| Literature DB >> 22163775 |
Lu Hong1, Feng Hong, Zhongwen Guo, Zhengbao Li.
Abstract
TDMA protocols have attracted a lot of attention for underwater acoustic sensor networks (UWSNs), because of the unique characteristics of acoustic signal propagation such as great energy consumption in transmission, long propagation delay and long communication range. Previous TDMA protocols all allocated transmission time to nodes based on discrete time slots. This paper proposes an efficient continuous time scheduling TDMA protocol (ECS) for UWSNs, including the continuous time based and sender oriented conflict analysis model, the transmission moment allocation algorithm and the distributed topology maintenance algorithm. Simulation results confirm that ECS improves network throughput by 20% on average, compared to existing MAC protocols.Entities:
Keywords: ST-MAC; TDMA; communication scheduling; underwater sensor networks
Mesh:
Substances:
Year: 2011 PMID: 22163775 PMCID: PMC3231614 DOI: 10.3390/s110302920
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Different UWSN transmission moment allocations.
Figure 2.Local network topology of node i.
Figure 3.Calculation of forbidden time.
CreateLCG().
| 1: Input: |
| 2: Output: |
| 3: |
| 4: if ( |
| 5: return |
| 6: else |
| 7: return |
| 8: } |
| 9: |
| 10: if(∃ |
| 11: return |
| 12: else |
| 13: return |
| 14: } |
| 15: new |
| 16: while ( |
| 17: ∀ |
| 18: |
| 19: new |
| 20: while ( |
| 21 ∀ |
| 22: |
| 23: If ( |
| 24: |
| 25: |
| 26: } //end if |
| 27: } //end while ( |
| 28: } //end while( |
| 29: return |
Figure 4.Local conflict graph (LCG) of node i.
Mark().
| 1: |
| 2: |
| 3: while(∃ |
| 4: receve node |
| 5: |
| 6: |
| 7: for each |
| 8: calculate |
| 9: } // end while |
| 10: loop: //highest priority; ordinal marking, find the earliest available time |
| 11: |
| 12: for each |
| 13: if( |
| 14: |
| 15: } |
| 16: } |
| 17: |
| 18: return |
Figure 5.ECS process: (a) network topology; (b) nodes’ LCG; (c) marking order and results.
Figure 6.A node may be incapable to use the transmission time of a dead node.
Maintenance().
| 1: If a node |
| 2: Broadcast message ‘i_death’ to |
| 3: Loop{ |
| 4: choose the highest priority node |
| 5: if(∃ |
| 6: choose the node that priority is second to |
| 7: continue loop; |
| 8: else |
| 9: calculate |
| 10: break; |
| 11: } |
| 12: broadcast |
Join(i).
| 1: jam the channel; |
| 2: receive information of all LCG neighbors and calculate their forbidden time, create LCG(i); |
| 3: |
| 4: for (all node |
| 5: if(∃ |
| 6: |
| 7: } |
| 8: if ( |
| 9: node |
| 10: else{ |
| 11: broadcast |
| 12: return |
| 13: } |
Figure 7.Network throughput in different topologies: (a) Star, (b) Linear, (c) Grid, (d) Tree.
Figure 8.End-to-end delay of different TDMA protocols.
Figure 9.Efficiency of ECS in underwater harsh environments.