skip to main content
10.1145/1868812.1868826acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Reliable transport and storage protocol with fountain codes for underwater acoustic sensor networks

Published:30 September 2010Publication History

ABSTRACT

Due to high energy efficiency and fast data query, data-centric storage (DCS) is a promising technique for underwater acoustic sensor networks (UASN). However, the harsh sea environment poses new challenges to the design of underwater DCS protocols. First, because of long propagation delay and unreliably data links of underwater acoustic communications, long-distance multihop reliable data transport needs to be investigated. Secondly, due to the high node failure probability in the unattended UASNs, data reliability demands better protection. To address these two issues together, a fountain codes based reliable transport and storage (RTS) protocol is proposed in this paper. In the RTS protocol, a distributed fountain coding scheme is designed to facilitate reliable data delivery and multiple acknowledgements are adopted to ensure the control message reliability. In addition, to guarantee uniform data reliability, we devise a distributed storage scheme with concatenated fountain codes. Analyses are provided to reveal the performance of the proposed RTS protocol, which include storage reliability, energy consumption and number of retransmissions.

References

  1. }}I. Akyildiz, D. Pompili, and T. Melodia. Underwater acoustic sensor networks: Research challenges. Elsevier's Journal of Ad Hoc Netowrks, 3:257--279, Mar. 2005.Google ScholarGoogle ScholarCross RefCross Ref
  2. }}R. Cao and L. Yang. Robust data-centric storage for underwater acoustic sensor networks. In Proc. of Oceans Conf., Biloxi, MS, Oct. 26--29 2009.Google ScholarGoogle ScholarCross RefCross Ref
  3. }}P. Casari, M. Rossi, and M. Zorzi. Fountain codes and their application to broadcasting in underwater networks: performance modeling and relevant tradeoffs. In Proc. of the 3rd ACM intl. workshop on Underwater Networks, San Francisco, CA, Sep. 14--19 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. }}B. Karp and H. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In Intl. Conf. on Mobile Computing and Networking, pages 243--254, Boston, MA, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. }}Z. Kong, S. A. Aly, and E. Soljanin. Decentralized coding algorithms for distributed storage in wireless sensor networks. IEEE Journal on Selected Areas in Communications, 28:261--267, Feb. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. }}M. Luby. LT codes. In 43rd Symp. on Foundations of Computer Science, Vancouver, BC, Canada, Nov. 16--19 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. }}S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu. Data-centric storage in sensornets with GHT, a geographic hash table. Mobile Networks and Applications, 8(4):427--442, Aug. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. }}K. Seada and A. Helmy. Rendezvous regions: A scalable architecture for service location and data-centric storage in large-scale wireless networks. In 18th Intl. Parallel and Distributed Processing Symp. (IPDPS'04), pages 91--98, Santa Fe, NM, Apr. 26--30, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  9. }}P. Xie and J.-H. Cui. SDRT: a reliable data transport protocol for underwater sensor networks. Tech. rep. ubinet-tr06--03, Department of Computer Science and Engineering, University of Connecticut, Storrs, CT, Feb. 2006.Google ScholarGoogle Scholar

Index Terms

  1. Reliable transport and storage protocol with fountain codes for underwater acoustic sensor networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WUWNet '10: Proceedings of the 5th International Workshop on Underwater Networks
          September 2010
          105 pages
          ISBN:9781450304023
          DOI:10.1145/1868812

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 30 September 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate84of180submissions,47%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader