Introduction Beehive is a routing algorithm with emphasis On wireless ad-hoc mobile networks and Energy awareness. It is Completely Distributed and does.

Slides:



Advertisements
Similar presentations
CSCI-1680 Network Layer: Intra-domain Routing Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Rodrigo Fonseca.
Advertisements

Network Layer – Routing 2 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Security Issues in Ant Routing Weilin Zhong. Outline Swarm Intelligence AntNet Routing Algorithm Security Issues in AntNet Possible Solutions.
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
1 Routing Techniques in Wireless Sensor networks: A Survey.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Mobile IP Overview: Standard IP Standard IP Evolution of Mobile IP Evolution of Mobile IP How it works How it works Problems Assoc. with it Problems Assoc.
Mobile Agents for Adaptive Routing Presented by Hong-Jiun Chen & Manu Prasanna Gianni Di Caro & Marco Dorigo.
Performance Comparison of Routing Protocols for Ad Hoc Networks PATTERN ENDIF Ferrara.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Ants-based Routing Marc Heissenbüttel University of Berne
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Delivery, Forwarding, and Routing
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
The Zone Routing Protocol (ZRP)
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
SAvPS – úvod Genči 2009 (bsaed on Tanenbaum’s slides.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Review: routing algorithms. –Choose the appropriate paths. –Routing algorithms Flooding Shortest path routing (example). –Dijkstra algorithm. –Bellman-Ford.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Mobile Adhoc Network: Routing Protocol:AODV
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Patch Based Mobile Sink Movement By Salman Saeed Khan Omar Oreifej.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Locating Mobile Agents in Distributed Computing Environment.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Presentation of Wireless sensor network A New Energy Aware Routing Protocol for Wireless Multimedia Sensor Networks Supporting QoS 王 文 毅
A Survey of Geocast Routing Protocols 指導教授:許子衡 教授 報告學生:馬敏修 指導教授:許子衡 教授 報告學生:馬敏修.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Stainov - DataComMET CS TC5353 THE NETWORK LAYER 5.2 ROUTING ALGORITHMS - adaptive Distance Vector Routing (Bellman-Ford, Ford-Fulkenson). It was used.
Sanjay K. Dhurandher, Mohammad S. Obaidat, Fellow of IEEE and Fellow of SCS, Siddharth Goel and Abhishek Gupta CAITFS, Division of Information Technology,
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
GridNets 2006 – October 1 st Grid Resource Management by means of Ant Colony Optimization Gustavo Sousa Pavani and Helio Waldman Optical Networking Laboratory.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Computer Networks22-1 Network Layer Delivery, Forwarding, and Routing.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Distance Vector Routing
ProgessFace: An Algorithm to Improve Routing Efficiency of GPSR-like Routing Protocols in Wireless Ad Hoc Networks Chia-Hung Lin, Shiao-An Yuan, Shih-Wei.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
ROUTING.
Protocols for Wireless Sensor Networks
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
COMP 3270 Computer Networks
Link-State Routing Protocols
Lei Chen and Wendi B. Heinzelman , University of Rochester
THE NETWORK LAYER.
Intra-Domain Routing Jacob Strauss September 14, 2006.
ECE 544 Protocol Design Project 2016
5.2 FLAT NAMING.
Kuliah 5 ROUTING.
Link-State Routing Protocols
Link-State Routing Protocols
Presentation transcript:

Introduction Beehive is a routing algorithm with emphasis On wireless ad-hoc mobile networks and Energy awareness. It is Completely Distributed and does not need global information about the network condition. The algorithm is based on source routing and on-demand routing.

This algorithm is inspired from honey bee behavior specially their foraging techniques. Hive sends agents to look for food and if one of them finds a good food site it returns back to hive to perform the Waggle Dance on the Dance Floor. Waggle dance Waggle dance2

This dance gives three important information :  The Direction of flower patches(angle between the sun and the patch)  The distance from the hive(duration of the dance)  The quality rating (fitness)(frequency of the dance). So the hive can easily enhance the discovered site with a sufficient number of foragers even without a guide.

1

2

3

Basic idea outlines Most design decisions were done with the picture of honeybees in mind. Every node is a beehive, with packets (bees) collecting data (food). This means that every packet is a very simple mobile agent, transporting user data and route information from its starting node to its destination. Once it returns with fresh information about the route conditions, it will "inform" other bees through waggle dances, depending on the rating.

Beehive’s steps: 1- each node consider itself as a representative node (node with the lowest ip address take this position) 2- after launching 1st,2nd and 3rd short distance bee agent network is organized into fixed partition called foraging region. 3- each node has a specific foraging zone. 4- each non representative node launch periodically short distance bee agent by broadcasting replicas to the neighbors. 5- representative node launch long distance bee agent.

6- bee agent collect path information during the trip. 7- each node has three routing tables Intra Foraging Zone Inter Foraging Region Foraging Region Membership 8- each node can route any destination in the network. 9- The next hop for a data packet is selected in a probabilistic manner according to the quality measure of the neighbors. Ri Ri D1(i).. Dd(i)Dd(i) N1(i)N1(i) (p11, q11)..(p1d, q1d) Nn(i)Nn(i) (pn1, qn1)..(pnd,qnd)

IFZ+IFR node 10 FRM

pseudo code of BeeHive  t:= current time, tend:= time to end simulation  // Short Limit:= 4, Long Limit:= 10, Bee Generation Interval:= 1  // i=current node, d=destination node, s=source node  // n=successor node of i, p=predecessor node of i  // z=Representative node of the foraging region containing s  // w=Representative node of the foraging region containing d  // q is queuing delay estimate of a bee agent from node p to s  // p is propagation delay estimate of a bee agent from node p to s  Δt:= Bee Generation Interval, Δh:= hello packet generation interval  bip:=estimated link band width to neighbor p  pip:=estimated propagation delay to neighbor p  hi:= hop limit for bees of i, lip:=size normal queue i to p (bits)

foreach Node // concurrent activity over the network while (t ≤ tend) if ( t mod Δt = 0) if(i is representative node of the foraging region) set hi:= Long Limit, bi is long distance bee agent else set hi:= Short Limit, bi is short distance bee agent endif launch a bee bi to all neighbors of i endif foreach bee bs received at i from p if(bs was launched by i or its hop limit reached) kill bee bs elseif(bs is inside foraging zone of node s) Calculate q and p

Update IFZ routing table entries qps = q and pps = p Update q Update p else Calculate q and p Update IFR routing table entries qpz = q and ppz = p Update q Update p endif if( bs already visited node i) kill bee bs else use priority queues to forward bs to all neighbors of i except p endif endfor

foreach data packet dsd received at i from p if ( node d is within foraging zone of node i) consult IFZ routing table of node i to find delays to node d calculate goodness of all neighbors for reaching d using equation 2 else consult FRM routing table of node i to find node w consult IFR routing table of node i to find delays to node w calculate goodness of all neighbors for reaching w using equation 2 endif probabilistically select a neighbor n (n = p) as per goodness enqueue data packet dsd in normal queue for neighbor n endfor

if ( t mod Δh = 0) send a hello packet to all neighbors if (time out before a response from neighbor) (4th time) neighbor is down update the routing table and launch bees to inform other nodes endif endwhile Endfor

a c g e h d v i f k b R1 R4 1

R fdegc b4436 i7957 k3434 h5267 degc b5674 i8878 k8877 h5546 f b a c

Experiments with different test cases on these algorithms show that. 1-Bees algorithm is more efficient when finding and collecting food, that is it takes less number of steps. 2-Bees algorithm is more scalable it requires less computation time to complete task.