Browse > Article
http://dx.doi.org/10.3837/tiis.2012.02.012

A Percolation based M2M Networking Architecture for Data Transmission and Routing  

Lu, Jihua (School of Information and Electronics, Beijing Institute of Technology)
An, Jianping (School of Information and Electronics, Beijing Institute of Technology)
Li, Xiangming (School of Information and Electronics, Beijing Institute of Technology)
Yang, Jie (School of Information and Electronics, Beijing Institute of Technology)
Yang, Lei (School of Information and Electronics, Beijing Institute of Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.6, no.2, 2012 , pp. 649-663 More about this Journal
Abstract
We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server-free and router-free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases: routing and data transmission phases. In the routing phase, probe packets will be transmitted and forwarded in the network thus multiple paths are selected and performed based on the constriction of the maximum hop number. In the second phase, the information will be encoded, say, with the fountain codes, and transmitted using the paths generated in the first phase. In such a way, an efficient routing and data transmission mechanism can be built, which allow us to construct a low-cost, flexible and ubiquitous network. Such a networking architecture and data transmission can be used in many M2M communications, such as the stub network of internet of things, and deep space networking, and so on.
Keywords
M2M; percolation networking; fountain codes; IoT;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
Times Cited By Web Of Science : 0  (Related Records In Web of Science)
연도 인용수 순위
1 Stephen M. Dye, "End-to-end M2M," 3rd Edition, Mind Commerce LLC, pp.222-224, Jan.2010.
2 I. Cha, Y. Shah and A. U. Schmidt, "Trust in M2M communication," IEEE Vehicle Technology Magazine., vol.4, no.3, pp.69-75, Sep.2009.
3 3rd Generation Partnership Project (3GPP), "Study on facilitation of machine-to-machine communication in 3GPP systems," 3GPP Tech. Rep. 22.868, Mar.2007.
4 3rd Generation Partnership Project (3GPP), "Feasibility study on remote managements of USIM application on M2M equipment," 3GPP Tech. Rep. 33.812, May.2007.
5 Bob Emmerson, "M2M: The Internet of 50 billion devices," Win-Win Magazine, pp.19-22, Jan.2010.
6 X. Li, J. Lu, J. Yang and J. An, "A novel routing and data transmission method for stub network of Internet of things based on percolation," IEEE Conference on Computer Communications Workshops on M2MCN, pp.201-205, Apr.2011.
7 T. Predojev, J. Alonso-Zarate and M. Dohler, "Energy-delay tradeoff analysis in embedded M2M networks with channel coding," IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, pp.2733-2738, Dec.2010,.
8 M. Martsola, T. Kiravuo and J.K.O. Lindqvist, "Machine to machine communication in cellular networks", IEEE International Conference on Mobile Technology, Applications and Systems, pp.1-6, Nov. 2005.
9 L. Popova, T. Herpel and W. Koch, "Improving downlink UMTS capacity by exploiting direct M2M data transfer," International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, pp.1-8, Apr.2007.
10 C.K.K Toh, "Ad Hoc mobile wireless networks: protocols and systems," Prentice Hall PTR Upper Saddle River, pp.324-326.
11 G. Jayakumar and G. Gopinath, "Ad Hoc mobile wireless networks routing protocols - A review," Journal of Computer Science, vol.3, No.8, Aug.2007, pp.574-582.   DOI
12 M. Franceschetti, O. Dousse, D. Tse, and P. Thiran, "Closing the gap in the capacity of wireless networks via percolation theory," IEEE Transactions on Information Theory, vol.53, no.3, pp.1009-18, Mar.2007,.
13 A. Mei and J. Stefa, "SWIM: A simple model to generate small mobile worlds," in Proc. of IEEE Conference on Computer Communications Workshops, pp.2106-13.
14 C. Hu, X. Wang, Z. Yang, J. Zhang, Y. Xu and X. Gao, "A geometry study on the capacity of wireless networks via percolation," IEEE Transactions on Communications, 2010.
15 Chi-Kin Chau, Richard J. Gibbens and Robert E. Hancock, "Robust multipath routing in large wireless networks," in Proc. of IEEE Conference on Computer Communications Workshops, pp.271-275.
16 Bertossi, A.A. and Pinotti, C.M., "Skewed allocation of non-uniform data for broadcasting over multiple channels," 20th International Symposium on Parallel and Distributed Processing, 2006.
17 O. Bakun and G. Konjevod, "Adaptive decentralized routing in small-world networks," in Proc. of IEEE Conference on Computer Communications Workshops, pp.1-6, 2010.
18 I. Grønbaek and P.K. Biswas, "Ontology-based abstractions for M2M virtual nodes and topologies," International Conference on Ultra Modern Telecommunications & Workshops, pp.1-8, Oct.2009.
19 M. Ryu, S. Cha, J. Koh, etc. "Position-based routing Algorithm for improving reliability of Inter-vehicle communication," KSII Transactions on Internet and Information Systems (TIIS), vol.5, no.8, pp.1388-1402, Aug.2011.
20 S. Park, S. Yoo, and F. Qiu, "Route reutilization routing in mobile ad hoc networks," KSII Transactions on Internet and Information Systems (TIIS), vol.4, no.2, pp. 78-97, Apr.2010.
21 M. Luby, "LT codes," in Proc. of 43rd IEEE Symposium on Foundations of Computer Sciences, pp.271-280, Nov.2002
22 A. Shokrollahi, "Raptor codes," IEEE Transactions on Information Theory, vol.52, no.6, pp.2551-2567, Jun.2006.
23 X. Li and T. Jiang. "Fountain codes over GF(q)," Wireless Communications and Mobile Computing, Sep.2011.
24 T.Jiang and X. Li. "Using fountain codes to control the Peak-to-Average power ratio of OFDM signals," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3779-85, 2010.