SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Current Trends in Engineering & Research (IJCTER)
e-ISSN 2455–1392 Volume 1 Issue 1, November 2015 pp. 8-14
http://www.ijcter.com
@IJCTER-2015, All rights Reserved 8
BEE BASED ROUTING PROTOCOL FOR MANET
Mahesh Bhatt1
, Mukul Joshi2
1,2
Gujarat Technological University
Abstract – Mobile Ad HOC networks (MANET’S) are networks in which all nodes are mobile and
communicate with each other via wireless connections. Nodes can join or leave the network at any
time. There is no fixed infrastructure. Research and industries are recently more interesting and
attracting to the VANET and MANET development domain. A vehicular ad hoc network (VANET)
is a subclass of MANET. In this paper, we propose Bee Routing Protocol for Ad Hoc Network, in
which a new quality of service multipath routing protocol adapted for the VANET. This algorithm is
a reactive source routing algorithm and consumes less energy as compared to DSDV, AODV, DSR
routing algorithms because a fewer control packets for routing are sent as compared to other
networks.
Keywords – MANET, VANET, Routing algorithms, Swarm Bee Communication, QoS.
I. INTRODUCTION
Routing in MANETs is a challenging task because we cannot use protocol of wired networks due to
dynamic topology of the network. Making use of a number of relatively simple biological agents like
bees, a variety of different organized behavior are generated at the system level from the local
interaction among the agents and with the environment. Bee communication systems have recently
become a source of inspiration for design of distributed & adaptive algorithms.
VANET represents a special kind of Mobile Ad Hoc Network(MANET). It aims to provide
communications among vehicles via Inter-Vehicle Communication and between vehicles and fixed
equipment described as roadside base stations via Roadside-to-Vehicle Communication. It is
distributed, adaptive network, characterized by very high node mobility, high speed variation of
vehicles, and limited degrees of freedom in the mobility patterns. This situation leads to very fast and
very frequent change of network topology. In this field, one of the most important requirements is
the quality of service (QoS - end to end delay and bandwidth) that provides information needed in
time to passengers in order to make safe decisions.
II. ISSUES OF ADHOC NETWORK
The most important challenge in designing algorithms for Ad Hoc Network are mobility and limited
battery capacity of nodes. Mobility of nodes results in continuously evolving new topologies and
consequently the routing algorithms have to discover or update the routes in real time but with small
control overhead. The limited battery capacity requires that the packets if possible be distributed on
multiple paths, which would result in the depletion of batteries of different nodes at an equal rate and
hence as a result the life time of networks would increase.
Therefore an important challenge in Ad Hoc Network is to design a routing algorithm that is not only
energy efficient but also delivers performance same or better than existing state of art routing
protocols.
A. ISSUES RELATED TO MANET
[1] Routing
International Journal of Current Trends in Engineering & Research (IJCTER)
Volume 01, Issue 01; November – 2015
@IJCTER-2015, All rights Reserved 9 `
Routing is one of the most complicated problems to solve as ad hoc networks have a seamless
connectivity to other devices in its neighborhood. Because of multi hop routing no default route is
available. Every node acts as a router and forwards each other’s packets to enable information
sharing between mobile nodes.
[2] Security
Obviously a wireless link is much more vulnerable than a wired link. The science of cracking the
encryption and eavesdropping on radio links has gone on since the first encryption of radio links was
established. The user can insert spurious information into routing packets and cause routing loops,
long time-outs and advertisements of false or old routing table updates. Security has several unsolved
issues that are important to solve to make the ad hoc network into a good solution.
[3] Quality of Service(QoS)
QoS is a difficult task for the developers, because the topology of an ad hoc network will
constantly change. Reserving resources and sustaining a certain quality of service, while the network
condition constantly changes, is very challenging. The challenges of supporting QoS in ad hoc
networks are how to reserve bandwidth and how to guarantee the specified delay for real-time
application data flows. For wireless transmissions, the channel is shared among neighbors.
Therefore, the available bandwidth depends on the neighboring traffic status, as does the delay.
III. PROBLEM RELATED TO QOS IN MANET
[A] Unpredictable link properties
Wireless media is very unpredictable and packet collisions are an unavoidable consequence of
wireless networks. Signal propagation faces difficulties such as fading, interference, and multipath
cancellation. These properties of the wireless network make measurements such as bandwidth and
delay of the link unpredictable.
[B] Limited battery life
There is limited power of the devices that establish the nodes in the ad hoc network due to limited
battery life time. QoS should consider residual battery power and rate of battery consumption
corresponding to resource utilization. The technique used in QoS provisioning should be power
aware and power efficient.
[C] Node mobility
Movement of nodes in the ad hoc network creates a dynamic network topology. Links will be
dynamically formed when two nodes moves into transmission range of each other and are torn down
when they move out of transmission range. Node mobility makes measurements in the network even
harder and measurements as bandwidth is essential for QoS.
[D] Route maintenance
The dynamic nature of the network topology and the changing behavior of the communication
medium make the precise maintenance of network state information very difficult. Because of this,
the routing algorithms in MANET must operate on imprecise information. Since the nodes can join
and leave the ad hoc network environment as they please, the established routing path may be broken
at any time even during the process of data transfer. Thus, the need arises of routing paths with
minimal overhead and delay. Since the QoS-aware routing would require reservation of resources at
the routers (nodes), the problem of a heavily changing topology network might become cumbersome,
as reservation maintenance with updates along the routing path must be done.
[E] Security
International Journal of Current Trends in Engineering & Research (IJCTER)
Volume 01, Issue 01; November – 2015
@IJCTER-2015, All rights Reserved 10 `
Without adequate security, unauthorized access and usage may violate QoS negotiations. The nature
of broadcasts in wireless networks potentially results in more security exposure. The physical
medium of communication is inherently insecure, so it is important to design aware routing
algorithms for MANET.
IV. ISSUES RELATED TO VANET
1) High mobility and rapid changing topology
Vehicles move very fast especially on roads and highways. Thus, they remain within each other
communication range for a very short time, and links are established and broken fast which results to
rapid changes in network topology. Moreover, driver behavior is affected by the necessity to react to
the data received from the network, which causes changes in the network topology. The rapid
changes in network topology affect the network diameter to be small, while many paths may be
disconnected before they can be used.
2) Variable network density
The network density in VANET varies depending on the traffic load, which can be very high in the
case of a traffic jam, or very low, as in suburban areas.
V. ARTIFICIAL INTELLIGENCE TECHNIQUES
Swarm intelligence which is part of Artificial Intelligence, is any attempt to design algorithm and
distributed problem solving devices inspired by the collective behavior of any social insect colonies
or other animal societies. Various algorithms are: Ant Colony Optimization, Particle Swarm
Optimization, Intelligent Water Drops, The Bees, Bat, Termites. Sample applications of these are :
Travelling Salesman, Crown Simulation, Ad Hoc Networks.
BEEADHOC ARCHITECTURE
BeeAdHoc is an on-demand multi path routing algorithm for mobile adhoc networks inspired from
the foraging principles of honey bees. The bees are domestic insects live in colony which is divided
in a single breeding female (Queen), a few thousands of males (Drones), a several thousands of
sterile females (Workers), and many young bee larvae (Broods). They share a communication
language based on dances which are performed by the worker called “Scout” when it finds food.This
dance aims to recruit others by the transmission of the distance, direction and quantity of found food
with a visual, tactile and olfactory perception. Thus, some bees are recruited and then, become
“foragers”.
BeeAdHoc works with types of agents: packers, scouts, foragers and swarms. The packers locate a
forager and hand over the data packet to the discovered forager. Scouts discover new routes from the
launching node to the destination node. Foragers, is the main workers. The BeeAdHoc Architecture
is shown in figure 1.
A. PACKING FLOOR
The packing floor is an interface to the upper transport layer (e.g., TCP or UDP) . Once a data packet
arrives from transport layer i.e., sender sends the data, a matching forager for it is looked up on the
danced floor. If a forager is found then the data packet is encapsulated in its payload . Otherwise, the
data packet is temporary buffered waiting for a returning forager. If no forager comes back within a
certain predefined time, a scout is launched which is responsible for discovering new routes to the
packet destination.
International Journal of Current Trends in Engineering & Research (IJCTER)
Volume 01, Issue 01; November – 2015
@IJCTER-2015, All rights Reserved 11 `
B. ENTRANCE
The entrance handles all incoming and outgoing packet. Action on the dance floor depends on the
type of packet entered the floor from the MAC layer. If the packet is the forager and the current node
is its destination, then the forager is forwarded to the packing floor; otherwise, it is directly routed to
the MAC interface of the next hop node. If the packet is a scout, it is broadcast to the neighbor nodes
if its TTL timer has not expired yet or if the current node is not its destination. If a replica of
previously received scout arrives at the entrance floor , it is removed from the system.
Figure 1: BeeAdHoc Architecture
C. DANCE FLOOR
The dance floor recruits new forager by “dancing” according to the quality of the path it
traversed. It sends matching foragers to the packing floor in response to a request from a packer. The
foragers whose lifetime has expired are not considered for matching. If multiple path be identified
for matching, then a forager is selected in a random way. This helps in distributing the packets over
multiple paths, which in turn serves two purpose : avoiding congestion under high loads and
depleting batteries of different nodes at comparable rate. If the last forager for a destination leaves a
hive then the hive does not have any more route to the destination. Nevertheless if a route to the
destination still exists then soon a forager will be returning to the hive if no forager comes back
within reasonable amount of time, then the node has probably lost its connection to the destination
node. In this way fewer control packets are transmitted resulting in less energy expenditure.
VI. QoS BEE ROUTING PROTOCOL
A. QoS Bee Routing Packet Type
Scout and forager are the two major kinds of packets used in the protocol.
1) Scout
This control packet is used in the route request. First, it is called forward scout until finding the food
(destination). Thus, it returns to the beehive (source node) to inform its nest mates (data packets). In
the back way, it’s named backward scout.
Forward Scout
It ensures the exploration of the VANET in order to find the destination. It is launched from the
source node to nodes in neighborhood and so on until finding the destination. It marks temporarily its
itinerary in the routes tables of the visited nodes in order to be used on the backway. A forward’s
scout identifier is unique; in fact, it’s constructed as an incremental value. Forward scout includes
International Journal of Current Trends in Engineering & Research (IJCTER)
Volume 01, Issue 01; November – 2015
@IJCTER-2015, All rights Reserved 12 `
also the beehive identifier. A unique identification of the route request is represented by the
conjunction of these last two identifiers. It prevents the route request duplication.
This control packet contains also the food identifier, the minimum bandwidth requested and the
maximum delay allowed by the source node, and a lifespan field used to limit number of hops to be
done by the packet. Thus, if reached, the forward scout will be dropped. It ensures the loop-free
propriety of the route request. Note that lifespan field will be increased if the beehive doesn’t receive
any response after the waiting time expiration. Forward scout records a hop count field which is the
number of hops carried out from the source node to the node handling this scout. In addition, it
includes stamp field used to save the transmission time which employs to compute available
bandwidth and measured delay and then to decide if the network satisfy the QoS guarantees.
Backward Scout
Once the route is found, the node propagates the scout in backward scout form toward the source
node along the reverse path. Backward scout includes the same fields as forward scout such as: the
scout identifier, the beehive identifier, the food identifier, the minimum bandwidth requested and the
maximum delay allowed by the source node. Backward scout employs the hop count field in order to
indicate number of hops from the source node to the destination. This field is initialized using the
hop count field of the forward scout when finding the desired route. Furthermore, the stamp field is
used to inform the source node by the bandwidth and the delay carried out between the source node
and the destination. It contains the trip time estimated by the forward scout.
Backward scout takes advantage of lifespan field as a time to life field. It represents the time validity
of the route in the backward scout trip.
2) Forager
This packet type represents data packet used to transmit the communication data. Data packets are
queued until the discovery process of the desired route is terminated, and then they will be launched
to the destination.
B. QoS Bee Routing Phases
1) Neighborhood connection discovery phase
In this phase, each node informs its neighbors that the links are active. All nodes in the VANET
broadcast a refresh packet periodically with its immediate neighbors. When a neighbor node receives
the refresh packet, all route entries in its routes table regarding the sender will be consider as valid.
If the node does not get information from the node’s neighbor for specified amount of time, then the
routing information in the routes table is marked as lost. In this case, the bandwidth and delay of the
relevant entry will take the infinity value. Hence, an error scout packet is generated and sent to
inform others of the link breakage.
2) Route discovery phase
When one node is responsible to transmit data, it first checks whether the route is present in its routes
table and the QoS requirements are satisfied. If this is a case and there is a sufficient forgers, the
source node transmits the data. If there is no forager, data wait recruiting foragers.
In the case of no QoS route exists, beehive generates and clones several forward scouts from one and
unique forward scout. It launches and broadcasts them stochastically to its immediate neighbors.
Stochastic broadcasting means the transmission of forward scouts to a limit percentage(=80%) of
neighbor nodes. The cloned forward scouts have the same scout identifier, the beehive identifier, the
food identifier and the maximum lifespan of the route request. Consequently, the current node checks
International Journal of Current Trends in Engineering & Research (IJCTER)
Volume 01, Issue 01; November – 2015
@IJCTER-2015, All rights Reserved 13 `
the QoS validity and thus, the route discovery is continued, else the exploration is denied and the
forward scout will be dropped.
If intermediate node has already received a forward scout with that same scout identifier and beehive
identifier then it will discard it, else current node records in the routes table entry the forward scout
identifier and the source node identifier at the prior hop field. It prevents from the duplication of
scout. After that, it checks for available rout in its routes table, if any rout is found, it sends a
backward scout to the source node along the reverse path; else it rebroadcasts stochastically the
forward scout in the same manner such as the source node.
In return, the backward scout records the next hop at the tables’ route entry to indicate its sender.
After the backward scout arrives at the source node, the link weight is calculated and recorded at the
routes table entry using the stamp field. Now, the source node recruits a number of forager according
to the quality of the route discovered. Consequently, waiting data are sending using foragers. Note
that the routes are selected to transmit simultaneous data according to the link weight factor. This
will reduce the network congestion and then, increases the bandwidth and decreases the delay. The
following diagrams figure 2. explain the route discovery phase.
Figure 2 Route discovery phase diagrams (beehive, bees, food source)
3) Route maintenance phase
In route maintenance phase in VANET, the periodic sending of refresh packet between node and
its neighbors ensures the stability of connections and also the links safely in the transmission range
of node. Otherwise, the node detects a link breaks and then, any route passing this broken link is
considered disconnected. Besides, the node can detect a QoS requirements violation (bandwidth
insufficiency or large delay). In these cases, the detector node of this failure sends an error scout to
the source node via the prior hop and so on. The goal here is to inform any node in the reverse route
about the broken link to remove it from its routes table and to rediscover a new QoS route by the
source node if needed.
VII. CONCLUSION
Research and industries are recently more interesting and attracting to the VANET and MANET
development domain. A vehicular ad hoc network (VANET) is a subclass of MANET. From this
paper, we conclude that Bee Ad Hoc Network employs a simple bee behavior to monitor the validity
of the routes. When compared to other algorithms the battery level of BeeAdHoc is better because it
International Journal of Current Trends in Engineering & Research (IJCTER)
Volume 01, Issue 01; November – 2015
@IJCTER-2015, All rights Reserved 14 `
tries to spread the data packets over different routes rather than always sending them on the best
routes. This protocol is reactive, distributed and topology based protocol which provides QoS
guarantees in VANET compare to AODV, DSDV such as end-to-end delay and bandwidth in
VANET due to transmitting fewer control packets and by distributing data packets on multiple path.
REFERENCES
[1] D. B. Johnson, D. A. Maltz, and J. Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad
hoc Networks,” Ad hoc Networking, edited by C. Perkins, Addison-Wesley, 2001, pp. 139-172.
[2] F. Li, and Y. Wang, “Routing in vehicular ad hoc networks: A survey,” IEEE vehicular Technology Magazine, vol.
2, June 2007, pp. 12-22.
[3] B. Karp, and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” MobiCom’00, Boston,
USA, 2000, pp. 243-254.6.
[4] C. Lochert, M. Mauve, H. Fusler, and H. Hartenstein, “Geographic routing in city scenarios,” ACM SIGMOBILE
Mobile Computing and Communications Review, 2005, pp. 69-72.
[5] S. Bitam, M. Batouche, E-G. Talbi, “ A survey on bee colony algorithms,” 24th IEEE International Parallel and
Distributed Processing Symposium, NIDISC Workshop, Atlanta, Georgia, USA, 2010, pp. 1-8.

More Related Content

What's hot

QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network IJECEIAES
 
A Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNA Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNIJERA Editor
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...chokrio
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...chokrio
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...IRJET Journal
 
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEME
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEMEPERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEME
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEMEijasuc
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networkspraveen369
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...ijcncs
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
 

What's hot (18)

QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
 
A Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNA Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSN
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
 
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...
NEW APPROACH TO IMPROVING LIFETIME IN HETEROGENEOUS WIRELESS SENSOR NETWORKS ...
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
Energy Efficient Enhancement of TDEEC Wireless Sensors Network Protocol Based...
 
J031101064069
J031101064069J031101064069
J031101064069
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEME
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEMEPERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEME
PERFORMANCE COMPARISON OF QOS METRICS FOR A DISTRIBUTED PRICING SCHEME
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
 

Similar to Bee-inspired Routing Protocol for MANETs

Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolAhmad Sharifi
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
 
Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...Alexander Decker
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018IJMER
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsidescitation
 
Reliable and efficient data dissemination scheme in VANET: a review
Reliable and efficient data dissemination scheme in VANET:  a review Reliable and efficient data dissemination scheme in VANET:  a review
Reliable and efficient data dissemination scheme in VANET: a review IJECEIAES
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs ijasuc
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
 
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...IDES Editor
 
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...IJARIDEA Journal
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivityijsrd.com
 

Similar to Bee-inspired Routing Protocol for MANETs (20)

Secured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing ProtocolSecured-Bandwidth Reservation Distance Vector routing Protocol
Secured-Bandwidth Reservation Distance Vector routing Protocol
 
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSDATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKS
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...Application independent based multicast routing protocols in mobile ad hoc ne...
Application independent based multicast routing protocols in mobile ad hoc ne...
 
Cp3210151018
Cp3210151018Cp3210151018
Cp3210151018
 
[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti[IJET-V1I6P19] Authors : Kirti
[IJET-V1I6P19] Authors : Kirti
 
Security Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETsSecurity Enhancement in AODV Routing Protocol for MANETs
Security Enhancement in AODV Routing Protocol for MANETs
 
eaodv
eaodveaodv
eaodv
 
Reliable and efficient data dissemination scheme in VANET: a review
Reliable and efficient data dissemination scheme in VANET:  a review Reliable and efficient data dissemination scheme in VANET:  a review
Reliable and efficient data dissemination scheme in VANET: a review
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...
 
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETSECA MODEL BASED QOS AODV ROUTING FOR MANETS
ECA MODEL BASED QOS AODV ROUTING FOR MANETS
 
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
Adaptive QoS Multicast Routing with Mobility Prediction in MANETs
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
 
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Gateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet ConnectivityGateway Forwarding Schemes For Manet-Internet Connectivity
Gateway Forwarding Schemes For Manet-Internet Connectivity
 

More from Editor IJCTER

Android Based Solution for Indian Agriculture Management A Design Paper
Android Based Solution for Indian Agriculture Management A Design PaperAndroid Based Solution for Indian Agriculture Management A Design Paper
Android Based Solution for Indian Agriculture Management A Design PaperEditor IJCTER
 
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATIONPROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATIONEditor IJCTER
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer ForensicEditor IJCTER
 
Study about AVL Tree & Operations
Study about AVL Tree & OperationsStudy about AVL Tree & Operations
Study about AVL Tree & OperationsEditor IJCTER
 
Comparison of various page Rank Algorithms
Comparison of various page Rank AlgorithmsComparison of various page Rank Algorithms
Comparison of various page Rank AlgorithmsEditor IJCTER
 
A Survey- Knapsack Problem Using Dynamic Programming
A Survey- Knapsack Problem Using Dynamic ProgrammingA Survey- Knapsack Problem Using Dynamic Programming
A Survey- Knapsack Problem Using Dynamic ProgrammingEditor IJCTER
 
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEPRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEEditor IJCTER
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESEditor IJCTER
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless TechnologyEditor IJCTER
 

More from Editor IJCTER (9)

Android Based Solution for Indian Agriculture Management A Design Paper
Android Based Solution for Indian Agriculture Management A Design PaperAndroid Based Solution for Indian Agriculture Management A Design Paper
Android Based Solution for Indian Agriculture Management A Design Paper
 
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATIONPROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
PROGRAMMED TARGET RECOGNITION FRAMEWORKS FOR UNDERWATER MINE CLASSIFICATION
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
Study about AVL Tree & Operations
Study about AVL Tree & OperationsStudy about AVL Tree & Operations
Study about AVL Tree & Operations
 
Comparison of various page Rank Algorithms
Comparison of various page Rank AlgorithmsComparison of various page Rank Algorithms
Comparison of various page Rank Algorithms
 
A Survey- Knapsack Problem Using Dynamic Programming
A Survey- Knapsack Problem Using Dynamic ProgrammingA Survey- Knapsack Problem Using Dynamic Programming
A Survey- Knapsack Problem Using Dynamic Programming
 
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGEPRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
PRIVATE CLOUD SERVER IMPLEMENTATIONS FOR DATA STORAGE
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
5G Wireless Technology
5G Wireless Technology5G Wireless Technology
5G Wireless Technology
 

Recently uploaded

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

Bee-inspired Routing Protocol for MANETs

  • 1. International Journal of Current Trends in Engineering & Research (IJCTER) e-ISSN 2455–1392 Volume 1 Issue 1, November 2015 pp. 8-14 http://www.ijcter.com @IJCTER-2015, All rights Reserved 8 BEE BASED ROUTING PROTOCOL FOR MANET Mahesh Bhatt1 , Mukul Joshi2 1,2 Gujarat Technological University Abstract – Mobile Ad HOC networks (MANET’S) are networks in which all nodes are mobile and communicate with each other via wireless connections. Nodes can join or leave the network at any time. There is no fixed infrastructure. Research and industries are recently more interesting and attracting to the VANET and MANET development domain. A vehicular ad hoc network (VANET) is a subclass of MANET. In this paper, we propose Bee Routing Protocol for Ad Hoc Network, in which a new quality of service multipath routing protocol adapted for the VANET. This algorithm is a reactive source routing algorithm and consumes less energy as compared to DSDV, AODV, DSR routing algorithms because a fewer control packets for routing are sent as compared to other networks. Keywords – MANET, VANET, Routing algorithms, Swarm Bee Communication, QoS. I. INTRODUCTION Routing in MANETs is a challenging task because we cannot use protocol of wired networks due to dynamic topology of the network. Making use of a number of relatively simple biological agents like bees, a variety of different organized behavior are generated at the system level from the local interaction among the agents and with the environment. Bee communication systems have recently become a source of inspiration for design of distributed & adaptive algorithms. VANET represents a special kind of Mobile Ad Hoc Network(MANET). It aims to provide communications among vehicles via Inter-Vehicle Communication and between vehicles and fixed equipment described as roadside base stations via Roadside-to-Vehicle Communication. It is distributed, adaptive network, characterized by very high node mobility, high speed variation of vehicles, and limited degrees of freedom in the mobility patterns. This situation leads to very fast and very frequent change of network topology. In this field, one of the most important requirements is the quality of service (QoS - end to end delay and bandwidth) that provides information needed in time to passengers in order to make safe decisions. II. ISSUES OF ADHOC NETWORK The most important challenge in designing algorithms for Ad Hoc Network are mobility and limited battery capacity of nodes. Mobility of nodes results in continuously evolving new topologies and consequently the routing algorithms have to discover or update the routes in real time but with small control overhead. The limited battery capacity requires that the packets if possible be distributed on multiple paths, which would result in the depletion of batteries of different nodes at an equal rate and hence as a result the life time of networks would increase. Therefore an important challenge in Ad Hoc Network is to design a routing algorithm that is not only energy efficient but also delivers performance same or better than existing state of art routing protocols. A. ISSUES RELATED TO MANET [1] Routing
  • 2. International Journal of Current Trends in Engineering & Research (IJCTER) Volume 01, Issue 01; November – 2015 @IJCTER-2015, All rights Reserved 9 ` Routing is one of the most complicated problems to solve as ad hoc networks have a seamless connectivity to other devices in its neighborhood. Because of multi hop routing no default route is available. Every node acts as a router and forwards each other’s packets to enable information sharing between mobile nodes. [2] Security Obviously a wireless link is much more vulnerable than a wired link. The science of cracking the encryption and eavesdropping on radio links has gone on since the first encryption of radio links was established. The user can insert spurious information into routing packets and cause routing loops, long time-outs and advertisements of false or old routing table updates. Security has several unsolved issues that are important to solve to make the ad hoc network into a good solution. [3] Quality of Service(QoS) QoS is a difficult task for the developers, because the topology of an ad hoc network will constantly change. Reserving resources and sustaining a certain quality of service, while the network condition constantly changes, is very challenging. The challenges of supporting QoS in ad hoc networks are how to reserve bandwidth and how to guarantee the specified delay for real-time application data flows. For wireless transmissions, the channel is shared among neighbors. Therefore, the available bandwidth depends on the neighboring traffic status, as does the delay. III. PROBLEM RELATED TO QOS IN MANET [A] Unpredictable link properties Wireless media is very unpredictable and packet collisions are an unavoidable consequence of wireless networks. Signal propagation faces difficulties such as fading, interference, and multipath cancellation. These properties of the wireless network make measurements such as bandwidth and delay of the link unpredictable. [B] Limited battery life There is limited power of the devices that establish the nodes in the ad hoc network due to limited battery life time. QoS should consider residual battery power and rate of battery consumption corresponding to resource utilization. The technique used in QoS provisioning should be power aware and power efficient. [C] Node mobility Movement of nodes in the ad hoc network creates a dynamic network topology. Links will be dynamically formed when two nodes moves into transmission range of each other and are torn down when they move out of transmission range. Node mobility makes measurements in the network even harder and measurements as bandwidth is essential for QoS. [D] Route maintenance The dynamic nature of the network topology and the changing behavior of the communication medium make the precise maintenance of network state information very difficult. Because of this, the routing algorithms in MANET must operate on imprecise information. Since the nodes can join and leave the ad hoc network environment as they please, the established routing path may be broken at any time even during the process of data transfer. Thus, the need arises of routing paths with minimal overhead and delay. Since the QoS-aware routing would require reservation of resources at the routers (nodes), the problem of a heavily changing topology network might become cumbersome, as reservation maintenance with updates along the routing path must be done. [E] Security
  • 3. International Journal of Current Trends in Engineering & Research (IJCTER) Volume 01, Issue 01; November – 2015 @IJCTER-2015, All rights Reserved 10 ` Without adequate security, unauthorized access and usage may violate QoS negotiations. The nature of broadcasts in wireless networks potentially results in more security exposure. The physical medium of communication is inherently insecure, so it is important to design aware routing algorithms for MANET. IV. ISSUES RELATED TO VANET 1) High mobility and rapid changing topology Vehicles move very fast especially on roads and highways. Thus, they remain within each other communication range for a very short time, and links are established and broken fast which results to rapid changes in network topology. Moreover, driver behavior is affected by the necessity to react to the data received from the network, which causes changes in the network topology. The rapid changes in network topology affect the network diameter to be small, while many paths may be disconnected before they can be used. 2) Variable network density The network density in VANET varies depending on the traffic load, which can be very high in the case of a traffic jam, or very low, as in suburban areas. V. ARTIFICIAL INTELLIGENCE TECHNIQUES Swarm intelligence which is part of Artificial Intelligence, is any attempt to design algorithm and distributed problem solving devices inspired by the collective behavior of any social insect colonies or other animal societies. Various algorithms are: Ant Colony Optimization, Particle Swarm Optimization, Intelligent Water Drops, The Bees, Bat, Termites. Sample applications of these are : Travelling Salesman, Crown Simulation, Ad Hoc Networks. BEEADHOC ARCHITECTURE BeeAdHoc is an on-demand multi path routing algorithm for mobile adhoc networks inspired from the foraging principles of honey bees. The bees are domestic insects live in colony which is divided in a single breeding female (Queen), a few thousands of males (Drones), a several thousands of sterile females (Workers), and many young bee larvae (Broods). They share a communication language based on dances which are performed by the worker called “Scout” when it finds food.This dance aims to recruit others by the transmission of the distance, direction and quantity of found food with a visual, tactile and olfactory perception. Thus, some bees are recruited and then, become “foragers”. BeeAdHoc works with types of agents: packers, scouts, foragers and swarms. The packers locate a forager and hand over the data packet to the discovered forager. Scouts discover new routes from the launching node to the destination node. Foragers, is the main workers. The BeeAdHoc Architecture is shown in figure 1. A. PACKING FLOOR The packing floor is an interface to the upper transport layer (e.g., TCP or UDP) . Once a data packet arrives from transport layer i.e., sender sends the data, a matching forager for it is looked up on the danced floor. If a forager is found then the data packet is encapsulated in its payload . Otherwise, the data packet is temporary buffered waiting for a returning forager. If no forager comes back within a certain predefined time, a scout is launched which is responsible for discovering new routes to the packet destination.
  • 4. International Journal of Current Trends in Engineering & Research (IJCTER) Volume 01, Issue 01; November – 2015 @IJCTER-2015, All rights Reserved 11 ` B. ENTRANCE The entrance handles all incoming and outgoing packet. Action on the dance floor depends on the type of packet entered the floor from the MAC layer. If the packet is the forager and the current node is its destination, then the forager is forwarded to the packing floor; otherwise, it is directly routed to the MAC interface of the next hop node. If the packet is a scout, it is broadcast to the neighbor nodes if its TTL timer has not expired yet or if the current node is not its destination. If a replica of previously received scout arrives at the entrance floor , it is removed from the system. Figure 1: BeeAdHoc Architecture C. DANCE FLOOR The dance floor recruits new forager by “dancing” according to the quality of the path it traversed. It sends matching foragers to the packing floor in response to a request from a packer. The foragers whose lifetime has expired are not considered for matching. If multiple path be identified for matching, then a forager is selected in a random way. This helps in distributing the packets over multiple paths, which in turn serves two purpose : avoiding congestion under high loads and depleting batteries of different nodes at comparable rate. If the last forager for a destination leaves a hive then the hive does not have any more route to the destination. Nevertheless if a route to the destination still exists then soon a forager will be returning to the hive if no forager comes back within reasonable amount of time, then the node has probably lost its connection to the destination node. In this way fewer control packets are transmitted resulting in less energy expenditure. VI. QoS BEE ROUTING PROTOCOL A. QoS Bee Routing Packet Type Scout and forager are the two major kinds of packets used in the protocol. 1) Scout This control packet is used in the route request. First, it is called forward scout until finding the food (destination). Thus, it returns to the beehive (source node) to inform its nest mates (data packets). In the back way, it’s named backward scout. Forward Scout It ensures the exploration of the VANET in order to find the destination. It is launched from the source node to nodes in neighborhood and so on until finding the destination. It marks temporarily its itinerary in the routes tables of the visited nodes in order to be used on the backway. A forward’s scout identifier is unique; in fact, it’s constructed as an incremental value. Forward scout includes
  • 5. International Journal of Current Trends in Engineering & Research (IJCTER) Volume 01, Issue 01; November – 2015 @IJCTER-2015, All rights Reserved 12 ` also the beehive identifier. A unique identification of the route request is represented by the conjunction of these last two identifiers. It prevents the route request duplication. This control packet contains also the food identifier, the minimum bandwidth requested and the maximum delay allowed by the source node, and a lifespan field used to limit number of hops to be done by the packet. Thus, if reached, the forward scout will be dropped. It ensures the loop-free propriety of the route request. Note that lifespan field will be increased if the beehive doesn’t receive any response after the waiting time expiration. Forward scout records a hop count field which is the number of hops carried out from the source node to the node handling this scout. In addition, it includes stamp field used to save the transmission time which employs to compute available bandwidth and measured delay and then to decide if the network satisfy the QoS guarantees. Backward Scout Once the route is found, the node propagates the scout in backward scout form toward the source node along the reverse path. Backward scout includes the same fields as forward scout such as: the scout identifier, the beehive identifier, the food identifier, the minimum bandwidth requested and the maximum delay allowed by the source node. Backward scout employs the hop count field in order to indicate number of hops from the source node to the destination. This field is initialized using the hop count field of the forward scout when finding the desired route. Furthermore, the stamp field is used to inform the source node by the bandwidth and the delay carried out between the source node and the destination. It contains the trip time estimated by the forward scout. Backward scout takes advantage of lifespan field as a time to life field. It represents the time validity of the route in the backward scout trip. 2) Forager This packet type represents data packet used to transmit the communication data. Data packets are queued until the discovery process of the desired route is terminated, and then they will be launched to the destination. B. QoS Bee Routing Phases 1) Neighborhood connection discovery phase In this phase, each node informs its neighbors that the links are active. All nodes in the VANET broadcast a refresh packet periodically with its immediate neighbors. When a neighbor node receives the refresh packet, all route entries in its routes table regarding the sender will be consider as valid. If the node does not get information from the node’s neighbor for specified amount of time, then the routing information in the routes table is marked as lost. In this case, the bandwidth and delay of the relevant entry will take the infinity value. Hence, an error scout packet is generated and sent to inform others of the link breakage. 2) Route discovery phase When one node is responsible to transmit data, it first checks whether the route is present in its routes table and the QoS requirements are satisfied. If this is a case and there is a sufficient forgers, the source node transmits the data. If there is no forager, data wait recruiting foragers. In the case of no QoS route exists, beehive generates and clones several forward scouts from one and unique forward scout. It launches and broadcasts them stochastically to its immediate neighbors. Stochastic broadcasting means the transmission of forward scouts to a limit percentage(=80%) of neighbor nodes. The cloned forward scouts have the same scout identifier, the beehive identifier, the food identifier and the maximum lifespan of the route request. Consequently, the current node checks
  • 6. International Journal of Current Trends in Engineering & Research (IJCTER) Volume 01, Issue 01; November – 2015 @IJCTER-2015, All rights Reserved 13 ` the QoS validity and thus, the route discovery is continued, else the exploration is denied and the forward scout will be dropped. If intermediate node has already received a forward scout with that same scout identifier and beehive identifier then it will discard it, else current node records in the routes table entry the forward scout identifier and the source node identifier at the prior hop field. It prevents from the duplication of scout. After that, it checks for available rout in its routes table, if any rout is found, it sends a backward scout to the source node along the reverse path; else it rebroadcasts stochastically the forward scout in the same manner such as the source node. In return, the backward scout records the next hop at the tables’ route entry to indicate its sender. After the backward scout arrives at the source node, the link weight is calculated and recorded at the routes table entry using the stamp field. Now, the source node recruits a number of forager according to the quality of the route discovered. Consequently, waiting data are sending using foragers. Note that the routes are selected to transmit simultaneous data according to the link weight factor. This will reduce the network congestion and then, increases the bandwidth and decreases the delay. The following diagrams figure 2. explain the route discovery phase. Figure 2 Route discovery phase diagrams (beehive, bees, food source) 3) Route maintenance phase In route maintenance phase in VANET, the periodic sending of refresh packet between node and its neighbors ensures the stability of connections and also the links safely in the transmission range of node. Otherwise, the node detects a link breaks and then, any route passing this broken link is considered disconnected. Besides, the node can detect a QoS requirements violation (bandwidth insufficiency or large delay). In these cases, the detector node of this failure sends an error scout to the source node via the prior hop and so on. The goal here is to inform any node in the reverse route about the broken link to remove it from its routes table and to rediscover a new QoS route by the source node if needed. VII. CONCLUSION Research and industries are recently more interesting and attracting to the VANET and MANET development domain. A vehicular ad hoc network (VANET) is a subclass of MANET. From this paper, we conclude that Bee Ad Hoc Network employs a simple bee behavior to monitor the validity of the routes. When compared to other algorithms the battery level of BeeAdHoc is better because it
  • 7. International Journal of Current Trends in Engineering & Research (IJCTER) Volume 01, Issue 01; November – 2015 @IJCTER-2015, All rights Reserved 14 ` tries to spread the data packets over different routes rather than always sending them on the best routes. This protocol is reactive, distributed and topology based protocol which provides QoS guarantees in VANET compare to AODV, DSDV such as end-to-end delay and bandwidth in VANET due to transmitting fewer control packets and by distributing data packets on multiple path. REFERENCES [1] D. B. Johnson, D. A. Maltz, and J. Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad hoc Networks,” Ad hoc Networking, edited by C. Perkins, Addison-Wesley, 2001, pp. 139-172. [2] F. Li, and Y. Wang, “Routing in vehicular ad hoc networks: A survey,” IEEE vehicular Technology Magazine, vol. 2, June 2007, pp. 12-22. [3] B. Karp, and H. T. Kung, “GPSR: greedy perimeter stateless routing for wireless networks,” MobiCom’00, Boston, USA, 2000, pp. 243-254.6. [4] C. Lochert, M. Mauve, H. Fusler, and H. Hartenstein, “Geographic routing in city scenarios,” ACM SIGMOBILE Mobile Computing and Communications Review, 2005, pp. 69-72. [5] S. Bitam, M. Batouche, E-G. Talbi, “ A survey on bee colony algorithms,” 24th IEEE International Parallel and Distributed Processing Symposium, NIDISC Workshop, Atlanta, Georgia, USA, 2010, pp. 1-8.