This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
1. Introduction
Internet of Underwater Things (IoUT) [1–3] has a wide range of application prospects in civilian and military fields. As a key technology of IoUT, underwater sensor networks (UWSNs) have attracted widespread attention from academia and industry. In recent years, the underwater sensor network has been no stranger to the people. It has been widely used in industrial, civil, and military fields [4–7] and has a very impressive application scenario [8]. Using this technology, human beings can perform marine environmental monitoring, marine resource management, underwater reconnaissance and multipoint detection, and dispatching and commanding of cluster management [9, 10]. However, the underwater environment is complex and unstable, with high delay, dynamic variation of delay, multipath effect, Doppler effect, and severe attenuation [11]. These factors make the research of underwater acoustic sensor network far behind the land wireless sensor network technology. Therefore, studying the underwater acoustic sensor network and promoting the advancement of technology in this field is of great significance to the development of the country and human beings.
The underwater sensor network adopts the underwater acoustic communication method. The actual network construction requires a large amount of equipment support, which requires a long establishment period and a large amount of human and financial resources consumption [12]. Therefore, it is very difficult and impractical to establish an underwater sensor network entity for scientific research under conditions that are not mature. It is a reasonable and effective way to verify the feasibility of the underwater sensor network model and protocol by using computer technology simulation.
Most of the current simulation systems are based on mathematical modelling, which greatly simplifies the real environment. There is still no widely recognized simulation system of underwater acoustic sensor networks [13]. Thomase [14] proposed a modular simulation software with a visual platform. Users can set the underwater acoustic parameters in the platform, and the operation is convenient. However, the software does not consider the impact of seawater temperature, depth, salinity, and other factors in channel modelling. The same is true for the Aqua-Sim [15] software, which do not take into account some seawater factors when establishing the underwater acoustic channel model. To improve the realism of computer simulations, Harris and Zorzi [16] added the marine environmental noise model to the channel model of the NS-Miracle [17] simulation software.
The common feature of the above simulation platforms is that they did not consider the differences between underwater environments in different sea areas (such as sea temperature, salinity, depth, and seabed sediments). These parameters can affect underwater acoustic propagation. In order to improve the accuracy of the computer simulation of underwater acoustic channel, WOSS [18] was introduced into the simulation software (NS2/NS-Miracle). Compared with other literatures, the main contribution of this paper is to simulate and analyze UWSNs by integrating NS2, NS-MIRACLE, WOSS, and Bellhop. The integrated simulator makes the simulation channel of underwater wireless sensor networks closer to the real ocean environment than original channel simulation.
In this paper, the first section introduces the simulation work of the underwater sensor network. The environment model of the simulation platform and WOSS is represented in the second section. The third section describes the underwater acoustic channel modelling of the simulation platform, mainly including the Ray-Tracing model, empirical model, and noise model. The fourth section tests the channel model. The MAC protocol of the underwater sensor network is simulated and analyzed by using the simulation platform in the fifth section. The sixth section summarizes the whole paper.
2. Environmental Modelling of Simulation Platform
WOSS is an open source multithreaded framework, which provides a series of APIs that automatically deliver environmental data to the channel simulator. The aim is to improve the reliability of underwater sensor network simulation through modelling of more realistic underwater environment [19]. We provide the visualization platform in order that users can set network topology parameter and location information (latitude, longitude, and depth). WOSS obtains the marine environment data of the region according to the location information and provides the data to Bellhop simulator.
In order to retrieve the required environmental data, WOSS provides a free-to-use marine database interface for the network simulator and Bellhop [20–22] as shown in Figure 1. User inputs the simulation parameters through the visual interface, after NS-Miracle gets the simulation data, and transmits the location data to WOSS. WOSS retrieves the regional environmental data through accessing the environment parameters database according to its location data and transmit them to the Bellhop channel simulator. After simulation processing, the simulation results are transmitted to NS-Miracle, which finally presents the simulation results to the user in the form of a diagram through the visual platform.
[figure omitted; refer to PDF]
There are three major databases in WOSS. They are the WOA (World Ocean Atlas) sound speed profile database, the GEBCO ocean depth database, and the DECK41 ocean sediment database. WOSS obtains the location information (latitude, longitude, and depth) of the node through the visual simulation platform, then uses this information to inquire the database, and calculates the sound speed profile through WOA. The WOA database collects environmental data of the oceans around the world, including salinity and temperature sampling data. The seawater depth data of the network is extracted and transmitted to Bellhop by accessing the GEBCO grid database interface. WOSS obtains seabed sediment data by accessing the Deck41 database, which is taken into account when Bellhop calculates the loss and attenuation. The accuracy of model is improved because the more precise environment data is obtained by WOSS.
The WOSS interfaces are mainly divided into three categories, which, respectively, implement communication connections with network simulator, channel simulator, and environment databases. The first category is the base class library, which contains 11 classes, which implement the underwater network node geographic coordinates, time calculation, random number generator, sound speed profile calculation, ocean depth data, seabed sediment data definition, etc. The second category is the interface class library of the database, which is used to create and initialize the database, which to achieve data access and extraction of the database. The third category is the interface class library of the channel simulator, which is used to create and initialize WOSS objects. The library automatically integrates with the channel simulator and provides simulation result reading and output interfaces.
The framework of WOSS is shown in Figure 2. It can be seen from the figure that the user layer of the network emulator is responsible for passing the ocean geolocation parameters to the WossManager. The WossManager is responsible for requesting a WOSS object from the WossCreator. After the WossCreator receives the request, it will create and initialize a WOSS object. WOSS object calls the database interface of environment parameters. The WOSS object can also call ResReader and WossResReader to read the results of the channel simulator.
[figure omitted; refer to PDF]
The parameters used in the three sets of experiments were identical, as shown in Table 1. All the nodes in the network are arranged at 42.59 degrees north latitude, and the longitude is 10.125 degrees to 10.162 degrees east longitude. The latitude and depth distance between adjacent nodes are, respectively, 0.01 degrees and 1 meter. The sink is located at the 10.143 degrees east longitude and 5.5 meters underwater.
Table 1
Three sets of simulation experimental parameters.
Parameter | Value | Parameter | Value |
Number of nodes | 5 | Frequency | 11.5 kHz |
Packet length | 512 byte | Bandwidth | 5 kHz |
Simulation time | Receive node maximum bit rate | 4800 bps | |
Transmitting the maximum sound source level | 190 dB | Bit rate/node | 51.2 bps |
Transmitter transducer opening angle | 90° | Receiving transducer opening angle | 90° |
Maximum emission distance | 10 km |
The comparison of the data of the three sets of simulation results is shown in Table 2. The comparison results show that the three sets of simulation results are relatively close. The average throughput and average delay of the two sets of experiments using Bellhop channel simulation model are very close, while the average throughput and delay obtained by the first set of simulations using the empirical models are the slightly larger than the latter. The average packet error rate of the three is very close. This indicates that the integrated simulation platform introduced by WOSS and Bellhop can correctly simulate the propagation characteristics of underwater acoustic channel. Since WOSS can retrieve the global ocean data information and provide it to the Bellhop channel simulator, the simulation performance is close to that of the actual underwater network. In addition, WOSS can automatically retrieve the environmental parameters needed for simulation with only the geographic location (longitude, latitude, and depth), this simplifies the simulation. However, compared with the simulation time-consuming, the latter two sets spend a relatively long simulation time, especially the third group, which indicates that Bellhop and WOSS will seriously reduce the simulation efficiency.
Table 2
Comparison of three sets of simulation results.
Parameter | Average throughput (bps) | Average normalized throughput | Average delay (s) | Average packet error rate | Simulation time consuming (s) |
Group 1 | 46.653 | 0.911 | 2.326 | 0.063 | 2 |
Group 2 | 47.478 | 0.927 | 1.522 | 0.066 | 70 |
Group 3 | 47.52 | 0.928 | 1.524 | 0.061 | 223 |
The influence of the empirical model, the Bellhop model, and WOSS combined with Bellhop model on the MAC protocol was discussed. The simulation results of the ALOHA-CS protocol (the protocol is detailed in Section 6) are shown in Figures 4–6 when three channel models are used. The network topology as shown Figure 3, and other experimental parameters are the same as in Table 1.
[figure omitted; refer to PDF]
The simulation experiment sets the packet sending period of each node is sampled from 15 seconds to 200 seconds, a total of samples is eleven, the samples of packet sending period in experiment are shown in Table 3. The simulation platform tracks the transmission data between each transmitting node and the sink node during the network running process. The average throughput, delay, and packet error rate of each simulation experiment are calculated. The normalized throughput is the ratio of the number of bits correctly arriving at the receiver per second divided by the data traffic because this is the maximum rate at which information can reach the receiver. In order to compare the performance of each protocol, the average throughput is done as normalized as shown as follows
Table 3
Experimental grouping list.
Average delivery period second (seconds) | Total |
15, 20, 30, 40, 50, 60, 70, 80, 90, 100, 200 |
where
The average normalized throughput of the three models obtained by simulation is shown in Figure 4. It can be seen from the figure that the throughput of the three models gradually decreases with the increase of the data traffic. The average normalized throughput of Bellhop model and WOSS combined with Bellhop model is very close, and the average normalized throughput is always higher than that of empirical model when the data traffic of protocol is between 30 bps and 270 bps.
Figure 5 shows the simulation results of the impact of the data traffic on network packet delay. It can be seen from the figure that as the increase of the data traffic, the delay of the three models increases gradually. When the data traffic is between 30 bps and 211 bps, the average delay of Bellhop model and WOSS combined with Bellhop model increase steadily, when the data traffic higher than 211 bps that the two models increase rapidly, but it is always lower than that of empirical model.
The network average packet error rate simulation results using three models are shown in Figure 6. The average packet error rate of the three models is gradually increasing, and when the data traffic is between 40 bps and 270 bps, the packet error rate of the Bellhop model and WOSS combined with Bellhop model is always lower than of the empirical model.
The simulation results of three models show that, as the Bellhop model and the WOSS combined with Bellhop model take into account the complex characteristics of real-time ocean channels, the simulation results are more realistic compared with the empirical model. At the same time, WOSS combined with Bellhop model only obtains the marine environment data of the region according to the location information (latitude, longitude, and depth) and provides the data to Bellhop simulator, which makes the operation more convenient.
5. MAC Protocol Simulation of UWSNs
The ALOHA-CS protocol [34] is an improved version of the ALOHA protocol. The ALOHA-CS protocol adds the channel monitoring function. When data is transmitted, the node monitors the channel. If there is packet transmission, it waits for a randomly distributed time and monitors the channel again and finally performs the next retransmission. When the number of retransmissions reaches the maximum, it abandons the transmission. The carrier sense multiple access with collision avoid (CSMA/CA) protocol [35] is a multiple access method in wireless networks for sensing and avoiding the collisions. The CSMA/CA protocol adds an RTS-CTS (Request To Send-Clear To Send) handshake mechanism to the CSMA protocol, which solves the problems of hidden terminals and exposed terminals. The Distance Aware Collision Avoidance Protocol (DACAP) protocol [36] uses the RTS-CTS handshake for reserving the channel for packet transmission and saves broadcast energy by avoiding collisions.
In order to further test whether the extended simulation software is available, the paper uses the integrated system to simulate the Aloha-CS protocol, the CSMA/CA protocol, and the DACAP protocol in a five-node centralized topology (see Figure 3). In the test, the network data generation method is a fixed bit rate, and BPSK modulation and demodulation is adopted. The geographic location of the nodes and other experimental parameters is the same as that of the previous section. The simulation experiments are divided into three groups, and three MAC protocols are simulated by the same parameters.
The average normalized throughput of the three protocols obtained by simulation is shown in Figure 7. It can be seen that the throughput of the Aloha-CS and DACAP protocols gradually decreases with the increase of the packet delivery rate, and the throughput of Aloha-CS protocol is always higher than that of DACAP protocol when the average data traffic is between 80 bps and 270 bps. The reason is that Aloha-CS and DACAP protocols implement collision avoidance mechanisms through channel listening and avoidance time. The channel listening and handshake mechanisms consume a certain amount of time and increase the network load, so the throughput declined when the average data traffic increased. The DACAP handshake and warning packet mechanism are more complex than Aloha-CS, so the throughput performance is even worse. For CSMA/CA protocol, after the transmitting node received confirmation message of the receiving node, the data packets will be transmitted according to whether the network is blocked or not. This mechanism makes the impact of increasing the average data traffic on throughput weakly when the bandwidth is large enough. Therefore, Figure 7 shows that the average data traffic has little effect on the throughput of the network using the CSMA/CA MAC protocol.
[figure omitted; refer to PDF]
Figure 8 shows the simulation results of the impact of the average data traffic on the network delay. It can be seen from the figure that as the average data traffic increases, the delay of the Aloha-CS and DACAP protocols increases gradually. When the average data traffic reached 100 bps, the delay of the DACAP protocol has reached 700 seconds, which indicates that the protocol is not working properly. So the DACAP protocol is not applicable to underwater networks with the average data traffic higher than 100 bps. When the average data traffic is 270 bps, the delay of the Aloha-CS protocol reaches 160 seconds. It indicated the network basically did not work. Therefore, the Aloha-CS protocol is not applicable to UWSNs with the average data traffic higher than 200 bps. Delay and average throughput of both protocols are affected by the collision avoidance mechanism. The delay of CSMA/CA protocol increases firstly with the increase of the average data traffic. When the average data traffic is greater than 150 bps, the average delay decreases slightly.
[figure omitted; refer to PDF]
The network average packet error rate using three MAC protocols is shown in Figure 9. When the average data traffic is less than 30 bps, the average packet error rate of the Aloha-CS and DACAP protocols is almost zero. The packet error rate of both tends to increase with the increase of the average data traffic. The packet error rate of the CSMA/CA protocol is always less than 0.1 in the whole process. It shows very good performance.
[figure omitted; refer to PDF]
The simulation results of three MAC protocols show that, as a result of DACAP strongly avoid collision mechanism, the packet error rate is almost zero during the average data traffic is very low. However, because its performance is limited by the handshake mechanisms, its performance declined seriously, even unable to work with the average data traffic increasing. This protocol achieves a very high success rate at the expense of lower throughput. For the Aloha-CS and CSMA/CA protocols, the performance of the CSMA/CA protocol is higher obviously than that of the Aloha-CS protocol. Therefore, it is concluded that CSMA/CA is more suitable for the underwater sensor network with centralized topology than the other two protocols.
6. Conclusion
The NS2/NS-Miracle simulation system extended by WOSS and Bellhop can simulate correctly the propagation characteristics of underwater acoustic channel. Since WOSS can retrieve the global marine data and provide it to Bellhop, the network modelling is closer to the actual communication situation of underwater network, so as to the reliability of the integrated simulation system improve.
The characteristic empirical model, Bellhop Ray-Tracing model, and WOSS combined with Bellhop model were, respectively, adopted to simulate underwater acoustic channel in order to verify the reliability of the integrated system. The simulation results of three models are very close. It proves that the accuracy of integrated simulation system is as excellent as that of NS-Miracle. In addition, the characteristics of three MAC protocols of Aloha-CS, CSMA/CA, and DACAP in the integrated simulation system show that the integrated simulation system can more accurately simulate the MAC protocol in the real underwater network.
The network topology of this paper is currently limited to the subnet with a small number of nodes. In the future work, further simulation experiments and analysis will be carried out for a wide range of node transmission. It is necessary to investigate the related works about IoUT thoroughly and add the Autonomous Underwater Vehicle (AUV) to analyze the influence of mobile nodes on network topology and protocol performance.
Acknowledgments
This project was supported by the Guiding Program of Natural Science Foundation of Liaoning Province (no. 2019-ZD-0075), Basic Research Project of Education Department of Liaoning Province (no. LJ2020022), and Opening Project of Beijing Key Laboratory of Sensors of Beijing Information Science and Technology University (2020CGKF005).
[1] R. W. Coutinho, A. Boukerche, L. F. Vieira, A. A. Loureiro, "EnOR: energy balancing routing protocol for underwater sensor networks," IEEE International Conference on Communications(ICC), .
[2] Z. Fang, J. Wang, C. Jiang, Q. Zhang, Y. Ren, "AoI-inspired collaborative information collection for AUV-assisted internet of underwater things," IEEE Internet of Things Journal, vol. 8 no. 19, pp. 14559-14571, DOI: 10.1109/JIOT.2021.3049239, 2021.
[3] Z. Fang, J. Wang, J. Du, X. Hou, Y. Ren, Z. Han, "Stochastic optimization aided energy efficient information collection in internet of underwater things networks," IEEE Internet of Things Journal, vol. 1,DOI: 10.1109/JIOT.2021.3088279, 2021.
[4] D.-R. Chen, L.-C. Chen, M.-Y. Chen, M.-Y. Hsu, "A coverage-aware and energy-efficient protocol for the distributed wireless sensor networks," Computer Communications, vol. 137, pp. 15-31, DOI: 10.1016/j.comcom.2019.01.008, 2019.
[5] D. Li, K. D. Wong, Y. H. Hu, A. M. Sayeed, "Detection, classification, and tracking of targets," IEEE Signal Processing Magazine, vol. 19 no. 2, pp. 17-29, DOI: 10.1109/79.985674, 2002.
[6] Y. Durmus, A. Ozgovde, C. Ersoy, "Distributed and online fair resource management in video surveillance sensor networks," IEEE Transactions on Mobile Computing, vol. 11 no. 5, pp. 835-848, DOI: 10.1109/TMC.2011.115, 2012.
[7] H. Modares, R. Salleh, A. Moravejosharieh, "Overview of security issues in wireless sensor networks," 2011 Third International Conference on Computational Intelligence, Modelling & Simulation, pp. 308-311, .
[8] X. Ming, G.-Z. Liu, "Multi-population firefly based routing protocol in underwater acoustic sensor networks," Computer Science Journal, vol. 40 no. 11, pp. 65-69, 2013.
[9] Y. Zhu, X. Pengfei, "Development and applications of underwater acoustic communication networks," Communications Technology Journal, vol. 45 no. 6, pp. 36-38, 2012.
[10] Z. Guo, H. Luo, F. Hong, M. Yang, M. Ni, "Current progress and research issues in underwater sensor networks," Journal of Computer Research and Development, vol. 47 no. 3, pp. 377-389, 2010.
[11] H. Zhang, Research on Simulation Technology of Underwater Acoustic Sensor Networks Based on NS2, 2010.
[12] J. Liu, Research on Network Communication and Dispiay Console in Underwater Acoustic Communication Networks, 2010.
[13] W. Fei, Design and Implementation of Simulation Software for Underwater Acoustic Sensor Network, 2016.
[14] T. E. Tamayo, A Modular Visual Simulator of Underwater Sensor Networks [M.S. thesis], 2011.
[15] P. Xie, Z. Zhou, Z. Peng, H. Yan, T. Hu, J. Cui, Z. Shi, Y. Fei, S. Zhou, "Aqua-Sim: an NS-2 based simulator for underwater sensor networks," .
[16] A. F. Harris, M. Zorzi, "Modeling the underwater sensor networks," In Proc. Of IEEE OCEANS’09, .
[17] N. Baldo, M. Miozzo, F. Guerra, M. Rossi, M. Zorzi, "Miracle: the multi-interface cross-layer extension of ns2," EURASIP Journal on Wireless Communications and Networking, vol. 2010, 2010. http://www.hindawi.com/journals/wcn/aip.761792.html
[18] F. Guerra, P. Casari, M. Zorzi, "World ocean simulation system (WOSS):a simulation tool for underwater networks with realistic propagation modeling," WUWNet’09, .
[19] X.-M. L. Chun-Qiu, "Research on underwater wireless sensor network simulation tool," SCIENCE & TECHNOLOGY INFORMATION, vol. 13 no. 11, 2015.
[20] M. Porter, Bellhop Code, 2014. http://oalib.hlsresearch.com/Rays/index.html
[21] M. Li, R. Zhou, "Underwater channel simulation method based on BELLHOP model," Ship Electronic Engineering, vol. 38, pp. 166-169, 2018.
[22] H. Xu, X. Geng, "Modeling and simulation of ocean sound field based on Bellhop model," World Scientific Research Journal, vol. 7, 2021.
[23] T. Ai, Underwater Acoustic Modeling and Simulation, 2005.
[24] Z. Zhang, R. K. Sorensen, Z. Yun, M. F. Iskander, J. F. Harvey, "A ray-tracing approach for indoor/outdoor propagation through window structures," IEEE Transactions on Antennas & Propagation, vol. 50 no. 5, pp. 742-749, DOI: 10.1109/TAP.2002.1011242, 2002.
[25] M. B. Porter, H. P. Bucher, "Gaussian beam tracing for computing ocean acoustic fields," Journal of the Acoustical Society of America, vol. 82 no. 4, pp. 1349-1359, DOI: 10.1121/1.395269, 1987.
[26] H. P. Bucker, "A simple 3-D Gaussian beam sound propagation model for shallow water," Journal of the Acoustical Society of America, vol. 95 no. 5, pp. 2437-2440, DOI: 10.1121/1.409853, 1994.
[27] H. Weinberg, R. E. Keenan, "Gaussian ray bundles for modeling high-frequency propagation loss under shallow-water conditions," Journal of the Acoustical Society of America, vol. 100 no. 3, pp. 1421-1431, DOI: 10.1121/1.415989, 1996.
[28] F. B. Jensen, W. A. Kuperman, M. B. Porter, H. Schmidt, Computational Ocean Acoustics, 2011.
[29] L. I. Li, C. H. E. N. Zhaoyi, Y. A. N. G. Lijuan, "Modeling and simulation of underwater acoustic sensor network channel," Radio Communications Technology, vol. 44 no. 2, pp. 154-159, 2018.
[30] Y.-l. Zhang, The Research on Spectrum Prediction in Cognitive Underwater Acoustic Communication, 2011.
[31] R. Goates, Underwater Acoustic Systems, 1989.
[32] M. Stojanovic, "On the relationship between capacity and distance in an underwater acoustic communication channel," WUWNet’06, pp. 41-47, .
[33] W. J. Liu, MAC Protocols for Underwater Acoustic Sensor Networks, 2015.
[34] L. I. Tao, M. A. Yutao, Research on MAC Protocol of Underwater Sensor Networks, 2008.
[35] X. U. Chaonong, L. I. Chao, W. A. N. G. Zhiguang, "DLSOMAC: a MAC protocol oriented to distributed wireless link scheduling technology," Acta Automatica Sinica, vol. 40 no. 12, pp. 2747-2755, 2014.
[36] B. Peleato, M. Stojanovic, "Distance aware collision avoidance protocol for ad-hoc underwater acoustic sensor networks," IEEE Communications Letters, vol. 11 no. 12, pp. 1025-1027, DOI: 10.1109/LCOMM.2007.071160, 2007.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2021 Li Li et al. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
The reliability of the modelling system mainly depends on the simulation of underwater acoustic channel characteristics. The reliability of simulator is improved because of the use of Bellhop in NS-Miracle. World Ocean Simulation System (WOSS) can retrieve the data of marine environment by accessing the database of seabed depth, sound speed profile and seabed sediment, and transmit them to Bellhop simulator automatically, so that the model is closer to the actual underwater acoustic transmission channel than not using WOSS. In order to verify the reliability of NS2/NS-Miracle simulation system with WOSS, a centralized underwater sensor network with five nodes is simulated on the integrated simulation system. The characteristic empirical model, Bellhop Ray-Tracing model, and WOSS combined with Bellhop model are, respectively, adopted to simulate underwater acoustic channel. The results of three types of simulation, such as average throughput, average delay, and packet error rate, and simulation time are very close under the same condition. It proves that the accuracy of integrated simulation system is as excellent as that of NS-Miracle. However, WOSS can automatically acquire the actual sea environment parameters and provide them to the simulator, which can improve the authenticity of the simulation system. Furthermore, three MAC protocols, Aloha-CS, CSMA/CA, and DACAP, are simulated on the integrated simulation system under the same condition including ocean environment, network topology, and parameters. The results show that the performance of CSMA/CA is greater than the other protocols in such networks. It also proves that the integrated simulation system can accurately simulate the relevant characteristics of the MAC protocol.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 College of Computer Science and Technology, Shenyang University of Chemical Technology, Shenyang 110142, China; Laboratory of Sensor Technology, Beijing Information Science & Technology University, Beijing 100631, China; Key Laboratory of Intelligent Technology of Chemical Process Industry, Liaoning Province 110142, China
2 College of Computer Science and Technology, Shenyang University of Chemical Technology, Shenyang 110142, China