Please wait a minute...
JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE)
Automation Technology, Control Technology     
Reservation-based MAC protocol for underwater wireless sensor networks with data train
QIAN Liang-fang, ZHANG Sen-lin, LIU Mei-qin
1. State Key Laboratory of Industrial Control Technology, Zhejiang University, Hangzhou 310027, China;
2. College of Electrical Engineering, Zhejiang University, Hangzhou 310027, China
Download:   PDF(1202KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

A reservation-based MAC protocol for underwater wireless sensor networks with data train was proposed in order to effectively reduce the channel conflict and improve the network throughput. In this protocol, a reservation period and a reservation confirmation period were introduced before the data transmission. Utilizing the RTS-CTS, the channel was reserved and the data packets were sorted. After the reservation period and the reservation confirmation period, all the data packets were transmitted in order. These methods can reduce the average reservation time and the waiting time of the nodes to send data, and effectively improve the network throughput. The simulation results show that the protocol can reduce the control packet cost and improve the network throughput when the network load is high.



Published: 25 April 2017
CLC:  TP 393  
Cite this article:

QIAN Liang-fang, ZHANG Sen-lin, LIU Mei-qin. Reservation-based MAC protocol for underwater wireless sensor networks with data train. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 691-696.


基于预约的数据队列水下无线传感器网络MAC协议

为了有效地减少水声信道冲突提高网络吞吐量,提出基于预约的数据队列水下无线传感器网络MAC协议.该协议在数据传输前设置了信道预约周期与预约确认周期,利用RTS-CTS握手过程完成信道的预约、确认与数据传输的排序工作.当全部预约得到确认后,所有发送端按事先排好的顺序以接龙的方式传输数据队列,完成多对节点间的数据传输任务.这些方法降低了节点的平均预约时间,减少了节点发送数据的等待时间,有效提高了网络吞吐量.仿真实验结果表明,当网络负载较高时,该协议能够较大程度地减少控制包开销,提高网络吞吐量.

[1] AKYILDIZ I F, POMPILI D, MELODIA T. Underwater acoustic sensor networks: research challenges [J]. Ad Hoc Networks Journal, 2005, 3(3): 257-281.
[2] CUI J, KONG J, GERLA M, et al. The challenges of building mobile underwater wireless networks for aquatic applications [J]. IEEE Network, 2006, 20(3): 12-18.
[3] CLIMENT S, SANCHEZ A, CAPELLA J, et al. Underwater acoustic wireless sensor networks: advances and future trends in physical, MAC and routing layers [J]. Sensors, 2014, 14(1): 795-833.
[4] CHEN K, MA M, CHENG E, et al. A survey on MAC protocols for underwater wireless sensor networks [J]. IEEE Communications Surveys And Tutorials, 2014, 16(3): 1433-1447.
[5] LIU J, WANG Z, PENG Z, et al. Suave: swarm underwater autonomous vehicle localization [C]∥Proceedings of IEEE INFOCOM. Toronto: IEEE, 2014: 64-72.
[6] LUO Y, PU L, ZUBA M, et al. Challenges and opportunities of nderwater cognitive acoustic networks [J]. IEEE Transactions on Emerging Topics in Computing, 2014, 2(2): 198-211.
[7] PARK M, RODOPLU V. UWANMAC: an energy-efficient MAC protocol for underwater acoustic wireless sensor networks [J]. IEEE Journal of Oceanic Engineering, 2007, 32(3): 710-720.
[8] CHIRDCHOO N, SOH W, CHUA K. Aloha-based MAC protocols with collision avoidance for underwater acoustic networks [C]∥Proceedings of IEEE INFOCOM. Singapore: IEEE, 2007: 2271-2275.
[9] MOLINS M, STOJANOVIC M. Slotted FAMA: a MAC protocol for underwater acoustic networks [C]∥Proceedings of MTS/IEEE Oceans. Singapore: IEEE, 2006: 1-7.
[10] GUO X, FRATER M, RYAN M. A propagation-delay-tolerant collision avoidance protocol for underwater acoustic sensor networks [C]∥ Proceedings of IEEE OCEANS. Singapore: IEEE, 2007: 1-6.
[11] 汪生泉,孙大军,张友文.一种高效的水下传感器网络MAC协议[J].传感器与微系统,2015, 34(1): 7679.
WANG Sheng-quan, SUN Da-jun, ZHANG You-wen. An efficient MAC protocol for underwater sensor networks [J]. Transducer and Microsystem Technologies, 2015, 34(1): 76-79.
[12] PENG Z, ZHU Y, ZHOU Z, et al. Cope-mac: a contention-based medium access control protocol with parallel reservation for underwater acoustic networks [C]∥Proceedings IEEE OCEANS. Sydney: IEEE, 2010: 1-10.
[13] FAN G, CHEN H, XIE L, et al. A hybrid reservation-based MAC protocol for underwater acoustic networks [J]. Ad Hoc Networks, 2013, 11(3): 1178-1192.
[14] XIE P, ZHOU Z, PENG Z, et al. Aqua-Sim: an NS-2 based simulator for underwater sensor networks [C]∥Proceedings of OCEANS.  Cabo Frio: IEEE, 2009: 1-7.
[15] SYED A, YE W, HEIDEMANN J. T-Lohi: a new class of MAC protocols for underwater acoustic sensor networks [C]∥Proceedings of the 27th IEEE International Conference on Computer Communications. Phoenix: IEEE, 2008: 231-235.

[1] Yi-xuan ZHANG,Jian GONG. Multi-layer domain name detection and measurement based on DNS traffic[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(12): 2423-2429.
[2] Hai-xiu CHENG,Guan-lin LI,Ling ZHANG. Dynamic resource reservation algorithm for core network video business with bandwidth reduction based on time slot[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(9): 1746-1752.
[3] Dong LI,Yu LU,Jun-qing YU. Security of source address validation improvement binding table in software defined network[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(8): 1543-1549.
[4] Qiu-yun WU,Wei DING. Analysis of Internet scanning behavior based on dynamic dark network[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(8): 1550-1556.
[5] Ping QI,Hong SHU. Task offloading strategy considering terminal mobility in medical wisdom scenario[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(6): 1126-1137.
[6] Yi-han LUO,Jie-ren CHENG,Xiang-yan TANG,Ming-wang OU,Tian WANG. Early warning model of DDoS attack situation based on adaptive threshold[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(4): 704-711.
[7] Wei CHEN,Xue-jiao LIU,Ying-jie XIA. Multi-factor reputation evaluation model based on analytic hierarchy process in vehicle Ad-hoc networks[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2020, 54(4): 722-731.
[8] YOU Lu-jin, LU Xing-jian, HE Gao-qi. Research on sub-health in cloud environment[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1181-1189.
[9] ZHANG Xin-xin, XU Ke, ZHONG Yi-Feng, SU Hui. Evolutionary game analysis on cooperative behaviors of  internet service providers[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1214-1224.
[10] LI Jian-li, DING Ding, LI Tao. Multi-objective hybrid cloud task scheduling using twice clustering[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(6): 1233-1241.
[11] WANG Yu-xiang, LI Sheng-jie, WANG Hao, MA Jun-yi, WANG Ya-sha, ZHANG Da-qing. Survey on Wi-Fi based contactless activity recognition[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(4): 648-654.
[12] LI Xiao-dong, ZHU Yue-fei, LIU Sheng-li, XIAO Rui-qing. Permission-based Android application security evaluation method[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2017, 51(3): 590-597.
[13] HUANG Yan, WANG Peng, XIE Gao hui, AN Jun xiu. Data center energy cost optimization in smart grid: a review[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2016, 50(12): 2386-2399.
[14] YU Yang,XIA Chun he,YUAN Zhi chao,LI Zhong. Trust bootstrapping model for computer network collaborative defense system[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2016, 50(9): 1684-1694.
[15] QI Ping, LI Long shu, LI Xue jun. Cloud resource scheduling algorithm with failure recovery mechanism[J]. JOURNAL OF ZHEJIANG UNIVERSITY (ENGINEERING SCIENCE), 2015, 49(12): 2305-2315.