CN103442382B - Reduce the topology control method disturbing between link - Google Patents

Reduce the topology control method disturbing between link Download PDF

Info

Publication number
CN103442382B
CN103442382B CN201310416501.3A CN201310416501A CN103442382B CN 103442382 B CN103442382 B CN 103442382B CN 201310416501 A CN201310416501 A CN 201310416501A CN 103442382 B CN103442382 B CN 103442382B
Authority
CN
China
Prior art keywords
node
center control
control nodes
topology
limit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310416501.3A
Other languages
Chinese (zh)
Other versions
CN103442382A (en
Inventor
王玺钧
盛敏
刘梦霞
翟道森
张琰
李建东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201310416501.3A priority Critical patent/CN103442382B/en
Publication of CN103442382A publication Critical patent/CN103442382A/en
Application granted granted Critical
Publication of CN103442382B publication Critical patent/CN103442382B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of topology control method disturbing between link that reduces, mainly solve and in prior art, can not ensure to reduce the problem of disturbing between link. Its implementation procedure is: first, build peak power topology by center control nodes; Secondly, by center control nodes, taking the degree of disturbance on limit as standard, all limits in the limit set of traversal peak power topology, delete optimization to this limit set, build full mesh topology; Again, by center control nodes all node broadcasts full mesh topology information except center control nodes in network; Finally, determine the logic neighbors of oneself according to the full mesh topology information of receiving by all nodes except center control nodes in network, and adjust the transmitting power of oneself. The present invention has reduction node energy consumption, and the advantage that reduces to disturb between link, can be used for radio sensing network.

Description

Reduce the topology control method disturbing between link
Technical field
The invention belongs to wireless communication field, particularly a kind of method that builds network topology structure, can be used forRadio sensing network.
Background technology
Wireless sensor network is the wireless network consisting of Ad hoc mode the small node of one group of random distribution,Each small node is made up of sensor, data processing unit and communication unit. Wireless sensor network combines sensingDevice, low-power consumption, communication and the technology such as micro electronmechanical, have real-time data acquisition, Supervised Control and information sharing and depositThe functions such as storage management are a kind of network communicating systems that is full of development potentiality.
Energy reserving is the research aspect of two outbalances in wireless sensor network with reducing interference. In topology controlAspect, a large amount of research work in recent years mainly focuses on how algorithm for design is to reduce the energy consumption of network node, severalIndividual comparatively typical algorithm, if the authors such as N.Li are at IEEETransactionsonWirelessCommunicationsOn the article " DesignandAnalysisofanMST-BasedTopologyControlAlgorithm " delivered mentionLMST algorithm, the authors such as Y.Shen are on ACMSIGCOMMComputerCommunicationReviewArticle " the Ashortest-path-basedtopologycontrolalgorithminwirelessmu lti-hop deliveringNetworks " in the LSP algorithm mentioned etc., be subjected to and paid close attention to widely, due to the common tool of low energy consumption topological structureHave the characteristics such as sparse property, node degree be low, therefore people generally believe that the topology of low energy consumption also means low interference, soIn this class algorithm, seldom have in reducing node energy consumption and take explicitly into account the interference how reducing between node.
But, the article " Dosetopology that the authors such as M.Burkhart deliver on ACMMobiHoc2004Controlreduceinterference? " in be disclosed in energy reserving and reduce disturb between do not have definite relation, also, a low energy consumption Topology Control Algorithm can not guarantee that its final topological structure is low interference.
At present, in order to reduce interference, researcher has proposed some Topology Control Algorithms. According to interference model notWith, these algorithms roughly can be divided into two large classes: a class be consideration a pair of node in communication process to its transmission rangeThe interference that interior node causes, i.e. the low interference Topology Control Algorithm of the interference model based on limit noise spot, as M.Article " the Dosetopologycontrolreduce that the authors such as Burkhart deliver on ACMMobiHoc2004Interference? " the LISE algorithm of middle proposition; Another kind of is that consideration individual node is made the node in its transmission rangeThe interference becoming, i.e. the low interference Topology Control Algorithm of the interference model based on a noise spot, as the authors such as G.Feng existArticle " the Interferenceminimumnetwork delivering on Wirel.Commun.Mob.Comput2012TopologiesforNetworksadhocnetworks " the middle BIMA algorithm proposing. Owing to opening up based on bottom in researchWhen the Channel Assignment Problems of flutterring or scheduling problem, need to consider a pair of node in communication process to can in its transmission rangeThe interference causing with the link of communication, and above-mentioned two class algorithms all cannot guarantee to reduce the interference between link, Jin ErwuMethod provides a good bottom topology.
Summary of the invention
The object of the invention is to the problem for above-mentioned prior art, propose a kind of topology control of disturbing between link that reducesMethod processed, to reduce node energy consumption, reduces the interference between link, realizes bottom topology.
To achieve these goals, network topology control method of the present invention comprises the steps:
(1) in network, except center control nodes o, all node u send a Hello number to center control nodes oAccording to bag, center control nodes o obtains peak power topology Gmax=(V(Gmax),E(Gmax)), wherein V (Gmax) forHigh-power topological GmaxNode set, E (Gmax) be peak power topology GmaxLimit set:
(2) the center control nodes o in network calculates the degree of disturbance on every limit in peak power topology:
(2a) center control nodes o judges limit set E (Gmax) in any two limit (xi,yi) and (xj,yj) whether mutualDisturb, if limit (xj,yj) on have at least one node xjOr yjAt node xiOr node yiTransmission radius r within the scope of,Limit (xi,yi) interfere with limit (xj,yj);
(2b) center control nodes o calculates limit set E (Gmax) in the degree of disturbance on every limit (x, y), gather on limitE(Gmax) total number on the limit that statistics limit (x, y) interferes with in scope;
(3) center control nodes o builds full mesh topology G=(V (G), E (G)), and wherein V (G) is full mesh topology G'sNode set, comprises in center control nodes o and network all node u except center control nodes o, and E (G) is instituteThe limit set of the full mesh topology G building;
(4) center control nodes o is recorded in the node set V of described full mesh topology G (G) and limit set E (G) to open upFlutter more in new information MSG, and wide with the mode all node u except center control nodes o in network that floodBroadcast this MSG message;
(5) in network, except center control nodes o, all node u, according to above-mentioned MSG message, determine patrolling of oneselfCollect neighbors, and adjust the transmitting power of oneself.
Tool of the present invention has the following advantages:
1) the present invention, owing to having considered the phase mutual interference of limit with limit in the time calculating interference, therefore adopts the inventive method structureThe bottom topology of building, is more conducive to the link interference problem in processing channel distribution or link scheduling process;
2) the present invention is because the interference taking between link is weight, and in topology constructing, considered arbitrary node combinationBetween shortest path length, make the present invention ensureing, under the prerequisite of Euclidean distance t-Spanner characteristic, reducing nodeEnergy consumption, reduces the interference between link.
Brief description of the drawings
Fig. 1 is the applicable wireless network scenario schematic diagram of the present invention;
Fig. 2 is the peak power topological diagram forming when 50 meshed network scenes in Fig. 1;
Fig. 3 is realization flow figure of the present invention;
Fig. 4 is the sub-process figure that center control nodes of the present invention builds full mesh topology;
Fig. 5 is the present invention and the simulation comparison figure of existing Topology Control Algorithm to node maximum interference degree;
Fig. 6 is the present invention and the simulation comparison figure of existing Topology Control Algorithm to node maximum transmitted radius.
Detailed description of the invention
Below in conjunction with accompanying drawing, embodiment of the present invention is described in further detail.
With reference to Fig. 1, the wireless network that the present invention uses is made up of n the homogeneity node being distributed in two dimensional surface region,Suppose to control node o centered by one of them node, remain as controlling all node u outside joint o in network Zhong Chu center.Each node has No. ID, unique authentication number, and can obtain by GPS or other location technologiesIt self positional information. In network, each internodal wireless channel is additive white Gaussian noise channel. All jointsPoint is by omnidirectional antenna and node communication around, and maximum transmission power is Pmax. The transmitting power P of all nodes canTo regulate continuously between minimum and maximum, i.e. 0≤P≤Pmax. The transmission range corresponding to transmitting power of each nodeFor the transmission radius r of this node, maximum transmission power PmaxCorresponding transmission radius is maximum transmitted radius R, twoThe necessary and sufficient condition that has Radio Link between node is that the Euclidean distance between them is less than or equal to transmission radius r.
When all nodes in network all use maximum transmission power PmaxThe topological structure forming when transmission is that peak power is opened upFlutter, as shown in Figure 2, peak power topological representation is: Gmax=(V(Gmax),E(Gmax)), wherein V (Gmax) forHigh-power topological GmaxNode set, E (Gmax) be peak power topology GmaxLimit set. The peak power hereTopology is undirected topology, at limit set E (Gmax) in (x, y) and (y, x) be same limit, in explanation afterwards,All represent with (x, y).
With reference to Fig. 3, performing step of the present invention is as follows:
Step 1, center control nodes o builds peak power topology Gmax
(1a) all node u except center control nodes o in center control nodes o and network, form maximum workRate topology GmaxNode set V (Gmax);
(1b) all node u that save outside o are controlled with maximum transmission power P in network Zhong Chu centermaxBy the side floodingFormula sends a Hello packet, the authentication that comprises node u in this Hello packet to center control nodes oNo. ID, number and positional information;
(1c) center control nodes o receives the Hello packet that in network, all node u except own send, andBy the information recording in Hello packet in the whole network informational table of nodes of oneself;
(1d) center control nodes o, according to the node location information in the whole network informational table of nodes of oneself, calculates the whole networkIn any two node x, the Euclidean distance d (x, y) between y:
d ( x , y ) = ( X x - X y ) 2 + ( Y x - Y y ) 2 ,
Wherein, (Xx,Yx) be the position coordinates of node x, (Xy,Yy) be the position coordinates of node y;
(1e) center control nodes o judges between any two points according to node maximum transmitted radius R and described Euclidean distanceAnnexation, obtain limit set E (Gmax) information, concrete determination methods is as follows:
If the Euclidean distance d (x, y) of limit (x, y) is less than or equal to node maximum transmitted radius R, when d (x, y)≤R,(x, y) ∈ E (Gmax);
If the Euclidean distance d (x, y) of limit (x, y) is greater than node maximum transmitted radius R, i.e. d (x, y) > when R,Wherein, ∈ represents subordinate relation,Represent non-subordinate relation;
(1f) with node set V (Gmax) and limit set E (Gmax), jointly form peak power topology:Gmax=(V(Gmax),E(Gmax))。
Step 2, the center control nodes o in network calculates peak power topology limit set E (Gmax) in every limit dryDegree of disturbing.
(2a) center control nodes o is according to the limit set E (G of peak power topologymax) in every limit (x, y) EuropeanApart from d (x, y), judge limit set E (Gmax) in any two limit (xi,yi) and (xj,yj) whether phase mutual interference:
If limit (xj,yj) on have at least one node xjOr yjAt node xiTransmission radius r within the scope of, limit (xi,yi)Interfere with limit (xj,yj);
If limit (xj,yj) on have at least one node xjOr yjAt node yiTransmission radius r within the scope of, limit (xi,yi)Interfere with limit (xj,yj), otherwise (xi,yi) interference edge (x notj,yj);
(2b) center control nodes o calculates limit set E (Gmax) in the degree of disturbance on every limit (x, y), gather on limitE(Gmax) total number on the limit that statistics limit (x, y) interferes with in scope.
Step 3, center control nodes o builds full mesh topology G=(V (G), E (G)).
With reference to Fig. 4, being implemented as follows of this step:
(3a) center control nodes o initializes full mesh topology and shortest path collection:
The node set V of full mesh topology G (G) is initialized to all joints in peak power topology by center control nodes oPoint, is initialized to all limits in peak power topology by the limit set E (G) of full mesh topology G, and is limit set E (G)In every limit (x, y) set up traversal mark, be initialized as 1, represent not ergodic state, i.e. label(x,y)=1;
Center control nodes o sets up set of minimal paths P={pG(x, y) }, wherein pG(x, y) is in node set V (G)Any a pair of node combination<x, y>shortest path in full mesh topology G, if limit (x, y) ∈ E (G), For empty set, if limitCenter control nodes o computing node combination<x, y>Shortest path p in full mesh topology GG(x, y), and be recorded to set of minimal paths P;
(3b) center control nodes o checks in limit set E (G), whether to exist in the limit of ergodic state not, if do not deposit, full mesh topology G has built, otherwise center control nodes o gathers all traversals in E (G) by limit and is labeled asSorting from big to small by degree of disturbance in 1 limit, selects the limit of degree of disturbance maximumTraveled through mark and be made as 0, tableShow ergodic state,And set up test topology For node setWhole nodes in V (G),For limit set E (G) removes limitAfter set;
(3c) center control nodes o, taking Euclidean distance as weight, adopts shortest path tree algorithm, as Dijkstra calculatesMethod, bellman-ford algorithm, computing node combinationIn test topologyIn shortest pathAnd decision node combinationIn test topologyIn shortest pathCan meet Euclidean distanceT-Spanner characteristic:
| p G ^ ( x ^ , y ^ ) | &le; t &times; | p G m a x ( x ^ , y ^ ) | ,
WhereinFor node combinationIn test topologyIn shortest path length,For node combinationAt peak power topology GmaxIn shortest path length, t is the parameter of t-Spanner characteristicThe factor, value is 2 or 4;
If (3d) node combinationIn test topologyIn shortest pathCan meet Euclidean distanceT-Spanner characteristic, center control nodes o execution step (3e), if can not meet, center control nodes oReturn to step (3b);
(3e) center control nodes o finds out in set of minimal paths P and uses limitThe combination of all nodes<m, n>, form and quote set T,If quoting set T is empty set,Center control nodes execution step (3g), if set T is not empty set, center control nodes execution step (3f);
(3f) center control nodes o, taking Euclidean distance as weight, adopts shortest path tree algorithm, as Dijkstra calculatesMethod, bellman-ford algorithm, calculate all node combination<m that quote in set T, n>in test topologyInShortest path, and judge that can it meet Euclidean distance t-Spanner characteristic, if quote all node groups in set TClose and can meet, center control nodes o execution step (3g), has at least one pair of node to combine if quote in set TIn test topologyIn shortest path cannot meet Euclidean distance t-Spanner characteristic, center control nodes o returnsStep (3b);
(3g) center control nodes o upgrades topological state:
(3g1) center control nodes o is by limitFrom limit set E (G), delete, and node is combined?Test topologyIn shortest pathWith quote set T in all nodes be combined in test topologyInShort path is updated in set of minimal paths P;
(3g2) center control nodes o upgrades the degree of disturbance on every limit in limit set E (G), according to step (2) instituteThe degree of disturbance that the method for stating recalculates every limit (x, y) in limit set E (G), afterwards, returns to step (3b).
Step 4, center control nodes o is to more new information MSG message of the whole network broadcast topology.
(4a) center control nodes o is recorded in the node set V of described full mesh topology G (G) and limit set E (G)Topology is more in new information MSG;
(4b) center control nodes o maximum transmission power, controls joint o in the mode flooding to network Zhong Chu centerOuter all node u broadcast described MSG message.
Step 5, all node u that network Zhong Chu center is controlled outside joint o determine patrolling of oneself according to described MSG messageCollect neighbors, and adjust the transmitting power of oneself.
(5a) all node u that save outside o are controlled according to the full mesh topology in described MSG message in network Zhong Chu centerInformation, one on full mesh topology G jumped to neighbors v as logic neighbors, and form logic neighbors collection:LNu=v ∈ V (G) | (u, v) ∈ E (G) }, wherein, V (G) is the node set of full mesh topology G, E (G) is the whole networkThe limit set of topology G;
(5b) all node us of joint outside o are controlled according to described logic neighbors collection in network Zhong Chu center, by oneselfTransmitting power is adjusted into the needed minimum power of logic neighbors that can cover farthest?
P LN u = m a x { p u , v | v &Element; LN u } .
Effect of the present invention can further illustrate by emulation:
(1) simulated conditions
Emulation adopts MATLAB simulation software to realize.
In simulating scenes, network node is evenly distributed on a 1000 × 1000m at random2On two dimensional surface region. NetIn network, all nodes adopt identical maximum transmitted radius R=250m. Number of network node excursion is 50~100.
(2) emulation content and result
Emulation 1, is respectively at t under 2,4 condition, by the inventive method and existing LISE algorithm, peak powerTopology Control Algorithm NONE carries out simulation comparison to the maximum interference degree of network, and result as shown in Figure 5.
Fig. 5 shows: with increasing of nodes, and the network that adopts LISE algorithm and peak power Topology Control Algorithm to generateMaximum interference degree be obvious ascendant trend, and adopt the maximum interference degree of network that the inventive method generates with nodesThe ascendant trend increasing is slow, even tends to be steady; And in situation for same node point number, adopt the inventive methodThe maximum interference degree value of the network generating and average degree of disturbance value are much smaller than other two kinds of algorithms.
Emulation 2, is respectively at t under 2,4 condition, by the inventive method and existing LISE algorithm, peak powerTopology Control Algorithm NONE carries out simulation comparison to the maximum transmitted radius of network, and result as shown in Figure 6.
Fig. 6 shows: adopt the maximum transmitted radius of the network of the inventive method generation to be better than other Topology Control Algorithm,Because maximum transmitted radius is directly proportional to maximum transmission power, therefore the inventive method can effectively reduce the transmitting merit of nodeRate, this can prove the validity of the inventive method.

Claims (7)

1. reduce the topology control method disturbing between link, comprise the steps:
(1) in network, except center control nodes o, all node u send a Hello number to center control nodes oAccording to bag, center control nodes o obtains peak power topology Gmax=(V(Gmax),E(Gmax)), wherein V (Gmax) forHigh-power topological GmaxNode set, E (Gmax) be peak power topology GmaxLimit set:
(2) the center control nodes o in network calculates the degree of disturbance on every limit in peak power topology:
(2a) center control nodes o judges limit set E (Gmax) in any two limit (xi,yi) and (xj,yj) whether mutualDisturb, if limit (xj,yj) on have at least one node xjOr yjAt node xiOr node yiTransmission radius r within the scope of,Limit (xi,yi) interfere with limit (xj,yj);
(2b) center control nodes o calculates limit set E (Gmax) in the degree of disturbance on every limit (x, y), gather on limitE(Gmax) total number on the limit that statistics limit (x, y) interferes with in scope;
(3) center control nodes o builds full mesh topology G=(V (G), E (G)), and wherein V (G) is full mesh topology G'sNode set, comprises in center control nodes o and network all node u except center control nodes o, and E (G) is instituteThe limit set of the full mesh topology G building;
(4) center control nodes o is recorded in the node set V of described full mesh topology G (G) and limit set E (G) to open upFlutter more in new information MSG, and wide with the mode all node u except center control nodes o in network that floodBroadcast this MSG message;
(5) in network, except center control nodes o, all node u, according to above-mentioned MSG message, determine patrolling of oneselfCollect neighbors, and adjust the transmitting power of oneself.
2. topology control method according to claim 1, the wherein described network Zhong Chu center control of step (1)The outer all node u of node o processed send a Hello packet to center control nodes o, refer to that node u is with maximumTransmitting power PmaxSend the Hello packet of oneself to center control nodes o in the mode flooding.
3. topology control method according to claim 1, the wherein described center control nodes o of step (1)Obtain peak power topology Gmax=(V(Gmax),E(Gmax)), obtain as follows:
(1a) in center control nodes o and network, except center control nodes o, all node u formation peak powers are opened upFlutter GmaxNode set V (Gmax);
(1b) in network, except center control nodes o, all node u send oneself Hello to center control nodes oPacket, No. ID, the authentication number and the positional information that in this Hello packet, comprise node u;
(1c) center control nodes o receives the Hello data that in network, all node u of other except own sendBag, and by the information recording in Hello packet in the whole network informational table of nodes of oneself;
(1d) center control nodes o, according to the positional information in the whole network informational table of nodes, calculates any two points in the whole networkX, the Euclidean distance d (x, y) between y;
(1e) center control nodes o is any according to node maximum transmitted radius R and described Euclidean distance d (x, y) judgementThe annexation of point-to-point transmission, obtains peak power topology GmaxLimit set E (Gmax);
(1f) with node set V (Gmax) and described limit set E (Gmax), jointly form peak power topology:Gmax=(V(Gmax),E(Gmax))。
4. topology control method according to claim 1, the wherein described center control nodes o of step (3)Build full mesh topology G=(V (G), E (G)), build as follows:
(3a) initialize full mesh topology:
The node set V of full mesh topology G (G) is initialized to all joints in peak power topology by center control nodes oPoint, is initialized to all limits in peak power topology by the limit set E (G) of full mesh topology G;
Center control nodes o sets up set of minimal paths P={pG(x, y) }, wherein pG(x, y) is node set V (G)In any a pair of node combination<x, y>shortest path in full mesh topology G, if limit (x, y) ∈ E (G), For empty set, if limitCenter control nodes o calculates based on full mesh topology GpG(x,y);
(3b) center control nodes o gathers in E (G) all limits that were not traversed by degree of disturbance from big to small by limitSort, select the limit of degree of disturbance maximumAnd set up test topology For set of nodeClose the whole nodes in V (G),For limit set E (G) removes limitAfter set, if in limit set E (G)Limit all traveled through, full mesh topology G has built;
(3c) center control nodes o is taking Euclidean distance as weight, and computing node combinesIn test topologyInShortest pathAnd judgementCan meet Euclidean distance t-Spanner characteristic, if can not meet,Center control nodes o returns to step (3b), if can meet, and center control nodes o execution step (3d);
(3d) center control nodes o finds out in set of minimal paths P and uses limitThe combination of all nodes<m, n>, form and quote set: T ( x , y ) = { < m , n > | ( x ^ , y ^ ) &Element; p ( m , n ) , p ( m , n ) &Element; P } , If quote set T(x,y)For empty set, center control nodes o performs step (3f), is not empty set if quote set T, and center control nodes is heldRow step (3e);
(3e) center control nodes o, taking Euclidean distance as weight, calculates and quotes every pair of node combination in set T<m, n>in test topologyIn shortest pathAnd judgementCan meet Euclidean distanceT-Spanner characteristic, if there is at least one pair of node combination not meet, center control nodes o returns to step (3b),All can meet center control nodes o execution step (3f) if quote all node combinations in set T;
(3f) center control nodes o is by limitFrom limit set E (G), leave out, if exist not in limit set E (G)The limit being traversed, center control nodes o upgrades the degree of disturbance on limit in limit set E (G), and node is combinedIn test topologyIn shortest pathAnd quote and gather every couple of node combination < m in T, n in testTopologyIn shortest pathBe updated in set of minimal paths P, and return to step (3b), if limit collectionThe limit of closing in E (G) all traveled through, and full mesh topology G has built.
5. topology control method according to claim 1, the wherein described network Zhong Chu center control of step (5)The outer all node u of node o processed determine the logic neighbors of oneself according to described MSG message, and adjust sending out of oneselfPenetrate power, carry out as follows:
(5a) node u, according to described MSG message, jumps neighbors v as logic neighbour using one on full mesh topology GNode, and form logic neighbors collection: LNu={v∈V(G)|(u,v)∈E(G)};
(5b) node u, according to logic neighbors, is adjusted into the transmitting power of oneself logic that can cover farthestThe needed minimum power of neighbors? P LN u = m a x { p u , v | v &Element; LN u } .
6. topology control method according to claim 4, wherein said step (3a), step (3c) and stepSuddenly the shortest path in (3e) is by using dijkstra's algorithm or bellman-ford algorithm to calculate.
7. topology control method according to claim 4, the Euclidean distance in wherein said step (3c)T-spanner characteristic, refers to node combinationIn test topologyIn shortest pathMeet
| p G ^ ( x ^ , y ^ ) | &le; t &times; | p G m a x ( x ^ , y ^ ) | ,
WhereinFor node combinationIn test topologyIn shortest path length,For node combinationAt peak power topology GmaxIn shortest path length, t is the parameter of t-Spanner characteristicThe factor, value is 2 or 4.
CN201310416501.3A 2013-09-12 2013-09-12 Reduce the topology control method disturbing between link Expired - Fee Related CN103442382B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310416501.3A CN103442382B (en) 2013-09-12 2013-09-12 Reduce the topology control method disturbing between link

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310416501.3A CN103442382B (en) 2013-09-12 2013-09-12 Reduce the topology control method disturbing between link

Publications (2)

Publication Number Publication Date
CN103442382A CN103442382A (en) 2013-12-11
CN103442382B true CN103442382B (en) 2016-05-25

Family

ID=49696034

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310416501.3A Expired - Fee Related CN103442382B (en) 2013-09-12 2013-09-12 Reduce the topology control method disturbing between link

Country Status (1)

Country Link
CN (1) CN103442382B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103826280B (en) * 2014-03-10 2017-05-17 广州银禾网络通信有限公司 Mobile communication network route optimizing method and system
CN106131887B (en) * 2016-07-08 2019-02-19 西安电子科技大学 Distribution topology control method based on serial interference elimination
CN111277953B (en) * 2020-02-22 2020-11-13 杜义平 Communication network stability processing method and system and electronic equipment
CN114389956B (en) * 2022-01-03 2024-03-15 中国电子科技集团公司第二十研究所 Network topology automatic connection method based on interference node

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200689A (en) * 2013-04-01 2013-07-10 东南大学 Link distribution method used for multichannel wireless Mesh network
CN103200643A (en) * 2013-03-28 2013-07-10 西安电子科技大学 Distributed fault-tolerant topology control method based on dump energy sensing

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7469143B2 (en) * 2003-10-07 2008-12-23 Microsoft Corporation Model and method for computing performance bounds in multi-hop wireless networks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103200643A (en) * 2013-03-28 2013-07-10 西安电子科技大学 Distributed fault-tolerant topology control method based on dump energy sensing
CN103200689A (en) * 2013-04-01 2013-07-10 东南大学 Link distribution method used for multichannel wireless Mesh network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
RESP: A k-Connected Residual Energy-Aware Topology Control Algorithm for Ad Hoc Networks;Xijun Wang,Min Sheng,Mengxia Liu,Daosen Zhai,Yan Zhang;《Wireless Communications and Networking Conference (WCNC)》;IEEE;20130410;第1009-1013页 *
一种QoS保证的容错拓扑控制算法;王东,李发,李晓鸿;《武汉大学学报·信息科学版》;20100531;第35卷(第5期);第512-515页 *

Also Published As

Publication number Publication date
CN103442382A (en) 2013-12-11

Similar Documents

Publication Publication Date Title
Ahmed et al. Internet of Things (IoT) for smart precision agriculture and farming in rural areas
Mao et al. An improved fuzzy unequal clustering algorithm for wireless sensor network
CN104602302B (en) It is a kind of based on cluster structured ZigBee-network balancing energy method for routing
Wen et al. Energy-efficient and delay-aware distributed routing with cooperative transmission for Internet of Things
CN103442382B (en) Reduce the topology control method disturbing between link
Mazumdar et al. A survey on clustering approaches for wireless sensor networks
Pilloni et al. TAN: a distributed algorithm for dynamic task assignment in WSNs
Zhang et al. New method of vehicle cooperative communication based on fuzzy logic and signaling game strategy
CN103095577B (en) Context-sensitive Uneven Cluster routing algorithm
CN103200643A (en) Distributed fault-tolerant topology control method based on dump energy sensing
Xia et al. Cluster-enabled cooperative scheduling based on reinforcement learning for high-mobility vehicular networks
CN102244914A (en) Route recognizing method applicable to multihop wireless network
Zeng et al. Data delivery from WSNs to cloud based on a fog structure
Zhao et al. Survey on social-aware data dissemination over mobile wireless networks
Aznaoui et al. An efficient GAF routing protocol using an optimized weighted sum model in WSN
Zeng Game theory-based energy efficiency optimization model for the Internet of Things
CN107969008A (en) A kind of software definition Sensor Network concentrated route computational methods
Mohiddin et al. Routing path estimation based on RWS method for competent energy dissipation employing X-layer network
CN102630086B (en) Gabriel graph-based data communication method of wireless sensor network
Pandey et al. Energy conservation and efficient data collection in WSN-ME: a survey
Reyes et al. Game of sensors: An energy-efficient method to enhance network lifetime in wireless sensor networks using the game of life cellular automaton
CN103826282A (en) Set partitioning multi-hop routing method based on dump energy
Satyanarayana et al. Implementation of modified Cluster Based Routing Algorithm to Enhance QoS for Wireless Sensor Networks
CN110049465A (en) A kind of water area monitoring communication means based on WSN
Gharajeh A neural-MCDM-based routing protocol for packet transmission in mobile ad hoc networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160525