1 Introduction

Broadcast refers to the basic task of transmitting a single message originating from some source node s to all \(n-1\) remaining nodes \(V\setminus \{s\}\). This fundamental problem has been studied in many settings, from wireless networks consisting of nodes with omnidirectional antennas, to wireline networks with point-to-point communication. An interesting and less well-understood communication network type gains importance with the modernization of the electrical grid infrastructure: powerline communication (PLC) networks. PLC is used by utilities to control and manage the electrical grid without building an additional (fiber or wireless) communication infrastructure. The powerlines carrying power from producers to consumers can be used to disseminate information as well by adding a modulated carrier signal to the wiring system. While powerline communication has been used on point-to-point links for many years in the electrical grid’s high voltage backbone network, multi-hop low and medium voltage PLC networks can enable “smart grid” functionalities in the electrical distribution grid [19, 29]. Smart grid applications are envisioned to use medium voltage PLC networks for control and monitoring, e.g., current and voltage values at transformers as well as the health status of electrical grid equipment are to be collected; and control commands and settings are to be distributed to switches, circuit breakers and transformers.

This article initiates the study of the broadcast problem in a medium voltage PLC network. For instance, broadcasts are useful in the context of adaptive protection: in order to ensure the reliable and efficient operation of electrical grids, adaptive protection changes the settings of the protection equipment depending on the network load, capacity and configuration. Thus, broadcast communication services are needed to disseminate currently valid settings. Broadcast in powerline networks also constitutes a challenging algorithmic problem. Similarly to wireless networks, the signal propagation is typically subject to various types of interference and uncertainties. Indeed, today there is no network model for the analysis of media access control (MAC) or higher-layer protocols for medium voltage PLC.Footnote 1 In PLC, the achievable communication quality between two devices varies depending on the powerline paths between them and the current electrical conditions. While studies have shown that in medium voltage networks, the packet success rate is strongly dependent on the distance between the two nodes that communicate and potential concurrent transmission from other senders, many other static and dynamic factors such as the quality of the line, electrical switches, circuit breakers, transformers and loads influence packet transmission. As a consequence, although the powerline communication infrastructure is known, the uncertainty on the effective transmission ranges at runtime translates into a partly unknown communication (and interference) topology.

1.1 Our contribution

We study reliable broadcast algorithms in powerline networks, and present and discuss a novel graph model capturing important characteristics of the powerline communication channel. We put our \(\text {PLC}\) model into perspective with respect to existing communication network models, and introduce a variant where transmission ranges are unknown to the nodes and may change over time. We present a broadcast time complexity lower bound in this model, based on the diameter, the network size n and the level of uncertainty on the transmission range of the nodes.

We present and analyse the distributed and deterministic algorithm \(\textsc {Color}\textsc {Cast}\) to solve the PLC broadcast problem. We prove an asymptotically optimal broadcast time of at most n (the “runtime” of the algorithm is measured in communication rounds). More specifically, we derive a non- asymptotic bound which gives hard and deterministic performance guarantees and which depends on the chromatic number \(\xi \) of the interference graph; generally, \(\xi \) can be much smaller than n. We show that \(\textsc {Color}\textsc {Cast}\) is asymptotically better than the best possible broadcast algorithm for unknown topologies. Moreover, it is easy to see that existing known-topology algorithms often fail when faced with uncertainty.

We also report on our simulation study on a Swiss medium voltage grid topology, and compare \(\textsc {Color}\textsc {Cast}\) to a heuristic and randomized approach. Our results suggest that \(\textsc {Color}\textsc {Cast}\) does not only provide good worst-case guarantees on the broadcast time complexity, but also performs well in realistic scenarios (Sect. 6).

1.2 Organization

The remainder of this article is organized as follows. Section 2 introduces our formal model, and Sect. 3 puts our model into perspective with respect to related models arising in the context of wired and wireless networks. Section 4 highlights the challenge of the broadcast problem and reports on lower bounds. Section 5 presents our algorithm and analysis, and in Sect. 6, we present simulation results. After reviewing related work in Sect. 7, we conclude in Sect. 8.

2 PLC network model with and without uncertainty

2.1 Powerline communication between two nodes

Given a powerline and two PLC modems u and v attached to it, u can only communicate with v if the length of the powerline connecting u and v is not too large. Note that therefore two closely located PLC modems u and v cannot necessarily communicate: they also need to be linked by a short enough powerline. Apart from this distance, the communication quality of this link depends on many factors, such as electromagnetic interference and impedance effects from electric appliances. We model this time-dependent quality as a varying noise level \(\rho ^t(u,v) \in [0,\rho _{\max }]\). Note that we do not require that \(\rho ^t(u,v) = \rho ^t(v,u)\) to account for the fact that communication links in PLC are not necessarily symmetric.

The larger distance d and the higher the noise level \(\rho \), the less likely is a successful message reception. To be able to model this relation in a general way, we introduce the notion of a link quality function:

Definition 1

(Link quality function) Consider a function

$$\begin{aligned} f :\mathbb {R}^+ \times [0,\rho _{max}]&\rightarrow \mathbb {R}^+\\ ~(d,\rho )&\mapsto f(d,\rho ). \end{aligned}$$

Function f is a link quality function iff it is monotonically increasing in both d and \(\rho \): \(\frac{\partial f}{\partial d}>0\).

We refer to \(f(d, \rho )\) as the virtual distance of d under \(\rho \).

By adjusting to the noise level, this model allows us to account for fading and time-varying behavior for channel attenuation, in addition to the influence of the link length. In other words, f can be used to compute a weight for a communication link at time t which determines its current link quality. We can interpret this weight as a virtual distance of this link. As scaling the link quality function with a constant factor does not violate the conditions, we assume without loss of generality that u can communicate with v successfully at time t if \(f(d,\rho ^t) < 1\).Footnote 2

2.2 Powerline communication networks

We represent the wiring of the electrical grid used for powerline communication as a weighted graph, where the n nodes represent the communication devices and the edges represent the powerlines connecting them as well as their distances, see Fig. 1. The communication devices (nodes) of the PLC infrastructure can communicate by local broadcasts, reaching a certain set of other devices. This set depends on: (i) the length of the powerlines between them, (ii) the current link qualities and (iii) simultaneous transmissions.

Fig. 1
figure 1

Model illustration: a Electrical distribution grid: secondary substations transforming medium voltage into low voltage (red boxes) and the powerlines (orange lines) connecting them. b Graph I: PLC infrastructure topology model with communication devices at secondary substations and lengths of power lines. c Communication graph representation example \(G^t_{com}\), where \(\rho ^t(u,v) =0\) for all \(u,v\in V\) and link quality function \(f(d,\rho ) = d/1000m+\rho \), i.e., nodes can communicate if there is a path of at most 1000 m between them (color figure online)

Formally, we model a PLC infrastructure topology as a weighted graph with PLC modems as nodes and powerline links, where the weights represent the length of the links. Figure 1b depicts an example.

Definition 2

(PLC infrastructure topology I) A PLC infrastructure topology is a graph \(I=(V,E,d)\) which connects nodes V along powerline links \(E \subset V\times V\). The length of edge \(e=(u,v)\) is denoted by d(e). Analogously to the noise level of a single link, we assigned a (time-varying) noise level \(\rho ^t(e) \in [0,\rho _{\max }]\) to each edge \(e\in E\).

The (temporal) communication graph \(G_{com}^t=(V,E_{com}^t)\) features links to nodes which can communicate at a certain time t. Thanks to the generic definition of the noise level and the link quality function, the node transmission range can be normalized to one unit. That is, we assume that a message reaches all nodes within virtual distance of at most 1.

Definition 3

(Communication graph \(G_{com}\)) Let \(I=(V,E,d)\) be a weighted symmetric graph representing a powerline infrastructure, and let \(\rho :E\rightarrow [0,\rho _{max}]\) be a noise distribution on I. The resulting communication graph \(G_{com}\) given a link quality function f satisfies

  1. 1.

    \(V(G_{com}) = V\)

  2. 2.

    \((i,j) \in E(G_{com})\) iff there exists a path P from i to j in I such that \(\sum _{(v,w)\in P} f(d(v,w),\rho (v,w)) \le 1.\)

We define \(G_{com}^\perp \)to be the “worst case” communication graph where noise levels are maximal, and \(G_{com}^\top \)to be the “best case” when the noise level is minimal on all edges. We denote the corresponding edge sets by \(E^\perp \)and \(E^\top \): \((v_i,v_j) \in E^\perp \Leftrightarrow j\)’s message will always reach i, even in the worst case when \(\rho (e) = \rho _{\max }~\forall e\), and \((v_i,v_j) \in E^\top \Leftrightarrow j\)’s message can reach i in ideal conditions with \(\rho (e) = 0~\forall e\).

Note that the edge set of \(G_{com}\) does not have to be a subset or superset of G. Depending on \(\rho \) and f there are cases where \(G_{com}\) is the same as G and there are cases where it has fewer or more edges than G. In particular, nodes which are physically close to each other, but not connected by a short powerline path cannot communicate. Yet, it is not necessary to have a direct and separate powerline (an edge in the infrastructure graph) for each edge of the communication graph: signals can be received over multiple hops in the infrastructure graph, as long as the path between the nodes is short enough.

Since powerlines form a shared medium where concurrent transmissions can collide, we state the conditions that need to be met to guarantee a successful transmission.

Definition 4

(Conditions for successful concurrent transmissions) A node \(v_j\) receives the message sent from \(v_i\) at round t if

  1. 1.

    nodes \(v_i\) and \(v_j\) are in communication range in this round: \((v_i,v_j) \in E_{com}^t\)

  2. 2.

    node \(v_i\) is the only node in \(v_j\)’s range to send a message

If another node \(v_k\) in the communication range sends concurrently, i.e., \((v_k,v_j)\in E_{com} \), then the two messages might interfere and \(v_j\) may or may not be able to receive any of \(v_i\) and \(v_j\)’s messages.Footnote 3 In other words, we study a simple, binary interference model, where signals travel along the graph structure of the powerline network, and we assume that a message arriving via different paths at a node does not interfere with itself.

We address the broadcast problem on PLC networks in this article.

Definition 5

(PLC broadcast problem PBC) The broadcast problem on I(VEd), where some node \(s\in V\) (the broadcast root or source) needs to send a message to all other nodes \(V\setminus \{s\}\) and the temporal noise level distribution \(\rho ^t\) is unknown is called PBC.

A synchronous environment is assumed in which time proceeds in discrete rounds: a message transmitted in round t is received in the same round. At \(t_0=0\), the source s transmits the message and we want to minimize the time t until all nodes V have successfully received the message.

To guarantee that the broadcast can terminate successfully regardless of the network conditions, we require the worst case scenario to still offer a solution. In other words, we only consider scenarios where \(G_{com}^\perp \)is connected. If \(G_{com}^\perp \)is not connected, no solution to the broadcast is possible if \(\rho ^t=\rho _{max},\forall t\).

We assume that the nodes know the PLC infrastructure I in advance. This assumption makes sense in a smart grid scenario where the devices are static and designed to be in operation for decades. Nodes know an upper bound on the noise level \(\rho _{\max }\), and the function f. What is unknown to the nodes is the current noise level \(\rho ^t, \forall t\) and hence the resulting current communication graph.

In the remainder of this article, we will refer to the powerline broadcast problem with unknown link qualities by PBC. We will measure the total number of communication rounds used by an algorithm in the worst case. Concretely, the time complexity is the time when each node has received the message.

3 Putting the powerline model into perspective

In contrast to wireless models where the signal is typically assumed to spread in “free space”, the signal in the powerline network is bound to spread along the electrical grid infrastructure, such as overhead wires or underground cables. In this section, we have a first closer look at the communication graphs of PLC and also put these graphs into perspective with related graphs known in wireless settings, such as Unit-Disk Graphs or r-restricted graphs.

Let us start with the Unit Disk Graph. Unit-Disk Graph (UDG) model [7, 9, 14]. The specific structure of the corresponding propagation and interference models can be exploited in the algorithm design of efficient protocols.

While many properties are similar in wireless and powerline communication, i.e., with respect to interference from simultaneous transmissions, we show that the communication topologies for power line communication are more general than the ones produced by, e.g., Unit Disk Graphs.

To enable a simpler comparison with geometric graph models (capturing free-space signal propagations), we restrict ourselves to PLC infrastructures with an embedding in the two dimensional Euclidean space.

Let \(\mathcal {G}_{UDG}\) be the set of “UDG-compliant” communication graphs, in the sense that any graph \(G\in \mathcal {G}_{UDG}\) can result from an embedding \(\mu : V \rightarrow \mathbb {R}^2\) mapping nodes v to a position \(\mu (v)\) in the Euclidean plane, and where two nodes v and w are connected iff \(d_2(\mu (v),\mu (w)) \le 1\), where \(d_2\) represents the 2D Euclidean distance.

To compare PLC communication graphs against UDG communication graphs, we restrict ourselves to situations where the weighted infrastructure graph \(I=(V,E,d)\) is a representation of the electrical infrastructure’s 2D layout.

Definition 6

(Euclidean embeddings of \(I(V,E,d), com(\mu ,G,\rho )\) and \(\mathcal {G}_{PLC}\)) Given I(VEd), a valid PLC embedding \(\mu : V \rightarrow \mathbb {R}^2\) satisfies that \(\forall ~(v,w)\in E, d(v,w)=d_2(\mu (v),\mu (w))\). As a shorthand, given an unweighted graph G, an embedding \(\mu \) (which defines the link lengths implicitly), and a noise distribution \(\rho \), the resulting 2-D embedded communication graph is denoted by \(com(\mu ,G,\rho ).\) Let \(\mathcal {G}_{PLC}\) denote the set of all possible 2-embedded PLC communication graphs: \(\mathcal {G}_{PLC}=\{ com(\mu ,G,\rho ):~ \forall G,~\forall \mu ,~ \forall \rho \}\), and let \(\mathcal {G}_{PLC_0}\) be the set of all possible communication graphs ignoring noise: \(\mathcal {G}_{PLC_0}=\{ com(\mu ,G,0): ~ \forall G ~\forall \mu \}\).

The following lemma shows that the set of UDGs is a strict subset of PLC communication graphs.

Lemma 1

The set of possible 2-D embedded PLC communication graphs, even if restricted to \(\rho =0\), is a strict superset of the set of possible UDGs, i.e., \( \mathcal {G}_{UDG} \subsetneq \mathcal {G}_{PLC_0}\).

Proof

We first show \( \mathcal {G}_{UDG} \subseteq \mathcal {G}_{PLC_0}\). Let G be a UDG graph resulting from an embedding \(\mu \) of \(\vert V(G)\vert =n \) nodes. Let d(e) be the length of the edge \(e=(u,v)\) in this embedding, i.e., the distance between nodes u and v in the Euclidean plane according to their positions. We now construct a powerline graph \(G'\) with the same edge set as G, by placing a powerline of length d(uv) between u and v. Hence \(com(\mu ,G',0)=G=G'\) and \( \mathcal {G}_{UDG} \subseteq \mathcal {G}_{PLC_0} \) (Fig. 2).

It remains to prove that there are graphs which are not UDGs. Let \(W_{14}\) be a 14-wheel graph: a star graph consisting of 15 nodes (1 central node and 14 leaves) whose leaves are additionally connected in a circular manner. It is easy to see that \(W_{14} \not \in \mathcal {G}_{UDG}\): for the neighborhood of the center node there exists an independent set of cardinality larger than six: a contradiction to the unit disk assumption. However, \(W_{14} \in \mathcal {G}_{PLC_0}\). Let ABC be the positions in the Euclidean plane of an equilateral triangle of side length 3 / 4. Let \(\mu \) be the following embedding: \(\mu (1)=A\), \(\mu (v)=B\) if v is even, \(\mu (v)=C\) otherwise. Consider \(com(\mu ,W_{14},0)\): since \(d(B,C)=d(A,B)=d(A,C)<1\), \(E(W_{14})\subset E(com(\mu ,W_{14}),0)\). Since \(2d(A,B)=2d(B,C)=2d(A,C)=d(A,B)+d(A,C)>1\), no two nodes of the parity can communicate together, thus \(E(W_{14})= E(com(\mu ,W_{14}),0)\). Therefore \(W_{14} \in \mathcal {G}_{PLC_0}\). \(\square \)

Fig. 2
figure 2

Illustration of the embedding \(\mu \) constructed in Lemma 1: \(\mu \) maps \(W_{14}\) to an equilateral triangle ABC. For clarity the \(\mu \) on some vertices is omitted, and nodes stacked on B and C are slightly spread

Some algorithms developed for UDGs can still be applied in \(\mathcal {G}_{PLC_0}\) networks. To ensure they work as planned, there must exist an embedding into the Euclidean plane of the PLC network G(VEd) meeting two conditions: (i) the UDG edge set induced by the embedding must be equal to E and (ii) all length constraints d must be satisfied. Otherwise, however, an algorithm may fail as it relies on the bounded independence and/or on the fact that all nodes in at most unit distance can hear each other. Both of these assumptions do not hold in general for \(\mathcal {G}_{PLC_0}\). Algorithms for the UDG generalizations of Unit Ball Graphs (more than two dimensions) and Quasi-Unit Disk Graphs (QUDGs), allowing for a grey zone where communication links may or may not exist [26], can also be applied for PLC networks if the respective generalizations of the conditions mentioned above are met. Related results in prior work are discussed in more detail in Sect. 7.

To identify further subclasses of \(\mathcal {G}_{PLC}\), the technique of the previous proof can be generalized. For this, let us introduce the definition of the chromatic contraction of a graph. The concept will simplify the task of finding a PLC embedding of any unweighted graph G.

Definition 7

(Chromatic Contraction (CC) Graph) Let G be an arbitrary graph. \(G_C\) is the Chromatic Contraction (CC) graph of G if and only if there exists a proper coloring \(\xi :V(G)\mapsto V(G_C)\) of the graph G: nodes of the same color in G are mapped to the same node in \(G_C\), and two color nodes are connected in \(G_C\) if the corresponding nodes are connected in G, i.e., \(\forall ~(v,w) \in E(G),~(\xi (v),\xi (w))\in E(G_C)\).

In other words, the chromatic contraction graph is a compact representation of the original graph with respect to a coloring, where all the nodes sharing the same color in the original graph are grouped into a single node of the CC graph, while the CC graph edges preserve the relations of the nodes in the original graph.

We need the following lemma. Intuitively, a chromatic contraction defines an embedding in the plane where we collocate or “stack” nodes of the same color. Nodes of the same color never share a link, also no link exists between nodes of the same “color stack”. Moreover, since the minimal distance between two stacks is at least 1/2, link lengths are between 1/2 and 1: the transmission can never bridge two hops.

Lemma 2

Let CC(G) be the set of Chromatic Contraction Graphs of G. If \(\exists G_C \in CC(G)\) such that \(G_C\in \mathcal {G}_{PLC}\) with an embedding \(\mu \) satisfying \(\forall v,w \in V(G_C), d(\mu (v),\mu (w))>1/2\) then \(G\in \mathcal {G}_{PLC}\).

Proof

By construction, let \(G_C \in \mathcal {G}_{PLC}\) be the chromatic contraction graph of G. Since \(G_C\) is in \(\mathcal {G}_{PLC}\), let \(\mu \) be an embedding respecting the UDG constraints. Since \(G_C \in CC(G)\), let \(\xi \) be an arbitrary legal coloring of G. Let \(\mu ':V(G)\mapsto \mathbb {R}^2\) be the embedding such that \(\mu '(v)=\mu (\xi (v))\).

We need to show that \(com(\mu ',G, 0)=G\). Assume \(com(\mu ',G, 0)=G'\ne G\). Since \(V(G)=V(com(\mu ',G, 0))=V(G')\), graphs can only differ by their links. Let \(M=E(G)\setminus E(G')\) be the set of missing communication links, and let \(X=E(G')-E(G)\) be the set of extra communication links.

Assume \(M\ne \emptyset \), and let \((v,w) \in M\). Since (vw) is in the infrastructure graph, but not in the communication graph, it must hold that \(d_2(\mu '(v),\mu '(w))>1\). This contradicts the definition of \(G_C\) since \((v,w) \in E(G_C)\) and therefore \(d_2(\mu (\xi (v)),\mu (\xi (w)))\le 1\). Thus there cannot exist any missing links.

Assume \(X \ne \emptyset \), and let \((u,w) \in A\). Since \((u,w) \in E(G'), d_{G'}(u,w) \le 1\). But since \((u,w)\not \in E(G)\), we deduce that u and w are not directly connected. Let us consider the shortest path between u and w. The length of this path is at least two. If the path is exactly two, in which case there exists a node v such that \((u,v) \in E(G),~(v,w) \in E(G)\) and \(d_2(\mu '(u),\mu '(v))+d_2(\mu '(v),\mu '(w))\le 1\). Since \((u,v) \in E(G),~(v,w) \in E(G)\), \(\xi (v) \ne \xi (u)\) and \(\xi (v) \ne \xi (w)\). Therefore \(d_2(\mu '(u),\mu '(v))+d_2(\mu '(v),\mu '(w)) > 1/2+1/2=1\): no such connection can exist, as communication links have distance at most 1. Clearly, no such connections can exist for longer paths neither. Hence there cannot be any additional links and hence \(com(\mu ',G, 0)=G\). This concludes the proof. \(\square \)

Using Lemma 2, we can show that PLC communication graphs include large graph families.

Theorem 1

All five-colorable graphs, short \(\mathcal {G}_{5}\), are PLC communication graphs: \(\mathcal {G}_{5}\subsetneq \mathcal {G}_{PLC}\)

Proof

Five colorable graphs have a chromatic contraction graph \(G_C\) containing of at most five nodes. Consider a regular pentagon of side length \(s=1/2+\epsilon \). The diagonal length is \(2s\cos {\pi /10}\approx 1.91s <1\). Let \(\mu \) be the function mapping each node of a five node graph to one vertex of the pentagon graph; \(\mu \) satisfies: \(\forall v,w \in V(G_C)\times V(G_C), d_2(\mu (v),\mu (w))>1/2\). Observe that for any graph G with \(\vert V(G) \vert =5, com(\mu ,G, 0)=G\): all 5-node graphs are in \(\mathcal {G}_{PLC}\). Thus we can apply Lemma 2 to derive that \(\mathcal {G}_{5}\subset \mathcal {G}_{PLC}\). Finally, observe that \(K_6 \not \in \mathcal {G}_5\) and \(K_6 \in \mathcal {G}_{PLC}\). \(\square \)

As a direct consequence of Theorem 1, any planar graph can be a powerline communication graph: planar graphs are 4-colorable.

Corollary 1

Let \(\mathcal {P}\) be the set of planar graphs: \(\mathcal {P}\subsetneq \mathcal {G}_{PLC}\)

This shows that the set \(\mathcal {G}_{PLC}\) forms an interesting super class of unit disk graphs and planar graphs. Moreover \(\mathcal {G}_{PLC}\) includes graphs of unbounded neighbor independence: an example is the k-wheel graph which is in \(\mathcal {G}_{PLC}\) for any k, since it is 3-colorable regardless of k.

Another interesting model which has recently received attention is the r-restricted model [17]: this model defines a set of unreliable edges which may or may not be usable and all edges in this set connect nodes of hop-distance at most r. Note that this is a superset of \(\mathcal {G}_{PLC}\) for the special case where all distances in the PLC infrastructure graph are set to 1, with f and \(\rho _{max}\) chosen adequately (for instance \(f(d,\rho )=(d+\rho )/r\) and \(\rho _{max}=r-1\)). In r-restricted graphs it is possible that a node cannot receive a message originating from hop-distance two, while one of its neighbors (at hop-distance three from the sender) might receive it. In \(\mathcal {G}_{PLC}\) receiving a message at distance \(r'\) successfully implies that all nodes at distance less than \(r'\) from the sender can decode it as well (unless there are collisions). Apart from this, \(\mathcal {G}_{PLC}\) can be seen as a generalization of r-restricted graphs to a more detailed model using edge lengths instead of hop counts.

4 The challenge of unknown link quality

Unknown noise conditions render the broadcast problem significantly more difficult, even if there is no temporal variation.

Theorem 2

There exist problem instances where the broadcast time of any (optimal) deterministic algorithm \(\textsc {Alg}\) is \(\varOmega (n)\) times higher than without uncertainty.

Proof

Recall that we can choose an arbitrary link quality function f which is monotonic in the link distance and the noise level, assigning links a weight at each point in time, which can be interpreted as a virtual distance. Let \(\check{\ell }\in ~(0,1]\) denote a constant distance where \(f(\check{\ell }, \rho _{\max }) < 1\) and analogously, let \(\hat{\ell }\in ~(0.5,1]\) denote a distance where \(f(\hat{\ell }, \rho _{\max }) > 1\). For the proof it is sufficient to focus on link lengths \(\check{\ell }\) and \(\hat{\ell }\) only.

Consider the powerline graph G depicted in Fig. 3a. The broadcast source s is connected to k nodes (denoted by \(V_1\)) which in turn are connected to the sink t (the value of k will be determined later). In addition we create a path of \(n-k-2\) nodes called \(V_2\) from s to t and connect all nodes to t directly as well. All links incident to s, the links among the set \(V_2\) and the link from the last node of \(V_2\) to t are of length \(\check{\ell }\), all others of length \(\hat{\ell }\). This ensures that the communication graph is connected, even under worst case noise conditions. As a next step we describe how the noise is assigned to these links.

Fig. 3
figure 3

The lower bound powerline graph G for PBC is depicted in (a). The nodes in \(V_2\) are of degree 3 each, as they form a path from s to t among each other and are connected to t directly in addition. The broadcast problem can be reduced to an unknown radio network graph depicted in (b)

We construct a noise assignment which guarantees that there is an interference-free path of length \(|V_2|\) from s to t using the nodes in \(V_2\). Concretely, we only use a binary noise value of 0 and \(\rho _{\max }\), and assume that the following edges do not experience any noise: the edges between s and \(V_1\), the edges among \(V_2\) nodes, the edges from t to \(V_2\) nodes, the edge from s to the first node of \(V_2\), and the edge from the lowest node of \(V_2\) and t. We assign \(\rho _{\max }\) to all other edges from \(V_2\) to t. This assignment is known to the algorithm; the only uncertainty concerns the edges between \(V_1\) nodes and t, where the algorithm does not know which edges are free of noise and which are experiencing a noise level of \(\rho _{\max }\).

We note that scheduling any subset of \(V_1\) nodes for concurrent transmissions can result in one of two outcomes: if exactly one node of the set is incident to an edge without noise, then the message can reach t. Otherwise, if there is no node incident to a noise-free edge, then node t cannot be reached; also, if two or more nodes with noise-free edges transmit simultaneously their messages will collide. The last two cases cannot be distinguished by the algorithm.

To deliver a message from \(V_1\) to t, an algorithm must select a set with exactly one node incident to a noise-free edge. In this scenario there is at least one path of length two from s to t, and if the algorithm knew one link between a node \(v\in V_1\) and t, then it could devise a schedule of length three (s, v, t): Node s sends the message in slot one, v in slot two and t in slot three, completing the broadcast. Hence, an algorithm solving broadcast in time \(T < |V_2|\) on this graph G must find subsets \(S_1, S_2, \ldots S_T\) of nodes in \(V_1\) which send simultaneously in round i, hoping that exactly one of the nodes in \(S_i\) has an edge without noise to t, and all others are noisy (success condition). If the algorithm has chosen such a set, then node t can forward the message to all nodes in the subsequent time slot. In contrast, broadcasting along the long \(V_2\) path from v to t, takes \(\varOmega (\check{\ell }~(n-k))\).

We now show that any algorithm solving \(\mathbf PBC \) on this graph in o(T) time can be used to solve broadcast on unknown radio networks on graphs \(C_T\) for \(T+2\) nodes [4] in time o(T). Since the time complexity for this problem is \(\varOmega (T)\) this leads to a contradiction. A member of \(C_l\) defined by a set \(S\subseteq \{ 1, 2, \ldots , l\}=\left[ l\right] \) is a graph with one node \(s'\) connected to all nodes with IDs in \(\left[ l\right] \). The nodes of S are connected to another node \(u'\). The problem of radio broadcast without knowing the topology thus reduces to choosing a subset M of the nodes \(\left[ l\right] \) that contains exactly one node of S without knowing S. Reference [4] demonstrates a lower bound of \(\varOmega (l)\) time slots to pick such a set M (without collision detection). The fact that the noise level between \(V_1\) and t is uncertain corresponds to the situation where \(C_{|V_1|}\) is unknown. The time complexity is thus \(\varOmega (\min (k, \check{\ell }~(n-k)))\) which is maximized for \(k = \lceil \check{\ell }n /(1+\check{\ell }) \rceil \). Thus this topology and noise level assignment is a scenario where any deterministic algorithm has a broadcast time of at least \(\varOmega (n)\) times more than the effective diameter: a constant. \(\square \)

5 Deterministic broadcast upper bounds

We now present an algorithm \(\textsc {Color}\textsc {Cast}\) (Algorithm 1) which solves the broadcast problem in powerline networks, even for unknown link qualities. The basic idea of the \(\textsc {Color}\textsc {Cast}\) algorithm is to use a coloring on the interference graph to compute a schedule without any collisions.

\(\textsc {Color}\textsc {Cast}\) seeks to conservatively avoid collisions by scheduling two nodes u and v which may interfere at some node w if \((u,w)\in E^\top \wedge (v,w)\in E^\top \) in different rounds. This is achieved by computing the following coloring-based schedule. First, an arbitrary Minimal (Connected) Dominating Set (MDS) is computed on \(G_{com}^\perp \). The MDS ensures connectivity in the sense that any two dominators are within each other’s communication range, even in the worst case. Subsequently, starting from the source, \(\textsc {Color}\textsc {Cast}\) computes a breadth-first spanning tree on \(G_{com}^\perp \), the communication graph under low transmission ranges, and divides the tree into layers \(L_i\) of increasing distances. Then \(\textsc {Color}\textsc {Cast}\) computes for each layer \(L_i\) separately, a minimal coloring on the dominator nodes of the MDS in the \(L_i\)-induced subgraph of \(G_{com}^\top \) of high transmission range, henceforth simply denoted by \(G(L_i)\). Let \(\xi _i\) denote the chromatic number of \(G(L_i)\) and \(\xi = \sum _{i=1}\xi _i\) the sum of the chromatic number over all layers.

By this layer coloring, \(\textsc {Color}\textsc {Cast}\) avoids collisions entirely: each color constitutes an independent set on the interference graph, and the nodes cannot interfere, even if some or all nodes have a better-than-worstcase transmission range (\(\rho ^t < \rho _{max}\)).

Figure 4 illustrates the layering and coloring of the \(\textsc {Color}\textsc {Cast}\) Algorithm.

figure a

First, let us note that all nodes that can exchange information in normal conditions can do so in ideal conditions: \(\forall t, E^t_{com} \subset E^\top \). To see this, let \(e\in E^t_{com}\). We have \(f(d(e),\rho ^t(e)) \le 1\) since e exists. Thanks to the monotonicity of f in \(\rho \), we have: \(d(e) = f(d(e),0) \le f(d(e),\rho ^t(e)) \le 1\).

Fig. 4
figure 4

Visualization of \(\textsc {Color}\textsc {Cast}\). The algorithm structures nodes along layers (here: two layers), starting from the source s and at low-range intervals. Each layer is colored, as indicated by the different node colors (black, grey, white). The spanning tree on the connected dominating set is shown in solid lines, while interference edges (for the layer coloring with respect to maximal interference) are dotted. Communication links are not shown explicitly in this figure

We first prove that the algorithm is collision free, and then prove its correctness. Finally we prove the complexity.

Lemma 3

\(\textsc {Color}\textsc {Cast}\) (Algorithm 1) produces a collision-free schedule.

Proof

Let G(VEd) be a powerline network, and \(s \in V\) the broadcast source. Let R be the transmission schedule produced by \(\textsc {Color}\textsc {Cast}\), i.e., the binary variable \(R[i,t]\in \{0,1\}\) indicates whether node \(v_i\) transmits in round t. The proof is by contradiction: Assume such a collision occurs at some node w during round t. Let \(v_i\) and \(v_j\) two of the nodes responsible for this collision: \(R[i,t]=R[j,t]=1\). Since w experienced a collision we know that \((v_i,w)\in E_{com}^t \wedge ~(v_j,w) \in E_{com}^t\). Thus, \((v_i,w)\in E^\top \wedge ~(v_j,w) \in E^\top \) and therefore \((v_i,v_j)\in ~({E^\top }\times E^\top )\). First observe that if \(R[i,t]=R[j,t]=1\), because of the update of round in Line 12, then necessarily \(v_i\) and \(v_j\) belong to the same layer. Let L be this layer, and \(\Xi \) the corresponding coloring obtained in Line 9. Because of Line 11, necessarily \(\Xi (i) = \Xi (j)\). Since \(\Xi \) is a legal coloring of G(L), we conclude that \((v_i,v_j)\notin E_i\). Contradiction. \(\square \)

Lemma 4

Executing the \(\textsc {Color}\textsc {Cast}\) schedule ensures that all nodes obtain the broadcast message.

Proof

Let \(G(V,E,\ell )\) be a powerline network, and \(s \in V\) the broadcast source. Let R be the schedule produced by Algorithm 1. We first show by induction on the layers \(L_i\) that all the nodes of T will get the message. The inductive step is that if all the nodes of layer \(L_{i}\) received the broadcast message at round k, then all the nodes of layer \(L_{i+1}\) have the message after round \(k+\xi _i\). Base case \(i=0\): by definition, the source s has the message and \(L_0=\{s\}\). Now assume that at some round \(k<\infty \), all nodes from layer \(L_i\) have the message. Let \(u\in L_{i+1}\), u has at least one parent p in T on layer \(L_i\). Observe that from round k to round \(k+\xi _i\), all nodes of layer \(L_i\) will forward the message (\(\forall v\in L_i, k<R[v]\le k+\xi _i\)). Thanks to Lemma 3 we know there cannot be any collisions, and since \((u,p)\in T \subset G_{com}^\perp \), u will receive the message. Thus at round \(k+\xi _i\) all the nodes of layer \(L_{i+1}\) have the message, which proves the induction. Since all nodes of T eventually get the message and send it, and since T is a dominating set of \(G_{com}^\perp \), the other nodes obtain the message as well. \(\square \)

Theorem 3

\(\textsc {Color}\textsc {Cast}\) solves the broadcast problem in time \(\xi \), where \(\xi =\sum _i \xi _i\) is the sum of the chromatic numbers of the layers. This is at most \(n-1\).

Proof

From Lemma 4, we know that \(\textsc {Color}\textsc {Cast}\) eventually solves the broadcast problem. Observe that at the end of the execution (Line 12), the round variable is maximal. This variable is initialized in Line 6 and only incremented in Line 12. Thus, \(round=\sum _{i}\xi _i=\xi \le \vert D \vert \). Since D is a connected dominating set of a connected topology, it dominates at least one node: \(\vert D\vert \le n-1\). This bound is tight: consider a line topology \(L_n\) with n nodes, where \(G_{com}^\perp =L_n\) yields a line and \(G_{com}^\top =K_n\) yields a clique. In such a scenario, all nodes but the last one will have to transmit. \(\square \)

Remark 1

Note that Theorem 3 gives an absolute and deterministic bound on the broadcast complexity: the time is simply bounded by the chromatic number of the interference graph. This is attractive and unlike many existing algorithms, especially for unknown topologies and algorithms based on selectors (cf Sect. 7), which have hidden constants in their asymptotic bounds. Also, note that in general, the chromatic number can be significantly lower than the network size (\(\xi < n\)).

Remark 2

Another interesting corollary from Theorem 3 is the fact that even with unknown transmission ranges, the network leaks certain information on its structure which can be exploited. Even if \(\rho ^t\) can assume arbitrary non-zero values, there are communication topologies which cannot be generated from a given PLC infrastructure graph: for instance, in a line network \(L_n\), a communication topology connecting nodes 1 and n must also connect nodes 1 and j for any \(j\le n-1\). This is the reason why in our model, more efficient algorithms exist than in the unknown topology case.

6 Simulations

We evaluate our algorithm on the topology of a real urban electrical distribution grid of a town in Switzerland (population approx. 20k, area approx. 14 km\(^2\)), see Fig. 5. The electrical infrastructure consists of 93 nodes (primary substations and ring main units) connected by 107 edges. Typically, the distances between two neighboring ring main units are between 200m and 2000m in this area of Switzerland. Hence, we use the PLC infrastructure information provided by the utility as the graph \(G=(V,E)\), and choose the lengths d(e) uniformly at random between 200 and 2000. This corresponds to a PLC infrastructure without elements that disconnect PLC links (like open switches and transformers), and hence, we study a scenario with the maximum number of possible collisions. We generate 100 different graphs \(G=(V,E,\ell )\) in this manner.

We investigate the effect of a multiplicative link quality function, i.e., \(f(d(e), \rho ^t(e)) = d(e) \cdot (1+\rho ^t(e))\) for a static scenario where the noise level may differ between edges, but it does not vary over time: \(\rho ^t(e) = \rho (e) \in \left[ 0,\rho _{max}\right] \) (the time complexity of the algorithm is independent of the current unknown conditions). We quantify the influence of varying \(\rho _{max}\) on the diameter and time complexity of broadcast algorithms with values derived from realistic scenarios. The powerline communication characteristics described in [31] and the model presented there lead to a bit error rate (BER) of close to 0 up to a distance of 2000m, after which there is a sharp increase. Based on this, we interpret \(f(d, \rho )\) as a virtual distance in meters and assume that within a communication range of 2000m, nodes can communicate with each other and thus we do not consider longer edges.

To have a benchmark for the performance of \(\textsc {Color}\textsc {Cast}\), we also implemented the simple randomized Decay algorithm (cf Algorithm 2) described in [4], which has a time complexity of \(O((D + \log ~(n/\epsilon )) \cdot \log \Delta )\) with high probability, where D is the network diameter and \(\epsilon \) is a parameter. While the maximal degree \(\Delta \) can reach n, but can also be much lower, we run Decay both with \(\Delta =n\) and with \(\Delta =\max \text {degree} \left( G_{\rho _{min}}^{com}\right) \). In order to avoid penalizing Decay for the fact that it is a randomized algorithm, we set \(\epsilon \) to 1. This has the drawback that in our simulations, Decay does not always reach all nodes. However, in our experiments this event occurred in less than 4 % of all cases, and we believe that the algorithm is well suited as a benchmark in this setting.

figure b

6.1 Influence of \(\rho _{max}\)

Figure 6 (left) plots the average duration of a broadcast on the topology of Fig. 5, for different \(\rho _{\max }\) values. We compare \(\textsc {Color}\textsc {Cast}\) with Decay parametrized with two different estimates for \(\Delta \): maximum degree D of \(G_{\rho _{t}}^{com}\) or number of nodes n. While the time complexity of \(\textsc {Color}\textsc {Cast}\) does not vary with the actual \(\rho _{t}\), the performance of Decay is affected. Therefore, we run Decay on the same topology with three different assignments and average them: (i) In the first scenario, \(\rho _t\) is set to 0 for all edges; (ii) in the second scenario, \(\rho \) is chosen uniformly at random between 0 and \(\rho _{max}\) for each edge; (iii) in the third scenario, edges are subject to \(\rho _{max}\). Since \(\textsc {Color}\textsc {Cast}\) only relies on \(\rho _{max}\) and not on the actual virtual distance of the edges, its performance is not affected by these different scenarios.

Fig. 5
figure 5

Topology of a medium voltage distribution grid of a town in Switzerland

Fig. 6
figure 6

Impact of \(\rho _{max}\) (top) and the network size (center) on the broadcast time for \(\textsc {Color}\textsc {Cast}\) and Decay. Number of colors per layer (bottom)

\(\textsc {Color}\textsc {Cast}\) clearly outperforms Decay on this medium-sized electrical distribution grid even in the scenario with most uncertainty and despite the randomized approach of Decay which theoretically allows for asymptotically lower runtimes on average. When \(\rho _{max}\) is chosen uniformly at random, this increases the effective diameter from 12.37 to 17.38 and the average degree shrinks from 11.3 to 5.1 for maximal noise levels. However, as can be seen by the confidence interval for Decay, even when the noise level is maximal on all edges, \(\textsc {Color}\textsc {Cast}\) always completes broadcast faster.

6.2 Impact of scale

In order to study the impact of larger network sizes, we iteratively attach two copies of the basic network to each other. The two copies are connected by adding links between three randomly chosen pairs of nodes of the two copies. This is reasonable, since larger distribution grids often have the same density as smaller distribution grids. Thus the average degree of the PLC infrastructure does not grow with the size of the network. In this manner, we construct 100 networks with \(n = 93\cdot 2^k\) nodes, for k between 0 and 5; thus, the largest networks contain 2976 nodes.

Figure 6 (center) studies how the broadcast time depends on the network size n. According to our construction of networks, the diameter grows roughly linearly with the size of the network, while the average degree grows from 11.3 to 16.6. With larger network sizes, the factors in the O-notation matter less and Decay starts to exhibit better performance than \(\textsc {Color}\textsc {Cast}\) for networks with more than around 1000 nodes. However, the difference in number of rounds is not very large, i.e., for networks with 2976 nodes, \(\textsc {Color}\textsc {Cast}\) needs 263 rounds on average (std 14) while Decay using the maximum degree for \(\Delta \) finishes after 204 rounds (std 42). In general, Decay is subject to a high variance (vertical bars represent the runtime’s standard deviation over 100 runs), the different topologies influence \(\textsc {Color}\textsc {Cast}\)’ performance only slightly. This, in combination with the fact that Decay cannot guarantee that the message reaches all nodes in all cases and fails to do so in up to 4% of all runs as well as the fact that Medium Voltage distribution grids are not arbitrarily large, indicates that \(\textsc {Color}\textsc {Cast}\) is an attractive algorithm for PLC networks.

Figure 6 (right) sheds more light on these performance results: it shows the size distribution of the layers over the 100 different runs on each topology. A low number of colors facilitates a parallel traversal of the layers, and hence ensures a quick propagation of the broadcast message. Since the majority of layers are traversed in less than 10 rounds, regardless of the topology size, \(\textsc {Color}\textsc {Cast}\) is efficient.

7 Related work

For an excellent overview of the broadcast problem in various radio network models (with an emphasis on time complexity), we refer the reader to the surveys [18] and [30]. Existing broadcast models differ in the collision detection model, and the extent to wich the network topology is known.

Our model can be seen as an instance of a radio network model as well, in the sense that the transmissions of nodes are subject to topological constraints and collisions can happen when more than one node transmit at the same time. Thus, many existing broadcast algorithms can also be executed on our model. However, in contrast to most radio models, the underlying graph describes a PLC network with a different signal propagation compared to radio networks. However, we believe that the study of imperfect transmission ranges is of independent interest and the model can apply to other networks, such as radio networks as well. One interesting such radio model concerns Quasi-unit disk graphs (QUDGs), since they allow for a grey zone for links of lengths between \(d_{min}\) and 1 where communication may or may not be possible. Most UDG algorithms can be adapted for QUDG at the cost of an additional factor of \(1/d_{min}^2\) [26]. This is acceptable for large \(d_{\min }\), but implies an increase of two orders of magnitude or more for \(d_{\min } < 0.1\).

To the best of our knowledge, the time complexity of the broadcast problem in networks with collisions under uncertain transmission ranges has not been considered so far. Several results from radio models with or without knowledge on the topology also apply on our networks.

7.1 Broadcast

A seminal work on the time-complexity of broadcast in multi-hop networks is by Bar-Yehuda et al. [4] who show an exponential gap between deterministic and randomized algorithms in the same collision model we adopt. Moreover they present a simple distributed randomized oblivious algorithm for unknown directed networks that broadcasts a message in time \(O(D\log n + \log ^2 n)\), a result which holds in our model too; however, as discussed, our setting generally allows for faster solutions. In the light of Kushilevitz et al.’s [27] randomized \(\varOmega (D \log {(n/D)})\) lower bound and Alon et al.’s [2] \(\varOmega (\log ^2 n)\) lower bound for the broadcast problem in radio networks, the algorithm of [4] is almost optimal. For a slightly weaker collision model assuming that two or more transmissions in the reception range always result in a collision that is indistinguishable from noise and silence the lower bound can be matched, as demonstrated in [11, 22]. Another randomized algorithm reaches time \(O(n\log n\log \log n)\) [12].

Many efficient broadcast algorithms for known topologies rely on the notion of a wave front: the algorithmic wit is focused on the frontier of nodes having the message (the potential senders) and their immediate vicinity (the potential receivers). Informally, in our model with unknown transmission ranges, it is a priori impossible to plan where the wavefront will be at a given time; moreover, since the communication graph is directed (and possibly only weakly connected), the a posteriori knowledge of which nodes received the message may remain local as well. When restricted to deterministic algorithms on unknown networks, lower bounds of \(\varOmega (n\log n / \log (n/D))\) and \(\varOmega (n \log D)\) are presented in [22] and [10] respectively. Deterministic algorithms for this scenario achieve broadcast in time \(O(n \log n)\) [22], \(O(n\log ^2 D)\) [11] and \(O(D\Delta \log ^\alpha n)\) [10], where \(\Delta \) is the maximum degree of the network and \(\alpha \ge 2\) unless n is known (\(\alpha =2\)) or n and \(\Delta \) are known (\(\alpha =1\)). If nodes know their neighbors, a broadcast time of O(n) [3] is possible. In our model nodes know the possible communication topology of the whole network, however they do not know their effective neighbors. For scenarios where nodes are aware of the actual topology, a message can be broadcast in asymptotically optimal time \(D+O(\log ^2 n)\) [16] with a randomized algorithm or deterministically in time \(D+O(\log ^3/\log \log n)\) [8] or \(O(D+\log ^2 n)\) [23].

An interesting related result to our article is due to Gasieniec et al. [15]. The authors attend to deterministic broadcasting in geometric/Euclidean radio networks whose nodes have complete knowledge of the network. Each node can transmit within some range r assigned to it; these ranges are nonuniform and they are drawn from the predefined interval \([r_{\min },r_{\max }]\). A lower bound of \(\delta +\varOmega (\min \{\log (r_{\max }/r_{\min }),\log (n-\delta )\})\) is derived; on the positive side, an upper bound of \(O(\delta \log ^2(r_{\max }/r_{\min }))\) is shown. The main differences to our model are the fact that nodes know their range and the network growth is bounded.

While many broadcast results are limited to undirected networks, our model with unknown powers is inherently directed. In this regard, an interesting related result on directed communication networks has recently been shown by Kuhn et al. [25]. Finally, there also exists work on approximation algorithms for broadcast [13].

7.2 Relationship to abstract MAC

A recent line of research studies communication primitives such as broadcast and consensus on top of an Abstract MAC layer. Instead of dealing with MAC layer issues such as collisions and backoff in the design of new algorithms, basic guarantees on the delivery of messages by the MAC layer are assumed and algorithm complexities are analyzed based on these assumptions. E.g., given bounds for the maximum time \(F_{ack}\) of local broadcast (the MAC layer announces a message has been transmitted successfully) and the maximum time \(F_{prog}\) a device receives some message if neighbors are broadcasting, a simple broadcast algorithm that forwards a message whenever it receives it is analysed [17]. The authors show that this algorithm terminates fast, even when the availability of some links is unknown. More precisely, the following bounds hold: \(O(D F_{prog} + k F_{ack})\) for known topologies [20], \(O(D F_{prog} + k r F_{ack})\) for r-restricted uncertainty and \(\Theta ((D+k) F_{ack})\) for QUDG model [17].

The abstract MAC layer facilitates the design and analysis of network layer algorithms and is especially useful when working with devices where the MAC layer mechanisms can only be influenced by parameter tuning, but not by changing their algorithms. However, for domains with applications running on networks with very low bandwidth and static network infrastructure, it can be beneficial to address MAC layer primitives that are optimized for specific applications. Especially when determinism is key and hard deadlines are to be met, it is important that the MAC layer offers more than an indication that the medium seemed to be unoccupied before starting the transmission and that some near-by nodes might have received the message. Moreover it allows a more fine-grained analysis that gives bounds which are specific to the structure of a given network and do not depend on a potentially very high estimate value of \(F_{ack}\). In other words, our work complements the line of research on the opportunities of Abstract MAC layer guarantees. More precisely, the algorithm \(\textsc {Color}\textsc {Cast}\) it is a step in the opposite direction, i.e., it is shown how MAC layer transmission schedules with deterministic guarantees can be computed.

7.3 Relationship to dynamic graphs

Our work studies how to deal with uncertainty in terms of transmission ranges, and our model is related to the notion of temporal and dynamic graphs which have recently received much attention, both from an arbitrary graph as well as a geometric graph perspective [1, 21, 24]. Our graphs can be seen as a mixture of arbitrary and geometric graphs where propagation is dictated by physical lines. Also the dynamics of our communication graphs are constrained by the physical lines: the changes over time are due to varying noise levels on links.

8 Conclusion

We understand our work as a first step toward network models for powerline communication. As a case study, we consider the broadcast problem in this model and give upper and lower time complexity bounds. We analyze the \(\textsc {Color}\textsc {Cast}\) algorithm which not only achieves a good worst-case performance (strictly better than existing known and unknown topology approaches), but also performs well in our simulations. Interestingly, \(\textsc {Color}\textsc {Cast}\) does not try to infer the transmission range of a given node. Consequently, the algorithm also works under changing transmission ranges and the assumption that transmission ranges are fixed is not necessary for our algorithm. Moreover, the algorithm automatically deals with directed links.

While we have derived lower bounds showing the inherent hardness of the broadcast problem under uncertain transmission ranges, the complexity results of the protocols presented in this article do not match these lower bounds. The obvious open research question regards the design of faster broadcast protocols in our model, or a proof that this is not possible.