Next Article in Journal
An Improved ACKF/KF Initial Alignment Method for Odometer-Aided Strapdown Inertial Navigation System
Next Article in Special Issue
Joint Passive Detection and Tracking of Underwater Acoustic Target by Beamforming-Based Bernoulli Filter with Multiple Arrays
Previous Article in Journal
A Blockchain-Based Location Privacy Protection Incentive Mechanism in Crowd Sensing Networks
Previous Article in Special Issue
Reinforcement Learning-Based Multi-AUV Adaptive Trajectory Planning for Under-Ice Field Estimation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks

1
School of Electronic Control, Chang’an Uiversity, Xi’an 710064, China
2
School of Computer Science and Computer Engineering, University of Southern Mississippi, Hattiesburg, MS 39406, USA
3
Department of Electrical and Computer Engineering, Mississippi State University, Mississippi State, MS 39762, USA
4
Computer Science Department, The City College of New York, New York, NY 10031, USA
5
Oracle America Inc., Seattle, WA 98101, USA
6
School of Communication and Information Engineering, Xi’an University of Sience and Technology, Xi’an 700154, China
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.
This manuscript is extension version of the conference paper: Traffic estimation based receiver initiated MAC for underwater acoustic networks.In Proceedings of the Eighth ACM International Conference on Underwater Networks and Systems, Kaohsiung, Taiwan, 4–7 November 2013.
Sensors 2018, 18(11), 3895; https://doi.org/10.3390/s18113895
Submission received: 14 September 2018 / Revised: 1 November 2018 / Accepted: 5 November 2018 / Published: 12 November 2018
(This article belongs to the Special Issue Underwater Sensing, Communication, Networking and Systems)

Abstract

:
In underwater sensor networks (UWSNs), the unique characteristics of acoustic channels have posed great challenges for the design of medium access control (MAC) protocols. The long propagation delay problem has been widely explored in recent literature. However, the long preamble problem with acoustic modems revealed in real experiments brings new challenges to underwater MAC design. The overhead of control messages in handshaking-based protocols becomes significant due to the long preamble in underwater acoustic modems. To address this problem, we advocate the receiver-initiated handshaking method with parallel reservation to improve the handshaking efficiency. Despite some existing works along this direction, the data polling problem is still an open issue. Without knowing the status of senders, the receiver faces two challenges for efficient data polling: when to poll data from the sender and how much data to request. In this paper, we propose a traffic estimation-based receiver-initiated MAC (TERI-MAC) to solve this problem with an adaptive approach. Data polling in TERI-MAC depends on an online approximation of traffic distribution. It estimates the energy efficiency and network latency and starts the data request only when the preferred performance can be achieved. TERI-MAC can achieve a stable energy efficiency with arbitrary network traffic patterns. For traffic estimation, we employ a resampling technique to keep a small computation and memory overhead. The performance of TERI-MAC in terms of energy efficiency, channel utilization, and communication latency is verified in simulations. Our results show that, compared with existing receiver-initiated-based underwater MAC protocols, TERI-MAC can achieve higher energy efficiency at the price of a delay penalty. This confirms the strength of TERI-MAC for delay-tolerant applications.

1. Introduction

Underwater sensor networks (UWSNs) have demonstrated a wide range of important applications in oceanographic data collection, pollution detection, and marine surveillance [1,2]. Recently, UWSNs have spurred a great wave of efforts from the research community. However, the unique characteristics of UWSNs, such as their limited available bandwidth, long propagation delays, and high energy consumption, introduce great challenges to almost every layer of the network design [3,4]. In a network with shared media, medium access control (MAC) serves a fundamental role in network protocol stack coordinating multi-user communications. It is especially critical for acoustic networks with limited channel bandwidth, long propagation delays, and a constrained power supply.
To date, numerous MAC protocols, for example, [5,6,7], have been proposed and designed for UWSNs. Random access-based MAC protocols, such as those described in [8], are designed for simple implementation as well as robustness to adapt to dynamic networks. Nevertheless, their high collision probability limits their application in energy-constrained underwater networks. Alternatively, handshaking-based methods, e.g., [9,10], are a viable option for resolving collisions in the network system. The majority of existing handshaking MAC protocols for UWSNs have focused on how to handle the long propagation delays [11]. However, long preambles and the resulting high overhead on control packets have not been investigated thoroughly in the literature.
The handshaking MAC protocols can be generally classified into two categories. One is sender-initiated MAC, where the sender starts one round of handshakes by sending out a Request-to-Send ( R T S ) message to the intended receiver(s). Most of the existing handshake-based MAC protocols [9,10,11] are in this category. The other one is receiver-initiated MAC [12,13,14,15] where the receiver initiates the handshake process by sending a Request-to-Receive ( R T R ) message to poll data from intended senders. Despite improving the energy efficiency and enabling data aggregations, existing solutions to receiver-initiated-based handshake MAC protocols face great challenges in terms of efficient data polling. On the one hand, without knowing the status of neighboring senders, it is difficult for the receiver to decide when to poll data and how much data to request. On the other hand, the frequent information exchange between the sender and receiver leads to low efficiency in data communication. Following this concern, we propose a receiver-initiated handshaking MAC with adaptive data polling.
The contribution of our work is three-fold. First, we propose a traffic estimation-based receiver-initiated MAC (TERI-MAC). The receiver collecting data from neighboring nodes enables the data aggregation at the link layer, which benefits the data fusion and sensing process in underwater sensor networks. Second, we propose an adaptive data polling mechanism to solve the when-to-poll and how-much-to-poll problems in the receiver-initiated MAC protocols. With the assistance of online traffic estimation, TERI-MAC can be applied to networks with arbitrary traffic patterns while maintaining high energy efficiency and channel utilization for each user request. Third, extensive simulations have been conducted to evaluate the performance of TERI-MAC. It has been verified that TERI-MAC can achieve good energy efficiency and channel utilization by delaying the data requests at the receivers and adjusting the channel resource assignment among different senders.
The rest of this paper is organized as follows. We first discuss the applications and motivations of receiver-initiated MACs and enumerate challenges in Section 2. In Section 3, we survey the related research on the receiver-initiated MAC protocols and network traffic predictions. The network architecture is presented in Section 4. The details of TERI-MAC are elaborated in Section 5, with the adaptive data polling presented in Section 6. The traffic estimation technique is discussed in Section 7. We evaluate the performance of TERI-MAC in Section 8 and conclude this paper in Section 9.

2. Applications, Motivations, and Challenges

Receiver-initiated-based MACs have several advantages over sender-initiated-based handshaking protocols in data gathering applications of UWSNs, as will be discussed in this section. We also describe the major challenges in designing an efficient receiver-initiated-based MAC protocol.

2.1. Applications of Receiver-Initiated MAC

In applications such as underwater environment monitoring, offshore structural health monitoring (SHM), and oceanography data collection, environmental or structural information is frequently collected by the sensors in water and then forwarded to the sink nodes deployed on the ocean surface. The aggregated data flow in these applications naturally forms a tree network, where the sink nodes are the roots and the sensors are the leaves. The sensing pattern can either be periodic or have a varying rate depending on the environment (e.g., temperature and salinity, etc.) or human activity (e.g., oil drilling) [16]. When an interesting event is detected, bursty traffic from a short period of intensive observations may also be triggered. In addition, the traffic on a node is a combination of self-generated sensing data and the forwarding packets, resulting in traffic dynamics in both temporal and spatial dimensions. Therefore, we consider the data gathering tree network as an application that is preferable, yet challenging, to the receiver-initiated MAC protocols.

2.2. Motivations for Receiver-Initiated MAC

Enabling Data Aggregation at the Link Layer. In receiver-initiated MAC protocols, the receiving node requests and gathers data packets from surrounding neighbors at each round of communication. This feature enables data aggregation at the link layer which can significantly reduce the traffic overhead with the link layer packet fusion [17]. As assistance to the end-to-end data fusion, local information gathering is essential to support a fast response to the dynamics of a network and meanwhile, to extend the network‘s lifetime. In addition, receiver-initiated MAC protocols are preferable to the applications with network coding [18]. In order to successfully decode one data packet, the receiver may need multiple packets from different senders, since the coded packets generally diverge to the surrounding neighbor users. The scheme of one receiver invites multiple packets from different nodes in receiver-initiated protocols to fit the data gathering request of network coding applications.
Significantly Reducing the Overhead on Control Messages. For the purpose of achieving reliable communication, an acknowledgment ( A C K ) is needed for the receiver to inform the senders of successful data delivery. Since only one receiver is involved in parallel reservation with the receiver-initiated handshake, one A C K packet is enough to notify all the senders of the successful data reception in one round of communication. In contrast, in the sender-initiated-based protocols, each receiver in the parallel reservation is required to respond with an A C K message due to the one-to-many scheme, which results in extra energy consumption. When the overhead of control packets is comparable to the data packets in UWSNs owing to the long preamble problem [19], reducing the number of A C K messages could remarkably improve the energy efficiency of acoustic communications.
Based on the length of control and data packets listed in Table 1 [20], we summarized the control message overhead of the traditional sender-initiated handshaking without parallel reservation and the receiver-initiated method with parallel reservation, using the AquaSeNT OFDM (orthogonal frequency division multiplexing) Modem as an example. We assumed that five reservations were made on average with each round of parallel reservations.
  • single-sender to single-receiver
    ( R T S + C T S + A C K ) / D a t a = 0.66 × 3 / 1.15 172 %
  • single-sender to multiple-receiver
    ( R T S + 5 C T S + 5 A C K ) / 5 D a t a = 0.66 × 11 / 1.15 / 5 126 %
  • multiple-sender to single-receiver
    ( R T R + 5 A T S + A C K ) / 5 D a t a = 0.66 × 7 / 1.15 / 5 80 %
    R T S Request-to-Send message
    C T S Clear-to-Send message
    A C K Acknowledgment message
    R T R Request-to-Receive message
    A T S Available-to-Send message
Besides energy saving with parallel reservation, the receiver-initiated communication scheme further reduced the network overhead roughly from 126 % to 80 % , illustrating a promising application for the energy-constrained UWSNs.
Enhancing Collision Avoidance Capacity. The interference area, marked as red in Figure 1, is the region within which the transmission of nodes will interfere with the reception process of the receiving node. In the communication with parallel reservation, either one sending node communicates with multiple receivers in sender-initiated-based methods, or one receiver requests data packets from multiple senders in receiver-initiated-based protocols. The interference area in Figure 1a changes while the sender communicates with different receivers in sender-initiated methods. In contrast, the receiver-initiated handshaking communication has a static interference area, as shown in Figure 1b, since only one receiver is involved. This static interference area enhances the collision avoidance for the time scheduling on the receiver side.
The exposed area where the exposed nodes lie is marked in light blue in Figure 1. In the traditional handshaking protocols, the exposed nodes that overhear the R T S message have to keep silent until hearing the corresponding Clear-to-Send ( C T S ) message. Even though the handshake mechanism helps to mitigate the exposed terminal problem, the nodes are still exposed for one propagation delay plus the transmission time of a control packet, neither of which is negligible in UWSNs. The exposed nodes in the receiver-initiated-based protocols, however, learn the fact that it is an exposed terminal when receiving an Available-to-Send ( A T S ) message immediately, since the R T R message has gone earlier. Therefore, the exposed terminal problem is mitigated in the receiver-initiated-based MAC protocols.
To summarize, the enabled data aggregation at the link layer, the significantly reduced overhead in the control message, and the enhanced collision avoidance capacity of receiver-initiated MAC protocols make them promising solutions for data gathering UWSNs.

2.3. Challenges in Receiver-Initiated MAC

Even though the receiver-initiated MAC design has its advantages over the traditional handshaking methods in many ways, it still faces great challenges in the implementation of data polling. Data polling is defined as the process whereby the receiver retrieves data from the neighboring senders. Since the receiver does not know the status of the neighboring senders, how to design an efficient data polling scheme becomes an open problem. The retrieval of data frequently results in energy waste when transmitting control messages, whereas slowing down the polling rate causes a long queuing delay because the data cannot be delivered timely. An efficient polling scheme needs to decide (1) when packets are available for the receiver to poll, and (2) how much data to request. For most of the receiver-initiated methods, when and how much are two fundamental challenges.
Furthermore, how to design a protocol that can adapt well to the dynamics and heterogeneity of network traffic is still yet to be explored. On the one hand, the number of queued packets at the link layer is a random variable that may vary with time and among different senders due to the combined effects of all the upper layers, e.g., network layer, transport layer, and application layer. On the other hand, it is not practical in underwater networks to approximate the traffic distribution with a large number of data samples. This is because of the limited computation and memory capacity of underwater sensors and the time-varying feature of network traffic. In TERI-MAC, the cumulative density function (CDF) inversion sampling technique is employed to pull a number of samples from the large history dataset and utilize the most recently observed data to determine the trend of the network traffic. In this way, a lightweight traffic estimation can be achieved to support the adaptive data polling mechanism in TERI-MAC.

3. Related Work

In this section, we review the existing receiver-initiated handshaking MAC protocols and survey the related work on the network traffic prediction.

3.1. Related Work on Receiver-Initiated MAC

The idea of receiver-initiated handshaking MAC is not new. Aiming to reduce the overhead of the handshaking procedure, Talucci et al. proposed MACA by invitation (MACA-BI) [13], a simplified version of multiple access collision avoidance (MACA) protocol by removing the transmission of R T S in the sender. In this method, a traditional three-way handshaking process is reduced to a two-way handshake. MACA-BI saves one round R T S message transmission; however, it suffers the hidden terminal problem in multi-hop networks.
Garcia-Luna-Aceves et al. designed the receiver-initiated multiple access (RIMA) protocol by reversing the handshaking process in wireless networks [14]. A three-way receiver-initiated handshaking process is employed in RIMA. The authors also extended the protocol to a version with dual-use polling (RIMA-DP), which allows both the polling and polled nodes to send data in one round of collision avoidance. Since no parallel reservation or packet train is implemented in the RIMA protocol, the overhead of the handshaking process is significant when it is applied to the underwater networks.
More recently, the receiver-initiated packet train (RIPT) protocol [15] was proposed for UWSNs. It employs both parallel reservation and a packet train to mitigate the long propagation delay problem of underwater acoustic channels and to enhance the handshaking efficiency. The RIPT utilizes a four-way R T R / S I Z E / O R D E R / D A T A handshaking process. The  S I Z E message is a response to the R T R , based on which the receiver allocates the channel recourse among multiple senders. The new O R D E R control message is introduced to schedule the packet train transmission of all involved sending nodes. Similar to RIMA-DP, the RIPT protocol also allows the receiver to transmit data in one round of collision avoidance. Without the prediction of when data will be available in the senders, the receiver simply starts one round of handshaking when it has data to transmit. When the network traffic features high dynamics, RIPT will suffer from poor handshaking efficiency.
The design of efficient data polling is a common challenge to all receiver-initiated MAC protocols in the literature. Without knowing the number of packets that have cumulated on the surrounding nodes, it is difficult for the receiver to decide a good time to initiate the next receiving request, especially with the dynamic traffic pattern. Therefore, in this work, we propose TERI-MAC, a receiver-initiated MAC based on traffic estimation. An adaptive data polling will enable stable energy efficiency in the networks with arbitrary traffic patterns. With the assistance of traffic estimation, the receivers in TERI-MAC are able to arrange the transmission scheduling on the R T R message without waiting for the A T S response from senders. The O R D E R message can thus be removed in TERI-MAC to further reduce the overhead of the MAC protocol.

3.2. Related Work on Traffic Prediction

Traffic prediction is one of the major issues in measurement-based network control. An accurate prediction of the traffic load in the next time interval helps to provide a high quality of service (QoS) for multimedia applications [21] to improve resource allocation for cognitive radio systems [22] and to assist in capacity planning for Wi-Fi networks [23]. The traffic-related time series prediction problem has been extensively explored in both Ethernet and WiFi networks with different applications [23,24].
Traffic prediction algorithms are highly dependent on the traffic patterns and the statistical characteristics of traffics. As it is affected by the traffic aggregation and sampling (or smoothing) [25], the network traffic has a mix of self-similarity, short range, and long range dependencies [22]. If the network traffic is stable [26,27], we can model it as an autoregressive moving average (ARMA) process. However, if the network traffic is dynamic or its statistical properties change over time, ARMA cannot describe those variations very well. In this case, using an adaptive filter or a neural network [24] to predict the network traffic is a wise choice since they can continuously track the network changes by adjusting the weight of the filter (or neural network) in accordance with the instant traffic load. The neural network approach which can capture the non-linear nature of network traffic, however, is complicated to implement. The over-fitting problem in neural network forecasting also limits its applications to online prediction scenarios.
Traffic load in an arbitrary node of an underwater network, however, is quite different from the large-scale traffic of the Internet, which exhibits aggregation, self-similarity, and long-range dependence features. The traffic at the link layer tends to be more random and dynamic under the effect of all protocols at the upper layers. The packet generation pattern at the application layer and the control flow and reliability control at the transport layer as well as the paths selected at the network layer all affect the traffic pattern at the link layer. For this reason, we estimate the link layer traffic using statistical methods in this paper.

4. Network Architecture

Similar to the traditional sender-initiated handshaking MAC protocols, the receiver-initiated handshaking methods can be applied to a wide range of network applications. The parallel reservation in the receiver-initiated handshaking works particularly well in networks with specific data flow, e.g., data gathering networks. Figure 2 illustrates a data gathering network in which data from underwater sensors or vehicles is gathered to a surface buoy or a control center. This type of network has a wide range of applications, such as underwater environment monitoring as well as scientific exploration [28,29].
With parallel reservation, node r 2 in Figure 2 is able to collect information from its neighbor nodes. This data gathering scheme helps to reduce the channel competition and thus decreases the number of collisions among data packets. The receiver-initiated mechanism also enables packet merging at the link layer which further reduces the network traffic load. So, the receiver-initiated handshaking MAC protocols with parallel reservation are especially preferred in data gathering applications.
In this paper, we assume the sensor nodes monitor the underwater environment (e.g., temperature, pressure, salinity) with periodical sensing. Because of the limited power supply and channel capacity, not every piece of data is reported, but only when some event is detected [30], i.e., temperature change, infusion target detection, and so on. This filtered information results in a random traffic generation rate in the underwater sensor network. We assume that the data packets on network nodes are generated independently with a given probability p g in each sensing period. For all nodes that act as relays, the total traffic, which includes its self-generated data and the relayed data, follows a Bernoulli Distribution. The traffic prediction problem is not trivial, since it is further affected by the behaviors of the transport and network layer protocols as well as the collisions and retransmissions on the link layer. Figure 3 shows that the resulting traffic has a much heavier tail than the traffic pattern on the application layer. For this reason, we study the link layer traffic from a probability point of view. The traffic estimation algorithm here updates the probability distribution of the number of packets, which supports the data polling for the receiver-initiated MAC protocols.

5. TERI-MAC Design

In this section, we first present the design of the TERI-MAC protocol in detail. The primary objective of TERI-MAC is to improve the network‘s energy efficiency and channel utilization in UWSNs. In TERI-MAC, the receiver needs to know the propagation delay to its neighbors, which could be measured through the classic two-way handshake approach that was tested in a sea experiment [31].

5.1. Description of TERI-MAC

TERI-MAC employs a receiver-initiated three-way handshake. Specifically, it involves four phases, as shown in Figure 4.
Phase 1: The receiver R starts a handshake process by sending out a Request-to-Receive ( R T R ) message when it intends to poll data from its neighbors. Here, the R T R message has two functions: to help the receiver request data from neighborhoods and to arrange the transmissions of Available-to-Send ( A T S ) packets from neighboring senders. It consists of the receiver’s ID, the next-hop receiver’s ID, the surrounding senders’ IDs, the transmission time of A T S in sequence, and the number of requested packets from each sender for the data transmission, as shown in Figure 5. By overhearing the R T R message, all the senders and potential interference nodes within the communication range are immediately notified of the upcoming data transmissions. No matter whether the neighboring node is scheduled to transmit the data or not, it will not interfere with the following data reception at the receiver. In this way, TERI-MAC is more effective at preventing the packet collisions caused by the hidden terminal phenomenon.
R T R loss: If the R T R message is not successfully decoded at the intended sender or potential interference node, we call it the R T R loss. Taking sender S 3 as an example, if the R T R is lost on S 3 , the node will not be able to respond with A T S and thus, the handshake between R and S 3 will not be established. The time slots that have been assigned to sender S 3 will be wasted, degrading the channel‘s utilization. However, the handshake process and data transmissions continue on other senders that have successfully received the R T R message, as shown in Figure 6. Another negative effect of R T R loss is on the collision avoidance mechanism in TERI-MAC. Without the interpretation of the transmission scheduling carried on R T R , the node may not be aware of the following data receptions on the receiver R. Collisions are likely to happen if the node attempts to access a channel at the same time. In this case, overhearing the A T S message from other senders within the transmission range (i.e., S 1 and S 4 in Figure 4) can help mitigate the collisions caused by R T R loss.
Phase 2: The senders need to respond to the receiver with A T S messages to establish the data transmission sessions. In order to avoid collisions among A T S packets, the transmission time of the A T S packets should be staggered and follow the order scheduled in the R T R packet, which will be introduced in detail in Section 5.2. The A T S message includes the sender’s ID and the number of available packets during the time interval since the last round of data transmission, as shown in Figure 7. This information, as the input of the traffic estimation algorithm to be discussed in Section 7, helps the receiver to update the traffic distribution of each sender.
A T S loss: When the A T S message cannot be decoded, we call it A T S loss. Different from R T R loss, A T S loss does not affect the handshake process or the scheduled data transmissions, since the transmission is arranged in advance in the R T R packet. Figure 6 illustrates an example when the A T S from S 2 is lost on the receiver, R. The loss of the information about the number of available data packets on S 2 affects the traffic estimation to be performed on the receiver, R.
Phase 3: After establishing the handshakes between the receiver and the senders, the data transmission process begins. The senders send one or multiple data packets in a packet train according to the arrangement of the receiver. The time in the data transmission phase is divided into mini slots, which are assigned to the invited senders by the receiver in Phase 1, corresponding to N S i in the R T R message. The length of time slot is equal to the transmission time of the D A T A packets. Each sender sends out its D A T A packets in the scheduled time if it is able to transmit. Since the slot allocation is based on the traffic estimation, which may not be accurate, the slots may be wasted if the invited sender has fewer packets to send or if some of the packets are not be transmitted in time if insufficient slots are assigned and are therefore queued at the sender. For this reason, TERI-MAC is more preferred in delay-tolerant applications. However, as long as we can get a good approximation of the traffic distribution of the senders, which is stationary, at least in the short term, TERI-MAC can achieve a desirable energy efficiency and network latency based on the adaptive data polling scheme which will be discussed in Section 6.
Phase 4: In the last phase of TERI-MAC, the receiver confirms the successful data reception by replying to an integrated acknowledgment ( A C K ) message to all senders, instead of individual A C K s from each receiver in the sender-initiated protocols. Considering the long preamble in acoustic modems, having fewer A C K packets will significantly reduce the power consumption and thus extend the network‘s lifetime. If the A C K message is lost on a sender, the node will not know whether the data reception is successful or not. The sender can either retransmit all involved data packets in the next round of data requests from the same receiver or dump those packets at the risk of potential data loss. In the simulation, we implemented the retransmission scheme to handle the occasional A C K loss to guarantee the delivery of data packets.
It is worth noting that, the guard time is generally required in most of the MAC protocols that utilize parallel transmissions to prevent unexpected collisions caused by an inaccurate distance measurement, a synchronization error or the drifting of acoustic nodes with an ocean current. In order to prevent collisions among A T S messages in Phase 2 and D A T A packets in Phase 3, a guard time of 1 ms is added in the implementation of TERI-MAC.
Compared to the sender-initiated algorithms, one of the significant advantages of TERI-MAC is its energy efficiency. TERI-MAC conserves energy in three ways. Firstly, the receiver-initiated reservation is more effective at preventing data packet collisions since all the potentially interfering nodes of the receiver are no longer hidden and are informed at the very beginning of the handshaking process. Secondly, TERI-MAC employs parallel reservation and a packet train to reduce the overhead of handshaking control messages. Furthermore, the number of A C K packets is reduced dramatically compared to the sender-oriented protocols.

5.2. Arrangement of A T S Transmission

The A T S packets from different senders should arrive at the receiver in a staggered manner to prevent A T S collisions, as introduced in Phase 2 of Section 5.1. Based on the receiver-initiated protocols, each receiver in TERI-MAC needs to arrange the transmission of A T S packets for these invited senders in advance in the R T R packet. By optimally scheduling the A T S transmission, one can get a minimal A T S reception time while improving the utilization of the acoustic channel.
Now, assume that there are L senders, denoted by a set S = [ S 1 , S 2 , , S L ] . Each sender S i transmits an A T S i packet to the common receiver R, and the propagation delay between R and S i is denoted by τ i . At time t 0 , the receiver R transmits an R T R packet and at time t i , the receiver R receives the A T S i from the sender S i successively, where i { 1 , , L } . The transmission times of R T R and A T S are denoted by T R T R and T A T S , respectively, and the time difference between the R T R reception and the A T S i transmission on S i is labeled D i . Let b i ( i { 1 , , L 1 } ) denote the reception interval among A T S i and A T S i + 1 , as shown in Figure 6.
In order to avoid collisions among A T S messages, each sender S i should wait for an appropriate time difference D i to make the b i 0 (i.e., no A T S overlapping at the receiver). Based on the fact that the differences in propagation delays to different senders are marginal compared to the length of control packets considering the long preamble in acoustic modems, it is highly possible to ensure b i = 0 and to obtain a minimum total time for all A T S receptions. In this case, according to the propagation delay between the receiver and the sender S i , we have
D i = t i ( t 0 + T R T R ) 2 τ i , i { 1 , , L } .
If A T S i is the l t h of L A T S packets arriving at the receiver, then Equation (1) can be written as
D i = T m ( L l ) T A T S ( t 0 + T R T R ) 2 τ i , i { 1 , , L }
where T m is the local time at the receiver receiving the last A T S packet, i.e., T m = max { t i } , i { 1 , , L } . Then, the goal of minimizing the total time for all A T S packets receptions is equivalent to minimizing T m .
Since D i 0 , from Equation (2), we can get
T m ( L l ) T A T S + ( t 0 + T R T R ) + 2 τ i , i { 1 , , L } .
By observing Equation (3), we find that ( t 0 + T R T R ) is a constant. So, in order to minimize T m , we have to add the smallest ( L l ) T A T S to the largest τ i . More specifically, an A T S packet from a sender with the largest propagation delay should be the last to arrive at the receiver. Similar rules apply to other senders. Therefore, an A T S packet from a sender with a larger propagation delay (larger  τ ) should come after the one from a closer sender (smaller τ ) and vice versa.
If we sort senders in the set S by the propagation delay τ in an ascending order, i.e., sender S L has the largest propagation delay τ L , and Equation (3) can be rewritten as
T m ( L i ) T A T S + ( t 0 + T R T R ) + 2 τ i , i { 1 , , L } .
Therefore, the minimum T m is
T m = max i { ( L i ) T A T S + ( t 0 + T R T R ) + 2 τ i } , i { 1 , , L } .
Finally, the receiver calculates t i by t i = T m ( L i ) T A T S and the sender delay D i by D i = t i t 0 2 τ i for each sender and then attaches the time difference [ D 1 , D 2 , , D L ] and the MAC addresses of the corresponding senders to an R T R packet. After the R T R reception, sender S i is delayed for D i before replying to its A T S .
From the above descriptions, we know that the knowledge of the receiver’s local time is not necessary on the sender side, rather, the time difference D i is sufficient for the scheduling of A T S transmission, which allows it to operate in a non-synchronized UWSN.

6. Adaptive Data Polling for TERI-MAC

The data polling mechanism is one fundamental problem for the receiver-initiated MAC protocols since the receiver that starts the communication has little information on the transmission requests of senders. More specifically, the data polling problem includes two issues, one is when to poll data, the other is how much data to poll. In this section, with the assistance of link layer traffic estimation, we discuss and propose an adaptive data polling algorithm to solve these two issues. Based on the historical feedback of the packet number on the sender side, the receiver can estimate the traffic from different senders. Traffic estimation can help the receiver to poll data in time and to avoid over-requesting.

6.1. When to Poll Data

In most of the receiver-initiated methods, due to the lack of knowledge of the current status of the intended senders, e.g., having packets to send or not, on the receiver side, receivers usually blindly decide when to poll data from the surrounding senders. Frequent data polling results in high energy consumption if the sender has few packets to transmit. The parallel reservation and packet train lose effectiveness when the data is polled too frequently. Conversely, if receivers do not request data in time, long delays will be introduced into the data transmission, which is also not acceptable in most applications. Therefore, a receiver needs to adjust the frequency of data polling in order to get an appropriate tradeoff between energy efficiency and communication latency.
In UWSNs with a constrained power supply, high energy efficiency is preferred to extend the network’s lifetime. In order to achieve a controllable performance, we set up a threshold of the control packet overhead E t h , which is defined as the total power consumption of the control packets during the data transmission during one round handshake, and the average hop-by-hop communication delay D t h , which is defined as the average delay for data packets waiting for transmission. For each node Q i , i { 1 , , N } , where N is the total number of nodes in the network, Q i will start the data request in three cases, as follows.
  • Case 1: If Q i is the next-hop destination of the current active receiver, Q i will start the data polling as soon as it can so that the packets can be forwarded to the final destination smoothly in the multi-hop communications. As shown in Figure 5, the R T R message including the A n e x t information notifies the successive node of the coming data reception. It is worth noting that the A n e x t does not indicate the dependency of TERI-MAC on specific routing protocols. When a new packet is generated or a forwarding packet is received, it is temporally stored in a queue before being sent out. The node also records the generation or reception time and the next-hop receiver’s ID, A n e x t for each packet. The A n e x t information can be obtained from the routing header. When a node receives an R T R request from A n e x t , all the packets with a matched next-hop ID have the chance to be transmitted in a group. Although TERI-MAC can work with most of the existing routing protocols, clustering-based routing enables better data aggregation, allowing TERI-MAC to achieve higher throughputs and better energy efficiency.
  • Case 2: Q i starts the handshake if the estimated energy efficiency E e s t ( i ) , which is the power consumption of control packets over the estimation of data transmission, is below the defined threshold of performance E t h . Here, E e s t ( i ) is estimated by the receiver based on the traffic estimation which is introduced in the next section. In this way, a baseline energy efficiency E t h can be achieved in TERI-MAC.
  • Case 3: Q i requests data from its neighbors when the time interval D i since the last communication exceeds the delay threshold D t h . In networks with a low traffic load, the waiting time to cumulate packets and achieve the desired energy efficiency becomes too long to be acceptable, since the out-of-date sensing information may become useless even if the destination is received successfully. The hop-by-hop communication delay threshold D t h can guarantee the maximum delay performance. In most cases, we can achieve preferable energy efficiency with a tolerable amount of delay.

6.2. How Much Data to Poll

The second challenge of the data polling problem is to decide how much data to request from each sender. Since the receiver has no prior knowledge regarding the number of data packets cumulated on the intended senders, the receiver has trouble determining how many packets to request from senders without any extra communication. By assigning more channel resources to the sender, a higher packet delivery coverage and thus, a shorter communication delay can be achieved at the cost of lower efficiencies for both energy and channel utilization. The receiver can improve the energy and channel efficiency by assigning few transmission slots to senders, such that the assigned slots have less chance of being wasted, which, however, may result in an extra queuing delay when the cumulated packets cannot be sent out in a timely manner. Therefore, a good estimation of the probability distribution of the senders’ traffic is especially important. With the assistance of a good traffic predictor, the receiver is able to guarantee an overall packet delivery ratio. More information about the traffic estimation is introduced in Section 7.
In an underwater network, deployed as Figure 2 for example, the receiver node initiates the handshaking by requesting data from its neighbors. The traffic from different senders may vary since it includes both the self-generated data and the packets forwarded for other nodes, according to the network topology and the routing protocol. The traffic in node Q i , i { 1 , , N } would follow the binominal distribution, and we have
T R A Q i j = 1 N Q i B ( T j , p g j )
where N Q i represents the number of nodes that have packets to travel through node Q i which may vary with time and depends on the network topology and routing algorithm. T j is the time interval between two successive rounds of data requests, and p g j is the self-generated average data rate.
  • The delivery percentage P del : When the number of packets in the polled node follows a given distribution F ( x ) , there is a certain probability P d e l that the assigned slots T S will be enough to transmit all of the queued packets:
    P d e l = 0 T S F ( x ) d x .
Since the number of packets is a random process, there is no way for the receiver to predict an exact number without error. However, based on traffic distribution knowledge, the receiver can assign time slots for each sender in order to guarantee a predetermined delivery percentage P d e l .
By adjusting percentage P d e l , we can achieve a tradeoff between channel resource utilization and communication delay. A high P d e l increases the chance that a packet will delivered in the current round of communication; however, it also increases the probability that the channel resource be wasted because of the overassigned time slots. A low P d e l , on the contrary, leads to a high average delay, which is not profitable for the network communications. Choosing an appropriate P d e l is important to TERI-MAC, as will be discussed later in Section 8.1.

7. Traffic Estimation for TERI-MAC

During the handshaking process, the receiver is informed of the average packet number within the time interval between two successive data requests, serving as input information for the traffic estimation. Now, let x i denote the number of packets and X M = [ x 1 , x 2 , , x M ] be the set of the samples, where M is the size of X M . A standard method for an approximating distribution is the empirical distribution of the observed data from all of the historical records, e.g., the sample set X M . We can get a better estimation as the sample size M increases. However, because of the traffic dynamics in the time domain and the constrained computation and memory capacity in the underwater nodes, we can only expect a sparse dataset for a rough traffic model approximation.
On the one hand, a larger sample size leads to a more accurate traffic estimation and a more efficient channel allocation for the TERI-MAC. On the other hand, large datasets slow down the adaptation of the traffic model to the temporal variation of the link layer traffics and aggravate the computation overhead of underwater nodes. Instead of keeping all the history samples, { x i } , i = 1 , , M , we utilize the CDF Inverse Sampling technique to generate a set of samples { x ^ i } , i = 1 , , M of a constant size M where M < M from the traffic distribution F ( x ) is a representation of the large dataset.
  • CDF Inverse Sampling [32]: Let G ( x ) be the cumulative distribution function (CDF) of a random variable x which has the probability density function (PDF) F ( x ) . If random variable y comes from a uniform distribution U ( 0 , 1 ) , then the random variable x ^ = G 1 ( y ) follows the same distribution as x. In other words, a set of samples { x i ^ } becomes a good representation of random variable x as they have the same distribution ( F ( x ) ).
CDF Inverse Sampling is a simple but effective method when the distribution is univariate and the inverse CDF is easy to obtain. In many cases, when inverse CDF cannot be solved analytically, we can approximate the true CDF with a piecewise linear function based on the sample set from the distribution [33].
In order to determine the trend of traffic when it varies, the most recent K records { x M K + 1 , , x M } are used to approximate the traffic distribution together with samples { x ^ 1 , , x ^ M } . The sampling window of size K represents the most recent trend of the network’s traffic, while the resampled data { x ^ 1 , , x ^ M } from the preceding records presents the historical information of the traffic distribution. With the small dataset { x ^ 1 , , x ^ M , x M K + 1 , , x M } , we can then estimate the traffic distribution by leveraging an affordable computation, e.g., the kernel density estimation method.
When the new record x M + 1 arrives, the sampling window moves forward and leaves the sample x M K + 1 out of the window. We also need to resample the historical records { x M K + 1 , x ^ 1 , , x ^ M } to keep a non-increasing dataset. To reduce the frequent resampling process in the traffic estimation, a simplified procedure is illustrated in Algorithm 1. A sampling window with a changing size is employed. The size of the sampling window S W I N increases with the new arrival records. When  S W I N K , all the records in the sampling window are moved out and merged to the data set { x ^ 1 , , x ^ M } , and the set is resampled to get a new representation for the historical distribution.
Algorithm 1 Traffic estimation in TERI-MAC.
  • while new record x M + 1 comes do
  •     if S W I N K then
  •         Move out x M K + 1 , , x M in the sampling window;
  •         Resample from { x ^ 1 , , x ^ M , x M K + 1 , , x M }
  •     end if
  •     Add x M + 1 in the sampling window;
  •     Build PDF with { x ^ 1 , , x ^ M } and records in sampling window;
  • end while
Depending on the traffic estimation designed in Algorithm 1, the receiver estimates how much data to request from each sender and assigns time slots for their data transmissions. We simulated an experiment to show the average traffic of one sender and the channel resource assignment with traffic estimation at the receiver side. In this simulation, we tested the ability of the traffic estimation mechanism used in our work to capture the dynamic traffic and perform accurate predictions. A sequence of random traffic was generated following a Bernoulli distribution and the average traffic load varied from 0 to 2 to manipulate the traffic load variation over time in real applications. The traffic load was the average number of data packets generated per time slot. In addition, we set a sampling window size of K = 10 and resampled M = 5 from the historical records each time. Figure 8 illustrates that even though a lag existed from the moment of the traffic change and the slot assignment, the traffic estimation followed the trend very well. Furthermore, we computed the channel utilization by calculating the ratio of the time slots utilized for data transmission over the total amount assigned by the receiver. Based on the premise of P d e l = 50 % , the simulation results verified that an overall 88 % channel utilization was achieved when trying to assign the slots to guarantee a 50 % probability of packet coverage in the transmission. This simulation verifies the efficiency of the traffic estimation mechanism.

8. Simulation and Analysis

This section describes the evaluation of the performance of TERI-MAC via simulations. The simulation platform was Aqua-Sim [34], an NS-2 based underwater network simulator. Three performance metrics were used as follows:
  • Energy Efficiency: The energy efficiency was evaluated in terms of the relative control message overhead, defined as the overhead of control messages divided by that of data packets in one round of data communication.
  • Channel Utilization: The ratio of the time slots utilized for data transmission in the data communication phase (Phase 3 in Figure 4) over the total amount assigned by the receiver.
  • Hop-by-Hop Communication Delay: The average queuing delay for the data transmission, i.e., the time period between when the original data packet is generated or the relay data is received and when the packet is transmitted to the next-hop receiver.
The simulation results verified the enhanced energy efficiency, delivery delay, and channel utilization of TERI-MAC with the adaptive data polling mechanism. We also compared TERI-MAC with RIPT [15] which is briefly introduced in Section 3.1. All results presented in this section are the average outcomes of multiple tests.
We evaluated the performance of TERI-MAC in a tree network topology, a typical topology for underwater sensing data collection. In this topology, 20 sub-sea nodes collect and forward data to the sink node on the surface of the ocean, as illustrated in Figure 9. For each branch, we let four intended senders transmit to a common receiver. In addition, the average distance between neighboring nodes was 1 km (uniformly distributed between 800 m and 1200 m). The maximum transmission range and the maximum transmission power of each node were set as 1.5 km and 20 watts, respectively. The size of data packets was 250 bytes.
The overall available channel bandwidth in the simulation was 5 kHz (from 20 kHz to 25 kHz). We implemented the classic frequency-dependent absorption model and the shallow water noise model presented in [35]. Aqua-Sim [34] includes a default bit error model where each bit in a receiving packet has an independent chance of having an error. Whether a packet can be successfully decoded depends not only on the bit error rate (BER) but also on the error correction coding, which is not implemented in the current version of Aqua-Sim. Therefore, the BER in the simulation was set to zero in the evaluation of both TERI-MAC and RIPT MAC. We expected a performance degradation for both protocols if the BER was remarkable. Although the BER was not considered, the channel in our simulation was not error-free. Strong attenuation strong or high noise in the environment would cause the signal-to-noise ratio (SNR) of the receiving packet to be weak, leading to a packet error. This, to some extent, allowed us to simulate the effect of physical error (even if not colliding) on the performance of the MAC protocols.

8.1. Performance Evaluation

We first evaluated the energy efficiency performance of the TERI-MAC system, which is controlled by the parameter, E t h , which represents the target energy efficiency in the Algorithm 2. Be aware of the traffic models of all neighbor senders, the receiver that initiated the handshaking communication was able to adjust the frequency of data polling to reach the required energy efficiency. The traffic estimation enabled TERI-MAC to adapt to any traffic pattern. If the traffic load was relatively low, the waiting time increased to allow more packets to be accumulated at the senders. For high traffic loads, the receiver would request the data more frequently after achieving the desired energy efficiency.
The energy consumption of the control and data packets in our simulations was calculated based on the AquaSeNT OFDM Modems presented in Table 1. The average traffic generation rates of four senders involved in the simulation were set as λ = 0.02 , 0.03 , 0.05 , 0.1 , respectively. Figure 10 illustrates that TERI-MAC was able to achieve the desired energy efficiency by adjusting parameter E t h from 0.1 to 0.9 . In other words, the good consistency between the desired E t h and the achieved E verified the effectiveness of both the energy efficiency control and the traffic estimation procedure in TERI-MAC.
As introduced in the problem of when to poll data in Section 6.1, the frequency of data polling is a key factor that affects energy efficiency and delays performance, and thus, Algorithm 2 is was proposed to decide when to poll data based on the threshold of the control packet overhead E t h . Figure 11 shows the tradeoff between the energy efficiency and the average hop-by-hop communication delays of the four senders. The simulation results revealed two facts as follows: (a) The delays significantly increased when the target control packet overhead E t h decreased from 0.3 to 0.1 for all senders. In other words, a relatively low E t h resulted in a longer hop-by-hop delay. (b) For senders with different traffic loads λ , a larger λ resulted in a longer average hop-by-hop delay. We found that the protocol worked with high efficiency and acceptable delay when E t h = 0.2 . For delay-sensitive applications, a control packet overhead as low as 0.3 can be achieved in TERI-MAC.
Algorithm 2 When to poll data.
  • if A Q i = = A n e x t then      % A Q i denotes the address of the node Q i
  •     Poll data when current handshaking ends;
  • else
  •     while E e s t ( i ) E t h & m a x ( D j ) D t h do   % where j is the index of intended senders around Q i
  •         Waiting time + + ;
  •     end while
  •     Poll data if channel idle;
  • end if
Next, we conducted simulations to verify the efficiency of Algorithm 1, which solves the how much data to poll problem. As introduced in Section 6.2, the transmission slot allocation among senders based on the traffic estimation acts as a tradeoff between channel utilization and delay performance by adjusting the delivery percentage P d e l from 0.1 to 1. Figure 12 demonstrates that the channel utilization linearly decreases with the increase of P d e l , presenting a reduced delay in an inverse proportional way. The simulation results revealed that a P d e l within [ 0.4 0.5 ] can achieve an acceptable channel utilization and delay.

8.2. Performance Comparison

To verify the advantages of the proposed system, we compared TERI-MAC with RIPT. A brief introduction on RIPT was presented in Section 3.1. Furthermore, we also ran RIPT with the traffic predictor to validate the effectiveness of the adaptive data polling mechanism based on the traffic estimation.
Figure 13 and Figure 14 demonstrate the performance of three methods (i.e., TERI-MAC, RIPT MAC and RIPT with traffic estimation) in terms of the energy efficiency and hop-by-hop communication delay. As revealed in Figure 13, TERI-MAC achieved the best energy efficiency as revealed in Figure 13, at the cost of a relatively long hop-by-hop communication delay, as shown in Figure 14. In the TERI-MAC simulation with E t h = 0.2 , a roughly stable control packet overhead was achieved with a wide range of network traffic loads, which was much lower than the RIPT MAC, especially at low traffic loads. However, a longer hop-by-hop communication delay was introduced in the TERI-MAC, due to the less frequent data polling when the network had a light traffic load. In addition, we observed the heavy reliance of the performance of RIPT on the network traffic load. When the traffic load was low, there were only few data packets available in the senders for each handshaking communication. This overfrequent data polling in RIPT MAC resulted in a relatively high control packet overhead and thus a poor energy efficiency. The efficiency performance improved at a high traffic load but was still worse than that of TERI-MAC.
We also implemented the proposed traffic estimation for RIPT MAC in order to verify the efficiency of the traffic estimation scheme. The modified RIPT achieved a significant improvement in energy efficiency, as shown in Figure 13. With an estimation of the number of packets at each sender, the polling receiver was able to detect the low traffic load of the network and tended to slow down the handshaking process to accumulate packets. Even though a longer delay resulted from the adaptive data polling scheme, the substantial energy efficiency improvement is more promising for its use in power constraint UWSNs. The efficiency enhancement to RIPT reveals the effectiveness of our traffic estimation-assisted adaptive data polling scheme for receiver-initiated MAC protocols.

9. Conclusions

In this paper, we designed a new receiver-initiated system based on traffic estimation, TERI-MAC to achieve efficient communications for UWSNs. In TERI-MAC, receivers replace the role of senders in conventional protocols to initiate the handshaking process. The parallel reservation, shared control packets, and enabled link layer data aggregation in TERI-MAC significantly improve the energy efficiency of UWSNs compared to the long preamble in acoustic modems.
The unique challenges faced in the receiver-initiated MAC approaches, that is, to decide when to poll and how much data to poll, were solved by adopting traffic estimation in our paper. By employing the adaptive data polling mechanism, the receiver in TERI-MAC can initiate handshakes timely to reduce the packet queuing delay while constraining the energy consumption on transmitting control packets. The simulation results verified that our traffic estimation adapts well to dynamic traffic loads in the network, and the adaptive data polling mechanism in TERI-MAC results in stable energy efficiency with varying traffic patterns.
In the meantime, we carried out extensive simulations and evaluated the energy efficiency, the channel utilization, and the hop-by-hop delay performance of TERI-MAC. The results demonstrate that by adjusting the frequency of data polling, the desired energy efficiency can be achieved. A trade-off between channel utilization and delay performance is also expected in TERI-MAC. Moreover, the comparative experiments proved that the performance of TERI-MAC with traffic estimation outperforms RIPT, a representative receiver-initiated-based underwater MAC protocol. Therefore, we believe that TERI-MAC is a promising MAC solution for delay-tolerant underwater applications.

Author Contributions

All authors contributed to the research of this paper. Y.D. and L.P. composed the original draft, designed the method and carried out the experiments. Y.L., Z.P. and H.M. made suggestions on the protocol design and edited the whole manuscript. Y.M., Y.Z. (Yi Zhao) and Y.Z. (Yuzhi Zhang) made some suggestions on the paper editing and refined the overall manuscript. The article was initially written by L.P. and Y.D. and improved and polished by all of the authors.

Funding

This research was supported by Project of International Cooperation and Exchanges of Shaanxi Province (2016KW-035); Fundamental Research Funds for the Central Universities in Chang’An University (310832171007); National Natural Science Foundation of China (61701044, 61801372); Natural Science Foundation of Shaanxi Province (2016JQ6067).

Acknowledgments

The authors would like to thank Xiaohui Li and Nan Gao for reviewing the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

A r e c v Address of the active receiver that sends the R T R
A n e x t Address of the next-hop receiver of A r e c v
A S i Address of the sender i that is invited by the receiver, where i { 1 , , L }
D S i Time schedule of A T S transmission for sender i
N S i Number of D A T A packets assigned to sender i for the following data transmission
A s e n d Address of the sender that responds to the A T S
N s e n d Average number of D A T A packets since the last transmission

References

  1. Felemban, E.; Shaikh, F.K.; Qureshi, U.M.; Sheikh, A.A.; Qaisar, S.B. Underwater sensor network applications: A comprehensive survey. Int. J. Distrib. Sens. Netw. 2015, 11, 1–14. [Google Scholar] [CrossRef]
  2. Zhou, Z.; Peng, Z.; Cui, J.H.; Shi, Z.J.; Bagtzoglou, A.C. Scalable Localization with Mobility Prediction for Underwater Sensor Network. IEEE Trans. Mob. Comput. 2011, 10, 335–348. [Google Scholar] [CrossRef]
  3. Zenia, N.Z.; Aseeri, M.; Ahmed, M.R.; Chowdhury, Z.I.; Kaiser, M.S. Energy-efficiency and Reliability in MAC and Routing Protocols for Underwater Wireless Sensor Network: A Survey. J. Netw. Comput. Appl. 2016, 71, 72–85. [Google Scholar] [CrossRef]
  4. Climent, S.; Sanchez, A.; Capella, J.V.; Meratnia, N.; Serrano, J.J. Underwater Acoustic Wireless Sensor Networks: Advances and Future Trends in Physical, MAC and Routing Layers. Sensors 2014, 14, 795–833. [Google Scholar] [CrossRef] [PubMed]
  5. Jiang, S.M. State-of-the-art Medium Access Control (MAC) Protocols for Underwater Acoustic Networks: A Survey Based on a MAC Reference Model. IEEE Commun. Surv. Tutor. 2018, 20, 96–131. [Google Scholar] [CrossRef]
  6. Su, Y.S.; Jin, Z.G. UMMAC: A Multi-channel MAC Protocol for Underwater Acoustic Networks. J. Commun. Netw. 2016, 18, 75–83. [Google Scholar]
  7. Zhang, S.; Qian, L.; Liu, M.; Fan, Z.; Zhang, Q. A Slotted-FAMA Based MAC Protocol for Underwater Wireless Sensor Networks with Data Train. J. Signal Process. Syst. 2017, 89, 3–12. [Google Scholar] [CrossRef]
  8. Chirdchoo, N.; Soh, W.S.; Chua, K.C. Aloha-based MAC Protocols with Collision Avoidance for Underwater Acoustic Networks. In Proceedings of the IEEE INFOCOM, Anchorage, AK, USA, 6–12 May 2007. [Google Scholar]
  9. Molins, M.; Stojanovic, M. Slotted FAMA: A MAC Protocol for Underwater Acoustic Networks. In Proceedings of the IEEE OCEANS 2006—Asia Pacific, Singapore, 16–19 May 2006. [Google Scholar]
  10. Peng, Z.; Zhu, Y.B.; Zhou, Z.; Guo, Z.; Cui, J.H. COPE-MAC: A Contention-based Medium Access Control Protocol with Parallel Reservation for Underwater Acoustic Networks. In Proceedings of the 2010 IEEE OCEANS, Sydney, Australia, 24–27 May 2010. [Google Scholar]
  11. Guo, X.X.; Frater, M.R.; Ryan, M.J. Design of a Propagation-Delay-Tolerant MAC Protocol for Underwater Acoustic Sensor Networks. IEEE J. Ocean. Eng. 2009, 34, 170–180. [Google Scholar]
  12. Pu, L.N.; Luo, Y.; Peng, Z.; Mo, H.N.; Cui, J.H. Traffic Estimation Based Receiver Initiated MAC for Underwater Acoustic Networks. In Proceedings of the Eighth ACM International Conference on Underwater Networks and Systems, Kaohsiung, Taiwan, 11–13 November 2013; ACM: New York, NY, USA, 2013; pp. 1–5. [Google Scholar] [CrossRef]
  13. Talucci, F.; Gerla, M.; Fratta, L. MACA-BI (MACA By Invitation)—A Receiver Oriented Access Protocol for Wireless Multihop Networks. In Proceedings of the 8th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Helsinki, Finland, 1–4 September 1997. [Google Scholar]
  14. Garcia-Luna-Aceves, J.J.; Tzamaloukas, A. Reversing the Collision-Avoidance Handshake in Wireless Networks. In Proceedings of the ACM Conference on Mobile Computing and Networking (MobiCom), Seattle, DC, USA, 15–20 August 1999. [Google Scholar]
  15. Chirdchoo, N.; Soh, W.S.; Chua, K.C. RIPT: A Receiver-initiated Reservation-based Protocol for Underwater Acoustic Networks. IEEE J. Sel. Areas Commun. 2008, 26, 1744–1753. [Google Scholar] [CrossRef]
  16. Luo, Y.; Pu, L.N.; Peng, Z.; Zhu, Y.B.; Cui, J.H. RISM: An Efficient Spectrum Management System for Underwater Cognitive Acoustic Networks. In Proceedings of the 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), Singapore, 30 June–3 July 2014. [Google Scholar]
  17. Chong, C.Y.; Kumar, S.P. Sensor Networks: Evolution, Opportunities, and Challenges. Proc. IEEE 2003, 91, 1247–1256. [Google Scholar] [CrossRef]
  18. Gkantsidis, C.; Rodriguez, P.R. Network Coding for Large Scale Content Distribution. In Proceedings of the 2005 IEEE INFOCOM, Miami, FL, USA, 13–17 March 2005. [Google Scholar]
  19. Pu, L.N.; Luo, Y.; Mo, H.N.; Le, S.; Peng, Z.; Cui, J.H.; Jiang, Z.H. Comparing Underwater MAC Protocols in Real Sea Experiments. Comput. Commun. 2015, 56, 47–59. [Google Scholar] [CrossRef]
  20. Pu, L.N.; Luo, Y.; Zhu, Y.B.; Peng, Z.; Khare, S.; Cui, J.H.; Liu, B.Y.; Wang, L. Impact of Real Modem Characteristics on Practical Underwater MAC Design. In Proceedings of the 2012 IEEE OCEANS, Ottawa, ON, Canada, 10–15 June 2012. [Google Scholar]
  21. Sahinoglu, Z.; Tekinay, S. On multimedia networks: Self-similar traffic and network performance. IEEE Commun. Mag. 1999, 37, 48–52. [Google Scholar] [CrossRef]
  22. Li, X.K.; Seyed, A.; Zekavat, R. Traffic Pattern Prediction Based Spectrum Sharing for Cognitive Radios. Cogn. Radio Syst. 2009, 77–95. [Google Scholar]
  23. Rossi, C.; Casetti, C.; Chiasserini, C.F. Bandwidth Monitoring in Multi-Rate 802. 11 WLANs with Elastic Traffic Awareness. In Proceedings of the 2011 IEEE GLOBECOM, Houston, TX, USA, 5–9 December 2011. [Google Scholar]
  24. Alarcon-Aquino, V.; Barria, J.A. Multiresolution FIR Neural-network-based Learning Algorithm Applied to Network Traffic Prediction. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 2006, 36, 208–220. [Google Scholar] [CrossRef] [Green Version]
  25. Sang, A.; Li, S.Q. A Predictability Analysis of Network Traffic. In Proceedings of the 2000 IEEE INFOCOM, Tel Aviv, Israel, 26–30 March 2000. [Google Scholar]
  26. Sadek, N.; Khotanzad, A. Multi-scale High-speed Network Traffic Prediction Using K-factor Gegenbauer ARMA Model. In Proceedings of the 2004 IEEE ICC, Paris, France, 20–24 June 2004. [Google Scholar]
  27. Shu, Y.T.; Yu, M.F.; Liu, J.K.; Yang, O.W.W. Wireless Traffic Modeling and Prediction Using Seasonal ARIMA Models. In Proceedings of the 2003 IEEE ICC, Anchorage, AK, USA, 11–15 May 2003. [Google Scholar]
  28. Vasilescu, I.; Kotay, K.; Rus, D.; Dunbabin, M.; Corke, P. Data Collection, Storage, and Retrieval with an Underwater Sensor Network. In Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, San Diego, CA, USA, 2–4 November 2005. [Google Scholar]
  29. Nawaz, S.; Hussain, M.; Watson, S.; Trigoni, N.; Green, P.N. An Underwater Robotic Network for Monitoring Nuclear Waste Storage Pools. In Proceedings of the 1st International ICST Conference on Sensor Systems and Software (SCUBE), Pisa, Italy, 7–8 September 2009. [Google Scholar]
  30. Yao, Y.; Gehrke, J. Query Processing in Sensor Networks. In Proceedings of the 1st Biennial Conference on Innovative Data Systems Research (CIDR 2003), Asilomar, CA, USA, 5–8 January 2003. [Google Scholar]
  31. Luo, Y.; Pu, L.N.; Zhao, Y.X.; Cui, J.H. Exploring Uncertainties of Transmission, Reception Delays for Underwater Acoustic Networks. IEEE Wirel. Commun. Lett. 2017, 6, 418–421. [Google Scholar] [CrossRef]
  32. Chen, H.S. Tutorial on Monte Carlo Sampling; The Ohio State University: Columbus, OH, USA, 2005. [Google Scholar]
  33. Christian, R.; Tanner, M.A. Facilitating the Gibbs Sampler: The Gibbs Stopper and the Griddy-Gibbs Sampler. J. Am. Stat. Assoc. 1992, 87, 861–868. [Google Scholar]
  34. Zhu, Y.; Lu, X.; Pu, L.; Su, Y.; Martin, R.; Zuba, M.; Peng, Z.; Cui, J.-H. Aqua-Sim: An NS-2 based simulator for underwater sensor networks. In Proceedings of the 2013 ACM WUWNet, Kaohsiung, Taiwan, 11–13 November 2013. [Google Scholar]
  35. Lurton, X. An Introduction to Underwater Acoustics: Principles and Applications; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2002. [Google Scholar]
Figure 1. Interference and exposed areas in handshaking-based MAC protocols with parallel reservation. (a) Sender-initiated handshaking; (b) Receiver-initiated handshaking.
Figure 1. Interference and exposed areas in handshaking-based MAC protocols with parallel reservation. (a) Sender-initiated handshaking; (b) Receiver-initiated handshaking.
Sensors 18 03895 g001
Figure 2. Data gathering network scenario.
Figure 2. Data gathering network scenario.
Sensors 18 03895 g002
Figure 3. Distribution of the average number of packets on the link layer. The average data generation rate is 0.4.
Figure 3. Distribution of the average number of packets on the link layer. The average data generation rate is 0.4.
Sensors 18 03895 g003
Figure 4. Four phases in traffic estimation-based receiver-initiated medium access control (TERI-MAC).
Figure 4. Four phases in traffic estimation-based receiver-initiated medium access control (TERI-MAC).
Sensors 18 03895 g004
Figure 5. Format of the Request-to-Receive ( R T R ) message.
Figure 5. Format of the Request-to-Receive ( R T R ) message.
Sensors 18 03895 g005
Figure 6. TERI-MAC transmission scheduling. Squares filled with and without oblique lines represent transmissions and receptions, respectively. The red cross indicates the occasional packet loss.
Figure 6. TERI-MAC transmission scheduling. Squares filled with and without oblique lines represent transmissions and receptions, respectively. The red cross indicates the occasional packet loss.
Sensors 18 03895 g006
Figure 7. Format of the Available-to-Send ( A T S ) message.
Figure 7. Format of the Available-to-Send ( A T S ) message.
Sensors 18 03895 g007
Figure 8. Adaptive slot assignment in TERI-MAC with a varying traffic load.
Figure 8. Adaptive slot assignment in TERI-MAC with a varying traffic load.
Sensors 18 03895 g008
Figure 9. Tree topology in the network simulation.
Figure 9. Tree topology in the network simulation.
Sensors 18 03895 g009
Figure 10. The achieved energy efficiency with respect to different parameter settings ( E t h ) in TERI-MAC.
Figure 10. The achieved energy efficiency with respect to different parameter settings ( E t h ) in TERI-MAC.
Sensors 18 03895 g010
Figure 11. Tradeoff between energy efficiency and the hop-by-hop delay performance.
Figure 11. Tradeoff between energy efficiency and the hop-by-hop delay performance.
Sensors 18 03895 g011
Figure 12. Tradeoff between channel utilization and the hop-by-hop communication delay performance.
Figure 12. Tradeoff between channel utilization and the hop-by-hop communication delay performance.
Sensors 18 03895 g012
Figure 13. The overhead of the control packet with respect to the network traffic load.
Figure 13. The overhead of the control packet with respect to the network traffic load.
Sensors 18 03895 g013
Figure 14. The hop-by-hop communication delay with respect to the network traffic load.
Figure 14. The hop-by-hop communication delay with respect to the network traffic load.
Sensors 18 03895 g014
Table 1. Overhead of control message (6 bytes) and data packet (250 bytes) with different acoustic modems.
Table 1. Overhead of control message (6 bytes) and data packet (250 bytes) with different acoustic modems.
Modem TypeData RatePreamble (s)Control Packet Length (s)Data Packet Length (s)
Benthos ATM-88X Modem800 bps (Standard)≈1.5≈1.56≈4.06
2.4 Kbps (Highest)≈1.52≈2.35
AquaSeNT OFDM Modem3.045 Kbps0.490.661.15
WHOI Micro Modem80 bps (Standard)0.871.4725.87
300–5000 bps (PSK mode)0.88–1.031.27–7.54

Share and Cite

MDPI and ACS Style

Dong, Y.; Pu, L.; Luo, Y.; Peng, Z.; Mo, H.; Meng, Y.; Zhao, Y.; Zhang, Y. Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks . Sensors 2018, 18, 3895. https://doi.org/10.3390/s18113895

AMA Style

Dong Y, Pu L, Luo Y, Peng Z, Mo H, Meng Y, Zhao Y, Zhang Y. Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks . Sensors. 2018; 18(11):3895. https://doi.org/10.3390/s18113895

Chicago/Turabian Style

Dong, Yuan, Lina Pu, Yu Luo, Zheng Peng, Haining Mo, Yun Meng, Yi Zhao, and Yuzhi Zhang. 2018. "Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks " Sensors 18, no. 11: 3895. https://doi.org/10.3390/s18113895

APA Style

Dong, Y., Pu, L., Luo, Y., Peng, Z., Mo, H., Meng, Y., Zhao, Y., & Zhang, Y. (2018). Receiver-Initiated Handshaking MAC Based on Traffic Estimation for Underwater Sensor Networks . Sensors, 18(11), 3895. https://doi.org/10.3390/s18113895

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop