Next Article in Journal
Knitted Strain Sensors: Impact of Design Parameters on Sensing Properties
Previous Article in Journal
A Novel Topology Control Approach to Maintain the Node Degree in Dynamic Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Maximization of the Supportable Number of Sensors in QoS-Aware Cluster-Based Underwater Acoustic Sensor Networks

Department of Electrical and Computer Engineering, University of Ulsan, Ulsan 680-749, South Korea
*
Author to whom correspondence should be addressed.
Sensors 2014, 14(3), 4689-4711; https://doi.org/10.3390/s140304689
Submission received: 15 January 2014 / Revised: 27 February 2014 / Accepted: 4 March 2014 / Published: 7 March 2014
(This article belongs to the Section Sensor Networks)

Abstract

: This paper proposes a practical low-complexity MAC (medium access control) scheme for quality of service (QoS)-aware and cluster-based underwater acoustic sensor networks (UASN), in which the provision of differentiated QoS is required. In such a network, underwater sensors (U-sensor) in a cluster are divided into several classes, each of which has a different QoS requirement. The major problem considered in this paper is the maximization of the number of nodes that a cluster can accommodate while still providing the required QoS for each class in terms of the PDR (packet delivery ratio). In order to address the problem, we first estimate the packet delivery probability (PDP) and use it to formulate an optimization problem to determine the optimal value of the maximum packet retransmissions for each QoS class. The custom greedy and interior-point algorithms are used to find the optimal solutions, which are verified by extensive simulations. The simulation results show that, by solving the proposed optimization problem, the supportable number of underwater sensor nodes can be maximized while satisfying the QoS requirements for each class.

1. Introduction

As an emerging technique, underwater acoustic sensor networks (UASN) have a wide range of applications, such as oceanographic data collection, environment monitoring, undersea exploration, disaster prevention, assisted navigation and tactical surveillance [15]. In order to implement these applications, underwater nodes communicate with each other via acoustic channels that have unique characteristics, including the limited available bandwidth and a high and variable propagation delay [69].

In this paper, we consider a UASN that has a cluster-based network topology, in which each cluster is governed by a clusterhead (or gateway node), since it makes the network scalable and can readily provide network connectivity in a harsh communication environment [5,1013]. In addition, the considered UASN consists of different types of underwater sensor nodes, some of which generate more important data than others, i.e., the sensing data from some sensors may need to be delivered to the clusterhead with a higher PDR (packet delivery ratio). Therefore, the network needs to provide the sensor nodes with differentiated QoS (quality of service) in terms of PDR based on the QoS class to which the sensor nodes belong.

In such a network, an important problem is to maximize the number of nodes that the network can accommodate while still providing the required QoS for each class. In addition, as a related problem, when the operators deploy a UASN, they would want to know the achievable PDR value given the number of sensor nodes in the network. Intuitively, if the number of nodes in a UASN increases beyond a specific amount, the network may not be able to provide the demanded QoS, due to a high level of network traffic.

In order to address the problem of maximizing the supportable number of nodes, we focus on the MAC (medium access control) layer, since it plays a key role for providing QoS and dominates the overall performance of the network [14]. In particular, contention-based MAC protocols have received a lot of attention, due to the simplicity and applicability in UASNs [1529]. Among various contention-based MAC protocols, Aloha-CS (Aloha with carrier sensing) is a potential low-complexity protocol for UASNs, since it offers a high throughput and low latency in a low network load without requiring time synchronization or a handshaking mechanism [1820].

In this paper, we design a practical low-complexity QoS-aware MAC scheme and an optimization formulation for maximizing the supportable number of sensors in UASNs. We first estimate the packet delivery probability (PDP) in the MAC layer. Then, based on the PDP estimation, an optimization problem is formulated for maximizing the supportable number of sensors in a specific QoS priority class. The main idea of the formulation is to find optimal values of the maximum packet retransmissions for each QoS class, such that the number of nodes in a specific QoS class is maximized and every node can achieve the required QoS.

The custom greedy and interior-point algorithms are used to find the solutions to the optimization problem. Furthermore, extensive simulations are performed to verify the solutions. The simulation results show that our optimization formulation can maximize the supportable number of underwater sensor nodes, while satisfying the QoS requirement for each class.

The rest of this paper is organized as follows. Section 2 presents the related studies and compares them with the proposed scheme. The system model and problem definition are described in Section 3. Section 4 first discusses the packet delivery probability approximation, then describes the optimization problem formulation. We also discuss the approximation of the background traffic. The performance analysis using various scenarios is presented in Section 5, in which we also discuss solutions and the simulation setup. Finally, Section 6 concludes the paper.

2. Related Work

MAC protocols for UASN can be categorized into contention-free and contention-based protocols. The contention-free protocols include time division multiple access (TDMA), frequency division multiple access (FDMA) and code division multiple access (CDMA), in which different time slots, frequency bands or codes are assigned to different users to avoid collisions among transmissions.

FDMA divides the available frequency band into several sub-bands and assigns each sub-band to a node. Due to the limited available bandwidth of underwater channels, FDMA is not suitable for UASNs that consist of a large number of underwater sensors.

In TDMA, in order to avoid the collision of packets from adjacent time slots, guard times are added to the time slot. The high propagation delay in underwater acoustic communication channels requires long guard times, which limit the efficiency of TDMA [30]. Moreover, TDMA systems require precise synchronization for proper utilization of the time slots.

It is also known that CDMA-based protocols require a high complexity design for UASN. In addition, it is a challenging problem to assign pseudo-random codes to a large number of sensor nodes [2].

On the other hand, contention-based protocols have received significant attention for UASN, due to their simplicity, acceptable throughput and energy efficiency [1523]. For example, the authors of [15] studied the performance of Aloha-based protocols in underwater networks and proposed two enhanced schemes that take advantage of the long propagation delay in the underwater acoustic channel and do not require handshaking or time synchronization.

It was also shown that, under the high and varying propagation delay in underwater acoustic channels, the performance of slotted Aloha becomes similar to that of pure Aloha [23]. The study in [16] proposed a propagation delay-tolerant Aloha protocol, where the authors address the space-time uncertainty by adding guard times to slotted Aloha.

Another simple yet practical Aloha-based protocol, Aloha-CS (Aloha with carrier sensing), was also studied and evaluated in [15,1820]. In Aloha-CS, a node senses the carrier on the channel before it transmits data. The intended receiver sends an acknowledgment (ACK) packet to the source node to announce the successful reception. For unsuccessful transmissions, the retransmission mechanism with an exponential backoff can be also applied, i.e., the data packet can be retransmitted up to a maximum limit of retries unless an ACK packet is received at the source node. According to the results presented in these studies, Aloha-CS (Aloha with carrier sensing) [1820] can achieve high throughput and low latency without requiring time synchronization or handshaking.

The authors of [21] proposed an extension of the FAMA protocol [31] for UASN, namely slotted FAMA. Slotted FAMA is also based on carrier sensing and handshaking prior to data transmission. The new idea of slotted FAMA is that it uses time slotting to eliminate the requirement for excessively long control packets. The study in [22] proposed a reservation-based MAC protocol, T-Lohi, where a node sends a short tone to count the number of contenders. If it does not receive any other tones, it starts data transmission. Otherwise, it goes to the backoff mode.

Although our work is also based on channel contention, those studies differ from ours since they do not consider the provision of QoS or optimality.

There are few MAC protocols that address QoS provision in UASNs. However, there have been several MAC protocols that considered QoS provision for wireless sensor networks [3239].

In particular, the authors of [37] proposed I-MAC, a hybrid TDMA/CSMA-based MAC protocol for wireless sensor networks. The I-MAC protocol is composed of two phases: the setup and transmission phases. During the setup phase, neighbor node discovery, slot assignment, local framing and global synchronization operations are successively performed. If a node owns assigned slots, it transmits data using those slots. If a node does not own any slot, it uses CSMA to access the channel. By using a different value of the CW (contention window), some groups of nodes can have a higher priority for accessing the channel.

As another example, the study in [38] proposed a MAC protocol that supports QoS in wireless sensor networks. It also uses a hybrid scheduling technique where dedicated time slots are assigned for data packet transmissions, and CSMA/CA-based random access periods are used for control packet transmissions. The MAC protocol consists of four phases: time synchronization, request for time slots, reception of slot schedules and data transfer.

However, the studies in [37,38] do not consider satisfying a given QoS requirement. In addition, they require tight time synchronization and overheads for slot requests and assignments. In contrast, the objective of our work is to design a low-complexity MAC scheme that supports differentiated QoS without requiring time synchronization or scheduling overheads.

There also have been attempts to design a QoS-aware MAC protocol based on channel contention for a wireless sensor network. For example, the study in [39] considered a transmitter-only network and proposed a MAC protocol to provide QoS using an optimal number of transmissions. That work also differs from ours, since it considered a network of nodes without an RFreceiver or packet queuing and a fixed number of transmissions of each packet in a given time interval. Moreover, the objective is different from that in our paper.

3. System Model and Problem Definition

In this paper, we consider a cluster-based UASN, where each cluster is governed by a clusterhead (or gateway node). As shown in Figure 1, each underwater sensor node (or, simply, U-sensor or node) belongs to one cluster. The clusterhead collects sensing data from U-sensors, performs data aggregation/fusion and then forwards the data to the underwater sink node. Clusterheads are equipped with two communication interfaces, so that they can use different channels for communicating with U-sensors and other clusterheads, respectively.

It is assumed that communications in a cluster do not interfere with communications in other clusters, due to the use of different carriers, and U-sensors transmit sensed data to the clusterhead using a direct acoustic channel [40]. Assigning channels to adjacent clusters or nodes has been considered in several studies [4145].

U-sensors in a cluster are classified into several QoS classes, each of which has a required packet delivery ratio (PDR). In this paper, required PDR values are used to determine QoS classes. Every node generates a data packet at a predetermined rate and transmits them to the clusterhead. U-sensors in each QoS class are allowed to retransmit each data packet up to the maximum number of retransmissions, unless they receive the corresponding ACK packet from the clusterhead within the ACK timeout interval. Before a U-sensor transmits data, it first performs carrier sensing to assure that the channel is idle. It also performs exponential back-offs when collisions occur.

The considered optimization problem is the maximization of the number of nodes in a specific QoS class, which will be selected by the operators of the network, while providing the QoS for every node in each class.

In order to facilitate discussion, suppose that a set of N nodes in a cluster is divided into m QoS classes, (Q1,Q2,…,Qm), where class Qi contains ni nodes (1 ≤ im). Nodes in each QoS class have a packet size, si, and the corresponding packet transmission delay, t d i. Each node in class Qi is allowed to retransmit each data packet up to xi times and requires a minimum PDR of pi, where xi denotes the maximum number of retransmissions. Suppose also that class Qk is selected to maximize the number of nodes in the class, where 1 ≤ km.

Therefore, in order to achieve the objective, while providing differentiated QoS to nodes, the core problem is to determine an optimal value of xi for each class, Qi, such that nk is maximized and every node in each class can achieve a PDR of at least pi.

4. Maximization of the Supportable Number of Sensors

In this section, we first describe the approximation of the packet delivery probability. Then, we present the formulation of the optimization problem. In addition, we discuss algorithms for finding solutions.

4.1. PDP Approximation

We first define the packet delivery probability (PDP) as the probability that a packet is successfully delivered at the clusterhead when it can be retransmitted up to x times.

In a UASN, the packet generation rate is usually low, due to the limited bandwidth. In such a network, very few packet losses result from the buffer overflow, since available space is likely when a new packet is generated. Consequently, PDP values can approximate PDR values in a UASN. Therefore, PDP is used in the optimization formulation for PDR.

Now, we discuss the approximation of the PDP of nodes in each class, Qi, where a node can retransmit a packet up to xi times. In order to approximate the PDP value, we first assume that the packet arrival in a UASN follows a Poisson process, which will also be verified in the following discussion. Then, the probability of k packet arrivals during an interval of time t is given by:

P [ n = k ] = e λ t ( λ t ) k k !
where λ represents the arrival rate of background traffic in a time interval of t [46].

A U-sensor node in each class, Qi, transmits to the clusterhead a data packet in every interval, T. Suppose that a data packet arrives at the clusterhead at time t0 with the transmission delay of t d i. In order to avoid collisions for a packet that is transmitted from a node in class Qi, no packets from the other N – 1 nodes should arrive at the clusterhead during the interval [ t 0 t d i , t 0 + t d i ], i.e., there should be no packet arrival during the interval of 2 t d i.

Let P s i and P f i denote the probabilities of the successful and failed packet transmissions of a node in class Qi at the clusterhead, respectively, where P f i = 1 P s i. Furthermore, let λb denote the arrival rate of the background traffic for a node in an arbitrary class. Then, the probability that a data packet, which is transmitted from a node in class Qi, is successfully delivered at the clusterhead is given by:

P s i = e 2 λ b t d i

In order to verify the assumption of Poisson distribution of the packet arrival in a UASN, where a node performs carrier sensing and exponential back-offs, we conduct a simple simulation using Aloha and Aloha-CS protocols. The considered cluster in the network consists of 50 U-sensors and one clusterhead that are randomly deployed over an area of 1,555 m × 1,555 m. In this example, for simplicity, we assume that there is only one QoS class, Q1. Each U-sensor node is equipped with a half-duplex acoustic transceiver that has a data rate of 14 Kbps. Every U-sensor periodically generates a data packet of 160 bytes and sends it to the clusterhead. Each node is allowed to retransmit one data packet up to three times, unless it receives the corresponding ACK packet from the clusterhead. We calculate the probability of successful packet transmission in class Q1, P s 1, according to Equation (2), and determine the actual successful individual packet transmission ratio from simulation. Then, we compare the value of P s 1 from analysis and that from simulation.

As shown in Figure 2, over different network loads from 1 Kbps to 6 Kbps, the approximation of P s i is fairly similar to the actual successful individual packet transmission ratio. Therefore, in our work, we use the assumption that packet arrivals follow a Poisson process to design the optimization formulation. Now, we define P s i , j and P f i , j as the probabilities of the successful and failed delivery of the j -th transmission of a packet of nodes in class Qi, respectively. Furthermore, let P(xi) denote the PDP that the nodes in class Qi can achieve, and recall that one data packet can be retransmitted up to xi times. Then, P(xi) can be expressed as:

P ( x i ) = P s i , 1 + P f i , 1 P s i , 2 + + P f i , 1 P f i , x i 1 P s i , x i

Since each packet transmission can be regarded as an independent event based on the assumption of a Poisson process, P s i , j = P s i and P f i , j = P f i for all j (j = 1…xi). Therefore, P(xi) becomes:

P ( x i ) = P s i 1 ( P f i ) x i 1 P f i = 1 ( P f i ) x i = 1 ( 1 e 2 λ b t d i ) x i

In the following section, we present an optimization formulation for maximizing the number of sensors in UASN, while satisfying the QoS requirement.

4.2. Optimization Problem Formulation

In this subsection, we describe the proposed optimization problem formulation that is a non-linear optimization problem.

Recall that the nodes in each class, Qi, need to guarantee their PDR requirement of at least pi. In other words, the approximated PDP of the nodes in each class needs to be at least pi. Specifically, the constraint function is expressed as:

1 ( 1 e 2 λ b t d i ) x i p i

The actual arrival rate of background traffic for a node in an arbitrary class, λb, is the total number of packet arrivals from the other N – 1 nodes in the time interval. It is a challenging problem to calculate the exact value of λb, since the actual number of retransmissions for one data packet at a given time depends on the network traffic and status. Therefore, to simplify the problem, we use the maximum arrival rate of background traffic generated by all nodes in the network, λmax. In the following discussion, we prove that the required PDR can be satisfied by using λmax.

In order to calculate the value of λmax, we use the maximum number of retransmissions for each class, Qi, which is denoted by xi. Then, the maximum arrival rate of background traffic is given by:

λ max = i = 1 m n i x i T

Then, the constraint function in which we use the maximum arrival rate, λmax, is given as:

1 ( 1 e 2 λ max t d i ) x i p i

Lemma 1

Suppose that we use the maximum arrival rate of background traffic, λmax, to formulate the optimization problem. If we can determine an optimal value of xi that satisfies the constraint function in Equation (7), then we can assure that xi also satisfies the constraint function in Equation (5).

Proof

When we use the actual arrival rate of background traffic for calculating Ps, then P s i ( λ b ) = e 2 λ b t d i. Similarly, when we use the maximum arrival rate of background traffic to calculate P s i, then P s i ( λ max ) = e 2 λ max t d i. From the fact that λmaxλb, we have 1 e 2 λ max t d i 1 e 2 λ b t d i. Note that the value of xi is a positive integer. Therefore, we have the following relation:

1 ( 1 e 2 λ max t d i ) x i 1 ( 1 e 2 λ b t d i ) x i

According to the constraint function in Equation (7), if we can find a value of xi that satisfies Equation (7), then the inequality 1 ( 1 e 2 λ max t d i ) x i p i is always true. Combining the relation represented in Equation (8) and the constraint in Equation (7), we can achieve the following relation:

p i 1 ( 1 e 2 λ max t d i ) x i 1 ( 1 e 2 λ b t d i ) x i

As a result, since xi satisfies the constraint function in Equation (7) in which the maximum arrival rate of background traffic, λmax, is used, then it also satisfies the constraint function in Equation (5) that uses the actual arrival rate of background traffic, λb.

Therefore, we have the formulation of P(xi) for each class as follows:

P ( x i ) = 1 ( 1 e 2 λ max t d i ) x i

Now, we describe our optimization problem formulation.

The objective of our optimization problem is to maximize the supportable number of nodes in a class, Qk, nk, where k is a given integer number from one to m. Note that Qk has the PDR requirement of pk. In order to maximize nk, we determine the relationships between nk and other variables. More specifically, from the fact that P(xk) ≥ pk, we have:

1 ( 1 e 2 λ max t d k ) x k p k

We replace λmax based on Equation (6) to show:

1 ( 1 e 2 t d k T ( n 1 x 1 + + n k x k + + n m x m ) ) x k p k

From Equation (12), we obtain the following inequality:

n k 1 x k ( T 2 t d k ln ( 1 ( 1 p k ) 1 x k ) + i = 1 i k m n i x i )

Then, the optimization formulation is that, given ni (ik) and p1, p2, …, pm, find x1,x2, …,xm, such that:

max [ 1 x k ( T 2 t d k ln ( 1 ( 1 p k ) 1 x k ) + i = 1 i k m n i x i ) ]
subject to:
( 1 e 2 λ max t d i ) x i ( 1 p i ) 0 , i = 1 m
1 x i l , i = 1 m

The constraint in Equation (15) is based on the requirement that the value of xi should guarantee P(xi) ≥ pi, where P(xi) is calculated according to the Equation (10). In addition, the value of xi is limited by an upper bound, l, as impressed in constraint Equation (16).

4.3. Finding Solutions

In order to find solutions to the proposed optimization formulation, we use a custom developed greedy algorithm and the interior-point method.

In the greedy algorithm, for each solution vector x = (x1,x2, …,xm), the maximum value of nk is first calculated by using Equation (13). If all PDR constraints are met using the vector and the value of nk, it stores those values and checks other vectors. Otherwise, nk is decremented until all constraint are satisfied. Among all possible nk values, the maximum is selected as n k max, and the corresponding vector, x, is returned as a solution. The detailed algorithm is presented in Algorithm 1. Since there are m QoS classes, the vector of the optimum variable has m elements. Each xi can be one integer value from one to l (the upper bound of xi). Then, we have lm possible solutions. Furthermore, for each solution, up to nk times need to be evaluated. As a result, the worst-case computational complexity becomes O(Ulm), where U represents the upper bound of the node number in the system.

It is also worthwhile to note that even though the greedy algorithm seems to be expensive in terms of computational complexity, it may be affordable in a practical scenario. For example, when there are 3 QoS classes and l = 7, in most cases, less than 7,000 iterations are needed in our experiments, which is fairly acceptable, considering the computing power of modern computing systems.

In addition, the interior-point algorithm is used to find the solutions. The interior-point algorithm has been developed to solve linear or non-linear convex optimization problems with inequality constraints in a short amount time. The basic idea of this algorithm is to decompose the problem into a sequence of equality constrained problems and apply Newton's method to each problem [47]. There are a lot of variations of the interior-point method, and many of them have been shown to have a polynomial time complexity [48]. In this paper, we use the MATLAB optimization toolbox for the interior-point method with the assumption that each xi is a real number. Then, for simulation, we take the ceiling of xi after the solution is obtained, since the xi value should be an integer number in the real world. Note that, due to the real number relaxation and non-convexity of the objective function, it is possible that the solutions may not be the global optimal or may not even satisfy the required constrains. However, according to the simulation results, in most cases, the observed solutions are close to the global optimal values.


Algorithm 1 The Custom Greedy Algorithm

Inputs:
m: number of QoS classes
T: packet interval
t d i ( i = { 1 m } ): transmission delay in class Qi
ni(ik, i = {1…m}): number of nodes in each class except class Qk
pi(i = {1…m}): PDR requirement in class Qi
l: maximum number of retransmissions
U: MAX_NODE (upper bound of the node number in the system)
Outputs:
The maximum supportable number of nodes x i opt in class Qk and the corresponding optimal number of retransmission for each class
1:λmax = 0;
2: x i opt = 0 ;i = {1…m}
3:nk = 0;
4: n k max = 0 ;
5:for each (xi, …, xm) ∈ {1…l} do
6: n k = min ( 1 x k ( T 2 t d k ln ( 1 ( 1 p k ) 1 x k ) + i = 1 i k m n i x i ) , U i = 1 i k m n i ) ;
7:while n k > n k max do
8:   λ max = i = 1 m n i x i T ;
9:   P ( x i ) = 1 ( 1 e 2 λ max t d i ) x i ;i = {1…m}
10:  if P(xi) ≥ pii = {1…m} then
11:    n k max = n k ;
12:    x i opt = x i ;i = {1…m}
13:   break;
14:  end if
15:  nk = nk − 1;
16:end while
17:end for
18:return : x i opt, ∀i = {1…m}

5. Performance Study

In this section, we first describe the simulation setup and then analyze the results of the simulations.

5.1. Simulation Setup

In order to evaluate the performance of the proposed protocol, we first consider a cluster with three QoS classes. Then, we extend our discussion to the case of four QoS classes. Finally, we consider a case where each QoS class has a different packet size.

When there are three QoS classes, the nodes in a cluster are partitioned into three QoS (in terms of PDR) classes (Q1,Q2,Q3), where Q3 is the selected QoS class in which we want to maximize the supportable number of sensors (i.e., k = 3). It is assumed that the required PDR values for Q1 and Q2 are p1 = 0.95 and p2 = 0.8, while the PDR requirement for Q3 (p3) is a variable parameter. Furthermore, we suppose that the numbers of sensor nodes in classes Q1 and Q2 are five and 15, respectively (i.e., n1 = 5,n2 = 15).

In case of four QoS classes, the nodes in the cluster are divided into four QoS classes, and Q4 is the selected QoS class (i.e., k = 4). The required PDR values for Q1, Q2 and Q3 are p1 = 0.95, p2 = 0.9 and p3 = 0.8, respectively. The PDR requirement for Q4 (p4) is a variable parameter. The numbers of sensor nodes in classes Q1, Q2 and Q3 are five, 15 and 20, respectively.

In this paper, for practical simulation, we used the DESERTunderwater simulation framework [20], which incorporates spreading loss and various underwater noises, such as turbulence, shipping, wind and thermal noises. The observed solutions to the optimization formulation in Equations (14)(16) are used as inputs for the simulations. The value of the maximum number of sensor nodes in the selected class is calculated using the solution. Then, this obtained value is also used for simulations as the number of nodes in the selected class.

Each node is equipped with a half-duplex acoustic transceiver that has a data rate of 14 Kbps and a transmission range of 1,100 m. The speed of the underwater acoustic signal is assumed to be 1,500 m/s. The data generation rate applies to every node in the network. The upper bound of the maximum number of retransmissions is set to seven.

5.2. Performance Analysis

In this subsection, we first present simulation results for a case with three QoS classes and discuss the results. Then, in order to show that our approach can support an arbitrary number of QoS classes, we extend our discussion to the case where a cluster has four QoS classes. Finally, we present the simulation results and analysis for a case where each of three QoS classes has a different packet size.

5.2.1. Analysis of Results for Three QoS Classes

In this case, we consider a cluster that has three QoS classes. We first discuss the effects of the PDR requirement for a QoS class on PDR and on the maximum number of nodes in that QoS class. Then, we continue our discussion for the effects of the network load on the network performance. We assume that the PDR requirement of Q3 varies and the PDR requirements of Q1 and Q2 are given.

The effects of PDR requirement for class Q3:

In this case, every node transmits a data packet of 160 bytes to the clusterhead in every interval of T = 64 s, which leads to the transmission rate of 20 bps. The PDR requirement for class Q3 is varied from 0.7 to 0.86.

Tables 1 and 2 show the effects of the PDR requirement for class Q3 on the PDR and on the maximum supportable number of nodes in class Q3, when the greedy and interior-point algorithms are used, respectively. The tables show required PDR values (Preq), a solution, x, calculated PDR values using optimal solutions (Panal), PDR values collected from simulations (Psim) and the maximum number of nodes in Q3 ( n 3 max), calculated using the solution, which is also used for simulations.

As shown in Table 1, when the required PDR for class Q3 varies from 0.7 to 0.86, the maximum supportable number of sensor nodes in this class decreases from 84 to 50. The results indicate that, when the PDR requirement for the selected class decreases, the considered cluster in the network can accommodate a larger number of nodes, while satisfying the required PDR. For instance, if the PDR requirement for the nodes in class Q3 is 0.86, the considered cluster in the network can support 50 nodes in this class. However, if class Q3 is required to provide a PDR of 0.7, the considered cluster can support 84 nodes in class Q3. It is intuitive that the number of supportable nodes becomes greater as the required PDR decreases. However, one interesting point is that the supportable number of nodes is very sensitive to the PDR requirement. More specifically, when the PDR requirement of Q3 is lowered from 0.86 to 0.7 (e.g., 18.6% decrease), the supportable number of nodes in Q3 increases by approximately 68%.

Now, we discuss the selection of optimal x values to maximize the n3 and meet the requirements using examples in Table 1. As shown in Table 1, when P 3 req is 0.76, the achievable P 3 anal is only 0.761 with x3 = 2. This indicates that when P 3 req becomes 0.78, P 3 anal cannot meet the requirement any longer with x3 = 2, i.e., 0.761 is less than 0.78. From Equation (11), there are two ways to increase P 3 anal (suppose that k = 3). One way is to increase the value of xk in the left-hand side (lhs) of Equation (11). As xk increases, the lhs increases accordingly. Another way is to reduce λmax. It is clear that the lhs decreases as λmax decreases. It can be seen that, from Equation (6), the value of λmax depends on xi, where 1 ≤ im.

Note that our greedy algorithm tests all possible cases. In this particular case, it appears that reducing λmax results in a larger n3, i.e., x1 and x2 values are decreased to reduce λmax. This can be also regarded as follows. In order to increase P 3 anal, P 1 anal and P 2 anal are sacrificed by reducing x1 and x2. This also agrees with the results in Table 1 when P 3 req is 0.78, P 1 anal and P 2 anal values have lower values with less x1 and x2 values than when P 3 req is 0.76.

It is also possible in some cases that the greedy algorithm selects a higher x3 value with which a maximal n3 value can be obtained, while satisfying the requirements. For example, when P 3 req values are varied from 0.82 to 0.84 in Table 1, the algorithm selects an increased value of x3 to maximize n3. In this case, x1 and x2 are also increased to meet P 1 req and P 2 req, respectively. Note that when x3 increases, λmax also increases. However, in this case, the P 3 req gain from raising x3 is higher than that lost from increasing λmax. Therefore, P 3 req increases when a greater x3 value is used.

Another point to note is that when P 3 req varies from 0.8 to 0.82, n 3 max also changes from 64 to 58, even with the same xi values. This is because n 3 max depends on P 3 req, as shown in Equation (13). Furthermore, note that P 1 sim, P 2 sim and P 3 sim values increase, since n 3 max has a lower value with the same xi values.

The results in Table 1 also show that, in all cases, both Panal and Psim are greater than Preq, i.e., the required PDR is always satisfied for all classes. This indicates that, by using the solution to the optimization formulation, the maximum number of nodes in a specific class can be obtained while satisfying the required PDR for all classes.

Table 2 shows the results based on the solution obtained using the interior-point algorithm. The results are close to those in Table 1, except that xi and n 3 max are real numbers. Recall that the ceilings of xi and the floor of n 3 max values are used for simulations. When the PDR requirement of class Q3 varies from 0.7 to 0.86, the maximum number of nodes in class Q3 decreases from 87 to 53.

Furthermore, note that, as shown in Tables 1 and 2, there are differences between Panal and Psim values, and in all cases, Psim values are greater than Panal values. In particular, we can observe these phenomena more clearly in Table 1, where there is no distortion, due to the ceiling effect. The reason for these phenomena is that the maximum arrival rate of background traffic, λmax, is used to calculate Panal, which results in a lower value of Panal. Therefore, this value can be considered as the lower bound of the PDR that can be achieved, and the results also agree with Lemma 1. In terms of n 3 max, the greedy algorithm and interior-point algorithm show similar results, i.e., interior-point algorithm outputs three more nodes on average. Note that the greedy algorithm shows a higher PDR for the highest priority group, i.e., P 1 sim with the greedy algorithm shows a 0.0091 higher value than with interior point algorithm. Since the greedy algorithm shows a comparable performance in terms of n 3 max and it shows a higher PDR, which is important for guaranteeing QoS, from now on, we focus on the results from the greedy algorithm.

Effects of Node Load

In this case, the PDR requirement for class Q3 is fixed to 0.7. Each underwater sensor periodically generates data packet of 160 bytes. Every node in the cluster transmits data at the rate from 20 bps to 50 bps to the clusterhead, i.e., every node transmits data at every interval from T = 25.6 s to 64 s.

Table 3 shows the PDR requirements for each class ( P 1 req, P 2 req, p 3 req) and the various node loads in the network. It also shows the solution (x1, x2, x3) and the maximum supportable number of nodes in class Q3 ( n 3 max) determined from the optimization formulation. The greedy algorithm is used to find the solutions in Table 3.

As shown in Table 3, all solutions have the same vector, x. Note that the node load is controlled by varying the packet transmission interval, T. Then, from Equation (13), it can be seen that nk is inversely proportional to the node load. In other words, nk and T are linearly dependent with given pi and xi values, which indicates that nk depends more on the change of the T value than on the change of xi values.

In order to facilitate understanding, we show and compare Preq, Panal and Psim over different node loads in Figure 3. Furthermore, to show the confidence level of simulations, we present the standard deviation of Psim values along with mean values in Figure 3.

From Figure 3, we can see that, when the node load is high, a smaller number of nodes in class Q3 can be supported. On the contrary, when the node load becomes lower, the considered cluster in the network can accommodate a larger number of nodes in class Q3, while meeting the PDR requirements.

More specifically, Figure 3 shows that the nodes in all classes can satisfy their PDR requirements over various node loads. However, when the node load increases from 20 bps to 50 bps, the maximum supportable number of nodes in class Q3 shows a sharp decline from 84 to 12. In particular, up to the 30 bps node load, the supportable number of nodes in Q3 decreases sharply. Figure 3 also indicates that, by using the optimal value of the maximum number of retransmissions, the average PDR value of nodes in all classes are above their PDR requirements as the node load increases. For example, in Figure 3a, which shows obtained PDR values for class Q1, the average PDR values from both the analytical model and simulation are always equal to or greater than the required PDR value, 0.95. This also applies to class Q2 and class Q3 in Figure 3b,c, respectively.

5.2.2. Analysis of Results for Four QoS Classes

In this section, we show that the proposed scheme can support four QoS classes. The greedy algorithm is used to find the solution in this experiment.

Effects of PDR Requirement for Class Q4

Similarly to the case of three QoS classes, every node transmits a data packet of 160 bytes to the clusterhead in every interval of T = 64 s, which leads to the transmission rate of 20 bps. The PDR requirement for class Q4 is varied from 0.7 to 0.86.

Table 4 shows the effects of the PDR requirement for class Q4 on the PDR values of the nodes in each QoS class, which are obtained from the greedy algorithm and simulations. It also shows the obtained maximum supportable number of nodes in class Q4 using the optimal x values.

As shown in Table 4, when the required PDR for class Q4 varies from 0.7 to 0.86, the maximum supportable number of sensor nodes, n 4 max, in this class decreases from 46 to 25 or, equivalently, the maximum supportable number of sensor nodes in the considered cluster decreases from 86 to 65. More specifically, if the required PDR for class Q4 is 0.7, the considered cluster can support 46 nodes in this class. On the other hand, if the PDR requirement for the nodes in class Q4 is 0.86, the cluster can support only 25 nodes in class Q4.

Note that, in some cases, n 4 max remains the same even when P 4 req increases. For example, when P 4 req varies from 0.74 to 0.80, n 4 max keeps the value of 36. This is because the effect of the P 3 req 's change is not enough for changing the nk value in Equation (13). Furthermore, P 3 anal = 0.83 is sufficient for P 3 req values from 0.74 to 0.80, which results in the same xi values and nk. The results also indicate that, among all feasible solutions, the solution x = {4,3,2,2} can achieve the maximum number of nodes in Q4 in the given P 4 req range.

Effects of Node Load

In this case, the PDR requirement for class Q4 is fixed to 0.7. Every node in the cluster transmits data at the rate from 18 bps to 30 bps to the clusterhead with the data packet size of 160 bytes, i.e., every node transmits data at every interval from T = 42.67 s to 71.11 s. Figure 4 compares Preq, Panal and Psim over different node loads for all QoS classes.

As shown in Figure 4, the case of four classes shows a similar pattern to the three-class case. When the node load is small, a higher number of nodes in class Q4 can be supported. When the node load becomes higher, the considered cluster in the network can accommodate a smaller number of sensor nodes in class Q4, while satisfying the PDR requirements. Furthermore, the nodes in all classes can meet their PDR requirements over various node loads.

5.2.3. Analysis of Results for Three QoS Classes with Different Packet Sizes

In this subsection, we consider a case where each QoS class has a different packet size. The sensor nodes in class Q1, Q2 and Q3 periodically generate data packets of 300 bytes, 200 bytes and 150 bytes, respectively. The PDR requirement for class Q3 is varied from 0.7 to 0.9. We discuss the effects of the PDR requirement for class Q3 on the maximum number of sensor nodes in class Q3.

From Table 5, we can see that the nodes in all classes satisfy their PDR requirements, i.e., the Psim and the Panal values are greater than Preq values. As the required PDR for class Q3 increases from 0.7 to 0.9, the maximum supportable number of sensor nodes in this class decreases from 51 to 27 nodes. The results also implicate that, in order to satisfy the required PDR for all classes, the maximum number of nodes in selected class decrease as the required PDR for this class increases.

Another point to note in Table 5 is that in many cases, n 3 max keeps the same value of 40. When P 3 req is 0.74, the algorithm selects x = {6,2,2} with which the obtained values of n 3 max = 40 and P 3 anal = 0.873. When P 3 req becomes 0.76, nk is calculated again using Equation (13). In this case, it appears that the effect of the P 3 req 's change is not significant to change the new nk value. Moreover, P 3 anal = 0.873 is sufficient for new P 3 req = 0.76. Therefore, the nk remains at the same value. The phenomenon continues until P 3 req becomes 0.86, which has a sufficient impact on changing the nk value in Equation (13). When P 3 req varies from 0.88 to 0.9, P 3 anal = 0.895 does not meet the new P 3 req = 0.9. Therefore, as shown in Equation (11), x3 should be increased or λmax should be reduced. In this case, the algorithm chooses to reduce λmax by decreasing the x1 value from six to five, since it leads to a larger value of n 3 max.

6. Concluding Remarks

In this paper, we have proposed a practical and low-complexity MAC scheme that does not require time synchronization or scheduling overhead, for QoS-aware and cluster-based underwater acoustic sensor networks (UASN). In particular, we have considered an optimization problem to maximize the supportable number of sensor nodes in UASNs that are required to provide differentiated QoS in terms of PDR. In order to address the problem, the packet delivery probability (PDP) has been estimated, and based on the estimation, an optimization formulation has been designed to determine optimal values of the maximum number of packet retransmissions for each QoS class. The greedy and interior-point algorithms are used to find the solutions, which are verified by simulations. The simulation results have shown that, by solving the proposed optimization formulation, the supportable number of underwater sensor nodes can be maximized, while satisfying the QoS requirements for each class.

Acknowledgments

This work was supported by the 2012 Research Fund of University of Ulsan.

Author Contributions

Seokhoon Yoon and Thi-Tham Nguyen developed the network architecture and algorithms. The experimental simulations of this work were conducted by Thi-Tham Nguyen. Seokhoon Yoon, Thi-Tham Nguyen and Duc Van Le performed analysis and wrote the manuscript. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this article.

References

  1. Lloret, J. Underwater sensor nodes and networks. Sensors 2013, 13, 11782–11796. [Google Scholar]
  2. Akyildiz, I.F.; Pompili, D.; Melodia, T. Underwater acoustic sensor networks: Research challenges. J. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar]
  3. Heidemann, J.; Ye, W.; Wills, J.; Syed, A.; Li, Y. Research Challenges and Applications for Underwater Sensor Networking. Proeedings of the IEEE Wireless Communications and Networking Conference (WCNC'06), Las Vegas, NV, USA, 3–6 April 2006; pp. 228–235.
  4. Heidemann, J.; Stojanovic, M.; Zorzi, M. Underwater sensor networks: Applications, advances, and challenges. Philos. Trans. R. Soc. A 2012, 370, 158–175. [Google Scholar]
  5. Akyildiz, I.F.; Pompili, D.; Melodia, T. State of the art in protocol research for underwater acoustic sensor networks. SIGMOBILE Mob. Comput. Commun. Rev. 2007, 11, 11–22. [Google Scholar]
  6. Sozer, E.M.; Stojanovic, M.; Proakis, J.G. Underwater acoustic networks. IEEE J. Ocean. Eng. 2000, 25, 72–83. [Google Scholar]
  7. Stojanovic, M. On the Relationship between Capacity and Distance in an Underwater Acoustic Communication Channel. Proceedings of the 1st ACM International Workshop on Underwater Networks (WUWNet 06), Los Angeles, CA, USA, 25 September 2006.
  8. Stojanovic, M.; Preisig, J. Underwater acoustic communication channels: Propagation models and statistical characterization. IEEE Commun. Mag. 2009, 47, 84–89. [Google Scholar]
  9. Stojanovic, M. Acoustic Underwater Communications; Proakis, J.G., Ed.; Wiley: New York, NY, USA, 2003; Chapter: Encyclopedia of Telecommunications. [Google Scholar]
  10. Chitre, M.; Shahabodeen, S.; Stojanovic, M. Underwater acoustic communications and networking: Recent advances and future challenges. Mar. Technol. Soc. J. 2008, 42, 103–116. [Google Scholar]
  11. Domingo, M.C.; Prior, R. A Distributed Clustering Scheme for Underwater Wireless Sensor Networks. Proceedings of the 18th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Athens, Greece, 3–7 September 2007; pp. 1–5.
  12. Sharad, S.; Shailendra, M.; Mayank, S. Clustering based on node density in heterogeneous underwater sensor network. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 2013, 5, 49–55. [Google Scholar]
  13. Salva-Garau, F.; Stojanovic, M. Multi-Cluster Protocol for Ad Hoc Mobile Underwater Acoustic Networks. Proceedings of OCEANS 2003, San Diego, CA, USA, 22–26 September 2003; pp. 91–98.
  14. Yigitel, M.A.; Incel, O.D.; Ersoy, C. QoS-aware MAC protocols for wireless sensor networks: A survey. Comput. Netw. 2011, 55, 1982–2004. [Google Scholar]
  15. Chirdchoo, N.; Soh, W.S.; Chua, K.C. Aloha-Based MAC Protocols with Collision Avoidance for Underwater Acoustic Networks. Proceedings of the 26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 6–12 May 2007; pp. 2271–2275.
  16. Ahn, J.; Syed, A.; Krishnamachari, B.; Heidemann, J. Design and analysis of a propagation delay tolerant ALOHA protocol for underwater networks. Ad Hoc Netw. 2011, 9, 752–766. [Google Scholar]
  17. Jin, L.; Huang, D. A slotted CSMA based reinforcement learning approach for extending the lifetime of underwater acoustic wireless sensor networks. Comput. Commun. 2013, 36, 1094–1099. [Google Scholar]
  18. Petrioli, C.; Petroccia, R.; Stojanovic, M. A Comparative Performance Evaluation of MAC Protocols for Underwater Sensor Networks. Proceedings of OCEANS 2008, Quebec, QC, Canada, 15–18 September 2008; pp. 1–10.
  19. Peleato, B.; Stojanovic, M. Distance aware collision avoidance protocol for ad-hoc underwater acoustic sensor networks. IEEE Commun. Lett. 2007, 11, 1025–1027. [Google Scholar]
  20. Masiero, R.; Azad, S.; Favaro, F.; Petrani, M.; Toso, G.; Guerra, F.; Casari, P.; Zorzi, M. DESERT Underwater: An NS-Miracle-Based Framework to Design, Simulate, Emulate and Realize Test-Beds for Underwater Network Protocols. Proceedings of OCEANS 2012 MTS/IEEE Yeosu, Yeosu, Korea, 21–24 May 2012; pp. 1–10.
  21. Molins, M.; Stojanovic, M. Slotted FAMA: A MAC Protocol for Underwater Acoustic Networks. Proceedings of OCEANS 2006—Asia Pacific, Singapore, Singapore, 16–19 May 2007; pp. 1–7.
  22. Syed, A.A.; Ye, W.; Heidemann, J. T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks. Proceedings of the 27th Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, USA, 13–18 April 2008; pp. 789–797.
  23. Vieira, L.F.M.; Kong, J.; Lee, U.; Gerla, M. Analysis of ALOHA Protocols for Underwater Acoustic Sensor Networks. In Work in Progess poster at the First ACM International Workshop on UnderWater Networks (WUWNet); ACM: Los Angeles, CA, USA, 2006. [Google Scholar]
  24. Smith, S.M.; Park, J.C.; Neel, A. A Peer-to-Peer Communication Protocol for Underwater Acoustic Communication. Proceedings of OCEANS '97, MTS/IEEE, Halifax, Canada, 6–9 October 1997; pp. 268–272.
  25. Fang, D.; Li, Y.; Huang, H.; Yin, L. A CSMA/CA-Based MAC Protocol for Underwater Acoustic Networks. Proceedings of the 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), Chengdu, China, 23–25 September 2010; pp. 1–4.
  26. Xie, P.; Cui, J.H. Exploring Random Access and Handshaking Techniques in Large-Scale Underwater Wireless Acoustic Sensor Networks. Proceedings of OCEAN 2006, Boston, MA, USA, 18–21 September 2006; pp. 1–6.
  27. Guo, X.; Frater, M.R.; Ryan, M.J. An Adaptive Propagation-delay-tolerant MAC Protocol for Underwater Acoustic Sensor Networks. Proceedings of OCEANS 2007—Europe, Aberdeen, Scotland, 18–21 June 2007; pp. 1–5.
  28. Guo, X.; Frater, M.R.; Ryan, M.J. A Propagation-Delay-Tolerant Collision Avoidance Protocol for Underwater Acoustic Sensor Networks. Proceedings of OCEANS 2006—Asia Pacific, Singapore, Singapore, 16–19 May 2006; pp. 1–6.
  29. Peng, Z.; Zhu, Y.; Zhou, Z.; Guo, Z.; Cui, J.H. COPE-MAC: A Contention-Based Medium Access Control Protocol with Parallel Reservation for Underwater Acoustic Networks. Proceedings of OCEANS 2010, Sydney, Australia, 24–27 May 2010; pp. 1–10.
  30. Proakis, J.G.; Sozer, E.M.; Rice, J.A.; Stojanovic, M. Shallow Water Acoustic Networks; John Wiley and Sons: Boston, MA, USA, 2003; Chapter Encyclopedia of Telecommunications. [Google Scholar]
  31. Fullmer, C.L.; Garcia Luna Aceves, J.J. Floor acquisition multiple access (FAMA) for packet-radio networks. SIGCOMM Comput. Commun. Rev. 1995, 25, 262–273. [Google Scholar]
  32. Yoon, S.; Qiao, C.; Sudhaakar, R.; Li, J.; Talty, T. QoMOR: A QoS-Aware MAC Protocol Using Optimal Retransmission for Wireless Intra-Vehicular Sensor Networks. Proceedings of Mobile Networking for Vehicular Environments 2007, Anchorage, AK, USA, 11 May 2007; pp. 121–126.
  33. Liu, Z.; Elhanany, I. RL-MAC: A QoS-Aware Reinforcement Learning based MAC Protocol for Wireless Sensor Networks. Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, Ft. Lauderdale, FL, USA, 23–25 April 2006; pp. 768–773.
  34. Tan, J.; Chan, M.C.; Tan, H.X.; Kong, P.Y.; Tham, C.K. A Medium Access Control Protocol for UWB Sensor Networks with QoS Support. Proceedings of IEEE Conference on Local Computer Networks, Montreal, Canada, 14–17 October 2008; pp. 289–296.
  35. Kim, H.; Min, S.G. Priority-Based QoS MAC Protocol for Wireless Sensor Networks. Proceedings of IEEE International Symposium on Parallel Distributed Processing, Rome, Italy, 23–29 May 2009; pp. 1–8.
  36. Baroudi, U. EQoSA: Energy and QoS Aware MAC for Wireless Sensor Networks. Proceedings of the 9th International Symposium on Signal Processing and Its Applications, Sharjah, United Arab Emirates, 12–15 February 2007; pp. 1–4.
  37. Slama, I.; Shrestha, B.; Jouaber, B.; Zeghlache, D. A Hybrid MAC with Prioritization for Wireless Sensor Networks. Proceedings of IEEE Conference on Local Computer Networks, Montreal, Canada, 14–17 October 2008; pp. 274–281.
  38. Yahya, B.; Ben-Othman, J. Energy efficient and QoS aware medium access control for wireless sensor networks. Concurr. Comput. Pract. Exper. 2010, 22, 1252–1266. [Google Scholar]
  39. Sudhaakar, R.S.; Yoon, S.; Zhao, J.; Qiao, C. A novel Qos-aware MAC scheme using optimal retransmission for wireless networks. IEEE Trans. Wirel. Commun. 2009, 8, 2230–2235. [Google Scholar]
  40. Jagannath, J.; Saji, A.; Kulhandjian, H.; Sun, Y.; Demirors, E.; Melodia, T. A Hybrid MAC Protocol with Channel-dependent Optimized Scheduling for Clustered Underwater Acoustic Sensor Networks. Proceedings of ACM International Conference on Underwater Networks and Systems (WUWNet), Kaohsiung, Taiwan, 11–13 November 2013.
  41. Skalli, H.; Ghosh, S.; Das, S.K.; Lenzini, L.; Conti, M. Channel assignment strategies for multiradio wireless mesh networks: Issues and solutions. IEEE Commun. Mag. 2007, 45, 86–95. [Google Scholar]
  42. Saurav, G.; Nive, D.; Tanmoy, S. A Cluster Based Multi-Radio Multi-Channel Assignment Approach in Wireless Mesh Networks; Springer Berlin Heidelberg: Berlin, Germany, 2011; Chapter: Computer Networks and Information Technologies—Series: Communications in Computer and Information Science; pp. 487–491. [Google Scholar]
  43. Naveed, A.; Kanhere, S.S. Cluster-Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks. Proceedings of the 34th IEEE Conference on Local Computer Networks, Zurich, Switzerland, 20‒23 October 2009; pp. 53–60.
  44. Raniwala, A.; Gopalan, K.; Chiueh, T. Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks. SIGMOBILE Mob. Comput. Commun. Rev. 2004, 8, 50–65. [Google Scholar]
  45. Ramachandran, K.N.; Belding, E.; Almeroth, K.C.; Buddhikot, M.M. Interference-Aware Channel Assignment in Multi-Radio Wireless Mesh Networks. Proceedings of the 25th INFOCOM 2006, Barcelona, Spain, 23–29 April 2006; pp. 1–12.
  46. Papoulis, A.; Pillai, S.U. Probability, Random Variables and Stochastic Processes; McGraw-Hill: New York, NY, USA, 2002; Chapter 10; p. 456. [Google Scholar]
  47. Byod, S.; Vandenberghe, L. Convex Optimization; Cambridge Univeristy Press: Cambridge, United Kingdom, 2004; Chapter 11; pp. 561–623. [Google Scholar]
  48. Nemirovski, A.S.; Todd, M.J. Underwater sensor nodes and networks. Acta Numer. 2008, 17, 191–234. [Google Scholar]
Figure 1. Cluster-based underwater acoustic sensor network.
Figure 1. Cluster-based underwater acoustic sensor network.
Sensors 14 04689f1 1024
Figure 2. Approximation of the successful packet transmission ratio. Aloha-CS, Aloha with carrier sensing.
Figure 2. Approximation of the successful packet transmission ratio. Aloha-CS, Aloha with carrier sensing.
Sensors 14 04689f2 1024
Figure 3. Effects of node load on the PDR (mean +/- standard deviation) achieved from the greedy algorithm and from simulations, and the maximum number of nodes in class Q3 with n1 = 5, n2 = 15. (a) For class Q1; (b) For class Q2; (c) For class Q3.
Figure 3. Effects of node load on the PDR (mean +/- standard deviation) achieved from the greedy algorithm and from simulations, and the maximum number of nodes in class Q3 with n1 = 5, n2 = 15. (a) For class Q1; (b) For class Q2; (c) For class Q3.
Sensors 14 04689f3 1024
Figure 4. The effects of node load on the PDR (mean +/− standard deviation) achieved from the greedy algorithm and from simulations and the maximum number of nodes in class Q4 with n1 = 5, n2 = 15, n3 = 20. (a) For class Q1; (b) For class Q2; (c) For class Q3; (d) For class Q4.
Figure 4. The effects of node load on the PDR (mean +/− standard deviation) achieved from the greedy algorithm and from simulations and the maximum number of nodes in class Q4 with n1 = 5, n2 = 15, n3 = 20. (a) For class Q1; (b) For class Q2; (c) For class Q3; (d) For class Q4.
Sensors 14 04689f4 1024
Table 1. The effects of the packet delivery ratio (PDR) requirement for class Q3 on the PDR achieved from the greedy algorithm and the maximum number of nodes in class Q3 (with n1 = 5, n2 = 15, p1 = 0.95, p2 = 0.80).
Table 1. The effects of the packet delivery ratio (PDR) requirement for class Q3 on the PDR achieved from the greedy algorithm and the maximum number of nodes in class Q3 (with n1 = 5, n2 = 15, p1 = 0.95, p2 = 0.80).
P 1 req P 2 req P 3 reqOpt. Solut. P 1 anal P 1 sim P 2 anal P 2 sim P 3 anal P 3 sim n 3 max

x1x2x3
0.950.800.705320.9510.9650.8360.8750.7010.72984
0.950.800.725320.9590.9700.8520.8960.7210.75078
0.950.800.745320.9650.9770.8680.9080.7410.77472
0.950.800.765320.9720.9820.8830.9190.7610.80366
0.950.800.784220.9600.9720.8000.8500.8000.81964
0.950.800.804220.9600.9720.8000.8500.8000.81964
0.950.800.824220.9670.9770.8200.8660.8200.84758
0.950.800.845330.9530.9810.8400.9130.8400.90455
0.950.800.865330.9620.9860.8600.9270.8600.91950
Table 2. The effects of the PDR requirement for class Q3 on the PDR achieved from the interior-point algorithm, and the maximum number of nodes in class Q3 (with n1 = 5, n2 = 15, p1 = 0.95, p2 = 0.80).
Table 2. The effects of the PDR requirement for class Q3 on the PDR achieved from the interior-point algorithm, and the maximum number of nodes in class Q3 (with n1 = 5, n2 = 15, p1 = 0.95, p2 = 0.80).
P 1 req P 2 req P 3 reqOpt. Solut. P 1 anal P 1 sim P 2 anal P 2 sim P 3 anal P 3 sim n 3 max

x1x2x3
0.950.800.704.3212.3211.7370.9500.9620.8000.8650.7000.71687.6
0.950.800.724.3212.3211.8360.9500.9670.8000.8840.7200.73982.8
0.950.800.744.3212.3211.9430.9500.9700.8000.8960.7400.75178.3
0.950.800.764.3212.3212.0580.9500.9560.8000.8380.7600.82173.9
0.950.800.784.3212.3212.1840.9500.9560.8000.8600.7800.84369.6
0.950.800.804.3222.3222.3220.9500.9630.8000.8820.8000.86265.5
0.950.800.824.3222.3222.4740.9500.9700.8000.8910.8200.88161.5
0.950.800.844.3222.3212.6430.9500.9740.8000.9080.8400.89757.5
0.950.800.864.3222.3222.8360.9500.9820.8000.9170.8600.91153.6
Table 3. The solutions from the greedy algorithm with various node loads (n1 = 5, n2 = 15).
Table 3. The solutions from the greedy algorithm with various node loads (n1 = 5, n2 = 15).
Node load (bps) P 1 req P 2 req P 3 reqOpt. Solut n 3 max

x1x2x3
200.950.800.7053284
250.950.800.7053260
300.950.800.7053244
350.950.800.7053233
400.950.800.7053224
450.950.800.7053218
500.950.800.7053212
Table 4. The effects of the PDR requirement for class Q4 on the PDR achieved from the greedy algorithm and the maximum number of nodes in class Q4 (with n1 = 5, n2 = 15, n3 = 20, P 1 req = 0.95, P 2 req = 0.90, P 3 req = 0.80).
Table 4. The effects of the PDR requirement for class Q4 on the PDR achieved from the greedy algorithm and the maximum number of nodes in class Q4 (with n1 = 5, n2 = 15, n3 = 20, P 1 req = 0.95, P 2 req = 0.90, P 3 req = 0.80).
P 4 reqOpt. Solut. P 1 anal P 1 sim P 2 anal P 2 sim P 3 anal P 3 sim P 4 anal P 4 sim n 4 max

x1x2x3x4
0.7054320.950.970.910.940.830.900.700.7746
0.7254320.960.980.920.960.850.910.720.8040
0.7443220.960.970.910.930.800.840.800.8336
0.7643220.960.970.910.930.800.840.800.8336
0.7843220.960.970.910.930.800.840.800.8336
0.8043220.960.970.910.930.800.840.800.8336
0.8264330.970.990.900.950.820.910.820.9132
0.8454330.950.980.910.960.840.910.840.9130
0.8654330.960.980.920.960.860.930.860.9225
Table 5. The effects of the PDR requirement for class Q3 on the PDR achieved from the greedy algorithm and the maximum number of nodes in class Q3 (with n1 = 5, n2 = 15, p1 = 0.95, p2 = 0.80 and a different packet size for each QoS class).
Table 5. The effects of the PDR requirement for class Q3 on the PDR achieved from the greedy algorithm and the maximum number of nodes in class Q3 (with n1 = 5, n2 = 15, p1 = 0.95, p2 = 0.80 and a different packet size for each QoS class).
P 1 req P 2 req P 3 reqOpt. Solut. P 1 anal P 1 sim P 2 anal P 2 sim P 3 anal P 3 sim n 3 max

x1x2x3
0.950.800.705210.9790.9890.8790.8970.7160.71951
0.950.800.724210.9700.9870.9030.9240.7480.75042
0.950.800.746220.9700.9940.8130.8780.8730.89340
0.950.800.766220.9700.9940.8130.8780.8730.89340
0.950.800.786220.9700.9940.8130.8780.8730.89340
0.950.800.806220.9700.9940.8130.8780.8730.89340
0.950.800.826220.9700.9940.8130.8780.8730.89340
0.950.800.846220.9700.9940.8130.8780.8730.89340
0.950.800.866220.9710.9930.8170.8860.8760.89039
0.950.800.886220.9810.9960.8450.9090.8950.92132
0.950.800.905220.9770.9950.8730.9290.9150.93827

Share and Cite

MDPI and ACS Style

Nguyen, T.-T.; Le, D.V.; Yoon, S. Maximization of the Supportable Number of Sensors in QoS-Aware Cluster-Based Underwater Acoustic Sensor Networks. Sensors 2014, 14, 4689-4711. https://doi.org/10.3390/s140304689

AMA Style

Nguyen T-T, Le DV, Yoon S. Maximization of the Supportable Number of Sensors in QoS-Aware Cluster-Based Underwater Acoustic Sensor Networks. Sensors. 2014; 14(3):4689-4711. https://doi.org/10.3390/s140304689

Chicago/Turabian Style

Nguyen, Thi-Tham, Duc Van Le, and Seokhoon Yoon. 2014. "Maximization of the Supportable Number of Sensors in QoS-Aware Cluster-Based Underwater Acoustic Sensor Networks" Sensors 14, no. 3: 4689-4711. https://doi.org/10.3390/s140304689

Article Metrics

Back to TopTop