Applied Sciences (Apr 2024)

Practical Steps towards Establishing an Underwater Acoustic Network in the Context of the Marine Internet of Things

  • Konstantin Kebkal,
  • Aleksey Kabanov,
  • Oleg Kramar,
  • Maksim Dimin,
  • Timur Abkerimov,
  • Vadim Kramar,
  • Veronika Kebkal-Akbari

DOI
https://doi.org/10.3390/app14083527
Journal volume & issue
Vol. 14, no. 8
p. 3527

Abstract

Read online

When several hydroacoustic modems operate simultaneously in an area of mutual coverage, collisions of data packets received from several sources may occur, which lead to information loss. With an increase in the number of simultaneously operating hydroacoustic modems, physical layer algorithms do not provide stable data transmission and the likelihood of collisions increases, which makes the operation of modems ineffective. To ensure effective operation in a hydroacoustic signal propagation environment and to reduce collisions when exchanging data between two modems that do not have the ability to operate synchronously and to reduce the access time to the signal propagation environment, methods of the medium access control layer using link layer protocols are required. Typically, this problem is solved using code separation of hydroacoustic channels. If you need to transfer over a network, this option will not work, since network transfer involves working on the basis of “broadcast” messages, particularly between data source and data sink that remain too far from each other, outside of their mutual audibility. In practical use, it is convenient to place these protocols into a software environment for developing specific user applications for solving network communication problems. This software framework allows for custom modification of existing network algorithms, as well as the inclusion of new network hydroacoustic communication algorithms. To build a predictive model, the DACAP, T-Lohi, Flooding, and ICRP protocols were used in this work. The implementation is performed in Erlang. The paper presents algorithms for implementing these protocols. A comparative analysis of network operation with and without protocols is provided. Efficiency of operation, i.e., data rates and probabilities of data delivery, was assessed.

Keywords