S-LogixS-Logix
S-Logix
S-Logix – Research Foundation in Chennai
  • Home
  • Projects
    • Final Year Projects
    • JAVA Projects
      • Machine Learning Projects
      • Data Mining Projects
      • Big Data Projects
      • Network Security Projects
      • Mobile Computing Projects
      • IoT Projects
      • Web Technology Projects
      • Semantic Web Projects
      • Social Network Projects
      • Web Services Projects
      • Hadoop Projects
      • Spark Projects
      • Cloud Security Projects
    • NS2 Projects
      • WSN Projects
      • MANET Projects
      • VANET Projects
      • CRN Projects
      • Wired Network Projects
    • Cloud Computing Projects
      • CloudSim Projects
      • Fog computing Projects
      • Edge computing Projects
      • Cloud Security Projects
    • Python Projects
      • Machine learning Projects
      • Data Mining Projects
      • Big Data Projects
    • R Projects
      • Machine learning Projects
      • Data Mining Projects
    • IoT Projects
      • Cooja Projects
      • NS2 Projects
      • Java Projects
    • Mobile Computing Projects
    • Ph.D Projects
    • Training
      • NS2 Training
      • PHP Training
      • Project Internship
      • JAVA J2EE Training
      • Android Training
      • Hadoop Training
      • Inplant Training
      • Workshops
      • Application Projects
    • Research & Development
    • Software Development
  • Research
    • PHD Guidance
    • PHD Consulting
    • PHD Projects
    • PHD Research Proposal
    • PHD Process
    • PHD Support Services
    • PHD Resources
    • PHD Courses in India
    • Top Journals in Computer Science
    • Research Books
  • Source Code
    • JAVA Source Code
      • Hadoop Source Code
      • Spark Source Code
      • HBase Source Code
    • NS2 Simulation Samples
      • NS2 Tutorial for Beginners
      • NS2 sample source code for Mobile Ad hoc Network
      • NS2 sample source code for Wireless Networks
      • NS2 sample source code for Wireless Sensor Networks
      • NS2 sample source code for vehicular ad hoc network
      • NS2 sample source code for Cognitive Radio Networks
      • NS2 sample source code for Wired Networks
    • IoT Contiki Source Code
    • Python Source Code
      • Python Programming Sample Source Code
      • Python Machine Learning Sample Source Code
      • Python Deep Learning Sample Source Code
      • Python Spark Sample Source Code
      • Python Natural Language Processing Source Code
      • Python Data science & Visualization Sample Source Code
    • R Programming Source Code
      • R Programming Sample Source Code
      • R Machine Learning Sample Source Code
      • R Deep Learning Sample Source Code
      • R Spark Source Code
      • R Data science & Visualization Sample Source Code
      • R Natural Language Processing Source Code
    • Cloud Computing Source code
      • OpenNebula Sample Source Code
      • CloudSim Sample Source Code
      • iFog Computing Source Code
      • EdgeCloudSim Source Code
  • Domains
    • Internet of Things(IOT)
    • Networks
      • Wired Networks
      • Mobile Ad Hoc Networks
      • Wireless Sensor Network
      • Vehicular Ad Hoc Networks
      • Mobile Wireless Networks
      • Cognitive Radio Networks
      • Wireless Security
    • Network Security
    • Machine Learning
    • Cloud
      • Cloud Computing
      • Fog Computing
      • Edge Computing
      • Cloud Security
    • Big Data
    • Digital Forensics
    • Cybersecurity
    • Artificial Intelligence
    • Blockchain Technology
    • Mobile Computing
    • WWW
      • Web Technology
      • Semantic Web
      • Social Network
      • Web Mining
      • Web Services
    • Data Base
    • Data Mining
  • Blogs
  • Contact
  • Home
  • Projects
    • Final Year Projects
    • JAVA Projects
      • Machine Learning Projects
      • Data Mining Projects
      • Big Data Projects
      • Network Security Projects
      • Mobile Computing Projects
      • IoT Projects
      • Web Technology Projects
      • Semantic Web Projects
      • Social Network Projects
      • Web Services Projects
      • Hadoop Projects
      • Spark Projects
      • Cloud Security Projects
    • NS2 Projects
      • WSN Projects
      • MANET Projects
      • VANET Projects
      • CRN Projects
      • Wired Network Projects
    • Cloud Computing Projects
      • CloudSim Projects
      • Fog computing Projects
      • Edge computing Projects
      • Cloud Security Projects
    • Python Projects
      • Machine learning Projects
      • Data Mining Projects
      • Big Data Projects
    • R Projects
      • Machine learning Projects
      • Data Mining Projects
    • IoT Projects
      • Cooja Projects
      • NS2 Projects
      • Java Projects
    • Mobile Computing Projects
    • Ph.D Projects
    • Training
      • NS2 Training
      • PHP Training
      • Project Internship
      • JAVA J2EE Training
      • Android Training
      • Hadoop Training
      • Inplant Training
      • Workshops
      • Application Projects
    • Research & Development
    • Software Development
  • Research
    • PHD Guidance
    • PHD Consulting
    • PHD Projects
    • PHD Research Proposal
    • PHD Process
    • PHD Support Services
    • PHD Resources
    • PHD Courses in India
    • Top Journals in Computer Science
    • Research Books
  • Source Code
    • JAVA Source Code
      • Hadoop Source Code
      • Spark Source Code
      • HBase Source Code
    • NS2 Simulation Samples
      • NS2 Tutorial for Beginners
      • NS2 sample source code for Mobile Ad hoc Network
      • NS2 sample source code for Wireless Networks
      • NS2 sample source code for Wireless Sensor Networks
      • NS2 sample source code for vehicular ad hoc network
      • NS2 sample source code for Cognitive Radio Networks
      • NS2 sample source code for Wired Networks
    • IoT Contiki Source Code
    • Python Source Code
      • Python Programming Sample Source Code
      • Python Machine Learning Sample Source Code
      • Python Deep Learning Sample Source Code
      • Python Spark Sample Source Code
      • Python Natural Language Processing Source Code
      • Python Data science & Visualization Sample Source Code
    • R Programming Source Code
      • R Programming Sample Source Code
      • R Machine Learning Sample Source Code
      • R Deep Learning Sample Source Code
      • R Spark Source Code
      • R Data science & Visualization Sample Source Code
      • R Natural Language Processing Source Code
    • Cloud Computing Source code
      • OpenNebula Sample Source Code
      • CloudSim Sample Source Code
      • iFog Computing Source Code
      • EdgeCloudSim Source Code
  • Domains
    • Internet of Things(IOT)
    • Networks
      • Wired Networks
      • Mobile Ad Hoc Networks
      • Wireless Sensor Network
      • Vehicular Ad Hoc Networks
      • Mobile Wireless Networks
      • Cognitive Radio Networks
      • Wireless Security
    • Network Security
    • Machine Learning
    • Cloud
      • Cloud Computing
      • Fog Computing
      • Edge Computing
      • Cloud Security
    • Big Data
    • Digital Forensics
    • Cybersecurity
    • Artificial Intelligence
    • Blockchain Technology
    • Mobile Computing
    • WWW
      • Web Technology
      • Semantic Web
      • Social Network
      • Web Mining
      • Web Services
    • Data Base
    • Data Mining
  • Blogs
  • Contact

Applying Bio-Inspired Optimization Algorithms for Routing Protocols in Mobile Ad-Hoc NETworks

Screenshot from 2017-10-11 18:05:01
Figure1: Operation of MANET

         Mobile Ad-hoc NETwork (MANET) is a self-organized and decentralized system that enables communication via wireless links between nodes either in single or multiple hops. Figure1 shows the operation of MANET with dynamic infrastructure. Packets are relayed from source node to destination node via neighboring nodes within its transmission range. Routing solution for MANET facing constraints such as energy, topology, density, bandwidth, and mobility, this can be managed effectively by utilizing the bio-inspired algorithms. The food searching behavior of insects can apply in the packet routing. This routing technique can successfully transmit the packet to the destination depending on the optimal path selection using the bio-inspired algorithm.

         Ants food searching activity solves the routing problem in MANET. Ant colony optimization helps to select the shortest path depends on the bandwidth, hop-count and congestion level for routing the packets from source to destination. Limited bandwidth, energy consumption, and dynamic topology make the computational problem in MANET. In this method, ants select the shortest way depends on the amount of pheromone content in the traveling path. Pheromone is like a chemical content which left from ants. Ants search for the food in the shortest way, where the pheromone deposit amount is high.

Artificial bee colony optimization imitates the intelligent foraging of bee swarms in nature. The scout bee searches the source area and finds out the best food source. Bee intimates the food source information via dancing, which is called waggle dance. Onlooker bee identifies the food source quality (high nectar) and distance using waggle dance. It collects the food from a source in the shortest way. In this optimization method, the source node selects the most efficient route to relay the packet in the dynamic network topology. Food sources represent the number of solutions and nectar value represents the quality of the solutions.

         PSO is adapted to find the optimal solution over the velocity and position of each particle. Particles move towards the optimal solution depends on the best fitness of position by adding a velocity. Every particle accelerates to move the previous best (pbest) position and compare its value with pbest to get its global best value (gbest). The objective of particle swarm optimization is to obtain the best routing solution with minimum delay and cost.

Firefly Algorithm (FA):

         In a MANET, dynamic nodes are willing to communicate with each node through optimal route. Firefly algorithm deals the routing issue depending on the natural behavior of fireflies. The distance between the fireflies is indirectly proportional to the brightness. The brightness of the light is related to the attractiveness which is taken as the routing parameters such as minimum congestion, minimum delay, and shortest path. One important advantage of firefly algorithm automatically subdivides the whole population and solve the optimization problems.

Bat Algorithm (BA):

         Bat algorithm depends on the echolocation of bats in dark places. Many types of bats are lived in nature, and it has more magical senses like smell sense, hear sense, etc., Every bat makes the sound and senses the echo to find the food location. Echolocation behavior helps the bats to identify the distance of food or prey and obstacles. Bats able to adjust the loudness depending on the location of prey. It enables the nodes to find the static route from auxiliary path according to the link availability estimation in MANET.

Genetic Algorithm (GA):

         The genetic algorithm depends on the natural evaluation principles to rectify the optimization problem. It consists of individuals are called chromosomes, which represent the possible solutions. The genetic operators such as crossover and mutation create the next offspring from the current population. The offspring population is replaced with parent population. This process is continuously repeated to derive the new generations. The genetic algorithm can obtain the optimal route from the accessible multi-paths with considerable delay and bandwidth.

Cuckoo Search Algorithm (CSA):

         Cuckoo search algorithm helps to choose the best option according to the probabilistic technique. Cuckoo drops their eggs in the nest of host bird, and eggs of both birds are more similar in color and shape. The probability of selecting the cuckoo’s egg is very poor. The host bird identifies the cuckoo’s egg to throw away from their nest. Cuckoo search optimization enables the mobile nodes to select the high capability routing paths and also it should be easy to execute.

Share this post
FacebookTwitterGoogle+PinterestLinkedIn
Related posts
Evaluating the Impact of Blackhole Attack in MANET
May 27, 2016
Evaluating the Impact of Wormhole Attack in MANET
May 28, 2016
Leave Comment

Cancel reply

Your email address will not be published. Required fields are marked *

clear formSubmit

Search
Recent Posts
  • nmnm July 23, 2019
  • Internet of Things October 9, 2017
  • How to Ensure Security to the IoT Technologies? October 9, 2017
  • How the Internet of Things Significantly Change Lives through its Potential Applications? October 9, 2017
  • Classification of QoS routing in WMN October 9, 2017
  • How to apply Bio-Inspired Optimization Algorithms to Routing Protocols in Wireless Sensor Networks October 9, 2017
  • How to build trust and security into the IoT devices ? October 4, 2017
  • What are the Pitfalls in the Design of IoT Routing Protocols October 4, 2017
  • Applying Bio-Inspired Optimization Algorithms for Routing Protocols in Mobile Ad-Hoc NETworks October 4, 2017
  • Cognitive Radio Networks June 30, 2016

S-Logix (OPC) Private Limited

Find us on:

       


  • Registered Office
  • #5,  First Floor, 4th Street
  • Dr. Subbarayan Nagar
  • Kodambakkam, Chennai-600 024
  • Landmark : Samiyar Madam
  • GSTIN:33AAXCS2730H1Z5

  • Research Projects
  • E-mail: pro@slogix.in
  • Mobile: +91- 81240 01111
  • Inquiry: Project Inquiry
  • IoT Projects
  • Python Projects
  • NS2 Projects

  • Ph.D Guidance & Consulting
  • E-mail: phd@slogix.in
  • Mobile: +91- 97109 99001
  • Enquiry: Ph.D Inquiry
  • PHD Guidance
  • PHD Consulting

  • About US
  •  Job Openings
  •  

  • Resumes: jobs@slogix.in
  • S-Logix image Gallery
  • Post Your Suggestions / Feedbacks

All Rights Reserved. Designed By: Firstsoft Technologies (P) Limited.
DISCLAIMER