2015
DOI: 10.1109/cc.2015.7084363
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical code assignment algorithm and state-based CDMA protocol for UWSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…Since T is fixed, in formula (7), it is assumed that when T work is constant, the sleep time can be prolonged by reducing the idle time of nodes, thus reducing energy consumption.…”
Section: Network Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Since T is fixed, in formula (7), it is assumed that when T work is constant, the sleep time can be prolonged by reducing the idle time of nodes, thus reducing energy consumption.…”
Section: Network Modelmentioning
confidence: 99%
“…The underwater sensor nodes use acoustic channels as the communication medium with a speed of 1500 m/s, which is five orders of magnitude lower than that of radio signals; thus, the MAC protocols designed for terrestrial sensor networks are not suitable for UWSNs. The underwater acoustic channel has the characteristics of long propagation delay, high bit error rate, and low bandwidth [7][8][9]. Moreover, in addition to high delay and low bandwidth, energy consumption is another major problem.…”
Section: Introductionmentioning
confidence: 99%
“…For example, Zhou et al dealt with the design and performance evaluation of random access scheme in UWSN [17] and focused on tradeoffs arisen in clustered topology and proposed a protocol which is partly deterministic and partly random in [18]. Du et al presented CDMA based MAC protocols for UWSN [19]. CDMA system requires additional hardware, and the narrow available frequency range in underwater acoustic channels has a negative impact on the application of CDMA based MAC protocols.…”
Section: Mac Protocol For Uwsnmentioning
confidence: 99%
“…(1) INPUT: data block (2) OUTPUT: encoded packets delivery (3) Upon receiving a data block of size do (4) encodes packets to generate encoded packets; (5) set the frame sequence number of the first encoded packet to ; (6) // used to notice the overhearing nodes that the sender will transmit − 1 frames subsequently (7) set the frame sequence number of the second packet to − 1, and so on till last to "1"; (8) // also used to notice the overhearing nodes the frame number transmitted subsequently (9) set the "immediate ACK" field of the first frame as well as the last to "1", others to "0"; (10) find the next hop (receiver) in routing table; (11) while (the state of the receiver ≤1) then (12) put off delivery; (13) endwhile (14) if (the state of the receiver >1) & (backoff timer is timeout) then (15) switch to sending state and transmit the first frame; // start one transmission stage (16) switch to receiving state; // waiting for the ACK (17) if (receive the ACK for the first frame with "0" in the index field) then (18) switch to sending state and send the other frames subsequently; (19) set backoff time = ; (20) switch to receiving state; // waiting for ACK for the block (21) // the first transmission stage for the block is over. (22) if (receive the ACK for the block) then (23)…”
mentioning
confidence: 99%
“…In this Protocol, communication among the nodes is fixed and its control packets has been shared. Multiple Accesses with collision avoidance is incorporated along the protocol [6]. Specifically all nodes utilizes the allocated time slots with time to achieve collision elimination for communication which minimizes the channel utilization and increase the throughput of network greatly.…”
Section: Introductionmentioning
confidence: 99%