SlideShare a Scribd company logo
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290
3391
Maximizing Throughput using Adaptive Routing
Based on Reinforcement Learning
Rahul Desai
Research Scholar, Sinhgad College of Engineering, Asst Professor, Information Tech. Department
Army Institute of Technology, Savitribai Phule Pune University, India
Email: desaimrahul@yahoo.com
Dr. B P Patil
Principal, Professor, E&TC Department, Army Institute of Technology, Savitribai Phule Pune University, India
Email: bp_patil@rediffmail.com
-------------------------------------------------------------------ABSTRACT---------------------------------------------------------------
In this paper, prioritized sweeping confidence based dual reinforcement learning based adaptive routing is
studied. Routing is an emerging research area in wireless networks and needs more research due to emerging
technologies such as wireless sensor network, ad hoc networks and network on chip. In addition, mobile ad hoc
network suffers from various network issues such as dynamicity, mobility, data packets delay, high dropping
ratio, large routing overhead, less throughput and so on. Conventional routing protocols based on distance vector
or link state routing is not much suitable for mobile ad hoc network. All existing conventional routing protocols
are based on shortest path routing, where the route having minimum number of hops is selected. Shortest path
routing is non-adaptive routing algorithm that does not take care of traffic present on some popular routes of the
network. In high traffic networks, route selection decision must be taken in real time and packets must be
diverted on some alternate routes. In Prioritized sweeping method, optimization is carried out over confidence
based dual reinforcement routing on mobile ad hoc network and path is selected based on the actual traffic
present on the network at real time. Thus they guarantee the least delivery time to reach the packets to the
destination. Analysis is done on 50 nodes MANET with random mobility and 50 nodes fixed grid network.
Throughput is used to judge the performance of network. Analysis is done by varying the interval between the
successive packets.
Keywords – DSDV, AODV, DSR, Q Routing, CBQ Routing, DRQ Routing, CDRQ Routing
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: Aug 05, 2017 Date of Acceptance: Sep 30, 2017
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Information is transmitted in the network in form of
packets. Routing is the process of transmitting these
packets from one network to another. Different routing
algorithms such as shortest path routing, bellman ford
algorithms are used. The most simplest and effective
policy used is the shortest path routing. The shortest path
routing policy is good and found effective for less number
of nodes and less traffic present on the network. But this
policy is not always good as there are some intermediate
nodes present in the network that are always get flooded
with huge number of packets. Such routes are referred as
popular routes. In such cases, it is always better to select
the alternate path for transmitting the packets. This path
may not be shortest in terms of number of hops, but this
path definitely results in minimum delivery time to reach
the packets to the destination because of less traffic on
those routes. Such routes are dynamically selected in real
time based on the actual traffic present on the network.
Hence when the more traffic is present on some popular
routes, some un-popular routes must be selected for
delivering the packets.
Ad Hoc networks are infrastructure less networks. These
are consisting of mobiles nodes which are moving
randomly. Routing protocols for an ad hoc network are
generally classified into two types - Proactive and On
Demand. Proactive protocols which are table driven
routing protocols which attempt to maintain consistent, up
to date routing information from each node to every other
node in the network. These protocols require each node to
maintain one or more tables to store routing information
and they respond to changes in network topology by
exchanging updates throughout the network. Destination
Sequenced Distance Vector (DSDV) is one of the earliest
pro-active routing protocol developed for an ad hoc
networks[1]. DSDV is the extension of Bellman-Ford
algorithm[2]. This protocol uses sequence number to avoid
count-to-infinity problem. Every node maintains sequence
number in increasing order. In addition, it maintains
highest sequence number for every destination in the
network. This distance information along with destination
sequence numbers are exchanged using routing update
message among all neighbor nodes. Ad Hoc on Demand
Distance Vector (AODV) routing protocol is on-demand
routing protocol. Here the routing tables are used to store
routing entries. It uses route discovery process to find the
shortest route to the destination [3]. The destination node
replies with route response message. Thus, the shortest
path is stored in routing tables. There will be a single
entry of route available in routing tables. Ad hoc On
Demand Distance Vector Multipath (AOMDV) routing
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290
3392
protocol is just extension of AODV protocol where
multiple entries are stored in routing tables such that if one
path fails, another path will be available in routing tables
[4]. Dynamic source routing is on-demand routing
protocol. Here instead of routing tables, routing caches are
used to store routing tables. It also uses route discovery
process to find the optimum route to the destination. All
intermediate nodes only broadcasts this requests. Only the
destination node replies with the response message. Thus
the shortest route is stored in routing caches [5].
II. REINFORCEMENT LEARNING
Reinforcement learning is learning where the mapping
between situations to actions is carried out so as to
maximize a numerical reward signal [6, 7]. Fig 1 shows
agent’s interaction with the system. An agent checks the
current state of system, chooses one action from those
available in that state, observes the outcome and receives
some reinforcement signal [8-9].
Fig 1: Reinforcement Learning Approach
Q Routing is one of the best reinforcement based learning
algorithm. In this, each node contains reinforcement
learning module which dynamically determines the
optimum path for every destination [10-12]. Let Qx(y, d)
be the time that a node x estimates it takes to deliver a
packet P to the destination node d through neighbor node y
including the time that packet would have to spend in node
x’s queue. Upon sending packet to y, x gets back y’s
estimate for the time remaining in the trip. Upon receiving
this estimate, node x computes the new estimate [13-15].
In Q routing, there is no way to specify the reliability of Q
values. In another optimized form, Confidence Based Q
Routing (CBQ), each Q value is associated with
confidence value (real number between 0 and 1). This
value essentially specifies the reliability of Q values All
Intermediate nodes along with Q value, also transmits C
values which will updated in confidence table. [14-15]
Dual reinforcement Q Routing (DRQ) is another
optimized version of the Q Routing, where learning occurs
in both ways. Performance of DRQ routing almost doubles
as learning occurs in both directions. The various
optimizations on Q routing are also studies in [14-16].
III. PRIORITIZED SWEEPING REINFORCEMENT
LEARNING
Mostly, a packet has multiple possible routes to reach to
its destination. The decision of selecting best route is very
important in order to reach the packets to the destination
having a least amount of time and without packet loss
[17].
Fig 2: Limitation of Shortest Path Algorithms
For example, in order to demonstrate limitation of shortest
path algorithms (fig 2), consider that Node 0, Node 9 and
Node 15 are simultaneously transferring data to Node 20.
Route Node 15-16-17-18-19-20 gets flooded with huge
number of packets and then it starts dropping the packets.
Thus shortest path routing is non-adaptive routing
algorithm that does not take care of traffic present on some
popular routes of the network. Learning such effective
policy for deciding routes online is major challenge, as the
decision of selecting routes must be taken in real time and
packets are diverted on some unpopular routes. The main
goal is to optimize the delivery time for the packets to
reach to the destination and preventing the network to go
into the congestion. There is no training signal available
for deciding optimum policy at run time, instead decision
must be taken when the packets are routed and packets
reaches to the destination on popular routes[18,19].
Prioritized sweeping is a method that requires a model of
the environment. Model of the environment specifies that
agent can use to predict how the environment will respond
to its action. This technique is suited for efficient
prediction and control of stochastic Markov systems.
Agents are used to predict how the environment will
respond to its actions. The prioritized sweeping technique
makes sweeps through the state of spaces, generating for
each state the distribution of possible transactions. It uses
all previous experiences both to prioritize important
dynamic programming sweeps and to guide the
exploration of the state space [19].
In the Q-Routing framework, the state was a packet finds
itself in, is defined by the node that has the packet in its
waiting queue and by the destination the packet is destined
to. The actions available in that state are represented by
sending the packet to one of the node’s neighbors. When a
node n selects greedy its best action A' for a particular
packet P(S, D) , it forwards the packet P(S, D) to node N'
the neighbor-node for which node n believes that it has the
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290
3393
best estimate for delivering packet P to its final destination
D. In order that prioritized sweeping can give a high
priority to the preceding states of a changed state, node N'
needs to send a control message M to all the neighbor
nodes n that can make a transition to node N'. The control
message M takes along with it, the destination D, its own
node-id id , and the priority P. A node n receiving such a
control message looks in its routing table if node N’s best
estimate for delivering a packet P(S, D) to destination D
would use node id. In order that this preceding state can be
updated node N places the tupel (d, id) in its priority queue
with priority P, if this is not the case the packet is simply
discarded [19]. The Q values of the form Qx(*, y) and
Qy(*, x) are given a value close to zero when the link R is
restored. This causes certain packets to be routed in the
wrong direction for a short period of time after a new link
becomes available, but more important, the new link will
be explored and the routing policy will revert to the
optimal routing policy for the new established network
state[19]. The fig 3 shows a proposed optimization on
CDRQ method.
Fig 3: Optimization for CDRQ Routing framework
Fig 4 shows prioritized sweeping technique (PSRL) for the
CDRQ Routing Framework. When node X sends a packet
P(S, D) to node Y, it immediately gets back node Y’s best
estimate R for delivering the packet to the destination.
Node X updates its model and computes the absolute
difference, if this is larger than small threshold θ, it places
the tupel (D, Y) in its priority queue with priority P. Node
X will make such N state transitions, for each state
transition, it pops a state action pair (S, A) from its priority
queue, control message M is sent to all the neighbors of
the node (labeled as 1) [19].
Fig 4: Prioritized sweeping technique for the CDRQ
Routing framework
When node N receives a control message M, it extracts the
state S, action id and the reward R. if the absolute
difference is bigger than the threshold θ and node N’s best
estimate for delivering the packet with destination s uses
the neighbor node id then the tupel (S, id) is placed in
node N’s priority queue with priority P, thus each time
when absolute difference is greater than the threshold θ,
the state change is propagated further throughout the
network. [19].
IV. PERFORMANCE ANALYSIS
Simulation always helps in analyzing the design and
performance of networks before implementing it in the
real application. The various network simulators are
available whose output goes as close as possible to real
time implementation. In this work, we use the discrete-
event simulator NS2 (version 2.34) and the performance
analysis is done using AWK script. This experiment is
carried on 50 Nodes MANET with random mobility of
nodes as shown in Fig 5. The default packet size is 512
bytes. The interval between successive packets varies from
0.1 to 0.2 second. The simulation is carried out for 200
seconds. The various performance parameters are used to
judge the quality of network such as packet delivery ratio,
dropping ratio, delay and throughput. Throughput is one of
most important parameter used to judge the quality of a
network. In general terms, throughput is the maximum rate
of production or the maximum rate at which something
can be processed. In communication terms, network
throughput is the rate of successful message delivery over
a communication channel. Throughput is the rate at which
data is traversing a link while Goodput is the rate at which
useful data traverses a link. Fig. 6 refers to interval versus
Throughput. Prioritized sweeping CDRQ method is
compared with DSDV, AODV, DSR and CDRQ
protocols. Table 1 specifies throughput values for different
intervals.
Fig. 5: 50 Nodes Mobile Ad Hoc Network with Mobility
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290
3394
Fig. 6: Interval vs. Throughput for 50 Nodes MANET with
Random Mobility
Table 1: Interval (s) vs. Throughput (bps) for 50 nodes
MANET
Interval vs. Throughput for 50 Nodes Mobile Ad Hoc
Network with Random Mobility
Interval 0.1 0.12 0.14 0.16 0.18 0.20
AODV 38325 31445 27854 26578 23580 21237
DSDV 10437 14739 12216 12455 9458 7058
DSR 40890 33992 29177 25459 22656 20444
CDRQ 42495 35466 30378 26621 23344 21237
PSRL 102299 84568 30378 26621 47678 50965
The experiment is also carried on 50 nodes fixed grid
network with no mobility as shown in Fig 7. The default
packet size is 512 bytes. The interval varies from 0.1 to
0.2 second. The simulation is carried out for 200 seconds.
Fig. 8 refers to interval versus Throughput. Prioritized
sweeping method is compared with DSDV, AODV, DSR
and CDRQ protocols. Table 2 specifies throughput values
for different intervals.
Fig. 7: 50 Nodes Fixed Grid with No Mobility
Fig. 8: Interval vs. Throughput for 50 Nodes Fixed Grid
Table 2: Interval (s) vs. Throughput (bps) for 50 nodes
Fixed Grid
Interval vs. Throughput for 50 Nodes Fixed Grid
Interval 0.1 0.12 0.14 0.16 0.18 0.20
AODV 42560 35488 30421 26621 23665 21280
DSDV 32593 27167 23319 20373 18146 16296
DSR 40960 34153 29277 25620 22776 20480
CDRQ 42560 35488 30421 26621 23665 21280
PSRL 48275 35488 107929 77424 74091 81491
V. CONCLUSION
In this paper, various reinforcement learning algorithms
were presented. Prioritized Sweeping Confidence Based
Dual Reinforcement Learning method is compared with
existing routing protocols such as DSDV, AODV, and
DSR and also compared with CDRQ protocol. Prioritized
Sweeping Confidence Based Dual Reinforcement
Learning method shows prominent results as compared
with shortest path routing for medium and high load
conditions. Throughput is analyzed by varying the interval
between successive packets. It is observed that throughput
is highly increased in the proposed method as compared
with existing routing protocols such as DSDV, AODV and
DSR.
REFERENCES
[1]M. Imran and M. A. Qadeer, "Evaluation Study of
Performance Comparison of Topology Based Routing
Protocol, AODV and DSDV in MANET," 2016
International Conference on Micro-Electronics and
Telecommunication Engineering, Ghaziabad, 2016, pp.
207-211.
[2]C. Cheng, R. Riley and S.P.R. Kumar, “A loop-free
extended Bellman–Ford routing protocol without bouncing
effect” , Proc. of ACM SIGCOMM Conf. , 1989, pp. 224–
236.
[3]M. K. Marina and S. R. Das, “Ad-hoc on-demand
multi-path distance vector routing,” Wireless
Communication. Mobile Computing, vol. 6, no. 7, 2006,
pp. 969–988
Int. J. Advanced Networking and Applications
Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290
3395
[4]C. E. Perkins, E. M. Royer, and S. Das, “Ad hoc on-
demand distance vector routing,'' document RFC 3561,
IETF, Oct. 2003
[5]C. Liu, Y. Shu, and Y. Zhou, et al., “A comparison of
DSR, MSR and BSR in wireless ad-hoc networks,” SPIE,
vol. 6011, 2005, pp. 601–610.
[6]Fahimeh Farahnakian. "Q-learning based congestion-
aware routing algorithm for onchip network", 2011 IEEE
2nd International Conference on Networked Embedded
Systems for Enterprise Applications, 12/2011
[7]Parag Kulkarni, "Introduction to Reinforcement and
Systemic Machine Learning," in Reinforcement and
Systemic Machine Learning for Decision Making , 1,
Wiley-IEEE Press, 2012, pp.1-21
[8]S. Nuuman, D. Grace and T. Clarke, "A quantum
inspired reinforcement learning technique for beyond next
generation wireless networks," 2015 IEEE Wireless
Communications and Networking Conference Workshops
(WCNCW), New Orleans, LA, 2015, pp. 271-275.
[9]M. N. ul Islam and A. Mitschele-Thiel, "Reinforcement
learning strategies for self-organized coverage and
capacity optimization," 2012 IEEE Wireless
Communications and Networking Conference (WCNC),
Shanghai, 2012, pp. 2818-2823.
[10]Oussama Souihli, Mounir Frikha, Mahmoud Ben
Hamouda, "Load-balancing in MANET shortest-path
routing protocols", Ad Hoc Networks, Volume 7, Issue 2,
March 2009, Pages 431-442
[11]Ouzecki, D.; Jevtic, D., "Reinforcement learning as
adaptive network routing of mobile agents," MIPRO, 2010
Proceedings of the 33rd International Convention ,
pp.479,484, 24-28 May 2010
[12]Ramzi A. Haraty and Badieh Traboulsi “MANET with
the Q-Routing Protocol” ICN 2012 : The Eleventh
International Conference on Networks
[13]S Kumar, Confidence based Dual Reinforcement Q
Routing : An on line Adaptive Network Routing
Algorithm. Technical Report, University of Texas, Austin
1998.
[14]Kumar, S., 1998, “Confidence based Dual
Reinforcement Q-Routing: An On-line Adaptive Network
Routing Algorithm, “Master’s thesis, Department of
Computer Sciences, The University of Texas at Austin,
TX-78712, USA Tech. Report AI98-267.
[15]Kumar, S., Miikkulainen, R., 1997, “Dual
Reinforcement Q-Routing: An On-line Adaptive Routing
Algorithm,’’ Proc. Proceedings of the Malaysian Journal
of Computer, Vol. 17 No. 2, December 2004, pp.21-29
[16]Artificial Neural Networks in Engineering
Conference.
[17]Shalabh Bhatnagar, K. Mohan Babu “ New
Algorithms of the Q-learning type” Science Direct
Automatica 44 (2008} 1111-1119.
Website: www.sciencedirect.com
[18]Soon Teck Yap and Mohamed Othman, “An Adaptive
Routing Algorithm: Enhanced Confidence Based Q
Routing Algorithm in Network Traffic.
[19]Rahul Desai, B P Patil, “Analysis of Reinforcement
Based Adaptive Routing in MANET”, Indonesian Journal
of Electrical Engineering and Computer Science Vol. 2,
No.3, June 2016, pp.684-694
[20]Moore, A.W., Atkeson, C.G., Prioritized Sweeping:
Reinforcement Learning with less data and less time.
Machine Learning, Vol. 13, 1993
Author Biography
Rahul Desai received his Bachelor of
Engineering degree and Masters in
engineering degree from Pune
university. He is currently pursuing
Ph.D. from Pune University, Sinhgad
College of Engineering as a research
center. Presently working as Asst Professor, Dept. of
Information Technology in Army Institute of Technology,
Pune, India. He has published 25 plus research papers in
Dr. B.P. Patil received received Ph.D.
in Electronics Technology from Guru
Nanak Dev Univ., Amritsar India in
year 2000. Presently working as
Professor, Dept. of E&TC Army Institute of Technology,
Pune, India. He has published 120 plus research papers in
various international and national referred journals and
conferences. He is having 25 years of teaching and
industry experience.
various international and national referred journals and
conferences.

More Related Content

What's hot

Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
IJCNCJournal
 
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc NetworksPBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
Eswar Publications
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Narendra Singh Yadav
 
13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian
IAESIJEECS
 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
ijwmn
 
20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)
IAESIJEECS
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
IJCNCJournal
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
KhushbooGupta145
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
IJSRED
 
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
sipij
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
IJCNCJournal
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
ijmnct
 
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
ijwmn
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTESpiros Louvros
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
iosrjce
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
IJCNCJournal
 

What's hot (17)

Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc NetworksPBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
PBMAC – Position Based Channel Allocation for Vehicular Ad Hoc Networks
 
Fy3111571162
Fy3111571162Fy3111571162
Fy3111571162
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian13 9 sep17 22aug 8454 9914-1-ed edit septian
13 9 sep17 22aug 8454 9914-1-ed edit septian
 
O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
 
20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)
 
Performance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocolsPerformance comparison of mobile ad hoc network routing protocols
Performance comparison of mobile ad hoc network routing protocols
 
An Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANETAn Enhanced DSR Protocol for Improving QoS in MANET
An Enhanced DSR Protocol for Improving QoS in MANET
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
AN MINIMUM RECONFIGURATION PROBABILITY ROUTING ALGORITHM FOR RWA IN ALL-OPTIC...
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
 
A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...A scalable and power efficient solution for routing in mobile ad hoc network ...
A scalable and power efficient solution for routing in mobile ad hoc network ...
 
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
FREQUENCY AND TIME DOMAIN PACKET SCHEDULING BASED ON CHANNEL PREDICTION WITH ...
 
Analytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTEAnalytical average throughput and delay estimations for LTE
Analytical average throughput and delay estimations for LTE
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 

Similar to Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning

20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)
IAESIJEECS
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
Editor IJCATR
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
IRJET Journal
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
IOSR Journals
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
IRJET Journal
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
ijwmn
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
شيماء شقيرة
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
ijwmn
 
P01754110117
P01754110117P01754110117
P01754110117
IOSR Journals
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
IJET - International Journal of Engineering and Techniques
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
Narendra Singh Yadav
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
ijsrd.com
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
IJRAT
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
IOSR Journals
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET Journal
 

Similar to Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning (20)

20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)20 16 sep17 22jul 8036 9913-2-ed(edit)
20 16 sep17 22jul 8036 9913-2-ed(edit)
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
A Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETsA Systematic Review on Routing Protocols for VANETs
A Systematic Review on Routing Protocols for VANETs
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Comparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing ProtocolsComparative and Behavioral Study on VANET Routing Protocols
Comparative and Behavioral Study on VANET Routing Protocols
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energ...
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
QUALITY OF SERVICE ROUTING IN MOBILE AD HOC NETWORKS USING LOCATION AND ENERG...
 
P01754110117
P01754110117P01754110117
P01754110117
 
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Paper id 252014153
Paper id 252014153Paper id 252014153
Paper id 252014153
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
IRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing ProtocolIRJET- Survey on Enhancement of Manet Routing Protocol
IRJET- Survey on Enhancement of Manet Routing Protocol
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
Eswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
Eswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
Eswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 

Recently uploaded (20)

AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 

Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning

  • 1. Int. J. Advanced Networking and Applications Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290 3391 Maximizing Throughput using Adaptive Routing Based on Reinforcement Learning Rahul Desai Research Scholar, Sinhgad College of Engineering, Asst Professor, Information Tech. Department Army Institute of Technology, Savitribai Phule Pune University, India Email: desaimrahul@yahoo.com Dr. B P Patil Principal, Professor, E&TC Department, Army Institute of Technology, Savitribai Phule Pune University, India Email: bp_patil@rediffmail.com -------------------------------------------------------------------ABSTRACT--------------------------------------------------------------- In this paper, prioritized sweeping confidence based dual reinforcement learning based adaptive routing is studied. Routing is an emerging research area in wireless networks and needs more research due to emerging technologies such as wireless sensor network, ad hoc networks and network on chip. In addition, mobile ad hoc network suffers from various network issues such as dynamicity, mobility, data packets delay, high dropping ratio, large routing overhead, less throughput and so on. Conventional routing protocols based on distance vector or link state routing is not much suitable for mobile ad hoc network. All existing conventional routing protocols are based on shortest path routing, where the route having minimum number of hops is selected. Shortest path routing is non-adaptive routing algorithm that does not take care of traffic present on some popular routes of the network. In high traffic networks, route selection decision must be taken in real time and packets must be diverted on some alternate routes. In Prioritized sweeping method, optimization is carried out over confidence based dual reinforcement routing on mobile ad hoc network and path is selected based on the actual traffic present on the network at real time. Thus they guarantee the least delivery time to reach the packets to the destination. Analysis is done on 50 nodes MANET with random mobility and 50 nodes fixed grid network. Throughput is used to judge the performance of network. Analysis is done by varying the interval between the successive packets. Keywords – DSDV, AODV, DSR, Q Routing, CBQ Routing, DRQ Routing, CDRQ Routing -------------------------------------------------------------------------------------------------------------------------------------------------- Date of Submission: Aug 05, 2017 Date of Acceptance: Sep 30, 2017 -------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Information is transmitted in the network in form of packets. Routing is the process of transmitting these packets from one network to another. Different routing algorithms such as shortest path routing, bellman ford algorithms are used. The most simplest and effective policy used is the shortest path routing. The shortest path routing policy is good and found effective for less number of nodes and less traffic present on the network. But this policy is not always good as there are some intermediate nodes present in the network that are always get flooded with huge number of packets. Such routes are referred as popular routes. In such cases, it is always better to select the alternate path for transmitting the packets. This path may not be shortest in terms of number of hops, but this path definitely results in minimum delivery time to reach the packets to the destination because of less traffic on those routes. Such routes are dynamically selected in real time based on the actual traffic present on the network. Hence when the more traffic is present on some popular routes, some un-popular routes must be selected for delivering the packets. Ad Hoc networks are infrastructure less networks. These are consisting of mobiles nodes which are moving randomly. Routing protocols for an ad hoc network are generally classified into two types - Proactive and On Demand. Proactive protocols which are table driven routing protocols which attempt to maintain consistent, up to date routing information from each node to every other node in the network. These protocols require each node to maintain one or more tables to store routing information and they respond to changes in network topology by exchanging updates throughout the network. Destination Sequenced Distance Vector (DSDV) is one of the earliest pro-active routing protocol developed for an ad hoc networks[1]. DSDV is the extension of Bellman-Ford algorithm[2]. This protocol uses sequence number to avoid count-to-infinity problem. Every node maintains sequence number in increasing order. In addition, it maintains highest sequence number for every destination in the network. This distance information along with destination sequence numbers are exchanged using routing update message among all neighbor nodes. Ad Hoc on Demand Distance Vector (AODV) routing protocol is on-demand routing protocol. Here the routing tables are used to store routing entries. It uses route discovery process to find the shortest route to the destination [3]. The destination node replies with route response message. Thus, the shortest path is stored in routing tables. There will be a single entry of route available in routing tables. Ad hoc On Demand Distance Vector Multipath (AOMDV) routing
  • 2. Int. J. Advanced Networking and Applications Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290 3392 protocol is just extension of AODV protocol where multiple entries are stored in routing tables such that if one path fails, another path will be available in routing tables [4]. Dynamic source routing is on-demand routing protocol. Here instead of routing tables, routing caches are used to store routing tables. It also uses route discovery process to find the optimum route to the destination. All intermediate nodes only broadcasts this requests. Only the destination node replies with the response message. Thus the shortest route is stored in routing caches [5]. II. REINFORCEMENT LEARNING Reinforcement learning is learning where the mapping between situations to actions is carried out so as to maximize a numerical reward signal [6, 7]. Fig 1 shows agent’s interaction with the system. An agent checks the current state of system, chooses one action from those available in that state, observes the outcome and receives some reinforcement signal [8-9]. Fig 1: Reinforcement Learning Approach Q Routing is one of the best reinforcement based learning algorithm. In this, each node contains reinforcement learning module which dynamically determines the optimum path for every destination [10-12]. Let Qx(y, d) be the time that a node x estimates it takes to deliver a packet P to the destination node d through neighbor node y including the time that packet would have to spend in node x’s queue. Upon sending packet to y, x gets back y’s estimate for the time remaining in the trip. Upon receiving this estimate, node x computes the new estimate [13-15]. In Q routing, there is no way to specify the reliability of Q values. In another optimized form, Confidence Based Q Routing (CBQ), each Q value is associated with confidence value (real number between 0 and 1). This value essentially specifies the reliability of Q values All Intermediate nodes along with Q value, also transmits C values which will updated in confidence table. [14-15] Dual reinforcement Q Routing (DRQ) is another optimized version of the Q Routing, where learning occurs in both ways. Performance of DRQ routing almost doubles as learning occurs in both directions. The various optimizations on Q routing are also studies in [14-16]. III. PRIORITIZED SWEEPING REINFORCEMENT LEARNING Mostly, a packet has multiple possible routes to reach to its destination. The decision of selecting best route is very important in order to reach the packets to the destination having a least amount of time and without packet loss [17]. Fig 2: Limitation of Shortest Path Algorithms For example, in order to demonstrate limitation of shortest path algorithms (fig 2), consider that Node 0, Node 9 and Node 15 are simultaneously transferring data to Node 20. Route Node 15-16-17-18-19-20 gets flooded with huge number of packets and then it starts dropping the packets. Thus shortest path routing is non-adaptive routing algorithm that does not take care of traffic present on some popular routes of the network. Learning such effective policy for deciding routes online is major challenge, as the decision of selecting routes must be taken in real time and packets are diverted on some unpopular routes. The main goal is to optimize the delivery time for the packets to reach to the destination and preventing the network to go into the congestion. There is no training signal available for deciding optimum policy at run time, instead decision must be taken when the packets are routed and packets reaches to the destination on popular routes[18,19]. Prioritized sweeping is a method that requires a model of the environment. Model of the environment specifies that agent can use to predict how the environment will respond to its action. This technique is suited for efficient prediction and control of stochastic Markov systems. Agents are used to predict how the environment will respond to its actions. The prioritized sweeping technique makes sweeps through the state of spaces, generating for each state the distribution of possible transactions. It uses all previous experiences both to prioritize important dynamic programming sweeps and to guide the exploration of the state space [19]. In the Q-Routing framework, the state was a packet finds itself in, is defined by the node that has the packet in its waiting queue and by the destination the packet is destined to. The actions available in that state are represented by sending the packet to one of the node’s neighbors. When a node n selects greedy its best action A' for a particular packet P(S, D) , it forwards the packet P(S, D) to node N' the neighbor-node for which node n believes that it has the
  • 3. Int. J. Advanced Networking and Applications Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290 3393 best estimate for delivering packet P to its final destination D. In order that prioritized sweeping can give a high priority to the preceding states of a changed state, node N' needs to send a control message M to all the neighbor nodes n that can make a transition to node N'. The control message M takes along with it, the destination D, its own node-id id , and the priority P. A node n receiving such a control message looks in its routing table if node N’s best estimate for delivering a packet P(S, D) to destination D would use node id. In order that this preceding state can be updated node N places the tupel (d, id) in its priority queue with priority P, if this is not the case the packet is simply discarded [19]. The Q values of the form Qx(*, y) and Qy(*, x) are given a value close to zero when the link R is restored. This causes certain packets to be routed in the wrong direction for a short period of time after a new link becomes available, but more important, the new link will be explored and the routing policy will revert to the optimal routing policy for the new established network state[19]. The fig 3 shows a proposed optimization on CDRQ method. Fig 3: Optimization for CDRQ Routing framework Fig 4 shows prioritized sweeping technique (PSRL) for the CDRQ Routing Framework. When node X sends a packet P(S, D) to node Y, it immediately gets back node Y’s best estimate R for delivering the packet to the destination. Node X updates its model and computes the absolute difference, if this is larger than small threshold θ, it places the tupel (D, Y) in its priority queue with priority P. Node X will make such N state transitions, for each state transition, it pops a state action pair (S, A) from its priority queue, control message M is sent to all the neighbors of the node (labeled as 1) [19]. Fig 4: Prioritized sweeping technique for the CDRQ Routing framework When node N receives a control message M, it extracts the state S, action id and the reward R. if the absolute difference is bigger than the threshold θ and node N’s best estimate for delivering the packet with destination s uses the neighbor node id then the tupel (S, id) is placed in node N’s priority queue with priority P, thus each time when absolute difference is greater than the threshold θ, the state change is propagated further throughout the network. [19]. IV. PERFORMANCE ANALYSIS Simulation always helps in analyzing the design and performance of networks before implementing it in the real application. The various network simulators are available whose output goes as close as possible to real time implementation. In this work, we use the discrete- event simulator NS2 (version 2.34) and the performance analysis is done using AWK script. This experiment is carried on 50 Nodes MANET with random mobility of nodes as shown in Fig 5. The default packet size is 512 bytes. The interval between successive packets varies from 0.1 to 0.2 second. The simulation is carried out for 200 seconds. The various performance parameters are used to judge the quality of network such as packet delivery ratio, dropping ratio, delay and throughput. Throughput is one of most important parameter used to judge the quality of a network. In general terms, throughput is the maximum rate of production or the maximum rate at which something can be processed. In communication terms, network throughput is the rate of successful message delivery over a communication channel. Throughput is the rate at which data is traversing a link while Goodput is the rate at which useful data traverses a link. Fig. 6 refers to interval versus Throughput. Prioritized sweeping CDRQ method is compared with DSDV, AODV, DSR and CDRQ protocols. Table 1 specifies throughput values for different intervals. Fig. 5: 50 Nodes Mobile Ad Hoc Network with Mobility
  • 4. Int. J. Advanced Networking and Applications Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290 3394 Fig. 6: Interval vs. Throughput for 50 Nodes MANET with Random Mobility Table 1: Interval (s) vs. Throughput (bps) for 50 nodes MANET Interval vs. Throughput for 50 Nodes Mobile Ad Hoc Network with Random Mobility Interval 0.1 0.12 0.14 0.16 0.18 0.20 AODV 38325 31445 27854 26578 23580 21237 DSDV 10437 14739 12216 12455 9458 7058 DSR 40890 33992 29177 25459 22656 20444 CDRQ 42495 35466 30378 26621 23344 21237 PSRL 102299 84568 30378 26621 47678 50965 The experiment is also carried on 50 nodes fixed grid network with no mobility as shown in Fig 7. The default packet size is 512 bytes. The interval varies from 0.1 to 0.2 second. The simulation is carried out for 200 seconds. Fig. 8 refers to interval versus Throughput. Prioritized sweeping method is compared with DSDV, AODV, DSR and CDRQ protocols. Table 2 specifies throughput values for different intervals. Fig. 7: 50 Nodes Fixed Grid with No Mobility Fig. 8: Interval vs. Throughput for 50 Nodes Fixed Grid Table 2: Interval (s) vs. Throughput (bps) for 50 nodes Fixed Grid Interval vs. Throughput for 50 Nodes Fixed Grid Interval 0.1 0.12 0.14 0.16 0.18 0.20 AODV 42560 35488 30421 26621 23665 21280 DSDV 32593 27167 23319 20373 18146 16296 DSR 40960 34153 29277 25620 22776 20480 CDRQ 42560 35488 30421 26621 23665 21280 PSRL 48275 35488 107929 77424 74091 81491 V. CONCLUSION In this paper, various reinforcement learning algorithms were presented. Prioritized Sweeping Confidence Based Dual Reinforcement Learning method is compared with existing routing protocols such as DSDV, AODV, and DSR and also compared with CDRQ protocol. Prioritized Sweeping Confidence Based Dual Reinforcement Learning method shows prominent results as compared with shortest path routing for medium and high load conditions. Throughput is analyzed by varying the interval between successive packets. It is observed that throughput is highly increased in the proposed method as compared with existing routing protocols such as DSDV, AODV and DSR. REFERENCES [1]M. Imran and M. A. Qadeer, "Evaluation Study of Performance Comparison of Topology Based Routing Protocol, AODV and DSDV in MANET," 2016 International Conference on Micro-Electronics and Telecommunication Engineering, Ghaziabad, 2016, pp. 207-211. [2]C. Cheng, R. Riley and S.P.R. Kumar, “A loop-free extended Bellman–Ford routing protocol without bouncing effect” , Proc. of ACM SIGCOMM Conf. , 1989, pp. 224– 236. [3]M. K. Marina and S. R. Das, “Ad-hoc on-demand multi-path distance vector routing,” Wireless Communication. Mobile Computing, vol. 6, no. 7, 2006, pp. 969–988
  • 5. Int. J. Advanced Networking and Applications Volume: 09 Issue: 02 Pages: 3391-3395 (2017) ISSN: 0975-0290 3395 [4]C. E. Perkins, E. M. Royer, and S. Das, “Ad hoc on- demand distance vector routing,'' document RFC 3561, IETF, Oct. 2003 [5]C. Liu, Y. Shu, and Y. Zhou, et al., “A comparison of DSR, MSR and BSR in wireless ad-hoc networks,” SPIE, vol. 6011, 2005, pp. 601–610. [6]Fahimeh Farahnakian. "Q-learning based congestion- aware routing algorithm for onchip network", 2011 IEEE 2nd International Conference on Networked Embedded Systems for Enterprise Applications, 12/2011 [7]Parag Kulkarni, "Introduction to Reinforcement and Systemic Machine Learning," in Reinforcement and Systemic Machine Learning for Decision Making , 1, Wiley-IEEE Press, 2012, pp.1-21 [8]S. Nuuman, D. Grace and T. Clarke, "A quantum inspired reinforcement learning technique for beyond next generation wireless networks," 2015 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), New Orleans, LA, 2015, pp. 271-275. [9]M. N. ul Islam and A. Mitschele-Thiel, "Reinforcement learning strategies for self-organized coverage and capacity optimization," 2012 IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, 2012, pp. 2818-2823. [10]Oussama Souihli, Mounir Frikha, Mahmoud Ben Hamouda, "Load-balancing in MANET shortest-path routing protocols", Ad Hoc Networks, Volume 7, Issue 2, March 2009, Pages 431-442 [11]Ouzecki, D.; Jevtic, D., "Reinforcement learning as adaptive network routing of mobile agents," MIPRO, 2010 Proceedings of the 33rd International Convention , pp.479,484, 24-28 May 2010 [12]Ramzi A. Haraty and Badieh Traboulsi “MANET with the Q-Routing Protocol” ICN 2012 : The Eleventh International Conference on Networks [13]S Kumar, Confidence based Dual Reinforcement Q Routing : An on line Adaptive Network Routing Algorithm. Technical Report, University of Texas, Austin 1998. [14]Kumar, S., 1998, “Confidence based Dual Reinforcement Q-Routing: An On-line Adaptive Network Routing Algorithm, “Master’s thesis, Department of Computer Sciences, The University of Texas at Austin, TX-78712, USA Tech. Report AI98-267. [15]Kumar, S., Miikkulainen, R., 1997, “Dual Reinforcement Q-Routing: An On-line Adaptive Routing Algorithm,’’ Proc. Proceedings of the Malaysian Journal of Computer, Vol. 17 No. 2, December 2004, pp.21-29 [16]Artificial Neural Networks in Engineering Conference. [17]Shalabh Bhatnagar, K. Mohan Babu “ New Algorithms of the Q-learning type” Science Direct Automatica 44 (2008} 1111-1119. Website: www.sciencedirect.com [18]Soon Teck Yap and Mohamed Othman, “An Adaptive Routing Algorithm: Enhanced Confidence Based Q Routing Algorithm in Network Traffic. [19]Rahul Desai, B P Patil, “Analysis of Reinforcement Based Adaptive Routing in MANET”, Indonesian Journal of Electrical Engineering and Computer Science Vol. 2, No.3, June 2016, pp.684-694 [20]Moore, A.W., Atkeson, C.G., Prioritized Sweeping: Reinforcement Learning with less data and less time. Machine Learning, Vol. 13, 1993 Author Biography Rahul Desai received his Bachelor of Engineering degree and Masters in engineering degree from Pune university. He is currently pursuing Ph.D. from Pune University, Sinhgad College of Engineering as a research center. Presently working as Asst Professor, Dept. of Information Technology in Army Institute of Technology, Pune, India. He has published 25 plus research papers in Dr. B.P. Patil received received Ph.D. in Electronics Technology from Guru Nanak Dev Univ., Amritsar India in year 2000. Presently working as Professor, Dept. of E&TC Army Institute of Technology, Pune, India. He has published 120 plus research papers in various international and national referred journals and conferences. He is having 25 years of teaching and industry experience. various international and national referred journals and conferences.