Next Article in Journal
Machine Learning-Based Prediction of Dynamic Responses of a Tower Crane under Strong Coastal Winds
Next Article in Special Issue
R&D of an Innovative OFDM Communication Payload for Small-Size AUV
Previous Article in Journal
In Situ Radioactivity Measurements and Water Flow Characteristics of a Thermal Spring in Gera Gulf, Lesvos Island, Greece
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Spatially Fair and Low Conflict Medium Access Control Protocol for Underwater Acoustic Networks

1
National Key Laboratory of Underwater Acoustic Technology, Harbin Engineering University, Harbin 150001, China
2
Key Laboratory of Marine Information Acquisition and Security, Harbin Engineering University, Ministry of Industry and Information Technology, Harbin 150001, China
3
College of Underwater Acoustic Engineering, Harbin Engineering University, Harbin 150001, China
4
Qingdao Innovation and Development Center, Harbin Engineering University, Qingdao 266000, China
*
Author to whom correspondence should be addressed.
J. Mar. Sci. Eng. 2023, 11(4), 802; https://doi.org/10.3390/jmse11040802
Submission received: 11 March 2023 / Revised: 4 April 2023 / Accepted: 7 April 2023 / Published: 9 April 2023
(This article belongs to the Special Issue Underwater Acoustic Communication and Network)

Abstract

:
The large propagation delay in underwater acoustic networks results in spatial and temporal uncertainty between communication links. This uncertainty, in turn, leads to problems with spatial unfairness and packet collision in media access control (MAC) solutions. To address these issues, this research paper proposes a spatially fair and low-conflict media access control (SFLC-MAC) protocol. Within the protocol, a contention window spatial fairness adjustment strategy is designed, including random and fair states. Nodes autonomously adjust their contention states based on the perceived network information. Nodes in the fair state increase their listening time to ensure that nodes in the random state can successfully access the channel, thereby overcoming the fairness issues in channel access. A method based on postponing data packet transmission is proposed to avoid collisions between data packets and neighbors’ control packets. By scrutinizing the spatio-temporal constraints pertinent to these conflicts, the exact duration of the delay required for this method is ascertained. Simulation results demonstrate that SFLC-MAC effectively improves network throughput, reduces end-to-end delay, decreases network energy consumption, and enhances channel access fairness among nodes.

1. Introduction

In recent years, Underwater Acoustic Networks (UANs) have been widely used in marine observation, pollution detection, marine ranching, and assisted navigation [1,2,3]. As an important part of UANs, the Medium Access Control (MAC) protocol is responsible for ensuring the efficient and fair delivery of data to the next hop. How to maximize the network throughput by optimizing rules under fair and low conflict rates is the key challenge of MAC protocol [4,5].
Compared with terrestrial wireless networks, there are large propagation delays, low transmission rates, and dynamic communication environments in UANs. Due to these characteristics, designing MAC protocols has become a difficult and challenging task. In the distributed topology scene of UANs, there is no central management node, and data can be exchanged between nodes [6]. The contention-based MAC protocol shows high applicability in the highly dynamic distributed topology, which can be divided into random access protocol and reservation protocol. Slot ALOHA is a typical random access protocol. It divides the network time into equal slots and allows nodes to send data only at the beginning of the slot [7]. This protocol can suppress the problem of high data collision rate of ALOHA protocol under long propagation delay. Compared with random access mode, reservation MAC protocol requires nodes to acquire channels by interacting request-to-send (RTS) and clear-to-send (CTS) packets before transmitting data [8]. Slotted floor acquisition multiple access (Slotted-FAMA) is a reservation MAC protocol based on RTS/CTS handshaking [9]. The protocol solves the problem of hidden terminals by using the slot reservation transmission mechanism and using the maximum propagation delay as the basis for slot allocation. However, its long slot will result in a large amount of idle time in the channel.
The large propagation delay leads to the problem of spatial-temporal uncertainty in UANs [10]. The spatial-temporal uncertainty problem can be defined as two-dimensional uncertainty. The packets sent simultaneously by different senders may arrive at the receiver sequentially due to different propagation delays, and then can be received without collision. The packet collisions may still occur at the receiver even if no packets are sent at the same time. From the above problems, it can be concluded that the collision problem in UANs is caused by the joint effect of the location and transmission time of the nodes. Therefore, it is necessary to consider the spatial-temporal uncertainty in dealing with data collision problems of the MAC protocol in UANs.
Due to spatial-temporal uncertainty, there is a spatial unfairness of channel access and collisions between control packets and DATA packets in reservation-based protocols. The spatial unfairness of channel access is caused by differences in propagation delays between communication links. Links with a shorter propagation delay require less time to complete the RTS/CTS exchange and, therefore, access channels preferentially compared to links with a longer propagation delay. To ensure collision-free reception of DATA packets, the receiver notifies its neighbors to remain silent by sending a CTS packet. However, the neighbor node may have sent a control packet before receiving the CTS packet from the receiver, resulting in a collision with the DATA packet at the receiver due to long propagation delays.
To address these issues, this paper proposes a spatially fair and low-conflict medium access control (SFLC-MAC) protocol. The paper’s multiple contributions include the following:
  • A contention window spatial fairness adjustment strategy is presented to address the issue of spatial unfairness in channel access. The  mechanism divides the contention state into random and fair. In random state, nodes possess similar channel access priorities. Conversely, in fair state, nodes proactively lower their priority by increasing channel listening time, ensuring other nodes can access the channel. The state transition strategy is formulated to minimize network performance degradation caused by extended listening time while maintaining channel access fairness among nodes.
  • To address the problem of collisions between control packets from neighbors and DATA packets, we propose a conflict avoidance approach that allows the sender to postpone the transmission of DATA packets. By examining the spatio-temporal constraints associated with these conflicts, we derive the precise delay time necessary for effective conflict resolution.
  • A node state transition strategy is proposed, wherein nodes perform different operations based on their own state and the type of packets received. This strategy allows nodes to adapt their behavior according to the current network status, ensuring an efficient and stable operation of the network.
The remainder of the paper is structured as follows. Section 2 provides an overview of existing MAC protocols for UANs. Section 3 outlines the problem definition. Section 4 presents a detailed description of the SFLC-MAC protocol. Section 5 evaluates the performance of the SFLC-MAC protocol through simulation and compares it to other protocols. Finally, Section 6 concludes the paper.

2. Related Work

The MAC protocols in UANs can be divided into contention-based and scheduling-based protocols. The scheduling-based protocols allocate channel resources, such as time slots, frequency bands, and orthogonal codes, to all nodes by a centralized control center, thereby ensuring contention-free network transmission. According to the type of resource, they can be divided into time division multiple access (TDMA), frequency division multiple access (FDMA), and code division multiple access (CDMA) [11,12,13].
The spatial-temporal MAC protocol [10] utilizes the spatio-temporal unpredictability of UANs to construct a network conflict graph and then proposes a heuristic approach to address the issue of coloring this conflict graph. This approach increases channel reuse, which consequently enhances the throughput of the network. The continuous-time TDMA (CT-TDMA) protocol [14] constructs a local conflict state graph with the sender at the center and continuous time as the unit of measurement. It proposes a distributed construction algorithm that takes advantage of the difference in link delay between the same receiver and different senders to reduce the idle time between frames received at the destination. Based on spatiotemporal uncertainty, a deep-reinforcement learning-based medium access control (DL-MAC) protocol [15] uses deep Q-learning algorithms to propose synchronous and asynchronous optimal MAC policies to improve network performance. The FDMA enables users to access channels simultaneously by assigning different frequencies to each user. SeaWeb’98 and SeaWeb’99 were the first ocean observation networks to utilize FDMA [16]; however, they experienced issues such as low-frequency utilization and susceptibility to interference. The CDMA enables multiple users to share a single frequency channel simultaneously. Spread spectrum communication provides better robustness to frequency selective fading channels caused by multipath propagation [17]. In [18], it proposes a transmitter-based distributed code division protocol that optimizes power allocation and spreading code length, aiming to improve network throughput, reduce channel access delay, and lower energy consumption. The energy-efficient adaptive hiErarchical and robust architecture (EDETA) protocol is based on a clustering mechanism [19], which ensures that communication between clusters is free of conflicts by using a CDMA mechanism and aggregating data within clusters using TDMA.
The scheduling-based protocols are generally applicable to static and fixed topological structures and often require a central node to schedule compliance with all the network nodes. They are mostly used in star or clustered networks. Compared to contention-based protocols, scheduling-based protocols have higher requirements for auxiliary mechanisms such as clock synchronization and positioning algorithms. These auxiliary mechanisms have higher implementation costs in randomly distributed, highly dynamic scenarios.
There are many works on contention-based MAC protocols, which can be divided into random access protocols and reservation protocols. Table 1 summarizes the performance of the main contention-based protocols in addressing spatial unfairness in channel access and packet collision issues.
The random access protocol is mainly based on the ALOAH protocol [29]. In ALOHA, the sender does not need to listen to the channel in advance, but instead sends their data packets directly. However, the terrestrial ALOHA protocol cannot be directly applied to the underwater environment due to the large propagation delay. In [20], it found that the synchronization advantage of the Slot-ALOHA protocol was weakened due to the problem of spatial-temporal uncertainty. Its propagation delay tolerant ALOHA (PDT-ALOHA) algorithm reduced the collision rate of the Slot-ALOHA protocol by increasing the protection interval in each time slot. In [30], it deduced the theoretical performance of the PDT-ALOHA protocol, proved that the network throughput would not decrease with an increase in the protection interval, and obtained the theoretical upper limit of the network throughput under different network load conditions. In [31], it revealed the time-coupling relationship of the underwater Slot-ALOHA protocol in conflict-free scenarios and proposed a low-complexity heuristic scheduling algorithm, which improved the network performance of Slot-ALOHA in a star topology. A seedex-based protocol for UANs (UW-SEEDEX) [21] is proposed. The protocol begins with an initial phase in which nodes within two hops exchange the seeds of their respective pseudo-random methods. Each node then randomly sets the state to receive or transmit within each time slot according to its respective seed. Each node estimates the state of each node within two-hop based on the random seeds of its neighbors and, thus, decides whether to transmit data or not. Compared to ALOHA-based protocols, UW-SEEDEX can achieve higher network performance because the nodes in UW-SEEDEX can predict the two-hop node states.
The reservation-based protocols are used to reserve channels through the exchange of RTS and CTS packets [32]. These protocols can be divided into two categories: receiver-centric multi-access control protocols and sender-driven reservation-based protocols. In multi-access protocols, since only one receiver is considered, the handshake mechanism can be designed based on the spatial-temporal constraints between the links. The main challenge in multi-access protocols is addressing fairness issues caused by spatio-temporal uncertainty. The spatially fair MAC (SF-MAC) protocol [22] makes it possible to receive RTS packets from multiple senders by deferring CTS packets. In this protocol, the receiver calculates the potential transmission time of each competitor and selects the sender for this transmission while taking fairness into account. A conflict avoidance fairness protocol is proposed in [33] to address the issue of RTS packet collisions at the receiver. This protocol divides the receiver’s neighbors into two groups based on their average propagation delay and ensures that packets sent by two senders within each group will never collide at the receiver by considering the earliest sending time.
In wireless networks, sender-driven reservation-based protocols are primarily based on either the multiple access with collision avoidance (MACA) or floor acquisition multiple access (FAMA) protocol [34]. Since the next hop in a packet in the cache queue to be sent may be different, a MACA-based protocol with packet train to multiple neighbors (MACA-MN) [23] alleviates network congestion and reduces the collision rate by sending a single RTS packet to multiple neighboring nodes for simultaneous handshaking. The MACA-based protocol with delay tolerant (MACA-DT) [24] improves channel utilization and reduces end-to-end delay through the use of adaptive silent time and simultaneous handshake technique. The Slotted-FAMA based protocol with data train (SFAMA-DT) [25] is proposed. It simultaneously established communication links by sequencing RTS/CTS packets, thereby increasing the channel utilization of Slotted-FAMA. In [26], it proposed a multi-ACK mode for Slotted-FAMA to address the issue of retransmission due to lost acknowledgment packets by increasing the likelihood of successful ACK reception. In [27], an adaptive contention window adjustment backoff algorithm based on Q-learning (QL-UACW) is proposed to address issues of unfairness access to the dynamic channel. This algorithm utilizes the concept of reinforcement learning to adjust the contention window. Simulations have shown that the protocol can achieve high network performance under different traffic loads.
The slotted FAMA-based protocols can be effective in avoiding collisions between control packets from neighbors and DATA packets. However, due to the limitation of fixed slots, these protocols are only suitable for low-load network scenarios. The protocols described [28,35] attempt to avoid collisions by deferring CTS packets or DATA packets. Both the fixed slot and deferral approaches increase the time cost of each handshake round, thus, reducing network efficiency.
The issue of spatial unfairness in channel access is not often taken into account in distributed topology scenarios of UANs. However, in certain application scenarios, this fairness issue must be addressed. For instance, in a routing network where energy balance is the indicator, relay nodes closer to the Sink tend to select the next hop closer to themselves, while nodes further away from the Sink tend to select the next hop closer to them. This can lead to the closer communication link blocking the more distant communication link persistently.

3. Problem Definition

In the reservation-based MAC protocol, the spatial-temporal uncertainty leads to channel access unfairness and packet collision. This section analyses the spatial-temporal constraints of these problems.

3.1. Spatial Unfairness in Channel Access

The issue of spatial unfairness in channel access mainly arises from the difference in propagation delay between communication links. Examining the interplay between two links can shed light on this problem. As illustrated in Figure 1, let us assume that nodes A and C need to transmit data to nodes B and D, respectively. Four interfering links directly affect the links AB and CD. Analyzing these interfering links enables us to investigate the spatial unfairness problem between communication links. The four interfering links are representative examples of typical scenarios involving exposed and hidden terminals in transmission and reception processes.
Assuming node C transmits an RTS packet before node A, the First-In-First-Out (FIFO) principle dictates that node C should be granted priority access to the communication channel. However, due to the long propagation delay inherent in underwater environments, neighboring nodes may experience asynchronous reception of control packets, potentially causing node A to occupy the channel when node C should have been given access priority. As a result, the intended FIFO mechanism is disrupted, leading to spatial unfairness, as nodes with longer propagation delays may be at a disadvantage when attempting to establish communication links.
Figure 2 presents the timing diagrams for various packet interactions that lead to spatial unfairness across the four scenarios depicted in Figure 1. In Figure 2a, node C receives an RTS packet from node A before the expected CTS packet due to the closer proximity to node A and the greater distance from node D. Similarly, in Figure 2b, node D receives an RTS packet from node A before receiving the RTS from node C because of the same distance factors. The handshake rules state that a node will remain silent upon receiving an RTS packet intended for another node. As a result, the handshake process for Link CD is disrupted by node A’s RTS packet in both scenarios a and b. In Figure 2c, the handshake process between nodes A and B completes quickly due to their close proximity. However, node C’s greater distance from node D and closer proximity to node B cause it to receive node B’s CTS packet before node D’s CTS packet, interrupting the handshake process for Link CD. In contrast, Figure 2d shows that if node C sends the RTS packet before node A does, the handshake process for Link CD remains uninterrupted. Since node D is the hidden receive terminal of node A, and the distance from node A to node D is greater than the maximum effective propagation distance, the RTS packet sent by node C reaches node D before the CTS packet sent by node B.
In summary, spatial unfairness in Links AB and CD emerges due to location factors in scenarios a, b, and c. Therefore, it is necessary to investigate these scenarios to analyze the problem’s constraints.
If node A and C send RTS packet at the time T 2 and T 1 , respectively, the temporal-spatial constraints for the unfairness problem in Figure 2a–c are as follows:
a : T 3 < T 4 T 5 < T 6 b : T 3 < T 4 c : T 3 < T 4 T 5 < T 6
where T 5 < T 6 in scenarios a and c ensure that link AB can successfully complete the handshake, and  T 3 < T 4 in all scenarios is the condition required for link CD to be interrupted.
Equation (1) is converted into the constraint relationship between RTS packet sending time and propagation delay, as shown in the following equation:
a : T 2 T 1 < 2 D C D + T R T S + T C T S D A C T 2 T 1 < D A C 2 D A B T R T S T C T S b : T 2 T 1 < D C D + T R T S D A D c : T 2 T 1 < 2 D C D + T C T S D A B D B C T 2 T 1 < D B C D A B T R T S
where T R T S and T C T S are the RTS and CTS packet duration, respectively. D i j denotes the propagation delay between node i and node j.
In conclusion, it can be seen that if the relationship between the transmission time and the spatial location of any two links satisfies Equation (2), there is a channel access spatial unfairness issue in the network.

3.2. The Collision between Control Packet from Neighbors and DATA Packet in Hidden Terminal Scene

The RTS/CTS handshake mechanism can effectively reduce the impact of hidden terminal problems, but Figure 3 shows that, due to the large propagation delay, successful handshakes do not guarantee collision-free reception of data packets.
In Figure 3, the temporal-spatial constraints for the collision between the control packet and the data packet need to be satisfied:
T 5 T 6 T 8 T 5 T 7 T 8
Since the node needs to enter the quiet state when it receives a control packet that is intended for another node (xRTS or xCTS), the time T 3 and T 2 when Node B or C sends the control packet needs to satisfy:
T 2 T 4 T 3 T 6
As shown in Equation (5), for each time point, it can be represented by the time of sending the RTS packet, the link propagation delay, and the duration of various packets.
T 3 = T 1 + D A B + T R T S T 4 = T 1 + D A B + T R T S + D B C T 5 = T 1 + D A B + T R T S + D A B + T C T S + D A B T 6 = T 2 + D B C T 7 = T 2 + D B C + T R T S T 8 = T 1 + D A B + T R T S + D A B + T C T S + D A B + T D A T A
where T D A T A is the DATA packet duration.
Substituting Equation (5) into Equation (3), we can get.
3 T A B T B C + T C T S T 2 T 1 3 T A B T B C + T C T S + T D A T A 3 T A B T B C + T R T S + T C T S T 2 T 1 3 T A B T B C + T R T S + T C T S + T D A T A
Simplification Equation (6) can be obtained.
3 T A B T B C + T C T S T 2 T 1 3 T A B T B C + T R T S + T C T S + T D A T A
Substituting Equation (5) into Equation (4), we can get.
T A B + T R T S T B C T 2 T 1 T A B + T R T S + T B C
If the times T 1 and T 2 at which nodes A and C send their respective control packet satisfy Equations (7) and (8), then the control packet from node C and the data packet from node A will collide at node B.

4. SFLC-MAC

In this section, we first present an overview of the SFLC-MAC protocol. Then, the spatial fairness adjustment strategy of the contention window and packet collision avoidance mechanism are described, respectively. Finally, the state transition strategy of the protocol is discussed in detail.

4.1. Overview of SFLC-MAC

In the SFLC-MAC protocol (As shown in Figure 4), when node S needs to transmit data to node R, it uses the competition window spatial fairness algorithm to calculate its listening period. If no packet is overheard from other nodes during this period, node S sends an RTS packet. Node R calculates the waiting time for the DATA packet and records this time in the CTS packet after receiving the RTS packet. Node S then sends the DATA packet according to the waiting time. If node R does not receive the DATA packet, it will immediately send a negative acknowledgment (NACK) packet to node S, requesting that the DATA packet be retransmitted. Upon receiving the NACK packet, node S will immediately retransmit the corresponding DATA packet. Node R will then send an acknowledgment (ACK) packet immediately after receiving the DATA packet. Upon receiving the ACK packet, Node S will check if the cache queue with the destination address node R is empty. If it is not, node S will continue to send the next DATA packet.

4.2. Contention Window Spatial Fairness Adjustment Strategy

In the reservation-based MAC protocol, to avoid multiple nodes accessing the channel at the same time, nodes need to randomly select their listening periods before sending an RTS packet. During the listening period, the node detects the status of the channel. If it overhears that the channel is busy, the node will stop the competition and remain silent. The listening period T C T D can be expressed as
T C T D = R a n d o m 0 , 1 × ω
where R a n d o m 0 , 1 means taking a random number between 0 to 1, ω is the contention window value.
As the density of nodes and the load on the network increase, the likelihood of congestion increases. Previous research has typically addressed this issue by decreasing the packet send rate. That is to use a large contention window to reduce the sending rate of each node. The node’s current level of congestion is measured by the length ( L s q ) of the queue of data packets in the buffer at nodes. The  ω of the node can be expressed as
ω = min ( L s q L t h , C W max ) τ + T R T S
where C W max is the maximum contention window counter; τ is the maximum propagation delay; L t h is the range of congestion levels per level. For the Equation (10), the larger the L s q , the larger the ω .
In Figure 1, node A can increase its listening time after completing a data transmission to give node C a chance to access the channel. However, due to spatial unfairness, Node A may still shake hands successfully even if its listening time is greater than that of node C. Therefore, the listening time of node A has to take into account the spatial relationship with node C.
As demonstrated in Figure 1, the spatial unfairness problem is primarily present in scenarios a, b, and c. Figure 5a–c illustrate that for node C to successfully handshake, the following conditions need to be met.
  • In scenario a, the RTS packet from node A cannot reach node C before node C receives the CTS packet from node D.
  • In scenario b, the RTS packet from node A cannot reach node D before node D receives the RTS packet from node C.
  • In scenario c, node B receives an RTS packet from node C before it receives an RTS packet from node A.
Combining the above, if  T 3 T 4 in Figure 5, node C can successfully complete the control packet exchange with node D.
The T 3 T 4 is converted into the relationship between T 1 , T 2 , propagation delay and packet duration as follows.
a : T 1 + 2 D C D + T R T S + T C T S T 2 + D A C b : T 1 + D C D + T R T S T 2 + D A D c : T 1 + D B C T 2 + D A B
If nodes A and C are ready to access the channel at time 0, then the values of T 1 and T 2 are equivalent to the listening times of nodes A and C. The maximum value of T 1 is w, the value of T 2 is shown below.
a : T 2 = w + 2 D C D D A C + T R T S + T C T S b : T 2 = w + D C D + T R T S D A D c : T 2 = w + D B C D A B
The T 2 value in scenario b is less than that in scenario a, so node A chooses the maximum value from scenarios a and c as the listening time to ensure that node C can successfully access the channel in all three scenarios.
Assuming that the sender is i and the destination node is j, according to Equation (12), to ensure that the neighbors can successfully access the channel, node i uses the following equation to calculate its listening time.
T C T D i j = ω + T S F i j
where T S F i j is the spatial fairness waiting time.
The above discussion is based on a two-link scenario, but each node may have more than one neighbor. In Equation (12), the acquisition of the D C D and D B C require node A to maintain the location information of all nodes within its 2-hop range. However, the dynamic nature of the underwater environment makes it costly for a node to obtain the location of nodes within its 2-hop range. We use the maximum propagation delay from node C or D to its neighbors as the value of D C D . The  D B C is acquired using the same method. The value of T S F i j is shown below.
T S F i j = max ( T S F ( a ) , T S F ( c ) ) , T S F ( a ) = max ( 2 D k max D i k + T R T S + T C T S ) T S F ( c ) = D j max D i j
where max ( ) means take the maximum value among the values in the brackets. T S F ( a ) and T S F ( c ) denote the spatially fair waiting time under scenario a and c, respectively. k is the neighbor node of node i. D k max and D j max represent the maximum propagation delays from nodes k and j to their neighbors, respectively.
For node C to successfully access the channel, node A and C must make decisions at the same time. If node C sends the RTS packet later than T 1 , the method may be invalid. Figure 1a,c show that if the scenario is exposed or hidden transmit terminal, node C can obtain the specific time for link AB to complete data transmission through xRTS or xCTS packet, and then can start the channel competition mechanism with A at the same time in the next transmission. Figure 1b shows that when node D receives xRTS, it will enter the quiet state. At this time, node C will not be able to get the CTS packet from node D after sending the RTS packet, so node C will implement a random backoff mechanism (for example, binary exponential backoff mechanism [36]). This prevents nodes A and C from starting the channel contention mechanism synchronously.
If link i j successfully handshake, this indicates that the node in i’s two-hop range has not accessed the channel. To increase the likelihood of a non-synchronous decision node accessing the channel, node i must further increase its listening time in the next transmission. Equation (15) demonstrates that node i’s listening period is increased exponentially.
T C T D i j = 2 N T x O k i j ω + T S F i j
where N T x O k i j represents the number of successful handshakes between node i and j.
This paper adopts the same binary exponential backoff mechanism as in [36]. To ensure the access channel of the node for asynchronous decision, the maximum value of T C T D should not be less than the maximum backoff time. Assuming that the maximum backoff counter is B max , the maximum backoff time is τ + T r t s B max . That is, the maximum value N M A X T x O k i j of N T x O k i j should meet the following.
2 N M A X T x O k i j ω τ + T R T S B max
Based on the analysis presented, this protocol sets the node contention state to G, which is divided into a random period (G = RD) and a fair period (G = FA). The listening time T C T D i j for each contention state G is determined by the equation presented below.
T C T D i j = R a n d o m 0 , 1 × ω , G i j = R D min 2 N T x O k i j ω , B max ( τ + T R T S ) + T S F i j , G i j = F A
where, during the random period, the listening time is selected randomly based on the size of the contention window. During the fair period, a node increases its listening time actively in accordance with the number of successful handshakes. Compared to the RD state, nodes in the FA state extend their listening time to the channel. In other words, while nodes maintain a consistent channel access priority in the RD state, they proactively reduce their channel access priority in the FA state by increasing their listening time.
The calculation method for a node’s listening time is illustrated in Algorithm 1. First, nodes compute the basic contention window ω based on their current buffer queue length. If the present state is FA, nodes iterate through all neighbors to acquire the maximum T S F ( a ) value and subsequently calculate the T S F ( c ) value according to the destination node. The larger value between T S F ( a ) and T S F ( c ) is chosen as T S F , and the final T C T D value is determined using Equation (17). Conversely, if the current state is RD, a random value within the basic contention window range is selected as the listening time.   
Algorithm 1: Algorithm for the calculation of listening time.
Input
the sender i, the receiver j, the contention state G i j , the number of successful handshakes N T x O k i j , the set of node i’s neighbors F n e i , and  the length of the data queue L s q .
Output: the listening time T C T D i j
Jmse 11 00802 i001
    The above method ensures the fairness of other nodes accessing the channel by increasing the listening time, which may reduce the end-to-end delay performance of the network. To ensure fairness and optimize end-to-end delay performance, the transition between states should be carefully evaluated.
To achieve high network performance, nodes must monitor the current network status and adjust the G accordingly. In a distributed topology, a node can gather information about itself within a two-hop range. A node can assess the success of data transmission by checking if it receives an acknowledgment packet from the destination node. To determine if there is an active communication link within two hops, the node should consider the following:
  • If it does not receive a CTS packet after sending an RTS, this may indicate that the destination node is in a quiet state, possibly due to an active communication link within one hop of the destination node.
  • If it receives an xRTS or xCTS during the idle state, listening time, or while waiting for the CTS packet, this can also indicate the presence of an active communication link within two hops.
The node adjusts the state G according to the perceived information. The state transition rules are as follows.
  • In RD state, it will be transferred according to the following conditions:
    • When a data packet is successfully transmitted, it sets N T x O k i j = N T x O k i j + 1 . If  N T x O k i j = = N t h R D , the node sets G i j = F A , N T x O k i j = 0 . Where, N t h R D is a certain number. This is because the contention window of FA is larger, resulting in a longer listening time and reducing the channel utilization rate. To prevent FA from occupying a large portion of the entire network cycle, this protocol specifies that G i j cannot switch to RD until N t h R D successful transmissions have been completed.
    • When the node does not receive the CTS packet after sending an RTS packet, it will increase its backoff counter, B c n t i . If CTS is not received multiple times, the backoff counter B c n t i will increase exponentially. If  B c n t i reaches the maximum backoff counter, it indicates that the node has been in the backoff state for a longer period. At this time, the protocol compensates for the node by reducing the N T x O k i j value to ensure that the node has more opportunities to be in the RD state in the future, thus, increasing the number of times the node accesses the channel. That is to say, if  N T x O k i j > N t h R D and B c n t i = = B max , it then sets N T x O k i j = N T x O k i j 1 .
  • In FA state, it will be transferred according to the following conditions:
    • If the transmission of the DATA packet is successful, it then sets N T x O k i j = N T x O k i j + 1 . If  N T x O k i j = = N M A X T x O k i j , this means that there is a high probability that no other node needs to access the channel within the node’s 2-hop range. So, there is no need to keep the fair state and set G i j = R D , N T x O k i j = 0 .
    • If there is a communication link within 2-hops, it sets N T x F a i l i j = N T x F a i l i j + 1 and N T x O k i j = 0 . However, as there may be more than one node waiting to access the channel within the 2-hop range, this node must still remain in its current state. Assuming that the maximum number of waits specified by the protocol is N t h F A , if  N T x F a i l i j = = N t h F A , then the node enters the random period and sets G i j = R D , N T x O k i j = 0 , N T x F a i l i j = 0 .
The process of updating the contention window state is shown in Algorithm 2. In Algorithm 2, assuming that the sender is i and the destination is j, node i maintains the G, N T x O k i j , and  N T x F a i l i j , where N T x F a i l i j represents the number of times node i has successfully relinquished the channel.   
Algorithm 2: Contention window state update algorithm.
Input
the sender i, the receiver j, the destination node of the last time k, the contention state G i j , the number of successful handshakes N T x O k i j , the number of times node i has successfully relinquished the channel N T x F a i l i j , and the backoff counter, B c n t i .
Output: the contention state G i j
Jmse 11 00802 i002
When the destination node changes, the communication distance will also change. Since the problem of spatial unfairness is determined by the distance between nodes, if the communication distance changes slightly, the new link will still have a continuous impact on the surrounding nodes. Therefore, if the change in the communication distance is less than the threshold Δ t h , the new link will still continue the calculation process of the listening period of the previous link. Assume that the destination nodes of the last time and this time are k and j, respectively. If  d i j d i k Δ t h , then G i j = G i k , N T x O k i j = N T x O k i k and N T x F a i l i j = N T x F a i l i k . If  d i k d i j > Δ t h , then G i j = R D , N T x O k i j = 0 and N T x F a i l i j = 0 . Where, d a b represents the euclidean distance between nodes a and b.

4.3. Avoid Collisions between Control Packets from Neighbors and DATA Packets

In Figure 6, node A delays sending the DATA packet for some time after receiving the CTS packet to ensure that the DATA packet does not collide with the control packet sent by node C at node B. T 3 and T 4 are the moments when the control packet of node C and the data packet of node A arrive at node B, respectively. To avoid collisions, the following conditions must be satisfied.
T 3 T 4
Equation (18) is converted into the relationship between T 1 , T 2 , the waitting time T W A B C , propagation delay, and packet transmission time as follows.
T 2 + D B C + T R T S T 1 + 3 D A B + T R T S + T C T S + T W A B C
The range of T W A B C can be obtained.
T W A B C T 2 T 1 + D B C 3 D A B T C T S
According to Equations (7) and (8), the sets F 1 A B C and F 2 A B C can be obtained. The time difference between T 2 and T 1 of the collision case is the intersection of sets F 1 A B C and F 2 A B C .
F 1 A B C = 3 T A B T B C + T C T S , 3 T A B T B C + T R T S + T C T S + T D A T A F 2 A B C = T A B + T R T S T B C , T A B + T R T S + T B C
Let T M A X A B C be the maximum value of F 1 A B C F 2 A B C , and if T W A B C T M A X A B C + D B C 3 D A B T C T S , the collision probability between control packets from neighbors and DATA packets is 0. The value of T W A B C is as follows.
T W A B C = T M A X A B C + D B C 3 D A B T C T S + δ
where δ is a protection interval designed to prevent short-term distance errors caused by node drift. The likelihood of a collision increases if the intersection of sets F 1 and F 2 is larger. Therefore, the receiver needs to choose the hidden terminal of the sender with the largest intersection value to calculate the waiting time.
As shown in Figure 6, the collision problem between control packets from neighbors and data packets can be effectively prevented. However, collisions between data packets may still occur due to the waiting time. To address this issue, we incorporate the stop-and-wait automatic repeat request (ARQ) scheme from the [37] into the protocol.
Assuming that the sender is node i and the receiver is node j, then node j uses the following process and Algorithm 3 to calculate the waiting time, T W i j .
  • The receiver can obtain the set F H i d d e n of the sender’s hidden terminals among the receiver’s neighbors by using the location information.
  • After receiving the RTS packet from the sender i, the receiver j calculates the waiting time of the DATA packet by traversing the location information of the set F H i d d e n . Node j selects the node k with the largest P W i j k to calculate its waiting time T W i j . Node j informs node i of the waiting time through the CTS packet.
  • If node j does not receive the DATA packet, it will immediately send a negative NACK packet to node i. Upon receiving the NACK packet, node i will immediately retransmit the corresponding DATA packet.
  • Node j will then send an ACK packet immediately after receiving the DATA packet. Upon receiving the ACK packet, Node i will check if the cache queue with the destination address node j is empty. If it is not, node i will continue to send the next DATA packet.
Algorithm 3: Waiting time selection algorithm.
 Input
the sender i, the receiver j and the sender’s hidden terminals among the receiver’s neighbors F H i d d e n .
Output: the waiting time T w i j
Jmse 11 00802 i003

4.4. Packet Structure

As shown in Figure 7, the packet structures for RTS, CTS, DATA, ACK, and NACK are designed to enable nodes to efficiently acquire information and accomplish data transmission tasks. In the design of each packet structure, apart from the fundamental fields such as packet type, source address, and destination address, we have incorporated additional fields to support the protocol algorithm effectively. The node maintains the location information of its neighbors in the neighbor table by receiving the spatial position coordinates in the RTS or CTS packet. Through the neighbor table, the node can easily obtain the hidden terminal set of its sender in Algorithm 3. Nodes typically obtain their position coordinates in the network periodically using a positioning algorithm. However, due to the fact that underwater nodes drift with the current, there can be errors in the propagation delay of nodes to neighbors obtained by coordinates. The timestamp in each packet records when the packet was sent, and the receiver can obtain the propagation delay of the sender through the timestamp. The link delay in CTS, DATA, and ACK/NACK is set to record the propagation delay of the communication link, and neighboring nodes can then set the quiet time based on this information. The maximum propagation delay to neighbors is set in RTS and CTS, so the sender can use this information to get a spatially fair waiting time. In the DATA, ACK, and NACK packet structures, the “Has Next” field indicates whether there is another DATA packet to be sent or received. Neighbors can get the end time of the communication link based on this field. The “Data ID” and “Data” fields represent the identification and specific content of the DATA packet, respectively.

4.5. State Transition Policy

The state transition strategies are typically an essential part of contention-based MAC protocols. These strategies define the rules for nodes to transition between different states, such as idle, backoff, and transmission, based on the perceived network conditions and the protocol’s requirements. The state transition strategy consists of two components: state transition rules and state hold time. The State hold time determines the duration that a node remains in a specific state. To effectively determine the state holding times for each state, it is crucial to analyze the timing of various packet interactions within the proposed MAC protocol.
Suppose the source node is i, the destination node is j, and node k is a neighbor of node i and node j. The timing diagram of SFLC-MAC is shown in Figure 8. When node j receives an RTS packet from node i, it waits for a duration of 2 D i j + T DATA + T CTS + T w to receive the DATA packet. After receiving the DATA packet, if there is a subsequent packet, node j waits for a duration of 2 D i j + T DATA + T ACK to receive the next packet. After sending the DATA packet, node i waits for a duration of 2 D i j + T DATA + T ACK to receive the ACK packet from node j. If there is another packet to be sent, the same waiting time applies. Neighboring node k must remain silent when receiving packets from nodes i or j. Upon receiving an xRTS packet from node i, node k cannot determine the location of node j, so the silence duration for node k should be 2 τ + T C T S + T D A T A . If node k receives an xCTS packet from node j, the silence duration can be easily determined as 2 T l i n k i j + T w i j + T D A T A + T A C K from the timing diagram. When receiving an xDATA packet from node i, node k must determine whether there will be another DATA packet received based on the data packet information; if so, the actual silence duration is 2 T l i n k i j + T D A T A + T A C K . Similarly, when node k receives an xACK packet from node j, the same silence strategy is employed.
By providing a clear and organized overview of the protocol’s operation, the state transition diagram is shown in Figure 9. It visually represents the possible states that a node can be in, as well as the conditions and events that trigger transitions between these states. The SFLC-MAC has six states, namely, IDLE, CONTEND (CTD), WFCTS, WFDATA, WFACK, and QUIET. The state transition strategies in Figure 9 can be described as follows:
  • In IDLE state, it will be transferred according to the following conditions:
    • If there is a DATA packet to be sent in the cache, the state is switched to the CTD, and the CTD state’s hold time is calculated according to Algorithm 1.
    • Overhear RTS packet, it calculates the DATA packet waiting time T w according to Algorithm 3, writes the T w into CTS packet, and broadcast the packet. Then, its state switches to the WFDATA, and the state’s hold time is 2 D i j + T DATA + T CTS + T w + T PRO . Where T P R O is a protection interval.
    • Overhear xRTS packet, its state switches to the QUIET, and the state’s hold time is 2 τ + T C T S + T D A T A + T P R O .
    • Overhear xCTS packet, its state switches to the QUIET, and the state’s hold time is 2 T l i n k + T w + T D A T A + T A C K + T P R O . Where T l i n k and T w are the link delay and waiting time recorded in the packet, respectively.
    • Overhear DATA packet that is intended for another node (xDATA), its state switches to the QUIET. If the HasNext flag of the packet is 1, the state’s hold time is 2 T l i n k + T D A T A + T A C K + T P R O . If the flag is 0, the state’s hold time is 2 T l i n k + T A C K + T P R O .
    • Overhear ACK or NACK packet that is intended for another node (xACK or xNACK). If the HasNext flag of the packet is 1, its state switches to the QUIET, and the state’s hold time is 2 T l i n k + T D A T A + T A C K + T P R O .
  • In CTD state, it will be transferred according to the following conditions:
    • After the state hold time is over, the node sends an RTS packet. The state then switches to WFCTS and the state hold time is 2 τ + T RTS + T CTS + T PRO .
    • Overhear RTS packet, the node executes the policy consistent with IDLE.
    • Overhear packet sent to other nodes, the node executes the policy consistent with IDLE.
  • In the WFCTS state, it will be transferred according to the following conditions:
    • Overhear the CTS packet, the node sends the DATA packet immediately after the waiting time. Then, its state switches to the WFACK and the state’s hold time is 2 D i j + T DATA + T ACK + T PRO .
    • After the hold time expires, it means that the handshake fails. The node updates the backoff value B cnt according to the BEB algorithm. Then, its state switches to the CTD and the state’s hold time is R a n d o m 0 , B cnt τ + T RTS .
    • Overhear packet sent to other nodes, the node executes the policy consistent with IDLE.
  • In the WFDATA state, it will be transferred according to the following conditions:
    • Overhear DATA packet, the node write the HasNext into ACK packet and broadcast the packet. If the HasNext flag of the packet is 1, its state switches to the WFDATA and the state’s hold time is 2 D i j + T DATA + T ACK + T PRO . If the flag is 0, its state switches to the IDLE.
    • After the hold time expires, it means that the DATA packet has not been received. If the DATA packet does not exceed the maximum number of retransmissions, the node immediately sends a NACK packet to request retransmission, and maintains the WFDATA state for a duration of 2 D i j + T DATA + T ACK + T PRO . If the DATA packet exceeds the maximum number of retransmissions, the state is switched to IDLE.
  • In the WFACK state, it will be transferred according to the following conditions:
    • Overhear ACK packet, the node detects whether there is still data in the queue to be sent this time. If there is, it immediately sends a DATA packet, and the state is changed to WFACK, and the hold time is 2 D i j + T DATA + T ACK + T PRO . If the queue is empty, the state is switched to IDLE.
    • Overhear NACK packet, the node detects whether the corresponding DATA packet exceeds the maximum number of retransmissions. If not, the node immediately sends the corresponding DATA packet, switches the state to WFACK, and the hold time is 2 D i j + T DATA + T ACK + T PRO . If it exceeds, the DATA packet will be discarded immediately, and the state will be set to IDLE.
    • After the hold time expires, the node executes the policy consistent with WFCTS.
  • In QUIET state, it will be transferred according to the following conditions:
    • After the hold time expires, the node detects whether the channel is busy. If it is busy, the node will continue to maintain the QUIET state, and the state hold time is τ + T RTS . If it is idle, the state is changed to the IDLE state.
    • Overhear packet sent to other nodes, the node calculates the new hold time according to the policy in the IDLE state. It compares the new hold time with the current remaining hold time, and selects the largest hold time as the hold time of this state.

5. Simulation Results

In this paper, we use the NS3 simulation to compare the performance of SFLC-MAC with QL-UACW, Slotted-FAMA, and UW-SEEDEX. Table 2 shows the simulation parameters, while Figure 10 depicts the scenarios of a distributed topology. In Figure 10a,b, nodes A and C transmit packets to nodes B and D, respectively. We assume that the maximum transmission range is R, with d 2 being a random number r ranging from 0 to R. Furthermore, d 1 and d 3 are random numbers in the range of R r to R, ensuring that the scene is either an exposed or hidden terminal. In Figure 10c, we divide the 6 km × 6 km sea area into 16 grids of 1.5 km × 1.5 km each and randomly deploy one node in each grid.
In all scenarios, the time interval for each sender to generate DATA packets satisfies the Poisson distribution. In Figure 10c, each time the sender generates a DATA packet, it randomly selects a neighbor node as the destination address. A total of 100 simulations were conducted randomly, each lasting 10 , 000 s, and the results were averaged across all simulations.
Four metrics are utilized to evaluate the performance of these protocols: network throughput, end-to-end delay, average energy consumption, and spatial fairness index. Network throughput is quantified as the amount of data successfully transmitted during the simulation period. End-to-end delay is determined as the duration from the time a packet is generated by the sending node to the time it is received by the destination node. Average energy consumption is calculated by computing the average energy consumed to successfully receive a packet. To evaluate the fairness of the protocols, we adopted Jain’s Fairness Index [38]:
Fairness Index = i = 1 N x i 2 N × i = 1 N x i 2
where x i denotes the throughput of node i ( 1 i N ), and N is the number of nodes in the network.

5.1. Evaluating Contention Window Spatial Fairness Adjustment Strategy

To verify the effectiveness of the contention window adjustment algorithm, we conducted simulation experiments using QL-UACW in scenarios with exposed, hidden, and random topologies. The simulation results for a packet size of 500 bytes are presented in Figure 11.

5.1.1. 4-Node Topology

In Figure 11a,c,e we show the performance differences between SFLC-MAC and QL-UACW in the 4-node scenario. Equation (2) reveals that the unfairness in channel access is linked to the distance of link; therefore, the simulation experiments were conducted with varying values of d 1 . To assess the impact of short communication links on the network and maintain generality, we set the random range of values for d 1 in Figure 10 to [ 100 m , 500 m] and [ 100 m , 2900 m], respectively.
Figure 11a shows that the difference in the fairness index between SFLC-MAC and QL-UACW is close to 0 in both exposed and hidden terminal scenarios when the load is less than 0.1 pkt/s. However, as the load increases, the difference between the two MAC protocols also increases. While re-handshaking can solve the unfairness problem when the network congestion is low due to a small load, it becomes more difficult for nodes to access the channel through re-handshaking as the network load increases.
In the same topology scene, it was observed that SFLC-MAC had a higher fairness index when d 1 was between 100 m and 500 m than when d 1 was between 100 m and 2900 m. This is because SFLC-MAC addresses issues related to spatial fairness, which are more likely to occur when d 1 is small. In contrast, QL-UACW does not take problems of spatial fairness into account.
In the same range of d 1 , SFLC-MAC has a greater fairness advantage in the topology scenario shown in Figure 10a than in Figure 10b. This is because Figure 10a shows the exposed terminal scenario and the degree of competition among senders is high, which affects the self-learning process of QL-UACW. In SFLC-MAC, the sender periodically switches to the fair period, which enhances the cooperation ability among nodes and ensures the orderly transmission of links. As shown in Figure 11c, SFLC-MAC requires the node that has successfully completed its DATA transmission to increase its listening time, thus, paying a high end-to-end delay cost in scenario in Figure 10a to ensure fairness.
As shown in Figure 11c,e, SFLC-MAC has a better end-to-end delay and higher throughput performance for the hidden terminal scenario. In Figure 10b, if the sender does not receive a CTS packet, it will enter the backoff state. The backoff time can effectively reduce the conflict rate between nodes and improve fairness. Therefore, the fairness advantages of QL-UACW and SFLC-MAC are similar in the hidden terminal scenario. This can be attributed to SFLC-MAC’s consideration of the asynchronous decision problem that exists in hidden terminals, which guarantees fair access to the channel for hidden terminals by actively deferring access to the channel. In contrast, QL-UACW has to wait longer to update its policy.

5.1.2. 16-Node Topology

In Figure 11b,d,f we show the performance differences between SFLC-MAC and QL-UACW in the 16-node scenario.
As shown in Figure 11b, it can be concluded that the SFLC-MAC protocol provides higher fairness than the QL-UACW after 0.05 pkt/s. In this scenario, each packet from a node randomly selects a neighboring node as its destination address, resulting in rapid changes in the network. The QL-UACW uses a greedy strategy based on Q-learning, which does not consider the cooperation of neighboring nodes. Furthermore, Q-learning algorithms require some time to reach a converged state. In comparison, the fairness algorithm in this paper allows nodes to actively or postpone competing for channels while considering the spatial fairness issue, ensuring orderly communication between nodes. As a result, SFLC-MAC has clear advantages in both the spatial fairness problem and the rapidly changing network transmission environment.
In Figure 11f, it can be observed that when the load exceeds 0.05 pkt/s, the throughput of SFLC-MAC is lower than that of QL-UACW. With reduced fairness, certain nodes will continuously occupy the channel, leading to fast packet delivery for these nodes, while packets from other nodes may be consistently blocked. Consequently, a low fairness approach may result in higher network throughput. In Figure 11d, the end-to-end delay of SFLC-MAC is slightly higher than that of the QL-UACW protocol. As shown in Equation (10), this study employs a fixed step size for adjusting the basic contention window value, whereas QL-UACW adopts an adaptive adjustment strategy, which leads to a loss of delay performance. Nonetheless, although the end-to-end delay and throughput performance of SFLC-MAC are slightly lower than those of QL-UACW, its fairness is significantly higher than QL-WACW when the load exceeds 0.05 pkt/s.
In summary, under various scenarios, the contention window adjustment mechanism in SFLC-MAC can achieve higher fairness while ensuring good end-to-end delay and throughput performance. This ensures that each node in the network can access the channel fairly, regardless of the specific scenario.

5.2. Evaluating the Mechanism of Postponing DATA Packet Transmission

To evaluate the effectiveness of the collision avoidance mechanism, we modified the waiting time for DATA packets sent in the SFLC-MAC protocol to 0, and named the modified protocol SFNW-MAC. We then compared the performance differences between the SFLC-MAC and SFNW-MAC protocols in scenarios with 4 nodes (Figure 10b) and 16 nodes (Figure 10c). The simulation results are depicted in Figure 12.

5.2.1. Hidden Terminal Scenario of 4-Node

Based on Equations (7) and (8), it becomes evident that the probability of collisions between control packets and DATA packets is associated with the DATA packet size and the distance between the links. Therefore, for the purpose of the simulation experiments, we chose packet sizes of 300 bytes and 1000 bytes, and set the d 2 values within the ranges of [ 100 m , 500 m] and [ 1000 m , 1500 m]. In Figure 12a,c, we show the performance differences between SFLC-MAC and SFNW-MAC in the 4-node scenario.
As depicted in Figure 12c, the difference in end-to-end delay between SFLC-MAC and SFNW-MAC is more significant when the packet length is 300 bytes than when it is 1000 bytes. This is because shorter packets require less transmission time, resulting in an increased number of handshakes within the same network time. This increase in handshakes leads to a higher probability of collisions between control and DATA packets. The performance of SFLC-MAC can be improved by waiting a certain amount of time before sending DATA packets, depending on the probability of control packets colliding with DATA packets. Consequently, SFLC-MAC performs better in shorter packet scenarios within the same simulation time. The performance advantage of SFLC-MAC is more noticeable when the distance d 2 is in [ 1000 m , 1500 m]. This is because a larger d 2 corresponds to a higher probability of collision between control and DATA packets.
In Figure 12a, regarding throughput performance, the SFLC-MAC demonstrates higher throughput than the SFNW-MAC. With the same data packet size, the larger the range of d 2 , the greater the difference in throughput. These performance trends are related to the end-to-end delay performance in their respective scenarios. This is because as the end-to-end delay decreases, the number of data packets transmitted per unit of time increases, consequently leading to higher throughput.

5.2.2. 16-Node Topology

In the 16-node topology, as shown in Figure 12d, the end-to-end delay difference between the two schemes is approximately −30 s, while in the hidden terminal scenario, the difference is approximately −100 s. The probability of collision between control packets and DATA packets is lower in the 16-node topology. Thus, the advantage of SFLC-MAC in terms of end-to-end delay is smaller in this scenario. Nevertheless, the end-to-end delay of SFLC-MAC is still lower than that of SFNW-MAC in the 16-node topology. As shown in Figure 12b, when the packet size is increased from 300 to 1000 bytes, the throughput difference is significantly higher. This is because larger packet lengths result in more DATA being received by the node for a similar end-to-end delay, thus, leading to an increase in the throughput difference.
In conclusion, this paper has shown that the proposed waiting time algorithm can effectively reduce end-to-end delay and increase throughput in both hidden terminal and random scenarios, with a particularly significant improvement in the hidden terminal scenario.

5.3. Comparing SFLC-MAC with Other Protocols in Randomly Deployed Networks Topology

This paper compares the performance of SFLC-MAC with that of Slotted-FAMA and UW-SEEDEX in the 16-node topology.
Under different loads, UW-SEEDEX demonstrates excellent fairness, as depicted in Figure 13d. The SFLC-MAC protocol maintains fairness of over 0.95 at loads lower than 0.01 pkt/s. At higher loads, network congestion increases, which affects the fairness of SFLC-MAC but remains above 0.85. The Slotted-FAMA protocol, which employs a fixed time slot algorithm, cannot handle network congestion under high loads, resulting in a significant drop in fairness after 0.05 pkt/s. In contrast, SFLC-MAC addresses fairness issues caused by spatio-temporal uncertainty at low loads and maintains fairness similar to UW-SEEDEX, and higher than the Slotted-FAMA protocol.
Both UW-SEEDEX and Slotted-FAMA use fixed time slots to transmit DATA packets, as shown in Figure 13a, resulting in a convergence of throughput at 0.05 pkt/s due to the limited number of time slots. UW-SEEDEX, which employs a collision avoidance mechanism, has a lower packet collision rate than Slotted-FAMA, resulting in higher throughput. SFLC-MAC performs similarly to UW-SEEDEX when the load is not higher than 0.007 pkt/s. However, when network congestion occurs, as shown in Figure 13a,c, SFLC-MAC adjusts the competition window time according to the degree of congestion and reduces the degree of congestion, resulting in higher throughput and end-to-end performance than UW-SEEDEX and Slotted-FAMA. The average energy consumption of the UW-SEEDEX network significantly increases at a load of 0.01 pkt/s, compared to the load of 0.007 pkt/s required to reach the full load state of UW-SEEDEX, and convergence is maintained as the load increases, as shown in Figure 13b. Slotted-FAMA is unable to adapt to the high congestion state of the network at 0.01 pkt/s, resulting in an increase in the average energy consumption of its network. SFLC-MAC can effectively manage network congestion and independently coordinate network resources, ensuring that the average energy consumption of the network remains stable.
In the 16-node topology, the SFLC-MAC protocol demonstrates lower end-to-end delay, higher network throughput, and lower average energy consumption than other protocols due to its ability to address unfairness caused by spatio-temporal uncertainty and reduce the probability of collision between control and DATA packets.

6. Conclusions

SFLC-MAC is a reservation-based protocol for UANs. The protocol optimizes the contention window adjustment mechanism, handshake mechanism, and state transfer strategy. The protocol formulates a contention window state transition strategy based on the locally perceived information of the nodes. Through this strategy, nodes can autonomously switch between random and fair contention states. This not only ensures fairness in channel access, but also minimizes performance degradation caused by prolonged listening time. This protocol reduces the packet collision rate by making the receiver responsible for calculating the waiting time for sending DATA packets from the sender. Finally, a node state transition strategy is established to regulate the behavior of nodes under different network conditions. Based on the timing of data packet interactions, the maintenance durations of various states are refined under different conditions. Through experiments in the exposed terminal, hidden terminal, and 16-node topology scenarios, the protocol achieved high performance in terms of throughput, end-to-end delay, network energy consumption, and fairness, demonstrating its effectiveness. Future work will evaluate the performance of this protocol in combination with routing protocols and aim to enhance its advantages in end-to-end networks.

Author Contributions

Conceptualization, M.Z.; methodology, M.Z. and W.G.; investigation, M.Z., W.G. and X.H.; formal analysis, M.Z. and X.H.; writing—original draft preparation, M.Z. and W.G.; supervision, funding acquisition, J.Y.; writing—review and editing, M.Z. and X.H. All authors have read and agreed to the published version of the manuscript.

Funding

The work was supported in part by the National Science Foundation for Distinguished Young Scholars of China (Grant No. 62125104).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors would like to thank the anonymous reviewers for their careful reading and valuable comments.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Islam, K.Y.; Ahmad, I.; Habibi, D.; Waqar, A. A survey on energy efficiency in underwater wireless communications. J. Netw. Comput. Appl. 2022, 198, 103295. [Google Scholar] [CrossRef]
  2. Darehshoorzadeh, A.; Boukerche, A. Underwater sensor networks: A new challenge for opportunistic routing protocols. IEEE Commun. Mag. 2015, 53, 98–107. [Google Scholar] [CrossRef]
  3. Campagnaro, F.; Steinmetz, F.; Renner, B.C. Survey on Low-Cost Underwater Sensor Networks: From Niche Applications to Everyday Use. J. Mar. Sci. Eng. 2023, 11, 125. [Google Scholar] [CrossRef]
  4. Jiang, S. State-of-the-art medium access control (MAC) protocols for underwater acoustic networks: A survey based on a MAC reference model. IEEE Commun. Surv. Tutor. 2017, 20, 96–131. [Google Scholar] [CrossRef]
  5. Bello, O.; Zeadally, S. Internet of underwater things communication: Architecture, technologies, research challenges and future opportunities. Ad Hoc Netw. 2022, 135, 102933. [Google Scholar] [CrossRef]
  6. Alfouzan, F.A. Energy-efficient collision avoidance MAC protocols for underwater sensor networks: Survey and challenges. J. Mar. Sci. Eng. 2021, 9, 741. [Google Scholar] [CrossRef]
  7. De, S.; Mandal, P. On Stability of S-Aloha with Variable Propagation Delay. IET Commun. 2019, 13, 1813–1820. [Google Scholar] [CrossRef]
  8. Chen, K.; Ma, M.; Cheng, E.; Yuan, F.; Su, W. A survey on MAC protocols for underwater wireless sensor networks. IEEE Commun. Surv. Tutor. 2014, 16, 1433–1447. [Google Scholar] [CrossRef]
  9. Molins, M.; Stojanovic, M. Slotted FAMA: A MAC protocol for underwater acoustic networks. In Proceedings of the OCEANS 2006-Asia Pacific, Singapore, 16–19 May 2006; IEEE: New York, NY, USA, 2006; pp. 1–7. [Google Scholar] [CrossRef] [Green Version]
  10. Hsu, C.C.; Kuo, M.S.; Chou, C.F.; Lin, K.C.J. The elimination of spatial-temporal uncertainty in underwater sensor networks. IEEE/ACM Trans. Netw. 2012, 21, 1229–1242. [Google Scholar] [CrossRef]
  11. Kredo II, K.; Djukic, P.; Mohapatra, P. STUMP: Exploiting position diversity in the staggered TDMA underwater MAC protocol. In Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; IEEE: New York, NY, USA, 2009; pp. 2961–2965. [Google Scholar] [CrossRef]
  12. Pompili, D.; Melodia, T.; Akyildiz, I.F. A CDMA-based medium access control for underwater acoustic sensor networks. IEEE Trans. Wirel. Commun. 2009, 8, 1899–1909. [Google Scholar] [CrossRef]
  13. Petroni, A.; Ko, H.L.; Im, T.; Cho, Y.H.; Cusani, R.; Scarano, G.; Biagi, M. Hybrid space-frequency access for underwater acoustic networks. IEEE Access 2022, 10, 23885–23901. [Google Scholar] [CrossRef]
  14. Hong, L.; Hong, F.; Li, Z.B.; Guo, Z.W. CT-TDMA: Efficient TDMA protocol for underwater sensor networks. J. China Inst. Commun. 2012, 33, 164–174. [Google Scholar] [CrossRef]
  15. Geng, X.; Zheng, Y.R. Exploiting Propagation Delay in Underwater Acoustic Communication Networks via Deep Reinforcement Learning. IEEE Trans. Neural Networks Learn. Syst. 2022, 1, 1–12. [Google Scholar] [CrossRef]
  16. Rice, J.; Creber, B.; Fletcher, C.; Baxley, P.; Rogers, K.; McDonald, K.; Rees, D.; Wolf, M.; Merriam, S.; Mehio, R.; et al. Evolution of Seaweb underwater acoustic networking. In Proceedings of the OCEANS 2000 MTS/IEEE Conference and Exhibition, Conference Proceedings (Cat. No. 00CH37158), Providence, RI, USA, 11–14 September 2000; IEEE: New York, NY, USA, 2000; Volume 3, pp. 2007–2017. [Google Scholar] [CrossRef]
  17. Guo, J.; Song, S.; Liu, J.; Wan, L.; Zhao, Y.; Han, G. An Efficient Medium Access Control Scheme Based on MC-CDMA for Mobile Underwater Acoustic Networks. IEEE Netw. 2022, 36, 167–173. [Google Scholar] [CrossRef]
  18. Watfa, M.K.; Selman, S.; Denkilkian, H. UW-MAC: An underwater sensor network MAC protocol. Int. J. Commun. Syst. 2010, 23, 485–506. [Google Scholar] [CrossRef] [Green Version]
  19. Climent, S.; Capella, J.V.; Meratnia, N.; Serrano, J.J. Underwater sensor networks: A new energy efficient and robust architecture. Sensors 2012, 12, 704–731. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  20. Syed, A.A.; Ye, W.; Heidemann, J.; Krishnamachari, B. Understanding spatio-temporal uncertainty in medium access with ALOHA protocols. In Proceedings of the 2nd Workshop on Underwater Networks, Montreal, QC, Canada, 14 September 2007; pp. 41–48. [Google Scholar] [CrossRef] [Green Version]
  21. Júnior, E.P.C.; Vieira, L.F.; Vieira, M.A. UW-SEEDEX: A pseudorandom-based MAC protocol for underwater acoustic networks. IEEE Trans. Mob. Comput. 2021, 21, 3402–3413. [Google Scholar] [CrossRef]
  22. Liao, W.H.; Huang, C.C. SF-MAC: A spatially fair MAC protocol for underwater acoustic sensor networks. IEEE Sensors J. 2011, 12, 1686–1694. [Google Scholar] [CrossRef]
  23. Chirdchoo, N.; Soh, W.S.; Chua, K.C. MACA-MN: A MACA-based MAC protocol for underwater acoustic networks with packet train for multiple neighbors. In Proceedings of the VTC Spring 2008-IEEE Vehicular Technology Conference, Marina Bay, Singapore, 11–14 May 2008; IEEE: New York, NY, USA, 2008; pp. 46–50. [Google Scholar] [CrossRef] [Green Version]
  24. Lin, W.; Cheng, E.; Yuan, F. A MACA-based MAC protocol for Underwater Acoustic Sensor Networks. J. Commun. 2011, 6, 179–184. [Google Scholar] [CrossRef] [Green Version]
  25. Zhang, S.; Qian, L.; Liu, M.; Fan, Z.; Zhang, Q. A slotted-FAMA based MAC protocol for underwater wireless sensor networks with data train. J. Signal Process. Syst. 2017, 89, 3–12. [Google Scholar] [CrossRef]
  26. Ansari, S.; Poncela, J.; Otero, P.; Ansari, A. Performance Analysis of MultiACK-SFAMA for Underwater Acoustic Networks. Wirel. Pers. Commun. 2019, 106, 2427–2444. [Google Scholar] [CrossRef]
  27. Zhang, W.; Wang, X.; Han, G.; Peng, Y.; Guizani, M.; Sun, J. A load-adaptive fair access protocol for MAC in underwater acoustic sensor networks. J. Netw. Comput. Appl. 2021, 173, 102867. [Google Scholar] [CrossRef]
  28. Dou, F.; Peng, Z. On-demand pipelined MAC for multi-hop underwater wireless sensor networks. In Proceedings of the 10th International Conference on Underwater Networks & Systems, Los Angeles, CA, USA, 25 September 2015; pp. 1–5. [Google Scholar] [CrossRef]
  29. Chirdchoo, N.; Soh, W.S.; Chua, K.C. Aloha-based MAC protocols with collision avoidance for underwater acoustic networks. In Proceedings of the IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications, Anchorage, AK, USA, 6–12 May 2007; IEEE: New York, NY, USA, 2007; pp. 2271–2275. [Google Scholar] [CrossRef]
  30. Ahn, J.; Krishnamachari, B. Performance of a propagation delay tolerant ALOHA protocol for underwater wireless networks. In Proceedings of the Distributed Computing in Sensor Systems: 4th IEEE International Conference, DCOSS 2008, Santorini Island, Greece, 11–14 June 2008; Proceedings 4. Springer: Berlin, Germany, 2008; pp. 1–16. [Google Scholar] [CrossRef]
  31. Chen, W.; Guan, Q.; Yu, H.; Ji, F.; Chen, F. Medium access control under space-time coupling in underwater acoustic networks. IEEE Internet Things J. 2021, 8, 12398–12409. [Google Scholar] [CrossRef]
  32. Tracy, L.T.; Roy, S. A reservation MAC protocol for ad-hoc underwater acoustic sensor networks. In Proceedings of the 3rd International Workshop on Underwater Networks, San Francisco, CA, USA, 15 September 2008; pp. 95–98. [Google Scholar] [CrossRef]
  33. Hossain, M.A.; Karmaker, A.; Alam, M.S. A Low Latency MAC Protocol with Reduced Handshaking for Provisioning Spatial Fairness in Underwater Sensor Network. Int. J. Wirel. Inf. Netw. 2021, 28, 147–161. [Google Scholar] [CrossRef]
  34. Goyal, N.; Dave, M.; Verma, A.K. Protocol stack of underwater wireless sensor network: Classical approaches and new trends. Wirel. Pers. Commun. 2019, 104, 995–1022. [Google Scholar] [CrossRef]
  35. Peleato, B.; Stojanovic, M. A MAC protocol for ad-hoc underwater acoustic sensor networks. In Proceedings of the 1st International Workshop on Underwater Networks, Los Angeles, CA, USA, 25 September 2006; pp. 113–115. [Google Scholar] [CrossRef]
  36. Ng, H.H.; Soh, W.S.; Motani, M. MACA-U: A media access protocol for underwater acoustic networks. In Proceedings of the IEEE GLOBECOM 2008-2008 IEEE Global Telecommunications Conference, New Orleans, LA, USA, 30 November–4 December 2008; IEEE: New York, NY, USA, 2008; pp. 1–5. [Google Scholar] [CrossRef] [Green Version]
  37. Lin, S.; Costello, D.J.; Miller, M.J. Automatic-repeat-request error-control schemes. IEEE Commun. Mag. 1984, 22, 5–17. [Google Scholar] [CrossRef]
  38. Sediq, A.B.; Gohary, R.H.; Schoenen, R.; Yanikomeroglu, H. Optimal tradeoff between sum-rate efficiency and Jain’s fairness index in resource allocation. IEEE Trans. Wirel. Commun. 2013, 12, 3496–3509. [Google Scholar] [CrossRef] [Green Version]
Figure 1. 4-node network topology. (a) C is the exposed transmit terminal of A. (b) D is the exposed receive terminal of A. (c) C is the hidden transmit terminal of A. (d) D is the hidden receive terminal of A.
Figure 1. 4-node network topology. (a) C is the exposed transmit terminal of A. (b) D is the exposed receive terminal of A. (c) C is the hidden transmit terminal of A. (d) D is the hidden receive terminal of A.
Jmse 11 00802 g001
Figure 2. Timing Diagram of spatial unfairness scenarios. (a) The exposed transmit terminal. (b) The exposed receive terminal. (c) The hidden transmit terminal. (d) The hidden receive terminal.
Figure 2. Timing Diagram of spatial unfairness scenarios. (a) The exposed transmit terminal. (b) The exposed receive terminal. (c) The hidden transmit terminal. (d) The hidden receive terminal.
Jmse 11 00802 g002
Figure 3. Collision between control packet from neighbors and data packet in hidden terminal scene. (a) The hidden transmit terminal. (b) The hidden receive terminal.
Figure 3. Collision between control packet from neighbors and data packet in hidden terminal scene. (a) The hidden transmit terminal. (b) The hidden receive terminal.
Jmse 11 00802 g003
Figure 4. Timing diagram of SFLC-MAC protocol.
Figure 4. Timing diagram of SFLC-MAC protocol.
Jmse 11 00802 g004
Figure 5. Timing diagram of spatial unfairness scenario with the spatial fairness waiting time. (a) The exposed transmit terminal. (b) The exposed receive terminal. (c) The hidden transmit terminal.
Figure 5. Timing diagram of spatial unfairness scenario with the spatial fairness waiting time. (a) The exposed transmit terminal. (b) The exposed receive terminal. (c) The hidden transmit terminal.
Jmse 11 00802 g005
Figure 6. Avoid collisions between control packets from neighbors and DATA packets by the waiting time.
Figure 6. Avoid collisions between control packets from neighbors and DATA packets by the waiting time.
Jmse 11 00802 g006
Figure 7. Packet structures of RTS, CTS, DATA, ACK, and NACK.
Figure 7. Packet structures of RTS, CTS, DATA, ACK, and NACK.
Jmse 11 00802 g007
Figure 8. Timeing diagram of node i, j, and k.
Figure 8. Timeing diagram of node i, j, and k.
Jmse 11 00802 g008
Figure 9. State transition rules of SFLC-MAC.
Figure 9. State transition rules of SFLC-MAC.
Jmse 11 00802 g009
Figure 10. The network topology used in our simulations. (a) The exposed terminal scenario of 4–Node. (b) The hidden terminal scenario of 4–Node. (c) The randomly scenario of 16–Node.
Figure 10. The network topology used in our simulations. (a) The exposed terminal scenario of 4–Node. (b) The hidden terminal scenario of 4–Node. (c) The randomly scenario of 16–Node.
Jmse 11 00802 g010
Figure 11. The performance of SFLC–MAC and QL–UACW in relation to the traffic rate. (a) The difference of the fairness index in 4–Node topology. (b) The fairness index in 16–Node topology. (c) The difference of the end–to–end delay in 4–Node topology. (d) The end–to–end delay in 16–Node topology. (e) The difference of the throughput in 4–Node topology. (f) The thoughput in 16–Node topology.
Figure 11. The performance of SFLC–MAC and QL–UACW in relation to the traffic rate. (a) The difference of the fairness index in 4–Node topology. (b) The fairness index in 16–Node topology. (c) The difference of the end–to–end delay in 4–Node topology. (d) The end–to–end delay in 16–Node topology. (e) The difference of the throughput in 4–Node topology. (f) The thoughput in 16–Node topology.
Jmse 11 00802 g011
Figure 12. The performance of SFLC–MAC and SFNW–MAC in relation to the traffic rate. (a) The difference of the throughput in 4–Node topology. (b) The difference of the throughput in 16–Node topology. (c) The difference of the end–to–end delay in 4–Node topology. (d) The difference of the end–to–end delay in 16–Node topology.
Figure 12. The performance of SFLC–MAC and SFNW–MAC in relation to the traffic rate. (a) The difference of the throughput in 4–Node topology. (b) The difference of the throughput in 16–Node topology. (c) The difference of the end–to–end delay in 4–Node topology. (d) The difference of the end–to–end delay in 16–Node topology.
Jmse 11 00802 g012
Figure 13. The performance of SFLC–MAC, UW–SEEDEX and Slotted–FAMA in relation to the traffic rate. (a) The throughput. (b) The average energy consumption per data reception. (c) The end–to–end delay. (d) The fairness index.
Figure 13. The performance of SFLC–MAC, UW–SEEDEX and Slotted–FAMA in relation to the traffic rate. (a) The throughput. (b) The average energy consumption per data reception. (c) The end–to–end delay. (d) The fairness index.
Jmse 11 00802 g013
Table 1. Summary of the contention-based MAC protocols.
Table 1. Summary of the contention-based MAC protocols.
ProcotolClassificationNetwork TopologySpatial Unfairness of Channel AccessCollisions between Control Packets and DATA Packets
PDT-ALOHA [20]RADTN
UW-SEEDEX [21]RADTY
SF-MAC [22]HSTY
MACA-MN [23]HDTNN
MACA-DT [24]HDTNN
SFAMA-DT [25]HDTNY
MultiACK-SFAMA [26]HDTNY
QL-UACW [27]HDTYN
OPMAC [28]HDTNY
RA: Random Access, H: Handshaking, ST: Star topology, DT: Distributed topology, Y: Deal with the problem, N: Ignore the problem, –: The problem does not exist.
Table 2. Simulation parameter settings.
Table 2. Simulation parameter settings.
MAC ParameterValue
Maximum transmission range3 km
Date rate3000 bps
DATA packet size 300 , 500 , 1000 bytes
Transmission power10 W
Receiver power3 W
Idle power8 mW
T P R O 0.01 s
C W max 5
L t h 5
Δ t h 300 m
N t h R D 5
N t h F A 4
B max 8
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zheng, M.; Ge, W.; Han, X.; Yin, J. A Spatially Fair and Low Conflict Medium Access Control Protocol for Underwater Acoustic Networks. J. Mar. Sci. Eng. 2023, 11, 802. https://doi.org/10.3390/jmse11040802

AMA Style

Zheng M, Ge W, Han X, Yin J. A Spatially Fair and Low Conflict Medium Access Control Protocol for Underwater Acoustic Networks. Journal of Marine Science and Engineering. 2023; 11(4):802. https://doi.org/10.3390/jmse11040802

Chicago/Turabian Style

Zheng, Maochun, Wei Ge, Xiao Han, and Jingwei Yin. 2023. "A Spatially Fair and Low Conflict Medium Access Control Protocol for Underwater Acoustic Networks" Journal of Marine Science and Engineering 11, no. 4: 802. https://doi.org/10.3390/jmse11040802

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop