UNDERSTANDING AND EXPLOITING THE ACOUSTIC PROPAGATION DELAY IN UNDERWATER SENSOR NETWORKS by Affan

نویسندگان

  • Ahmed Syed
  • Affan Ahmed Syed
  • Joon Ahn
چکیده

xiv Chapter 1: Introduction 1 1.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.1 Communication Medium for UWSN . . . . . . . . . . . . . . . 3 1.2.2 The Vision of UWSN . . . . . . . . . . . . . . . . . . . . . . . 4 1.2.3 Acoustic Propagation and Sensornet Protocols . . . . . . . . . 6 1.3 Thesis Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.3.1 Summary of Work . . . . . . . . . . . . . . . . . . . . . . . . 7 1.4 Contribution and Novelty . . . . . . . . . . . . . . . . . . . . . . . . . 10 Chapter 2: Related Work 12 2.1 Underwater Acoustic Communication . . . . . . . . . . . . . . . . . . 12 2.1.1 Underwater Acoustic Channel . . . . . . . . . . . . . . . . . . 12 2.1.2 Multipath in UWA Communication . . . . . . . . . . . . . . . 14 2.2 Time Synchronization in Computer Networks . . . . . . . . . . . . . . 17 2.2.1 Wide-Area-Network Time Synchronization . . . . . . . . . . . 18 2.2.2 Time Synchronization in SensorNets . . . . . . . . . . . . . . . 19 2.3 Shared Medium Access . . . . . . . . . . . . . . . . . . . . . . . . . . 21 2.3.1 Terrestrial RF-based MACs . . . . . . . . . . . . . . . . . . . 21 2.3.2 Satellite MACs . . . . . . . . . . . . . . . . . . . . . . . . . . 23 2.3.3 Underwater Acoustic MACs . . . . . . . . . . . . . . . . . . . 24 Chapter 3: Space-Time Uncertainty 27 3.1 Space-time Uncertainty and the ALOHA Protocol . . . . . . . . . . . . 29

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks

Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behav...

متن کامل

Delay coupling enhances synchronization in complex networks

The phenomenon of enhancement of synchronization due to time delay is investigated in an arbitrary delay coupled network with chaotic units. Using the master stability formalism for a delay coupled network, we elaborate that there always exists an extended regime of stable synchronous solutions of the network for appropriate coupling delays. Further, the stable synchronous state is achieved eve...

متن کامل

Response of Two Indica Rice Varieties to Salt Stress

  Salinity is one of the most challenging problems that adversely affects growth and development of plants. Therefore, understanding of the mechanisms that enable plants to adapt to salinity stress will ultimately help in the selection of stress tolerant cultivars for exploiting saline soils. The main objective of this study was to examine the effects of NaCl on some physiological and biochemic...

متن کامل

Information Dissemination in Vehicular Networks in an Urban Hyperfractal Topology

The goal of this paper is to increase our understanding of the fundamental performance limits of urban vehicle networks by exploiting the self-similarity and hierarchical organization of modern cities. We use an innovative model called “hyperfractal” that captures the self-similarity of the topology and vehicle locations while avoiding the extremes of regularity and randomness. We use analytica...

متن کامل

Identifying Topic-Sensitive Influential Spreaders in Social Networks

Identifying influential spreaders is an important issue in understanding the dynamics of information diffusion in social networks. It is to find a small subset of nodes, which can spread the information or influence to the largest number of nodes. The conventional approaches consider information diffusion through the network in a coarse-grained manner, without taking into account the topical fe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009