DOI QR코드

DOI QR Code

A Percolation based M2M Networking Architecture for Data Transmission and Routing

  • Lu, Jihua (School of Information and Electronics, Beijing Institute of Technology) ;
  • An, Jianping (School of Information and Electronics, Beijing Institute of Technology) ;
  • Li, Xiangming (School of Information and Electronics, Beijing Institute of Technology) ;
  • Yang, Jie (School of Information and Electronics, Beijing Institute of Technology) ;
  • Yang, Lei (School of Information and Electronics, Beijing Institute of Technology)
  • Received : 2011.12.25
  • Accepted : 2012.02.13
  • Published : 2012.02.28

Abstract

We propose a percolation based M2M networking architecture and its data transmission method. The proposed network architecture can be server-free and router-free, which allows us to operate routing efficiently with percolations based on six degrees of separation theory in small world network modeling. The data transmission can be divided into two phases: routing and data transmission phases. In the routing phase, probe packets will be transmitted and forwarded in the network thus multiple paths are selected and performed based on the constriction of the maximum hop number. In the second phase, the information will be encoded, say, with the fountain codes, and transmitted using the paths generated in the first phase. In such a way, an efficient routing and data transmission mechanism can be built, which allow us to construct a low-cost, flexible and ubiquitous network. Such a networking architecture and data transmission can be used in many M2M communications, such as the stub network of internet of things, and deep space networking, and so on.

Keywords

References

  1. Stephen M. Dye, "End-to-end M2M," 3rd Edition, Mind Commerce LLC, pp.222-224, Jan.2010.
  2. I. Cha, Y. Shah and A. U. Schmidt, "Trust in M2M communication," IEEE Vehicle Technology Magazine., vol.4, no.3, pp.69-75, Sep.2009.
  3. 3rd Generation Partnership Project (3GPP), "Study on facilitation of machine-to-machine communication in 3GPP systems," 3GPP Tech. Rep. 22.868, Mar.2007.
  4. 3rd Generation Partnership Project (3GPP), "Feasibility study on remote managements of USIM application on M2M equipment," 3GPP Tech. Rep. 33.812, May.2007.
  5. Bob Emmerson, "M2M: The Internet of 50 billion devices," Win-Win Magazine, pp.19-22, Jan.2010.
  6. X. Li, J. Lu, J. Yang and J. An, "A novel routing and data transmission method for stub network of Internet of things based on percolation," IEEE Conference on Computer Communications Workshops on M2MCN, pp.201-205, Apr.2011.
  7. T. Predojev, J. Alonso-Zarate and M. Dohler, "Energy-delay tradeoff analysis in embedded M2M networks with channel coding," IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications, pp.2733-2738, Dec.2010,.
  8. M. Martsola, T. Kiravuo and J.K.O. Lindqvist, "Machine to machine communication in cellular networks", IEEE International Conference on Mobile Technology, Applications and Systems, pp.1-6, Nov. 2005.
  9. L. Popova, T. Herpel and W. Koch, "Improving downlink UMTS capacity by exploiting direct M2M data transfer," International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, pp.1-8, Apr.2007.
  10. C.K.K Toh, "Ad Hoc mobile wireless networks: protocols and systems," Prentice Hall PTR Upper Saddle River, pp.324-326.
  11. G. Jayakumar and G. Gopinath, "Ad Hoc mobile wireless networks routing protocols - A review," Journal of Computer Science, vol.3, No.8, Aug.2007, pp.574-582. https://doi.org/10.3844/jcssp.2007.574.582
  12. C. Hu, X. Wang, Z. Yang, J. Zhang, Y. Xu and X. Gao, "A geometry study on the capacity of wireless networks via percolation," IEEE Transactions on Communications, 2010.
  13. Chi-Kin Chau, Richard J. Gibbens and Robert E. Hancock, "Robust multipath routing in large wireless networks," in Proc. of IEEE Conference on Computer Communications Workshops, pp.271-275.
  14. Bertossi, A.A. and Pinotti, C.M., "Skewed allocation of non-uniform data for broadcasting over multiple channels," 20th International Symposium on Parallel and Distributed Processing, 2006.
  15. A. Mei and J. Stefa, "SWIM: A simple model to generate small mobile worlds," in Proc. of IEEE Conference on Computer Communications Workshops, pp.2106-13.
  16. O. Bakun and G. Konjevod, "Adaptive decentralized routing in small-world networks," in Proc. of IEEE Conference on Computer Communications Workshops, pp.1-6, 2010.
  17. I. Grønbaek and P.K. Biswas, "Ontology-based abstractions for M2M virtual nodes and topologies," International Conference on Ultra Modern Telecommunications & Workshops, pp.1-8, Oct.2009.
  18. M. Ryu, S. Cha, J. Koh, etc. "Position-based routing Algorithm for improving reliability of Inter-vehicle communication," KSII Transactions on Internet and Information Systems (TIIS), vol.5, no.8, pp.1388-1402, Aug.2011.
  19. S. Park, S. Yoo, and F. Qiu, "Route reutilization routing in mobile ad hoc networks," KSII Transactions on Internet and Information Systems (TIIS), vol.4, no.2, pp. 78-97, Apr.2010.
  20. M. Luby, "LT codes," in Proc. of 43rd IEEE Symposium on Foundations of Computer Sciences, pp.271-280, Nov.2002
  21. A. Shokrollahi, "Raptor codes," IEEE Transactions on Information Theory, vol.52, no.6, pp.2551-2567, Jun.2006.
  22. X. Li and T. Jiang. "Fountain codes over GF(q)," Wireless Communications and Mobile Computing, Sep.2011.
  23. T.Jiang and X. Li. "Using fountain codes to control the Peak-to-Average power ratio of OFDM signals," IEEE Transactions on Vehicular Technology, vol. 59, no. 8, pp. 3779-85, 2010.
  24. M. Franceschetti, O. Dousse, D. Tse, and P. Thiran, "Closing the gap in the capacity of wireless networks via percolation theory," IEEE Transactions on Information Theory, vol.53, no.3, pp.1009-18, Mar.2007,.