SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Invention Journal of Research Technology in Engineering & Management (IJRTEM)
ISSN: 2455-3689
www.ijrtem.com Volume 2 Issue 5 ǁ May 2018 ǁ PP 66-73
|Volume 2| Issue 5 | www.ijrtem.com | 66 |
Clustering based Time Slot Assignment Protocol for Improving
Performance in Underwater Acoustic Networks
Muzaffar Ergashev1
and Sunmyeng Kim2
1,2,
Department of Software engineering, Kumoh National Institute of Technology,
Gumi 730-701, South Korea
ABSTRACT : Recently, numerous approaches have been proposed for designing medium access control (MAC)
in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for
terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be
used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC
protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for
exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional
energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above
shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are
clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head
obtains its own relative position information. Finally, the cluster head assigns its own time slot for data
transmission based on the information. Simulation results show that the proposed protocol has always better
performance compared to the COD-TS.
KEYWORDS: clustering, MAC, time slot, underwater acoustic networks
I. INTRODUCTION
Underwater acoustic networks (UAN) has become a popular topic among both academic and industrial
researchers. Because UANs are the very effective system for exploring and observing under oceans. UAN is the
system which consists of sensor nodes, autonomous underwater vehicles (AUV) and floating buoys which utilizes
acoustic waveforms for communication among each other and all together do the special task. Main utilization
purposes of UANs are ocean sampling, environmental monitoring, undersea explorations, disaster prevention,
assisted navigation, distributed tactical surveillance, mine reconnaissance [1]. In early times numerous proposal of
designing MAC for UANs had been done by researchers which are based on contention or handshaking algorithms.
The propagation speed of acoustic (1500 m/s in water) wave is very slow comparing to the propagation speed of the
electromagnetic wave (3 x 10^8 m/s), long preamble (1.5 seconds) and low transmission speed (667 bps) [2]
degrades the efficiency of above mentioned protocols. Low propagation speed, the long preamble, and low
transmission speed cause the high probability of simultaneous transmission of frames from different nodes in
random access and handshaking protocols. In turn, it brings low throughput and low energy efficiency in
communication. So, directly implementation or adjusting of existing MAC protocols of terrestrial networks for
UANs will not give an effective result.
Fig. 1. An example of COD-TS with the given topology.
Clustering based Time Slot Assignment Protocol…
|Volume 2| Issue 5 | www.ijrtem.com | 67 |
Several MAC protocols have been proposed for UANs and some of them are given here. In [3], communication
protocol proposed for underwater vehicles. Authors proposed closed loop distributed algorithm for setting optimal
transmit power and code length in CDMA [4]. Protocol proposed in [5], uses RTS/CTS packets to reserve channel,
but there is still collision between data-control packets. The work in [6], uses the selection of packet size for
communication in multi hop networks. In [7], improved CSMA (Distance Aware CSMA) protocol is proposed. In
[8], multiband modems are used and if noise is detected in currently utilizing band, modem switches to another
frequency band. Protocol designed for centralized networks in [9]. Nodes are mapped to the network schedule on
its local clock according to the relative propagation delay. Those protocols mentioned above still have
shortcomings and cannot provide high performance for large size and dense network.
To improve the performance of UANs COD-TS has been proposed in [2]. COD-TS uses algorithms presented in
[10, 11] for synchronizing nodes. And organizes nodes into clusters using algorithm proposed in [12]. A cluster
consists of a cluster head node and one-hop neighbor nodes of the cluster head. Each cluster head schedules
data/control packet transmissions for the duration of time which is called communication round. Communication
round is limited with D max and would be between two successive schedule updates of the cluster head. In Fig. 1,
for example, the period between time t1 and t3 is one communication round of cluster head H1’s cluster. In Fig. 1
each cluster has cluster heads H1 and H2, and member nodes M1 and M2, and M3 and M4, respectively. In the
communication round which ends at t1, the cluster head H1 receives the request packets from member nodes M1
and M2. At time t1, the cluster head H1 makes a new schedule considering the request packets and sends it in the
schedule and notification packets. The member nodes transmit data/request packets at its own time slots. The
cluster head H2 receives the schedule packet from the cluster head H1 at time t2, it makes a new schedule based on
the schedule packet and request packets from its member nodes. In COD-TS schedule packets are transmitted at
high power and it causes to increase the interference and collision probability at between transmissions of
neighboring nodes/clusters. Also, additional energy is consumed for transmissions of schedule packets which
accelerates depletion of battery energy. Power control algorithm is not provided to overcome near-far effect in
CDMA.
To overcome above shortcomings, we propose Clustering based Time Slot Assignment Protocol – CTSA protocol.
In the proposed protocol, sensor nodes are organized into clusters, and each cluster head performs two-hop
neighbor cluster discovery operation. So, each cluster head knows its two-hop neighbor clusters ids. And then,
using two-hop neighbor clusters ids a cluster head obtains its own relative position information according to its
relative position. Finally, the cluster head assigns its own time slot for data transmission based on its own relative
position information. All clusters own their slot time and the cluster head schedules data/control packet
transmissions of cluster members. In this way, collisions of transmission of neighboring nodes in the same cluster
and neighboring clusters are prevented, and it is done without exchanging schedule information. This paper is
organized as follows: In Section 2, we explain the proposed protocol in detail; In Section 3, we analyze network
performance of the proposed protocol through the simulation and compare with COD-TS protocol; Finally, Section
4 concludes the paper.
Fig. 2. An example topology of UANs.
II. PROPOSED CTSA PROTOCOL
We assume the network is static or could be seen as a static for relatively long enough duration. The network
consists of a sink node and sensor nodes which is shown as an example topology in Fig. 2. We have to mention that
CTSA protocol can work for the network with randomly located nodes. Also, we assume that network is well
synchronized which is obtainable utilizing algorithms in [10, 11]. Time is divided into cluster times and each
cluster time consists 4 intra cluster time as shown in Fig. 6. Using our algorithm, a cluster head obtains an intra
Clustering based Time Slot Assignment Protocol…
|Volume 2| Issue 5 | www.ijrtem.com | 68 |
cluster time according to its relative position to its neighbor clusters. Our algorithm contains 3 phases:
initialization, obtaining relative position information, and obtaining intra cluster time. Initialization phase includes
clustering nodes after deployment and two hop neighbor discovery. In obtaining relative position information
phase, cluster heads are assigned parameters according to their relative position to their neighbor clusters. In
obtaining intra cluster time phase, each cluster head obtains a portion of time called intra cluster time for
data/control packet transmissions of the cluster members according to their relative position information.
Initialization phase: In the initialization phase, first, nodes are clustered. Each cluster consists of a cluster head
and member nodes
Fig. 3. Exchanging PNEIGHBORS packet.
which are one-hop neighbors of the cluster head. We use existing algorithm proposed in [12] for clustering.
Second, each cluster head performs two-hop neighbor cluster discovery operation. A cluster head owns a neighbor
clusters table. Table entries are the number of hops between neighbors and ids of neighbors. Each cluster head fills
its table by exchanging PNEIGHBORS packets as shown in Fig. 3. PNEIGHBORS packet contains source id, N-number of
one hop neighbor clusters and their ids. If a cluster head does not receive PNEIGHBORS packet during a fixed τmax time,
neighbor cluster discovery step will end. Neighbor discovery step is performed periodically at fixed ξmax time. An
example of neighbor discovery step is shown in Fig. 3 and Fig. 4. The Fig. 3 shows an example of PNEIGHBORS packet
exchange between cluster heads H1 and H2 via their members M1 and M4. PNEIGHBORS packet sent by cluster head
H1 travels through H1 → M1 → M4 → H2 to cluster head H2. And H2 cluster head also sends PNEIGHBORS packet
which goes through H2 → M4 → M1 → H1 to cluster head H1. An example of neighbor cluster discovery with
details of updating neighbor cluster table is given in Fig. 4. Cluster head H2 sends packet P1. Since its neighbor
cluster table is empty in step 0, the cluster head H2 includes only its id in source field PNEIGHBORS packet and sets the
number of neighbor clusters field of the packet to zero. After receiving packet P1 cluster heads H1 and H3 inserts
id of cluster head H2 to their table as one hop neighbor cluster as shown in step 1. Cluster head H1 sends packet P2,
Fig. 4. An example of neighbor cluster discovery.
Clustering based Time Slot Assignment Protocol…
|Volume 2| Issue 5 | www.ijrtem.com | 69 |
which includes its id and one hop neighbor cluster H2’s id. The cluster head H2 inserts cluster head H1’s id to its
table as one hop neighbor cluster as shown in step 1. Next, cluster head H3 sends packet P3 with self id and cluster
head H2’s id. Cluster head H2 inserts H3’s to its table as shown in step 1. Since cluster head H2 updated its table it
sends packet P4. Packet P4 includes H2’s self id and its one hop neighbor clusters’ ids H1 and H3. Cluster heads
H1 and H3 receive packet P4 and H1 inserts H3’s id as two hop neighbor cluster and H3 also inserts H1’s id as two
hop neighbor cluster to their respective tables as shown in step 2.
Obtaining relative position information: In this subsection, we explain obtaining relative position information
which are a number of hops and an index number (H, I). Fig. 2 shows that the sensor network includes a sink node
and sensor nodes. As shown in Fig. 5, sensor nodes are organized into clusters. CHn is the identification number of
the cluster. The sink node assigns the closest cluster head to itself as a super cluster head. In Fig. 5, super cluster
head’s identification number is CH00. H is the number of hop between each cluster and the super cluster and I is the
index number of clusters those own same hop number. The number of hops is the distance between cluster heads
and it is easy to obtain. The super cluster head randomly chooses a cluster head among its one hop neighbor clusters
Fig. 5. An example topology
(H, = 1). And assigns index number 0 (I = 0) to it. Starting from chosen cluster index numbers (I = 1, 2, 3, 4, …) are
assigned to neighbor clusters turn by turn. The cluster with the number of hops 1 and index number is 0 randomly
chooses one of the clusters among its neighbor clusters with the number of hops 2 and assigns index number 0 to it.
Clusters with same hop number are assigned index numbers turn by turn. The steps explained above are repeated
until all clusters assigned index numbers.
Fig. 6. Time slot assignment
In Fig. 5, the super cluster CH00 chooses CH01 from the clusters with the number of hops 1 and assigns index
number 0. CH01 assigns index number 2 to CH02 which is the neighbor cluster with same hop number. In turn,
CH02 assigns index number 3 to the CH03. All clusters with the number of hops 1 are assigned index number in the
same way. In the same time, CH01 chooses the cluster CH07 from its neighbor clusters with the number of hops 2
and assigns index number 0. To the clusters with the number of hops 2 index numbers are assigned turn by turn.
Clustering based Time Slot Assignment Protocol…
|Volume 2| Issue 5 | www.ijrtem.com | 70 |
Obtaining intra cluster time: After all clusters obtain their own relative position information each cluster
calculates its time slot which we call intra cluster time. As mentioned above time channel is divided into cluster
time and each cluster time consists of 4 intra cluster time which is shown in Fig. 6. Intra cluster time 1 is used by
clusters with an even number of hops and an even index number.
The clusters with an odd number of hops and an even index number use intra cluster time 2. Intra cluster time 3 is
utilized by clusters with an even number of hops and an odd index number. And intra cluster time 4 is used by
clusters with an odd number of hops and an odd index number. Different from normal clusters super cluster uses
both intra cluster time 1, 3.
III. PERFORMANCE ANALYSIS
In this section, we compare COD-TS and proposed protocol through simulation using network simulator ns-3. In
the network, 20 clusters of nodes are distributed randomly unless specified otherwise. Each cluster consists of 8
nodes including a cluster head. All nodes’ modems are configured to 1100 m transmission range and 667 bps
transmission rate, to each packet, a preamble is added with duration of 1.5s by the physical layer and propagation
speed of acoustic carrier is set to 1500 m/s. Transmission power is set to 2 W, and power consumption of node in
reception and idle states are both set to 158 m W. For COD-TS, the transmission power for the schedule packet is
set to 5 W. All nodes, including cluster heads, generate packets of size 400 bytes following a Poisson process with
mean λ rate. Each node is allowed to send at most 4 frames in a round. Queue size of each node is set as much as big
enough to prevent overflow of frames. Simulation run time is 10000 seconds.
Fig. 7. Nodal throughput with varying packet generation rate λ
Fig. 8. Energy efficiency with varying packet generation rate λ
Clustering based Time Slot Assignment Protocol…
|Volume 2| Issue 5 | www.ijrtem.com | 71 |
For COD-TS, we set D max maximal communication round time to 760 seconds. And for proposed protocol Tour
duration of an intra cluster time is set to 35 seconds, which is obtained best value by running simulations.
Simulation results are averaged from simulation runs with 20 randomly deployed topologies with 20 times
repetition for each topology. We measured nodal throughput and energy efficiency with the varying packet
generation rate, packet size and number of nodes in the network. Nodal throughput is an average number of
successfully received bits in a second per node during simulation time:
Energy Efficiency = Number of Successful Packets * Packet Size / Total Utilized Energy
We discuss simulation results in the following order: first, with varying packet generation rate λ, then, with varying
packet size, and then, with varying number of nodes in the network. Fig. 7, 8 show nodal throughput and energy
efficiency with varying λ rate. As shown in Fig. 7, proposed protocol achieves higher nodal throughput than
COD-TS. COD-TS achieves very low nodal throughput at low packet generation rate. This is because COD-TS
spends more time for sending schedule packets more frequently compared to useful data packet transmissions.
Also, the schedule packet itself collides with transmissions of nodes of neighboring clusters. On the contrary, the
nodal throughput of proposed protocol linearly increases at low packet generation rates and it switches to
saturation state at high packet generation rates. Proposed protocol achieves almost three times more energy
efficient than COD-TS as it is shown in Fig. 8. The reason for this is similar to the reason explained for nodal
throughput. COD-TS transmits schedule packets at a higher power level, as mentioned above the schedule packet
itself cause collisions to nodes of neighboring clusters, and because of incorrectly received schedule packets data
Fig. 9. Nodal throughput with varying packet size
Fig. 10. Energy efficiency with varying packet size
Clustering based Time Slot Assignment Protocol…
|Volume 2| Issue 5 | www.ijrtem.com | 72 |
data packets collide transmitted by nodes of neighboring clusters, those all decrease energy efficiency.
Performance comparisons of the protocols in terms of nodal throughput and energy efficiency with varying packet
size are shown in Fig. 9, 10. Both protocols throughput and energy efficiency increase with increasing packet size.
Since the proportion of control packet (overhead) size on useful data size decreases when the payload of data
packet size increases. Therefore, throughput that is an average number of useful data bits per second and energy
efficiency that is an average number of useful data bits per utilized joule of energy increases when increases data
packet size. Proposed protocol outperforms COD-TS. In Fig. 11, 12, comparisons of nodal throughput and energy
efficiency with varying number (i.e. density) of nodes in the network are illustrated. As expected, in general for
both protocols the performance goes down with increasing density of nodes in the network. For all density of the
network, the proposed protocol achieves higher performance with significant difference than COT-TS. Especially,
at low density proposed protocol achieves more than two times higher throughput and more than three times higher
energy efficiency than that COD-TS achieves. In COD-TS, transmitting same schedule packet to less number of
neighbor clusters becomes more overhead than that transmitting it to more number of neighbor clusters. The
transmission time of schedule packet does not depend on the number of receivers.
Fig. 11. Nodal throughput with varying number of nodes in the network
Fig. 12. Energy efficiency with varying number of nodes in the network
Both, throughput and energy efficiency of COD-TS fluctuates as density increases. This is explained as an average
number of neighbor clusters is higher with certain numbers of clusters in the network. For example, when number
of nodes in the network is 8x8 (8 clusters with 8 nodes each) the throughput goes up since the average number of
neighbor clusters of a cluster is higher compared to that when the number of nodes in the network is 6x8. Thus,
transmission of schedule packet in the network with 8 clusters is more effective than in the network with 6 clusters.
Clustering based Time Slot Assignment Protocol…
|Volume 2| Issue 5 | www.ijrtem.com | 73 |
IV. CONCLUSIONS
The CTSA is a distributed protocol which can work in the network with randomly located nodes. Nodes are
clustered, and each cluster calculates its intra cluster time according to its relative position to its neighbors.
Relative position information of a cluster includes number of hops from the super cluster head and index number
(H, I). In each cluster, a cluster head schedules its members’ transmission for the duration of the cluster’s intra
cluster time. Simulation results show that proposed protocol achieves higher performance with significant
difference comparing to COD-TS in terms of nodal throughput and energy efficiency.
ACKNOWLEDGEMENTS
This research was supported by Basic Science Research Program through the National Research Foundation of
Korea (NRF) funded by the Ministry of Education (2015R1D1A1A01059644).
REFERENCES
[1] Keyu Chen, Maode Ma, En Cheng, Fei Yuan, and Wei Su, “A Survey on MAC Protocols for Underwater Wireless Sensor
Networks,” IEEE Communications surveys & tutorials, vol. 16, no. 3, pp. 1433-1447, 2014.
[2] Y. Zhu, Z. Peng, J.-H. Cui, and H. Chen, “Toward Practical MAC Design for Underwater Acoustic Networks,” IEEE
Transactions on Mobile Computing, vol. 4, no. 4, pp. 872-886, 2015.
[3] Yeo, Jin-Ki, Young-Kon Lim, and Heung-Ho Lee. "Modified mac (media access control) protocol design for the acoustic-based
underwater digital data communication." Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International Symposium
on. Vol. 1. IEEE, 2001.
[4] Pompili, Dario, Tommaso Melodia, and Ian F. Akyildiz. "A CDMA-based medium access control for underwater acoustic sensor
networks." IEEE Transactions on Wireless Communications 8.4 (2009): 1899-1909.
[5] Basagni, Stefano, et al. "Optimizing network performance through packet fragmentation in multi-hop underwater
communications." OCEANS 2010 IEEE-Sydney. IEEE, 2010.
[6] Basagni, Stefano, et al. "Optimized packet size selection in underwater wireless sensor network communications." IEEE Journal of
Oceanic Engineering 37.3 (2012): 321-337.
[7] Jiarong Zhang, Gang Qiao, and Can Wang, “A Distance Aware Protocol for Underwater Acoustic Communication Networks”,
IEEE Transactions on Information and Communications Technology (2013):1- 6.
[8] Pescosolido, Loreto, Chiara Petrioli, and Luigi Picari. "A multi-band Noise-aware MAC protocol for underwater acoustic sensor
networks." WiMob. 2013.
[9] Zhang, Jiarong, Gang Qiao, and Feng Zhou. "A relative clock based and energy sense MAC protocol for underwater acoustic
communication networks." OCEANS 2014-TAIPEI. IEEE, 2014.
[10] J. Liu, Z. Zhou, Z. Peng, and J.-H. Cui, “Mobi-sync: Efficient time synchronization for mobile underwater sensor networks,” in
Proceedings of IEEE GLOBECOM, 2010, pp. 1–5.
[11] F. Lu, D. Mirza, and C. Schurgers, “D-sync: Doppler-based time synchronization for mobile underwater sensor networks,” in
Proceedings of ACM Fifth ACM Int. Workshop UnderWater Net., 2010, pp. 3:1-3:8.
[12] S. Bandyopadhyay and E. J. Coyle, “An energy efficient hierarchical clustering algorithm for wireless sensor
networks,” in Proc. IEEE INFOCOM, 2003, pp. 1713–1723.
Muzaffar Ergashev, and Sunmyeng Kim. “Clustering Based Time Slot Assignment Protocol
for Improving Performance in Underwater Acoustic Networks.” Invention Journal of Research
Technology in Engineering & Management (IJRTEM), vol. 2, no. 5, 22 May 2018, pp. 66–73.,
www.ijrtem.com

Weitere ähnliche Inhalte

Was ist angesagt?

O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routingijwmn
 
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Editor IJARCET
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocolchirag bhatt
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 pptAAKASH S
 
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerDelay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerAM Publications
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...A. Sufian
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...INFOGAIN PUBLICATION
 
Performance analysis of fls, exp, log and
Performance analysis of fls, exp, log andPerformance analysis of fls, exp, log and
Performance analysis of fls, exp, log andijwmn
 
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEEGLOBALSOFTSTUDENTPROJECTS
 

Was ist angesagt? (16)

O dsr optimized dsr routing
O dsr optimized dsr routingO dsr optimized dsr routing
O dsr optimized dsr routing
 
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
 
Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356Ijarcet vol-2-issue-7-2351-2356
Ijarcet vol-2-issue-7-2351-2356
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocol
 
J1803056876
J1803056876J1803056876
J1803056876
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 ppt
 
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross LayerDelay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
Delay Sensitive Packet Scheduling Algorithm for MANETs by Cross Layer
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
 
40520130101003
4052013010100340520130101003
40520130101003
 
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
 
Performance analysis of fls, exp, log and
Performance analysis of fls, exp, log andPerformance analysis of fls, exp, log and
Performance analysis of fls, exp, log and
 
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
 
Jc3615871591
Jc3615871591Jc3615871591
Jc3615871591
 

Ähnlich wie Clustering based Time Slot Assignment Protocol for Improving Performance in Underwater Acoustic Networks

Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACHEditor IJCATR
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientIJCNCJournal
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAKARTHIKEYAN V
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedDebesh Sadhukhan
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsSpiros Louvros
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...TELKOMNIKA JOURNAL
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacherySenthilvel S
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKIJCNCJournal
 

Ähnlich wie Clustering based Time Slot Assignment Protocol for Improving Performance in Underwater Acoustic Networks (20)

Protocol Enhancements in LEACH
Protocol Enhancements in LEACHProtocol Enhancements in LEACH
Protocol Enhancements in LEACH
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficient
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_SchedA_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2RDETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2R
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid ApplicationsIEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
IEEE CAMAD 2014_LTE Uplink Delay Constraints for Smart Grid Applications
 
IEEE CAMAD 2014
IEEE CAMAD 2014IEEE CAMAD 2014
IEEE CAMAD 2014
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
 
NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKVHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
VHFRP: VIRTUAL HEXAGONAL FRAME ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORK
 

Mehr von IJRTEMJOURNAL

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...IJRTEMJOURNAL
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...IJRTEMJOURNAL
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomnessIJRTEMJOURNAL
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...IJRTEMJOURNAL
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain managementA study on financial aspect of supply chain management
A study on financial aspect of supply chain managementIJRTEMJOURNAL
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...IJRTEMJOURNAL
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERIJRTEMJOURNAL
 
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...IJRTEMJOURNAL
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A PrimerIJRTEMJOURNAL
 
Resource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economyResource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economyIJRTEMJOURNAL
 
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...IJRTEMJOURNAL
 
Security and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaSecurity and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaIJRTEMJOURNAL
 
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster MushroomInfluence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster MushroomIJRTEMJOURNAL
 
Optimization of Design Parameters for Crane Hook Using Finite Element Analysis
Optimization of Design Parameters for Crane Hook Using Finite Element AnalysisOptimization of Design Parameters for Crane Hook Using Finite Element Analysis
Optimization of Design Parameters for Crane Hook Using Finite Element AnalysisIJRTEMJOURNAL
 
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...IJRTEMJOURNAL
 
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa GorontaloReserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa GorontaloIJRTEMJOURNAL
 
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...IJRTEMJOURNAL
 
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...IJRTEMJOURNAL
 
What are the determinants of the non-reimbursement for SMEs in Central Africa...
What are the determinants of the non-reimbursement for SMEs in Central Africa...What are the determinants of the non-reimbursement for SMEs in Central Africa...
What are the determinants of the non-reimbursement for SMEs in Central Africa...IJRTEMJOURNAL
 
Multivariate regression methods with infrared spectroscopy to detect the fals...
Multivariate regression methods with infrared spectroscopy to detect the fals...Multivariate regression methods with infrared spectroscopy to detect the fals...
Multivariate regression methods with infrared spectroscopy to detect the fals...IJRTEMJOURNAL
 

Mehr von IJRTEMJOURNAL (20)

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomness
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain managementA study on financial aspect of supply chain management
A study on financial aspect of supply chain management
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMER
 
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A Primer
 
Resource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economyResource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economy
 
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
 
Security and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaSecurity and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in Nigeria
 
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster MushroomInfluence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
 
Optimization of Design Parameters for Crane Hook Using Finite Element Analysis
Optimization of Design Parameters for Crane Hook Using Finite Element AnalysisOptimization of Design Parameters for Crane Hook Using Finite Element Analysis
Optimization of Design Parameters for Crane Hook Using Finite Element Analysis
 
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
 
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa GorontaloReserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
 
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
 
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
 
What are the determinants of the non-reimbursement for SMEs in Central Africa...
What are the determinants of the non-reimbursement for SMEs in Central Africa...What are the determinants of the non-reimbursement for SMEs in Central Africa...
What are the determinants of the non-reimbursement for SMEs in Central Africa...
 
Multivariate regression methods with infrared spectroscopy to detect the fals...
Multivariate regression methods with infrared spectroscopy to detect the fals...Multivariate regression methods with infrared spectroscopy to detect the fals...
Multivariate regression methods with infrared spectroscopy to detect the fals...
 

Kürzlich hochgeladen

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSrknatarajan
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 

Kürzlich hochgeladen (20)

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Clustering based Time Slot Assignment Protocol for Improving Performance in Underwater Acoustic Networks

  • 1. Invention Journal of Research Technology in Engineering & Management (IJRTEM) ISSN: 2455-3689 www.ijrtem.com Volume 2 Issue 5 ǁ May 2018 ǁ PP 66-73 |Volume 2| Issue 5 | www.ijrtem.com | 66 | Clustering based Time Slot Assignment Protocol for Improving Performance in Underwater Acoustic Networks Muzaffar Ergashev1 and Sunmyeng Kim2 1,2, Department of Software engineering, Kumoh National Institute of Technology, Gumi 730-701, South Korea ABSTRACT : Recently, numerous approaches have been proposed for designing medium access control (MAC) in underwater acoustic networks (UANs). Some of those works tried to adapt MAC protocols proposed for terrestrial networks. However, unique environmental characteristics of UANs make the MAC protocols hard to be used in the UANs and degrade network performance. In order to improve network performance, COD-TS MAC protocol was proposed. COD-TS focuses on both single hop and multi-hop mode and utilizes CDMA for exchanging schedule information between cluster heads. COD-TS has shortcomings such as collisions, additional energy consumption by exchanging schedule information and near-far effect of CDMA. To overcome above shortcomings, we propose a clustering-based time slot assignment protocol. In the proposed protocol, nodes are clustered, and each cluster head performs two-hop neighbor cluster discovery operation. And then, a cluster head obtains its own relative position information. Finally, the cluster head assigns its own time slot for data transmission based on the information. Simulation results show that the proposed protocol has always better performance compared to the COD-TS. KEYWORDS: clustering, MAC, time slot, underwater acoustic networks I. INTRODUCTION Underwater acoustic networks (UAN) has become a popular topic among both academic and industrial researchers. Because UANs are the very effective system for exploring and observing under oceans. UAN is the system which consists of sensor nodes, autonomous underwater vehicles (AUV) and floating buoys which utilizes acoustic waveforms for communication among each other and all together do the special task. Main utilization purposes of UANs are ocean sampling, environmental monitoring, undersea explorations, disaster prevention, assisted navigation, distributed tactical surveillance, mine reconnaissance [1]. In early times numerous proposal of designing MAC for UANs had been done by researchers which are based on contention or handshaking algorithms. The propagation speed of acoustic (1500 m/s in water) wave is very slow comparing to the propagation speed of the electromagnetic wave (3 x 10^8 m/s), long preamble (1.5 seconds) and low transmission speed (667 bps) [2] degrades the efficiency of above mentioned protocols. Low propagation speed, the long preamble, and low transmission speed cause the high probability of simultaneous transmission of frames from different nodes in random access and handshaking protocols. In turn, it brings low throughput and low energy efficiency in communication. So, directly implementation or adjusting of existing MAC protocols of terrestrial networks for UANs will not give an effective result. Fig. 1. An example of COD-TS with the given topology.
  • 2. Clustering based Time Slot Assignment Protocol… |Volume 2| Issue 5 | www.ijrtem.com | 67 | Several MAC protocols have been proposed for UANs and some of them are given here. In [3], communication protocol proposed for underwater vehicles. Authors proposed closed loop distributed algorithm for setting optimal transmit power and code length in CDMA [4]. Protocol proposed in [5], uses RTS/CTS packets to reserve channel, but there is still collision between data-control packets. The work in [6], uses the selection of packet size for communication in multi hop networks. In [7], improved CSMA (Distance Aware CSMA) protocol is proposed. In [8], multiband modems are used and if noise is detected in currently utilizing band, modem switches to another frequency band. Protocol designed for centralized networks in [9]. Nodes are mapped to the network schedule on its local clock according to the relative propagation delay. Those protocols mentioned above still have shortcomings and cannot provide high performance for large size and dense network. To improve the performance of UANs COD-TS has been proposed in [2]. COD-TS uses algorithms presented in [10, 11] for synchronizing nodes. And organizes nodes into clusters using algorithm proposed in [12]. A cluster consists of a cluster head node and one-hop neighbor nodes of the cluster head. Each cluster head schedules data/control packet transmissions for the duration of time which is called communication round. Communication round is limited with D max and would be between two successive schedule updates of the cluster head. In Fig. 1, for example, the period between time t1 and t3 is one communication round of cluster head H1’s cluster. In Fig. 1 each cluster has cluster heads H1 and H2, and member nodes M1 and M2, and M3 and M4, respectively. In the communication round which ends at t1, the cluster head H1 receives the request packets from member nodes M1 and M2. At time t1, the cluster head H1 makes a new schedule considering the request packets and sends it in the schedule and notification packets. The member nodes transmit data/request packets at its own time slots. The cluster head H2 receives the schedule packet from the cluster head H1 at time t2, it makes a new schedule based on the schedule packet and request packets from its member nodes. In COD-TS schedule packets are transmitted at high power and it causes to increase the interference and collision probability at between transmissions of neighboring nodes/clusters. Also, additional energy is consumed for transmissions of schedule packets which accelerates depletion of battery energy. Power control algorithm is not provided to overcome near-far effect in CDMA. To overcome above shortcomings, we propose Clustering based Time Slot Assignment Protocol – CTSA protocol. In the proposed protocol, sensor nodes are organized into clusters, and each cluster head performs two-hop neighbor cluster discovery operation. So, each cluster head knows its two-hop neighbor clusters ids. And then, using two-hop neighbor clusters ids a cluster head obtains its own relative position information according to its relative position. Finally, the cluster head assigns its own time slot for data transmission based on its own relative position information. All clusters own their slot time and the cluster head schedules data/control packet transmissions of cluster members. In this way, collisions of transmission of neighboring nodes in the same cluster and neighboring clusters are prevented, and it is done without exchanging schedule information. This paper is organized as follows: In Section 2, we explain the proposed protocol in detail; In Section 3, we analyze network performance of the proposed protocol through the simulation and compare with COD-TS protocol; Finally, Section 4 concludes the paper. Fig. 2. An example topology of UANs. II. PROPOSED CTSA PROTOCOL We assume the network is static or could be seen as a static for relatively long enough duration. The network consists of a sink node and sensor nodes which is shown as an example topology in Fig. 2. We have to mention that CTSA protocol can work for the network with randomly located nodes. Also, we assume that network is well synchronized which is obtainable utilizing algorithms in [10, 11]. Time is divided into cluster times and each cluster time consists 4 intra cluster time as shown in Fig. 6. Using our algorithm, a cluster head obtains an intra
  • 3. Clustering based Time Slot Assignment Protocol… |Volume 2| Issue 5 | www.ijrtem.com | 68 | cluster time according to its relative position to its neighbor clusters. Our algorithm contains 3 phases: initialization, obtaining relative position information, and obtaining intra cluster time. Initialization phase includes clustering nodes after deployment and two hop neighbor discovery. In obtaining relative position information phase, cluster heads are assigned parameters according to their relative position to their neighbor clusters. In obtaining intra cluster time phase, each cluster head obtains a portion of time called intra cluster time for data/control packet transmissions of the cluster members according to their relative position information. Initialization phase: In the initialization phase, first, nodes are clustered. Each cluster consists of a cluster head and member nodes Fig. 3. Exchanging PNEIGHBORS packet. which are one-hop neighbors of the cluster head. We use existing algorithm proposed in [12] for clustering. Second, each cluster head performs two-hop neighbor cluster discovery operation. A cluster head owns a neighbor clusters table. Table entries are the number of hops between neighbors and ids of neighbors. Each cluster head fills its table by exchanging PNEIGHBORS packets as shown in Fig. 3. PNEIGHBORS packet contains source id, N-number of one hop neighbor clusters and their ids. If a cluster head does not receive PNEIGHBORS packet during a fixed τmax time, neighbor cluster discovery step will end. Neighbor discovery step is performed periodically at fixed ξmax time. An example of neighbor discovery step is shown in Fig. 3 and Fig. 4. The Fig. 3 shows an example of PNEIGHBORS packet exchange between cluster heads H1 and H2 via their members M1 and M4. PNEIGHBORS packet sent by cluster head H1 travels through H1 → M1 → M4 → H2 to cluster head H2. And H2 cluster head also sends PNEIGHBORS packet which goes through H2 → M4 → M1 → H1 to cluster head H1. An example of neighbor cluster discovery with details of updating neighbor cluster table is given in Fig. 4. Cluster head H2 sends packet P1. Since its neighbor cluster table is empty in step 0, the cluster head H2 includes only its id in source field PNEIGHBORS packet and sets the number of neighbor clusters field of the packet to zero. After receiving packet P1 cluster heads H1 and H3 inserts id of cluster head H2 to their table as one hop neighbor cluster as shown in step 1. Cluster head H1 sends packet P2, Fig. 4. An example of neighbor cluster discovery.
  • 4. Clustering based Time Slot Assignment Protocol… |Volume 2| Issue 5 | www.ijrtem.com | 69 | which includes its id and one hop neighbor cluster H2’s id. The cluster head H2 inserts cluster head H1’s id to its table as one hop neighbor cluster as shown in step 1. Next, cluster head H3 sends packet P3 with self id and cluster head H2’s id. Cluster head H2 inserts H3’s to its table as shown in step 1. Since cluster head H2 updated its table it sends packet P4. Packet P4 includes H2’s self id and its one hop neighbor clusters’ ids H1 and H3. Cluster heads H1 and H3 receive packet P4 and H1 inserts H3’s id as two hop neighbor cluster and H3 also inserts H1’s id as two hop neighbor cluster to their respective tables as shown in step 2. Obtaining relative position information: In this subsection, we explain obtaining relative position information which are a number of hops and an index number (H, I). Fig. 2 shows that the sensor network includes a sink node and sensor nodes. As shown in Fig. 5, sensor nodes are organized into clusters. CHn is the identification number of the cluster. The sink node assigns the closest cluster head to itself as a super cluster head. In Fig. 5, super cluster head’s identification number is CH00. H is the number of hop between each cluster and the super cluster and I is the index number of clusters those own same hop number. The number of hops is the distance between cluster heads and it is easy to obtain. The super cluster head randomly chooses a cluster head among its one hop neighbor clusters Fig. 5. An example topology (H, = 1). And assigns index number 0 (I = 0) to it. Starting from chosen cluster index numbers (I = 1, 2, 3, 4, …) are assigned to neighbor clusters turn by turn. The cluster with the number of hops 1 and index number is 0 randomly chooses one of the clusters among its neighbor clusters with the number of hops 2 and assigns index number 0 to it. Clusters with same hop number are assigned index numbers turn by turn. The steps explained above are repeated until all clusters assigned index numbers. Fig. 6. Time slot assignment In Fig. 5, the super cluster CH00 chooses CH01 from the clusters with the number of hops 1 and assigns index number 0. CH01 assigns index number 2 to CH02 which is the neighbor cluster with same hop number. In turn, CH02 assigns index number 3 to the CH03. All clusters with the number of hops 1 are assigned index number in the same way. In the same time, CH01 chooses the cluster CH07 from its neighbor clusters with the number of hops 2 and assigns index number 0. To the clusters with the number of hops 2 index numbers are assigned turn by turn.
  • 5. Clustering based Time Slot Assignment Protocol… |Volume 2| Issue 5 | www.ijrtem.com | 70 | Obtaining intra cluster time: After all clusters obtain their own relative position information each cluster calculates its time slot which we call intra cluster time. As mentioned above time channel is divided into cluster time and each cluster time consists of 4 intra cluster time which is shown in Fig. 6. Intra cluster time 1 is used by clusters with an even number of hops and an even index number. The clusters with an odd number of hops and an even index number use intra cluster time 2. Intra cluster time 3 is utilized by clusters with an even number of hops and an odd index number. And intra cluster time 4 is used by clusters with an odd number of hops and an odd index number. Different from normal clusters super cluster uses both intra cluster time 1, 3. III. PERFORMANCE ANALYSIS In this section, we compare COD-TS and proposed protocol through simulation using network simulator ns-3. In the network, 20 clusters of nodes are distributed randomly unless specified otherwise. Each cluster consists of 8 nodes including a cluster head. All nodes’ modems are configured to 1100 m transmission range and 667 bps transmission rate, to each packet, a preamble is added with duration of 1.5s by the physical layer and propagation speed of acoustic carrier is set to 1500 m/s. Transmission power is set to 2 W, and power consumption of node in reception and idle states are both set to 158 m W. For COD-TS, the transmission power for the schedule packet is set to 5 W. All nodes, including cluster heads, generate packets of size 400 bytes following a Poisson process with mean λ rate. Each node is allowed to send at most 4 frames in a round. Queue size of each node is set as much as big enough to prevent overflow of frames. Simulation run time is 10000 seconds. Fig. 7. Nodal throughput with varying packet generation rate λ Fig. 8. Energy efficiency with varying packet generation rate λ
  • 6. Clustering based Time Slot Assignment Protocol… |Volume 2| Issue 5 | www.ijrtem.com | 71 | For COD-TS, we set D max maximal communication round time to 760 seconds. And for proposed protocol Tour duration of an intra cluster time is set to 35 seconds, which is obtained best value by running simulations. Simulation results are averaged from simulation runs with 20 randomly deployed topologies with 20 times repetition for each topology. We measured nodal throughput and energy efficiency with the varying packet generation rate, packet size and number of nodes in the network. Nodal throughput is an average number of successfully received bits in a second per node during simulation time: Energy Efficiency = Number of Successful Packets * Packet Size / Total Utilized Energy We discuss simulation results in the following order: first, with varying packet generation rate λ, then, with varying packet size, and then, with varying number of nodes in the network. Fig. 7, 8 show nodal throughput and energy efficiency with varying λ rate. As shown in Fig. 7, proposed protocol achieves higher nodal throughput than COD-TS. COD-TS achieves very low nodal throughput at low packet generation rate. This is because COD-TS spends more time for sending schedule packets more frequently compared to useful data packet transmissions. Also, the schedule packet itself collides with transmissions of nodes of neighboring clusters. On the contrary, the nodal throughput of proposed protocol linearly increases at low packet generation rates and it switches to saturation state at high packet generation rates. Proposed protocol achieves almost three times more energy efficient than COD-TS as it is shown in Fig. 8. The reason for this is similar to the reason explained for nodal throughput. COD-TS transmits schedule packets at a higher power level, as mentioned above the schedule packet itself cause collisions to nodes of neighboring clusters, and because of incorrectly received schedule packets data Fig. 9. Nodal throughput with varying packet size Fig. 10. Energy efficiency with varying packet size
  • 7. Clustering based Time Slot Assignment Protocol… |Volume 2| Issue 5 | www.ijrtem.com | 72 | data packets collide transmitted by nodes of neighboring clusters, those all decrease energy efficiency. Performance comparisons of the protocols in terms of nodal throughput and energy efficiency with varying packet size are shown in Fig. 9, 10. Both protocols throughput and energy efficiency increase with increasing packet size. Since the proportion of control packet (overhead) size on useful data size decreases when the payload of data packet size increases. Therefore, throughput that is an average number of useful data bits per second and energy efficiency that is an average number of useful data bits per utilized joule of energy increases when increases data packet size. Proposed protocol outperforms COD-TS. In Fig. 11, 12, comparisons of nodal throughput and energy efficiency with varying number (i.e. density) of nodes in the network are illustrated. As expected, in general for both protocols the performance goes down with increasing density of nodes in the network. For all density of the network, the proposed protocol achieves higher performance with significant difference than COT-TS. Especially, at low density proposed protocol achieves more than two times higher throughput and more than three times higher energy efficiency than that COD-TS achieves. In COD-TS, transmitting same schedule packet to less number of neighbor clusters becomes more overhead than that transmitting it to more number of neighbor clusters. The transmission time of schedule packet does not depend on the number of receivers. Fig. 11. Nodal throughput with varying number of nodes in the network Fig. 12. Energy efficiency with varying number of nodes in the network Both, throughput and energy efficiency of COD-TS fluctuates as density increases. This is explained as an average number of neighbor clusters is higher with certain numbers of clusters in the network. For example, when number of nodes in the network is 8x8 (8 clusters with 8 nodes each) the throughput goes up since the average number of neighbor clusters of a cluster is higher compared to that when the number of nodes in the network is 6x8. Thus, transmission of schedule packet in the network with 8 clusters is more effective than in the network with 6 clusters.
  • 8. Clustering based Time Slot Assignment Protocol… |Volume 2| Issue 5 | www.ijrtem.com | 73 | IV. CONCLUSIONS The CTSA is a distributed protocol which can work in the network with randomly located nodes. Nodes are clustered, and each cluster calculates its intra cluster time according to its relative position to its neighbors. Relative position information of a cluster includes number of hops from the super cluster head and index number (H, I). In each cluster, a cluster head schedules its members’ transmission for the duration of the cluster’s intra cluster time. Simulation results show that proposed protocol achieves higher performance with significant difference comparing to COD-TS in terms of nodal throughput and energy efficiency. ACKNOWLEDGEMENTS This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2015R1D1A1A01059644). REFERENCES [1] Keyu Chen, Maode Ma, En Cheng, Fei Yuan, and Wei Su, “A Survey on MAC Protocols for Underwater Wireless Sensor Networks,” IEEE Communications surveys & tutorials, vol. 16, no. 3, pp. 1433-1447, 2014. [2] Y. Zhu, Z. Peng, J.-H. Cui, and H. Chen, “Toward Practical MAC Design for Underwater Acoustic Networks,” IEEE Transactions on Mobile Computing, vol. 4, no. 4, pp. 872-886, 2015. [3] Yeo, Jin-Ki, Young-Kon Lim, and Heung-Ho Lee. "Modified mac (media access control) protocol design for the acoustic-based underwater digital data communication." Industrial Electronics, 2001. Proceedings. ISIE 2001. IEEE International Symposium on. Vol. 1. IEEE, 2001. [4] Pompili, Dario, Tommaso Melodia, and Ian F. Akyildiz. "A CDMA-based medium access control for underwater acoustic sensor networks." IEEE Transactions on Wireless Communications 8.4 (2009): 1899-1909. [5] Basagni, Stefano, et al. "Optimizing network performance through packet fragmentation in multi-hop underwater communications." OCEANS 2010 IEEE-Sydney. IEEE, 2010. [6] Basagni, Stefano, et al. "Optimized packet size selection in underwater wireless sensor network communications." IEEE Journal of Oceanic Engineering 37.3 (2012): 321-337. [7] Jiarong Zhang, Gang Qiao, and Can Wang, “A Distance Aware Protocol for Underwater Acoustic Communication Networks”, IEEE Transactions on Information and Communications Technology (2013):1- 6. [8] Pescosolido, Loreto, Chiara Petrioli, and Luigi Picari. "A multi-band Noise-aware MAC protocol for underwater acoustic sensor networks." WiMob. 2013. [9] Zhang, Jiarong, Gang Qiao, and Feng Zhou. "A relative clock based and energy sense MAC protocol for underwater acoustic communication networks." OCEANS 2014-TAIPEI. IEEE, 2014. [10] J. Liu, Z. Zhou, Z. Peng, and J.-H. Cui, “Mobi-sync: Efficient time synchronization for mobile underwater sensor networks,” in Proceedings of IEEE GLOBECOM, 2010, pp. 1–5. [11] F. Lu, D. Mirza, and C. Schurgers, “D-sync: Doppler-based time synchronization for mobile underwater sensor networks,” in Proceedings of ACM Fifth ACM Int. Workshop UnderWater Net., 2010, pp. 3:1-3:8. [12] S. Bandyopadhyay and E. J. Coyle, “An energy efficient hierarchical clustering algorithm for wireless sensor networks,” in Proc. IEEE INFOCOM, 2003, pp. 1713–1723. Muzaffar Ergashev, and Sunmyeng Kim. “Clustering Based Time Slot Assignment Protocol for Improving Performance in Underwater Acoustic Networks.” Invention Journal of Research Technology in Engineering & Management (IJRTEM), vol. 2, no. 5, 22 May 2018, pp. 66–73., www.ijrtem.com