Simulation of Route Optimization with load balancing Using AntNet System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 4
Abstract
This paper is based on analysis of the performance of load balancing and route optimization in computerized networks. The complete system model shows the scenario of Packet distribution between nodes, and if congestion occurs due to traffic then Packet to be failed. The model used the AntNet system for simulate the network. The simulation runs on the ant’s behavior for the load balancing of the network. The ants travel across the network between alternative chosen pairs of nodes; as they travel they deposit pheromones from their source node, collect the information of the route and the traffic congestion encountered on their journey. They select their path at each next node according the distribution of pheromones at each node. Packets between nodes are routed of the pheromone distributions at each next node. The performance of the network is proportional to packets which are failed. This model also shows the adaptivity of the system; the nodes are removed from the network, system finds the alternative chosen paths without system degradation and controls the performance of routing
Authors and Affiliations
Ashish Sharma
Text Classification by Augmenting Bag of Words (BOW) Representation with Co-occurrence Feature
Text classification is the task of assigning predefined categories to free-text documents based on their content. Traditional approaches used unigram based models for text classification. Unigram based models suc...
Application Architecture of Car Automobile Dealers Using Enterprise Architecture Planning (EAP)
Abstract: Mandala Company is one of company which engaged in the field of car automotive dealer. The company has several business processes i.e. sales units and test drive, service, sales and purchases of spare parts. At...
Design of Non-Volatile SRAM Using Magnetic Tunnel Junction
In the last 10 years, FPGA circuits have developed rapidly, because of their flexibility, their ease of use and the low cost to design a function with them. However, the internal memories used in FPGA circuit could limit...
Moving ATM Applications to Smartphones with a Secured PinEntryMethods
Abstract: A personal identification number (pin) is a widely used numeric password. The 4-digit pin numericpassword is being used as authentication in many important applications such as, an ATM. An ATM is a placew...
Analysis of Pattern Transformation Algorithms for SensitiveKnowledge Protection in Data Mining
Abstract: Privacy Preserving Data Mining(PPDM) is an emerging research area. Its objective is to extend thetraditional data mining techniques to work with transformed data while protecting confidential information...