CN104348562B - Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network - Google Patents

Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network Download PDF

Info

Publication number
CN104348562B
CN104348562B CN201310340872.8A CN201310340872A CN104348562B CN 104348562 B CN104348562 B CN 104348562B CN 201310340872 A CN201310340872 A CN 201310340872A CN 104348562 B CN104348562 B CN 104348562B
Authority
CN
China
Prior art keywords
nodes
node
data
control frame
rts
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310340872.8A
Other languages
Chinese (zh)
Other versions
CN104348562A (en
Inventor
刘磊
李宇
张春华
黄海宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Acoustics CAS
Original Assignee
Institute of Acoustics CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Acoustics CAS filed Critical Institute of Acoustics CAS
Priority to CN201310340872.8A priority Critical patent/CN104348562B/en
Publication of CN104348562A publication Critical patent/CN104348562A/en
Application granted granted Critical
Publication of CN104348562B publication Critical patent/CN104348562B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to multiple access method based on UW CSMA/CA in the communication of a kind of underwater acoustic network, including: when node is in WFCTS state, if node receives the RTS of destination node, then entrance backoff state again competitive channel, if node receives the RTS of other nodes, then reply CTS, enter WFDTA state, if receiving the RTS not being intended for this node, abandoning and adhering to waiting corresponding CTS, if node listens to any xCTS, xDATA, then enter silent status;When node is in WFDATA state, if node receives the RTS of source node, then reply CTS, reset the time-out time of WFDATA state, if node receives xRTS, xCTS that source node issues other nodes, be immediately finished wait DATA and enter QUIET state, if node listens to any xDATA, then enter silent status, otherwise, adhere to waiting that corresponding DATA is until time-out.

Description

Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network
Technical field
The present invention relates to the underwater acoustic network communications field, based on UW-CSMA/CA in communicating particularly to a kind of underwater acoustic network Multiple access method.
Background technology
Ocean occupies more than 2/3rds of ground sphere area, and observation and exploitation to ocean are increasingly by the weight of various countries Depending on, meanwhile, underwater acoustic network becomes worldwide study hotspot.Data link layer protocol is the important interior of underwater sound net research Hold.Compared with wireless channel, underwater acoustic channel Bandwidth-Constrained, propagation delay are big, and the design of underwater acoustic network MAC protocol is proposed by this Challenge greatly.
Obtaining mode according to the channel of agreement, MAC protocol is divided into MAC protocol based on scheduling and MAC based on competition association View.Owing to the available band of underwater acoustic channel is the narrowest so that FDMA based on scheduling is difficult with.TDMA based on scheduling needs each Nodal clock precise synchronization and protection interval, this has the biggest being stranded in the underwater acoustic network that high propagation delay, random time space frequency become Difficult.CDMA based on scheduling applies less because its computation complexity is higher.Therefore, MAC protocol based on competition is more applicable Underwater acoustic network.MAC protocol based on competition can be divided into again MAC protocol based on ALOHA and based on the MAC protocol shaken hands.This Based on the MAC protocol shaken hands in application main research multi-hop underwater acoustic network.
Shaken hands reserve channel by RTS/CTS based on the MAC protocol shaken hands, solve concealed terminal and exposed terminal is asked Topic.At list of references 1 " Affan A.Syed, Wei Ye, Jobn Heidemann.T-Lohi:A New Class of MAC Protocols For Underwater Acoustic Sensor Networks[C].The27th Conference on Computer Communications, Phoenix, 2008:231-235 " disclosed by T-Lohi agreement in, use short calling out Signal reserve channel of waking up prevents the collision of packet, and for distributed, short distance, denser network, T-Lohi is provided that and gulps down The network service that the amount of telling is stable, capacity usage ratio is high.At list of references 2 " X.Guo, M.R.Frater, and M.J.Ryan.Design of a Propagation-Delay-Tolerant MAC Protocol for Underwater Acoustic Sensor Networks [J] .Oceanic Engineering, 2009,34 (2): 170-180 " in, by rule Determine the impact reducing underwater acoustic channel height propagation delay turnaround time of CTS, thus improve the handling capacity of network.At list of references 3《Nitthita Chirdchoo,Wee-Seng Soh,and Kee Chaing Chua.RIPT:A Receiver- initiated Reservation-based Protocol for Underwater Acoustic Networks[J] .Selected propose in Areas in Communications, 2008,26 (9): 1744-1753 " a kind of to be come by receiving terminal The Stochastic accessing MAC protocol of initializing communication process, makes its all neighbors to be sent in the way of data packet queue Packet is sent to receiving terminal.At list of references 4 " Dong Fang, Yu Li, Haining Huang, Li Yin.A CSMA/ CA-based MAC Protocol for Underwater Acoustic Networks[C].6th International Conference on Wireless Communications,Networking and Mobile Computing, Chengdu, 2010:1-4 " a kind of MAC protocol being applicable to underwater acoustic network of middle design, by its named UW-CSMA/CA agreement, Multiple access method based on this agreement uses the strategy adhering to waiting, reduces and keeps out of the way number of times, thus improves the handling capacity of network.
In UW-CSMA/CA agreement, the persistent period of RTS, CTS, DATA, ACK is respectively labeled as TRTS、TCTS、 TDATA、TACK, maximum delay spread is labeled as τmax.Based on UW-CSMA/CA agreement, the node in underwater acoustic network is likely to be at Six kinds of states: IDLE, CTD, WFCTS, WFDATA, WFACK and QUIET.
With reference to Fig. 1, in UW-CSMA/CA agreement, in underwater acoustic network, the basic communication process between each node is as follows: When source node S has packets need to send, node state forwards CTD to from IDLE, when CTD state terminates, and source node S can send RTS also forwards WFCTS state to, and arranging time-out time is 2 τmax+TCTS;After destination node D receives RTS, send CTS also immediately Proceeding to WFDATA state, arranging time-out time is 2 τmax+TDATA;After source node S receives CTS, send DATA immediately and proceed to WFACK state, arranging time-out time is 2 τmax+TACK;After destination node D receives DATA, send ACK immediately and terminate this Communication (curve arrow in Fig. 1 represents that node terminates this handshake communication);Source node S terminates this communication after receiving ACK.
It is above the description of basic communication process between underwater acoustic network interior joint.In actual applications, due to underwater acoustic network The complexity of environment, node needs to be tackled various possible situations, how to process node in multiple access method Various possible situations describe, and the multiple access method in UW-CSMA/CA agreement does corresponding explanation below.
If nodes X is any node in underwater acoustic network.
Step 1), nodes X are in sleep state or waiting state, if this node receives acoustics wake-up signal, forward to Step 2);If keeping out of the way time-out and self having data to send, then forward step 8) to;The time-out and have moving back of time-out if mourned in silence Keep away, then continue to keep out of the way, and keep sleep state or waiting state;If mourned in silence, time-out and keeping out of the way without time-out, then continue It is in sleep state or waiting state;If self having data to send and be not at keeping out of the way or silent status, then set and keep out of the way After intervalometer, keep sleep state or waiting state, if self having data to send and be in keeps out of the way or silent status, Then keep sleep state or waiting state.
Step 2), nodes X be waken up, proceed to network control frame receive state.
If step 3) receives time-out, forwarding step 1) to, if receiving check errors, then forwarding step 1) to;If receiving To network control frame, the destination address of network control frame is checked, if destination address is not nodes X, then enters and mourn in silence State, then goes to step 1), if destination address is nodes X and is not at mourning in silence, then forwards step 4) to, if destination address It is that nodes X and being in is mourned in silence, then forwards step 1) to.
Step 4), type to received network control frame judge, if control frame type is RTS, forward to Step 5), if other types, then forwards step 1) to;
Step 5), nodes X, to source node response CTS, then arrange overtime timer TWFDATA=2 × τmax+TDATA, its In, τmaxFor maximum delay spread, TDATAPersistent period for DATA.
Step 6), nodes X wait DATA, if receiving DATA before the timeout, then forward step 7) to, otherwise forward step to 1).
Step 7), closedown overtime timer, then verify received DATA, if verification is correctly DATA Pass to Internet, abandon DATA if incorrect;Reply ACK then according to check results, finally re-execute step 1).
Step 8), nodes X send RTS, and arrange overtime timer TWFCTS=2 × τmax+TCTS, wherein, τmaxPass for maximum Broadcast delay, TCTSPersistent period for CTS.
Step 9), nodes X wait the CTS of destination node, if having correctly received network control frame before the timeout, then forward to Step 10), if check errors or time-out, then closes overtime timer, keeps out of the way number of times and add 1, then go to step 1).
Step 10), nodes X judge the network control frame type received, if receiving network control frame for transmit To the CTS of nodes X, then close overtime timer, forward step 0 to;If the network control frame received is for be transferred to other joints CTS or DATA of point, then close overtime timer, keep out of the way number of times and add 1, arranges intervalometer of mourning in silence, forwards step 1) 0 to;If connect The network control frame type received is RTS, then abandon this RTS, then go to step 9).
Step 11), nodes X send DATA, then arrange overtime timer TWFACK=2 × τmax+TACK, wherein, τmaxFor Big propagation delay, TACKPersistent period for ACK.
Step 12), nodes X wait the ACK of destination node, if receiving network control frame before the timeout, and are received The verification of network control frame is correct, then forward step 13) to, if received network control frame check errors, then continue waiting for purpose The ACK of node;If time-out, keep out of the way number of times and add 1, then go to step 1).
Step 13), nodes X judge the network control frame type received, if receiving network control frame for nodes X ACK, then close overtime timer, then go to step 12), otherwise forward step 12) to.
Step 14), nodes X judge the check bit in ACK.If verification is correct, then keeps out of the way number of times and reset, forward step to 1), otherwise keep out of the way number of times and add 1, then go to step 1).
It is above the step to the multiple access method in existing UW-CSMA/CA agreement to describe.The most permissible Finding out, the process employs the thought adhering to waiting, such as: in step 6), node adheres to waiting corresponding CTS, abandons and appoints What RTS, until receiving CTS or time-out;In step 12) and step 13), node adheres to waiting corresponding ACK;Abandon any its Its frame, until receiving ACK or time-out.But in some conditions, may determine that node will not wait according to the type of the frame listened to To desired frame, if continuing waiting for losing time, it is unfavorable for the handling capacity that improve agreement in Underwater Acoustic Environment.
Summary of the invention
It is an object of the invention to reduce the employing of existing UW-CSMA/CA agreement interior joint adhere to waiting what thought was wasted Time, improve UW-CSMA/CA agreement handling capacity in Underwater Acoustic Environment.
To achieve these goals, the invention provides multiple access based on UW-CSMA/CA in a kind of underwater acoustic network communication to connect Enter method, including:
Step 1), nodes X are in sleep state or waiting state;If this node receives acoustics wake-up signal, forward to Step 2);If keeping out of the way time-out and self having data to send, then forward step 8) to;The time-out and have moving back of time-out if mourned in silence Keep away, then continue to keep out of the way, and keep sleep state or waiting state;If mourned in silence, time-out and keeping out of the way without time-out, then continue It is in sleep state or waiting state;If self having data to send and be not at keeping out of the way or silent status, setting to keep out of the way and determining Time device, then continue in sleep state or waiting state, if self having data to send and be in and keep out of the way or silent status, Then keep sleep state or waiting state;
Step 2), nodes X be waken up, proceed to network control frame receive state;
If step 3) receives time-out, forwarding step 1) to, if receiving check errors, then forwarding step 1) to;If receiving To network control frame, the destination address of received network control frame is checked, if destination address is not nodes X, then enters Enter silent status, then go to step 1), if destination address is nodes X and is not at mourning in silence, then forward step 4) to, if mesh Address be that nodes X and being in is mourned in silence, then forward step 1) to;
Step 4), type to received network control frame judge, if control frame type is RTS, forward to Step 5), if other types, then forwards step 1) to;
Step 5), nodes X, to source node response CTS, then arrange overtime timer TWFDATA=2 × τmax+TDATA, its In, τmaxFor maximum delay spread, TDATAPersistent period for DATA;
Step 6), nodes X wait DATA, if receiving DATA before the timeout, then forward step 7) to, if node receives Source node issues the RTS of this node, then forward step 5) to;If node receives source node and issues xRTS or xCTS of other nodes Time, it is immediately finished wait DATA, and enters silent status, intervalometer of mourning in silence is set, forwards step 1) to;Take office if node is monitored What xDATA, then enter silent status, arranges intervalometer of mourning in silence, forwards step 1) to, otherwise forward step 1) to;
Step 7), closedown overtime timer, then verify received DATA, if verification is correctly DATA Pass to Internet, abandon DATA if incorrect;Reply ACK then according to check results, finally return to step 1);
Step 8), nodes X send RTS, and arrange overtime timer TWFCTS=2 × τmax+TCTS, wherein, TCTSFor CTS's Persistent period;
Step 9), nodes X wait the CTS of destination node, if having correctly received network control frame before the timeout, then forward to Step 10), if check errors or time-out, closes overtime timer, keeps out of the way number of times and adds 1, then goes to step 1);
Step 10), nodes X judge the network control frame type received, if receiving network control frame for transmit To the CTS of nodes X, then close overtime timer, forward step 11) to;If the network control frame received is for be transferred to it CTS or DATA of his node, then close overtime timer, keeps out of the way number of times and adds 1, arranges intervalometer of mourning in silence, forwards step 1) to;If For the purpose of the network control frame received, node issues the RTS of nodes X, then keep out of the way number of times and add 1, then go to step 1);If The network control frame received is the RTS that other nodes issue nodes X, then forward step 5) to, moves back after DATA reception terminates again Keep away and retransmit the DATA needing to send;If the network control frame received is other nodes issue the RTS of destination node or other The RTS sent mutually between node, then abandon this RTS, then go to step 9);
Step 11), nodes X send DATA, then arrange overtime timer TWFACK=2 × τmax+TACK, wherein, TACKFor The persistent period of ACK;
Step 12), nodes X wait the ACK of destination node, if having correctly received network control frame before the timeout, then turn To step 13);If check errors, forward step 12) to;If time-out, keep out of the way number of times and add 1, forward step 1) to;
Step 13), nodes X judge the network control frame type received, if receiving network control frame for nodes X ACK, then close overtime timer, forward step 14) to;If receiving destination node to issue the RTS of this node, then forward step to Rapid 5), after DATA reception terminates, the DATA that repeating transmission needs send is kept out of the way again;If node receives destination node and issues other joints When xRTS, xCTS, xDATA of putting, it is immediately finished wait ACK and enters QUIET state, intervalometer of mourning in silence is set, returning again to step Rapid 1), after step 1) terminates, repeating transmission is kept out of the way again;Otherwise forward step 12) to;
Step 14), nodes X judge the check bit in ACK.If verification is correct, then keeps out of the way number of times and reset, forward step to 1);Otherwise keep out of the way number of times and add 1, forward step 1) to.
It is an advantage of the current invention that: reduce the employing of existing UW-CSMA/CA agreement interior joint and adhere to waiting what thought was wasted Time, particularly as follows:
(1) when node is in WFCTS state, if node receives destination node and issues the RTS of this node, then enter and move back Keep away state competitive channel again;If node receives other nodes and issues the RTS of this node, then reply CTS, enter WFDTA State;If receiving the RTS not being intended for this node, abandoning and adhering to waiting corresponding CTS;If node listens to any XCTS, xDATA, then enter silent status.
(2) when node is in WFDATA state, if node receives source node and issues the RTS of this node, then reply CTS, resets the time-out time of WFDATA state;If node receives xRTS, xCTS that source node issues other nodes, It is immediately finished wait DATA and enters QUIET state;If node listens to any xDATA, then enter silent status.Otherwise, Adhere to waiting that corresponding DATA is until time-out.
(3) when node is in WFACK state, if node receives destination node and issues the RTS of this node, then reply CTS, proceeds to the WFDATA state received, and receives and keeps out of the way repeating transmission again after terminating;If node receives destination node and issues other joints When xRTS, xCTS, xDATA of putting, it is immediately finished wait ACK and enters QUIET state, after end of mourning in silence, keeping out of the way repeating transmission again;No Then, adhere to waiting that corresponding ACK is until time-out.
The present invention is significantly improved compared with the prior art in handling capacity.
Accompanying drawing explanation
Fig. 1 is in existing UW-CSMA/CA agreement, the schematic diagram of the communication process between underwater acoustic network communication node;
Fig. 2 is the flow chart of the multiple access method of the present invention;
Fig. 3 is the network topology structure schematic diagram that the present invention is used when emulating;
Fig. 4 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes Rate is 1024bps, and average meshes spacing is 1000m;
Fig. 5 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes Rate is 2048bps, and average meshes spacing is 1000m;
Fig. 6 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes Rate is 4096bps, and average meshes spacing is 1000m;
Fig. 7 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is 128Bytes, average meshes spacing is 1000m;
Fig. 8 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is 256Bytes, average meshes spacing is 1000m;
Fig. 9 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is 512Bytes, average meshes spacing is 1000m;
Figure 10 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at average meshes Spacing is the comparative result schematic diagram that the handling capacity under 500m, 1000m and 2000m carries out emulating, and in emulation, data packet length is 256Bytes, traffic rate is 2048bps.
Detailed description of the invention
In conjunction with accompanying drawing, the invention will be further described.
With reference to Fig. 2, it is assumed that nodes X is any node in underwater acoustic network, and the method for the present invention comprises the following steps:
Step 1), nodes X are in sleep state or waiting state.If this node receives acoustics wake-up signal, forward to Step 2);If keeping out of the way time-out and self having data to send, then forward step 8) to;The time-out and have moving back of time-out if mourned in silence Keep away, then continue to keep out of the way, and keep sleep state or waiting state;If mourned in silence, time-out and keeping out of the way without time-out, then continue It is in sleep state or waiting state;If self having data to send and be not at keeping out of the way or silent status, setting to keep out of the way and determining Time device, then continue in sleep state or waiting state, if self having data to send and be in and keep out of the way or silent status, Then keep sleep state or waiting state.
Step 2), nodes X be waken up, proceed to network control frame receive state.
If step 3) receives time-out, forwarding step 1) to, if receiving check errors, then forwarding step 1) to;If receiving To network control frame, the destination address of received network control frame is checked, if destination address is not nodes X, then enters Enter silent status, then go to step 1), if destination address is nodes X and is not at mourning in silence, then forward step 4) to, if mesh Address be that nodes X and being in is mourned in silence, then forward step 1) to.
Step 4), type to received network control frame judge, if control frame type is RTS, forward to Step 5), if other types, then forwards step 1) to;
Step 5), nodes X, to source node response CTS, then arrange overtime timer TWFDATA=2 × τmax+TDATA, its In, τmaxFor maximum delay spread, TDATAPersistent period for DATA;
Step 6), nodes X wait DATA, if receiving DATA before the timeout, then forward step 7) to, if node receives Source node issues the RTS of this node, then forward step 5) to;If node receives source node and issues xRTS or xCTS of other nodes Time, it is immediately finished wait DATA, and enters silent status, intervalometer of mourning in silence is set, forwards step 1) to;Take office if node is monitored What xDATA, then enter silent status, arranges intervalometer of mourning in silence, forwards step 1) to, otherwise forward step 1) to.
Step 7), closedown overtime timer, then verify received DATA, if verification is correctly DATA Pass to Internet, abandon DATA if incorrect;Reply ACK then according to check results, finally return to step 1).
Step 8), nodes X send RTS, and arrange overtime timer TWFCTS=2 × τmax+TCTS, wherein, τmaxPass for maximum Broadcast delay, TCTSPersistent period for CTS.
Step 9), nodes X wait the CTS of destination node, if having correctly received network control frame before the timeout, then forward to Step 10), if check errors or time-out, closes overtime timer, keeps out of the way number of times and adds 1, then goes to step 1).
Step 10), nodes X judge the network control frame type received, if receiving network control frame for transmit To the CTS of nodes X, then close overtime timer, forward step 11) to;If the network control frame received is for be transferred to it CTS or DATA of his node, then close overtime timer, keeps out of the way number of times and adds 1, arranges intervalometer of mourning in silence, forwards step 1) to;If For the purpose of the network control frame received, node issues the RTS of nodes X, then keep out of the way number of times and add 1, then go to step 1);If The network control frame received is the RTS that other nodes issue nodes X, then forward step 5) to, moves back after DATA reception terminates again Keep away and retransmit the DATA needing to send;If the network control frame received is other nodes issue the RTS of destination node or other The RTS sent mutually between node, then abandon this RTS, then go to step 9).
Step 11), nodes X send DATA, then arrange overtime timer TWFACK=2 × τmax+TACK, wherein, τmaxFor Big propagation delay, TACKPersistent period for ACK.
Step 12), nodes X wait the ACK of destination node, if having correctly received network control frame before the timeout, then turn To step 13);If check errors, forward step 12) to;If time-out, keep out of the way number of times and add 1, forward step 1) to.
Step 13), nodes X judge the network control frame type received, if receiving network control frame for nodes X ACK, then close overtime timer, forward step 14) to;If receiving destination node to issue the RTS of this node, then forward step to Rapid 5), after DATA reception terminates, the DATA that repeating transmission needs send is kept out of the way again;If node receives destination node and issues other joints When xRTS, xCTS, xDATA of putting, it is immediately finished wait ACK and enters QUIET state, intervalometer of mourning in silence is set, returning again to step Rapid 1), after step 1) terminates, repeating transmission is kept out of the way again;Otherwise forward step 12) to.
Step 14), nodes X judge the check bit in ACK.If verification is correct, then keeps out of the way number of times and reset, forward step to 1);Otherwise keep out of the way number of times and add 1, forward step 1) to.
Being above the description of the basic step to the inventive method, compared with prior art, the inventive method is to reduce Existing UW-CSMA/CA agreement interior joint uses adheres to waiting the time that thought is wasted, particularly as follows:
(1) when node is in WFCTS state, if node receives destination node and issues the RTS of this node, then enter and move back Keep away state competitive channel again;If node receives other nodes and issues the RTS of this node, then reply CTS, enter WFDTA State;If receiving the RTS not being intended for this node, abandoning and adhering to waiting corresponding CTS;If node listens to any XCTS, xDATA, then enter silent status.
(2) when node is in WFDATA state, if node receives source node and issues the RTS of this node, then reply CTS, resets the time-out time of WFDATA state;If node receives xRTS, xCTS that source node issues other nodes, It is immediately finished wait DATA and enters QUIET state;If node listens to any xDATA, then enter silent status.Otherwise, Adhere to waiting that corresponding DATA is until time-out.
(3) when node is in WFACK state, if node receives destination node and issues the RTS of this node, then reply CTS, proceeds to the WFDATA state received, and receives and keeps out of the way repeating transmission again after terminating;If node receives destination node and issues other joints When xRTS, xCTS, xDATA of putting, it is immediately finished wait ACK and enters QUIET state, after end of mourning in silence, keeping out of the way repeating transmission again;No Then, adhere to waiting that corresponding ACK is until time-out.
Therefore, the method for the present invention is significantly improved in handling capacity.
Below by emulation, the inventive method is compared with prior art.
Using NS2 to carry out simulation analysis in the present invention, the network topology structure that emulation uses is as it is shown on figure 3,36 quiet State node (dark node in Fig. 3) forms the square profile of 6 × 6.Node is positioned on the cross point of grid the most accurately, But the random offset of 10% mesh spacing is all introduced in the horizontal direction with vertical direction.The maximum communication distance of node is grid 1.75 times of spacing, so, each node all has 8 one to jump neighbors and 16 double bounce neighbors.In emulation, 36 nodes are equal Produce packet by Poisson distribution, and the speed producing packet is identical.It is arbitrary that each packet that node produces all mails to it Double bounce neighbors, and each packet to mail to the probability of 16 double bounce neighbors identical.In order to make borderline node also have 16 Individual double bounce neighbors, needs to be extended border, i.e. all extends two-layer node (grayed-out nodes) on four direction, but this The most extra node will not produce data stream, and the destination node and the forward node that are only used as boundary node exist.Emulation uses quiet State route, and only represents the static routing of a node (circular node) in figure, and the route of remaining node is similar to therewith.
In the simulation process of the present invention, the velocity of sound takes 1500m/s.In simulation process, to different pieces of information packet length, difference Prior art (UW-CSMA/CA) under traffic rate and different mesh spacing and the water of the multiple access method of the employing present invention Load-the handling capacity of sound network communication method carries out emulation and compares.
The whole network load involved in simulation process and handling capacity are defined as follows:
Fig. 4 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes Rate is 1024bps, and average meshes spacing is 1000m.
Fig. 5 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes Rate is 2048bps, and average meshes spacing is 1000m.
Fig. 6 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at data packet length The comparative result schematic diagram emulated is carried out, communication speed in emulation for the handling capacity under 128Bytes, 256Bytes and 512Bytes Rate is 4096bps, and average meshes spacing is 1000m.
It can be seen that along with data packet length increases, agreement single after shaking hands successfully leads to from Fig. 4, Fig. 5 and Fig. 6 Letter efficiency increases, and the handling capacity of two kinds of agreements is all improved.Under identical data packet length, the multiple access of the present invention is used to access The underwater acoustic network communication means of method in handling capacity apparently higher than prior art.
Fig. 7 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is 128Bytes, average meshes spacing is 1000m.
Fig. 8 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is 256Bytes, average meshes spacing is 1000m.
Fig. 9 is that the underwater acoustic network communication means of the multiple access method using the present invention is at traffic rate with prior art Handling capacity under 1024bps, 2048bps and 4096bps carries out the comparative result schematic diagram emulated, and in emulation, data packet length is 512Bytes, average meshes spacing is 1000m.
It can be seen that along with traffic rate increases, the transmission time of packet reduces, and propagates from Fig. 7, Fig. 8 and Fig. 9 Postponing the most correspondingly to reduce, communication efficiency reduces, and the handling capacity of two kinds of agreements all can reduce.Under same communication speed, use The underwater acoustic network communication means of the multiple access method of the present invention in handling capacity apparently higher than prior art.
Figure 10 is that underwater acoustic network communication means and the prior art of the multiple access method using the present invention are at average meshes Spacing is the comparative result schematic diagram that the handling capacity under 500m, 1000m and 2000m carries out emulating, and in emulation, data packet length is 256Bytes, traffic rate is 2048bps.
It can be seen from fig. 10 that along with average meshes spacing increases, propagation delay increases, the RTS-CTS time of shaking hands prolongs Long, communication efficiency reduces, and the handling capacity of two kinds of agreements all can reduce.Under identical average meshes spacing, use the present invention many The underwater acoustic network communication means of location cut-in method in handling capacity apparently higher than prior art.
It should be noted last that, above example is only in order to illustrate technical scheme and unrestricted.Although ginseng According to embodiment, the present invention is described in detail, it will be understood by those within the art that, the technical side to the present invention Case is modified or equivalent, and without departure from the spirit and scope of technical solution of the present invention, it all should be contained in the present invention Right in the middle of.

Claims (1)

1. a multiple access method based on UW-CSMA/CA in underwater acoustic network communication, including:
Step 1), nodes X be in sleep state or waiting state;If this node receives acoustics wake-up signal, forward step to 2);If keeping out of the way time-out and self having data to send, then forward step 8 to);The time-out and have keeping out of the way of time-out, then if mourned in silence Continue to keep out of the way, and keep sleep state or waiting state;If mourned in silence, time-out and keeping out of the way without time-out, then keep and sleep Dormancy state or waiting state;If self having data to send and be not at keeping out of the way or silent status, set back off timer, Then continue in sleep state or waiting state;If self having data to send and be in keeps out of the way or silent status, then continue Continue and be in sleep state or waiting state;
Step 2), nodes X be waken up, proceed to network control frame receive state;
Step 3) if receiving time-out, forward step 1 to), if receiving check errors, then forward step 1 to);If receiving net Network control frame, checks the destination address of received network control frame, if destination address is not nodes X, then enters quiet Silent state, then goes to step 1), if destination address is nodes X and is not at mourning in silence, then forward step 4 to), if destination Location is that nodes X and being in is mourned in silence, then forward step 1 to);
Step 4), the type of received network control frame is judged, if control frame type is RTS, forward step to 5), if other types, then step 1 is forwarded to);
Step 5), nodes X to source node response CTS, then overtime timer T is setWFDATA=2 × τmax+TDATA, wherein, τmax For maximum delay spread, TDATAPersistent period for DATA;
Step 6), nodes X wait DATA, if receiving DATA before the timeout, then forward step 7 to), if node receive source joint Point issues the RTS of this node, then forward step 5 to);If node receives xRTS or xCTS that source node issues other nodes, It is immediately finished wait DATA, and enters silent status, intervalometer of mourning in silence is set, forwards step 1 to);If node listens to any XDATA, then enter silent status, arranges intervalometer of mourning in silence, forwards step 1 to);Otherwise forward step 1 to);
Step 7), close overtime timer, then received DATA is verified, if verification correctly DATA is transmitted To Internet, abandon DATA if incorrect;Reply ACK then according to check results, finally return to step 1);
Step 8), nodes X send RTS, and overtime timer T is setWFCTS=2 × τmax+TCTS, wherein, TCTSContinuing for CTS Time;
Step 9), nodes X wait destination node CTS, if having correctly received network control frame before the timeout, then forward step to 10), if check errors or time-out, close overtime timer, keep out of the way number of times and add 1, then go to step 1);
Step 10), nodes X judge the network control frame type that receives, if receiving network control frame for be transferred to joint The CTS of some X, then close overtime timer, forward step 11 to);If the network control frame received is for be transferred to other joints CTS or DATA of point, then close overtime timer, keep out of the way number of times and add 1, arranges intervalometer of mourning in silence, forwards step 1 to);If received To network control frame for the purpose of node issue the RTS of nodes X, then keep out of the way number of times and add 1, then go to step 1);If received To network control frame be the RTS that other nodes issue nodes X, then forward step 5 to), until DATA receive terminate after keep out of the way again weight Send out the DATA needing to send;RTS or other nodes of destination node is issued if the network control frame received is other nodes Between the RTS that sends mutually, then abandon this RTS, then go to step 9);
Step 11), nodes X send DATA, then overtime timer T is setWFACK=2 × τmax+TACK, wherein, TACKFor ACK's Persistent period;
Step 12), nodes X wait destination node ACK, if having correctly received network control frame before the timeout, then forward to step Rapid 13);If check errors, forward step 12 to);If time-out, keep out of the way number of times and add 1, forward step 1 to);
Step 13), nodes X judge the network control frame type that receives, if receiving network control frame is to nodes X ACK, then close overtime timer, forward step 14 to);If receiving destination node to issue the RTS of this node, then forward step to 5), after DATA reception terminates, the DATA that repeating transmission needs send is kept out of the way again;If node receives destination node and issues other nodes XRTS, xCTS, xDATA time, be immediately finished wait ACK enter QUIET state, intervalometer of mourning in silence be set, return again to step 1), until step 1) terminate after keep out of the way repeating transmission again;Otherwise forward step 12 to);
Step 14), nodes X judge the check bit in ACK, if verification is correct, then keeps out of the way number of times and reset, forward step 1 to);No Then keep out of the way number of times and add 1, forward step 1 to).
CN201310340872.8A 2013-08-07 2013-08-07 Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network Active CN104348562B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310340872.8A CN104348562B (en) 2013-08-07 2013-08-07 Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310340872.8A CN104348562B (en) 2013-08-07 2013-08-07 Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network

Publications (2)

Publication Number Publication Date
CN104348562A CN104348562A (en) 2015-02-11
CN104348562B true CN104348562B (en) 2016-09-28

Family

ID=52503474

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310340872.8A Active CN104348562B (en) 2013-08-07 2013-08-07 Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network

Country Status (1)

Country Link
CN (1) CN104348562B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106788782B (en) * 2016-12-06 2021-05-07 哈尔滨工程大学 Cross-layer communication method for OFDM link physical layer and MAC layer of underwater acoustic communication network

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5844905A (en) * 1996-07-09 1998-12-01 International Business Machines Corporation Extensions to distributed MAC protocols with collision avoidance using RTS/CTS exchange
CN101567707A (en) * 2008-04-24 2009-10-28 赵力 Medium access control method based on CDMA underwater acoustic network
CN101729566A (en) * 2009-11-27 2010-06-09 中国科学院声学研究所 Underwater sound network multiple access method based on CSMA/CA
US7920536B1 (en) * 2006-10-20 2011-04-05 Marvell International Ltd. More robust data transfer through detection of hidden nodes
CN102098113A (en) * 2011-02-25 2011-06-15 东南大学 Method for realizing water sound sensor network MAC (Media Access Control) protocol based on ALOHA and TDMA (Time Division Multiple Access)
CN102546323A (en) * 2010-12-14 2012-07-04 中国科学院声学研究所 Peer-to-peer network based on underwater sound and radio mixed channel
CN102612077A (en) * 2012-03-19 2012-07-25 东南大学 Medium access control method used for distributed multi-skip underwater acoustic communication network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7885287B2 (en) * 2005-03-29 2011-02-08 Intel Corporation Method and apparatus for adaptive network allocation

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5844905A (en) * 1996-07-09 1998-12-01 International Business Machines Corporation Extensions to distributed MAC protocols with collision avoidance using RTS/CTS exchange
US7920536B1 (en) * 2006-10-20 2011-04-05 Marvell International Ltd. More robust data transfer through detection of hidden nodes
CN101567707A (en) * 2008-04-24 2009-10-28 赵力 Medium access control method based on CDMA underwater acoustic network
CN101729566A (en) * 2009-11-27 2010-06-09 中国科学院声学研究所 Underwater sound network multiple access method based on CSMA/CA
CN102546323A (en) * 2010-12-14 2012-07-04 中国科学院声学研究所 Peer-to-peer network based on underwater sound and radio mixed channel
CN102098113A (en) * 2011-02-25 2011-06-15 东南大学 Method for realizing water sound sensor network MAC (Media Access Control) protocol based on ALOHA and TDMA (Time Division Multiple Access)
CN102612077A (en) * 2012-03-19 2012-07-25 东南大学 Medium access control method used for distributed multi-skip underwater acoustic communication network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Aloha-LPD:一种用于水声通信网的MAC协议;王毅等;《东南大学学报(自然科学版)》;20090120;第39卷(第01期);第12-17页 *
多帧确认及虚拟载波侦听的水声MACAW协议;周倩等;《探测与控制学报》;20090426;第31卷(第02期);第28-32页 *

Also Published As

Publication number Publication date
CN104348562A (en) 2015-02-11

Similar Documents

Publication Publication Date Title
Zhai et al. Performance analysis of IEEE 802.11 MAC protocols in wireless LANs
Lin et al. Asynchronous multimedia multihop wireless networks
Kliazovich et al. Cross-layer congestion control in ad hoc wireless networks
Woo et al. A transmission control scheme for media access in sensor networks
Pu et al. Comparing underwater MAC protocols in real sea experiments
CN104349495B (en) A kind of underwater acoustic network multiple access method based on MACA U agreements
Zhuo et al. Delay and queue aware adaptive scheduling-based MAC protocol for underwater acoustic sensor networks
CN105245358B (en) Intelligent grid MAC layer multi-service method for analyzing performance based on Markov model
CN103929284B (en) High-reliability transmission method for wireless sensor network
Peng et al. COPE-MAC: A contention-based medium access control protocol with parallel reservation for underwater acoustic networks
CN103312697B (en) Based on the underwater sensor network MAC protocol implementation method of space-time justice
Shahabudeen et al. Analysis of a high-performance MAC protocol for underwater acoustic networks
CN102932919B (en) The resource allocation method and device of uplink sounding reference signal
Gabale et al. Lit mac: Addressing the challenges of effective voice communication in a low cost, low power wireless mesh network
Tardioli et al. A wireless multi-hop protocol for real-time applications
CN102098113A (en) Method for realizing water sound sensor network MAC (Media Access Control) protocol based on ALOHA and TDMA (Time Division Multiple Access)
CN104348560B (en) The node based on UW CSMA/CA is mourned in silence method in underwater acoustic network communication
CN104348562B (en) Multiple access method based on UW-CSMA/CA in the communication of a kind of underwater acoustic network
Ding et al. Research on the multi-channel probability detection CSMA protocol with sensor monitoring function
CN101729566B (en) Underwater sound network multiple access method based on CSMA/CA
CN102195763B (en) Method for realizing MAC (Media Access Control) protocol under long delay condition of underwater sound sensor network
Yasmeen et al. Ferry access points and sticky transfers: Improving communication in ferry-assisted DTNs
Hu et al. Efficient modeling and performance analysis for IEEE 802.15. 4 with coloured petri nets
CN110139367A (en) A kind of communication processing method and relevant device of non-scheduling resource
Gao et al. A feedback approach for QoS-enhanced MAC in wireless sensor network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant