CN106658523A - Distributed topological method for constructing K channel connectivity in cognitive AdHoc network - Google Patents

Distributed topological method for constructing K channel connectivity in cognitive AdHoc network Download PDF

Info

Publication number
CN106658523A
CN106658523A CN201610369203.7A CN201610369203A CN106658523A CN 106658523 A CN106658523 A CN 106658523A CN 201610369203 A CN201610369203 A CN 201610369203A CN 106658523 A CN106658523 A CN 106658523A
Authority
CN
China
Prior art keywords
node
subgraph
channel
topology
conflict
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610369203.7A
Other languages
Chinese (zh)
Other versions
CN106658523B (en
Inventor
盛敏
李轩
刘豹
孙红光
王玺钧
李建东
陈雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
CETC 54 Research Institute
Original Assignee
Xidian University
CETC 54 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University, CETC 54 Research Institute filed Critical Xidian University
Priority to CN201610369203.7A priority Critical patent/CN106658523B/en
Publication of CN106658523A publication Critical patent/CN106658523A/en
Application granted granted Critical
Publication of CN106658523B publication Critical patent/CN106658523B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/541Allocation or scheduling criteria for wireless resources based on quality criteria using the level of interference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a distributed topological method for constructing K channel connectivity in a cognitive AdHoc network. The method mainly settles problems of secondary user network disconnection and mutual interference of secondary users when a plurality of main users occupy a channel in prior art. The distributed topological method comprises the realizing steps of 1, broadcasting a HELLO package twice by each node in the network, receiving the HELLO packages of an initial adjacent node, and establishing a local two-hop topological subgraph; 2, constructing a shortest path tree based on the local two-hop topological subgraph, and constructing a local generation subgraph which can ensure sub-user connectivity according to the shortest path tree; 3, adjusting an emission power according to a one-hop adjacent node in the local generation subgraph and determining the logical adjacent node of each node; and 4, forming a full network topology by all nodes in the network and logical adjacent nodes, and performing channel selection. The distributed topological method has advantages of ensuring user network connectivity, eliminating the secondary user interferences and saving channel resource. The distributed topological method can be used for the cognitive AdHoc network.

Description

The distributed topology approach of K channel-connectivities is built in cognitive AdHoc networks
Technical field
The invention belongs to wireless communication field, more particularly to a kind of network topology structure based on structure K channel-connectivities Method, can be used for cognitive Ad Hoc networks.
Background technology
The topological structure of network is a highly important factor for affecting cognition Ad Hoc network performances, improves cognition Ad The robustness of Hoc network, the fault-tolerant ability of enhancing network topology become the primary study direction of Topology Control.Cognitive Ad There are two kinds of users in Hoc network, one is primary user, another is time user.Primary user enjoys the preferential right of channel.Work as master During CU channel, secondary user must make a concession the channel in silent status, it is more likely that affect the connectedness of time user.And When multiple primary users take multiple channels, the right to use of substantial amounts of user's yielding channel is had, this may be such that network The situation of segmentation will be more serious, therefore, cognitive Ad Hoc networks how are maintained when busy channel resource occur in multiple primary users Connectedness become a critical problem.In the article that the authors such as Xinjun Wang deliver on IEEE VTC 2014 In the algorithm of " Bi-Channel-Connected Topology Control in Cognitive Radio Networks " etc. The connection of time user network is can ensure that, the interference between time user can be also eliminated, but the method only has to single primary user Effect, when multiple primary users occur, it is impossible to ensure the connection of network, can not eliminate the interference of time user, so as to affect cognition The fault-tolerant ability of Ad Hoc networks.
The content of the invention
Present invention aims to above-mentioned problem of the prior art, proposes to build K in a kind of cognitive Ad Hoc networks The distributed topology approach of channel-connectivity, to ensure the connectedness of secondary user's network, eliminates the interference between secondary user's, from And improve the fault-tolerant ability of cognition Ad Hoc networks.
For achieving the above object, technical scheme includes as follows:
(1) it is that k points are connected to initialize network, k >=2, and each node u obtains respectively a jump and double bounce abutment points in network Sequence number and positional information;
(2) sequence number and positional information in step (1) sets up local double bounce topology subgraphAnd calculateIn Any two has the node x of annexation, link energy consumption weight w between yp(x, y) and link range weight wd(x,y);
(3) each node u builds and is locally generated subgraph S in networku
(3a) initialize each node and be locally generated subgraph SuNode set V (Su) it is local double bounce topology subgraphIn All nodes, initialize each node and be locally generated subgraph SuLine set E (Su) it is empty set;
(3b) based on local double bounce topology subgraphEach node u is according to link energy consumption weight wp(x, y), structure be with u Root, the shortest path tree T of all nodes in local double bounce topology subgraphu=(V (Tu),E(Tu)), whereinFor all nodes in local double bounce topology subgraph, E (Tu) it is all sides for constituting shortest path tree, and will These sides recorded the line set E (S for being locally generated subgraphu) in, i.e. E (Su)<=E (Tu)∪E(Su);
(3c) each node u in network is according to shortest path tree TuThe node conflicted with oneself is found, conflict section is constituted Point set CNu, and according to CNuWithBuild conflict subgraph CSu=(V (CSu),E(CSu)), wherein
(3d) conflict subgraph CS is judgeduWhether it is the connection of k-1 points:If so, then by CSuPut into conflict subgraph set { CSu} In;Otherwise, in local double bounce topology subgraphMiddle structure k-1 points connection conflict subgraphOrderWill Put into conflict subgraph set { CSuIn;
(3e) judge whether k-1 >=2 set up:If so, then execution step (3f), otherwise, jumps to step (3m);
(3f) i=2 is initialized, wherein i represents conflict subgraphIn i-th layer;
(3g) j=1 is initialized, wherein j represents conflict subgraph CSuIn j-th conflicting nodes;
(3h) makeWherein { CSu}jRepresent in conflict subgraph CSuJ-th node conflict subgraph,Represent the i-th -1 layer conflict subgraph;
(3i) for all of node In find corresponding conflicting nodes set CNuv, according to CNuv WithBuild i-th layer of conflict subgraphWhereinSet of nodeSide collection
(3j) judgeWhether it is k-i points connection conflict subgraph:If so, then willIt is incorporated into conflict subgraph set {CSuIn, otherwise, build k-i points connection conflict subgraphOrderAnd willIt is incorporated into set { CSuIn;
(3k) judge whether j meets j=| { CSu}|:If so, execution step (3l), otherwise, j=j+1 jumps to step (3h);
(3l) judge whether i meets i=k-1:If so, execution step (3m), otherwise, i=i+1 jumps to step (3g);
(3m) to gathering { CSuIn all conflict subgraphs using distributed two channel-connectivities algorithm DBCC build generate son Tree Su=(V (Su),E(Su)), wherein V (Su) represent SuSet of node, E (Su) represent SuSide collection;
(3n) each node u is locally generated subgraph S according to what the topology information that other nodes are sent updated oneselfuAnd logic Conflict neighbours collection LCNuv, subgraph S will be locally generateduOn a jump neighbors v as logic neighbors, and constitute logic neighbors Collection:LCNu={ v ∈ V (Su)|(u,v)∈E(Su)};
(3p) side collection information E (S)=E (S) ∪ E (S are updatedu), more new logic neighborhood information LCNu=V (Su), wherein E (S) represent that all nodes generate total side collection for generating figure, LCN in networkuRepresent the logic neighbors set of node u;
(4) each node u determines the transmission power of oneself in network, will transmission power be adjusted to can cover it is all Minimum power required for logic neighbors:
(5) link combinations between all nodes and each node and the logic neighbors of oneself in network are got up, Constitute final full mesh topology, i.e. G=(V (G), E (G)), wherein V (G) is all nodes in network, E (G)=(u, v) | u ∈ V(G),v∈LCNu, wherein E (G) represents the side collection in network G;
(6) channel distribution is carried out to each node u in the final full mesh topology that built using greedy coloring algorithm.
The invention has the advantages that:
1) present invention is locally generated subgraph by distributed structure, and combines Power Control and channel distribution causes time user The independent sets of network do not constitute the cut set of network, when solving multiple multiple channels of primary users' occupancy, the disconnected situation of network, So as to ensure the connectedness of time user network, the K channel-connectivities of network are realized;
2) joint Power control of the present invention and channel distribution, not only reduce the transmission power of node, and decrease The required number of channel, so as to save frequency spectrum resource.
3) present invention carries out channel distribution by each node u in the final full mesh topology to having built, eliminates secondary Interference between user.
Description of the drawings
Fig. 1 is the applicable cognitive Ad Hoc networks schematic diagram of a scenario of the present invention;
Fig. 2 be the present invention realize general flow chart;
Fig. 3 is the peak power topology formed in 50 meshed network scenes in the present invention;
Fig. 4 is that the sub-process figure for being locally generated subgraph is built in the present invention;
Fig. 5 is the exemplary plot that interior joint u of the present invention builds topology;
Fig. 6 is the simulating, verifying figure that topology is generated to the present invention;
Fig. 7 is simulation comparison figure of the average transmission radius obtained to the present invention under different value of K;
Fig. 8 is simulation comparison figure of the average channel number obtained to the present invention under different value of K;
Fig. 9 is simulation comparison figure of the maximum channel number obtained to the present invention under different value of K.
Specific embodiment
Embodiment of the present invention is described in further detail below in conjunction with accompanying drawing.
With reference to Fig. 1, the cognitive Ad Hoc networks that the present invention is used are distributed in the node group in two dimensional surface region by n Into.Time user of each node on behalf one, and with unique sequence number, it is possible to by GPS or other location technologies come Obtain the positional information of its own.All of node is affected by multiple primary users, and primary user can be using in C channel Any one channel.Each node can send data in any one channel in C channel, while in other all channels Upper interception data, in addition each node do not exist at aspects such as physical arrangement, initial setting up, functional characteristic, parameter indexs Any difference.In a network, the wireless channel between arbitrary node is additive white Gaussian noise channel.Node by omnidirectional antenna with Surroundings nodes communicate, and maximum transmission power is Pmax.Transmission power P of arbitrary node uuCan connect between a minimum and a maximum It is continuous to adjust, i.e. 0≤Pu≤Pmax.Transmission radius r is the transmission range corresponding to node transmitting power, between any two node The necessary and sufficient condition that there is Radio Link is transmission radius r of the Euclidean distance between them less than or equal to node.
With reference to Fig. 2, the present invention's realizes that step is as follows:
Step 1, each node u sends the first node information HELLO-1 bag of oneself in network, and receives a jump neighbors The HELLO-1 bags of transmission.
(1a) when each node is using maximum power transfer in network, the topological structure that formed is peak power topology, As shown in figure 3, peak power topological representation is:Gmax=(V (Gmax),E(Gmax)), wherein V (Gmax) it is node set, represent net Network node, E (Gmax) it is line set, represent the Radio Link existed between node.
(2b) all nodes in the transmission radius of node u, constitute a jump neighbors collection of node u Wherein secondary user v1Jump for 1 with the distance of secondary user u;
(3c) each node u in network is with maximum transmission power PmaxA HELLO-1 is broadcasted to a jump neighbors of u Bag, the positional information of sequence number and node u containing node u in HELLO-1 bags;
Each node u in network receives one and jumps neighbors with maximum transmission power PmaxThe HELLO-1 bags of broadcast.
Step 2, the first node information HELLO-1 bag in above-mentioned steps 1, each node u sends oneself in network Section Point information HELLO-2 bag, and receive a jump neighbors transmission HELLO-2 bags.
(2a) node u is used within double bounce includes all nodes that double bounce can be reached, and constitutes the double bounce neighbors of node u Collection∪ represents two union of sets , && Represent also, wherein secondary user v2Jump for 2 with the distance of secondary user u;
(2b) each node u in network has received all one and has jumped after the HELLO-1 bags that neighbors sends, with emission maximum Power PmaxA HELLO-2 bag is broadcasted to a jump neighbors of u, containing u all one jump the sequence of neighbors in HELLO-2 bags Row number and positional information;
(2c) each node u in network receives one and jumps neighbors with maximum transmission power PmaxThe HELLO-2 bags of broadcast.
Step 3, each node u builds the local double bounce topology subgraph of oneself in network
(3a) first node information HELLO-1 that each node u in network sends according to the jump neighbors for receiving With Section Point information HELLO-2 package informatin, oneself all double bounce neighbors v is obtained and recorded12Sequence number and positional information, Wherein
(3b) each node u calculates any two according to the positional information of oneself and the positional information of double bounce neighbors Node x, the minimum emissive power required for directly transmitting between y:Wherein,β is received signal to noise ratio Threshold value, according to the sensitivity and bit error rate requirement determination of receiver, α is path-loss factor, and { u } represents node u compositions Set, dx,yIt is node x, the Euclidean distance between y;
(3c) according to the minimum emissive power for calculating, the annexation between double bounce neighbors is judged, if Px,yLess than node Maximum transmission power Pmax, it is determined that node x, there is annexation between y;Otherwise, there is no connection between y and close in node x System;
(3d) each node u sets up local double bounce topology subgraph according to the annexation between double bounce neighborsWhereinNode set beLocal double bounce topology subgraphSide collection It is combined into:I.e. forIn any two nodeWhenWhen, by sidePut into local double bounce topology subgraphLine setIn;
(3e) each node u calculates any two the node x of annexation, the link energy consumption weight between y:wp(x, Y)=Px,y, wherein,Px,yFor the node x that any two has annexation, required for directly transmitting between y Minimum transmit power;
(3f) node u calculates any two the node x of annexation, the link range weight between y:wd(x, y)= dx,y, wherein,dx,yIt is node x that any two has annexation, the Euclidean distance between y.
Step 4, each node u builds and is locally generated subgraph S in networku=(V (Su),E(Su)), and determine patrolling for oneself Collect neighbors.
With reference to Fig. 4, this step is implemented as follows:
(4a) initialize each node and be locally generated subgraph SuNode set V (Su) it is local double bounce topology subgraphIn All nodes, initialize each node and be locally generated subgraph SuLine set E (Su) it is empty set;
(4b) based on local double bounce topology subgraphWith link energy consumption weight wp(x, y) is link weight, and node u passes through Using dijkstra's algorithm, build with u as root, the shortest path tree T of all nodes in local double bounce topology subgraphu=(V (Tu),E(Tu)), whereinFor all nodes in local double bounce topology subgraph, E (Tu) it is to constitute shortest path All sides of tree, so as to acquire the shortest path of the arbitrary node up in local double bounce topology subgraph in subrange, and will These sides recorded locally connected subgraph SuIn, i.e. E (Su)<=E (Tu)∪E(Su),<=represent assignment;
(4c) each node u in network is according to shortest path tree TuThe node conflicted with oneself is found, conflict section is constituted Point set CNu, and according to CNuWithBuild conflict subgraph CSu=(V (CSu),E(CSu)), wherein V (CSu)=CNu,
(4d) conflict subgraph CS is judged according to maximum-flow algorithmuWhether it is the connection of k-1 points:
If so, then by CSuPut into conflict subgraph set { CSuIn;
Otherwise, in local double bounce topology subgraphMiddle structure k-1 points connection conflict subgraphOrderI.e. WillPut into conflict subgraph set { CSuIn, build k-1 point connected subgraphs by following (4d1)-(4d2):
(4d1) basisConflicting nodes set CNu, the neighbors x and node of addition conflicting nodes v connect to (v, x) Side E (v, x) for connecing is arrivedIn, formedWhereinv∈CNu
(4d2) judged according to maximum-flow algorithmWhether k-1 points are connected:If so, orderOtherwise, return To step (4d1);
(4e) judge whether k-1 >=2 set up:If so, then execution step (4f), otherwise, jumps to step (4m);
(4f) i=2 is initialized, wherein i represents conflict subgraphIn i-th layer;
(4g) j=1 is initialized, wherein j represents conflict subgraph CSuIn j-th conflicting nodes;
(4h) makeWherein { CSu}jRepresent in conflict subgraph CSuJ-th node conflict subgraph,Represent the i-th -1 layer conflict subgraph;
(4i) for all of node In find corresponding conflicting nodes set CNuv, according to CNuv WithBuild i-th layer of conflict subgraphWhereinSet of nodeSide collection
(4j) judged according to maximum-flow algorithmWhether it is a connection conflict subgraph k-i:
If so, then willIt is incorporated into conflict subgraph set { CSuIn;
Otherwise, k-i points connection conflict subgraph is builtOrderAnd willIt is incorporated into set { CSuIn, press As follows (4j1)-(4j2) builds k-i point connected subgraphs::
(4j1) basisConflicting nodes set CNuv, the neighbors x and node of addition conflicting nodes w connect to (w, x) Side E (w, x) for connecing is arrivedIn, formedWhereinw∈CNuv
(4j2) judged according to maximum-flow algorithmWhether it is the connection of k-1 points:If so, orderOtherwise, return Return to step (4j1);
(4k) judge whether j meets j=| { CSu}|:If so, execution step (4l), otherwise, j=j+1 jumps to step (4h);
(4l) judge whether i meets i=k-1:If so, execution step (4m), otherwise, i=i+1 jumps to step (4g);
(4m) to gathering { CSuIn all conflict subgraphs using distributed two channel-connectivities algorithm DBCC build generate son Tree Su=(V (Su),E(Su)), wherein V (Su) represent SuSet of node, E (Su) represent SuSide collection, comprise the following steps that:
(4m1) for set { CSuIn each conflict subgraphConstruction is locally generated accordingly subgraph T 'u=(V (T′u),E(T′u));
(4m2) update and be locally generated subgraph SuSide collection E (Su), i.e. E (Su)<=E (T 'u)∪E(Su), renewal is locally generated Subgraph SuSide collection V (Su), i.e. V (Su)<=V (T 'u)∪V(Su), and by node V (T 'u) recorded logic conflict neighbours collection LCNuvIn, i.e. LCNuv=V (T 'u), then node u flooding by way of LCNuvWith E (Su) topology information be sent to Su In all nodes.
(4n) each node u is locally generated subgraph S according to what the topology information that other nodes are sent updated oneselfuAnd logic Conflict neighbours collection LCNuv, subgraph S will be locally generateduOn a jump neighbors v as logic neighbors, and constitute logic neighbors Collection:LCNu={ v ∈ V (Su)|(u,v)∈E(Su)};
(4p) side collection information E (S)=E (S) ∪ E (S are updatedu), more new logic neighborhood information LCNu=V (Su), wherein E (S) represent that all nodes generate total side collection for generating figure, LCN in networkuRepresent the logic neighbors set of node u;
By step (4c)-(4m), subgraph S is specifically locally generateduResult as shown in figure 5, wherein ground floor Represent the k-1 points connection conflict subgraph of node uThe second layer is representedAny node v corresponding k-2 points connection punching Prominent subgraphThird layer is representedThe corresponding k-2 points connection conflict subgraph of any node vAny node w Corresponding k-3 points connection conflict subgraphLast layer represents that what is ultimately formed is locally generated subgraph Su
The author such as dijkstra's algorithm reference Xinjun Wang is in IEEE VTC wherein described in above-mentioned steps (4b) Article " the Bi-Channel-Connected Topology Control in Cognitive Radio delivered on 2014 Networks”;The maximum-flow algorithm adopted in above-mentioned steps (4d) judges to conflict subgraph whether in the connection of k-1 points and step (4j) Using maximum-flow algorithm judge the subgraph whether k-i points connection that conflicts, make with reference to Shimon Even and R.Endre Tarjan etc. " Network Flow and Testing Graph Connectivity " that person delivers.
Step 5, each node u determines the transmission power of oneself in network, will transmission power be adjusted to and can cover Minimum power required for all logic neighbors:All logic neighbors of wherein u Required minimum power, refers to the maximum of the transmission power of all logic neighbors of u, pu,vRepresent the logic neighbors of u The transmission power of v;
Step 6, according to above-mentioned steps 4- step 5 topology control process, each node disjoint in network determines and oneself Logic neighbors annexation, by the chain between all nodes and each node and the logic neighbors of oneself in network Road combines, and constitutes final full mesh topology, i.e. G=(V (G), E (G)), wherein V (G) are all nodes in network, E (G) =(u, v) | u ∈ V (G), v ∈ LCNu}.
Step 7, channel point is carried out using greedy coloring algorithm to each node u in the final full mesh topology that built Match somebody with somebody.
(7a) node u maximum transmit powers PmaxOn a common control channel broadcast request distributes channel bag RAC, other Node needs transfer bag again when this bag is received, until logic conflict neighbours collection LCNuIn all nodes all receive Till RAC bags;
(7b) logic conflict neighbours collection LCNuIn node after RAC bags are received, check oneself the allocated channel, and Feedback channels distribution bag AC give node u, the allocated channel of the node is contained in wherein channel distribution bag AC, if the section Point is also unallocated, and bag AC is just designated as empty bag by channel;
(7c) node u collects all LCNuIn node feedback AC bags, and from also unappropriated channel select master The minimum channel of CU probability, as the available channel of oneself.;
(7d) each node disjoint performs said process, till all nodes all distribute channel.
The effect of the present invention can be further illustrated by emulation:
(1) simulated conditions
In simulating scenes, network node is evenly distributed at random a 1000 × 1000m2Two dimensional surface region in. The threshold value of received signal to noise ratio SNR is set to -80dBm, and path-loss factor α values are 4.All nodes are using identical in network Maximum transmission power, wherein maximum transmission power Pmax=256mW, corresponding maximum transmitted radius Rmax=400m.Assume master User influences whether all of user node.
(2) emulation content and result
Emulation 1, the topologies that the present invention is generated in the scene of 50 nodes are as shown in fig. 6, wherein
Fig. 6 (a) is peak power topology;
Fig. 6 (b) is the topology that the inventive method is generated, and numeral therein represents the channel of node distribution;
The topology of time user network when Fig. 6 (c) represents that primary user takes a channel;
The topology of time user network when Fig. 6 (d) represents that two primary users take two channels;
The topology of time user network when Fig. 6 (e) represents that three primary users take three channels;
By Fig. 6 (a)-(e) as can be seen that the topology that the inventive method is generated arbitrarily takes k-1 channel in primary user When, the network of secondary user remains connection.
Emulation 2, is entered with peak power topology MaxPower with the inventive method to the different value of K of node average transmission radius Row emulation, as a result as shown in Figure 7:
From fig.7, it can be seen that with network time user node number increase, the average transmission of peak power topology MaxPower Radius keeps constant, is 400m, and the average transmission radius of the present invention is continuous with the increase of in network user node number Reduce, and with the increase of k, average transmission radius is continuously increased, therefore the inventive method can be very good to reduce the energy of node Consumption, increases the life cycle of network.
Emulation 3, is carried out with peak power topology MaxPower with the inventive method to the different value of K of required average channel number Emulation, as a result as shown in Figure 8:
As seen from Figure 8, with network time user node number increase, the average channel of peak power topology MaxPower Number is linear to be increased, and average channel number is less needed for the inventive method, and increasing with network user node number, averagely The number of channel slowly increases, and with the increase of k, average channel number also slowly increases.
Emulation 4, is carried out with peak power topology MaxPower with the inventive method to the different value of K of required maximum channel number Emulation, as a result as shown in Figure 9:
As seen from Figure 9, with network time user node number increase, peak power topology MaxPower's is maximum required The number of channel linearly increases, and the number of channel needed for the inventive method is maximum is less, and increasing with network user node number, The number of channel needed for maximum slowly increases, and with the increase of k, average channel number also slowly increases, and can draw from Fig. 8 and Fig. 9 The present invention not only greatlys save channel resource, and maintains the connectedness of network, so that network has good Shandong Rod.

Claims (10)

1. the distributed topology approach of K channel-connectivities is built in cognition Ad Hoc networks, is comprised the steps:
(1) initialize network to connect for k points, k >=2, each node u obtains respectively the sequence of a jump and double bounce abutment points in network Number and positional information;
(2) sequence number and positional information in step (1) sets up local double bounce topology subgraphAnd calculateIn any two The individual node x for having an annexation, link energy consumption weight w between yp(x, y) and link range weight wd(x,y);
(3) each node u builds and is locally generated subgraph S in networku
(3a) initialize each node and be locally generated subgraph SuNode set V (Su) it is local double bounce topology subgraphIn institute There is node, initialize each node and be locally generated subgraph SuLine set E (Su) it is empty set;
(3b) based on local double bounce topology subgraphEach node u is according to link energy consumption weight wp(x, y), builds with u as root, The shortest path tree T of all nodes in local double bounce topology subgraphu=(V (Tu),E(Tu)), wherein For all nodes in local double bounce topology subgraph, E (Tu) it is to constitute all sides of shortest path tree, and these sides recorded It is locally generated the line set E (S of subgraphu) in, i.e. E (Su)<=E (Tu)∪E(Su);
(3c) each node u in network is according to shortest path tree TuThe node conflicted with oneself is found, conflicting nodes set is constituted CNu, and according to CNuWithBuild conflict subgraph CSu=(V (CSu),E(CSu)), wherein V (CSu)=CNu,
(3d) conflict subgraph CS is judgeduWhether it is the connection of k-1 points:If so, then by CSuPut into conflict subgraph set { CSuIn; Otherwise, in local double bounce topology subgraphMiddle structure k-1 points connection conflict subgraphOrderWillPut Enter to conflict subgraph set { CSuIn;
(3e) judge whether k-1 >=2 set up:If so, then execution step (3f), otherwise, jumps to step (3m);
(3f) i=2 is initialized, wherein i represents conflict subgraphIn i-th layer;
(3g) j=1 is initialized, wherein j represents conflict subgraph CSuIn j-th conflicting nodes;
(3h) makeWherein { CSu}jRepresent in conflict subgraph CSuJ-th node conflict subgraph,Table Show the i-th -1 layer conflict subgraph;
(3i) for all of node In find corresponding conflicting nodes set CNuv, according to CNuvWithBuild i-th layer of conflict subgraphWhereinSet of nodeSide collection
(3j) judgeWhether it is k-i points connection conflict subgraph:If so, then willIt is incorporated into conflict subgraph set { CSu} In, otherwise, build k-i points connection conflict subgraphOrderAnd willIt is incorporated into set { CSuIn;
(3k) judge whether j meets j=| { CSu}|:If so, execution step (3l), otherwise, j=j+1 jumps to step (3h);
(3l) judge whether i meets i=k-1:If so, execution step (3m), otherwise, i=i+1 jumps to step (3g);
(3m) to gathering { CSuIn all conflict subgraphs using distributed two channel-connectivities algorithm DBCC build generate subtree Su =(V (Su),E(Su)), wherein V (Su) represent SuSet of node, E (Su) represent SuSide collection;
(3n) each node u is locally generated subgraph S according to what the topology information that other nodes are sent updated oneselfuWith logic conflict Neighbours collect LCNuv, subgraph S will be locally generateduOn a jump neighbors v as logic neighbors, and constitute logic neighbors collection: LCNu={ v ∈ V (Su)|(u,v)∈E(Su)};
(3p) side collection information E (S)=E (S) ∪ E (S are updatedu), more new logic neighborhood information LCNu=V (Su), wherein E (S) table Show the side collection of the total generation figure of all nodes generations in network, LCNuRepresent the logic neighbors set of node u;
(4) each node u determines the transmission power of oneself in network, will transmission power be adjusted to and can cover all logics Minimum power required for neighbors:
(5) link combinations between all nodes and each node and the logic neighbors of oneself in network are got up, is constituted Final full mesh topology, i.e. G=(V (G), E (G)), wherein V (G) be network in all nodes, E (G)=(u, v) | u ∈ V (G),v∈LCNu, wherein E (G) represents the side collection in network G;
(6) channel distribution is carried out to each node u in the final full mesh topology that built using greedy coloring algorithm.
2. the distributed topology approach of K channel-connectivities is built in cognitive Ad Hoc networks according to claim 1, wherein walking Suddenly the sequence number and positional information of a jump and double bounce abutment points are obtained in (1) respectively, refers to that each node u is sent out with maximum in network Penetrate power PmaxFirst node information HELLO- is broadcasted respectively to positioned at all nodes in oneself transmission radius 1 bag and Section Point information HELLO-2 bag, and the HELLO-1 bags and HELLO-2 bags of jump neighbors transmission are received, wherein should HELLO-1 bags include the sequence number and positional information of u node, and containing u all one jump the sequence of neighbors in HELLO-2 bags Number and positional information.
3. the distributed topology approach of K channel-connectivities is built in cognitive Ad Hoc networks according to claim 1, wherein walking Suddenly local double bounce topology subgraph is set up in (2)Carry out as follows:
(2a) first node information HELLO-1 bags and Section Point information of each node u according to the jump neighbors for receiving HELLO-2 bags, obtain and record the sequence number and positional information of the HELLO-1 bags and HELLO-2 bag interior joints, these neighbors Constitute double bounce neighbors collectionWherein described HELLO-1 bags include the sequence number and positional information of u node, described Containing u all one jump the sequence number and positional information of neighbors in HELLO-2 bags;
(2b) each node u calculates any two node according to the positional information of oneself and the positional information of double bounce neighbors Minimum emissive power required for directly transmitting between x, yWherein,β is received signal to noise ratio thresholding Value, determines according to the sensitivity of receiver and bit error rate requirement, and α is path-loss factor, dx,yIt is node x, it is European between y Distance, if Px,yLess than the maximum transmission power P of nodemax, it is determined that node x, there is annexation between y;Otherwise, node x, There is no annexation between y;
(2c) each node u sets up local double bounce topology subgraph according to the annexation between double bounce neighborsWherein local topology subgraphNode set beLocal topology subgraphLine set be:I.e. forIn any two nodeWhenWhen, side
4. the distributed topology approach of K channel-connectivities is built in cognitive Ad Hoc networks according to claim 1, wherein walking Suddenly calculate in (2)Middle any two has the node x of annexation, link energy consumption weight w between yp(x, y), is according to office Portion's double bounce topology subgraph, calculating any two in each node u has the node x of annexation, the link energy consumption weight between y: wp(x, y)=Px,y, wherein,Px,yFor the node x that any two has annexation, directly transmit between y required The minimum transmit power wanted.
5. the distributed topology approach of K channel-connectivities is built in cognitive Ad Hoc networks according to claim 1, wherein walking Suddenly calculate in (2)Middle any two has the node x of annexation, link range weight w between yd(x, y), is according to Europe Formula distance, any two has the distance between the node x of annexation, y weight in calculate node u:wd(x, y)=dx,y, its In,dx,yIt is node x that any two has annexation, the Euclidean distance between y.
6. the distributed topology approach of K channel-connectivities is built in cognitive Ad Hoc networks according to claim 1, wherein walking Suddenly the shortest path tree T in (3b)uBuilt using dijkstra's algorithm or bellman-ford algorithm.
7. the distributed topology approach of K channel-connectivities is built in cognitive Ad Hoc networks according to claim 1, wherein walking Suddenly it is by FLSS that k-1 points connection conflict subgraph is built in (3d)kAlgorithm builds, and comprises the following steps that:
(3d1) basisConflicting nodes set CNu, the neighbors x and node for adding conflicting nodes v connected to (v, x) Side E (v, x) is arrivedIn, formedWhereinv∈CNu
(3d2) judgeWhether k-1 points are connected:If so, orderOtherwise, step (3d1) is returned to.
8. the distributed topology approach of K channel-connectivities is built in cognitive Ad Hoc networks according to claim 1, wherein walking Suddenly it is by FLSS that k-i points connection conflict subgraph is built in (3j)kAlgorithm builds, and comprises the following steps that:
(3j1) basisConflicting nodes set CNuv, the neighbors x and node of addition conflicting nodes w are connected to (w, x) Side E (w, x) arriveIn, formedWhereinw∈CNuv
(3j2) judgeWhether k-i points are connected:If so, then makeOtherwise return to step (3j1).
9. the distributed topology approach of K channel-connectivities is built in cognitive Ad Hoc networks according to claim 1, wherein walking Suddenly built using distributed two channel-connectivities algorithm DBCC in (3m) and generate subtree, carried out as follows:
(3m1) for set { CSuIn each conflict subgraphConstruction is locally generated accordingly subgraph T 'u=(V (T 'u),E (T′u));
(3m2) update and be locally generated subgraph SuSide collection E (Su), i.e. E (Su)<=E (T 'u)∪E(Su), renewal is locally generated subgraph SuSide collection V (Su), i.e. V (Su)<=V (T 'u)∪V(Su), and by node V (T 'u) recorded logic conflict neighbours collection LCNuvIn, That is LCNuv=V (T 'u), then node u flooding by way of LCNuvWith E (Su) topology information be sent to SuIn it is all Node.
10. the distributed topology approach of K channel-connectivities is built in cognitive Ad Hoc networks according to claim 1, wherein Greedy coloring algorithm carries out channel distribution to each node u in the final full mesh topology that built used in step (6), by such as Lower step is carried out:
(6a) node u collects LCN to logic conflict neighboursuIn all nodes with maximum transmit power by way of flooding in public affairs Send request distribution channel bag RAC in control channel altogether;
(6b) logic conflict neighbours collection LCNuIn node after RAC bags are received, with maximum transmit power by way of unicast handle Feedback channels distribution bag AC issues node u, informs and has been chosen by channel;
(6c) node u collects all LCNuIn node feedback AC bags, and from also unappropriated channel select primary user account for With the channel that probability is minimum, as the available channel of oneself.
CN201610369203.7A 2016-05-30 2016-05-30 Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network Active CN106658523B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610369203.7A CN106658523B (en) 2016-05-30 2016-05-30 Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610369203.7A CN106658523B (en) 2016-05-30 2016-05-30 Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network

Publications (2)

Publication Number Publication Date
CN106658523A true CN106658523A (en) 2017-05-10
CN106658523B CN106658523B (en) 2019-10-11

Family

ID=58848663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610369203.7A Active CN106658523B (en) 2016-05-30 2016-05-30 Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network

Country Status (1)

Country Link
CN (1) CN106658523B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197425A (en) * 2017-06-16 2017-09-22 韩冰青 Isomery Energy-aware topology control method in wireless self-networking
CN109121098A (en) * 2018-08-24 2019-01-01 京东方科技集团股份有限公司 A kind of method and system for distributing channel
CN110022562A (en) * 2019-04-11 2019-07-16 池州学院 A kind of distributed channel distribution control method for mobile ad-hoc network
CN111683413A (en) * 2020-08-12 2020-09-18 成都极米科技股份有限公司 Method, terminal, network access device and storage medium for establishing multilink connection
CN112468996A (en) * 2020-12-14 2021-03-09 华东交通大学 Network topology control method in cognitive Internet of vehicles

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507168A (en) * 2014-12-27 2015-04-08 西安电子科技大学 Distributed topology control method for cognitive Ad Hoc network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507168A (en) * 2014-12-27 2015-04-08 西安电子科技大学 Distributed topology control method for cognitive Ad Hoc network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
H.LIU: "Generalized-Bi-Connectivity for Fault Tolerant Cognitive Radio Network", 《IEEE》 *
X.WANG: "Achieving Bi-channel-Connectivity with Topology Control in Cognitive Ratio Network", 《IEEE》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197425A (en) * 2017-06-16 2017-09-22 韩冰青 Isomery Energy-aware topology control method in wireless self-networking
CN107197425B (en) * 2017-06-16 2019-08-06 韩冰青 Isomery Energy-aware topology control method in wireless self-networking
CN109121098A (en) * 2018-08-24 2019-01-01 京东方科技集团股份有限公司 A kind of method and system for distributing channel
US10917876B2 (en) 2018-08-24 2021-02-09 Boe Technology Group Co., Ltd. Method and system for allocating channel
CN110022562A (en) * 2019-04-11 2019-07-16 池州学院 A kind of distributed channel distribution control method for mobile ad-hoc network
CN110022562B (en) * 2019-04-11 2022-04-01 池州学院 Distributed channel allocation control method for mobile ad hoc network
CN111683413A (en) * 2020-08-12 2020-09-18 成都极米科技股份有限公司 Method, terminal, network access device and storage medium for establishing multilink connection
CN111683413B (en) * 2020-08-12 2020-11-10 成都极米科技股份有限公司 Method, terminal, network access device and storage medium for establishing multilink connection
CN112468996A (en) * 2020-12-14 2021-03-09 华东交通大学 Network topology control method in cognitive Internet of vehicles
CN112468996B (en) * 2020-12-14 2022-07-26 华东交通大学 Network topology control method in cognitive Internet of vehicles

Also Published As

Publication number Publication date
CN106658523B (en) 2019-10-11

Similar Documents

Publication Publication Date Title
CN104507168B (en) Recognize the distribution topology control method of Ad Hoc networks
CN109673035B (en) Route establishing and maintaining method suitable for wireless self-organizing network
Wu et al. Forward‐node‐set‐based broadcast in clustered mobile ad hoc networks
CN106658523A (en) Distributed topological method for constructing K channel connectivity in cognitive AdHoc network
Wieselthier et al. On the construction of energy-efficient broadcast and multicast trees in wireless networks
Mansourkiaie et al. Cooperative routing in wireless networks: A comprehensive survey
CN103347246B (en) Discovery method between proximal subscribers under embedded D2D environment in cellular network
Pavkovic et al. Efficient topology construction for RPL over IEEE 802.15. 4 in wireless sensor networks
CN103200643B (en) Based on the distributed fault-tolerance topology control method of dump energy perception
Ramachandran et al. Received signal strength-based cross-layer designs for mobile ad hoc networks
CN112040528B (en) Method for selecting control node of wireless ad hoc network center
Yu et al. Cooperative bridges: topology control in cooperative wireless ad hoc networks
CN104010344B (en) A kind of wireless sensor network virtual MIMO communication strategy based on cooperative groups
Huang et al. Virtual mesh networking for achieving multi-hop D2D communications in 5G networks
Zheng et al. A resource-efficient and scalable wireless mesh routing protocol
CN113316214B (en) Self-adaptive cooperative routing method of energy heterogeneous wireless sensor
CN106792744B (en) The topology control method being connected to based on k point under two channel-connectivities of building
CN106131887B (en) Distribution topology control method based on serial interference elimination
CN115665860B (en) Unmanned aerial vehicle ad hoc network resource allocation method based on characteristics of waiting bird group
CN106658647A (en) Relay selection algorithm based on interference perception
CN112637789B (en) VHF and UHF section fusion intelligent ad hoc network method
Lipman et al. Neighbor aware adaptive power flooding (NAAP) in mobile ad hoc networks
Kumar et al. A survey on routing techniques in zigbee wireless networks in contrast with other wireless networks
CN112468996A (en) Network topology control method in cognitive Internet of vehicles
Beydoun et al. An Efficient Zone-Based Routing Protocol for WSN

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant