Cover image for Bee-inspired protocol engineering : from nature to networks
Title:
Bee-inspired protocol engineering : from nature to networks
Personal Author:
Series:
Natural computing series,
Publication Information:
Berlin, GW : Springer, 2009
Physical Description:
xx, 306 p. : ill. ; 25 cm.
ISBN:
9783540859536

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010194087 TK5105.5 F35 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

Honey bee colonies demonstrate robust adaptive efficient agent-based communications and task allocations without centralized controls - desirable features in network design. This book introduces a multipath routing algorithm for packet-switched telecommunication networks based on techniques observed in bee colonies. The algorithm, BeeHive, is dynamic, simple, efficient, robust and flexible, and it represents an important step towards intelligent networks that optimally manage resources.

The author guides the reader in a survey of nature-inspired routing protocols and communication techniques observed in insect colonies. He then offers the design of a scalable framework for nature-inspired routing algorithms, and he examines a practical application using real networks of Linux routers. He also utilizes formal techniques to analytically model the performance of nature-inspired routing algorithms. In the last chapters of the book, he introduces an immune-inspired security framework for nature-inspired algorithms, and uses the wisdom of the hive for routing in ad hoc and sensor networks. Finally, the author provides a comprehensive bibliography to serve as a reference for nature-inspired solutions to networking problems.

This book bridges the gap between natural computing and computer networking. What sets this book apart from other texts on this subject is its natural engineering approach in which the challenges and objectives of a real-world system are identified before its solution, nature-inspired or otherwise, is discussed. This balanced exposition of the book makes it equally suitable for telecommunication network designers and theorists, and computer science researchers engaged with artificial intelligence, agents, and nature-inspired techniques.


Table of Contents

1 Introductionp. 1
1.1 Motivation of the Workp. 2
1.2 Problem Statementp. 4
1.2.1 Hypothesesp. 5
1.3 An Engineering Approach to Nature-Inspired Routing Protocolsp. 6
1.4 The Scientific Contributions of the Workp. 7
1.4.1 A Simple, Disributed, Decentralized Multi-Agent Systemp. 8
1.4.2 A Comprehensive Routing Systemp. 9
1.4.3 An Empirical Comprehensive Performance Evaluation Frameworkp. 9
1.4.4 A Scalability Framework for (Nature-Inspired) Agent-Based Routing Protocolsp. 9
1.4.5 Protocol Engineering of Nature-Inspired Routing Protocolsp. 9
1.4.6 A Nature-Inspired Linux Routerp. 10
1.4.7 The Protocol Validation Frameworkp. 10
1.4.8 The Formal Framework for Nature-Inspired Protocolsp. 10
1.4.9 A Simple, Efficient, and Scalable Nature-Inspired Security Frameworkp. 10
1.4.10 Emerging Mobile and Wireless Sensors Ad Hoc Networksp. 11
1.5 Organization of the Bookp. 11
2 A Comprehensive Survey of Nature-Inspired Routing Protocolsp. 19
2.1 Introductionp. 19
2.1.1 Organization of the Chapterp. 20
2.2 Network Routing Algorithmsp. 20
2.2.1 Features Landscape of a Modern Routing Algorithmp. 21
2.2.2 Taxonomy of Routing Algorithmsp. 22
2.3 Ant Colony Optimization (ACO) Routing Algorithms for Fixed Networksp. 26
2.3.1 Important Elements of ACO in Routingp. 26
2.3.2 Ant-Based Control (ABC) for Circuit-Switched Networksp. 28
2.3.3 Ant-Based Control (ABC) for Packet-Switched Networksp. 30
2.3.4 AntNetp. 31
2.3.5 Ant Colony Routing (ACR) and AntNet+SELA QoS-Aware Routingp. 33
2.3.6 A Brief History of Research in AntNetp. 34
2.4 Evolutionary Routing Algorithms for Fixed Networksp. 37
2.4.1 Important Elements of EA in Routingp. 38
2.4.2 GARAp. 39
2.4.3 ASGA and SynthECAp. 41
2.4.4 DGAp. 43
2.5 Related Work on Routing Algorithms for Fixed Networksp. 44
2.5.1 Artificial Intelligence Communityp. 45
2.5.2 Networking Communityp. 46
2.6 Summaryp. 52
3 From The Wisdom of the Hive to Routing in Telecommunication Networksp. 53
3.1 Introductionp. 53
3.1.1 Organization of the Chapterp. 54
3.2 An Agent-Based Investigation of a Honeybee Colonyp. 55
3.2.1 Labor Managementp. 55
3.2.2 The Communication Network of a Honeybee Colonyp. 55
3.2.3 Reinforcement Learningp. 56
3.2.4 Distributed Coordination and Planningp. 56
3.2.5 Energy-Efficient Foragingp. 56
3.2.6 Stochastic Selection of Flower Sitesp. 56
3.2.7 Group Organizationp. 57
3.3 BeeHive: The Mapping of Concepts from Nature to Networksp. 57
3.4 The Bee Agent Modelp. 58
3.4.1 Estimation Model of Agentsp. 62
3.4.2 Goodness of a Neighborp. 62
3.4.3 Communication Paradigm of Agentsp. 65
3.4.4 Packet-Switching Algorithmp. 65
3.5 BeeHive Algorithmp. 66
3.6 The Performance Evaluation Framework for Nature-Inspired Routing Algorithmsp. 69
3.7 Routing Algorithms Used for Comparisonp. 73
3.7.1 AntNetp. 73
3.7.2 DGAp. 73
3.7.3 OSPFp. 74
3.7.4 Daemonp. 74
3.8 Simulation Environment for BeeHivep. 75
3.8.1 simpleNetp. 75
3.8.2 NTTNetp. 76
3.8.3 Node150p. 76
3.9 Discussion of the Results from the Experimentsp. 76
3.9.1 Congestion Avoidance Behaviorp. 76
3.9.2 Queue Management Behaviorp. 91
3.9.3 Hot Spotsp. 93
3.9.4 Router Crash Experimentsp. 97
3.9.5 Bursty Traffic Generatorp. 99
3.9.6 Sessionless Network Trafficp. 103
3.9.7 Size of Routing Tablep. 106
3.10 Summaryp. 107
4 A Scalability Framework for Nature-Inspired Routing Algorithmsp. 109
4.1 Introductionp. 109
4.1.1 Existing Work on Scalability Analysisp. 110
4.1.2 Organization of the Chapterp. 113
4.2 The Scalability Model for a Routing Algorithmp. 114
4.2.1 Cost Modelp. 114
4.2.2 Power Model of an Algorithmp. 115
4.2.3 Scalability Metric for a Routing Algorithmp. 117
4.3 Simulation Environment for Scalability Analysisp. 117
4.3.1 simpleNetp. 117
4.3.2 NTTNetp. 117
4.3.3 Node150p. 117
4.3.4 Node350p. 118
4.3.5 Node650p. 118
4.3.6 Node1050p. 118
4.4 Discussion of the Results from the Experimentsp. 119
4.4.1 Throughput and Packet Delivery Ratiop. 120
4.4.2 Packet Delayp. 124
4.4.3 Control Overhead and Suboptimal Overheadp. 125
4.4.4 Agent and Packet Processing Complexityp. 128
4.4.5 Routing Table Sizep. 131
4.4.6 Investigation of the Behavior of AntNetp. 131
4.5 Towards an Empirically Founded Scalability Model for Routing Protocolsp. 134
4.5.1 Scalability Matrix and Scalability Analysisp. 139
4.5.2 Scalability Analysis of BeeHivep. 140
4.5.3 Scalability Analysis of AntNetp. 141
4.5.4 Scalability Analysis of OSPFp. 141
4.6 Summaryp. 144
5 BeeHive in Real Networks of Linux Routersp. 147
5.1 Introductionp. 147
5.1.1 Organization of the Chapterp. 149
5.2 Engineering of Nature-Inspired Routing Protocolsp. 149
5.2.1 Structural Design of a Routing Frameworkp. 149
5.2.2 Structural Semantics of the Network Stackp. 153
5.2.3 System Design Issuesp. 154
5.3 Natural Routing Framework: Design and Implementationp. 155
5.3.1 Algorithm-Independent Frameworkp. 156
5.3.2 Algorithmic-Dependent BeeHive Modulep. 157
5.4 Protocol Verification Frameworkp. 162
5.5 The Motivation Behind the Design and Structure of Experimentsp. 167
5.6 Discussion of the Results from the Experimentsp. 167
5.6.1 Quantum Traffic Engineeringp. 167
5.6.2 Real-World Applications Traffic Engineeringp. 178
5.6.3 Hybrid Traffic Engineeringp. 181
5.7 Summaryp. 184
6 A Formal Framework for Analyzing the Behavior of BeeHivep. 185
6.1 Introductionp. 185
6.1.1 Organization of the Chapterp. 186
6.2 Goodnessp. 186
6.3 Analytical Modelp. 189
6.3.1 Node Trafficp. 191
6.3.2 Link Flowsp. 192
6.3.3 Calculation of Delaysp. 192
6.3.4 Throughputp. 194
6.4 Empirical Verification of the Formal Modelp. 194
6.4.1 Example 1p. 194
6.4.2 Example 2p. 197
6.5 Summaryp. 201
7 An Efficient Nature-Inspired Security Framework for BeeHivep. 205
7.1 Introductionp. 205
7.1.1 Organization of the Chapterp. 206
7.2 Robustness and Security Analysis of a Routing Protocolp. 206
7.2.1 Security Threats to Nature-Inspired Routing Protocolsp. 207
7.2.2 Existing Works on Security of Routing Protocolsp. 208
7.3 BeeHiveGuard: A Digital Signature-Based Security Frameworkp. 208
7.3.1 Agent Integrityp. 209
7.3.2 Routing Information Integrityp. 209
7.3.3 Architecture of BeeHiveGuardp. 210
7.4 BeeHiveAIS: an Immune-Inspired Security Framework for BeeHivep. 211
7.4.1 Artificial Immune Systems (AISs)p. 211
7.4.2 Behavioral Analysis of BeeHive for Designing an AISp. 213
7.4.3 The AIS Model of BeeHiveAISp. 216
7.4.4 Top-Level BeeHiveAISp. 218
7.5 Simulation Models of Our Security Frameworksp. 220
7.5.1 Attack Scenarios on Simple Topologiesp. 220
7.5.2 Analysis of Attacks and Effectiveness of Security Frameworksp. 221
7.5.3 NTTNetp. 225
7.5.4 Node150p. 230
7.6 Summaryp. 233
8 Bee-Inspired Routing Protocols for Mobile Ad Hoc and Sensor Networksp. 235
8.1 Introductionp. 235
8.1.1 Existing Works on Nature-Inspired MANET Routing Protocolsp. 236
8.1.2 Organization of the Chapterp. 237
8.2 Bee Agent Modelp. 237
8.2.1 Packersp. 237
8.2.2 Scoutsp. 237
8.2.3 Foragersp. 238
8.2.4 Beeswarmp. 238
8.3 Architecture of BeeAdHocp. 238
8.3.1 Packing Floorp. 239
8.3.2 Entrancep. 239
8.3.3 Dance Floorp. 240
8.4 Simulation Frameworkp. 242
8.4.1 Metricsp. 243
8.4.2 Node Mobility Behaviorp. 243
8.5 BeeAdHoc in Real-World MANETsp. 247
8.5.1 A Performance Evaluation Framework for Real MANETs in Linuxp. 247
8.6 Results of Experimentsp. 252
8.7 Security Threats in BeeAdHocp. 257
8.8 Challenges for Routing Protocols in Ad Hoc Sensor Networksp. 258
8.8.1 Existing Works on Routing Protocols for Wireless Sensor Networksp. 258
8.9 BeeSensor: Architecture and Workingp. 260
8.9.1 BeeSensor Agent's Modelp. 260
8.9.2 Protocol Descriptionp. 261
8.10 A Performance Evaluation Framework for Nature-Inspired Routing Protocols for WSNsp. 264
8.10.1 Metricsp. 265
8.11 Resultsp. 266
8.12 Summaryp. 269
9 Conclusion and Future Workp. 271
9.1 Conclusionp. 271
9.2 Future Researchp. 274
9.2.1 Quality of Service (QoS) Routingp. 274
9.2.2 Cyclic Pathsp. 275
9.2.3 Intelligent and Knowledgeable Network Engineeringp. 277
9.2.4 Bee Colony Metaheuristicp. 281
9.3 Natural Engineering: The Need for a Distinct Disciplinep. 281
Referencesp. 283
Indexp. 299