Abstract
In this paper, we propose a method for sharing the handshakes of control packets among multiple nodes, which we call a hybrid sender- and receiver-initiated (HSR) protocol scheme. Handshake-sharing can be achieved by inviting neighbors to join the current handshake and by allowing them to send their data packets without requiring extra handshakes. Thus, HSR can reduce the signaling overhead involved in control packet exchanges during handshakes, as well as resolve the spatial unfairness problem between nodes. From an operational perspective, HSR resembles the well-known handshake-sharing scheme referred to as the medium access control (MAC) protocol using reverse opportunistic packet appending (ROPA). However, in ROPA the waiting time is not controllable for the receiver’s neighbors and thus unexpected collisions may occur at the receiver due to hidden neighbors, whereas the proposed scheme allows all nodes to avoid hidden-node-induced collisions according to an elaborately calculated waiting time. Our computer simulations demonstrated that HSR outperforms ROPA with respect to both the throughput and delay by around 9.65% and 11.36%, respectively.
Keywords: handshake-based MAC protocol, handshake-sharing, hidden-node problem, long propagation delay, receiver-initiated protocol, sender-initiated protocol, sensor networks, spatial unfairness problem, underwater acoustics
1. Introduction
Underwater acoustic sensor networks (UWSNs) comprise variable numbers of sensor nodes, which are deployed to perform a variety range of applications, such as oceanic research, oil spill monitoring, submarine detection, offshore exploration, and assisted navigation [1,2]. To communicate between nodes, UWSNs typically employ acoustic signals, which have poor channel conditions compared with terrestrial radio signals. In particular, the speed of sound under water is about 1500 m/s, which is lower than the 3 × 108 m/s propagation speed of a radio signal, resulting in significantly longer propagation delays. In addition, the underwater acoustic channel is only capable of low data transmission rates due to its extremely limited bandwidth. Consequently, the medium access control (MAC) protocols designed for terrestrial radio channels with high data rates and negligible propagation delays may not work correctly in the underwater channel [3]. Therefore, it is essential to design a new MAC protocol to adapt to the poor underwater channel conditions.
Current research into underwater MAC protocols has focused mainly on handshake-based protocols, which are known to work properly during long-distance delivery via multi-hop relaying [4,5]. The multiple-access collision avoidance (MACA) protocol is a popular terrestrial handshake-based MAC protocol, which uses the request-to-send (RTS)/clear-to-send (CTS) handshake to reserve the shared channel [6]. In MACA, prior to data transmission the sender and receiver exchange RTS and CTS between the sender and receiver. Thus, any neighbors that overhear a control packet can delay their transmission to avoid possible collisions, which is called as a hidden-node problem. In order to apply MACA in an underwater environment, MACA for underwater (MACA-U) was proposed by revising the state transition rules to consider the long propagation delay [7]. However, the simple RTS/CTS exchange fails to fully address the hidden-node problem due to the long propagation delay in the underwater acoustic channel [8]. In addition, the performance of MACA-U is severely constrained by the long propagation delay because of the increased time required for control packet exchanges. Moreover, the long propagation delay also causes a spatial unfairness problem where the channel always becomes clear earlier at nodes closer to the receiver, and thus nodes located far from the receiver might never capture the channel.
Most conventional protocols have improved the channel utilization by sending multiple packets at once in a packet-train form [9,10,11]. As another approach for channel utilization improvement, a MAC protocol using reverse opportunistic packet appending (ROPA) has permitted multiple nodes to participate in a common handshake [12], which we name “handshake-sharing” in this paper. In general, the handshake-sharing approach is known to be more efficient than the packet-train methods, because the packet-train is only originated from a single sender. In ROPA, an initiating sender polls its neighbors to join the handshake using RTS, which may cause hidden-node collisions at the receiver-side. Such collisions may severely degrade the performance in terms of throughput and latency. Thus, as a solution for the hidden-node collisions, conventional protocols have inserted a specific amount of waiting time into the schedules of both the sender and receiver, but it may still cause additional latency [13,14,15]. In this paper, we propose a new handshake-sharing approach where a receiver polls its neighbors to join the handshake using CTS. Such a receiver-initiated polling not only improves channel utilization, but also addresses the hidden-node problem.
Based on these observations, we propose an underwater MAC protocol called a hybrid sender- and receiver-initiated (HSR) protocol scheme, which addresses the channel utilization issue and the hidden-node problem. First, to overcome the channel utilization problem, HSR permits multiple nodes to cut into an ongoing communication procedure that involves a handshake between a given sender and a receiver, thereby allowing data packets to be sent without additional handshakes. The method for sharing an ongoing handshaking is similar to that of ROPA. However, in contrast to ROPA, the receiver is the same for both the sender and neighbors in HSR, and thus the transmission schedules of all the nodes can be controlled by the same receiver to avoid the hidden-node problem. HSR combines both sender- and receiver-initiated approaches from the aspect of who initiates communication. The sender begins a handshake by transmitting an RTS to a receiver as part of the typical sender-initiated communication. On the other hand, the receiver invites neighbors to participate in the ongoing communication using three-way signaling via polling/request/grant as part of the receiver-initiated communication [11]. In addition, this participatory process gives neighbors the opportunity to transmit their data packets evenly, which also can address the spatial unfairness problem.
The remainder of this paper is organized as follows: we first review the relevant literature in Section 2. Section 3 presents the problem statements. In Section 4, we explain the proposed protocol design, including our system description. In Section 5, we present our simulation results and discuss them in detail. Finally, we give our conclusions in Section 6.
2. Related Work
Considerable research efforts have been made to overcome the effects of long propagation delay, such as low channel utilization, the hidden-node problem, and the spatial unfairness problem, which are also the main concerns of HSR. First, to improve channel utilization, a MACA-based MAC protocol with a packet-train to multiple neighbors (MACA-MN) was proposed wherein multiple packets could be sent to multiple neighbors in every handshake round [9]. Moreover, MACA-U with packet trains (MACA-UPT) was introduced [10] to enhance channel utilization by allowing a sender to transmit a train of data packets for each handshake. Another method for improving channel utilization was presented [8], which is called the adaptive propagation-delay-tolerant collision-avoidance protocol (APCAP). This protocol allows a transmitting node to perform other actions while waiting for the CTS to return, called MAC level pipelining. Nevertheless, APCAP has two constraints: the complexity of MAC level pipelining and time synchronization. Recently, a bidirectional concurrent MAC (BiC-MAC) protocol was proposed, where a sender-receiver pair can exchange bidirectional data transmissions in each handshake simultaneously, which results in channel utilization improvement [10]; however, a bidirectional data packet exchange only occurs when the receiver has data packets destined for the sender. If the receiver does not have any data packets to return, BiC-MAC behaves in a similar manner to MACA-UPT.
In a second attempt to overcome the hidden-node problem, so-called slotted floor acquisition multiple access (Slotted-FAMA) was proposed, which combines carrier sensing and RTS/CTS handshake mechanisms [13]. Slotted-FAMA exploits time slotting to prevent the hidden-node collisions by aligning all of the packet transmissions into slots, but which requires an excessive length of time slot resulting in a low throughput performance. Unlike Slotted-FAMA, the distance-aware collision avoidance protocol (DACAP) [14] is a non-synchronized protocol that minimizes the duration of handshake by taking advantage of the receiver’s tolerance to interference when the two nodes are closer than the maximum transmission range. Moreover, DACAP waits for a certain amount of time before data transmission to avoid possible hidden-node collisions. This waiting time is determined based on a trade-off between throughput and collision avoidance.
Finally, to address the spatial unfairness problem, the spatially fair MAC (SF-MAC) protocol was proposed, which also considers the hidden-node problem [15]. To avoid the hidden-node collisions, SF-MAC delays the CTS transmission after receiving the RTS. In addition, the receiver captures the RTSs of all contenders and determines the earliest RTS transmitter, thereby achieving a fair transmission. However, SF-MAC has a long and fixed RTS collection period and the receiver can only obtain a data packet from one of the potential senders, which severely degrades channel utilization. An efficient handshaking mechanism (EHM) was also proposed to solve the spatial unfairness problem [16]. In EHM, a receiver delays its reply to the RTS that arrives first for a specific amount of time. During this period, if any other RTS that departed earlier than the first-arrival RTS should arrive late due to the long distance, then the receiver also takes the late-arriving RTS into consideration when creating CTS so the long-distance node has an equal transmission opportunity. However, EHM does not consider the control packet collisions caused by hidden nodes, which may significantly decrease the overall network throughput.
3. Problem Statements
3.1. Hidden-Node Problem in UWSNs
Conventional handshake-based protocols attempt to reserve the channel by exchanging RTS/CTS control packets, which are probably overheard by neighbors. The neighbors are then aware that the channel will be reserved and they remain in the sleep mode by stopping any transmissions until the occupied channel is released. In this manner, any possible collisions caused by neighboring hidden nodes may be avoided.
However, in the underwater acoustic channel, a new type of hidden-node problem is introduced due to the long propagation delay. In Figure 1, nodes A and D, i.e., the neighbors in this example, may detect a channel reservation too late by overhearing the RTS or CTS after completing the transmission of their control packets, P1 and P2. Thus, the early departure of packets without recognizing channel reservation may cause collisions at the sender (node B) and receiver (node C), as shown by the solid arrows. In this scenario, nodes A and D are hidden from nodes B and C. Therefore, unlike a terrestrial radio channel where a hidden node is located beyond the signal’s coverage so its existence is not recognized, a hidden node in an underwater acoustic channel may also occur due to the long propagation delay even when it is located within the region covered.
3.2. Spatial Unfairness Problem in UWSNs
The “first come, first served” method has been used as the most reasonable approach to ensure fairness among communicating nodes that share a medium, where the requests for the medium accessed by nodes are processed in the order of their arrival. However, due to the long propagation delay in the underwater acoustic channel, a request for channel reservation occurs earlier, but it may arrive later at a long-distance node compared with those nearby so it cannot be served first. This is called the spatial unfairness problem.
In Figure 2, nodes A and B transmit a request packet to node C to reserve the channel. The starting time of node A tA is before tB for node B, but the request from node A arrives later than that from node B because node A is located farther than node B from node C. Furthermore, provided that node B has data to transmit, it can preoccupy the channel every time in advance of node A. This causes a severe unfairness problem.
4. Proposed HSR Protocol
4.1. System Description
In HSR, handshake-sharing can be achieved using multi-way polling/request/grant signaling between the receiver and its neighbors. A CTS plays an additional role in polling whether the neighbors have any data packets destined for the receiver. After receiving the CTS, the neighbors who want to participate in the current handshake (defined as “participants”) notify their participation by transmitting a control packet called a request-to-participate (RTP). After collecting RTPs, the receiver grants participation by broadcasting a control packet called a clear-to-participate (CTP), which contains the transmission schedules of the sender and participants to avoid collisions at the receiver. We refer to the sender and participants who are granted participation by the receiver as “granted participants”.
4.1.1. Assumptions
A multi-hop acoustic network is considered where all of the nodes reach their respective destinations in a multi-hop manner using an omnidirectional and half-duplex underwater acoustic modem. We assume that each node acquires the inter-nodal propagation delay for one-hop distance neighbors through the network initialization stage by measuring the round-trip time or by exchanging some information with its neighboring nodes [17]. The nodes also maintain a list of neighbors to allow the establishment of a bi-directional communication link if necessary. A routing table is maintained in the nodes to facilitate multi-hop relay.
4.1.2. Time Duration Parameters in HSR
In HSR, three parameters related to the time duration are defined, i.e., Delay, Silence, and Waiting. First, Delay (denoted by DX (i)) is an interval during which a node i delays packet X’s transmission to avoid collisions. Silence is an interval during which nodes who overhear the control packets associated with channel reservation by others remain quiet and do not communicate. To express the length of the Silence, another time duration called Waiting is defined as an interval between the transmission of a control packet and the reception of the corresponding response, which could be a control packet or a data packet.
Figure 3 shows an example of a RTS/CTS handshaking procedure to illustrate how to obtain the Waiting and Silence. CTS is the response to RTS, so the Waiting of node i for response to RTS is given by:
(1) |
where τi,j is the propagation delay between nodes i and j, and Tcontrol is the transmission time for the control packet, which is the same for all control packets. We denote WX (i) as the Waiting of node i to obtain a response to packet X. Similarly, since the data from node i correspond to the response to CTS of node j, then the Waiting of node j for response to CTS is given by:
(2) |
where TDATA is the transmission time of a data packet. The Waiting is specified in the associated control packets and it is overheard by neighbors so they can estimate how long they should remain in Silence in order to avoid collisions. In Figure 3, the values of WRTS (i) and WCTS (j) are specified in the RTS and CTS, respectively. After overhearing the CTS, the neighbor (node N) calculates the Silence by:
(3) |
Similarly, all of the neighbors can calculate how long they must maintain the Silence. If a node in Silence overhears another control packet of neighbor, it checks and extends the Silence if necessary.
4.2. Fundamental Operation and Features
Figure 4 illustrates the operation of the HSR protocol. Nodes S and R denote a sender and a receiver, respectively. It is assumed that nodes P1, P2, and P3 are neighbors of node R within one-hop distance. Node S starts the handshake by transmitting RTS to node R. Node R specifies the following information in the RTS: (1) the address of the destination; (2) the batch size of node S, i.e., the number of data packets to be transmitted, Bsize,S; and (3) the Waiting of node S for response to RTS, WRTS (S).
After receiving the RTS, node R broadcasts a CTS, which is used to respond to the RTS but also to invite the neighbors (e.g., nodes P1, P2, and P3) to join the current handshake to send their data packets to the receiver R if they have any. After receiving the CTS, a neighbor with data packets destined for node R participates in the current handshake by transmitting an RTP to node R, and it then waits for a response. As shown in Figure 4, the RTPs from different participants might collide with each other, so node R computes the Delay for all of the participants’ RTP transmissions to ensure that collisions do not occur and it specifies these values in the CTS. Thus, the CTS contains two parameters: WCTS (R) and DRTP (i). The methods for calculating WX (i) and DX (i) are explained in Section 4.3. The RTP of participant i includes the same information as RTS: (1) address of the destination; (2) Bsize,i; (3) WRTP (i). On the other hand, a neighbor with no data packets destined for node R remains silent during the Silence (as in the case of node P3).
After transmitting the CTS, node R collects RTPs during the Waiting, WCTS (R), and then broadcasts the CTP. In this case, WCTS (R) may induce slightly additional handshake negotiation times for a low offered load condition, but its contribution to the performance, such as collecting the neighbors’ notifications of participation and avoiding the collisions caused by hidden nodes, are high enough to ignore the demerit. As shown in Figure 5a, node N is hidden from node S and it may transmit a control packet (e.g., RTS) before overhearing CTS, which causes a collision at node R, as shown by the solid arrow. However, in HSR, WCTS (R) continues until the arrival of all of the control packets that departed from the neighbors earlier than the CTS was overheard, as shown by the dotted arrow in Figure 5b. This method allows the HSR to avoid possible collisions caused by hidden nodes.
In addition, the HSR addresses the spatial unfairness problem caused by different inter-node distances and the long propagation delay, where it provides an additional opportunity to participate in the ongoing communication. For example, as shown in Figure 6, nodes S and P transmit their RTSs to node R. Because it is closer to node R, node S captures the channel even if it sends the RTS later than node P, thereby leading to the spatial unfairness problem. However, in HSR, node P still has a chance to share the channel by transmitting the RTP, as shown in Figure 6. Thus, all of the neighbors of the receiver have the same opportunity to capture the channel, regardless of their locations.
Back to Figure 4, after collecting all of the RTPs, node R calculates the data transmission times for the granted participants so the data packets arrive at the receiver sequentially in a similar manner to a packet-train [9]. The data transmission time for node i is translated into DData (i) and sent with WCTP (R), where it is included in the CTS. After transmitting the CTP, node R waits for the data packets from the granted participants.
4.3. Calculating the Time Duration Parameters
4.3.1. Delay for the RTP and Data Transmission
In HSR, two types of collisions can occur at a receiver: (1) RTP collisions and (2) data packet collisions. RTP collisions occur when more than two participants at similar distances from the receiver send an RTP immediately after receiving the CTS. Thus, in order to avoid RTP collisions, it is necessary to force all of the participants to delay their RTP transmissions by a specific amount of time, which is denoted by DRTP.
Figure 7 shows an example of how to calculate the Delay for RTP transmission, where nodes (k − 1), k, and (k + 1) are participants, and their RTPs are assumed to arrive in the order named. The condition that node k’s RTP is scheduled to arrive after node (k − 1)’s RTP is given by:
(4) |
Thus, the Delay for node k’s RTP transmission is chosen as the minimum value that satisfies the condition of Equation (4), as follows:
(5) |
However, in the case where a Delay is not required, such as node (k + 1), Equation (5) yields a negative value. Thus, the general expression for the Delay for RTP transmission is given by:
(6) |
DRTP (i) is calculated for all of the participants and written in the CTS by the receiver, and the participants then adjust the RTP transmission time accordingly.
Data packet collision is also avoided in a similar manner to RTP collision. After receiving the RTPs, the receiver then calculates the Delay for data transmission by the granted participants so the data packets arrive sequentially at the receiver in a packet-train form, as shown in Figure 8, where it is assumed that the data packets of node k arrive after those of node (k − 1). For this packet-train arrival process, the following relationship should be satisfied:
(7) |
Thus, from Equation (7), the Delay for node k’s data transmission is chosen as:
(8) |
and the general expression for granted participant i is:
(9) |
DData (i) is carried by the CTP and the granted participants then determine their data transmission times accordingly.
4.3.2. Waiting for Responses to RTS, CTS, RTP, and CTP
The Waiting has a different value according to the type of control packet (i.e., RTS, CTS, RTP, and CTP). The Waiting for response to RTS is given in Equation (1). As shown in Figure 9a, the Waiting for response to CTS (corresponding to ① in Figure 9a is given by:
(10) |
where node L denotes the participant farthest from node R (receiver). The Waiting for response to CTP (corresponding to ② in Figure 9a, during which the data packet receptions are all completed as a response to CTP, is obtained by:
(11) |
where node L is the granted participant most distant from node R.
The Waiting of participant i for response to RTP (corresponding to ① in Figure 9b, during which CTP reception is completed as a response to RTP, is given by:
(12) |
where dremain,i is the residual Waiting of node R for response to CTS at the time when participant i’s RTP is received (corresponding to ② in Figure 9b. Utilizing the values of WCTS (R) and DRTP (i), which are specified in CTS, participant i calculates dremain,i as:
(13) |
After substituting Equation (13) for Equation (12), the Waiting of participant i for response to RTP is given by:
(14) |
5. Simulations and Results
5.1. Simulation Model
We developed a custom MATLAB network simulator and considered a multi-hop topology that has 36 static-nodes with a grid spacing of 1000 m as shown in Figure 10. To reflect more real situation, the location of node is randomly generated to deviate from a grid intersection point by 10% at maximum of the grid spacing in both vertical and horizontal directions. The transmission power of all of the nodes were assumed to be the same to cover 1.5 times the grid spacing, so the coverage of a node included eight neighbors, as denoted by the dotted circle in Figure 10.
Data packet generation for each node followed a Poisson distribution with parameter λnode (packets/s) and the destination of each packet was selected randomly with equal probability. In the case of multi-hop transmission, a static routing scheme was employed where every node used a preconfigured routing table [12]. We ignored any channel related packet losses due to noise and multi-path, which only occurred due to packet collisions. For the RTS trials, HSR employed the binary exponential back-off algorithm specified in the IEEE 802.11 standard [18]. Table 1 provides the system parameters and the values used in simulations. The transmission rate was referred to the LinkQuest acoustic modem [19].
Table 1.
Parameter | Value |
---|---|
Transmission Rate | 9600 bps |
Size of Data Packet | 1200 bits |
Size of Control Packet | 120 bits |
Minimum Back-Off Counter | 1 |
Maximum Back-Off Counter | 64 |
Capacity of Buffer | 300 packets |
Speed of Acoustic Wave | 1500 m/s |
5.2. Simulation Results
We compared the HSR protocol with conventional handshake-based protocols, i.e., MACA-U [7], MACA-UPT [10], and ROPA [12], with respect to the normalized throughput per node and end-to-end packet delay. The normalized throughput per node is defined by:
(15) |
where ri is the number of successfully received data packets at node i as a destination; N is the total number of nodes in the network; BData is a data packet size in bits; and tsim is the total simulation duration. As another performance evaluation metric, the end-to-end packet delay is used, defined as the time spent from initial data generation at a source to successful reception at a destination. Let Ω be the set of successfully received data packets at a destination. The length of Ω is given by , and each element of Ω has a different end-to-end packet delay, . Therefore, the average value of end-to-end packet delay is defined by:
(16) |
In terms of the channel occupancy priority, the three priority strategies of foreign-first, dominant-first, and oldest-first described in [20] were applied in order. Foreign-first gives priority to the relayed packets over newly generated packets. Dominant-first gives priority to a larger group of packets, which are commonly destined for a specific node. Oldest-first gives priority to the packets that have traveled a larger number of hops up to the current instant.
5.2.1. Throughput and Delay Analysis
Figure 11 shows the normalized throughput per node and the average end-to-end packet delay performance for various offered loads per node (λnode). For simplicity, hereafter the terms “normalized throughput per node”, “average end-to-end delay”, and “offered load per node” are referred to as “throughput”, “delay”, and “offered load”, respectively.
The results showed that MAC protocols with packet-train approach, such as HSR, ROPA, and MACA-UPT, significantly outperformed the non-packet-train MACA-U protocol in terms of both the throughput and delay, while achieving a stable saturation throughput and delay at high offered load ranges. This is because individual handshake for every single data packet is a very inefficient method, especially in conditions with a long propagation delay such as an underwater channel. Allowing multiple nodes to share an ongoing handshake, HSR and ROPA performed better than MACA-UPT where handshake only involved the sender and receiver.
In the saturation region, a closer analysis of the results for HSR and ROPA showed that HSR performed better in terms of both throughput and delay by around 9.65% and 11.36%, respectively because HSR additionally addresses the hidden-node problem, as mentioned earlier. Figure 12 demonstrates that the number of data packet collisions was lower for HSR compared with that for ROPA and the difference increased with the offered load. The features of the aforementioned MAC protocols are summarized in Table 2.
Table 2.
Feature | Handshake-Sharing | Packet-Train Method | Solving the Hidden-Node Problem | |
---|---|---|---|---|
MAC Protocol | ||||
HSR | O | O | O | |
ROPA | O | O | X | |
MACA-UPT | X | O | X | |
MACA-U | X | X | X |
O: used, X: not used.
Figure 13 shows the system throughput for various offered loads, which is defined by:
(17) |
where si is the total number of successfully received data packets at node i, regardless of whether they are relayed or destined. Alternatively, the system throughput can be interpreted as the single-hop performance of the MAC protocol. Thus, with similar reason as the case of throughput, HSR outperformed the other method in terms of the system throughput, which demonstrates that the features of HSR mentioned in Table 2 are also useful in single-hop networks.
5.2.2. Analysis of Spatial Fairness
To obtain further insights into the performance of HSR, the spatial fairness is analyzed using Jain’s fairness index (FI), which is defined by [21]:
(18) |
where xi is the throughput of node i. The fairness index ranges from 1/N (worst case) to 1 (best case), and the maximum value can be obtained when all of the nodes have the same level of throughput.
Figure 14 shows that the fairness index was highest for HSR, which is because HSR gives all the neighbors of a receiver an equal opportunity to capture the channel regardless of their locations. ROPA also employs a handshake-sharing approach, but HSR offers a solution to the hidden-node problem and this helps to improve the fairness.
6. Conclusions
In this paper, we have considered the challenges posed by the long propagation delay in underwater acoustic channels when designing an underwater MAC protocol. Based on these considerations, we have proposed an underwater MAC protocol called the HSR, which employs a packet-train method to improve channel utilization as well as allowing multiple nodes to share an ongoing handshake between a sender and a receiver. This approach also reduces the latency, which is expected to be very high in long propagation delay environments such as those in underwater channels. In addition, HSR addresses the hidden-node problem, which occurs in a different manner compared with terrestrial networks, and this is the main cause of performance degradation in the underwater handshake-based MAC protocol. Addressing the hidden-node problem also improves the fairness between nodes. The results of computer simulations showed that HSR surpasses other popular underwater MAC protocols based on handshake or packet-train methods, such as MACA-U, MUAC-UPT, and ROPA, with respect to both the throughput and delay.
Acknowledgments
This work was supported by Defense Acquisition Program Administration and Agency for Defense Development under the contract UD130007DD.
Author Contributions
J.-W.L. developed the HSR protocol and a custom MATLAB network simulator for simulations, and wrote the manuscript. H.-S.C. supervised the research and participated in the data analysis and revision processes.
Conflicts of Interest
The authors declare no conflict of interest.
References
- 1.Akyildiz I.F., Pompili D., Melodia T. Underwater Acoustic sensor networks: Research challenges. Ad Hoc Netw. 2005;3:257–279. doi: 10.1016/j.adhoc.2005.01.004. [DOI] [Google Scholar]
- 2.Zhang B., Sukhatme G.S., Requicha A.G. Adaptive sampling for marine microorganism monitoring; Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and System (IROS 2004); Sendai, Japan. 28 September–2 October 2004; pp. 1115–1122. [Google Scholar]
- 3.Chen K., Ma M., Cheng E., Yuan F., Su W. A survey on mac protocols for underwater wireless sensor networks. IEEE Commun. Surv. Tutor. 2014;16:1433–1447. doi: 10.1109/SURV.2014.013014.00032. [DOI] [Google Scholar]
- 4.Partan J., Kurose J., Levine B.N. A survey of practical issues in underwater networks; Proceedings of the 1st ACM International Workshop on Underwater Networks (WUWNet); Los Angeles, CA, USA. 25 September 2006; pp. 17–24. [Google Scholar]
- 5.Chitre M., Shahabudeen S., Stojanovic M. Underwater acoustic communication and networks: Recent advances and future challenges. Mar. Technol. Soc. J. 2008;42:103–116. doi: 10.4031/002533208786861263. [DOI] [Google Scholar]
- 6.Karn P. MACA: A new channel access method for packet radio; Proceedings of the 9th Computer Networking Conference; London, ON, Canada. 22 September 1990; pp. 134–140. [Google Scholar]
- 7.Ng H.H., Soh W.S., Montani M. MACA-U: A media access protocol for underwater acoustic networks; Proceedings of the IEEE Global Telecommunications Conference 2008; New Orleans, LO, USA. 30 November–4 December 2008. [Google Scholar]
- 8.Guo X., Frater M.R., Ryan M.J. Design of a propagation-delay-tolerant mac protocol for underwater acoustic sensor networks. IEEE J. Ocean. Eng. 2009;34:170–180. [Google Scholar]
- 9.Chirdchoo N., Soh W.S., Chua K.C. MACA-MN: A MACA-based MAC protocol for underwater acoustic networks with packet train for multiple neighbors; Proceedings of the IEEE Vehicular Technology Conference; Singapore. 11–14 May 2008; pp. 46–50. [Google Scholar]
- 10.Ng H.H., Soh W.S., Montani M. BiC-MAC: Bidirectional-concurrent mac protocol with packet bursting for underwater acoustic networks; Proceedings of the MTS/IEEE OCEANS 2010; Seattle, WA, USA. 20–23 September 2010. [Google Scholar]
- 11.Chirdchoo N., Soh W.S., Chua K. RIPT: A receiver-initiated reservation-based protocol for underwater acoustic networks. IEEE J. Sel. Areas Commun. 2008;26:1744–1753. doi: 10.1109/JSAC.2008.081213. [DOI] [Google Scholar]
- 12.Ng H.H., Soh W.S., Montani M. An Underwater Acoustic MAC protocol using reverse opportunistic packet appending. Comput. Netw. 2013;57:2733–2751. doi: 10.1016/j.comnet.2013.06.007. [DOI] [Google Scholar]
- 13.Molins M., Stojanovic M. Slotted FAMA: A MAC protocol for underwater acoustic networks; Proceedings of the IEEE OCEANS’06 Asia Pacific; Singapore. 16–19 May 2006; pp. 16–19. [Google Scholar]
- 14.Peleato B., Stojanovic M. Distance aware collision avoidance protocol for ad-hoc underwater acoustic sensor networks. IEEE Commun. Lett. 2007;11:1025–1027. doi: 10.1109/LCOMM.2007.071160. [DOI] [Google Scholar]
- 15.Liao W.H., Huang C.C. SF-MAC: A spatially fair MAC protocol for underwater acoustic sensor networks. IEEE Sens. J. 2012;12:1686–1694. doi: 10.1109/JSEN.2011.2177083. [DOI] [Google Scholar]
- 16.Lin W., Cheng E., Yuan F. EHM: A novel efficient protocol based handshaking mechanism for underwater acoustic sensor networks. Wirel. Netw. 2013;19:1051–1061. doi: 10.1007/s11276-012-0517-1. [DOI] [Google Scholar]
- 17.Xie P., Cui J.H. R-MAC: An energy-efficient MAC protocol for underwater sensor networks; Proceedings of the IEEE International Conference on Wireless Algorithms, Systems and Applications 2007 (WASA 2007); Chicago, IL, USA. 1–3 August 2007; pp. 187–198. [Google Scholar]
- 18.LAN/MAN (IEEE 802) Standards Committee . Wireless LAN Media Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE; New York, NY, USA: 1999. [Google Scholar]
- 19.LinkQuest Inc. [(accessed on 30 August 2014)]. Available online: http://www.link-quest.com.
- 20.Lee J.W., Cho H.S. Cascading multi-hop reservation and transmission in underwater acoustic sensor networks. Sensors. 2014;14:18390–18409. doi: 10.3390/s141018390. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 21.Syed A., Ye W., Heidemann J. Comparison and evaluation of the T-Lohi MAC for underwater acoustic sensor networks. IEEE J. Sel. Areas Commun. 2008;26:1731–1743. doi: 10.1109/JSAC.2008.081212. [DOI] [Google Scholar]