SlideShare a Scribd company logo
Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771
765 | P a g e
Anti-Void Traversal Mechanism Using Pressure Routing For
Underwater Sensor Networks
Shreyas M.S1
, Prof. D. Jayaramaiah2
1
M.Tech Student,
2
Head of the dept,
Department of Information Science Engineering The Oxford College of Engineering VTU Bangalore, India
Abstract
Underwater acoustic sensor networks
have recently been proposed as a way to explore
and capture oceanographic data to monitor
underwater environments. A specialized
geographic routing problem called pressure
routing that directs a packet to any sonobuoys on
the surface based on depth information available
from on-board pressure gauges. In this respect,
the efficient handling of void areas in the acoustic
network is the main challenge of pressure
routing. It was recently proven that the greedy
stateless perimeter routing method, very popular
in terrestrial networks, cannot be extended to
void recovery in acoustic networks. In order to
remedy this problem, the existing protocol Depth
based routing is enhanced. The proposed solution
takes advantage of what is already inherited as a
natural part of geographic routing to provide
clues on the routing direction for data packets
with minimal overhead to navigate around the
voids. The proposed solution that uses depth
information, sequence number and hop count
and exploits opportunistic beacon packet
receptions to circumvent void areas and
efficiently progress towards the destination when
choosing forwarding nodes the proposed solution
follows this direction by embedding small
amounts of trace routing data in each beaconing
packet to inform neighboring nodes about the
broadcasting node’s status as a local maxima or
dead end node and avoid routing to nodes which
may lead to a void in the network.
Index Terms— Pressure Routing, Geographic
Routing, Opportunistic data forwarding, Any-cast
Routing.
I. INTRODUCTION
Underwater sensor networks (UWSNs)
communications are becoming increasingly
important, with numerous applications emerging in
military tactical surveillance applications,
oceanographic data collection environmental and
pollution monitoring [1], [2]. Underwater acoustic
networking is the enabling technology for these
applications. In underwater networks, to perform
collaborative monitoring tasks over a given area a
variable number of sensors and vehicles that are
deployed forming a sea Swarm (Sensor Equipped
Aquatic Swarm) that moves as a group with water
current [3], [4]. Each sensor is equipped with a low
bandwidth acoustic modem and with various sensors
(e.g., Drogues [5]). Moreover, it can control its
depth through a fish-like bladder apparatus and a
pressure gauge. The swarm is escorted by sonobuoys
at the sea surface that are equipped with both
acoustic and radio (e.g., Wi-Fi or Satellites)
communications and GPS (See Fig 1).
Fig 1: Sea swarm architecture
Our goal in this paper is to design an
efficient any cast routing protocol for underwater
data collection that addresses several challenges that
are unique to underwater communications like the
underwater acoustic channel is prone to packet
losses and severely constrained by long propagation
latency and low bandwidth (usually less than
100Kbps) [16] and collisions in a congested
network. Energy efficiency is a critical factor as
well, given that acoustic transmissions consume far
more energy than terrestrial radio communications
(reception to transmission power ratio of 1:125
[17]).
The existing terrestrial routing protocols
(e.g., OLSR [14], DSDV [12], AODV [11], DSR
[13]) can be modified in mobile underwater
networks to support any-cast routing. This approach
has few shortcomings: (1) it is challenging to
incorporate opportunistic forwarding mechanisms
(e.g., ExOR [9], LCOR [10]) into the stateful routing
protocols due to node mobility (2) these protocols
require frequent systematic flooding and route
Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771
766 | P a g e
maintenance with neighboring nodes, which are very
expensive operations under water.
In Acoustic networks, recent researches
has been directed to geographic routing because it
does not require any link state exchanges or route
maintenances (i.e., stateless and localized). Another
key advantage of geographic routing is that it
enables localized geo-opportunistic forwarding; i.e.,
a subset of nodes that have correctly received the
packet can collaboratively schedule a packet
transmission to maximize its progress toward the
destination [15]. Note that our geographic routing
problem is specialized in that it is any-cast to any
buoy on the surface. Thus, it suffices to route a
packet upwards to shallower depths. Given that the
onboard hydraulic pressure gauge can accurately
estimate depth (avg. error < 1m ), we can use depth
information for geographic any-cast routing (called
pressure routing).
A simple greedy pressure routing often fails
in sparse underwater networks due to the presence
of void Nodes — packets must be routed around
such routing holes. As depicted in Fig. 2, a data
packet originating from node c may eventually be
routed to a local maximum node g when greedily
forwarded based on depth (via path P1). Node g
cannot make any progress toward the surface
because it does not have any neighboring node with
depth shallower than its own. Node g must thus
perform a route recovery process to get around the
void via path P2. For Underwater networks, there is
no efficient routing algorithm that delivers messages
deterministically even in the presence of void nodes.
Therefore several recovery methods was proposed
such as 2D void surface flooding and random walks
[15]. These methods also have a drawback: some of
the nodes around a void area will eventually route
packets to local maxima (called trapped nodes, e.g.,
node i and h in Fig. 1), and any nodes located
beneath the trapped nodes can potentially suffer
from route hop stretch because local greedy
forwarding may lead packets to local maxima and
then invoke fallback mechanisms. For example in
Fig.2, node c’s packet is greedily forwarded to the
local maxima via path P1 and then is re-routed via
path P2 (total 7 hops), whereas this packet can be
directly delivered via path P3 (total 3 hops). Note
that these problems will be more pronounced when
the number of sonobuoys is sparse or when node
density is low. This drawback of pressure routing is
inherently due to the nodes’ blindness to the network
topology, as they make localized routing decisions.
Fig. 2. Greedy Pressure Routing.
In this paper, pressure routing is improved
by providing nodes with a partial view of the
network topology such that greedy pressure routing
is guided by soft-state breadcrumbs (i.e., up/down
directions) from the sonobuoys. This soft-state
breadcrumb approach, which exploits periodic
beaconing to build directional trails toward the
surface nodes utilize geo-opportunistic forwarding
along the directional trails.
The rest of the paper in organized as
follows. In section II, review the related work in
field. In section III, provide a detailed description of
proposed techniques. In section IV, provide a details
about parameters used for simulation and validate
the performance of proposed approach by comparing
it with existing approach. In section V, conclude the
paper.
II. RELATED WORK
Underwater Sensor Networks are attracting
the attention of industry and academia as well [15].
At one side, it can enable a wide range of aquatic
applications, and on the same time, adverse
environmental conditions create a range of
challenges for underwater communication and
networking. Major challenges in the design of
underwater acoustic networks are:
 Battery power is limited and usually
batteries cannot be recharged, because solar
energy cannot be exploited;
 Channel characteristics, including long and
variable propagation delays, multi-path and
fading problems;
 The available bandwidth is severely
limited;
 High bit error rates;
 Underwater sensors are prone to failures
because of fouling, corrosion, etc.
The main issues for development for routing
protocols for underwater sensor network.
 Harsh deployment environment is the major
challenging factor which comes under
routing protocol for underwater sensor
network.
 Bandwidth capacity is low because routing
protocol for underwater sensor network
comes from high bit error rates.
Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771
767 | P a g e
 Node mobility is also another concern
which comes under routing protocol for
underwater sensor network because if they
are not anchored at the bottom of the sea.
This situation conclusion in a dynamic
topology
 Radio single are not efficient compare to
routing protocol for underwater sensor
network. Because it provides high
propagation delays.
 High propagation delays are the major
factor of routing protocol for underwater
sensor network.
The applications for underwater acoustic sensor
networks:
 Environmental monitoring. UW-ASNs can
perform pollution monitoring (chemical,
biological and nuclear). For example, it
may be possible to detail the chemical
slurry of antibiotics, estrogen-type
hormones and insecticides to monitor
streams, rivers, lakes and ocean bays (water
quality in situ analysis). Monitoring of
ocean currents and winds, improved
weather forecast, detecting climate change,
under-standing and predicting the effect of
human activities on marine ecosystems,
biological monitoring such as tracking of
fishes or micro-organisms, are other
possible applications. For example, in [16],
the design and construction of a simple
underwater sensor network is described to
detect extreme temperature gradients
(thermoclines), which are considered to be
a breeding ground for certain marine micro-
organisms.
 Undersea explorations. Underwater sensor
networks can help detecting underwater
oilfields or reservoirs, determine routes for
laying undersea cables, and assist in
exploration for valuable minerals.
 Disaster prevention. Sensor networks that
measure seismic activity from remote
locations can provide tsunami warnings to
coastal areas, or study the effects of
submarine earthquakes (seaquakes).
 Assisted navigation. Sensors can be used to
identify hazards on the seabed, locate
dangerous rocks or shoals in shallow
waters, mooring positions, submerged
wrecks, and to perform bathymetry
profiling.
Underwater Routing Protocols: Vector-Based
Forwarding (VBF) [6] prescribes that packets be
forwarded to the nodes that are located within a
route of the given width between the source and the
destination. This relay selection algorithm saves
energy consumption by reducing the number of
packet relays. Note that there are also geographic
routing protocols that exploit the opportunistic
forwarding features in underwater environments [7].
Pressure Routing: Yan et al. proposed a greedy
any-cast routing solution called Depth Based
Routing (DBR) [8]. They suggested that packet
forwarding decisions be made locally based on the
pressure (or depth) level measured at each node.
Packets would then be geographically forwarded to
nodes with shallower depth in a greedy fashion
toward the water surface. DBR exploits the
simultaneous packet reception induced by the
broadcast nature of the wireless medium and
performs opportunistic greedy forwarding via a
subset of the neighbors that have received the packet
correctly. However, DBR lacks an efficient
forwarding set selection method and a recovery
method from local maxima. Therefore, recent
research in underwater networks has been directed to
position-based or geographic routing because it does
not require any link state exchanges or route
maintenances (i.e., stateless and localized). Thus, it
suffices to route a packet upwards to shallower
depths. Given that the onboard hydraulic pressure
gauge can accurately estimate depth, we can use
depth information for geographic any-cast routing
(called pressure routing).
Opportunistic Routing: Most opportunistic routing
protocols (also called any-path routing) such as
ExOR [9], Least Cost Opportunistic Routing
(LCOR) [10], which do not use geographic
information, require global topology and link quality
information (like link state routing) to find a set of
forwarding groups toward the destination; thus, they
are more suitable for static wireless mesh or sensor
networks. In practice, geographic routing can also
benefit from opportunistic forwarding, as in
Geographic Random Forwarding (GeRaF) [13],
Contention Based Forwarding (CBF) [14], and
Focused Beam Routing (FBR) [15], though these
methods are not optimal due to lack of global
knowledge. In the literature, researchers have
typically used a geometric shape (e.g., a
triangle/cone [14], [15]) that is faced toward the
destination for forwarding set selection to prevent
hidden terminal problems.
III. PROPOSED TECHNIQUES
The proposed Anti-Void (AV) technique
consists of three components, namely Routing
Initialization, Enhanced Periodic Beaconing and
Opportunistic directional data forwarding.
A. Routing Initialization
The Sonobuoys uses Enhanced Periodic
Beaconing method to propagate their reachability
information to sensor nodes. Each node’s beacon is
augmented with additional information, namely the
NodeID (), sender’s depth π() (or pressure
level), hop count to a sonobuoys hop_count(),
Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771
768 | P a g e
sequence number seq_num() and its current data
forwarding direction DF_dir() (toward the surface).
When receiving the augmented beacons from
predecessors, each node updates its variables,
namely minimal hop to the surface, sequence
number, data forwarding direction, and next-hop
data forwarding direction NDF_dir() (i.e.,
predecessor’s data forwarding direction).
B. Enhanced Periodic Beaconing
In the beginning, every sonobuoys on the
surface initializes these variables and starts
beaconing. After receiving a beacon message, a node
can tell whether it has received the message from
deeper or shallower depth, and each node sets its
data forwarding direction toward the surface. The
direction is set as up when a beacon is received from
a shallower depth node; otherwise, it is set as down.
When multiple direction cues from different
sonobuoys are received, the direction cue with the
minimal hop count is chosen. Also, a node’s next-
hop data forwarding direction is set based on the
beacon sender’s data forwarding direction. For
instance, in Fig. 2, since node d/e receives a beacon
message from a shallower depth node, it sets its data
forwarding direction and next-hop data forwarding
direction as up-up, respectively. In contrast, when
node I receives a beacon message from a deeper
depth node (i.e., node d), it sets its data forwarding
direction and next hop data forwarding direction as
down-up, respectively. After updating its local
states, each node prepares a beacon message to
broadcast by incrementing the hop count and setting
its current depth, data forwarding direction, and
sequence number. This beaconing process will
repeat, and thus, nodes essentially build directional
trails toward their closes sonobuoys on the surface.
Note that a direction change is caused by voids; e.g.,
in Fig. 2, path P3 has only a single direction (up),
whereas path P2 experiences a direction change due
to the void (down and up).
Fig. 3. Enhanced Periodic Beaconing
In a beacon message, nodes embed their
local states, namely current hop-count, sequence
number, depth, and data forwarding direction. To
minimize the chance of collisions and
synchronization, nodes add random jitters for
periodic beaconing using timers when they broadcast
beacon messages; then, the nodes set up a new
timeout for the next beaconing. After receiving a
beacon message, each node checks the validation of
the received beacon by checking the sequence
number (increasing) and hop-count (smaller), and
each node sets its data forwarding direction and
updates its next-hop data forwarding direction. As
illustrated earlier, the direction is set as up if a
beacon message is received from a shallower depth
node; otherwise, it is set as down. After the data
forwarding direction is set, a node’s next-hop data
forwarding direction is also updated based on the
data forwarding direction of the beacon sender. Note
that when multiple direction cues from different
sonobuoys are received, the direction cue with
minimal hop count is deterministically chosen.
Fig. 3 shows an example to illustrate
beacon propagation. The sonobuoys initializes a
beacon message after the beacon timer has expired
and then broadcasts the beacon message with the
sequence number (= 0), depth (= 0), data forwarding
direction (=up), and hop count (= 0). Node a
receives the beacon and finds that it is a new beacon
with a higher sequence number and sets its status
(e.g., seq_num = 0 with incremented hop_count(a) =
1). By comparing the depth, node a sets DF_dir(a)
as up, and NDF_dir(a) (i.e., the sonobuoys data
forwarding direction) as up. Node a will broadcast
an updated beacon, and node b will perform a
similar procedure, which will be continued. Later,
node x receives a beacon message from node b; it
then updates DF_dir(x) as down based on the depth
difference and NDF_dir(x) as DF_dir(b) = up. Node
x will broadcast an updated beacon message. After
these changes are announced via a beacon message,
node y receives the beacon message and will
maintain DF_dir(y) and NDF_dir(y) as down-down.
On the basis of this beacon and update process,
nodes will set up a set of directional trails toward
any one of the sonobuoys. When multiple direction
cues from different sonobuoys are received,
direction flapping may occur. Then proposed
solution uses the sequence number and hop count to
prevent such flapping.
C. Opportunistic Directional Data
Forwarding
The nodes forward data packets solely
based on the data forwarding direction (DF_dir) and
next-hop data forwarding direction (NDF_dir). Each
node sets up the data forwarding direction (either up
or down) that is the opposite direction of the beacon
reception direction. If this direction is up, we use
Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771
769 | P a g e
greedy upward forwarding; otherwise, we use
greedy downward forwarding. As the data packet is
forwarded upward beneath the concave area of
voids, a change of data forwarding direction is
inevitable. Data forwarding direction alone cannot
provide sufficient information to route packets to the
destination. In conjunction, we use the next-hop data
forwarding direction, which was the predecessor’s
data forwarding direction during beacon propagation
and now becomes the next-hop’s data forwarding
direction. The forwarding node uses the next-hop’s
data forwarding direction as an additional direction
constraint to ensure that routing properly follows the
direction trails; i.e., among all neighboring nodes, a
neighboring nodes whose data forwarding directions
are equal to the next-hop data forwarding direction
of the current node. Therefore, there are only four
possible cases of data forwarding and next-hop data
forwarding direction setting: up-up, down-down,
down-up, and up-down.
Consider an example scenario depicted in
Fig. 4. In particular, let us take a look at the nodes a,
b, and x. Here, node x is a trapped node that
eventually delivers packets to the local maximum
via greedy upward forwarding. DF_dir and NDF_dir
of nodes a and b are up-up, whereas those of node x
are dn-up. Let us say that there is a packet to send in
node b. Node b’s DF_dir is up and will consider
nodes whose depth is shallower than that of node b,
namely nodes a and x. Since node x’s DF_dir
(down) does not match with that of NDF_dir (up),
the trapped node x is filtered out, and node a is only
considered as a forwarding candidate for local
greedy “upward” forwarding.
Fig. 4. Opportunistic Directional Data Forwarding
IV. SIMULATIONS
 Simulation setup
A simulation is performed on set of network
topologies with varying number of sensor nodes.
The nodes will be allowed to move over the network
location. Meanwhile, additional 4 nodes are
deployed on the upper surface of the region to
simulate the presence of Sonobuoys (sink node) and
assumption that these Sonobuoys will be static.
The parameters which are considered in the
simulation are listed in the table below
 Simulation results
The network connectivity is analysed first
and its impact on the performance of greedy
forwarding under different node and sonobuoys
densities. Comparative study between the proposed
solution and existing DBR protocol [8] is made.
Extensive simulation results show that proposed
solution outperforms existing DBR protocol.
Fig. 5: Energy consumption per message
Fig. 5 shows the average energy
consumption per message. Energy consumption per
message decreases as the number of deployed nodes
increases. A higher number of deployed nodes
consequently can yield more chances for greedy
upward forwarding to succeed without requiring a
route recovery process to reach any of the
sonobuoys, resulting in less energy consumption per
message.
PARAMETER VALUE
Area 800m * 800m
Simulation Time 120 sec
Number of nodes 50-300
Number of Sink Nodes 4
Transmission Range 200m
Initial battery pack 1000 J
Tx Power 20 W [17]
Rx Power 600 mW [17]
Idle Mode Power 5 mW
Data rate 100 Kbps
Packet size 500 Kb
Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771
770 | P a g e
Fig 6: Packet Delivery Ratio
Fig. 6 shows the average packet delivery
ratio. As the number of nodes increases probability
of error occurred during routing will be less.
Although a packet may reach the sinks multiple
times, these redundant packets are considered as
only one distinct packet.
V. CONCLUSION
In this paper, the proposed solution which
exploits periodic beaconing to build directional path
towards the surface by avoiding void regions and
features opportunistic directional forwarding for
packet delivery. The extensive simulations showed
that proposed solution outperforms existing scheme
by significantly lowering the frequency of recovery
fall-backs and by reducing the energy consumption.
REFERENCES
[1]. J. Kong, J.-H. Cui, D. Wu, and M. Gerla,
“Building Underwater Ad-hoc Networks
and Sensor Networks for Large Scale Real-
time Aquatic Applications,” in IEEE
MILCOM, 2005.
[2]. I. F. Akyildiz, D. Pompili, and T. Melodia,
“Underwater Acoustic Sensor Networks:
Research Challenges,” Elsevier Ad Hoc
Networks, 2005.
[3]. U. Lee, J. Kong, J.-S. Park, E. Magistretti,
and M. Gerla. Time-Critical Underwater
Sensor Diffusion with No Proactive
Exchanges and Negligible Reactive Floods.
In ISCC’06, June 2006.
[4]. Z. Zhou, J.-H. Cui, and A. Bagtzoglou.
Scalable Localization with Mobility
Prediction for Underwater Sensor
Networks. In INFOCOM’08, Apr. 2008.
[5]. J. Jaffe and C. Schurgers. Sensor Networks
of Freely Drifting Autonomous Underwater
Explorers. In WUWNet’06, Sep. 2006.
[6]. P. Xie, J.-H. Cui, and L. Lao, “Vbf: Vector-
based forwarding protocol for underwater
sensor networks.” in Networking, 2006.
[7]. J. M. Jornet, M. Stojanovic, and M. Zorzi,
“Focused Beam Routing Protocol for
Underwater Acoustic Networks,” in
WUWNet’08, Sep. 2008.
[8]. H. Yan, Z. Shi, and J.-H. Cui, “DBR:
Depth-Based Routing for Underwater
Sensor Networks,” in IFIP Networking,
2008.
[9]. S. Biswas and R. Morris, “Opportunistic
Routing in Multi-Hop Wireless Networks,”
in SIGCOMM, 2005.
[10]. H. Dubois-Ferriere, M. Grossglauser, and
M. Vetterli, “Least-Cost Opportunistic
Routing,” in Allerton, 2007.
[11]. C. E. Perkins and E. M. Royer, “Ad-hoc
on-demand distance vector routing,” in
IEEE Workshop on Mobile Computing Sys.
and Apps., 1997.
[12]. C. E. Perkins and P. Bhagwat, “Highly
dynamic destination sequenced distance-
vector routing (dsdv) for mobile
computers,” in SIGCOMM, 1994.
[13]. D. B. Johnson and D. A. Maltz, “Dynamic
source routing in ad hoc wireless
networks,” Mobile Computing, pp. 153–
181, 1996.
[14]. Clausen and P. Jacquet, “Optimized Link
State Routing Protocol (OLSR),” IETF
RFC 3626, 2003.
[15]. Jun-Hong Cui, Jiejun Kong, Mario Gerla
and Shengli Zhou, " Challenges: Building
Scalable Mobile Underwater Wireless
Sensor Networks for Aquatic
Applications", IEEE Network, Special
Issue on Wireless Sensor Networking, Vol.
20, No. 3, pp.12-18, May/June 2006.
[16]. B. Zhang, G.S. Sukhatme, A.A. Requicha,
Adaptive sampling for marine
microorganism monitoring, in: IEEE/RSJ
International Conference on Intelligent
Robots and Systems, 2004.
[17]. http://www.hydrointernational.com/files/pr
oductsurvey_v_pdfdocument_15.pdf
Authors Profile
Shreyas M.S is currently Pursuing
Master of Technology in Computer
Network Engineering from The
Oxford College of Engineering under
Visvesvaraya Technological
University (VTU), India and has
received the Bachelor of Engineering
in Information Science and
Engineering in 2011 from VTU,
India. His area of interest is
Terrestrial and Acoustic Wireless
Sensor Networks.
Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771
771 | P a g e

More Related Content

What's hot

Development of an FHMA-based Underwater Acoustic Communications System for Mu...
Development of an FHMA-based Underwater Acoustic Communications System for Mu...Development of an FHMA-based Underwater Acoustic Communications System for Mu...
Development of an FHMA-based Underwater Acoustic Communications System for Mu...
Waqas Tariq
 
Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...
IAEME Publication
 
STATE-OF-THE-ART OF THE PHYSICAL LAYER IN UNDERWATER WIRELESS SENSOR NETWORKS
STATE-OF-THE-ART OF THE PHYSICAL LAYER IN UNDERWATER WIRELESS SENSOR NETWORKSSTATE-OF-THE-ART OF THE PHYSICAL LAYER IN UNDERWATER WIRELESS SENSOR NETWORKS
STATE-OF-THE-ART OF THE PHYSICAL LAYER IN UNDERWATER WIRELESS SENSOR NETWORKS
ijwmn
 
19 9255 nautical ad hoc network application edit septian
19 9255 nautical ad hoc network application edit septian19 9255 nautical ad hoc network application edit septian
19 9255 nautical ad hoc network application edit septian
IAESIJEECS
 
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
theijes
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficient
IJCNCJournal
 
Performance Analysis of OFDM system using LS, MMSE and Less Complex MMSE in t...
Performance Analysis of OFDM system using LS, MMSE and Less Complex MMSE in t...Performance Analysis of OFDM system using LS, MMSE and Less Complex MMSE in t...
Performance Analysis of OFDM system using LS, MMSE and Less Complex MMSE in t...
AM Publications
 
Underwater acoustic 1
Underwater acoustic 1Underwater acoustic 1
Underwater acoustic 1
kanusinghal3
 
Thesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor NetworksThesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor NetworksGunilla Burrowes
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor networkSrija Kumar
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
Mphasis
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
Shubham Srivastava
 
underwater wireless communication.
underwater wireless communication.underwater wireless communication.
underwater wireless communication.
Poonam Jamakhandi
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
Şüheda Acar
 
Underwater Object Detection and Tracking Using Electromagnetic Waves
Underwater Object Detection and Tracking Using Electromagnetic WavesUnderwater Object Detection and Tracking Using Electromagnetic Waves
Underwater Object Detection and Tracking Using Electromagnetic Waves
Musbiha Binte Wali
 
IRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater CommunicationIRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater Communication
IRJET Journal
 

What's hot (18)

Development of an FHMA-based Underwater Acoustic Communications System for Mu...
Development of an FHMA-based Underwater Acoustic Communications System for Mu...Development of an FHMA-based Underwater Acoustic Communications System for Mu...
Development of an FHMA-based Underwater Acoustic Communications System for Mu...
 
Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...Architectural study of littoral zone sensing using underwater acoustic wirele...
Architectural study of littoral zone sensing using underwater acoustic wirele...
 
STATE-OF-THE-ART OF THE PHYSICAL LAYER IN UNDERWATER WIRELESS SENSOR NETWORKS
STATE-OF-THE-ART OF THE PHYSICAL LAYER IN UNDERWATER WIRELESS SENSOR NETWORKSSTATE-OF-THE-ART OF THE PHYSICAL LAYER IN UNDERWATER WIRELESS SENSOR NETWORKS
STATE-OF-THE-ART OF THE PHYSICAL LAYER IN UNDERWATER WIRELESS SENSOR NETWORKS
 
19 9255 nautical ad hoc network application edit septian
19 9255 nautical ad hoc network application edit septian19 9255 nautical ad hoc network application edit septian
19 9255 nautical ad hoc network application edit septian
 
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...Design of Underwater wireless optical/acoustic link for reduction of back-sca...
Design of Underwater wireless optical/acoustic link for reduction of back-sca...
 
Fuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficientFuzzy based clustering and energy efficient
Fuzzy based clustering and energy efficient
 
Performance Analysis of OFDM system using LS, MMSE and Less Complex MMSE in t...
Performance Analysis of OFDM system using LS, MMSE and Less Complex MMSE in t...Performance Analysis of OFDM system using LS, MMSE and Less Complex MMSE in t...
Performance Analysis of OFDM system using LS, MMSE and Less Complex MMSE in t...
 
Underwater acoustic 1
Underwater acoustic 1Underwater acoustic 1
Underwater acoustic 1
 
50120140502016
5012014050201650120140502016
50120140502016
 
Thesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor NetworksThesis_Underwater Swarm Sensor Networks
Thesis_Underwater Swarm Sensor Networks
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Underwater acoustic sensor network
Underwater acoustic sensor networkUnderwater acoustic sensor network
Underwater acoustic sensor network
 
Underwater Wireless Communication
Underwater Wireless CommunicationUnderwater Wireless Communication
Underwater Wireless Communication
 
underwater wireless communication.
underwater wireless communication.underwater wireless communication.
underwater wireless communication.
 
Underwater wireless sensor networks
Underwater wireless sensor networksUnderwater wireless sensor networks
Underwater wireless sensor networks
 
Underwater Object Detection and Tracking Using Electromagnetic Waves
Underwater Object Detection and Tracking Using Electromagnetic WavesUnderwater Object Detection and Tracking Using Electromagnetic Waves
Underwater Object Detection and Tracking Using Electromagnetic Waves
 
IRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater CommunicationIRJET- A Survey of Underwater Communication
IRJET- A Survey of Underwater Communication
 
RF Communication
RF CommunicationRF Communication
RF Communication
 

Viewers also liked

Dq34713721
Dq34713721Dq34713721
Dq34713721
IJERA Editor
 
Dt34733739
Dt34733739Dt34733739
Dt34733739
IJERA Editor
 
Eb34777780
Eb34777780Eb34777780
Eb34777780
IJERA Editor
 
Cr34562565
Cr34562565Cr34562565
Cr34562565
IJERA Editor
 
Ej34821826
Ej34821826Ej34821826
Ej34821826
IJERA Editor
 
Dw34752755
Dw34752755Dw34752755
Dw34752755
IJERA Editor
 
Eq34877880
Eq34877880Eq34877880
Eq34877880
IJERA Editor
 
Eo34861869
Eo34861869Eo34861869
Eo34861869
IJERA Editor
 
Ex34922926
Ex34922926Ex34922926
Ex34922926
IJERA Editor
 
Dd34640647
Dd34640647Dd34640647
Dd34640647
IJERA Editor
 
Dg34662666
Dg34662666Dg34662666
Dg34662666
IJERA Editor
 
Cw34597599
Cw34597599Cw34597599
Cw34597599
IJERA Editor
 
Di34672675
Di34672675Di34672675
Di34672675
IJERA Editor
 
Fa34936941
Fa34936941Fa34936941
Fa34936941
IJERA Editor
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
IJERA Editor
 
Gf3111931199
Gf3111931199Gf3111931199
Gf3111931199
IJERA Editor
 
OBJETOS DE APRENDIZAJE
OBJETOS DE APRENDIZAJEOBJETOS DE APRENDIZAJE
OBJETOS DE APRENDIZAJE
CINDY Verdezoto
 
Trabajo de informatica
Trabajo de informaticaTrabajo de informatica
Trabajo de informaticaluxor123100
 
nuevo Convención colectiva 2012-2013
nuevo Convención colectiva  2012-2013nuevo Convención colectiva  2012-2013
nuevo Convención colectiva 2012-2013angel Perez
 
Rutina primero 19
Rutina primero 19Rutina primero 19
Rutina primero 19cahumada321
 

Viewers also liked (20)

Dq34713721
Dq34713721Dq34713721
Dq34713721
 
Dt34733739
Dt34733739Dt34733739
Dt34733739
 
Eb34777780
Eb34777780Eb34777780
Eb34777780
 
Cr34562565
Cr34562565Cr34562565
Cr34562565
 
Ej34821826
Ej34821826Ej34821826
Ej34821826
 
Dw34752755
Dw34752755Dw34752755
Dw34752755
 
Eq34877880
Eq34877880Eq34877880
Eq34877880
 
Eo34861869
Eo34861869Eo34861869
Eo34861869
 
Ex34922926
Ex34922926Ex34922926
Ex34922926
 
Dd34640647
Dd34640647Dd34640647
Dd34640647
 
Dg34662666
Dg34662666Dg34662666
Dg34662666
 
Cw34597599
Cw34597599Cw34597599
Cw34597599
 
Di34672675
Di34672675Di34672675
Di34672675
 
Fa34936941
Fa34936941Fa34936941
Fa34936941
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 
Gf3111931199
Gf3111931199Gf3111931199
Gf3111931199
 
OBJETOS DE APRENDIZAJE
OBJETOS DE APRENDIZAJEOBJETOS DE APRENDIZAJE
OBJETOS DE APRENDIZAJE
 
Trabajo de informatica
Trabajo de informaticaTrabajo de informatica
Trabajo de informatica
 
nuevo Convención colectiva 2012-2013
nuevo Convención colectiva  2012-2013nuevo Convención colectiva  2012-2013
nuevo Convención colectiva 2012-2013
 
Rutina primero 19
Rutina primero 19Rutina primero 19
Rutina primero 19
 

Similar to Dz34765771

ENERGY EFFICIENT ROUTING ALGORITHM FOR VOID AVOIDANCE IN UWSN USING RESIDUAL ...
ENERGY EFFICIENT ROUTING ALGORITHM FOR VOID AVOIDANCE IN UWSN USING RESIDUAL ...ENERGY EFFICIENT ROUTING ALGORITHM FOR VOID AVOIDANCE IN UWSN USING RESIDUAL ...
ENERGY EFFICIENT ROUTING ALGORITHM FOR VOID AVOIDANCE IN UWSN USING RESIDUAL ...
IJCNCJournal
 
Priority based energy efficient hybrid cluster routing protocol for underwate...
Priority based energy efficient hybrid cluster routing protocol for underwate...Priority based energy efficient hybrid cluster routing protocol for underwate...
Priority based energy efficient hybrid cluster routing protocol for underwate...
IJECEIAES
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Energy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewEnergy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A Review
TELKOMNIKA JOURNAL
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
ijfcstjournal
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Editor IJCATR
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
IJTET Journal
 
An implementation of_partial_transmit_se
An implementation of_partial_transmit_seAn implementation of_partial_transmit_se
An implementation of_partial_transmit_se
Waleed Raza
 
Underwater localization and node mobility estimation
Underwater localization and node mobility estimationUnderwater localization and node mobility estimation
Underwater localization and node mobility estimation
IJECEIAES
 
Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless Network
SunilPoddar7
 
GPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic NetworksGPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic Networks
CSCJournals
 
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
IRJET Journal
 
A Review on Routing Protocols for Underwater Wireless Sensor Networks
A Review on Routing Protocols for Underwater Wireless Sensor NetworksA Review on Routing Protocols for Underwater Wireless Sensor Networks
A Review on Routing Protocols for Underwater Wireless Sensor Networks
IRJET Journal
 
Under water acoustic (uw a) communication architecture and the key notions of...
Under water acoustic (uw a) communication architecture and the key notions of...Under water acoustic (uw a) communication architecture and the key notions of...
Under water acoustic (uw a) communication architecture and the key notions of...
eSAT Publishing House
 
Under water acoustic (uw a) communication architecture and the key notions of...
Under water acoustic (uw a) communication architecture and the key notions of...Under water acoustic (uw a) communication architecture and the key notions of...
Under water acoustic (uw a) communication architecture and the key notions of...
eSAT Journals
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
frestoadi
 
Measuring the underwater received power behavior for 433 mhz radio frequency ...
Measuring the underwater received power behavior for 433 mhz radio frequency ...Measuring the underwater received power behavior for 433 mhz radio frequency ...
Measuring the underwater received power behavior for 433 mhz radio frequency ...
journalBEEI
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...
IJECEIAES
 
Review on Localization based Routing Protocols for Underwater Wireless Sensor...
Review on Localization based Routing Protocols for Underwater Wireless Sensor...Review on Localization based Routing Protocols for Underwater Wireless Sensor...
Review on Localization based Routing Protocols for Underwater Wireless Sensor...
IJECEIAES
 

Similar to Dz34765771 (20)

ENERGY EFFICIENT ROUTING ALGORITHM FOR VOID AVOIDANCE IN UWSN USING RESIDUAL ...
ENERGY EFFICIENT ROUTING ALGORITHM FOR VOID AVOIDANCE IN UWSN USING RESIDUAL ...ENERGY EFFICIENT ROUTING ALGORITHM FOR VOID AVOIDANCE IN UWSN USING RESIDUAL ...
ENERGY EFFICIENT ROUTING ALGORITHM FOR VOID AVOIDANCE IN UWSN USING RESIDUAL ...
 
Priority based energy efficient hybrid cluster routing protocol for underwate...
Priority based energy efficient hybrid cluster routing protocol for underwate...Priority based energy efficient hybrid cluster routing protocol for underwate...
Priority based energy efficient hybrid cluster routing protocol for underwate...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Energy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A ReviewEnergy Efficient Routing Protocols for UWSN: A Review
Energy Efficient Routing Protocols for UWSN: A Review
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
An implementation of_partial_transmit_se
An implementation of_partial_transmit_seAn implementation of_partial_transmit_se
An implementation of_partial_transmit_se
 
Underwater localization and node mobility estimation
Underwater localization and node mobility estimationUnderwater localization and node mobility estimation
Underwater localization and node mobility estimation
 
Underwater Sensor wireless Network
Underwater Sensor wireless NetworkUnderwater Sensor wireless Network
Underwater Sensor wireless Network
 
GPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic NetworksGPS-less Localization Protocol for Underwater Acoustic Networks
GPS-less Localization Protocol for Underwater Acoustic Networks
 
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
 
A Review on Routing Protocols for Underwater Wireless Sensor Networks
A Review on Routing Protocols for Underwater Wireless Sensor NetworksA Review on Routing Protocols for Underwater Wireless Sensor Networks
A Review on Routing Protocols for Underwater Wireless Sensor Networks
 
Under water acoustic (uw a) communication architecture and the key notions of...
Under water acoustic (uw a) communication architecture and the key notions of...Under water acoustic (uw a) communication architecture and the key notions of...
Under water acoustic (uw a) communication architecture and the key notions of...
 
Under water acoustic (uw a) communication architecture and the key notions of...
Under water acoustic (uw a) communication architecture and the key notions of...Under water acoustic (uw a) communication architecture and the key notions of...
Under water acoustic (uw a) communication architecture and the key notions of...
 
Underwater sensor network
Underwater sensor networkUnderwater sensor network
Underwater sensor network
 
Measuring the underwater received power behavior for 433 mhz radio frequency ...
Measuring the underwater received power behavior for 433 mhz radio frequency ...Measuring the underwater received power behavior for 433 mhz radio frequency ...
Measuring the underwater received power behavior for 433 mhz radio frequency ...
 
An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...An energy aware scheme for layered chain in underwater wireless sensor networ...
An energy aware scheme for layered chain in underwater wireless sensor networ...
 
Review on Localization based Routing Protocols for Underwater Wireless Sensor...
Review on Localization based Routing Protocols for Underwater Wireless Sensor...Review on Localization based Routing Protocols for Underwater Wireless Sensor...
Review on Localization based Routing Protocols for Underwater Wireless Sensor...
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Dz34765771

  • 1. Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771 765 | P a g e Anti-Void Traversal Mechanism Using Pressure Routing For Underwater Sensor Networks Shreyas M.S1 , Prof. D. Jayaramaiah2 1 M.Tech Student, 2 Head of the dept, Department of Information Science Engineering The Oxford College of Engineering VTU Bangalore, India Abstract Underwater acoustic sensor networks have recently been proposed as a way to explore and capture oceanographic data to monitor underwater environments. A specialized geographic routing problem called pressure routing that directs a packet to any sonobuoys on the surface based on depth information available from on-board pressure gauges. In this respect, the efficient handling of void areas in the acoustic network is the main challenge of pressure routing. It was recently proven that the greedy stateless perimeter routing method, very popular in terrestrial networks, cannot be extended to void recovery in acoustic networks. In order to remedy this problem, the existing protocol Depth based routing is enhanced. The proposed solution takes advantage of what is already inherited as a natural part of geographic routing to provide clues on the routing direction for data packets with minimal overhead to navigate around the voids. The proposed solution that uses depth information, sequence number and hop count and exploits opportunistic beacon packet receptions to circumvent void areas and efficiently progress towards the destination when choosing forwarding nodes the proposed solution follows this direction by embedding small amounts of trace routing data in each beaconing packet to inform neighboring nodes about the broadcasting node’s status as a local maxima or dead end node and avoid routing to nodes which may lead to a void in the network. Index Terms— Pressure Routing, Geographic Routing, Opportunistic data forwarding, Any-cast Routing. I. INTRODUCTION Underwater sensor networks (UWSNs) communications are becoming increasingly important, with numerous applications emerging in military tactical surveillance applications, oceanographic data collection environmental and pollution monitoring [1], [2]. Underwater acoustic networking is the enabling technology for these applications. In underwater networks, to perform collaborative monitoring tasks over a given area a variable number of sensors and vehicles that are deployed forming a sea Swarm (Sensor Equipped Aquatic Swarm) that moves as a group with water current [3], [4]. Each sensor is equipped with a low bandwidth acoustic modem and with various sensors (e.g., Drogues [5]). Moreover, it can control its depth through a fish-like bladder apparatus and a pressure gauge. The swarm is escorted by sonobuoys at the sea surface that are equipped with both acoustic and radio (e.g., Wi-Fi or Satellites) communications and GPS (See Fig 1). Fig 1: Sea swarm architecture Our goal in this paper is to design an efficient any cast routing protocol for underwater data collection that addresses several challenges that are unique to underwater communications like the underwater acoustic channel is prone to packet losses and severely constrained by long propagation latency and low bandwidth (usually less than 100Kbps) [16] and collisions in a congested network. Energy efficiency is a critical factor as well, given that acoustic transmissions consume far more energy than terrestrial radio communications (reception to transmission power ratio of 1:125 [17]). The existing terrestrial routing protocols (e.g., OLSR [14], DSDV [12], AODV [11], DSR [13]) can be modified in mobile underwater networks to support any-cast routing. This approach has few shortcomings: (1) it is challenging to incorporate opportunistic forwarding mechanisms (e.g., ExOR [9], LCOR [10]) into the stateful routing protocols due to node mobility (2) these protocols require frequent systematic flooding and route
  • 2. Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771 766 | P a g e maintenance with neighboring nodes, which are very expensive operations under water. In Acoustic networks, recent researches has been directed to geographic routing because it does not require any link state exchanges or route maintenances (i.e., stateless and localized). Another key advantage of geographic routing is that it enables localized geo-opportunistic forwarding; i.e., a subset of nodes that have correctly received the packet can collaboratively schedule a packet transmission to maximize its progress toward the destination [15]. Note that our geographic routing problem is specialized in that it is any-cast to any buoy on the surface. Thus, it suffices to route a packet upwards to shallower depths. Given that the onboard hydraulic pressure gauge can accurately estimate depth (avg. error < 1m ), we can use depth information for geographic any-cast routing (called pressure routing). A simple greedy pressure routing often fails in sparse underwater networks due to the presence of void Nodes — packets must be routed around such routing holes. As depicted in Fig. 2, a data packet originating from node c may eventually be routed to a local maximum node g when greedily forwarded based on depth (via path P1). Node g cannot make any progress toward the surface because it does not have any neighboring node with depth shallower than its own. Node g must thus perform a route recovery process to get around the void via path P2. For Underwater networks, there is no efficient routing algorithm that delivers messages deterministically even in the presence of void nodes. Therefore several recovery methods was proposed such as 2D void surface flooding and random walks [15]. These methods also have a drawback: some of the nodes around a void area will eventually route packets to local maxima (called trapped nodes, e.g., node i and h in Fig. 1), and any nodes located beneath the trapped nodes can potentially suffer from route hop stretch because local greedy forwarding may lead packets to local maxima and then invoke fallback mechanisms. For example in Fig.2, node c’s packet is greedily forwarded to the local maxima via path P1 and then is re-routed via path P2 (total 7 hops), whereas this packet can be directly delivered via path P3 (total 3 hops). Note that these problems will be more pronounced when the number of sonobuoys is sparse or when node density is low. This drawback of pressure routing is inherently due to the nodes’ blindness to the network topology, as they make localized routing decisions. Fig. 2. Greedy Pressure Routing. In this paper, pressure routing is improved by providing nodes with a partial view of the network topology such that greedy pressure routing is guided by soft-state breadcrumbs (i.e., up/down directions) from the sonobuoys. This soft-state breadcrumb approach, which exploits periodic beaconing to build directional trails toward the surface nodes utilize geo-opportunistic forwarding along the directional trails. The rest of the paper in organized as follows. In section II, review the related work in field. In section III, provide a detailed description of proposed techniques. In section IV, provide a details about parameters used for simulation and validate the performance of proposed approach by comparing it with existing approach. In section V, conclude the paper. II. RELATED WORK Underwater Sensor Networks are attracting the attention of industry and academia as well [15]. At one side, it can enable a wide range of aquatic applications, and on the same time, adverse environmental conditions create a range of challenges for underwater communication and networking. Major challenges in the design of underwater acoustic networks are:  Battery power is limited and usually batteries cannot be recharged, because solar energy cannot be exploited;  Channel characteristics, including long and variable propagation delays, multi-path and fading problems;  The available bandwidth is severely limited;  High bit error rates;  Underwater sensors are prone to failures because of fouling, corrosion, etc. The main issues for development for routing protocols for underwater sensor network.  Harsh deployment environment is the major challenging factor which comes under routing protocol for underwater sensor network.  Bandwidth capacity is low because routing protocol for underwater sensor network comes from high bit error rates.
  • 3. Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771 767 | P a g e  Node mobility is also another concern which comes under routing protocol for underwater sensor network because if they are not anchored at the bottom of the sea. This situation conclusion in a dynamic topology  Radio single are not efficient compare to routing protocol for underwater sensor network. Because it provides high propagation delays.  High propagation delays are the major factor of routing protocol for underwater sensor network. The applications for underwater acoustic sensor networks:  Environmental monitoring. UW-ASNs can perform pollution monitoring (chemical, biological and nuclear). For example, it may be possible to detail the chemical slurry of antibiotics, estrogen-type hormones and insecticides to monitor streams, rivers, lakes and ocean bays (water quality in situ analysis). Monitoring of ocean currents and winds, improved weather forecast, detecting climate change, under-standing and predicting the effect of human activities on marine ecosystems, biological monitoring such as tracking of fishes or micro-organisms, are other possible applications. For example, in [16], the design and construction of a simple underwater sensor network is described to detect extreme temperature gradients (thermoclines), which are considered to be a breeding ground for certain marine micro- organisms.  Undersea explorations. Underwater sensor networks can help detecting underwater oilfields or reservoirs, determine routes for laying undersea cables, and assist in exploration for valuable minerals.  Disaster prevention. Sensor networks that measure seismic activity from remote locations can provide tsunami warnings to coastal areas, or study the effects of submarine earthquakes (seaquakes).  Assisted navigation. Sensors can be used to identify hazards on the seabed, locate dangerous rocks or shoals in shallow waters, mooring positions, submerged wrecks, and to perform bathymetry profiling. Underwater Routing Protocols: Vector-Based Forwarding (VBF) [6] prescribes that packets be forwarded to the nodes that are located within a route of the given width between the source and the destination. This relay selection algorithm saves energy consumption by reducing the number of packet relays. Note that there are also geographic routing protocols that exploit the opportunistic forwarding features in underwater environments [7]. Pressure Routing: Yan et al. proposed a greedy any-cast routing solution called Depth Based Routing (DBR) [8]. They suggested that packet forwarding decisions be made locally based on the pressure (or depth) level measured at each node. Packets would then be geographically forwarded to nodes with shallower depth in a greedy fashion toward the water surface. DBR exploits the simultaneous packet reception induced by the broadcast nature of the wireless medium and performs opportunistic greedy forwarding via a subset of the neighbors that have received the packet correctly. However, DBR lacks an efficient forwarding set selection method and a recovery method from local maxima. Therefore, recent research in underwater networks has been directed to position-based or geographic routing because it does not require any link state exchanges or route maintenances (i.e., stateless and localized). Thus, it suffices to route a packet upwards to shallower depths. Given that the onboard hydraulic pressure gauge can accurately estimate depth, we can use depth information for geographic any-cast routing (called pressure routing). Opportunistic Routing: Most opportunistic routing protocols (also called any-path routing) such as ExOR [9], Least Cost Opportunistic Routing (LCOR) [10], which do not use geographic information, require global topology and link quality information (like link state routing) to find a set of forwarding groups toward the destination; thus, they are more suitable for static wireless mesh or sensor networks. In practice, geographic routing can also benefit from opportunistic forwarding, as in Geographic Random Forwarding (GeRaF) [13], Contention Based Forwarding (CBF) [14], and Focused Beam Routing (FBR) [15], though these methods are not optimal due to lack of global knowledge. In the literature, researchers have typically used a geometric shape (e.g., a triangle/cone [14], [15]) that is faced toward the destination for forwarding set selection to prevent hidden terminal problems. III. PROPOSED TECHNIQUES The proposed Anti-Void (AV) technique consists of three components, namely Routing Initialization, Enhanced Periodic Beaconing and Opportunistic directional data forwarding. A. Routing Initialization The Sonobuoys uses Enhanced Periodic Beaconing method to propagate their reachability information to sensor nodes. Each node’s beacon is augmented with additional information, namely the NodeID (), sender’s depth π() (or pressure level), hop count to a sonobuoys hop_count(),
  • 4. Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771 768 | P a g e sequence number seq_num() and its current data forwarding direction DF_dir() (toward the surface). When receiving the augmented beacons from predecessors, each node updates its variables, namely minimal hop to the surface, sequence number, data forwarding direction, and next-hop data forwarding direction NDF_dir() (i.e., predecessor’s data forwarding direction). B. Enhanced Periodic Beaconing In the beginning, every sonobuoys on the surface initializes these variables and starts beaconing. After receiving a beacon message, a node can tell whether it has received the message from deeper or shallower depth, and each node sets its data forwarding direction toward the surface. The direction is set as up when a beacon is received from a shallower depth node; otherwise, it is set as down. When multiple direction cues from different sonobuoys are received, the direction cue with the minimal hop count is chosen. Also, a node’s next- hop data forwarding direction is set based on the beacon sender’s data forwarding direction. For instance, in Fig. 2, since node d/e receives a beacon message from a shallower depth node, it sets its data forwarding direction and next-hop data forwarding direction as up-up, respectively. In contrast, when node I receives a beacon message from a deeper depth node (i.e., node d), it sets its data forwarding direction and next hop data forwarding direction as down-up, respectively. After updating its local states, each node prepares a beacon message to broadcast by incrementing the hop count and setting its current depth, data forwarding direction, and sequence number. This beaconing process will repeat, and thus, nodes essentially build directional trails toward their closes sonobuoys on the surface. Note that a direction change is caused by voids; e.g., in Fig. 2, path P3 has only a single direction (up), whereas path P2 experiences a direction change due to the void (down and up). Fig. 3. Enhanced Periodic Beaconing In a beacon message, nodes embed their local states, namely current hop-count, sequence number, depth, and data forwarding direction. To minimize the chance of collisions and synchronization, nodes add random jitters for periodic beaconing using timers when they broadcast beacon messages; then, the nodes set up a new timeout for the next beaconing. After receiving a beacon message, each node checks the validation of the received beacon by checking the sequence number (increasing) and hop-count (smaller), and each node sets its data forwarding direction and updates its next-hop data forwarding direction. As illustrated earlier, the direction is set as up if a beacon message is received from a shallower depth node; otherwise, it is set as down. After the data forwarding direction is set, a node’s next-hop data forwarding direction is also updated based on the data forwarding direction of the beacon sender. Note that when multiple direction cues from different sonobuoys are received, the direction cue with minimal hop count is deterministically chosen. Fig. 3 shows an example to illustrate beacon propagation. The sonobuoys initializes a beacon message after the beacon timer has expired and then broadcasts the beacon message with the sequence number (= 0), depth (= 0), data forwarding direction (=up), and hop count (= 0). Node a receives the beacon and finds that it is a new beacon with a higher sequence number and sets its status (e.g., seq_num = 0 with incremented hop_count(a) = 1). By comparing the depth, node a sets DF_dir(a) as up, and NDF_dir(a) (i.e., the sonobuoys data forwarding direction) as up. Node a will broadcast an updated beacon, and node b will perform a similar procedure, which will be continued. Later, node x receives a beacon message from node b; it then updates DF_dir(x) as down based on the depth difference and NDF_dir(x) as DF_dir(b) = up. Node x will broadcast an updated beacon message. After these changes are announced via a beacon message, node y receives the beacon message and will maintain DF_dir(y) and NDF_dir(y) as down-down. On the basis of this beacon and update process, nodes will set up a set of directional trails toward any one of the sonobuoys. When multiple direction cues from different sonobuoys are received, direction flapping may occur. Then proposed solution uses the sequence number and hop count to prevent such flapping. C. Opportunistic Directional Data Forwarding The nodes forward data packets solely based on the data forwarding direction (DF_dir) and next-hop data forwarding direction (NDF_dir). Each node sets up the data forwarding direction (either up or down) that is the opposite direction of the beacon reception direction. If this direction is up, we use
  • 5. Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771 769 | P a g e greedy upward forwarding; otherwise, we use greedy downward forwarding. As the data packet is forwarded upward beneath the concave area of voids, a change of data forwarding direction is inevitable. Data forwarding direction alone cannot provide sufficient information to route packets to the destination. In conjunction, we use the next-hop data forwarding direction, which was the predecessor’s data forwarding direction during beacon propagation and now becomes the next-hop’s data forwarding direction. The forwarding node uses the next-hop’s data forwarding direction as an additional direction constraint to ensure that routing properly follows the direction trails; i.e., among all neighboring nodes, a neighboring nodes whose data forwarding directions are equal to the next-hop data forwarding direction of the current node. Therefore, there are only four possible cases of data forwarding and next-hop data forwarding direction setting: up-up, down-down, down-up, and up-down. Consider an example scenario depicted in Fig. 4. In particular, let us take a look at the nodes a, b, and x. Here, node x is a trapped node that eventually delivers packets to the local maximum via greedy upward forwarding. DF_dir and NDF_dir of nodes a and b are up-up, whereas those of node x are dn-up. Let us say that there is a packet to send in node b. Node b’s DF_dir is up and will consider nodes whose depth is shallower than that of node b, namely nodes a and x. Since node x’s DF_dir (down) does not match with that of NDF_dir (up), the trapped node x is filtered out, and node a is only considered as a forwarding candidate for local greedy “upward” forwarding. Fig. 4. Opportunistic Directional Data Forwarding IV. SIMULATIONS  Simulation setup A simulation is performed on set of network topologies with varying number of sensor nodes. The nodes will be allowed to move over the network location. Meanwhile, additional 4 nodes are deployed on the upper surface of the region to simulate the presence of Sonobuoys (sink node) and assumption that these Sonobuoys will be static. The parameters which are considered in the simulation are listed in the table below  Simulation results The network connectivity is analysed first and its impact on the performance of greedy forwarding under different node and sonobuoys densities. Comparative study between the proposed solution and existing DBR protocol [8] is made. Extensive simulation results show that proposed solution outperforms existing DBR protocol. Fig. 5: Energy consumption per message Fig. 5 shows the average energy consumption per message. Energy consumption per message decreases as the number of deployed nodes increases. A higher number of deployed nodes consequently can yield more chances for greedy upward forwarding to succeed without requiring a route recovery process to reach any of the sonobuoys, resulting in less energy consumption per message. PARAMETER VALUE Area 800m * 800m Simulation Time 120 sec Number of nodes 50-300 Number of Sink Nodes 4 Transmission Range 200m Initial battery pack 1000 J Tx Power 20 W [17] Rx Power 600 mW [17] Idle Mode Power 5 mW Data rate 100 Kbps Packet size 500 Kb
  • 6. Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771 770 | P a g e Fig 6: Packet Delivery Ratio Fig. 6 shows the average packet delivery ratio. As the number of nodes increases probability of error occurred during routing will be less. Although a packet may reach the sinks multiple times, these redundant packets are considered as only one distinct packet. V. CONCLUSION In this paper, the proposed solution which exploits periodic beaconing to build directional path towards the surface by avoiding void regions and features opportunistic directional forwarding for packet delivery. The extensive simulations showed that proposed solution outperforms existing scheme by significantly lowering the frequency of recovery fall-backs and by reducing the energy consumption. REFERENCES [1]. J. Kong, J.-H. Cui, D. Wu, and M. Gerla, “Building Underwater Ad-hoc Networks and Sensor Networks for Large Scale Real- time Aquatic Applications,” in IEEE MILCOM, 2005. [2]. I. F. Akyildiz, D. Pompili, and T. Melodia, “Underwater Acoustic Sensor Networks: Research Challenges,” Elsevier Ad Hoc Networks, 2005. [3]. U. Lee, J. Kong, J.-S. Park, E. Magistretti, and M. Gerla. Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods. In ISCC’06, June 2006. [4]. Z. Zhou, J.-H. Cui, and A. Bagtzoglou. Scalable Localization with Mobility Prediction for Underwater Sensor Networks. In INFOCOM’08, Apr. 2008. [5]. J. Jaffe and C. Schurgers. Sensor Networks of Freely Drifting Autonomous Underwater Explorers. In WUWNet’06, Sep. 2006. [6]. P. Xie, J.-H. Cui, and L. Lao, “Vbf: Vector- based forwarding protocol for underwater sensor networks.” in Networking, 2006. [7]. J. M. Jornet, M. Stojanovic, and M. Zorzi, “Focused Beam Routing Protocol for Underwater Acoustic Networks,” in WUWNet’08, Sep. 2008. [8]. H. Yan, Z. Shi, and J.-H. Cui, “DBR: Depth-Based Routing for Underwater Sensor Networks,” in IFIP Networking, 2008. [9]. S. Biswas and R. Morris, “Opportunistic Routing in Multi-Hop Wireless Networks,” in SIGCOMM, 2005. [10]. H. Dubois-Ferriere, M. Grossglauser, and M. Vetterli, “Least-Cost Opportunistic Routing,” in Allerton, 2007. [11]. C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in IEEE Workshop on Mobile Computing Sys. and Apps., 1997. [12]. C. E. Perkins and P. Bhagwat, “Highly dynamic destination sequenced distance- vector routing (dsdv) for mobile computers,” in SIGCOMM, 1994. [13]. D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” Mobile Computing, pp. 153– 181, 1996. [14]. Clausen and P. Jacquet, “Optimized Link State Routing Protocol (OLSR),” IETF RFC 3626, 2003. [15]. Jun-Hong Cui, Jiejun Kong, Mario Gerla and Shengli Zhou, " Challenges: Building Scalable Mobile Underwater Wireless Sensor Networks for Aquatic Applications", IEEE Network, Special Issue on Wireless Sensor Networking, Vol. 20, No. 3, pp.12-18, May/June 2006. [16]. B. Zhang, G.S. Sukhatme, A.A. Requicha, Adaptive sampling for marine microorganism monitoring, in: IEEE/RSJ International Conference on Intelligent Robots and Systems, 2004. [17]. http://www.hydrointernational.com/files/pr oductsurvey_v_pdfdocument_15.pdf Authors Profile Shreyas M.S is currently Pursuing Master of Technology in Computer Network Engineering from The Oxford College of Engineering under Visvesvaraya Technological University (VTU), India and has received the Bachelor of Engineering in Information Science and Engineering in 2011 from VTU, India. His area of interest is Terrestrial and Acoustic Wireless Sensor Networks.
  • 7. Shreyas M.S, Prof. D. Jayaramaiah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.765-771 771 | P a g e