Next Article in Journal
A Fully Coupled Thermo-Hydro-Mechanical-Chemical Model for Methane Hydrate Bearing Sediments Considering the Effect of Ice
Next Article in Special Issue
A uw-Cellular Network: Design, Implementation and Experiments
Previous Article in Journal
Influence of Different Static Equilibrium Calculation Methods on the Dynamic Response of Marine Cables during the Releasing Process: Review and a Case Study
Previous Article in Special Issue
Cross-Layer Protocol Based on Directional Reception in Underwater Acoustic Wireless Sensor Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An On-Demand Scheduling-Based MAC Protocol for UW-WiFi Networks

1
College of Computer Science and Technology, Jilin University, Changchun 130012, China
2
Shenzhen Institute for Advanced Study, UESTC, Shenzhen 518110, China
3
School of Electronic and Information Engineering, Beihang University, Beijing 100191, China
4
Smart Ocean Technology Co., Ltd., Shenzhen 518057, China
*
Author to whom correspondence should be addressed.
J. Mar. Sci. Eng. 2023, 11(4), 765; https://doi.org/10.3390/jmse11040765
Submission received: 10 March 2023 / Revised: 28 March 2023 / Accepted: 30 March 2023 / Published: 31 March 2023
(This article belongs to the Special Issue Underwater Wireless Communications: Recent Advances and Challenges)

Abstract

:
Underwater Internet-of-Things (UIoT) is an extension of Internet-of-Things technology in underwater. The underwater acoustic network with WiFi architecture (UW-WiFi), as a specific deployment of UIoT, has been proved to be a promising technique for wide-ranging marine applications. However, due to the unique features of underwater acoustic channel, such as long and variable propagation delay, low available bandwidth and high bit error rate, conventional medium access control (MAC) protocols designed for terrestrial WiFi networks need an overhaul to work efficiently for UW-WiFi networks. In consideration of the aforementioned channel features, different demands of nodes to occupy channel resources and the reliability of data transmission, a time sequence-based dynamic on-demand assignment (SDDA) MAC protocol for UW-WiFi networks is proposed in this paper. In SDDA, the collision-free scheduling is integrated with the reservation mechanism, aiming to address the issue of various access requirements of diverse task nodes on channel resources in the UW-WiFi network system. The designed protocol employs propagation delays and the amount of data to be sent by terminal nodes to achieve non-conflict transmissions of control packets and on-demand scheduling of data packets. Additionally, the scheme does not require extra overhead for time synchronization. Comparison simulations demonstrate that SDDA provides considerable benefits in terms of channel utilization, end-to-end delay and packet delivery ratio. At last, the SDDA protocol is implemented and a UW-WiFi network system is set up in the marine environment. The ocean field experiment results agree well with the simulated ones and also verify that the proposed protocol achieve conflict-free on-demand scheduling, fairness among terminal nodes at different ranges and the practicability in actual environments.

1. Introduction

In recent years, underwater acoustic networks (UANs), as a momentous extension of Internet-of-Things technology to the underwater environment, have captured growing attention in academia and industry because of their wide range of use, for example, ocean monitoring, oceanographic data collection, disaster warning, diving, and so on. In order to enable various underwater nodes with diverse missions to be networked in a flexible manner to meet those applications, a UAN with the WiFi network architecture, called UW-WiFi, is presented in [1], similarly to the traditional terrestrial WiFi network, which provides wireless access services for underwater nodes (e.g., marine engineering equipment, automatic underwater vehicles, divers, sensors, and so on). The UW-WiFi network affords distinct types of data collecting activities in uplinks, command control actions in downlinks and interacting functions between any two nodes.
To accomplish the UW-WiFi network consisting of heterogeneous nodes, designing a practical medium access control (MAC) protocol is indispensable. Nevertheless, MAC protocols, mainly including carrier sense multiple access (CSMA), time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA), designed for the terrestrial WiFi network [2] are not applicable for the UW-WiFi network, due to typical characteristics of the underwater acoustic channel, such as low available bandwidth, long and variable propagation delay, high bit error rate, and time-varying. The underwater acoustic speed is approximately 1500 m/s, five orders of magnitude lower than the optical speed ( 3 × 10 8 m/s), which makes CSMA based on the Request To Send/Clear To Send (RTS/CTS) exchanging costly. Because of the narrow available bandwidth, FDMA is impractical. TDMA requires precise time synchronization, which is difficult and needs extra cost to achieve. The near-far effect is usually difficult to be eradicated in the time-varying acoustic channel, leading CDMA to be not suitable for the UW-WiFi network. Several related works have been proposed for underwater data collection networks [3,4,5]. A customized Slotted-FAMA protocol is introduced for underwater acoustic WiFi networks [3]. This protocol only caters for applicable scenarios with low node density and traffic load, in which as the data traffic increases, the conflict of control packets will become sharply harsh. Two MAC protocols based on TDMA, namely, Transmit Delay Allocation MAC (TDA-MAC) and Accelerated TDA-MAC, are proposed [4], which have no need for clock synchronization. However, the algorithm is quite inflexible and unable to adapt to the various data volume requirements of nodes. A deep reinforcement learning-based MAC protocol is proposed [5], which is highly complex, and has high requirements for hardware computing and energy consumption, which makes it hard to be applicable in real situations. Furthermore, the hardship and high-cost of setting up real underwater network systems and executing field experiments lead to most research being based on theoretical analysis and simulations. However, dynamic underwater acoustic channel and complicated communication systems cannot be well reflected by simulation.
Given the above issues, and considering the limitations of underwater acoustic communication channel, energy conservation, the different needs of heterogeneous nodes for the shared channel and the usability of the algorithm, a time sequence-based dynamic on-demand assignment (SDDA) MAC protocol is proposed and implemented in an actual system for the UW-WiFi network. By combining the main point of TDMA and reservation, this protocol improves channel utilization and packet delivery ratio, decreases end-to-end delay, and achieves good fairness among terminal nodes at different ranges. This protocol mainly includes two phases, the reservation phase and the time sequence scheduling phase. To avoid collisions of request packets during the reservation phase, the sending time of request packets from each terminal node is calculated by exploiting propagation delays. During the time sequence scheduling phase, the timing of every node beginning to transmit data is figured out according to the data transmission delay and the propagation delay from itself to the master node. This on-demand scheduling algorithm does not require time synchronization and saves energy by reducing the number of control packets and preventing all packets from conflicting. Overall, the key contributions of our work are summarized as follows:
  • Based on the UW-WiFi network scenario that addresses real-world application issues, and taking the above various constraints into account, a practical MAC protocol is proposed, which can allocate channel resources on demand according to the different data sizes of each node under diverse duties.
  • To thoroughly verify the practicability of the SDDA MAC protocol, we have performed numerous simulations and two types of ocean trials. The comparison simulation experimental results show that the SDDA protocol substantially outperforms TDMA and S-FAMA [6] on channel utilization, packet delivery ratio, and end-to-end delay. Then, we implement the SDDA protocol in the embedded motherboard and build a real UW-WiFi network system at Daya bay, Shenzhen. The first type of tests is mainly to validate the effectiveness of the simulation, and it is obtained that the sea test results conform to the simulation. The other type is the experiments on different tasks of nodes, from which we collect the distinct real ocean data, which demonstrate the utility of the proposed protocol. The sea trials also show that the SDDA is a feasible solution for the real UW-WiFi network deployments.
The remainder of this paper is organized as following. Section 2 gives a brief overview of the state of art on the related protocols. Section 3 discusses the application scenario. Section 4 gives a detailed description of the proposed SDDA MAC protocol. Section 5 presents extensive simulations and sea trials to testify the performance of the SDDA protocol. Finally, Section 6 concludes the paper.

2. Related Work

There has been extensive research on MAC protocols for UANs. These work can be classified into three categories: contention-free, contention-based, and hybrid, which this section will examine in the UW-WiFi network scenario.
Contention-free MAC protocols, mainly including TDMA, FDMA, CDMA, and their variants, allocate network resources to specific nodes but not on-demand. TDMA divides the channel into multiple time slots and assigns each time slot to each node [7], in which, data are buffered by a node before being transmitted until its assigned time slot. Each node can take full advantage of the available bandwidth during its time slot. Unfortunately, TDMA requires strict time synchronization amongst all of the nodes in the network. Additionally, when network nodes have no data to send, their time slots are wasted. FDMA divides the available frequency band into multiple sub-bands and assigns a sub-band to each user [8], by which it guarantees collisions free among nodes. This algorithm is simple and efficient when dealing with a small number of nodes in uniformly constant traffic. However, for networks with changes in scale and traffic, such as UANs, it is unadjustable and inefficient. Additionally, guard bands are needed between sub-bands to compensate for imperfect filters, adjacent channel interference, and spectral spreading due to the Doppler Effect, which decreases the available bandwidth. CDMA allocates a unique code to each node, allowing multiple nodes to transmit packets concurrently by using the entire bandwidth. However, to prevent the near-far effect, it needs a power control algorithm to adjust the appropriate output power level for each node [9], which is hard to accomplish in actual sea applications.
Contention-based protocols are clustered into random access and handshaking based. The random access approaches majorly comprise ALOHA, CSMA, and their variants, which are suitable for UANs with lower data traffic and sparser deployment. In the original Aloha protocol, Whenever a node has information to send, it transmits the information immediately, which cannot avoid collisions and will result in a high probability of retransmission and ultimately reduce the network performance. Due to a number of retransmissions, the maximum achievable throughput of the original Aloha protocol is only 18 % [10,11]. Roberts et al. proposed Aloha with Collision Avoidance (Aloha-CA) and Aloha with Advance Notification (Aloha-AN) to reduce collisions [12], both of which utilize overhearing messages and propagation delays between nodes to avoid collisions. However, when the number of nodes and network traffic increase, the collision may increase as well. CSMA protocol avoids collisions by requiring a node to sense the channel prior to data transmission [13], which only addresses the sender-side collisions, while the receiver is still vulnerable to collisions due to the hidden terminal problem [14]. Details and various designs of CSMA can be found in [15,16,17]. The handshaking-based protocols employ RTS/CTS control packet exchanges to reduce data packet conflicts. Molins proposes a protocol named S-FAMA [6] which uses a four-way handshaking with time-slotting to avoid data collisions. To reduce reservation duration, the DACAP protocol allows a node to use different handshaking lengths for different receivers [18]. SASHA [19] is a hybrid approach of selective automatic repeat request (ARQ) and slotted handshaking access, in which after each successful negotiation, the sender pushes multiple available packets into a train to reduce the average overhead and improve the channel utilization. A multiple access with collision avoidance MAC protocol named fixed interval MACA (FI-MACA) [20] is proposed, where the sender can detect collisions effectively with low complexity, and the receiver also listens to the channel for a while to solve the hidden station problem before responding a CTS to the sender. However, because of the long preamble of acoustic modems [21] and the long propagation delay in the underwater acoustic channel, when the network load is heavy, the pure handshaking-based solution will spend a lot of time on channel reservation.
Different from the abovementioned protocols, hybrid protocols make use of the positive characteristics of both contention-free and contention-based. Zilong Liao et al. [22] propose a handshake-based ordered scheduling MAC (HOSM) protocol for underwater acoustic local area networks, which utilizes a variant Max–Min Ant System algorithm to calculate the optimal order for each data transmission round to improve channel utilization while maintaining low delay and good spatial fairness. Two MAC protocols, namely, Transmit Delay Allocation MAC (TDA-MAC) and Accelerated TDA-MAC, are proposed to provide time division multiple access to sensor nodes without the need for centralized clock synchronization, and to utilize ping packets to calculate the propagation delays between nodes, achieving the ordered scheduling [4]. J. H. et al. [23] propose a sequence-scheduled and query-based MAC (SQ-MAC) protocol for UANs with a mobile node, which is receiver-initiated [24], and can effectively avoid the sender–receiver collision [25] caused by the long propagation delay. Additionally, in this protocol, the ant colony algorithm [26] is adopted as Ref. [22] to schedule the transmission order of data packets to improve channel utilization. However, to ensure the real-time of mobile node data as much as possible, it increases the delay of static node data. However, none of these protocols consider the different data requirements of different nodes in practical applications.
To some extent, the above protocols are capable of achieving their performance goals in the network model that they are concerned with and mainly based on theory analysis and simulation tests. Moreover, their performance is limited for UW-WiFi networks comprised of nodes with various task types. Accordingly, our work is significant for this kind of practical network scenario.

3. Application Scenario

Underwater Internet-of-Things (UIoT), as a significant extension of Internet of Things in underwater environments, is regarded as the network of interconnected underwater smart objects. UANs, considered as a promising network infrastructure to support UIoT, have wide application prospects in marine scientific investigation, ocean environment observation, marine ranch monitoring, disaster prevention, underwater rescue, coastal guard, military reconnaissance, blockades, etc. Usually, UANs, meeting the above application scenarios, are composed of heterogeneous nodes with heterogeneous data. For example, the nodes may include surface buoys, submerged buoys, unmanned underwater vehicles (UUV), gliders, unmanned surface vessels (USV), and so on; and the data may include sonar detection data, image, hydrological data, status data, command data, etc. Additionally, these UANs need to have the following functions: data acquisition in the uplink, remote command control in the downlink, and interaction between some nodes.
In view of the aforementioned actual requirements, and in order to enable flexible networking of heterogeneous nodes with diverse missions, the UW-WiFi network architecture is introduced, as shown in Figure 1, in which the given UW-WiFi network is two-level, the first level consists of a surface gateway (called SG) and base stations (called BS) within SG’s communication range, and the second level is composed of multiple subnets consisting of base stations and terminal nodes within BS’s communication range. All terminal nodes in the whole network can be static or mobile. The radius of each subnet is the maximum communication range of the BS. Subnets are spatially far away from each other without interference between them. The BS of each subnet is responsible for providing wireless access services for terminal nodes, which can aggregate a wide variety of data from terminals and forward them to the SG through the upstream underwater acoustic link, and can relay commands from the SG or data from other nodes to its terminal nodes through the downstream underwater acoustic link. In this work, the designed MAC protocol is intended for each subnet, and the MAC protocol for the entire hierarchical UW-WiFi network, including a solution to switching among subnets for AUVs, is not in the scope of this paper, which will be our future work.
Designing a practical MAC protocol is of great significance to the UW-WiFi network. The MAC protocol is the basis for guaranteeing good quality of service in wireless networks. Taking into account the inherent characteristics of underwater acoustic signal with long propagation delay, low available bandwidth, and high bit error rate, as well as the diverse data transmission demand of nodes in the UW-WiFi network, the functional MAC scheme constructing is a challenging work. Firstly, in the case of different data transmitting needs of each terminal node in the network, how to effectively manage the access of multiple nodes to the shared channel to optimize the channel utilization. Secondly, how to resolve the issue that different types of data have different demands for reliability and real-time performance. In the following sections, we will discuss the MAC protocol design strategy.

4. Design of SDDA MAC Protocol

Overview of SDDA MAC Protocol
Firstly, we give an overview of SDDA, which performs on-demand scheduling and guarantees collision-free transmissions of both control packets and data packets. This protocol merged the reservation mechanism and the scheduling to fulfill a collision-free on-demand assignment. The most significant challenges for our collision-free scheduling are: (1) How to work out propagation delays from BS to all terminal nodes without time synchronization? (2) How to achieve the on-demand assignment for each node? (3) How to make sure collision-free transmissions of control packets from static and dynamic terminals? (4) How to ensure the reliability of data as far as possible in the case of packet loss caused by acoustic channel instability? Then we will show how SDDA solves these issues.
An example of packets transmission scheduling of SDDA MAC protocol is shown in Figure 2. It can be seen from Figure 2 that the processing flow is composed of three procedures: the initial reservation phase, the time sequence scheduling phase, and the data transmitting phase. In addition, there is a periodic regular reservation phase, described in the following. During the initial reservation phase, BS broadcasts a trigger ( T R ) packet at first; and after receiving the T R packet, those terminal nodes that have data to report send a request ( R E ) packet to BS. Then, in the time sequence scheduling phase, after receiving all R E packets, BS calculates the waiting time of each node before sending data packets on the basis of propagation delay and data transmission delay contained in the R E packet and broadcasts a transmitting-start ( T S ) packet, in which the scheduling information is embedded. Within the data transmitting phase, after receiving the T S packet, those terminal nodes with data to send will start transmitting data packets at an appropriate time in the light of the scheduling information obtained from the T S packet. Finally, at the end of data transmission, BS will broadcast an A C K and then, if any, forward data or command packets to the related terminals. Beyond those, it should be noted that the difference between the initial reservation phase and the periodic regular reservation phase is the method of handling R E packet conflicts. Afterwards details about SDDA are as follows.
A. The Initial Reservation Phase. This phase mainly solves how to obtain the amount of data to be sent by each node and how to avoid the R E packet collisions. During this phase, in the first place, BS records the current time ( t s e n d _ T R ) and broadcasts a T R packet, the format of which is shown in Figure 3 that reveals the meaning of each byte of T R . For instance, l a y e r _ i d stands for the MAC layer ID, h d r _ l e n means the length of header information of a MAC layer packet, s r c _ a d d r denotes the source address, d e s t _ a d d r represents the destination address, p k t _ t y p e expresses the type of the present packet, and the rest ( n o d e I D and r e _ t x _ w a i t T i m e ) indicates the waiting time of each terminal node before transmitting an R E packet. Actually, r e _ t x _ w a i t T i m e is the waiting duration ( w d t x _ R E _ i , where i denotes the node ID) for each terminal node from receiving T R to sending R E . In the case where the propagation delays between each node and BS are not known at present, so as to prevent R E packets from colliding, we adopt the maximum propagation delay ( p d m a x ) in the UW-WiFi network and the transmission delay of R E packet ( t d R E ) to compute the above-mentioned waiting duration. The computational formula is as follows:
w d t x _ R E _ i = ( i 1 ) × ( p d m a x + t d R E ) .
After receiving T R , each terminal node extracts its own waiting duration information from T R in accordance with the node ID. Additionally, then they make use of the sum of the lengths of all data packets in the sending queue to figure out their respective data transmission delay ( t d d a t a _ i ) and put t d d a t a _ i (i.e., d a t a _ t x _ d e l a y in the R E packet shown in Figure 3) into the R E packet. When the waiting duration expires, terminal nodes dispatch R E packets to BS. As long as BS receives an R E , it takes notes on the reception time ( t r e c v _ R E _ i ) and t d d a t a _ i carried in the R E packet. Instead of plenty of RTS-CTS handshakes, this reservation scheme diminishes the number of control packets by broadcasting a T R , while solving the problem of control packet collisions, hence saving energy, improving channel utilization, and shortening end-to-end delay. The pseudo code of this phase is shown in Algorithm 1.
Algorithm 1. The Initial Reservation Phase.
1.
for each node ID i, 1 i n , n is the number of terminal nodes, do
2.
calculate the transmitting time of each terminal node’s R E ,
3.
w d t x _ R E _ i = ( i 1 ) × ( p d m a x + t d R E )
4.
end for
5.
write each R E ’s transmitting time information into T R
6.
record t s e n d _ T R and broadcast T R
7.
switch from the sending T R state to the waiting R E state
8.
start the waiting R E timer, the duration of this timer is D w _ R E = t d T R + ( n + 1 ) × p d m a x + n × t d R E
9.
if D w _ R E doesn’t expire, then
10.
receive RE, record t r e c v _ R E _ i , and t d d a t a _ i   T D A T A + = t d d a t a _ i , T D A T A is the transmission delay of all data packets from all terminal nodes
11.
else if the number of R E packets received > 0, then
12.
switch from the waiting R E state to the sending T S state
13.
else
14.
go to the step of Line 6
15.
end if
B. The Time Sequence Scheduling Phase. This phase mainly settles the efficient scheduling problem of data transmission for each node on the basis of t d d a t a _ i and the propagation delay (from BS to terminal nodes, denoted as p d i ). The equation of computing p d i is:
p d i = ( t r e c v _ R E _ i t s e n d _ T R w d t x _ R E _ i t d T R t d R E ) / 2 .
For the purpose of precluding data packets from colliding and enhancing the channel utilization as far as possible, we sort propagation delays of all terminal nodes in ascending order at first. Suppose the ascending sequence of these propagation delays is p d i < p d i + 1 , i [ 1 , n 1 ] , where n is the number of all terminal nodes. Then the data sending order of all terminal nodes is n o d e 1 , n o d e 2 , , n o d e n 1 , n o d e n . From the above, the waiting time of the first node before starting data transmission is:
w d t x _ D A T A _ 1 = p d n p d 1 .
That is, w d t x _ D A T A _ 1 is waiting duration for n o d e 1 from receiving T S to beginning delivering data. In that way, the waiting duration for n o d e i can be expressed as below:
w d t x _ D A T A _ i = w d t x _ d a t a _ i 1 + t d d a t a _ i 1 + t g + 2 ( p d i 1 p d i ) ,
where t g is the guard interval for BS between the end of receiving data from n o d e n 1 and the start of receiving data from n o d e n . Afterwards, w d t x _ D A T A _ i is added into the T S packet, whose specification is exhibited in Figure 3, where n o d e _ n u m _ s e n d is the number of those terminal nodes having data to send, and d a t a _ t x _ w a i t T i m e means w d t x _ D A T A _ i . After that, BS broadcasts the T S packet. This on-demand scheduling design reasonably allocates channel according to the data amount of each terminal node, without wasting channel resources, thus maximizing channel utilization. The pseudo code of this phase is revealed as Algorithm 2.
Algorithm 2. The Time Sequence Scheduling Phase.
1.
for each node ID i, 1 i n , n is the number of terminal nodes, do
2.
calculate the propagation delay of each terminal node according to t r e c v _ R E _ i a n d t s e n d _ T R , p d i = ( t r e c v _ R E _ i t s e n d _ T R w d t x _ R E _ i t d T R t d R E ) / 2
3.
end for
4.
define an array of structures p d _ a r r a y [ n _ s ] , n _ s is the number of terminal nodes to send data, storing the node ID and its propagation delay.
5.
sort p d _ a r r a y [ n _ s ] in ascending order according to p d _ a r r a y [ i ] . p d
6.
calculate the data transmitting time of the first terminal node ( p d _ a r r a y [ 0 ] . I D ), w d t x _ D A T A _ ( p d _ a r r a y [ 0 ] . I D ) = p d _ a r r a y [ n _ s 1 ] . p d p d _ a r r a y [ 0 ] . p d
7.
for each index i , 0 < i < n _ s , do
8.
calculate the data transmitting time of the rest terminal nodes, w d t x _ D A T A _ ( p d _ a r r a y [ i ] . I D ) = 2 p d _ a r r a y [ i 1 ] . p d + w d t x _ D A T A _ ( p d _ a r r a y [ i 1 ] . I D ) + t d d a t a _ ( p d _ a r r a y [ i 1 ] . I D ) + t g 2 p d _ a r r a y [ i ] . p d
9.
end for
10.
add each node’s data transmitting time information into T S
11.
broadcast T S
12.
switch from the sending T S state to the waiting data state
13.
start the waiting data timer, the duration of this timer is D w _ D A T A = p d _ a r r a y [ n _ s 1 ] . p d + p d _ a r r a y [ 0 ] . p d + T D A T A + ( n _ s 1 ) t g + t d T S
C. The Data Transmitting Phase. This phase mainly concerns data transferring and lost packet retransmission or not. In this phase, each terminal node extracts its own waiting duration information ( w d t x _ D A T A _ i ) from T S by using node ID after receiving T S . When the waiting duration is due, the terminal node commences pouring data packets onto the acoustic channel. The layout of the data packet is detailed in Figure 3, where p k t _ s e q _ n u m is the sequence number of data packets. After finishing receiving data packets from all terminal nodes, BS broadcasts an A C K packet to acknowledge all data packets successfully transferred by all terminal nodes. The A C K packet contains the sequence number of each data packet received from each terminal node, which is p k t _ s e q _ n u m _ r e c v listed in Figure 3, where n o d e _ n u m _ r e c v is the number of those terminal nodes delivering at least one data packet successfully, and p k t _ n u m _ r e c v is the number of data packets received from some terminal node. Data packets that fail to be transferred will be retransferred in the next round. This acknowledge mechanism reduces the number of A C K packets, thereby decreasing energy consumption and improving channel utilization, while ensuring data reliability to a certain extent. For non-critical data, two retransmissions are allowed. For important command data, multiple retransmissions are executed to ensure successful delivery. For data with high real-time requirement such as AUV status, the latest data are transmitted every time without retransmission. The pseudo code of this phase is described in Algorithm 3. Before the start of the next cycle, BS can relay data or commands to a designated terminal node at the end of this phase.
Algorithm 3. The Data Transmitting Phase.
1.
if   D w _ D A T A doesn’t expire, then
2.
receive data packets
3.
record the source address ( n o d e I D ) and the sequence number of each data packet from each terminal node ( p k t _ s e q _ n u m _ r e c v )
4.
else if the number of data packets received > 0, then
5.
switch from the waiting D A T A state to the sending A C K state
6.
construct A C K , the details of which is shown as Figure 3
7.
broadcast A C K
8.
else
9.
go to the Periodic Regular Reservation Phase
10.
end if
D. The Periodic Regular Reservation Phase. The reservation phase is the beginning of each round. The abovementioned initial reservation phase is only a special case at the network initialization. The only difference between the periodic regular reservation phase and the initial reservation phase is the scheduling scheme of R E packets. In the initial reservation phase, as the result of the propagation delay of each terminal node being unknown, the maximum propagation delay is adopted when calculating the transmission moment per R E packet by way of forestalling conflicts as much as possible. Nevertheless, in the periodic regular reservation phase, the propagation delay is known for static terminal nodes at present. Therefore, in order to minimize the spare waiting time of each static node, the calculation method of static nodes’ R E packets transmission moment is the same as that of data packets transmission moment. We assume that the first k nodes are static nodes and the rest are dynamic nodes in the UW-WiFi network, and that the ascending order of static nodes’ propagation delays is p d i < p d i + 1 , i [ 1 , k 1 ] . Then the R E packet transmission moment of the first static node is (i.e., the waiting time before sending the R E packet):
w d t x _ R E _ 1 = p d m a x p d 1 ,
where the meaning of w d t x _ R E _ 1 is in common with w d t x _ R E _ i in the initial reservation phase. Additionally, then R E packets transmission moment of the rest static nodes is:
w d t x _ R E _ i = w d t x _ R E _ i 1 + t d R E + t g + 2 ( p d i 1 p d i ) , 1 < i < k + 1 .
However, the propagation delay of dynamic nodes is constantly changing. Therefore, for preventing R E packets of dynamic nodes from conflicting, we still use the maximum propagation delay, and the transmission moment of each dynamic node’s R E packet is as follows. From the above, the R E transmission moment of the first dynamic node (i.e., n o d e ( k + 1 ) ) is:
w d t x _ R E _ ( k + 1 ) = w d t x _ R E _ k + p d k + t d R E .
Additionally, then R E packets transmission moment of the rest dynamic nodes is:
w d t x _ R E _ i = w d t x _ R E _ ( i 1 ) + p d m a x + t d R E , k + 1 < i n .
The pseudo code of this phase is detailed in Algorithm 4.
Algorithm 4. The Periodic Regular Reservation Phase.
1.
define an array of structures p d _ a r r a y _ r e [ k ] , k is the number of static nodes, storing the node ID and its propagation delay.
2.
sort p d _ a r r a y _ r e [ k ] in ascending order according to p d _ a r r a y _ r e [ i ] . p d
3.
calculate the R E transmitting moment of the first static node ( p d _ a r r a y _ r e [ 0 ] . I D ), w d t x _ R E _ ( p d _ a r r a y _ r e [ 0 ] . I D ) = p d m a x p d _ a r r a y _ r e [ 0 ] . p d
4.
for each index i, 0 < i < k , do
5.
calculate the R E transmitting moment of the rest static nodes, w d t x _ R E _ ( p d _ a r r a y _ r e [ i ] . I D ) = 2 p d _ a r r a y _ r e [ i 1 ] . p d + w d t x _ R E _ ( p d _ a r r a y _ r e [ i 1 ] . I D ) + t d R E + t g 2 p d _ a r r a y _ r e [ i ] . p d
6.
end for
7.
calculate the R E transmission moment of the first dynamic node ( k + 1 ), w d t x _ R E _ ( k + 1 ) = w d t x _ R E _ ( p d _ a r r a y _ r e [ k 1 ] . I D ) + p d _ a r r a y _ r e [ k 1 ] . p d + t d R E
8.
for each dynamic node j, ( k + 1 ) < j < ( n + 1 ) , do
9.
calculate the R E transmitting moment of the rest dynamic nodes, w d t x _ R E _ j = w d t x _ R E _ ( j 1 ) + p d m a x + t d R E
10.
end for
11.
write each R E ’s transmitting moment information into T R
12.
record t s e n d _ T R and broadcast T R
13.
switch from the sending T R state to the waiting R E state
14.
start the waiting R E timer, the duration of this timer is D w _ R E = t d T R + 2 p d m a x + w d t x _ R E _ n + t d R E
15.
if   D w _ R E doesn’t expire, then
16.
receive R E , record t r e c v _ R E _ i , and t d d a t a _ i   T D A T A + = t d d a t a _ i , T D A T A is the transmission delay of all data packets from all terminal nodes.
17.
else if the number of R E packets received > 0, then
18.
switch from the waiting R E state to the sending T S state
19.
else
20.
go to the step of Line 12
21.
end if

5. Experiments and Results

In this section, we first perform throughput simulations on the SDDA MAC protocol. Then, we also use simulations to compare SDDA with another two MAC protocols, S-FAMA [6] and TDMA, in aspects of channel utilization, end-to-end delay, and packet delivery ratio. The time slot length of S-FAMA is equal to the maximum propagation delay plus the CTS’s transmission delay. In TDMA, the number of slots in a periodic time frame is the number of nodes in the UW-WiFi network, and the slot length is set to the sum of the maximum propagation delay and a data packet’s transmission delay. In addition, we implement the SDDA protocol and build a WiFi network system in a real marine environment. In the real network system, we carry out two types of trials to demonstrate the performance of the proposed MAC protocol.

5.1. Performance Metrics

The performance metrics involved in this work are described as follows. (a) The throughput is defined as S = L d a t a D t o t a l , where L d a t a is the total length of user data received, and D t o t a l is the total delay, the duration of an SDDA’s round, which is formulated as D t o t a l = D w _ R E + D w _ D A T A + t d A C K , where t d A C K is the transmission delay of an ACK packet. In throughput simulations, the number and the size of data packets to be sent by each terminal node are the same, denoted as m and L, respectively. Then L d a t a = m n L , and D w _ R E + D w _ D A T A is up to m and n. Consequently, the throughput S is related to n and m. (b) The channel utilization is measured as the ratio of the data delay to the total delay during the given transmission period, i.e., D d a t a D t o t a l . (c) The end-to-end delay is measured as the average delay of the packets received from generation to reception, i.e., k = 1 n R ( t R , k t G , k ) n R . (d) The packet delivery ratio is measured as the ratio of the number of packets delivered successfully to the number of packets sent by all nodes, i.e., n d n s .

5.2. Experimental Implementation

A. Simulation Settings
The simulator used in this work is Aqua-Net Mate [27]. In the simulation scenario, the physical layer parameters are set as follows: the preamble time is 480 ms, and the data rate is 1 kbps, which refers to the commercial off-the-shelf modem. Data packets from all terminal nodes are delivered to BS. In throughput simulations, all terminal nodes, being fixed, are randomly deployed in a circular area with a radius of 3 km centered on BS. Either the number of data packets sent or the number of terminal nodes gradually increases, and the size of data packets generated by each node is set to 544 B. In comparative experiments of the aforementioned three MAC protocols on other performances, the data packet size is fixed to 300 B, and the data packet generation rate of each node gradually increases. In comparative experiments, there are four terminal nodes, in which one terminal node is mobile at a range of 800 to 1131 m, moving back and forth in a square trajectory at a speed of 2 knots, and the other three terminal nodes are at distances of 1500 m, 2000 m, and 3000 m, respectively. The network topology is shown in Figure 4. During the simulations, the packet generation rate λ is from 0.02 to 0.2 pkt/s, and each set of experiments runs lasting 1 h. Finally, various performance results are computed through the stored logs.
The simulated environment is the coastal ocean area, with a depth 10–30 m. For the sake of making the simulation settings closer to the real situation, we have carried out many sea trials on point-to-point communication in offshore area of Shenzhen and summarized the results of communication success ratio (CSR) at different distances as shown in Table 1. Then the ocean trial results in Table 1 are used as the CSR for different ranges in the simulations.
B. Ocean Field Trials Implementation
We code the proposed SDDA MAC protocol in SeaLinx, a network protocol stack designed in [28]. Additionally, the network protocol stack SeaLinx is implemented in the embedded operating system of underwater acoustic modems, which are provided by Smart Ocean Technology Co., Ltd. In the sea trials, each node is equipped with one aforementioned acoustic modem, which operates at a frequency band between 21 and 27 kHz. To fully verify the performance of the SDDA protocol, we conduct two categories of experiments. In the first category of experiments: for the software parameters, we experiment with different numbers of data packets in respect of throughput. The number of data packets is 5, 10, 15, 20, 25, and 30, respectively. The length of the data packet is 544 B. Apart from those, we also trial with varying packet generation rate from 0.02 to 0.2 packet/s with regard to other performances mentioned above. The length of the data packet is 300 B. All the test data are recorded in the log files. In the other category of experiments: to testify the utility of the proposed protocol, we conduct experiments on different classes data of nodes, including image, CTD (conductivity, temperature, and depth), and UUV (unmanned underwater vehicle) status data, of which the image data size is 8 KB, the CTD data size is 50 B, and the UUV status data is 120 B.
Ocean field experiments are conducted at Daya Bay, Shenzhen. The water depth of the test site is around 10 m. The average height of the sea wave during the test is between 1 m and 2 m. The deployment area embraces wave, tide, and temperature variance. In experiment I, we dispose four terminal nodes within a radius of 3 km centered on BS, which is shown in Figure 5, where one terminal node is mobile, moving at a speed of 2 to 3 knots. The distance between each terminal node and BS is about 3 km. In experiment II, we deploy three terminal nodes centered on BS, of which one node, equipped with an underwater camera, is 1.5 km away; another, as UUV, is 1.6 km away; and the third one, carrying a CTD, is 3.5 km away.

5.3. Results and Analysis

A. Simulation Results
In this subsection, we first analyze the throughput simulation results of the proposed protocol. Second, the comparison experiment results of the three protocols are discussed.
Throughput Results Analysis
Figure 6 shows the simulation results of the SDDA protocol with respect to throughput. From Figure 6, we can see that the throughput rises as the number of data packets sent by each node increases. When the number of data packets is less than 7, the throughput increases rapidly. Nevertheless, when the number of data packets is more than 7, the throughput tends to be stable and finally converges to a certain value. This is because when m , except for the data transmission phase, the additional overhead is negligible. Therefore, the throughput eventually approaches the maximum communication rate of the point-to-point link. From Figure 6, we can see that the throughput declines with the number of nodes increasing in the case that the number of data packets issued is less than 7, but ascends with the number of nodes increasing in the case of the number of data packets issued being more than 7. This is because when the number of data packets transmitted by each node is small, as the number of nodes accessing the network increases, compared to the data transmission period, the reservation phase time increases more (i.e., more extra overhead). Thus, to achieve good throughput, the number of data packets to be sent by each node should be more than 7.
Simulated Comparison Experiment Results
Figure 7 compares the simulated channel utilization of the SDDA protocol with that of the other two MAC protocols, S-FAMA and TDMA. As shown in Figure 7, our proposed scheme SDDA notably outperforms S-FAMA and TDMA on channel utilization. Because compared to S-FAMA, SDDA not only reduces the number of control packets, but also ensures conflict-free transmission, and multiple data packets can be sent out after each round of channel reservation. Compared to TDMA, SDDA utilizes the on-demand scheduling mechanism to make the best use of the channel, decreasing the waste of spare time. From Figure 7, it is apparent that the channel utilization of both SDDA and TDMA raises with λ increasing, and eventually becomes a constant value. This is because the proportion of channel time occupied by data packets gradually increases, and when the data traffic in the network is at full load, the channel utilization no longer increases. However, the channel utilization of S-FAMA declines when λ is more than 0.07. This is because more collisions occur, bringing about more additional time being wasted.
Figure 8 illustrates the changes in end-to-end delay over λ . In Figure 8, the end-to-end delay becomes longer as λ goes up, owing to the queueing delay of data packets gradually increasing. In addition, more and more serious conflicts also exacerbate end-to-end delay performance for S-FAMA. As shown in Figure 8, the SDDA protocol achieves the best performance in terms of end-to-end delay, in that each node can burst out all data packets in sending queue by every channel reservation in SDDA, while TDMA can only send one packet in each slot, and there are a great many of handshake clashes in S-FAMA, which greatly enlarges the end-to-end delay.
Figure 9 demonstrates the packet delivery ratio performance of these three protocols. From Figure 9, we can see that the packet delivery ratio of SDDA and TDMA is essentially constant, linked to the packet loss rate specified in the simulation settings, but that of SDDA is higher on account of its acknowledgement-repeat mechanism. While in S-FAMA, the packet delivery ratio is relatively low, and there is a lot of fluctuation, in that control packets collisions become heavier and heavier, leading to multiple retransmissions of data packets failures, and thus data packets that fail to be retransmitted will be discarded.
Based on the above comparison experimental results, the performance of SDDA is significantly superior to the other two. However, in terms of energy efficiency, TDMA is the most energy-saving without transmitting additional control packets; compared to S-FAMA, SDDA only needs a small amount of control packets and completely avoids conflict to save energy. As can be seen from Figure 7, when the packet generation rate is greater than 0.1, the channel utilization of SDDA exceeds 90%, and the proportion of control packets is less than 10%. SDDA’s extra energy consumption except data transmission is not high. Compared with TDMA, although SDDA consumes slightly more energy, its channel utilization is two times higher and end-to-end delay is three times lower, and to some extent, it guarantees the reliability of data transmission.
B. Ocean Field Experiment Results
In this subsection, we evaluate the performances of the SDDA protocol through two types of sea trials. In experiment I, we compare the results of real sea tests with those of simulation in regard to throughput, channel utilization, end-to-end delay, and packet delivery ratio of SDDA protocol. In experiment II, we verify the practicability of SDDA by collecting various underwater data in the built UW-WiFi network system.
Experiment I:
Figure 10 shows the results of ocean trial and the simulation on network throughput of the SDDA protocol in the same settings. It is apparent that the network throughput gradually rises and finally stabilizes with the increase in the number of data packets sent, which conforms with the throughput simulation results. However, through Figure 10, we can obtain that the field trial results are slightly lower than the simulation results. This is because the underwater acoustic communication link is unstable due to the serious ocean conditions during the trial, resulting in a high bit error rate, which causes packet decoding failures and being dropped.
Figure 11 and Figure 12 depict the simulation and sea test consequences of channel utilization and end-to-end delay on the proposed SDDA scheme, respectively. As the packet generation rate rises, it results in an increase in the number of data packets, thereby significantly increasing the time that the data occupy the channel and the data queueing delay in each round of transmission. Hence, the channel utilization and end-to-end delay increase as illustrated in Figure 11 and Figure 12. From Figure 11, we can also see that the channel utilization eventually converges to a certain value. This is because the maximum number of packets sent by each node each time is fixed, and when the number of packets sent reaches the maximum, the channel utilization will no longer increase. The field experiment results are in line with the simulations on both of the two performances. When the number of packets sent is unlimited and tends to infinity (i.e., the packet generation rate tends to infinity), the channel utilization will be infinitely close to 100%, but the end-to-end delay will become considerable. Therefore, in practical applications, we should consider a trade-off between the two performances to choose the most appropriate packet generation rate based on the application requirements.
Figure 13 presents the simulation and sea field experiment results of the packet delivery ratio of the SDDA mechanism. From Figure 13, we can observe that the packet delivery ratio holds steady at around 90%, and even reaches 100% once in a while. Compared to the results of the simulation, those of real sea tests are a little lower in Figure 13. For the reason that underwater acoustic communication suffers from intermittent connectivity in consequence of harsh hydrological environment varying with time in real sea trials, which brings about erratic packet loss. Though, thanks to the mechanism of acknowledgment and retransmission in the SDDA protocol, the network has a low packet drop ratio.
Experiment II:
Figure 14 illustrates the data of various sizes from terminal nodes at different ranges. These test results from the real scenario, as demonstrated in Figure 14, indicate that the proposed protocol effectively addresses the issue of diverse data needs of different functional nodes in real-world ocean applications by the on-demand scheduling scheme. Additionally, the trial also manifests that terminal nodes at different distances have an equal opportunity to send data in each transmission round. Thus, there will not be a situation where the short-range nodes frequently pre-empt the channel, resulting in the data backlog of long-range nodes. Therefore, the SDDA protocol achieves good fairness amongst terminal nodes. Apart from that, this protocol reduces energy usage to prolong the network lifetime by using fewer control packets and the conflict-free scheduling.

6. Conclusions

For constructing an actual UIoT, the UW-WiFi network architecture is introduced. Taking into consideration the application requirements, in this paper, we propose a time sequence-based dynamic on-demand assignment MAC protocol with low complexity for the real UW-WiFi network scenario, namely SDDA, enabling anchored and mobile nodes to access the network flexibly. This protocol employs the amount of data to be transferred by each node and the propagation delay to optimize channel resource allocation. Simulations are conducted to evaluate the performance of the SDDA protocol. The simulation results demonstrate that the SDDA protocol has much better performance with respect to channel utilization, end-to-end delay, and packet delivery ratio. Moreover, this protocol has no time synchronization required compared to TDMA. Additionally, the design reduces the number of control messages exchanged and accomplishes non-conflict transmissions to achieve energy efficiency. Furthermore, we implement the SDDA protocol in the embedded Linux operating system and carry out ocean field trials. Results from the ocean trials agree with the simulations. In addition, different classes of real ocean data collection experiments validate the practicability and fairness of this protocol. All in all, both simulation and ocean experimental results justify that the SDDA protocol is a promising solution for the UW-WiFi network.
In the future, we will optimize this protocol to adapt to the varying channel and design a more effective MAC protocol based on this scheme for the hierarchical UW-WiFi network.

Author Contributions

Conceptualization, X.P. and J.Z.; methodology, X.P.; software, X.P. and J.Z.; validation, X.P., J.Z., M.L. and X.W.; formal analysis, X.P.; investigation, X.P.; resources, J.C. and J.L.; data curation, X.P. and J.C.; writing—original draft preparation, X.P.; writing—review and editing, X.P. and Z.P.; visualization, X.P. and M.L.; supervision, Z.P.; project administration, J.C.; funding acquisition, J.C. and J.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 61971206, Grant 62101211, and Grant U1813217; in part by the National Key Basic Research Program under Grant 2018YFC1405800; in part by Overseas Top Talents Program of Shenzhen under Grant KQTD20180411184955957, and Grant LHTD20190004; and in part by the National Key Research and Development Program under Grant 2021YFC2803000.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

The data presented in this paper are available after contacting the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhu, J.; Pan, X.; Cui, J.H.; Yang, T. uw-WiFi: An Underwater Wireless Sensor Network for Data Collection and Network Control in Real Environments. In Proceedings of the The 15th International Conference on Underwater Networks & Systems, Shenzhen, China, 23–26 November 2021; pp. 1–8. [Google Scholar]
  2. IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999); IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Committee: Piscataway, NJ, USA, 2007; pp. 1–1076.
  3. Pan, X.; Cui, J.H.; Liu, J. A MAC protocol design for underwater acoustic wifi network. In Proceedings of the Thirteenth ACM International Conference on Underwater Networks & Systems, Shenzhen, China, 3 December 2018; pp. 1–2. [Google Scholar]
  4. Morozs, N.; Mitchell, P.; Zakharov, Y.V. TDA-MAC: TDMA without clock synchronization in underwater acoustic networks. IEEE Access 2017, 6, 1091–1108. [Google Scholar] [CrossRef]
  5. Ye, X.; Fu, L. Deep reinforcement learning based MAC protocol for underwater acoustic networks. In Proceedings of the Fourteenth International Conference on Underwater Networks & Systems, Atlanta, GA, USA, 23 October 2019; pp. 1–5. [Google Scholar]
  6. Molins, M.; Stojanovic, M. Slotted FAMA: A MAC protocol for underwater acoustic networks. In Proceedings of the OCEANS 2006-Asia Pacific, Singapore, 16–19 May 2006; pp. 1–7. [Google Scholar]
  7. Akyildiz, I.F.; Pompili, D.; Melodia, T. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar] [CrossRef]
  8. Noh, Y.; Shin, S. Survey on MAC protocols in underwater acoustic sensor networks. In Proceedings of the 2014 14th International Symposium on Communications and Information Technologies (ISCIT), Incheon, Korea, 24–26 September 2014; pp. 80–84. [Google Scholar]
  9. Pompili, D.; Melodia, T.; Akyildiz, I.F. A CDMA-based medium access control for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1899–1909. [Google Scholar] [CrossRef]
  10. Bertsekas, D.; Gallager, R. Data Networks, 2nd ed.; Athena Scientific: Nashua, NH, USA, 2021. [Google Scholar]
  11. Vieira, L.F.M.; Kong, J.; Lee, U.; Gerla, M. Analysis of aloha protocols for underwater acoustic sensor networks. In Proceedings of the ACM Wuwnet’06, Los Angeles, CA, USA, 25 September 2006; pp. 1–2. [Google Scholar]
  12. Chirdchoo, N.; Soh, W.S.; Chua, K.C. Aloha-based MAC protocols with collision avoidance for underwater acoustic networks. In Proceedings of the IEEE INFOCOM 2007–26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 6–12 May 2007; pp. 2271–2275. [Google Scholar]
  13. Liu, L.; Li, Y.; Zhang, C.; Huang, H. Multiple-Access Method Based on UW-CSMA/CA in Underwater Acoustic Network Communication. Available online: https://patents.google.com/patent/CN104348562A (accessed on 21 February 2023).
  14. Bharghavan, V.; Demers, A.; Shenker, S.; Zhang, L. MACAW: A media access protocol for wireless LAN’s. ACM SIGCOMM Comput. Commun. Rev. 1994, 24, 212–225. [Google Scholar] [CrossRef]
  15. Smith, S.M.; Park, J.C.; Neel, A. A peer-to-peer communication protocol for underwater acoustic communication. In Proceedings of the Oceans’ 97. MTS/IEEE Conference Proceedings; Volume 1, pp. 268–272.
  16. Kleinrock, L.; Tobagi, F. Packet switching in radio channels: Part I-carrier sense multiple-access modes and their throughput-delay characteristics. IEEE Trans. Commun. 1975, 23, 1400–1416. [Google Scholar] [CrossRef]
  17. Takagi, H.; Kleinrock, L. Correction to “Throughput Analysis for Persistent CSMA Systems”. IEEE Trans. Commun. 1987, 35, 243–245. [Google Scholar] [CrossRef]
  18. Peleato, B.; Stojanovic, M. Distance aware collision avoidance protocol for ad-hoc underwater acoustic sensor networks. IEEE Commun. Lett. 2007, 11, 1025–1027. [Google Scholar] [CrossRef] [Green Version]
  19. Mo, H.; Pu, L.; Zhu, Y.; Peng, Z.; Jiang, Z.; Cui, J.H. Evaluating selective ARQ and slotted handshake based access in real world underwater networks. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Zhangjiajie, China, 7–10 August 2013; pp. 206–220. [Google Scholar]
  20. Liu, J.; Wang, J. A MACA-based collision avoidance MAC protocol for underwater acoustic sensor networks. In Proceedings of the 2016 IEEE/OES China Ocean Acoustics (COA), Harbin, China, 9–11 January 2016; pp. 1–4. [Google Scholar]
  21. Zhu, Y.; Peng, Z.; Cui, J.H.; Chen, H. Toward practical MAC design for underwater acoustic networks. IEEE Trans. Mob. Comput. 2014, 14, 872–886. [Google Scholar] [CrossRef]
  22. Liao, Z.; Li, D.; Chen, J. A handshake based ordered scheduling MAC protocol for underwater acoustic local area networks. Int. J. Distrib. Sens. Netw. 2015, 11, 984370. [Google Scholar] [CrossRef]
  23. Huang, J.; Chi, C.; Wang, W.; Huang, H. A sequence-scheduled and query-based mac protocol for underwater acoustic networks with a mobile node. J. Commun. Inf. Netw. 2020, 5, 150–159. [Google Scholar] [CrossRef]
  24. Chirdchoo, N.; Soh, W.S.; Chua, K.C. RIPT: A receiver-initiated reservation-based protocol for underwater acoustic networks. IEEE J. Sel. Areas Commun. 2008, 26, 1744–1753. [Google Scholar] [CrossRef] [Green Version]
  25. Zhu, M.; Zhang, W.; Jin, N.; Qin, Z.; Xin, J.; Wang, L. UPMAC: A localized load-adaptive MAC protocol for underwater acoustic networks. IEEE Sensors J. 2015, 16, 4110–4118. [Google Scholar] [CrossRef]
  26. Wang, H.; Li, Y.; Zhang, L.; Fan, Y.; Li, Z. A self-deployment algorithm for maintaining maximum coverage and connectivity in underwater acoustic sensor networks based on an ant colony optimization. Appl. Sci. 2019, 9, 1479. [Google Scholar] [CrossRef] [Green Version]
  27. Zhu, Y.; Le, S.; Pu, L.; Lu, X.; Peng, Z.; Cui, J.H.; Zuba, M. Aqua-Net Mate: A real-time virtual channel/modem simulator for Aqua-Net. In Proceedings of the 2013 MTS/IEEE OCEANS-Bergen, Bergen, Norway, 10–14 June 2013; pp. 1–6. [Google Scholar]
  28. Le, S.N.; Peng, Z.; Cui, J.H.; Zhou, H.; Liao, J. Sealinx: A Multi-instance Protocol Stack Architecture for Underwater Networking. In Proceedings of the Eighth ACM International Conference on Underwater Networks and Systems, 11–13 November 2013; pp. 1–5. [Google Scholar]
Figure 1. The UW-WiFi network scenario.
Figure 1. The UW-WiFi network scenario.
Jmse 11 00765 g001
Figure 2. An example of packets transmission scheduling of SDDA MAC protocol.
Figure 2. An example of packets transmission scheduling of SDDA MAC protocol.
Jmse 11 00765 g002
Figure 3. Frame formats for various packets.
Figure 3. Frame formats for various packets.
Jmse 11 00765 g003
Figure 4. Network topology.
Figure 4. Network topology.
Jmse 11 00765 g004
Figure 5. Network deployment.
Figure 5. Network deployment.
Jmse 11 00765 g005
Figure 6. Throughput with different m ((a) the number of data packets sent) and n ((b) the number of nodes).
Figure 6. Throughput with different m ((a) the number of data packets sent) and n ((b) the number of nodes).
Jmse 11 00765 g006
Figure 7. Channel utilization comparison.
Figure 7. Channel utilization comparison.
Jmse 11 00765 g007
Figure 8. End-to-end delay comparison.
Figure 8. End-to-end delay comparison.
Jmse 11 00765 g008
Figure 9. Packet delivery ratio comparison.
Figure 9. Packet delivery ratio comparison.
Jmse 11 00765 g009
Figure 10. Network throughput.
Figure 10. Network throughput.
Jmse 11 00765 g010
Figure 11. Channel utilization.
Figure 11. Channel utilization.
Jmse 11 00765 g011
Figure 12. End-to-end delay.
Figure 12. End-to-end delay.
Jmse 11 00765 g012
Figure 13. Packet delivery ratio.
Figure 13. Packet delivery ratio.
Jmse 11 00765 g013
Figure 14. Image, CTD and AUV data from different terminal nodes.
Figure 14. Image, CTD and AUV data from different terminal nodes.
Jmse 11 00765 g014
Table 1. Success rate of communication at different ranges.
Table 1. Success rate of communication at different ranges.
Communication RangeSuccess Rate
0–2 km90%
0–2 km (mobile)85%
2–3 km85%
3–4 km70%
4–5 km50%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Pan, X.; Zhu, J.; Liu, M.; Wang, X.; Peng, Z.; Liu, J.; Cui, J. An On-Demand Scheduling-Based MAC Protocol for UW-WiFi Networks. J. Mar. Sci. Eng. 2023, 11, 765. https://doi.org/10.3390/jmse11040765

AMA Style

Pan X, Zhu J, Liu M, Wang X, Peng Z, Liu J, Cui J. An On-Demand Scheduling-Based MAC Protocol for UW-WiFi Networks. Journal of Marine Science and Engineering. 2023; 11(4):765. https://doi.org/10.3390/jmse11040765

Chicago/Turabian Style

Pan, Xiaohe, Jifeng Zhu, Mengzhuo Liu, Xiaoyu Wang, Zheng Peng, Jun Liu, and Junhong Cui. 2023. "An On-Demand Scheduling-Based MAC Protocol for UW-WiFi Networks" Journal of Marine Science and Engineering 11, no. 4: 765. https://doi.org/10.3390/jmse11040765

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop