CN104348562A - Multiple-access method based on UW-CSMA/CA in underwater acoustic network communication - Google Patents

Multiple-access method based on UW-CSMA/CA in underwater acoustic network communication Download PDF

Info

Publication number
CN104348562A
CN104348562A CN201310340872.8A CN201310340872A CN104348562A CN 104348562 A CN104348562 A CN 104348562A CN 201310340872 A CN201310340872 A CN 201310340872A CN 104348562 A CN104348562 A CN 104348562A
Authority
CN
China
Prior art keywords
nodes
node
data
forward step
rts
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310340872.8A
Other languages
Chinese (zh)
Other versions
CN104348562B (en
Inventor
刘磊
李宇
张春华
黄海宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Acoustics CAS
Original Assignee
Institute of Acoustics CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Acoustics CAS filed Critical Institute of Acoustics CAS
Priority to CN201310340872.8A priority Critical patent/CN104348562B/en
Publication of CN104348562A publication Critical patent/CN104348562A/en
Application granted granted Critical
Publication of CN104348562B publication Critical patent/CN104348562B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to a multiple-access method based on UW-CSMA/CA in underwater acoustic network communication. The method comprises the following steps that when a node is in a WFCTS state, if the node receives RTS of a target node, the node enters a retreating state and re-competes a signal channel, if the node receives the RTS of other nodes, the node replies to CTS and enters a WFDTA state, if the received RTS is not the RTS sent to the current node, the RTS is abandoned, the node keeps on waiting for the corresponding CTS, and if a node monitors any xcTS and xDATA, the node enters a quiesced state; when the node is in the WFDATA state, if the node receives the RTS of a source node, the CTS is replied, the timeout time of the WFDATA state is reset, if the node receives the xTRS and the xCTS sent to other nodes by the source node, the waiting for the DATA is immediately terminated, the node enters a QUIET state, if the node monitors any xDATA, the node enters the quiesced state, and otherwise, the node keeps on waiting for the corresponding DATA until the timeout.

Description

Based on the multiple access method of UW-CSMA/CA in a kind of underwater acoustic network communication
Technical field
The present invention relates to the underwater acoustic network communications field, particularly in the communication of a kind of underwater acoustic network based on the multiple access method of UW-CSMA/CA.
Background technology
Ocean occupies more than 2/3rds of ground sphere area, and the observation of ocean and exploitation are more and more subject to the attention of various countries, meanwhile, underwater acoustic network becomes worldwide study hotspot.Data link layer protocol is the important content of underwater sound net research.Compared with wireless channel, underwater acoustic channel Bandwidth-Constrained, propagation delay are large, and this proposes great challenge to the design of underwater acoustic network MAC protocol.
According to the channel obtain manner of agreement, MAC protocol is divided into based on the MAC protocol of scheduling and the MAC protocol based on competition.Because the available band of underwater acoustic channel is very narrow, the FDMA based on scheduling is made to be difficult to use.TDMA based on scheduling needs each nodal clock precise synchronization and protection interval, and this has very large difficulty in the underwater acoustic network of high propagation delay, random time space frequency change.CDMA based on scheduling applies less because its computation complexity is higher.Therefore, the MAC protocol based on competition is relatively applicable to underwater acoustic network.MAC protocol based on competition can be divided into again based on the MAC protocol of ALOHA with based on the MAC protocol of shaking hands.The application mainly studies in multi-hop underwater acoustic network based on the MAC protocol of shaking hands.
To be shaken hands reserve channel by RTS/CTS based on the MAC protocol of shaking hands, solve concealed terminal and exposed terminal problem.At list of references 1 " Affan A.Syed, Wei Ye, Jobn Heidemann.T-Lohi:A New Class of MAC Protocols For Underwater Acoustic Sensor Networks [C] .The27th Conference on Computer Communications, Phoenix, 2008:231-235 " disclosed by T-Lohi agreement in, use short wake-up signal reserve channel to prevent the collision of packet, for distributed, short distance, denser network, T-Lohi can provide the network service that throughput is stablized, capacity usage ratio is high.At list of references 2 " X.Guo, M.R.Frater, and M.J.Ryan.Design of a Propagation-Delay-Tolerant MAC Protocol for Underwater Acoustic Sensor Networks [J] .Oceanic Engineering, 2009,34 (2): 170-180 " in, reduced the impact of underwater acoustic channel height propagation delay by the turnaround time of regulation CTS, thus improve the throughput of network.At list of references 3 " Nitthita Chirdchoo, Wee-Seng Soh, and Kee Chaing Chua.RIPT:A Receiver-initiated Reservation-based Protocol for Underwater Acoustic Networks [J] .Selected Areas in Communications, 2008,26 (9): 1744-1753 " in propose a kind of Stochastic accessing MAC protocol being carried out initializing communication process by receiving terminal, make its all neighborss in the mode of data packet queue Packet Generation to be sent to receiving terminal.At list of references 4 " Dong Fang, Yu Li, Haining Huang, Li Yin.A CSMA/CA-based MAC Protocol for Underwater Acoustic Networks [C] .6th International Conference on Wireless Communications, Networking and Mobile Computing, Chengdu, 2010:1-4 " a kind of MAC protocol being applicable to underwater acoustic network of middle design, by its called after UW-CSMA/CA agreement, multiple access method based on this agreement adopts the strategy adhering to waiting for, reduce and keep out of the way number of times, thus improve the throughput of network.
In UW-CSMA/CA agreement, the duration of RTS, CTS, DATA, ACK is labeled as T respectively rTS, T cTS, T dATA, T aCK, maximum delay spread is labeled as τ max.Based on UW-CSMA/CA agreement, the node in underwater acoustic network may be in six kinds of states: IDLE, CTD, WFCTS, WFDATA, WFACK and QUIET.
With reference to figure 1, in UW-CSMA/CA agreement, basic communication process in underwater acoustic network between each node is as follows: when source node S has packets need to send, node state forwards CTD to from IDLE, when CTD state terminates, source node S can send RTS and forward WFCTS state to, and arranging time-out time is 2 τ max+ T cTS; After destination node D receives RTS, send CTS immediately and proceed to WFDATA state, arranging time-out time is 2 τ max+ T dATA; After source node S receives CTS, send DATA immediately and proceed to WFACK state, arranging time-out time is 2 τ max+ T aCK; After destination node D receives DATA, send ACK immediately and terminate this communication (curve arrow in Fig. 1 represents that node terminates this handshake communication); Source node S terminates this communication after receiving ACK.
It is more than the description to basic communication process between underwater acoustic network interior joint.In actual applications, due to the complexity of underwater acoustic network environment, node needs to be tackled various possible situation, how to process various possible situation and describes, do corresponding explanation below to the multiple access method in UW-CSMA/CA agreement in multiple access method to node.
If nodes X is any node in underwater acoustic network.
Step 1), nodes X are in sleep state or wait state, if this node receives acoustics wake-up signal, forward step 2 to); If keep out of the way time-out and self have data to send, then forward step 8) to; The time-out if mourned in silence and have keeping out of the way of time-out, then continue to keep out of the way, and keep sleep state or wait state; The time-out if mourned in silence and without suspend keeping out of the way, then keep sleep state or wait state; Keep out of the way or silent status if self have data to send and be not in, after then setting back off timer, keep sleep state or wait state, keep out of the way or silent status if self have data to send and be in, then keep sleep state or wait state.
Step 2), nodes X is waken up, and proceeds to network control frame accepting state.
If step 3) receive time-out, forwards step 1) to, if receive check errors, then forward step 1) to; If receive network control frame, the destination address of network control frame is checked, if destination address is not nodes X, then enter silent status, then forward step 1) to, if destination address is nodes X and is not in mourn in silence, then forward step 4) to, if destination address is nodes X and is in mourn in silence, then forward step 1) to.
Step 4), the type of received network control frame to be judged, if control frame type is RTS, forward step 5) to, if be other types, then forward step 1) to;
Step 5), nodes X reply CTS to source node, then arrange overtime timer T wFDATA=2 × τ max+ T dATA, wherein, τ maxfor maximum delay spread, T dATAfor the duration of DATA.
Step 6), nodes X wait for DATA, if receive DATA before the timeout, then forward step 7) to, otherwise forward step 1) to.
Step 7), closedown overtime timer, then verify received DATA, if verification correctly passes to network layer DATA, abandon DATA if incorrect; Then reply ACK according to check results, finally re-execute step 1).
Step 8), nodes X send RTS, and arrange overtime timer T wFCTS=2 × τ max+ T cTS, wherein, τ maxfor maximum delay spread, T cTSfor the duration of CTS.
Step 9), nodes X wait for the CTS of destination node, if correctly receive network control frame before the timeout, then forward step 10) to, if check errors or time-out, then close overtime timer, keep out of the way number of times and add 1, then forward step 1) to.
Step 10), nodes X judge the network control frame type received, if receiving network control frame is the CTS that will be transferred to nodes X, then closes overtime timer, forward step 0 to; If the network control frame received is CTS or DATA that will be transferred to other nodes, then closes overtime timer, keep out of the way number of times and add 1, timer of mourning in silence is set, forwards step 1) 0 to; If the network control frame type received is RTS, then abandons this RTS, then forward step 9) to.
Step 11), nodes X send DATA, then arrange overtime timer T wFACK=2 × τ max+ T aCK, wherein, τ maxfor maximum delay spread, T aCKfor the duration of ACK.
Step 12), nodes X wait for the ACK of destination node, if receive network control frame before the timeout, and institute to receive network control frame check correct, then forward step 13) to, if receive network control frame check mistake, then the ACK of continuation wait destination node; If time-out, keep out of the way number of times and add 1, then forward step 1) to.
Step 13), nodes X judge the network control frame type received, if receiving network control frame is to the ACK of nodes X, then closes overtime timer, then forward step 12) to, otherwise forward step 12) to.
Step 14), nodes X judge the check digit in ACK.If verification is correct, then keeps out of the way number of times and reset, forward step 1) to, otherwise keep out of the way number of times and add 1, then forward step 1) to.
More than that the step of the multiple access method in existing UW-CSMA/CA agreement is described.As can be seen from explanation above, the process employs the thought adhering to waiting for, such as: in step 6), node adheres to waiting for corresponding CTS, abandons any RTS, until receive CTS or time-out; In step 12) and step 13), node adheres to waiting for corresponding ACK; Abandon other frame any, until receive ACK or time-out.But in some conditions, can the frame that can not by the time expect of decision node according to the type of the frame listened to, can lose time if continue wait, be unfavorable for improve the throughput of agreement in Underwater Acoustic Environment.
Summary of the invention
The object of the invention is to reduce existing UW-CSMA/CA agreement interior joint and adopt the time adhering to waiting for that thought is wasted, improve the throughput of UW-CSMA/CA agreement in Underwater Acoustic Environment.
To achieve these goals, the invention provides the multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network, comprising:
Step 1), nodes X are in sleep state or wait state; If this node receives acoustics wake-up signal, forward step 2 to); If keep out of the way time-out and self have data to send, then forward step 8) to; The time-out if mourned in silence and have keeping out of the way of time-out, then continue to keep out of the way, and keep sleep state or wait state; The time-out if mourned in silence and without suspend keeping out of the way, then keep sleep state or wait state; Keep out of the way or silent status if self have data to send and be not in, set back off timer, then sleep state or wait state is kept, keep out of the way or silent status if self have data to send and be in, then keep sleep state or wait state;
Step 2), nodes X is waken up, and proceeds to network control frame accepting state;
If step 3) receive time-out, forwards step 1) to, if receive check errors, then forward step 1) to; If receive network control frame, the destination address of received network control frame is checked, if destination address is not nodes X, then enter silent status, then forward step 1) to, if destination address is nodes X and is not in mourn in silence, then forward step 4) to, if destination address is nodes X and is in mourn in silence, then forward step 1) to;
Step 4), the type of received network control frame to be judged, if control frame type is RTS, forward step 5) to, if be other types, then forward step 1) to;
Step 5), nodes X reply CTS to source node, then arrange overtime timer T wFDATA=2 × τ max+ T dATA, wherein, τ maxfor maximum delay spread, T dATAfor the duration of DATA;
Step 6), nodes X wait for DATA, if receive DATA before the timeout, then forward step 7) to, if node receives the RTS that source node issues this node, then forward step 5) to; If node receives source node when issuing xRTS or xCTS of other nodes, terminate immediately to wait for DATA, and enter silent status, timer of mourning in silence is set, forwards step 1) to; If nodes listen to any xDATA, then enters silent status, timer of mourning in silence is set, forwards step 1) to, otherwise forward step 1) to;
Step 7), closedown overtime timer, then verify received DATA, if verification correctly passes to network layer DATA, abandon DATA if incorrect; Then reply ACK according to check results, finally again forward step 1) to;
Step 8), nodes X send RTS, and arrange overtime timer T wFCTS=2 × τ max+ T cTS, wherein, T cTSfor the duration of CTS;
Step 9), nodes X wait for the CTS of destination node, if correctly receive network control frame before the timeout, then forward step 10) to, if check errors or time-out, close overtime timer, keep out of the way number of times and add 1, then forward step 1) to;
Step 10), nodes X judge the network control frame type received, if receiving network control frame is the CTS that will be transferred to nodes X, then closes overtime timer, forward step 11) to; If the network control frame received is CTS or DATA that will be transferred to other nodes, then close overtime timer, keep out of the way number of times and add 1, timer of mourning in silence is set, forwards step 1) to; If node issues the RTS of nodes X for the purpose of the network control frame received, then keep out of the way number of times and add 1, then forward step 1) to; If the network control frame received is the RTS that other nodes issue nodes X, then forward step 5) to, after DATA reception terminates, keep out of the way the DATA retransmitting needs and send again; Issue if the network control frame received is other nodes the RTS sent mutually between the RTS of destination node or other nodes, then abandon this RTS, then forward step 9) to;
Step 11), nodes X send DATA, then arrange overtime timer T wFACK=2 × τ max+ T aCK, wherein, T aCKfor the duration of ACK;
Step 12), nodes X wait for the ACK of destination node, if correctly receive network control frame before the timeout, then forward step 13) to; If check errors, forward step 12) to; If time-out, keep out of the way number of times and add 1, forward step 1) to;
Step 13), nodes X judge the network control frame type received, if receiving network control frame is to the ACK of nodes X, then closes overtime timer, forward step 14) to; If receive the RTS that destination node issues this node, then forward step 5) to, after DATA reception terminates, keep out of the way the DATA retransmitting needs and send again; If node receives destination node when issuing xRTS, xCTS, xDATA of other nodes, terminate immediately wait for ACK and enter QUIET state, timer of mourning in silence is set, then forwards step 1) to, after step 1) terminates, keep out of the way repeating transmission again; Otherwise forward step 12) to;
Step 14), nodes X judge the check digit in ACK.If verification is correct, then keeps out of the way number of times and reset, forward step 1) to; Otherwise keep out of the way number of times and add 1, forward step 1) to.
The invention has the advantages that: reduce existing UW-CSMA/CA agreement interior joint and adopt the time adhering to waiting for that thought is wasted, be specially:
(1) when node is in WFCTS state, if node receives the RTS that destination node issues this node, then backoff state is entered and competitive channel again; If node receives the RTS that other nodes issue this node, then reply CTS, enter WFDTA state; If receiving is not the RTS issuing this node, abandons and adhere to waiting for corresponding CTS; If nodes listen to any xCTS, xDATA, then enters silent status.
(2) when node is in WFDATA state, if node receives the RTS that source node issues this node, then reply CTS, reset the time-out time of WFDATA state; If node receives source node when issuing xRTS, xCTS of other nodes, terminate immediately wait for DATA and enter QUIET state; If nodes listen to any xDATA, then enters silent status.Otherwise, adhere to waiting for corresponding DATA until time-out.
(3) when node is in WFACK state, if node receives the RTS that destination node issues this node, then reply CTS, proceed to the WFDATA state of reception, receive after terminating and keep out of the way repeating transmission again; If node receives destination node when issuing xRTS, xCTS, xDATA of other nodes, terminate immediately wait for ACK and enter QUIET state, mourn in silence after terminating and keep out of the way repeating transmission again; Otherwise, adhere to waiting for corresponding ACK until time-out.
The present invention comparatively prior art compares and is significantly improved in throughput.
Accompanying drawing explanation
Fig. 1 is in existing UW-CSMA/CA agreement, the schematic diagram of the communication process between underwater acoustic network communication node;
Fig. 2 is the flow chart of multiple access method of the present invention;
Fig. 3 is the network topology structure schematic diagram that the present invention adopts when emulating;
Fig. 4 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under data packet length is 128Bytes, 256Bytes and 512Bytes to carry out the comparative result schematic diagram emulated, in emulation, traffic rate is 1024bps, and average meshes spacing is 1000m;
Fig. 5 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under data packet length is 128Bytes, 256Bytes and 512Bytes to carry out the comparative result schematic diagram emulated, in emulation, traffic rate is 2048bps, and average meshes spacing is 1000m;
Fig. 6 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under data packet length is 128Bytes, 256Bytes and 512Bytes to carry out the comparative result schematic diagram emulated, in emulation, traffic rate is 4096bps, and average meshes spacing is 1000m;
Fig. 7 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under traffic rate is 1024bps, 2048bps and 4096bps to carry out the comparative result schematic diagram emulated, in emulation, data packet length is 128Bytes, and average meshes spacing is 1000m;
Fig. 8 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under traffic rate is 1024bps, 2048bps and 4096bps to carry out the comparative result schematic diagram emulated, in emulation, data packet length is 256Bytes, and average meshes spacing is 1000m;
Fig. 9 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under traffic rate is 1024bps, 2048bps and 4096bps to carry out the comparative result schematic diagram emulated, in emulation, data packet length is 512Bytes, and average meshes spacing is 1000m;
Figure 10 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under average meshes spacing is 500m, 1000m and 2000m to carry out the comparative result schematic diagram emulated, in emulation, data packet length is 256Bytes, and traffic rate is 2048bps.
Embodiment
Now the invention will be further described by reference to the accompanying drawings.
With reference to figure 2, suppose that nodes X is any node in underwater acoustic network, method of the present invention comprises the following steps:
Step 1), nodes X are in sleep state or wait state.If this node receives acoustics wake-up signal, forward step 2 to); If keep out of the way time-out and self have data to send, then forward step 8) to; The time-out if mourned in silence and have keeping out of the way of time-out, then continue to keep out of the way, and keep sleep state or wait state; The time-out if mourned in silence and without suspend keeping out of the way, then keep sleep state or wait state; Keep out of the way or silent status if self have data to send and be not in, set back off timer, then sleep state or wait state is kept, keep out of the way or silent status if self have data to send and be in, then keep sleep state or wait state.
Step 2), nodes X is waken up, and proceeds to network control frame accepting state.
If step 3) receive time-out, forwards step 1) to, if receive check errors, then forward step 1) to; If receive network control frame, the destination address of received network control frame is checked, if destination address is not nodes X, then enter silent status, then forward step 1) to, if destination address is nodes X and is not in mourn in silence, then forward step 4) to, if destination address is nodes X and is in mourn in silence, then forward step 1) to.
Step 4), the type of received network control frame to be judged, if control frame type is RTS, forward step 5) to, if be other types, then forward step 1) to;
Step 5), nodes X reply CTS to source node, then arrange overtime timer T wFDATA=2 × τ max+ T dATA, wherein, τ maxfor maximum delay spread, T dATAfor the duration of DATA;
Step 6), nodes X wait for DATA, if receive DATA before the timeout, then forward step 7) to, if node receives the RTS that source node issues this node, then forward step 5) to; If node receives source node when issuing xRTS or xCTS of other nodes, terminate immediately to wait for DATA, and enter silent status, timer of mourning in silence is set, forwards step 1) to; If nodes listen to any xDATA, then enters silent status, timer of mourning in silence is set, forwards step 1) to, otherwise forward step 1) to.
Step 7), closedown overtime timer, then verify received DATA, if verification correctly passes to network layer DATA, abandon DATA if incorrect; Then reply ACK according to check results, finally again forward step 1) to.
Step 8), nodes X send RTS, and arrange overtime timer T wFCTS=2 × τ max+ T cTS, wherein, τ maxfor maximum delay spread, T cTSfor the duration of CTS.
Step 9), nodes X wait for the CTS of destination node, if correctly receive network control frame before the timeout, then forward step 10) to, if check errors or time-out, close overtime timer, keep out of the way number of times and add 1, then forward step 1) to.
Step 10), nodes X judge the network control frame type received, if receiving network control frame is the CTS that will be transferred to nodes X, then closes overtime timer, forward step 11) to; If the network control frame received is CTS or DATA that will be transferred to other nodes, then close overtime timer, keep out of the way number of times and add 1, timer of mourning in silence is set, forwards step 1) to; If node issues the RTS of nodes X for the purpose of the network control frame received, then keep out of the way number of times and add 1, then forward step 1) to; If the network control frame received is the RTS that other nodes issue nodes X, then forward step 5) to, after DATA reception terminates, keep out of the way the DATA retransmitting needs and send again; Issue if the network control frame received is other nodes the RTS sent mutually between the RTS of destination node or other nodes, then abandon this RTS, then forward step 9) to.
Step 11), nodes X send DATA, then arrange overtime timer T wFACK=2 × τ max+ T aCK, wherein, τ maxfor maximum delay spread, T aCKfor the duration of ACK.
Step 12), nodes X wait for the ACK of destination node, if correctly receive network control frame before the timeout, then forward step 13) to; If check errors, forward step 12) to; If time-out, keep out of the way number of times and add 1, forward step 1) to.
Step 13), nodes X judge the network control frame type received, if receiving network control frame is to the ACK of nodes X, then closes overtime timer, forward step 14) to; If receive the RTS that destination node issues this node, then forward step 5) to, after DATA reception terminates, keep out of the way the DATA retransmitting needs and send again; If node receives destination node when issuing xRTS, xCTS, xDATA of other nodes, terminate immediately wait for ACK and enter QUIET state, timer of mourning in silence is set, then forwards step 1) to, after step 1) terminates, keep out of the way repeating transmission again; Otherwise forward step 12) to.
Step 14), nodes X judge the check digit in ACK.If verification is correct, then keeps out of the way number of times and reset, forward step 1) to; Otherwise keep out of the way number of times and add 1, forward step 1) to.
Be more than the description of the basic step to the inventive method, compared with prior art, the inventive method is that reducing existing UW-CSMA/CA agreement interior joint adopts the time adhering to waiting for that thought is wasted, and is specially:
(1) when node is in WFCTS state, if node receives the RTS that destination node issues this node, then backoff state is entered and competitive channel again; If node receives the RTS that other nodes issue this node, then reply CTS, enter WFDTA state; If receiving is not the RTS issuing this node, abandons and adhere to waiting for corresponding CTS; If nodes listen to any xCTS, xDATA, then enters silent status.
(2) when node is in WFDATA state, if node receives the RTS that source node issues this node, then reply CTS, reset the time-out time of WFDATA state; If node receives source node when issuing xRTS, xCTS of other nodes, terminate immediately wait for DATA and enter QUIET state; If nodes listen to any xDATA, then enters silent status.Otherwise, adhere to waiting for corresponding DATA until time-out.
(3) when node is in WFACK state, if node receives the RTS that destination node issues this node, then reply CTS, proceed to the WFDATA state of reception, receive after terminating and keep out of the way repeating transmission again; If node receives destination node when issuing xRTS, xCTS, xDATA of other nodes, terminate immediately wait for ACK and enter QUIET state, mourn in silence after terminating and keep out of the way repeating transmission again; Otherwise, adhere to waiting for corresponding ACK until time-out.
Therefore, method of the present invention is significantly improved in throughput.
Below by emulation, the inventive method and prior art are compared.
Adopt NS2 to carry out simulation analysis in the present invention, as shown in Figure 3,36 static nodes (dark node in Fig. 3) form the square profile of 6 × 6 to the network topology structure that emulation adopts.Node is not positioned on the crosspoint of grid accurately, but all introduces the random offset of 10% mesh spacing with vertical direction in the horizontal direction.The maximum communication distance of node is 1.75 times of mesh spacing, and like this, each node all has 8 one to jump neighbors and 16 double bounce neighborss.In emulation, 36 nodes all produce packet by Poisson distribution, and the speed producing packet is identical.Each packet that node produces all mails to its arbitrary double bounce neighbors, and the probability that each packet mails to 16 double bounce neighborss is identical.Also 16 double bounce neighborss are had in order to make borderline node, need to expand border, namely on four direction, all expand two-layer node (grayed-out nodes), but these extra nodes can not produce data flow, only as destination node and the forward node existence of boundary node.Emulation adopts static routing, and only indicate the static routing of a node (circular node) in figure, the route of all the other nodes is similar with it.
In simulation process of the present invention, the velocity of sound gets 1500m/s.In simulation process, to the prior art (UW-CSMA/CA) under different pieces of information packet length, different communication speed and different mesh spacing with adopt the load-throughput of underwater acoustic network communication means of multiple access method of the present invention to carry out emulation to compare.
The whole network load involved in simulation process and throughput are defined as follows:
Fig. 4 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under data packet length is 128Bytes, 256Bytes and 512Bytes to carry out the comparative result schematic diagram emulated, in emulation, traffic rate is 1024bps, and average meshes spacing is 1000m.
Fig. 5 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under data packet length is 128Bytes, 256Bytes and 512Bytes to carry out the comparative result schematic diagram emulated, in emulation, traffic rate is 2048bps, and average meshes spacing is 1000m.
Fig. 6 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under data packet length is 128Bytes, 256Bytes and 512Bytes to carry out the comparative result schematic diagram emulated, in emulation, traffic rate is 4096bps, and average meshes spacing is 1000m.
As can be seen from Fig. 4, Fig. 5 and Fig. 6, along with data packet length increases, agreement increases at the single communication efficiency successfully of shaking hands, and the throughput of two kinds of agreements is all improved.Under identical data packet length, adopt the underwater acoustic network communication means of multiple access method of the present invention in throughput apparently higher than prior art.
Fig. 7 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under traffic rate is 1024bps, 2048bps and 4096bps to carry out the comparative result schematic diagram emulated, in emulation, data packet length is 128Bytes, and average meshes spacing is 1000m.
Fig. 8 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under traffic rate is 1024bps, 2048bps and 4096bps to carry out the comparative result schematic diagram emulated, in emulation, data packet length is 256Bytes, and average meshes spacing is 1000m.
Fig. 9 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under traffic rate is 1024bps, 2048bps and 4096bps to carry out the comparative result schematic diagram emulated, in emulation, data packet length is 512Bytes, and average meshes spacing is 1000m.
As can be seen from Fig. 7, Fig. 8 and Fig. 9, along with traffic rate increases, the transmitting time of packet reduces, and propagation delay does not correspondingly reduce, and communication efficiency reduces, and the throughput of two kinds of agreements all can reduce.Under same communication speed, adopt the underwater acoustic network communication means of multiple access method of the present invention in throughput apparently higher than prior art.
Figure 10 adopts the underwater acoustic network communication means of multiple access method of the present invention and the throughput of prior art under average meshes spacing is 500m, 1000m and 2000m to carry out the comparative result schematic diagram emulated, in emulation, data packet length is 256Bytes, and traffic rate is 2048bps.
As can be seen from Figure 10, along with average meshes spacing increases, propagation delay increases, and RTS-CTS shakes hands time lengthening, and communication efficiency reduces, and the throughput of two kinds of agreements all can reduce.Under identical average meshes spacing, adopt the underwater acoustic network communication means of multiple access method of the present invention in throughput apparently higher than prior art.
It should be noted last that, above embodiment is only in order to illustrate technical scheme of the present invention and unrestricted.Although with reference to embodiment to invention has been detailed description, those of ordinary skill in the art is to be understood that, modify to technical scheme of the present invention or equivalent replacement, do not depart from the spirit and scope of technical solution of the present invention, it all should be encompassed in the middle of right of the present invention.

Claims (1)

1. in underwater acoustic network communication based on a multiple access method of UW-CSMA/CA, comprising:
Step 1), nodes X are in sleep state or wait state; If this node receives acoustics wake-up signal, forward step 2 to); If keep out of the way time-out and self have data to send, then forward step 8) to; The time-out if mourned in silence and have keeping out of the way of time-out, then continue to keep out of the way, and keep sleep state or wait state; The time-out if mourned in silence and without suspend keeping out of the way, then keep sleep state or wait state; Keep out of the way or silent status if self have data to send and be not in, set back off timer, then sleep state or wait state is kept, keep out of the way or silent status if self have data to send and be in, then keep sleep state or wait state;
Step 2), nodes X is waken up, and proceeds to network control frame accepting state;
If step 3) receive time-out, forwards step 1) to, if receive check errors, then forward step 1) to; If receive network control frame, the destination address of received network control frame is checked, if destination address is not nodes X, then enter silent status, then forward step 1) to, if destination address is nodes X and is not in mourn in silence, then forward step 4) to, if destination address is nodes X and is in mourn in silence, then forward step 1) to;
Step 4), the type of received network control frame to be judged, if control frame type is RTS, forward step 5) to, if be other types, then forward step 1) to;
Step 5), nodes X reply CTS to source node, then arrange overtime timer T wFDATA=2 × τ max+ T dATA, wherein, τ maxfor maximum delay spread, T dATAfor the duration of DATA;
Step 6), nodes X wait for DATA, if receive DATA before the timeout, then forward step 7) to, if node receives the RTS that source node issues this node, then forward step 5) to; If node receives source node when issuing xRTS or xCTS of other nodes, terminate immediately to wait for DATA, and enter silent status, timer of mourning in silence is set, forwards step 1) to; If nodes listen to any xDATA, then enters silent status, timer of mourning in silence is set, forwards step 1) to, otherwise forward step 1) to;
Step 7), closedown overtime timer, then verify received DATA, if verification correctly passes to network layer DATA, abandon DATA if incorrect; Then reply ACK according to check results, finally again forward step 1) to;
Step 8), nodes X send RTS, and arrange overtime timer T wFCTS=2 × τ max+ T cTS, wherein, T cTSfor the duration of CTS;
Step 9), nodes X wait for the CTS of destination node, if correctly receive network control frame before the timeout, then forward step 10) to, if check errors or time-out, close overtime timer, keep out of the way number of times and add 1, then forward step 1) to;
Step 10), nodes X judge the network control frame type received, if receiving network control frame is the CTS that will be transferred to nodes X, then closes overtime timer, forward step 11) to; If the network control frame received is CTS or DATA that will be transferred to other nodes, then close overtime timer, keep out of the way number of times and add 1, timer of mourning in silence is set, forwards step 1) to; If node issues the RTS of nodes X for the purpose of the network control frame received, then keep out of the way number of times and add 1, then forward step 1) to; If the network control frame received is the RTS that other nodes issue nodes X, then forward step 5) to, after DATA reception terminates, keep out of the way the DATA retransmitting needs and send again; Issue if the network control frame received is other nodes the RTS sent mutually between the RTS of destination node or other nodes, then abandon this RTS, then forward step 9) to;
Step 11), nodes X send DATA, then arrange overtime timer T wFACK=2 × τ max+ T aCK, wherein, T aCKfor the duration of ACK;
Step 12), nodes X wait for the ACK of destination node, if correctly receive network control frame before the timeout, then forward step 13) to; If check errors, forward step 12) to; If time-out, keep out of the way number of times and add 1, forward step 1) to;
Step 13), nodes X judge the network control frame type received, if receiving network control frame is to the ACK of nodes X, then closes overtime timer, forward step 14) to; If receive the RTS that destination node issues this node, then forward step 5) to, after DATA reception terminates, keep out of the way the DATA retransmitting needs and send again; If node receives destination node when issuing xRTS, xCTS, xDATA of other nodes, terminate immediately wait for ACK and enter QUIET state, timer of mourning in silence is set, then forwards step 1) to, after step 1) terminates, keep out of the way repeating transmission again; Otherwise forward step 12) to;
Step 14), nodes X judge the check digit in ACK.If verification is correct, then keeps out of the way number of times and reset, forward step 1) to; Otherwise keep out of the way number of times and add 1, forward step 1) to.
CN201310340872.8A 2013-08-07 2013-08-07 Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network Active CN104348562B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310340872.8A CN104348562B (en) 2013-08-07 2013-08-07 Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310340872.8A CN104348562B (en) 2013-08-07 2013-08-07 Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network

Publications (2)

Publication Number Publication Date
CN104348562A true CN104348562A (en) 2015-02-11
CN104348562B CN104348562B (en) 2016-09-28

Family

ID=52503474

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310340872.8A Active CN104348562B (en) 2013-08-07 2013-08-07 Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network

Country Status (1)

Country Link
CN (1) CN104348562B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106788782A (en) * 2016-12-06 2017-05-31 哈尔滨工程大学 Underwater sound communication network OFDM Link Physical Layers and MAC layer cross-layer communication method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5844905A (en) * 1996-07-09 1998-12-01 International Business Machines Corporation Extensions to distributed MAC protocols with collision avoidance using RTS/CTS exchange
US20060221999A1 (en) * 2005-03-29 2006-10-05 Intel Corporation Method and apparatus for adaptive network allocation
CN101567707A (en) * 2008-04-24 2009-10-28 赵力 Medium access control method based on CDMA underwater acoustic network
CN101729566A (en) * 2009-11-27 2010-06-09 中国科学院声学研究所 Underwater sound network multiple access method based on CSMA/CA
US7920536B1 (en) * 2006-10-20 2011-04-05 Marvell International Ltd. More robust data transfer through detection of hidden nodes
CN102098113A (en) * 2011-02-25 2011-06-15 东南大学 Method for realizing water sound sensor network MAC (Media Access Control) protocol based on ALOHA and TDMA (Time Division Multiple Access)
CN102546323A (en) * 2010-12-14 2012-07-04 中国科学院声学研究所 Peer-to-peer network based on underwater sound and radio mixed channel
CN102612077A (en) * 2012-03-19 2012-07-25 东南大学 Medium access control method used for distributed multi-skip underwater acoustic communication network

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5844905A (en) * 1996-07-09 1998-12-01 International Business Machines Corporation Extensions to distributed MAC protocols with collision avoidance using RTS/CTS exchange
US20060221999A1 (en) * 2005-03-29 2006-10-05 Intel Corporation Method and apparatus for adaptive network allocation
US7920536B1 (en) * 2006-10-20 2011-04-05 Marvell International Ltd. More robust data transfer through detection of hidden nodes
CN101567707A (en) * 2008-04-24 2009-10-28 赵力 Medium access control method based on CDMA underwater acoustic network
CN101729566A (en) * 2009-11-27 2010-06-09 中国科学院声学研究所 Underwater sound network multiple access method based on CSMA/CA
CN102546323A (en) * 2010-12-14 2012-07-04 中国科学院声学研究所 Peer-to-peer network based on underwater sound and radio mixed channel
CN102098113A (en) * 2011-02-25 2011-06-15 东南大学 Method for realizing water sound sensor network MAC (Media Access Control) protocol based on ALOHA and TDMA (Time Division Multiple Access)
CN102612077A (en) * 2012-03-19 2012-07-25 东南大学 Medium access control method used for distributed multi-skip underwater acoustic communication network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周倩等: "多帧确认及虚拟载波侦听的水声MACAW协议", 《探测与控制学报》 *
王毅等: "Aloha-LPD:一种用于水声通信网的MAC协议", 《东南大学学报(自然科学版)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106788782A (en) * 2016-12-06 2017-05-31 哈尔滨工程大学 Underwater sound communication network OFDM Link Physical Layers and MAC layer cross-layer communication method
CN106788782B (en) * 2016-12-06 2021-05-07 哈尔滨工程大学 Cross-layer communication method for OFDM link physical layer and MAC layer of underwater acoustic communication network

Also Published As

Publication number Publication date
CN104348562B (en) 2016-09-28

Similar Documents

Publication Publication Date Title
Woo et al. A transmission control scheme for media access in sensor networks
Lin et al. Asynchronous multimedia multihop wireless networks
Sun et al. DW-MAC: a low latency, energy efficient demand-wakeup MAC protocol for wireless sensor networks
Miorandi et al. A queueing model for HTTP traffic over IEEE 802.11 WLANs
Zhuo et al. Delay and queue aware adaptive scheduling-based MAC protocol for underwater acoustic sensor networks
Gabale et al. Lit mac: Addressing the challenges of effective voice communication in a low cost, low power wireless mesh network
Shahabudeen et al. Analysis of a high-performance MAC protocol for underwater acoustic networks
CN104349495B (en) A kind of underwater acoustic network multiple access method based on MACA U agreements
CN105245358B (en) Intelligent grid MAC layer multi-service method for analyzing performance based on Markov model
CN103929284B (en) High-reliability transmission method for wireless sensor network
CN106254254B (en) Mesh topology structure-based network-on-chip communication method
CN102098113A (en) Method for realizing water sound sensor network MAC (Media Access Control) protocol based on ALOHA and TDMA (Time Division Multiple Access)
Pawar et al. Hybrid mechanisms: Towards an efficient wireless sensor network medium access control
CN104348560B (en) The node based on UW CSMA/CA is mourned in silence method in underwater acoustic network communication
Al Nahas et al. Competition: Towards Low-Power Wireless Networking that Survives Interference with Minimal Latency.
CN105208671B (en) The implementation method of high channel utilization rate H-MAC agreements for wireless sensor network
Ding et al. Research on the multi-channel probability detection CSMA protocol with sensor monitoring function
CN101729566B (en) Underwater sound network multiple access method based on CSMA/CA
CN104348562B (en) Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network
CN102195763B (en) Method for realizing MAC (Media Access Control) protocol under long delay condition of underwater sound sensor network
Kumar et al. Performance of network formation and scheduling algorithms in the Bluetooth wireless ad‐hoc network
WO2022014367A1 (en) Communication device and communication method
CN114125069A (en) Method for realizing many-to-one parallel transmission MAC protocol of underwater acoustic network
CN104349494A (en) Node retreating method based on UW-CSMA/CA in underwater acoustic network communication
Bhuiyan et al. I-MAC: Energy efficient intelligent MAC protocol for wireless sensor networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant