Proceedings of OCEANS 2005 MTS/IEEE
DOI: 10.1109/oceans.2005.1639918
|View full text |Cite
|
Sign up to set email alerts
|

An Energy-Efficient MAC Protocol for Underwater Wireless Acoustic Networks

Abstract: We propose a distributed, scalable, energy-efficient MAC protocol that works despite long, unknown propagation delays of the underwater acoustic medium. This protocol can be used for delay-tolerant applications such as underwater ecological sensor networks between energy-limited nodes. Our protocol differs significantly from ALOHA, MACA, and MACAW protocols in that energy is the main performance metric in our case rather than bandwidth utilization. It is shown that under a realistic underwater sensor network s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
81
0

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 127 publications
(82 citation statements)
references
References 14 publications
1
81
0
Order By: Relevance
“…MAC Design efforts for UANs cover the spectrum of techniques employed by wireless networks, to include channel allocation [1,8], carrier-sense techniques using duty cycles [11], adaptive reservation-based protocols [12], and topologyaware protocols [13]. Each of these designs seems to offer certain advantages for specific UAN issues.…”
Section: Related Workmentioning
confidence: 99%
“…MAC Design efforts for UANs cover the spectrum of techniques employed by wireless networks, to include channel allocation [1,8], carrier-sense techniques using duty cycles [11], adaptive reservation-based protocols [12], and topologyaware protocols [13]. Each of these designs seems to offer certain advantages for specific UAN issues.…”
Section: Related Workmentioning
confidence: 99%
“…A random access based MAC protocol for underwater sensor networks is proposed in [12]. Due to the fundamental limitation of random access, this protocol only works well for the networks with very low and evenly distributed traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Contention-based protocols includes random access methods [1,11,12] and collision avoidance methods [7,3,5]. In a random access protocol, the sender sends packets without coordination.…”
Section: Introductionmentioning
confidence: 99%
“…A different approach to channel access was proposed in [5]. This solution is strictly tied to a sleeping schedule, which is optimized for minimal energy consumption and does not consider bandwidth utilization or access delay as objectives.…”
Section: Introductionmentioning
confidence: 99%