Feeds

Barging ants solve network congestion

Data packets are just too polite

  • alert
  • submit to reddit

Secure remote control for conventional and virtual desktops

Ants could help to manage the flow of data through networks, according to researchers at Université Paul Sabatier in Toulouse, France.

Vincent Fourcassié and his team studied how ants manage to avoid banging into each other on foraging trails. They discovered a pragmatic approach: faced with a blockage, an ant will simply barge the other out of the way, forcing it to take an alternative route.

Ants will lay down scent cues for their colleagues to follow when out looking for food. These trails mark the path between food and home and are reinforced as more ants use them. This makes them even more attractive, and even more ants want to use the trails.

Too many ants trying to use one route will slow the delivery of food to the nest. In his paper, published in Nature, Fourcassié reports that ants will just shove each other off the main thoroughfares, and onto chemical back streets.

Computer scientists at University College London say this simple approach could help reduce congestion in large networks – like telephone systems.

Fourcassié and team set up a trial with bog-standard garden ants. Luring them out into the open with a sugar source, the team funnelled the ants over a bridge, divided into two branches of equal width.

When there was plenty of space, on a 10mm-wide route, the ants mainly stayed on one, well-marked trail. When the branches were narrowed to just 6mm, the traffic was more evenly distributed.

Fourcassié argues that this demonstrates that outward bound ants were hitting traffic head-on. "It was not the result we expected," he says. "We expected the ants to do a U-turn and come back to the nest. But the ants found a better solution to the problem."

This helps maintain an even flow of food into the nest. Fourcassié suspects that a similar strategy is used inside the nest.

The original paper is available here, to Nature subscribers. Everyone else can read the abstract. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Renewable energy 'simply WON'T WORK': Top Google engineers
Windmills, solar, tidal - all a 'false hope', say Stanford PhDs
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Post-pub nosh neckfiller: The MIGHTY Scotch egg
Off to the boozer? This delicacy might help mitigate the effects
I'M SO SORRY, sobs Rosetta Brit boffin in 'sexist' sexy shirt storm
'He is just being himself' says proud mum of larger-than-life physicist
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.