- Research
- Open Access

# Analyzing the performance of Aloha in string multi-hop underwater acoustic sensor networks

- Hongyang Yu
^{1}, - Nianmin Yao
^{1}Email author, - Shaobin Cai
^{1}and - Qilong Han
^{1}

**2013**:65

https://doi.org/10.1186/1687-1499-2013-65

© Yu et al.; licensee Springer. 2013

**Received:**25 October 2012**Accepted:**31 January 2013**Published:**12 March 2013

## Abstract

In this article, we intend to investigate the performance of channel access protocols in multi-hop underwater acoustic sensor networks, which are characterized by long propagation delays and limited channel bandwidth. An analytical model specifically designed for contention-based protocols in multi-hop underwater acoustic networks is identified and validated. The model is based on an underwater network model, called string topology network model, which provides a method for computing the expected network throughput and the probability of packets’ delivery to the gateway from an arbitrary sensor. This study demonstrates an improvement of an existing model, in which a node is implicitly assumed to be able to transmit two packets at the same time, which is not realistic due to the half-duplex character of underwater acoustic channels. Based on our findings, we propose a modified analytical model and evaluate it using NS-3 simulator. Results show that our analytical model is more precise than the existing one.

## Keywords

- Underwater acoustic sensor networks
- Performance analysis
- Medium access control (MAC) protocol
- Aloha
- Multi-hop

## Introduction

Underwater sensor networks are becoming an important research topic. They enable a wide range of collaborative applications, such as navy military surveillance, oceanographic data collection, ocean resource exploration, disaster prevention, and so on. Since both radio and optical signals suffer significant attenuation in salty water [1], acoustic technology is the typical physical layer communication method adopted by the underwater sensor networks, namely, underwater acoustic sensor networks (UASNs). However, the speed of acoustic waves in water is only approximately 1500 m/s, which is five orders of magnitude lower than the radio propagation speed. And the bandwidth of acoustic channels in water is one-thousandth that of the radio channels. Thus, compared with wireless sensor networks (WSNs), the research on UASNs is featured by long propagation delay and limited bandwidth, which pose grand challenges to almost every layer of network protocol stack and applications [2–8].

Similar to the WSNs, medium access control (MAC) protocols play a very important role in UASNs, which has high impact on the performance of the networks. Currently, theoretical analyses regarding MAC methods for UASNs focus on single-hop topology, which are summarized in surveys [5, 9]. In particular, Xie and Cui [6] presented some theoretical analyses of contention-based protocols such as Aloha for UASNs. However, in reality, multi-hop network is more practical and it can provide wider coverage [10]. Therefore, in this article we focus on the study of multi-hop underwater scenarios.

Pure Aloha is one of the contention-based MAC protocols, which allows nodes to transmit whenever it is needed. And Aloha has become the basis of many wireless MACs since its proposal in the 1970s [11]. Due to the long propagation delay and limited bandwidth of acoustic channels, contention-based protocols tend to be effective for multi-hop UASNs [12].

In [7], the first analytical model is proposed for the contention-based protocols in string multi-hop networks, called string topology network model (STNM). The model provides a method for computing the expected network throughput and the probability of packets’ delivery to the gateway from an arbitrary sensor. As a follow-up work, the performance of *p*-persistent Aloha is analyzed in [13]. In addition, a summary of these models are provided in [14].

In fact, the analytical model in [7] is questionable in three aspects. First, since the node cannot transmit two packets simultaneously, there is no collision among the packets sent by the same node. However, the analytical model includes the corresponding probability, and thus the collision probability of a packet reception must be higher than the actual one. Second, the packet transmitting rate is equal to the aggregate traffic rate of the same node in the analytical model. But in fact the former should be less than the latter, since the generated packet will be dropped when the node is sending packet. Third, the analytical model is not validated by the simulations or experiments, which make it less convincing.

In this article, we propose a modified analytical model of Aloha protocol for string multi-hop UASNs. In order to validate the new analytical model, we simulate Aloha protocol in a string multi-hop network via NS-3. A comparison between STNM and our analytical model is done. The results show that the analytical results obtained from our analytical model are more accurate than the ones obtained from STNM. Besides, based on our analytical model, we derive expressions for the system throughput and average end-to-end packet delay.

The remainder of this article is organized as follows. Section Performance analysis of multi-hop Aloha gives a brief overview of the string topology network, and identifies the modified analytical model of Aloha for string multi-hop UASNs. Section Experiments validates our model via simulations and analyzes the differences between the results obtained from our analytical model and the simulation results. Finally, Section Conclusion concludes the study.

## Performance analysis of multi-hop Aloha

In this section, we first briefly describe the string topology network [11]. Based on the string multi-hop topology, we then present an analytical model of Aloha protocol in string multi-hop UASNs. After that, we consider the analytical model in another way, and prove that the two models are equivalent. At the end of this section, the performance expressions for string multi-hop UASNs are derived from our model.

### String topology network

*λ*, i.e., on average, each node generates

*λ*packets per second. Each node immediately forwards the packet received from its upstream neighbor to its downstream neighbor. And the transmission range of each node is assumed to be only capable to reach its 1-hop neighbors and the interference range is less than the distance to any 2-hop neighbor. In this article, we only consider packet loss caused by collisions. We also assume that all packets in collisions will get lost, since the differences of signal strength between packets involved in the collision are not large enough. It is further assumed a fixed packet size and uniform transmission rate for all nodes, which result in a constant packet transmission time

*T*.

We notice the fact that a generated packet cannot be transmitted when the node is busy with sending. Our analytical model considers this while it is ignored by STNM. A packet sent out by each node may not follow a Poisson distribution since a packet may not be transmitted. In simulation, the packet will be dropped when it cannot be transmitted. As a result, the packet transmit rate is less than the aggregate traffic rate for each node.

As mentioned in [7], the string topology shown in Figure 1 favors the downstream traffic over the upstream traffic in underwater acoustic channels, as the packet from the downstream will be dropped only if it collides with other packets at a node further downstream.

### Improved analytical model

*λ*

_{ i }denote the aggregate traffic rate for node

*O*

_{ i }. The success probability of

*O*

_{ i }’s transmission,

*P*

_{ i }, is the success probability that

*O*

_{i+ 1}receives its packet, which is given as below [7]:

*C*

_{ i }= {

*O*

_{ i },

*O*

_{i+1},

*O*

_{i+2}} will inject traffic such that it arrives at the reception point at any time during the reception of the packet of interest, as depicted in Figure 2. Based on the results, the model derives a series of equations relating

*P*

_{ i }to

*λ*

_{ i },

*i*=

*1*,…,

*n*.

However, there are three disadvantages in STNM. First, the packet transmitting rate of *O*_{
i
} is equal to *λ*_{
i
} in STNM. But in fact the former is less than the latter, because some packets may not be sent out. Second, we consider the reception of a packet from *O*_{
i
} at node *O*_{i+ 1}. The duration that *O*_{
i
} takes to transmit a packet is equal to the duration *O*_{i+ 1} takes to receive the packet in STNM. Due to *O*_{
i
} cannot transmit two packets at the same time, there should be no collision at *O*_{i+ 1} between the packets from *O*_{
i
}. That is, the probability of successful reception has nothing to do with whether or not *O*_{
i
} is sending packets when *O*_{i+ 1} is receiving a packet from *O*_{
i
}. Therefore, in STNM, the collision probability of a packet reception must be higher than the actual one, since the model includes the corresponding probability. At last, STNM is not validated by the simulations or experiments.

*O*

_{ i }as

*λ*

_{transmit}(

*i*), and the successful transmission probability of a packet from

*O*

_{ i }as

*P*

_{transmit}(

*i*). The sending of a packet from

*O*

_{ i }can be done if and only if

*O*

_{ i }is not sending at that moment. Hence, the probability that a packet can be sent out by

*O*

_{ i }is equal to the probability that no traffic is generated by

*O*

_{ i }in one packet’s transmission time, i.e.,

*T*. Recalling that the packet generation of each node follows a Poisson distribution, we have

*O*

_{i+1}includes the traffic received from

*O*

_{ i }and the one generated by

*O*

_{i+1}. Given that each node originates packets at the same rate, we have

The successful reception of a packet from *O*_{
i
} at node *O*_{i+ 1} depends on the state of *O*_{i+ 1}. The reception of a packet will fail while *O*_{i+ 1} is currently overhearing the transmission of a packet by its downstream neighbor *O*_{i+ 2}, or currently sending a packet to *O*_{i+ 2}. And the reception of a packet will succeed only if *O*_{i+ 1} is idle in twice the packet’s reception time, i.e., 2*T*. These constraints are independent.

*O*

_{ j }is equal to the probability that no traffic arrives at

*O*

_{ j }. The probability that no packet is sent out by

*O*

_{ j }during a packet’s reception period is

*O*

_{ i }is

*n*variables:

*λ*

_{transmit}(1),

*λ*

_{transmit}(2) ,…,

*λ*

_{transmit}(

*n*). This can be achieved by solving the following minimization problem

where Λ = (*λ*_{
transmit
}(1) *λ*_{
transmit
}(2) … *λ*_{
transmit
}(*n*)), and ${F}_{i}^{\prime}\left(\mathrm{\Lambda}\right)$ is calculated by iterative computation using Equation (5).

The Nelder-Mead simplex method has been quite effective to solve the above minimization problems [15]. In Section Experiments, we will calculate above equations and obtain the analytical results using this method in Matlab.

### Equivalent modification analytical model

*P*

_{success}(

*i*) denote the success probability that

*O*

_{i+1}receives the packet arrived at

*O*

_{ i }. More formally stated, that is

*O*

_{ i }at node

*O*

_{i+ 1}depends on the state of

*O*

_{ i }and

*O*

_{i+1}. The reception of a packet from

*O*

_{ i }is successful only if

*O*

_{ i }is not sending some packet and no other packets arrive at

*O*

_{i+1}during one packet’s reception period. In other words, there are three possible reasons for a packet from

*O*

_{ i }to get lost: first, the packet generated by

*O*

_{ i }is tried to be sent when

*O*

_{ i }is transmitting some other packet; second, the packet arrives at

*O*

_{i+1}when

*O*

_{i+1}is currently overhearing a packet from

*O*

_{i+2}or

*O*

_{i+1}is transmitting some packet to

*O*

_{i+2}; and third,

*O*

_{i+1}initiates a transmission or some packet from

*O*

_{i+2}arrives at

*O*

_{i+1}when

*O*

_{i+1}is receiving the packet. Therefore, the reception success probability at

*O*

_{i+1}is

We can see that this analytical model is equivalent to the one described in Section Improved analytical model.

### Network performance expressions

*U*

_{ i }denote the utilization of the link from

*O*

_{ i }to

*O*

_{i+ 1}. The utilization of the network and the effective throughput of the sensor network, denoted by

*U*(

*n*) and

*S*(

*n*), can be expressed as follows

where *λ*_{transmit} (*n*) and *P*_{
n
} are calculated by Equations (5), (7), and (8), respectively; *L* is the average packet size in bits; and *α* is the average fraction of data bits in each packet received by the gateway.

where *c* is the speed of acoustic waves in water; *T* is the packet transmission time; and Distance(*i*) is the distance from *O*_{
i
} to *O*_{i+ 1}.

## Experiments

In this section, we first calculate the analytical results obtained from STNM (“the original results” for short) using Equations [7] and the ones obtained from our model (“the improved results” for short) using Equations (5) and (7). Then, we perform simulation with the same parameter setting using NS-3. After that, we compare STNM with the modification model, as well as validate them with the simulation results.

The NS-3 UAN module offers accurate modeling of the underwater acoustic channel and a model of the WHOI acoustic modem. Both the attenuation and noise are known to be strong functions of frequency. In our simulation, the acoustic channel model adopts Thorp attenuation [16], which is used for the calculation of the SNR at the receiver with the consideration of the ambient noise.

*T*is set to be 1 s, packet size is 32 Bytes, and the simulation operation time is 20,000 s. There are nine nodes in the string multi-hop network, so

*n*is 8. All nodes are at the same depth, 100 m. We use a channel bandwidth of 10–14 kHz, data rate of 256 bps, and transmit power of 190 dB

*re*1 uPa. The minimum SIR that the receiver requires for a correct reception is set to 10 dB. Thus, the packet transmission time is 32 × 8/256 = 1 s, which is equal to

*T*. We use a path loss exponent of 1.5 corresponding to practical spreading, and absorption according to Thorp, sensor node’s communication range is between 50509 and 50510 m. We set the distance between nodes as 45000 m to make sure that a node can only talk with its one-hop neighbors. Therefore,

*O*

_{ i }’s position is (45000

*i*, 0, 100) in the string topology network. All parameters are listed in Table 1.

**Parameter setting**

Parameter | Value |
---|---|

Transmission time | 1 s |

Data rate | 256 bps |

Packet size | 32 Bytes |

Total node number | 9 |

Channel bandwidth | 10–14 kHz |

Transmit power | 190 dB re 1 uPα |

Minimum SIR | 10 dB |

Simulation time | 20,000 s |

The position of each node | (45,000 |

*λ*is set as 0.002, 01, 0.1, and 0.5, respectively, to diversify the per-sensor load like [7]. Figure 3 shows the original, improved, and simulation results of the actual traffic load of each node (

*λ*

_{transmit}(

*i*),

*i*= 1,…,

*n*). Same as claimed in [7], we can see that

*λ*

_{transmit}(

*i*) increases when

*i*increases, regardless of

*n*. We can also observe that our improved results can better match the simulation results than the original ones do.

*P*

_{ i }deceases except at the last two nodes due to their smaller contending node sets. When the load exceeds

*λ*= 0.5 each node has reached its saturation status and

*P*

_{ i }becomes stable. In particular, no matter what load is chosen, simulation results of

*P*

_{ n }is always approaching to 1, therefore our model is more accurate than STNM.

*λ*= 0.2, 0.3, 0.4, 0.5, and 0.6, respectively. Figure 5 shows that the bias between our improved results and simulation results increases as the load goes up. One of the main reasons for the bias is that in our model and STNM, we assume that the packet transmitted by each node follows a Poisson process, which can approximately be satisfied when the

*λ*is low. However, the interarrival time between the two adjacent packets transmitted is not an exponential distribution, since it is more than

*T*. Thus, with the increase of the

*λ*, the packet transmitted by each node cannot be approximately by a Poisson process any more, which contributes to the bias in the heavy traffic-loaded network.

*λ*

_{transmit}(

*i*) and the

*λ*

_{transmit}(

*i*) measured by simulation, and the sum of the squared differences between the improved

*λ*

_{transmit}(

*i*) and the

*λ*

_{transmit}(

*i*) measured by simulation versus the

*λ*. We can observe that our improved results can better match the simulation results than the original ones do.

Figure 6b shows the sum of the squared differences between the original *P*_{
i
} and the *P*_{
i
} measured by simulation, and the sum of the squared differences between the improved *P*_{
i
} and the *P*_{
i
} measured by simulation versus the *λ*. We can observe that our improved results are always more coincident with the simulation results than the original ones. Considering *P*_{
n
} significantly impacts results, we compute the sum of the squared differences of *P*_{
i
} except *P*_{
n
}, again. From Figure 6c, we can observe that the bias of our improved results still fit better than the original ones do in most cases. The above results show that our analytical model is more precise.

In the following, we explore the utilization of the string topology network. Gibson et al. [7] provide a method for computing the expected network utilization. Since STNM in [7] does not fit the simulation result well, we reconsider the utilization of the network using Equation (13).

*λ*. As mentioned in [7], the utilization increases with

*n*when the per-sensor load is small, since more packets arrive at the gateway when the nodes have not reached their saturation status. When the nodes are saturated, or almost saturated, the utilization of the network is almost flat with respect to

*n*. However, Gibson et al.’s [7] analysis severely underestimated the utilization of Aloha in string topology UASNs, as depicted in Figures 7 and 8. The utilization can reach the maximum at about 0.3678 when the load is about 0.8. The results from STNM are less than half of the results of our model. The throughput of the network is similar with the utilization.

From Figure 8, we can also observe that the utilization obtained from our model and STNM first increases with the load. After it has reached the maximum, it starts decreasing. However, the utilization obtained from simulation is monotonically non-decreasing and the maximum utilization is 1. When the load is very heavy, only the data from the last node can reach the gateway. Thus, the bias between analytical model and simulation results increases as the load goes up. This also indicates that the packet transmitted by each node cannot be approximated by a Poisson process when *λ* is high.

Although there is a bias between analytical model and simulation results, our analytical model is still reasonable, since *λ* is less than 1 in most cases for underwater scenario. To further improve the analytical model’s accuracy, the relationship between the bias and the load should be investigated. We would like to explore this topic in our future work.

## Conclusion

In this article, we identified and validated the analytical model of Aloha in multi-hop UASNs. The simulation results justify that our modified analytical model is more accurate than STNM. Based on our model, we provide the expected network throughput and average end-to-end delay in string topology underwater networks.

The above analytical models are based on pure Aloha protocol which the node’s transmission has higher priority than the node’s reception. It is very inefficient, since a node will simply transmit a packet whenever it has anything to send, regardless of whether it is currently receiving a packet.

In the future, we would like to investigate the relationship between the bias and the load for our analytical model as well as further improve the accuracy of our analytical model. And we would also investigate other Aloha-based protocols such as slotted-Aloha protocol and Aloha with half-duplex protocol for string topology multi-hop network.

## Declarations

### Acknowledgment

This study was supported by the National Natural Science Foundation of China under Grant no. 61073047; Fundamental Research Funds for the Central Universities: HEUCFT1202 and Harbin Special funds for Technological Innovation Talents: 2012RFLXG023.

## Authors’ Affiliations

## References

- Schill F, Zimmer UR, Trumpf J:
*Visible spectrum optical communication and distance sensing for underwater applications, in Proceedings of the Australasian Conference on Robotics and Automation*. 2004.Google Scholar - Liu J, Wang Z, Peng Z, Cui J, Zhou S: JSL: a joint solution for localization and time synchronization underwater sensor networks. In Proceedings of the IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON). Seoul, Korea: ; 18–21 June 2012Google Scholar
- Liu J, Han X, Bzoor MA, Zuba M, Cui J, Ammar RA, Raj S: PADP: prediction assisted dynamic surface gateway placement for mobile underwater networks. In Proceedings of the Seventeenth IEEE Symposium on Computers and Communication (ISCC’12). Cappadocia, Turkey: ; 1–4 July 2012Google Scholar
- Liu J, Wang Z, Peng Z, Zuba M, Cui J, Zhou S:
*TSMU: a time synchronization scheme for mobile underwater sensor networks, in Proceedings of the GLOBECOM*. Houston, TX, USA: ; 2011.Google Scholar - Heidemann J, Ye W, Willis J, Syed AA, Li Y: Research challenges and applications for underwater sensor networking. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2006). Las Vegas, NV: ; 229-235. 3–6 April 2006Google Scholar
- Xie P, Cui J: Exploring random access and handshaking in large scale underwater wireless acoustic sensor networks. In
*Proceedings of the MTS/IEEE Oceans Conference*. Boston: ; 2006.Google Scholar - Gibson J, Xie G, Xiao Y, Chen H:
*Analyzing the performance of multi-hop underwater acoustic sensor networks, in IEEE Oceans’ 07*. Aberdeen, Scotland: ; 2007.Google Scholar - Liu J, Zhou Z, Peng Z, Cui J:
*Mobi-Sync: efficient time synchronization for mobile underwater sensor networks, Proceedings of the GLOBECOM*. Miami, FL, USA: ; 2010:1-5.Google Scholar - Akyildiz IF, Pompili D, Melodia T:
*State of the Art in Protocol Research for Underwater Acoustic Sensor Networks*. 4th edition. New York: ACM; 2007:11-12.Google Scholar - Chitre M, Shahabudeen S, Stojanovic M: Underwater acoustic communications and networking: recent advances and future challenges.
*Mar. Technol. Soc. J.*2008, 42: 103-116.View ArticleGoogle Scholar - Abramson N: The ALOHA system.
*Proceedings of the AFIPS 1970 Fall Joint Comput Conference*1970, 37: 281-285.Google Scholar - Berkhovskikh L, Lysanov Y:
*Fundamentals of Ocean Acoustics*. New York: Springer; 1982.View ArticleGoogle Scholar - Xiao Y, Zhang Y, Gibson JH, Xie GG: Performance analysis of p-persistent aloha for multi-hop underwater acoustic sensor networks.
*International Conference on Embedded Software and Systems*2009, 305-311.Google Scholar - Xiao Y, Zhang Y, Gibson JH, Xie GG, Chen H: Performance analysis of ALOHA and p-persistent ALOHA for multi-hop underwater acoustic sensor networks.
*Cluster Comput.*2011, 14: 65-80. 10.1007/s10586-009-0093-zView ArticleGoogle Scholar - Olsson DM, Nelson LS: The Nelder-Mead simplex procedure for function minimization.
*Technometrics*1975, 17: 45-51. 10.1080/00401706.1975.10489269View ArticleGoogle Scholar - Harris AF, Zorzi M: Modeling the underwater acoustic channel in ns2. In
*Proceedings of the 2nd international Conference on Performance Evaluation Methodologies and Tools, vol 321, Nantes, France, 22–27 October 2007*. Brussels, Belgium: ValueTools ICST (Institute for Computer Sciences Social-Informatics and Telecommunications Engineering), ICST; 2007:1-8.Google Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.