Summary of the invention
It is an object of the invention to D2D communication environment in, propose a kind of Cellular Networks assist under based on social networks
File Sharing Technique, this technology is effectively reducing system overall delay, while improving file transmission efficiency, bears alleviating base station
Load aspect also has the biggest advantage.
For solving this technical problem, the technical solution used in the present invention is to propose a kind of file based on social networks altogether
Enjoy method, specifically include following steps:
Step 1: user grouping, server is set up user and is collected u={U1,U2,U3,···,UNAnd user's demand file collection
F={F1,F2,F3,···,FM};
Step 2: set up social network diagram, user, according to user interest, is divided into some interim groups, and feeds back to by base station
Group member, sets up regular network;
Step 3: determine central user;
Step 4: judge whether can set up D2D link between user;
Step 5: link selection.
Further, in step 2, first generate adjacency matrix A according to described regular network, then regular network is carried out even
Connect, generate small-world network, analyze adjacency matrix A, whether to have between decision node i and node j connection, and generate a nothing
Weigh undirected social network diagram G and social networks matrix TM×N。
Especially, above-mentioned regular network be attached refers to reconnect probability at random regular network is weighed at random
Even.
In step 3, determine central user be calculate interim group by communication degree algorithm in the communication degree D of each user
(Ui), then choose the central user that the user that wherein communication degree is maximum organizes as this.
Above-mentioned communication degree algorithm is preferably Dul.
Step 4 judges whether can set up between user the process of D2D link be first determine whether this group in whether there is demand
File, is first transferred to file central user if there is then base station by cellular communications channel, in group other users again with
It is shared, then by the average degree of belief of the user node in degree of belief algorithm calculating social networks, if less than secure threshold,
Then can set up D2D link between user, otherwise can only select cellular communication link.
In step 5, carry out the utility function value between elder generation's computing terminal user node or base station during link selection, then divide
The social network diagram that analysis user is constituted, will meet the company limit composition set ψ of certain restrictive condition, then mark in set ψ
There is the company limit of maximum utility functional value, according to the node at two ends, limit to selecting communication pattern.
Further, above-mentioned restrictive condition is that OIOO (One In One Out) singly enters singly to go out.
Compared with prior art, there is advantages that
1. the present invention can be effectively improved the efficiency of file-sharing between user, effectively reduces the time delay of file-sharing;
2. the present invention can alleviate the download burden of base station, have while ensureing file-sharing safety and transmission quality
Effect saves frequency spectrum resource, optimizes the overall performance of cellular communication system.
3. solve the problem that D2D user is only capable of processing (receive or a send) request in the same time.
Detailed description of the invention
Below in conjunction with Figure of description, the present invention is described in further detail.
The present invention solves that this technical problem is adopted the technical scheme that: utilize small-world network model to emulate user's structure
The social networks become.Subsequently, according to user's demand to file, user is divided into several interim groups, in each group,
First the central user of social activity degree maximum receives file destination.Finally according to social networks situation between user, use D2D communication technology
It is shared with other users.Including user node degree of belief algorithm Suc, group member social activity degree algorithm Dul, and time delay is calculated
Method Del.Be simultaneously introduced in file-sharing Mechanism Study the conventional greedy colored limit labeling algorithm for time-delay calculation in order to
It is proposed that time delay algorithm compare.
User node degree of belief algorithm Suc: assume user node UjTrust user node Ui, work as UjIn a network credible
When spending higher, then UiCredibility in a network also will not be poor.So the degree of belief that user node is in social networks
Its weighted average trusting angle value can be obtained by value by other nodes, and concrete formula is as follows:
Group member's social activity degree algorithm Dul: user UiSocial degree represent the summation of its in-degree and out-degree, it may be assumed that
Wherein N is total user node number, works as UiWith node UkBetween when there is social link, a (Ui,Uk)=1, anyway
It is then 0.
Greedy colored limit labeling algorithm: the propagation delay time between base station to user is considered as being that a constant is set to t0,
In same group, propagation delay time between D2D user can also be seen constant as and is set to t1.Assume that all of cellular link number is
Lcj, all of D2D number of links is Ldj, the time delay that therefore can obtain transmitting file in the labeling algorithm of greedy colored limit is:
The overall delay of D2D file-sharing based on the social networks mechanism that the present invention is studied is:
Wherein LcjAnd LdjCellular link number and the D2D chain of other users of social networks is not respectively had with central user
Way.
Based on above theoretical, we can provide file based on social networks distribution and secret sharing, and to file
Propagation delay time calculates.The present invention is divided into following step:
Step 1: set up packet
(1) server is set up user and is collected u={U1,U2,U3,···,UNAnd user demand file collection F={F1,F2,
F3,···,FM, wherein N represents the number of user, and M represents the number of file;
(2) server sends information to base station, and base station is broadcast to all users after receiving information.N number of user respectively please
Seek content interested in M file, and solicited message is sent back to base station;
(3) some interim groups are set up according to the interest of user in base station, and the group's relation formed is fed back to each little
All members in group.
Step 2: set up small-world network model
(1) set up regular network, obtain adjacency matrix A;
(2) regular network is reconnected at random reconnecting probability at random, generate small-world network;
(3) analyze adjacency matrix A, whether have connection between decision node i and node j;
(4) generate one and have no right undirected social network diagram G and social networks matrix TM×N。
Step 3: determine central user:
(1) social activity degree algorithm Dul, the social degree of each user in calculating group are used;
(2) user that selection social activity degree is the highest is as the central user of group;
(3) first base station is transferred to file central user by cellular communication;
(4) little group member shares this document based on social networks by D2D communication again.
Step 4: terminal node link selection:
(1) the degree of belief S (U to each user node in social networksi) compose initial value, value scope is between [0,1];
(2) according to degree of belief algorithm Suc, each node is averaging degree of belief;
(3) whether degree of belief difference total in judging group exceedes accuracy value;
(4) the convergence result of degree of belief is tried to achieve;
(5) by whether D2D link can be there is between degree of belief and threshold value multilevel iudge user;
(6) the utility function value between computing terminal user node (including base station);
(7) analyze the social network diagram that user is constituted, the company limit of OIOO (One In One Out) restrictive condition will be met
Composition set ψ, then marks the company limit in set ψ with maximum utility functional value, according to connecting the node at two ends, limit to coming
Select communication pattern.
Now file distributing is shared implementation method to be further described.
As depicted in figs. 1 and 2, server initially sets up user and collects u={U1,U2,U3,···,UNAnd user ask literary composition
Part collection F={F1,F2,F3,···,FM, subsequently, user is divided into some interim groups according to user interest by base station (eNB)
And feed back to personnel in group.The central user U in group is selected by social activity valuei, demand file is sent to central authorities by base station subsequently
User.Group member selects the acquisition mode of file again by utility function.
As it is shown on figure 3, the specifically comprising the following steps that of file-sharing implementation method
1. user grouping
(1) server is set up user and is collected u={U1,U2,U3,···,UNAnd user demand file collection F={F1,F2,
F3,···,FM, wherein N represents the number of user, and M represents the number of file;
(2) server sends information to base station, and base station is broadcast to all users after receiving information.N number of user respectively please
Seek content interested in M file, and solicited message is sent back to base station.Assume solicited status matrix RN×M=
(rn,m) user's interest to file in expression system, define rn,m=1 represents user UNTo file FMInterested, otherwise, rn,m=
0;
(3) some interim groups are set up according to the interest of user in base station, and the group's relation formed is fed back to each little
All members in group.If group's collection is combined into g={g1,g2,g3,···,gj, gjRepresent file FjThere is demand
User set.Obviously the number of users that small set meets in relation g≤| M |, and each group meets gj≤N.Due to often
Individual user can ask multiple file, so allowing overlap, i.e. g between groupi∩gj≠ o sets up.
2. set up social network diagram
(1) set up regular network, obtain adjacency matrix A;
(2) regular network is reconnected at random reconnecting probability at random, generate small-world network;
(3) analyze adjacency matrix A, whether have connection between decision node i and node j;
(4) generate one and have no right undirected social network diagram G and social networks matrix TM×N。
3. determine central user
(1), after packet, base station needs to determine central user in packet;
(2) different due to the social status of each user, select which user as the central user of group to whole nothing
Gauze network has a major impact.Here choose user in the group that social value is the highest, the highest sharing efficiency can be reached;
(3) user U is calculatediSocial degree, it represents user's in-degree and summation of out-degree, it may be assumed that
Wherein N is total user node number, works as UiWith node UkBetween when there is social link, a (Ui,Uk)=1.In order to
Guarantee concordance and the comparability of result, present invention assumes that user and oneself there is not social networks.Definition makes CD(Ui) value is
Big node UiFor central user.
In each group, if there is not the file of demand in this group, then first base station is transmitted file by cellular communication
To central user, each group shares this document based on social networks by D2D communication again.
4. judge whether can set up D2D link between user
(1) the degree of belief s (U to each user node in social networksi) compose initial value, value scope is between [0,1];
(2) according to below equation, each user node is asked
(3) setFor low precision, it is judged thatValue withSize, if
Then forward step 4 to), otherwise makeForward step (2) to continue to calculate;
(4) convergence result is tried to achieve;
(5) there is D2D link between user and must be fulfilled for two conditions: firstly, there are social networks;Secondly, degree of belief
Must be in the scope of safety.The threshold value assuming degree of belief is S0, then can be by social link metric S elementary composition for 0-1M×N
Meet condition s (Ui) > S0.When meeting two above condition, D2D link can be set up between user, otherwise can only use Cellular Networks
Middle traditional communication link.
5. link selection
(1) the utility function value between computing terminal user node (including base station):
Wherein:
Represent that user i has been received that file m,And if only if Γi,m=1 and user j or just
Accepting file m.When user i is base station or its transmitter free time, haveEqually, the most occupied when the receiver of user j
Used time,
(2) analyze the social network diagram that user is constituted, the company limit of OIOO (One In One Out) restrictive condition will be met
Composition set ψ, then marks the company limit in set ψ with maximum utility functional value, according to connecting the node at two ends, limit to coming
Communication pattern is selected (if two nodes are user, then to select D2D communication pattern;If containing base station, then select cellular communication mould
Formula), circulate this process until set ψ is sky.
6. time-delay analysis
Assume that all of cellular link number is Lcj, all of D2D number of links is Ldj, therefore calculate at greedy colored limit labelling
The time delay that can obtain transmitting file in method is:
From previously described, a social colony exist the central user that social activity degree is maximum, the present invention assumes
The social degree of central user is Dj, then to have social networks and the degree of belief user in threshold range permissible with central user
Directly by central user by D2D link sharing file to meet demand, therefore the present invention studied based on social networks
The overall delay of D2D file-sharing mechanism is:
Wherein LcjAnd LdjCellular link number and the D2D chain of other users of social networks is not respectively had with central user
Way, the join algorithm of link is set up by greedy colored limit labeling algorithm.Assume that central user is in this group the first of file
Individual recipient, can directly obtain owing to having social networks and trust angle value user in the reasonable scope with it at central user
Obtaining file, the most in theory, overall delay reduces, i.e. tsum,D2DLess than tgre。
It it is below simulation result
Fig. 4 illustrates under given D2D communication environment, 20 users in the border circular areas that radius is 1000 meters, threshold value
S0Impact on user's average degree.As seen from the figure, S is worked as0When=0 i.e. trust threshold is zero, corresponding maximum user's average degree is about etc.
In 5.25, along with the increase of threshold value, the average degree of user reduces.As can be seen from Figure, curve has downward trend, i.e. S0Value
The biggest, trust requires the harshest, and user's average degree is the least.
Fig. 5 illustrate file-sharing based on social networks mechanism and greediness colour limit labeling algorithm under, overall delay with
The situation the change of file number m and change, m is the total number of file that user asks in file set F here.By permissible in figure
Finding out, the overall delay of institute of the present invention extracting method is less than the time delay in the labeling algorithm of greedy colored limit, is consistent with theory analysis.This
Outward, along with increasing of quantity of documents, in figure, the difference of the numerical value of two curves is also increasing.
Fig. 6 illustrates respectively under file-sharing mechanism algorithm based on social networks and greediness colour limit labeling algorithm,
The situation of load of base station, when i.e. meeting all users to the request of file, the number of files of base station in response.It can be seen that
When meeting the identical demand condition of user, the quantity of documents of base station in response differ.As m=20, greedy colored limit mark
In note algorithm, the number of files of base station in response is about 560, and is only about 210 in the algorithm that the present invention proposes.This can illustrate, selects
The user with maximum social activity degree can effectively alleviate the load of base station as central user.
The foregoing is only a specific embodiment of the present invention, not in order to limit the present invention, all essences in the present invention
Within god and principle, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.