2015
DOI: 10.1109/joe.2015.2471736
|View full text |Cite
|
Sign up to set email alerts
|

Underwater Acoustic Network Simulation With Lookup Tables From Physical-Layer Replay

Abstract: An underwater acoustic network simulation methodology is presented that is based on lookup tables (LUTs) with physical-layer error ratios. These LUTs are prepared with a validated replay channel simulator, which is here driven by channel measurements from the Kauai Acomms MURI 2011 (KAM11) experiment. Three physical-layer candidates are considered: a coherent singlecarrier scheme, a coherent multicarrier scheme, and an incoherent scheme. The three modulation schemes are operated at a fixed message size and at … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
32
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 45 publications
(33 citation statements)
references
References 41 publications
1
32
0
Order By: Relevance
“…Following the presentation at UComms, IMT Atlantique (formerly known as Telecom Bretagne) generously offered array data [13] for release with the benchmark, and, soon after, Scripps Institution of Oceanography approved a request to include array data from the Kauai Acomms MURI 2011 (KAM11) experiment [14], [15].…”
Section: Introductionmentioning
confidence: 99%
“…Following the presentation at UComms, IMT Atlantique (formerly known as Telecom Bretagne) generously offered array data [13] for release with the benchmark, and, soon after, Scripps Institution of Oceanography approved a request to include array data from the Kauai Acomms MURI 2011 (KAM11) experiment [14], [15].…”
Section: Introductionmentioning
confidence: 99%
“…This procedure will be done for a fixed number of re-transmissions. In [10], a random selection of the implicit ACK time has been proposed for the Dflood protocol. We will use the same approach in order to have a direct comparison between the two protocols.…”
Section: Implicit Ackmentioning
confidence: 99%
“…In some other cases, it may happen that the channel buffers the packets from different nodes, and thus avoids the interference from different ongoing transmissions. With the latter assumption for the interference model, in the NC case, we have assumed that the network layer sends the packets down to the MAC layer with a backoff time drawn uniformly from [1,10]. This is done with the goal to avoid interference that may affect all the packets of the same generation, if they are transmitted sequentially.…”
Section: Physical and Mac Layermentioning
confidence: 99%
See 2 more Smart Citations