skip to main content
research-article
Open access

LSR: Energy-Efficient Multi-Modulation Communication for Inhomogeneous Wireless IoT Networks

Published: 13 April 2023 Publication History

Abstract

In many real-world wireless IoT networks, the application dictates the location of the nodes and therefore the link characteristics are inhomogeneous. Furthermore, nodes may in many scenarios only communicate with the Internet-attached gateway via multiple hops. If an energy-efficient short-range modulation scheme is used, nodes that are reachable only via high-path-loss links cannot communicate. Using a more energy-demanding long-range modulation allows connecting more nodes but would be inefficient for nodes that are easily reachable via low-path-loss links. Combining multiple modulations is challenging, as low-power radios usually only support the use of a single modulation at a time. In this article, we present the Long-Short-Range (LSR) protocol which supports low-power multi-hop communication using multiple modulations and is suited for networks with inhomogeneous link characteristics. To reduce the inherent redundancy of long-range modulations, we present a method to determine the connectivity graph of the network during regular data communication without adding significant overhead. In simulations, we show that LSR allows for reducing power consumption significantly for many scenarios when compared to a state-of-the-art multi-hop communication protocol using a single long-range modulation. We demonstrate the applicability of LSR with an implementation on real hardware and a testbed with long-range links.

1 Introduction

Motivation.

In the course of digitalization, a large variety of objects are being connected to the Internet to automate processes, optimize workflows, and open up new monitoring opportunities. In many use cases, it is most convenient to connect the objects using low-power wireless communication, as such a setup does not require a lot of infrastructure like wired power or wired network connections. Many real-world deployments consist of a set of low-power nodes and a gateway that connects the nodes to the Internet. Often, the placement of the nodes is heavily influenced by positions that are of interest to the application. An example is the placement of Internet of Things (IoT) nodes inside a building at spots that are relevant for building automation (e.g., close to windows, next to doorways, or at work spaces). Another example, inspired by Beutel et al. [4] and Weber et al. [48] and illustrated in Figure 1, is a system to measure seismic events on mountains for long-term environmental monitoring where sensor nodes are placed at locations that allow good observation of geological events. Such networks usually exhibit inhomogeneous link characteristics between nodes (i.e., the path loss of the links is diverse). For example, some nodes are placed close to the gateway and therefore the link to the gateway exhibits a very small path loss. Other nodes are placed at distances of multiple kilometers or with obstacles in-between and therefore exhibit a large path loss. In many cases, there are nodes that cannot directly communicate with the gateway (e.g., behind a mountain ridge) and therefore require relay nodes to forward their data to the gateway.
Fig. 1.
Fig. 1. Example scenario inspired by the work of Beutel et al. [4] and Weber et al. [48] with a single unconstrained gateway (house) and multiple resource-constrained nodes (circles) which can reach the gateway via single or multiple hops over links with a diverse set of path losses.

Problem Statement.

In this article, we focus on Low-Power Wide-Area Network (LPWAN) application scenarios with the following characteristics:
The network consists of a set of resource-constrained nodes—that is, they have limited available energy and limited processing capabilities, and a single unconstrained gateway. The gateway is assumed to be connected to the Internet. We focus on networks with a single gateway. Extensions to multi-sink networks are briefly discussed in Section 6.4.4.
The characteristics of the links in the network are inhomogeneous—that is, the network contains links with high and low path losses.
The network may contain nodes that can directly communicate with the gateway over a single hop as well as nodes that can reach the gateway only via multiple hops.
The Radio Frequency (RF) characteristics between nodes may change over time but only with a limited rate of change.
The application requires an energy-efficient transfer of data to the Internet and accurate timestamping on the nodes to annotate observations. However, it does not require real-time communication with near-zero latency. In other words, the reliable and energy-efficient transfer of data has higher priority than a low latency.
The goal of the system is to enable communication with the gateway for each node. For nodes that cannot directly reach the gateway, the system should support sending their messages using other nodes as relays. As the nodes are resource-constrained, the system should be energy-efficient even if the network consists of inhomogeneous links. In the following, we refer to the scenario just described as our scenario.
One way to tackle the problem of inhomogeneous links is to add additional relay nodes to the network. This allows the nodes to communicate over homogeneous links with a small range of path losses. However, the addition of nodes requires additional resources (hardware, time, and labor for the installation), and determining a suitable placement is in many cases not trivial. Therefore, we do not consider this approach to be generally applicable. Another approach to make communication in a network with inhomogeneous links more energy-efficient is to apply adaptive transmit power schemes. However, the link budget (i.e., the maximally tolerable path loss between sender and receiver) of traditional low-power radios is usually too limited. Consequently, the achievable range of link budgets when varying the transmit power of low-power radios is not sufficient to cover the wide range of path losses in the considered low-power wide-area network (LPWAN) application scenarios. Recent advances in low-power radio technology enable radios with a significantly larger link budget (e.g., up to 170 dB for Semtech SX1262 [40] compared to 128 dB for the Texas Instruments CC430 [22]). The improved link budget of modern radios is possible partially due to the ability to send with higher transmit powers but mainly because of the support of multiple modulation settings which allow trading time-on-air for better receiver sensitivity. For example, LoRa radios [5] support different Spreading Factors (SFs). Transmissions with a large spreading factor (SF) provide a reduced data rate but allow bridging multiple kilometers or larger obstacles compared to transmissions with a small SF or transmissions of traditional radios which typically permit a range of 10s of meters. Many modern low-power transceivers typically support a variety of modulation settings or even multiple modulation schemes.
In this article, we focus on the use of different modulations to cover all nodes in a network with inhomogeneous links. We refer to a modulation as a two-element tuple that contains (1) the type of physical representation of symbols, such as LoRa (Long Range) or FSK (Frequency Shift Keying), and (2) the rate at which the symbols are transmitted (e.g., the SF for LoRa or the raw bit rate for FSK). For the abstract description, we sort the used modulations by decreasing link budget and enumerate them. For simplicity, we only use two modulations in the explanations of this article. We use Mod0 as a symbol for a long-range modulation and Mod1 as a symbol for a short-range modulation. In Table 3 in Section 5.2.1, we compare three exemplary modulations supported by the hardware that we use in the evaluation to showcase the diversity found in modern transceivers.

Challenges.

As discussed, a network with a wide range of path losses between nodes requires the use of multiple modulations to allow for energy-efficient communication. Since the low-power radios of nodes only support the use of a single radio configuration (e.g., a single LoRa SF) at a time, this makes it necessary to switch between radio configurations in a coordinated and reliable fashion. The use of a different modulation results in an altered link budget and a changed transmission duration, and therefore in a different energy consumption. All these tradeoffs need to be taken into account when orchestrating transmissions in the network. The requirement to support multi-hop transmissions in the network further increases complexity. To maximize the system lifetime, it is necessary to distribute energy consumption evenly to all the nodes. In a static radio frequency (RF) environment, it would be sufficient to measure the environment in the beginning of the deployment, calculate the optimal configuration, and distribute it to all the nodes. However, in many realistic scenarios, the RF conditions change over time. In this case, the task of finding and distributing an efficient configuration and communication pattern is no longer a one-shot problem but needs to be repeated continuously.

Straightforward Approaches.

Based on examples in Figure 2, we explain why straightforward approaches do not meet the requirements of our scenario. Single-hop schemes, such as LoRaWAN [1], do not work since nodes that have no direct connection to the gateway cannot communicate with it. In example (a), nodes A and B can reach the gateway via a single hop. However, node C is only reachable via a multi-hop path and therefore cannot communicate with the gateway. Two separate systems, one for long-range links and another one for short-range links, would be another straightforward approach. In example (b), node A only participates using the short-range modulation. In this case, nodes B and C can communicate with the gateway as node C can communicate via node B. Nevertheless, this approach also does not fulfill the requirements of our scenario, as there are cases (e.g., example (c)) where nodes are unable to communicate with the gateway even though there exists a path between the node and the gateway. In example (c), nodes B and C would have a path to the gateway via node A. But since node A participates only in the short-range system, nodes B and C cannot reach the gateway. Single modulation schemes, where only a single modulation is used to connect all nodes to the gateway, work for all scenarios. However, to cover all nodes with links with a wide range of path losses, a long-range modulation is required. This is inefficient in terms of energy and radio-on time for nodes that have a short-range path to the gateway. In example (d), node A would send its data using the long-range modulation even though a data transfer using short-range modulation would be possible.
Fig. 2.
Fig. 2. Straightforward solutions do not meet the requirements of our scenario: a single-hop scheme does not support communication between the gateway (GW) and nodes reachable only via a multi-hop path (a), a scheme with two separate systems for long- and short-range communication works in certain cases (b) but does not work if links are not available even though there would be a path to the gateway for every node (c), and a single modulation scheme works but is inefficient in many cases (d).

Proposed Scheme.

In this article, we present the Long-Short-Range (LSR) protocol, a multi-hop communication protocol that runs on a network of energy-constrained nodes with homogeneous hardware. As a basic communication primitive, Glossy-like [16] flooding is used. On a higher layer, the protocol uses rounds of Time-Division Multiple Access (TDMA) slots (similar to Sparkle [50] or Low-Power Wireless Bus (LWB) [15]). To prevent redundancy due to the overlap of long- and short-range coverage, we propose a set of optimizations. Since nodes transmit concurrently during a flood, it is not straightforward to determine which path a received message has taken. Therefore, we propose a non-destructive probing method based on delayed retransmissions within floods to measure the connectivity graph without significant overhead during normal data floods. The obtained connectivity information can serve as a basis for various network optimization methods. LSR is characterized by the following advantages. First, Long-Short-Range (LSR) covers any multi-hop scenario; as long as there is a path between a node and the gateway, the LSR protocol will use it. Second, LSR does not only perform a one-shot adaptation when the system starts but dynamically and continuously adapts to changes in the topology. The flooding-based approach allows for fast reconnecting to react to significant topology changes. Third, the energy consumption can be balanced by distributing energy-intensive operations evenly across multiple nodes, which increases the system lifetime (see Section 5.2.3). For many scenarios (see Section 5), LSR is more efficient than a comparable single modulation scheme.

Contributions.

In this article, we make the following contributions:
We design and implement a multi-hop low-power communication protocol using the principles of flooding and multiple modulations for energy-efficient and reliable data transfer in networks with inhomogeneous link characteristics.
We propose a scheme based on non-destructive delayed retransmissions to deduce the connectivity graph of the network. This information serves as the basis of many network optimization methods.
We implement the proposed LSR protocol in a simulation and extensively evaluate the LSR protocol by comparing it to a single modulation scheme without optimizations.
By implementing the LSR protocol on real Internet of Things (IoT) hardware and by performing tests on the FlockLab 2 testbed [46], we demonstrate the feasibility of the LSR protocol and verify the simulation results.
First, we provide an overview of existing approaches for the stated problem and discuss related work in Section 2. In Section 3, we explain the proposed LSR protocol, and in Section 4, we describe optimizations to thin out the network, including how to determine the connectivity graph. In Section 5, we evaluate the LSR protocol. Then, we discuss advantages, limitations, and potential extensions in Section 6. We conclude the article in 7.

2 Related Work

In this section, we classify and discuss approaches for communication in LPWANs.

Adaptive Transmit Power Control.

A large body of work proposed and analyzed schemes for adaptive transmit power control for networks with links with a limited range of path losses and in combination with traditional short-range radios (e.g., see [23, 30, 36, 42]). In principle, such adaptive transmit power control schemes could also be used for inhomogeneous networks in combination with recent radio technologies which provide larger link budgets for LPWANs. However, in addition to the transmit power settings, newer radios offer an additional degree of freedom by supporting different modulation settings. Usually, the influence of the modulation on the energy consumption is significantly larger than the influence of the transmit power setting [37]. Therefore, an approach based purely on the transmit power control is ill-suited.

Star-Based Topology with Constrained Relays.

One of the most popular LPWAN protocols is LoRaWAN [1]. It supports star-based topologies and covers different channel access schemes with multiple classes. A major limitation is the missing support for multi-hop communication. Nodes that do not have a direct connection to the gateway (e.g., due to obstacles) cannot transmit any data (also see Figure 2(a)). Multiple works have investigated the extension of LoRaWAN, or star-based protocols in general, using relay nodes. We can distinguish two classes of approaches: (1) relay nodes with unconstrained energy supply (e.g., see [11]) and (2) energy-constrained relay nodes (e.g., see [12, 14, 33, 38]). In all of these systems, only a subset of all nodes is assigned or can be assigned to take over the role of a relay node. This is contrary to the requirements of our scenario where any node should be able to communicate with the gateway as long as there is a multi-hop path.

Separate Systems for Long- and Short-Range Modulations.

Another closely related approach is to use two separate communication systems and potentially protocols. For example, one system could cover links with low path loss, and the second system is used for communication over links with large path loss. An example where two separate protocols are used and a subset of nodes support both protocols is presented by García-Martín and Torralba [18]. Even if the two systems work completely independently, a minimal amount of coordination is required for proper functioning. For example, the two systems need to coordinate their access to the RF spectrum. A node that participates in the system using short-range communication could still try to participate in the system using long-range communication in case it gets disconnected. However, since not all nodes are always participating in the long-range system, there are scenarios where a node cannot reach the gateway even if there would be a long-range path between the node and the gateway (also see Figure 2(c)). For this reason, this approach does not satisfy the requirements of our scenario.

Routing with LPWAN.

A large amount of related work focuses on routing to transfer data efficiently between a gateway and end devices. However, most of the work (e.g., [2, 27, 34, 53]) does not make use of different modulations (e.g., different SFs for LoRa). One exception is the work of Sartori et al. [39], where different SFs are scanned and incorporated into the metric for computing the link cost. A general problem of routing-based approaches is the relatively slow convergence to obtain the required connectivity information such as a tree.

Flooding with LPWAN.

One common approach is to use synchronous transmissions and flooding for LPWANs (e.g., see [7, 28, 54]). Simple flooding provides efficient, reliable, and low-latency multi-hop communication for networks with homogeneous link properties. However, to the best of our knowledge, all related work focusing on flooding in LPWANs only supports a single modulation (e.g., a single Long Range (LoRa) SF). A protocol that relies on synchronous transmission flooding normally requires all nodes to use the same modulation within the same flood. To reach a large portion of the nodes, flooding with the long-range (i.e., low data rate) modulations would be necessary, which is not efficient for inhomogeneous networks with links with a wide range of path losses.
Our proposed LSR protocol is based on a global TDMA schedule and makes use of synchronous transmission flooding, which provides reliable multi-hop communication and fast convergence after network changes. By using multiple modulations and optimizations, the LSR protocol supports energy-efficient communication in inhomogeneous networks with links with a wide range of path losses despite the preceding challenges.

3 LSR Protocol Design

In this section, we explain the operation of the proposed LSR protocol. First, we explain the general concept with the underlying communication primitive and the basic scheme under steady-state conditions. Then, we discuss the operation under dynamic conditions.

3.1 General Concept

LSR is a round-based time-division multiple access (TDMA) protocol whose structure is inspired by the Low-Power Wireless Bus (LWB) protocol [15]. Each round consists of a number of slots which are grouped into three phases (Figure 3): Schedule, Contention, and Data. In each slot, a synchronous transmission flood (described in more detail in Section 3.2) is used to send a message from the flood-initiating node over potentially multiple hops to one or more other nodes. The network is controlled by a single node, the host. For simplicity, we assume in the rest of this article that the gateway node serves both as the data sink and the host of the network.
Fig. 3.
Fig. 3. One round of LSR using two modulations consists of two interleaved LSR rounds, each using its own modulation.
We first explain LSR for the degenerate case in which a single modulation is used. In this case, the round structure of LSR is similar to the round structure of LWB. The Schedule phase consists of a single slot in which the host sends a schedule packet. This schedule packet contains protocol control information and the schedule—that is, the usage and assignment of the following slots within the same round as well as the time to the start of the next round (round period). The schedule packet is received by all nodes which can be reached with the flood and serves as a time synchronization beacon. The next phase, the Contention phase, also consists of a single slot that is used by nodes to register data streams or to modify existing streams. A data stream consists of two pieces of information: (1) the nodes between which data is transmitted and (2) how much data is transmitted per time (data rate). The host receives and handles such stream requests and assigns slots to nodes. We refer to a node that has at least one registered data stream as a registered node. The last phase of an LSR round is the Data phase, which consists of multiple slots for data transmissions. Within each slot, only the node assigned according to the schedule is allowed to initiate the flood. This means there is no time slot in which multiple nodes are allowed to initiate floods simultaneously, except in the Contention phase.
In case the LSR protocol is used with multiple modulations, the round consists of multiple interleaved LSR rounds, each using its own modulation (see Figure 3). For simplicity, we only use two different modulations in this work: Mod0, which corresponds to LoRa SF7 with a bandwidth of 125 kHz and represents a long-range modulation providing a large link budget of 138 dB at a physical-layer data rate of 5.5 kbit/s, and Mod1, which corresponds to FSK 250 kbit/s and represents a short-range modulation providing a smaller link budget of 117 dB with an increased physical-layer data rate of 250 kbit/s (for the link budget values, a transmit power of \(+14{\text{dBm}}\) is assumed). Other pairs of modulations, including for example two LoRa modulations with different SFs, could be used as well. In Table 3 in Section 5.2.1, we provide a comparison of three exemplary modulations. In addition, the proposed LSR protocol could easily be extended to work with more than two modulations (see Section 6.4.1). Within the Schedule and the Contention phases, there is a slot for each modulation. The Data phase is divided into two sub-phases, each with a variable number of data slots for the corresponding modulation. The sequence of modulations within each phase is ordered according to decreasing link budget. This ordering is to allow for simpler and faster bootstrapping (see Section 3.4.1).
LSR includes two different acknowledgments, which are both sent in the schedule: one to acknowledge the successful registration of a data stream and one to acknowledge data transmissions. The latter is an aggregated acknowledgment of all data transmissions of the corresponding modulation in the preceding round. The LSR protocol supports scenarios where the traffic demand of different nodes may be different and is allowed to change over time. For simplicity, we specify that the nodes can register exactly zero or one data stream. An extension with multiple streams per node is discussed in Section 6.4.2.

3.2 Gloria One-to-All Flooding

Within each LSR slot, the Gloria flooding primitive is used to flood a message. Gloria is an optimized variant of the Glossy [16] flooding primitive which we ported to the DPP2 LoRa platform (see Section 5.3.2). Gloria includes improvements to the original Glossy scheme regarding the Rx-Tx sequence that have been introduced with Robust flooding by Lim et al. [29] and which are for example also included in BlueFlood [3]. In contrast to Robust flooding, Gloria does not implement frequency hopping or the randomized transmit power scheme. Previous work shows that the concept of synchronous transmission flooding can also be used in combination with the LoRa modulation scheme [7, 28, 54].
Both Gloria and Glossy make use of the concept of synchronous transmissions to flood messages over multiple hops. According to this concept, multiple nodes send the same message simultaneously. Thanks to the capture effect, other nodes are able to successfully receive the message. As depicted in the example in Figure 4, with the Gloria primitive, a single node initiates the flood by sending a message multiple times in successive time slots. All nodes that received a message synchronously retransmit it a pre-defined number of times (two times in the example) in subsequent slots. With this, the flood propagates through the network. In contrast to Glossy, the timing of packet retransmissions within a Gloria flood is based on timer events rather than the directly preceding reception of a packet. As a consequence, a node successfully receives a packet within a Gloria flood at most once and retransmits packets multiple times back-to-back.
Fig. 4.
Fig. 4. In a Gloria flood, the slot index within a flood is directly related to the hop distance between the flood initiator and the receiving node. The number of retransmissions (in this example set to 2) is a parameter of the Gloria flooding primitive.
Gloria flooding allows the distribution of a message from a single node to all nodes in the network (one-to-all) without requiring information about the network topology or queuing of messages at relaying nodes. Consequently, using message flooding with Gloria has the advantage that no complex control is required to prevent overflows of message queues at intermediate nodes. In addition, compared to multi-hop schemes with in-network buffering, the end-to-end message transfer with Gloria has a short latency that is upper-bounded by the configured flood duration. The flood duration is typically chosen such that the number of slots within a Gloria flood is sufficient to cover the maximum number of hops required for the flood to propagate to all nodes in the network.
In this article, we use the expression initiating a flood to express that a node starts sending a flood by being the first node to transmit the packet to be flooded. Furthermore, we use the expression participating in a flood when a node starts the Gloria primitive without initiating a flood—that is, a node listens for a packet and retransmits it in case of a successful reception. This means that a node can participate in a flood even if no node initiates a flood.
Analogously to Glossy, with Gloria, the nodes can use the arrival time and the slot index of the received flood to reconstruct the time when a schedule flood has been initiated by the host. This point in time is the same for all nodes and is therefore used as a synchronization point to accurately synchronize the time of the nodes to the time of the host.

3.3 Basic Scheme

First, we look at the basic protocol operation in the steady state. An example is depicted in Figure 5(a). For the explanation of the basic scheme, we assume that the RF environment and the traffic demand by the nodes do not change and that optimizations, as discussed in Section 4, are not applied. Furthermore, we assume the protocol runs long enough such that protocol operations converged. This means that all nodes are time-synchronized and know from the preceding round when the following round will start. In addition, each node determined the best modulation—that is, the modulation with the smallest link budget which still provides enough reliability. Since the host has already assigned data slots to the nodes, the best modulation has already become the active modulation—that is, the modulation which is used by the nodes to send data floods to the host.
Fig. 5.
Fig. 5. LSR steady-state operation without optimization (a). The two levels of optimization (b) and (c) are discussed in Section 4.
In the first two slots, the host initiates (i.e., starts sending) one flood on each of the two modulations containing the schedule of the respective modulation. All nodes participate in both schedule floods—that is, the nodes listen in each slot for a packet and potentially retransmit it if it has been successfully received. Since we are looking at the steady state, no node is initiating a flood in the Contention slots. Also due to the steady state, together, both schedules contain data slots for all nodes. As a consequence, all the nodes send data in their respective slot. In the slots of the Contention and Data phases, each node only participates if (1) it received the corresponding schedule and (2) the index of the modulation of the slot is smaller than or equal to the index of the active modulation.
In the example in Figure 5(a), node B listens for schedule floods of all modulations but only receives the schedule flood for Mod0. Accordingly, it uses Mod0 as its active modulation and does not participate in Contention and Data slots with Mod1. However, node A which has received both schedule floods and uses Mod1 as active modulation participates in floods of all modulations to support floods initiated by other nodes but sends its own data packets only using the active modulation Mod1.

3.4 Dynamic Behavior

According to our scenario (see Section 1), the protocol is required to adapt to changes in the RF environment or the traffic demand of the nodes. In this section, we discuss the most important changes and explain the corresponding reactions of the protocol.

3.4.1 Bootstrapping.

An important change occurs when one or multiple nodes are switched on (or reset) and start participating in the protocol. The goal of this first phase of the protocol, the Bootstrapping phase, is to let nodes synchronize their local time with the time of the host, register a data stream, and apply optimizations (discussed in Section 4). An example of the bootstrapping process is depicted in Figure 6.
Fig. 6.
Fig. 6. Bootstrapping process of the protocol. In this example, selecting the modulation is immediately applied after receiving the first schedule, whereas optimizations are not applied within the first three rounds. The same notation as in Figure 5 is used.
We assume that a node starts in the beginning without any knowledge about the network except for the set of used modulations. As a first step, each node listens with modulation Mod0 for schedule floods initiated by the host and potentially forwarded by other nodes. Since the nodes start with Mod0, all nodes which are able to communicate with at least one modulation in the set of used modulations will be able to receive and relay a schedule packet. Once a schedule packet is received, the node can synchronize its time. The node will then start to listen for the second schedule floods sent with modulation Mod1. Because the modulations are ordered according to decreasing link budget, already in the first round, each node can determine a first estimate of the best modulation, based on the received/not received schedule floods. Nodes that successfully received at least the first schedule flood and which have a traffic demand now use the contention slot corresponding to the best modulation to request a data stream. To support floods initiated by other nodes, the nodes keep participating in floods for all modulations with smaller or equal modulation indices as the active modulation. A random exponential backoff mechanism is applied if a stream is not confirmed by the host in the following schedule message. Once a stream request is confirmed and the node is registered, the node starts sending data messages in the assigned data slots and starts the optimizations (discussed in Section 4). The example in Figure 6 shows the process of registering nodes; however, no optimizations are applied. An example which applies optimizations is discussed in the evaluation in Section 5.2.3.

3.4.2 Adapting to Changes.

In the following, we describe the most important changes and the corresponding reactions according to the LSR protocol.
Nodes continuously update the best modulation based on received schedule messages. In case the best modulation is determined to be different from the active modulation, the node sends a stream request to the host to request a change of the modulation. If a switch of modulation is possible according to the host, the host acknowledges the updated stream, and the active modulation is updated on the host and the node. If the modulation is changed to a modulation with a smaller link budget, switching modulations is seamless and does not cause data packets to be lost, assuming ideal RF conditions. In the other direction, the need for switching the modulation is based on missed schedule floods and therefore reduces the data transmission throughput but no energy is wasted as no data floods are initiated.
In case a node is disconnected (i.e., it has no assigned data slot but data to send), it needs to register a data stream at the host again. Thanks to the flooding approach, only one round is required for a node to register a stream, when assuming no packet loss, which is a realistic assumption if no other node is trying to reconnect simultaneously. If a node is freshly connected, also the corresponding optimization state (see Section 4) is reset. Consequently, reconnecting a node is fast, but the optimizations related to the reconnected node take a few rounds to converge.

4 Optimizations

In data slots in the basic scheme of LSR where a long-range modulation is used (Mod0 in our example), usually many nodes are within range and therefore a large number of nodes help to retransmit the data packet. However, often this redundancy is not required and does not improve the overall reliability significantly. In many cases, the reliability of flooding the message even starts to decrease if the number of relaying nodes becomes too large [13, 25, 47]. For this reason, multiple optimization methods are integrated into the LSR protocol to reduce the redundancy of data floods. In this section, we explain the different optimizations step-by-step.

4.1 Thinning Based on Hop Distance

In a first approach, we only use the hop distance information to apply thinning (i.e., to turn off a subset of all nodes). This is a well-known method that has already been presented in different variations in related work. For example, in CXFS [9], all nodes measure the hop distance to the source as well as to the destination of a flood and decide based on the hop distance between the source and destination whether to participate in the flood. With LaneFlood [8], this concept has been refined to fine-tune the level of allowed redundancy. A similar scheme based on the hop distance to the sink has been integrated into the Weaver protocol [45]. However, in most of the related work, the decision of whether to turn off a node is made in a decentralized way directly on the nodes. In contrast to this, with LSR, the host collects all hop distance measurements and makes the decision. In LSR, the host represents the central entity that controls and therefore optimizes the network. This central control has the advantage that it allows a TDMA assignment of data slots preventing potential collisions. In addition, the collection of hop distance information at the host can be used for further optimizations, such as for determining the connectivity graph (see Section 4.2). At the same time, this approach implicitly imposes the requirement that every node periodically sends floods that reach the host node to enable optimizations.
Hop distance measurements are available for free when using flooding as a communication primitive (see Section 4.3). In LSR, all nodes which, according to hop distance, cannot be part of a shortest path between initiator and host are instructed not to participate in the flood. A visualization of applying thinning based on hop distance to our example is depicted in Figure 5(b). The host aggregates the complete hop distance information and decides which nodes should participate in which flood. The thinning of floods is determined for every node individually. Since the information in which floods a node participates is expected to change only rarely, it is buffered as a local state at the node. The host only sends updates of this state, the so-called participation updates as part of the schedule packet. In our implementation in Section 5.3.2, updates are represented as a fixed-size bit field. For better scalability with a large number of nodes, other representations, such as a variable-size list containing updated nodes, could be considered. For schedule and contention floods, high reliability is important for the stable operation of the protocol in most cases. Therefore, no thinning is applied to these floods. An extension to apply thinning to the schedule and contention floods is discussed in Section 6.4.5.

4.2 Thinning Based on Connectivity Graph

Many more schemes have been proposed and designed to further optimize wireless multi-hop networks in terms of energy consumption, reliability, radio-on time, and so forth (e.g., see [8, 19, 51, 52]). We discuss some examples in Section 4.5. Usually, information on how nodes are connected is required for further optimization. However, using flooding with synchronous transmissions as a communication primitive does not directly provide such connectivity information. Therefore, we propose to determine connectivity information using non-destructive probing by delaying the retransmission of floods on a subset of nodes in the network. By repeating this multiple times in a systematic manner, the connectivity graph can be deduced from the set of measurements without disturbing the communication of data. The obtained connectivity information serves as a basis for more elaborate optimization algorithms. A detailed explanation of this approach is provided in Section 4.4. A visualization of applying thinning based on hop distance and the connectivity graph to our example is depicted in Figure 5(c).
If the connectivity graph is used for thinning, the energy consumption corresponding to forwarding packets can be distributed. In example (b) in Figure 2, node C could communicate with the gateway either via node B or via node A. The second option minimizes the maximum energy consumption across all nodes as the energy required to perform short-range communication is much smaller than the energy required for long-range communication. In addition, the overall energy consumption of all nodes is reduced by the thinning as nodes only participate in floods in which they are needed.
In our simulation (see Section 5), we implement a simple optimization based on the connectivity graph. A single shortest path between the node and the host is determined, and nodes not on the path are turned off. By selecting a shortest path out of the set of all available shortest paths for each node, the host can perform energy load balancing. To average out the power consumption, the selection of the shortest path is repeated every time the connectivity graph is updated (see Section 3.4) and also periodically in case the thinning is not updated for a long period of time. Selecting a single shortest path represents an extreme case and therefore is suited to indicate an upper bound on the energy savings that can be achieved. More elaborate schemes which provide a defined level of redundancy or schemes where the actually available energy of each node is taken into account are left for future work.

4.3 Collection of Statistics

The basic scheme and the optimizations introduced in this article require information for decision-making. In this section, we explain what communication characteristics are measured and how they are used. An overview is provided in Table 1.
Table 1.
MeasurementWhen Collected?Influence on
Active ModulationThinning
Packet lossContinuously
Hop distance without delayContinuously 
Hop distance with delayOnly when probing 
Table 1. Measured Communication Characteristics and Their Use in the LSR Protocol
Packet Loss. The LSR protocol tries to minimize packet loss as much as possible. However, as with any wireless communication system, packet loss cannot be completely prevented. The frequency of packet losses is an important indicator for the network and is therefore recorded accordingly and incorporated into the control of the LSR protocol.
For the basic scheme, the best modulation of each node needs to be determined. For this, a node listens to all schedules (i.e., to the long- and short-range schedule). The index of the modulation of the last schedule that was successfully received in the round is stored. To increase the statistical significance, it is possible to increase the history depth—that is, the measurement is repeated and stored in a ring buffer with parameterizable size \(B_m\). All nodes listen for all schedule floods in each round and therefore continuously collect measurements. The best modulation is then derived from the ring buffer using a mathematical method such as the minimum, the mean, or the median.
Schedule and data packets as well as acknowledgments of streams and data are used by the host and by the nodes to determine whether the node is registered at the host (i.e., it has an active data stream). Furthermore, the information about packet loss is used to assess whether data can successfully be transferred between node and host. This information about the status of each node is also used to adapt the thinning as only actively connected nodes can be used to forward messages.
Hop Distance Without Delay. In a Gloria flood, the hop distance (i.e., the length (number of edges) of the shortest path to the host) is directly related to the index of the slot within the Gloria flood. This slot index (sometimes also referred to as hop count) is contained in every Gloria packet. It is set to zero on the node which initiates the flood and is incremented on every node which relays the flood (see Figure 4). As a consequence, the hop distance \(d(n)\) of node \(n\) can be determined from the slot index \(k(n)\) when the flood is received on node \(n\) using the following relation:
\begin{equation*} d(n) = k(n) + 1. \end{equation*}
To make global decisions, the information on the hop distance between the host and each of the nodes needs to be available on the host. For each node/modulation combination for which the host receives a data message, it directly determines the hop distance from the received slot index. As explained in Section 3.3, a subset of the nodes participate in slots of both modulations but send data messages only using the active modulation. For such nodes, the host is only able to directly determine hop distance measurements for the active modulation. However, to make reasonable decisions for the thinning optimization, measurements for all modulations with an index smaller or equal to the active modulation of a node are required. For node/modulation combinations for which no data message is sent, the node determines the hop distance measurement from the schedule flood and sends it piggy-backed to the host via the data flood that uses the active modulation. This approach implicitly assumes that the hop distance is symmetric (i.e., the shortest path has the same length in both directions). Since obtaining the hop distance measurement does not require additional energy with Gloria floods and the influence of the transfer of measurements not directly collected on the host is small, the hop distance is updated continuously in every round.
Hop Distance with Delay. As explained in Section 4.4 in more detail, the protocol not only collects hop distance measurements of normal floods but also collects hop distance measurements when some of the nodes delay their retransmission to determine the link structure between the nodes (i.e., the connectivity graph). The principle for measuring the hop distance remains the same. Again, the host uses a ring buffer of size \(B_d\) for every connection to store the \(B_d\) most recent connectivity measurements. The probing with delayed retransmissions may reduce the reliability of floods for nodes with a large hop distance relative to the host. For this reason, hop distance data with delayed retransmissions is only collected when not enough measurements are available (e.g., when not all nodes are connected in the connectivity graph or if topology changes are detected).

4.3.1 Sequence of Measurement Collection.

On the host, there is a ring buffer of size \(B_h\) for every node to store the \(B_h\) most recent hop distance measurements of floods without delayed retransmissions. When the host needs the hop distance to a node for a decision, it calculates an estimate of the hop distance based on the measurements stored in the ring buffer. Whenever there is such a ring buffer that is not completely filled with measurements, such as in the beginning or when a node just joined the LSR network, the host instructs all nodes to not apply any delay to the retransmissions to measure the unaffected hop distance. If the ring buffer of every registered node is completely filled and fresh connectivity information is required (graph contains unconnected nodes or topology change occurred, see Section 3.4.2), the host initiates a probing sequence with delayed retransmissions as described in Section 4.4 and measures the potentially affected hop distances.

4.4 Determining the Connectivity Graph

As discussed previously, many optimization schemes require information about the connectivity between the nodes, which is difficult to obtain when using flooding as a communication scheme since nodes are sending concurrently. Therefore, from observing regular floods, we cannot determine which nodes are relevant. Knock-out measurements (i.e., disabling a node or a subset of nodes during a flood) would provide the necessary information. If the flood still reaches the destination, the knocked-out nodes are not essential. However, if the nodes are indeed essential for the flood, the message would not reach its destination. Losing messages would only be acceptable if dedicated floods are used for probing and thereby generate significant communication overhead.
We propose to use a different approach to obtain the necessary information with only negligible additional overhead. For probing, instead of knocking-out nodes, the host instructs a subset of nodes to delay their retransmissions of the received packet by a single Gloria time slot within the flood as depicted in the example in Figure 7. This has the advantage that the flood may still reach its destination. This allows the use of existing schedule and data transfer floods instead of dedicated costly probing floods to obtain measurements. If at least one node in the set of nodes that delay their retransmission is essential for forwarding the message, the measured hop distance increases compared to the case where no node delays the retransmission.
Fig. 7.
Fig. 7. Example flood from node A to node E. A subset of all nodes (nodes C and D) is instructed to delay the retransmission of the received message by one time slot. The delay on node C has no influence, as there is a redundant path via node B. However, node D is essential for forwarding the message, and therefore the arrival of the message at node E is delayed by one time slot (k = 3 instead of k = 2).
The instruction regarding which node should delay the retransmission is transmitted in every schedule and is valid for schedule and all data floods of the corresponding modulation within the same round. Again, in the implementation in Section 5.3.2, we use a fixed-size bit mask to distribute this information. Similar to the participation updates, for better scalability with a large number of nodes, other representations, such as a compressed list of nodes which is limited in length, could be considered. Measurements of the currently observed hop distance are obtained in the same way as for rounds without delayed retransmissions (see Section 4.3). Again, nodes that participate in both modulations but send data floods using only the active modulation send hop distance measurements based on the reception of the schedule flood. This works because also the schedule flood is delayed according to the delay instruction sent by the host.
In the following, we describe an algorithm that performs systematic probing and allows the host to construct a connectivity graph. The basic scheme can be applied to other protocols that also make use of synchronous transmission flooding. The resulting connectivity graph can then be used for thinning and other optimizations. We are looking for the connectivity graph—that is, a directed graph which contains only the shortest paths from any node to the host. Therefore, we call it the shortest connectivity graph. In other words, all paths from a single node to the host have the same length (number of edges), which corresponds to the hop distance between the host and the node. The shortest connectivity graph can easily be constructed from a complete connectivity graph by deleting all directed edges from a node with hop distance \(d_1\) to a node with hop distance \(d_2 \ge d_1\).
Suppose that the shortest connectivity graph is denoted as \(G(V, E)\) with nodes \(V\) and edges \(E\). A node \(v \in V\) has a hop distance \(d(v),\) whereas the host \(h \in V\) has hop distance \(d(h)=0\). We further define the subset \(V_D \subseteq V\) as the set of nodes with hop distance \(d(v)=D\) (see the example in Figure 8). Note that \(E\) only contains edges \((s, t)\) with \(d(s) = d(t) + 1\). We assume that within a round the host receives hop distance measurements from all nodes for all modulations. If a measurement for a node is missing, the host needs to repeat the measurement for this specific combination of node and modulation. The algorithm can be described as follows:
Fig. 8.
Fig. 8. Example of a shortest connectivity graph for floods with the host as a destination.
The host collects hop distance measurements for all nodes without instructing any node to apply delayed retransmissions.
Based on the collected measurements without delayed retransmissions, the host determines the hop distance \(d(v)\) of every node \(v \in V\). The maximal hop distance of all nodes is denoted as \(D_\text{max}\). Based on the hop distance information, the host can partition the set of nodes into subsets \(V_D\) with \(D \in \lbrace 1,2,\dots ,D_\text{max}\rbrace\). As a result, the host \(h \in V\) also knows that \((t, h) \in E\) for all \(t \in V_1\). This means a path between each of the nodes in the first layer (\(V_1\)) and the host is known at this point.
The goal of the next steps is to determine the edges \((s, t) \in E\) for some hop distance \(D = d(t)\). For every \(0 \lt D \lt D_\text{max}\), the host schedules \(|V_D|\) different configurations \(C_t\) where each configuration lasts for a complete round. In configuration \(C_t\), only nodes \(v \in V_D \setminus \lbrace t \rbrace\) delay the relaying of incoming packets. The host records the new hop distance \(d^{\prime }(v)\) of every node \(v \in V\). There is an edge \((s, t)\) with \(d(s) = D + 1\) if and only if \(d(s) = d^{\prime }(s)\).
The result of this probing sequence is the shortest connectivity graph \(G(V, E)\). The total number of rounds that is necessary for this simple version can be computed as
\begin{equation} R = \sum _{d=1}^{D_\text{max}-1} |V_d|, \end{equation}
(1)
where \(R \cdot (|V|-1)\) packets need to be sent. This does not include the measurements which are required to determine the hop distance without delayed retransmissions.

4.5 Potential Use Cases of the Shortest Connectivity Graph

The resulting shortest connectivity graph provides the basis for a large number of optimization schemes. In the following, we discuss the most important classes that can be combined with each other. For every flood, a subset of relaying nodes is determined such that all nodes are still connected. For many scenarios, this leaves a certain degree of freedom which can be used to optimize the network for one of the following aspects:
The level of redundancy can be tuned to match the requirements of the application. For example, a subgraph could be determined which is still connected if a single edge is removed.
The overall total energy consumption could be minimized.
The energy usage is evenly distributed to the nodes—that is, the maximum energy consumption across all nodes is minimized.
For example, the RFT [51] and LaneFlood [8] schemes make use of connectivity information to achieve a configurable level of redundancy. LiM [52] uses connectivity information to apply machine learning to reduce redundancy and improve the reliability of the network. Additionally, traditional schemes based on tree construction, such as CTP [19], require information about the link characteristics. Most of the proposed schemes require or could significantly benefit from the information that the connectivity graph obtained by the LSR protocol provides.
In our implementation in Section 5, we use the connectivity graph to select a shortest path between the node and the host. All nodes not on the selected shortest path are turned off. To distribute the energy consumption among nodes, we determine the set of selected paths such that the maximum number of transmissions across all nodes is minimized. Even though we apply single-path routing, the forwarding of the message is still performed using the flooding mechanism—that is, all retransmitting nodes use the same modulation and the flood runs directly from the initiator to the destination without interruption or long buffering of messages at intermediate nodes.

5 Performance Evaluation

In the following performance evaluation, we show the following important properties of the LSR protocol: LSR (1) allows to cover all scenarios as described in Section 1 and Section 5.2, (2) is energy-efficient and enables energy load balancing, and (3) dynamically adapts to a changing environment. We show the protocol behavior for a set of scenarios using an event-based simulation and verify that the simulation is realistic by comparing it to a hardware implementation running on the FlockLab 2 testbed [46].

5.1 Methodology

5.1.1 Metrics.

To evaluate the performance, we use the following metrics:
Reliability: The number of rounds with a successful transfer of a data packet from the node to the host divided by the number of rounds that could be used for a data transfer. This metric is calculated for each node. In the evaluation, we assume and ensure that each node wants to send exactly one packet in each round.
Energy per round: Total energy consumption per round for a single node. This includes the energy of all radio operations such as listening, receiving, and transmitting.
Active modulation: The active modulation provides information about the modulation with which the node has registered a stream. This information is available on both the nodes and the host.
We do not include a metric for latency for transferring data from a node to the host in our evaluation because by design this property does not significantly differ for the considered round-based protocols. The upper bound of the latency is determined by the round period (when assuming successful flood receptions). The aspect of unsuccessful data transfers is covered in the evaluation by the reliability metric.

5.1.2 Protocols for Comparison.

As discussed in Section 1, straightforward approaches such as star-based protocols or protocols that only use short-range transmissions do not satisfy the requirement of covering all considered scenarios. As this difference in coverage makes a fair comparison impossible, we do not include such protocols in the evaluation. Instead, we compare the following two protocol implementations, which have the potential to cover all scenarios:
LWB: This protocol is an implementation of the LWB [15] for long-range communication and serves as the baseline. It supports multiple hops but only a single long-range modulation. Concretely, a simplified version of LWB is used. The main difference to the original LWB lies in the fact that the round does not contain a second slot during which the host distributes the schedule. In addition, to improve the comparability to the LSR protocol implementation, we use Gloria (see Section 3.2) instead of Glossy as the lower-layer flooding primitive.
LSR: This protocol is an implementation of the LSR protocol as described in Section 3 with optimizations as described in Section 4. We differentiate different variants by (1) the number of used modulations (in this evaluation, we use either one or two modulations) and (2) the types of thinning optimizations that are applied. If only one modulation is used, only the long-range modulation (Mod0) is available. Used thinning options are hop distance thinning, where only the hop distance information is used, or full thinning, which corresponds to thinning using the hop distance and the shortest connectivity graph information.

5.1.3 Protocol Execution.

We implement the mentioned protocols in a simulation as well as on real hardware:
Event-based simulation: The event-based simulation simulates RF transmissions on a packet level. The radio model used in the simulation is based on the Semtech SX1262 transceiver [40] and accordingly specifies the available modulation schemes with the corresponding link budgets and the relations for the time-on-air calculations. Links (i.e., the point-to-point connection between two nodes) are modeled using path loss values. The reception at the receiver is probabilistic and is based on models and findings of work investigating LoRa and concurrent transmissions [6, 49]. The used model takes the receiver’s sensitivity and the signal power of all arriving transmissions into account. For a reception to be successful, the reception must not be prevented by an insufficient received signal power or by another overlapping transmission. The closer the received signal power is to the receiver’s sensitivity, the higher the probability that the reception does not succeed due to a too low signal power. For signals below the sensitivity, the reception fails in any case. The capture effect is taken into account by independently considering each transmission that overlaps with a transmission of interest in time (considering the entire message, i.e., header and payload) and determining whether it prevents the reception on the node of interest. A probabilistic decision modeled by a continuous normal distribution is used. If the received signal powers of the transmission of interest and an overlapping transmission are equal, the probability of preventing the successful reception of the transmission of interest is 50 %. If the transmission of interest has a received signal power that is for example 3 dB higher compared to the overlapping transmission, the probability of preventing the successful reception of the transmission of interest is significantly reduced to 15.9 % due to the modeling of the capture effect.
The simulation allows for arbitrary scenarios and provides control over the environment (i.e., the link characteristics). A network is defined in the form of a path loss matrix. With this, the simulation allows using path loss values from real measurements or synthetically constructed scenarios. The simulation is written in Python and available as open source.1 An exemplary visualization of the radio operations of a single LSR round is shown in Figure 9.
Testbed: We use the FlockLab 2 testbed [46] to execute the protocols on real hardware. As shown in more detail in Section 5.3, the FlockLab 2 testbed includes short-range and long-range links and is therefore suited to evaluate the performance of the considered scenarios and protocols.
Fig. 9.
Fig. 9. Exemplary visualization of a simulation run. Depicted is one LSR round with the radio operations (Tx, Rx, Listen) of all nodes. The Listen operation corresponds to Rx without the successful reception of a packet. In this example, the CR scenario is used (see Figure 10) and LSR is configured to apply full thinning.

5.2 Evaluation with a Set of Scenarios

To verify the correct functional behavior of the LSR protocol and to investigate in which aspects it outperforms the LWB baseline, we look at the metrics when executing the protocols in different scenarios. For this purpose, we define a set of seven scenarios, visualized in Figure 10, which cover a wide range of use cases. In the following, we describe the scenarios:
Fig. 10.
Fig. 10. Scenarios used for the performance evaluation.
Short-range (SR): All nodes in the network are reachable from the host via a short-range multi-hop path. This corresponds to a scenario for traditional radios which do not support long-range communication (e.g., see [24]).
Long-range single-hop (LS): The network consists of nodes that are reachable from the host via a single-hop long-range link. No node is reachable from the host via a short-range multi-hop path. This scenario corresponds to a star topology which is an implicit assumption of the LoRaWAN [1] protocol.
Long-range multi-hop (LM): The network consists exclusively of nodes that are reachable from the host via a long-range multi-hop path. No node is reachable from the host via a short-range multi-hop path. The nodes are distributed and do not form a single cluster. A possible use case scenario is a network for monitoring farm animals (e.g., see [21]).
Cluster with remote nodes (CR): This scenario is based on the SR scenario but is extended with additional single remote nodes that are only accessible via long-range paths from the host. A subset of the remote nodes is only reachable via a multi-hop long-range path. An exemplary use case for this scenario is a monitoring system for underground infrastructure [14].
Remote cluster (RC): Variation of the LM scenario. Instead of the nodes being distributed, in this scenario, they are gathered in a cluster. Again, monitoring underground infrastructure [14] is an example use case for this scenario.
Line (LI): This scenario represents an extended line topology. The used long-range modulation does not only allow to reach the next hop but the next two hops at least. This scenario is motivated by application scenarios such as tunnels (e.g., see [10]).
Fanout (FO): In this scenario, the majority of nodes can only communicate with the host via multiple hops and using the long-range modulation. Nodes 8 and 9 have a direct connection to the host and represent a bottleneck for the communication of the remaining nodes.
For the concrete implementation of the scenarios, the high-level information about the links (Mod0, Mod1, or no link) in the network together with the set of available modulations is used to construct a corresponding path loss matrix. This path loss matrix is then used in the simulation.

5.2.1 Configuration.

The basic configuration values which are used for the simulation are listed in Table 2. The transmit power has been set to the same level as in the evaluation on the testbed (see Section 5.3). For the simulation, it has no influence on the connectivity, as the used path loss matrix is constructed by taking into account the available link budget. However, it has an influence on the absolute power consumption values (i.e., the energy per round metric). For measurements regarding packet loss, hop distance without delay, and hop distance with delay, a history depth of three measurements (i.e., \(B_m=B_h=B_d=3\)) is used, unless otherwise noted. The number of hops setting for the Gloria flooding primitive limits the maximum supported network diameter. The number of available nodes in the network is used as an upper bound for the number of skipped rounds due to the random exponential backoff mechanism.
Table 2.
ParameterConfiguration
Traffic demandTx queue is always filled with at least one packet (i.e. every node always has a demand to send a packet)
All nodes request exactly one slot per round
Data payload size16 bytes
Set of modulationsMod0: LoRa SF7 (bandwidth: 125 kHz)
Mod1: FSK 250 kbit/s
Transmit power+4 dBm
Set of nodes1, 2, 3, 4, 5, 6, 7, 8, 9
Host node1
Gloria floods: No. of retransmissions2
Gloria floods: No. of hopsMod0: 5, Mod1: 5
Table 2. Configuration Parameters Used for the Simulation
For simplicity, we only use the two modulations also used in the description of the LSR protocol in Section 3.1 for the evaluation. For a quantitative comparison of different modulations, we provide the most important characteristics of the modulations used in the evaluation plus one additional modulation in Table 3. For the calculations, we used the configuration used in the simulations (Table 2). The range values are based on the Friis free-space loss equation [17] and are merely indicative, as the achievable range in a realistic environment depends on many additional factors (e.g., see [20, 31]).
Table 3.
Symbol used in paperModulation schemeModulation settingTx durationEnergy for RxEnergy for TxRange (Friis free-space)
(Not used)LoRaSF10346 ms5710 \(\mu \mathrm{J}\)67,100 \(\mu \mathrm{J}\)170 km
Mod0LoRaSF753.5 ms883 \(\mu \mathrm{J}\)10,400 \(\mu \mathrm{J}\)69 km
Mod1FSK250 kbit/s0.832 ms13.7 \(\mu \mathrm{J}\)161 \(\mu \mathrm{J}\)6.4 km
Table 3. Example Modulations and Their Characteristics When Using the Configuration Parameters Listed in Table 2
The calculations are based on chapter 2 in the work of Trüb [43].

5.2.2 Results: Overview of Scenarios.

First, we verify that the protocols work reliably in all scenarios and compare the energy consumption. For this, we use the simulation to execute the LWB and the LSR protocols in all scenarios. For the LSR protocol, we use two modulations and full thinning. For each combination of protocol and scenario, the simulation is executed for 500 rounds, whereas the first 30 rounds are omitted in the presented data to remove the influence of the Bootstrapping phase. Visualizations of the collected reliability and energy per round metrics are depicted in Figures 11(a) and 11(b), respectively. In the case of reliability, one sample corresponds to the reliability of a single node. The data of all nodes form one distribution (i.e., one box in the boxplot). For the energy per round, one sample corresponds to the consumed energy of a single node in a single round. The data of all nodes for all rounds form one distribution (i.e., one box in the boxplot).
Fig. 11.
Fig. 11. Simulation results for the set of scenarios.
The results show that the LWB and the LSR protocols provide sufficiently high reliability (i.e., they work for all scenarios). The reliability of LSR is comparable to the reliability of LWB. There are cases in which the reliability of LSR is lower. This can be explained by the fact that LSR applies thinning optimizations which reduce the redundancy. However, in other cases, the reliability of LWB is lower. Such cases can be explained by the reduced potential of colliding packets within a flood as the number of simultaneously transmitting nodes is reduced by the thinning as well. The energy consumption of LSR is significantly reduced compared to LWB. There are two reasons for this. The main reason is the thinning optimizations which disable a subset of nodes during data floods. The second contributing factor is the use of two modulations that allows certain nodes to transmit data efficiently via short-range communication. Together with energy load balancing, this allows for reducing the maximum energy consumption of all nodes. More detailed results are provided in Section 5.2.3.
The reduction of energy per round is most significant for scenarios with nodes connected to the host via a short-range path, such as scenarios SR and CR. Scenarios that require most or even all nodes to send data using the long-range modulation, such as scenarios LM, LI, and FO, show a higher energy consumption. As all transmissions within a flood are required to use the same modulation, this also applies to scenario RC. The LI scenario is the most extreme one, as indicated by the wide range of energy per round. For this scenario, all nodes are required to send data with the long-range modulation. The nodes close to the host represent a bottleneck and the opportunities to apply thinning optimizations are limited.
In summary, the LSR protocol allows for reducing power consumption without losing the property that every node can always be connected via the long-range modulation if required by the environment, which ensures that it is able to support all scenarios.

5.2.3 Results: Closer Look at the CR Scenario.

As the aggregated results only provide a high-level view, we have a closer look at the CR scenario. For this, we simulate the CR scenario for 1,000 rounds. To see the influence of the number of modulations when using the LSR protocol, we add the LSR protocol variant that uses only a single modulation, the long-range modulation. We apply full thinning for both LSR variants. In Figure 12, we plot the distribution of the energy per round for each node separately. Again we omit the first 30 rounds to remove the effect of the Bootstrapping phase (i.e., each bar represents the data from rounds 30 to round 999).
Fig. 12.
Fig. 12. Energy per round for each node separately for the CR scenario. The bars represent the mean of all considered rounds, and the black vertical lines span the 95% confidence interval.
As expected, the energy consumption of the LWB protocol is similar for all nodes. With this protocol, all nodes always use long-range modulation and all nodes participate in each data flood. Using LSR with only one modulation already reduces energy consumption significantly. The thinning reduces the energy consumption and the information from the connectivity graph allows to evenly distribute the energy load for relaying messages to different nodes. Concretely, the forwarding of messages from nodes 2 and 4 is distributed to nodes 3, 5, and 6 compared to an assignment in which node 3 does all the work. However, this scheme is still inefficient in this case as the relaying nodes send their own data as well as data from remote nodes with the more expensive long-range modulation. If we use LSR with two modulations, the relaying nodes (nodes 3, 5, and 6) can send their own data via the short-range modulation. This allows to further reduce the maximum energy consumption across all nodes and therefore would increase the lifetime of a battery-powered system.
In the following, we further inspect the LSR protocol using two modulations. To investigate the temporal behavior, we plot the energy per round metric over time in Figure 13(a). In this case, we do not omit any rounds. From the energy consumption, we see that the Bootstrapping phase starts in round 0 and lasts around 20 rounds. The Bootstrapping phase consists of two parts: (1) the registration of the nodes at the host and (2) the collection of measurements for the thinning. The time required for the registration is mainly determined by the number of participating nodes. Each node determines the best modulation and sends a stream request. Per round, the host can receive at most one stream request for each modulation successfully. In the example, 8 rounds are required for all nodes to get registered. Once a node has a stream assigned (i.e., the active modulation has been determined), the thinning procedure is started. In the example in Figure 13(a), the thinning lasts until round 18. Afterward, the energy consumption is significantly reduced and remains stable for all nodes for a longer period of time. In rare cases, the network is adapted to a detected change even in a static scenario. For illustration purposes, we specifically picked a case where this happens within the first 100 rounds, concretely in round 33. This behavior can be explained with the simulation which is configured to use probabilistic transmissions (i.e., individual packets can be lost and the arrival of floods can be delayed). This can lead to situations where a used link in the connectivity graph is considered to be no longer available or a node is considered to have a different distance to the host. In these cases, the thinning is partially reset and the connections between nodes are measured again. As a consequence, the energy consumption is increased for a short amount of time. By configuring the history depth, it is possible to adjust the trade-off between fast adaptation to changes versus stability. Overall, LSR is able to continuously collect information about link characteristics without increasing the energy consumption significantly.
Fig. 13.
Fig. 13. Results for the CR scenario when executing LSR using two modulations with full thinning.
To examine the contributions of different radio operations, we plot the individual components in Figure 13(b). Here, we again omit the first 30 rounds. The results show that transmitting with long-range modulation accounts for the largest share of energy consumption. In addition, the nodes that are connected to the host via a short-range path and do not have to forward data (nodes 7 and 8) have a non-negligible long-range part. This is due to the forwarding of the schedule packets and the participation in contention slots. This represents the cost of supporting continuous dynamic adaptation to a changing environment. In certain cases, this is not necessary and further optimizations, as discussed in Section 6.4.5, could be applied.

5.2.4 Results: Dynamic Behavior.

To demonstrate how the LSR protocol adapts itself to a changing environment, we artificially change the link characteristics at runtime. For this, we use the RC scenario and simulate 100 rounds. At round 50, we change the link between the host (node 1) and node 5 from supporting only long-range communication to supporting long- and short-range communication.
In Figure 14, the active modulation as registered on the host node is depicted over time. In the first 10 rounds, the bootstrapping process is taking place and all nodes successfully register a stream for the long-range modulation (Mod0). After the path loss of the link between node 1 and node 5 is artificially decreased, all nodes could potentially switch to using the short-range modulation (Mod1). The transition happens with a delay due to the history of measurements. In this example of this section, the depth of the history is configured to eight measurements. In Figure 15, the shortest connectivity graphs for Mod0 and Mod1 as observed by the host node before and after the change are depicted. The two time instants are marked with arrows in Figure 14. When comparing the shortest connectivity graphs in Figure 15 to the RC scenario in Figure 10, we find that the graphs match the original graph well. This example shows that LSR is capable of continuously measuring the link characteristics and switching the modulation during normal data transfer rounds. In many cases, this even works without interrupting the data stream (i.e., without losing data packets). This is also the case in this example (Figure 16). For the other direction (switch from Mod1 to Mod0), such an uninterrupted switching is not supported by LSR as the change of the topology is detected by observing missed packets.
Fig. 14.
Fig. 14. Simulation results for the CR scenario with the LSR protocol using two modulations and full thinning. In round 50, the link between nodes 1 and 5 is changed to support short-range communication (i.e., it supports Mod0 and Mod1). The changed link characteristics allow all nodes to switch to Mod1. The shortest connectivity graphs for the highlighted time instants (a) and (b) are shown in Figure 15.
Fig. 15.
Fig. 15. The connectivity graphs before (a) and after (b) the change in link characteristics for both modulations. The two different time instants correspond to the highlighted time instants in Figure 14. The edges used by the nodes for data transfers are highlighted (thick lines). After the change, a short-range path is used by all nodes.
Fig. 16.
Fig. 16. Rounds with (white) and without (gray) received packets for all nodes. In the example, each node tries to send exactly one packet in each round. Despite the major change of the topology at round 50, no packet is lost during the transition.

5.2.5 Results: Thinning Convergence.

In this section, we investigate the convergence behavior and the accuracy of the graph-based thinning method of LSR with full thinning. For this, we introduce an additional metric, the graph distance. The graph distance is a measure that describes how much the graph obtained by LSR differs compared to the original graph defined by the scenario (ground truth). To compute the graph distance, for both graphs we first determine the shortest connectivity graph and extract the set of all edges. Then, we compute the symmetric difference between the two sets. The number of elements in the resulting set corresponds to all nodes that are either missing or superfluous compared to the ground truth. Ideally, the optimization of LSR is able to determine the original graph (i.e., the graph distance reaches zero). To prevent any influence from the registration procedure, we pre-register all nodes to Mod0 for the evaluation in this section.
First, we use the RC scenario to investigate the influence of the history depth. In Figure 17, we plot the graph distance for Mod0 over the first 40 rounds for four different history depths and 10 different simulation runs (i.e., different initialization of the random number generator) each. In addition, we indicate the best-case convergence time calculated based on the used scenario variation and used configuration parameters as vertical lines. In this case, all nodes are pre-registered and thus no rounds are required for registering streams at the host. However, a number of rounds are needed to fill the history buffer for hop distance measurements and collect thinning information. The best case for the first part is directly given by the history depth configuration. The best-case duration of the second part is given by Equation (1) discussed in Section 4.4.
Fig. 17.
Fig. 17. Convergence behavior of LSR with full thinning executed using the RC scenario and with pre-registering all nodes to Mod0. The plot shows 10 simulation runs for each history depth configuration. The vertical lines indicate the best-case convergence times.
The results show that the thinning with a history depth of one element often does not converge. However, for more suitable history depths of three or more elements, the thinning converges in many cases within 25 rounds. In rare cases, the obtained connectivity graph differs from the original graph by one or two edges; however, in most cases, LSR determines the correct graph.
To further investigate the influence of the number of hops and the number of nodes in the scenario, we additionally introduce the Convergence (CO) scenario depicted in Figure 18. This scenario defines several variations that differ by the number of hops and columns.
Fig. 18.
Fig. 18. Visualization of the Convergence (CO) scenario with its variations with a different number of hops and columns as used for the convergence analysis.
In Figure 19, we plot the graph distance for Mod0 over the first 60 rounds for the different variations of the CO scenario. For each scenario variation, we plot 10 runs. In addition, we use a fixed history depth of five elements. Again, we depict the best-case convergence time corresponding to each scenario variation as a vertical line. The results show that the best-case convergence times can indeed be achieved. However, there are also runs that converge more slowly. The results suggest that convergence becomes more challenging with scenarios involving more nodes. In addition, the results indicate that a larger number of hops and nodes increases the remaining graph distance.
Fig. 19.
Fig. 19. Convergence behavior of LSR with full thinning executed using the CO scenario variations (see Figure 18) and with pre-registering all nodes to Mod0. The plot shows 10 simulation runs for each scenario variation. The vertical lines indicate the best-case convergence times.

5.3 Comparison of Simulation to Testbed Execution

In this section, we show that the LSR protocol not only works in a simulation but also works on real hardware in a testbed. In addition, we compare the performance metrics of the simulation to the testbed to confirm that the simulation matches the reality sufficiently well to use it as a basis for our analysis.

5.3.1 Testbed and Scenarios.

The scenarios used for the comparison between the simulation and the testbed are based on the FlockLab 2 testbed [46] installation. FlockLab 2 supports tests with up to 30 nodes. The FlockLab 2 testbed provides different actuation and tracing capabilities including tracing the serial output, logic actuation and tracing, power profiling, and interactions and tracing using debug probes. The accurate timestamping required for the actuation and tracing services is achieved via time synchronization based on the Global Navigation Satellite System (GNSS) and Precision Time Protocol (PTP).
In the experiments in this section, we use two scenarios that both use the same set of 13 nodes depicted in Figure 20. Nine nodes are located inside an office building, and four additional nodes are located farther apart at distances of up to 2 km on rooftops of campus and city buildings. The first scenario (CR_FL2) is similar to the CR scenario of Section 5.2. We use node 24 as the host node. It is part of a cluster with short link distances. In addition, the scenario includes four rooftop nodes with large path loss links to the cluster. The second scenario (RC_FL2) is similar to the RC scenario of Section 5.2. In this scenario, we use node 15 as the host node and the remaining nodes form a cluster that includes links with high and low path losses.
Fig. 20.
Fig. 20. Nodes used for the comparison of the simulation and the execution on the FlockLab 2 testbed.
A main reason for the evaluation in this section is the verification that the simulation is meaningful compared to real-world deployments. We therefore tried to match the real scenarios as well as possible in the simulation. We obtain the corresponding link characteristics information by performing link tests on the FlockLab 2 testbed which we then feed into the simulation in the form of a path loss matrix.

5.3.2 Implementation on the Testbed.

The implementation used for the testbed is based on the DPP2 LoRa target architecture [46] which consists of the DPP2 LoRa communication board [5] and a simple target adapter that enables the connection to the FlockLab 2 target interface. The DPP2 LoRa communication board consists of an STMicroelectronics STM32L433CC microcontroller and a Semtech SX1262 low-power long-range radio transceiver [40]. The microcontroller features an ARM Cortex-M4 core that supports clock frequencies of up to 80 MHz. The radio transceiver provides up to \(+\)22 dBm of transmit power, operates in the 868-MHz band, and supports the long-range LoRa and the short-range Frequency Shift Keying (FSK) modulation schemes using the same radio front end and antenna.
The software used to run on the nodes is available as open source as part of the Flora software2 [44]. An overview of the message structures of the implementation is depicted in Figure 21. The header of each message contains a network ID and the message type identifier. The Slots field of the Schedule message contains a list of node IDs that defines the structure of the round for the corresponding modulation. In this simple implementation, fixed-size bit fields are used for the data acknowledgment, the delay mask, and the participation updates. As discussed in Sections 4.1 and 4.4, this representation could be replaced by alternative representations to allow for better scaling of the protocol to a larger number of nodes. The implementation on the DPP2 LoRa communication board supports the full LSR scheme for the sensor nodes and the basic scheme (see Section 3.3) for the host node. A fully featured scheduler that implements all optimizations is implemented in Python and runs on a separate device that interfaces with the host node via a serial connection. This partitioning of the functionality has the advantage that any ordinary node with a serial connection to a device that supports the execution of Python scripts can serve as a host node. Consequently, in the evaluation with the testbed, any node can be configured to be the host.
Fig. 21.
Fig. 21. Structure of LSR messages used in the implementation for the testbed. Components marked with an asterisk are optional.

5.3.3 Configuration.

The configuration values that are used for both the simulation and the tests on the FlockLab 2 testbed are listed in Table 4. The transmit power is chosen such that the four remote rooftop nodes are not directly reachable from the remaining nodes using the short-range modulation (Mod1) but are reachable using the long-range modulation (Mod0). A history depth of three measurements (i.e., \(B_m=B_h=B_d=3\)) is used for the simulation and the testbed.
Table 4.
ParameterConfiguration
Traffic demandTx queue is always filled with at least one packet (i.e. every node has always a demand to send a packet)
All nodes request exactly one slot per round
Data payload size16 bytes
Set of modulationsMod0: LoRa SF7 (bandwidth: 125 kHz)
Mod1: FSK 250 kbit/s
Transmit power+4 dBm
Set of FlockLab 2 nodes1, 4, 6, 7, 12, 13, 15, 17, 24, 25, 26, 27, 30
Host nodeCR_FL2: 24, RC_FL2: 15
Gloria floods: No. of retransmissions2
Gloria floods: No. of hopsMod0: 2, Mod1: 4
Table 4. Configuration Parameters Used for the Simulation and the Tests Performed on the FlockLab 2 Testbed When Comparing the Two Implementations

5.3.4 Measurements and Results.

For the simulation as well as the testbed and for each scenario, we run the LSR protocol with full thinning and using two modulations for 180 rounds. We omit the first 30 rounds to remove the influence of the Bootstrapping phase. The resulting reliability and the energy per round values for the CR_FL2 and the RC_FL2 scenarios are plotted in Figure 22. For the testbed, the reliability values are determined by analyzing serial logs, whereas the energy is measured using the power profiling service of FlockLab 2.
Fig. 22.
Fig. 22. Comparison of reliability and energy per round metrics when running LSR using two modulations and with full thinning in the simulation and on the real testbed using the same subset of nodes and link characteristics. For the CR_FL2 node 24 and for the RC_FL2 node 15 is used as the host node. For the energy per round plots, the bars represent the mean of all considered rounds and the black vertical lines span the 95% confidence interval.
We observe that in both scenarios, the reliability values for both implementations are in a similar range. For the CR_FL2 scenario, the reliability obtained from the testbed is less than 1 % higher compared to the results from the simulation. For the RC_FL2 scenario, the simulation has a tendency of being slightly too optimistic as the reliability determined by the simulation is 7% higher compared to the value measured with the testbed.
For both scenarios, the energy per round values exhibit the same order of magnitude and a similar pattern for both implementations. In the RC_FL2 scenario, some nodes display more significant deviations, but the tendency is comparable. The energy per round measurements for the CR_FL2 and RC_FL2 scenarios obtained from the testbed are on average 12 % and 18 % higher when compared to the corresponding values determined in the simulation, respectively.
The results from the testbed demonstrate that the LSR protocol including its optimizations can be implemented on real IoT hardware and works as expected. Various factors may contribute to differences between the simulation and the testbed implementation. On the one hand, the wireless channel inherently contains various probabilistic elements which are changing over time. On the other hand, the simulation includes a number of simplifications and abstractions to keep the computations tractable. For example, the probabilistic model of the simulation is based on fixed path loss values, whereas in a real system the path loss values can significantly vary over time. Additionally, overheads such as the power consumption of the microcontroller as well as frequency synthesis and amplifier ramp-up time of the radio which are not considered in the simulation contribute to differences. Furthermore, it is difficult to accurately model real-world effects such as the capture effect [49]. Considering the described complexity stemming from the properties of real systems and the probabilistic elements of the LSR protocol, we do not necessarily expect the metrics to agree on a per-node level, but that the network-wide trends align with our simulations. Thus, we find that the results of the simulation match the ones of the testbed sufficiently well. As a consequence, we consider the results of the evaluation in Section 5.2 to be representative.

6 Discussion and Outlook

In this section, we discuss the advantages and limitations of the LSR protocol and provide a selection of interesting extensions.

6.1 Relations to Routing-Based Approaches

The resulting forwarding network of LSR when applying the thinning optimizations might be similar to forwarding networks obtained by routing-based approaches. However, the two approaches are fundamentally different and therefore have different properties. Routing represents an additive approach, where a network with no connections is used as a starting point, and newly discovered connections are successively added. In contrast, the flooding approach of LSR with the thinning optimizations represents a subtractive approach where all nodes are immediately reachable already during the very first flood. The optimizations discussed in Section 4 are only applied gradually after collecting enough measurements. As a consequence, with routing, the time until full coverage is established after a change is larger compared to the flooding-based approach of LSR. In addition, in-network buffering is often used with routing, which increases complexity and complicates bounding the latency of message transfers. The latency of LSR, however, is upper-bounded by the round period. A message either reaches the destination within the same round or not at all. In general, both approaches are applicable but have a different focus and different properties.

6.2 Advantages

One main advantage of the LSR protocol is that for any multi-hop scenario it connects all nodes to the host as long as there is a multi-hop path. The use of multiple modulations allows connecting nodes in networks with links that span a wide range of path losses and helps to keep the energy consumption low. Using a TDMA channel access scheme and flooding for transferring data provides high reliability, ensures fast convergence, and serves as a straightforward mechanism to periodically time synchronize all nodes to the time basis on the host. Furthermore, LSR adapts itself to changes in the network, such as link characteristics and topology, and is able to optimize energy consumption. Even when using the hop-distance thinning method only, the LSR protocol automatically degenerates to a star topology if for all nodes a single-hop path to the host is available and this path is optimal in terms of energy consumption. A key aspect of LSR is that it allows measuring the shortest connectivity graph of the network at runtime during normal data communication in a non-intrusive way and with only little overhead. This provides a generally applicable basis for further optimizations.

6.3 Limitations

The presented LSR protocol has a strong focus on data collection—that is, it focuses on aggregating data from all the nodes on a single node (all-to-one communication pattern). The proposed optimization schemes are therefore based on centralized control at the host. Accordingly, every node in the network is required to periodically send floods to the host node for the optimization to be effective. Extensions that allow for more flexible traffic patterns are possible (see also Section 6.4) but potentially increase the complexity of the protocol significantly.
Analogous to LWB, the LSR protocol is round-based and the upper bound of the latency for transferring data from a node to the host is mainly determined by the round period (when assuming successful flood receptions). The round period is a parameter of the LSR protocol and can be adapted according to the application requirements. As demonstrated by Mager et al. [32], synchronous transmission flooding over multiple hops can be used for controlling real-time systems. However, in many use cases with constraints on the available power, a large period is chosen to have a small duty cycle and thus low power consumption on average.
Another disadvantage of LSR when comparing it to other protocols, such as LWB, is the increased complexity. In Section 5.3, however, we demonstrate that the implementation on a representative IoT platform is feasible.
The proposed LSR protocol relies on synchronous transmission flooding. This Glossy-like flooding only allows using a single modulation within the same flood. As a consequence, in LSR, if a path between a node and the host contains a long-range segment, the long-range modulation is used for all segments of the path. Extending the flooding scheme to allow flooding with mixed modulations is challenging. One possibility would be to use multiple modulations sequentially within the flood. However, this introduces the problem of determining and distributing the point in time for switching modulations. Alternatively, multiple modulations could be used simultaneously. This in turn entails the risk of destructive packet collisions and limits the number of forwarding nodes for each modulation, since not all nodes would participate in all modulations anymore.
In LSR, the exchange of status information, contained in schedule and contention messages, is necessary for each modulation. This implies an additional overhead that, in certain application scenarios, cannot be compensated by the potentially more efficient data transmission enabled by modulations with a lower link budget and the thinning optimizations. However, in Section 5.2, we show that the proposed LSR protocol has advantageous properties for many application scenarios.

6.4 Extensions

We presented the LSR protocol which fulfills all requirements according to the application scenario in Section 1. Nevertheless, there are a number of extensions that would allow improving the LSR protocol further and that could be explored in future work.

6.4.1 Set of Modulations.

So far, we have assumed that the set of available modulations is given and does not change. For simplicity, we use only two modulations in this work. However, the protocol could easily be extended to use more than two modulations. The mechanism to determine the best modulation would be unchanged and still relies on collecting statistics on the received schedule floods. But the overhead would potentially increase as each node needs to listen to additional schedule floods. The optimal set of modulations (number of modulations and which modulations are available) could be determined offline or online based on a model of the network or using sample measurements.

6.4.2 More Flexible Data Streams.

Up to now, we have limited the number of streams for each node to a single stream. Furthermore, the gateway is always the sender or receiver of the data. With extensions of the basic scheme, more flexibility for data streams could be added. By introducing stream IDs and adaptation of the scheduler on the host, multiple streams per node could be supported. In addition, streams between two nodes could be integrated by including the destination node ID into stream requests and adapting the scheduler. In this case, thinning could be applied but full thinning to a single shortest path would not be possible in every case as the shortest connectivity graph, obtained as described in Section 4.4, does not contain all edges between nodes that have the same hop distance from the host. The scheme for measuring the connectivity graph could be extended as well but additional hop distance measurements need to be collected and the overall complexity would be increased.

6.4.3 Increasing Reliability by Resending Data.

Due to the uncontrollable and fluctuating RF environment, flooding messages with blind retransmissions, as it is implemented in Gloria, does usually achieve a packet delivery ratio below \(100\%\). To improve this, an additional protocol layer on top of the basic scheme could be added. This additional layer would resend data that has not been delivered successfully. With the aggregated acknowledgment of data transmissions in schedule messages, the basic LSR scheme provides a mechanism to implement such a layer on top.

6.4.4 Multiple Gateways.

We described the LSR protocol applied to a system with a single gateway. One straightforward solution to support multiple gateways is to assign each of the gateways the role of an LSR host and to statically assign each node to exactly one gateway. More sophisticated schemes where nodes for example are being passed between gateways at runtime or schemes where nodes can be registered to multiple gateways at the same time are possible but outside the scope of this article.

6.4.5 Thinning of Non-Data Transmissions.

If it is known from the scenario that topology changes do not occur or are extremely rare, the protocol could be further optimized by thinning non-data transmissions such as schedule and contention floods. However, this is more critical with respect to recovery from a failure than thinning data floods since this could impact the flow of control information. To ensure recovery from a failure, a mechanism is required to reset the thinning of non-data floods. A simple example of such a mechanism would be that all nodes are required to participate in schedule floods in every \(j\)th round to receive control information.

6.4.6 Selection of Participating Nodes Based on Shortest Connectivity Graph.

We propose to use a simple approach for thinning based on the shortest connectivity graph information, namely selecting a single path out of the available shortest paths. The selection of participating nodes could potentially be improved or tailored to the needs of the application by improving the load balancing and allowing for a defined level of redundancy.

7 Conclusion

In many wireless networks for the IoT, the location of the nodes is dictated by the application. This often leads to networks with inhomogeneous links and nodes that cannot directly communicate with the gateway. In this article, we present the LSR protocol, which efficiently allows TDMA-based low-power multi-hop multi-modulation communication and is suited for networks with inhomogeneous link characteristics. We show that LSR provides the same large coverage and flexibility for scenarios with long-range links as a long-range LWB variant but allows for reducing power consumption significantly in many scenarios. Reducing power consumption is achieved through the application of thinning and by the use of multiple modulations. We demonstrate that the reduction of power consumption is most effective for scenarios with a mix of nodes connected with long- and short-range paths to the host. However, also for scenarios with only nodes which are reachable via long-range paths, the energy consumption can be reduced as a consequence of the thinning optimizations. As a consequence, many application scenarios that include networks with long-range links, such as wireless systems for gathering state information from farmland and plantations [26, 41] or city-wide measuring of traffic flows [35], could potentially benefit from the application of the LSR protocol. For special cases with only long-range paths and where no thinning is possible, LSR shows similar performance as LWB. The LSR protocol supports dynamic adaptation to changes in topology and the link characteristics. Furthermore, it includes a scheme to continuously measure the shortest connectivity graph by non-destructive probing in parallel to normal data transmissions. This information offers the potential to apply various known optimizations on top of the presented work and further improve performance.
One limitation of the LSR protocol is that it is not advantageous in cases where long-distance paths can be precluded, since there is a non-negligible overhead required to allow dynamic adaptations to networks including long-range links. In addition, in our implementation and evaluation, the optimization based on the shortest connectivity graph is limited as only a single shortest path is selected. More advanced optimizations are possible and could be investigated in future work. For example, this includes schemes with an advanced energy load balancing or which provide a configurable degree of redundancy for forwarding messages over multiple hops. However, already the basic scheme with simple optimizations demonstrates good performance and is therefore promising for many application scenarios.

Footnotes

References

[1]
LoRa Alliance. 2017. LoRaWAN 1.1 Specification. Retrieved January 20, 2023 fromhttps://lora-alliance.org/resource_hub/lorawan-specification-v1-1/.
[2]
Toni Adame Vázquez, Sergio Barrachina-Muñoz, Boris Bellalta, and Albert Bel. 2018. HARE: Supporting efficient uplink multi-hop communications in self-organizing LPWANs. Sensors 18, 1 (2018), 115. DOI:
[3]
Beshr Al Nahas, Simon Duquennoy, and Olaf Landsiedel. 2019. Concurrent transmissions for multi-hop Bluetooth 5. In Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks (EWSN’19). 130–141.
[4]
Jan Beutel, Stephan Gruber, Andreas Hasler, Roman Lim, Andreas Meier, Christian Plessl, Igor Talzi, et al. 2009. PermaDAQ: A scientific instrument for precision sensing and data recovery in environmental extremes. In Proceedings of the 2009 International Conference on Information Processing in Sensor Networks. 265–276. https://ieeexplore.ieee.org/abstract/document/5211923.
[5]
Jan Beutel, Roman Trüb, Reto Da Forno, Markus Wegmann, Tonio Gsell, Romain Jacob, Michael Keller, Felix Sutton, and Lothar Thiele. 2019. The dual processor platform architecture. In Proceedings of the 18th International Conference Information Processing in Sensor Networks (IPSN’19). ACM, New York, NY, 335–336. DOI:
[6]
Martin Bor, Utz Roedig, Thiemo Voigt, and Juan Alonso. 2016. Do LoRa low-power wide-area networks scale? In Proceedings of the 19th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM’16). ACM, New York, NY, 59–67. DOI:
[7]
Martin Bor, John Vidler, and Utz Roedig. 2016. LoRa for the Internet of Things. In Proceedings of the 2016 International Conference on Embedded Wireless Systems and Networks (EWSN’16). 361–366.
[8]
Martina Brachmann, Olaf Landsiedel, and Silvia Santini. 2016. Concurrent transmissions for communication protocols in the Internet of Things. In Proceedings of the 2016 IEEE 41st Conference on Local Computer Networks (LCN’16). 406–414. DOI:
[9]
Doug Carlson, Marcus Chang, Andreas Terzis, Yin Chen, and Omprakash Gnawali. 2013. Forwarder selection in multi-transmitter networks. In Proceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor Systems. 1–10. DOI:
[10]
Matteo Ceriotti, Michele Corrá, Leandro D’Orazio, Roberto Doriguzzi, Daniele Facchin, Ştefan Gună, Gian Paolo Jesi, et al. 2011. Is there light at the ends of the tunnel? Wireless sensor networks for adaptive lighting in road tunnels. In Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks. 187–198. https://ieeexplore.ieee.org/abstract/document/5779037
[11]
José Dias and António Grilo. 2018. LoRaWAN multi-hop uplink extension. In Proceedings of the 9th International Conference on Ambient Systems, Networks, and Technologies (ANT’18) and the 8th International Conference on Sustainable Energy Information Technology (SEIT’18) and Affiliated Workshops, Vol. 130. 424–431. DOI:
[12]
Mamour Diop and Congduc Pham. 2019. Increased flexibility in long-range IoT deployments with transparent and light-weight 2-hop LoRa approach. In Proceedings of the 2019 Wireless Days Conference (WD’19). 1–6. DOI:
[13]
Manjunath Doddavenkatappa, Mun Choon Chan, and Ben Leong. 2013. Splash: Fast data dissemination with constructive interference in wireless sensor networks. In Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13). 269–282. https://www.usenix.org/conference/nsdi13/technical-sessions/presentation/doddavenkatappa.
[14]
Christian Ebi, Fabian Schaltegger, Andreas Rüst, and Frank Blumensaat. 2019. Synchronous LoRa mesh network to monitor processes in underground infrastructure. IEEE Access 7 (2019), 57663–57677. DOI:
[15]
Federico Ferrari, Marco Zimmerling, Luca Mottola, and Lothar Thiele. 2012. Low-power wireless bus. In Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems (SenSys’12). ACM, New York, 1–14. DOI:
[16]
Federico Ferrari, Marco Zimmerling, Lothar Thiele, and Olga Saukh. 2011. Efficient network flooding and time synchronization with glossy. In Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks. IEEE, Los Alamitos, CA, 73–84. https://ieeexplore.ieee.org/abstract/document/5779066
[17]
Harald Trap Friis. 1946. A note on a simple transmission formula. Proceedings of the IRE 34, 5 (1946), 254–256. DOI:
[18]
Juan Pablo García-Martín and Antonio Torralba. 2021. Model of a device-level combined wireless network based on NB-IoT and IEEE 802.15.4 standards for low-power applications in a diverse IoT framework. Sensors 21, 11 (2021), 3718. DOI:
[19]
Omprakash Gnawali, Rodrigo Fonseca, Kyle Jamieson, David Moss, and Philip Levis. 2009. Collection tree protocol. In Proceedings of the 7th ACM Conference on Embedded Networked Sensor Systems (SenSys’09). ACM, New York, NY, 1–14. DOI:
[20]
Masaharu Hata. 1980. Empirical formula for propagation loss in land mobile radio services. IEEE Transactions on Vehicular Technology 29, 3 (1980), 317–325. DOI:
[21]
Derek Heeger, Maeve Garigan, Eirini Eleni Tsiropoulou, and Jim Plusquellic. 2020. Secure energy constrained LoRa mesh network. In Ad-Hoc, Mobile, and Wireless Networks. Springer International Publishing, Cham, Switzerland, 228–240. DOI:
[22]
Texas Instruments. 2012. CC430F614x, CC430F514x, CC430F512x MSP430 SoC with RF Core Datasheet. Retrieved September 30, 2021 from https://www.ti.com/lit/gpn/cc430f5147.
[23]
Jaein Jeong, David Culler, and Jae-Hyuk Oh. 2007. Empirical analysis of transmission power control algorithms for wireless sensor networks. In Proceedings of the 2007 4th International Conference on Networked Sensing Systems. 27–34. DOI:
[24]
Matthias Keller, Matthias Woehrle, Roman Lim, Jan Beutel, and Lothar Thiele. 2011. Comparative performance analysis of the PermaDozer protocol in diverse deployments. In Proceedings of the 2011 IEEE 36th Conference on Local Computer Networks. 957–965. DOI:
[25]
Olaf Landsiedel, Federico Ferrari, and Marco Zimmerling. 2013. Chaos: Versatile and efficient all-to-all data sharing and in-network processing at scale. In Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems (SenSys’13). ACM, New York, NY, Article 1, 14 pages. DOI:
[26]
Koen Langendoen, Aline Baggio, and Otto Visser. 2006. Murphy loves potatoes: Experiences from a pilot sensor network deployment in precision agriculture. In Proceedings of the 20th IEEE International Parallel and Distributed Processing Symposium. 8. DOI:
[27]
Huang-Chen Lee and Kai-Hsiang Ke. 2018. Monitoring of large-area iot sensors using a LoRa wireless mesh network system: Design and evaluation. IEEE Transactions on Instrumentation and Measurement 67, 9 (2018), 2177–2187. DOI:
[28]
Chun-Hao Liao, Guibing Zhu, Daiki Kuwabara, Makoto Suzuki, and Hiroyuki Morikawa. 2017. Multi-hop LoRa networks enabled by concurrent transmission. IEEE Access (2017), 21430–21446. DOI:
[29]
Roman Lim, Reto Da Forno, Felix Sutton, and Lothar Thiele. 2017. Competition: Robust flooding using back-to-back synchronous transmissions with channel-hopping. In Proceedings of the 2017 International Conference on Embedded Wireless Systems and Networks (EWSN’17). 270–271. https://www.ewsn.org/file-repository/ewsn2017/270_271_lim.pdf.
[30]
Shan Lin, Fei Miao, Jingbin Zhang, Gang Zhou, Lin Gu, Tian He, John A. Stankovic, Sang Son, and George J. Pappas. 2016. ATPC: Adaptive transmission power control for wireless sensor networks. ACM Transactions on Sensor Networks 12, 1 (March 2016), Article 6, 31 pages. DOI:
[31]
Hendrik Linka, Michael Rademacher, Osianoh Glenn Aliu, and Karl Jonas. 2018. Path loss models for low-power wide-area networks: Experimental results using LoRa. In Proceedings of the VDE ITG-Fachbericht Mobilkommunikation Conference. 1–5.https://pub.h-brs.de/files/3707/2018-Path-Loss-Models-for-Low-Power-Wide-Area-Networks.pdf.
[32]
Fabian Mager, Dominik Baumann, Romain Jacob, Lothar Thiele, Sebastian Trimpe, and Marco Zimmerling. 2019. Feedback control goes wireless: Guaranteed stability over low-power multi-hop networks. In Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS’19). ACM, New York, NY, 97–108. DOI:
[33]
Michele Magno, Faycal Ait Aoudia, Matthieu Gautier, Olivier Berder, and Luca Benini. 2017. WULoRa: An energy efficient IoT end-node for energy harvesting and heterogeneous communication. In Proceedings of the Design, Automation, and Test in Europe Conference and Exhibition (DATE’17). IEEE, Los Alamitos, CA, 1528–1533. DOI:
[34]
Dinh Loc Mai and Myung Kyun Kim. 2020. Multi-hop LoRa network with pipelined transmission capability. In Ubiquitous Networking. Springer International Publishing, Cham, Switzerland, 125–135. DOI:
[35]
Samarth Mathur, Anand Sankar, Prajwal Prasan, and Bob Iannucci. 2017. Energy analysis of LoRaWAN technology for traffic sensing applications. In Proceedings of the Intelligent Transportation Society of America (ITS) World Congress, Vol. 29. https://ppms.cit.cmu.edu/media/project_files/v12403_-_as_Published.pdf.
[36]
Di Mu, Yunpeng Ge, Mo Sha, Steve Paul, Niranjan Ravichandra, and Souma Chowdhury. 2017. Adaptive radio and transmission power selection for Internet of Things. In Proceedings of the 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS’17). 1–10. DOI:
[37]
Moises Nunez Ochoa, Arturo Guizar, Mickael Maman, and Andrzej Duda. 2017. Evaluating LoRa energy efficiency for adaptive networks: From star to mesh topologies. In Proceedings of the 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking, and Communications (WiMob’17). 1–8. DOI:
[38]
Rajeev Piyare, Amy L. Murphy, Michele Magno, and Luca Benini. 2018. On-Demand LoRa: Asynchronous TDMA for energy efficient and low latency communication in IoT. Sensors 18, 11 (2018), 3718. DOI:
[39]
Benjamin Sartori, Steffen Thielemans, Maite Bezunartea, An Braeken, and Kris Steenhaut. 2017. Enabling RPL multihop communications based on LoRa. In Proceedings of the 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking, and Communications (WiMob’17). 1–8. DOI:
[40]
Semtech. 2019. SX1261/SX1262 Datasheet. Retrieved September 30, 2021 from https://www.semtech.com/products/wireless-rf/lora-core/sx1262.
[41]
Faisal Karim Shaikh, Sarang Karim, Sherali Zeadally, and Jamel Nebhen. 2022. Recent trends in Internet-of-Things-enabled sensor technologies for smart agriculture. IEEE Internet of Things Journal 9, 23 (2022), 23583–23598. DOI:
[42]
Muhammad Tahir, Nadeem Javaid, Adeel Iqbal, Zahoor Ali Khan, and N. Alrajeh. 2013. On adaptive energy-efficient transmission in WSNs. International Journal of Distributed Sensor Networks 9, 5 (2013), 10. DOI:
[43]
Roman Trüb. 2022. Design and Testing of Mixed-Range Low-Power Wireless Networks. Ph. D. dissertation. ETH Zurich. DOI:
[44]
Roman Trüb, Reto Da Forno, Markus Wegmann, Michael Keller, Andreas Biri, Tobias Gatschet, and Tobias Kuonen. 2021. Flora Software. Retrieved January 20, 2023 fromDOI:
[45]
Matteo Trobinger, Davide Vecchia, Diego Lobba, Timofei Istomin, and Gian Pietro Picco. 2020. One flood to route them all: Ultra-fast convergecast of concurrent flows over UWB. In Proceedings of the 18th Conference on Embedded Networked Sensor Systems (SenSys’20). ACM, New York, NY, 179–191. DOI:
[46]
Roman Trüb, Reto Da Forno, Lukas Sigrist, Lorin Mühlebach, Andreas Biri, Jan Beutel, and Lothar Thiele. 2020. FlockLab 2: Multi-modal testing and validation for wireless IoT. In Proceedings of the 3rd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things (CPS-IoTBench’20). DOI:
[47]
Yin Wang, Yuan He, Xufei Mao, Yunhao Liu, and Xiang-Yang Li. 2013. Exploiting constructive interference for scalable flooding in wireless networks. IEEE/ACM Transactions on Networking 21, 6 (2013), 1880–1889. DOI:
[48]
Samuel Weber, Jan Beutel, Reto Da Forno, Alain Geiger, Stephan Gruber, Tonio Gsell, Andreas Hasler, et al. 2019. A decade of detailed observations (2008–2018) in steep bedrock permafrost at the Matterhorn Hörnligrat (Zermatt, CH). Earth System Science Data 11, 3 (2019), 1203–1237. DOI:
[49]
Matthias Wilhelm, Vincent Lenders, and Jens B. Schmitt. 2014. On the reception of concurrent transmissions in wireless sensor networks. IEEE Transactions on Wireless Communications 13, 12 (2014), 6756–6767. DOI:
[50]
Dingwen Yuan, Michael Riecker, and Matthias Hollick. 2014. Making “glossy” networks sparkle: Exploiting concurrent transmissions for energy efficient, reliable, ultra-low latency communication in wireless control networks. In Wireless Sensor Networks. Springer International Publishing, Cham, Switzerland, 133–149. DOI:
[51]
Jin Zhang, Andreas Reinhardt, Wen Hu, and Salil S. Kanhere. 2015. RFT: Identifying suitable neighbors for concurrent transmissions in point-to-point communications. In Proceedings of the 18th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM’15). ACM, New York, NY, 73–82. DOI:
[52]
Peilin Zhang, Alex Yuan Gao, and Oliver Theel. 2017. Less is more: Learning more with concurrent transmissions for energy-efficient flooding. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous’17). ACM, New York, NY, 323–332. DOI:
[53]
Guibing Zhu, Chun-Hao Liao, Theerat Sakdejayont, I-Wei Lai, Yoshiaki Narusue, and Hiroyuki Morikawa. 2019. Improving the capacity of a mesh LoRa network by spreading-factor-based network clustering. IEEE Access 7 (2019), 21584–21596. DOI:
[54]
Guibing Zhu, Chun-Hao Liao, Makoto Suzuki, Yoshiaki Narusue, and Hiroyuki Morikawa. 2018. Evaluation of LoRa receiver performance under co-technology interference. In Proceedings of the 2018 15th IEEE Annual Consumer Communications and Networking Conference (CCNC’18). IEEE, Los Alamitos, CA, 1–7. DOI:

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet of Things
ACM Transactions on Internet of Things  Volume 4, Issue 2
May 2023
199 pages
EISSN:2577-6207
DOI:10.1145/3586022
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 13 April 2023
Online AM: 10 January 2023
Accepted: 14 December 2022
Revised: 09 October 2022
Received: 14 December 2021
Published in TIOT Volume 4, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Low-power
  2. multi-hop
  3. multi-modulations
  4. LSR
  5. IoT
  6. LoRa
  7. FlockLab
  8. wireless sensor network

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)699
  • Downloads (Last 6 weeks)91
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)FDLoRa: Tackling Downlink-Uplink Asymmetry with Full-duplex LoRa GatewaysProceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems10.1145/3666025.3699338(281-294)Online publication date: 4-Nov-2024
  • (2024)Processor-Sharing Internet of Things Architecture for Large-scale DeploymentProceedings of the 22nd ACM Conference on Embedded Networked Sensor Systems10.1145/3666025.3699333(211-224)Online publication date: 4-Nov-2024
  • (2024)Direct Antenna Multi-Modulation with Time-Modulated Arrays2024 IEEE International Symposium on Antennas and Propagation and INC/USNC‐URSI Radio Science Meeting (AP-S/INC-USNC-URSI)10.1109/AP-S/INC-USNC-URSI52054.2024.10687227(2273-2274)Online publication date: 14-Jul-2024
  • (2023)Enhancing LoRa Communication: A Comprehensive Review of Improvement Techniques2023 7th International Conference on System Reliability and Safety (ICSRS)10.1109/ICSRS59833.2023.10381139(507-512)Online publication date: 22-Nov-2023
  • (2023)Application of Websockets with PainlessMesh Topology to Monitor and Control Soil Moisture in Agricultural Land2023 10th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE)10.1109/ICITACEE58587.2023.10277530(377-382)Online publication date: 31-Aug-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media