an example we note that: the number of
ants in the path 1-2-8 increases from 11 to 30 during iteration 1 to iteration 20. But the number of
ants on the other paths is decreasing to 0. This means that, the path 1-2-8 is the best candidate
route from the source node 1 to the destination node 8.
Figure 4 represents the multicast tree which obtained by the genetic algorithm, [12].
FIGURE 4: The Multicast Tree obtained by [12].
By comparing the Multicast tree obtained by the proposed Ant algorithm, given in Fig. 2 and the
other one which obtained by using genetic algorithm [12], given in Fig. 4, we noted the following:
1. The bandwidth B of the path 1->3->4->8 in the tree obtained by [12] equal to 9 according
to Eq. 5 which is not 10 as it is imposed.
2. The path 1->2 isn't true, because the node 2 does not represent the destination node.
Hence, the multicast tree obtained by [12] is not correct, based on the parameters imposed.
1
6
3
4
7
2
8
5
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 164
4.2 Second Example
We consider a network with 8 nodes taken from [10]. Each link represented by a triple-group (D,
B, C), given its value randomly as shown in Fig.5 and compare the results with [10].
FIGURE 5: Network Topology Structure
Assuming the source node n0 is node 1, destination node set U= {2, 4, 5, 7} as shown in the
above figure. By the algorithm for finding the k shortest paths in reference [4] with smallest
bandwidth constraint B=70, we can find the candidate route set from source node 1 to each
destination node, as shown in Table 2.
1
6
3
4
7
2
8
(8,110,21)
(18,100,9)
(10,75,8)
(7,90,6)5
(9,60,2)
(3,80,3)
(3,90,3)
(4,13,10)
(9,120,1)
(6,70,4)
(9,40,7)
(12,120,4)
(12,80,12)
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 165
Destination node The shortest paths
2
1 3 4 2
1 5 3 2
1 5 3 4 2
1 3 5 6 4 2
1 3 2
1 5 6 7 8 2
1 5 6 4 2
1 5 6 4 3 2
1 3 5 6 7 8 2
4
1 5 3 4
1 5 3 2 4
1 3 5 6 4
1 5 6 4
1 3 2 4
1 3 4
5
1 5
1 3 4 6 5
1 3 5
1 3 2 4 6 5
7
1 3 5 6 7
1 3 4 6 7
1 5 6 7
1 3 4 2 8 7
1 3 2 8 7
1 5 3 4 6 7
TABLE 2: The candidate route set from source node 1 to each destination node
We find the multicast tree as shown in Fig.6 with cost=63.
FIGURE 6: The Multicast Tree obtained by the proposed Ant Algorithm
1
6
3
4
7
25
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 166
The multicast tree obtained by [10] is shown in Fig. 7.
FIGURE 7: The Multicast Tree obtained by [10]
By comparing the previous results we observe that the multicast tree obtained by the proposed
Ant algorithm is quite similar to the multicast tree obtained by [10].This means that the proposed
Ant algorithm is working properly.
5. CONCLUSION
This paper presented an Ant algorithm for solving QoS multicast routing problem based on
bandwidth and delay constraints. The proposed algorithm uses the k
th
shortest paths algorithm
[4], to construct the route set. Then, we have a set of paths for each destination nodes; the Ants
moving through the paths depending on the corresponding probabilities function and update the
Pheromone on the paths after finishing each iteration. Simulation results show that the proposed
algorithm has features of well performance of cost, fast convergence and stable delay. The
algorithm can guarantee the requirement of multimedia group communication for quality of
service.
6. REFERENCES
1. L. H. Sahasrabuddhe, and B. Mukherjee, ā€œMulticast Routing Algorithms and Protocols: A
Tutorialā€, IEEE Network, pp. 90-102, January, February 2000.
2. B. Wang, and J. C. Hou, ā€œMulticast Routing and Its QoS Extension: Problems, Algorithms,
and Protocols,ā€ IEEE Network, pp. 22-36, January/February 2000.
3. H. F. Salama, D. S. Reeves, and Y. Viniotis, ā€œEvaluation of Multicast Routing Algorithms for
Real-Time Communication on High-Speed Networks,ā€ IEEE Journal on Selected Areas in
Communications, Vol. 15(3): 332-345, 1997.
4. A. Younes, ā€œA Genetic Algorithm for Finding the K Shortest Paths in a Networkā€, Egyptian
Informatics Journal, Vol.10(2), 2010.
5. Z. Wang, and B. Shi, ā€œSolution to QoS Multicast Routing Problem Based on Heuristic Genetic
Algorithm,ā€ Journal of Computer, 2001, Vol. 24(1): 55-61, 2001.
6. X. Zhou, C. Chen, and G. Zhu, ā€œA Genetic Algorithm for Multicasting Routing Problem,ā€
International Conference on Communication Technology, Vol. 2, pp. 1248-1253, 2000.
7. Z. Wang, and J. Crowcroft, ā€œQuality of Service for Supporting Multimedia Applications,ā€ IEEE
Journal on Selected Areas in Communications, Vol. 14(7): 1228-1234, 1996.
1
6
3
4
7
25
A. Younes
International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 167
8. L. Guo and I. Matta, ā€œQDMR: An Efficient QoS Dependent Multicast Routing Algorithm,ā€
Proceedings of the Fifth IEEE Real-Time Technology and Applications Symposium, pp. 213-
222, 1999.
9. W. Wu, ā€œMulticast routing Algorithm Based on Multiple Qualities of Services,ā€ Applied
Electronic Technologiesā€, Vol. 266(8), 2000.
10. Chao-Hsien Chu, ā€œA Heuristic Ant Algorithm for Solving QoS Multicast Routing Problemā€,
Proceedings of the Evolutionary Computation Vol. 2, 2002.
11. Lin Huang, Haishan Han and Jian Hou, ā€œMulticast Routing Based on the Ant Systemā€œ,Applied
Mathematical Sciences, Vol. 1(57): 2827ā€“2838, 2007.
12. Hua Chen, Baolin Sun, ā€œ Multicast Routing Optimization Algorithm with Bandwidth and
Delay Constraints Based on GAā€, Journal of Communication and Computer, Vol. 2(5): 2005.
13. L. Atzori and A. Raccis, ā€œNetwork Capacity Assignment for Multicast Services Using Genetic
Algorithmsā€, IEEE Communications Letters, vol. 8(6): 403-405, June 2004.
14. C.W. Ahn and R.S. Ramakrishna, ā€œA genetic algorithm for shortest path routing problem and
the sizing of populationā€, IEEE Transaction on evolutionary computation, vol. 6(6): Dec. 2002.
15. R.H. Hwang, W.Y. Do, and S.C. Yang, ā€œMulticast Routing Based on Genetic Algorithmsā€,
Journal of information science and engineering, vo1.16, pp.885-901, 2000.
16. R. Bhattacharya, P. Venkateswaran, S.K. Sanyal, R. Nandi, , ā€œGenetic algorithm based
efficient outing scheme for multicast networksā€, IEEE International Conference on Personal
Wireless Communications (ICPWC 2005), pp. 500 - 504, Jan 2005
17. L. Chen, Z. Yang, Z. Xu, ā€œA degree-delay-constrained genetic algorithm for multicast routing
treeā€, The Fourth International Conference on Computer and Information Technology (CIT),
pp. 1033 -1038, September 2004.
18. M. Hamdan and M.E. El-Hawary, ā€œMulticast routing with delay and delay variation constraints
using genetic algorithmā€, Canadian Conference on Electrical and Computer Engineering, vol.
4, pp. 2363 - 2366, May 2004.
19. Luca Sanna Randaccio and Luigi Atzori, ā€œA Genetic Algorithm Based Approach for Group
Multicast Routingā€, Journal of Networks, Vol. 1(4): , 2006.

More Related Content

What's hot

On Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector PrecodingOn Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector PrecodingTSC University of Mondragon
Ā 
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityImage encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityeSAT Journals
Ā 
Adaptive blind multiuser detection under impulsive noise using principal comp...
Adaptive blind multiuser detection under impulsive noise using principal comp...Adaptive blind multiuser detection under impulsive noise using principal comp...
Adaptive blind multiuser detection under impulsive noise using principal comp...csandit
Ā 
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...csandit
Ā 
Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Pvrtechnologies Nellore
Ā 
Art%3 a10.1155%2fs1110865704401036
Art%3 a10.1155%2fs1110865704401036Art%3 a10.1155%2fs1110865704401036
Art%3 a10.1155%2fs1110865704401036SANDRA BALSECA
Ā 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmCSCJournals
Ā 
On the performance of code word diversity based quasi orthogonal space time b...
On the performance of code word diversity based quasi orthogonal space time b...On the performance of code word diversity based quasi orthogonal space time b...
On the performance of code word diversity based quasi orthogonal space time b...IJECEIAES
Ā 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precodingadeelrazi
Ā 
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"Thesis : "IBBET : In Band Bandwidth Estimation for LAN"
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"Vishalkumarec
Ā 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...acijjournal
Ā 
2012 cvpr gtw
2012 cvpr gtw2012 cvpr gtw
2012 cvpr gtwChau Phuong
Ā 
Comparison and analysis of combining techniques for spatial multiplexing spac...
Comparison and analysis of combining techniques for spatial multiplexing spac...Comparison and analysis of combining techniques for spatial multiplexing spac...
Comparison and analysis of combining techniques for spatial multiplexing spac...IAEME Publication
Ā 
Haqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetsHaqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetscsandit
Ā 

What's hot (16)

On Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector PrecodingOn Complex Enumeration for Multiuser MIMO Vector Precoding
On Complex Enumeration for Multiuser MIMO Vector Precoding
Ā 
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrityImage encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrity
Ā 
9517cnc05
9517cnc059517cnc05
9517cnc05
Ā 
Adaptive blind multiuser detection under impulsive noise using principal comp...
Adaptive blind multiuser detection under impulsive noise using principal comp...Adaptive blind multiuser detection under impulsive noise using principal comp...
Adaptive blind multiuser detection under impulsive noise using principal comp...
Ā 
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
Ā 
Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...
Ā 
Art%3 a10.1155%2fs1110865704401036
Art%3 a10.1155%2fs1110865704401036Art%3 a10.1155%2fs1110865704401036
Art%3 a10.1155%2fs1110865704401036
Ā 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Ā 
On the performance of code word diversity based quasi orthogonal space time b...
On the performance of code word diversity based quasi orthogonal space time b...On the performance of code word diversity based quasi orthogonal space time b...
On the performance of code word diversity based quasi orthogonal space time b...
Ā 
Multiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation PrecodingMultiuser MIMO Vector Perturbation Precoding
Multiuser MIMO Vector Perturbation Precoding
Ā 
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"Thesis : "IBBET : In Band Bandwidth Estimation for LAN"
Thesis : "IBBET : In Band Bandwidth Estimation for LAN"
Ā 
Density based clustering
Density based clusteringDensity based clustering
Density based clustering
Ā 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Ā 
2012 cvpr gtw
2012 cvpr gtw2012 cvpr gtw
2012 cvpr gtw
Ā 
Comparison and analysis of combining techniques for spatial multiplexing spac...
Comparison and analysis of combining techniques for spatial multiplexing spac...Comparison and analysis of combining techniques for spatial multiplexing spac...
Comparison and analysis of combining techniques for spatial multiplexing spac...
Ā 
Haqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manetsHaqr the hierarchical ant based qos aware on demand routing for manets
Haqr the hierarchical ant based qos aware on demand routing for manets
Ā 

Viewers also liked

UIU Network System(Cn project)
UIU Network System(Cn project)UIU Network System(Cn project)
UIU Network System(Cn project)Shahrin Ahammad
Ā 
copy-of-2016md_prospectus_official
copy-of-2016md_prospectus_officialcopy-of-2016md_prospectus_official
copy-of-2016md_prospectus_officialMitchell DeJong
Ā 
GERGES RESUME 2016
GERGES RESUME 2016GERGES RESUME 2016
GERGES RESUME 2016Nick Gerges
Ā 
Distribution and marketing of movie trailers
Distribution and marketing of movie trailersDistribution and marketing of movie trailers
Distribution and marketing of movie trailersWill Beard
Ā 
ELSS Schemes -Mutual_Funds
ELSS Schemes -Mutual_FundsELSS Schemes -Mutual_Funds
ELSS Schemes -Mutual_FundsAditi Jain
Ā 
AASD capability Brochure
AASD capability BrochureAASD capability Brochure
AASD capability BrochureChris Cole
Ā 
BĆ i tįŗ­p dĆ nh cho kÄ© năng đį»c hiį»ƒu
BĆ i tįŗ­p dĆ nh cho kÄ© năng đį»c  hiį»ƒuBĆ i tįŗ­p dĆ nh cho kÄ© năng đį»c  hiį»ƒu
BĆ i tįŗ­p dĆ nh cho kÄ© năng đį»c hiį»ƒuKim Thįŗ£o
Ā 
Irmgard Keun
Irmgard Keun Irmgard Keun
Irmgard Keun L2550
Ā 
Apostila c. edifĆ­cios ufjf 2 2011
Apostila c. edifĆ­cios ufjf 2 2011Apostila c. edifĆ­cios ufjf 2 2011
Apostila c. edifĆ­cios ufjf 2 2011John David Costa
Ā 
EnergĆ­a Especifica y Cantidad de Movimiento
EnergĆ­a Especifica y Cantidad de MovimientoEnergĆ­a Especifica y Cantidad de Movimiento
EnergĆ­a Especifica y Cantidad de Movimientoanakp
Ā 
CV of ABDULLAH AL MAMUN-F10.DOC
CV of ABDULLAH AL MAMUN-F10.DOCCV of ABDULLAH AL MAMUN-F10.DOC
CV of ABDULLAH AL MAMUN-F10.DOCAbdullah Al Mamun
Ā 
EEP306: Frequency modulation
EEP306: Frequency modulationEEP306: Frequency modulation
EEP306: Frequency modulationUmang Gupta
Ā 
Hablemos de prezi
Hablemos de preziHablemos de prezi
Hablemos de prezilluvenimontero
Ā 

Viewers also liked (13)

UIU Network System(Cn project)
UIU Network System(Cn project)UIU Network System(Cn project)
UIU Network System(Cn project)
Ā 
copy-of-2016md_prospectus_official
copy-of-2016md_prospectus_officialcopy-of-2016md_prospectus_official
copy-of-2016md_prospectus_official
Ā 
GERGES RESUME 2016
GERGES RESUME 2016GERGES RESUME 2016
GERGES RESUME 2016
Ā 
Distribution and marketing of movie trailers
Distribution and marketing of movie trailersDistribution and marketing of movie trailers
Distribution and marketing of movie trailers
Ā 
ELSS Schemes -Mutual_Funds
ELSS Schemes -Mutual_FundsELSS Schemes -Mutual_Funds
ELSS Schemes -Mutual_Funds
Ā 
AASD capability Brochure
AASD capability BrochureAASD capability Brochure
AASD capability Brochure
Ā 
BĆ i tįŗ­p dĆ nh cho kÄ© năng đį»c hiį»ƒu
BĆ i tįŗ­p dĆ nh cho kÄ© năng đį»c  hiį»ƒuBĆ i tįŗ­p dĆ nh cho kÄ© năng đį»c  hiį»ƒu
BĆ i tįŗ­p dĆ nh cho kÄ© năng đį»c hiį»ƒu
Ā 
Irmgard Keun
Irmgard Keun Irmgard Keun
Irmgard Keun
Ā 
Apostila c. edifĆ­cios ufjf 2 2011
Apostila c. edifĆ­cios ufjf 2 2011Apostila c. edifĆ­cios ufjf 2 2011
Apostila c. edifĆ­cios ufjf 2 2011
Ā 
EnergĆ­a Especifica y Cantidad de Movimiento
EnergĆ­a Especifica y Cantidad de MovimientoEnergĆ­a Especifica y Cantidad de Movimiento
EnergĆ­a Especifica y Cantidad de Movimiento
Ā 
CV of ABDULLAH AL MAMUN-F10.DOC
CV of ABDULLAH AL MAMUN-F10.DOCCV of ABDULLAH AL MAMUN-F10.DOC
CV of ABDULLAH AL MAMUN-F10.DOC
Ā 
EEP306: Frequency modulation
EEP306: Frequency modulationEEP306: Frequency modulation
EEP306: Frequency modulation
Ā 
Hablemos de prezi
Hablemos de preziHablemos de prezi
Hablemos de prezi
Ā 

Similar to An Ant Algorithm for Solving QoS Multicast Routing Problem

International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
Ā 
A genetic algorithm to solve the
A genetic algorithm to solve theA genetic algorithm to solve the
A genetic algorithm to solve theIJCNCJournal
Ā 
A NOVEL ANT COLONY ALGORITHM FOR MULTICAST ROUTING IN WIRELESS AD HOC NETWORKS
A NOVEL ANT COLONY ALGORITHM FOR MULTICAST ROUTING IN WIRELESS AD HOC NETWORKS A NOVEL ANT COLONY ALGORITHM FOR MULTICAST ROUTING IN WIRELESS AD HOC NETWORKS
A NOVEL ANT COLONY ALGORITHM FOR MULTICAST ROUTING IN WIRELESS AD HOC NETWORKS cscpconf
Ā 
An Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayAn Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayCSCJournals
Ā 
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...csandit
Ā 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...cscpconf
Ā 
My Final Year B.Tech Research Project
My Final Year B.Tech Research ProjectMy Final Year B.Tech Research Project
My Final Year B.Tech Research ProjectEeshan Srivastava
Ā 
A comparative study on multicast routing using dijkstraā€™s, prims and ant colo...
A comparative study on multicast routing using dijkstraā€™s, prims and ant colo...A comparative study on multicast routing using dijkstraā€™s, prims and ant colo...
A comparative study on multicast routing using dijkstraā€™s, prims and ant colo...IAEME Publication
Ā 
A comparative study on multicast routing using dijkstraā€™s
A comparative study on multicast routing using dijkstraā€™sA comparative study on multicast routing using dijkstraā€™s
A comparative study on multicast routing using dijkstraā€™siaemedu
Ā 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkEditor Jacotech
Ā 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd Iaetsd
Ā 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Krishna Nanda
Ā 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
Ā 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
Ā 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
Ā 
A comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionA comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionIJCNCJournal
Ā 
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...IJNSA Journal
Ā 
1687 1499-2008-601346[1]
1687 1499-2008-601346[1]1687 1499-2008-601346[1]
1687 1499-2008-601346[1]TARKI AOMAR
Ā 

Similar to An Ant Algorithm for Solving QoS Multicast Routing Problem (20)

International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
Ā 
A genetic algorithm to solve the
A genetic algorithm to solve theA genetic algorithm to solve the
A genetic algorithm to solve the
Ā 
A NOVEL ANT COLONY ALGORITHM FOR MULTICAST ROUTING IN WIRELESS AD HOC NETWORKS
A NOVEL ANT COLONY ALGORITHM FOR MULTICAST ROUTING IN WIRELESS AD HOC NETWORKS A NOVEL ANT COLONY ALGORITHM FOR MULTICAST ROUTING IN WIRELESS AD HOC NETWORKS
A NOVEL ANT COLONY ALGORITHM FOR MULTICAST ROUTING IN WIRELESS AD HOC NETWORKS
Ā 
An Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet DelayAn Algorithm for Computing Average Packet Delay
An Algorithm for Computing Average Packet Delay
Ā 
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...Amtr  the ant based qos aware multipath temporally ordered routing algorithm ...
Amtr the ant based qos aware multipath temporally ordered routing algorithm ...
Ā 
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
AMTR: THE ANT BASED QOS AWARE MULTIPATH TEMPORALLY ORDERED ROUTING ALGORITHM ...
Ā 
My Final Year B.Tech Research Project
My Final Year B.Tech Research ProjectMy Final Year B.Tech Research Project
My Final Year B.Tech Research Project
Ā 
A comparative study on multicast routing using dijkstraā€™s, prims and ant colo...
A comparative study on multicast routing using dijkstraā€™s, prims and ant colo...A comparative study on multicast routing using dijkstraā€™s, prims and ant colo...
A comparative study on multicast routing using dijkstraā€™s, prims and ant colo...
Ā 
A comparative study on multicast routing using dijkstraā€™s
A comparative study on multicast routing using dijkstraā€™sA comparative study on multicast routing using dijkstraā€™s
A comparative study on multicast routing using dijkstraā€™s
Ā 
Ijcnc050204
Ijcnc050204Ijcnc050204
Ijcnc050204
Ā 
An efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor networkAn efficient ant optimized multipath routing in wireless sensor network
An efficient ant optimized multipath routing in wireless sensor network
Ā 
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networksIaetsd a novel scheduling algorithms for mimo based wireless networks
Iaetsd a novel scheduling algorithms for mimo based wireless networks
Ā 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1
Ā 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
Ā 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
Ā 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
Ā 
A comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionA comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistribution
Ā 
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Ā 
1687 1499-2008-601346[1]
1687 1499-2008-601346[1]1687 1499-2008-601346[1]
1687 1499-2008-601346[1]
Ā 
EESRDA
EESRDAEESRDA
EESRDA
Ā 

Recently uploaded

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
Ā 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
Ā 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
Ā 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
Ā 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
Ā 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
Ā 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
Ā 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
Ā 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
Ā 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
Ā 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
Ā 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
Ā 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
Ā 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
Ā 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
Ā 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
Ā 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
Ā 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
Ā 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
Ā 
Tį»”NG ƔN Tįŗ¬P THI VƀO Lį»šP 10 MƔN TIįŗ¾NG ANH NĂM Hį»ŒC 2023 - 2024 CƓ ĐƁP ƁN (NGį»® Ƃ...
Tį»”NG ƔN Tįŗ¬P THI VƀO Lį»šP 10 MƔN TIįŗ¾NG ANH NĂM Hį»ŒC 2023 - 2024 CƓ ĐƁP ƁN (NGį»® Ƃ...Tį»”NG ƔN Tįŗ¬P THI VƀO Lį»šP 10 MƔN TIįŗ¾NG ANH NĂM Hį»ŒC 2023 - 2024 CƓ ĐƁP ƁN (NGį»® Ƃ...
Tį»”NG ƔN Tįŗ¬P THI VƀO Lį»šP 10 MƔN TIįŗ¾NG ANH NĂM Hį»ŒC 2023 - 2024 CƓ ĐƁP ƁN (NGį»® Ƃ...Nguyen Thanh Tu Collection
Ā 

Recently uploaded (20)

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
Ā 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
Ā 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
Ā 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
Ā 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
Ā 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
Ā 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
Ā 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Ā 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
Ā 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
Ā 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Ā 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
Ā 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
Ā 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
Ā 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
Ā 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Ā 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Ā 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
Ā 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Ā 
Tį»”NG ƔN Tįŗ¬P THI VƀO Lį»šP 10 MƔN TIįŗ¾NG ANH NĂM Hį»ŒC 2023 - 2024 CƓ ĐƁP ƁN (NGį»® Ƃ...
Tį»”NG ƔN Tįŗ¬P THI VƀO Lį»šP 10 MƔN TIįŗ¾NG ANH NĂM Hį»ŒC 2023 - 2024 CƓ ĐƁP ƁN (NGį»® Ƃ...Tį»”NG ƔN Tįŗ¬P THI VƀO Lį»šP 10 MƔN TIįŗ¾NG ANH NĂM Hį»ŒC 2023 - 2024 CƓ ĐƁP ƁN (NGį»® Ƃ...
Tį»”NG ƔN Tįŗ¬P THI VƀO Lį»šP 10 MƔN TIįŗ¾NG ANH NĂM Hį»ŒC 2023 - 2024 CƓ ĐƁP ƁN (NGį»® Ƃ...
Ā 

An Ant Algorithm for Solving QoS Multicast Routing Problem

  • 1. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 156 An Ant Algorithm for Solving QoS Multicast Routing Problem A. Younes a_y_hamed@yahoo.com Computer Science Department, Faculty of Science, Sohag University, Sohag, Egypt Abstract Many applications require send information from a source to multiple destinations through a communication network. To support these applications, it is necessary to determine a multicast tree of minimal cost to connect the source node to the destination nodes subject to delay constraints. Based on the Ant System algorithm, we present an ant algorithm to find the multicast tree that minimizes the total cost. In the proposed algorithm, the k shortest paths from the source node to the destination nodes are used for genotype representation. By comparing the results The expermintal results show that the algorithm can find optimal solution quickly and has a good scalability. Keywords: Multimedia Communication; Multicast Routing; Multicast Tree; Ant Colony Algorithms; Bandwidth, Delay and Cost. 1. INTRODUCTION The QoS multicast routing (QMR) problem concerns the search of optimal routing trees in the distributed network, where messages or information are sent from the source node to all destination nodes, while meeting all QoS requirements. This problem is NP completes [1]. Over the past decades, many unconstrained or simple constrained multicast routing algorithms have been developed. Typical approaches include (1) applying Dijkstra algorithm to find the shortest path, (2) seeking the minimum network cost using Steiner tree routing algorithm, and (3) finding multicast trees that the paths between source node and the destination nodes are connected and their cost is minimized. A state of the art review and analysis can be found, see [1]- [3]. There are many studies that apply genetic algorithms (GA) and ant algorithms to solve the QMR problems (with different types of QoS constraints) are increasing. In [4] ā€“ [7], a heuristic GA is used to solve the QMR problems. The algorithm acquires the solution by representing a multicast tree as a chromosome so as to save the coding spaces and reduce the decoding operations (compared with the binary coding mechanism). However, these approaches cannot be expanded. If one or more nodes are added into the network, the system needs to scan all nodes again to acquire the optimum solution. That is, previous network information cannot be transferred to the expanded network. A number of efficient heuristic algorithms given in [7] ā€“ [9], consider a number of rigid QoS criteria, such as bandwidth, delay, delay constraint, and packet loss rate. Chu [10], presented a model that treats these constraints separately, add more constraints such as delay jitter and packet loss rate, and take network expansion into account. In [11], an efficient algorithm based on ant system is used for generating a low-cost multicast tree subject to delay constraints. The algorithm starts with a backup-paths-set from the source node to each destination nodes using Dijkstra Kth shortest path algorithm. Then transform the formed procedure of the multicast tree to the Graph, and use AS to the QoS problems: when a ant move
  • 2. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 157 from the node i to the node j depend on the corresponding probabilities function, and update the Pheromone on Graph when every iteration finished. In the last years, the genetic algorithms (GA) are gaining an increasing interest for solving complex problems in the networking field, as network design [13] and unicast routing [14]. GA for multicast routing without constraints was presented by [15] and [16], while authors in [17] and [18] addressed the constrained problem taking into account the QoS level provided for real-time applications in single multicast sessions. Luca and Lugi [19], presented an approach for group multicast routing by genetic algorithm. Chen [12], proposed a new multicast routing optimization algorithm based on Genetic Algorithms, which find the low-cost multicasting tree with bandwidth and delay constraints. In this paper, we propose an efficient algorithm based on ant system for generating a low-cost multicast tree subject to delay constraints. The proposed algorithm uses a genetic algorithm given in [4], to find the kth shortest paths from the source node to each destination nodes. Then we use the Ant System to solve the QoS problems: when an Ant moves through a shortest path it depends on the corresponding probabilities function and update Pheromone on that path after finishing each iteration. The experimental results show the comparison between the proposed ant algorithm and the genetic algorithm, [12]. Simulation results show our algorithm has features of well performance of cost, fast convergence and stable delay. The rest of the paper is organized as follows: Section 2 presents the problem description and formulation. Sections 3 describe our Ant-System based QOS multicasting algorithm followed by time complexity of the algorithm. Simulation results and comparison with other reported heuristics are presented in Section4. Section 5 concludes the paper. 2. PROBLEM DESCRIPTION AND FORMULATION A network is usually represented as a weighted directed graph G=(N,E), where N denotes the set of nodes and E denotes the set of communication links connecting the nodes. |N| and |E| denote the number of nodes and links in the network respectively. We consider the multicast routing problem with bandwidth and delay constraints from one source node to multi-destination nodes. Let NuuunX m āˆˆ= }......,,,{ 210 be a set of from source to destination nodes of the multicast tree. Where n0 is source node, and U= {u1 , u2 ā€¦ um } denotes a set of destination nodes. Multicast tree T= (NT , ET ), where NT āŠ†N, ET āŠ†E, there exists the path PT (n0 , d) from source node n0 to each destination node dāˆˆļ€ U in T. e(i,j) is a link from node i N to node j N. Three non-negative real value functions are associated with each link e(e E): cost C(e), delay D(e), and available bandwidth B(e). The link cost function, C(e), may be either monetary cost or any measure of the resource utilization, which must be optimized. The link delay, D(e), is considered to be the sum of switching, queuing, transmission, and propagation delays. The link bandwidth, B(e), is the residual bandwidth of the physical or logical link. The link delay and bandwidth functions, D(e) and B(e), define the criteria that must be constrained. The cost of the path PT is defined as the sum of the cost of all links in that path and can be given by )1()()( āˆ‘āˆˆ = TPe T eCPC The total cost of the tree T is defined as the sum of the cost of all links in that tree and can be given by )2()()( āˆ‘āˆˆ = TEe eCTC
  • 3. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 158 The total delay of the path PT(n0,d) is simply the sum of the delay of all links along PT(n0,d): )3(),()( ),( 0 āˆ‘āˆˆ āˆˆ= dnPe T T UdeDPD The delay of multicast tree T is the maximum value of delay in the path from source node n0 to each destination node dāˆˆU. )4()),(max()( ),( 0 āˆ‘āˆˆ āˆˆ= dnPe T T UdPDTD The bandwidth of the path PT(n0,d) is defined as the minimum available residual bandwidth at any link along the path: )5()),(min()( TT PeeBPB āˆˆ= The bandwidth of the tree T is defined as the minimum available residual bandwidth at any link along the tree: )6()),(min()( TEeeBTB āˆˆ= Assume the minimum bandwidth constraint of multicast tree is B, and the maximum delay constraint id is D, given a multicast demand R, then, the problem of bandwidth-delay constrained multicast routing is to find a multicast tree T, satisfying: 1. Bandwidth constraint: B (T) = B. 2. Delay constraint: D (T) = D. Suppose S(R) is the set, S(R) satisfies the conditions above, then, the multicast tree T which we find is: C (T) = min (C (Ts), Ts S(R)) 3. THE PROPOSED ANT ALGORITHM Assuming n0 is source node, and U= {u1, u2 ā€¦ um} denotes a set of destination nodes, the smallest bandwidth constraint, and by the algorithm for finding the k shortest paths in reference [4], we can find the candidate route set from source node to each destination node i (i.e. Pi ={p1, p2,ā€¦ā€¦ā€¦.,pn}). The proposed ant algorithm can be performed as the following steps: Algorithm: Ant algorithm for multicast routing 1. Initialize network nodes. a. Define the source node s and the destination nodes U= {u1, u2 ā€¦ um} b. Set NC =0 (NC is a loop counter.), and put m ants to s 2. For each destination node ui āˆˆ U, 3. Let Pi be the set of the shortest paths for the destination node ui ( by using [4]). 4. Assign an initial value ;0=kĻ„ to the pheromone intensity of every pk, k=1,2,ā€¦n, 5. Begin the first tour; 6. Let m ants move from s to ui on Pi equally (the ants number in each path pk is equal). 7. Compute the pheromone amount left by x ants at pk ( kĻ„āˆ† ) by using the following equation:
  • 4. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 159 )7(;* x C Q k total k =āˆ†Ļ„ Where Ck is the cost of the path pk and is computed by Eq. (1). 8. Update the local pheromone ;kĻ„ )(;)( 81 total kkk Ļ„āˆ†+Ļ„Ļāˆ’=Ļ„ Where Ļ (0, 1] is the evaporation rate. 9. Begin a new tour 10. Set NC=NC+1; 11. Compute the corresponding probabilities function fk for each pk as follows: ļ£“ ļ£“ ļ£³ ļ£“ļ£“ ļ£² ļ£± āˆˆ = āˆ‘āˆˆ otherwise nk f nj jj kk k 0 )9(; ][*][ ][*][ Ī²Ī± Ī²Ī± Ī·Ļ„ Ī·Ļ„ Where k k d 1 =Ī· ; dk is computed by using Eq. (3), and Ī±, Ī² denote the information accumulated during the movement of ants and the different effects of factors in the path selection. 12. Compute kĻ„āˆ† by using Eq. (7) 13. Update the global pheromone kĻ„ by using Eq. (8) 14. Repeat from step 9 until NCmax 15. Compare between the values of kĻ„ to get the best path for the destination ui (pui). 16. End For 17. Collect the all best path (pui) to get the multicast tree. 4. EXPERIMENTAL RESULTS In this section, we show the effectiveness of the above algorithm by applying it on two examples and compare the results which obtained by the proposed ant algorithm with the results of which obtained by [12]. The parameters setting in the proposed algorithm as follows: ants number m = 30, 5.0=Ļ , Ī±=Ī²=1, and NCmax=20 (iteration numbers). 4.1 First Example We consider a network with 8 nodes taken from [12]. Each link represented by a triple-group (B, D, C), given its value randomly as shown in Fig. 1.
  • 5. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 160 FIGURE 1: Network Topology Structure Assuming the source node n0 is node 1, destination node set U= {4, 5, 7, 8} as shown in the above figure. By the algorithm for finding the k shortest paths in reference [4] with smallest bandwidth constraint B=10, we can find the candidate route set from source node 1 to each destination node, as shown in Table 1. Destination node The shortest paths 4 1 2 8 7 6 4 1 3 4 1 5 6 4 1 2 4 1 5 6 7 8 2 4 5 1 5 1 2 4 6 5 1 2 8 7 6 5 1 3 4 6 5 7 1 3 4 2 8 7 1 3 4 6 7 1 2 4 6 7 1 2 8 7 1 5 6 7 1 5 6 4 2 8 7 8 1 5 6 4 2 8 1 3 4 2 8 1 3 4 6 7 8 1 5 6 7 8 1 2 8 1 2 4 6 7 8 TABLE 1: The candidate route set from source node 1 to each destination node We find the multicast tree as shown in Fig.2 with cost=41. 1 6 3 4 7 2 8 (12,2,6 (13,3,4) (8,3,6) (10,3,6) (10,2,4) (12,2,6) (15,2,8) (13,2,6) (15,3,6) (9,3,4) (10,1,5) (12,3,4) (9,1,3) 5
  • 6. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 161 FIGURE 2: The Multicast Tree obtained by the proposed Ant Algorithm Figure 3(a, b, c, and d)) shows the number of ants on each path of the destination 4, 5, 7, and 8 respectively. The following figures show the best path which represents the candidate route from the source node 1 to the destination nodes. The horizontal axis represents the tour number and the vertical axis represents the number of ants. FIGURE 3(a): The iteration number and the number of Ants for the destination 4. 1 6 3 4 7 2 8 5
  • 7. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 162 FIGURE 3(b): The iteration number and the number of Ants for the destination 5. The best path for the destination node (7) 0 2 4 6 8 10 12 14 16 18 1 2 3 4 5 6 7 8 9 1011121314151617181920 Antsnumber path 1-3-4-2-8-7 path 1-3-4-6-7 path 1-2-4-6-7 path 1-2-8-7 path 1-5-6-7 path 1-5-6-4-2-8-7 Iterations FIGURE 3(c): The iteration number and the number of Ants for the destination 7.
  • 8. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 163 The best path for the destination node (8) 0 5 10 15 20 25 30 35 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Antsnumber path 1-5-6-4-2-8 path 1-3-4-2-8 path 1-3-4-6-7-8 path 1-5-6-7-8 path 1-2-8 path 1-2-4-6-7-8 Iterations FIGURE 3(d): The iteration number and the number of Ants for the destination 8. From the above figures, if we consider the figure 3(d) as an example we note that: the number of ants in the path 1-2-8 increases from 11 to 30 during iteration 1 to iteration 20. But the number of ants on the other paths is decreasing to 0. This means that, the path 1-2-8 is the best candidate route from the source node 1 to the destination node 8. Figure 4 represents the multicast tree which obtained by the genetic algorithm, [12]. FIGURE 4: The Multicast Tree obtained by [12]. By comparing the Multicast tree obtained by the proposed Ant algorithm, given in Fig. 2 and the other one which obtained by using genetic algorithm [12], given in Fig. 4, we noted the following: 1. The bandwidth B of the path 1->3->4->8 in the tree obtained by [12] equal to 9 according to Eq. 5 which is not 10 as it is imposed. 2. The path 1->2 isn't true, because the node 2 does not represent the destination node. Hence, the multicast tree obtained by [12] is not correct, based on the parameters imposed. 1 6 3 4 7 2 8 5
  • 9. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 164 4.2 Second Example We consider a network with 8 nodes taken from [10]. Each link represented by a triple-group (D, B, C), given its value randomly as shown in Fig.5 and compare the results with [10]. FIGURE 5: Network Topology Structure Assuming the source node n0 is node 1, destination node set U= {2, 4, 5, 7} as shown in the above figure. By the algorithm for finding the k shortest paths in reference [4] with smallest bandwidth constraint B=70, we can find the candidate route set from source node 1 to each destination node, as shown in Table 2. 1 6 3 4 7 2 8 (8,110,21) (18,100,9) (10,75,8) (7,90,6)5 (9,60,2) (3,80,3) (3,90,3) (4,13,10) (9,120,1) (6,70,4) (9,40,7) (12,120,4) (12,80,12)
  • 10. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 165 Destination node The shortest paths 2 1 3 4 2 1 5 3 2 1 5 3 4 2 1 3 5 6 4 2 1 3 2 1 5 6 7 8 2 1 5 6 4 2 1 5 6 4 3 2 1 3 5 6 7 8 2 4 1 5 3 4 1 5 3 2 4 1 3 5 6 4 1 5 6 4 1 3 2 4 1 3 4 5 1 5 1 3 4 6 5 1 3 5 1 3 2 4 6 5 7 1 3 5 6 7 1 3 4 6 7 1 5 6 7 1 3 4 2 8 7 1 3 2 8 7 1 5 3 4 6 7 TABLE 2: The candidate route set from source node 1 to each destination node We find the multicast tree as shown in Fig.6 with cost=63. FIGURE 6: The Multicast Tree obtained by the proposed Ant Algorithm 1 6 3 4 7 25
  • 11. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 166 The multicast tree obtained by [10] is shown in Fig. 7. FIGURE 7: The Multicast Tree obtained by [10] By comparing the previous results we observe that the multicast tree obtained by the proposed Ant algorithm is quite similar to the multicast tree obtained by [10].This means that the proposed Ant algorithm is working properly. 5. CONCLUSION This paper presented an Ant algorithm for solving QoS multicast routing problem based on bandwidth and delay constraints. The proposed algorithm uses the k th shortest paths algorithm [4], to construct the route set. Then, we have a set of paths for each destination nodes; the Ants moving through the paths depending on the corresponding probabilities function and update the Pheromone on the paths after finishing each iteration. Simulation results show that the proposed algorithm has features of well performance of cost, fast convergence and stable delay. The algorithm can guarantee the requirement of multimedia group communication for quality of service. 6. REFERENCES 1. L. H. Sahasrabuddhe, and B. Mukherjee, ā€œMulticast Routing Algorithms and Protocols: A Tutorialā€, IEEE Network, pp. 90-102, January, February 2000. 2. B. Wang, and J. C. Hou, ā€œMulticast Routing and Its QoS Extension: Problems, Algorithms, and Protocols,ā€ IEEE Network, pp. 22-36, January/February 2000. 3. H. F. Salama, D. S. Reeves, and Y. Viniotis, ā€œEvaluation of Multicast Routing Algorithms for Real-Time Communication on High-Speed Networks,ā€ IEEE Journal on Selected Areas in Communications, Vol. 15(3): 332-345, 1997. 4. A. Younes, ā€œA Genetic Algorithm for Finding the K Shortest Paths in a Networkā€, Egyptian Informatics Journal, Vol.10(2), 2010. 5. Z. Wang, and B. Shi, ā€œSolution to QoS Multicast Routing Problem Based on Heuristic Genetic Algorithm,ā€ Journal of Computer, 2001, Vol. 24(1): 55-61, 2001. 6. X. Zhou, C. Chen, and G. Zhu, ā€œA Genetic Algorithm for Multicasting Routing Problem,ā€ International Conference on Communication Technology, Vol. 2, pp. 1248-1253, 2000. 7. Z. Wang, and J. Crowcroft, ā€œQuality of Service for Supporting Multimedia Applications,ā€ IEEE Journal on Selected Areas in Communications, Vol. 14(7): 1228-1234, 1996. 1 6 3 4 7 25
  • 12. A. Younes International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1) : 2011 167 8. L. Guo and I. Matta, ā€œQDMR: An Efficient QoS Dependent Multicast Routing Algorithm,ā€ Proceedings of the Fifth IEEE Real-Time Technology and Applications Symposium, pp. 213- 222, 1999. 9. W. Wu, ā€œMulticast routing Algorithm Based on Multiple Qualities of Services,ā€ Applied Electronic Technologiesā€, Vol. 266(8), 2000. 10. Chao-Hsien Chu, ā€œA Heuristic Ant Algorithm for Solving QoS Multicast Routing Problemā€, Proceedings of the Evolutionary Computation Vol. 2, 2002. 11. Lin Huang, Haishan Han and Jian Hou, ā€œMulticast Routing Based on the Ant Systemā€œ,Applied Mathematical Sciences, Vol. 1(57): 2827ā€“2838, 2007. 12. Hua Chen, Baolin Sun, ā€œ Multicast Routing Optimization Algorithm with Bandwidth and Delay Constraints Based on GAā€, Journal of Communication and Computer, Vol. 2(5): 2005. 13. L. Atzori and A. Raccis, ā€œNetwork Capacity Assignment for Multicast Services Using Genetic Algorithmsā€, IEEE Communications Letters, vol. 8(6): 403-405, June 2004. 14. C.W. Ahn and R.S. Ramakrishna, ā€œA genetic algorithm for shortest path routing problem and the sizing of populationā€, IEEE Transaction on evolutionary computation, vol. 6(6): Dec. 2002. 15. R.H. Hwang, W.Y. Do, and S.C. Yang, ā€œMulticast Routing Based on Genetic Algorithmsā€, Journal of information science and engineering, vo1.16, pp.885-901, 2000. 16. R. Bhattacharya, P. Venkateswaran, S.K. Sanyal, R. Nandi, , ā€œGenetic algorithm based efficient outing scheme for multicast networksā€, IEEE International Conference on Personal Wireless Communications (ICPWC 2005), pp. 500 - 504, Jan 2005 17. L. Chen, Z. Yang, Z. Xu, ā€œA degree-delay-constrained genetic algorithm for multicast routing treeā€, The Fourth International Conference on Computer and Information Technology (CIT), pp. 1033 -1038, September 2004. 18. M. Hamdan and M.E. El-Hawary, ā€œMulticast routing with delay and delay variation constraints using genetic algorithmā€, Canadian Conference on Electrical and Computer Engineering, vol. 4, pp. 2363 - 2366, May 2004. 19. Luca Sanna Randaccio and Luigi Atzori, ā€œA Genetic Algorithm Based Approach for Group Multicast Routingā€, Journal of Networks, Vol. 1(4): , 2006.