Design and Simulation of an Underwater Acoustic Local Area Network

Similar documents
II. NETWORK MODEL The network consists of two types of nodes:

Review on an Underwater Acoustic Networks

Reliable Communication using Packet Coding for Underwater Acoustic Channels

An Architecture for Underwater Networks

CHAPTER 5 PROPAGATION DELAY

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding

Experiment report. Figure 1: Deployment location

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

ENSC 427: COMMUNICATION NETWORKS

CSE 461: Wireless Networks

PERFORMANCE ANALYSIS OF VBF PROTOCOL IN UNDERWATER COMMUNICATION FOR ANCHORING NODES AND MOVING NODES

Introduction. Communication Systems Simulation - I. Monte Carlo method. Simulation methods

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

Implementation of an Adaptive MAC Protocol in WSN using Network Simulator-2

Chapter 12 Multiple Access 12.1

Impact of Frequencies on IEEE WPANs for Wireless Sensor Networks

A Survey on Underwater Sensor Network Architecture and Protocols

Interference avoidance in wireless multi-hop networks 1

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

Master. Slave. Master. Slaves. TCP/IP Traffic with Efficient Bluetooth Technology. Shafqat Hameed 1, Umar F.Khan 2, *Muhammad Saleem 3

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

TinyOS-based Gateway for Underwater Acoustics/Radio Frequency Communication

CS4700/CS5700 Fundamentals of Computer Networks

King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering

Local Area Networks NETW 901

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wireless MACs: MACAW/802.11

More wireless: Sensor networks and TCP on mobile hosts

Tutorial 2 : Networking

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

MAC Essentials for Wireless Sensor Networks

Outline. CS5984 Mobile Computing

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

COMPUTER NETWORK Model Test Paper

Topology Control from Bottom to Top

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

CS3600 SYSTEMS AND NETWORKS

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Cooperative-Diversity Slotted ALOHA

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

SWAP and TCP performance

Peer-to-Peer Protocols and Data Link Layer. Chapter 5 from Communication Networks Leon-Gracia and Widjaja

COMBINED IEEE PHYSICAL LAYER AND VIRTUAL MULTIPLE INPUT MULTIPLE OUTPUT (V- MIMO) TRANSMISSIONS FOR ENERGY EFFICIENT WIRELESS SENSOR NETWORKS

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wzzard Sensing Platform Network Planning and Installation. Application Note

6.033 Computer Systems Engineering: Spring Quiz II THIS IS AN OPEN BOOK, OPEN NOTES QUIZ. NO PHONES, NO COMPUTERS, NO LAPTOPS, NO PDAS, ETC.

3. Evaluation of Selected Tree and Mesh based Routing Protocols

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Media Access Control in Ad Hoc Networks

Underwater Acoustic Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

SIMULATING CDPD NETWORKS USING OPNET

Chapter - 1 INTRODUCTION

OPNET Editors and Features

Chapter 16 Networking

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

Last Lecture: Data Link Layer

Multicasting in ad hoc networks: Energy efficient

Time Synchronization in Wireless Sensor Networks: CCTS

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Wireless and Mobile Networks 7-2

By Ambuj Varshney & Akshat Logar

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

CSC 4900 Computer Networks: Wireless Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Joint PHY/MAC Based Link Adaptation for Wireless LANs with Multipath Fading

CS263: Wireless Communications and Sensor Networks

Energy Management Issue in Ad Hoc Networks

Multi Hop Send Protocol Tool for TinyNodes Semesterthesis

CMSC 611: Advanced. Interconnection Networks

Dynamic Power Control MAC Protocol in Mobile Adhoc Networks

AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET

QoS-Enabled Video Streaming in Wireless Sensor Networks

Research Article Cooperative Signaling with Soft Information Combining

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

Energy Management Issue in Ad Hoc Networks

Link Layer and Ethernet

An Adaptive Self-Organization Protocol for Wireless Sensor Networks

Ad Hoc Networks: Introduction

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT

Wireless Medium Access Control Protocols

Subject: Adhoc Networks

Data Link Control Protocols

THE capabilities of mobile cellular communications may

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

A Simulation Analysis of Large Scale Path Loss in an Underwater Acoustic Network

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

CSE/EE 461. TCP congestion control. Last Lecture. This Lecture. Focus How should senders pace themselves to avoid stressing the network?

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Recap. More TCP. Congestion avoidance. TCP timers. TCP lifeline. Application Presentation Session Transport Network Data Link Physical

Transcription:

Design and Simulation of an Underwater Acoustic Local Area Network Ethem M. Sozer, Milica Stojanovic, and John G. Proakis Northeastern University, Communications and Digital Signal Processing Center 409 Dana Research Building, Boston, MA, 02115 esozer@cdsp.neu.edu/www.cdsp.neu.edu ABSTRACT An underwater acoustic (UWA) local area network (LAN) is designed and tested using Opnet's Radio Modeler. The network consists of master and sensor nodes that will be deployed in sea with battery powered modems. We modeled the UWA channel using the Radio Transceiver Pipeline stages supplied with Opnet. Since the network nodes are stationary, we assumed that channel is slowly varying and stays constant during a packet interval. An important parameter of battery powered network nodes is the power consumption. The power control algorithm and the power consumption of nodes are also tested using Opnet. The network models and simulation results are presented. I. INTRODUCTION In this work, we investigated the underwater local area network (LAN) that was first tested during SeaWeb 98 [1]. The network consists of a number of sensor nodes that collect data from the ocean bottom, and a master node. The master node is responsible for gathering the collected data, transferring it to a control center on shore, and for controlling sensor nodes. The network traffic consists of asynchronous data delivery from the sensor nodes to the master node and remote command and control of oceanographic sensors in the other direction. Network nodes use acoustic modems to communicate [2]. The speed of acoustic signals is 1500 m/s, which is much less than the speed of radio waves. Thus, packets experience large propagation delays. Also, current modems used for underwater communications can only provide bit rates in the order of tens or hundreds. This can create situations in which before a node finishes transmission of a packet, the receiver node may begin the reception of the same packet. Since the modem that will be used in the network nodes is not capable of processing signals from different sources simultaneously, nodes can establish only one session at a time. We propose a packet transfer protocol that provides reliable transmission of information through an underwater LAN. In Section II, we present the network topology used in simulations. Section III gives the node structure. The process models are defined in Section IV. The pipeline stage models used to simulated underwater acoustic channel are provided in Section V. The last section presents the results of the simulations. II. NETWORK MODEL The network consists of two types of nodes: Sensor Nodes: These nodes collect data using their sensors. The collected data is then passed to the master nodes through the network. There may be as many sensor nodes as needed depending on the area to be covered. Master Nodes: Master nodes are responsible for collecting data from sensor nodes. The collected data is then passed to a gateway node that connects the acoustic network to the user on shore. In this simulation, we don't include gateway connection. Master nodes can also issue commands to control sensor nodes. The sensor nodes are connected to the master node in a hierarchical manner. The number of hops that is required for a sensor node to communicate with the master node determines the level of the node. The available frequency band is divided into sub-bands and each sub-band is assigned to a cluster of nodes. A cluster of nodes is deployed in the same general geographical region. The neighboring clusters are assigned different frequency bands to assure low interference. Each cluster communicates with the master node through its first level node. Figure 1 shows the network topology created using the network editor of Opnet. The network consists of a single master node and fifteen sensor nodes. Sensor nodes are divided into three clusters. Master node uses frequency group M. Sensor nodes are assigned frequency groups A, B, and C, as shown in the figure. The lines connecting the nodes represent the virtual communication paths created by the acoustic modems. 1

Figure 2: Node model used in network nodes. Figure 1: Network topology consists of one master and fifteen sensor nodes and a probe. There is also a probe node in the network that is used for simulation purposes. The probe node initializes the random number generators and records statistics at the end of the simulation. III. NODE STRUCTURE Each node in the network consists of an antenna, a receiver, a transmitter, tree processors, and an ideal generator to simulate data generation of the senders. Figure 2 shows the node model used in the simulations. The ideal generators use exponential inter-arrival time distribution. The data generation rate, λ, of the sensors is set at run time by the user. λ represents the offered load for the system and used as the input parameter for the simulations. Three processors are used to model the Layer 3, Layer 2, and Modem Control protocols. The details of these processors are given in the following sections. IV. PROCESS MODELS In this section, we explain the protocols carried out by the processors presented in the previous section. The following logical node designations are used in this section: Source node: a node that transmits an acoustic packet Destination Node: the node that receives an acoustic packet from a source node Sender Node: the node at which an information sequence was first created Recipient Node: the node to which the information sequence generated by the sender will ultimately go 1) Modem Control Process Modem Control corresponds to the physical layer or the first layer of the system [3]. This layer is responsible for creating a virtual link through an acoustic channel. To achieve this function, commercially available Datasonics ATM-875 modems [2] are used. These modems have a low-power state to decrease energy consumption. A modem powers up when it hears the wakeup signal that is uniquely assigned to it. This process controls the acoustic modem used in the system. Modem parameters are set according to the commands passed by Layer 2 at this layer. Figure 3 shows the finite state machine for Modem Control process. After initialization, modem control process waits for packets. This state corresponds to the low-power state of the node. When an acoustic packet is received and passed to Modem Control by the receiver, it first checks the wakeup sequence. If the wakeup sequence matches the unique wakeup assigned to the corresponding node, the modem wakes up and accepts the packet. Then, Modem Control retrieves the Layer 2 packet and gets the received SNR. SNR is placed into an ICI and send to Layer 2 together with the Layer 2 packet. 2

any response from the destination, it times out and resends the data packet. This is repeated until the source either gets a Data_Ack command or retransmits five times, whichever occurs first. Once a correct data packet is received by the destination it is passed to Layer 3. Figure 5 shows the finite state machine used to implement the Layer 2 protocol. Figure 3: Layer 1 finite state machine. 2) Layer 2 Process Layer 2 process implements a data link control protocol that ensures error-free communication between a source and a destination to transport Layer 3 information sequence [3]. Timeout Source RIX RIX DATA Figure 5: Layer 2 finite state machine. Destination IX Figure 4: Layer 2 packet transmission protocol. Upon the receipt of the information sequence from Layer 3, Layer 2 sends a packet to the destination node containing a Request_Xmt command. This command requests permission to transmit a larger information packet. The destination node that receives Request_Xmt sends an Info_Xmt command back to the source informing the source that permission is granted. If for some reason the destination does not receive the Request_Xmt command correctly, then it does not respond and returns to the low-power state. The source node times out and repeats the request by sending a new Request_Xmt command. When the source node receives an Info_Xmt correctly, it immediately sends a Layer 2 packet that contains the Layer 3 information sequence with Data_Pck command. If the Layer 2 command sequence fails the CRC, or the information sequence of the data packet fails its CRC check (when Layer 3 is in Errorless mode), the destination sends another Info_Xmt. If the source receives Info_Xmt it then resends the same data packet. The destination repeats Info_Xmt for at most five times. If destination cannot receive a correct data packet after the fifth trial it decides that the link is not available any more and returns to the low power mode. Destination node issues an acknowledgment by sending a Data_Ack command to the source upon the receipt of a correct data packet. Also, if the source does not receive ACK During Layer 2 handshaking, all other transmission requests are declined. If the source of the transmission that has been declined is not informed, it repeats its request. The power control algorithm that is currently used dictates that the source node increases its power. This will increase the battery consumption as well as the probability of collisions. To prevent these undesirable effects, destination node issues a Wait command that informs the source node that destination is busy and will send an Info_Xmt as soon as it is done. Layer 2 handles a Power Control protocol to ensure minimum battery consumption. When a source node transmits a Request_Xmt, the destination node measures the SNR of the received packet and includes a power control parameter to its Info_Xmt packet to indicate whether the source should increase or decrease its power during the subsequent transmissions. If during a future Request_Xmtor Info_Xmt packet transmission, the source of the packet cannot get an answer, it repeats its transmission with increased power. 3) Layer 3 Process Layer 3 process implements the network layer that permits the transmission of Layer 3 information sequence across multiple nodes. Figure 6 presents the finite state machine of Layer 3 process. When a new data is generated at a sender node, Layer 3 creates a Layer 3 packet, and passes it to Layer 2. If the sender node is a sensor node, the recipient node is set as 3

the master node. Layer 3 also decides the next hop (destination node) of the current packet. If a destination node receives a Layer 3 packet and decides that it is not the recipient node, it decides on the next hop, and passes the Layer 3 packet onto Layer 2. random variable that represents fading. When received power of a packet is calculated, two Gaussian random variables with zero mean and unit variance are generated, and the Rayleigh fading coefficient is calculated. The resulting number is multiplied by the received power after loss. Since we make this calculation for the entire packet, this is equivalent to simulating a quasi-stationary channel [5]. 2) Background Noise Background noise of the system is fixed throughout the simulations. The noise level is calculated to achieve 20dB SNR at maximum range. This SNR level ensures 10-3 bit error rate with Hadamard coded MFSK modulation on AWGN channel. Figure 6: Layer 3 finite state machine. For routing purposes, Layer 3 maintains a general tree that contains node's IDs formatted according to their levels. For example, if node A is the parent of nodes B and C, B and C appear as the leaves of node A. Each node keeps its parent ID together with Layer 3 tree. The next hop (destination node) is determined by tracing the Layer 3 tree. If the recipient ID cannot be found in the tree, destination ID is set as the parent id. If recipient is in the tree, then destination ID is set to a one-layerhigher node that contains the recipient in its tree. V. MODIFIED RADIO PIPELINE STAGES In this subsection, we discuss modifications done to the pipeline stages of Opnet to represent the underwater acoustic channel. 1) Power Model The path loss in underwater channels is defined by the following formula: 0.11f 2 44 f 2 g( f ) = + + 2.75 10 4 f 2 + 0.003 1 f 2 4100 f 2 + + loss = d γ exp( d. g( f ) /10) where d is the propagation distance, γ is the path loss exponent, which is set to two, and f is the center frequency of the transmission [4]. In addition to the path loss, we also defined a Rayleigh 3) Propagation Delay Model The propagation speed of acoustic signals is 1500 m/s under water. The standard propagation delay routine of Opnet is modified by replacing the speed of light, c, with this value. VI. RESULTS In the simulations we use offered load, which is defined as the average time between detections for a single node, as the input parameter. We tested the performance of our system under several load conditions. Figure 7 shows the total network energy consumption. As the offered load increases, the number of transmissions and the energy consumption of the system increase. The energy consumption of node levels is obtained by probing sample nodes from each level. Figure 8 presents battery consumption of master node, node 4 (level 1), and node 7 (level 2). We see the same trend in all plots. The battery consumption decreases for higher level nodes. This is due to the fact that lower level nodes carry more traffic. The average network throughput is calculated by counting the number of Layer 3 information sequences received by recipient nodes and dividing it to the total simulation time. Figure 9 shows the change in the average throughput of the system as a function of offered load. The throughput of the system increases until the offered load reaches 0.0015 packets per second. At this point, the system has barely enough time to complete a transaction before a new detection occurs. The throughput of the system is so small because of the low data rate, high propagation delay of the underwater 4

channel and the slow handshaking protocol. Figure 10 gives the end-to-end packet delay of the system. As expected, the end-to-end delay experienced by the information sequences increases with increasing load. However, after 0.0015, end-to-end delay begins to decrease. This is because of the highly congested higher level nodes. Due to congestion, high level nodes cannot complete their transaction. However, the first level nodes continue to communicate with the master node, and the only completed transaction occurs between first level nodes and the master node. Figure 9: Throughput of the network. The number of Inf_Xmt transmissions before completing a successful transaction is presented in Figure 12. The Info_Xmt packets can be lost due to channel conditions. The interference present at the channel increases with increased load, and then the number of successfully decoded packets decreases. We observed that if the offered load stays below 0.0015, the packet transfer protocol provides reliable communication between network nodes. However, the throughput of the network is very low. A faster algorithm such as selective repeat can speed up the network traffic. Also, the network configuration is poor, however it is chosen to facilitate the experimental deployment. Figure 10: End-to-end delay in the network. Figure 7: Total battery consumption of the network. Figure 8: Battery consumption of node levels. Figure 11: Number of Info_Xmt transmissions before completing a successful transaction. VII. REFERENCES [1] D.Green, J.A.Rice, and S.Merriam, Implementing an undersea wireless network using cots acoustic modems, Proc. IEEE Oceans Conf., Baltimore, Maryland, USA, Oct. 1998 [2] K.E.Scussel, J.A.Rice, and S.Merriam, A new MFSK acoustic modem for operation in adverse underwater channels, Proc. IEEE Oceans Conf., Halifax, Nova Scotia, Canada, Oct. 1997 [3] D.Bertsekas and R.Gallager, Data Networks, N.J: Prentice Hall, 1992 [4] L.Berkhovskikh and Y.Laysanov, Fundamentals of Ocean Acoustics, N.Y: Springer, 1982 [5] J.G.Proakis, Digital Communications, N.Y: McGraw-Hill, 1995 5