You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

7 January 2018

Retransmission Avoidance for Reliable Data Delivery in Underwater WSNs

,
,
,
,
and
1
COMSATS Institute of Information Technology, Islamabad 44000, Pakistan
2
College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Advances and Challenges in Underwater Sensor Networks

Abstract

The energy-efficient and reliable delivery of data packets in resource constraint underwater wireless sensor networks (UWSNs) is one of the key considerations to enhance the network lifetime. The traditional re-transmissions approach consumes the node battery and increases the communication overhead, which results in congestion and affects the reliable data packet delivery in the network. To ensure the reliability and conserve the node battery, in this paper, we propose adaptive forwarding layer multipath power control routing protocol to reduce the energy dissipation, achieve the data reliability and avoid the energy hole problem. In order to achieve the reliability, tree based topology is exploited to direct multiple copies of the data packet towards the surface through cross nodes in the network. The energy dissipation is reduced by a substantial amount with the selection of low noise path between the source and the destination including the information of neighbors of the potential forwarder node. Extensive simulation results show that our proposed work outperforms the compared existing scheme in terms of energy efficiency and packet received ratio (PRR).

1. Introduction

Recent progress in underwater wireless sensor networks (UWSNs) has procured much attention and it encompasses an extensive range of applications like pollution monitoring, coastline surveillance, disaster prevention, oceanographic data collection, marine life monitoring, etc. [1]. UWSN is composed of sensor nodes deployed in the deep water which forward data to sink(s) situated off shore. Radio and optical waves used in terrestrial communication cannot be used in underwater environment because they get absorbed or scattered rapidly. Therefore, the acoustic signals emerge as a suitable choice due to low absorption rate.
Acoustic signals face high end-to-end delay because of low propagation speed, whereas, multipath fading, doppler effect, path loss, noises like shipping, wind, thermal, etc. cause high bit error rate (BER) resulting in low reliability and high energy consumption [2]. Acoustic signals are stronger near the source and get impaired from noises as they propagate away. Noise intensity in shallow water is high as compared to deep water. Therefore, less number of different paths are required in deep water to reduce the energy consumption. Sensor nodes are costly and equipped with limited batteries which are difficult to replace. Therefore, energy efficiency, maximum data gathering, reliable transfer and low delay are the objectives of protocol designing.
Some multipath routing protocols [3,4] have been proposed in recent years to achieve reliability. Data packets are forwarded linearly through different paths towards the sink(s) situated at the surface of the water. If these copies, which are less in number, somehow survived energy holes, there are high noises in shallow water which make them erroneous resulting in data packet drop at the sink and high energy consumption. Data packets are also forwarded by following tree structure in which every sensor node multicasts the data packet upon reception in its transmission range and becomes the parent while, the receivers further multicast data packet and make subtrees. The reception of multiple copies at the sink increases the chances of uncorrupted data packet reception. However, a high number of copies increases collision and energy consumption which is unbearable with the availability of limited node battery.
Authors of layered multipath power control (LMPC) [5] send multiple copies of a data packet by following binary tree structure packet. These copies are directed through different paths which faces low noise to achieve reliability. They are combined at the surface to generate original data packets. LMPC generates binary tree from every source node resulting in high energy utilization in dense network. Sparse regions created by random deployment or death of sensor nodes result in data packet drop because of void holes (unsensed zone) in LMPC.
In this paper, we propose forward layered multipath power control-one (FLMPC-One) and FLMPC-Two routing protocols to forward the data packets towards the surface through multiple paths with the aim of eliminating retransmissions and avoiding void holes. Retransmission increases delay and energy consumption which effects the performance of time critical scenarios. In order to reduce the energy dissipation, the network field is divided into multiple heterogenous sized layers. From each layer, the source node unicasts the data packet which resides near the layer, whereas, node on the layer known as cross node generates binary tree upon reception of the data packet by using IP multicast technology. Current forwarder in FLMPC-One forwards data when it is confident about finding neighbors up till two hops. While, FLMPC-Two uses three hops neighbor information. The goal of FLMPC-One and FLMPC-Two is to achieve energy efficiency and reliability of the data packet.
The main contributions are mentioned as follow:
  • Binary tree establishment from the sensor node lies on the layer nearest to the source node which results in less energy consumption.
  • In order to avoid void holes, the forwarder node sends data packet to that sensor node which further has one or two hop neighbor nodes in its transmission range.
  • Every data packet passing through sensor nodes lies on the layer which reduces the chance of retransmissions due to the reception of more than one copies at the sink.
The remainder of the paper is organized as follows: Section 2 provides an overview of existing routing protocols in UWSNs. In Section 3, a brief overview of FLMPC-One and FLMPC-Two is provided along with problem description in LMPC. Linear optimization of energy and throughput are discussed in Section 4. Section 5 consists of simulation results and performance evaluation of both proposed schemes and LMPC. In Section 5.3, performance trade offs are discussed. Finally, Section 6 presents conclusion.

3. FLMPC: Proposed Protocols

In this section, we first describe the network architectures of existing and proposed schemes. As network architecture of both FLMPC-One and FLMPC-Two is the same, therefore, we use term FLMPC to generalize while describing the architecture. Then, we explain propagation model of underwater acoustic signals. Later, we propose two schemes; FLMPC-One and FLMPC-Two. FLMPC-One makes routing decision using information of two hop neighbors. Whereas, FLMPC-Two forwards the data packet after making sure that the forwarder node has neighbor information up to three hops. Both schemes increase reliability of transmission and reduce the chance of data packet entrance in void hole region. Moreover, the energy consumption is reduced by generating binary tree from the node exists at the closest layer of the source node.

3.1. Network Architecture

Before describing architecture, few terms need to be defined here: Relay nodes are the sensor nodes which not only forward their sensed data but also forward data of higher depth nodes. While, Cross nodes are the sensor nodes lying near or at the layers.
Both LMPC and FLMPC consist of relay nodes, cross nodes, surface gateways and a sink. The sink works as an embedded system to manage the node battery in an efficient way. All the sensor nodes are randomly distributed in the network. Initially, all the nodes are sleeping and become active when they receive data packet. If they are not taking part in communication, they get back to sleep mode. Binary tree is established in both schemes for multiple-path transmission of a data packet. Let’s assume a scenario depicted in Figure 1 in which LMPC network field be distributed into homogeneous layers. From every node, two copies of the data packet are generated irrespective of the layer, until it reaches the destination. Now, it is obvious that noise at the bottom of the sea is very low, where we can afford to generate one data packet, however, the noise increases as we approach the surface of the water.
Figure 1. Network Architecture of layered multipath power control (LMPC).
Therefore, we need to generate multiple copies closer to the water surface. In this regard, we have divided the network field into unequal layers as illustrated in Figure 2. In addition, the source node generates only one copy of the data packet at the lower layers, however, as it propagates towards the destination, it starts transmitting two copies through cross nodes deployed over the layer. If, cross node is not present, then only single copy is passed on through a relay node. The source and relay node unicast data packet upon reception. Contrary to source node, a cross node uses IP multicast technology to transmit data packet. Both existing and proposed schemes direct multiple copies of a data packet towards gateways through different paths in order to reduce the retransmissions. All the copies of a data packet are relayed to the sink where they are combined to generate original data packet. Unlike LMPC, FLMPC generates binary tree from cross nodes only with the aim of reducing collisions. Acoustic modem is installed in gateways to receive data from sensor nodes while a radio modem is used to direct collected data towards the sink.
Figure 2. Network Architecture of forward layered multipath power control (FLMPC)-One and FLMPC-Two.

3.2. Propagation Model

In this section, we present the propagation model of acoustic signals and their absorption in underwater environment.

Energy Model

The attenuation of acoustic channel over distance d, for the signal of frequency f can be expressed as [20]:
A ( d , f ) = d k α ( f ) d
where k shows the spreading factor of the signal and α ( f ) is the absorption coefficient. k defines the geometry of propagation (i.e., k = 1 is cylindrical spreading (signal does not propagate in all directions, but gets trapped within the boundaries and wave fronts move in cylindrical shape without any attenuation in the power of the signal), k = 1.5 is practical spreading (spreading loss in which transmission loss and attenuation are considered while performing experiments in order to achieve more accurate and precise results.) and k = 2 is spherical spreading (signal propagates in all directions, where wave fronts grow as it move away from the source and intensity of the signal remains the same)). Thorp’s propagation model is used to describe α ( f ) given by [7]:
α ( f ) = 0.11 f 2 1 + f 2 + 44 f 2 4100 + f 2 + 2.75 × 10 4 f 2 + 0.003
where α ( f ) is measured in dB/Km and f is given in KHz.
Figure 3 shows the relation of α ( f ) and frequency which is obtained from Thorp’s model. As the frequency increases, absorption of acoustic signals also increases.
Figure 3. Absorption and Frequency Relation.
The total noise power spectral density (NP) of all noises at frequency f is given by [5]:
N P ( f ) = i = 1 n s N P i ( f )
where n s shows the total number of noise sources like shipping, turbulence, etc. and NP is measured in dB. The more noise signals propagate away from the source, the more they attenuate. Their attenuation over distance d can be calculated from:
N P d ( f ) = i = 1 n s N P i d k α ( f ) d
The signal to noise ratio (SNR) of the received signal can be written as:
S N R = P / A ( d , f ) N P d ( f ) = P d k α ( f ) d i = 1 n s N P i d k α ( f ) d
where P is the power of acoustic signal and d is the distance among n 1 and nth nodes. S N R follows additive white gaussian noise channel ( A W G N ). As S N R depends on channel modulation scheme through which we can calculate B E R . The B E R for ( π / 4 ) Q P S K modulation scheme is given by:
p b e r ( S N R ) = 1 2 π S N R e t 2 / 2 d t
B E R depends on channel coding scheme and it can be converted to ( P E R ) which is given by:
P p e r = 1 [ 1 p b e r ( S N R ) ] P l
where P l is the data packet size.
Energy consumption of a sensor node while sending a data packet can be calculated from the values of transmission power ( T p ), P l , data rate ( D R ) of acoustic channel and d is the distance between n 1 and nth node. The mathematical expression is given as follows [5]:
E t x = T p × P l D R × d
While, reception energy ( E r x ) is calculated according to Equation (9).
E r x = P r × P l D R × d
where P r is the reception power. Total leftover energy of the network nodes after forwarding all the data packets is computed as follows:
E t x r e m = d p = 1 N h = 1 m n i E t x
where N shows the total number of data packets, m is the total hop count for one data packet from the source node to the destination, n i is the ith node of the network. When the hop count increases by one, it updates n i . We can find the total remaining energy of the network for receiving data packets from:
E r x r e m = d p = 1 N h = 1 m n i E r x
Total consumed energy E t o t a l of the network is computed by Equation (12).
E t o t a l = E i ( E t x r e m + E r x r e m )
where E i is the total initial energy of the network.

3.3. Problem Description

The intensity of noise signals is high in shallow water as compared to deep water [21]. In LMPC, the source node establishes binary tree as shown in Figure 1. This establishment increases the number of duplicate packets in dense network and results in collision. Random distribution and energy depletion of sensor nodes create void holes. LMPC forwards data packet on the link which has minimum P E R and acceptable D R in the presence of errors without considering the probability of void hole occurrence. As shown in Figure 4a, node C is a current forwarder. A and E are low depth nodes and lies within the transmission range of C. Link to A might have less errors than E and is suitable to become forwarder, however, A leads to void hole because it has no node in its transmission range. If C directs data packet to E, error chances might be higher. However, the probability of the data packet to reach the destination is very high in this situation. LMPC divides the network filed into equal sized layers irrespective of considering noise intensity in shallow water. High noise makes the data packets erroneous which effects the reliability of the data packet.
Figure 4. Forwarder Node Selection in FLMPC-One. (a) Cross Node potential forwarder node (PFN); (b) Relay Node PFN.

3.4. Layers Division

In FLMPC-One and FLMPC-Two, we split the network into unequal sized layers, because noise intensity is relatively high near the noise source and in the shallow water, while, smoother in deep water. Based upon this fact, the layer size near the surface is smaller in contrast to deep water. This division increases the reliability and reduces the packet drop of FLMPC-One and FLMPC-Two. The expression for unequal size division is given by [22]:
C ( x , y ) = k 1 x 2 + k 2 x 1 k 1 + k 2 , k 1 y 2 + k 2 y 1 k 1 + k 2
where x 1 , y 1 , x 2 and y 2 are the coordinates of end points and C ( x , y ) is the point of division as shown in Figure 5. Point C divides A B in the ratio k 1 : k 2 which depends upon the noise signal’s strength.
Figure 5. Layer Division.
Cross nodes reside near the layers as shown in Figure 2. When sensor nodes are randomly deployed, they often leave layers vacant. To make sure every data packet passes through cross node, the deployment of cross nodes is uniform random.

3.5. Neighbor Table

Sensor nodes reside in transmission range and lying at the low depth than the current forwarder are its neighbors. In order to save energy because of excessive exchange of control messages among the network nodes, all the sensor nodes in proposed schemes maintain neighbor table. Initially, the sensor nodes broadcast control message in the network. This control message consists of source ID, location (x,y) and depth of source node. Receivers calculate their distance with source based upon receiving a control message by Euclidean distance formula which is given by:
D i s t ( i , j ) = ( x i x j ) 2 + ( y i y j ) 2
where ( x i , y i ) and ( x j , y j ) are the coordinates of source and receiver, respectively.
Every sensor node maintains tuple which consists of (Source ID, Location, Distance, Depth) for each neighbor. The Location is (x,y) coordinates of the sender retrieved from the control message, whereas, Distance is calculated using Equation (14), Depth shows that how far the node is from the surface of the water. When this information is acquired successfully, the sensor node maintains it’s tuple of neighbor nodes.
D i s t ( i , j ) R t
D e p t h i > D e p t h j
where R t is the transmission range and Equation (15) ensures that the calculated distance must be less than or equal to the transmission radius. Receiver nodes also retrieve depth information from the control message to compare it with its own depth as shown in Equation (16). If Equation (16) evaluates to true, the receiver maintains tuple for the source node in its neighbor table. Depth of neighbors helps the sensor nodes to select forwarder which is at minimum depth among all selected neighbors while transmitting data packet. Both schemes do not maintain information of high depth nodes because they have no mechanism of backward transmissions and also to reduce the message overhead.

3.6. Network Configuration and Data Transmission

Transmission phase consists of: potential neighbor selection and tree establishment. In the former, a node which is deployed closer to the destination than the source node will be illegible to become a neighbor. Whereas, in latter, tree is established to successfully deliver the data packet from multiple routes towards the destination. We have discussed both of the phases in detail as follows:

3.6.1. Potential Neighbor Selection

When a sensor node has a data packet to transmit, it selects a potential forwarder node ( P F N ) among all of its neighbors. Before describing the selection process of P F N , we firstly define the term P F N here:
PFN: Let a sensor node n lying h hops away from the destination having a neighbor of h 1 hops which further has neighbors up to h 1 or h 2 hops, this neighbor is a P F N . Sensor node E in Figure 4a is a P F N .
In the P F N selection phase, every senor node processes all the neighbors to select cross node which is also a P F N . Cross node increases duplicate packets which helps in achieving the purpose of high reliability. If no such neighbor is found, sensor node selects relay node which is a P F N . In the case that no P F N is found, data packet is dropped to save energy of the node.

PFN Selection in FLMPC-One

Figure 4a,b illustrate P F N selection mechanism of FLMPC-One. Let C be the current forwarder lying at depth d and h hops away from the surface of the water. A, B and E lie at h 1 hops. B is at lowest depth among all the neighbors, data packet should be sent to it. However, A and E are cross nodes, they have higher priority than B. Existence of cross nodes reduce the chances of data packet transmission to relay node B. If we look precisely at Figure 4a, A can not be selected as P F N . Although, there is a sensor node at lower depth than A. However, it does not lie in A s transmission range. At this stage, C processes only left cross node E which has D in its range. D ensures neighbor information up to h 2 hops. Thus, E is a P F N and data packet is transmitted to it.
There can be a scenario, when cross node is not the P F N as shown in Figure 4b. A is a cross node having high priority, however, its not a P F N . Now C looks in it’s neighbor table to find another cross node. If there is not any cross node then C makes an effort to find relay node which is also a P F N . If we look at B, we can see, it is a relay node and also has a node in its transmission range, so B has priority in this case. C selects B as a forwarder.
Algorithm 1 FLMPC Pseudocode.
1:procedure Potential–Forwarder
2:  for each node i ∈ Nodes do
3:    for each node n ∈ Neighbor–Table do
4:     if n e i g h b o r ( n ) 1 then
5:     go to 7
6:     if n e i g h b o r ( n e i g h b o r ( n ) ) 1 then
7:       if n==Cross–node then
8:          P F N n
9:         go to 2              ▹ Find P F N for next node
10:       end if
11:     end if
12:     end if
13:     if C r o s s   n o d e = = 0 then
14:     go to 16
15:     if n e i g h b o r ( n e i g h b o r ( n ) ) 1 then
16:        P F N r e l a y
17:     end if
18:     end if
19:    end for
20  end for
21:end procedure
22:procedure Datatransmission
23:  Node i received data packet
24:  if i is Cross–node then
25:    Multicast data packet
26:  else Unicast data packet
27:  end if
28:end procedure
Algorithm 1 shows the selection and transmission of both proposed schemes. Line 4 states that two hop information is fulfilled, thus, line 6 is skipped for FLMPC-One. After P F N selection at step 8, the next iteration starts. Afterwards, transmission phase starts. If current forwarder is a cross node, data packet is multicasted, otherwise, unicasted.

PFN Selection in FLMPC-Two

FLMPC-Two forwards data packets after ensuring neighbor information up to h 3 number of hops from the current forwarder. The P F N selection mechanism of FLMPC-Two is shown in Figure 6a,b. A, B and E are h 1 hops away from the gateways and they are neighbors of the current forwarder C which itself is h hops away. Let C has a data packet to forward and it computes all the neighbors to find P F N . Being cross nodes A and E has high priority. A does not have any node in its range, so A is eliminated from this competition. C now makes an attempt to spot cross node which is E in this state. By focusing on E in Figure 6a, we can see, it has D and I in range which confirms h 2 hops information with respect to C. However, its not enough for avoiding the energy hole occurrence in the network. Both D and I are computed to ensure that there is no void hole. D and I has H and J in their transmission ranges, respectively, and based upon them C forwards data packet to E.
Figure 6. Forwarder Node Selection in FLMPC-Two. (a) Cross Node PFN; (b) Relay Node PFN.
Now, E is the current forwarder and also a cross node, so data packet needs to be multicasted. E follows complete selection mechanism and spot two relay nodes D and I. D further has H in its range. However, D can not be the P F N because E has only h 2 hops information in case of D. D is leading to void region and because of no backward transmission, H has only choice of packet drop. Node J lies in I’s transmission range and K resides in range of J. h 3 hops information is confirmed and E now forwards data packet to I. Being cross node E needs to multicast data packet, however, only one P F N can ensure reliable transmission. FLMPC-One and FLMPC-Two make energy efficient decisions.
If there is no cross node in transmission range or the existing cross node is leading to a void hole, data packet transmission to such node results in packet drop. As shown in Figure 6b, A is cross node and it has I in range. However, A leads the data packet to a void hole. Now, C looks in the neighbor table to locate another cross node. In the case shown in Figure 6b, this search results in negation. C now searches for relay nodes and spots B which ensures h 3 hops information. The data packet is forwarded to P F N B.

3.6.2. Tree Establishment

When a sensor node sends a data packet, one of the given conditions is true. The current forwarder is a cross node, a source or a relay node.
Y = L ; if N = S n or N = N n T ; if N = C n
where L, T, N, S n , N n and C n represent the linear transmission, tree, current forwarder, source node, relay node and cross node, respectively.
If N is S n or N n , it unicasts the data packet and follows a linear path. However, incase N is C n , it multicasts data packet and generates binary tree. A tree consists of a root node and subtrees. In case of a binary tree, every parent node has utmost two subtrees. In our schemes, only C n generates binary tree. The establishment of binary tree can be expressed as [5]:
T = G ( B 1 , P 0 , B 2 )
where
B i = G ( B 2 i + 1 , P i , B 2 i + 2 ) ; if B 2 i + 1 ϕ and B 2 i + 2 ϕ P i ; if B 2 i + 1 = ϕ and B 2 i + 2 = ϕ
where, the ϕ is used to represent the leaf node. If, B 2 i + 1 equals to ϕ , it means no further nodes are present to traverse. If, B 2 i + 1 not equals to ϕ , then the current node is not a leaf node. P 0 in Equation (18) is the root node, B 1 and B 2 are the left and right children which can be leaf nodes or trees. If B 1 or B 2 does not have children (low depth nodes), they are leaf nodes. In existing and proposed schemes, leaf nodes are the surface gateways as shown in Figure 1. P i in Equation (19) is the parent of ith subtree. Left and right children of ith subtree can be found from B 2 i + 1 and B 2 i + 2 .

4. Linear Optimization

Linear Optimization is a mathematical optimization model widely used to gain the best possible result. It consists of an objective function in which we formulate problem with the aim of minimizing or maximizing the result under a set of linear constraints.
In this section, two linear problems are formulated, the first one is to minimize the energy consumption and the second one is to maximize the throughput of the network.

4.1. Energy Minimization

In FLMPC-One and FLMPC-Two, cross nodes multicast and relay nodes unicast data packet. In order to increase the lifetime of network, efficient energy consumption is necessary. Energy is mainly consumed by transmission or reception of data packets. Energy is also consumed in idle state, however, it is very minor, thus, we are not considering it. The objective function of energy can be expressed as:
M i n t = 1 t m a x E ( t ) t R
such that;
L 1 : E t E o
L 2 : D R D R p r
L 3 : E s E t x
L 4 : L Q t L Q r e q
L 5 : M i n d p = 1 N E t x i R
L 6 : M i n d p = 1 N E r x i R
The main objective of Equation (20) is to minimize the energy consumption for the total time ( t m a x ) of transmission to prolong network lifetime. Equation (21a) shows that energy of sensor node at any time t must be less than or equal to the initial energy ( E o ) supplied to the sensor node. It reveals sensor nodes have limited energy. In Equation (21b), D R must be less than or equal to D R which makes the data packet erroneous. If Equation (21b) evaluates to false then P E R increases which results in packet drop. As a result, the data packet needs to be retransmitted and it increases energy consumption. Equation (21c) shows sensor node must have energy greater or equal to transmission energy when it has a data packet to send. Constraint in Equation (21d) ensures that the link quality at current time must be good. If it is not, data packet becomes erroneous and gets dropped at surface gateway. Equations (21e) and (21f) indicate the energy consumption for the total number of data packets ( d p s ) transmitted and received in the network. We can calculate E t x from Equation (8) and E r x from Equation (9).
Graphical Analysis: Let us consider a scenario in which initial energy be 6 J, T p = 0.66 mW (milliWatt), P l = 500 bytes, D R = 10 KB/s, d = 100 m to 300 m and R p = 0.395 mW. From d = 100 m to 300 m, the calculated value of E t x is 3.3 mJ to 9.9 mJ and E r x is 1.98 mJ to 5.93 mJ. So
3.3 mJ E t x 9.9 mJ
1.98 mJ E r x 5.93 mJ
Figure 7 shows the intersection of lines which results in the bounded region which is called feasible region. Every point in this region results in feasible solution. Extreme values can be found at the corner points. Now examining vertices of the bounded region of Figure 7 as follows:
Figure 7. Energy Consumption Feasible Region.
  • P 1 ( 3.3 , 1.98 ) = 3.3 + 1.98 = 5.28 mJ
  • P 2 ( 3.3 , 5.93 ) = 3.3 + 5.93 = 9.23 mJ
  • P 3 ( 9.9 , 5.93 ) = 9.9 + 5.93 = 15.83 mJ
  • P 4 ( 9.9 , 1.98 ) = 9.9 + 1.98 = 11.88 mJ
The above results show that values of the corner points lies within the range of initial energy. So all solutions are valid. When a sensor node transmits or receives a data packet, the value of energy is selected from this feasible region.

4.2. Throughput Maximization

In this section, we are using linear programming to maximize network throughput. In FLMPC-One and FLMPC-Two, multiple copies of a data packet are relayed towards the destination. Throughput is the number of distinct packets successfully received at the sink. The objective function is defined as follows:
M a x t = 1 t m a x P ( t ) t R
where,
P ( t ) = t = 1 t m a x p t × c c P
and,
p t = 1 i f d i s t i n c t p a c k e t 0 i f d u p l i c a t e p a c k e t
L 1 : E t E o
L 2 : D R D R p r
L 3 : E s E t x
L 4 : P E R < P E R r e q
L 5 : M i n d = d o d m a x N o t h d R
L 6 : M i n d = d o d m a x N o s d R
In Equation (24), our objective is to maximize the number of distinct packets P received at the sink in aggregated time ( t m a x ). In Equation (25), p t is the packet type and c is the counter. Counter c increments by one if p t is 1 in Equation (26). It ensures that the data packet is not a duplicate one. Equations (27a)–(27c) are same as explained in previous section without them data packet can not be transmitted. Constraint Equation (27d) ensures that P E R must be less than or equal to required level ( P E R r e q ). Equations (27e) and (27f) show the thermal noise ( N o t h ) and shipping noise ( N o s ) , respectively. Where d is the distance from source node to surface gateways. If noise intensity is high, data packet becomes erroneous. If P E R increases the required level, data packet is dropped at gateway. In order to increase throughput, noises should be minimum. Total noise is given by:
N o t o t a l = N o t h + N o s N o t h , N o s R
where N o t h [23] and N o s [24] are given by:
N o t h = 15 + 20 l o g ( f ) D
N o s = N L 20 l o g ( f 100 ) D
where N L is noise level and it is based upon shipping density.
Graphical Analysis: Let f = 1000 Hz, d = 100 m to 2000 m and N L = 60 dB. The calculated value of N o t h is 0.0375 dB to 0.75 dB and N o s lies in the range of 0.02 dB to 0.4 dB.
0.0375 + 0.02 N o t h + N o s 0.75 + 0.4
0.0375 N o t h 0.75
0.02 N o s 0.4
In Figure 8, intersection of lines results in feasible region.
Figure 8. Noises Feasible Region.
All points in this region provide a valid solution. Now testing corner points to validate the results of Equations (32) and (33). Calculating values at corner points:
  • P 1 ( 0.0375 , 0.02 ) = 0.0375 + 0.02 = 0.0575 dB
  • P 2 ( 0.0375 , 0.4 ) = 0.0375 + 0.4 = 0.438 dB
  • P 3 ( 0.75 , 0.4 ) = 0.75 + 0.4 = 1.15 dB
  • P 4 ( 0.75 , 0.02 ) = 0.75 + 0.02 = 0.77 dB
The lesser the noise is, the higher are the chances of successful packet reception at gateways. If a data packet faces noise value from this feasible region, the error is less in data packet and it is acceptable at gateways.

5. Simulation Results and Performance Evaluation

In this section, we evaluate the performance of FLMPC-One and FLMPC-Two. In FLMPC-One, every sensor node looks up to two hop neighbors and finds P F N . While, FLMPC-Two uses three hops neighbor information to forward data packet. The chance for a data packet to enter void hole region reduces. Void hole avoidance results in fewer number of drop packets. In the simulations, we implemented two different scenarios of LMPC, FLMPC-One and FLMPC-Two. In the first scenario, 150 sensor nodes are deployed in the network of 2000 m × 2000 m. We consider two noise sources here i.e., wind and shipping noise. Wind speed is considered 5 m/s and shipping noise is 0.2 dB. Similarly, in scenario two, 500 sensor nodes are distributed over the area of 4000 m × 4000 m. The wind speed and shipping noise are stronger in scenario two i.e., 20 m/s and 0.8 dB, respectively. The transmission power and the reception power of sensor nodes are 0.66 mW and 0.395 mW, respectively. Five gateways are deployed at the surface of water. All surface gateways relay data packets to a sink which combines them to generate original data packet. Simulations are run for 1000 s. The average of five simulation results is taken in order to compensate the difference of random deployment. The network dimensions and important performance parameters for simulations are listed in Table 4.
Table 4. Simulation Parameters.

5.1. Performance Metrics

We are defining few terms here based upon them we evaluate proposed and existing schemes.
Active Nodes are the number of sensor nodes which are taking part in data transmission and reception.
Delay is the time taken by a data packet from the source to the destination. It includes transmission delay, propagation delay, holding time and processing delay. It is measured in second(s). There are multiple surface gateways and more than one copies of the same data packet are relayed, hence a data packet corresponds to more than one delays. However, we consider the highest delay among them.
Energy Consumption is the amount of energy consumed from start to the end of the network lifetime. Total energy consumption comes from the accumulation of energy consumed by individual nodes during the data transmission phase.
Required Packet Error Rate ( P r r e q ) is the maximum number of erroneous bits allowed in the data packet to be accepted at sink. If erroneous bits in data packet exceeds P r r e q limit, surface gateway drops it.
PRR is the ratio of successfully received data packets at surface gateways to the data packets sent by source nodes.

5.2. Simulation Results

In this section, we have presented and discussed the simulation results for both FLMPC-One and FLMPC-Two. Both schemes are compared with LMPC in terms of active nodes, delay, energy consumption, required packet error rate and PRR. The detailed discussion of each parameter along with it’s results is presented as follows:

5.2.1. Active Nodes

It can be observed from Figure 9, as the number of layers increases number of active nodes also increases. Because if the source node lies nearest to surface gateways, it results in less number of duplicate packets and awake less number of nodes. However, if source node resides away from the surface, it results in high number of active nodes. It shows farther the source node is from the surface, higher is the number of active nodes.
Figure 9. Active Nodes.
The number of active nodes increases as the layer number increases in DBR. When the information is obtained up to two hops, the active nodes are high, however, as the hop count increases, means the neighbor information acquired up till three hops, the probability of finding void hole increases. Furthermore, the transmission of data packet from the single path towards destination only involves few number of nodes. While in LMPC and FLMPC multiple routes generated from every cross node results in high number of active nodes. The use of single route is the major reason behind low number of active nodes participating in the data forwarding process.
Figure 9 shows that initially the number of active nodes in scenario one of LMPC is high due to tree generation from source node resulting in high number of duplicate copies. Later, the increment is gradual because higher depth nodes forward data packets through the relay nodes which are already awake in the upper layers and also awake few more sensor nodes. Less number of active nodes save network energy.
Number of active nodes in FLMPC-One is lower as compared to LMPC. FLMPC-One generates less copies of packets which reduces the chances of collision. Packet collision is very critical factor in sensor networks which effects energy and delay of the network. If collision increases, it affects network’s performance and results in loss of data. All the active nodes not only relay data packets of higher depth nodes but also sense their own data and forward it. Two hops neighbor information of FLMPC-One reduces number of active nodes and also reduces the probability of data packet entrance in void region. FLMPC-One acquires neighbor information to avoid the awakening of sleeping nodes leading to void regions.
Active nodes of FLMPC-Two in scenario one are less than both LMPC and FLMPC-One because of finding P F N after using three hops information. It saves data packet from entering in void region. If sensor node is lying in the sparse region, this mechanism reduces the probability of data packet drop. When a sensor node forwards data packet to its P F N using three hops information. The receiver node needs not to forward that data packet to the node found by its previous forwarder during P F N finding mechanism. Because previous node information may lead data packet to void region. So, current forwarder locates its P F N by running P F N selection mechanism. In this way, data packets loss is avoided.
In scenario two, initially increment in the number of active nodes of LMPC and FLMPC-One is rapid. Later, FLMPC-One makes smart decision by detecting void holes and changes the path of the data packet. In this way, FLMPC-Two awakes suitable nodes which results in gradual increment. Although, two hops neighbor information reduces active nodes of FLMPC-One, however, three hops information reduces them more. FLMPC-Two has more data to forward and already awake nodes are not enough. So, active nodes of FLMPC-Two increases sharply as the time passes on, however, it awakes most suitable sensor nodes.

5.2.2. Delay

Delay of proposed and existing schemes is shown in Figure 10 and it mainly depends upon underwater channel and distance from the source to destination. As expected, delay of LMPC in both scenarios is less as compared to FLMPC-One and FLMPC-Two, respectively, because of one hop information which leads to high number of active nodes as shown in Figure 9. As the number of active nodes increases, the probability of finding P F N in less time also increases. Figure 10 shows delay of all schemes in scenario one is higher than scenario two. The difference in sensor nodes density of both scenarios is one of the reasons. Scenario one is 70% less dense as compared to scenario two.
Figure 10. End-to-end Delay.
Due to single path routing, the delay is very less in the both scenarios of DBR. The classic depth based algorithm only considers distance while making forwarding decisions. The selection of always shortest path irrespective of energy consumption results in minimal delay. It is evident from the Figure 10, that as number of layers increases, the number of active nodes also increases resulting in further decrease in the end-to-end delay. At layer 6, the minimal delay is 0.51 and 0.53 s in scenario one and scenario two, respectively.
In scenario one, the delay of FLMPC-One is almost 0.2 s higher than LMPC because of processing time for potential node selection at every node. Meanwhile, FLMPC-Two’s delay is almost 0.6 s higher than LMPC due to less number of active nodes and three hops neighbor calculation. Less number of active nodes results in less number of possible paths to advance data packet reliably towards surface which increases processing delay.
In scenario two, delay of FLMPC-One is almost 0.3 s higher and FLMPC-Two is 0.5 s higher as compared to LMPC. The reason to locate P F N using two hops or three hops information is to avoid energy holes. When a data packet reaches in void region, there is no way out and the current forwarder drops it which needs to be retransmitted. Retransmission increases energy consumption and delay.
In existing and proposed schemes, multiple copies of a data packet reach at the destination. So, there are more than one delays for one data packet. In our proposed schemes, we consider the worst scenario and count the highest delay among them. While calculating delay, we are taking into consideration transmission delay, propagation delay and processing delay of P F N at each node. In proposed schemes, if there are more than one, two or three hops neighbors exist then the one farthest among them from current forwarder is selected. The farthest node selection affects delay because of high propagation time.

5.2.3. Energy Consumption

Figure 11a,b show energy consumption of existing and proposed schemes in scenario one and scenario two, respectively, with different D R s and P l s . Energy consumption depends upon the D R s irrespective of the P l . We set D R to 10, 20 and 30 KB/s and P l to 100, 200, 300, 400 and 500 bytes.
Figure 11. Energy Consumption with Different Data Rate and Packet Size. (a) Scenario-1; (b) Scenario-2.
High number of active nodes in LMPC as shown in Figure 9, increases collision in the dense network which results in packet drop. While, sparse regions effect PRR by dropping data packets in void region. In existing and proposed schemes, multiple copies are directed towards surface in order to eliminate retransmissions and save energy.
Unlike LMPC, tree generation from source node, FLMPC-One and FLMPC-Two establish binary tree from cross nodes only which results in less number of duplicate data packets. FLMPC-One and FLMPC-Two reliably transmit data packets to most suitable nodes and save data packets from entering void region. These reliable and less number of data packets ultimately saves energy and increases PRR as shown in Figure 12.
Figure 12. Packet Received Ratio.
In scenario one, FLMPC-One saves almost 8–12.5% energy while, FLMPC-Two saves 23–26% energy of the network as shown in Figure 11a. FLMPC-One saves 8.33–12.7% energy and FLMPC-Two saves 23.8–29% energy in scenario two. FLMPC-One and FLMPC-Two reduces energy consumption at the cost of delay. In FLMPC-Two, every node performs calculations up to three hops in order to avoid void holes which increases PRR and saves energy. FLMPC-Two achieves this by paying cost of high delay as shown in Figure 10.
In DBR, energy consumption is higher in both scenarios one and two as compared to LMPC and FLMPC schemes. The high energy consumption is because of void hole occurrence when forwarding data packets with greedy approach. Moreover, it can be seen from Figure 11a,b, that with the increase in packet size, the energy consumption also increases. The reason for more energy dissipation in DBR is because of inefficient approach to handle the void holes. The occurrence of void holes increase the packet drop ratio resulting in unwanted energy depletion. While in LMPC and FLMPC transmission of data packets from multiple paths and generation of data packets from cross nodes ensure that the packet will not be re-transmitted.

5.2.4. PRR

It can be seen from Figure 12 that PRR of LMPC in scenario one is less than in both proposed schemes. Initially, it is higher and it gradually decreases as the time increases. Because establishment of binary tree from source node increases duplicate packets in dense region which results in high collision. This collision increases packet drop. Moreover, one hop information in LMPC may lead data packet to void region which also affects PRR. In scenario two of LMPC, initially PRR is less because of less number of copies reached to gateway. However, it improves as the time increases because of increasing active node density. As active nodes increases, number of possible paths increases.
PRR of DBR in both scenarios is less as compared to both FLMPC schemes and LMPC. The reason for low performance in term of packet reception is greedy approach for at every data packet is broadcasted to find out a shortest path. The broadcast mechanism increases the collision of the data packets. Moreover, with the increase in number of active nodes, the chances of collision also increases. In addition, the factor of holding time also contributes in the reduction of PRR at each hop. Hence, from the depicted results it can be concluded that high collisions and inefficient holding time of the data packet by the neighbors node result in less PRR.
In the proposed schemes, unlike LMPC, every source node unicasts the data packet. When this data packet reaches the the cross node of nearest layer, this cross node generates a binary tree. This mechanism results in a lower number of duplicate packets which reduces collision as compared to LMPC. In a sparse region FLMPC-One’s two hops and FLMPC-Two’s three hops neighbor information avoid void holes. In void holes avoidance, proposed schemes awake most suitable sensor nodes to lead data packet towards destination. There are less copies generated in both proposed schemes as compared to LMPC. However, reliable advancement of data packets increases PRR. PRR of FLMPC-One in scenario one is higher than PRR of scenario two because it has less active nodes in scenario one which ultimately leads to less collision.

5.2.5. Required Packer Error Ratio

Figure 13 shows energy consumption per packet in the presence of different P r r e q . We can observe, if P r r e q is high which means high reliability of data packet, energy consumption is also high. Because when data packets are received at the gateway, error is checked in them. If error is higher than threshold, this data packet is dropped. As we allow higher number of acceptable erroneous bits, energy consumption decreases. Increasing P r r e q value means that reliability of data packet is decreasing.
Figure 13. Required Packer Error Ratio.
Energy per packet with different P r r e q in both scenarios of LMPC is higher as compared to proposed schemes. Although, the difference is less because in all schemes multiple copies are generated of a data packet. So, data packets reach at the sink through different paths. If one path has high fading, data packet may get less affected on other path. FLMPC-One is performing better because of two hops information and achieves reliability in both scenarios. Figure 13 shows that FLMPC-Two outperforms both schemes because of three hops information. FLMPC-Two selects that path which advances data packet towards surface and effects the data packet less. If all the copies of the data packet are erroneous then still there is a chance of getting original packet by combining them at the sink.
The energy consumption of DBR in Figure 13 is initially low as compared to LMPC and FLMPC because it only generates one copy from every source node. On the other hand, with the increase in packet interval, the energy depletion increases because of high message exchange among the network nodes. Additionally, the occurrence of void hole also increases which results in high energy dissipation and more packet drop ratio. In Figure 13, the results depicted clearly show that at 6 s of packet interval, the energy consumption is greater than 0.3 J. Hence, the FLMPC and LMPC have achieved considerable amount of improvement in terms of energy utilization as compared to DBR.

5.3. Performance Trade Offs

Table 5 shows the performance trade offs of proposed schemes. In order to avoid repetition, parameters are explained generally because of same behaviour in proposed schemes. Multiple copies of data packets are forwarded in order to achieve reliability. FLMPC-One performs better in terms of active nodes, energy consumption and PRR. However, processing delay at each node in FLMPC-One increases its delay. FLMPC-Two makes smart decisions than FLMPC-One and awakes less number of active nodes which saves energy and increases PRR by reliably transmitting the data packet towards the surface. However, FLMPC-Two pays the cost of delay.
Table 5. Performance Tradeoffs in Proposed and Compared Schemes.

6. Conclusions

Energy conservation is one of the prime requirements in protocol designing of UWSNs because of limited resources. Energy holes, created by random distribution or death of nodes, increase the data packet’s drop rate and decrease the network lifetime. In this paper, we have proposed FLMPC-One and FLMPC-Two in order to achieve reliability and energy efficiency. Both schemes direct multiple copies of a data through various data routes towards the surface gateways where they are combined to generate an original data packet. Deep water faces less noises; thus, both proposed schemes (FLMPC-One and FLMPC-Two) have not generated the binary tree from cross nodes deployed in deep water. This is only done to reduce number of duplicate packets at the destination in order to save nodes battery and prolong the network operations. However, in shallow water, the noise increases, therefore cross nodes generate binary tree and direct multiple copies towards the destination which ensured the reliable delivery of data packets. FLMPC-One and FLMPC-Two avoid the void hole problem through a proactive approach and find an alternative route towards the destination making sure that the selected path has less noises. The simulation results show that our proposed schemes achieve energy efficiency, high PRR and reduce the number of active nodes which increases the network lifetime by paying the cost of delay.

Acknowledgments

The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through research group NO (RG-1438-034).

Author Contributions

Babar Ali, Arshad Sher, Nadeem Javaid and Saif Ul Islam proposed and implemented (validated) the main idea. Khursheed Aurangzeb and Syed Irtaza Haider wrote, organized and refined rest of the manuscript.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Akyildiz, I.F.; Pompili, D.; Melodia, T. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar] [CrossRef]
  2. Davis, A.; Chang, H. Underwater wireless sensor networks. In Proceedings of the IEEE Oceans, Hampton Roads, VA, USA, 14–19 October 2012; pp. 1–5. [Google Scholar]
  3. Al-Salti, F.; Alzeidi, N.; Arafeh, B. A new multipath grid-based geographic routing protocol for underwater wireless sensor networks. In Proceedings of the IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Shanghai, China, 13–15 October 2014; pp. 331–336. [Google Scholar]
  4. Wang, K.; Gao, H.; Xu, X.; Jiang, J.; Yue, D. An Energy-efficient Reliable Data Transmission Scheme for Complex Environmental Monitoring in Underwater Acoustic Sensor Networks. IEEE Sens. J. 2016, 16, 4051–4062. [Google Scholar] [CrossRef]
  5. Xu, J.; Li, K.; Min, G.; Lin, K.; Qu, W. Energy-efficient tree-based multipath power control for underwater sensor networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 2107–2116. [Google Scholar] [CrossRef]
  6. Yan, H.; Shi, Z.J.; Cui, J.-H. DBR: Depth-based routing for underwater sensor networks. In Proceedings of the International Conference on Research in Networking, Singapore, 5–9 May 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 72–86. [Google Scholar]
  7. Yu, H.; Yao, N.; Wang, T.; Li, G.; Gao, Z.; Tan, G. WDFAD-DBR: Weighting depth and forwarding area division DBR routing protocol for UASNs. Ad Hoc Netw. 2016, 37, 256–282. [Google Scholar] [CrossRef]
  8. Wahid, A.; Lee, S.; Kim, D. A reliable and energy-efficient routing protocol for underwater wireless sensor networks. Int. J. Commun. Syst. 2014, 27, 2048–2062. [Google Scholar] [CrossRef]
  9. Noh, Y.; Lee, U.; Wang, P.; Choi, B.S.C.; Gerla, M. VAPR: Void-aware pressure routing for underwater sensor networks. IEEE Trans. Mob. Comput. 2013, 12, 895–908. [Google Scholar] [CrossRef]
  10. Diao, B.; Xu, Y.; An, Z.; Wang, F.; Li, C. Improving both energy and time efficiency of depth-based routing for underwater sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 781932–781940. [Google Scholar] [CrossRef]
  11. Jiang, J.; Han, J.; Guo, H.; Shu, L.; Rodrigues, J.J.P.C. Geographic multipath routing based on geospatial division in duty-cycled underwater wireless sensor networks. J. Netw. Comput. Appl. 2016, 59, 4–13. [Google Scholar] [CrossRef]
  12. Zhou, Z.; Cui, J.-H. Energy efficient multi-path communication for time-critical applications in underwater sensor networks. In Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hong Kong, China, 26–30 May 2008; ACM: New York, NY, USA, 2008; pp. 221–230. [Google Scholar]
  13. Javaid, N.; Ilyas, N.; Ahmad, A.; Alrajeh, N.; Qasim, U.; Ali Khan, Z.; Liaqat, T.; Iqbal Khan, M. An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks. Sensors 2015, 15, 29149–29181. [Google Scholar] [CrossRef] [PubMed]
  14. Huang, C.-J.; Wang, Y.-W.; Liao, H.-H.; Lin, C.-F.; Hu, K.-W.; Chang, T.-Y. A power-efficient routing protocol for underwater wireless sensor networks. Appl. Soft Comput. 2011, 11, 2348–2355. [Google Scholar] [CrossRef]
  15. Xu, J.; Li, K.; Min, G. Reliable and energy-efficient multipath communications in underwater sensor networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1326–1335. [Google Scholar] [CrossRef]
  16. Luo, H.; Guo, Z.; Wu, K.; Hong, F.; Feng, Y. Energy balanced strategies for maximizing the lifetime of sparsely deployed underwater acoustic sensor networks. Sensors 2009, 9, 6626–6651. [Google Scholar] [CrossRef] [PubMed]
  17. Coutinho, R.W.L.; Boukerche, A.; Vieira, L.F.M.; Loureiro, A.A.F. Geographic and Opportunistic Routing for Underwater Sensor Networks. IEEE Trans. Comput. 2016, 65, 548–561. [Google Scholar] [CrossRef]
  18. Noh, Y.; Lee, U.; Lee, S.; Wang, P.; Vieira, L.F.M.; Cui, J.-H.; Gerla, M.; Kim, K. Hydrocast: Pressure routing for underwater sensor networks. IEEE Trans. Veh. Technol. 2016, 65, 333–347. [Google Scholar] [CrossRef]
  19. Latif, K.; Javaid, N.; Ahmad, A.; Ali Khan, Z.; Alrajeh, N.; Khan, M.I. On energy hole and coverage hole avoidance in underwater wireless sensor networks. IEEE Sens. J. 2016, 16, 4431–4442. [Google Scholar] [CrossRef]
  20. Stojanovic, M. On the relationship between capacity and distance in an underwater acoustic communication channel. ACM Sigmob. Mob. Comput. Commun. Rev. 2007, 11, 34–43. [Google Scholar] [CrossRef]
  21. Sha’ameri, A.Z.; Al-Aboosi, Y.Y.; Khamis, N.H.H. Underwater acoustic noise characteristics of shallow water in tropical seas. In Proceedings of the 2014 IEEE International Conference on Computer and Communication Engineering (ICCCE), Kuala Lumpur, Malaysia, 23–25 September 2014; pp. 80–83. [Google Scholar]
  22. Divide line in ratio k1:k2. Available online: http://www.teacherschoice.com.au/Maths_Library/Analytical%20Geometry/AnalGeom_3.htm (accessed on 12 January 2017).
  23. Sea 6 technical report: Underwater ambient noise. Available online: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/197303/SEA6_Noise_QinetiQ.pdf. (accessed on 21 December 2016).
  24. Ambient noise: The background noise of the sea. Available online: https://www.usna.edu/Users/physics/ejtuchol/documents/SP411/Chapter11.pdf (accessed on 21 December 2016).

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.