Abstract

The energy hole is a severe problem for underwater acoustic distributed networks in that it affects the normal operations of the network and shortens the network’s life span. To deal with this problem, a loop-free routing control technique is proposed in this paper. The classical shortest-path routing control method is used to generate multiple disjointed routing tables. The residual energy of the nodes and the changing information of the uplink/downlink matrix are added to the data frames for distribution. The source node specifies the routing path to transmit the data frames based on the changing information, and the relay nodes route the data frames strictly according to the routing path designated by the source node. Besides, the energy consumption of the relay node is saved by replying to the pseudo-ACK frame. Simulation experiments are implemented in four typical scenarios, and the results reflect that the proposed technique could extend the network’s life span by approximately 10% when compared to other mature techniques. Besides, it has no other negative effects on the normal operations of the network.

1. Introduction

1.1. Background and Literature Review

The underwater acoustic distributed network which consisted of fixed sensor nodes is widely used for collecting data and exchanging information in the environment of underwater [1]. However, the energy holes are severely affecting the normal operations of the system and shortening the network’s life span [2]. To avoid energy holes, a variety of excellent engineering methods are proposed, e.g., reducing hardware power consumption [3], decreasing software calculations, sleep-awaken strategies [4], optimizing and configuring battery power, adjusting node-deployment density [5], configuring topology [6], and other methods through balancing the energy consumption of nodes. The main design ideas are based on four assumptions, which are specified as follows:(1)No auxiliary information or equipment is needed, and the cost function is designed to adjust the transmission power or routing path based on factors, such as residual energy of nodes, channel characteristics, and link quality [2, 79](2)The auxiliary information, such as the geographic location, the deployment depth, the azimuth of arrival, and distances between nodes, is used to adjust the transmission power or routing path [1017](3)Machine learning methods (e.g., Q-learning and ant colony algorithm) are used [1820](4)Mobile nodes are used as auxiliary equipment for data collection, and their movement trajectories and collection strategies are planned [2126]

An arc-shaped hierarchical network composed of 1 central node and 50 static nodes is constructed in [7]. It selects the routing paths based on the efficiency of the path energy and the path lifetime. Besides, prior knowledge of the network topology is required. A congestion control and load balancing technique for cluster-based underwater acoustic sensor networks is proposed in [8], but the route hops or paths are not mentioned. A routing strategy that leads to an even energy depletion among all sensors in the network and consequently an improved network life span is proposed in [2], but the network is assumed to be arranged as a star topology. A dynamic routing control method is presented in [9], but the route paths are controlled and distributed only by the sink node, which consumes considerable energy. A routing algorithm based on link quality is proposed in [10], which reduces retransmission times, but requires the geographic location information of the node as support. Nodes’ one-hop neighbour is redefined based on signal attenuation, and a distributed energy-efficient routing protocol for UASNs is designed in [11], but it assumes each node knows its neighbours’ positions. An energy-balancing and delay-restricted routing protocol is proposed in [12], but the location, residual energy, and load of its neighbours must be aware of by every node. A new clustering algorithm based on the low-energy adaptive clustering hierarchy (LEACH) protocol is proposed in [13], but the cluster head’s position is needed. An improved protocol called energy-balanced pressure routing (EBPR) is proposed in [14], but the depth information of each node and periodical broadcast are needed. An improved reliability and energy-balanced routing algorithm (REBAR) is proposed in [15], but distances between source nodes and sink nodes are needed. A detailed description of the ad hoc underwater acoustic network protocol is presented in [16], which is an improved ad hoc on-demand distance vector (AODV) routing control method, and distance information is needed. An energy-efficient routing scheme is presented for underwater acoustic sensor networks (UW-ASN) in [17], which is based on the directed diffusion routing scheme. An adaptive, energy-efficient, and lifetime-aware routing protocol based on reinforcement learning, QELAR, is proposed and simulated in [18, 19], but considerable energy is consumed by periodical broadcast. A fair energy usage routing algorithm, which uses the ant colony optimization algorithm (ACO) to balance the network energy, is proposed in [20], but it is designed for wireless sensor networks only.

In this study, the nodes are deployed randomly so that some essential information, e.g., neighbour information, depth information of other nodes, and geographical location information, is difficult to obtain, and no mobile node is deployed. Therefore, only the first and the third types of assumptions are considered. The first and third types of assumptions require routing control for transmitting data, and table-driven routing [5, 27] and on-demanding routing [28, 29] are two main routing control methods. Currently, the on-demand routing control method has been reported in most published reports. On the one hand, considering that the fixed underwater acoustic distributed network nodes carry limited energy and are difficult to move after deployment, the routing changes are relatively rare, and there is no need to search for routing paths repeatedly. On the other hand, most load balancing methods do not focus on routing loops that are prone to occur when routing paths change.

1.2. The Motivation of This Paper

It is found that when geographic location and topology information is lacking, routing loops are likely to occur when searching for the routing path to achieve load balancing. Repeated route searching and routing loops both lead to rapid node energy consumption, shortened network life, large channel resource occupation, and increased end-to-end delays of data packets. A few methods use loop detection to break routing loops, but they cannot fundamentally eliminate routing loops. This paper concentrates on how to delay the appearing time of the energy hole in the underwater acoustic distributed network as late as possible, and that is to save the energy of the nodes on critical routing paths and eliminate routing loops while searching for the routing path to balance the load.

1.3. Contributions of This Paper

There are four contributions of this paper.

A novel loop-free routing control technique for the energy hole in the underwater acoustic distributed network is proposed to delay the appearance time of the energy hole (the first failed node) without negative effects on the normal operations.

To avoid the routing loop problem, the routing path of the data frame is designated by its source node, and the relay nodes will route the data frame strictly according to the routing path designated by the source node.

The link quality and the residual energy of the nodes are used by the source node to select the routing path, and the data load and the energy consumption are balanced.

The energy consumption is saved by replying pseudo-ACK frames by relay nodes.

1.4. Paper Organization

The rest of the paper is organized as follows: Section 2 describes the problem formulation of the energy hole in underwater acoustic distributed networks. Section 3 presents a detailed introduction of the proposed technique. Section 4 provides a detailed description of the simulation experiments and analyses the results to demonstrate the advantages of the proposed technique. Section 5 concludes the paper.

2. Problem Formulation

For underwater acoustic distributed networks, extended propagation delays, severe attenuations, narrow available communication bandwidth, low communication rates, and complicated underwater acoustic environments will increase the consumption of the transmission energy. Owing to premature energy exhaustion, the energy holes, which refer to failure nodes located on critical routing paths, become challenging problems, and they affect the network’s normal operation and shorten the life span.

To solve the energy hole problems, the load-balanced methods, which extend the life of the network by balancing the energy consumption of each node, are widely used. However, once a routing loop is formed, the data frames will be transmitted within the network repeatedly and cannot reach the destination node. Consequently, the energy of the node is consumed quicker and the limited channel resource is occupied a lot, which damage the performance of the load-balanced methods.

In this study, a novel loop-free route control technique is proposed for solving the routing loop problem. The classical shortest-path routing control method is used to generate multiple disjointed routing tables. The residual energy of the nodes and the changing information of the uplink/downlink matrix are added to the data frames for distribution. The source node specifies the routing path to transmit the data frame based on the changing information, while relay nodes route the data frame strictly according to the routing path designated by the source node. Besides, the energy consumption of the relay node is saved by replying the pseudo-ACK frame.

3. Routing Control Technique for the Energy Hole

3.1. Generation of the Routing Table

The procedures of generating the routing table can be explained as follows:(1)Assume there are totally nodes in the network and at least two other nodes in the communication range of each node, which means that each node has at least one backup routing table.(2)A unique address t, where t ∈ [0, ), is initialized for each node.(3)A link matrix, , and a residual energy table, , must be built through the self-organization process (see Appendix) for each node, wherein link matrix, , has rows and columns, with the element, qij, in row i and column j, representing the link quality from node i to node j, and qij ∈ [0, ], i, j ∈ [0, ). The residual energy table, , has rows and one column, with the element, ei, of the i-th term being the residual energy of node i, where ei ∈ [0, ].(4)Routing tables are created according to and .(5)A routing index table, , is created after all routing tables have been calculated. contains rows and one column, where the i-th element, si, indicates that the i-th routing path in group t, recorded in the si-th routing table, is selected as the routing path from the local node to node i.

3.2. Data Transmission

Figure 1 presents the format of the data frame. The change information of the link matrix includes row/column number, uplink/downlink, and change results, which are used to communicate the uplink/downlink changes between the local node and others. If the destination node address of the data frame is dst, it is transmitted according to the dst-th routing path of group t in the sdst-th routing table. After transmission, the information and transmission time of the data frame are recorded and enter the ACK waiting state. If ACK waiting timer expires, the data frame will be retransmitted, and the transmission record will be updated. If the retransmission limit is exceeded, the data frame will be put into the tail of transmitting queue. The flowchart of the node-transmitting terminal is shown in Figure 2.

3.3. Data Reception

Figure 3 presents the flowchart of the node-receiving terminal, and data processing can only be performed when the CRC checksum is correct. Each node follows this flowchart to process the received data frame and update the transmitting information table.

3.3.1. Selection of the Routing Table

Update the link matrix, , and the residual energy table, , according to the received data frame, and note the node address with the smallest residual energy in the residual energy table as em. Then, according to equation (1), the routing cost, tmpb, from local node t in the entire routing table to any other node, j, is calculated:wherein

G means broadcast. When j = t, the local loop path of the local node is given, and no calculation is needed. rhbtj is the hop count required by the local node to reach node j in the b-th routing table. The hop count is used as the denominator to allow some routing paths having a large number of hop counts to be selected. Δenbk is the residual energy cost, and Δchbk is the link quality cost. rrbtjk is the address of the k-th hop node in the b-th routing table from the local node to node j, b∈[0, B], and B is the routing table having lowest selection cost, and the sequence number of this routing table is assigned to sj, as shown in the following:

When the data frame sent by the source node does not receive the ACK frame returned by the destination node within a limited time, the routing index table, , is updated according to the above process and retransmitted.

3.3.2. Update of the Link Matrix

When the data frame transmitted or relayed by this node is correctly responded to by the correct next hop node within the limited time, the uplink/downlink matrix of the node is updated according to equations (4) and (5):

If the correct response is not received within the limited time, the uplink/downlink matrix of the node is updated according to equations (6) and (7), respectively:

In equations (4)–(7), cur represents the next hop address. The correct response includes two cases. When the next hop address of the frame is the relay node, the frame should be relayed. When the next hop node is the destination node of the data frame, the ACK frame should be replied. After the update is completed, when the change of an element in the link matrix exceeds a certain threshold, the change is assigned to the next data frame sent by the node. When the data frame sent by the source node does not receive the ACK frame replied by the destination node within a limited time, the corresponding elements in the uplink/downlink matrix are valued according to equations (6) and (7), respectively.

3.3.3. Data Relay

When a node receives a frame from another node, if the next hop address in the frame is the address of itself, it must relay the frame. Before relaying a data frame, the node must check its own transmission record. If it is found that an ACK frame corresponding to the data frame has been transmitted, it pretends that it is the destination node of the data frame and replies a pseudo-ACK frame to the source node. If there is no transmission record corresponding to the data frame that needs to be relayed before relaying a DATA frame, the routing path from the source node of the data frame to its destination node in all routing tables must be found. Then, according to the path, the current address in the required relay data frame is changed to its own node number, and the next hop address is changed to the next-hop node number on the path. After the hop count is increased by one, the content redundancy check is recalculated and transmitted.

4. Results and Discussion

A half-duplex underwater acoustic communication method is designed using OPNET software, a tool used to simulate the behaviour and performance of different types of networks, and the underwater acoustic channel is modelled. Four typical node-deployment scenarios are simulated, and simulation results are compared with those using a traditional shortest-path route control method.

4.1. Modelling and Design of Half-Duplex Underwater Acoustic Communication

The wireless link is divided into 14 pipeline model stages for modelling in OPNET. In the node model, the centre frequency, the bandwidth, the modulation method, the transmission rate, and the error-correction coding of both transmitter and receiver are set. In OPNET, the wireless link adopts the full-duplex mode by default. However, at present, most underwater acoustic communications can only use half-duplex.

During the simulation, the underwater acoustic communication parameters are set to BPSK (binary phase-shift keying) modulation in the half-duplex mode. The centre frequency is 8 kHz, the bandwidth is 4 kHz, the communication rate is 1 kbps, the effective distance is 5 km, the transmission power is 20 W, the standby (including receiving) power is 0.1 W, and the battery capacity of each node is 16,000 J. Additionally, the master node is powered by shore-based power, excluding energy consumption. In the underwater acoustic communication process, the following pipeline model stages need attention.

In stage 6, the underwater wave propagation speed (1,500 m/s) differs from the default electromagnetic-wave propagation speed and must be modified.

In stage 8, the code must be rewritten based on the underwater acoustic propagation attenuation model to calculate the received power. The mesoscale empirical formula in the classic Marsh–Schulkin model is used in the simulation process, and the formula iswhere H = [(L + D)/3]0.5 is the span (km), L is the depth of the mixed layer (m), D is the depth of the ocean (m), is the horizontal distance (km), α is the absorption coefficient (dB/km), αt is the effective attenuation coefficient in shallow water (dB, reflection loss per sea surface-bottom reflection, which is related to frequency, sea conditions, and bottom quality), and kL is the near-field anomaly correction (dB, related to frequency and bottom quality).

The unit of α is dB/km, is thousandth of salinity (usually, 35‰), A = 2.34 × 10−6, B = 3.38 × 10−6, f is the acoustic frequency (kHz), P is the static pressure (atmospheric pressure), and f is the relaxation frequency (kHz).

In actual underwater acoustic communications, when collisions occur between multiple received signals, they cannot be received correctly. Therefore, the influence of noise crosstalk between signals is amplified during the noise crosstalk of stage 9.

In stage 10, the ocean background noise level should be calculated, and a classic empirical formula should be adopted in the simulation [30]. It is divided into four categories for calculation, as shown in the following:where

In the formula, VD represents the vessel density, and VD ∈ [0, 1]. B is the signal bandwidth. f is the centre frequency of the signal, and the unit is HZ. is the wind speed, and the unit is m/s.

By adjusting parameters, such as transmission power, in the 11th stage, the bit error rates without collision are about 10−3, and the bit error rates with collision are in the order of 10−1.

4.2. Results’ Analysis

Figure 4 presents the simulation results for the four typical node-deployment situations using the traditional shortest-path routing control method.

Considering the case of node 4, the lengths of each segment of the data frame are data type (4 bits), source address (4 bits), current address (4 bits), next hop address (4 bits), destination address (4 bits), hop count (4 bits), residual energy of the source (4 bits), change information of the link matrix (4 bits), frame number (8 bits), data segment (256 bits), and checking (8 bits). The ratio of useful information (data segment) is 84.2%. A link matrix, , and a residual energy table, , are established for each node through a network self-organization method, wherein  = 3,  = 15, and

The routing table of each node is shown in Table 1, and G stands for “broadcast.”

The transmission interval of the data frame in each case can be divided into 10 levels: 1, 2, 3, 4, 5, 6, 7, 8, 9, and 10 minutes. Network lifetime in this paper is defined as the lifetime of the first exhausted node for the traditional technique, greedy technique, and proposed technique under different node-deployment conditions and different data frame intervals.

In Table 2, the comparisons of the network lifetime of the traditional technique, greedy technique, and proposed technique under different node-deployment conditions and different data frame intervals are listed, and the time unit is minute. Overall, compared with the traditional technique which does not use load-balancing route control, the proposed technique can extend the network life by about 10% on average. And the greedy technique which uses the greedy algorithm for load-balancing route control performs better than the traditional technique when no route loop is shaped during the simulation. If any route loop is shaped, the performance of the technique related becomes the worst.

The proposed technique extends the network life. Moreover, its network throughput is basically the same as the traditional technique. Take the case of 16 nodes in Figure 4(d) with data frame intervals of 1 minute and 8 minutes as an example. The network throughput comparisons between the traditional technique, greedy technique, and proposed technique are shown in Figure 5. The network throughput shown in the figures is the net throughput. Thus, only the number of bits contained in the data segment in the data frame is calculated. It can be seen from both figures that the throughput of the proposed technique is basically the same as that of the traditional technique and greedy technique.

5. Conclusions

In this study, a loop-free routing control technique is proposed to solve the problem of energy holes in underwater acoustic distributed networks. Both link qualities and residual energies of the nodes are used for balancing the data load. All nodes are learned through the same routing tables during the period of self-organization, and the source node specifies the routing path, and then the relay nodes follow it to route the data frames strictly. Besides, the pseudo-ACK frame is replied by the relay node to save energy consumption. Simulation experiments are implemented in four typical scenarios, and the results show that the proposed technique extends the network life by approximately 10% while ensuring the network throughput.

Appendix

The self-organization process is explained in the authors’ previously published papers [31, 32]. Here, the authors provide a brief summary as follows:(1)It is supposed that the network contains nodes. Each node has an empty link matrix, , and residual energy table, , before deployment.(2)After deployment of all nodes, each node sends neighbour-finding frames one by one for several turns. When other nodes receive the neighbour-finding frames, update their link matrix, , according to equation 5, and set the corresponding element in the energy table, , to E. After several turns of neighbour finding, each node gets its own column of link matrix, , filled with some nonzero elements.(3)Each node broadcasts the fusing frame just once, which contains its own column of link matrix, . When other nodes receive the fusing frame, fill the corresponding column of their own link matrices, , and broadcast the fusing frame again.(4)Each node checks its link matrix, . If there is any empty column, send an inquiring frame to its neighbours to ask for the empty column. When the neighbours receive the inquiring frame, every neighbour checks its corresponding column of the link matrix, . If the corresponding column is not empty, the neighbour node will send the replying frame to answer the node who sends the inquiring frame. Each node takes the inquiring-replying for several turns until all nodes have the same link matrix, , and the same residual energy table, , after completing self-organization.(5)According to equation A1, each node calculates the elements of the routing matrix, :

WQ and WE are the weights of link quality and residual energy, respectively. According to the routing matrix, , the related routing algorithm (e.g., Dijkstra) is used to calculate the routing table and the backup routing tables. When the backup routing table is being calculated, it is necessary to bypass the nodes that the previous route has passed in order to ensure that there are no overlapping nodes between the routing tables. Each routing table contains groups, and each group contains entries. Each entry in the routing table should contain information, such as the destination address, the next hop address to which the destination node should be delivered, and the hop count required to reach the destination node. For the unreachable node, the next hop address is assigned to “broadcast,” and the hop count is assigned to “0.”

Data Availability

Almost all the data are presented in the tables of this paper. If there is a need for any other information, the corresponding author may be contacted by e-mail.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported in part by the Youth Innovation Promotion Association, Chinese Academy of Sciences (no. 2020024) and the Institute of Acoustics Chinese Academy of Sciences Young Elite Researcher Project (no. QNYC201702).