SlideShare a Scribd company logo
Bulletin of Electrical Engineering and Informatics
ISSN: 2302-9285
Vol. 6, No. 1, March 2017, pp. 88~98, DOI: 10.11591/eei.v6i1.574  88
Received November 6, 2016; Revised January 6, 2017; Accepted January 20, 2017
Routing in Networks using Genetic Algorithm
Meenakshi Moza*, Suresh Kumar
CSE Department, F.E.T., Manav Rachna International University, India
*Corresponding author, email: meenakshi.fet@mriu.edu.in
Abstract
With the increase in traffic, internet service providers are trying their best to provide maximum
utilization of resources available. The current traffic load has to be taken into account for computation of
paths in routing protocols. Network applications; require the shortest paths to be used for communication
purposes. Addressing the selection of path, from a known source to destination is the basic aim of this
paper. This paper proposes a method of calculating the shortest path for a network using a combination of
Open shortest path first and Genetic Algorithm (OSGA). Genetic Algorithm is used in this paper for
optimization of routing. It helps in enhancing the performance of the routers.
Keywords: genetic algorithm, open shortest path first, quality of service, chromosome, mutation, routing
1. Introduction
Computer Network is a collection of autonomous computers interconnected for the
purpose of communication and resource sharing [1]. The interconnection can be done using the
public telephone network, dedicated leased lines or any other medium. The transmission media
used for interconnection may be wired or wireless. The demands of users of computer networks
are changing very fast. They want information anytime, anywhere. The networks are not only
used for merely transferring data, but also for other applications like audio and video
conversation, video streaming, etc. These applications have special requirements in terms of
reliability, bandwidth, jitter, delay etc. The network should possess these qualities for satisfying
the demands of the users.
Routing is a selection of the best path for packets to traverse in a network [2-4].
Selection of the path means to apply a routing metric like hop count, delay, bandwidth, for the
evaluation of a path, which is best for a packet to travel. Routing algorithms facilitate in the
determination of the path [5]. They help in initialization and maintenance of routing tables, which
contain routing information. When a packet is received by a router, the destination address is
checked and it is the duty of routing algorithm for association of this destination address with the
next hop. Routing tables are built, using a lot of routing algorithms which help to find the path
from source to destination. Open Shortest Path First (OSPF) is one such link state routing
algorithm, which helps us to find the shortest path between each source & destination [6-9].
OSPF can run on most routers and makes use of shortest path first (SPF) algorithm developed
by Dijkstra. The basic steps carried out in OSPF are as follows:
a. Step 1: The routers are synchronized by exchanging the hello packets.
b. Step 2: The topology of the network is shared by exchanging link state packets.
c. Step 3: Each router then creates a shortest path tree from the topology information received
in the step 2.
The limitation in case of OSPF is overloading, in the shortest path. The arrival of the
packets at the desired destination with the delay or queuing on the way or router processing can
result in service quality being affected. All these limitations can be taken care of, by optimization
of the IP network [10-12]. It can therefore be safely said that the basis of planning and
managing networks is routing optimization which is achieved by applying GA to the network. In
this paper, it is proposed to extend OSPF by applying GA on OSPF resulting in the Open
shortest genetic algorithm (OSGA). Here, a potential solution to the problem are encoded in a
Bulletin of EEI ISSN: 2302-9285 
Routing in Networks using Genetic Algorithm (Meenakshi Moza)
89
way that the computer can process. The easiest way is to encode solutions as binary
sequences of 0’s and 1’s which has been adopted in this paper [13-16].
This paper is organized into five sections. Section 1 provides the introduction to routing.
Section 2 discusses the literature review. Section 3 talks about network analysis using GA.
Section 4 deals with the performance evaluation in terms of methodology adopted and how NS3
is used for analyzing the behavior of the network under consideration. Also it talks about the
variations of certain parameters for the routing protocols under consideration. In other words,
this section comprises the complete result analysis. Section 5 discusses the conclusions drawn
and the future scope.
2. Literature Review
M. Goyal et al. (2006) state that a tradeoff is required between load processing, traffic
control and speed, after re convergence, due to the change in topology. Because of the nature
and size of networks being served by OSPF has changed, therefore there is a requirement for
reevaluation of OSPF. In order to modify OSPF, we cannot increase load on routers because
overloading of Central Processing Unit (CPU) results in routing instability of networks. In this
paper, an environment which is broadcast and Local Area Network (LAN) in nature is taken and
it is seen that many Designated Router (DR) elections are required by a router before settling on
the DR, Backup Designated router (BDR) identification. The reason for this is given as, that
routers before being able to establish communication which is bidirectional in nature, are out of
the wait state. Also more than one router can initially elect itself as BDR, so many DR elections
take place and then the routers later give it up. In addition to this, a forty second wait time
results in settling process of the DR / BDR to get delayed. Certain modifications are put forward
in this paper to remove the above limitations. The first change is to restart wait timer as soon as
a hello message (one way) is obtained. The next change is for wait timer to have a value so that
the router can have bidirectional communication with that neighbor, who had sent a hello
message which had restarted the wait timer. Also for a router which is not in a wait state, it
should be possible to avoid DR elections, if it establishes bidirectional communication, when
some of its neighbors are not bidirectional. This is possible by introducing a new wait 2 state.
The last modification required is that on being elected a DR / BDR, a router should send a hello
message immediately so that everybody knows about it.
M. Goyal et al. (2011) states the steps required to improve the scalability and
convergence in OSPF. They further discuss that, recovering from a network failure in original
OSPF, would take tens of seconds, but in real time, applications like Voice Over Internet
Protocol, used now, the breakdown of a network for such a length of time is not possible. The
paper has carried out an extensive survey and found out that, in case of topology change, fast
convergence is the talk of the day and the below mentioned steps need to be carried out to fulfill
the same. The first step is detection of failure at a faster rate. The next step is establishing
adjacencies, lesser in number, but faster in speed. The third step is optimization in generating
link state advertisements and the last step is optimization in calculating routing tables. The
paper also stated that, the changes that are to be incorporated in the operation of OSPF, should
not result in compromising the correctness of the protocol in any improbable scenario also.
M. Shand et al. (2013) in this paper, describe a technique which can be used in
combination with link state protocols for prevention of transient loops. The technique consists of,
formation of correct sequence, of the updates of forwarding information base (FIB) on routers.
They further state in the paper that whenever a router shutdown occurs, any router R1 should
not update its forwarding information base till all the other routers which are sending traffic
through R1 and the router that has been shut down, have updation of their FIB’s. Also, they
describe, that when a router is put to service, any router R2 has to update its FIB, before all
those routers which will use R2 to reach the affected router. They further analyzed and listed the
steps required to apply updation of the FIB. The first step is deduction of change in topology
followed by the decision as to whether updates of ordered FIB apply. The next step is to
compute the order that is computation of rank by a router which helps in the determination of the
time at which FIB update can be performed. The last step is to accelerate the ordered
convergence. This is comprised of usage of completion messages to increase the speed of
convergence. This is done by means of a router which informs all the routers about completion
of changes of FIB. So the routers can go for updation of their FIB with less of delay. A wait list of
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88
90
neighbors from whom completion messages are to be received is chalked out. The router
removes the neighbor from the waitlist as soon as its completion message is received. As soon
as a router has an empty waiting list, it can update its FIB. It is also mentioned in this paper that
the technique for prevention of transient loops can be used when single and also multiple
topology changes occur.
Y. Fadil (2010) states that evaluation of each path is done on the basis of cost (shortest
path) to find the routes in most of routing algorithms. In case of overloading or congestion taking
place in the shortest path, optimization based on other parameters needs to be carried out to
get better solutions. Genetic Algorithm (GA) is an optimization algorithm and Fadil puts forward
a genetic algorithm. The basic solution lies here in providing alternative paths instead of
overloaded paths so that there is better utilization of network resources and thereby improved
QOS. The chromosomes of varying length and their genes are used for encoding purposes.
Crossover and mutation provide a searching facility giving an improvement in solution quality
and increased speed of convergence.
H. Ahmed (2010) describes a genetic algorithm for finding k shortest paths from a single
source to multiple destination nodes. He presents the algorithm in terms of the connection
matrix of the network analyzed and makes use of link bandwidth for determination of k shortest
paths. He applies the algorithm to two networks comprising of 8 nodes and 20 nodes
respectively, and calculates the k shortest paths for each destination node in both cases. He
further states that in order to find k shortest paths with bandwidth constraint, all the paths from
source to destination have to satisfy the condition that the bandwidth of the requisite path has to
be greater than or equal to user defined bandwidth. By plotting a graph between k shortest
paths and mutation probability, Ahmed proves that number of K shortest paths decrease with a
decrease in mutation probability.
3. Network Analysis Using GA (RESEARCH METHOD)
The below mentioned steps are carried out in optimization of network using GA.
Step 1: The network represented by nodes is formulated by means of a graph and assignment
of cost, to a link that connects two nodes, is done randomly. The source and the destination
nodes are chosen to generate all the paths between desired nodes. Whenever cost = ∞, it
indicates there is no link connecting the two nodes. Figure 1 represents the network analyzed
and Table 1 gives the detailed network link cost.
Figure 1. The network to be analyzed
Table 1. Network Link Cost
1 2 3 4 5 6
1 ∞ 2 5 7 ∞ ∞
2 2 ∞ ∞ 3 ∞ ∞
3 5 ∞ ∞ 3 4 ∞
4 7 3 3 ∞ ∞ 2
5 ∞ ∞ 4 ∞ ∞ 2
6 ∞ ∞ ∞ 2 2 ∞
Bulletin of EEI ISSN: 2302-9285 
Routing in Networks using Genetic Algorithm (Meenakshi Moza)
91
Figure 2. Most Optimized Route
Step 2: Coding of individuals is composed of m strings. Each ei represents the distance
between nodes where i = 1, 2, 3…m. Let e12 = 2, e24 = 3, e34 = 3, e13 = 5, e14 = 7, e46 = 2, e56 =
2, e35 = 4.
Step 3: Minimum distance from source to destination with continuity comprises the fitness
function.
Step 4: Selection of initial population is the next step. This is randomly generated based on the
distance between nodes. As mentioned earlier coding of individuals is composed of m strings
where m = 3, 4, 5…. Here the value of m is assumed to be 3. Distance is coded in 4 bit strings
and the total string length = 4*3 = 12 bits. Take an example of 4 candidates or individuals as
initial population.
a) e24(3) e13(5) e34(3)
b) e12(2) e35(4) e14(7)
c) e13(5) e46(2) e35(4)
d) e56(2) e34(3) e12(2)
Sum of edges for a) = 11
Sum of edges for b) = 13
Sum of edges for c) = 11
Sum of edges for d) = 7
Step 5: Apply two point crossover after third and eighth bit, on the initial population.
Before crossover, randomly generated individuals /candidates are as follows:
8421 8421 8421 Sum of edges:
a) 0011 0101 0011 11
b) 0010 0100 0111 13
c) 0101 0010 0100 11
d) 0010 0011 0010 7
After, applying two point crossover, the individuals obtained are as follows:
8421 8421 8421 Sum of edges
a) 0010 0100 0011 9
b) 0011 0101 0111 15
c) 0100 0011 0100 11
d) 00110010 0010 7
Step 6: Mutation is implemented by replacing first four bits with source and the last four bits with
destination node values. For the network under consideration, node 1 is the source node and
node 6 is the destination node. Lowest weight associated with both is 2. Therefore, replacing
both by 0010. Hence the new set of individuals obtained are as follows
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88
92
8421 8421 8421 Sum of edges
a) 0010 0100 0010 8
b) 0010 0101 0010 9
c) 0010 0011 0010 7
d) 0010 0010 0010 6
Step 7: As already specified earlier, the fitness function = min _ ei with continuity. After mutation
the minimum path length from source to destination, that is, from node 1 to node 6 is case d
above which is written as follows:
0010 0010 0010
This can be decoded as the path node 12 to node 46 to node 56. But this is not a
continuous path. After many iterations we get the minimum path length with continuity as
follows:
0010 0011 0010
which, can be decoded as the path node 12 to node 24 to node 46. This is the most optimal path
as shown in figure 2.
4. Performance Evaluation
We have applied genetic algorithm to overcome the problems of OSPF. The genetic
algorithm is integrated with OSPF resulting in OSGA. The process flow of OSGA is shown in
Figure 3. The performance analysis of OSPF and OSGA is carried out using NS3, a software
tool. NS3 is an event driven simulator used for simulating wired and wireless networks. It is
used to analyze the behavior of networks. The topology used to study the performance of OSPF
and OSGA is shown in Figure 4. We have taken 25 nodes, spread uniformly in the rectangular
area.
Bulletin of EEI ISSN: 2302-9285 
Routing in Networks using Genetic Algorithm (Meenakshi Moza)
93
Figure 3. Flow chart of OSGA
Figure 4. Topology of 25 nodes considered for optimization of route
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88
94
The focus of the simulation is to study the effect of varying the packet sizes, on
throughput, packet delivery ratio, packet loss and delay summarized as QOS parameters, for
the routing protocols, namely OSPF and OSGA as shown in Tables 2 and 3 for the topology of 6
nodes, Tables 4 and 5 for the topology of 17 nodes and Tables 6 and 7 for the topology of 25
nodes. From the experimental results, it is observed that, as the packet size increases, the
number of packets sent and received decreases in the two configurations.
Table 2. QOS Parameter values for OSPF (6 nodes)
PKT.
SIZE
THROUGHPUT
(Kbps)
PKTS.
SENT
PKTS.
RECD.
PDR %
PKT.
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 22915.6 14687 14666 99.8570164 21 7.19521 2.3984
400 22915.6 7343 7333 99.8638159 10 7.20049 2.40016
600 22912.5 4895 4888 99.8569969 7 7.2048 2.4016
800 22912.5 3671 3666 99.8637973 5 7.21008 2.40336
1000 22914.1 2937 2933 99.8638066 4 7.21487 2.40496
Table 3. QOS Parameter values for OSGA (6 nodes)
PKT.
SIZE
THROUGHPUT
(Kbps)
PKTS.
SENT
PKTS.
RECD.
PDR %
PKT
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 24389.1 15624 15609 99.9039939 15 4.8009 1.6003
400 24389.7 7812 7804 99.8975934 8 4.80539 1.6018
600 24389.1 5208 5203 99.9039939 5 4.81049 1.6035
800 24387.5 3906 3902 99.8975934 4 4.81498 1.60499
1000 24382.8 3124 3121 99.9039693 3 4.82008 1.60669
Table 4. QOS Parameter values for OSPF (17 nodes)
PKT.
SIZE
THROUGHPUT
(Kbps)
PKTS.
SENT
PKTS.
RECD.
PDR %
PACKET
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 28883 16234 16215 99.8829617 19 5.93856 1.97952
400 27107.8 8117 8107 99.8768018 10 5.94298 1.98099
600 26518.3 5411 5405 99.8891148 6 5.94851 1.98284
800 26217.8 4058 4053 99.8767866 5 5.95257 1.98419
1000 26045.3 3246 3243 99.9075786 3 5.9592 1.9864
Table 5. QOS Parameter values for OSGA (17 nodes)
PKT.
SIZE
THROUGHPUT
(Kbps)
PKTS.
SENT
PKTS.
RECD.
PDR %
PACKET
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 29474.3 17468 16547 94.72750 1921 31.922 10.6407
400 29170.9 8734 8724 99.885504 10 5.40412 1.80137
600 28534.8 5822 5816 99.8969426 6 5.40954 1.80318
800 28216.7 4367 4362 99.8855049 5 5.41371 1.80457
1000 28021 3493 3489 99.8854853 4 5.4185 1.80617
Table 6. QOS Parameter values for OSPF (25 nodes)
PKT.
SIZE
THROUGHPUT
(Kbps)
PKTS.
SENT
PKTS.
RECD.
PDR %
PACKET
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 29463.7 17906 16541 92.3768569 1365 33.2943 11.0981
400 29893.1 8953 8940 99.8547973 13 7.19984 2.39995
600 29241.2 5968 5960 99.8659517 8 7.20544 2.40181
800 28915.3 4476 4470 99.8659517 6 7.21024 2.40341
1000 28719.8 3581 3576 99.8603742 5 7.21463 2.40488
Table 7. QOS Parameter values for OSGA (25 nodes)
PKT
SIZE
THROUGHPUT
(Kbps)
PKT
SENT
PKTS.
RECD.
PDR %
PACKET
LOSS
TOTAL
DELAY (ms)
JITTER
(ms)
200 29474.3 19343 16547 85.545158 2796 29.7951 9.93169
400 32304 9671 9661 99.896598 10 5.40472 1.80157
600 31596.2 6447 6440 99.891422 7 5.40924 1.80308
800 31244.1 4835 4830 99.896587 5 5.41431 1.80477
1000 31032.8 3868 3864 99.896587 4 5.41911 1.80637
Bulletin of EEI ISSN: 2302-9285 
Routing in Networks using Genetic Algorithm (Meenakshi Moza)
95
Further, throughput is higher in OSGA as compared to OSPF as shown in figures 5, 6, 7
for 6, 17, and 25 nodes respectively. Packet loss in OSGA is less than OSPF as shown in
figures 8, 9, 10 for 6, 17 and 25 nodes respectively. As the packet loss is less in OSGA
technique, it is therefore OSGA which can be used in future.
Figure 5. Packet size vs Throughput (6 nodes)
Figure 6. Packet size vs Throughput (17
nodes)
Figure 7. Packet size vs Throughput (25
nodes)
Figure 8. Packet size vs Packet loss (6 nodes)
Figure 9. Packet size vs Packet loss (17
nodes)
Figure 10. Packet size vs Packet loss (25
nodes)
Delay and jitter values are smaller in OSGA as compared to OSPF. The reason for this
is, a high reconvergence time in case of OSPF. The delay and jitter values for both the protocols
are shown in figures 11, 12, 13, and figures 14, 15, 16 for 6, 17, 25 nodes respectively. All the
above results confirm the fact that OSGA gives a better optimal path for sending packets of data
into a network.
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88
96
Figure 11. Packet size vs Delay (6 nodes) Figure 12. Packet size vs Delay (17 nodes)
Figure 13. Packet size vs Delay (25 nodes) Figure 14. Packet size vs Jitter (6 nodes)
Figure 15. Packet size vs Jitter (17 nodes) Figure 16. Packet size vs Jitter (25 nodes)
The packet delivery ratio is higher in OSGA as compared to OSPF for all packet sizes in
6 node topology as shown in Figure 17. As we go for 17 and 25 node topology, the packet
delivery ratio, for packet size of 200 bytes is smaller, in OSGA as compared to OSPF. The
reason for this is very high packet loss in this particular case. For all other packet sizes, in 17
and 25 node topology, the packet delivery ratio is same for the two protocols OSPF and OSGA
as shown in figures 18 and 19.
Figure 17. Packet size vs Packet delivery ratio
(6 nodes)
Figure 18. Packet size vs Packet delivery ratio
(17 nodes)
Bulletin of EEI ISSN: 2302-9285 
Routing in Networks using Genetic Algorithm (Meenakshi Moza)
97
Figure 19. Packet size vs Packet delivery ratio (25 nodes)
After studying all the parameters it can be said that OSGA seems to be a better
technique, for finding the most optimal path for sending packets of data into a network.
5. Conclusion and Future Scope
This paper proposes the usage of GA in combination with OSPF (OSGA) for finding a
optimal path between source and destination. Length of chromosomes (paths) is dependent on
a number of existing nodes in the network [17-19]. The simulation is carried out in NS3
environment. This method can be used in the future for high speed networks. The results tell us
that by setting the GA parameters properly (Size of population, Number of generations), the
algorithm gives a better result than OSPF.
References
[1] Lee YO. Improving Efficiency and Effectiveness of Multipath Routing in Computer Networks (Doctoral
dissertation, Texas A&M University). 2012.
[2] Chandel GS, Gupta R, Kushwaha A. Implementation of Shortest Path in Packet Switching Network
Using Genetic Algo. International Journal of Advanced Research in Computer Science and Software
Engineering.
[3] Leung R, Liu J, Poon E, Chan AL, Li B. MP-DSR: A QoS-aware multi-path Dynamic Source Routing
Protocol for the Wireless Ad-hoc Networks. In Local Computer Networks, 2001. Proceedings. LCN.
26th Annual IEEE Conference. 2001: 132-141.
[4] Sharma S, Bhardwaj SK. Experimental Analysis of OLSR and DSDV Protocols on NS-2.35 in Mobile
Ad-Hoc Networks. International Journal of Computer Network and Information Security. Jul 1 2015;
7(8): 21.
[5] Al-Ghazal M, El-Sayed A, Kelash H. Routing Optimization using Genetic Algorithm in Ad hoc
Networks. In 2007 IEEE International Symposium on Signal Processing and Information Technology
Dec 15 2007: 497-503.
[6] Ren W, Kang C, Li Y, Gong L. Chaotic Immune Genetic Hybrid Algorithms and Its Application.
Indonesian Journal of Electrical Engineering and Computer Science. Feb 1 2013; 11(2): 975-84.
[7] Goyal M, Soperi M, Baccelli E, Choudhury G, Shaikh A, Hosseini H, Trivedi K. Improving
Convergence Speed and Scalability in OSPF: A survey. IEEE Communications Surveys & Tutorials.
Apr 2 2012; 14(2): 443-63.
[8] Goyal M, Xie W, Hosseini SH, Vairavan K, Rohm D. Improving OSPF dynamics on a broadcast LAN.
Simulation. Feb 1 2006; 82(2): 107-29.
[9] Shand M, Bryant S, Previdi S, Filsfils C, Francois P, Bonaventure O. Framework for Loop-free
Convergence using the Ordered Forwarding Information Base (ofib) approach. 2013.
[10] Obeidat A, Ebed M. Improving the Performance of Networks using Genetic Algorithm. Proc. of the
International Conf. on Advances in Computer and Information Technology, ACIT, 2012.
[11] Sooda K, Nair TR. A Comparative Analysis for Determining the Optimal Path using PSO and GA.
arXiv preprint arXiv 1407.5327. Jul 20 2014.
[12] Kavitha R, Anusuya V. Genetic algorithm for Finding Shortest Test Path in Networks. International
Journal of Fuzzy Mathematical Archive. 2013; (2): 43–48.
[13] Fadil YA. Routing using Genetic Algorithm for large Networks. Diyala Journal of Engineering
Sciences. Dec 2010; 3(02). 53-70.
[14] Krishna G, Pandey NK, Bajpai S. Optimal Path Routing in Variable Data Network using Genetic
Algorithm. International Journal of Engineering Science and Humanities. 2012.
[15] Kumar R, Kumar M. Exploring Genetic algorithm for Shortest Path Optimization in Data Networks.
Global Journal of Computer Science and Technology. Oct 25 2010; 10(11).
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88
98
[16] Hassan M, Younes A, Hassan MR, Abdo H. Solving the File Allocation Problem in the Distributed
Networks by UsingGenetic Algorithms. International Journal of Information and Network Security. Jan
1 2013; 2(1):109.
[17] Baboo SS, Narasimhan B. Genetic Algorithm Based Congestion Aware Routing Protocol (GA-CARP)
for Mobile Ad Hoc Networks. Procedia Technology. Dec 31 2012; 4: 177-81.
[18] Hamed AY. A Genetic Algorithm for finding the K Shortest Paths in a Network. Egyptian Informatics
Journal. Dec 31 2010; 11(2): 75-9.
[19] Moza M, Kumar S. Improving the Performance of Routing Protocol using Genetic Algorithm.
International Journal of Computer Network & Information Security. Jul 1 2016; 8(7).
BIOGRAPHIES OF AUTHORS
Meenakshi Moza born in Srinagar on 25th Jan 1965, did her B.E from R.E.C. Srinagar
(Kashmir) in Electronics and Communication. She completed her Mtech from Y.M.C.A
Faridabad. She is pursuing her Phd in the field of computer networks. She has 14 years
of experience in teaching and 8 years of experience in industry namely Onida, Avery
India. Total number of research publications are 14.
Dr. Suresh Kumar is a professor in M.R.I.U. His qualifications are as mentioned. Ph.D.
(Computer Science & Engg.), UGC NET(Computer Science & Engg), M.Tech.(
Computer Science & Engg.), B.Tech. (Computer Science & Engg.) He has 14 years of
teaching experience and his areas of interest include Networking, Operating systems,
Database management system. Total number of research publications are 31.

More Related Content

What's hot

Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
eSAT Publishing House
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
Dr. Amarjeet Singh
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
IRJET Journal
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission range
Alexander Decker
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANET
idescitation
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
eSAT Publishing House
 
A study on “link
A study on “linkA study on “link
A study on “link
prj_publication
 
19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n
IAESIJEECS
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
Editor IJCATR
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)
IISRT
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
idescitation
 
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
IJERA Editor
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
IAEME Publication
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
Saurabh Mishra
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
IJCNCJournal
 
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsFuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
CSCJournals
 

What's hot (18)

Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless NetworksThe Impact of Signal Strength over Routing Protocols in Wireless Networks
The Impact of Signal Strength over Routing Protocols in Wireless Networks
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission range
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
Analysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANETAnalysis of FSR, LANMAR and DYMO under MANET
Analysis of FSR, LANMAR and DYMO under MANET
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
 
A study on “link
A study on “linkA study on “link
A study on “link
 
19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n19 6 jul17 28apr 6576 8092-1-ed(edit)n
19 6 jul17 28apr 6576 8092-1-ed(edit)n
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)Iisrt aarthi ravindran (networks)
Iisrt aarthi ravindran (networks)
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
Extensive Reviews of OSPF and EIGRP Routing Protocols based on Route Summariz...
 
Improvement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanetImprovement over aodv routing protocol in vanet
Improvement over aodv routing protocol in vanet
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
The Extended Clustering Ad Hoc Routing Protocol (Ecrp)
 
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsFuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETs
 

Similar to Routing in Networks using Genetic Algorithm

Jm3516391646
Jm3516391646Jm3516391646
Jm3516391646
IJERA Editor
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
graphhoc
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
ijfcstjournal
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
ijfcstjournal
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
ijfcstjournal
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
IRJET Journal
 
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkAn Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
IJAAS Team
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
IJERA Editor
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
IJERA Editor
 
C0343015019
C0343015019C0343015019
C0343015019
ijceronline
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
IOSR Journals
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
IOSR Journals
 
Improvement in the mobility of mobile ipv6 based mobile networks using revers...
Improvement in the mobility of mobile ipv6 based mobile networks using revers...Improvement in the mobility of mobile ipv6 based mobile networks using revers...
Improvement in the mobility of mobile ipv6 based mobile networks using revers...
ijmnct
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
IRJET Journal
 
Ijetr021261
Ijetr021261Ijetr021261
Arun project-Final
Arun project-FinalArun project-Final
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
IOSR Journals
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
theijes
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IJCNCJournal
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
IAEME Publication
 

Similar to Routing in Networks using Genetic Algorithm (20)

Jm3516391646
Jm3516391646Jm3516391646
Jm3516391646
 
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
GRAPH THEORETIC ROUTING ALGORITHM (GTRA) FOR MOBILE AD-HOC NETWORKS (MANET)
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
 
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
CONGESTION CONTROL USING FUZZY BASED LSPS IN MULTIPROTOCOL LABEL SWITCHING NE...
 
The Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANETThe Hybrid AODV routing protocol for path establishment in MANET
The Hybrid AODV routing protocol for path establishment in MANET
 
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkAn Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
 
Bx4201493498
Bx4201493498Bx4201493498
Bx4201493498
 
Mq3624532158
Mq3624532158Mq3624532158
Mq3624532158
 
C0343015019
C0343015019C0343015019
C0343015019
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Improvement in the mobility of mobile ipv6 based mobile networks using revers...
Improvement in the mobility of mobile ipv6 based mobile networks using revers...Improvement in the mobility of mobile ipv6 based mobile networks using revers...
Improvement in the mobility of mobile ipv6 based mobile networks using revers...
 
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
Performance Analysis of Optimization Techniques for OLSR Routing Protocol for...
 
Ijetr021261
Ijetr021261Ijetr021261
Ijetr021261
 
Arun project-Final
Arun project-FinalArun project-Final
Arun project-Final
 
Routing protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation StudyRouting protocols in Ad-hoc Networks- A Simulation Study
Routing protocols in Ad-hoc Networks- A Simulation Study
 
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
Analytical Execution of Dynamic Routing Protocols For Video Conferencing Appl...
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
A detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks usingA detailed study of routing protocols for mobile ad hoc networks using
A detailed study of routing protocols for mobile ad hoc networks using
 

More from journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
journalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
journalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
journalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
journalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
journalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
journalBEEI
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
journalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
journalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
journalBEEI
 

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 

Recently uploaded

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 

Recently uploaded (20)

CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 

Routing in Networks using Genetic Algorithm

  • 1. Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 Vol. 6, No. 1, March 2017, pp. 88~98, DOI: 10.11591/eei.v6i1.574  88 Received November 6, 2016; Revised January 6, 2017; Accepted January 20, 2017 Routing in Networks using Genetic Algorithm Meenakshi Moza*, Suresh Kumar CSE Department, F.E.T., Manav Rachna International University, India *Corresponding author, email: meenakshi.fet@mriu.edu.in Abstract With the increase in traffic, internet service providers are trying their best to provide maximum utilization of resources available. The current traffic load has to be taken into account for computation of paths in routing protocols. Network applications; require the shortest paths to be used for communication purposes. Addressing the selection of path, from a known source to destination is the basic aim of this paper. This paper proposes a method of calculating the shortest path for a network using a combination of Open shortest path first and Genetic Algorithm (OSGA). Genetic Algorithm is used in this paper for optimization of routing. It helps in enhancing the performance of the routers. Keywords: genetic algorithm, open shortest path first, quality of service, chromosome, mutation, routing 1. Introduction Computer Network is a collection of autonomous computers interconnected for the purpose of communication and resource sharing [1]. The interconnection can be done using the public telephone network, dedicated leased lines or any other medium. The transmission media used for interconnection may be wired or wireless. The demands of users of computer networks are changing very fast. They want information anytime, anywhere. The networks are not only used for merely transferring data, but also for other applications like audio and video conversation, video streaming, etc. These applications have special requirements in terms of reliability, bandwidth, jitter, delay etc. The network should possess these qualities for satisfying the demands of the users. Routing is a selection of the best path for packets to traverse in a network [2-4]. Selection of the path means to apply a routing metric like hop count, delay, bandwidth, for the evaluation of a path, which is best for a packet to travel. Routing algorithms facilitate in the determination of the path [5]. They help in initialization and maintenance of routing tables, which contain routing information. When a packet is received by a router, the destination address is checked and it is the duty of routing algorithm for association of this destination address with the next hop. Routing tables are built, using a lot of routing algorithms which help to find the path from source to destination. Open Shortest Path First (OSPF) is one such link state routing algorithm, which helps us to find the shortest path between each source & destination [6-9]. OSPF can run on most routers and makes use of shortest path first (SPF) algorithm developed by Dijkstra. The basic steps carried out in OSPF are as follows: a. Step 1: The routers are synchronized by exchanging the hello packets. b. Step 2: The topology of the network is shared by exchanging link state packets. c. Step 3: Each router then creates a shortest path tree from the topology information received in the step 2. The limitation in case of OSPF is overloading, in the shortest path. The arrival of the packets at the desired destination with the delay or queuing on the way or router processing can result in service quality being affected. All these limitations can be taken care of, by optimization of the IP network [10-12]. It can therefore be safely said that the basis of planning and managing networks is routing optimization which is achieved by applying GA to the network. In this paper, it is proposed to extend OSPF by applying GA on OSPF resulting in the Open shortest genetic algorithm (OSGA). Here, a potential solution to the problem are encoded in a
  • 2. Bulletin of EEI ISSN: 2302-9285  Routing in Networks using Genetic Algorithm (Meenakshi Moza) 89 way that the computer can process. The easiest way is to encode solutions as binary sequences of 0’s and 1’s which has been adopted in this paper [13-16]. This paper is organized into five sections. Section 1 provides the introduction to routing. Section 2 discusses the literature review. Section 3 talks about network analysis using GA. Section 4 deals with the performance evaluation in terms of methodology adopted and how NS3 is used for analyzing the behavior of the network under consideration. Also it talks about the variations of certain parameters for the routing protocols under consideration. In other words, this section comprises the complete result analysis. Section 5 discusses the conclusions drawn and the future scope. 2. Literature Review M. Goyal et al. (2006) state that a tradeoff is required between load processing, traffic control and speed, after re convergence, due to the change in topology. Because of the nature and size of networks being served by OSPF has changed, therefore there is a requirement for reevaluation of OSPF. In order to modify OSPF, we cannot increase load on routers because overloading of Central Processing Unit (CPU) results in routing instability of networks. In this paper, an environment which is broadcast and Local Area Network (LAN) in nature is taken and it is seen that many Designated Router (DR) elections are required by a router before settling on the DR, Backup Designated router (BDR) identification. The reason for this is given as, that routers before being able to establish communication which is bidirectional in nature, are out of the wait state. Also more than one router can initially elect itself as BDR, so many DR elections take place and then the routers later give it up. In addition to this, a forty second wait time results in settling process of the DR / BDR to get delayed. Certain modifications are put forward in this paper to remove the above limitations. The first change is to restart wait timer as soon as a hello message (one way) is obtained. The next change is for wait timer to have a value so that the router can have bidirectional communication with that neighbor, who had sent a hello message which had restarted the wait timer. Also for a router which is not in a wait state, it should be possible to avoid DR elections, if it establishes bidirectional communication, when some of its neighbors are not bidirectional. This is possible by introducing a new wait 2 state. The last modification required is that on being elected a DR / BDR, a router should send a hello message immediately so that everybody knows about it. M. Goyal et al. (2011) states the steps required to improve the scalability and convergence in OSPF. They further discuss that, recovering from a network failure in original OSPF, would take tens of seconds, but in real time, applications like Voice Over Internet Protocol, used now, the breakdown of a network for such a length of time is not possible. The paper has carried out an extensive survey and found out that, in case of topology change, fast convergence is the talk of the day and the below mentioned steps need to be carried out to fulfill the same. The first step is detection of failure at a faster rate. The next step is establishing adjacencies, lesser in number, but faster in speed. The third step is optimization in generating link state advertisements and the last step is optimization in calculating routing tables. The paper also stated that, the changes that are to be incorporated in the operation of OSPF, should not result in compromising the correctness of the protocol in any improbable scenario also. M. Shand et al. (2013) in this paper, describe a technique which can be used in combination with link state protocols for prevention of transient loops. The technique consists of, formation of correct sequence, of the updates of forwarding information base (FIB) on routers. They further state in the paper that whenever a router shutdown occurs, any router R1 should not update its forwarding information base till all the other routers which are sending traffic through R1 and the router that has been shut down, have updation of their FIB’s. Also, they describe, that when a router is put to service, any router R2 has to update its FIB, before all those routers which will use R2 to reach the affected router. They further analyzed and listed the steps required to apply updation of the FIB. The first step is deduction of change in topology followed by the decision as to whether updates of ordered FIB apply. The next step is to compute the order that is computation of rank by a router which helps in the determination of the time at which FIB update can be performed. The last step is to accelerate the ordered convergence. This is comprised of usage of completion messages to increase the speed of convergence. This is done by means of a router which informs all the routers about completion of changes of FIB. So the routers can go for updation of their FIB with less of delay. A wait list of
  • 3.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88 90 neighbors from whom completion messages are to be received is chalked out. The router removes the neighbor from the waitlist as soon as its completion message is received. As soon as a router has an empty waiting list, it can update its FIB. It is also mentioned in this paper that the technique for prevention of transient loops can be used when single and also multiple topology changes occur. Y. Fadil (2010) states that evaluation of each path is done on the basis of cost (shortest path) to find the routes in most of routing algorithms. In case of overloading or congestion taking place in the shortest path, optimization based on other parameters needs to be carried out to get better solutions. Genetic Algorithm (GA) is an optimization algorithm and Fadil puts forward a genetic algorithm. The basic solution lies here in providing alternative paths instead of overloaded paths so that there is better utilization of network resources and thereby improved QOS. The chromosomes of varying length and their genes are used for encoding purposes. Crossover and mutation provide a searching facility giving an improvement in solution quality and increased speed of convergence. H. Ahmed (2010) describes a genetic algorithm for finding k shortest paths from a single source to multiple destination nodes. He presents the algorithm in terms of the connection matrix of the network analyzed and makes use of link bandwidth for determination of k shortest paths. He applies the algorithm to two networks comprising of 8 nodes and 20 nodes respectively, and calculates the k shortest paths for each destination node in both cases. He further states that in order to find k shortest paths with bandwidth constraint, all the paths from source to destination have to satisfy the condition that the bandwidth of the requisite path has to be greater than or equal to user defined bandwidth. By plotting a graph between k shortest paths and mutation probability, Ahmed proves that number of K shortest paths decrease with a decrease in mutation probability. 3. Network Analysis Using GA (RESEARCH METHOD) The below mentioned steps are carried out in optimization of network using GA. Step 1: The network represented by nodes is formulated by means of a graph and assignment of cost, to a link that connects two nodes, is done randomly. The source and the destination nodes are chosen to generate all the paths between desired nodes. Whenever cost = ∞, it indicates there is no link connecting the two nodes. Figure 1 represents the network analyzed and Table 1 gives the detailed network link cost. Figure 1. The network to be analyzed Table 1. Network Link Cost 1 2 3 4 5 6 1 ∞ 2 5 7 ∞ ∞ 2 2 ∞ ∞ 3 ∞ ∞ 3 5 ∞ ∞ 3 4 ∞ 4 7 3 3 ∞ ∞ 2 5 ∞ ∞ 4 ∞ ∞ 2 6 ∞ ∞ ∞ 2 2 ∞
  • 4. Bulletin of EEI ISSN: 2302-9285  Routing in Networks using Genetic Algorithm (Meenakshi Moza) 91 Figure 2. Most Optimized Route Step 2: Coding of individuals is composed of m strings. Each ei represents the distance between nodes where i = 1, 2, 3…m. Let e12 = 2, e24 = 3, e34 = 3, e13 = 5, e14 = 7, e46 = 2, e56 = 2, e35 = 4. Step 3: Minimum distance from source to destination with continuity comprises the fitness function. Step 4: Selection of initial population is the next step. This is randomly generated based on the distance between nodes. As mentioned earlier coding of individuals is composed of m strings where m = 3, 4, 5…. Here the value of m is assumed to be 3. Distance is coded in 4 bit strings and the total string length = 4*3 = 12 bits. Take an example of 4 candidates or individuals as initial population. a) e24(3) e13(5) e34(3) b) e12(2) e35(4) e14(7) c) e13(5) e46(2) e35(4) d) e56(2) e34(3) e12(2) Sum of edges for a) = 11 Sum of edges for b) = 13 Sum of edges for c) = 11 Sum of edges for d) = 7 Step 5: Apply two point crossover after third and eighth bit, on the initial population. Before crossover, randomly generated individuals /candidates are as follows: 8421 8421 8421 Sum of edges: a) 0011 0101 0011 11 b) 0010 0100 0111 13 c) 0101 0010 0100 11 d) 0010 0011 0010 7 After, applying two point crossover, the individuals obtained are as follows: 8421 8421 8421 Sum of edges a) 0010 0100 0011 9 b) 0011 0101 0111 15 c) 0100 0011 0100 11 d) 00110010 0010 7 Step 6: Mutation is implemented by replacing first four bits with source and the last four bits with destination node values. For the network under consideration, node 1 is the source node and node 6 is the destination node. Lowest weight associated with both is 2. Therefore, replacing both by 0010. Hence the new set of individuals obtained are as follows
  • 5.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88 92 8421 8421 8421 Sum of edges a) 0010 0100 0010 8 b) 0010 0101 0010 9 c) 0010 0011 0010 7 d) 0010 0010 0010 6 Step 7: As already specified earlier, the fitness function = min _ ei with continuity. After mutation the minimum path length from source to destination, that is, from node 1 to node 6 is case d above which is written as follows: 0010 0010 0010 This can be decoded as the path node 12 to node 46 to node 56. But this is not a continuous path. After many iterations we get the minimum path length with continuity as follows: 0010 0011 0010 which, can be decoded as the path node 12 to node 24 to node 46. This is the most optimal path as shown in figure 2. 4. Performance Evaluation We have applied genetic algorithm to overcome the problems of OSPF. The genetic algorithm is integrated with OSPF resulting in OSGA. The process flow of OSGA is shown in Figure 3. The performance analysis of OSPF and OSGA is carried out using NS3, a software tool. NS3 is an event driven simulator used for simulating wired and wireless networks. It is used to analyze the behavior of networks. The topology used to study the performance of OSPF and OSGA is shown in Figure 4. We have taken 25 nodes, spread uniformly in the rectangular area.
  • 6. Bulletin of EEI ISSN: 2302-9285  Routing in Networks using Genetic Algorithm (Meenakshi Moza) 93 Figure 3. Flow chart of OSGA Figure 4. Topology of 25 nodes considered for optimization of route
  • 7.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88 94 The focus of the simulation is to study the effect of varying the packet sizes, on throughput, packet delivery ratio, packet loss and delay summarized as QOS parameters, for the routing protocols, namely OSPF and OSGA as shown in Tables 2 and 3 for the topology of 6 nodes, Tables 4 and 5 for the topology of 17 nodes and Tables 6 and 7 for the topology of 25 nodes. From the experimental results, it is observed that, as the packet size increases, the number of packets sent and received decreases in the two configurations. Table 2. QOS Parameter values for OSPF (6 nodes) PKT. SIZE THROUGHPUT (Kbps) PKTS. SENT PKTS. RECD. PDR % PKT. LOSS TOTAL DELAY (ms) JITTER (ms) 200 22915.6 14687 14666 99.8570164 21 7.19521 2.3984 400 22915.6 7343 7333 99.8638159 10 7.20049 2.40016 600 22912.5 4895 4888 99.8569969 7 7.2048 2.4016 800 22912.5 3671 3666 99.8637973 5 7.21008 2.40336 1000 22914.1 2937 2933 99.8638066 4 7.21487 2.40496 Table 3. QOS Parameter values for OSGA (6 nodes) PKT. SIZE THROUGHPUT (Kbps) PKTS. SENT PKTS. RECD. PDR % PKT LOSS TOTAL DELAY (ms) JITTER (ms) 200 24389.1 15624 15609 99.9039939 15 4.8009 1.6003 400 24389.7 7812 7804 99.8975934 8 4.80539 1.6018 600 24389.1 5208 5203 99.9039939 5 4.81049 1.6035 800 24387.5 3906 3902 99.8975934 4 4.81498 1.60499 1000 24382.8 3124 3121 99.9039693 3 4.82008 1.60669 Table 4. QOS Parameter values for OSPF (17 nodes) PKT. SIZE THROUGHPUT (Kbps) PKTS. SENT PKTS. RECD. PDR % PACKET LOSS TOTAL DELAY (ms) JITTER (ms) 200 28883 16234 16215 99.8829617 19 5.93856 1.97952 400 27107.8 8117 8107 99.8768018 10 5.94298 1.98099 600 26518.3 5411 5405 99.8891148 6 5.94851 1.98284 800 26217.8 4058 4053 99.8767866 5 5.95257 1.98419 1000 26045.3 3246 3243 99.9075786 3 5.9592 1.9864 Table 5. QOS Parameter values for OSGA (17 nodes) PKT. SIZE THROUGHPUT (Kbps) PKTS. SENT PKTS. RECD. PDR % PACKET LOSS TOTAL DELAY (ms) JITTER (ms) 200 29474.3 17468 16547 94.72750 1921 31.922 10.6407 400 29170.9 8734 8724 99.885504 10 5.40412 1.80137 600 28534.8 5822 5816 99.8969426 6 5.40954 1.80318 800 28216.7 4367 4362 99.8855049 5 5.41371 1.80457 1000 28021 3493 3489 99.8854853 4 5.4185 1.80617 Table 6. QOS Parameter values for OSPF (25 nodes) PKT. SIZE THROUGHPUT (Kbps) PKTS. SENT PKTS. RECD. PDR % PACKET LOSS TOTAL DELAY (ms) JITTER (ms) 200 29463.7 17906 16541 92.3768569 1365 33.2943 11.0981 400 29893.1 8953 8940 99.8547973 13 7.19984 2.39995 600 29241.2 5968 5960 99.8659517 8 7.20544 2.40181 800 28915.3 4476 4470 99.8659517 6 7.21024 2.40341 1000 28719.8 3581 3576 99.8603742 5 7.21463 2.40488 Table 7. QOS Parameter values for OSGA (25 nodes) PKT SIZE THROUGHPUT (Kbps) PKT SENT PKTS. RECD. PDR % PACKET LOSS TOTAL DELAY (ms) JITTER (ms) 200 29474.3 19343 16547 85.545158 2796 29.7951 9.93169 400 32304 9671 9661 99.896598 10 5.40472 1.80157 600 31596.2 6447 6440 99.891422 7 5.40924 1.80308 800 31244.1 4835 4830 99.896587 5 5.41431 1.80477 1000 31032.8 3868 3864 99.896587 4 5.41911 1.80637
  • 8. Bulletin of EEI ISSN: 2302-9285  Routing in Networks using Genetic Algorithm (Meenakshi Moza) 95 Further, throughput is higher in OSGA as compared to OSPF as shown in figures 5, 6, 7 for 6, 17, and 25 nodes respectively. Packet loss in OSGA is less than OSPF as shown in figures 8, 9, 10 for 6, 17 and 25 nodes respectively. As the packet loss is less in OSGA technique, it is therefore OSGA which can be used in future. Figure 5. Packet size vs Throughput (6 nodes) Figure 6. Packet size vs Throughput (17 nodes) Figure 7. Packet size vs Throughput (25 nodes) Figure 8. Packet size vs Packet loss (6 nodes) Figure 9. Packet size vs Packet loss (17 nodes) Figure 10. Packet size vs Packet loss (25 nodes) Delay and jitter values are smaller in OSGA as compared to OSPF. The reason for this is, a high reconvergence time in case of OSPF. The delay and jitter values for both the protocols are shown in figures 11, 12, 13, and figures 14, 15, 16 for 6, 17, 25 nodes respectively. All the above results confirm the fact that OSGA gives a better optimal path for sending packets of data into a network.
  • 9.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88 96 Figure 11. Packet size vs Delay (6 nodes) Figure 12. Packet size vs Delay (17 nodes) Figure 13. Packet size vs Delay (25 nodes) Figure 14. Packet size vs Jitter (6 nodes) Figure 15. Packet size vs Jitter (17 nodes) Figure 16. Packet size vs Jitter (25 nodes) The packet delivery ratio is higher in OSGA as compared to OSPF for all packet sizes in 6 node topology as shown in Figure 17. As we go for 17 and 25 node topology, the packet delivery ratio, for packet size of 200 bytes is smaller, in OSGA as compared to OSPF. The reason for this is very high packet loss in this particular case. For all other packet sizes, in 17 and 25 node topology, the packet delivery ratio is same for the two protocols OSPF and OSGA as shown in figures 18 and 19. Figure 17. Packet size vs Packet delivery ratio (6 nodes) Figure 18. Packet size vs Packet delivery ratio (17 nodes)
  • 10. Bulletin of EEI ISSN: 2302-9285  Routing in Networks using Genetic Algorithm (Meenakshi Moza) 97 Figure 19. Packet size vs Packet delivery ratio (25 nodes) After studying all the parameters it can be said that OSGA seems to be a better technique, for finding the most optimal path for sending packets of data into a network. 5. Conclusion and Future Scope This paper proposes the usage of GA in combination with OSPF (OSGA) for finding a optimal path between source and destination. Length of chromosomes (paths) is dependent on a number of existing nodes in the network [17-19]. The simulation is carried out in NS3 environment. This method can be used in the future for high speed networks. The results tell us that by setting the GA parameters properly (Size of population, Number of generations), the algorithm gives a better result than OSPF. References [1] Lee YO. Improving Efficiency and Effectiveness of Multipath Routing in Computer Networks (Doctoral dissertation, Texas A&M University). 2012. [2] Chandel GS, Gupta R, Kushwaha A. Implementation of Shortest Path in Packet Switching Network Using Genetic Algo. International Journal of Advanced Research in Computer Science and Software Engineering. [3] Leung R, Liu J, Poon E, Chan AL, Li B. MP-DSR: A QoS-aware multi-path Dynamic Source Routing Protocol for the Wireless Ad-hoc Networks. In Local Computer Networks, 2001. Proceedings. LCN. 26th Annual IEEE Conference. 2001: 132-141. [4] Sharma S, Bhardwaj SK. Experimental Analysis of OLSR and DSDV Protocols on NS-2.35 in Mobile Ad-Hoc Networks. International Journal of Computer Network and Information Security. Jul 1 2015; 7(8): 21. [5] Al-Ghazal M, El-Sayed A, Kelash H. Routing Optimization using Genetic Algorithm in Ad hoc Networks. In 2007 IEEE International Symposium on Signal Processing and Information Technology Dec 15 2007: 497-503. [6] Ren W, Kang C, Li Y, Gong L. Chaotic Immune Genetic Hybrid Algorithms and Its Application. Indonesian Journal of Electrical Engineering and Computer Science. Feb 1 2013; 11(2): 975-84. [7] Goyal M, Soperi M, Baccelli E, Choudhury G, Shaikh A, Hosseini H, Trivedi K. Improving Convergence Speed and Scalability in OSPF: A survey. IEEE Communications Surveys & Tutorials. Apr 2 2012; 14(2): 443-63. [8] Goyal M, Xie W, Hosseini SH, Vairavan K, Rohm D. Improving OSPF dynamics on a broadcast LAN. Simulation. Feb 1 2006; 82(2): 107-29. [9] Shand M, Bryant S, Previdi S, Filsfils C, Francois P, Bonaventure O. Framework for Loop-free Convergence using the Ordered Forwarding Information Base (ofib) approach. 2013. [10] Obeidat A, Ebed M. Improving the Performance of Networks using Genetic Algorithm. Proc. of the International Conf. on Advances in Computer and Information Technology, ACIT, 2012. [11] Sooda K, Nair TR. A Comparative Analysis for Determining the Optimal Path using PSO and GA. arXiv preprint arXiv 1407.5327. Jul 20 2014. [12] Kavitha R, Anusuya V. Genetic algorithm for Finding Shortest Test Path in Networks. International Journal of Fuzzy Mathematical Archive. 2013; (2): 43–48. [13] Fadil YA. Routing using Genetic Algorithm for large Networks. Diyala Journal of Engineering Sciences. Dec 2010; 3(02). 53-70. [14] Krishna G, Pandey NK, Bajpai S. Optimal Path Routing in Variable Data Network using Genetic Algorithm. International Journal of Engineering Science and Humanities. 2012. [15] Kumar R, Kumar M. Exploring Genetic algorithm for Shortest Path Optimization in Data Networks. Global Journal of Computer Science and Technology. Oct 25 2010; 10(11).
  • 11.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 78 – 88 98 [16] Hassan M, Younes A, Hassan MR, Abdo H. Solving the File Allocation Problem in the Distributed Networks by UsingGenetic Algorithms. International Journal of Information and Network Security. Jan 1 2013; 2(1):109. [17] Baboo SS, Narasimhan B. Genetic Algorithm Based Congestion Aware Routing Protocol (GA-CARP) for Mobile Ad Hoc Networks. Procedia Technology. Dec 31 2012; 4: 177-81. [18] Hamed AY. A Genetic Algorithm for finding the K Shortest Paths in a Network. Egyptian Informatics Journal. Dec 31 2010; 11(2): 75-9. [19] Moza M, Kumar S. Improving the Performance of Routing Protocol using Genetic Algorithm. International Journal of Computer Network & Information Security. Jul 1 2016; 8(7). BIOGRAPHIES OF AUTHORS Meenakshi Moza born in Srinagar on 25th Jan 1965, did her B.E from R.E.C. Srinagar (Kashmir) in Electronics and Communication. She completed her Mtech from Y.M.C.A Faridabad. She is pursuing her Phd in the field of computer networks. She has 14 years of experience in teaching and 8 years of experience in industry namely Onida, Avery India. Total number of research publications are 14. Dr. Suresh Kumar is a professor in M.R.I.U. His qualifications are as mentioned. Ph.D. (Computer Science & Engg.), UGC NET(Computer Science & Engg), M.Tech.( Computer Science & Engg.), B.Tech. (Computer Science & Engg.) He has 14 years of teaching experience and his areas of interest include Networking, Operating systems, Database management system. Total number of research publications are 31.