CN104348562B - Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network - Google Patents
Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network Download PDFInfo
- Publication number
- CN104348562B CN104348562B CN201310340872.8A CN201310340872A CN104348562B CN 104348562 B CN104348562 B CN 104348562B CN 201310340872 A CN201310340872 A CN 201310340872A CN 104348562 B CN104348562 B CN 104348562B
- Authority
- CN
- China
- Prior art keywords
- nodes
- node
- data
- control frame
- rts
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention relates to multiple access method based on UW CSMA/CA in the communication of a kind of underwater acoustic network, including: when node is in WFCTS state, if node receives the RTS of destination node, then entrance backoff state again competitive channel, if node receives the RTS of other nodes, then reply CTS, enter WFDTA state, if receiving the RTS not being intended for this node, abandoning and adhering to waiting corresponding CTS, if node listens to any xCTS, xDATA, then enter silent status;When node is in WFDATA state, if node receives the RTS of source node, then reply CTS, reset the time-out time of WFDATA state, if node receives xRTS, xCTS that source node issues other nodes, be immediately finished wait DATA and enter QUIET state, if node listens to any xDATA, then enter silent status, otherwise, adhere to waiting that corresponding DATA is until time-out.
Description
Technical field
The present invention relates to the underwater acoustic network communications field, based on UW-CSMA/CA in communicating particularly to a kind of underwater acoustic network
Multiple access method.
Background technology
Ocean occupies more than 2/3rds of ground sphere area, and observation and exploitation to ocean are increasingly by the weight of various countries
Depending on, meanwhile, underwater acoustic network becomes worldwide study hotspot.Data link layer protocol is the important interior of underwater sound net research
Hold.Compared with wireless channel, underwater acoustic channel Bandwidth-Constrained, propagation delay are big, and the design of underwater acoustic network MAC protocol is proposed by this
Challenge greatly.
Obtaining mode according to the channel of agreement, MAC protocol is divided into MAC protocol based on scheduling and MAC based on competition association
View.Owing to the available band of underwater acoustic channel is the narrowest so that FDMA based on scheduling is difficult with.TDMA based on scheduling needs each
Nodal clock precise synchronization and protection interval, this has the biggest being stranded in the underwater acoustic network that high propagation delay, random time space frequency become
Difficult.CDMA based on scheduling applies less because its computation complexity is higher.Therefore, MAC protocol based on competition is more applicable
Underwater acoustic network.MAC protocol based on competition can be divided into again MAC protocol based on ALOHA and based on the MAC protocol shaken hands.This
Based on the MAC protocol shaken hands in application main research multi-hop underwater acoustic network.
Shaken hands reserve channel by RTS/CTS based on the MAC protocol shaken hands, solve concealed terminal and exposed terminal is asked
Topic.At list of references 1 " Affan A.Syed, Wei Ye, Jobn Heidemann.T-Lohi:A New Class of MAC
Protocols For Underwater Acoustic Sensor Networks[C].The27th Conference on
Computer Communications, Phoenix, 2008:231-235 " disclosed by T-Lohi agreement in, use short calling out
Signal reserve channel of waking up prevents the collision of packet, and for distributed, short distance, denser network, T-Lohi is provided that and gulps down
The network service that the amount of telling is stable, capacity usage ratio is high.At list of references 2 " X.Guo, M.R.Frater, and
M.J.Ryan.Design of a Propagation-Delay-Tolerant MAC Protocol for Underwater
Acoustic Sensor Networks [J] .Oceanic Engineering, 2009,34 (2): 170-180 " in, by rule
Determine the impact reducing underwater acoustic channel height propagation delay turnaround time of CTS, thus improve the handling capacity of network.At list of references
3《Nitthita Chirdchoo,Wee-Seng Soh,and Kee Chaing Chua.RIPT:A Receiver-
initiated Reservation-based Protocol for Underwater Acoustic Networks[J]
.Selected propose in Areas in Communications, 2008,26 (9): 1744-1753 " a kind of to be come by receiving terminal
The Stochastic accessing MAC protocol of initializing communication process, makes its all neighbors to be sent in the way of data packet queue
Packet is sent to receiving terminal.At list of references 4 " Dong Fang, Yu Li, Haining Huang, Li Yin.A CSMA/
CA-based MAC Protocol for Underwater Acoustic Networks[C].6th International
Conference on Wireless Communications,Networking and Mobile Computing,
Chengdu, 2010:1-4 " a kind of MAC protocol being applicable to underwater acoustic network of middle design, by its named UW-CSMA/CA agreement,
Multiple access method based on this agreement uses the strategy adhering to waiting, reduces and keeps out of the way number of times, thus improves the handling capacity of network.
In UW-CSMA/CA agreement, the persistent period of RTS, CTS, DATA, ACK is respectively labeled as TRTS、TCTS、
TDATA、TACK, maximum delay spread is labeled as τmax.Based on UW-CSMA/CA agreement, the node in underwater acoustic network is likely to be at
Six kinds of states: IDLE, CTD, WFCTS, WFDATA, WFACK and QUIET.
With reference to Fig. 1, in UW-CSMA/CA agreement, in underwater acoustic network, the basic communication process between each node is as follows:
When source node S has packets need to send, node state forwards CTD to from IDLE, when CTD state terminates, and source node S can send
RTS also forwards WFCTS state to, and arranging time-out time is 2 τmax+TCTS;After destination node D receives RTS, send CTS also immediately
Proceeding to WFDATA state, arranging time-out time is 2 τmax+TDATA;After source node S receives CTS, send DATA immediately and proceed to
WFACK state, arranging time-out time is 2 τmax+TACK;After destination node D receives DATA, send ACK immediately and terminate this
Communication (curve arrow in Fig. 1 represents that node terminates this handshake communication);Source node S terminates this communication after receiving ACK.
It is above the description of basic communication process between underwater acoustic network interior joint.In actual applications, due to underwater acoustic network
The complexity of environment, node needs to be tackled various possible situations, how to process node in multiple access method
Various possible situations describe, and the multiple access method in UW-CSMA/CA agreement does corresponding explanation below.
If nodes X is any node in underwater acoustic network.
Step 1), nodes X are in sleep state or waiting state, if this node receives acoustics wake-up signal, forward to
Step 2);If keeping out of the way time-out and self having data to send, then forward step 8) to;The time-out and have moving back of time-out if mourned in silence
Keep away, then continue to keep out of the way, and keep sleep state or waiting state;If mourned in silence, time-out and keeping out of the way without time-out, then continue
It is in sleep state or waiting state;If self having data to send and be not at keeping out of the way or silent status, then set and keep out of the way
After intervalometer, keep sleep state or waiting state, if self having data to send and be in keeps out of the way or silent status,
Then keep sleep state or waiting state.
Step 2), nodes X be waken up, proceed to network control frame receive state.
If step 3) receives time-out, forwarding step 1) to, if receiving check errors, then forwarding step 1) to;If receiving
To network control frame, the destination address of network control frame is checked, if destination address is not nodes X, then enters and mourn in silence
State, then goes to step 1), if destination address is nodes X and is not at mourning in silence, then forwards step 4) to, if destination address
It is that nodes X and being in is mourned in silence, then forwards step 1) to.
Step 4), type to received network control frame judge, if control frame type is RTS, forward to
Step 5), if other types, then forwards step 1) to;
Step 5), nodes X, to source node response CTS, then arrange overtime timer TWFDATA=2 × τmax+TDATA, its
In, τmaxFor maximum delay spread, TDATAPersistent period for DATA.
Step 6), nodes X wait DATA, if receiving DATA before the timeout, then forward step 7) to, otherwise forward step to
1).
Step 7), closedown overtime timer, then verify received DATA, if verification is correctly DATA
Pass to Internet, abandon DATA if incorrect;Reply ACK then according to check results, finally re-execute step 1).
Step 8), nodes X send RTS, and arrange overtime timer TWFCTS=2 × τmax+TCTS, wherein, τmaxPass for maximum
Broadcast delay, TCTSPersistent period for CTS.
Step 9), nodes X wait the CTS of destination node, if having correctly received network control frame before the timeout, then forward to
Step 10), if check errors or time-out, then closes overtime timer, keeps out of the way number of times and add 1, then go to step 1).
Step 10), nodes X judge the network control frame type received, if receiving network control frame for transmit
To the CTS of nodes X, then close overtime timer, forward step 0 to;If the network control frame received is for be transferred to other joints
CTS or DATA of point, then close overtime timer, keep out of the way number of times and add 1, arranges intervalometer of mourning in silence, forwards step 1) 0 to;If connect
The network control frame type received is RTS, then abandon this RTS, then go to step 9).
Step 11), nodes X send DATA, then arrange overtime timer TWFACK=2 × τmax+TACK, wherein, τmaxFor
Big propagation delay, TACKPersistent period for ACK.
Step 12), nodes X wait the ACK of destination node, if receiving network control frame before the timeout, and are received
The verification of network control frame is correct, then forward step 13) to, if received network control frame check errors, then continue waiting for purpose
The ACK of node;If time-out, keep out of the way number of times and add 1, then go to step 1).
Step 13), nodes X judge the network control frame type received, if receiving network control frame for nodes X
ACK, then close overtime timer, then go to step 12), otherwise forward step 12) to.
Step 14), nodes X judge the check bit in ACK.If verification is correct, then keeps out of the way number of times and reset, forward step to
1), otherwise keep out of the way number of times and add 1, then go to step 1).
It is above the step to the multiple access method in existing UW-CSMA/CA agreement to describe.The most permissible
Finding out, the process employs the thought adhering to waiting, such as: in step 6), node adheres to waiting corresponding CTS, abandons and appoints
What RTS, until receiving CTS or time-out;In step 12) and step 13), node adheres to waiting corresponding ACK;Abandon any its
Its frame, until receiving ACK or time-out.But in some conditions, may determine that node will not wait according to the type of the frame listened to
To desired frame, if continuing waiting for losing time, it is unfavorable for the handling capacity that improve agreement in Underwater Acoustic Environment.
Summary of the invention
It is an object of the invention to reduce the employing of existing UW-CSMA/CA agreement interior joint adhere to waiting what thought was wasted
Time, improve UW-CSMA/CA agreement handling capacity in Underwater Acoustic Environment.
To achieve these goals, the invention provides multiple access based on UW-CSMA/CA in a kind of underwater acoustic network communication to connect
Enter method, including:
Step 1), nodes X are in sleep state or waiting state;If this node receives acoustics wake-up signal, forward to
Step 2);If keeping out of the way time-out and self having data to send, then forward step 8) to;The time-out and have moving back of time-out if mourned in silence
Keep away, then continue to keep out of the way, and keep sleep state or waiting state;If mourned in silence, time-out and keeping out of the way without time-out, then continue
It is in sleep state or waiting state;If self having data to send and be not at keeping out of the way or silent status, setting to keep out of the way and determining
Time device, then continue in sleep state or waiting state, if self having data to send and be in and keep out of the way or silent status,
Then keep sleep state or waiting state;
Step 2), nodes X be waken up, proceed to network control frame receive state;
If step 3) receives time-out, forwarding step 1) to, if receiving check errors, then forwarding step 1) to;If receiving
To network control frame, the destination address of received network control frame is checked, if destination address is not nodes X, then enters
Enter silent status, then go to step 1), if destination address is nodes X and is not at mourning in silence, then forward step 4) to, if mesh
Address be that nodes X and being in is mourned in silence, then forward step 1) to;
Step 4), type to received network control frame judge, if control frame type is RTS, forward to
Step 5), if other types, then forwards step 1) to;
Step 5), nodes X, to source node response CTS, then arrange overtime timer TWFDATA=2 × τmax+TDATA, its
In, τmaxFor maximum delay spread, TDATAPersistent period for DATA;
Step 6), nodes X wait DATA, if receiving DATA before the timeout, then forward step 7) to, if node receives
Source node issues the RTS of this node, then forward step 5) to;If node receives source node and issues xRTS or xCTS of other nodes
Time, it is immediately finished wait DATA, and enters silent status, intervalometer of mourning in silence is set, forwards step 1) to;Take office if node is monitored
What xDATA, then enter silent status, arranges intervalometer of mourning in silence, forwards step 1) to, otherwise forward step 1) to;
Step 7), closedown overtime timer, then verify received DATA, if verification is correctly DATA
Pass to Internet, abandon DATA if incorrect;Reply ACK then according to check results, finally return to step 1);
Step 8), nodes X send RTS, and arrange overtime timer TWFCTS=2 × τmax+TCTS, wherein, TCTSFor CTS's
Persistent period;
Step 9), nodes X wait the CTS of destination node, if having correctly received network control frame before the timeout, then forward to
Step 10), if check errors or time-out, closes overtime timer, keeps out of the way number of times and adds 1, then goes to step 1);
Step 10), nodes X judge the network control frame type received, if receiving network control frame for transmit
To the CTS of nodes X, then close overtime timer, forward step 11) to;If the network control frame received is for be transferred to it
CTS or DATA of his node, then close overtime timer, keeps out of the way number of times and adds 1, arranges intervalometer of mourning in silence, forwards step 1) to;If
For the purpose of the network control frame received, node issues the RTS of nodes X, then keep out of the way number of times and add 1, then go to step 1);If
The network control frame received is the RTS that other nodes issue nodes X, then forward step 5) to, moves back after DATA reception terminates again
Keep away and retransmit the DATA needing to send;If the network control frame received is other nodes issue the RTS of destination node or other
The RTS sent mutually between node, then abandon this RTS, then go to step 9);
Step 11), nodes X send DATA, then arrange overtime timer TWFACK=2 × τmax+TACK, wherein, TACKFor
The persistent period of ACK;
Step 12), nodes X wait the ACK of destination node, if having correctly received network control frame before the timeout, then turn
To step 13);If check errors, forward step 12) to;If time-out, keep out of the way number of times and add 1, forward step 1) to;
Step 13), nodes X judge the network control frame type received, if receiving network control frame for nodes X
ACK, then close overtime timer, forward step 14) to;If receiving destination node to issue the RTS of this node, then forward step to
Rapid 5), after DATA reception terminates, the DATA that repeating transmission needs send is kept out of the way again;If node receives destination node and issues other joints
When xRTS, xCTS, xDATA of putting, it is immediately finished wait ACK and enters QUIET state, intervalometer of mourning in silence is set, returning again to step
Rapid 1), after step 1) terminates, repeating transmission is kept out of the way again;Otherwise forward step 12) to;
Step 14), nodes X judge the check bit in ACK.If verification is correct, then keeps out of the way number of times and reset, forward step to
1);Otherwise keep out of the way number of times and add 1, forward step 1) to.
It is an advantage of the current invention that: reduce the employing of existing UW-CSMA/CA agreement interior joint and adhere to waiting what thought was wasted
Time, particularly as follows:
(1) when node is in WFCTS state, if node receives destination node and issues the RTS of this node, then enter and move back
Keep away state competitive channel again;If node receives other nodes and issues the RTS of this node, then reply CTS, enter WFDTA
State;If receiving the RTS not being intended for this node, abandoning and adhering to waiting corresponding CTS;If node listens to any
XCTS, xDATA, then enter silent status.
(2) when node is in WFDATA state, if node receives source node and issues the RTS of this node, then reply
CTS, resets the time-out time of WFDATA state;If node receives xRTS, xCTS that source node issues other nodes,
It is immediately finished wait DATA and enters QUIET state;If node listens to any xDATA, then enter silent status.Otherwise,
Adhere to waiting that corresponding DATA is until time-out.
(3) when node is in WFACK state, if node receives destination node and issues the RTS of this node, then reply
CTS, proceeds to the WFDATA state received, and receives and keeps out of the way repeating transmission again after terminating;If node receives destination node and issues other joints
When xRTS, xCTS, xDATA of putting, it is immediately finished wait ACK and enters QUIET state, after end of mourning in silence, keeping out of the way repeating transmission again;No
Then, adhere to waiting that corresponding ACK is until time-out.
The present invention is significantly improved compared with the prior art in handling capacity.
Accompanying drawing explanation
Fig. 1 is in existing UW-CSMA/CA agreement, the schematic diagram of the communication process between underwater acoustic network communication node;
Fig. 2 is the flow chart of the multiple access method of the present invention;
Fig. 3 is the network topology structure schematic diagram that the present invention is used when emulating;
Fig. 4 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length
The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes
Rate is 1024bps, and average meshes spacing is 1000m;
Fig. 5 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length
The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes
Rate is 2048bps, and average meshes spacing is 1000m;
Fig. 6 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length
The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes
Rate is 4096bps, and average meshes spacing is 1000m;
Fig. 7 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art
Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is
128Bytes, average meshes spacing is 1000m;
Fig. 8 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art
Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is
256Bytes, average meshes spacing is 1000m;
Fig. 9 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art
Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is
512Bytes, average meshes spacing is 1000m;
Figure 10 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at average meshes
Spacing is the comparative result schematic diagram that the handling capacity under 500m, 1000m and 2000m carries out emulating, and in emulation, data packet length is
256Bytes, traffic rate is 2048bps.
Detailed description of the invention
In conjunction with accompanying drawing, the invention will be further described.
With reference to Fig. 2, it is assumed that nodes X is any node in underwater acoustic network, and the method for the present invention comprises the following steps:
Step 1), nodes X are in sleep state or waiting state.If this node receives acoustics wake-up signal, forward to
Step 2);If keeping out of the way time-out and self having data to send, then forward step 8) to;The time-out and have moving back of time-out if mourned in silence
Keep away, then continue to keep out of the way, and keep sleep state or waiting state;If mourned in silence, time-out and keeping out of the way without time-out, then continue
It is in sleep state or waiting state;If self having data to send and be not at keeping out of the way or silent status, setting to keep out of the way and determining
Time device, then continue in sleep state or waiting state, if self having data to send and be in and keep out of the way or silent status,
Then keep sleep state or waiting state.
Step 2), nodes X be waken up, proceed to network control frame receive state.
If step 3) receives time-out, forwarding step 1) to, if receiving check errors, then forwarding step 1) to;If receiving
To network control frame, the destination address of received network control frame is checked, if destination address is not nodes X, then enters
Enter silent status, then go to step 1), if destination address is nodes X and is not at mourning in silence, then forward step 4) to, if mesh
Address be that nodes X and being in is mourned in silence, then forward step 1) to.
Step 4), type to received network control frame judge, if control frame type is RTS, forward to
Step 5), if other types, then forwards step 1) to;
Step 5), nodes X, to source node response CTS, then arrange overtime timer TWFDATA=2 × τmax+TDATA, its
In, τmaxFor maximum delay spread, TDATAPersistent period for DATA;
Step 6), nodes X wait DATA, if receiving DATA before the timeout, then forward step 7) to, if node receives
Source node issues the RTS of this node, then forward step 5) to;If node receives source node and issues xRTS or xCTS of other nodes
Time, it is immediately finished wait DATA, and enters silent status, intervalometer of mourning in silence is set, forwards step 1) to;Take office if node is monitored
What xDATA, then enter silent status, arranges intervalometer of mourning in silence, forwards step 1) to, otherwise forward step 1) to.
Step 7), closedown overtime timer, then verify received DATA, if verification is correctly DATA
Pass to Internet, abandon DATA if incorrect;Reply ACK then according to check results, finally return to step 1).
Step 8), nodes X send RTS, and arrange overtime timer TWFCTS=2 × τmax+TCTS, wherein, τmaxPass for maximum
Broadcast delay, TCTSPersistent period for CTS.
Step 9), nodes X wait the CTS of destination node, if having correctly received network control frame before the timeout, then forward to
Step 10), if check errors or time-out, closes overtime timer, keeps out of the way number of times and adds 1, then goes to step 1).
Step 10), nodes X judge the network control frame type received, if receiving network control frame for transmit
To the CTS of nodes X, then close overtime timer, forward step 11) to;If the network control frame received is for be transferred to it
CTS or DATA of his node, then close overtime timer, keeps out of the way number of times and adds 1, arranges intervalometer of mourning in silence, forwards step 1) to;If
For the purpose of the network control frame received, node issues the RTS of nodes X, then keep out of the way number of times and add 1, then go to step 1);If
The network control frame received is the RTS that other nodes issue nodes X, then forward step 5) to, moves back after DATA reception terminates again
Keep away and retransmit the DATA needing to send;If the network control frame received is other nodes issue the RTS of destination node or other
The RTS sent mutually between node, then abandon this RTS, then go to step 9).
Step 11), nodes X send DATA, then arrange overtime timer TWFACK=2 × τmax+TACK, wherein, τmaxFor
Big propagation delay, TACKPersistent period for ACK.
Step 12), nodes X wait the ACK of destination node, if having correctly received network control frame before the timeout, then turn
To step 13);If check errors, forward step 12) to;If time-out, keep out of the way number of times and add 1, forward step 1) to.
Step 13), nodes X judge the network control frame type received, if receiving network control frame for nodes X
ACK, then close overtime timer, forward step 14) to;If receiving destination node to issue the RTS of this node, then forward step to
Rapid 5), after DATA reception terminates, the DATA that repeating transmission needs send is kept out of the way again;If node receives destination node and issues other joints
When xRTS, xCTS, xDATA of putting, it is immediately finished wait ACK and enters QUIET state, intervalometer of mourning in silence is set, returning again to step
Rapid 1), after step 1) terminates, repeating transmission is kept out of the way again;Otherwise forward step 12) to.
Step 14), nodes X judge the check bit in ACK.If verification is correct, then keeps out of the way number of times and reset, forward step to
1);Otherwise keep out of the way number of times and add 1, forward step 1) to.
Being above the description of the basic step to the inventive method, compared with prior art, the inventive method is to reduce
Existing UW-CSMA/CA agreement interior joint uses adheres to waiting the time that thought is wasted, particularly as follows:
(1) when node is in WFCTS state, if node receives destination node and issues the RTS of this node, then enter and move back
Keep away state competitive channel again;If node receives other nodes and issues the RTS of this node, then reply CTS, enter WFDTA
State;If receiving the RTS not being intended for this node, abandoning and adhering to waiting corresponding CTS;If node listens to any
XCTS, xDATA, then enter silent status.
(2) when node is in WFDATA state, if node receives source node and issues the RTS of this node, then reply
CTS, resets the time-out time of WFDATA state;If node receives xRTS, xCTS that source node issues other nodes,
It is immediately finished wait DATA and enters QUIET state;If node listens to any xDATA, then enter silent status.Otherwise,
Adhere to waiting that corresponding DATA is until time-out.
(3) when node is in WFACK state, if node receives destination node and issues the RTS of this node, then reply
CTS, proceeds to the WFDATA state received, and receives and keeps out of the way repeating transmission again after terminating;If node receives destination node and issues other joints
When xRTS, xCTS, xDATA of putting, it is immediately finished wait ACK and enters QUIET state, after end of mourning in silence, keeping out of the way repeating transmission again;No
Then, adhere to waiting that corresponding ACK is until time-out.
Therefore, the method for the present invention is significantly improved in handling capacity.
Below by emulation, the inventive method is compared with prior art.
Using NS2 to carry out simulation analysis in the present invention, the network topology structure that emulation uses is as it is shown on figure 3,36 quiet
State node (dark node in Fig. 3) forms the square profile of 6 × 6.Node is positioned on the cross point of grid the most accurately,
But the random offset of 10% mesh spacing is all introduced in the horizontal direction with vertical direction.The maximum communication distance of node is grid
1.75 times of spacing, so, each node all has 8 one to jump neighbors and 16 double bounce neighbors.In emulation, 36 nodes are equal
Produce packet by Poisson distribution, and the speed producing packet is identical.It is arbitrary that each packet that node produces all mails to it
Double bounce neighbors, and each packet to mail to the probability of 16 double bounce neighbors identical.In order to make borderline node also have 16
Individual double bounce neighbors, needs to be extended border, i.e. all extends two-layer node (grayed-out nodes) on four direction, but this
The most extra node will not produce data stream, and the destination node and the forward node that are only used as boundary node exist.Emulation uses quiet
State route, and only represents the static routing of a node (circular node) in figure, and the route of remaining node is similar to therewith.
In the simulation process of the present invention, the velocity of sound takes 1500m/s.In simulation process, to different pieces of information packet length, difference
Prior art (UW-CSMA/CA) under traffic rate and different mesh spacing and the water of the multiple access method of the employing present invention
Load-the handling capacity of sound network communication method carries out emulation and compares.
The whole network load involved in simulation process and handling capacity are defined as follows:
Fig. 4 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length
The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes
Rate is 1024bps, and average meshes spacing is 1000m.
Fig. 5 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length
The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes
Rate is 2048bps, and average meshes spacing is 1000m.
Fig. 6 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length
The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes
Rate is 4096bps, and average meshes spacing is 1000m.
It can be seen that along with data packet length increases, agreement single after shaking hands successfully leads to from Fig. 4, Fig. 5 and Fig. 6
Letter efficiency increases, and the handling capacity of two kinds of agreements is all improved.Under identical data packet length, the multiple access of the present invention is used to access
The underwater acoustic network communication means of method in handling capacity apparently higher than prior art.
Fig. 7 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art
Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is
128Bytes, average meshes spacing is 1000m.
Fig. 8 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art
Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is
256Bytes, average meshes spacing is 1000m.
Fig. 9 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art
Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is
512Bytes, average meshes spacing is 1000m.
It can be seen that along with traffic rate increases, the transmission time of packet reduces, and propagates from Fig. 7, Fig. 8 and Fig. 9
Postponing the most correspondingly to reduce, communication efficiency reduces, and the handling capacity of two kinds of agreements all can reduce.Under same communication speed, use
The underwater acoustic network communication means of the multiple access method of the present invention in handling capacity apparently higher than prior art.
Figure 10 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at average meshes
Spacing is the comparative result schematic diagram that the handling capacity under 500m, 1000m and 2000m carries out emulating, and in emulation, data packet length is
256Bytes, traffic rate is 2048bps.
It can be seen from fig. 10 that along with average meshes spacing increases, propagation delay increases, the RTS-CTS time of shaking hands prolongs
Long, communication efficiency reduces, and the handling capacity of two kinds of agreements all can reduce.Under identical average meshes spacing, use the present invention many
The underwater acoustic network communication means of location cut-in method in handling capacity apparently higher than prior art.
It should be noted last that, above example is only in order to illustrate technical scheme and unrestricted.Although ginseng
According to embodiment, the present invention is described in detail, it will be understood by those within the art that, the technical side to the present invention
Case is modified or equivalent, and without departure from the spirit and scope of technical solution of the present invention, it all should be contained in the present invention
Right in the middle of.
Claims (1)
1. a multiple access method based on UW-CSMA/CA in underwater acoustic network communication, including:
Step 1), nodes X be in sleep state or waiting state;If this node receives acoustics wake-up signal, forward step to
2);If keeping out of the way time-out and self having data to send, then forward step 8 to);The time-out and have keeping out of the way of time-out, then if mourned in silence
Continue to keep out of the way, and keep sleep state or waiting state;If mourned in silence, time-out and keeping out of the way without time-out, then keep and sleep
Dormancy state or waiting state;If self having data to send and be not at keeping out of the way or silent status, set back off timer,
Then continue in sleep state or waiting state;If self having data to send and be in keeps out of the way or silent status, then continue
Continue and be in sleep state or waiting state;
Step 2), nodes X be waken up, proceed to network control frame receive state;
Step 3) if receiving time-out, forward step 1 to), if receiving check errors, then forward step 1 to);If receiving net
Network control frame, checks the destination address of received network control frame, if destination address is not nodes X, then enters quiet
Silent state, then goes to step 1), if destination address is nodes X and is not at mourning in silence, then forward step 4 to), if destination
Location is that nodes X and being in is mourned in silence, then forward step 1 to);
Step 4), the type of received network control frame is judged, if control frame type is RTS, forward step to
5), if other types, then step 1 is forwarded to);
Step 5), nodes X to source node response CTS, then overtime timer T is setWFDATA=2 × τmax+TDATA, wherein, τmax
For maximum delay spread, TDATAPersistent period for DATA;
Step 6), nodes X wait DATA, if receiving DATA before the timeout, then forward step 7 to), if node receive source joint
Point issues the RTS of this node, then forward step 5 to);If node receives xRTS or xCTS that source node issues other nodes,
It is immediately finished wait DATA, and enters silent status, intervalometer of mourning in silence is set, forwards step 1 to);If node listens to any
XDATA, then enter silent status, arranges intervalometer of mourning in silence, forwards step 1 to);Otherwise forward step 1 to);
Step 7), close overtime timer, then received DATA is verified, if verification correctly DATA is transmitted
To Internet, abandon DATA if incorrect;Reply ACK then according to check results, finally return to step 1);
Step 8), nodes X send RTS, and overtime timer T is setWFCTS=2 × τmax+TCTS, wherein, TCTSContinuing for CTS
Time;
Step 9), nodes X wait destination node CTS, if having correctly received network control frame before the timeout, then forward step to
10), if check errors or time-out, close overtime timer, keep out of the way number of times and add 1, then go to step 1);
Step 10), nodes X judge the network control frame type that receives, if receiving network control frame for be transferred to joint
The CTS of some X, then close overtime timer, forward step 11 to);If the network control frame received is for be transferred to other joints
CTS or DATA of point, then close overtime timer, keep out of the way number of times and add 1, arranges intervalometer of mourning in silence, forwards step 1 to);If received
To network control frame for the purpose of node issue the RTS of nodes X, then keep out of the way number of times and add 1, then go to step 1);If received
To network control frame be the RTS that other nodes issue nodes X, then forward step 5 to), until DATA receive terminate after keep out of the way again weight
Send out the DATA needing to send;RTS or other nodes of destination node is issued if the network control frame received is other nodes
Between the RTS that sends mutually, then abandon this RTS, then go to step 9);
Step 11), nodes X send DATA, then overtime timer T is setWFACK=2 × τmax+TACK, wherein, TACKFor ACK's
Persistent period;
Step 12), nodes X wait destination node ACK, if having correctly received network control frame before the timeout, then forward to step
Rapid 13);If check errors, forward step 12 to);If time-out, keep out of the way number of times and add 1, forward step 1 to);
Step 13), nodes X judge the network control frame type that receives, if receiving network control frame is to nodes X
ACK, then close overtime timer, forward step 14 to);If receiving destination node to issue the RTS of this node, then forward step to
5), after DATA reception terminates, the DATA that repeating transmission needs send is kept out of the way again;If node receives destination node and issues other nodes
XRTS, xCTS, xDATA time, be immediately finished wait ACK enter QUIET state, intervalometer of mourning in silence be set, return again to step
1), until step 1) terminate after keep out of the way repeating transmission again;Otherwise forward step 12 to);
Step 14), nodes X judge the check bit in ACK, if verification is correct, then keeps out of the way number of times and reset, forward step 1 to);No
Then keep out of the way number of times and add 1, forward step 1 to).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310340872.8A CN104348562B (en) | 2013-08-07 | 2013-08-07 | Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310340872.8A CN104348562B (en) | 2013-08-07 | 2013-08-07 | Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104348562A CN104348562A (en) | 2015-02-11 |
CN104348562B true CN104348562B (en) | 2016-09-28 |
Family
ID=52503474
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310340872.8A Active CN104348562B (en) | 2013-08-07 | 2013-08-07 | Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104348562B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106788782B (en) * | 2016-12-06 | 2021-05-07 | 哈尔滨工程大学 | Cross-layer communication method for OFDM link physical layer and MAC layer of underwater acoustic communication network |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5844905A (en) * | 1996-07-09 | 1998-12-01 | International Business Machines Corporation | Extensions to distributed MAC protocols with collision avoidance using RTS/CTS exchange |
CN101567707A (en) * | 2008-04-24 | 2009-10-28 | 赵力 | Medium access control method based on CDMA underwater acoustic network |
CN101729566A (en) * | 2009-11-27 | 2010-06-09 | 中国科学院声学研究所 | Underwater sound network multiple access method based on CSMA/CA |
US7920536B1 (en) * | 2006-10-20 | 2011-04-05 | Marvell International Ltd. | More robust data transfer through detection of hidden nodes |
CN102098113A (en) * | 2011-02-25 | 2011-06-15 | 东南大学 | Method for realizing water sound sensor network MAC (Media Access Control) protocol based on ALOHA and TDMA (Time Division Multiple Access) |
CN102546323A (en) * | 2010-12-14 | 2012-07-04 | 中国科学院声学研究所 | Peer-to-peer network based on underwater sound and radio mixed channel |
CN102612077A (en) * | 2012-03-19 | 2012-07-25 | 东南大学 | Medium access control method used for distributed multi-skip underwater acoustic communication network |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7885287B2 (en) * | 2005-03-29 | 2011-02-08 | Intel Corporation | Method and apparatus for adaptive network allocation |
-
2013
- 2013-08-07 CN CN201310340872.8A patent/CN104348562B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5844905A (en) * | 1996-07-09 | 1998-12-01 | International Business Machines Corporation | Extensions to distributed MAC protocols with collision avoidance using RTS/CTS exchange |
US7920536B1 (en) * | 2006-10-20 | 2011-04-05 | Marvell International Ltd. | More robust data transfer through detection of hidden nodes |
CN101567707A (en) * | 2008-04-24 | 2009-10-28 | 赵力 | Medium access control method based on CDMA underwater acoustic network |
CN101729566A (en) * | 2009-11-27 | 2010-06-09 | 中国科学院声学研究所 | Underwater sound network multiple access method based on CSMA/CA |
CN102546323A (en) * | 2010-12-14 | 2012-07-04 | 中国科学院声学研究所 | Peer-to-peer network based on underwater sound and radio mixed channel |
CN102098113A (en) * | 2011-02-25 | 2011-06-15 | 东南大学 | Method for realizing water sound sensor network MAC (Media Access Control) protocol based on ALOHA and TDMA (Time Division Multiple Access) |
CN102612077A (en) * | 2012-03-19 | 2012-07-25 | 东南大学 | Medium access control method used for distributed multi-skip underwater acoustic communication network |
Non-Patent Citations (2)
Title |
---|
Aloha-LPD:一种用于水声通信网的MAC协议;王毅等;《东南大学学报(自然科学版)》;20090120;第39卷(第01期);第12-17页 * |
多帧确认及虚拟载波侦听的水声MACAW协议;周倩等;《探测与控制学报》;20090426;第31卷(第02期);第28-32页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104348562A (en) | 2015-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fujimoto et al. | Network simulation | |
Zhai et al. | Performance analysis of IEEE 802.11 MAC protocols in wireless LANs | |
Lin et al. | Asynchronous multimedia multihop wireless networks | |
Kliazovich et al. | Cross-layer congestion control in ad hoc wireless networks | |
Woo et al. | A transmission control scheme for media access in sensor networks | |
Pu et al. | Comparing underwater MAC protocols in real sea experiments | |
CN104349495B (en) | A kind of underwater acoustic network multiple access method based on MACA U agreements | |
Zhuo et al. | Delay and queue aware adaptive scheduling-based MAC protocol for underwater acoustic sensor networks | |
CN105245358B (en) | Intelligent grid MAC layer multi-service method for analyzing performance based on Markov model | |
CN103929284B (en) | High-reliability transmission method for wireless sensor network | |
Peng et al. | COPE-MAC: A contention-based medium access control protocol with parallel reservation for underwater acoustic networks | |
CN103312697B (en) | Based on the underwater sensor network MAC protocol implementation method of space-time justice | |
Shahabudeen et al. | Analysis of a high-performance MAC protocol for underwater acoustic networks | |
Gabale et al. | Lit mac: Addressing the challenges of effective voice communication in a low cost, low power wireless mesh network | |
Tardioli et al. | A wireless multi-hop protocol for real-time applications | |
CN102098113A (en) | Method for realizing water sound sensor network MAC (Media Access Control) protocol based on ALOHA and TDMA (Time Division Multiple Access) | |
CN104348560B (en) | The node based on UW CSMA/CA is mourned in silence method in underwater acoustic network communication | |
CN104348562B (en) | Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network | |
Ding et al. | Research on the multi-channel probability detection CSMA protocol with sensor monitoring function | |
CN101729566B (en) | Underwater sound network multiple access method based on CSMA/CA | |
CN102195763B (en) | Method for realizing MAC (Media Access Control) protocol under long delay condition of underwater sound sensor network | |
Yasmeen et al. | Ferry access points and sticky transfers: Improving communication in ferry-assisted DTNs | |
Hu et al. | Efficient modeling and performance analysis for IEEE 802.15. 4 with coloured petri nets | |
CN110139367A (en) | A kind of communication processing method and relevant device of non-scheduling resource | |
Gao et al. | A feedback approach for QoS-enhanced MAC in wireless sensor network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |