A Two-phase Broadcast Scheme for Underwater Acoustic Networks

Size: px
Start display at page:

Download "A Two-phase Broadcast Scheme for Underwater Acoustic Networks"

Transcription

1 A Two-phase Broadcast Scheme for Underwater Acoustic Networks Haining Mo, Zheng Peng, Zhong Zhou and Jun-Hong Cui Computer Science & Engineering Department, University of Connecticut, Storrs, CT, USA 6269 {haining.mo, zhengpeng, zhong.zhou, Abstract Reliable broadcast is a critical service for Underwater Acoustic Networks (UANs). In this paper, we propose a Two-phase Broadcast Scheme () for UANs. includes two phases: Fast Spreading phase and Data Recovery phase. It does not require topology or neighbor information. In the Fast Spreading phase, which is a best effort phase, opportunistic overhearing and network coding are combined to accumulate encoded packets. A probability based forwarder selection scheme is employed to alleviate the broadcast storm problem. A rebroadcast scheduling algorithm is also proposed to reduce collisions. The Data Recovery phase is to guarantee reliability if a node fails to complete data decoding in the Fast Spreading phase. Through delayed request sending, the Data Recovery phase at a node will not interfere with the Fast Spreading phase at other nodes. Through simulations, we demonstrate the advantages of in terms of efficiency and reliability. ACKNOWLEDGMENT This work is supported in part by the US National Science Foundation under Grant No , Grant No , Grant No , Grant No , Grant No , and Grant No I. INTRODUCTION The last decade has witnessed a remarkable progress in Underwater Acoustic Networks (UANs) because of its various applications including underwater environment monitoring and tactical surveillance [1], [2]. Due to the significant differences between UANs and Terrestrial Wireless Sensor Networks (TWSNs), considerable research efforts have been devoted to every layer of UANs [3], [4], [5]. In this paper, we investigate a critical problem, reliable broadcast for UANs. Different from TWSNs, in UANs, acoustic channels are usually employed for signal transmission in the water. The data propagation delay is long due to the low propagation speed of acoustic signals (around 15m/s). Additionally, UAN channels have very low data rates because of the absorption, multipath and fading. Moreover, UANs usually suffer from high error probabilities because of error prone underwater acoustic channels as well as the intermittent network connectivity. Finally, current underwater acoustic modems are half-duplex and can only be in the sending or receiving status at one time [6]. All these features make reliable broadcast for UANs a very challenging task. A. Broadcast in TWSNs Reliable broadcast has always been a desirable feature for wireless networks. Applications such as updating the firmware/operating system on every node in the network and distributing a critical data file network-wide are common and required by various tasks in both TWSNs and UANs. Various approaches have been proposed for broadcast in Ad- Hoc Networks, with blind flooding being the simplest one [7]. Blind flooding achieves the best reliability at the cost of the broadcast storm [8]. To alleviate the broadcast storm problem, extensive research efforts have been devoted to the selection of an optimal set of rebroadcasting nodes. The proposed mechanisms can be coarsely categorized into probability based methods [9], area based methods, neighbor knowledge based methods [1], [11] and cluster based method [12]. However, the aforementioned mechanisms tend to be impractical and inefficient for UANs considering the special features of the underwater environment. In pure probability based methods, a node rebroadcasts with either a static or an adaptive probability, which is inversely proportional to the number of neighbors, for example [13]. Static probability is inefficient because the highly dynamic nature of UANs imposes great challenges to predetermine the rebroadcast probability. Adaptive probability is not a good option for UANs either due to the difficulty to obtain and maintain the neighbor information. Neighbor knowledge based methods such as Dominant Pruning [14] and Multi-point Relaying [15] have been proved efficient for Ad-Hoc Networks. They usually require one hop or even two hop neighbor information, which is obtained and maintained via beacon messages exchanges [12]. However, this scheme is inefficient for UANs due to two reasons. On the one hand, the large propagation delay in UANs and the long preamble of underwater acoustic modems [16] incur a significant overhead to message exchanges. According to [16], Benthos modem [6] imposes a preamble lasting 1.5 seconds. This implies that for a pair of nodes 15 meters away, even a short beacon message will take more than 2.5 seconds to travel between them, including a 1 second propagation delay and a larger than 1.5 second transmission delay. On the other hand, currents and tides might cause frequent changes in UAN topologies, which can lead to a non-trivial overhead to maintain the neighbor information. For the same reasons, cluster based methods are impractical for UANs since they also heavily depend on the topology information to select rebroadcasting nodes. B. Broadcast in UANs The limitations with conventional TWSN broadcast schemes motivate researchers to explore new methodologies in UANs. To counter the high error probability of acoustic channels, coding is commonly employed. Network coding has been applied to UAN like networks featuring time division duplex

2 2 channels [17]. Besides, fountain coding is a popular candidate due to its rate-less nature and low decoding complexity [18]. Hyrbid ARQ, which combines FEC coding and Automatic Repeat-reQuest (ARQ) has also been employed to guarantee reliability. Despite the benefits brought by coding and Hybrid ARQ, there are still some issues. First, the above schemes are generally hop by hop advancement approaches. The data dissemination will not advance to the next hop until all the nodes in the current hop have successfully recovered all the data packets. This mechanism may cause inefficiency in a heterogeneous network, where within a single hop, the link qualities between multiple receivers and the sender may vary dramatically, especially when there exists a bottle neck link. The bottle neck link might cause of a lot of retransmissions even though the majority of the nodes in that very hop have already completed data recovery. Second, the above schemes overlooked the overhearing opportunities in the network. UANs are by nature broadcast networks, where neighbors can overhear packets being transmitted. In a multi-hop UAN, a node can have up two three rounds of overhearing opportunities: the first one comes from the senders in its prior hop; the second one originates from its neighbors in the same hop and the last one stems from the nodes in its next hop. These overhearing opportunities provide a great data recovery chance when combined with network coding [19]. C. The Proposed Solution To overcome the problem with hop by hop advancement and take full advantage of overhearing opportunities, we propose a Fast Spreading scheme as the first phase for reliable broadcast in UANs. In this phase, we prioritize efficiency over reliability. A sender sends out encoded packets based on GF(256) network coding [2]. A receiver tries to decode the original data packets. However, different from hop by hop advancement approaches, a receiver does not send back ACK or NACK whether or not it succeeds in recovering all the data packets. Instead, the receiver rebroadcasts with a probability proportional to the number of linearly independent encoded packets it has accumulated so far. The packets transmitted not only reach its next hop neighbors but also contribute to the data decoding at its neighbors in the same and prior hop. In essence, the Fast Spreading phase tries to spread packets throughout the network as fast and many as possible. Benefiting from overhearing and network coding, nodes are expected to have a large chance for complete data recovery. Two key questions to answer in the Fast Spreading phase are how to avoid the broadcast storm problem and how to reduce the chance of collisions. To alleviate the broadcast storm, we employ a probability based method to decide whether a node will rebroadcast. To reduce the collision probability, we propose a scheduling algorithm which decides when and how many packets to rebroadcast. Only the Fast Spreading phase itself is insufficient to guarantee reliability because some nodes may fail to recover all the original data packets in the first phase. Therefore, we propose Data Recovery as the second phase. It is essentially a Hybrid ARQ procedure. A node failing to decode all the original data packets sends out a request and its neighbors will coordinate to respond. The sending of request is delayed to ensure that the Data Recovery phase at a node does not interfere with the Fast Spreading phase at other nodes. The Data Recovery phase at a node proceeds in parallel with the Fast Spreading phase only at nodes three hops away or further. Therefore, our proposed Two-phase Broadcast Scheme () consists of the Fast Spreading phase, focusing on efficiency and the Data Recovery phase, focusing on reliability. does not rely on topology or neighbor information and therefore is adaptive to dynamic topologies in UANs. Topology change due to node movements or failures does not affect the effectiveness of. The rest of this paper is organized as follows. The system model is given in Section II and network coding is introduced in Section III. Section IV describes the design of, including the Fast Spreading phase and the Data Recovery phase. The performance of is analyzed and evaluated in Section V. Finally conclusions and future works are given in Section VI. II. SYSTEM MODEL In this section, we present the model of the network, channel and UAN node. targets a multi-hop broadcast UAN, as shown in Fig. 1. There exists a source node trying to send a block of data packets to every node in the network. A typical application scenario is that a network-wide Operating System update/patch is required. A base station (the source node) is initially updated/patched manually by an operator. Afterwards, the base station divides the update/patch data into multiple packets and broadcasts into the network. The goal is that every node can receive all the data packets reliably and efficiently. Since requires no topology or neighbor information, the targeted UAN can be either a static one or a dynamic one with varying topology due to node movements, currents and tides. Acoustic is commonly employed as the medium for signal transmission in UANs. Channel quality is usually measured by Packet Error Rate (PER). The authors in [21] describe a channel model and gives the BPSK PER with additive white Gaussian noise. In addition to considering packet loss, we also highlight the heterogeneous channel quality, which means that the PERs of the links between a single sender and multiple receivers may vary dramatically. This fact has been supported by [22], which points out that in real world field tests, even adjacent nodes within a small area can suffer from significantly different PERs. Heterogeneous channel quality degrades the efficiency of hop by hop advancement based broadcast schemes because the receiver with the worst link quality within a hop decides the broadcast completion time of that hop. A UAN node is equipped with an underwater acoustic modem to send and receive data packets. Acoustic modems are half duplex and can only be in the sending or receiving status at one time. They are associated with several types of delays: Transmission delay: D tx = L pre + L 8/R (1)

3 3 B1 C1 A1 B2 S A2 B3 A3 B4 C2 C3 C4 Water surface B5 C5 Fig. 1. Network model for Here L is the packet length and R is the modem transmission rate. L pre is the preamble length of acoustic modems, which stems from synchronization, signal detection, automatic gain control (AGC) control and channel estimation. Decoding delay refers to the delay associated with data reception and demodulation. According to [23], it takes 17 ms to receive and demodulate a packet of 8 bytes. Therefore, for a block of N data packets with length equal to L, the decoding delay is: Propagation delay: D de = N L.17/8; (2) D pr = D/V (3) where D is the distance between two nodes and V is the sound speed. III. NETWORK CODING A broadcast UAN provides a node with up to three rounds of packet receiving opportunities. For instance, in Fig. 1, Node B3 can receive the first round of packets from its prior hop neighbors including Node A2 and A3. It is also able to receive packets when the neighbors at the same hop such as Node B2 and B4 perform rebroadcasting. Besides, overhearing of packets is possible when its next hop neighbors like Node C2 and C3 rebroadcast to further nodes. With network coding, Node B3 can accumulate encoded packets from all the data receptions. Once there are K linearly independent encoded packets, Node B3 can recover all the K original data packets. employs random linear network coding on Galois Field (2 8 ), namely GF(256). With a GF(256) network coding, the probability that K encoded packets fail to recover K data packets is negligible [2]. IV. PROTOCOL DESIGN is a two-phase broadcast protocol composed of the Fast Spreading phase and the Data Recovery phase. The key goal of the first phase is to spread the data packets throughout the network as efficiently as possible. The nodes take full advantage of overhearing opportunities to accumulate encoded packets. Once sufficient encoded packets are accumulated, the nodes are able to recover all the original data packets with the help of network coding. The Fast Spreading phase cannot achieve 1% reliability. In case a node fails to recover all the original data packets, it will step into the Data Recovery phase. Request will be sent and correspondingly neighbors will coordinate to send responses. A key idea in this phase is that a node delays sending out request until it estimates that all the nodes within the range of three hops have completed the Fast Spreading phase. With this scheme, the Data Recovery at a node does not interfere with ongoing data traffic in other areas of the network. A. The Fast Spreading Phase There are three types of nodes in the Fast Spreading phase: the source node, receivers and forwarders. The source node is the single node initially with a block of data packets to broadcast. Except the source node, every node in the network is a receiver since it has to completely recover the block of data packets. A receiver also acts as a forwarder if it is selected to rebroadcast. The source node simply encodes the original block of K data packets into K encoded packets via GF(256) random linear network coding and broadcasts them. For a receiver, each time it receives a new encoded packet, it tries to decode by checking whether it has obtained K linearly independent encoded packets. If a receiver is selected to be a forwarder, it rebroadcasts encoded packets. essentially tries to answer three questions in the Fast Spreading phase: whether to rebroadcast (whether a receiver should be selected as a forwarder), and if yes, when and how many packets to rebroadcast. The first one aims to alleviate the broadcast storm problem by limiting the size of the forwarder set. The latter two target at reducing collisions. Whether to rebroadcast: Since it is assumed that no topology or neighbor information of the network is available, adopts a probability based forwarder selection scheme. The probability that a node rebroadcasts after receiving a group of encoded packets is: P R = K P i P r K.e P i (4) where K is the block size; K is the number of linearly independent encoded packets the node has accumulated so far; P i is the initial power level of the node; P r is the remaining power level of the node. The rebroadcast probability is proportional to the number of linearly independent encoded packets accumulated so far. As described in Section II, a node can only be in the sending or receiving status at one time due to the half duplex underwater acoustic modems. If a node chooses to rebroadcast, it will give up the opportunity to receive packets from its neighboring forwarders at the same hop. By contrast, if the node chooses to keep silent, it might accumulate more encoded packets if some of its same hop neighbors end up being forwarders. Intuitively, if a node has already got a decent amount of linearly independent encoded packets, it should serve as a forwarder and contribute to packet accumulation at its neighbors. Although it gives up the overhearing opportunity at this round, it is still possible to recover the complete data set with the next overhearing opportunity from its next hop neighbors. On the contrary, if a node has only accumulated a small number of encoded packets, it should stay in the receiving state and accumulate more encoded packets. The second factor affecting the rebroadcast probability is the remaining power level of a node. For underwater acoustic

4 4 modems, sending a packet always consumes much more power than receiving one [23]. Therefore, we take into account the remaining power level of a node to meet the energy constraint challenge of UANs. When and how many to rebroadcast: After a node is selected as a forwarder, we have to carefully schedule when and how many packets it rebroadcasts. Otherwise, if all the forwarders at the same hop rebroadcast simultaneously, it will cause collisions at the receivers. The collision at a receiver originates from the long decoding delay of acoustic modems. For instance, in Fig. 1, let us suppose Node A2 and A3 are both rebroadcasting. When the packets from Node A2 reach Node B3, it will take the acoustic modem a period of time to decode, as can be estimated by Equation 2. During this decoding period, packets arriving at Node B3 from Node A3 will be discarded. To avoid the above situation, we propose a scheduling algorithm in terms of how many packets and when to rebroadcast. Every forwarder rebroadcasts exactly K encoded packets, which is equal to the block size. If a forwarder has already recovered the K original data packets, it will rebroadcast K linearly independent encoded packets. If a forwarder has only got K (K < K) independent encoded packets, it will reencode the K packets to generate another K K packets and rebroadcast in total K encoded packets as well. The uniform number of encoded packets to rebroadcast makes it easier to schedule rebroadcast timings among forwarders in order to avoid collisions. A forwarder has to perform a proactive back-off before rebroadcasting and the back-off time is: T BF = D de P e M (5) where D de is the decoding delay of K encoded packets as calculated in Equation 2; P e is uniformly distributed in [,1]; M is the maximum back-off number. M is a system parameter of that is usually decided by the node density or number of neighboring nodes. How to determine the optimal M without knowing the above prior information is a future work for. This scheduling algorithm cannot guarantee zero collision but can reduce the collision chance. As an example, in Fig. 1, we assume that Node A1, A2 and A3 are selected to be forwarders and rebroadcast to Node B3. In the ideal case, Node A1, A2 and A3 respectively backs-off for, 1 and 2 D de. The three forwarders all transmit K packets and therefore yield the same transmission delay D tx. Here we ignore the propagation delay difference between the three forwarders to Node B3 and assume a uniform propagation delay D pr. The reason is that the transmission delay is usually much more dominant than the propagation delay, which has been proved by real world sea experiment [22]. Therefore, after a time period of D tx + D pr, the three blocks of K encoded packets from these three forwarders will arrive at Node B3 in sequence with D de as the interval between every two consecutive blocks and therefore no collision is incurred. This conclusion stands even when packet loss occurs on some links. If we do have to consider the propagation delay difference, we can add a guard time to Equation 5 to ensure the correctness of this scheduling algorithm. A request response DATA C B A R n-2 n-1 n n+1 n+2 Fig. 2. Data Recovery phase of B. The Data Recovery Phase If a node fails to recover all the K original data packets in the Fast Spreading phase, it will get into the Data Recovery phase. The Data Recovery phase is essentially a Hybrid ARQ procedure. The node broadcasts a request for more encoded packets. Upon receiving the request, a neighbor performs a proactive back-off as what a forwarder does in the Fast Spreading phase and then broadcasts K encoded packets. If a neighbor overhears a broadcast before its back-off timer expires, it will cancel its scheduled broadcast. This procedure continues until the node has recovered the K original data packets. One critical goal of this phase is to guarantee that the Data Recovery phase at a node does not interfere with the Fast Spreading phase at other nodes. Fig. 2 illustrates this idea. Suppose Node A at hop n-2 is in the Data Recovery phase and Node A at hop n-1 is sending response to A (The distance of a hop is equal to the transmission range of acoustic modems); in the meanwhile, Node C at hop n+1 is in the Fast Spreading phase and rebroadcasting encoded packets. In this case, the packets sent from A and C will probably collide at Node R at hop n. Therefore, if we allow the Data Recovery phase at Node A (hop n-2) and the Fast Spreading phase at a node at a hop equal to or lower than n+1 to proceed simultaneously, collision will happen. Therefore, to avoid the interference between the two phases, we let a node delay sending out the request until it estimates that all the nodes within the range of three hops have completed their Fast Spreading phase. After a node receives its first packet, its estimated delay before sending out the request is: T BD = 4 (D tx + D pr + M D de ) (6) However, we notice that due to the probability based rebroadcast, there exists a chance that a node receives no packet in the Fast Spreading phase and therefore does not have a time point to start the delay timer. Inspired by the dual band broadcast scheme proposed in [24], a possible solution is to employ a second high power and long distance signal as the broadcast initialization notification. Upon receiving this signal, a node is aware of the starting of a broadcast and can thus set up its delay timer. Another benefit of this scheme is that with this notification, a node knows when its Fast Spreading phase begins and therefore can estimate when its Fast Spreading phase ends since the Fast Spreading phase contains at most three rounds of overhearing.

5 5 V. SIMULATION RESULTS In this section, we evaluate the performance of via simulations. We will investigate the behavior of. We will also compare with another two baseline broadcast protocols. We have implemented an FEC coding based Hopby-hop () broadcast scheme. employs a Hybrid ARQ scheme to guarantee reliability within one hop. After all the nodes in the current hop have completely recovered all the K original data packets, the broadcast will advance to nodes in the next hop. We have also implemented a pure probability based broadcast scheme. To alleviate the broadcast storm problem, every node does a coin toss to decide whether it will rebroadcast. A. Simulation Settings We simulate two UANs both with 73 network nodes: one with a uniform topology and one with a random topology, as shown in Fig. 3 and Fig. 4 (The red node is the source node). Unless otherwise specified, the network settings are as follows: the block size is 5, namely the source node has 5 packets to broadcast; each packet is 8 bytes long; the decoding delay for a packet is 17 ms; the average distance between two nodes is 15 m; the average PER is.3. some node may only have a single neighbor. The latter one can receive only a limited number of or no encoded packets in the Fast Spreading phase and usually ends up being in the Data Recovery phase. However, we have to note that a larger number of nodes into the Data Recovery phase does not necessarily mean a larger network-wide broadcast completion time. The reason is that in, the Data Recovery phase at some nodes can parallel with the Fast Spreading phase at other nodes three hops away or further. We also investigate the impact of block size. As shown in Fig. 6, block size has no impact on the number of nodes getting into the Data Recovery phase. Number of Nodes Getting into the Data Recovery Phase Uniform Toplogy Random Topology Packet Error Rate Fig. 5. Number of nodes into the 2nd phase with varying PER Number of Nodes Getting into the Data Recovery Phase Uniform Topology Random Topology Fig. 6. Number of nodes into the 2nd phase with varying block size Fig. 3. Uniform topology Fig. 4. Random topology B. Behavior In this section, we focus on analyzing the efficiency of combining opportunistic overhearing and network coding, which can be measured by the number of nodes forced into the Data Recovery phase. First, we investigate the impact of PER. As shown in Fig. 5, the number of nodes out of the 72 receivers getting into the second phase of grows larger with an increasing PER in both the uniform and random topology. When PER is small, only a small number of nodes get into the second phase, which means that most of the nodes can recover all the data packets in the Fast Spreading phase. However, with a larger PER, due to the high packet loss rate, a node usually cannot accumulate enough encoded packets from the Fast Spreading phase. Also we note that the number of nodes getting into the Data Recovery phase is smaller in the uniform topology than in the random topology. The reason is that nodes in the uniform topology usually have multiple neighbors and the numbers of their neighbors are close to each other. This means that every node can get good overhearing opportunities from its neighbors and enlarges the chance of complete data recovery in the Fast Spreading phase. By contrast, in a random topology, some nodes have a decent amount of neighbors while C. Network-wide Broadcast Completion Time In this section, we investigate the network-wide broadcast completion time with the three protocols. Network-wide broadcast completion time is equal to the delay between when the source node broadcasts a block of encoded packets and when all the nodes in the network have completely recovered the data block. Fig. 7 and 8 show the broadcast completion time of the three protocols in the uniform topology respectively with a low PER (.3) and a high PER (.6). achieves the smallest broadcast completion time. On the one hand, the combination of opportunistic overhearing and network coding in the Fast Spreading phase improves the broadcast efficiency. On the other hand, the parallelization of the Fast Spreading and the Data Recovery further decreases the network-wide broadcast completion time. FEC coding based hop-by-hop advancement yields a larger completion time due to the under-utilization of overhearing opportunities. Pure probability based method leads to the largest broadcast completion time due to the inefficiency of the predetermined rebroadcast probability. The simulation results with the random topology in Fig. 9 and 1 follow the same trend and also demonstrate the advantages of. All the three protocols achieve 1% reliability. D. Energy Efficiency The energy efficiency is measured by the total number of rebroadcasts conducted to complete the network-wide broadcast. A larger number leads to a lower energy efficiency. Fig. 11 shows the energy consumption of the three protocols with different PERs in the uniform topology. achieves the best energy efficiency (lowest energy consumption). On the one hand, the probability based forwarder selection scheme in the Fast Spreading phase lowers the number of rebroadcasts.

6 6 Network wise Broadcast Completion Delay (Seconds) Fig. 7. Completion time with low PER and uniform topology Network wise Broadcast Completion Delay (secs) Fig. 9. Completion time with low PER and random topology Network wise Broadcast Completion Delay (Seconds) Fig. 8. Completion time with high PER and uniform topology Network wise Broadcast Completion Delay (Seconds) x 14 Fig. 1. Completion time with high PER and random topology On the other hand, the delayed request sending in the Data Recovery phase reduces collisions and contributes to a better energy efficiency. VI. CONCLUSIONS AND FUTURE WORKS In this paper, in order to address the reliable broadcast problem in UANs, we propose a Two-phase Broadcast Scheme (), which does not depend on topology or neighbor information. The Fast Spreading phase combines opportunistic overhearing and network coding to improve the broadcast efficiency. addresses whether to rebroadcast, how many to rebroadcast and when to rebroadcast in order to alleviate the broadcast storm and reduce collisions. The Data Recovery phase aims at ensuring 1% reliability. By deliberately delaying sending request, the Data Recovery phase at a node will not interfere with the Fast Spreading phase at other nodes. In terms of future works, first we would like to design a more effective scheduling algorithm in the Fast Spreading phase. Currently, cannot decide the optimal maximum back-off time for a forwarder. Also we hope to more intensively and accurately evaluate the performance of, especially via lab tests and field tests and therefore we can have a better knowledge about how performs in real world. REFERENCES [1] E. M. Sozer, M. Stojanovic, and J. G. Proakis, Underwater acoustic networks, in IEEE JOURNAL OF OCEANIC ENGINEERING, 2, pp [2] I. F. Akyildiz, D. Pompili, and T. Melodia, Underwater acoustic sensor networks: Research challenges, in Ad Hoc Networks, no. 3, 25, pp [3] X. Xu, Z. Wang, S. Zhou, and L. Wan, Parameterizing both path amplitude and delay variations of underwater acoustic channels for block decoding of orthogonal frequency division multiplexing, in The Journal of the Acoustical Society of America, vol. 131, no. 6, 212, pp Energy Consumption Packet Error Rate Fig. 11. Energy consumption with varying PER [4] H. Mo, Z. Zhou, M. Zuba, Z. Peng, J.-H. Cui, and Y. Shu, Practical coding-based multi-hop reliable data transfer for underwater acoustic networks, in Proceedings of IEEE GLOBECOM, Dec 212. [5] H. Mo, A. C. Mingir, H. Alhumyani, Y. Albayram, and J.-H. Cui, Uwharq: An underwater hybrid arq scheme: Design, implementation and initial test, in Proceedings of IEEE/MTS OCEANS, Hampton Roads, VA, USA, Sep 212. [6] Benthos acoustic modem, in [7] B. Williams and T. Camp, Comparison of broadcasting techniques for mobile ad hoc networks, in Proceedings of ACM MobiHoc, Jun 22. [8] Y.-C. Tseng, S.-Y. Ni, and Y. shyan Chen, The broadcast storm problem in a mobile Ad Hoc network, in Proceedings of ACM MobiCom, Aug [9] P. Kyasanur and R. R. Choudhury, Smart gossip: An adaptive gossipbased broadcasting service for sensor networks, in Proceedings of IEEE MASS, Oct 26. [1] J. Cartigny, F. Ingelrest, D. Simplot-Ryl, and I. Stojmenovic, Localized LMST and RNG based minimum-energy broadcast protocols in ad hoc networks, in Proceedings of IEEE INFOCOM, Apr 23. [11] J. Lipman, P. Boustead, and J. Judge, Neighbor aware adaptive power flooding (naap) In mobile ad hoc networks, in International Journal of Foundations of Computer Science, 23. [12] J. Lipman, H. Liu, and I. Stojmenovic, Broadcast in Ad Hoc Networks. Springer, 29. [13] D. C. Yoav Sasson and A. Schiper, Probabilistic broadcast for flooding in wireless mobile ad hoc networks, in Proceedings of IEEE WCNC, Mar 23. [14] H. Lim and C. Kim, Multicast tree construction and flooding in wireless ad hoc networks, in Proceedings of ACM MSWIM, Aug 2. [15] Q. A, Multipoint relaying: An efficient technique for flooding in mobile wireless networks, in proceedings of the 35th Annual Hawaii International Conference on System Sciences, Jan 22. [16] L. Pu, Y. Luo, H. Mo, J.-H. Cui, and Z. Jiang, Comparing underwater mac protocols in real sea experiment, in Proceedings of IFIP NET- WORKING, Brooklyn, NY, US. [17] D. E. Lucani, M. Medard, and M. Stojanovic, Broadcasting in timedivision duplexing A random linear network coding approach, in Proceedings of Workshop on Network Coding, Theory, and Applications, Jun 29. [18] Z. Zhou, H. Mo, Y. Zhu, Z. Peng, J. Huang, and J.-H. Cui, Fountain code based adaptive multi-hop reliable data transfer for underwater acoustic networks, in Proceedings of IEEE ICC, Workshop on Radar and Sonar Networks, Jun [19] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, XORs in the air: Practical wireless network coding, in Proceedings of ACM SIGCOMM, Oct 26. [2] H. Mo, Z. Peng, Z. Zhou, M. Zuba, Z. Jiang, and J.-H. Cui, Coding based multi-hop coordinated reliable data transfer for underwater acoustic networks: Design, implementation and tests, in Proceedings of IEEE GLOBECOM, Dec 213. [21] P. Casari and M. Rossi and M. Zorzi, Towards optimal broadcasting policies for HARQ based on Fountain codes in underwater networks, in Proceedings of IEEE/IFIP WONS, Garmisch-Partenkirchen, Germany, Jan 28. [22] L. Pu, Y. Luo, H. Mo, Z. Peng, J.-H. Cui, and Z. Jiang, Comparing uderwater MAC protocol in real world, in Proceedings of IFIP NET- WORKING, Brooklyn, NY, USA, Apr 213. [23] H. Yan, S. Zhou, Z. Shi, J.-H. Cui, L. Wan, J. Huang, and H. Zhou, DSP implementation of SISO and MIMO OFDM acoustic modems, in Proceedings of IEEE/MTS OCEANS, Seattle, WA, USA, Sep 21. [24] P. Casari and A. Harris, Energy-efficient reliable broadcast in underwater acoustic networks, in Proceedings of ACM WUWNET, Sep 27.

Coding based Multi-hop Coordinated Reliable Data Transfer for Underwater Acoustic Networks: Design, Implementation and Tests

Coding based Multi-hop Coordinated Reliable Data Transfer for Underwater Acoustic Networks: Design, Implementation and Tests Coding based Multi-hop Coordinated Reliable Data Transfer for Underwater Acoustic Networks: Design, Implementation and Tests Haining Mo, Zheng Peng, Zhong Zhou, Michael Zuba, Zaihan Jiang 2, and Jun-Hong

More information

UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test

UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test UW-HARQ: An Underwater Hybrid ARQ Scheme: Design, Implementation and Initial Test Haining Mo, Ahmet Can Mingir, Hesham Alhumyani, Yusuf Albayram, and Jun-Hong Cui Computer Science & Engineering Department,

More information

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks

A Review on Efficient Opportunistic Forwarding Techniques used to Handle Communication Voids in Underwater Wireless Sensor Networks Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 1059-1066 Research India Publications http://www.ripublication.com A Review on Efficient Opportunistic Forwarding

More information

Reliable Communication using Packet Coding for Underwater Acoustic Channels

Reliable Communication using Packet Coding for Underwater Acoustic Channels Reliable Communication using Packet Coding for Underwater Acoustic Channels Rameez Ahmed and Milica Stojanovic Northeastern University, Boston, MA 02115, USA Email: rarameez@ece.neu.edu, millitsa@ece.neu.edu

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network

Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network Energy Efficient Broadcasting Using Network Coding Aware Protocol in Wireless Ad hoc Network 1 Shuai Wang 2 Athanasios Vasilakos 1 Hongbo Jiang 1 Xiaoqiang Ma 1 Wenyu Liu 1 Kai Peng 1 Bo Liu 1 Yan Dong

More information

Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networks

Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networks Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networs Zhong Zhou 1, Haining Mo 1, Yibo Zhu 1, Zheng Peng 1, Jie Huang 2 and Jun-Hong Cui 1 {zhongzhou, haining.mo,

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut, Storrs,

More information

Glasgow eprints Service

Glasgow eprints Service Yassein, M. B. and Ould-Khaoua, M. and Papanastasiou, S. (25) On the performance of probabilistic flooding in mobile ad hoc networks. In, th International Conference on Parallel and Distributed Systems,

More information

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks

Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191

More information

Collision Free and Energy Efficient MAC protocol for Wireless Networks

Collision Free and Energy Efficient MAC protocol for Wireless Networks 110 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.9, September 2007 Collision Free and Energy Efficient MAC protocol for Wireless Networks Muhammad Ali Malik, Dongha Shin

More information

XORs in the Air: Practical Wireless Network Coding

XORs in the Air: Practical Wireless Network Coding XORs in the Air: Practical Wireless Network Coding S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, J. Crowcroft MIT & University of Cambridge Can we use 3 transmissions to send traffic? 1 2 4 3 Can we

More information

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail

More information

Network Coding in Underwater Sensor Networks

Network Coding in Underwater Sensor Networks in Underwater Sensor Networks Claude Manville, Abdulaziz Miyajan, Ayman Alharbi, Haining Mo, Michael Zuba and Jun-Hong Cui Computer Science & Engineering Department, University of Connecticut, Storrs,

More information

A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks

A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks Mingsheng Gao Computing Laboratory National University of Singapore mingsh.gao@gmail.com Hui Jiang Department of Computer Science

More information

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Prasad Anjangi and Mandar Chitre Department of Electrical & Computer Engineering,

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networks

Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networks Fountain Code based Adaptive Multi-hop Reliable Data Transfer for Underwater Acoustic Networks Zhong Zhou 1, Haining Mo 1, Yibo Zhu 1, Zheng Peng 1, Jie Huang 2, Jun-Hong Cui 1 {zhongzhou, haining.mo,

More information

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.

More information

ADAPTIVE RTT-DRIVEN TRANSPORT-LAYER FLOW AND ERROR CONTROL. PROTOCOL FOR QoS GUARANTEED IMAGE TRANSMISSION OVER MULTI-

ADAPTIVE RTT-DRIVEN TRANSPORT-LAYER FLOW AND ERROR CONTROL. PROTOCOL FOR QoS GUARANTEED IMAGE TRANSMISSION OVER MULTI- ADAPTIVE RTT-DRIVEN TRANSPORT-LAYER FLOW AND ERROR CONTROL PROTOCOL FOR QoS GUARANTEED IMAGE TRANSMISSION OVER MULTI- HOP UNDERWATER WIRELESS NETWORKS: DESIGN, IMPLEMENTATION, AND ANALYSIS A Thesis by

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks Abdul Gaffar. H 1, a and P.Venkata Krishna 2,b 1 School of Computer Science and Engineering, VIT University, Vellore,

More information

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem

A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for Mitigating the Directional Hidden Node Problem 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC) A Directional MAC Protocol with the DATA-frame Fragmentation and Short Busy Advertisement Signal for

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Efficient Error Recovery Using Network Coding in Underwater Sensor Networks

Efficient Error Recovery Using Network Coding in Underwater Sensor Networks Efficient Error Recovery Using Network Coding in Underwater Sensor Networks Zheng Guo, Bing Wang, and Jun-Hong Cui Computer Science & Engineering Department, University of Connecticut, Storrs, CT, 06269

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks

A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks A Reliable Broadcast Algorithm with Selected Acknowledgements in Mobile Ad Hoc Networks Wei Lou and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network

Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network IEEE ICC 2016 - Wireless Communications Symposium Network Coding Efficiency In The Presence Of An Intermittent Backhaul Network Stefan Achleitner, Thomas La Porta Computer Science and Engineering The Pennsylvania

More information

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS

Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Modified Ultra Smart Counter Based Broadcast Using Neighborhood Information in MANETS Ms. Nutan Julka 1, Prof. Dr. J.W Bakal 2 1 Dept. of Computer Science, Pillais Institute of Information Technology,

More information

Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks

Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks Kazuya Sakai Department of CSSE Auburn University Auburn, AL 36849, USA Min-Te Sun Department of CSIE National Central University Jhongli

More information

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Khaldoun Al Agha LRI, Paris XI University, Orsay, France Email: alagha@lri.fr

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks Jinfang Zhang, Zbigniew Dziong, Francois Gagnon and Michel Kadoch Department of Electrical Engineering, Ecole de Technologie Superieure

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

MAC Protocol for Reducing Control Packet Overhead in Underwater Acoustic Networks

MAC Protocol for Reducing Control Packet Overhead in Underwater Acoustic Networks International Journal of pplied ngineering esearch I 0973-4562 Volume 12, umber 15 (2017) pp. 4886-4892 esearch India Publications. http://www.ripublication.com MC Protocol for educing Control Packet Overhead

More information

Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability

Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability Sivakumar.P, Sivaranjani.R, Srilakshmi.G, Subashini.R Abstract: Mobile ad hoc networks (MANET) have been proposed

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

Experiment report. Figure 1: Deployment location

Experiment report. Figure 1: Deployment location Experiment report 1. Experiment time: July 30th, 2015 2. Experiment location: receiving Node (MID3) was placed at Pocock rowing center and two source nodes (MID1, MID2) were setup in APL location. Figure

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm Journal of Computer Science 7 (1): 46-51, 2011 ISSN 1549-3636 2011 Science Publications Reliable and Efficient Broadcasting in Asymmetric Mobile Ad Hoc Networks Using Minimized Forward Node List Algorithm

More information

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks

Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Minimizing Energy Consumption for Cooperative Network and Diversity Coded Sensor Networks Gabriel E. Arrobo and Richard D. Gitlin Department of Electrical Engineering University of South Florida Tampa,

More information

Cross-layer Energy Minimization for Underwater ALOHA Networks

Cross-layer Energy Minimization for Underwater ALOHA Networks Cross-layer Energy Minimization for Underwater ALOHA Networks Mehmet Koseoglu, Ezhan Karasan, Member, IEEE, Lin Chen, Member, IEEE Abstract Underwater networks suffer from energy efficiency challenges

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

ISSN: [Powar * et al., 7(6): June, 2018] Impact Factor: 5.164

ISSN: [Powar * et al., 7(6): June, 2018] Impact Factor: 5.164 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY ROUTING TECHNIQUES FOR ENERGY EFFICIENT PROTOCOL OF UNDERWATER WIRELESS SENSOR NETWORK (UWSN) IN THE INTERNET OF UNDERWATER THINGS

More information

Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks

Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks Peng Xie, Zhong Zhou, Zheng Peng, Jun-Hong Cui, and Zhijie Shi Computer Science & Engineering Department, University of Connecticut,

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

Transmit and Receive Power Optimization for Source-Initiated Broadcast in Wireless-Relay Sensor Networks

Transmit and Receive Power Optimization for Source-Initiated Broadcast in Wireless-Relay Sensor Networks Transmit and Receive Power Optimization for Source-Initiated Broadcast in Wireless-Relay Sensor Networks Chen-Yi Chang and Da-shan Shiu Abstract Minimization of power consumption is a critical design goal

More information

Sabareesan M, Srinivasan S*,John Deva Prasanna D S

Sabareesan M, Srinivasan S*,John Deva Prasanna D S Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks Sabareesan M, Srinivasan S*,John Deva Prasanna D S Department of Computer Science and Technology, Hindustan University, Chennai,

More information

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks

H-MMAC: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks H-: A Hybrid Multi-channel MAC Protocol for Wireless Ad hoc Networks Duc Ngoc Minh Dang Department of Computer Engineering Kyung Hee University, Korea Email: dnmduc@khu.ac.kr Choong Seon Hong Department

More information

Proposal of interference reduction routing for ad-hoc networks

Proposal of interference reduction routing for ad-hoc networks Proposal of interference reduction routing for ad-hoc networks Katsuhiro Naito, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic Engineering, Mie University, 577 Kurimamachiya, Tsu,

More information

Design and Simulation of an Underwater Acoustic Local Area Network

Design and Simulation of an Underwater Acoustic Local Area Network Design and Simulation of an Underwater Acoustic Local Area Network Ethem M. Sozer, Milica Stojanovic, and John G. Proakis Northeastern University, Communications and Digital Signal Processing Center 409

More information

A Survey on Underwater Sensor Network Architecture and Protocols

A Survey on Underwater Sensor Network Architecture and Protocols A Survey on Underwater Sensor Network Architecture and Protocols Rakesh V S 4 th SEM M.Tech, Department of Computer Science MVJ College of Engineering Bangalore, India raki.rakesh102@gmail.com Srimathi

More information

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks

BEAM: Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE Wireless Ad Hoc Networks : Broadcast Engagement ACK Mechanism to Support Reliable Broadcast Transmission in IEEE 2.11 Wireless Ad Hoc Networks Jenhui Chen and Muwen Huang Department of Computer Science and Information Engineering,

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

Toward Practical MAC Design for Underwater Acoustic Networks

Toward Practical MAC Design for Underwater Acoustic Networks Toward Practical MAC Design for Underwater Acoustic Networks Yibo Zhu, Zaihan Jiang, Zheng Peng, Michael Zuba, Jun-Hong Cui and Huifang Chen Department of Computer Science and Engineering, University of

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

MAC Protocol Implementation on Atmel AVR for Underwater Communication

MAC Protocol Implementation on Atmel AVR for Underwater Communication MAC Protocol Implementation on Atmel AVR for Underwater Communication - Final Report- Shaolin Peng speng2@ncsu.edu Introduction Underwater acoustic communication is widely used in many areas to collect

More information

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas

Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Efficient Broadcasting in Ad Hoc Wireless Networks Using Directional Antennas Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL 3343 Abstract

More information

Management Science Letters

Management Science Letters Management Science Letters 4 (2014) 2509 2516 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Delay-based network coding packet selection Rasoul

More information

A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance

A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance In Proceedings of 17th International IEEE Conference on Computer Communications and Networks, August 28, pp. 1-6 A Power-Preserving Broadcast Protocol for WSNs With DoS Resistance Chien-Chun Ni, Tien-Ruey

More information

Safety and Infotainment Communications for Vehicles Opportunities and Challenges

Safety and Infotainment Communications for Vehicles Opportunities and Challenges Safety and Infotainment Communications for Vehicles Opportunities and Challenges Mahbub Hassan School of Computer Science and Engineering University of New South Wales, Sydney, Australia NSERC DIVA Distinguished

More information

PERFORMANCE ANALYSIS OF VBF PROTOCOL IN UNDERWATER COMMUNICATION FOR ANCHORING NODES AND MOVING NODES

PERFORMANCE ANALYSIS OF VBF PROTOCOL IN UNDERWATER COMMUNICATION FOR ANCHORING NODES AND MOVING NODES PERFORMANCE ANALYSIS OF VBF PROTOCOL IN UNDERWATER COMMUNICATION FOR ANCHORING NODES AND MOVING NODES P. Vijayalakshmi and V. Rajendran Department of Electronics and Communication Engineering, VELS University,

More information

Joint Routing and Energy Management in Underwater Acoustic Sensor Networks

Joint Routing and Energy Management in Underwater Acoustic Sensor Networks Joint Routing and Energy Management in Underwater Acoustic Sensor Networks Anjalam.S 1 anjulam@gmail.com Arulmani.P 2 arulmanip@gmail.cm Manisha,M 3 manisha23manimaran@g mail.com Manjula.M 4 manjulam@gmail.com

More information

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks AD: An Efficient Multihop roadcast Protocol ased on Asynchronous Duty-Cycling in Wireless Sensor Networks Yanjun Sun* Omer Gurewitz Shu Du Lei Tang* David. Johnson* *Rice University en Gurion University

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Fast distribution of Data in Wireless Sensor Network using Concurrency Operation

Fast distribution of Data in Wireless Sensor Network using Concurrency Operation Fast distribution of Data in Wireless Sensor Network using Concurrency Operation Geetha N, Janani V Abstract Wireless Sensor Network can be applied in verity of applications in real time. Efficient data

More information

Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless Multipath Environments

Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless Multipath Environments Tamkang Journal of Science and Engineering, Vol. 13, No. 1, pp. 1 9 (2010) 1 Bandwidth Aggregation with Path Interleaving Forward Error Correction Mechanism for Delay-Sensitive Video Streaming in Wireless

More information

II. NETWORK MODEL The network consists of two types of nodes:

II. NETWORK MODEL The network consists of two types of nodes: Initialization and Routing Optimization for Ad Hoc Underwater Acoustic Networks Ethem M. Sözer, Milica Stojanovic & John G. Proakis Northeastern University, Communications and Digital Signal Processing

More information

Implementation and Evaluation of Multihop ARQ for Reliable Communications in Underwater Acoustic Networks

Implementation and Evaluation of Multihop ARQ for Reliable Communications in Underwater Acoustic Networks Implementation and Evaluation of Multihop ARQ for Reliable Communications in Underwater Acoustic Networks Alvin Valera Pius W.Q. Lee Hwee-Pink Tan Huiguang Liang Winston K.G. Seah Institute for Infocomm

More information

Broadcasting Techniques for Mobile Ad Hoc Networks

Broadcasting Techniques for Mobile Ad Hoc Networks Broadcasting Techniques for Mobile Ad Hoc Networks Broadcasting: It is the process in which one node sends a packet to all other nodes in the network. 1 Usefulness of broadcasting Broadcasting of net-wide

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission Masashi Sugano 1, Ryo Fukushima 2, Masayuki Murata 2, Takayoshi Hayashi 3, Takaaki Hatauchi 3 1 School of Comprehensive

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

An Energy-Balanced Cooperative MAC Protocol in MANETs

An Energy-Balanced Cooperative MAC Protocol in MANETs 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore An Energy-Balanced Cooperative MAC Protocol in MANETs

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

Improving Performance of TCP with Efficient MIMO-based MAC

Improving Performance of TCP with Efficient MIMO-based MAC Improving Performance of TCP with Efficient MIMO-based MAC Ankit Jindal and Anirudha Sahoo Department of Computer Science and Engineering Indian Institute of Technology, Bombay, Powai, Mumbai, India 400076.

More information

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks Radhu.R.Nair #1 T. K Parani *2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor,

More information

SAMPLING SENSOR-FIELDS USING A MOBILE OBJECT: A BAND-BASED APPROACH FOR DIRECTIONAL BROADCAST OF SENSOR-DATA

SAMPLING SENSOR-FIELDS USING A MOBILE OBJECT: A BAND-BASED APPROACH FOR DIRECTIONAL BROADCAST OF SENSOR-DATA SAMPLING SENSOR-FIELDS USING A MOBILE OBJECT: A BAND-BASED APPROACH FOR DIRECTIONAL BROADCAST OF SENSOR-DATA Juzheng Li and Sol M. Shatz Department of Computer Science, University of Illinois at Chicago

More information

PRESENTED BY SARAH KWAN NETWORK CODING

PRESENTED BY SARAH KWAN NETWORK CODING PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

Lecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday

Lecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday Lecture 10: Link layer multicast Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday Unicast and broadcast Usually, link layer is used to send data over a single hop between source and destination. This

More information

An Enhanced IEEE Retransmission Scheme

An Enhanced IEEE Retransmission Scheme An Enhanced IEEE 802.11 Retransmission Scheme Hao-Li Wang, Jinghao Miao, J. Morris Chang Dept. of Electrical and Computer Engineering Iowa State University haoli, jhmiao, morris@iastate.edu Abstract In

More information

Pessimistic Backoff for Mobile Ad hoc Networks

Pessimistic Backoff for Mobile Ad hoc Networks Pessimistic Backoff for Mobile Ad hoc Networks Saher S. Manaseer Department of computing science Glasgow University saher@dcs.gla.ac.uk Muneer Masadeh Department of Computer Science Jordan University of

More information