
A node discovery protocol for ad hoc underwater acoustic networks
Author(s) -
Patil Ashish,
Stojanovic Milica
Publication year - 2013
Publication title -
wireless communications and mobile computing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.42
H-Index - 64
eISSN - 1530-8677
pISSN - 1530-8669
DOI - 10.1002/wcm.2206
Subject(s) - computer science , fading , wireless ad hoc network , computer network , node (physics) , initialization , scheduling (production processes) , protocol (science) , reliability (semiconductor) , mobile ad hoc network , wireless , real time computing , distributed computing , power (physics) , telecommunications , medicine , alternative medicine , physics , pathology , channel (broadcasting) , operations management , structural engineering , quantum mechanics , engineering , economics , programming language
Motivated by the advances in acoustic modem technology and the growing number of applications that call for ad hoc deployable autonomous underwater systems (floating sensors, crawlers, vehicles), we address the problem of network initialization upon deployment. A neighbor discovery protocol is proposed, whose goal is to establish communication links over a large area, with a finite power budget that mandates multi‐hopping to provide full coverage. The protocol uses random access to eliminate the need for scheduling (i.e., enable system operation without a global clock reference) and power control to ensure that full connectivity is provided using shortest links (i.e., to conserve batteries and prolong the system's lifetime). Transmit power allocation takes into account the acoustic propagation loss, while additional large‐scale variation in the average received power is modeled via log‐normal fading which is confirmed by experimental observations. System performance is assessed through simulation, by measuring the energy consumption, time to completion, and reliability in the presence of fading. Fading is shown to have a degrading effect on the system reliability, and protocol adjustments are proposed to recover the performance under the constraint on maximum power. The key features of the protocol are simplicity of implementation and efficient use of power.Copyright © 2012 John Wiley & Sons, Ltd.