Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks ‡
Abstract
:1. Introduction
2. Applications, Motivations, and Challenges
2.1. Applications of Receiver-Initiated MAC
2.2. Motivations for Receiver-Initiated MAC
- single-sender to single-receiver×
- single-sender to multiple-receiver×
- multiple-sender to single-receiver×
Request-to-Send message Clear-to-Send message Acknowledgment message Request-to-Receive message Available-to-Send message
2.3. Challenges in Receiver-Initiated MAC
3. Related Work
3.1. Related Work on Receiver-Initiated MAC
3.2. Related Work on Traffic Prediction
4. Network Architecture
5. TERI-MAC Design
5.1. Description of TERI-MAC
5.2. Arrangement of Transmission
6. Adaptive Data Polling for TERI-MAC
6.1. When to Poll Data
- Case 1: If is the next-hop destination of the current active receiver, will start the data polling as soon as it can so that the packets can be forwarded to the final destination smoothly in the multi-hop communications. As shown in Figure 5, the message including the information notifies the successive node of the coming data reception. It is worth noting that the does not indicate the dependency of TERI-MAC on specific routing protocols. When a new packet is generated or a forwarding packet is received, it is temporally stored in a queue before being sent out. The node also records the generation or reception time and the next-hop receiver’s ID, for each packet. The information can be obtained from the routing header. When a node receives an request from , all the packets with a matched next-hop ID have the chance to be transmitted in a group. Although TERI-MAC can work with most of the existing routing protocols, clustering-based routing enables better data aggregation, allowing TERI-MAC to achieve higher throughputs and better energy efficiency.
- Case 2: starts the handshake if the estimated energy efficiency , which is the power consumption of control packets over the estimation of data transmission, is below the defined threshold of performance . Here, is estimated by the receiver based on the traffic estimation which is introduced in the next section. In this way, a baseline energy efficiency can be achieved in TERI-MAC.
- Case 3: requests data from its neighbors when the time interval since the last communication exceeds the delay threshold . In networks with a low traffic load, the waiting time to cumulate packets and achieve the desired energy efficiency becomes too long to be acceptable, since the out-of-date sensing information may become useless even if the destination is received successfully. The hop-by-hop communication delay threshold can guarantee the maximum delay performance. In most cases, we can achieve preferable energy efficiency with a tolerable amount of delay.
6.2. How Much Data to Poll
- The delivery percentage : When the number of packets in the polled node follows a given distribution , there is a certain probability that the assigned slots will be enough to transmit all of the queued packets:
7. Traffic Estimation for TERI-MAC
- CDF Inverse Sampling [32]: Let be the cumulative distribution function (CDF) of a random variable x which has the probability density function (PDF) . If random variable y comes from a uniform distribution , then the random variable follows the same distribution as x. In other words, a set of samples becomes a good representation of random variable x as they have the same distribution ().
Algorithm 1 Traffic estimation in TERI-MAC. |
|
8. Simulation and Analysis
- Energy Efficiency: The energy efficiency was evaluated in terms of the relative control message overhead, defined as the overhead of control messages divided by that of data packets in one round of data communication.
- Channel Utilization: The ratio of the time slots utilized for data transmission in the data communication phase (Phase 3 in Figure 4) over the total amount assigned by the receiver.
- Hop-by-Hop Communication Delay: The average queuing delay for the data transmission, i.e., the time period between when the original data packet is generated or the relay data is received and when the packet is transmitted to the next-hop receiver.
8.1. Performance Evaluation
Algorithm 2 When to poll data. |
|
8.2. Performance Comparison
9. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
Abbreviations
Address of the active receiver that sends the | |
Address of the next-hop receiver of | |
Address of the sender i that is invited by the receiver, where | |
Time schedule of transmission for sender i | |
Number of packets assigned to sender i for the following data transmission | |
Address of the sender that responds to the | |
Average number of packets since the last transmission |
References
- Felemban, E.; Shaikh, F.K.; Qureshi, U.M.; Sheikh, A.A.; Qaisar, S.B. Underwater sensor network applications: A comprehensive survey. Int. J. Distrib. Sens. Netw. 2015, 11, 1–14. [Google Scholar] [CrossRef]
- Zhou, Z.; Peng, Z.; Cui, J.H.; Shi, Z.J.; Bagtzoglou, A.C. Scalable Localization with Mobility Prediction for Underwater Sensor Network. IEEE Trans. Mob. Comput. 2011, 10, 335–348. [Google Scholar] [CrossRef]
- Zenia, N.Z.; Aseeri, M.; Ahmed, M.R.; Chowdhury, Z.I.; Kaiser, M.S. Energy-efficiency and Reliability in MAC and Routing Protocols for Underwater Wireless Sensor Network: A Survey. J. Netw. Comput. Appl. 2016, 71, 72–85. [Google Scholar] [CrossRef]
- Climent, S.; Sanchez, A.; Capella, J.V.; Meratnia, N.; Serrano, J.J. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers. Sensors 2014, 14, 795–833. [Google Scholar] [CrossRef] [PubMed]
- Jiang, S.M. State-of-the-art Medium Access Control (MAC) Protocols for Underwater Acoustic Networks: A Survey Based on a MAC Reference Model. IEEE Commun. Surv. Tutor. 2018, 20, 96–131. [Google Scholar] [CrossRef]
- Su, Y.S.; Jin, Z.G. UMMAC: A Multi-channel MAC Protocol for Underwater Acoustic Networks. J. Commun. Netw. 2016, 18, 75–83. [Google Scholar]
- Zhang, S.; Qian, L.; Liu, M.; Fan, Z.; Zhang, Q. A Slotted-FAMA Based MAC Protocol for Underwater Wireless Sensor Networks with Data Train. J. Signal Process. Syst. 2017, 89, 3–12. [Google Scholar] [CrossRef]
- Chirdchoo, N.; Soh, W.S.; Chua, K.C. Aloha-based MAC Protocols with Collision Avoidance for Underwater Acoustic Networks. In Proceedings of the IEEE INFOCOM, Anchorage, AK, USA, 6–12 May 2007. [Google Scholar]
- Molins, M.; Stojanovic, M. Slotted FAMA: A MAC Protocol for Underwater Acoustic Networks. In Proceedings of the IEEE OCEANS 2006—Asia Pacific, Singapore, 16–19 May 2006. [Google Scholar]
- Peng, Z.; Zhu, Y.B.; Zhou, Z.; Guo, Z.; Cui, J.H. COPE-MAC: A Contention-based Medium Access Control Protocol with Parallel Reservation for Underwater Acoustic Networks. In Proceedings of the 2010 IEEE OCEANS, Sydney, Australia, 24–27 May 2010. [Google Scholar]
- Guo, X.X.; Frater, M.R.; Ryan, M.J. Design of a Propagation-Delay-Tolerant MAC Protocol for Underwater Acoustic Sensor Networks. IEEE J. Ocean. Eng. 2009, 34, 170–180. [Google Scholar]
- Pu, L.N.; Luo, Y.; Peng, Z.; Mo, H.N.; Cui, J.H. Traffic Estimation Based Receiver Initiated MAC for Underwater Acoustic Networks. In Proceedings of the Eighth ACM International Conference on Underwater Networks and Systems, Kaohsiung, Taiwan, 11–13 November 2013; ACM: New York, NY, USA, 2013; pp. 1–5. [Google Scholar] [CrossRef]
- Talucci, F.; Gerla, M.; Fratta, L. MACA-BI (MACA By Invitation)—A Receiver Oriented Access Protocol for Wireless Multihop Networks. In Proceedings of the 8th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Helsinki, Finland, 1–4 September 1997. [Google Scholar]
- Garcia-Luna-Aceves, J.J.; Tzamaloukas, A. Reversing the Collision-Avoidance Handshake in Wireless Networks. In Proceedings of the ACM Conference on Mobile Computing and Networking (MobiCom), Seattle, DC, USA, 15–20 August 1999. [Google Scholar]
- Chirdchoo, N.; Soh, W.S.; Chua, K.C. RIPT: A Receiver-initiated Reservation-based Protocol for Underwater Acoustic Networks. IEEE J. Sel. Areas Commun. 2008, 26, 1744–1753. [Google Scholar] [CrossRef]
- Luo, Y.; Pu, L.N.; Peng, Z.; Zhu, Y.B.; Cui, J.H. RISM: An Efficient Spectrum Management System for Underwater Cognitive Acoustic Networks. In Proceedings of the 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Singapore, 30 June–3 July 2014. [Google Scholar]
- Chong, C.Y.; Kumar, S.P. Sensor Networks: Evolution, Opportunities, and Challenges. Proc. IEEE 2003, 91, 1247–1256. [Google Scholar] [CrossRef]
- Gkantsidis, C.; Rodriguez, P.R. Network Coding for Large Scale Content Distribution. In Proceedings of the 2005 IEEE INFOCOM, Miami, FL, USA, 13–17 March 2005. [Google Scholar]
- Pu, L.N.; Luo, Y.; Mo, H.N.; Le, S.; Peng, Z.; Cui, J.H.; Jiang, Z.H. Comparing Underwater MAC Protocols in Real Sea Experiments. Comput. Commun. 2015, 56, 47–59. [Google Scholar] [CrossRef]
- Pu, L.N.; Luo, Y.; Zhu, Y.B.; Peng, Z.; Khare, S.; Cui, J.H.; Liu, B.Y.; Wang, L. Impact of Real Modem Characteristics on Practical Underwater MAC Design. In Proceedings of the 2012 IEEE OCEANS, Ottawa, ON, Canada, 10–15 June 2012. [Google Scholar]
- Sahinoglu, Z.; Tekinay, S. On multimedia networks: Self-similar traffic and network performance. IEEE Commun. Mag. 1999, 37, 48–52. [Google Scholar] [CrossRef]
- Li, X.K.; Seyed, A.; Zekavat, R. Traffic Pattern Prediction Based Spectrum Sharing for Cognitive Radios. Cogn. Radio Syst. 2009, 77–95. [Google Scholar]
- Rossi, C.; Casetti, C.; Chiasserini, C.F. Bandwidth Monitoring in Multi-Rate 802. 11 WLANs with Elastic Traffic Awareness. In Proceedings of the 2011 IEEE GLOBECOM, Houston, TX, USA, 5–9 December 2011. [Google Scholar]
- Alarcon-Aquino, V.; Barria, J.A. Multiresolution FIR Neural-network-based Learning Algorithm Applied to Network Traffic Prediction. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 2006, 36, 208–220. [Google Scholar] [CrossRef] [Green Version]
- Sang, A.; Li, S.Q. A Predictability Analysis of Network Traffic. In Proceedings of the 2000 IEEE INFOCOM, Tel Aviv, Israel, 26–30 March 2000. [Google Scholar]
- Sadek, N.; Khotanzad, A. Multi-scale High-speed Network Traffic Prediction Using K-factor Gegenbauer ARMA Model. In Proceedings of the 2004 IEEE ICC, Paris, France, 20–24 June 2004. [Google Scholar]
- Shu, Y.T.; Yu, M.F.; Liu, J.K.; Yang, O.W.W. Wireless Traffic Modeling and Prediction Using Seasonal ARIMA Models. In Proceedings of the 2003 IEEE ICC, Anchorage, AK, USA, 11–15 May 2003. [Google Scholar]
- Vasilescu, I.; Kotay, K.; Rus, D.; Dunbabin, M.; Corke, P. Data Collection, Storage, and Retrieval with an Underwater Sensor Network. In Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, San Diego, CA, USA, 2–4 November 2005. [Google Scholar]
- Nawaz, S.; Hussain, M.; Watson, S.; Trigoni, N.; Green, P.N. An Underwater Robotic Network for Monitoring Nuclear Waste Storage Pools. In Proceedings of the 1st International ICST Conference on Sensor Systems and Software (SCUBE), Pisa, Italy, 7–8 September 2009. [Google Scholar]
- Yao, Y.; Gehrke, J. Query Processing in Sensor Networks. In Proceedings of the 1st Biennial Conference on Innovative Data Systems Research (CIDR 2003), Asilomar, CA, USA, 5–8 January 2003. [Google Scholar]
- Luo, Y.; Pu, L.N.; Zhao, Y.X.; Cui, J.H. Exploring Uncertainties of Transmission, Reception Delays for Underwater Acoustic Networks. IEEE Wirel. Commun. Lett. 2017, 6, 418–421. [Google Scholar] [CrossRef]
- Chen, H.S. Tutorial on Monte Carlo Sampling; The Ohio State University: Columbus, OH, USA, 2005. [Google Scholar]
- Christian, R.; Tanner, M.A. Facilitating the Gibbs Sampler: The Gibbs Stopper and the Griddy-Gibbs Sampler. J. Am. Stat. Assoc. 1992, 87, 861–868. [Google Scholar]
- Zhu, Y.; Lu, X.; Pu, L.; Su, Y.; Martin, R.; Zuba, M.; Peng, Z.; Cui, J.-H. Aqua-Sim: An NS-2 based simulator for underwater sensor networks. In Proceedings of the 2013 ACM WUWNet, Kaohsiung, Taiwan, 11–13 November 2013. [Google Scholar]
- Lurton, X. An Introduction to Underwater Acoustics: Principles and Applications; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2002. [Google Scholar]
Modem Type | Data Rate | Preamble (s) | Control Packet Length (s) | Data Packet Length (s) |
---|---|---|---|---|
Benthos ATM-88X Modem | 800 bps (Standard) | ≈1.5 | ≈1.56 | ≈4.06 |
2.4 Kbps (Highest) | ≈1.52 | ≈2.35 | ||
AquaSeNT OFDM Modem | 3.045 Kbps | 0.49 | 0.66 | 1.15 |
WHOI Micro Modem | 80 bps (Standard) | 0.87 | 1.47 | 25.87 |
300–5000 bps (PSK mode) | 0.88–1.03 | 1.27–7.54 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Dong, Y.; Pu, L.; Luo, Y.; Peng, Z.; Mo, H.; Meng, Y.; Zhao, Y.; Zhang, Y. Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks ‡. Sensors 2018, 18, 3895. https://doi.org/10.3390/s18113895
Dong Y, Pu L, Luo Y, Peng Z, Mo H, Meng Y, Zhao Y, Zhang Y. Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks ‡. Sensors. 2018; 18(11):3895. https://doi.org/10.3390/s18113895
Chicago/Turabian StyleDong, Yuan, Lina Pu, Yu Luo, Zheng Peng, Haining Mo, Yun Meng, Yi Zhao, and Yuzhi Zhang. 2018. "Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks ‡" Sensors 18, no. 11: 3895. https://doi.org/10.3390/s18113895
APA StyleDong, Y., Pu, L., Luo, Y., Peng, Z., Mo, H., Meng, Y., Zhao, Y., & Zhang, Y. (2018). Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks ‡. Sensors, 18(11), 3895. https://doi.org/10.3390/s18113895