Professional Documents
Culture Documents
Acoustic CSCN Cmeri
Acoustic CSCN Cmeri
Acoustic CSCN Cmeri
Abstract---This paper considers the design of a simple application II. CONTROL AND COMMUNICATION
layer sub-sea data transmission technique over an acoustic channel,
which provides for the major communication link between an The overall communication channel comprises a control as
unmanned submersible and a control-station residing on the sea- well as data channel. The control command channel is
surface. The proposed communication protocol aims towards the predominantly a downlink channel, whereas the data channel
correct and reliable delivery of data with the transmission of
maximum information during a single session of communication
is a two-way transmission. Since the control communication
over a noisy acoustic link. The protocol as discussed in this paper link has a lower data rate with high information, therefore the
comprises an error detection and recovery technique, characterized control channel needs to be put to a higher priority in
by selective retransmissions and predictive recovery at the receiving comparison to the data transmission link as far as the safety
end. This also accounts for a fair utilization of bandwidth, which is of the AUV’s mission is concerned.
usually very low in the case of acoustic communications. Now, since the AUV is autonomous therefore there
is no need for human intervention. But, in some situations
Keywords---acoustic communication, protocol, selective like launching, diving and retrieval phases it is very difficult
retransmissions, error recovery to maneuver the AUV automatically with human-like
precision. It is thus required that during these phases the
I. INTRODUCTION AUV must be operated manually from the surface in order to
maintain proper safety of the vehicle during the various
T HE objective of this paper is to propose a simple
indigenous data transmission protocol to communicate
with an autonomous underwater vehicle (AUV), moving
phases of the mission. As a result, it is necessarily important
to receive the commands correctly at the receiving end. In
this regard, the set of various commands, (in the form of
underwater at a considerable depth from a control station mnemonics) that have been employed are as follows:
residing on the surface. The most adopted method of • ALV
communication in the case of underwater data transmission is • MAN
through acoustic links, since radio is not suitable for • AUT
underwater usage because of extremely limited propagation • ABT
[1]. But, due to the inherent limitations of acoustic modems • STA
[2] a suitably efficient and error-free communication protocol The ALV command is request-for-alive-status and is
had to be designed for the purpose of transmission of data to responsible for maintaining an idle control command link
and from the surface and sub-sea networks. between the AUV and the surface control. On reception of
In this paper, an attempt has been made to this command, the AUV sends an ACK to the surface, which
concentrate on the design of an indigenous communication indicates that the AUV is capable of communicating with the
protocol, involving the framing of data packets, realization of surface. MAN command is requesting the AUV to switch
the sequence for transmitting data and error-free reliable from the automatic controlling mode to manual (joystick)
delivery of data over the noisy channel by selective controlling mode. Likewise, the AUT command is requesting
retransmissions. As may be understood throughout the paper, the AUV to revert back to the automatic mode from the
the protocol lays greater emphasis on correct and reliable manual mode of control. The ABT command forces the AUV
transmission of data over minimization of propagation delay to shutdown its system and abort the mission immediately.
or bandwidth utilization. This is required when it is understood that an emergency has
In this regard, it is worth mentioning that acoustic occurred and it is impossible or unsafe to put the AUV in
propagation of data is associated with various losses [4], like mission. The STA command is to request for the system
spreading loss, absorption loss, multipath issue and others. status from the AUV at a particular instant of time, for
Hence, it is a necessity to design an application layer protocol example the positional and attitude information or the battery
for the safe and reliable data communication between the status.
surface-control and the AUV for the safe and successful
operation of the unmanned vehicle.
Table-I transmission. The subsequent sub-section describes the
Association of command mnemonics and code overall transmission sequence between the surface-control
and the AUV. The last sub-section describes in details the
Mnemonics Patterns Codeword
ALV AL/LL/LV 0x0123 technique adopted for detection of errors and recovery.
MAN MA/AA/AN 0x0456
ABT AB/BB/BT 0x0789 A. Packet Format
AUT AU/UU/UT 0x0ABC The major determining factors for deciding upon the format
STA ST/TT/TA 0x0DEF of data packets at either end have been:
• Bandwidth of the communication channel,
Coming to the other side of the communication link, which is 80 bytes for uplink and downlinks
the data channel comprises system specific and navigational each. Hence, the total available bandwidth
information, which the AUV uplinks to the surface-control accounts for only 1280 bits.
but only on the reception of the STA command from the
surface. • High probability for occurrence of errors during
Considering the following example of data sent
transmission, although the bit-error rate for
from the AUV to the surface control station, we have
acoustic modems of Link quest make is of the
“$AOSI,22.098,0.000,1.000,23.000,148.678,98.97,0xFEDD
order of 10-7, as may be referred in [8].
”. The first value following the $AOSI tag is the heading of
the vehicle; the next value indicates the speed of the vehicle At the surface-control end, a packet to be transmitted consists
in the east direction, whereas the following value indicates of the following:
the speed in the north direction. Following it the value • Header Field
indicates the net displacement of the vehicle from its start • Data Field
position and it is once again followed by the available battery • Control command field
life. Finally, the packet is completed with a checksum for The header is very important as far as information
error detection. From the surface-control side, the data extraction is concerned. It contains a packet bit-map (PBM).
channel comprises positional information of AUV (while The PBM consists of the bit positions of all the internal
diving underwater) with the ship as reference, which the components of the packet. Fig2. is a schematic representation
surface-control receives from the USBL (an Acoustic of a PBM.
Positioning System) and downlinks the same to the AUV.
PSN DO DL CO CL
Command
ByteLength
Command
Byte Offset
Data
ByteLength
Data Byte
Fig. 1 Piggybacking data and Command Offset
Packet
sequence
Since the acoustic link has a considerably low bandwidth, Number
therefore it becomes extremely important to transmit Fig. 2 schematic for packet bitmap (PBM)
maximal information in the available bandwidth. Out of this
necessity, each data packet transmitted from the surface- The PBM is of great help at the receiving end, i.e. AUV
control consists of a data message (data obtained from where the receiving code gets to learn the precise bit
USBL) and a control command framed into a single positions of all the packet contents straight from the PBM
encapsulation as shown in Fig.1. This results in the and without exploring the entire packet.
elimination of the transmission delay as well as overhead of The data field contains an original data message and
bandwidth that would have got incurred for a separate
a replicated image of the same. This redundancy helps in
transmission of command packets alone.
reducing the rate of retransmission requests, which shall be
III. COMMUNICATION PROTOCOL covered in details in Section III.C, where the process of error
detection and recovery will be described. As shown in Fig. 3,
This section has been subdivided into three sub-sections for a the structure of the data field is completed with a checksum
detailed description of the overall design of the protocol. The for detection of errors through CRC. The control command
first sub-section deals with the process of framing of packets field is structurally the same as the data field, with the only
both at the sending end as well as the receiving end of data difference being that it contains the various control
commands issued at the surface-control node. Following is a indicates the presence of errors in the command field of the
byte organization for the entire structure of a packet of data received packet.
to be transmitted from the surface-control to the AUV. The data field contains system related information
and navigational information which the surface needs to be
educated about the AUV, while it is carrying out its mission
underwater.
The checksum helps at the receiving side (surface
control) to detect the presence of errors in the packet. The
overall organization of a packet transmitted from the AUV to
the surface control is illustrated as follows in Fig. 4.
9: Go to Step :1
Piggybackwith
datafromAPOS
Resumeusual processof
transmission
This can be explained with some snippets of code Fig. 9 a burst error model showing the probability distribution of
used for implementing the predictive technique as follows: different bit errors with 6-bit error having the highest probability
mask_lop=cmd [0] & 0x0f
The error model consisted of the following bit error
mask_mop=(cmd [1]>>4) & 0x0f
probabilities:
mask_rop=cmd [1] & 0x0f
2-bit error: 0.15 probability
In the first operation, the left ordered pattern of a 4-bit error: 0.10 probability
command (represented by the cmd [] array) is being extracted 6-bit error: 0.45 probability
8-bit error: 0.05 probability AUV, and the inception of code redundancy through
10-bit error: 0.05 probability introduction of unique pattern sequences for each recognized
16-bit error: 0.15 probability operator’s command. Subsequent intentions are to
20-bit error: 0.05 probability incorporate the protocol in action with the acoustic modems
6-bit error has been given the highest probability as can be available in the lab. Work is being further carried out to come
seen in Fig. 9, since a pair of 3-bit errors is sufficient to up with a better encoding technique for rectifying a complete
corrupt both the original as well as the duplicate command erroneous packet at the receiving side, without ever
fields present in the same packet. requesting for retransmissions.
Subsequently, a simulated transmission of a set of
500 packets (each consisting of 32 bits) was carried out. Each ACKNOWLEDGEMENTS
packet consists of 16 bits of original command field and
another 16 bits of duplicate command field. After getting In this regard it would be significant enough to sincerely
associated with the burst error model, the predictive acknowledge the tireless work of the people behind this
technique was applied at the received packet. The results research work, without whose precious efforts and untiring
obtained can be well realized in Fig. 10. assistance this paper would remain incomplete. The authors
are also very grateful to the reviewers for their comments and
insight, which have significantly enhanced this paper. The
authors remain thankful to the entire Robotics and
Automation group for making it possible for this research to
happen. They would also like to thank the MOES (Ministry
of Earth Sciences, Govt. of India) for sponsoring the
concerned project, which motivated the concerned team
towards the development of this protocol.
REFERENCES