Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network...

13
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

Transcript of Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network...

Page 1: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

Page 2: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

ANALYTICAL STUDY ON ALGORITHM USED IN ANT COLONY

OPTIMIZATION IN WIRELESS SENSOR NETWORK

Vasima Khan, Research Scholar,Department of CSE, Sunrise University, Rajasthan

Dr. Shalini Goel , Supervisor, Department of CSE, Sunrise University, Rajasthan

Declaration of Author: I hereby declare that the content of this research paper has been truly made by me including the title of the research

paper/research article, and no serial sequence of any sentence has been copied through internet or any other source except references or some

unavoidable essential or technical terms. In case of finding any patent or copy right content of any source or other author in my paper/article, I shall

always be responsible for further clarification or any legal issues. For sole right content of different author or different source, which was

unintentionally or intentionally used in this research paper shall immediately be removed from this journal and I shall be accountable for any further

legal issues, and there will be no responsibility of Journal in any matter. If anyone has some issue related to the content of this research paper’s copied

or plagiarism content he/she may contact on my above mentioned email ID.

ABSTRACT

Apart from all the researches being done all around the world, still ad hoc networks are

a big challenge for the researchers. Routing in an ad hoc network is extremely

challenging because of its dynamic nature, limited bandwidth and power energy.

Somehow, Swarm Intelligence based techniques such as ant colony optimization (ACO)

algorithms have shown to be a good technique for developing routing algorithms for ad

hoc networks.

It is accepted that it is unrealistic to have all MHs inside scope of each other . In the

event that all MHs are close-by inside radio range, no directing issues to be tended to. In

genuine circumstances, the power expected to get finish network might be, at any rate,

infeasible, also issues, for example, battery life and spatial reusability. raises another

issue of symmetric (bi-directional) and awry (unidirectional) joins. As it will be seen later

on, a portion of the conventions that consider symmetric connections with acquainted

radio range, i.e., if MH1 is inside radio scope of MH3, at that point MH3 is likewise

inside radio scope of MH1.

INTRODUCTION

This is to state that the correspondence

joins are symmetric. In spite of the fact

that this suspicion is not generally

legitimate, it is normally made so on the

grounds that directing in hilter kilter

systems is a moderately hard errand.

In specific cases, it is conceivable to

discover courses that could maintain a

strategic distance from lopsided

connections, since it is very likely that

these connections approaching fall flat.

Symmetric connections, with all MHs

having indistinguishable capacities and

obligations are talked about.

Page 3: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

The issue of symmetric and lopsided

connections is one among the few

difficulties experienced in a MANET.

Another essential issue is that distinctive

hubs regularly have diverse versatility

designs. Some MHs are exceptionally

versatile, while others are essentially

stationary. It is hard to anticipate a MH's

development and example of

development.

The dynamic idea of MANETs makes

arrange open to assaults and

Untrustworthiness. Directing is

dependably the most noteworthy part for

any systems. Every hub ought work for

itself, as well as be agreeable with

different hubs. MANETs are defenseless

against different security assaults.

Subsequently, finding a protected and

dependable end-to-end way in MANETs

is a honest to goodness challenge.

The arrangement of a MANETs is

simple because of the nonappearance of

setting up any framework for

correspondence. Generally such sort of

systems are required in military

application and crisis save operations.

Be that as it may, gradually MANETs

have entered with the ranges of gaming,

detecting, and conferencing, cooperative

and appropriated registering [3]. This

dynamic system is yet to catch a large

portion of the business applications.

Research is as yet going ahead toward

this path with the goal that the MANET

can be sent in any zone where a speedier

and less expensive system can be setup

in a split second for information

correspondence.

Table 1: Application of Mobile Ad hoc Networks

Application Description

Military Services: Military services are one of the most discussed and common

application area of mobile ad hoc networks where

installation of any fixed infrastructure is not possible in the

enemy territories or inhospitable terrains. In this

environment MANET provides the required communication

mechanism in no time. Here, the soldiers are considered to

be the mobile nodes. So the network is required to remain

connected even though the soldiers move freely. This

support is provided by the MANET. Another application in

this area can be the coordination of the military objects and

the personnel in the battlefield. For example, the leader of a

group of soldiers may want to pass a message to all the

Page 4: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

soldiers or a group of soldiers involved in the operation. In

this situation, a secure and reliable routing protocol should

be able to do the job.

Emergency Services: These arise as a result of natural disasters when the entire

communications infrastructure is in disarray (for example,

Tsunamis, hurricanes, earthquake etc.) where restoring

communications quickly is essential. By using ad hoc

networks, an infrastructure could be set up in hours instead

of days/weeks required for wire-line communications.

Education: Universities and campus settings, Virtual classrooms, Ad

hoc communications during meetings or lectures.

Sensing and Gaming: Sensor network is a special case of ad hoc networks where

mobility is generally not considered. However the battery

power is a key factor in sensors. Each sensor is equipped

with a transceiver, a small microcontroller and an energy

source. The sensors relay information from other devices to

transport data to a central monitor. The sensors are used to

sense the environmental condition such as temperature,

pressure, humidity etc. In this case they form an ad hoc

network to collect intended information. The mobility can

also be incorporated into the sensor network where they are

meant to study the behavior of tornados or to study the

behavior of patients in the hospital.

Multi-user games, robotics pets.

Personal Area

Networking:

Personal communicating devices like laptops, PDAs, mobile

phones create a network to share data among one another

called the Personal Area Network (PAN). The PAN covers a

very short range for communication and can be used for ad

hoc communication among the devices or for connecting to

a backbone network.

Figure 1 An Infrastructure Network

Along these lines, every hub goes about

as a switch for correspondence which

makes directing complex when

contrasted with Wireless LANs

.

Page 5: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

Figure 2: An Infrastructure less Network

Recent years, have seen a fast

acceleration in the field of versatile

registering because of multiplication of

economical, generally accessible remote

gadgets. In this way, it has opened

immense open door for analysts to take a

shot at Ad Hoc Networks.

The Institute of Electrical and

Electronics Engineers (IEEE) 802.11 is a

conspicuous standard for remote

neighborhood (WLANs), which is

received by numerous sellers of WLAN

items. The IEEE 802.11 is the primary

computerized remote information

transmitting standard, which manages

the physical and MAC layers in

WLANs. It was acquired out year 1997.

Under the IEEE 802.11 standard, Mobile

Terminals (MTs) can work in two modes

[3, 32, 60]: (i) Infrastructure mode, in

which MTs can speak with at least one

Access Points (APs) which are

associated with a WLAN and (ii) Ad

Hoc Mode, in which MTs can discuss

straightforwardly with each other

without utilizing an AP.

A remote get to point is required for

foundation mode remote systems

administration. Consequently it offers

the benefit of versatility, brought

together security administration and

better availability. In the impromptu

method of remote systems, the hubs can

specifically speak with each other

without utilizing any get to point. To set

up a specially appointed remote system,

every remote connector must be

designed for impromptu mode versus the

foundation mode. An impromptu system

tends to include a little gathering of

gadgets all in closeness to each other. In

this system the execution debases as the

quantity of hubs increments. Specially

appointed systems can't bridge to wired

LANs or the internet without the

presence of a special purpose gateway

Page 6: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

node.

Physical Layer: IEEE 802.11 bolsters

three alternatives for the medium to be

utilized at the physical level – one

depends on infrared and the other two

depend on radio transmission. The

physical layer is subdivided reasonably

into two sections – Physical Medium

Dependent Sub layer (PMD) and

Physical Layer Convergence Protocol

(PLCP).

PMD handles encoding, interpreting,

and regulation of signs. The PLCP

abstracts the usefulness that the physical

layer brings to the table to the MAC

layer. PLCP offers a Service Access

Point (SAP) that is free of the

transmission innovation, and a Clear

Channel Assessment (CCA) transporter

sense flag to the MAC layer. The SAP

abstracts the channel which can present

to 1 or 2 Mbps information transmission

data transfer capacity. The CCA is

utilized by the MAC layer to execute the

Carrier Sense Medium Access with

Collision Avoidance (CSMA/CA)

instrument.

The accompanying are the three

decisions for the physical layer in the

first 802.11 standard : (i) Frequency

Hopping Spread Spectrum (FHSS)

working in 2.4 GHz Industrial,

Scientific, and Medical (ISM) band, at

information rates of 1 Mbps [using 2 –

level Gaussian Frequency Shift Keying

(GFSK) balance scheme] and 2 Mbps

(utilizing 4-level GFSK); (ii) Direct

Sequence Spread Spectrum (DSSS)

working in the 2.4 GHz ISM band, at

information rates of 1 Mbps (utilizing

differential parallel stage move

keying(DBPSK)) (iii) infrared working

at wavelengths in 850-950 mm go, at

information rates of 1 Mbps and 2 Mbps

utilizing Pulse Position Modulation

(PPM) conspire.

Basic MAC Layer Mechanism: The

IEEE 802.11 MAC has turned out to be

universal and increased broad notoriety

as an accepted layer-2 standard for

remote systems. Remote transmissions

are inalienably communicated in nature

and conflicts to get to the common

channel should be settled painstakingly

with a specific end goal to stay away

from impacts. Presently, the IEEE

802.11 principles incorporate an

essential medium get to convention

Distributed Coordination Function

(DCF) and a discretionary Point

Coordination Function (PCF). The

multihop or single-jump impromptu

Page 7: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

operation is bolstered by the DCF,

which depends on the Carrier Sense

Medium Access with Collision

Avoidance (CSMA/CA) irregular get to

conspire, in which retransmission of

impacted bundles is overseen as per

twofold exponential back off rules.

To stay away from the shrouded

terminal issue a discretionary Request to

Send (RTS)- Clear to Send (CTS)

system is actualized. The PCF is a

concentrate booking and surveying

based convention, which is intended to

help crash free and transmission of

ongoing movement in remote systems.

At the point when the PCF is in

operation, the AP controls medium get

to and maintains a strategic distance

from synchronous transmissions by the

hubs.

Inter-Frame Spacing (IFS): Inter-

frame spacing refers to the time interval

between the transmissions of two

successive frames by any station. There

are for types of IFS: SIFS, PIFS, DIFS,

and EIFS, in order from shortest to

longest. They denote priority levels of

access to the medium. Shorter IFS

denotes a higher priority to access the

medium, because the waiting time to

access the medium is lower.

The exact values of the IFS are obtained

from the attributes specified in the

Physical Layer Management

Information Based (PHYMIB) and are

independent of the station bit rate

Short inter-frame spacing (SIFS):

SIFS is the shortest of all the IFSs and

denotes highest priority to access the

medium. It is defined for short control

messages such as acknowledgement for

data packets.

PCF inter-frame spacing (PIFS): PIFS

is the waiting time whose value lies

between SIFS and DIFS and it is used

for real-time services.

DCF inter-frame spacing (DIFS):

DIFS is used by stations that are

operating under the DCF mode to

transmit packets. This is for

asynchronous data transfer within the

contention period

Extended inter-frame spacing (EIFS):

EIFS is the longest of all the IFSs and

denotes the least priority to access the

medium. IEFS is used for

resynchronization whenever physical

layer detects incorrect MAC frame

reception.

Carrier Sense Medium Access with

Collision Avoidance (CSMA/CA):

CSMA/CA is the MAC layer mechanism

Page 8: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

used by IEEE 802.11 WLAN. This

technique cannot be used in the context

of WLAN effectively because the error

rate in WLANs is much higher and

allowing collisions will lead to a drastic

reduction in throughput. Morever,

detecting collisions in the wireless

medium is not always possible. The

technique adopted here is therefore one

of collision avoidance.

THE NETWORK SIMULATOR

(NS2)

Reenactment has turned out to be a

significant apparatus in many research

zones where diagnostic strategies are not

appropriate and experimentation is not

practical. Specialists for the most part

utilize reenactment to break down

framework execution before physical

outline or to look at numerous choices

over a scope of framework conditions.

There are different test systems like NS-

2, Glomosim, Qualnet and Opnet are

accessible to do investigate work in

Wireless and Wired Networking. System

Simulator (NS form 2) is a protest

arranged, discrete occasion driven

system test system created at University

of California, Berkely written in C++

and OTcl and unreservedly accessible

for scholastic research reason. To lead

execution examination of our proposed

arrangements exhibited in this

postulation, the well known NS2 test

system has been widely utilized.

NS 2 was picked fundamentally on the

grounds that it is a demonstrated

reproduction instrument used in

numerous past research contemplates on

MANETs and has been approved and

checked in.

OBJECTIVES OF THE THESIS

The objective of the thesis is as

follows:

The objective of this work is to

find the shortest and lowest cost

path from one mobile node to

another. The time taken for

finding the path should be lesser

as it can be possible. So, as a

result the time taken while

setting-up a call will be less than

as it is in present. Here in this

paper I will use the tools like

NS2 simulation tool.

CHARACTERISTICS AND

FEATURES OF MANETS

Ad hoc networks have many features,

which make them quite distinct from

Page 9: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

wired networks and thus require

innovative ways to implement the

network functionalities. Table 1.2

summarizes some of the characteristics

of MANETs.

Table 2: Characteristics of MANETs.

Characteristics Description

Wireless medium: The wireless medium used by the nodes to communicate

with each other has time-varying coverage and asymmetric

propagation properties. It is less reliable and more prone to

interference compared to a wired medium.

Dynamic Topologies: Nodes are free to move arbitrarily with different speeds;

thus, the network topology may change randomly and at

unpredictable times.

Infrastructureless

Network:

Network is not depending on any fix infrastructure for its

operation.

Power Management: As the nodes are not fixed, they rely on batteries as their

power source. Thus mechanisms and protocols devised for

such networks need to keep the energy constraint in mind.

Peer-to-Peer nature: Thus, all protocols need to be designed for distributed

environments composed of “peers" and need to be robust

enough to handle these distributed dynamic topologies.

These different characteristics of wireless ad hoc networks

require different techniques than the wired networks,

especially at the three lower-most layers, to effectively

perform the network functions. The widely adopted

standard for wireless networks, at the physical and data-

link layer is IEEE 802.11 (for wireless local area networks)

Limited computing

and energy resources:

There are limited computing power, memory, and disk size

due to the limited battery capacity, as well as limitation on

device size, weight, and cost.

Limited service

coverage:

Due to device, distance between devices, network condition

limitations, service implementation for wireless devices is

more challenging as compared to the wired networks and

their elements and at the same time MANETs faces many

constraints.

Higher interference

results in lower

Infrared signals suffer interference from sunlight and heat

sources, and can be shielded/absorbed by various objects

and materials. Radio signals usually are less prone to being

Page 10: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

reliability: blocked; however, they can be interfered by other electrical

devices. The broadcast nature of transmission means all

devices are potentially interfering with one another. Self-

interference also happens due to multipath.

Highly variable

network conditions:

Higher data loss rates due to interference. User movement

causes frequent disconnection. Channel changes occur as

users move around. Received power diminishes with

distance.

Limited Bandwidth: Wireless links continue to have significantly lower capacity

than infrastructure networks. In addition, the realized

throughput of wireless communications - after accounting

for the effects of multiple access, fading, noise, and

interference conditions, etc., is often much less than a

radio's maximum transmission rate.

CONCLUSIONS

MANETs present distinctive challenges

to the convention architects. Versatility,

constrained bandwidth, and restricted

power cause visit topology changes. It

can also be liable to client misbehavior

and malicious attacks. The essential

nature of the communication mode is the

main concern because anything that

moves over the outdoors medium is

vulnerable to be grabbed by

unauthorized access. Apart from the

security issue, information access is also

an important issue since the primary goal

of the ad hoc networks is to give

information access to portable hubs.

Cooperative caching enhances the data

accessibility. This dissertation addressed

the issue of data accessibility,

malfunctioning of the hubs and hub

failure in MANETs. A Secure data cache

framework is presented.

To recognize the anomalies in the

network, a half breed interruption

identification framework is proposed.

This framework is outlined by utilizing

the idea of AIS and ACO. AIS makes

the network self safe and distinguishes

the anomalies, ACO takes care of course

distraction. The performance of half and

half IDS is evaluated with the aid of the

JiST simulator. The outcomes

demonstrate that half and half IDS is

capable of identifying the anomalies

with less time when compared to the

next steering conventions.

Page 11: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

A Data Caching Scheme (DCS) utilizing

ACO has been intended to enhance the

data accessibility ratio. DCS gives the

cache disclosure prepare. The hubs are

treated as ant agents and the local cache

is utilized to recover the data. The

experimental outcomes demonstrate that

DCS performs better by giving a less

end-to-end delay and a high packet

conveyance ratio.

To incorporate security amid data

access, a safe data cache framework

(ANTSEC) is planned. The group based

cooperative caching plan has been

enhanced by inserting control packets

with the data packets to give

invulnerability. The control capacities

AIS and CLC (Cross Layer Control) take

care of recognizing the misbehaving

hubs and course distraction individually.

The stack profile module is added with

directing table, CLC capacity and locator

set. The simulation comes about reveal

that the ANTSEC framework performs

better by giving higher PDR (Packet

Delivery Ratio) and lower end-to-end

delay as it installs the control packets

AISp and CLCp into the data packets.

The proposed framework is a novel mix

of cache management and security.

REFERENCES

1. Agrawal, D. P. and Qing-An Zeng,

„Introduction to Wireless and Mobile

Systems‟ , 2005, Brooks/Cole.

2. Amis, A., R. Prakash, T. Vuong, and

D. Huynh, „Max-min cluster

formation in wireless ad hoc

networks‟ , 2000. [Online].

Available: citeseer.ifi.unizh.ch/

amis00maxmin.html

3. An, B. and S. Papavassiliou, „A

mobility-based clustering approach

to support mobility management and

multicast routing in mobile ad-hoc

wireless networks,‟ International

Journal of Network Management,

Vol. 11, No. 6, pp. 387–395, 2001.

4. Anderson, R. G. T., B. Bershad, and

D. Wetherall, „A System

Architecture for Pervasive

Computing‟ , In Proc. 9th

ACM SIGOPS European

Workshop, pp. 177–182, Kolding,

Denmark, September 2000.

5. Andrew S. Tanenbaum, David J.

Wetherall, „Computer Networks,

Pearson‟ , 2011.

6. Artail, H., Haidar Safa, Khaleel

Mershad, Zahy Abou-Atme, Nabeel

Sulieman, „COACS: A Cooperative

and Adaptive Caching System for

Page 12: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

MANETs‟ , IEEE Transactions On

Mobile Computing, Vol. 7, No. 8,

August 2008.

7. Axelsson, S. „Intrusion detection

systems: A survey and taxonomy‟ ,

Technical Report No 99-15,

Chalmers University of Technology,

Sweden, 1999.

8. Basagni, S. „Distributed clustering

for ad hoc networks‟ , 1999.

[Online]. Available:

citeseer.ifi.unizh.ch/basagni99distrib

uted.html.

9. Bonabeau, E., M. Dorigo, and G.

Theraulaz, „Swarm Intelligence:

From Natural to Artificial Systems‟ ,

Oxford University Press, 1999.

10. Camara, D. and A.AF. Loureiro, „A

novel routing algorithm for hoc

networks‟ , Baltzer Journal of

Telecommunications Systems 18,

Vol.1, No.3, 2001, pp.85-100.

11. Carlos Cordeiro and Dharma P

Agrawal, „ Adhoc and Sensor

Networks, Theory and

Applications‟ , World Scientific

Publishing, 2006.

12. Castro L. de and Timmis J., „

Artificial Immune Systems as a

Novel Soft Computing Paradigm‟ ,

Soft Computing Journal, Vol. 7,

Issue 7, 2003.

13. Castro L. de and Zuben F.,

„Artificial Immune Systems: Part I –

Basic Theory and Applications‟ , TR

– DCA 01/99, 1999.

14. Chatterjee, M., S. K. Das, and D.

Turgut, „Wca: A weighted clustering

algorithm for mobile ad hoc

networks‟ , Cluster Computing, Vol.

5, No. 2, pp. 193–204, 2002.

15. Chen, G., F. Nocetti, J. Gonzalez,

and I. Stojmenovic, „Connectivity

based k-hop clustering in wireless

Networks‟ , In proceedings of the

35th Annual Hawaii International

Conference on System Sciences,

Vol. 7, 2002.

16. Chlamtac I. and J. Redi, „Mobile

Computing: Challenges and

Opportunities‟ , In Encyclopedia of

Computer Science, 4th Edn,D.

Hemmendinger, A. Ralston, and E.

Reilly (Eds), International Thomson

Publishing, 1998.

17. Chlamtac, I. , M. Conti, and J. Liu,

„Mobile Ad Hoc Networking:

Imperatives and Challenges‟ ,

Journal of Ad Hoc Networks, Vol. 1,

No. 1, pp. 13–64, 2003.

18. Chu Yan, Zhang JianPei, „Cache

Management based on Ant Colony

Page 13: Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power

Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714

Model in Wireless Mobile

Environments‟ , IEEE International

Multisymposium on Computer and

Computational Sciences, pp.517-

520, 2007.

19. Chu Yan, Zhang JianPei, Zhao

Chunhui, „Data Cache Strategy

Based on Colony Algorithm in

Mobile Computing Environment‟ ,

IEEE International Conference on

Internet Computing in Science and

Engineering, pp.235-238, 2008.

20. Chuangang Wang, Yanping Yu,

Yuanxin Xu, Minjue Ma, Shibin

Diao, „A Multi-Hop Clustering

Protocol for MANETs‟ , 5th

International Conference on Wireless

Communications, Networking and

Mobile Computing, 2009. WiCom

'09, pp. 1-4, 2009.

21. Conti, M., G.Maselli, G.Turi and

S.Giordano, „Cross-layering in

mobile ad hoc network design‟ ,

IEEE Computer Society, Vol

37,No.2, pp.48-51, 2004.

22. Cordon, O., F. Herrera and T.

Stützle, special issue on „Ant Colony

Optimization‟ , Vol. IX, No.2-3,

Mathware and Soft Computing,

November, 2002.

23. Corson S. and J. Macker, „Mobile ad

hoc networking (MANET): Routing

protocol performance issues and

evaluation considerations‟ , RFC

2501, Jan. 1999.

24. Daniel Camara, and Antonia A.F.

Loureiro, „Ants A novel routing

algorithm for ad hoc networks‟ ,

Proceedings of the 3300 Hawaii

International Conference on System

Sciences, 2000.

25. Dasgupta D., Ji Z. and Gonzalez F.,

„Artificial Immune System (AIS)

Research in the Last Five Years‟ ,

The 2003 Congress on Evolutionary

Computation (CEC '03), 8-12 Dec.,

Vol. 1, pp. 123-130, 2003.