Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Joint High-Order Synchrosqueezing Transform and Multi-Taper Empirical Wavelet Transform for Fault Diagnosis of Wind Turbine Planetary Gearbox under Nonstationary Conditions
Next Article in Special Issue
A Localization-Free Interference and Energy Holes Minimization Routing for Underwater Wireless Sensor Networks
Previous Article in Journal
Exploring the Efficacy of Platinum and Palladium Nanostructures for Organic Molecule Detection via Raman Spectroscopy
Previous Article in Special Issue
Research on Localization Algorithms Based on Acoustic Communication for Underwater Sensor Networks
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Retransmission Avoidance for Reliable Data Delivery in Underwater WSNs

1
COMSATS Institute of Information Technology, Islamabad 44000, Pakistan
2
College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(1), 149; https://doi.org/10.3390/s18010149
Submission received: 14 November 2017 / Revised: 27 December 2017 / Accepted: 4 January 2018 / Published: 7 January 2018
(This article belongs to the Special Issue Advances and Challenges in Underwater Sensor Networks)

Abstract

:
The energy-efficient and reliable delivery of data packets in resource constraint underwater wireless sensor networks (UWSNs) is one of the key considerations to enhance the network lifetime. The traditional re-transmissions approach consumes the node battery and increases the communication overhead, which results in congestion and affects the reliable data packet delivery in the network. To ensure the reliability and conserve the node battery, in this paper, we propose adaptive forwarding layer multipath power control routing protocol to reduce the energy dissipation, achieve the data reliability and avoid the energy hole problem. In order to achieve the reliability, tree based topology is exploited to direct multiple copies of the data packet towards the surface through cross nodes in the network. The energy dissipation is reduced by a substantial amount with the selection of low noise path between the source and the destination including the information of neighbors of the potential forwarder node. Extensive simulation results show that our proposed work outperforms the compared existing scheme in terms of energy efficiency and packet received ratio (PRR).

1. Introduction

Recent progress in underwater wireless sensor networks (UWSNs) has procured much attention and it encompasses an extensive range of applications like pollution monitoring, coastline surveillance, disaster prevention, oceanographic data collection, marine life monitoring, etc. [1]. UWSN is composed of sensor nodes deployed in the deep water which forward data to sink(s) situated off shore. Radio and optical waves used in terrestrial communication cannot be used in underwater environment because they get absorbed or scattered rapidly. Therefore, the acoustic signals emerge as a suitable choice due to low absorption rate.
Acoustic signals face high end-to-end delay because of low propagation speed, whereas, multipath fading, doppler effect, path loss, noises like shipping, wind, thermal, etc. cause high bit error rate (BER) resulting in low reliability and high energy consumption [2]. Acoustic signals are stronger near the source and get impaired from noises as they propagate away. Noise intensity in shallow water is high as compared to deep water. Therefore, less number of different paths are required in deep water to reduce the energy consumption. Sensor nodes are costly and equipped with limited batteries which are difficult to replace. Therefore, energy efficiency, maximum data gathering, reliable transfer and low delay are the objectives of protocol designing.
Some multipath routing protocols [3,4] have been proposed in recent years to achieve reliability. Data packets are forwarded linearly through different paths towards the sink(s) situated at the surface of the water. If these copies, which are less in number, somehow survived energy holes, there are high noises in shallow water which make them erroneous resulting in data packet drop at the sink and high energy consumption. Data packets are also forwarded by following tree structure in which every sensor node multicasts the data packet upon reception in its transmission range and becomes the parent while, the receivers further multicast data packet and make subtrees. The reception of multiple copies at the sink increases the chances of uncorrupted data packet reception. However, a high number of copies increases collision and energy consumption which is unbearable with the availability of limited node battery.
Authors of layered multipath power control (LMPC) [5] send multiple copies of a data packet by following binary tree structure packet. These copies are directed through different paths which faces low noise to achieve reliability. They are combined at the surface to generate original data packets. LMPC generates binary tree from every source node resulting in high energy utilization in dense network. Sparse regions created by random deployment or death of sensor nodes result in data packet drop because of void holes (unsensed zone) in LMPC.
In this paper, we propose forward layered multipath power control-one (FLMPC-One) and FLMPC-Two routing protocols to forward the data packets towards the surface through multiple paths with the aim of eliminating retransmissions and avoiding void holes. Retransmission increases delay and energy consumption which effects the performance of time critical scenarios. In order to reduce the energy dissipation, the network field is divided into multiple heterogenous sized layers. From each layer, the source node unicasts the data packet which resides near the layer, whereas, node on the layer known as cross node generates binary tree upon reception of the data packet by using IP multicast technology. Current forwarder in FLMPC-One forwards data when it is confident about finding neighbors up till two hops. While, FLMPC-Two uses three hops neighbor information. The goal of FLMPC-One and FLMPC-Two is to achieve energy efficiency and reliability of the data packet.
The main contributions are mentioned as follow:
  • Binary tree establishment from the sensor node lies on the layer nearest to the source node which results in less energy consumption.
  • In order to avoid void holes, the forwarder node sends data packet to that sensor node which further has one or two hop neighbor nodes in its transmission range.
  • Every data packet passing through sensor nodes lies on the layer which reduces the chance of retransmissions due to the reception of more than one copies at the sink.
The remainder of the paper is organized as follows: Section 2 provides an overview of existing routing protocols in UWSNs. In Section 3, a brief overview of FLMPC-One and FLMPC-Two is provided along with problem description in LMPC. Linear optimization of energy and throughput are discussed in Section 4. Section 5 consists of simulation results and performance evaluation of both proposed schemes and LMPC. In Section 5.3, performance trade offs are discussed. Finally, Section 6 presents conclusion.

2. Related Work

In this section, we describe recently proposed schemes which achieve energy efficiency and high throughput. For better understanding and in-depth knowledge, depth based state of the art is categorized in to: multi-hopping through single path to achieve minimal energy consumption and avoid void hole, whereas, multi-hopping via multiple-paths is performed to ensure the reliable data delivery at the destination. The brief discussion is provided in the following subsections.

2.1. Depth Based Routing Using Single Path

Yan et al. proposed depth based routing (DBR) for UWSNs in [6]. DBR forwards the data packet greedily to the lowest depth node in transmission range using local information of one hop. Every sensor node updates its own depth in each data packet while forwarding. Therefore, the higher depth nodes discard it upon reception which helps to avoid redundant data packets. In order to reduce duplication, every node maintains queue which stores information of the forwarded data packets. The sensor nodes require more memory to maintain queues. DBR also uses data packet holding mechanism. Lowest depth node in the transmission range holds data packet for shortest time. DBR performs well in terms of packet delivery ratio (PDR) and delay in dense regions, however, sparse regions affect them because of void holes in the network.
In [7], Yu et al. proposed weighting depth and forwarding area division depth based routing (WDFAD-DBR) protocol for underwater acoustic sensor networks (UASNs). The authors use weighting sum of depth difference of current and next expected hop technique to improve reliability and reduces probability of void hole occurrence. WDFAD-DBR saves energy by dividing forwarding area to suppress redundant data packets and neighbor node prediction mechanism which reduces the chance of packet drop. Authors performed theoretical analysis on routing performance in case of channel contention. WDFAD-DBR increases reliability and achieves energy efficiency. However, sparse region affects PDR and processing time at each hop due to the selection of forwarder increases delay.
The authors proposed a reliable and energy-efficient routing (R-ER P 2 R) protocol for UWSNs in [8]. This protocol balances energy consumption and decreases delay by utilizing physical distance at the time of a data packet transmission. Every sensor node calculates expected transmission count for each of its neighbor to find the link quality for reliable transmission of the data packets. A lowest depth neighbor in the range with high residual energy and good link quality is selected as forwarder. R-ER P 2 R forwards only one copy of a data packet to increase network lifetime. However, if a data packet reaches void region, sensor node drops it which results in retransmissions.
In [9], Noh et al. proposed void-aware pressure routing (VAPR) for UWSNs. VAPR works in enhanced beaconing and opportunistic directional data forwarding phases. All the sensor nodes forward data packets to the sink on the basis of pressure routing which uses depth information. The mobile sinks propagate their reachability information and the sensor nodes update their distance to sink from this control message. Afterwards, the sensor nodes beacon their information which helps the neighbors to update direction of forwarding and hop counts to sink. Hop count information in the beacon messages helps the sensor nodes to avoid void regions. VAPR performs better in dense regions. However, sparse regions affect its performance in terms of delay and PDR.
Improving both energy and time efficiency of depth-based routing (D-DBR) for UWSNs is proposed by Diao in [10]. This protocol uses time of arrival (ToA) ranging technique to measure distance between sensor nodes. Every sensor node makes decision of forwarding the received data packet based upon distance, depth and transmission range information. In order to direct data packets towards the sink, every sensor node calculates the angle between the sink and all the neighbors of the current forwarder which helps to select potential forwarder. D-DBR reduces delay and increases PDR of the network by directing packets into right direction at the cost of energy.
Jiang et al. [11] proposed geographic multipath routing based on geospatial division in duty-cycled UWSNs. Two schemes named; geographic forwarding based on geospatial division (GFGD) and greedy GFGD (GGFGD) are proposed in this research work. The sensor nodes can switch their state among sleep and awake modes which saves energy of idle sensing. Neighbor node having high residual energy, shortest transmission delay and less path loss is selected as a forwarder in both schemes. GGFGD greedily forwards data packet and selects next hop node closer to the sink. While, GFGD forwards data packet directionally. GFGD saves more energy and have less delay as compared to GGFGD. Farthest neighbor selection in GGFGD increases propagation delay. Summary of the related work is given in Table 1.

2.2. Depth based Routing using Multiple Paths

Multipath power-control transmission (MPT) protocol for time critical applications is proposed in [12]. Every source node directs multiple copies of data packet towards the surface gateways with the purpose of avoiding retransmissions. These copies are then combined at sink to get original data packet. MPT performs well in terms of delay and energy consumption in sparse regions. However, as the node density increases both delay and energy consumption increase because of data packets collision in the network.
Javaid et al. proposed an efficient data-gathering routing (AEDG) protocol for UWSNs in [13]. This protocol uses autonomous underwater vehicle (AUV) to collect data from randomly deployed gateway nodes. During attachment to gateways, every sensor node follows shortest path tree algorithm. Gateway node collects data from member nodes and makes sure that less number of nodes are attached to it, because the involvement of more number of nodes resulting in high energy consumption. AEDG rotates gateway nodes in order to balance energy consumption. New gateway node is selected on the basis of high residual energy and it must be in the range of AUV. AEDG prolongs network lifetime and increases throughput. However, end-to-end delay is compromised.
A power-efficient routing (PER) protocol for UWSNs which uses forwarding node selector mechanism to find appropriate forwarder is proposed in [14]. Every sensor node generates binary tree to direct multiple copies of a data packet to sink. In order to control duplication, every node uses forwarding tree trimming mechanism. If the number of duplicate packets forwarded by a sensor node exceeds threshold, the sensor node drops it and trims the tree. This protocol uses fuzzy logic inference system and decision tree which help to select appropriate forwarder and generate the tree. PER increases PDR at the cost of delay and energy. Duplicate data packets information maintenance at every node consumes a lot of energy.
Xu et al. proposed reliable and energy-efficient multipath communications in UWSNs [15]. In this protocol, multiple path forward error correction (M-FEC) based on hamming code technique is used. This technique encodes data packet at source node which is decoded at every intermediate node and the destination in order to reliably transmit data packet in the network. To calculate packet error rate (PER), authors use markovian model. Multiple copies of a data packet are sent through different paths by source node to avoid retransmissions. The source node adds error correction code in each data packet before transmission which allows the receiver to detect and correct errors. When a data packet reaches the destination, all the copies are combined to generate original data packet. M-FEC achieves reliability and saves energy by eliminating retransmissions. However, data packet correction at each node increases delay.
Energy balanced strategies for maximizing the lifetime of sparsely deployed UASNs are proposed in [16]. In this research work, authors proposed energy balanced hybrid (EBH) data propagation algorithm which efficiently utilizes energy of the network. All the sensor nodes can switch their state among direct transmission and multi-hopping which reduces packet drop. Initially, the sensor nodes send data packets through multiple hops towards the destination. When a node’s energy depletes, it propagates control message to the higher depth nodes. These high depth nodes start direct transmission with the sink node. EBH balances energy consumption, however, direct transmission and void holes increase energy consumption and delay. The limitations and achievements are summed up in Table 2.

2.3. Multi-Hopping to Avoid Void Regions

Authors proposed in [17], the geographic and opportunistic routing protocol (GEDAR) for UWSNs. This is an anycast, geographic and opportunistic protocol which selects a potential neighbor to forward data packet using anycast method. Every sensor node greedily forward data packets to the lowest depth node in its range. When a data packet reaches void region, the current forwarder switches to recovery mode and changes depth to find a potential neighbor. GEDAR overcomes void holes and increases PDR in dense regions. However, position changing mechanism consumes more energy and increases delay.
In [18], the authors proposed hydrocast: pressure routing for UWSNs which uses measured pressure level information to route data packets towards the destination. Every data packet is routed by anycast mechanism in only vertical direction. Every sensor node forwards each data packet to a subset of forwarders which maximizes the greedy progress towards the destination. The receiver node does not forward data packet until all the higher priority nodes in forwarding set fails. If a data packet reaches in void region, the current forwarder sends it to a higher depth node (backward transmission) and directs it to the sink through another path. The reliability increases by sending data packet to multiple forwarders and sends using different path in case of void region. However, hydrocast pays the cost of energy and delay.
The authors of on energy hole and coverage hole avoidance in UWSNs proposed spherical hole repair technique (SHORT) in [19]. Coverage hole is un-sensed region which occurs because of uneven distribution of nodes, random deployment or by death of sensor nodes. Every sensor node embeds its residual energy information in the forwarding data packet which helps the receivers to update their neighbors information. In order to reduce packet loss and suppress retransmissions, holding time is computed for each packet before forwarding. When a sensor node is near to die, it generates control message to its neighbors so, they stop forwarding data to it. Now a sensor node in dense region moves to fill this coverage hole ensuring its movement does not create another coverage hole. The nodes which make cross triangles or hidden cross triangles have higher probability of movement. Coverage hole filling increases throughput and lifetime of the network at the cost of high delay. The summary of the discussed routing algorithms is provided in Table 3.

2.4. Summary of Related Work

In aforesaid state of the art, the major focus of the research community is on the energy savings through multi-hop based routing. However, the features of the existing work differs from each other as per the requirements of the scenario. Such as, depth routing algorithms with single path focus on energy efficiency by ignoring the inevitable threat of void holes results in discontinuity in the network operations.
In multipath depth based routing schemes, source node looks for the reliability of the data packet. The scarcity of the energy is not taken into the consideration and packets are transmitted from various paths towards the destination resulting in high throughput at the cost of minimal lifetime.
Void avoidance depth based algorithms consider both parameters; energy and reliability. However, there exists tradeoff in the form of high latency and high energy consumption because when void hole occurs, an alternative route is discovered by broadcasting the beacon messages among the network nodes. In addition, if the alternative route is not discovered then depth of the source node is adjusted and again the configuration is performed which leads to unnecessary energy consumption and degrades the network performance.

2.5. How Our Work is Different from Baseline Scheme?

In this paper, similar to LMPC routing protocol, both proposed schemes (FLMPC-One and FLMPC-Two) also direct multiple copies of a data packet. However, they are different from LMPC as follows:
  • LMPC establishes binary tree from the source node. While, FLMPC-One and FLMPC-Two establish binary tree only from the sensor nodes which reside near the layer. It results in energy efficiency.
  • LMPC forwards the data packet to the sensor node which lies in the transmission range irrespective of considering void holes. However, both proposed schemes direct data packet on the path which ensures two or three hops neighbor information. It increases PRR of the network.
  • In LMPC, data packets not necessarily pass through the sensor nodes residing near the layer. In this way, less copies of data packet are generated from the sparse regions. However, every data packet passes through sensor nodes which lie near the layers to generate multiple copies in both FLMPC-One and FLMPC-Two. This results in reliability and almost elimination of retransmissions.

3. FLMPC: Proposed Protocols

In this section, we first describe the network architectures of existing and proposed schemes. As network architecture of both FLMPC-One and FLMPC-Two is the same, therefore, we use term FLMPC to generalize while describing the architecture. Then, we explain propagation model of underwater acoustic signals. Later, we propose two schemes; FLMPC-One and FLMPC-Two. FLMPC-One makes routing decision using information of two hop neighbors. Whereas, FLMPC-Two forwards the data packet after making sure that the forwarder node has neighbor information up to three hops. Both schemes increase reliability of transmission and reduce the chance of data packet entrance in void hole region. Moreover, the energy consumption is reduced by generating binary tree from the node exists at the closest layer of the source node.

3.1. Network Architecture

Before describing architecture, few terms need to be defined here: Relay nodes are the sensor nodes which not only forward their sensed data but also forward data of higher depth nodes. While, Cross nodes are the sensor nodes lying near or at the layers.
Both LMPC and FLMPC consist of relay nodes, cross nodes, surface gateways and a sink. The sink works as an embedded system to manage the node battery in an efficient way. All the sensor nodes are randomly distributed in the network. Initially, all the nodes are sleeping and become active when they receive data packet. If they are not taking part in communication, they get back to sleep mode. Binary tree is established in both schemes for multiple-path transmission of a data packet. Let’s assume a scenario depicted in Figure 1 in which LMPC network field be distributed into homogeneous layers. From every node, two copies of the data packet are generated irrespective of the layer, until it reaches the destination. Now, it is obvious that noise at the bottom of the sea is very low, where we can afford to generate one data packet, however, the noise increases as we approach the surface of the water.
Therefore, we need to generate multiple copies closer to the water surface. In this regard, we have divided the network field into unequal layers as illustrated in Figure 2. In addition, the source node generates only one copy of the data packet at the lower layers, however, as it propagates towards the destination, it starts transmitting two copies through cross nodes deployed over the layer. If, cross node is not present, then only single copy is passed on through a relay node. The source and relay node unicast data packet upon reception. Contrary to source node, a cross node uses IP multicast technology to transmit data packet. Both existing and proposed schemes direct multiple copies of a data packet towards gateways through different paths in order to reduce the retransmissions. All the copies of a data packet are relayed to the sink where they are combined to generate original data packet. Unlike LMPC, FLMPC generates binary tree from cross nodes only with the aim of reducing collisions. Acoustic modem is installed in gateways to receive data from sensor nodes while a radio modem is used to direct collected data towards the sink.

3.2. Propagation Model

In this section, we present the propagation model of acoustic signals and their absorption in underwater environment.

Energy Model

The attenuation of acoustic channel over distance d, for the signal of frequency f can be expressed as [20]:
A ( d , f ) = d k α ( f ) d
where k shows the spreading factor of the signal and α ( f ) is the absorption coefficient. k defines the geometry of propagation (i.e., k = 1 is cylindrical spreading (signal does not propagate in all directions, but gets trapped within the boundaries and wave fronts move in cylindrical shape without any attenuation in the power of the signal), k = 1.5 is practical spreading (spreading loss in which transmission loss and attenuation are considered while performing experiments in order to achieve more accurate and precise results.) and k = 2 is spherical spreading (signal propagates in all directions, where wave fronts grow as it move away from the source and intensity of the signal remains the same)). Thorp’s propagation model is used to describe α ( f ) given by [7]:
α ( f ) = 0.11 f 2 1 + f 2 + 44 f 2 4100 + f 2 + 2.75 × 10 4 f 2 + 0.003
where α ( f ) is measured in dB/Km and f is given in KHz.
Figure 3 shows the relation of α ( f ) and frequency which is obtained from Thorp’s model. As the frequency increases, absorption of acoustic signals also increases.
The total noise power spectral density (NP) of all noises at frequency f is given by [5]:
N P ( f ) = i = 1 n s N P i ( f )
where n s shows the total number of noise sources like shipping, turbulence, etc. and NP is measured in dB. The more noise signals propagate away from the source, the more they attenuate. Their attenuation over distance d can be calculated from:
N P d ( f ) = i = 1 n s N P i d k α ( f ) d
The signal to noise ratio (SNR) of the received signal can be written as:
S N R = P / A ( d , f ) N P d ( f ) = P d k α ( f ) d i = 1 n s N P i d k α ( f ) d
where P is the power of acoustic signal and d is the distance among n 1 and nth nodes. S N R follows additive white gaussian noise channel ( A W G N ). As S N R depends on channel modulation scheme through which we can calculate B E R . The B E R for ( π / 4 ) Q P S K modulation scheme is given by:
p b e r ( S N R ) = 1 2 π S N R e t 2 / 2 d t
B E R depends on channel coding scheme and it can be converted to ( P E R ) which is given by:
P p e r = 1 [ 1 p b e r ( S N R ) ] P l
where P l is the data packet size.
Energy consumption of a sensor node while sending a data packet can be calculated from the values of transmission power ( T p ), P l , data rate ( D R ) of acoustic channel and d is the distance between n 1 and nth node. The mathematical expression is given as follows [5]:
E t x = T p × P l D R × d
While, reception energy ( E r x ) is calculated according to Equation (9).
E r x = P r × P l D R × d
where P r is the reception power. Total leftover energy of the network nodes after forwarding all the data packets is computed as follows:
E t x r e m = d p = 1 N h = 1 m n i E t x
where N shows the total number of data packets, m is the total hop count for one data packet from the source node to the destination, n i is the ith node of the network. When the hop count increases by one, it updates n i . We can find the total remaining energy of the network for receiving data packets from:
E r x r e m = d p = 1 N h = 1 m n i E r x
Total consumed energy E t o t a l of the network is computed by Equation (12).
E t o t a l = E i ( E t x r e m + E r x r e m )
where E i is the total initial energy of the network.

3.3. Problem Description

The intensity of noise signals is high in shallow water as compared to deep water [21]. In LMPC, the source node establishes binary tree as shown in Figure 1. This establishment increases the number of duplicate packets in dense network and results in collision. Random distribution and energy depletion of sensor nodes create void holes. LMPC forwards data packet on the link which has minimum P E R and acceptable D R in the presence of errors without considering the probability of void hole occurrence. As shown in Figure 4a, node C is a current forwarder. A and E are low depth nodes and lies within the transmission range of C. Link to A might have less errors than E and is suitable to become forwarder, however, A leads to void hole because it has no node in its transmission range. If C directs data packet to E, error chances might be higher. However, the probability of the data packet to reach the destination is very high in this situation. LMPC divides the network filed into equal sized layers irrespective of considering noise intensity in shallow water. High noise makes the data packets erroneous which effects the reliability of the data packet.

3.4. Layers Division

In FLMPC-One and FLMPC-Two, we split the network into unequal sized layers, because noise intensity is relatively high near the noise source and in the shallow water, while, smoother in deep water. Based upon this fact, the layer size near the surface is smaller in contrast to deep water. This division increases the reliability and reduces the packet drop of FLMPC-One and FLMPC-Two. The expression for unequal size division is given by [22]:
C ( x , y ) = k 1 x 2 + k 2 x 1 k 1 + k 2 , k 1 y 2 + k 2 y 1 k 1 + k 2
where x 1 , y 1 , x 2 and y 2 are the coordinates of end points and C ( x , y ) is the point of division as shown in Figure 5. Point C divides A B in the ratio k 1 : k 2 which depends upon the noise signal’s strength.
Cross nodes reside near the layers as shown in Figure 2. When sensor nodes are randomly deployed, they often leave layers vacant. To make sure every data packet passes through cross node, the deployment of cross nodes is uniform random.

3.5. Neighbor Table

Sensor nodes reside in transmission range and lying at the low depth than the current forwarder are its neighbors. In order to save energy because of excessive exchange of control messages among the network nodes, all the sensor nodes in proposed schemes maintain neighbor table. Initially, the sensor nodes broadcast control message in the network. This control message consists of source ID, location (x,y) and depth of source node. Receivers calculate their distance with source based upon receiving a control message by Euclidean distance formula which is given by:
D i s t ( i , j ) = ( x i x j ) 2 + ( y i y j ) 2
where ( x i , y i ) and ( x j , y j ) are the coordinates of source and receiver, respectively.
Every sensor node maintains tuple which consists of (Source ID, Location, Distance, Depth) for each neighbor. The Location is (x,y) coordinates of the sender retrieved from the control message, whereas, Distance is calculated using Equation (14), Depth shows that how far the node is from the surface of the water. When this information is acquired successfully, the sensor node maintains it’s tuple of neighbor nodes.
D i s t ( i , j ) R t
D e p t h i > D e p t h j
where R t is the transmission range and Equation (15) ensures that the calculated distance must be less than or equal to the transmission radius. Receiver nodes also retrieve depth information from the control message to compare it with its own depth as shown in Equation (16). If Equation (16) evaluates to true, the receiver maintains tuple for the source node in its neighbor table. Depth of neighbors helps the sensor nodes to select forwarder which is at minimum depth among all selected neighbors while transmitting data packet. Both schemes do not maintain information of high depth nodes because they have no mechanism of backward transmissions and also to reduce the message overhead.

3.6. Network Configuration and Data Transmission

Transmission phase consists of: potential neighbor selection and tree establishment. In the former, a node which is deployed closer to the destination than the source node will be illegible to become a neighbor. Whereas, in latter, tree is established to successfully deliver the data packet from multiple routes towards the destination. We have discussed both of the phases in detail as follows:

3.6.1. Potential Neighbor Selection

When a sensor node has a data packet to transmit, it selects a potential forwarder node ( P F N ) among all of its neighbors. Before describing the selection process of P F N , we firstly define the term P F N here:
PFN: Let a sensor node n lying h hops away from the destination having a neighbor of h 1 hops which further has neighbors up to h 1 or h 2 hops, this neighbor is a P F N . Sensor node E in Figure 4a is a P F N .
In the P F N selection phase, every senor node processes all the neighbors to select cross node which is also a P F N . Cross node increases duplicate packets which helps in achieving the purpose of high reliability. If no such neighbor is found, sensor node selects relay node which is a P F N . In the case that no P F N is found, data packet is dropped to save energy of the node.

PFN Selection in FLMPC-One

Figure 4a,b illustrate P F N selection mechanism of FLMPC-One. Let C be the current forwarder lying at depth d and h hops away from the surface of the water. A, B and E lie at h 1 hops. B is at lowest depth among all the neighbors, data packet should be sent to it. However, A and E are cross nodes, they have higher priority than B. Existence of cross nodes reduce the chances of data packet transmission to relay node B. If we look precisely at Figure 4a, A can not be selected as P F N . Although, there is a sensor node at lower depth than A. However, it does not lie in A s transmission range. At this stage, C processes only left cross node E which has D in its range. D ensures neighbor information up to h 2 hops. Thus, E is a P F N and data packet is transmitted to it.
There can be a scenario, when cross node is not the P F N as shown in Figure 4b. A is a cross node having high priority, however, its not a P F N . Now C looks in it’s neighbor table to find another cross node. If there is not any cross node then C makes an effort to find relay node which is also a P F N . If we look at B, we can see, it is a relay node and also has a node in its transmission range, so B has priority in this case. C selects B as a forwarder.
Algorithm 1 FLMPC Pseudocode.
1:procedure Potential–Forwarder
2:  for each node i ∈ Nodes do
3:    for each node n ∈ Neighbor–Table do
4:     if n e i g h b o r ( n ) 1 then
5:     go to 7
6:     if n e i g h b o r ( n e i g h b o r ( n ) ) 1 then
7:       if n==Cross–node then
8:          P F N n
9:         go to 2              ▹ Find P F N for next node
10:       end if
11:     end if
12:     end if
13:     if C r o s s   n o d e = = 0 then
14:     go to 16
15:     if n e i g h b o r ( n e i g h b o r ( n ) ) 1 then
16:        P F N r e l a y
17:     end if
18:     end if
19:    end for
20  end for
21:end procedure
22:procedure Datatransmission
23:  Node i received data packet
24:  if i is Cross–node then
25:    Multicast data packet
26:  else Unicast data packet
27:  end if
28:end procedure
Algorithm 1 shows the selection and transmission of both proposed schemes. Line 4 states that two hop information is fulfilled, thus, line 6 is skipped for FLMPC-One. After P F N selection at step 8, the next iteration starts. Afterwards, transmission phase starts. If current forwarder is a cross node, data packet is multicasted, otherwise, unicasted.

PFN Selection in FLMPC-Two

FLMPC-Two forwards data packets after ensuring neighbor information up to h 3 number of hops from the current forwarder. The P F N selection mechanism of FLMPC-Two is shown in Figure 6a,b. A, B and E are h 1 hops away from the gateways and they are neighbors of the current forwarder C which itself is h hops away. Let C has a data packet to forward and it computes all the neighbors to find P F N . Being cross nodes A and E has high priority. A does not have any node in its range, so A is eliminated from this competition. C now makes an attempt to spot cross node which is E in this state. By focusing on E in Figure 6a, we can see, it has D and I in range which confirms h 2 hops information with respect to C. However, its not enough for avoiding the energy hole occurrence in the network. Both D and I are computed to ensure that there is no void hole. D and I has H and J in their transmission ranges, respectively, and based upon them C forwards data packet to E.
Now, E is the current forwarder and also a cross node, so data packet needs to be multicasted. E follows complete selection mechanism and spot two relay nodes D and I. D further has H in its range. However, D can not be the P F N because E has only h 2 hops information in case of D. D is leading to void region and because of no backward transmission, H has only choice of packet drop. Node J lies in I’s transmission range and K resides in range of J. h 3 hops information is confirmed and E now forwards data packet to I. Being cross node E needs to multicast data packet, however, only one P F N can ensure reliable transmission. FLMPC-One and FLMPC-Two make energy efficient decisions.
If there is no cross node in transmission range or the existing cross node is leading to a void hole, data packet transmission to such node results in packet drop. As shown in Figure 6b, A is cross node and it has I in range. However, A leads the data packet to a void hole. Now, C looks in the neighbor table to locate another cross node. In the case shown in Figure 6b, this search results in negation. C now searches for relay nodes and spots B which ensures h 3 hops information. The data packet is forwarded to P F N B.

3.6.2. Tree Establishment

When a sensor node sends a data packet, one of the given conditions is true. The current forwarder is a cross node, a source or a relay node.
Y = L ; if N = S n or N = N n T ; if N = C n
where L, T, N, S n , N n and C n represent the linear transmission, tree, current forwarder, source node, relay node and cross node, respectively.
If N is S n or N n , it unicasts the data packet and follows a linear path. However, incase N is C n , it multicasts data packet and generates binary tree. A tree consists of a root node and subtrees. In case of a binary tree, every parent node has utmost two subtrees. In our schemes, only C n generates binary tree. The establishment of binary tree can be expressed as [5]:
T = G ( B 1 , P 0 , B 2 )
where
B i = G ( B 2 i + 1 , P i , B 2 i + 2 ) ; if B 2 i + 1 ϕ and B 2 i + 2 ϕ P i ; if B 2 i + 1 = ϕ and B 2 i + 2 = ϕ
where, the ϕ is used to represent the leaf node. If, B 2 i + 1 equals to ϕ , it means no further nodes are present to traverse. If, B 2 i + 1 not equals to ϕ , then the current node is not a leaf node. P 0 in Equation (18) is the root node, B 1 and B 2 are the left and right children which can be leaf nodes or trees. If B 1 or B 2 does not have children (low depth nodes), they are leaf nodes. In existing and proposed schemes, leaf nodes are the surface gateways as shown in Figure 1. P i in Equation (19) is the parent of ith subtree. Left and right children of ith subtree can be found from B 2 i + 1 and B 2 i + 2 .

4. Linear Optimization

Linear Optimization is a mathematical optimization model widely used to gain the best possible result. It consists of an objective function in which we formulate problem with the aim of minimizing or maximizing the result under a set of linear constraints.
In this section, two linear problems are formulated, the first one is to minimize the energy consumption and the second one is to maximize the throughput of the network.

4.1. Energy Minimization

In FLMPC-One and FLMPC-Two, cross nodes multicast and relay nodes unicast data packet. In order to increase the lifetime of network, efficient energy consumption is necessary. Energy is mainly consumed by transmission or reception of data packets. Energy is also consumed in idle state, however, it is very minor, thus, we are not considering it. The objective function of energy can be expressed as:
M i n t = 1 t m a x E ( t ) t R
such that;
L 1 : E t E o
L 2 : D R D R p r
L 3 : E s E t x
L 4 : L Q t L Q r e q
L 5 : M i n d p = 1 N E t x i R
L 6 : M i n d p = 1 N E r x i R
The main objective of Equation (20) is to minimize the energy consumption for the total time ( t m a x ) of transmission to prolong network lifetime. Equation (21a) shows that energy of sensor node at any time t must be less than or equal to the initial energy ( E o ) supplied to the sensor node. It reveals sensor nodes have limited energy. In Equation (21b), D R must be less than or equal to D R which makes the data packet erroneous. If Equation (21b) evaluates to false then P E R increases which results in packet drop. As a result, the data packet needs to be retransmitted and it increases energy consumption. Equation (21c) shows sensor node must have energy greater or equal to transmission energy when it has a data packet to send. Constraint in Equation (21d) ensures that the link quality at current time must be good. If it is not, data packet becomes erroneous and gets dropped at surface gateway. Equations (21e) and (21f) indicate the energy consumption for the total number of data packets ( d p s ) transmitted and received in the network. We can calculate E t x from Equation (8) and E r x from Equation (9).
Graphical Analysis: Let us consider a scenario in which initial energy be 6 J, T p = 0.66 mW (milliWatt), P l = 500 bytes, D R = 10 KB/s, d = 100 m to 300 m and R p = 0.395 mW. From d = 100 m to 300 m, the calculated value of E t x is 3.3 mJ to 9.9 mJ and E r x is 1.98 mJ to 5.93 mJ. So
3.3 mJ E t x 9.9 mJ
1.98 mJ E r x 5.93 mJ
Figure 7 shows the intersection of lines which results in the bounded region which is called feasible region. Every point in this region results in feasible solution. Extreme values can be found at the corner points. Now examining vertices of the bounded region of Figure 7 as follows:
  • P 1 ( 3.3 , 1.98 ) = 3.3 + 1.98 = 5.28 mJ
  • P 2 ( 3.3 , 5.93 ) = 3.3 + 5.93 = 9.23 mJ
  • P 3 ( 9.9 , 5.93 ) = 9.9 + 5.93 = 15.83 mJ
  • P 4 ( 9.9 , 1.98 ) = 9.9 + 1.98 = 11.88 mJ
The above results show that values of the corner points lies within the range of initial energy. So all solutions are valid. When a sensor node transmits or receives a data packet, the value of energy is selected from this feasible region.

4.2. Throughput Maximization

In this section, we are using linear programming to maximize network throughput. In FLMPC-One and FLMPC-Two, multiple copies of a data packet are relayed towards the destination. Throughput is the number of distinct packets successfully received at the sink. The objective function is defined as follows:
M a x t = 1 t m a x P ( t ) t R
where,
P ( t ) = t = 1 t m a x p t × c c P
and,
p t = 1 i f d i s t i n c t p a c k e t 0 i f d u p l i c a t e p a c k e t
L 1 : E t E o
L 2 : D R D R p r
L 3 : E s E t x
L 4 : P E R < P E R r e q
L 5 : M i n d = d o d m a x N o t h d R
L 6 : M i n d = d o d m a x N o s d R
In Equation (24), our objective is to maximize the number of distinct packets P received at the sink in aggregated time ( t m a x ). In Equation (25), p t is the packet type and c is the counter. Counter c increments by one if p t is 1 in Equation (26). It ensures that the data packet is not a duplicate one. Equations (27a)–(27c) are same as explained in previous section without them data packet can not be transmitted. Constraint Equation (27d) ensures that P E R must be less than or equal to required level ( P E R r e q ). Equations (27e) and (27f) show the thermal noise ( N o t h ) and shipping noise ( N o s ) , respectively. Where d is the distance from source node to surface gateways. If noise intensity is high, data packet becomes erroneous. If P E R increases the required level, data packet is dropped at gateway. In order to increase throughput, noises should be minimum. Total noise is given by:
N o t o t a l = N o t h + N o s N o t h , N o s R
where N o t h [23] and N o s [24] are given by:
N o t h = 15 + 20 l o g ( f ) D
N o s = N L 20 l o g ( f 100 ) D
where N L is noise level and it is based upon shipping density.
Graphical Analysis: Let f = 1000 Hz, d = 100 m to 2000 m and N L = 60 dB. The calculated value of N o t h is 0.0375 dB to 0.75 dB and N o s lies in the range of 0.02 dB to 0.4 dB.
0.0375 + 0.02 N o t h + N o s 0.75 + 0.4
0.0375 N o t h 0.75
0.02 N o s 0.4
In Figure 8, intersection of lines results in feasible region.
All points in this region provide a valid solution. Now testing corner points to validate the results of Equations (32) and (33). Calculating values at corner points:
  • P 1 ( 0.0375 , 0.02 ) = 0.0375 + 0.02 = 0.0575 dB
  • P 2 ( 0.0375 , 0.4 ) = 0.0375 + 0.4 = 0.438 dB
  • P 3 ( 0.75 , 0.4 ) = 0.75 + 0.4 = 1.15 dB
  • P 4 ( 0.75 , 0.02 ) = 0.75 + 0.02 = 0.77 dB
The lesser the noise is, the higher are the chances of successful packet reception at gateways. If a data packet faces noise value from this feasible region, the error is less in data packet and it is acceptable at gateways.

5. Simulation Results and Performance Evaluation

In this section, we evaluate the performance of FLMPC-One and FLMPC-Two. In FLMPC-One, every sensor node looks up to two hop neighbors and finds P F N . While, FLMPC-Two uses three hops neighbor information to forward data packet. The chance for a data packet to enter void hole region reduces. Void hole avoidance results in fewer number of drop packets. In the simulations, we implemented two different scenarios of LMPC, FLMPC-One and FLMPC-Two. In the first scenario, 150 sensor nodes are deployed in the network of 2000 m × 2000 m. We consider two noise sources here i.e., wind and shipping noise. Wind speed is considered 5 m/s and shipping noise is 0.2 dB. Similarly, in scenario two, 500 sensor nodes are distributed over the area of 4000 m × 4000 m. The wind speed and shipping noise are stronger in scenario two i.e., 20 m/s and 0.8 dB, respectively. The transmission power and the reception power of sensor nodes are 0.66 mW and 0.395 mW, respectively. Five gateways are deployed at the surface of water. All surface gateways relay data packets to a sink which combines them to generate original data packet. Simulations are run for 1000 s. The average of five simulation results is taken in order to compensate the difference of random deployment. The network dimensions and important performance parameters for simulations are listed in Table 4.

5.1. Performance Metrics

We are defining few terms here based upon them we evaluate proposed and existing schemes.
Active Nodes are the number of sensor nodes which are taking part in data transmission and reception.
Delay is the time taken by a data packet from the source to the destination. It includes transmission delay, propagation delay, holding time and processing delay. It is measured in second(s). There are multiple surface gateways and more than one copies of the same data packet are relayed, hence a data packet corresponds to more than one delays. However, we consider the highest delay among them.
Energy Consumption is the amount of energy consumed from start to the end of the network lifetime. Total energy consumption comes from the accumulation of energy consumed by individual nodes during the data transmission phase.
Required Packet Error Rate ( P r r e q ) is the maximum number of erroneous bits allowed in the data packet to be accepted at sink. If erroneous bits in data packet exceeds P r r e q limit, surface gateway drops it.
PRR is the ratio of successfully received data packets at surface gateways to the data packets sent by source nodes.

5.2. Simulation Results

In this section, we have presented and discussed the simulation results for both FLMPC-One and FLMPC-Two. Both schemes are compared with LMPC in terms of active nodes, delay, energy consumption, required packet error rate and PRR. The detailed discussion of each parameter along with it’s results is presented as follows:

5.2.1. Active Nodes

It can be observed from Figure 9, as the number of layers increases number of active nodes also increases. Because if the source node lies nearest to surface gateways, it results in less number of duplicate packets and awake less number of nodes. However, if source node resides away from the surface, it results in high number of active nodes. It shows farther the source node is from the surface, higher is the number of active nodes.
The number of active nodes increases as the layer number increases in DBR. When the information is obtained up to two hops, the active nodes are high, however, as the hop count increases, means the neighbor information acquired up till three hops, the probability of finding void hole increases. Furthermore, the transmission of data packet from the single path towards destination only involves few number of nodes. While in LMPC and FLMPC multiple routes generated from every cross node results in high number of active nodes. The use of single route is the major reason behind low number of active nodes participating in the data forwarding process.
Figure 9 shows that initially the number of active nodes in scenario one of LMPC is high due to tree generation from source node resulting in high number of duplicate copies. Later, the increment is gradual because higher depth nodes forward data packets through the relay nodes which are already awake in the upper layers and also awake few more sensor nodes. Less number of active nodes save network energy.
Number of active nodes in FLMPC-One is lower as compared to LMPC. FLMPC-One generates less copies of packets which reduces the chances of collision. Packet collision is very critical factor in sensor networks which effects energy and delay of the network. If collision increases, it affects network’s performance and results in loss of data. All the active nodes not only relay data packets of higher depth nodes but also sense their own data and forward it. Two hops neighbor information of FLMPC-One reduces number of active nodes and also reduces the probability of data packet entrance in void region. FLMPC-One acquires neighbor information to avoid the awakening of sleeping nodes leading to void regions.
Active nodes of FLMPC-Two in scenario one are less than both LMPC and FLMPC-One because of finding P F N after using three hops information. It saves data packet from entering in void region. If sensor node is lying in the sparse region, this mechanism reduces the probability of data packet drop. When a sensor node forwards data packet to its P F N using three hops information. The receiver node needs not to forward that data packet to the node found by its previous forwarder during P F N finding mechanism. Because previous node information may lead data packet to void region. So, current forwarder locates its P F N by running P F N selection mechanism. In this way, data packets loss is avoided.
In scenario two, initially increment in the number of active nodes of LMPC and FLMPC-One is rapid. Later, FLMPC-One makes smart decision by detecting void holes and changes the path of the data packet. In this way, FLMPC-Two awakes suitable nodes which results in gradual increment. Although, two hops neighbor information reduces active nodes of FLMPC-One, however, three hops information reduces them more. FLMPC-Two has more data to forward and already awake nodes are not enough. So, active nodes of FLMPC-Two increases sharply as the time passes on, however, it awakes most suitable sensor nodes.

5.2.2. Delay

Delay of proposed and existing schemes is shown in Figure 10 and it mainly depends upon underwater channel and distance from the source to destination. As expected, delay of LMPC in both scenarios is less as compared to FLMPC-One and FLMPC-Two, respectively, because of one hop information which leads to high number of active nodes as shown in Figure 9. As the number of active nodes increases, the probability of finding P F N in less time also increases. Figure 10 shows delay of all schemes in scenario one is higher than scenario two. The difference in sensor nodes density of both scenarios is one of the reasons. Scenario one is 70% less dense as compared to scenario two.
Due to single path routing, the delay is very less in the both scenarios of DBR. The classic depth based algorithm only considers distance while making forwarding decisions. The selection of always shortest path irrespective of energy consumption results in minimal delay. It is evident from the Figure 10, that as number of layers increases, the number of active nodes also increases resulting in further decrease in the end-to-end delay. At layer 6, the minimal delay is 0.51 and 0.53 s in scenario one and scenario two, respectively.
In scenario one, the delay of FLMPC-One is almost 0.2 s higher than LMPC because of processing time for potential node selection at every node. Meanwhile, FLMPC-Two’s delay is almost 0.6 s higher than LMPC due to less number of active nodes and three hops neighbor calculation. Less number of active nodes results in less number of possible paths to advance data packet reliably towards surface which increases processing delay.
In scenario two, delay of FLMPC-One is almost 0.3 s higher and FLMPC-Two is 0.5 s higher as compared to LMPC. The reason to locate P F N using two hops or three hops information is to avoid energy holes. When a data packet reaches in void region, there is no way out and the current forwarder drops it which needs to be retransmitted. Retransmission increases energy consumption and delay.
In existing and proposed schemes, multiple copies of a data packet reach at the destination. So, there are more than one delays for one data packet. In our proposed schemes, we consider the worst scenario and count the highest delay among them. While calculating delay, we are taking into consideration transmission delay, propagation delay and processing delay of P F N at each node. In proposed schemes, if there are more than one, two or three hops neighbors exist then the one farthest among them from current forwarder is selected. The farthest node selection affects delay because of high propagation time.

5.2.3. Energy Consumption

Figure 11a,b show energy consumption of existing and proposed schemes in scenario one and scenario two, respectively, with different D R s and P l s . Energy consumption depends upon the D R s irrespective of the P l . We set D R to 10, 20 and 30 KB/s and P l to 100, 200, 300, 400 and 500 bytes.
High number of active nodes in LMPC as shown in Figure 9, increases collision in the dense network which results in packet drop. While, sparse regions effect PRR by dropping data packets in void region. In existing and proposed schemes, multiple copies are directed towards surface in order to eliminate retransmissions and save energy.
Unlike LMPC, tree generation from source node, FLMPC-One and FLMPC-Two establish binary tree from cross nodes only which results in less number of duplicate data packets. FLMPC-One and FLMPC-Two reliably transmit data packets to most suitable nodes and save data packets from entering void region. These reliable and less number of data packets ultimately saves energy and increases PRR as shown in Figure 12.
In scenario one, FLMPC-One saves almost 8–12.5% energy while, FLMPC-Two saves 23–26% energy of the network as shown in Figure 11a. FLMPC-One saves 8.33–12.7% energy and FLMPC-Two saves 23.8–29% energy in scenario two. FLMPC-One and FLMPC-Two reduces energy consumption at the cost of delay. In FLMPC-Two, every node performs calculations up to three hops in order to avoid void holes which increases PRR and saves energy. FLMPC-Two achieves this by paying cost of high delay as shown in Figure 10.
In DBR, energy consumption is higher in both scenarios one and two as compared to LMPC and FLMPC schemes. The high energy consumption is because of void hole occurrence when forwarding data packets with greedy approach. Moreover, it can be seen from Figure 11a,b, that with the increase in packet size, the energy consumption also increases. The reason for more energy dissipation in DBR is because of inefficient approach to handle the void holes. The occurrence of void holes increase the packet drop ratio resulting in unwanted energy depletion. While in LMPC and FLMPC transmission of data packets from multiple paths and generation of data packets from cross nodes ensure that the packet will not be re-transmitted.

5.2.4. PRR

It can be seen from Figure 12 that PRR of LMPC in scenario one is less than in both proposed schemes. Initially, it is higher and it gradually decreases as the time increases. Because establishment of binary tree from source node increases duplicate packets in dense region which results in high collision. This collision increases packet drop. Moreover, one hop information in LMPC may lead data packet to void region which also affects PRR. In scenario two of LMPC, initially PRR is less because of less number of copies reached to gateway. However, it improves as the time increases because of increasing active node density. As active nodes increases, number of possible paths increases.
PRR of DBR in both scenarios is less as compared to both FLMPC schemes and LMPC. The reason for low performance in term of packet reception is greedy approach for at every data packet is broadcasted to find out a shortest path. The broadcast mechanism increases the collision of the data packets. Moreover, with the increase in number of active nodes, the chances of collision also increases. In addition, the factor of holding time also contributes in the reduction of PRR at each hop. Hence, from the depicted results it can be concluded that high collisions and inefficient holding time of the data packet by the neighbors node result in less PRR.
In the proposed schemes, unlike LMPC, every source node unicasts the data packet. When this data packet reaches the the cross node of nearest layer, this cross node generates a binary tree. This mechanism results in a lower number of duplicate packets which reduces collision as compared to LMPC. In a sparse region FLMPC-One’s two hops and FLMPC-Two’s three hops neighbor information avoid void holes. In void holes avoidance, proposed schemes awake most suitable sensor nodes to lead data packet towards destination. There are less copies generated in both proposed schemes as compared to LMPC. However, reliable advancement of data packets increases PRR. PRR of FLMPC-One in scenario one is higher than PRR of scenario two because it has less active nodes in scenario one which ultimately leads to less collision.

5.2.5. Required Packer Error Ratio

Figure 13 shows energy consumption per packet in the presence of different P r r e q . We can observe, if P r r e q is high which means high reliability of data packet, energy consumption is also high. Because when data packets are received at the gateway, error is checked in them. If error is higher than threshold, this data packet is dropped. As we allow higher number of acceptable erroneous bits, energy consumption decreases. Increasing P r r e q value means that reliability of data packet is decreasing.
Energy per packet with different P r r e q in both scenarios of LMPC is higher as compared to proposed schemes. Although, the difference is less because in all schemes multiple copies are generated of a data packet. So, data packets reach at the sink through different paths. If one path has high fading, data packet may get less affected on other path. FLMPC-One is performing better because of two hops information and achieves reliability in both scenarios. Figure 13 shows that FLMPC-Two outperforms both schemes because of three hops information. FLMPC-Two selects that path which advances data packet towards surface and effects the data packet less. If all the copies of the data packet are erroneous then still there is a chance of getting original packet by combining them at the sink.
The energy consumption of DBR in Figure 13 is initially low as compared to LMPC and FLMPC because it only generates one copy from every source node. On the other hand, with the increase in packet interval, the energy depletion increases because of high message exchange among the network nodes. Additionally, the occurrence of void hole also increases which results in high energy dissipation and more packet drop ratio. In Figure 13, the results depicted clearly show that at 6 s of packet interval, the energy consumption is greater than 0.3 J. Hence, the FLMPC and LMPC have achieved considerable amount of improvement in terms of energy utilization as compared to DBR.

5.3. Performance Trade Offs

Table 5 shows the performance trade offs of proposed schemes. In order to avoid repetition, parameters are explained generally because of same behaviour in proposed schemes. Multiple copies of data packets are forwarded in order to achieve reliability. FLMPC-One performs better in terms of active nodes, energy consumption and PRR. However, processing delay at each node in FLMPC-One increases its delay. FLMPC-Two makes smart decisions than FLMPC-One and awakes less number of active nodes which saves energy and increases PRR by reliably transmitting the data packet towards the surface. However, FLMPC-Two pays the cost of delay.

6. Conclusions

Energy conservation is one of the prime requirements in protocol designing of UWSNs because of limited resources. Energy holes, created by random distribution or death of nodes, increase the data packet’s drop rate and decrease the network lifetime. In this paper, we have proposed FLMPC-One and FLMPC-Two in order to achieve reliability and energy efficiency. Both schemes direct multiple copies of a data through various data routes towards the surface gateways where they are combined to generate an original data packet. Deep water faces less noises; thus, both proposed schemes (FLMPC-One and FLMPC-Two) have not generated the binary tree from cross nodes deployed in deep water. This is only done to reduce number of duplicate packets at the destination in order to save nodes battery and prolong the network operations. However, in shallow water, the noise increases, therefore cross nodes generate binary tree and direct multiple copies towards the destination which ensured the reliable delivery of data packets. FLMPC-One and FLMPC-Two avoid the void hole problem through a proactive approach and find an alternative route towards the destination making sure that the selected path has less noises. The simulation results show that our proposed schemes achieve energy efficiency, high PRR and reduce the number of active nodes which increases the network lifetime by paying the cost of delay.

Acknowledgments

The authors extend their appreciation to the Deanship of Scientific Research at King Saud University for funding this work through research group NO (RG-1438-034).

Author Contributions

Babar Ali, Arshad Sher, Nadeem Javaid and Saif Ul Islam proposed and implemented (validated) the main idea. Khursheed Aurangzeb and Syed Irtaza Haider wrote, organized and refined rest of the manuscript.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Akyildiz, I.F.; Pompili, D.; Melodia, T. Underwater acoustic sensor networks: Research challenges. Ad Hoc Netw. 2005, 3, 257–279. [Google Scholar] [CrossRef]
  2. Davis, A.; Chang, H. Underwater wireless sensor networks. In Proceedings of the IEEE Oceans, Hampton Roads, VA, USA, 14–19 October 2012; pp. 1–5. [Google Scholar]
  3. Al-Salti, F.; Alzeidi, N.; Arafeh, B. A new multipath grid-based geographic routing protocol for underwater wireless sensor networks. In Proceedings of the IEEE International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), Shanghai, China, 13–15 October 2014; pp. 331–336. [Google Scholar]
  4. Wang, K.; Gao, H.; Xu, X.; Jiang, J.; Yue, D. An Energy-efficient Reliable Data Transmission Scheme for Complex Environmental Monitoring in Underwater Acoustic Sensor Networks. IEEE Sens. J. 2016, 16, 4051–4062. [Google Scholar] [CrossRef]
  5. Xu, J.; Li, K.; Min, G.; Lin, K.; Qu, W. Energy-efficient tree-based multipath power control for underwater sensor networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 2107–2116. [Google Scholar] [CrossRef]
  6. Yan, H.; Shi, Z.J.; Cui, J.-H. DBR: Depth-based routing for underwater sensor networks. In Proceedings of the International Conference on Research in Networking, Singapore, 5–9 May 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 72–86. [Google Scholar]
  7. Yu, H.; Yao, N.; Wang, T.; Li, G.; Gao, Z.; Tan, G. WDFAD-DBR: Weighting depth and forwarding area division DBR routing protocol for UASNs. Ad Hoc Netw. 2016, 37, 256–282. [Google Scholar] [CrossRef]
  8. Wahid, A.; Lee, S.; Kim, D. A reliable and energy-efficient routing protocol for underwater wireless sensor networks. Int. J. Commun. Syst. 2014, 27, 2048–2062. [Google Scholar] [CrossRef]
  9. Noh, Y.; Lee, U.; Wang, P.; Choi, B.S.C.; Gerla, M. VAPR: Void-aware pressure routing for underwater sensor networks. IEEE Trans. Mob. Comput. 2013, 12, 895–908. [Google Scholar] [CrossRef]
  10. Diao, B.; Xu, Y.; An, Z.; Wang, F.; Li, C. Improving both energy and time efficiency of depth-based routing for underwater sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 781932–781940. [Google Scholar] [CrossRef]
  11. Jiang, J.; Han, J.; Guo, H.; Shu, L.; Rodrigues, J.J.P.C. Geographic multipath routing based on geospatial division in duty-cycled underwater wireless sensor networks. J. Netw. Comput. Appl. 2016, 59, 4–13. [Google Scholar] [CrossRef]
  12. Zhou, Z.; Cui, J.-H. Energy efficient multi-path communication for time-critical applications in underwater sensor networks. In Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Hong Kong, China, 26–30 May 2008; ACM: New York, NY, USA, 2008; pp. 221–230. [Google Scholar]
  13. Javaid, N.; Ilyas, N.; Ahmad, A.; Alrajeh, N.; Qasim, U.; Ali Khan, Z.; Liaqat, T.; Iqbal Khan, M. An Efficient Data-Gathering Routing Protocol for Underwater Wireless Sensor Networks. Sensors 2015, 15, 29149–29181. [Google Scholar] [CrossRef] [PubMed]
  14. Huang, C.-J.; Wang, Y.-W.; Liao, H.-H.; Lin, C.-F.; Hu, K.-W.; Chang, T.-Y. A power-efficient routing protocol for underwater wireless sensor networks. Appl. Soft Comput. 2011, 11, 2348–2355. [Google Scholar] [CrossRef]
  15. Xu, J.; Li, K.; Min, G. Reliable and energy-efficient multipath communications in underwater sensor networks. IEEE Trans. Parallel Distrib. Syst. 2012, 23, 1326–1335. [Google Scholar] [CrossRef]
  16. Luo, H.; Guo, Z.; Wu, K.; Hong, F.; Feng, Y. Energy balanced strategies for maximizing the lifetime of sparsely deployed underwater acoustic sensor networks. Sensors 2009, 9, 6626–6651. [Google Scholar] [CrossRef] [PubMed]
  17. Coutinho, R.W.L.; Boukerche, A.; Vieira, L.F.M.; Loureiro, A.A.F. Geographic and Opportunistic Routing for Underwater Sensor Networks. IEEE Trans. Comput. 2016, 65, 548–561. [Google Scholar] [CrossRef]
  18. Noh, Y.; Lee, U.; Lee, S.; Wang, P.; Vieira, L.F.M.; Cui, J.-H.; Gerla, M.; Kim, K. Hydrocast: Pressure routing for underwater sensor networks. IEEE Trans. Veh. Technol. 2016, 65, 333–347. [Google Scholar] [CrossRef]
  19. Latif, K.; Javaid, N.; Ahmad, A.; Ali Khan, Z.; Alrajeh, N.; Khan, M.I. On energy hole and coverage hole avoidance in underwater wireless sensor networks. IEEE Sens. J. 2016, 16, 4431–4442. [Google Scholar] [CrossRef]
  20. Stojanovic, M. On the relationship between capacity and distance in an underwater acoustic communication channel. ACM Sigmob. Mob. Comput. Commun. Rev. 2007, 11, 34–43. [Google Scholar] [CrossRef]
  21. Sha’ameri, A.Z.; Al-Aboosi, Y.Y.; Khamis, N.H.H. Underwater acoustic noise characteristics of shallow water in tropical seas. In Proceedings of the 2014 IEEE International Conference on Computer and Communication Engineering (ICCCE), Kuala Lumpur, Malaysia, 23–25 September 2014; pp. 80–83. [Google Scholar]
  22. Divide line in ratio k1:k2. Available online: http://www.teacherschoice.com.au/Maths_Library/Analytical%20Geometry/AnalGeom_3.htm (accessed on 12 January 2017).
  23. Sea 6 technical report: Underwater ambient noise. Available online: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/197303/SEA6_Noise_QinetiQ.pdf. (accessed on 21 December 2016).
  24. Ambient noise: The background noise of the sea. Available online: https://www.usna.edu/Users/physics/ejtuchol/documents/SP411/Chapter11.pdf (accessed on 21 December 2016).
Figure 1. Network Architecture of layered multipath power control (LMPC).
Figure 1. Network Architecture of layered multipath power control (LMPC).
Sensors 18 00149 g001
Figure 2. Network Architecture of forward layered multipath power control (FLMPC)-One and FLMPC-Two.
Figure 2. Network Architecture of forward layered multipath power control (FLMPC)-One and FLMPC-Two.
Sensors 18 00149 g002
Figure 3. Absorption and Frequency Relation.
Figure 3. Absorption and Frequency Relation.
Sensors 18 00149 g003
Figure 4. Forwarder Node Selection in FLMPC-One. (a) Cross Node potential forwarder node (PFN); (b) Relay Node PFN.
Figure 4. Forwarder Node Selection in FLMPC-One. (a) Cross Node potential forwarder node (PFN); (b) Relay Node PFN.
Sensors 18 00149 g004
Figure 5. Layer Division.
Figure 5. Layer Division.
Sensors 18 00149 g005
Figure 6. Forwarder Node Selection in FLMPC-Two. (a) Cross Node PFN; (b) Relay Node PFN.
Figure 6. Forwarder Node Selection in FLMPC-Two. (a) Cross Node PFN; (b) Relay Node PFN.
Sensors 18 00149 g006
Figure 7. Energy Consumption Feasible Region.
Figure 7. Energy Consumption Feasible Region.
Sensors 18 00149 g007
Figure 8. Noises Feasible Region.
Figure 8. Noises Feasible Region.
Sensors 18 00149 g008
Figure 9. Active Nodes.
Figure 9. Active Nodes.
Sensors 18 00149 g009
Figure 10. End-to-end Delay.
Figure 10. End-to-end Delay.
Sensors 18 00149 g010
Figure 11. Energy Consumption with Different Data Rate and Packet Size. (a) Scenario-1; (b) Scenario-2.
Figure 11. Energy Consumption with Different Data Rate and Packet Size. (a) Scenario-1; (b) Scenario-2.
Sensors 18 00149 g011
Figure 12. Packet Received Ratio.
Figure 12. Packet Received Ratio.
Sensors 18 00149 g012
Figure 13. Required Packer Error Ratio.
Figure 13. Required Packer Error Ratio.
Sensors 18 00149 g013
Table 1. Comparison of Single Path Routing Protocols.
Table 1. Comparison of Single Path Routing Protocols.
Protocol NameFeaturesAchievementsLimitations
DBR [6]Multi-hoppingHigh PDR and less delayVoid holes waste energy and increase retransmissions
WDFAD-DBR [7]Multi-hoppingIncreases PDR and energy efficiencyDelay of network increases
R-ER P 2 R [8]Multi-hoppingMaximize network lifetime and balanced energy consumptionVoid regions increase delay
VAPR [9]Multi-hopping using depth informationEnergy efficiencyHigh delay and low PDR in sparse regions
D-DBR [10]Multi-hoppingLess delay and high PDRHigh energy consumption
GFGD [11]Multi-hopping among small cubesEnergy efficiency and less delayNo mechanism to avoid void holes
Table 2. Comparison of Multi-Path Routing Protocols.
Table 2. Comparison of Multi-Path Routing Protocols.
Protocol NameFeaturesAchievementsLimitations
MPT [12]Multiple path transmissionIncreases reliability and low delayDense regions increase collisions and energy consumption
AEDG [13]AUVs and multi-hoppingBalanced energy consumption and high throughputHigh delay
PER [14]Forwarding data through multiple paths by following binary treeHigh PDRHigh delay and energy consumption
M-FEC [15]Data forwarding through multiple pathsMinimum energy consumption and reliabilityDelay increases because of data packet correction at each node
EBH [16]Direct transmission and multi-hoppingBalance energy consumptionVoid holes increase delay and energy consumption
Table 3. Comparison of Void Avoidance Routing Protocols.
Table 3. Comparison of Void Avoidance Routing Protocols.
Protocol NameFeaturesAchievementsLimitations
GEDAR [17]Multi-hoppingVoid holes coverageHigh energy consumption due to nodes movement
HYDROCAST [18]Multi-hopping through multiple pathsReliable transmission and PDRHigh delay and energy consumption
SHORT [19]Multi-hoppingHigh throughput and extended network lifetimeHigh delay
Table 4. Simulation Parameters.
Table 4. Simulation Parameters.
OptionValue
Scenario-1Scenario-2
Area2000 m × 2000 m4000 m × 4000 m
Noise of Ship0.2 dB0.8 dB
Wind5 m/s20 m/s
Number of Nodes150500
Simulation Period1000 s
Frequency914 × 106 Hz
Initialized Energy1000 J
txPower0.66 mW
rxPower0.395 mW
idlePower0.035 mW
Table 5. Performance Tradeoffs in Proposed and Compared Schemes.
Table 5. Performance Tradeoffs in Proposed and Compared Schemes.
ProtocolAchievementsFigureCompromised ParameterFigure
LMPCReliability and delayFigure 10Energy consumptionFigure 11a,b
active nodes and PRRFigure 9, Figure 12
FLMPC-OneReliability, energy consumptionFigure 11a,bDelayFigure 10
active nodes and PRRFigure 9 Figure 12
FLMPC-TwoReliability, energy consumption,Figure 11a,b,DelayFigure 10
active nodes and PRRFigure 9, Figure 12

Share and Cite

MDPI and ACS Style

Ali, B.; Sher, A.; Javaid, N.; Islam, S.U.; Aurangzeb, K.; Haider, S.I. Retransmission Avoidance for Reliable Data Delivery in Underwater WSNs. Sensors 2018, 18, 149. https://doi.org/10.3390/s18010149

AMA Style

Ali B, Sher A, Javaid N, Islam SU, Aurangzeb K, Haider SI. Retransmission Avoidance for Reliable Data Delivery in Underwater WSNs. Sensors. 2018; 18(1):149. https://doi.org/10.3390/s18010149

Chicago/Turabian Style

Ali, Babar, Arshad Sher, Nadeem Javaid, Saif Ul Islam, Khursheed Aurangzeb, and Syed Irtaza Haider. 2018. "Retransmission Avoidance for Reliable Data Delivery in Underwater WSNs" Sensors 18, no. 1: 149. https://doi.org/10.3390/s18010149

APA Style

Ali, B., Sher, A., Javaid, N., Islam, S. U., Aurangzeb, K., & Haider, S. I. (2018). Retransmission Avoidance for Reliable Data Delivery in Underwater WSNs. Sensors, 18(1), 149. https://doi.org/10.3390/s18010149

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop