SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
UNIVERSITA' DEGLI STUDI DI PADOVA

    CORSO DI RETI WIRELESS
        A.A. 2011 - 2012




UNDERWATER SENSORS
     NETWORKS



        Alessandro Gonella
Reasons
●   Ocean sampling networks
●   Environmental monitoring
●   Undersea exploration
●   Disaster prevention
●   Assisted navigation
●   Distributed tactical surveillance
●   Mine reconnaissance


                                        2/25
MAJOR CHALLENGES

●   Radio waves are extremely strongly attenuated
    in salt water → use acoustic
    ●   The speed of sound underwater is approximately
        2e5 times lower than the speed of light
    ●   Severely limited bandwidth
●   The channel is severely impaired (multipath and
    fading)
●   High propagation delay, extremely variable

                                                         3/25
MAJOR CHALLENGES (2)
●   High bit error rates and temporary losses of
    connectivity (shadow zones)
●   Battery power is limited
●   Underwater sensors are prone to failures
    because of fouling and corrosion




                                                   4/25
Differences with terrestrial sensor
                networks
●   Cost
●   Deployment
●   More power requested
●   Memory for data caching
●   More spatial correlation
●   Channel highly temporally and spatially
    variable. The horizontal channel is by far more
    rapidly varying than the vertical channel

                                                      5/25
Factors that influence acoustic
               communications
●   Transmission loss:
    ●   Attenuation: absorption due to conversion of
        acoustic energy into heat
    ●   Spreading of sound energy as a result of the
        expansion of the wavefronts
●   Noise: Man made or ambient
●   Multi-path propagation generates intersymbol
    interference
●   The very high delay variance prevents from accurately
    estimating the round trip time (RTT)
                                                       6/25
TOPOLOGY
The network topology is in general a crucial factor
●   Energy consumption
●   Capacity
●   Reliability

●   3 basic communication architectures



                                                  7/25
2 dimensional UWSN




                     8/25
3 dimensional UWSN




                     9/25
UWSN with autonomous underwater
            vehicles




                             10/25
MAC layer
●   Frequency division multiple access (FDMA):
    ●   narrow bandwidth in UW-A channels and the
        vulnerability of limited band systems to fading and
        multipath
●   Time division multiple access (TDMA):
    ●   long time guards required
    ●   syncronization
●   Carrier sense multiple access (CSMA):
    ●   prevents collisions with the ongoing transmission at
        the transmitter side
    ●   need a guard time between transmissions
                                                              11/25
MAC layer (2)
Code division multiple access (CDMA):
●   it is able to distinguish among signals
    simultaneously transmitted by multiple devices
    through codes that spread the user signal over
    the entire available band
●   allows reducing the number of packet
    retransmissions
●   DSSS leads to less error rate than FHSS [4]


                                                  12/25
Open research issues
• In case CDMA is adopted, it is necessary to
design access codes with high auto-correlation
and low cross-correlation properties to achieve
minimum interference among users
• Research on optimal data packet length is
needed to maximize the network efficiency
• Distributed protocols should be devised to
reduce the activity of a device when its battery is
depleting without compromising on network
availability
                                                      13/25
Routing protocols
Some characteristics, such as the extremely long
propagation delays, are better addressed at the
network layer
Routing protocols divided in 3 categories:
• Proactive protocols: attempt to minimize the
message latency induced by route discovery, by
maintaining up-to-date routing information →
Overhead



                                                 14/25
Routing protocols (2)
●   Reactive protocols: A node initiates a route
    discovery process only when a route to a
    destination is required
    ●  high latency in the establishment of paths
     ● UW-ASNs is unlikely to vary dynamically on a

       short-time scale
●   Geographical routing protocols: establish
    source–destination paths by leveraging
    localization information
    ●   How to determine position?
                                                   15/25
Some proposed protocols
●   Vector-Based Forwarding Protocol for Underwater
    Sensor Networks [5]:
    ●   The forwarding path is specified by the the routing
        vector, a vector that connects source and
        destination
    ●   Each packet carries the positions of the sender, the
        destination and the forwarder
    ●   Upon receiving a packet, a node computes its
        position relative to the forwarder by measuring its
        distance to the forwarder and the angle of arrival of
        the signal

                                                           16/25
Some proposed protocols (2)

●   Recursively, every node calculates its position
●   If a node determines that it is close enough to the
    routing vector it includes its own position in the
    packet and forwards it
●   Otherwise, it discards the packet
●   Redundant and interleaved paths from source to
    destination
●   Energy and bandwidth waste


                                                          17/25
Some proposed protocols (3)
●   A Resilient Routing Algorithm for Long-term
    applications in Underwater Sensor Networks [6]
●   Virtual circuit: multihop connections established a
    priori
●   Each packet associated with a particular connection
    follows the same path
●   Centralized coordination → less flexible architecture
●   Aim to achieve optimal performance at the network
    layer with minimum signaling overhead


                                                           18/25
Some proposed protocols (4)
●   Two-phase approach
    ●   The network manager determines optimal primary and
        backup multihop data paths such that the energy
        consumption of the nodes is minimized
    ●   An on-line distributed solution guarantees survivability
        of the network, by locally repairing paths in case of
        disconnections or failures, or by switching the data
        traffic on the backup paths in case of severe failures




                                                               19/25
Open research issues
●   Need to develop algorithms to provide strict or loose latency
    bounds for time critical applications
●   Need to develop mechanisms to handle loss of connectivity
    without provoking immediate retransmissions
●   Devise routing algorithms that are robust with respect to the
    intermittent connectivity of acoustic channels
●   Accurate modeling is needed to better understand the
    dynamics of data transmission at the network layer. Moreover,
    credible simulation models and tools need to be developed
●   Algorithms and protocols need to be developed that detect and
    deal with disconnections due to failures, unforeseen mobility of
    nodes or battery

                                                                    20/25
Transport layer
●   Achieve reliable collective transport of event features and
    perform flow control and congestion control
●   High (and high variable) RTT:
    ●   affect the throughput of most TCP implementations
    ●   make it hard to effectively set the timeout of the
        window-based mechanism that most current TCP
        implementations adopt
●   Rate-based transport protocols are promising but they rely
    on feedback control messages sent back by the
    destination to dynamically adapt the transmission rate
●   It is important to discriminate losses due to impairments of
    the channel from those caused by congestion
                                                              21/25
Design principles
●   The transport layer should handle shadow zones
●   Minimize energy consumption
●   Rate-based transmission of packets
●   Intermediate nodes should be capable of determining
    and reacting immediately to local congestion
●   Losses should trigger the protocol to take appropriate
    actions, supported by the information from lower
    layers
●   There should be mechanism to guarantee the end-to-
    end reliability

                                                         22/25
Segmented Data Reliable Transport
          (SDRT) [7]
●   Uses error correction codes to recover errored packets
    to reduce retransmissions
●   Transmits the packets within the window quickly, and
    the remaining packets at a lower rate
●   Encoding and decoding codes are computation-
    intensive operations
●   No mechanism to guarantee the end-to-end reliability
    (hop-by-hop)
●   The total computation overhead will be too high for the
    network
                                                         23/25
Open research issues
●   New flow control strategies to tackle the high delays of
    the control messages
●   New effective mechanisms for efficiently infer the
    cause of packet losses
●   The effects of multiple concurrent events on the
    reliability and network performance requirements must
    be studied
●   It is necessary to devise solutions to handle the effects
    of losses of connectivity caused by shadow zones



                                                          24/25
Bibliography
●   [1] - A Survey of Practical Issues in Underwater Networks - Jim Partan, Jim
    Kurose, and Brian Neil Levine
●   [2] - Underwater Acoustic Networks - Ethem M. Sozer, Milica Stojanovic, and
    John G. Proakis
●   [3] - State-of-the-Art in Protocol Research for Underwater Acoustic Sensor
    Networks - Ian F. Akyildiz, Dario Pompili, and Tommaso Melodia
●   [4] - Analysis of Channel Effects on Direct-Sequence and Frequency-
    Hopped Spread-Spectrum Acoustic Communication - Lee Freitag, Milica
    Stojanovic, Sandipa Singh, and Mark Johnson
●   [5] - VBF: Vector-Based Forwarding Protocol for Underwater Sensor
    Network - P. Xie, J.-H. Cui, and L. Lao
●   [6] - A Resilient Routing Algorithm for Long-term applications in Underwater
    Sensor Networks - Pompili, Melodia, I. F. Akyildiz
●   [7] - SDRT: A Reliable Data Transport Protocol for Underwater Sensor
    Networks - P. Xie and J.-H. Cui
                                                                              25/25

Mais conteúdo relacionado

Mais procurados

Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkSrija Kumar
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless CommunicationShubham Srivastava
 
Cross layer design and optimization
Cross layer design and optimizationCross layer design and optimization
Cross layer design and optimizationDANISHAMIN950
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)tanveer alam
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communicationDheeresh Kumar
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONjaisica
 
Frequently asken interview questions about radars and their answers
Frequently asken interview questions about radars and their answersFrequently asken interview questions about radars and their answers
Frequently asken interview questions about radars and their answersbetyouknow
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issuesMenaga Selvaraj
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Unit 3 introduction to cognitive radios
Unit 3   introduction to cognitive radiosUnit 3   introduction to cognitive radios
Unit 3 introduction to cognitive radiosJAIGANESH SEKAR
 
Underwater wireless communication
Underwater wireless communication Underwater wireless communication
Underwater wireless communication AndeAkash
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networksAmeer Sameer
 
Satellite communication
Satellite communicationSatellite communication
Satellite communicationMannu Khani
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 

Mais procurados (20)

Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Cross layer design and optimization
Cross layer design and optimizationCross layer design and optimization
Cross layer design and optimization
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Cognitive Radio
Cognitive RadioCognitive Radio
Cognitive Radio
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)wireless Communication Underwater(Ocean)
wireless Communication Underwater(Ocean)
 
under water wireless communication
under water wireless communicationunder water wireless communication
under water wireless communication
 
UNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATIONUNDER WATER ACOUSTIC COMMUNICATION
UNDER WATER ACOUSTIC COMMUNICATION
 
Frequently asken interview questions about radars and their answers
Frequently asken interview questions about radars and their answersFrequently asken interview questions about radars and their answers
Frequently asken interview questions about radars and their answers
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Unit 3 introduction to cognitive radios
Unit 3   introduction to cognitive radiosUnit 3   introduction to cognitive radios
Unit 3 introduction to cognitive radios
 
Underwater wireless communication
Underwater wireless communication Underwater wireless communication
Underwater wireless communication
 
Cognitive radio networks
Cognitive radio networksCognitive radio networks
Cognitive radio networks
 
Satellite communication
Satellite communicationSatellite communication
Satellite communication
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 

Destaque

Talend Open Studio for Data Integration
Talend Open Studio for Data IntegrationTalend Open Studio for Data Integration
Talend Open Studio for Data IntegrationAlessandro Gonella
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KNisha Menon K
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt asharanick
 
Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)Ahmed ElSheikh
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless CommunicationDipaloke Arunodoy
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsnAkshay Paswan
 
Autonomous Unmanned Vehicles
Autonomous Unmanned VehiclesAutonomous Unmanned Vehicles
Autonomous Unmanned VehiclesAnirudh Kannan
 
Iver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis DefenseIver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis Defenseelev0083
 
Autonomous underwater vehicles
Autonomous underwater vehiclesAutonomous underwater vehicles
Autonomous underwater vehiclesRAKESH MC
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Curing dataheadachesv2 with sugarcrm levementum and talend
Curing dataheadachesv2 with sugarcrm levementum and talendCuring dataheadachesv2 with sugarcrm levementum and talend
Curing dataheadachesv2 with sugarcrm levementum and talendGeoffrey Mobisson
 
Content aware packet scheduling in peer-to-peer video streaming
Content aware packet scheduling in peer-to-peer video streamingContent aware packet scheduling in peer-to-peer video streaming
Content aware packet scheduling in peer-to-peer video streamingVideoguy
 

Destaque (15)

Talend Open Studio for Data Integration
Talend Open Studio for Data IntegrationTalend Open Studio for Data Integration
Talend Open Studio for Data Integration
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
Under water communication ppt
Under water communication ppt Under water communication ppt
Under water communication ppt
 
Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)Autonomous Underwater Vehicle (AUVs)
Autonomous Underwater Vehicle (AUVs)
 
Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)Autonomous Underwater Vehicle (AUV)
Autonomous Underwater Vehicle (AUV)
 
Cellular network
Cellular networkCellular network
Cellular network
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Securing Underwater Wireless Communication
Securing Underwater Wireless CommunicationSecuring Underwater Wireless Communication
Securing Underwater Wireless Communication
 
Localization scheme for underwater wsn
Localization scheme for underwater wsnLocalization scheme for underwater wsn
Localization scheme for underwater wsn
 
Autonomous Unmanned Vehicles
Autonomous Unmanned VehiclesAutonomous Unmanned Vehicles
Autonomous Unmanned Vehicles
 
Iver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis DefenseIver2 AUV Control Design Thesis Defense
Iver2 AUV Control Design Thesis Defense
 
Autonomous underwater vehicles
Autonomous underwater vehiclesAutonomous underwater vehicles
Autonomous underwater vehicles
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Curing dataheadachesv2 with sugarcrm levementum and talend
Curing dataheadachesv2 with sugarcrm levementum and talendCuring dataheadachesv2 with sugarcrm levementum and talend
Curing dataheadachesv2 with sugarcrm levementum and talend
 
Content aware packet scheduling in peer-to-peer video streaming
Content aware packet scheduling in peer-to-peer video streamingContent aware packet scheduling in peer-to-peer video streaming
Content aware packet scheduling in peer-to-peer video streaming
 

Semelhante a UNDERWATER SENSORS NETWORKS

Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptxMunazza63
 
Wireless Communication fundamentals and 4G Technology
Wireless Communication fundamentals and 4G TechnologyWireless Communication fundamentals and 4G Technology
Wireless Communication fundamentals and 4G TechnologyKiranShanbhag9
 
OPTICAL FIBER COMMUNICATION
OPTICAL FIBER COMMUNICATIONOPTICAL FIBER COMMUNICATION
OPTICAL FIBER COMMUNICATIONubhatia7
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkDiksha Katiyar
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
 
Lecture9 packet access
Lecture9 packet accessLecture9 packet access
Lecture9 packet accessAzzam Ayoub
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkIJCNCJournal
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksIJCNCJournal
 
Maria D'cruz_WCDMA UMTS Wireless Networks
Maria D'cruz_WCDMA UMTS Wireless NetworksMaria D'cruz_WCDMA UMTS Wireless Networks
Maria D'cruz_WCDMA UMTS Wireless NetworksMaria D'cruz
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfABYTHOMAS46
 
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONSPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONIRJET Journal
 

Semelhante a UNDERWATER SENSORS NETWORKS (20)

Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
Ad-hoc.pdf
Ad-hoc.pdfAd-hoc.pdf
Ad-hoc.pdf
 
Wireless Communication fundamentals and 4G Technology
Wireless Communication fundamentals and 4G TechnologyWireless Communication fundamentals and 4G Technology
Wireless Communication fundamentals and 4G Technology
 
OPTICAL FIBER COMMUNICATION
OPTICAL FIBER COMMUNICATIONOPTICAL FIBER COMMUNICATION
OPTICAL FIBER COMMUNICATION
 
5G Enabled Vehicular Networks
5G Enabled Vehicular Networks5G Enabled Vehicular Networks
5G Enabled Vehicular Networks
 
Smart grid communications and measurement technology
Smart grid communications and measurement technologySmart grid communications and measurement technology
Smart grid communications and measurement technology
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc network
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
Lecture9 packet access
Lecture9 packet accessLecture9 packet access
Lecture9 packet access
 
Final prentation M.TECH ( PPT )
Final prentation  M.TECH ( PPT )Final prentation  M.TECH ( PPT )
Final prentation M.TECH ( PPT )
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor NetworkVHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network
 
Priority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networksPriority based bandwidth allocation in wireless sensor networks
Priority based bandwidth allocation in wireless sensor networks
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
Maria D'cruz_WCDMA UMTS Wireless Networks
Maria D'cruz_WCDMA UMTS Wireless NetworksMaria D'cruz_WCDMA UMTS Wireless Networks
Maria D'cruz_WCDMA UMTS Wireless Networks
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
SPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATIONSPECTRUM SHARING FOR 6G COMMUNICATION
SPECTRUM SHARING FOR 6G COMMUNICATION
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

UNDERWATER SENSORS NETWORKS

  • 1. UNIVERSITA' DEGLI STUDI DI PADOVA CORSO DI RETI WIRELESS A.A. 2011 - 2012 UNDERWATER SENSORS NETWORKS Alessandro Gonella
  • 2. Reasons ● Ocean sampling networks ● Environmental monitoring ● Undersea exploration ● Disaster prevention ● Assisted navigation ● Distributed tactical surveillance ● Mine reconnaissance 2/25
  • 3. MAJOR CHALLENGES ● Radio waves are extremely strongly attenuated in salt water → use acoustic ● The speed of sound underwater is approximately 2e5 times lower than the speed of light ● Severely limited bandwidth ● The channel is severely impaired (multipath and fading) ● High propagation delay, extremely variable 3/25
  • 4. MAJOR CHALLENGES (2) ● High bit error rates and temporary losses of connectivity (shadow zones) ● Battery power is limited ● Underwater sensors are prone to failures because of fouling and corrosion 4/25
  • 5. Differences with terrestrial sensor networks ● Cost ● Deployment ● More power requested ● Memory for data caching ● More spatial correlation ● Channel highly temporally and spatially variable. The horizontal channel is by far more rapidly varying than the vertical channel 5/25
  • 6. Factors that influence acoustic communications ● Transmission loss: ● Attenuation: absorption due to conversion of acoustic energy into heat ● Spreading of sound energy as a result of the expansion of the wavefronts ● Noise: Man made or ambient ● Multi-path propagation generates intersymbol interference ● The very high delay variance prevents from accurately estimating the round trip time (RTT) 6/25
  • 7. TOPOLOGY The network topology is in general a crucial factor ● Energy consumption ● Capacity ● Reliability ● 3 basic communication architectures 7/25
  • 10. UWSN with autonomous underwater vehicles 10/25
  • 11. MAC layer ● Frequency division multiple access (FDMA): ● narrow bandwidth in UW-A channels and the vulnerability of limited band systems to fading and multipath ● Time division multiple access (TDMA): ● long time guards required ● syncronization ● Carrier sense multiple access (CSMA): ● prevents collisions with the ongoing transmission at the transmitter side ● need a guard time between transmissions 11/25
  • 12. MAC layer (2) Code division multiple access (CDMA): ● it is able to distinguish among signals simultaneously transmitted by multiple devices through codes that spread the user signal over the entire available band ● allows reducing the number of packet retransmissions ● DSSS leads to less error rate than FHSS [4] 12/25
  • 13. Open research issues • In case CDMA is adopted, it is necessary to design access codes with high auto-correlation and low cross-correlation properties to achieve minimum interference among users • Research on optimal data packet length is needed to maximize the network efficiency • Distributed protocols should be devised to reduce the activity of a device when its battery is depleting without compromising on network availability 13/25
  • 14. Routing protocols Some characteristics, such as the extremely long propagation delays, are better addressed at the network layer Routing protocols divided in 3 categories: • Proactive protocols: attempt to minimize the message latency induced by route discovery, by maintaining up-to-date routing information → Overhead 14/25
  • 15. Routing protocols (2) ● Reactive protocols: A node initiates a route discovery process only when a route to a destination is required ● high latency in the establishment of paths ● UW-ASNs is unlikely to vary dynamically on a short-time scale ● Geographical routing protocols: establish source–destination paths by leveraging localization information ● How to determine position? 15/25
  • 16. Some proposed protocols ● Vector-Based Forwarding Protocol for Underwater Sensor Networks [5]: ● The forwarding path is specified by the the routing vector, a vector that connects source and destination ● Each packet carries the positions of the sender, the destination and the forwarder ● Upon receiving a packet, a node computes its position relative to the forwarder by measuring its distance to the forwarder and the angle of arrival of the signal 16/25
  • 17. Some proposed protocols (2) ● Recursively, every node calculates its position ● If a node determines that it is close enough to the routing vector it includes its own position in the packet and forwards it ● Otherwise, it discards the packet ● Redundant and interleaved paths from source to destination ● Energy and bandwidth waste 17/25
  • 18. Some proposed protocols (3) ● A Resilient Routing Algorithm for Long-term applications in Underwater Sensor Networks [6] ● Virtual circuit: multihop connections established a priori ● Each packet associated with a particular connection follows the same path ● Centralized coordination → less flexible architecture ● Aim to achieve optimal performance at the network layer with minimum signaling overhead 18/25
  • 19. Some proposed protocols (4) ● Two-phase approach ● The network manager determines optimal primary and backup multihop data paths such that the energy consumption of the nodes is minimized ● An on-line distributed solution guarantees survivability of the network, by locally repairing paths in case of disconnections or failures, or by switching the data traffic on the backup paths in case of severe failures 19/25
  • 20. Open research issues ● Need to develop algorithms to provide strict or loose latency bounds for time critical applications ● Need to develop mechanisms to handle loss of connectivity without provoking immediate retransmissions ● Devise routing algorithms that are robust with respect to the intermittent connectivity of acoustic channels ● Accurate modeling is needed to better understand the dynamics of data transmission at the network layer. Moreover, credible simulation models and tools need to be developed ● Algorithms and protocols need to be developed that detect and deal with disconnections due to failures, unforeseen mobility of nodes or battery 20/25
  • 21. Transport layer ● Achieve reliable collective transport of event features and perform flow control and congestion control ● High (and high variable) RTT: ● affect the throughput of most TCP implementations ● make it hard to effectively set the timeout of the window-based mechanism that most current TCP implementations adopt ● Rate-based transport protocols are promising but they rely on feedback control messages sent back by the destination to dynamically adapt the transmission rate ● It is important to discriminate losses due to impairments of the channel from those caused by congestion 21/25
  • 22. Design principles ● The transport layer should handle shadow zones ● Minimize energy consumption ● Rate-based transmission of packets ● Intermediate nodes should be capable of determining and reacting immediately to local congestion ● Losses should trigger the protocol to take appropriate actions, supported by the information from lower layers ● There should be mechanism to guarantee the end-to- end reliability 22/25
  • 23. Segmented Data Reliable Transport (SDRT) [7] ● Uses error correction codes to recover errored packets to reduce retransmissions ● Transmits the packets within the window quickly, and the remaining packets at a lower rate ● Encoding and decoding codes are computation- intensive operations ● No mechanism to guarantee the end-to-end reliability (hop-by-hop) ● The total computation overhead will be too high for the network 23/25
  • 24. Open research issues ● New flow control strategies to tackle the high delays of the control messages ● New effective mechanisms for efficiently infer the cause of packet losses ● The effects of multiple concurrent events on the reliability and network performance requirements must be studied ● It is necessary to devise solutions to handle the effects of losses of connectivity caused by shadow zones 24/25
  • 25. Bibliography ● [1] - A Survey of Practical Issues in Underwater Networks - Jim Partan, Jim Kurose, and Brian Neil Levine ● [2] - Underwater Acoustic Networks - Ethem M. Sozer, Milica Stojanovic, and John G. Proakis ● [3] - State-of-the-Art in Protocol Research for Underwater Acoustic Sensor Networks - Ian F. Akyildiz, Dario Pompili, and Tommaso Melodia ● [4] - Analysis of Channel Effects on Direct-Sequence and Frequency- Hopped Spread-Spectrum Acoustic Communication - Lee Freitag, Milica Stojanovic, Sandipa Singh, and Mark Johnson ● [5] - VBF: Vector-Based Forwarding Protocol for Underwater Sensor Network - P. Xie, J.-H. Cui, and L. Lao ● [6] - A Resilient Routing Algorithm for Long-term applications in Underwater Sensor Networks - Pompili, Melodia, I. F. Akyildiz ● [7] - SDRT: A Reliable Data Transport Protocol for Underwater Sensor Networks - P. Xie and J.-H. Cui 25/25