Next Article in Journal
Automatic Cephalometric Landmark Identification System Based on the Multi-Stage Convolutional Neural Networks with CBCT Combination Images
Next Article in Special Issue
Measuring Key Quality Indicators in Cloud Gaming: Framework and Assessment Over Wireless Networks
Previous Article in Journal
Compact Dual-Polarized Vivaldi Antenna with High Gain and High Polarization Purity for GPR Applications
Previous Article in Special Issue
Transform-Based Multiresolution Decomposition for Degradation Detection in Cellular Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Enhanced Routing Algorithm Based on Reinforcement Machine Learning—A Case of VoIP Service

by
Davi Ribeiro Militani
1,
Hermes Pimenta de Moraes
1,
Renata Lopes Rosa
1,
Lunchakorn Wuttisittikulkij
2,
Miguel Arjona Ramírez
3 and
Demóstenes Zegarra Rodríguez
1,*
1
Department of Computer Science, Federal University of Lavras, Minas Gerais 37200-000, Brazil
2
Wireless Communication Ecosystem Research Unit, Department of Electrical Engineering, Chulalongkorn University, Bangkok 10330, Thailand
3
Department of Electronic Systems Engineering, University of São Paulo, São Paulo 05508-010, Brazil
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(2), 504; https://doi.org/10.3390/s21020504
Submission received: 9 November 2020 / Revised: 3 January 2021 / Accepted: 7 January 2021 / Published: 12 January 2021
(This article belongs to the Collection Intelligent Wireless Networks)

Abstract

:
The routing algorithm is one of the main factors that directly impact on network performance. However, conventional routing algorithms do not consider the network data history, for instances, overloaded paths or equipment faults. It is expected that routing algorithms based on machine learning present advantages using that network data. Nevertheless, in a routing algorithm based on reinforcement learning (RL) technique, additional control message headers could be required. In this context, this research presents an enhanced routing protocol based on RL, named e-RLRP, in which the overhead is reduced. Specifically, a dynamic adjustment in the Hello message interval is implemented to compensate the overhead generated by the use of RL. Different network scenarios with variable number of nodes, routes, traffic flows and degree of mobility are implemented, in which network parameters, such as packet loss, delay, throughput and overhead are obtained. Additionally, a Voice-over-IP (VoIP) communication scenario is implemented, in which the E-model algorithm is used to predict the communication quality. For performance comparison, the OLSR, BATMAN and RLRP protocols are used. Experimental results show that the e-RLRP reduces network overhead compared to RLRP, and overcomes in most cases all of these protocols, considering both network parameters and VoIP quality.

1. Introduction

Nowadays, there is a great demand for internet application services, such as video [1] and audio streaming, Voice-over-IP (VoIP) [2,3], online games [4] among others. Multimedia services represent more than 50% of current Internet traffic [5]. VoIP service is one of the most popular communication services due to the low phone call rate compared to conventional telephony [6], but also due to the high speech quality level achieved in recent years [7]. Thus, network providers need to perform monitoring and operation tasks to ensure an acceptable end-user’s Quality-of-Experience (QoE).
In ad-hoc wireless networks, to ensure a reliable network performance is a great challenge due to the characteristic of this kind of network [8]. Dynamic topology, shared wireless channels, and limited node capabilities are factors that need to be considered in order to provide a high quality VoIP service. For instance, device batteries are limited resources that can lead to link losses connected to that nodes during power failures [9].
In a VoIP communication, end-user’s QoE is determined by the user’s perception [10,11,12]. In general, speech quality assessment methods can be divided in subjective and objective methods. Subjective methods are performed in a laboratory environment using a standardized test procedure [13]. Several listeners score an audio sample and the average value is computed and named Mean Opinion Score (MOS). However, subjective methods are time-consuming and expensive [14]. Another manner to predict the quality of a VoIP call is through a parametric method, such as the E-model algorithms [15,16] which provides a conversation quality index estimated through different parameters related to acoustic environment, speech codec characteristics and network performance parameters.
Several factors, such as channel transmission capacity, node processing capacity, and routing protocols affect network performance parameters [17].
Conventional routing protocols in ad-hoc networks, such as Optimized Link State Routing (OLSR), are unable to learn from abnormal network events that occurred several times in the past [18]; then, those protocols can choose a path that in the past had recurrent problems. For example, let us consider a path P where a given node N presents recurrent shut downs due to either device failures or programmed power-offs to save energy [19]. If a conventional protocol chooses this path P, network degradation can occur, such as packet losses [20]. A routing protocol that is able to learn from previous network failure events could avoid this path improving the network performance. Hence, there is a need for protocols capable to learn from network data history. Therefore, it is important that routing protocols use strategies that make them learn from past experiences to choose optimal routing paths [21].
In the latest decades, Machine Learning algorithms have come to be used in several applications [22,23,24,25,26,27,28]. Thus, these algorithms can be applied into routing control protocols [29,30,31], specifically Reinforcement Learning (RL) is increasingly being used to solve routing problems [32,33,34]. In RL, an agent must be able to learn how to behave in a dynamic environment through iterations [35]. For instance, an agent who makes a choice receives a reward or a punishment whether the choice was good or bad, respectively. Hence, the RL technique can improve the steps along the decision making of path choice process, leading to better network performance, and consequently improved applications services, such as a VoIP communication [36].
In Reference [37], the authors introduce a generic model based on RL for ad-hoc networks focusing on routing strategies. Some works use RL for routing in urban vehicular ad-hoc networks (VANETs) [32]. Other works focus on wireless sensor networks and their characteristics [38] or unmanned robotic systems [39].
In Reference [18], an intelligent traffic control through deep learning is proposed, whose results demonstrated a performance gain compared to the traditional Open Shortest Path First (OSPF) routing protocol. In Reference [21], author uses Deep Reinforcement Learning to develop a new general purpose protocol, and obtained superior results compared to OSPF. However, both works do not focus on ad-hoc networks, and they do not compare the algorithm developed with ad-hoc network protocols. In Reference [40], a Reinforcement Learning Routing Protocol (RLRP) is proposed, which can be applied to ad-hoc networks.
Routing protocols require the use of control messages for their operation, they are responsible for the discovery of routes, for the dissemination of information on topology, among other things. However, control messages generate overhead on the network, thus decreasing network capacity especially in situations where the transmission channel may suffer interference or be saturated.
The use of RL technique in routing protocols may require an extra header, new control messages, or increasing the sending frequency of these messages. There are studies that aim to reduce overhead in traditional protocols. In protocols that use RL, a mechanism that provides the reduction of this overhead is relevant, because these routing techniques generate additional overhead.
In RL, there is an agent that interacts with an environment through the choice of actions [35]. In RL, each action generates a reward that generally defines whether the action taken was good or bad. In Reference [40], the rewards are sent to the nodes through control messages using a reward header that generates an overhead due to the use of RL. This additional overhead impacts on the global network performance.
In this context, there are research initiatives focused on decreasing the overhead originated by control messages. In Reference [41], authors propose an adjustment in the interval for sending hello messages of the AODV protocol in a Flying Ad-Hoc Networks (FANETs) scenario, focusing on reducing the energy consumption of unmanned aerial vehicles (UAVs) by reducing the frequency of sending the hello message.
The results show a reduction in energy consumption without loss of network performance. Despite presenting relevant results, the work focuses on FANETs and their specific characteristics. In Reference [42] the authors propose three algorithms to adjust the time to send Hello messages. The first algorithm is called Reactive Hello, where Hello messages are only sent when the node wants to send some packet. In other words, the discovery of the neighborhood is done only when the node wants to send a packet. Despite reducing overhead once the number of messages is reduced, this approach can degrade the network if its mobility is high, since the changes will only be noticed when the node needs to send a packet. The second method is called Event-Based Hello and the adjustment is made based on the events that occur in the network. In this approach, at first a network node sends Hello messages with the default frequency, but if after a predefined period of time that node does not receive any Hello messages from a neighbor or does not need to send packets it stops sending Hello messages. The problem with this approach is that if all the nodes in the network move away and after the time period return to get closer, no one will send Hello messages and the topology information would be out of step until a node decides to send a packet with the same problem as the Reactive Hello approach. In the third method, called Adaptive Hello, each node in the network sends a Hello after moving a defined distance. The problem with this algorithm is that each node needs to assume its position. In Reference [43], the frequency depends on the speed of the nodes, and the problem of this approach is when there are nodes that do not move but disconnect, for example, to save energy.
The works previously mentioned demonstrate that a dynamic adjustment reduces overhead in relation to the simplistic model where the frequency of sending messages is defined in a static manner using fixed values. In this context, the goal is that the algorithm adjusts the sending of Hello messages according to the mobility of the network. The mobility occurs when a node moves out of the reach of neighbors, shuts down or it is inoperative. In case of mobility events, the frequency is adjusted to higher values so that the new network information can converge quickly. If there is no mobility on the network, the frequency should be reduced but not suspended as proposed in other works.
In this context, the main contributions of this paper can be summarized as follows:
  • To develop an enhanced routing protocol based on RL technique, named e-RLRP, that is able to learn from network events history, avoiding paths with connection problems. Also, it is able to reduce the number of control messages. The routing algorithm based on RL is developed according to Reference [40].
  • Implementation of an algorithm that compensates the overhead inserted by the messages related to RL algorithm in the RLRP. To the best of our knowledge, a dynamic adjustment algorithm of Hello Message time interval to compensate the overhead has not been treated by other routing protocols based on RL. Thus, the present research contributes with the advances in the state-of-the-art of these protocol types.
  • The performance of the proposed method is compared to other widely used routing protocols, such as the Better Approach To Mobile Ad-hoc Networking (BATMAN) and Optimized Link State Routing (OLSR), and also the RLRP protocol. To this end, different network typologies and traffic flows were implemented. The performance comparison considers key network parameters, such as throughput, packet loss rate and delay. Also, the speech perceptual quality in a VoIP communication service is evaluated, in which two operation modes of the AMR-WB speech codec [44] are used.
The algorithm to compensate for the overhead caused by the use of RL is based on the reduction of the overhead generated by another control message, the Hello message, which is responsible for the dissemination of information about the neighborhood of each network node. A dynamic adjustment in the frequency of sending the Hello message is capable of reducing the global overhead. The algorithm proposed in this work adjusts the sending of Hello messages according to the mobility of the network. Thus, this work contributes in the improvement of routing protocols based on RL technique, because it addresses one of the deficiencies of these protocols, which is the increasing number of control messages; therefore, the network overhead is also affected.
In this work, different ad-hoc multihop network scenarios are implemented, considering different network topologies, a variable number of nodes, different traffic flows and several degrees of network mobility. In order to simulate network failures, some nodes drop in random instants during each simulation. In these scenarios, a VoIP traffic is simulated and used as a case study. To this end, an UDP traffic is defined between a pair of source and destination nodes, and some nodes in the network are randomly turned off in order to simulate a network failure. Thus, it is possible to obtain network parameters, such as throughput, delays, packet loss rate and number of control message sent to the network, which are used to evaluate the impact of the routing algorithm on the perceptual quality of VoIP communication according to the E-model algorithm described in ITU-T recommendation G.107.1 [16]. It is important to note that VoIP service is used as a specific study case, but the proposed routing algorithm is for general purposes being agnostic of the service application. Finally, experimental performance results show that the proposed e-RLP overcame, in most of the test scenarios used in this work, the other routing protocols used for comparison purposes. The e-RLRP provides an overhead reduction of up to 18% compared to RLRP. The case study demonstrates that e-RLRP can provide a VoIP communication quality improvement of more than 90% if compared to OLSR, and up to 8% if compared to RLRP.
The remainder of this paper is structured as follows. In the Section 2 a theoretical review is presented. The proposed routing algorithm based on RL is described in Section 3. In Section 4, the different steps of the experimental setup are described. Section 5 presents the experimental results. Finally, the conclusions are presented in Section 6.

2. Theoretical Review

2.1. Reinforcement Learning

RL is a Machine Learning technique in which there is an agent that interacts with the environment through actions and receives rewards for the actions taken. The RL problem can be summarized as, an agent interacting with an environment in order to maximize the accumulated reward over time [35].
The generalization of the RL interaction process [35] is shown in Figure 1, where the Agent interacts with the Environment through an a t action. This interaction leads to a new s t + 1 state and generates a reward for the Agent.
Through the rewards the agent estimates the action taken, and this knowledge is then used by the agent to adapt future decisions, which is usually controlled by the estimated value Q. In general, the estimated value defines how good a given action is.
The formulation of the RL optimization process can be represented as a Markov Decision Process (MDP) [35], introducing 4 sets S , A , P , R , where, S is a set of possible states of the agent; A represents the set of possible actions that an agent can take; P is defined as set of probabilities, in that an agent in a state s, advances to a state s when opting for an action A. And finally the reward function R, which generates the reinforcement that the agent receives for choosing action A.
According to MDP the transition probabilities from s to s after taking action a ( P s s a ), can be described as follows:
P s s a = P r s t + 1 = s s t = s , a t = a .
The estimation reward values (E) for action a ( R s s a ), from state s to s , is defined by:
R s s a = E r t + 1 s t = s , a t = a , s t + 1 = s .
The sets S and P can be defined by a set of estimation values Q, which is dependent on the reward value obtained from an environment, and also from the current moment t, when the corresponding action has been performed. The estimation function values are presented as follows:
Q k + 1 = Q k + α [ r k + 1 Q k ] ,
where Q k represents the estimation value on the previous step; Q k + 1 is the current estimation value; r k + 1 define the reward value for an action performed on the current step; α represents step size parameter; and k is the current step number.
One of the main questions about RL is to take advantage of the current actions that generate greater rewards or explore new actions in order to be able to obtain even better rewards. In order to maximize the rewards received, the agent must balance the need to explore new actions or take advantage of current ones.
In RL, the most common methods for action selection are greedy, e-greedy and softmax methods [45]. The greedy selection of the action with the maximum estimation value all the time. The e-greedy selection of action with the maximum estimation almost every time, however, sometimes it explores new actions at random. The Softmax method [46] provides a dynamic change of selection probabilities of the actions. This change of selection probabilities of the actions occurs according to a predefined probability function, such as the Gibbs-Boltzmann distribution [35].

2.2. Ad-Hoc Networks Routing Protocols

The purpose of a routing algorithm is to find good paths between a source and a destination node. Usually, the best path is one that has the lowest cost [47]. There are several routing algorithms, some of them aim to find the lowest cost path according to a defined metric. Then, for these protocols, the most common metric is the hop count where the cost of a path is the sum of the number of hops between source and destination.
Ad-hoc network routing protocols must be able to handle a dynamic topology. This feature brings several challenges in their development. In general, these routing protocols can be divided into three subclasses:
  • Reactive protocols [48] which exchange topology information on demand. In this type of protocol, the exchange of information about the topology occurs only when a node wants to send a message. In the reactive protocol, the redundancy in the transmission of service messages is lower in relation to other type of protocols.
  • Proactive protocols [49] which continuously update the route information by sending control messages. In this type of protocol, the exchange of information between nodes about the network topology occurs even before any node sends any packets. Proactive protocols generally provide greater flexibility in route selection compared to reactive ones. However, it produces a greater number of control messages that increases the overhead.
  • Hybrid protocols [50] that combine proactive and reactive characteristics. In hybrid protocols, some routes are created using a proactive approach and later the protocol works reactivelly.
As previously stated, for performance validation, the proposed algorithm is compared to BATMAN, OSPF and RLRP routing protocols, which are described in the following lines.

2.2.1. Better Approach to Mobile Ad-Hoc Networking (BATMAN)

The BATMAN [51] is a proactive routing protocol for Ad-hoc network. It uses a different approach for sharing the knowledge about the best paths. Basically, each node has information about which jump distance neighbor has the best route to a given destination X, that is, which neighbor must be chosen when it is desired to send a packet to node X.
In the BATMAN each node in the network sends a message, called OriGinator Messages (OGMs), to all its neighbors to inform of its existence. The OGMs are small messages that contain the address of the originating node, the address of the node that relayed, a Time To Live (TTL) and a sequence number to record the route already taken by the packet. When a node receives an OGM message it updates its routing table, decreases the TTL and increases the sequence field. After that it forwards the message to its neighbors; this procedure is repeated until all nodes in the network receive the message.
BATMAN uses the exchange of OGMs messages to influence the choice of routes, basically this happens as follows: When an X node in the network receives the same OGM from a Y emitter through two different paths it discards the last message and considers only the first message. The idea is that OGM that arrived first probably traveled the best route.
The node X then records which neighbor of a jump emitted the OGM that arrived first. This neighbor is defined as the best path for a possible route to the Y transmitter. When OGMs go through bad routes are usually lost or take a longer time to arrive, thus, the node will only consider OGMs from good routes, that is, only the routes considered the best are recorded.
Another important mechanism of BATMAN is the selective flooding system that works as follows: When a node receives an OGM in addition to relaying the OGM received to neighbors it also responds the source node with another OGM message. However, it does not send the message in brodcast, it first queries in its table which neighbor has the best route to the source node and sends only to this neighbor. In this way, messages are sent selectively. Which decreases the overhead of control messages.
BATMAN is used as a reference in this work because it is a well-known protocol for ad-hoc networks.

2.2.2. Optimized Link State Routing (OLSR)

The OLSR [52] is a proactive protocol commonly used in ad-hoc networks. The OLSR uses two control messages for topology discovery and maintenance: Hello and Topology Control (TC). Hello messages are used for neighbor discovery. The TC messages are used to disseminate information about neighbors and the state of the links established between them in order to build the network topology.
The OLSR employs a technique called Multi-Point Replaying (MPR) to reduce overhead caused by sending control messages and the number of rebroadcasting nodes [53]. This technique is to limit the number of neighbors that can relay control messages. For this to occur each node selects a number of neighbors that can relay the messages. Unselected neighbors receive the messages but do not forward them to other nodes. Additionally, TC packets include a sequence number to avoid infinite retransmissions due to undesirable loops.
The OLSR is used as a reference in this work because it is a widely used protocol in ad-hoc networks. In addition, this protocol provides better results, in terms of Quality of Service, than other routing algorithms [54] also considering the VoIP service [55].

2.3. Reinforcement Learning Routing Protocol (RLRP)

The RLRP is a reactive routing protocol for multi-hop ad-hoc networks. In general, the purpose of RLRP is to make a decision about the forwarding of packets to neighboring nodes based on estimated values. These values are dynamically updated through the rewards mechanism used by RL. The RLRP works on Linux systems with the TCP/IP stack providing routing for any data packets with either IPv4 or IPv6 addressing [40]. The routing process starts after initializing the routing daemon and runs on a created virtual interface.
The RLRP as any other conventional protocol for ad-hoc multi-hop networks is based on two operational modes. The first one is path discovery, which occurs when a node needs to send a packet and has no routing information for a destination. The second is packet forwarding, which is when a protocol decides which route is the best to send the packet [40].
In the first mode, the RLRP uses the reactive approach. Thus, a source node (A) sends a route request (RREQ) message to its direct neighbors and the neighbors in turn relay this RREQ to their neighbors. This manner, the RREQ message is forwarded to all network nodes until the transmission time-to-live (TTL) counter is reached or until a node that has already sent this RREQ receives the message again. All network nodes that participated in the RREQ relay get route information toward the source node and update their routing tables with that information. The destination node (B) receiving RREQ sends a route response message (RREP) that goes through the same relay process. Neighbor nodes of B and all node participating in RREP relay update their routing table with path information to reach node B. When the node A receives the RREP sent by the node B, all network nodes are already aware of the routes between A and B. Thus, the path discovery process ends and packet forwarding mode can be started.
Conventional routing protocols have in their routing table a field with destination address information. Each route is associated to a cost that is calculated according to an specific metric, then the path which has the lowest cost is selected. In turn, RLRP uses RL to decide which path is the best.
As explained in the Section 2.1 in RL there is an agent, a set of actions that the agent can do. Each agent’s action generates a reward. To this end, there is a set of estimations for the actions. For better association Table 1 introduces a relationship between reinforcement learning and conventional routing protocols.
The Table 1 shows the relationship between the routing mechanism/tasks and the Reinforcement Learning mechanisms. Through this relationship it is possible to apply the RL to the routing task. Thus, an X node of the network that uses the RLRP protocol can be considered an Agent.
The set of actions is the set of nodes in the network on which X can send messages. Sending a packet to a given network node is an Agent Action. And when sending this packet, node X expects to receive an Acknowledgment Message (ACK), if this happens it means that the message reached the given node, that is, a reward was generated for having chosen this node to send the message. If the ACK is not received it means that the message has been lost and the route is bad; then, node X receives a punishment for the chosen action.
Finally, the protocol routing table defines the best route to send a packet to a given destination. Similarly, an estimate set defines which action generates the best reward.

2.4. Speech Quality Assessment in VoIP Services

One of the major concerns in VoIP service is the cost associated with the transmission medium. Due to this fact, in a VoIP communication compression techniques are used, and they do not cause significant losses in the received signal quality [56]. Speech codecs are responsible for this compression. There are different speech codecs, one of the most adopted in current communication networks is the Adaptive Multi-Rate Wideband (AMR-WB) codec [57].
The AMR-WB is a speech codec used for mobile device communications. It is widely used by network operators to provide high quality conversations. AMR-WB is based on the linear prediction generated by the ACELP algebraic code that uses a vector quantization technique [58]. The AMR-WB uses nine operation modes, from 6.6 kbps to 23.85 kbps, and each of one has a different response to packet losses.
The WB E-Model algorithm [16] is a parametric method that predict a conversation quality using different impairment factors related to acoustic environment, network, and speech codec. The R W B is the global quality rating that is obtained using all the impairment factors. This value is expressed on a quality scale from 0 to 129, the higher the value the better the quality. The R W B score is determined by:
R W B = R 0 , W B I s , W B I d , W B I e-eff , W B + A ,
where R 0 , W B represents the basic signal-to-noise ratio (SNR), and for WB networks the standardized value is 129; I s , W B represents the combination of all impairments which occur simultaneously with the voice signal, for WB signals the adopted values of this factor is 0; I d , W B represents the impairments caused by delay and; I e-eff , W B is the quality degradation due to equipment, specifically the speech code; A represents an advantage factor, but in WB E-model is not considered and it is equal to 0. In this paper, we mainly focus on I e-eff , W B , and the I d , W B is also evaluated.
The I e-eff is determined by:
I e , eff , W B = I e , W B + ( 95 I e , W B ) · P p l P p l + B p l W B ,
where I e , W B is the equipment impairment factor at zero packet-loss, only related to codec impairment; P p l is the probability of packet losses, and the B p l W B is the packet-loss robustness factor for a specific codec in WB networks.
In Annex IV of ITU-T recommendation G.113 [59], I e and B p l values for AMR-WB cocec are defined. Table 2 presents the number of bits and bit-rate of each AMR-WB operation modes, and their existing standardized I e and B p l values. Note that some B p l values are not defined (ND) in some cases.
In this work, the operation modes used in the simulation tests were 2 and 8, because they have the Bpl parameter already defined, as can be observed in Table 2. Thus, the I e , eff , W B value can be computed.
The I d is computed using the following relation:
I d , W B = I dte , W B + I dle , W B + I dd , W B ,
where I dte , W B gives an estimate for the impairments due to talker echo, I dle , W B represents impairments due to listener echo, and I dd , W B represents the impairment caused by an absolute delay T a in the network. In this study, the I dte , W B and I dle , W B are not considered because they are related to echo and acoustic problems at the end-sides of the communication that is out of the scope of this research.
The I dd , W B is defined by:
I dd , W B = 1 , T a < 100 ms 25 [ ( 1 + X 6 ) ( 1 6 ) 3 ( 1 + ( X 3 ) 6 ) 1 6 + 2 ] , T a > 100 ms
where
X = log ( T a 100 ) log 2 .
It is important to note that in the proposed network scenarios, the P p l and T a variable values can be obtained in each simulation test; therefore, the R W B can be computed using (4).

3. The Proposed e-RLRP Algorithm

In this section, the proposed e-RLRP algorithm is explained. Firstly, the RL technique in the routing protocol is implemented according to Reference [40]. Later, the proposed method to reduce the overhead is detailed.

3.1. Reinforcement Learning Used in Routing Protocol

The reward propagation with Acknowledgment message, the reward generation and the estimation values are presented.

3.1.1. Reward Propagation with Acknowledgment Message (ACK)

The reward value is directly related to the receipt of the ACK. When a node wants to send a packet to a given destination it selects a neighbor from the existing one and sends the packet to that neighbor. After that, it waits for the corresponding ACK message, which contains meta-information about the received packet, and the reward value by the action of choosing this neighbor. This ACK message can return using a path different from the one used to send the corresponding packet.
If the ACK is not received within a pre-defined time then the sender node sets a punishment, that is, a negative reward to the neighboring node to which the packet was forwarded. This negative value is set to −1. If the ACK is not being received probably the neighboring node has gone offline. The neighboring may be experiencing hardware issues such as power outages, strong interference with wireless transmission or the node is overloaded with incoming traffic. Hence, it is consistent that this neighbor should be avoided in the future.
If the ACK message is received on time a reward value will be provided within the message. If the value is high it means that the neighbor has a good way to the destination, the probability of choosing this neighbor in the future will increase. If the value is low it means that the chosen neighbor does not have a good route to that destination, because it has hardware problems, there may be many hops or the further links quality is weak. In this case the source node will slowly decrease the estimation value for this neighbor, which is likely to cause the node to later choose other neighbors.

3.1.2. Reward Generation

The mechanism for adjusting the reward value must be flexible, that is, the adjustment may not be too small that do not cause changes or too large as to induce sudden change due to a specific events. For example, if the value of the punishment after choosing a bad route is too low, the estimated value of that route will slowly decrease and probably this bad route can still be chosen for a long time. On the other hand, if the punishment value is too high, a route may no longer be chosen because of just one packet loss event. Therefore, a balance must be found between low and high rewards/punishment.
According to Reference [40], the reward value is calculated as follows: When a node X receives a packet of node Y, an ACK is sent with the reward value to Y. To calculate the reward value, the sum of the estimated values that each neighbor has in relation to destination node Y, called Q dst ip is divided by the corresponding number of neighbors (N). Thus, the reward value is the average of the Q values of the neighbors in relation to node Y. The reward value is calculated according to:
reward value = Q dst ip / N .
Upon receiving the reward value , the node Y adjusts the estimated value for node X. However if the ACK is not received, the node Y automatically set the reward value to −1, that is, a punishment is generated that negatively impacts the estimated value for the route. The estimation value is defined in the next subsection.

3.1.3. Estimation Values Based on Rewards

An initial value must be set for each node when the protocol starts, which is often called cold start. The RLRP initially defines all neighbors with a value of 0 when a source node has no route information towards a destination node. The available range of estimated values is defined as: [0, 100]. When the protocol starts the route discovery process the estimate values are set as follows:
Q n = 100 / N hops ,
where Q n is the estimated value for destination IP towards neighbor n; N hops is the number of hops in which RREQ or RREP messages has traversed from the source to the destination node
After the path discovery procedure ends all nodes in the network have the initial estimated values for all routes. According to the calculation presented in (10), the estimation value is initially defined based on the number of hops between the source and the destination. It can be defined that the RLRP uses an initial approach of the hop count metric, in which the routes with the least hop are chosen.
However, afterwards the values be adjusted since the route with the least number of hops is not always the best one. For, a route may have the least number of hops but present an overloaded link or have nodes that present malfunctions. The adjustment is made according to the received reward value. The estimation value Q like described in Section 2.1 is calculated as follows:
Q k + 1 = Q k + α [ r k + 1 Q k ] ,
where Q k + 1 represents the new estimation value for the action; Q k is the actual estimate value; r k + 1 define the reward value obtained; α represents step size parameter; and k is the current step number. Therefore, the estimated value as stated above is impacted by the reward value.
In e-RLRP, the reward is associated with the successful delivery of packets. Then, in general, the local reward is given to the route that has the best rate of success in delivering packets, and the long-term reward is related to the global network performance by always looking for routes with the highest success rates. As explained in Section 2.1, the RL algorithm has to consider two approaches in order to obtain a long-term reward, the selection of actions that obtain the highest reward values or explore new actions that can generate even better rewards. For this decision task, the e-RLRP uses the Softmax method [60].

3.2. Algorithm Used in the e-RLRP to Reduce the Overhead

To send a packet, the node needs to know what neighbors nodes are directly connected. Therefore, a neighborhood discovery procedure is required. In RLRP, this procedure occurs through the broadcasting of messages called Hello.
By default, Hello messages are sent every 2 s, thus, the information about neighbors is updated in the same period of time. This update interval parameter is called Broadcast Interval (BI). The RLRP has 10 types of headers, two of them are Reward Header and Hello Header. The structure of data fields of the Reward Header and Hello Header are shown in Table 3 and Table 4, respectively.
The Reward Header is 8 bytes. The Type field defines what the header is, the ID field is the unique identifier of the message service. The Neg Reward Flag field is a test flag that checks whether the reward is negative or positive, the Reward Value is a value of reward, and finally, the Msg Hash is the identifier of the packet to which the reward belongs.
The Hello Header size ranges from 4 to 56 bytes, this variation depends on the node address that can be IPV4 or IPV6. The Type field defines what the header is, the field IPv4 Count defines the number of assigned IPv4 addresses, limited to one. The IPv6 Count is number of assigned IPv6 addresses, limited to three. Tx Count is the number of re-broadcasts, GW Mode define that a node is a Gateway in the network, the IPv4 and IPv6 address define the address of the node.
As can be observed in Table 3, the Reward header used in RLRP is 8 bytes long and generates an additional overhead, which corresponds to the use of RL technique.
In this context, the present research implemented an algorithm to reduce the overhead generated by the Hello message, specifically to reduce the frequency of sending Hello messages in order to compensate the additional overhead generated by the Reward header.
It is clear that increasing the time interval for sending Hello messages, defined by the BI parameter, will decrease the frequency of sending messages and consequently, the overhead is also decreased. However, a high value also impacts the time of updating information about the neighborhood, and the routing can be negatively affected.
Thus, the proposed algorithm implemented in the e-RLRP is capable of dynamically adjusts the frequency of sending Hello messages. This adjustment in the parameter BI is made according to the mobility present in the network. If the network is static, that is, no neighbors enter or leave the coverage range, it is not necessary to send Hello messages with a high frequency. Otherwise, if the network presents a high mobility, to send messages more frequently is necessary.
A general high representation of the proposed algorithm is introduced in Figure 2.
The sending of Hello messages starts together with the e-RLRP daemon. Next, the algorithm checks the mobility of the network. To this end, there is a function named Update Neighbors File responsible for updating the list of neighbors every time a Hello from a new node is received. And there is a other function named Check Expired Neighbors that checks if a Hello message has been received from neighbors every 7 s, if a neighbor is 7 s or more without sending a Hello, it is removed from the list because it is out of reach. This interval of time was defined experimentally in Reference [40]. In case, a new neighbor is detected or an existing one is lost, it will be considered that there is mobility in the network.
In the proposed e-RLRP, when mobility occurs, the BI value will be reduced to a lower limit called BI Lower Limit ( B I LL ), the algorithm waits for a new time interval, sends a message and restarts the process. If a mobility event does not occur, the BI parameter will be increased with the Adjustment Factor (AF) parameter respecting the upper limit called BI Upper Limit ( B I UL ). When the time defined by BI is reached, a Hello message will be sent and the process is restarted. Hence, the frequency of sending Hello messages is adjusted according to the mobility of the network
It is worth mentioning that the proposed dynamic adjustment is not based on RL, because RL uses more computational resources.

3.2.1. Definition of the Upper and Lower Limits of Broadcast Interval

The higher the value of the BI parameter, the lower the frequency of sending Hello messages, and consequently the overhead is reduced. However, it is necessary to define a limit to that value does not grow indefinitely.
The B I UL cannot be greater or equal than 7 s due to the Check Expired Neighbors function. Otherwise, the network nodes will be eliminated when the function timeout will be reached. Considering that the B I UL value must be lower than 7 s and also the latency of the existing network, the value 6 s is defined in order to guarantee that neighbors are not erroneously removed.
To define the B I LL , 3 values of BI lower that 2 s are tested in the scenario called Programmed that is described in Section 4.1. The overhead is calculated considering the source and destination node. The BI value of 2 s, defined in the RLRP, is also tested in the same scenario, and the overhead obtained was 1.42 MB. The BI values 0.5, 1.0 and 1.5 were tested. Table 5 shows the overhead results for each BI value.
Table 5 shows the increase in overhead of the tested values in relation to the default value used in RLRP. The BI value of 1.5 had a gain of 2.12%, the value of 1.0 presented an increase of 4.22%. The value of 0.5 obtained the highest increase, a gain of approximately 12.67%. Considering this value as a high increase in overhead compared to the previous ones, the value of 0.5 is discarded. Hence, we opted for the intermediate tested value, and B I LL is set to 1.0.

3.2.2. Adjustment Factor

The objective of the e-RLRP is to reduce overhead but without degrading the performance of the algorithm. Thus, after a scenario of high mobility is detected, the rise of the BI parameter should be slower to ensure that the upper limit is slowly reached, because there is a likelihood that the occurrence of mobility will repeat itself. In a scenario in which an isolated episode of mobility occurs, the climb should be a little faster. Therefore, the AF also should has responses according to the mobility of the network. It is important to note that in initial tests, we used fixed values for the frequency of Hello messages, and the results demonstrated that dynamic methods permit to obtain better results in terms of the network performance parameters used in this work.
To ensure that no sudden changes occur in the AF, a scale of ten positions is defined, in which the upper limit is called A F ul and the minimum value is called A F ll .
Also in the Programmed scenario described in the Section 4.1, the convergence time (CT) of the e-RLRP, which is defined as the time elapsed between breaking a route until the algorithm converged to find a new route, was also evaluated. Experimental test results demonstrated that the average of CT is 20.6 s.
The AF value cannot be high to avoid be aggressive enough to BI parameter reach the B I UL before the CT. Then, to calculate A F ul the Arithmetic Progression (AP) or also known as arithmetic sequence is applied, with a difference between the consecutive terms equal to B I , where term A 1 is B I LL , A n is B I UL and the sum of the terms must not be greater than CT.
To ensure that value is not reached before 20.6 s, the value is rounded to 21 s and applying the formula of the sum of a AP, the A F ul value is obtained.
C T ( B I UL + B I LL ) × n 2 .
Applying the result of Equation (12) in the formula for the general term of a AP:
B I UL = B I LL + ( n 1 ) × A F ul .
The value obtained for A F ul is 1, then, the maximum value of AF should be 1. As previously stated, a scale of 10 position was defined. Then, the value of A F ll is 0.1, and each position of that scale is increased by 0.1.
Whenever mobility occurs in the network the AF is decreased in the scale. The increase will occur when there is a tendency of decrease in mobility during a period of time.
This period of time called Time of Check (TC) is defined by the average between CT value and the time spent for the algorithm starting from B I LL until reaching value B I UL with adjustment A F ll . To calculate TC, first, the formula of the general term of AP is applied. The A F ll is the common difference, B I UL and B I LL are the terms An and A1 respectively.
B I UL = B I LL + ( n 1 ) A F ll .
Applying the result of Equation (14) in the formula for the sum of a AP and averaging:
T C = C T + ( B I LL + B I UL ) n 2 2 .
The TC value is 99.7, in this way after 99.7 s if there is a tendency to reduce mobility, the AF will be increased. A mobility counter denominated M counter will be used to count how many mobility events occur in the TC time period. Whether when a new neighbor comes within range of a given node or when a neighbor leaves within range of that node
M counter = N e w N e i g h b o r s counter + L o s t N e i g h b o r s counter .
Belonging to a family of statistical approaches used to analyze time series data in the area of finance and technical analysis [61], the Exponential Moving Average (EMA) can be used to estimate values [61,62,63]. The EMA is used to calculate if the occurrence of mobility tends to increase or decrease according to the Equation (17). The EMA is applied in a series of 10 values M counter .
E M A k = ( M counter E M A k 1 ) ( 2 ( N + 1 ) ) + E M A k 1 .
If E M A k < E M A k 1 , the number of mobility events has a tendency to decrease, then the AF value will be increased. The period N of 10 values was chosen precisely because it is the number of times that AF must be increased until reaching A F ul .
The scheme of the AF adjustment algorithm is shown in Figure 3.
Thus, the BI is adjusted according to the mobility of the network, making possible to reduce overhead.

4. Experimental Setup

In this section, different network scenario configurations used in the simulation tests for performance validation of the proposed e-RLRP are described. Different network topologies with different numbers of nodes, routes, traffic flows and network mobility conditions are considered. Firstly, the four network topologies used in the simulations are described. Later, two simulation scenarios are explained. Finally, the transmission rate in the scenarios are explained, and the simulation environment is described.

4.1. Network Topology

In this work, four network topologies were created to simulate a wireless node network, which are called T1, T2, T3 and T4. Node names were distributed in order to improve the understanding of the scenarios that will be described later. The topologies were developed in order to guarantee that each route has a different number of hops. In Topology T1, there are 3 routes and 8 nodes as illustrated in Figure 4.
The Topology T2 is an extension of T1 with the addition of three nodes, thus, in total there are 11 nodes and four different routes, which are distributed according to Figure 5.
The T3 is illustrated in Figure 6. This topology is also an extension of the T1 but now we add five extra nodes; thus, there are a total of 13 nodes with 5 different routes.
The T4 is illustrated in Figure 7. This topology like the others is an extension of the T1 but now we add eight extra nodes; thus, there are a total of 16 nodes with 6 different routes.

4.2. Emulation Scenario

In order to test the functionalities of the e-RLRP, two different scenarios were developed in which there are routes that degrade network performance. To this end, some nodes in the network were configured to disconnect on a recurring basis at random instants, simulating node failures and mobility in the network.
In the first scenario, only topology T1 is used. A flow is defined with node C being the source and E being the destination, the node D will be programmed to shut down 5 times. This node is part of the shortest route between the source and destination of traffic for T1. For a better later association, the first scenario is named Programmed (P). Thus, the scenario P is a proof of concept to test the RL in the e-RLRP, in which a better performance than other protocol is expected. In principle, the route with the least number of hops is the best path and is the one that should be chosen initially by all protocols. However, in this scenario, the choice of this path will cause degradation in the network since there is a node that recurrently disconnects causing packet loss. As the e-RLRP can learn from the network, it should be able to avoid the path containing nodes which present recurrent drops.
The second scenario, named Random (R), also a flow is defined with node C being the source and E being the destination. The nodes A, D and G of topology T1; nodes A, D, G and J of T2; nodes A, D, G, J and L of T3; and nodes A, D, G, J, N, and O of T4 are randomly disabled at different instants, in order to simulate random drops. In addition, 3 configurations for drops are defined. In the first configuration, 3 drops are drawn between the aforementioned nodes for each topology. In the second configuration, 5 drops are drawn, and in the third configuration 7 drops are considered. The reason for choosing only these nodes is to ensure that each route has only one node that fails, thus, the same probability to draw a drop for each route is ensured. These nodes are randomly disconnected in each simulation. The instants in which each node drops during the simulation is randomly defined, then, the routing algorithm does not know which node is down to avoid that path. The objective of this scenario is to test the e-RLRP in a random scenario when the network degradation increases. The network scenarios characteristics used in this research are different from network scenarios in which node drops are controlled, and a scheduler can be implemented in the network. It is important to note that the e-RLRP could also work in conjunction with a scheduler for more complex network scenarios, but these scenarios are out of the scope of this present research.
Additionally, two different configurations of the scenario R is defined for topologies T3 and T4 where the flow number is greater than one. A network configuration with 3 flows is defined, in which the first one is from node C to E, second one from node F to B and third one from node I to H. The second network configuration considers 4 flows, where an additional flow from node M to K is added to the three previous mentioned flows. The objective of these two scenarios, is to investigate the impact of the additional network overhead due to RL control messages.
In these both scenarios, the ability of e-RLRP to avoid routes that degrade the network through the use of RL is tested. And mainly the ability of e-RLRP to reduce network overhead in mobility scenarios is also evaluated, providing a higher throughput and reducing the Ppl value.
Table 6 shows which nodes have been configured to shut down simulating a drop in T1, T2, T3 and T4 topologies for all scenarios. In the Programmed Scenario uses only the T1 because it is a scenario for proof of concept.

4.3. Transmission Rates of AMR-WB Codec

This work also aims to test the impact of the previously mentioned routing protocols in a real communication service, to this end, VoIP communication scenario is used as a case study. Thus, a traffic from node C to E is simulated with different bit-rates defined according to the AMR-WB codec. In addition, we used UDP communication and a packet time-length of 20 ms.
Speech signal transmitted on an IP network is compressed by a speech codec, and them this payload must be packaged. For this, Real Time Protocol (RTP), the UDP and IP headers are inserted. The bit-rates presented in Table 2 only refer to the payload, then, it is necessary to add the number of bits regarding the RTP (12 bytes), UDP (8 bytes) and IP (20 bytes) headers to obtain the transmission rate. For example, AMR-WB-Mode 2 (12.65 kbps) contains 253 bits that are sent every 20 ms, then if the 320 bits of headers are added, a total of 573 bits are sent in this same period of time, that represents a transmission rate of 28.65 kbps. Table 7 shows the transmission rates used in the test scenarios.

4.4. Emulation Environment

To test and analyze the performance of the four protocols previously mentioned, we use the network emulator Common Open Research Emulator (CORE) [64]. Developed by Boeing’s Research and Technology division, CORE is a real-time, open source, emulator. The CORE is chosen because it enables the use of real-world routing protocols and applications using Linux system virtualization. The e-RLRP code must be executed on a Linux platform. Each node in the emulator is a virtual machine with network interface and resources shared with the host machine. The e-RLRP, RLRP, BATMAN and OLSR routing protocols are installed to be used by network nodes.
The network performance metrics obtained in the tests were throughput, Probability of Packet Loss (Ppl), the Round Trip Time (RTT) and Overhead. The throughput and Ppl values are calculated using Iperf tool [65]. It is capable of generating UDP and TCP traffic streams at defined rates. To calculate RTT, the UDP stream is replaced by an ICMP stream generated by the native Linux PING command. The PING command itself returns the RTT value. The Overhead is measured using the WireShark [66] tool. In addition to the aforementioned tools, the native Linux shell script is used to shutdown nodes on a programmed or random basis.
Finally, the speech quality of a VoIP communication is evaluated. To this end, the network parameters, such as Ppl and delay were used as inputs of the E-model algorithm to estimate the communication quality.

5. Results and Discussions

In order to evaluate the e-RLRP performance in relation to BATMAN, OLSR and RLRP protocols, different network scenarios were emulated. Each simulation scenario runs 50 times, and the average value for each scenario is computed. The simulation of each scenario takes 600 s.
In the test scenarios, the AMR-WB operation modes 2 and 8 were considered. Thus, the transmission bit-rates considered were those presented in Table 7.
Firstly, an ideal scenario without drops is tested to assess the overhead reduction obtained by the e-RLRP in relation to RLRP. The Table 8 shows the overhead in the network scenario without drops, these results represent the average overhead of the nodes, considering AMR-WB Modes 8 and 2.
As expected, the results obtained in the ideal scenario without drops demonstrate that e-RLRP obtained an overhead approximately 16% lower than RLRP. This result is due to the fact that the e-RLRP in a scenario without falls keeps the frequency of sending messages lower than the RLRP.
In a real ad-hoc network environment, nodes move or may fail, degrading the network performance. Therefore, the e-RLRP, RLRP, BATMAN and OLSR protocols are testing in scenario where mobility occurs. The throughput and Ppl results, in the so-called scenario P, are illustrated in Table 9 and Table 10, respectively.
Results presented in Table 9 and Table 10 demonstrate that e-RLRP and RLRP have a better performance than BATMAN and OSLR. The e-RLRP and RLRP have a Ppl value close to zero because they avoid the route containing node B that presents recurring drops. The value does not reach zero because when the routing starts, both protocols choose the route of node B which has the lowest number of hops, but after successive drops of node B, both protocols no longer consider the use of this route.
Differently, the OLSR protocol chooses the route which contains node B, because this is the path with the least number of hops. Despite the BATMAN protocol having obtained a higher Ppl than e-RLRP and RLRP, it presented a performance better than OLSR. This is due to the OGM messaging mechanism.
The overhead results for scenario P considering AMR-WB Modes 2 and 8 are shown in Table 11.
The overhead results presented in Table 11 show that the e-RLRP reduced the overhead in relation to the RLRP by approximately 7%, and also got better results than BATMAN and OLSR protocols. This happens because the e-RLRP reduced the frequency of sending Hello messages.
Similarly, the same network performance parameters are evaluated in R scenario. The Throughput, Ppl when nodes are shut down 3 times are presented in Table 12 and Table 13, respectively.
As can be observed in Table 12 and Table 13, the OLSR had the worst performance considering Ppl and Throughput, which is explained by the use of RL in e-RLRP and RLRP, and by the BATMAN OGM message mechanism. The e-RLRP reached similar throughput results to the other protocols, but in some scenarios, the Ppl had a significant reduction with e-RLRP.
The overhead when nodes are shut down 3 times are presented in Table 14. The results presented in the Table 14 demonstrate that the overhead of e-RLRP is lower than that of RLRP, reaching in some scenarios a reduction close to 18%.
The Throughput, Ppl and Overhead when nodes are shut down 5 times are presented in Table 15, Table 16 and Table 17, respectively.
According to the results obtained in a Five Drops scenario, the e-RLRP and RLRP algorithm performed better than BATMAN and OLSR. Also, the e-RLRP obtained an overhead reduction and Ppl lower values in relation to RLRP.
Similarly, the Throughput, Ppl and overhead, when nodes are shut down 7 times, are presented in Table 18, Table 19 and Table 20, respectively.
According to the presented results, the scenario where 7 drops occurs, the e-RLRP obtains better performance in all cases compared to BATMAN and OLSR, and also it presents a better performance than RLRP in most of the scenarios.
In general, the performance gain in scenarios R was lower than in scenario P. This behavior is because, in the scenario P the drops are recurrent in only one route, which facilitates the learning process of the e-RLRP.
Figure 8 demonstrates the e-RLRP performance improvement in relation to the other protocols. The Ppl values obtained is the average of the results obtained in the four topologies and both AMR-WB rates modes used in the tests.
From the results we can conclude that the performance of the e-RLRP in relation to the other three protocols increases when the number of drops increases. By increasing the number of drops, the performance of all algorithms degrades, however, in the e-RLRP and RLRP this degradation is lower.
Figure 9 shows the relationship between e-RLRP performance and the number of nodes in the network. The Ppl values obtained are the average of the results obtained in the scenarios of 3, 5 and 7 drops and both AMR-WB rate modes used in the tests. It is important to note that the higher the number of nodes in the network, the higher the processing needed by the RL algorithm to determine the reward values. Despite the RL processing increases, the performance obtained by the e-RLRP, in terms of Ppl, is superior in relation to the other routing protocols.
The Throughput, Ppl and overhead, for three flows considering AMR-WB Modes 8, are presented in Table 21, Table 22 and Table 23, respectively.
Similarly, the Throughput, Ppl and overhead, for three flows, and considering AMR-WB Mode 2, are presented in Table 24, Table 25 and Table 26, respectively.
Analyzing the scenario with 3 flows, it can be seen that the e-RLRP overcomes in most cases the other protocols considering Ppl and Troughput. Regarding overhead, the e-RLRP reached the best results in all the network scenarios.
The Throughput, Ppl and overhead, for four flows, and considering AMR-WB Mode 8, are presented in Table 27, Table 28 and Table 29, respectively.
Similarly, the Throughput, Ppl and overhead, for four flows, and considering AMR-WB Mode 2, are presented in Table 30, Table 31 and Table 32, respectively.
We can see from the results of the 4-flow scenarios that e-RLRP outperforms other protocols in most cases in terms of Throughput and Ppl. Regarding the overhead e-RLRP obtained the best results in all tested scenarios. In addition, it is worth mentioning that the overhead in general increases when there are more flows, however, specifically the overhead generated by the Hello control message is not so impacted. This is because Hello messages are exchanged regardless of the number of streams in the network.
In the results presented in Table 27, Table 28, Table 30 and Table 31, regarding Throughput and Ppl, we can observe that one of the traffic flow (noted as MK) reached a Ppl almost equal to O, because there is a direct route between the two pairs of nodes and no drops occurred in this path. The extra flows were added in order to overload the network.
Analyzing the results of the scenarios with more than one traffic flow, specifically three and four flows, it is possible to observe that the e-RLRP outperforms the other routing protocols in most of the network scenarios tested, in terms of Ppl and Throughput. Regarding overhead, we can see that e-RLRP continues overcoming the other protocols. The experimental results confirmed that e-RLRP obtained a lower overhead than the RLRP in most of the scenarios, even when the number of traffic flows, the number of routes or node drops were increased. Thus, these demonstrated that the proposed adjustment function worked properly in the task of overhead reduction.
Additionally, the RTT parameter values obtained in scenario P is presented in Figure 10. Figure 11 shows the average of the RTT values of the scenarios R with also a single flow. These results represent the average values of two AMR-WB mode, because there was not difference between them.
Analyzing the results presented in Figure 10 and Figure 11, it is observed that the e-RLRP and RLRP presented the highest RTT values. This can be justified because they are implemented in user space on Linux using a dynamic Python interpreter. According to Reference [40], this implementation-type generates a great loss of performance mainly due to the high number of I/O operations that cause delays in the packet sending process. It is worth mentioning that this is a limitation generated by the language in which it was implemented and not by the code/project. Thus, the implementation of these both protocols had a restriction in this regard, that was reflected in RTT values obtained in the experimental tests. According to (6) and (7), delays in the network have a negative impact on speech quality predictions.
Finally, the speech communication quality was evaluated using (4)–(6) considering the P p l and RTT values found in test scenarios that consider a single traffic flow with the topologies T1, T2, T3 and T4 used in this work. Figure 12 presents the R W B scores for scenario R with Three Drops, Figure 13 presents the R W B scores for Five Drops and Figure 14 with Seven Drops.
Figure 15 presents the R W B scores for scenario P.
As can be observed from Figure 12, Figure 13, Figure 14 and Figure 15, the use of e-RLRP promotes a gain of R W B score in relation to those obtained by the RLRP, BATMAN and OLSR protocols. In some cases the gain in relation to OLSR is more to 90%. In relation to BATMAN, in some cases the gain is approximately 33%. In relation to the RLRP, the gain approaches 8%.
Therefore, RL in routing protocols improves the user’s QoE in a speech communication service. The e-RLRP not only reduces overhead but also provides a positive impact in the quality of VoIP communication, mainly because the Ppl is decreased.

6. Conclusions

In this work, the experimental results demonstrate that a routing protocol based on RL overcomes traditional protocols, such as BATMAN and OLSR, specifically in Ppl and throughput parameters. These network performance results prove the relevance of the RL-based routing protocols to improve the computer, and ad-hoc networks. However, the RL technique generates an extra overhead. Thus, the proposed and developed adjustment algorithm was able to reduce the network overhead in terms of reducing the number of control messages. The dynamic adjustment in the frequency of sending Hello messages provided a reduction of up to 18% overhead. This gain increases the network’s payload providing better network performance. The global performance of the proposed method was optimized using different configurations and parameter values, leading to a final configuration which was defined experimentally. In terms of throughput and Ppl, in most of the test scenarios used in this work the e-RLRP achieved better performance, specially with respect to the Ppl parameter. Therefore, it is demonstrated that the proposed solution reduces overhead and also improves the network conditions.
Reducing network overhead in conventional protocols is an important approach because it provides performance improvements. This approach is even more relevant when it is used by new routing techniques, such RL, that aim to improve network performance but it generates extra overhead. Thus, an important contribution of this work is to demonstrate that extra overhead can be reduced using the proposed dynamic adjustment function.
It is worth noting that in our experimental tests different network topologies and configurations were used, including different numbers of nodes and their drops, and also different numbers of traffic flows.
Also, experimental results show the impact of network performance parameters on the user’s QoE in the VoIP communication services. The e-RLRP obtained better values of R W B due to having lower P p l values despite to have higher RTT values, which are calculated according to (6) and (7) defined in the WB E-model algorithm. In this case, it is observed that Ppl has a greater negative impact on speech quality than RTT, for the values obtained in the simulation scenarios considered in this research. Results indicate a quality improvement of more than 90% if compared to OLSR, and up to 8% if compared to RLRP. Therefore, it can be concluded that the RL-based routing protocols has a significant positive impact on user’s QoE in real-time communication services.
As a general conclusion, this research highlights the usefulness of incorporating machine-learning algorithms in routing protocols, specially for ad-hoc networks that recurrently present node drops. RL-based routing protocols can help to improve network conditions, and as a consequence, different communication applications are improved. In this work, only the VoIP service is evaluated, but in future works, video communication service will also be evaluated. Also, the implemented dynamic adjustment mechanism in the sending of Hello messages provided a performance improvement on the network, mainly by reducing overhead, which is an important approach to be applied in RL-based routing protocols.
In a future work, the proposed e-RLRP will be implemented in a real network environment to validate the performance results and potential benefits found in our simulation tests. Also, the inclusion of a scheduler or decentralized schedulers will be considered to work in conjunction with the e-RLRP algorithm in a future research, in which more complex and dynamic networks will be also implemented.

Author Contributions

Methodology and data curation, writing—original draft, D.R.M. and H.P.d.M.; formal analysis and validation, project conceptualization, R.L.R.; Supervision, writing—original draft, project administration, L.W.; project conceptualization, original draft, project administration funding acquisition, M.A.R.; formal analysis and validation, project conceptualization, writing—original draft D.Z.R. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP) in the following projects: Audio-Visual Speech Processing by Machine Learning, under Grant 2018/26455-8; Temático ELIOT: Enabling technologies for IoT, under Grant 2018/12579-7; and CPE C4AI: Center for Artificial Intelligence, under Grant 2019/07665-4. This Research is also partially funded by TSRI Fund (CU-FRB640001-01-21-6).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Khan, F.; Li, H. Ensuring trust and confidentiality for adaptive video streaming in ICN. J. Commun. Netw. 2019, 1–9. [Google Scholar] [CrossRef]
  2. Neves, F.; Soares, S.; Assuncao, P.A.A. Optimal voice packet classification for enhanced VoIP over priority-enabled networks. J. Commun. Netw. 2018, 20, 554–564. [Google Scholar] [CrossRef]
  3. Lee, S.; Kim, J. Adaptation for the retransmission in VoIP applications. J. Commun. Netw. 2017, 19, 298–305. [Google Scholar] [CrossRef]
  4. Hassan, J.A.; Hassan, M.; Das, S.K.; Ramer, A. Managing Quality of Experience for Wireless VOIP Using Noncooperative Games. IEEE J. Sel. Areas Commun. 2012, 30, 1193–1204. [Google Scholar] [CrossRef]
  5. CISCO. Visual Networking Index: Forecast and Methodology, 2013–2018; White Paper; Cisco Public: San Jose, CA, USA, 2014. [Google Scholar]
  6. Nazih, W.; Hifny, Y.; Elkilani, W.S.; Dhahri, H.; Abdelkader, T. Countering DDoS Attacks in SIP Based VoIP Networks Using Recurrent Neural Networks. Sensors 2020, 20, 5875. [Google Scholar] [CrossRef]
  7. Rodríguez, D.Z.; Möller, S. Speech Quality Parametric Model that Considers Wireless Network Characteristics. In Proceedings of the 2019 Eleventh International Conference on Quality of Multimedia Experience (QoMEX), Berlin, Germany, 5–7 June 2019; pp. 1–6. [Google Scholar] [CrossRef]
  8. Wang, Y.; Lin, X. User-provided networking for QoE provisioning in mobile networks. IEEE Wirel. Commun. 2015, 22, 26–33. [Google Scholar] [CrossRef]
  9. Nayak, D.; Mohanty, S.K.; Sahoo, A.B. Enhancing Battery Lifetime of Wireless Heterogeneous and Ad hoc NW. In Intelligent Computing, Communication and Devices; Jain, L.C., Patnaik, S., Ichalkaranje, N., Eds.; Springer: New Delhi, India, 2015; pp. 709–715. [Google Scholar]
  10. Mayor, V.; Estepa, R.; Estepa, A.; Madinabeitia, G. Energy-Efficient UAVs Deployment for QoS-Guaranteed VoWiFi Service. Sensors 2020, 20, 4455. [Google Scholar] [CrossRef]
  11. Affonso, E.T.; Nunes, R.D.; Rosa, R.L.; Pivaro, G.F.; Rodriguez, D.Z. Speech quality assessment in wireless voip communication using deep belief network. IEEE Access 2018, 6, 77022–77032. [Google Scholar] [CrossRef]
  12. Affonso, E.T.; Rodríguez, D.Z.; Rosa, R.L.; Andrade, T.; Bressan, G. Voice quality assessment in mobile devices considering different fading models. In Proceedings of the 2016 IEEE International Symposium on Consumer Electronics (ISCE), Sao Paulo, Brazil, 28–30 September 2016; pp. 21–22. [Google Scholar]
  13. ITU-T Rec. P.800. Methods for Subjective Determination of Transmission Quality; ITU: Geneva, Switzerland, 1996. [Google Scholar]
  14. Nunes, R.D. Performance improvement of a non-intrusive voice quality metric in lossy networks. IET Commun. 2019, 13, 3401–3408. [Google Scholar] [CrossRef]
  15. ITU-T Rec. G.107. The E-Model: A Computational Model for Use in Transmission Planning; ITU: Geneva, Switzerland, 2015. [Google Scholar]
  16. ITU-T Rec. P.862.1. Mapping Function for Transforming P.862 Raw Result Scores to MOS-LQO; ITU: Geneva, Switzerland, 2003. [Google Scholar]
  17. Affonso, E.T.; Rosa, R.L.; Rodríguez, D.Z. Speech Quality Assessment Over Lossy Transmission Channels Using Deep Belief Networks. IEEE Signal Process. Lett. 2018, 25, 70–74. [Google Scholar] [CrossRef]
  18. Tang, F.; Mao, B.; Fadlullah, Z.M.; Kato, N.; Akashi, O.; Inoue, T.; Mizutani, K. On Removing Routing Protocol from Future Wireless Networks: A Real-time Deep Learning Approach for Intelligent Traffic Control. IEEE Wirel. Commun. 2018, 25, 154–160. [Google Scholar] [CrossRef]
  19. Nawrocki, P.; Sniezynski, B.; Kolodziej, J.; Szynkiewicz, P. Adaptive context-aware energy optimization for services on mobile devices with use of machine learning considering security aspects. In Proceedings of the 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), Melbourne, Australia, 11–14 May 2020; pp. 708–717. [Google Scholar]
  20. Huang, H.; Yin, H.; Luo, Y.; Zhang, X.; Min, G.; Fan, Q. Three-dimensional geographic routing in wireless mobile ad hoc and sensor networks. IEEE Netw. 2016, 30, 82–90. [Google Scholar] [CrossRef]
  21. Ding, R.; Xu, Y.; Gao, F.; Shen, X.; Wu, W. Deep Reinforcement Learning for Router Selection in Network With Heavy Traffic. IEEE Access 2019, 7, 37109–37120. [Google Scholar] [CrossRef]
  22. Rosa, R.L.; Schwartz, G.M.; Ruggiero, W.V.; Rodríguez, D.Z. A knowledge-based recommendation system that includes sentiment analysis and deep learning. IEEE Trans. Ind. Inform. 2018, 15, 2124–2135. [Google Scholar] [CrossRef]
  23. Guimarães, R.; Rodríguez, D.Z.; Rosa, R.L.; Bressan, G. Recommendation system using sentiment analysis considering the polarity of the adverb. In Proceedings of the 2016 IEEE International Symposium on Consumer Electronics (ISCE), Sao Paulo, Brazil, 28–30 September 2016; pp. 71–72. [Google Scholar]
  24. Lasmar, E.L.; de Paula, F.O.; Rosa, R.L.; Abrahão, J.I.; Rodríguez, D.Z. Rsrs: Ridesharing recommendation system based on social networks to improve the user’s qoe. IEEE Trans. Intell. Transp. Syst. 2019, 20, 4728–4740. [Google Scholar] [CrossRef]
  25. Memeti, S.; Pllana, S.; Binotto, A.; Kołodziej, J.; Brandic, I. A review of machine learning and meta-heuristic methods for scheduling parallel computing systems. In Proceedings of the International Conference on Learning and Optimization Algorithms: Theory and Applications, Rabat, Marroco, 2–5 May 2018; pp. 1–6. [Google Scholar]
  26. Popa, D.; Pop, F.; Serbanescu, C.; Castiglione, A. Deep learning model for home automation and energy reduction in a smart home environment platform. Neural Comput. Appl. 2019, 31, 1317–1337. [Google Scholar] [CrossRef]
  27. Rosa, R.L.; Rodriguez, D.Z.; Bressan, G. SentiMeter-Br: A Social Web Analysis Tool to Discover Consumers’ Sentiment. In Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, 3–6 June 2013; Volume 2, pp. 122–124. [Google Scholar] [CrossRef]
  28. Dhouib, M.A.; Bougueroua, L.; Węgrzyn-Wolska, K.; Benayoune, S. Multi-Agent System for Remote Healthcare Monitoring. In Proceedings of the Fifth International Conference on Innovations in Bio-Inspired Computing and Applications IBICA, Ostrava, Czech Republic, 23–25 June 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 1–12. [Google Scholar]
  29. Bangotra, D.K.; Singh, Y.; Selwal, A.; Kumar, N.; Singh, P.K.; Hong, W.C. An intelligent opportunistic routing algorithm for wireless sensor networks and its application towards e-healthcare. Sensors 2020, 20, 3887. [Google Scholar] [CrossRef]
  30. Hung, L.L. A Smart Sensing and Routing Mechanism for Wireless Sensor Networks. Sensors 2020, 20, 5720. [Google Scholar] [CrossRef]
  31. Shin, C.; Lee, M. Swarm-Intelligence-Centric Routing Algorithm for Wireless Sensor Networks. Sensors 2020, 20, 5164. [Google Scholar] [CrossRef]
  32. Wu, J.; Fang, M.; Li, H.; Li, X. RSU-Assisted Traffic-Aware Routing Based on Reinforcement Learning for Urban Vanets. IEEE Access 2020, 8, 5733–5748. [Google Scholar] [CrossRef]
  33. Li, G.; Boukhatem, L.; Martin, S. An intersection-based QoS routing in vehicular ad hoc networks. Mob. Netw. Appl. 2015, 20, 268–284. [Google Scholar] [CrossRef]
  34. Yang, J.; He, S.; Xu, Y.; Chen, L.; Ren, J. A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks. Sensors 2019, 19, 970. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  35. Sutton, R.; Barto, A. Introduction to Reinforcement Learning; The MIT Press: Cambridge, MA, USA, 1998. [Google Scholar]
  36. Coutinho, N.; Matos, R.; Marques, C.; Reis, A.; Sargento, S.; Chakareski, J.; Kassler, A. Dynamic dual-reinforcement-learning routing strategies for quality of experience-aware wireless mesh networking. Comput. Netw. 2015, 88, 269–285. [Google Scholar] [CrossRef]
  37. Peshkin, L.; Savova, V. Reinforcement learning for adaptive routing. In Proceedings of the 2002 International Joint Conference on Neural Networks, IJCNN’02 (Cat. No.02CH37290), Honolulu, HI, USA, 12–17 May 2002; Volume 2, pp. 1825–1830. [Google Scholar]
  38. Wang, S.; Shin, Y. Efficient routing protocol based on reinforcement learning for magnetic induction underwater sensor networks. IEEE Access 2019, 7, 82027–82037. [Google Scholar] [CrossRef]
  39. Jung, W.; Yim, J.; Ko, Y. QGeo: Q-Learning-Based Geographic Ad Hoc Routing Protocol for Unmanned Robotic Networks. IEEE Commun. Lett. 2017, 21, 2258–2261. [Google Scholar] [CrossRef]
  40. Dugaev, D.; Matveev, I.; Siemens, E.; Shuvalov, V. Adaptive Reinforcement Learning-Based Routing Protocol for Wireless Multihop Networks. In Proceedings of the International Scientific-Technical Conference on Actual Problems of Electronics Instrument Engineering, Novosibirsk, Russia, 2–6 October 2018; pp. 209–218. [Google Scholar]
  41. Mahmud, I.; Cho, Y. Adaptive Hello Interval in FANET Routing Protocols for Green UAVs. IEEE Access 2019, 7, 63004–63015. [Google Scholar] [CrossRef]
  42. Giruka, V.C.; Singhal, M. Hello protocols for ad-hoc networks: Overhead and accuracy tradeoffs. In Proceedings of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, Taormina-Giardini Naxos, Italy, 16 June 2005; pp. 354–361. [Google Scholar] [CrossRef]
  43. Troël, A. Prise en Compte de la Mobilité Dans les Interactions de Proximité Entre Terminaux à Profils Hétérogènes. Ph.D. Thesis, Université de Rennes 1, Rennes, France, 2004. [Google Scholar]
  44. 3GPP TS 26.171. Adaptive Multi-Rate-Wideband (AMR-WB) Speech Codec. General Description (v15.0.0); 3GPP: Sophia Antipolis CEDEX, France, 2018. [Google Scholar]
  45. Koulouriotis, D.; Xanthopoulos, A. Reinforcement learning and evolutionary algorithms for non-stationary multi-armed bandit problems. Appl. Math. Comput. 2008, 196, 913–922. [Google Scholar] [CrossRef]
  46. Asadi, K.; Littman, M.L. An Alternative Softmax Operator for Reinforcement Learning. In Proceedings of the 34th International Conference on Machine Learning, Sydney, Australia, 6–11 August 2017; Volume 70, pp. 243–252. [Google Scholar]
  47. Kurose, J.F.; Ross, K.W. Computer Networking: A Top-Down Approach, 6th ed.; Pearson: Hoboken, NJ, USA, 2012. [Google Scholar]
  48. Dhurandher, S.K.; Obaidat, M.S.; Gupta, M. A reactive Optimized Link State Routing protocol for Mobile ad hoc networks. In Proceedings of the 2010 17th IEEE International Conference on Electronics, Circuits and Systems, Athens, Greece, 12–15 December 2010; pp. 367–370. [Google Scholar]
  49. Mbarushimana, C.; Shahrabi, A. Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks. In Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW’07), Niagara Falls, Canada, 21–23 May 2007; Volume 2, pp. 679–684. [Google Scholar]
  50. Ramasubramanian, V.; Haas, Z.J.; Sirer, E.G. SHARP: A Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks. In Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing, Annapolis, MD, USA, 1–3 June 2003; pp. 303–314. [Google Scholar]
  51. Sanchez-Iborra, R.; Cano, M.D.; Garcia-Haro, J. Performance evaluation of BATMAN routing protocol for VoIP services: A QoE perspective. IEEE Trans. Wirel. Commun. 2014, 13, 4947–4958. [Google Scholar] [CrossRef]
  52. Clausen, T.H.; Jacquet, P.; Adjih, C.; Laouiti, A.; Minet, P.; Muhlethaler, P.; Qayyum, A.; Viennot, L. Optimized Link State Routing Protocol (OLSR). 2003. Available online: https://hal.inria.fr/inria-00471712/document (accessed on 12 January 2021).
  53. AlShahwan, F.; Alshamrani, M.; Amer, A.A. Dynamic Novel Cross-Layer Performance Enhancement Approach for SIP over OLSR. IEEE Access 2018, 6, 71947–71964. [Google Scholar] [CrossRef]
  54. Fang, J.; Goff, T.; Pei, G. Comparison studies of OSPF-MDR, OLSR and Composite Routing. In Proceedings of the IEEE Military Communications Conference, San Jose, CA, USA, 31 October–3 November 2010; pp. 989–994. [Google Scholar] [CrossRef]
  55. Sai Anand, G.C.; Vaidya, R.R.; Velmurugan, T. Performance Analysis of VoIP Traffic using various Protocols and Throughput enhancement in WLANs. In Proceedings of the 2011 International Conference on Computer, Communication and Electrical Technology (ICCCET), Tamilnadu, India, 18–19 March 2011; pp. 176–180. [Google Scholar]
  56. Rodríguez, D.Z.; Rosa, R.L.; Almeida, F.L.; Mittag, G.; Möller, S. Speech Quality Assessment in Wireless Communications With MIMO Systems Using a Parametric Model. IEEE Access 2019, 7, 35719–35730. [Google Scholar] [CrossRef]
  57. Salami, R.; Bessette, B.; Lefebvre, R.; Jelinek, M.; Rotola-Pukkila, J.; Vainio, J.; Mikkola, H.; Jarvinen, K. The adaptive multi-rate wideband codec: History and performance. In Proceedings of the 2002 IEEE Workshop Proceedings Speech Coding, Ibaraki, Japan, 9 October 2002; pp. 144–146. [Google Scholar]
  58. Kumari, B.; Maurya, A.; Pattanaik, M.; Sharma, G.K. An efficient algebraic codebook structure for CS-ACELP based speech codecs. In Proceedings of the 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Delhi, India, 3–5 July 2017; pp. 1–6. [Google Scholar]
  59. ITU-T Rec. G.113—Appendix IV. Revised Appendix IV—Provisional Planning Values for the Wideband Equipment Impairment Factor and the Wideband Packet Loss Robustness Factor; ITU: Geneva, Switzerland, 2009. [Google Scholar]
  60. Luo, Y.; Wong, Y.; Kankanhalli, M.; Zhao, Q. G-Softmax: Improving Intraclass Compactness and Interclass Separability of Features. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 685–699. [Google Scholar] [CrossRef] [PubMed]
  61. Awheda, M.D.; Schwartz, H.M. Exponential moving average Q-learning algorithm. In Proceedings of the 2013 IEEE Symposium on Adaptive Dynamic Programming and Reinforcement Learning (ADPRL), Singapore, 16–19 April 2013; pp. 31–38. [Google Scholar] [CrossRef]
  62. Burkov, A.; Chaib-draa, B. Effective learning in the presence of adaptive counterparts. J. Algorithms 2009, 64, 127–138. [Google Scholar] [CrossRef]
  63. Tesauro, G. Extending Q-learning to general adaptive multi-agent systems. In Advances in Neural Information Processing Systems; The MIT Press: Cambridge, MA, USA, 2004; pp. 871–878. [Google Scholar]
  64. Ahrenholz, J.; Danilov, C.; Henderson, T.R.; Kim, J.H. CORE: A real-time network emulator. In Proceedings of the MILCOM 2008—2008 IEEE Military Communications Conference, San Diego, CA, USA, 16–19 November 2008; pp. 1–7. [Google Scholar]
  65. Tirumala, A.; Qin, F.J.; Dugan, J.M.; Ferguson, J.A.; Gibbs, K.A. iPerf: TCP/UDP Bandwidth Measurement Tool; The Board of Trustees of the University of Illinois: Urbana, IL, USA, 2005. [Google Scholar]
  66. Lamping, U.; Warnicke, E. Wireshark User’s Guide; Free Software Foundation: Boston, MA, USA, 2004. [Google Scholar]
Figure 1. Generalized Reinforcement Learning Scheme.
Figure 1. Generalized Reinforcement Learning Scheme.
Sensors 21 00504 g001
Figure 2. Scheme of the dynamic adjustment algorithm proposed.
Figure 2. Scheme of the dynamic adjustment algorithm proposed.
Sensors 21 00504 g002
Figure 3. Scheme of dynamic adjustment of Adjustment Factor (AF).
Figure 3. Scheme of dynamic adjustment of Adjustment Factor (AF).
Sensors 21 00504 g003
Figure 4. Network Scenario Topology T1.
Figure 4. Network Scenario Topology T1.
Sensors 21 00504 g004
Figure 5. Network Scenario Topology T2.
Figure 5. Network Scenario Topology T2.
Sensors 21 00504 g005
Figure 6. Network Scenario Topology T3.
Figure 6. Network Scenario Topology T3.
Sensors 21 00504 g006
Figure 7. Network Scenario Topology T4.
Figure 7. Network Scenario Topology T4.
Sensors 21 00504 g007
Figure 8. e-RLRP Performance, in terms of Ppl, and considering different number of drops.
Figure 8. e-RLRP Performance, in terms of Ppl, and considering different number of drops.
Sensors 21 00504 g008
Figure 9. e-RLRP Performance, in terms of Ppl, and considering different number of nodes.
Figure 9. e-RLRP Performance, in terms of Ppl, and considering different number of nodes.
Sensors 21 00504 g009
Figure 10. RTT Obtained in Scenario P (Programmed).
Figure 10. RTT Obtained in Scenario P (Programmed).
Sensors 21 00504 g010
Figure 11. RTT Obtained in Scenario R (Random).
Figure 11. RTT Obtained in Scenario R (Random).
Sensors 21 00504 g011
Figure 12. R W B Score in Scenario R with Three Drops.
Figure 12. R W B Score in Scenario R with Three Drops.
Sensors 21 00504 g012
Figure 13. R W B Score in Scenario R with Five Drops.
Figure 13. R W B Score in Scenario R with Five Drops.
Sensors 21 00504 g013
Figure 14. R W B Score in Scenario R with Seven Drops.
Figure 14. R W B Score in Scenario R with Seven Drops.
Sensors 21 00504 g014
Figure 15. R W B Score in Scenario P.
Figure 15. R W B Score in Scenario P.
Sensors 21 00504 g015
Table 1. Relationship Between Reinforcement Learning (RL) and Conventional Routing Protocols.
Table 1. Relationship Between Reinforcement Learning (RL) and Conventional Routing Protocols.
RL TaskRouting Task
AgentSource node
Set of actionsNeighbors set
Set of estimation values (Q)Routing table
Agent ActionSend a packet to neighbors
Agent receives a rewardNode receives an ACK message
Table 2. Adaptive Multi-Rate Wideband (AMR-WB) Operation Modes and their Bit-rates, I e and B p l  Values.
Table 2. Adaptive Multi-Rate Wideband (AMR-WB) Operation Modes and their Bit-rates, I e and B p l  Values.
AMR-WB Operation ModesNumber of BitsBit-Rate (kbps) I e B p l
01326.6041ND
11778.8526ND
225312.65134.3
328514.2510ND
431715.857ND
536518.255ND
639719.853ND
746123.051ND
847723.8584.9
Table 3. Reward Header Format.
Table 3. Reward Header Format.
Field NameSize (Bits)Description
TYPE4Type ID of the header
ID20ID of the service message
NEG_REWARD_FLAG1Check reward
REWARD_VALUE7Value of the reward
MSG_HASH32ID of the data packet
Table 4. Hello Header Format.
Table 4. Hello Header Format.
Field NameSize (Bits)Description
TYPE4Type ID of the header
IPV4_COUNT1Number of IPv4 addresses
IPV6_COUNT2Number of IPv6 addresses
TX_COUNT24Number of frame re-broadcasts
GW_MODE1Indicates GateWay Mode
IPV4_ADDRESS32IPv4 address (if exists)
IPV6_ADDRESS_1128IPv6 address 1 (if exists)
IPV6_ADDRESS_2128IPv6 address 2 (if exists)
IPV6_ADDRESS_3128IPv6 address 3 (if exists)
Table 5. Broadcast Interval values to obtain overhead.
Table 5. Broadcast Interval values to obtain overhead.
Broadcast Interval Value (s)Overhead (MB)Overhead Increase (%)
1.51.452.12% gain in relation to 2.0 s
1.01.484.22% gain in relation to 2.0 s
0.51.6012.67% gain in relation to 2.0 s
Table 6. Nodes Set to Disconnect.
Table 6. Nodes Set to Disconnect.
T1T2T3T4
Scenario PD---
Scenario RADGADGJADGJLADGJNO
Table 7. Bit-rate After Adding RTP, UDP and IP headers.
Table 7. Bit-rate After Adding RTP, UDP and IP headers.
AMR-WB Bit-Rate (kpbs)Bit-Rate Considering RTP/UDP/IP Headers (kpbs)
12.6528.65
23.8539.85
Table 8. Overhead (kbps) obtained in Scenario without drops considering AMR-WB Modes 8 and 2.
Table 8. Overhead (kbps) obtained in Scenario without drops considering AMR-WB Modes 8 and 2.
Routing ProtocolMode 8 (kbps)Mode 2 (kbps)
e-RLRP2.292.24
RLRP2.712.65
Batman6.606.30
OLSR2.632.58
Table 9. Throughput (kbps) obtained in Scenario P considering AMR-WB Modes 2 and 8.
Table 9. Throughput (kbps) obtained in Scenario P considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8AMR-WB Mode-2
T1T1
(kbps)(kbps)
e-RLRP39.8028.60
RLRP39.7928.60
Batman39.2828.25
OLSR36.5926.31
Table 10. Ppl (%) obtained in Scenario P considering AMR-WB Modes 2 and 8.
Table 10. Ppl (%) obtained in Scenario P considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8AMR-WB Mode-2
T1T1
(%)(%)
e-RLRP0.040.03
RLRP0.050.05
Batman1.31.23
OLSR8.088.02
Table 11. Overhead (kbps) Obtained in Scenario P considering AMR-WB Modes 2 and 8.
Table 11. Overhead (kbps) Obtained in Scenario P considering AMR-WB Modes 2 and 8.
Mode 8 (kbps)Mode 2 (kbps)
e-RLRP2.802.75
RLRP2.902.84
Batman6.906.50
OLSR2.882.80
Table 12. Throughput (kbps) Obtained in Scenario R with Three Drops considering AMR-WB Modes 2 and 8.
Table 12. Throughput (kbps) Obtained in Scenario R with Three Drops considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8AMR-WB Mode-2
T1T2T3T4T1T2T3T4
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP39.4039.5039.5439.5628.3128.3928.4128.41
RLRP39.0639.4639.5139.5128.1128.3728.4228.38
Batman39.0539.2039.2439.3028.0628.1728.2028.22
OLSR37.5738.539.0939.1427.0627.7428.1128.12
Table 13. Ppl (%) Obtained in Scenario R with Three Drops considering AMR-WB Modes 2 and 8.
Table 13. Ppl (%) Obtained in Scenario R with Three Drops considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8AMR-WB Mode-2
T1T2T3T4T1T2T3T4
(%)(%)(%)(%)(%)(%)(%)(%)
e-RLRP1.000.730.640.581.010.720.650.63
RLRP1.850.850.720.711.720.810.750.76
Batman1.861.491.391.251.791.511.351.32
OLSR5.603.251.781.655.403.021.711.67
Table 14. Overhead (kbps) Obtained in Scenario R with Three Drops considering AMR-WB Modes 2 and 8.
Table 14. Overhead (kbps) Obtained in Scenario R with Three Drops considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8AMR-WB Mode-2
T1T2T3T4T1T2T3T4
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP2.712.832.952.992.682.772.892.92
RLRP2.792.933.453.892.712.953.033.77
Batman6.207.808.038.456.057.707.978.23
OLSR2.742.942.993.272.702.862.953.18
Table 15. Throughpu (kbps) Obtained in Scenario R with Five Drops considering AMR-WB Modes 2 and 8.
Table 15. Throughpu (kbps) Obtained in Scenario R with Five Drops considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8AMR-WB Mode-2
T1T2T3T4T1T2T3T4
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP38.9839.1139.2839.2828.0628.2028.2328.21
RLRP38.9739.0139.1639.2328.0128.0528.1628.19
Batman38.4838.2038.8838.9527.6827.4727.8727.99
OLSR38.0338.3838.6038.6427.3227.5927.7327.74
Table 16. Ppl (%) Obtained in Scenario R with Five Drops considering AMR-WB Modes 2 and 8.
Table 16. Ppl (%) Obtained in Scenario R with Five Drops considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8            AMR-WB Mode-2
T1T2T3T4T1T2T3T4
(%)(%)(%)(%)(%)(%)(%)(%)
e-RLRP2.101.711.291.301.901.671.281.25
RLRP2.101.981.601.542.051.911.541.50
Batman3.304.012.302.103.203.912.502.30
OLSR4.443.563.012.954.473.523.042.98
Table 17. Overhead (kbps) Obtained in Scenario R with Five Drops considering AMR-WB Modes 2 and 8.
Table 17. Overhead (kbps) Obtained in Scenario R with Five Drops considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8AMR-WB Mode-2
T1T2T3T4T1T2T3T4
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP2.902.983.013.032.862.942.983.02
RLRP2.943.143.883.952.923.093.783.90
Batman11.0511.2011.4011.4811.0111.0011.3011.38
OLSR3.163.704.674.723.123.754.524.61
Table 18. Throughput (kbps) Obtained in Scenario R with Seven Drops considering AMR-WB Modes 2 and 8.
Table 18. Throughput (kbps) Obtained in Scenario R with Seven Drops considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8AMR-WB Mode-2
T1T2T3T4T1T2T3T4
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP38.9839.1539.1339.1928.0128.1528.1428.16
RLRP38.9738.9538.9839.0128.0027.9928.0628.19
Batman37.1937.6337.4737.4926.7327.0527.0027.03
OLSR36.7737.9838.5238.5526.4027.3027.7127.73
Table 19. Ppl (%) Obtained in Scenario R with Seven Drops considering AMR-WB Modes 2 and 8.
Table 19. Ppl (%) Obtained in Scenario R with Seven Drops considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8AMR-WB Mode-2
T1T2T3T4T1T2T3T4
(%)(%)(%)(%)(%)(%)(%)(%)
e-RLRP2.101.611.591.452.011.571.601.54
RLRP2.092.132.101.552.052.121.901.83
Batman6.555.455.855.626.565.395.605.49
OLSR7.604.563.203.107.704.543.103.01
Table 20. Overhead (kbps) Obtained in Scenario R with Seven Drops considering AMR-WB Modes 2 and 8.
Table 20. Overhead (kbps) Obtained in Scenario R with Seven Drops considering AMR-WB Modes 2 and 8.
AMR-WB Mode-8AMR-WB Mode-2
T1T2T3T4T1T2T3T4
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP2.983.414.844.992.943.254.104.96
RLRP3.103.645.295.453.013.395.365.25
Batman11.1211.1512.1012.3511.2111.1312.0112.49
OLSR3.263.795.105.173.203.854.995.01
Table 21. Throughput (kbps) Obtained in Scenario R with Three Flows considering AMR-WB Mode 8.
Table 21. Throughput (kbps) Obtained in Scenario R with Three Flows considering AMR-WB Mode 8.
Mode 8
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
CE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IH
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP38.50/38.38/38.2038.16/38.11/38.3337.81/37.60/38.1038.49/38.40/38.2738.15/38.17/38.3237.91/37.77/38.06
RLRP38.33/38.19/38.1838.10/38.14/38.2837.77/37.59/37.5038.40/38.32/38.2538.14/38.16/38.2937.87/37.75/37.83
Batman38.17/38.18/38.3737.60/37.71/37.7236.89/36.90/37.7738.18/38.22/38.2637.71/37.83/37.7936.83/37.02/36.95
OLSR37.93/38.11/38.1837.32/37.84/38.0137.46/37.59/37.4438.04/38.22/38.2637.48/37.96/38.0637.52/37.66/37.56
Table 22. Ppl (%) Obtained in Scenario R with Three Flows considering AMR-WB Mode 8.
Table 22. Ppl (%) Obtained in Scenario R with Three Flows considering AMR-WB Mode 8.
Mode 8
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
CE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IH
(%)(%)(%)(%)(%)(%)
e-RLRP0.69/0.63/1.031.40/1.10/0.822.05/2.63/1.990.51/0.51/0.851.17/1.10/0.721.80/2.20/1.40
RLRP0.71/1.06/1.091.31/1.19/0.852.15/2.66/2.860.52/0.74/0.911.20/1.15/0.801.90/2.20/2.00
Batman1.41/1.18/1.012.70/2.40/2.285.40/4.60/5.101.10/0.98/0.882.30/2.00/2.104.60/4.10/4.20
OLSR1.75/1.27/1.13.41/1.96/1.522.95/2.68/3.011.45/0.98/0.892.90/1.67/1.402.80/2.45/2.70
Table 23. Overhead (kbps) Obtained in Scenario R with Three flows considering AMR-WB Mode 8.
Table 23. Overhead (kbps) Obtained in Scenario R with Three flows considering AMR-WB Mode 8.
Mode 8
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP2.783.335.922.813.356.17
RLRP4.784.727.954.904.826.41
Batman9.9012.2015.4510.2011.9814.85
OLSR3.925.106.804.105.336.21
Table 24. Throughput (kbps) Obtained in Scenario R with Three Flows considering AMR-WB Mode 2.
Table 24. Throughput (kbps) Obtained in Scenario R with Three Flows considering AMR-WB Mode 2.
Mode 2
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
CE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IH
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP27.84/27.87/27.7727.86/27.65/27.8227.48/27.31/27.6727.85/27.86/27.7627.65/27.71/27.8427.50/27.35/27.69
RLRP27.83/27.71/27.7327.80/27.70/27.6627.46/27.30/27.2327.84/ 27.76/27.7527.65/27.74/27.8227.48/27.34/27.20
Batman27.69/27.74/27.7627.60/27.63/27.6626.69/26.97/26.8727.70/27.75/27.7527.63/27.68/27.7126.87/26.91/26.80
OLSR27.57/27.66/27.7727.06/27.49/27.6127.23/27.29/27.2027.61/27.65/27.7127.24/27.48/27.6527.21/27.24/27.23
Table 25. Ppl (%) Obtained in Scenario R with Three Flows considering AMR-WB Mode 2.
Table 25. Ppl (%) Obtained in Scenario R with Three Flows considering AMR-WB Mode 2.
Mode 2
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
CE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IH
(%)(%)(%)(%)(%)(%)
e-RLRP0.64/0.56/0.991.14/1.27/0.711.95/2.58/1.250.62/0.54/0.851.32/1.01/0.591.86/2.39/1.19
RLRP0.68/1.03/1.111.20/1.15/0.782.02/2.59/2.840.64/0.95/0.981.32/1.02/0.721.95/2.42/2.69
Batman1.19/1.01/1.031.70/1.40/1.284.50/4.10/4.301.15/ 0.98/0.961.42/1.22/1.104.10/3.98/4.35
OLSR1.62/1.28/0.903.45/1.90/1.472.83/2.60/2.941.49/1.23/0.862.67/1.90/1.322.71/2.62/2.83
Table 26. Overhead (kbps) Obtained in Scenario R with Three flows considering AMR-WB Mode 2.
Table 26. Overhead (kbps) Obtained in Scenario R with Three flows considering AMR-WB Mode 2.
Mode 2
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP2.623.096.893.022.976.14
RLRP4.164.766.924.214.806.62
Batman9.7011.4514.269.2311.5213.52
OLSR3.864.955.763.494.886.77
Table 27. Throughput (kbps) Obtained in Scenario R with Four Flows considering AMR-WB Mode 8.
Table 27. Throughput (kbps) Obtained in Scenario R with Four Flows considering AMR-WB Mode 8.
Mode 8
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
CE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IH
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP38.40/38.23/38.29/39.838.23/37.98/38.26/39.838.40/37.93/38.26/39.838.41/38.29/38.29/39.838.28/38.09/38.21/39.838.04/37.87/37.86/39.8
RLRP38.37/38.23/38.27/39.0138.14/38.16/38.20/39.637.89/37.79/38.18/39.838.39/38.28/38.29/39.838.15/38.07/38.18/39.838.02/37.82/37.81/39.8
Batman37.99/38.06/38.15/39.737.60/37.49/37.53/39.836.52/36.71/36.79/39.838.04/38.10/38.22/39.837.71/37.54/37.51/39.836.72/36.92/36.81/39.8
OLSR38.22/38.18/38.21/39.837.40/37.61/38.07/39.837.45/37.71/37.71/39.838.25/38.22/38.25/39.837.46/37.59/38.10/39.837.46/37.60/37.62/39.8
Table 28. Ppl (%) Obtained in Scenario R with Four Flows considering AMR-WB Mode 8.
Table 28. Ppl (%) Obtained in Scenario R with Four Flows considering AMR-WB Mode 8.
Mode 8
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
CE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IH
(%)(%)(%)(%)(%)(%)
e-RLRP0.52/0.88/0.92/00.96/1.10/1.14/01.79/2.30/1.85/00.49/0.75/ 0.81/00.83/1.30/1.01/01.45/1.89/1.81/0
RLRP0.61/0.95/0.96/01.22/1.25/1.15/01.83/2,31/1.93/00.55/0.84/0.81/01.17/1.35/1.10/01.50/1.96/1.89/0
Batman1.59/1.41/1.16/02.58/2.89/2.78/05.40/4.90/4.70/01.46/ 1.31/0.98/02.30/2.76/2.65/04.78/4.30/4.65/0
OLSR0.98/1.10/1.02/03.11/2.57/1.38/03.08/2.68/2.64/00.92/0.98/0.91/02.95/2.63/1.29/02.95/2.59/2.43/0
Table 29. Overhead (kbps) Obtained in Scenario R with Four flows considering AMR-WB Mode 8.
Table 29. Overhead (kbps) Obtained in Scenario R with Four flows considering AMR-WB Mode 8.
Mode 8
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP3.154.194.203.254.374.60
RLRP3.455.454.923.495.65.10
Batman9.2210.2013.039.310.1013.02
OLSR3.224.725.303.334.685.90
Table 30. Throughput (kbps) Obtained in Scenario R with Four Flows considering AMR-WB Mode 2.
Table 30. Throughput (kbps) Obtained in Scenario R with Four Flows considering AMR-WB Mode 2.
Mode 2
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
CE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IH
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP27.58/27.48/27.50/28.627.51/27.59/27.43/28.627.29/27.15/27.48/28.627.88/27.82/27.79/28.627.81/27.70/27.74/28.627.71/27.41/27.65/28.6
RLRP27.57/27.48/27.49/28.627.35/27.42/27.41/28.627.20/27.13/27.40/28.627.85/27.77/27.78/28.627.80/27.62/27.72/28.627.68/27.37/27.62/28.5
Batman27.32/27.31/27.39/28.626.99/26.94/26.91/28.526.27/26.52/26.60/28.627.61/27.64/27.73/28.627.35/27.31/27.33/28.626.62/26.87/26.93/28.6
OLSR27.29/27.38/27.49/28.626.78/27.21/27.33/28.626.95/27.02/26.92/28.527.61/27.64/27.73/28.627.35/27.31/27.33/28.626.62/26.87/26.93/28.6
Table 31. Ppl (%) Obtained in Scenario R with Four Flows considering AMR-WB Mode 2.
Table 31. Ppl (%) Obtained in Scenario R with Four Flows considering AMR-WB Mode 2.
Mode 2
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
CE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IHCE/FB/IH
(%)(%)(%)(%)(%)(%)
e-RLRP0.58/0.90/0.85/00.87/1.06/1.11/01.62/2.10/1.55/00.52/0.76/0.83/00.75/1.40/1.01/01.17/2.20/1.32/0
RLRP0.59/0.91/0.89/01.38/1.26/1.19/01.93/2,20/1.63/00.62/0.84/ 0.84/00.75/1.41/1.05/01.23/2.32/1.43/0
Batman1.52/1.55/1.26/02.70/2.86/2.98/05.30/4.40/4.10/01.49/1.35/1.03/02.41/2.56/2.49/05.01/4.1/3.89/0
OLSR1.62/1.28/0.90/03.45/1.90/1.47/02.83/2.60/2.94/01.49/1.35/1.03/02.41/2.56/2.49/05.01/4.1/3.89/0
Table 32. Overhead (kbps) Obtained in Scenario R with Four flows considering AMR-WB Mode 2.
Table 32. Overhead (kbps) Obtained in Scenario R with Four flows considering AMR-WB Mode 2.
Mode 2
T3T4
3 Drops5 Drops7 Drops3 Drops5 Drops7 Drops
(kbps)(kbps)(kbps)(kbps)(kbps)(kbps)
e-RLRP2.964.264.133.284.104.46
RLRP3.885.254.613.724.554.88
Batman8.269.0411.658.259.1611.33
OLSR3.064.665.303.954.685.11
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Militani, D.R.; de Moraes, H.P.; Rosa, R.L.; Wuttisittikulkij, L.; Ramírez, M.A.; Rodríguez, D.Z. Enhanced Routing Algorithm Based on Reinforcement Machine Learning—A Case of VoIP Service. Sensors 2021, 21, 504. https://doi.org/10.3390/s21020504

AMA Style

Militani DR, de Moraes HP, Rosa RL, Wuttisittikulkij L, Ramírez MA, Rodríguez DZ. Enhanced Routing Algorithm Based on Reinforcement Machine Learning—A Case of VoIP Service. Sensors. 2021; 21(2):504. https://doi.org/10.3390/s21020504

Chicago/Turabian Style

Militani, Davi Ribeiro, Hermes Pimenta de Moraes, Renata Lopes Rosa, Lunchakorn Wuttisittikulkij, Miguel Arjona Ramírez, and Demóstenes Zegarra Rodríguez. 2021. "Enhanced Routing Algorithm Based on Reinforcement Machine Learning—A Case of VoIP Service" Sensors 21, no. 2: 504. https://doi.org/10.3390/s21020504

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop