12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

88 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010probably lost its connection to the dest<strong>in</strong>ation node. In this wayfewer control packets are transmitted result<strong>in</strong>g <strong>in</strong> less energyexpenditure.packets over different routes rather then always send<strong>in</strong>g them onthe best routes.X. FUTURE ASPECTSDesign and development <strong>of</strong> rout<strong>in</strong>g protocols for Mobile AdHoc Networks (MANETs) is an active area <strong>of</strong> research. Thestandard practice among researchers work<strong>in</strong>g <strong>in</strong> this emerg<strong>in</strong>gdoma<strong>in</strong> is to evaluate the performance <strong>of</strong> their rout<strong>in</strong>g protocols<strong>in</strong> a network simulator. In future a mathematical models <strong>of</strong> twokey performance metrics, rout<strong>in</strong>g overhead and route optimality,<strong>of</strong> BeeAdHoc MANET rout<strong>in</strong>g protocol us<strong>in</strong>g a simulator can bestudied . One <strong>of</strong> the key components <strong>of</strong> our BeeAdHoc model isthe collision model at Medium Access Control (MAC) layer. Todesign the mathematical expressions <strong>of</strong> the performance metricscan also provide <strong>in</strong>sight about the behavior <strong>of</strong> BeeAdHoc <strong>in</strong>particular, and a typical ad hoc rout<strong>in</strong>g protocol <strong>in</strong> general.REFERENCESIX. CONCLUSIONThe simplicity <strong>of</strong> BeeAdHoc which results from its simplerarchitecture and its us<strong>in</strong>g a smaller number <strong>of</strong> control packetspay <strong>of</strong>f once we look at the energy consumption <strong>in</strong> transpot<strong>in</strong>gthe packets from their source to their dest<strong>in</strong>ation. BeeAdHocnetwork employs a simple bee behavior to monitor the validity<strong>of</strong> the routes.When compared to other algorithms the batterylevel <strong>of</strong> BeeAdHoc is better because it tries to spread the data[1] Formal Model<strong>in</strong>g <strong>of</strong> BeeAdHoc : A Bio-<strong>in</strong>spired Mobile AdHoc Network Rout<strong>in</strong>g Protocol, Muhammad Saleem 1 , SyedAli Khayam 2 and Muddassar Farooq 3.[2] The wisdom <strong>of</strong> the hive applied to mobile ad-hoc networksWedde, H.R.; Farooq, M.[3] BeeAdHoc: an Efficient, Secure and Scalable Rout<strong>in</strong>gFramework for Mobile AdHoc Networks , Pr<strong>of</strong>. Dr. HorstF. Wedde (wedde@ls3.cs.uni-dortmund.de) ME MuddassarFarooq (muddassar.farooq@ls3.cs.uni-dortmund.de)[4] M. Farooq, “From the Wisdom <strong>of</strong> the Hive to IntelligentRout<strong>in</strong>g <strong>in</strong> Telecommunication Networks” PhD Thesis,Dortmund University, 2006.[5] H. F. Wedde and M. Farooq. “The wisdom <strong>of</strong> the hiveapplied to mobile ad-hoc networks.” In Proceed<strong>in</strong>gs <strong>of</strong> theIEEE Swarm <strong>Intelligence</strong> Symposium, pages 341–348,2005.[6] P. K. Visscher, “Dance Language”, Encyclopedia <strong>of</strong>Insects, Academic Press, 2003© 2010 ACADEMY PUBLISHER

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!