CN106658523B - Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network - Google Patents

Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network Download PDF

Info

Publication number
CN106658523B
CN106658523B CN201610369203.7A CN201610369203A CN106658523B CN 106658523 B CN106658523 B CN 106658523B CN 201610369203 A CN201610369203 A CN 201610369203A CN 106658523 B CN106658523 B CN 106658523B
Authority
CN
China
Prior art keywords
node
subgraph
conflict
neighbors
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610369203.7A
Other languages
Chinese (zh)
Other versions
CN106658523A (en
Inventor
盛敏
李轩
刘豹
孙红光
王玺钧
李建东
陈雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CETC 54 Research Institute
Xian University of Electronic Science and Technology
Original Assignee
CETC 54 Research Institute
Xian University of Electronic Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CETC 54 Research Institute, Xian University of Electronic Science and Technology filed Critical CETC 54 Research Institute
Priority to CN201610369203.7A priority Critical patent/CN106658523B/en
Publication of CN106658523A publication Critical patent/CN106658523A/en
Application granted granted Critical
Publication of CN106658523B publication Critical patent/CN106658523B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/14Spectrum sharing arrangements between different networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/54Allocation or scheduling criteria for wireless resources based on quality criteria
    • H04W72/541Allocation or scheduling criteria for wireless resources based on quality criteria using the level of interference
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

The invention discloses the distributed topology approach for constructing K channel-connectivity in a kind of cognition Ad Hoc network, mainly solve the problems, such as that isolating for time user network interferes with each other with time user when multiple primary user's busy channels in the prior art.It realizes process are as follows: each node in 1. networks successively broadcasts HELLO packet twice, and receives the HELLO packet of initial neighbors, establishes local double bounce topology subgraph;2. constructing shortest path tree, and be locally generated subgraph according to certifiable user's connection of shortest path tree building based on local double bounce topology subgraph;3. jumping neighbors adjustment transmission power according to one be locally generated in subgraph and determining the logic neighbors of each node;4. constituting full mesh topology by the link between all nodes and node and its logic neighbors in network, and carry out channel selection.The present invention can guarantee time user network connection, eliminates time user's interference, saves channel resource, can be used for recognizing Ad Hoc network.

Description

Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network
Technical field
The invention belongs to wireless communication field, in particular to a kind of network topology structure based on building K channel-connectivity Method can be used for recognizing Ad Hoc network.
Background technique
The topological structure of network is a highly important factor for influencing cognition Ad Hoc network performance, improves cognition Ad The robustness of Hoc network, the fault-tolerant ability for enhancing network topology become the focus on research direction of Topology Control.Recognize Ad User there are two types of in Hoc network, first is that primary user, the other is secondary user.Primary user enjoys the preferential right of channel.Work as master When user occupancy channel, secondary user must make a concession the channel and be in silent status, it is more likely that influence the connectivity of time user.And When multiple primary users occupy multiple channels, the right to use that a large amount of user makes a concession channel is had, this may be such that network The case where segmentation, will be more serious, therefore, when busy channel resource occur in multiple primary users how to maintain cognition Ad Hoc network Connectivity become a critical problem.In the article that the authors such as Xinjun Wang deliver on IEEE VTC 2014 In the algorithm of " Bi-Channel-Connected Topology Control in Cognitive Radio Networks " etc. The connection that can guarantee time user network can also eliminate the interference between time user, but this method only has single primary user Effect, when multiple primary users occur, it cannot be guaranteed that the connection of network, can not eliminate the interference of time user, to influence to recognize The fault-tolerant ability of Ad Hoc network.
Summary of the invention
It is an object of the invention to be directed to above-mentioned problem of the prior art, propose to construct K in a kind of cognition Ad Hoc network The distributed topology approach of channel-connectivity eliminates the interference between secondary user's to guarantee the connectivity of secondary user's network, from And improve the fault-tolerant ability of cognition Ad Hoc network.
To achieve the above object, technical solution of the present invention includes the following:
(1) initialization network is that k point is connected to, k >=2, and each node u obtains a jump and double bounce abutment points respectively in network Sequence number and location information;
(2) according to the sequence number and the local double bounce topology subgraph of location information foundation in step (1)And it calculatesIn Any two have the link energy consumption weight w between the node x, y of connection relationshipp(x, y) and link range weight wd(x,y);
(3) each node u building is locally generated subgraph S in networku:
(3a) initializes each node and is locally generated subgraph SuNode set V (Su) it is local double bounce topology subgraphIn All nodes, initialize each node and be locally generated subgraph SuLine set E (Su) it is empty set;
(3b) is based on local double bounce topology subgraphEach node u is according to link energy consumption weight wp(x, y), building are with u Root, the shortest path tree T of all nodes in local double bounce topology subgraphu=(V (Tu),E(Tu)), whereinFor all nodes in local double bounce topology subgraph, E (Tu) it is to constitute all sides of shortest path tree, and incite somebody to action Line set E (the S for being locally generated subgraph is recorded in these sidesu) in, i.e. E (Su)≤E (Tu)∪E(Su);
Each node u in (3c) network is according to shortest path tree TuThe node to conflict with oneself is found, conflict section is constituted Point set CNu, and according to CNuWithBuilding conflict subgraph CSu=(V (CSu),E(CSu)), wherein
(3d) judgement conflict subgraph CSuIt whether is the connection of k-1 point: if so, by CSuIt is put into conflict subgraph set { CSu} In;Otherwise, in local double bounce topology subgraphMiddle building k-1 point connection conflict subgraphIt enablesIt willIt is put into conflict subgraph set { CSuIn;
(3e) judges whether k-1 >=2 are true: if so, (3f) is thened follow the steps, otherwise, jumps to step (3m);
(3f) initializes i=2, and wherein i indicates conflict subgraphIn i-th layer;
(3g) initializes j=1, and wherein j indicates conflict subgraph CSuIn j-th of conflicting nodes;
(3h) is enabledWherein { CSu}jIt indicates in conflict subgraph CSuJ-th of node conflict subgraph,Indicate (i-1)-th layer of conflict subgraph;
(3i) is for all nodes?In find corresponding conflicting nodes set CNuv, according to CNuv WithConstruct i-th layer of conflict subgraphWhereinNode collectionSide collection
(3j) judgementWhether it is k-i point connection conflict subgraph: if so, then willIt is incorporated into conflict subgraph set {CSuIn, otherwise, building k-i point connection conflict subgraphIt enablesAnd it willIt is incorporated into set { CSuIn;
(3k) judges whether j meets j=| { CSu|: if so, it executes step (3l), otherwise, j=j+1 jumps to step (3h);
(3l) judges whether i meets i=k-1: if so, it executes step (3m), otherwise, i=i+1 jumps to step (3g);
(3m) is to set { CSuIn all conflict subgraphs generated using two channel-connectivity algorithm DBCC of distribution building it is sub Set Su=(V (Su),E(Su)), wherein V (Su) indicate SuNode collection, E (Su) indicate SuSide collection;
(3n) each node u is locally generated subgraph S according to what the topology information that other nodes are sent updated oneselfuAnd logic The neighbours that conflict collect LCNuv, subgraph S will be locally generateduOn one jump neighbors v as logic neighbors, and constitute logic neighbors Collection: LCNu={ v ∈ V (Su)|(u,v)∈E(Su)};
(3p) updates side collection information E (S)=E (S) ∪ E (Su), more new logic neighborhood information LCNu=V (Su), wherein E (S) indicate that all nodes generate total side collection for generating figure, LCN in networkuIndicate the logic neighbors set of node u;
(4) each node u determines oneself transmission power in network, i.e., is adjusted to cover by transmission power all Minimum power required for logic neighbors:
(5) link combinations between all nodes and each node and the logic neighbors of oneself in network are got up, Constituting final full mesh topology, i.e. G=(V (G), E (G)), wherein V (G) is all nodes in network, E (G)=(u, v) | u ∈ V(G),v∈LCNu, wherein E (G) indicates the side collection in network G;
(6) channel distribution is carried out to each node u in the final full mesh topology constructed using greedy coloring algorithm.
The present invention has the advantage that
1) present invention is locally generated subgraph by distributed building, and combines power control and channel distribution makes time user The independent sets of network do not constitute the cut set of network, when solving multiple multiple channels of primary users' occupancy, the disconnected situation of network, To guarantee the connectivity of time user network, the K channel-connectivity of network is realized;
2) joint Power control of the present invention and channel distribution, not only reduce the transmission power of node, and decrease The required number of channel, to save frequency spectrum resource.
3) present invention is eliminated secondary by carrying out channel distribution to each node u in the final full mesh topology constructed Interference between user.
Detailed description of the invention
Fig. 1 is the applicable cognition Ad Hoc network schematic diagram of a scenario of the present invention;
Fig. 2 is realization general flow chart of the invention;
Fig. 3 is the maximum power topology formed in 50 meshed network scenes in the present invention;
Fig. 4 is the sub-process figure that building is locally generated subgraph in the present invention;
Fig. 5 is the exemplary diagram of interior joint u of the present invention building topology;
Fig. 6 is the simulating, verifying figure that topology is generated to the present invention;
Fig. 7 is the simulation comparison figure to obtained average transmission radius of the invention under different value of K;
Fig. 8 is the simulation comparison figure to obtained average channel number of the invention under different value of K;
Fig. 9 is the simulation comparison figure to obtained maximum channel number of the invention under different value of K.
Specific embodiment
Embodiment of the present invention is described in further detail below in conjunction with attached drawing.
Referring to Fig.1, the node group that the cognition Ad Hoc network that the present invention uses is distributed in two-dimensional surface region by n At.Each node on behalf one time user, and there is unique sequence number, and can by GPS or other location technologies come Obtain the location information of own.All nodes are influenced by multiple primary users, and primary user can be used in C channel Any one channel.Each node can send data in C channel in any one channel, while in other all channels Upper interception data, in addition to this each node physical structure, initial setting up, functional characteristic, in terms of be not present Any difference.In a network, the wireless channel between arbitrary node is additive white Gaussian noise channel.Node by omnidirectional antenna with Surroundings nodes communication, maximum transmission power is Pmax.The transmission power P of arbitrary node uuIt can connect between a minimum and a maximum It is continuous to adjust, i.e. 0≤Pu≤Pmax.Radius r is transmitted for the transmission range corresponding to node transmitting power, between any two node It is transmission radius r of the Euclidean distance between them less than or equal to node there are the necessary and sufficient condition of Radio Link.
Referring to Fig. 2, steps are as follows for realization of the invention:
Step 1, each node u sends the first node information HELLO-1 packet of oneself in network, and receives one and jump neighbors The HELLO-1 packet of transmission.
The topological structure that (1a) is formed when node each in network uses maximum power transfer is maximum power topology, As shown in figure 3, maximum power topological representation are as follows: Gmax=(V (Gmax),E(Gmax)), wherein V (Gmax) it is node set, indicate net Network node, E (Gmax) it is line set, indicate existing Radio Link between node.
(2b) is located at all nodes in the transmission radius of node u, and the one of composition node u jumps neighbors collection Wherein secondary user v1Distance with secondary user u is 1 jump;
Each node u in (3c) network is with maximum transmission power PmaxNeighbors, which is jumped, to the one of u broadcasts a HELLO-1 It wraps, the location information of the sequence number containing node u and node u in HELLO-1 packet;
Each node u in network receives one and jumps neighbors with maximum transmission power PmaxThe HELLO-1 packet of broadcast.
Step 2, according to the first node information HELLO-1 packet in above-mentioned steps 1, each node u sends oneself in network Second node information HELLO-2 packet, and receive one jump neighbors send HELLO-2 packet.
(2a) node u is used in all nodes that can be reached within double bounce including double bounce, forms the double bounce neighbors of node u Collection∪ indicates two union of sets , && Expression also, wherein secondary user v2Distance with secondary user u is 2 jumps;
After each node u in (2b) network has received the HELLO-1 packet that all one jump neighbors transmission, with emission maximum Power PmaxNeighbors, which is jumped, to the one of u broadcasts a HELLO-2 packet, the sequence of all jump neighbors containing u in HELLO-2 packet Row number and location information;
Each node u in (2c) network receives one and jumps neighbors with maximum transmission power PmaxThe HELLO-2 packet of broadcast.
Step 3, each node u constructs oneself local double bounce topology subgraph in network
Each node u in (3a) network jumps the first node information HELLO-1 that neighbors is sent according to one received With second node information HELLO-2 package informatin, obtains and record oneself all double bounce neighbors v12Sequence number and location information, Wherein
(3b) each node u calculates any two according to the location information of oneself and the location information of double bounce neighbors Minimum emissive power required for directly being transmitted between node x, y:Wherein,β is to receive noise It than threshold value, is determined according to the sensitivity of receiver and bit error rate requirement, α is path-loss factor, and { u } indicates node u composition Set, dx,yIt is node x, the Euclidean distance between y;
(3c) judges the connection relationship between double bounce neighbors according to the minimum emissive power of calculating, if Px,yLess than node Maximum transmission power Pmax, it is determined that there are connection relationships between node x, y;Otherwise, there is no connections to close between node x, y System;
(3d) each node u establishes local double bounce topology subgraph according to the connection relationship between double bounce neighborsWhereinNode set beLocal double bounce topology subgraphSide Set are as follows:I.e. forIn any two nodeWhenWhen, by sideIt is put into local double bounce topology subgraphLine setIn;
(3e) each node u, which calculates any two, the link energy consumption weight between the node x, y of connection relationship: wp(x, Y)=Px,y, whereinPx,yHave required for directly being transmitted between the node x, y of connection relationship for any two Minimum sends power;
(3f) node u, which calculates any two, the link range weight between the node x, y of connection relationship: wd(x, y)= dx,y, whereindx,yIt is that any two have Euclidean distance between the node x, y of connection relationship.
Step 4, each node u building is locally generated subgraph S in networku=(V (Su),E(Su)), and determine patrolling for oneself Collect neighbors.
Referring to Fig. 4, this step is implemented as follows:
(4a) initializes each node and is locally generated subgraph SuNode set V (Su) it is local double bounce topology subgraphIn All nodes, initialize each node and be locally generated subgraph SuLine set E (Su) it is empty set;
(4b) is based on local double bounce topology subgraphWith link energy consumption weight wp(x, y) is link weight, and node u passes through Using dijkstra's algorithm, construct using u as root, the shortest path tree T of all nodes in local double bounce topology subgraphu=(V (Tu),E(Tu)), whereinFor all nodes in local double bounce topology subgraph, E (Tu) it is to constitute shortest path All sides of tree, to obtain the shortest path for reaching arbitrary node in local double bounce topology subgraph in subrange, and will Locally connected subgraph S is recorded in these sidesuIn, i.e. E (Su)≤E (Tu)∪E(Su) ,≤indicate assignment;
Each node u in (4c) network is according to shortest path tree TuThe node to conflict with oneself is found, conflict section is constituted Point set CNu, and according to CNuWithBuilding conflict subgraph CSu=(V (CSu),E(CSu)), wherein V (CSu)=CNu,
(4d) judges conflict subgraph CS according to maximum-flow algorithmuWhether it is the connection of k-1 point:
If so, by CSuIt is put into conflict subgraph set { CSuIn;
Otherwise, in local double bounce topology subgraphMiddle building k-1 point connection conflict subgraphIt enablesI.e. It willIt is put into conflict subgraph set { CSuIn, k-1 point connected subgraph is constructed by following (4d1)-(4d2):
(4d1) basisConflicting nodes set CNu, the neighbors x and node for adding conflicting nodes v are to company, (v, x) institute Side E (v, x) connect is arrivedIn, it is formedWhereinv∈CNu
(4d2) judges according to maximum-flow algorithmWhether k-1 point is connected to: if so, it enablesOtherwise, it returns To step (4d1);
(4e) judges whether k-1 >=2 are true: if so, (4f) is thened follow the steps, otherwise, jumps to step (4m);
(4f) initializes i=2, and wherein i indicates conflict subgraphIn i-th layer;
(4g) initializes j=1, and wherein j indicates conflict subgraph CSuIn j-th of conflicting nodes;
(4h) is enabledWherein { CSu}jIt indicates in conflict subgraph CSuJ-th of node conflict subgraph,Indicate (i-1)-th layer of conflict subgraph;
(4i) is for all nodes?In find corresponding conflicting nodes set CNuv, according to CNuv WithConstruct i-th layer of conflict subgraphWhereinNode collectionSide collection
(4j) judges according to maximum-flow algorithmWhether it is a connection conflict subgraph k-i:
If so, willIt is incorporated into conflict subgraph set { CSuIn;
Otherwise, building k-i point connection conflict subgraphIt enablesAnd it willIt is incorporated into set { CSuIn, K-i point connected subgraph is constructed by following (4j1)-(4j2)::
(4j1) basisConflicting nodes set CNuv, the neighbors x and node for adding conflicting nodes w are to (w, x) institute Side E (w, x) of connection is arrivedIn, it is formedWhereinw∈CNuv
(4j2) judges according to maximum-flow algorithmWhether it is the connection of k-1 point: if so, it enablesOtherwise, Back to step (4j1);
(4k) judges whether j meets j=| { CSu|: if so, it executes step (4l), otherwise, j=j+1 jumps to step (4h);
(4l) judges whether i meets i=k-1: if so, it executes step (4m), otherwise, i=i+1 jumps to step (4g);
(4m) is to set { CSuIn all conflict subgraphs generated using two channel-connectivity algorithm DBCC of distribution building it is sub Set Su=(V (Su),E(Su)), wherein V (Su) indicate SuNode collection, E (Su) indicate SuSide collection, the specific steps are as follows:
(4m1) is for set { CSuIn each conflict subgraphConstruction is locally generated subgraph T ' accordinglyu=(V (T′u),E(T′u));
(4m2) update is locally generated subgraph SuSide collection E (Su), i.e. E (Su)≤E (T 'u)∪E(Su), update is locally generated Subgraph SuSide collection V (Su), i.e. V (Su)≤V (T 'u)∪V(Su), and by node V (T 'u) logic conflict neighbours collection is recorded LCNuvIn, i.e. LCNuv=V (T 'u), then node u is by way of flooding LCNuvWith E (Su) topology information be sent to Su In all nodes.
(4n) each node u is locally generated subgraph S according to what the topology information that other nodes are sent updated oneselfuAnd logic The neighbours that conflict collect LCNuv, subgraph S will be locally generateduOn one jump neighbors v as logic neighbors, and constitute logic neighbors Collection: LCNu={ v ∈ V (Su)|(u,v)∈E(Su)};
(4p) updates side collection information E (S)=E (S) ∪ E (Su), more new logic neighborhood information LCNu=V (Su), wherein E (S) indicate that all nodes generate total side collection for generating figure, LCN in networkuIndicate the logic neighbors set of node u;
By step (4c)-(4m), it is specifically locally generated subgraph SuResult as shown in figure 5, wherein first layer Indicate the k-1 point connection conflict subgraph of node uThe second layer indicatesAny node v corresponding k-2 point be connected to punching Prominent subgraphThird layer indicatesThe corresponding k-2 point connection conflict subgraph of any node vAny node w Corresponding k-3 point connection conflict subgraphThe last layer indicates finally formed and is locally generated subgraph Su
Wherein dijkstra's algorithm described in above-mentioned steps (4b) is referring to authors such as Xinjun Wang in IEEE VTC Article " the Bi-Channel-Connected Topology Control in Cognitive Radio delivered on 2014 Networks";The maximum-flow algorithm used in above-mentioned steps (4d) judge to conflict subgraph whether the connection of k-1 point in step (4j) The maximum-flow algorithm of use judges that whether k-i point is connected to conflict subgraph, makees referring to Shimon Even and R.Endre Tarjan etc. " the Network Flow and Testing Graph Connectivity " that person delivers.
Step 5, each node u determines oneself transmission power in network, i.e., is adjusted to cover by transmission power Minimum power required for all logic neighbors:Wherein all logic neighbors of u Required minimum power refers to the maximum value of the transmission power of all logic neighbors of u, pu,vIndicate the logic neighbors of u The transmission power of v;
Step 6, according to the topological control process of above-mentioned steps 4- step 5, each node disjoint in network it is determining and oneself Logic neighbors connection relationship, by the chain between all nodes and each node and the logic neighbors of oneself in network Road combines, and constitutes final full mesh topology, i.e. G=(V (G), E (G)), wherein V (G) is all nodes in network, E (G) =(u, v) | u ∈ V (G), v ∈ LCNu}.
Step 7, channel point is carried out to each node u in the final full mesh topology constructed using greedy coloring algorithm Match.
(7a) node u sends power P with maximummaxBroadcast request distributes channel packet RAC on a common control channel, other Node needs transfer packet again when receiving this packet, and until logic, conflict neighbours collect LCNuIn all nodes all receive Until RAC packet;
(7b) logic conflict neighbours collect LCNuIn node after receiving RAC packet, check oneself the allocated channel, and Feedback channels distribution packet AC give node u, the allocated channel of the node is wherein contained in channel distribution packet AC, if the section Point is also unallocated, and packet AC is just denoted as empty packet by channel;
(7c) node u collects all LCNuIn node feedback AC packet, and from also unappropriated channel select master The smallest channel of user occupancy probability, as the available channel of oneself.;
(7d) each node disjoint executes the above process, until all nodes all distribute channel.
Effect of the invention can be further illustrated by emulation:
(1) simulated conditions
In simulating scenes, network node is evenly distributed on a 1000 × 1000m at random2Two-dimensional surface region in. The threshold value of received signal to noise ratio SNR is set as -80dBm, and path-loss factor α value is 4.All nodes are using identical in network Maximum transmission power, wherein maximum transmission power Pmax=256mW, corresponding maximum transmitted radius Rmax=400m.Assuming that main User influences whether all secondary user nodes.
(2) emulation content and result
Emulation 1, the topologies that the present invention generates in the scene of 50 nodes are as shown in fig. 6, wherein
Fig. 6 (a) is maximum power topology;
Fig. 6 (b) is the topology that the method for the present invention generates, the channel of digital representation node distribution therein;
Fig. 6 (c) indicates the topology of time user network when primary user occupies a channel;
Fig. 6 (d) indicates the topology of time user network when two primary users occupy two channels;
Fig. 6 (e) indicates the topology of time user network when three primary users occupy three channels;
By Fig. 6 (a)-(e) as can be seen that the topology that the method for the present invention generates arbitrarily occupies k-1 channel in primary user When, the network of secondary user is still connection.
Emulation 2, with the method for the present invention and maximum power topology MaxPower to the different value of K of node average transmission radius into Row emulation, as a result as shown in Figure 7:
From fig.7, it can be seen that in network time user node number increase, the average transmission of maximum power topology MaxPower Radius remains unchanged, and is 400m, and average transmission radius of the invention is continuous with the increase of in network user node number Reduce, and with the increase of k, average transmission radius is continuously increased, therefore the method for the present invention can be very good to reduce the energy of node Consumption, increases the life cycle of network.
Emulation 3, is carried out with the method for the present invention and different value of K of the maximum power topology MaxPower to required average channel number Emulation, as a result as shown in Figure 8:
As seen from Figure 8, in network time user node number increase, the average channel of maximum power topology MaxPower Number is linear to be increased, and average channel number needed for the method for the present invention is less, and increasing in network user node number, average The number of channel slowly increases, and with the increase of k, average channel number also slowly increases.
Emulation 4, is carried out with the method for the present invention and different value of K of the maximum power topology MaxPower to required maximum channel number Emulation, as a result as shown in Figure 9:
As seen from Figure 9, in network time user node number increase, needed for the maximum of maximum power topology MaxPower The number of channel linearly increases, and the number of channel needed for the method for the present invention is maximum is less, and increasing in network user node number, The number of channel needed for maximum slowly increases, and with the increase of k, and average channel number also slowly increases, from Fig. 8 and Fig. 9 it can be concluded that Channel resource is not only greatly saved in the present invention, but also maintains the connectivity of network, so that network has good Shandong Stick.

Claims (2)

1. recognizing the distributed topology approach for constructing K channel-connectivity in Ad Hoc network, include the following steps:
(1) initialization network is that k point is connected to, k >=2, and each node u obtains the sequence of a jump and double bounce abutment points respectively in network Number and location information, i.e., each node u is in network with maximum transmission power PmaxIt is transmitted in radius to being located at apart from oneself All nodes broadcast a first node information HELLO-1 packet and second node information HELLO-2 packet respectively, and receive one and jump neighbour The HELLO-1 packet and HELLO-2 packet that node is sent, including the sequence number and location information of u node in the HELLO-1 packet, The sequence number and location information of all jump neighbors in HELLO-2 packet containing u;
(2) according to the sequence number and the local double bounce topology subgraph of location information foundation in step (1)And it calculatesIn it is any Two link energy consumption weight w having between the node x, y of connection relationshipp(x, y) and link range weight wd(x, y):
(2a) each node u based on the received one jump neighbors first node information HELLO-1 packet and second node information HELLO-2 packet obtains and records the sequence number and location information of the HELLO-1 packet and HELLO-2 packet interior joint, these neighbors Constitute double bounce neighbors collectionIt is described wherein including the sequence number and location information of u node in the HELLO-1 packet The sequence number and location information of all jump neighbors in HELLO-2 packet containing u;
(2b) each node u calculates any two node according to the location information of oneself and the location information of double bounce neighbors Minimum emissive power required for directly being transmitted between x, yWherein,β is received signal to noise ratio thresholding Value determines that α is path-loss factor, d according to the sensitivity of receiver and bit error rate requirementx,yIt is node x, it is European between y Distance, if Px,yLess than the maximum transmission power P of nodemax, it is determined that there are connection relationships between node x, y;Otherwise, node x, Connection relationship is not present between y;
(2c) each node u establishes local double bounce topology subgraph according to the connection relationship between double bounce neighborsWherein local topology subgraphNode set beLocal topology subgraphLine set are as follows:I.e. forIn any two nodeWhenWhen, side
(2d) according to local double bounce topology subgraph, calculating any two in each node u has between the node x, y of connection relationship Link energy consumption weight: wp(x, y)=Px,y, whereinPx,yFor any two have connection relationship node x, y it Between directly minimum required for transmission send power;
(2e) according to Euclidean distance, any two have node x, the distance between y weight of connection relationship: w in calculate node ud (x, y)=dx,y, whereindx,yIt is that any two have Euclidean distance between the node x, y of connection relationship;
(3) each node u building is locally generated subgraph S in networku:
(3a) initializes each node and is locally generated subgraph SuNode set V (Su) it is local double bounce topology subgraphIn institute There is node, initializes each node and be locally generated subgraph SuLine set E (Su) it is empty set;
(3b) is based on local double bounce topology subgraphEach node u is according to link energy consumption weight wp(x, y) is constructed using u as root, The shortest path tree T of all nodes in local double bounce topology subgraphu=(V (Tu),E(Tu)), whereinFor All nodes in local double bounce topology subgraph, E (Tu) it is to constitute all sides of shortest path tree, and office is recorded in these sides Line set E (the S of portion's spanning subgraphu) in, i.e. E (Su) <=E (Tu)∪E(Su);
Each node u in (3c) network is according to shortest path tree TuThe node to conflict with oneself is found, conflicting nodes set is constituted CNu, and according to CNuWithBuilding conflict subgraph CSu=(V (CSu),E(CSu)), wherein V (CSu)=CNu,
(3d) judgement conflict subgraph CSuIt whether is the connection of k-1 point: if so, by CSuIt is put into conflict subgraph set { CSuIn; Otherwise, in local double bounce topology subgraphMiddle building k-1 point connection conflict subgraphIt enablesIt willIt puts Enter to conflict subgraph set { CSuIn;The building k-1 point connection conflict subgraphThe step of it is as follows:
(3d1) basisConflicting nodes set CNu, what the neighbors x and node for adding conflicting nodes v connected (v, x) Side E (v, x) is arrivedIn, it is formedWhereinv∈CNu
(3d2) judgementWhether it is connected to k-1 point: if so, it enablesOtherwise, step (3d1) is returned to;
(3e) judges whether k-1 >=2 are true: if so, (3f) is thened follow the steps, otherwise, jumps to step (3m);
(3f) initializes i=2, and wherein i indicates conflict subgraphIn i-th layer;
(3g) initializes j=1, and wherein j indicates conflict subgraph CSuIn j-th of conflicting nodes;
(3h) is enabledWherein { CSu}jIt indicates in conflict subgraph CSuJ-th of node conflict subgraph,Table Show (i-1)-th layer of conflict subgraph;
(3i) is for all nodes?In find corresponding conflicting nodes set CNuv, according to CNuvWithConstruct i-th layer of conflict subgraphWhereinNode collectionSide collection
(3j) judgementWhether it is k-i point connection conflict subgraph: if so, then willIt is incorporated into conflict subgraph set { CSu} In, otherwise, building k-i point connection conflict subgraphIt enablesAnd it willIt is incorporated into set { CSuIn;It is described Construct k-i point connection conflict subgraphThe step of it is as follows:
(3j1) basisConflicting nodes set CNuv, add conflicting nodes w neighbors x and node (w, x) is connected Side E (w, x) arriveIn, it is formedWhereinw∈CNuv
(3j2) judgementWhether k-i point is connected to: if so, then enableOtherwise step (3j1) is returned to;
(3k) judges whether j meets j=| { CSu|: if so, it executes step (3l), otherwise, j=j+1 jumps to step (3h);
(3l) judges whether i meets i=k-1: if so, it executes step (3m), otherwise, i=i+1 jumps to step (3g);
(3m) is to set { CSuIn all conflict subgraphs using two channel-connectivity algorithm DBCC of distribution building generation subtree Su =(V (Su),E(Su)), wherein V (Su) indicate SuNode collection, E (Su) indicate SuSide collection, as follows carry out:
(3m1) is for set { CSuIn each conflict subgraphConstruction is locally generated subgraph T accordinglyu'=(V (Tu'), E(Tu'));
(3m2) update is locally generated subgraph SuSide collection E (Su), i.e. E (Su) <=E (Tu')∪E(Su), update is locally generated son Scheme SuSide collection V (Su), i.e. V (Su) <=V (Tu')∪V(Su), and by node V (Tu') logic conflict neighbours collection LCN is recordeduv In, i.e. LCNuv=V (Tu'), then node u is by way of flooding LCNuvWith E (Su) topology information be sent to SuIn All nodes;
(3n) each node u is locally generated subgraph S according to what the topology information that other nodes are sent updated oneselfuWith logic conflict Neighbours collect LCNuv, subgraph S will be locally generateduOn one jump neighbors v as logic neighbors, and constitute logic neighbors collection: LCNu={ v ∈ V (Su)|(u,v)∈E(Su)};
(3p) updates side collection information E (S)=E (S) ∪ E (Su), more new logic neighborhood information LCNu=V (Su), wherein E (S) table Show that all nodes in network generate the side collection of total generation figure, LCNuIndicate the logic neighbors set of node u;
(4) each node u determines oneself transmission power in network, i.e., is adjusted to transmission power that all logics can be covered Minimum power required for neighbors:
(5) link combinations between all nodes and each node and the logic neighbors of oneself in network are got up, is constituted Final full mesh topology, i.e. G=(V (G), E (G)), wherein V (G) be network in all nodes, E (G)=(u, v) | u ∈ V (G),v∈LCNu, wherein E (G) indicates the side collection in network G;
(6) channel distribution is carried out to each node u in the final full mesh topology constructed using greedy coloring algorithm, by as follows Step carries out:
(6a) node u collects LCN to logic conflict neighboursuIn all nodes send power by way of flooding in public affairs with maximum Request distribution channel packet RAC is sent in control channel altogether;
(6b) logic conflict neighbours collect LCNuIn node after receiving RAC packet, with maximum send power handle by way of unicast Feedback channels distribution packet AC issues node u, informs the channel having been selected;
(6c) node u collects all LCNuIn node feedback AC packet, and from also unappropriated channel select primary user account for With the smallest channel of probability, as the available channel of oneself.
2. the distributed topology approach of K channel-connectivity is constructed in cognition Ad Hoc network according to claim 1, wherein walking Suddenly the shortest path tree T in (3b)uIt is constructed using dijkstra's algorithm or bellman-ford algorithm.
CN201610369203.7A 2016-05-30 2016-05-30 Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network Active CN106658523B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610369203.7A CN106658523B (en) 2016-05-30 2016-05-30 Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610369203.7A CN106658523B (en) 2016-05-30 2016-05-30 Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network

Publications (2)

Publication Number Publication Date
CN106658523A CN106658523A (en) 2017-05-10
CN106658523B true CN106658523B (en) 2019-10-11

Family

ID=58848663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610369203.7A Active CN106658523B (en) 2016-05-30 2016-05-30 Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network

Country Status (1)

Country Link
CN (1) CN106658523B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107197425B (en) * 2017-06-16 2019-08-06 韩冰青 Isomery Energy-aware topology control method in wireless self-networking
CN109121098B (en) * 2018-08-24 2021-05-25 京东方科技集团股份有限公司 Method and system for allocating channel
CN110022562B (en) * 2019-04-11 2022-04-01 池州学院 Distributed channel allocation control method for mobile ad hoc network
CN111683413B (en) * 2020-08-12 2020-11-10 成都极米科技股份有限公司 Method, terminal, network access device and storage medium for establishing multilink connection
CN112468996B (en) * 2020-12-14 2022-07-26 华东交通大学 Network topology control method in cognitive Internet of vehicles

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507168A (en) * 2014-12-27 2015-04-08 西安电子科技大学 Distributed topology control method for cognitive Ad Hoc network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507168A (en) * 2014-12-27 2015-04-08 西安电子科技大学 Distributed topology control method for cognitive Ad Hoc network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Achieving Bi-channel-Connectivity with Topology Control in Cognitive Ratio Network;X.wang;《IEEE》;20141231;全文 *
Generalized-Bi-Connectivity for Fault Tolerant Cognitive Radio Network;H.Liu;《IEEE》;20120831;全文 *

Also Published As

Publication number Publication date
CN106658523A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
CN104507168B (en) Recognize the distribution topology control method of Ad Hoc networks
CN106658523B (en) Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network
Wu et al. Forward‐node‐set‐based broadcast in clustered mobile ad hoc networks
Sridhar et al. Energy supported AODV (EN-AODV) for QoS routing in MANET
JP2005518717A (en) Collision-free route routing integrated between layers
CN102546059A (en) Non-supervision clustering-based distributed cooperative spectrum sensing method for cognitive self-organizing network
Yu et al. Cooperative bridges: topology control in cooperative wireless ad hoc networks
Ammar et al. Multi-hop LEACH based cross-layer design for large scale wireless sensor networks
CN103974367A (en) Error-tolerance and multi-path optimization method based on HEED algorithm in wireless sensor network
Farooq Multi-hop communication protocol for LoRa with software-defined networking extension
CN112040528B (en) Method for selecting control node of wireless ad hoc network center
CN107846719A (en) A kind of wireless sensor network routing method based on improvement gam algorithm
US10499264B1 (en) Role selection method in wireless communication networks
Zheng et al. A resource-efficient and scalable wireless mesh routing protocol
Zhang et al. Less is more: Learning more with concurrent transmissions for energy-efficient flooding
CN106792744B (en) The topology control method being connected to based on k point under two channel-connectivities of building
CN106131887B (en) Distribution topology control method based on serial interference elimination
CN106658647A (en) Relay selection algorithm based on interference perception
Aslani et al. Improving the performance of rpl routing protocol for internet of things
CN115665860A (en) Unmanned aerial vehicle ad hoc network resource allocation method based on migratory bird swarm characteristics
Dai et al. Efficient channel assignment under dynamic source routing in cognitive radio networks
CN104219679B (en) A kind of improved method for channel allocation in cognitive radio networks
Xiao et al. A novel energy entropy based on cluster head selection algorithm for wireless sensor networks
Jayashree et al. E/sup 2/LBC: an energy efficient load balanced clustering technique for heterogeneous wireless sensor networks
Kumar et al. A survey on routing techniques in zigbee wireless networks in contrast with other wireless networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant