Skip to main navigation Skip to search Skip to main content

An ant colony algorithm based congestion elusion routing strategy for mobile ad hoc networks

  • Dan Yang Qin*
  • , Hong Wei Li
  • , Lin Ma
  • , Hong Bin Ma
  • , Qun Ding
  • *Corresponding author for this work
  • Heilongjiang University
  • Harbin Research Institute of Electrical Instruments

Research output: Contribution to journalArticlepeer-review

Abstract

A critical challenge for mobile ad hoc networks is the design of efficient routing protocols which are able to provide high bandwidth utilization and desired fairness in mobile wireless environment without any fixed communication establishments. Although extensive efforts have already been devoted to providing optimization based distributed congestion elusion strategy for efficient bandwidth utilization and fair allocation in both wired and wireless networks, a common assumption therein is the fixed link capacities, which will unfortunately limit the application scope in mobile ad hoc networks where channels keep changing. In this paper, an effective congestion elusion strategy is presented explicitly based on ant colony algorithm for mobile ad hoc networks, which will explore the optimal route between two nodes promptly, meanwhile forecast congestion state of the link. Accordingly, a new path will be found rapidly to have the flow spread around to relieve the congestion degree. Compared with OLSR, the strategy proposed will greatly reduce the packet loss ratio and the average end-to-end delay at the same time, which illustrate that it will make use of networking resource effectively.

Original languageEnglish
Pages (from-to)99-103
Number of pages5
JournalJournal of Harbin Institute of Technology (New Series)
Volume20
Issue number3
StatePublished - Jun 2013

Keywords

  • Ant conloy algorithm
  • CERS
  • Congestion elusion
  • Mobile ad hoc networks
  • OLSR

Fingerprint

Dive into the research topics of 'An ant colony algorithm based congestion elusion routing strategy for mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this