Next Article in Journal
Using Augmented Reality and Internet of Things for Control and Monitoring of Mechatronic Devices
Next Article in Special Issue
Sensing-HH: A Deep Hybrid Attention Model for Footwear Recognition
Previous Article in Journal
Effective Data Selection and Management Method Based on Dynamic Regulation in Opportunistic Social Networks
Previous Article in Special Issue
Study of NVIS Channel for USN Protocol Definition in Antarctica
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

High-Performance Long Range-Based Medium Access Control Layer Protocol

1
College of Electronic Information Engineering, Inner Mongolia University, Hohhot 010021, China
2
School of Electronics and Computer Science, University of Southampton, Southampton SO171BJ, UK
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(8), 1273; https://doi.org/10.3390/electronics9081273
Submission received: 30 June 2020 / Revised: 4 August 2020 / Accepted: 4 August 2020 / Published: 7 August 2020
(This article belongs to the Special Issue Ubiquitous Sensor Networks)

Abstract

:
Long Range (LoRa) has become one of the most promising physical layer technologies for the Internet of Things (IoT) ecosystem. Although it manifests low-power consumption and long-distance communication, LoRa encounters a large number of collisions in the IoT environment, which severely affects the system’s throughput and delay performance. In this paper, a code division carrier sense multiple access (CD/CSMA) protocol that resolves the traditional channel collision problem and implements multi-channel transmission is proposed for the LoRa medium access control (MAC) layer. To reduce data transmission delay and maximize the throughput of the system, the adaptive p-persistent CSMA protocol divides the channel load into four states and dynamically adjusts the data transmission probability. Then, to reduce channel collisions significantly, the code division multiple access (CDMA) protocol is performed on different channel states. Moreover, the combination of the proposed adaptive p-persistent CSMA protocol and the CDMA successfully reduces the number of data retransmissions and makes LoRa more stable. The simulation results demonstrate that the proposed adaptive p-persistent CD/CSMA protocol can achieve near-optimal and occasionally even better performance than some conventional MAC protocols, especially in a heavy load channel.

1. Introduction

With the development of wireless sensor networks, the emergent Internet of Things (IoT) uses machines and networks to provide people with convenient services, such as health monitoring, environmental testing, smart appliances and so on. These services have created a new demand for wireless networks, so the improvement of performance of IoT systems has become an interesting topic of research. Long Range (LoRa) is a physical layer technology of Semtech [1,2], which has received widespread attention in recent years, mainly because of its long-range communication coverage and low-power requirements as well as the availability of modulation/demodulation hardware [3].
Similar to the medium access control (MAC) layer protocol of LoRa, Long Range Wide Area Network (LoRaWAN) is an emerging low-complexity protocol for wireless communication in the unlicensed spectrum using LoRa modulation [4,5]. It is also considered to be one of the most promising wireless technologies for IoT because of the low complexity, the low power consumption equipment, and its open business model [6,7]. LoRaWAN specifications propose interesting solutions regarding MAC layer operations to deliver the best communication performance to connected things despite its crucial impact on the overall performance. Nevertheless, the LoRaWAN MAC layer has not been sufficiently considered by research studies [8,9]. Currently, the most widely used protocols in the LoRaWAN MAC layer are ALOHA and carrier sense multiple access (CSMA) [10]. Compared with traditional ALOHA, a data collision avoidance algorithm (CD-ALOHA) which increases system throughput was proposed in [11]. However, the CD-ALOHA algorithm cannot adjust the transmission probability of nodes according to different channel states, and will result in weak robustness of the system. Due to its distributed nature and inherent flexibility, the CSMA-type protocol has been the basis of many MAC communication standards that are based on random access. With the help of carrier sensing, they can provide variable packet length and significantly outperform the pioneering ALOHA-type protocols [12]. In [13], investigation has been indicated a carrier sense mechanism can be adapted to decrease collisions in LoRa transmissions. Additionally, a CSMA protocol has been proposed, which is capable of handling both short and long messages, as well as being adapted to LoRa networks. Further, by adapting the throughput and power consumption needs of each link, a new CSMA scheme that combines both throughput optimality and energy efficiency has been studied in [14]. In [15], the cooperative control feedback scheme has been examined to help senders discern false collision, which is caused by the rendezvous desynchronization problem whilst avoiding back-off misbehavior.
According to the control strategy, the CSMA protocols can be divided into non-persistent CSMA, 1-persistent CSMA, and p-persistent CSMA [16]. Recently, some studies mainly focused on the evaluation of the p-persistent CSMA to evaluate the scalability of LoRaWAN and improve the packet reception ratio [17,18]. In [17], a novel protocol called p persistent-channel activity recognition multiple access (p-CARMA) was presented to improve the scalability of LoRaWAN by manifolds, which can serve thousands of devices per gateway. In [18], the persistent-carrier sense multiple access (p-CSMA) MAC protocol was exploited to increase the packet reception rate when sending uplink messages. Nevertheless, it is worth noting that since the value of p is low, there are many terminal devices that delay transmission may result in insufficient channel utilization. The authors investigated the use of adaptive p-persistent CSMA scheme for long term evolution in unlicensed (LTE-U) bands in [19], however, only specific traffic and load condition was considered, which is unable to provide a flexible trade-off between the system overall throughput performance and the network offered traffic or the channel load when the deployment varies. Although the accessing unlicensed band probability of LTE-U is dynamically changed with the interference measurements, the system’s anti-interference capability still needs to be improved. To begin with, the p-persistent CSMA (from the standpoint of maximum throughput) can be regarded as the boundary closely approximated by the performance of many CSMA-type protocols, if the p-value is selected to guarantee that the same average back-off interval is used. Then, because of its memoryless nature, it is analytically tractable. Furthermore, because the p-persistent CSMA simply allows the user to begin a packet transmission with a common probability p, whenever this user has sensed idle channels, it is well suited for implementation. The stable region of such a system with N users has been investigated in [20], where it has been shown that the necessary and sufficient condition of the system stability, in terms of the existence of queue stabilizing, is a transmission probability. It is assumed that N users have their own arrival rate and transmission probability, and the system has non-zero sensing times. However, this system uses a fixed probability to transmit data packets, which will make the system channel utilization insufficient with changing load. Another case that has been considered in [21] is a multiple access system with multiple-packet reception capability that formulates the generalized p-persistent CSMA as a parameterized Markov decision process, in which the characteristics of such CSMA are modeled and transmission probabilities are designed to achieve maximum throughput. However, it has been proved that there are scalability problems in distributed wireless networks. A new collision-free hybrid medium access control protocol is proposed in [22] for distributed multi-channel networks, which uses time division multiple access (TDMA) technique to avoid the collision at cost of additional delay. Since the LoRaWAN MAC layer does not provide a listen-before-talk (LBT) mechanism, a custom MAC layer was proposed in [23] with LBT-based CSMA for collision avoidance. Although it has a satisfying performance in small sensor networks, it is not capable of extending to large networks. As explained in [24], LoRa has unavoidably experienced too many collisions that significantly reduce the average throughput and increase time delay in large-scale IoT environments. The throughput and delay performance determine whether an IoT system can be effectively applied in practice. Therefore, it is necessary to improve the throughput and reduce the delay of conventional LoRa MAC layer.
In this paper, we propose an adaptive p-persistent CD/CSMA MAC layer protocol algorithm for improving the performance of the LoRa protocol. Then, we set different levels of the network offered traffic and divide the channel load into four states in the LoRa module to further maximize the overall throughput and improve the robustness of the system. According to the load size, the value of p will be dynamically adjusted to reduce the load of the network in each condition. Compared with some existing p-persistent CSMA based schemes, the code division multiple access (CDMA) technology is introduced into the adaptive p-persistent scheme. Further, the orthogonal spread spectrum code is embedded to realize CDMA transmission for enhancing the system’s anti-interference capability. Ultimately, we use OPNET to construct LoRa nodes and build a network topology that simulates actual conditions for simulation experiments. The simulation results verify that the proposed adaptive p-persistent CD/CSMA protocol has better performance than the traditional adaptive p-persistent scheme without CDMA protocol under the same conditions and can further reduce channel collision rate.
The rest of the paper is organized as follows. Section 2 describes the conventional p-persistent CSMA protocol. In Section 3, we elaborate the proposed adaptive p-persistent CD/CSMA protocol. Section 4 involves the simulation model design and the results. Finally, the conclusions are presented in Section 5.

2. Conventional p-Persistent CSMA Protocol

Some of the related terms and the time structure of the p-persistent CSMA are shown in Figure 1. Time is slotted in the p-persistent CSMA protocol. The size of the slot is a which is the normalized propagation delay, and all transmissions start at the beginning of each time slot with a packet length equal to t. It is always assumed that the length of each transmission period (TP) is T, i.e., if the secondary station (STA) sends packets at time T = 0 , all the other STAs should wait until T = t + a (where a is the propagation delay as mentioned previously). When an STA sends a packet, it first senses the channel and then checks it. If the channel is busy, STA insists on sensing the next slot. If the channel is idle, STA sends data with probability p and is delayed for the next slot with probability ( 1 p ) . This process will loop until the data packet is sent out. Since the transmission is deferred with probability ( 1 p ) even the channel is detected idle, there exists a silent period between two TPs which is called initial random transmission delay (IRTD) [25,26].
Figure 2 shows the conventional p-persistent CSMA algorithm that uses a time slot media access control method [19]. When the node detects that the channel is idle, it will generate a Bernoulli random variable x with the mean of p. When x = 1 , the node will start sending packets.
All packets from all STAs are modelled as a single Poisson process, providing a load G for mathematical simplicity [27]. The system throughput is defined as the number of successful transmitted bits per unit time by using probabilistic analysis and renewal theory and is presented by Equation (1) below:
S = 1 e a G R c 1 e a G a t ¯ 1 π 0 + a t ¯ π 0 + a + 1 + a π 0 ,
where t ¯ is the duration of the IRTD before the first TP, t ¯ is the duration of the IRTD before other TPs and π 0 is the probability that no packet arrives during a TP. R c represents the average throughput over the channel fading statistics which is given by the following equation:
R c = R o n = 1 π n P s ( n ) ,
where R o is the ergodic capacity of a single transmission and π n is given by
π n = e ( 1 + a ) G ( 1 + a ) G n n ! .
P s ( n ) represents the probability of transmitting a data packet without any collision in the presence of n STAs successfully. It can be expressed as
P s ( n ) = n p ( 1 p ) n 1 1 ( 1 p ) n .
The above formulas indicate that the selection of the probability p should be based on the load G so that we can obtain the optimal system throughput. Generally, it is suitable to choose a large p value when the traffic is low; on the contrary, a small p should be selected. However, once p is selected, it is difficult to change, if it does not match the traffic, there will be channel collision, high delay, or low channel utilization.

3. Proposed Adaptive p-Persistent CD/CSMA Protocol

According to the different load status of the channel, the conventional p-persistent CSMA protocols mentioned above are not able to properly select the transmission probability p and are also limited owing to utilizing single channel communication. When the channel load is heavy, a series of challenging problems are encountered in practice, such as channel conflicts problem. Therefore, to solve the heavy load problem, we propose an adaptive p-persistent CD/CSMA protocol, in which the CDMA protocol is introduced to further improve the system throughput.

3.1. CDMA Protocol

The core of the CDMA protocol is spread spectrum, i.e., modulation with a pseudo-random code sequence whose bandwidth is much larger than the signal bandwidth, so that the bandwidth of the original signal is expanded and then modulated by the carrier and transmitted [28]. The CDMA spread spectrum model is shown in Figure 3. The signal a ( t ) is encoded by an encoder to become signal b ( t ) , and then modulated with a spreading code through spread spectrum modulation. RF modulation is performed with a carrier signal u ( t ) . The signal received by the receiver is given by the following equation:
s ( t ) = b ( t ) c ( t ) cos [ w c t + φ ( t ) ] + n ( t ) ,
where n ( t ) is the sum of all kinds of noise. The receiver uses the coherent carrier to demodulate the composite signal as given in Equation (6):
z ( t ) = s ( t ) u ( t ) = { b ( t ) c ( t ) cos [ w c t + φ ( t ) ] + n ( t ) } cos [ w c t + φ ( t ) ] = 1 2 b ( t ) c ( t ) { 1 + cos [ 2 w c t + 2 φ ( t ) ] } + n ( t ) cos [ w c t + φ ( t ) ] .
After multiplying by c ( t ) to complete the despreading process, baseband filtering and decoding are performed to obtain the information from the transmitter.
In order to improve performance, the most important problem is how to choose the spread spectrum code. The terminal hardware battery is small and cannot be replaced, which results in the inability to install chips with strong computing power. Hence, if the spread spectrum code order is too large, it may cause terminal overload. By contrast, if the order of spread spectrum code is too small and the total amount of users is larger than the total amount of orthogonal spread code, a large number of users will share a certain spread spectrum code. In this case, the purpose of distinguishing users by the code cannot be achieved. Thus, we will choose the appropriate spread spectrum code order using theoretical analysis.
If a node sends a packet successfully at time t 0 , during the 2 T time from t 0 T to t 0 + T , there is no node that uses the same spread spectrum code to send data. If there are terminals transmitting signals at the same time in 2 T time, the probability that the i-th terminal and the other k 1 terminals do not use the same spread spectrum code is given by [11]
P ( k ) = x = 0 M 1 P i ( x ) [ 1 P i ( x ) ] k 1 = ( 1 1 M ) k 1 ,
where M is the order of the selected orthogonal spreading code.
During this 2 T time, the probability of k terminals transmitting simultaneously is
P ( x = k ) = λ k e λ k ! , λ = 2 G ,
where G is the channel load. Then, the data frames sent successfully are equal to
2 S = k = 0 k P ( k ) P ( x = k ) = 2 G e 2 G k = 0 ( 2 G M 1 M ) k 1 ( k 1 ) ! .
The average number of retransmissions for a data frame is given by
N = G S 1 = e 2 G M 1 .
Additionally, the normalized average delay is
D = 1 + ( e 2 G M 1 ) m + 1 2 ,
where m is the m-th spreading code.
LoRa is a modulation technology in which the secondary spread spectrum mechanism is formed by embedding CDMA into a LoRa node again. In this paper, the LoRa spread spectrum mechanism is used directly and exploits the six original spread spectrum factors. The optional order of the spreading code M is generally between 1 and 16. With increasing M, the transmission distance will increase, and then the data transmission rate will be decreased. Therefore, in order to balance the system data transmission rate and guarantee enough transmission distance between nodes, the order of the spreading code is set to M = 5 .

3.2. Adaptive p-Persistent CSMA Protocol

In the theoretical model, we assume that the system contains n nodes, which continuously send packets and compete for a link at the same time, so the channel will be busy. Besides, the data frames of all end nodes are sent at the same rate. Finally, the link is an ideal channel without other unrelated signals and noise interference. Assuming that a stable network has n end nodes and the transmission probability of an end node is p i , the probability of collision p c can be expressed as
p c = 1 ( 1 p i ) n 1 , p i ( 0 , 1 ) .
Then, the probability of at least one terminal being sent within the observed slot is
p t r = 1 ( 1 p i ) n .
Furthermore, the probability that one of the nodes will successfully send is
p b = n p i ( 1 p i ) p t r n 1 = n p i ( 1 p i ) n 1 1 ( 1 p i ) n .
Equations (10)–(14) show that the number of end nodes n and their transmission probability p i will affect the collision probability p c and transmission success probability p b . The propagation delay can be significantly optimized by reducing the number of channel transmission collisions and collision probability.
The contention window model of different end nodes can be expressed as
S 1 : S 2 : S i max = p 1 p 1 1 p 1 1 p 1 : p 2 p 2 1 p 2 1 p 2 : p i max p i max 1 p i max . 1 p i max .
The throughput of the ( i + 1 ) -th end node can be calculated as in Equation (16),
S i + 1 = S i p i + 1 1 p i S i p i + 1 1 p i p i 1 p i + 1 . p i 1 p i + 1 .
The normalized throughput of the system is given by
S i = p b p t r E P 1 p t r σ + p b p t r T s + p t r 1 p b T c ,
where p b p t r E [ P ] represents the average payload successfully received by the receiver in a time slot, and ( 1 p t r ) σ + p b p t r T s + p t r ( 1 p b ) T c is the length of the transmission time slot. P is the payload information sent in a time slot and E [ P ] is the average value of P. In addition, T s is the average time for data to successfully reach the destination node, T c is the time of experiencing a collision in the process of data transmission, and σ is the length of the free time slot. Because the effective data frame length is the same, the system throughput is inversely proportional to the length of idle time slot. The total throughput of all stations can be calculated as
S = i = 1 i max S i .
The channel load is predicated on the premise of the advantages of CSMA being preserved. When the network is at the light load state, the traditional protocol is used to minimize the delay of media access. When the network is overloaded, the probability of sending data is reduced owing to the increase in the number of conflicts.
Table 1 shows the differences of the proposed p-persistent CD/CSMA protocol and some existing protocols. Figure 4 shows the flow chart of proposed adaptive p-persistent CD/CSMA protocol that is used to resolve channel conflicts. The system first monitors the channel before sending the data frame because it is necessary to assess the channel state and set the random transmission probability p i . The network load is divided into the following four cases based on the collection and analysis of the above network state parameters, i.e., the light load, the moderate load, the heavier load, and the heaviest load. When the current transmission back-off times are N p 4 , the system is at the light load and we let p i = 1 . When N p > 4 and the number of last transmission back-off is N p N l , the system is at the moderate load and we let p i = 2 p i . When 4 < N p < N l < 8 , the system is at the heavier load and p i = p i / 2 . If the current transmission back-off times are N p > 4 and N l > 8 , the current channel state is at the heaviest load and p i = p i / 3 . According to the different load conditions, we can dynamically adjust the p i value. Additionally, with the load of channel increasing, the number of transmission data conflicts R increases whereas the transmission probability p i = 1 / R will decrease. Therefore, the near-optimal p i value can be ascertained by simulation. Finally, if the channel data are not transmitted successfully, the system will enter a new waiting state.

4. Simulation Results

In this section, to evaluate the effectiveness and scalability of the proposed p-persistent CD/CSMA protocol, the simulation experiments were conducted by using the OPNET Modeler14.5 and NS-3. When building the network topology structure, it was assumed that all of the nodes were distributed in a square area, and the sink node was located at the center of the area. Then the node layer and MAC layer model were deployed in detail. After a brief description of the deployment scenario, simulation results are presented and discussed in detail.
In the simulations, each channel of the LoRa network had a bandwidth of 125 kHz. We set the packet inter-arrival time (i.e., traffic) parameters for the experiment, which were Poisson (60), Poisson (30), Poisson (10), Poisson (5), and Poisson (3), respectively. The packet sizes were sorted in ascending order by Constant (64), Constant (128) and Constant (256).

4.1. Network Topology

Firstly, the model performed within the range of 6 km × 6 km in the OPNET simulative scene. The scenario involved 230 terminals that communicate with one sink. The centre of the simulation scene is a sink node and the others are terminal nodes. Each edge of the model contained 40 terminals, and each terminal was 100 m apart. The arrangement of nodes is shown in Figure 5.

4.2. Physical Layer

The physical layer mainly configures the parameters both of the transmitter and receiver. In order to accurately reflect the characteristics of LoRa, the peak data transmission rate, channel bandwidth and the lowest frequency of data transmission were set in the transmitter and receiver. The channel bandwidth of the transmitter and receiver were set to 125 kHz in the simulation, and the maximum channel rate was 5 kbps. Moreover, the range of the LoRa frequency band was 470–518 MHz by default, so the minimum frequency of the transceiver was set to 470 MHz. The channel model mainly adopts the free space propagation model in OPNET.

4.3. Node Layer Model

The object-oriented simulation method is used in OPNET, with all nodes changed on the basis of the same model. In this subsection, we divide the nodes into four layers from bottom to top, as shown in Figure 6.
The application layer consisted of the Source model and the Sink model. The Source model mainly customized different transmission time slots, produced different size packets, and simulated the Poisson process [29,30]. The function of the Sink model was to destroy the packets, which were delivered to the destination node and count the throughput and packet loss rate of the system before their destruction. The network layer controls the routing function of users when sending data. It also drives the MAC model to complete the networking process of the wireless ad hoc network, which initiates the initialization of the network and transmits data packets generated by the application layer. The MAC layer was based on the IEEE802.15.4g communication rules to control how to select wireless communication links when transmitting information [31,32]. The MAC layer protocol of LoRa supports CSMA and conflict avoidance technology [33,34]. The physical layer was composed of two models; the wireless receiver and the wireless transmitter, as shown in Figure 6.

4.4. MAC Process Model

The main innovations of our proposed LoRa module are in MAC layer. The proposed adaptive p-persistent CD/CSMA protocol that is used in MAC layer to resolve channel conflicts. The CDMA spread spectrum protocol enables packets to realize wireless channel transmission on multiple channels. The MAC process model is shown in Figure 7. The Idle state is an interrupt state that detects the channel before sending packet data. When the channel is idle, it is transferred to the Wt_free state machine. Inversely, when the channel is busy, the idle state automatically turns to the Defer_0 state. Irrespective of the state the packet is transferred to, it will be given a random transmission probability p i . The random p i value was compared with the set p i value size, and the back-off algorithm was performed when the random value was less than the set value. Otherwise, the channel will enter the Wt_free state.

4.5. Simulation Results

To evaluate link performance, the system overall throughput and the packet reception rate (PRR) both served as metrics. The system overall throughput S can be obtained as S = L P r [35], where L denotes the network offered traffic and P r denotes the PRR. In this context, adopting the system overall throughput as a metric not only can evaluate system performance from the ratio between the number of successfully received packets and the total number of sent packets, but also can deploy different levels of the network offered traffic to further maximize the overall throughput of the system and achieve very competitive performance in various system settings. Thus, we consider the scenarios of different traffic and loads and evaluate the performance in terms of system throughput and delay.
To validate the effectiveness of the adaptive p-persistent CSMA protocol, we compare the existing Class A, ALOHA, conventional p-persistent CSMA, and adaptive p-persistent CSMA protocols. The simulation parameters are presented in Table 2. It can be seen from Figure 8 that the throughput of the 0.5-persistent CSMA protocol is higher than that of 1-persistent CSMA and 0.1-persistent CSMA protocols about 100 and 160 bits/s, respectively. This is due to traffic not being spread equally on the channels for high traffic that causes more serious channel collisions. As the limits of the adaptive p-persistent CSMA protocol are much closer to being optimal, the load is spread more uniformly over the channels at high traffic. Thus, we see a drop in collision rate and increased throughput by using the adaptive p. For this reason, the average throughputs of Class A and ALOHA protocols are far much lower than that of the adaptive p-persistent CSMA protocol. In conclusion, the adaptive p-persistent CSMA protocol can achieve a better system performance than other p-persistent CSMA protocols without adaptive p. Moreover, to make the comparison results more intuitive, a summary table has been added at the end of this section. As demonstrated in Table 3, our protocol can achieve higher throughput, lower latency than the others when the deployments of the network offered traffic or the channel loads varies, which is of great significance for diverse practical applications.
We investigate the impact of duty-cycled transmissions at the end device and the system throughput implemented on NS-3. The NS-3 LoRaWAN module is an extension of the NS-3 module for the low power wide area network. The collision model used in the NS-3 module is based on the capture effect. The LoRaWAN physical layer and MAC layer components are running over each LoRa device and the gateway. The physical layer of each device interacts with that of the respective gateway via the NS-3 spectrum physical module, implementing the devices air interface and channel-specific parameters. More specifically, in the physical layer, which includes the sender and receiver, the bandwidth is 125 kHz, the coding rate is 4/5, the order of spread spectrum code is 6, the peak data transmission rate is 5468 bps/s, and the frequency band is 868 MHz. In this case, a duty cycle of 1% [35] is beneficial for the system because it limits traffic and hence collisions, thus providing a higher throughput than the system without duty cycle restrictions. Figure 9 shows a comparison of the system throughput of the proposed protocol for a given value of the network offered traffic and different loads. It can be seen from the simulation results that for a given value of traffic, a higher load can obtain better system overall throughput in the condition of fulfilling the duty cycle requirements.
Figure 10 shows the average throughput of the proposed adaptive p-persistent CD/CSMA and the adaptive p-persistent CSMA without CDMA protocols for different traffic and loads. The average throughput of the proposed adaptive p-persistent CD/CSMA protocol is significantly improved by approximately 3000 bits/s compared with the adaptive p-persistent CSMA without the CDMA protocol for the scenario of high traffic and load. In the case of low traffic and load, although the average throughput of the two protocols is close to each other after stabilization, the proposed protocol is also superior to that of the adaptive p-persistent CSMA without CDMA protocol. Therefore, the proposed protocol significantly outperforms the adaptive p-persistent CSMA without CDMA protocol.
Figure 11 shows a comparison of the system delay between the proposed protocol and the adaptive p-persistent CSMA without CDMA protocol for high traffic channel and different loads. The simulation results indicate that the proposed adaptive p-persistent CD/CSMA protocol delivers lower delay even at Poisson (5) of packet inter-arrival time than the adaptive p-persistent CSMA without CDMA protocol. Moreover, when higher load is taken into account, it can be seen that the adaptive p-persistent CSMA protocol has a very high collision rate.
Figure 12 shows the average throughput in terms of the proposed adaptive p-persistent CD/CSMA protocol and adaptive p-persistent CSMA without CDMA protocol for different traffic and high load. The curve of the highest average throughput for the adaptive p-persistent CSMA protocol is Poisson (10), which is superior to the average throughput of Poisson (5) and Poisson (3). Normally, when the system traffic increases for the adaptive p-persistent CSMA protocol, the average throughput should increase as well, but the average throughput of Poisson (5) and Poisson (3) do not increase. This occurs because the channel for this protocol is saturated. On the contrary, the proposed adaptive p-persistent CD/CSMA protocol has the highest average throughput of Poisson (3), which exceeds approximately 3300 bits/s compared with the adaptive p-persistent CSMA protocol. It has been verified that the CDMA protocol is able to decrease collided frames efficiently and reduce the number of retransmission. Therefore, the proposed protocol could be used in cases of high traffic and load to resolve the channel collision problem.

5. Conclusions

In this paper, we propose an adaptive p-persistent code division carrier sense multiple access (CD/CSMA) protocol for a LoRa network service with high real-time data and throughput requirements. First, we develop a method to select an appropriate throughput for the p-CSMA protocol under high traffic. Then, according to various load conditions, we propose to use an adaptive p-algorithm to divide the network into four states and dynamically adjust the sending probability for these load states. Furthermore, we utilize the idea of the code division multiple access protocols to embed orthogonal spread spectrum code to achieve code division multi-channel transmission and enhance the system’s anti-interference capability. The simulation results demonstrate that the proposed method outperforms the conventional CSMA protocol in terms of both system throughput and traffic delay. Consequently, the proposed adaptive p-persistent CD/CSMA protocol holds great potential for application in LoRaWAN.

Author Contributions

The algorithms proposed in this paper have been conceived by Y.L., L.L. and X.L. Y.L., X.L., H.Z. and L.L. designed the experiments. L.L., J.L., J.C. and H.Z. performed the experiments and analyzed the results. Y.L. and X.L. wrote the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under grant 61461036 and 61701263, and is supported in part by the Program for Young Talents of Science and Technology in Universities of Inner Mongolia Autonomous Region under Grant NJYT-20-A11, and in part by the Natural Science Foundation of Inner Mongolia Autonomous Region under Grant 2019MS06033.

Conflicts of Interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Abbreviations

The following abbreviations are used in this manuscript:
LoRaLong Range
IoTInternet of Things
CD/CSMACode division carrier sense multiple access
MACMedium access control
LoRaWANLong Range Wide Area Network
CSMACarrier sense multiple access
TDMATime division multiple access
CDMACode division multiple access
TPTransmission period
STAStation
IRTDInitial random transmission delay
LBTListen-before-talk
p-CARMAPersistent-channel activity recognition multiple access
p-CSMAPersistent-carrier sense multiple access
LTE-ULong term evolution in unlicensed
PRRPacket reception rate

References

  1. Leonardi, L.; Battaglia, F.; Lo Bello, L. RT-LoRa: A medium access strategy to support real-time flows over LoRa-based networks for industrial IoT applications. IEEE Internet Things J. 2019, 6, 10812–10823. [Google Scholar] [CrossRef]
  2. Elshabrawy, T.; Robert, J. Interleaved chirp spreading LoRa-based modulation. IEEE Internet Things J. 2019, 6, 3855–3863. [Google Scholar] [CrossRef]
  3. Shanmuga Sundaram, J.P.; Du, W.; Zhao, Z. A survey on LoRa networking: Research problems, current solutions, and open issues. IEEE Commun. Surv. Tuts. 2020, 22, 371–388. [Google Scholar] [CrossRef] [Green Version]
  4. Elshabrawy, T.; Robert, J. Capacity planning of LoRa networks with joint noise-limited and interference-limited coverage considerations. IEEE Sens. J. 2019, 19, 4340–4348. [Google Scholar] [CrossRef]
  5. Zhou, Q.; Zheng, K.; Hou, L.; Xing, J.; Xu, R. Design and implementation of open LoRa for IoT. IEEE Access 2019, 7, 100649–100657. [Google Scholar] [CrossRef]
  6. Lee, H.; Ke, K. Monitoring of large-area IoT sensors using a LoRa wireless mesh network system: Design and evaluation. IEEE Trans. Instrum. Meas. 2018, 67, 2177–2187. [Google Scholar] [CrossRef]
  7. Marais, J.M.; Abu-Mahfouz, A.M.; Hancke, G.P. A survey on the viability of confirmed traffic in a LoRaWAN. IEEE Access 2020, 8, 9296–9311. [Google Scholar] [CrossRef]
  8. Xu, W.; Jha, S.; Hu, W. LoRa-key: Secure key generation system for LoRa-based network. IEEE Internet Things J. 2019, 6, 6404–6416. [Google Scholar] [CrossRef]
  9. Doroshkin, A.A.; Zadorozhny, A.M.; Kus, O.N.; Prokopyev, V.Y.; Prokopyev, Y.M. Experimental study of LoRa modulation immunity to Doppler effect in CubeSat radio communications. IEEE Access 2019, 7, 75721–75731. [Google Scholar] [CrossRef]
  10. Sørensen, R.B.; Kim, D.M.; Nielsen, J.J.; Popovski, P. Analysis of latency and MAC-layer performance for class a LoRaWAN. IEEE Wirel. Commun. Lett. 2017, 6, 566–569. [Google Scholar] [CrossRef] [Green Version]
  11. Hu, H.; Hui, Y. Study on ALOHA anti-collision algorithm based on LoRa for internet of things. In Proceedings of the 2018 3rd International Conference on Smart City and Systems Engineering (ICSCSE), Xiamen, China, 29–30 December 2018; pp. 652–654. [Google Scholar]
  12. Wu, Y.; He, Y.; Shi, L. Energy-saving measurement in LoRaWAN-based wireless sensor networks by using compressed sensing. IEEE Access 2020, 8, 49477–49486. [Google Scholar] [CrossRef]
  13. Pham, C. Robust CSMA for long-range LoRa transmissions with image sensing devices. In Proceedings of the 2018 Wireless Days (WD), Dubai, UAE, 3–5 April 2018; pp. 116–122. [Google Scholar]
  14. Maatouk, A.; Assaad, M.; Ephremides, A. Energy efficient and throughput optimal CSMA scheme. IEEE ACM Trans. Netw. 2019, 27, 316–329. [Google Scholar] [CrossRef] [Green Version]
  15. Liu, Q.; Lu, Y.; Hu, G.; Lv, S.; Wang, X.; Zhou, X. Cooperative control feedback: On backoff misbehavior of CSMA/CA MAC in channel-hopping cognitive radio networks. J. Commun. Netw. 2018, 20, 523–535. [Google Scholar]
  16. Zhang, Y.; Zhang, M.; Lo, Y.; Wong, W.S. Protocol sequences with carrier sensing for wireless sensor networks. IEEE Internet Things J. 2018, 5, 905–916. [Google Scholar] [CrossRef]
  17. Kouvelas, N.; Rao, V.S.; Venkatesha Prasad, R.R.; Tawde, G.; Langendoen, K. p-CARMA: Politely scaling LoRaWAN. In Proceedings of the International Conference on Embedded Wireless Systems and Networks (EWSN), Lyon, France, 1 February 2020; pp. 25–36. [Google Scholar]
  18. Kouvelas, N.; Rao, V.S.; Venkatesha Prasad, R.R. Employing p-CSMA on a LoRa network simulator. arXiv 2018, arXiv:1805.12263. [Google Scholar]
  19. Jia, B. An adaptive p-persistent CSMA scheme for LTE in unlicensed bands. In Proceedings of the 2015 International Conference on Wireless Communications & Signal Processing (WCSP), Nanjing, China, 15–17 October 2015; pp. 1–5. [Google Scholar]
  20. Seo, J.; Jin, H. Stability region of p-persistent CSMA systems. IEEE Commun. Lett. 2017, 21, 652–655. [Google Scholar] [CrossRef]
  21. Zhang, Y.; Gong, A.; Lo, Y.; Li, J.; Shu, F.; Wong, W.S. Generalized p-persistent CSMA for asynchronous multiple-packet reception. IEEE Trans. Commun. 2019, 67, 6966–6979. [Google Scholar] [CrossRef]
  22. Zhang, J.; Hu, Z.; Xiong, Y.; Ning, G. A collision-free hybrid MAC protocol based on pipeline parallel transmission for distributed multi-channel underwater acoustic networks. Electronics 2020, 9, 679. [Google Scholar] [CrossRef]
  23. Germani, L.; Mecarelli, V.; Baruffa, G.; Rugini, L.; Frescura, F. An IoT architecture for continuous livestock monitoring using LoRa LPWAN. Electronics 2019, 8, 1435. [Google Scholar] [CrossRef] [Green Version]
  24. Feltrin, L.; Buratti, C.; Vinciarelli, E.; Bonis, R.D.; Verdone, R. LoRaWAN: Evaluation of link- and system-level performance. IEEE Internet Things J. 2018, 5, 2249–2258. [Google Scholar] [CrossRef]
  25. Cano-Ortega, A.; Sánchez-Sutil, F.J. Monitoring of the efficiency and conditions of induction motor operations by smart meter prototype based on a LoRa wireless network. Electronics 2019, 8, 1040. [Google Scholar] [CrossRef] [Green Version]
  26. Pan, P.; Yang, L. Spatially modulated code-division multiple-access for high-connectivity multiple access. IEEE Trans. Wirel. Commun. 2019, 18, 4031–4046. [Google Scholar] [CrossRef]
  27. Wang, Y.; Xia, Y. I-CSMA: A link-scheduling algorithm for wireless networks based on Ising model. IEEE Trans. Control Netw. Syst. 2018, 5, 1038–1050. [Google Scholar] [CrossRef]
  28. Magrin, D.; Capuzzo, M.; Zanella, A. A thorough study of LoRaWAN performance under different parameter settings. IEEE Internet Things J. 2020, 7, 116–127. [Google Scholar] [CrossRef] [Green Version]
  29. Baek, H.; Lim, J. Time mirroring based CSMA/CA for improving performance of UAV-relay network system. IEEE Syst. J. 2019, 13, 4478–4481. [Google Scholar] [CrossRef]
  30. Liu, S.; Fu, L.; Xie, W. Hidden-node problem in full-duplex enabled CSMA networks. IEEE. Trans. Mob. Comput. 2020, 19, 347–361. [Google Scholar] [CrossRef]
  31. Nafar, F.; Shamsi, H. Design and implementation of an RFID-GSM-based vehicle identification system on highways. IEEE Sens. J. 2018, 18, 7281–7293. [Google Scholar] [CrossRef]
  32. Shoaei, A.D.; Derakhshani, M.; Le-Ngoc, T. Efficient LTE/Wi-Fi coexistence in unlicensed spectrum using virtual network entity: Optimization and performance analysis. IEEE Trans. Commun. 2018, 66, 2617–2629. [Google Scholar] [CrossRef] [Green Version]
  33. Choi, H.; Lee, I.; Lee, H. Delay analysis of carrier sense multiple access with collision resolution. J. Commun. Netw. 2015, 17, 275–285. [Google Scholar]
  34. Zou, L.; Wen, T.; Wang, Z.; Chen, L.; Roberts, C. State estimation for communication-based train control systems with CSMA protocol. IEEE Trans. Intell. Transp. Syst. 2019, 20, 843–854. [Google Scholar] [CrossRef]
  35. Magrin, D.; Centenaro, M.; Vangelista, L. Performance evaluation of LoRa networks in a smart city scenario. In Proceedings of the International Conference on Communications (ICC), Paris, France, 21–25 May 2017; pp. 1–7. [Google Scholar]
Figure 1. Time structure of conventional p-persistent carrier sense multiple access (CSMA).
Figure 1. Time structure of conventional p-persistent carrier sense multiple access (CSMA).
Electronics 09 01273 g001
Figure 2. Flow chart of the conventional p-persistent CSMA scheme.
Figure 2. Flow chart of the conventional p-persistent CSMA scheme.
Electronics 09 01273 g002
Figure 3. Code division multiple access (CDMA) spread spectrum model.
Figure 3. Code division multiple access (CDMA) spread spectrum model.
Electronics 09 01273 g003
Figure 4. Flow chart of the proposed adaptive p-persistent code division (CD)/CSMA protocol.
Figure 4. Flow chart of the proposed adaptive p-persistent code division (CD)/CSMA protocol.
Electronics 09 01273 g004
Figure 5. Arrangement of nodes.
Figure 5. Arrangement of nodes.
Electronics 09 01273 g005
Figure 6. Node layer model.
Figure 6. Node layer model.
Electronics 09 01273 g006
Figure 7. Medium access control (MAC) processes model.
Figure 7. Medium access control (MAC) processes model.
Electronics 09 01273 g007
Figure 8. Average throughput of different protocols for high traffic and general load.
Figure 8. Average throughput of different protocols for high traffic and general load.
Electronics 09 01273 g008
Figure 9. Throughput for a given value of traffic and different loads.
Figure 9. Throughput for a given value of traffic and different loads.
Electronics 09 01273 g009
Figure 10. Average throughput of different protocols. (a) High traffic and load. (b) Low traffic and load.
Figure 10. Average throughput of different protocols. (a) High traffic and load. (b) Low traffic and load.
Electronics 09 01273 g010
Figure 11. System delay of high traffic and different loads. (a) The adaptive p-persistent CD/CSMA protocol. (b) The adaptive p-persistent CSMA protocol.
Figure 11. System delay of high traffic and different loads. (a) The adaptive p-persistent CD/CSMA protocol. (b) The adaptive p-persistent CSMA protocol.
Electronics 09 01273 g011
Figure 12. Average throughput of different protocols for different traffic and high load. (a) The adaptive p-persistent CSMA protocol. (b) The adaptive p-persistent CD/CSMA protocol.
Figure 12. Average throughput of different protocols for different traffic and high load. (a) The adaptive p-persistent CSMA protocol. (b) The adaptive p-persistent CD/CSMA protocol.
Electronics 09 01273 g012
Table 1. The differences comparison among different protocols.
Table 1. The differences comparison among different protocols.
CD-ALOHA [11]Adaptive p-Persistent CSMA [19]Proposed Adaptive p-Persistent CD/CSMA
Data transmission probability adjustmentRandom probabilityInterference measurementFour channel load states
MAC protocolALOHAAdaptive p-Persistent CSMAAdaptive p-Persistent CSMA
CDMAOFDMACDMA
Table 2. Parameters settings of the simulations.
Table 2. Parameters settings of the simulations.
SituationParameterValue
Simulation Time1800 s
High traffic and general loadPacket SizeConstant (128)
Packet Interarrival TimePoisson (5)
Simulation Time1800 s
High traffic and loadPacket SizeConstant (256)
Packet Interarrival TimePoisson (5)
Simulation Time1800 s
Low traffic and loadPacket SizeConstant (128)
Packet Interarrival TimePoisson (5)
Simulation Time1800 s
High traffic and different loadsPacket SizeConstant (256), Constant (128), Constant (64)
Packet Interarrival TimePoisson (5)
Simulation Time1800 s
Different traffic and high loadPacket SizeConstant (256)
Packet Interarrival TimePoisson (60), Poisson (30), Poisson (10), Poisson (5), Posiion (3)
Table 3. Performances comparison among different protocols.
Table 3. Performances comparison among different protocols.
Lora_Class ALora_AlohaLora_P_CSMA _AdaptiveLora_P_CSMA _Adaptive_CDMA
Communication typesBidirectional communicationsBidirectional with scheduled receive slotsBidirectional communicationsMulti-channel transmission
Nodes communication typesUnicast messagesUnicast messagesMulticast messagesMulticast messages
Traffic configurationSingle traffic configurationSingle traffic configurationSingle traffic configurationMultiple traffic configuration
Load configurationMultiple loads configurationSingle load configurationSingle load configurationMultiple loads configuration
System latencyHigh latencyGeneral latencyGeneral latencyLow latency
ThroughputLow throughputGeneral throughputGeneral throughputHigh throughput

Share and Cite

MDPI and ACS Style

Liu, Y.; Liu, L.; Liang, J.; Chai, J.; Lei, X.; Zhang, H. High-Performance Long Range-Based Medium Access Control Layer Protocol. Electronics 2020, 9, 1273. https://doi.org/10.3390/electronics9081273

AMA Style

Liu Y, Liu L, Liang J, Chai J, Lei X, Zhang H. High-Performance Long Range-Based Medium Access Control Layer Protocol. Electronics. 2020; 9(8):1273. https://doi.org/10.3390/electronics9081273

Chicago/Turabian Style

Liu, Yang, Lei Liu, Jiacheng Liang, Jin Chai, Xuemei Lei, and Hui Zhang. 2020. "High-Performance Long Range-Based Medium Access Control Layer Protocol" Electronics 9, no. 8: 1273. https://doi.org/10.3390/electronics9081273

APA Style

Liu, Y., Liu, L., Liang, J., Chai, J., Lei, X., & Zhang, H. (2020). High-Performance Long Range-Based Medium Access Control Layer Protocol. Electronics, 9(8), 1273. https://doi.org/10.3390/electronics9081273

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop