CN106792744A - Topology control method based on k points connection under two channel-connectivities of structure - Google Patents

Topology control method based on k points connection under two channel-connectivities of structure Download PDF

Info

Publication number
CN106792744A
CN106792744A CN201611093640.7A CN201611093640A CN106792744A CN 106792744 A CN106792744 A CN 106792744A CN 201611093640 A CN201611093640 A CN 201611093640A CN 106792744 A CN106792744 A CN 106792744A
Authority
CN
China
Prior art keywords
node
subgraph
neighbors
points
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611093640.7A
Other languages
Chinese (zh)
Other versions
CN106792744B (en
Inventor
盛敏
陈雯
李建东
王玺钧
李轩
刘豹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201611093640.7A priority Critical patent/CN106792744B/en
Publication of CN106792744A publication Critical patent/CN106792744A/en
Application granted granted Critical
Publication of CN106792744B publication Critical patent/CN106792744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/38TPC being performed in particular situations
    • H04W52/46TPC being performed in particular situations in multi hop networks, e.g. wireless relay networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a kind of topology control method of k points connection under two channel-connectivities based on structure, prior art is mainly solved when primary user takes any one channel, some time users lose communication capacity and cause network to isolate and the interference problem between secondary user.Its implementation process is:1. the HELLO bags twice of each node broadcasts in network, set up local double bounce topology subgraph2. it is based onSet up the topological subgraph G of 1 point of connection of part ku;3. according to GuThe connection of k points is locally generated subgraph S under the structure guarantee time channel-connectivity of user two;4. the jump neighbors in S adjusts transmission power;5. full mesh topology is constituted by the link between all nodes and its logic neighbors in network, carry out channel distribution.The present invention can ensure the connection of network k points while secondary two channel-connectivity of user network is ensured, eliminate time user and disturb, and improve the robustness of network, can be used in cognitive Ad Hoc networks.

Description

Topology control method based on k points connection under two channel-connectivities of structure
Technical field
The invention belongs to wireless communication field, more particularly to topology control method can be used for cognitive Ad Hoc networks.
Background technology
Among many factors of influence cognition Ad Hoc network performances, the topological structure of network is very important one Aspect, thus how to optimize cognitive Ad Hoc networks topological structure, enhancing network topology fault-tolerant ability and be upper layer communication Agreement provides the emphasis that good bottom topological support is Topology Control research.
Cognitive Ad Hoc networks family is divided into two classes, and a class is primary user, and another kind of is time user, and primary user enjoys channel Preferential right, when primary user does not use channel, secondary user can use the channel.Because secondary user can only connect to opportunistic Enter channel, the connectedness of secondary user network is easily influenceed by primary user, when primary user will use certain channel, secondary user The channel will be vacated for the proper communication for protecting primary user and in silent status, node of mourning in silence can reduce time user network Connectedness, the segmentation of network can be caused when serious, the influence connective to secondary user network in order to reduce primary user, researcher Some Topology Control Algorithms, the article that such as Hai Liu authors deliver on IEEE ICCCN 2012 have been proposed " Generalized-Bi-Connectivity for Fault Tolerant Cognitive Radio Network " and Article " the Achieving Bi-Channel- that the authors such as Xijun Wang deliver on IEEE JSAC 2014 Connectivity with Topology Control in Cognitive Radio Networks " etc. can ensure time use The connection of family network, and the interference between time user can be eliminated, but these methods only individually consider primary user's occupancy After any one channel, the basic connectivity of network is merely ensured that.
When time user is because of depleted of energy in network or other emergency situations, such as hardware damage occurs and loses and other use During the ability of family communication, it is equally possible to cause the segmentation of network so that effective connection cannot be set up between secondary user, in this feelings Under condition, in order to strengthen the fault-tolerant ability of network, researcher has been proposed that some Topology Algorithms, and such as Ning Li authors are in IEEE Article " the Localize Fault-Topology Control in Wireless Ad Hoc delivered on TPDS Networks ", but the algorithm only individually considers the k points connection for ensureing network, does not consider influence of the primary user to secondary user, leads Time user network is there may be segmentation when causing primary user to take any one channel so that cannot be set up between secondary user and effectively connected Connect.
The content of the invention
It is an object of the invention to be directed to above-mentioned problem of the prior art, k under a kind of two channel-connectivities based on structure is proposed The topology control method of point connection, so that after the channel that primary user arbitrarily takes network, secondary user network is still for k points connect It is logical, it is ensured that when any k-1 node loses the communication capacity with other nodes, secondary user network remains to set up secondary user network Effective connection, while the interference between time user is eliminated, the effective robustness for improving network.
To achieve these goals, it is of the invention to realize step including as follows:
(1) initialization network is the connection of k points, and each node u obtains the sequence number of a jump and two hop nodes respectively in network And positional information, k >=2;
(2) local double bounce topology subgraph is set up according to sequence number and positional informationWherein,ForNode set,ForLine set;
(3) based on local double bounce topology subgraphEach node u sets up the topological subgraph G of part k-1 points connectionu
The topological subgraph of (3a) initialization part k-1 point connectionsNode u is according to GuFind its neighbors set PNu, and build the topological subgraph SN of k-1 points connectionu
(3a1) initializes the topological subgraph of k-1 points connectionNode set ForBy node setMiddle any two points are in GuIn corresponding side assignLine setI.e.Wherein, E (x, y) ∈ E (Gu),{ u } represents the collection of node u compositions Close, PNuFor node u existsIn one jump neighbors set;
(3a2) judges with maximum-flow algorithmWhether it is the connection of k-1 points:If so, thenJump to step (4) step (3b), otherwise, is performed;
(3b) initializes the topological subgraph of the 2nd k-1 points connection
(3b1) judgesWhether it is empty set:If so, then jumping to step (3c), otherwise, step is performed (3b2);
(3b2) judges with maximum-flow algorithmWhether it is the connection of k-1 points:If so, thenJump to step (4);Otherwise, will according to sequence node numberIn node m add vertex setI.e.Simultaneously by node setIn any two node existIn corresponding side assignI.e.Return to step (3b1), wherein,
(3c) initializes the topological subgraph of the 3rd k-1 points connection
(3c1) judges with maximum-flow algorithmWhether it is the connection of k-1 points:If so, thenJump to step (4) step (3c2), otherwise, is performed;
(3c2) node u knows that its h jumps the information of neighbors according to step (1) and step (2), obtains V (Gu) all neighbours NodeWill according to sequence node numberIn node w sequentially addNode setAnd Gu's Node set V (Gu), i.e.,Simultaneously by node w and V (Gu) in The incidence edge of node is addedLine set and GuLine set, i.e., Return to step (3c1), wherein, c ∈ V (Gu),And
(4) topological subgraph G is connected according to local k-1 pointsu, each node u calculates any two the node of annexation Link energy consumption weight w between x, yp(x, y)=Px,yWith link range weight wd(x, y)=dx,y, wherein, x, y ∈ V (Gu), Px,yThere is the node x of annexation for any two, the minimum transmit power required for directly being transmitted between y, dx,yIt is any two The individual node x for having an annexation, the Euclidean distance between y;
(5) each node u builds and is locally generated subgraph S=(V (S), E (S)) in network, and according to being locally generated subgraph S Obtain the logic conflicting nodes set LCN of each node uu, the node set of wherein V (S) expressions S, the side collection of E (S) expressions S Close;
(6) each node u is locally generated subgraph S and logic according to what the topology information that other nodes v sends updated oneself Conflict neighbors set LCNu, the jump neighbors on subgraph S will be locally generated as logic neighbors, constitute logic neighbors Set:Wherein, v ∈ V (S) and E (u, v) ∈ E (S), i.e. node v belong to the node set V for being locally generated subgraph S And the corresponding side E (u, v) of node u and v belong to the line set E (S) for being locally generated subgraph S (S);
(7) each node u determines the transmission power of oneself in network, will transmission power be adjusted to cover it is all Minimum power required for logic neighbors:Wherein, Pu,vNeeded for expression node u to node v Minimum emissive power;
(8) link combinations between all nodes and each node and the logic neighbors of oneself in network are got up, The final full mesh topology of composition, i.e. G=(V (G), E (G)), wherein, V (G) is all nodes in network, and E (G) is institute in network There is side;
(9) channel distribution is carried out to each node u in the final full mesh topology G that has built using greedy coloring algorithm.
The invention has the advantages that:
1) joint Power control of the present invention and channel distribution, by Power Control so that primary user arbitrarily takes a channel The k points connection of time user network is also ensured afterwards;Distribute different channels to by channel distribution the secondary user for interfering, from And eliminate the interference between time user.
2) present invention is suitable for the topology of channel distribution by Power Control structure, it is to avoid the connectedness of complexity high is sentenced It is disconnected, so as to reduce the overall complexity of algorithm.And secondary user only needs the local topology information, therefore algorithm can to transport in a distributed manner OK.
3) joint Power control of the present invention and node degree control, reduce channel needed for the transmission power and network of node Number.
Brief description of the drawings
Fig. 1 is the applicable cognitive Ad Hoc networks schematic diagram of a scenario of the present invention;
Fig. 2 realizes general flow chart for of the invention;
Fig. 3 is the peak power topology that the present invention is formed in 50 meshed network scenes;
Fig. 4 is that the sub-process figure for being locally generated subgraph is built in the present invention;
Fig. 5 is acquisition k-1 point connected subgraphs SN in the present inventionuWith local k-1 points topology subgraph GuSub-process figure;
Fig. 6 for the present invention in k-1 point connected subgraphs SNuMiddle structure spanning subgraph SNu' sub-process figure;
Fig. 7 in the present invention according to conflict subgraph CSuMiddle structure second order spanning subgraph Su' sub-process figure;
Simulating, verifying figures of the Fig. 8 to present invention generation topology;
Fig. 9 is simulation comparison figure of the average transmission radius obtained to the present invention under different value of K;
Figure 10 is simulation comparison figure of the average channel number obtained to the present invention under different value of K;
Figure 11 is simulation comparison figure of the maximum channel number obtained to the present invention under different value of K.
Specific embodiment
Embodiment of the present invention and effect are described in further detail below in conjunction with accompanying drawing.
Reference picture 1, the cognitive Ad Hoc networks that the present invention is used are distributed in the node group in two dimensional surface region by n Into.Time user of each node on behalf one, and with unique sequence number, it is possible to by GPS or other location technologies come Obtain the positional information of its own.All of node is influenceed by same primary user, and primary user can be using in C channel Any one channel.Each node can send data in the channel of any one in C channel, while in other all letters Interception data on road, in addition each node do not deposited at aspects such as physical arrangement, initial setting up, functional characteristic, parameter indexs In any difference.In a network, the wireless channel between arbitrary node is additive white Gaussian noise channel.Node passes through omnidirectional antenna Communicated with surroundings nodes, maximum transmission power is Pmax.The transmission power P of arbitrary node uuCan be between a minimum and a maximum Continuously adjust, i.e. 0≤Pu≤Pmax.Transmission radius r is transmission range corresponding to node transmitting power, any two node it Between to there is the necessary and sufficient condition of Radio Link be the transmission radius r of Euclidean distance between them less than or equal to node.
Reference picture 2, it is of the invention to realize that step is as follows:
Step 1, each node u sends the first node information HELLO-1 bags of oneself in network, and receives a jump neighbors The HELLO-1 bags of transmission.
(1a) topological structure for being formed when each node is using maximum power transfer in network is peak power topology, As shown in figure 3, peak power topological representation is:Gmax=(V (Gmax),E(Gmax)), wherein V (Gmax) it is node set, represent net Network node, E (Gmax) it is line set, the Radio Link existed between representing node;
(1b) is located at all node v in the transmission radius of node u1, a jump neighbors set of composition node u Wherein, v1∈V(Gmax) and node u and v1Between there is annexation, i.e. both corresponding side E (u, v1) Belong to E (Gmax), node v1It is 1 jump with the distance of node u;
Each node u in (1c) network is with maximum transmission power PmaxA HELLO-1 is broadcasted to a jump neighbors of u Bag, the positional information of the sequence number containing node u and node u in the HELLO-1 bags;
Each node u in (1d) network receives one and jumps neighbors with maximum transmission power PmaxThe HELLO-1 bags of broadcast.
Step 2, the first node information HELLO-1 bags in above-mentioned steps 1, each node u sends oneself in network Section Point information HELLO-2 bags, and receive one jump neighbors send HELLO-2 bags.
All nodes that (2a) node u is jumped using one and double bounce can be reached, the double bounce neighbors set of configuration node u Wherein, v2∈V(Gmax) and node v2At least with node u one jumps neighbors setIn There is incidence edge in one node,For node u one jumps neighbors set, node v2It is 2 jumps with the distance of node u;
After each node u in (2b) network has received all one HELLO-1 bags for jumping neighbors transmission, with emission maximum Power PmaxA HELLO-2 bag is broadcasted to a jump neighbors of u, and receives one and jump the HELLO-2 bags that neighbors sends, Containing u all one jump the sequence number and positional information of neighbors in HELLO-2 bags.
Step 3, each node u builds the local double bounce topology subgraph of oneself in network
The first node information HELLO-1 that each node u in (3a) network sends according to the jump neighbors for receiving With Section Point information HELLO-2 bags, oneself all double bounce neighbors v is obtained and recorded12Sequence number and positional information, wherein
(3b) each node u calculates any two according to the positional information of oneself and the positional information of double bounce neighbors Minimum emissive power required for directly being transmitted between node x and yWherein,β is according to reception The received signal to noise ratio threshold value that the sensitivity of machine and bit error rate requirement determine, α is path-loss factor, dx,yIt is node x, between y Euclidean distance;
(3c) is according to the minimum emissive power P for calculatingx,y, the annexation between double bounce neighbors is judged, if Px,yIt is less than The maximum transmission power P of nodemax, it is determined that there is annexation between node x and y;Otherwise, do not exist between node x and y Annexation;
(3d) each node u sets up local double bounce topology subgraph according to the annexation between double bounce neighborsWhereinNode set be Line set beForIn any two node x and y, when the transimission power needed for x to y is less than its maximum transmission power, by node x and The corresponding side E (x, y) of y assignI.e.Wherein, { u } represents the set of node u compositions.
Step 4, each node u builds the topological subgraph G of local k-1 points connection of oneself in networku
Reference picture 4, this step is implemented as follows:
The topological subgraph of (4a) initialization part k-1 point connectionsBuild the topological subgraph SN of k-1 points connectionu
(4a1) initializes the topological subgraph of k-1 points connectionNode set ForBy node setMiddle any two points are in GuIn corresponding side assignLine setI.e.Wherein, E (x, y) ∈ E (Gu),{ u } represents the collection of node u compositions Close, PNuFor node u existsIn one jump neighbors set;
(4a2) judges with maximum-flow algorithmWhether it is the connection of k-1 points:If so, thenJump to step (4d), otherwise, performs step (4b);
(4b) initializes the topological subgraph of the 2nd k-1 points connection
(4b1) judgesWhether it is empty set:If so, then jumping to step (4c), otherwise, step is performed (4b2);
(4b2) judges with maximum-flow algorithmWhether it is the connection of k-1 points:If so, thenJump to step (4d), otherwise, will according to sequence node numberIn node m add the 2nd k-1 points topological subgraph of connection Node setI.e.Simultaneously by node setIn any two node exist Local double bounce topology subgraphIn corresponding side assignI.e.Return to step (4b1), wherein,
(4c) initializes the topological subgraph of the 3rd k-1 points connection
(4c1) judges with maximum-flow algorithmWhether it is the connection of k-1 points:If so, thenJump to step (4d), otherwise, performs step (4c2);
(4c2) node u knows that its h jumps the information of neighbors according to step 1 and step 2, obtains V (Gu) all neighborsWill according to sequence node numberIn node w sequentially addNode setAnd GuNode Set V (Gu), i.e.,Simultaneously by node w and V (Gu) in it is any Incidence edge E (c, w) of node c adds the topological subgraph of the 3rd k-1 points connectionLine set topological son is connected with part k-1 points Figure GuLine set, i.e.,Return to step (4c1), Wherein, c ∈ V (Gu),And
Above step (4a) arrives step (4c), as shown in Figure 5;
(4d) connects topological subgraph G according to local k-1 pointsu, each node u calculates any two the node of annexation Link energy consumption weight w between x, yp(x, y)=Px,yWith link range weight wd(x, y)=dx,y, wherein, x, y ∈ V (Gu), Px,yFor any two has the minimum transmit power required for directly being transmitted between the node x and y of annexation, dx,yIt is any two The individual Euclidean distance having between the node x and y of annexation.
Step 5, each node u builds and is locally generated subgraph S in network, and determines the logic neighbors of oneself.
Each node u in (5a) network will be locally generated node set V (S) initialization of subgraph S=(V (S), E (S)) Topological subgraph G is connected into local k-1 pointsuIn all nodes, i.e.,Line set E (S) is initialized to sky Collection;
(5b) connects topological subgraph G according to local k-1 pointsu, minimum generation is built with kruskal minimal spanning tree algorithms Tree Tu, and according to k-1 point connected subgraphs SNu, with FLSSkAlgorithm builds the k-1 points connection spanning subgraph with minimum node degree SNu':
Reference picture 6, this step is implemented as follows:
(5b1) initialization k-1 point connection spanning subgraphs SNu'=(V (SNu'),E(SNu')), make SNu' line set E (SNu') it is E (SNu), SNu' node set E (SNu') it is E (SNu);
(5b2) is by E (SNu') in side with link range weight wp (x, y) be link energy consumption weight wd (x, y) descending arrange Row, make m represent line set E (SNu') in element number, loop initialization factor i=0;
(5b3) judges whether i is equal to m:If so, jumping to step (5c), otherwise, step (5b4) is performed;
(5b4) is by line set E (SNu') in weight limit side E (x, y) from E (SNu') middle removal, i.e.,The side right is reset zero simultaneously and i=i+1 is made;With maximum-flow algorithm decision node X and y are in SNu' in whether there is k-1 bars point uninterrelated path:If so, return to step (5b3), otherwise, by side E (x, y) addition To k-1 points connection spanning subgraph SNu' in, i.e.,Return to step (5b3);
(5c) is according to minimum spanning tree Tu=(V (Tu),E(Tu)) connect spanning subgraph SN with k-1 pointsu' build single order generation Subgraph Su=(V (Su),E(Su)), SuNode set beSuLine set beAnd renewal is locally generated subgraph S, i.e.,Wherein, V (Tu) represent TuNode Set, E (Tu) represent TuLine set,Represent assignment;
Each node u in (5d) network is according to single order spanning subgraph SuIts physics neighbors and conflict neighbors are found, Respectively constitute neighbors set PNuWith conflict neighbors set CNu, and initialization logic conflict neighbors set LCNuAnd conflict Subgraph CSu=(V (CSu),E(CSu)), wherein, E(x,y)∈E(Gu), x, y ∈ CNu;The neighbors set of node u is defined as:Along SuOne jumps the collection that reachable all nodes are constituted CloseI.e.The conflict neighbors set of node u is defined as:Along SuThe set that the reachable all nodes of double bounce are constitutedI.e. It is expressed as a jump neighbors set of node uIn each node the adjacent section of physics The node set of point composition;
(5e) judges the neighbors set PN of u with maximum-flow algorithmuMiddle any two node is in conflict subgraph CSuIn be It is no to there is k-1 bars point uninterrelated path:If so, then performing step (5f), otherwise, step (5g) is jumped to;
(5f) node u is in conflict subgraph CSuUpper structure second order spanning subgraph Su':
Reference picture 7, this step is implemented as follows:
(5f1) node u is by second order spanning subgraph Su'=(V (Su′),E(Su')) in point set be initialized as CSuIn All nodes, i.e.,Line set is initialized asWherein x, y ∈ V (Su'), E (x,y)∈E(CSu), will node set V (Su') in any two points in conflict subgraph CSuIn corresponding side assign second order life Into subgraph Su' line set E (Su');
(5f2) is by E (Su') in side with link range weight wp (x, y) for link energy consumption weight wd (x, y) carries out descending Arrangement, makes n represent set E (SNu') in element number, loop initialization factor j=0;
(5f3) judges whether j is equal to n:If so, jumping to step (5j), otherwise, step (5f4) is performed;
(5f4) is by E (Su') in weight limit side E (x, y) from E (Su') middle removal, i.e.,The side right is reset zero simultaneously and j=j+1 is made;The adjacent section of u is judged with maximum-flow algorithm Point set PNuMiddle any two node is in Su' in whether there is k-1 bars point uninterrelated path:If so, return to step (5f3), no Then, side E (x, y) is added to Su' in, i.e.,Return to step (5f3);
(5g) judges the neighbors set PN of u with maximum-flow algorithmuMiddle any two node is in GuWhether there is k- in u 1 point uninterrelated path:If so, performing step (5h), otherwise, step (5i) is jumped to, wherein, GuU represent that local k-1 points connect Logical topology subgraph GuRemove the spanning subgraph of node u and its incidence edge;
(5h) is according to step (5f1)-(5f4) in GuSecond order spanning subgraph S is built on uu', meanwhile, by neighbour's section of node u Point set PNuNode P on middle any two node k-1 pathsk-1It is added to the logic conflict neighbors set LCN of node uu In, i.e.,Step (5j) is jumped to, wherein, GuU represent the topological subgraph G of local k-1 points connectionuRemove The spanning subgraph of node u and its incidence edge;
(5i) node u obtains its h and jumps neighborhood information using the method for step 1 and step 2, builds part h and jumps topology FigureAndUpper structure second order spanning subgraph Su', wherein,RepresentRemove the life of node u and its incidence edge Into subgraph:
(5i1) initialization part h jumps topological subgraphInitializationNode set be Line set
(5i2) node u knows that its h jumps the information of neighbors using the method for step 1 and step 2 by sending Hello bags, ObtainAll neighborsBy nodeNeighbors w be added to point setRushed with logic Prominent neighbors set LCNuIn, while side E (c, w) is added toLine set in, i.e., Wherein,And{ w } table Show the set of node w compositions;
The neighbors set PN of (5i3) decision node uuMiddle any two node existsIn with the presence or absence of k-1 bars point not Introductory path:If so, performing step (5i4), otherwise, return to step (5i2);
(5i4) exists with reference to the method for step (5f1)-(5f4)Upper structure second order spanning subgraph Su', meanwhile, by PNu Node P on middle any two node k-1 pathsk-1It is added to LCNuIn, i.e.,
(5j) node u is by second order spanning subgraph Su' line set E (Su') recorded the line set E for being locally generated subgraph S (S) in, i.e.,By second order spanning subgraph Su' node set V (Su') recorded and be locally generated son In the node set V (S) of figure S, i.e.,Node u is by way of flooding LCNuWith the topology of E (S) Information is sent to all nodes in S;
(5k) each node u updates being locally generated subgraph S and patrolling for oneself according to the topology information that other nodes send Collect conflict neighbors set LCNu, the jump neighbors v on subgraph S will be locally generated as logic neighbors, and constitute logic Neighbors set:LNu=v ∈ V (S) | and (u, v) ∈ E (S) }, LNuRepresent the logic neighbors set of node u;
(5l) updates side collection informationAll node generations are total during wherein E (S') represents network Generation figure line set;
Kruskal algorithms are delivered with reference to J.B.Kruskal on PASM 1956 wherein described in above-mentioned steps (5b) " On the shortest spanning subtree of a graph and the traveling salesman problem"pp.48-50;Utilization FLSS described in above-mentioned steps (5b)kMiddle inference builds Local Minimum node degree k-1 points and connects Article " the Localized Fault- that logical subgraph algorithm is delivered with reference to authors such as Ning Li on IEEE TPDS 2006 Tolerant Topology Control in Wireless Ad Hoc Networks”;Used in above-mentioned steps 4 and step 5 Maximum-flow algorithm sentence it is local whether the connection of k-1 points, delivered with reference to authors such as ShimonEven and R.Endre Tarjan “Network Flow and Testing Graph Connectivity”。
Step 6, each node u determines the transmission power of oneself in network, will transmission power be adjusted to cover Minimum power required for all logic neighbors:Wherein, pu,vRepresent that u is saved to logic is adjacent Minimum emissive power needed for point v.
Step 7, according to above topology control process, each node disjoint in network determines and the logic neighbors of oneself Annexation, the link combinations between all nodes and each node and the logic neighbors of oneself in network are got up, Constitute final full mesh topology, i.e. G=(V (G), E (G)), wherein V (G)=V (Gmax) it is all nodes in network, E (G) net All sides in network, that is to say the set of the link composition in network between each node and the logic neighbors of oneself.
Step 8, channel point is carried out using greedy coloring algorithm to each node u in the final full mesh topology that has built Match somebody with somebody.
(8a) node u maximum transmit power PmaxBroadcast request distributes channel bag RAC on a common control channel, other Node needs transfer bag again when this bag is received, until logic conflict neighbors set LCNuIn all nodes all connect Untill receiving RAC bags;
The logic conflict neighbors set LCN of (8b) node uuIn all nodes after RAC bags are received, check oneself The channel of distribution, and feedback channels distribution bag AC gives node u, it is the allocated to contain the node in wherein channel distribution bag AC Channel, empty bag is designated as if the also unallocated channel of the node by bag AC;
(8c) node u collects all LCNuIn node feedback AC bags, select primary from also unappropriated channel The minimum channel of family acquistion probability, as the available channel of oneself;
(8d) each node disjoint performs said process, untill all nodes all distribute channel.
Effect of the invention can be further illustrated by emulation:
(1) simulated conditions
In simulating scenes, network node is evenly distributed on a 1000 × 1000m at random2Two dimensional surface region in, The threshold value of received signal to noise ratio SNR is set to -80dBm, path-loss factor α values are 4;All nodes use phase in network Same maximum transmission power, wherein maximum transmission power Pmax=256mW, corresponding maximum transmitted radius Rmax=400m;Assuming that Primary user influences whether all of user node.
(2) emulation content and result
Emulation 1, generates topological network, as a result as shown in figure 8, wherein with the present invention in the scene of 50 nodes
Fig. 8 (a) is peak power topology;
Fig. 8 (b) is the topology of generation, and numeral therein represents the channel of node distribution;
The topology of time user network when Fig. 8 (c) represents that primary user takes a channel;
Fig. 8 (d) represents that primary user takes a channel, while when having a node to lose the communication capacity with other nodes The topology of secondary user network;
Fig. 8 (e) represents that primary user takes a channel, while when having two nodes to lose the communication capacity with other nodes The topology of secondary user network;
By Fig. 8 (a) -8 (e) as can be seen that the topology that the inventive method is generated arbitrarily takes a channel in primary user When, the network of secondary user is still the connection of k-1 points.
Emulation 2, with the inventive method and existing peak power topology MaxPower to the different k of node average transmission radius Value is emulated, as a result as shown in Figure 9.
As seen from Figure 9, with network time user node number increase, the average transmission of peak power topology MaxPower Radius keeps constant, is 400m, and average transmission radius of the invention is continuous with the increase of in network user node number Reduce, and with the increase of k, average transmission radius is continuously increased;Meanwhile, as k=2, the transmission radius of the inventive method is small In CBCC algorithms, it is seen that the inventive method can well reduce the energy consumption of node, increase the life cycle of network.
Emulation 3, with the inventive method and existing peak power topology MaxPower to the different value of K of required average channel number Emulated, as a result as shown in Figure 10.
As seen from Figure 10, with network time user node number increase, the average letter of peak power topology MaxPower Road number linearly increases, and average channel number is less needed for the inventive method, and with network time user node number increase, put down The equal number of channel slowly increases, and with the increase of k, average channel number also slowly increases, while the inventive method as k=2 Required average channel number is less than CBCC algorithms.
Emulation 4, is carried out with peak power topology MaxPower with the inventive method to the different value of K of required maximum channel number Emulation, as a result as shown in figure 11.
From Figure 11, with increasing in network user node number, the maximum institute of peak power topology MaxPower The number of channel is needed linearly to increase, the number of channel needed for the inventive method is maximum is less, and with the network increasing of user node number Many, the maximum required number of channel slowly increases, and with the increase of k, average channel number also slowly increases, meanwhile, as k=2, this The required maximum channel number of inventive method is less than maximum channel needed for CBCC algorithms.
Can show that the present invention not only greatlys save channel resource from Figure 10 and Figure 11, and ensure that the k points of network Connection, so that network has good robustness.

Claims (9)

1. the topology control method based on k points connection under two channel-connectivities of structure, comprises the following steps:
(1) initialization network is the connection of k points, and each node u obtains sequence number and the position of a jump and two hop nodes respectively in network Confidence ceases, k >=2;
(2) local double bounce topology subgraph is set up according to sequence number and positional informationWherein,ForNode set,ForLine set;
(3) based on local double bounce topology subgraphEach node u sets up the topological subgraph G of part k-1 points connectionu
The topological subgraph of (3a) initialization part k-1 point connectionsNode u is according to GuFind its neighbors set PNu, and Build the topological subgraph SN of k-1 points connectionu
(3a1) initializes the topological subgraph of k-1 points connectionNode setForBy node setMiddle any two points are in GuIn corresponding side assignLine setI.e.Wherein, E (x, y) ∈ E (Gu),{ u } represents the collection of node u compositions Close, PNuFor node u existsIn one jump neighbors set;
(3a2) judges with maximum-flow algorithmWhether it is the connection of k-1 points:If so, thenStep (4) is jumped to, it is no Then, step (3b) is performed;
(3b) initializes the topological subgraph of the 2nd k-1 points connection
(3b1) judgesWhether it is empty set:If so, then jumping to step (3c), otherwise, step (3b2) is performed;
(3b2) judges with maximum-flow algorithmWhether it is the connection of k-1 points:If so, thenJump to step (4); Otherwise, will according to sequence node numberIn node m add vertex setI.e.Simultaneously by node setIn any two node existIn corresponding side assignI.e.Return to step (3b1), wherein,
(3c) initializes the topological subgraph of the 3rd k-1 points connection
(3c1) judges with maximum-flow algorithmWhether it is the connection of k-1 points:If so, thenStep (4) is jumped to, Otherwise, step (3c2) is performed;
(3c2) node u knows that its h jumps the information of neighbors according to step (1) and step (2), obtains V (Gu) all neighborsWill according to sequence node numberIn node w sequentially addNode setAnd GuNode Set V (Gu), i.e.,Simultaneously by node w and V (Gu) interior joint Incidence edge addLine set and GuLine set, i.e., Return to step (3c1), wherein, c ∈ V (Gu),And
(4) topological subgraph G is connected according to local k-1 pointsu, each node u calculate any two have annexation node x, y it Between link energy consumption weight wp(x, y)=Px,yWith link range weight wd(x, y)=dx,y, wherein, x, y ∈ V (Gu), Px,yTo appoint Meaning two has the node x of annexation, the minimum transmit power required for directly being transmitted between y, dx,yIt is that any two has connection The node x of relation, the Euclidean distance between y;
(5) each node u builds and is locally generated subgraph S=(V (S), E (S)) in network, and is obtained according to subgraph S is locally generated The logic conflicting nodes set LCN of each node uu, the node set of wherein V (S) expressions S, the line set of E (S) expressions S;
(6) each node u is locally generated subgraph S and logic conflict according to what the topology information that other nodes v sends updated oneself Neighbors set LCNu, the jump neighbors on subgraph S will be locally generated as logic neighbors, constitute logic neighbors collection Close:Wherein, v ∈ V (S) and E (u, v) ∈ E (S), i.e. node v belong to the node set V (S) for being locally generated subgraph S And the corresponding side E (u, v) of node u and v belong to the line set E (S) for being locally generated subgraph S;
(7) each node u determines the transmission power of oneself in network, will transmission power be adjusted to that all logics can be covered Minimum power required for neighbors:Wherein, Pu,vNeeded for expression node u to node v most Small transmission power;
(8) link combinations between all nodes and each node and the logic neighbors of oneself in network are got up, is constituted Final full mesh topology, i.e. G=(V (G), E (G)), wherein, V (G) is all nodes in network, and E (G) is all sides in network;
(9) channel distribution is carried out to each node u in the final full mesh topology G that has built using greedy coloring algorithm.
2. the topology control method for being connected based on k points under two channel-connectivities of structure according to claim 1, wherein step (1) It is middle obtain respectively one jump and double bounce neighbors sequence number and positional information, refer in network each node u with emission maximum work( Rate PmaxA first node information HELLO-1 bag is broadcasted respectively to positioned at all nodes in oneself transmission radius With Section Point information HELLO-2 bags, and receive one jump neighbors send HELLO-1 bags and HELLO-2 bags, wherein, this HELLO-1 bags include the sequence number of u node and positional information, and containing u all one jump the sequence of neighbors in HELLO-2 bags Number and positional information.
3. the topology control method that k points are connected under two channel-connectivities based on structure according to claim 1, wherein step (2) local double bounce topology subgraph is set up inCarry out as follows:
First node information HELLO-1 bags and Section Point information of (2a) each node u according to the jump neighbors for receiving HELLO-2 bags, obtain and record the sequence number and positional information of the HELLO-1 bags and HELLO-2 bag interior joints, these node structures Into the double bounce neighbors collection of node uWherein described HELLO-1 bags include the sequence number of u node and positional information, described Containing u all one jump the sequence number and positional information of neighbors in HELLO-2 bags;
(2b) each node u calculates any two node according to the positional information of oneself and the positional information of double bounce neighbors Minimum emissive power required for directly being transmitted between x, yWherein,β is the spirit according to receiver The received signal to noise ratio threshold value that sensitivity and bit error rate requirement determine, α is path-loss factor, dx,yIt is node x, it is European between y Distance, if Px,yLess than the maximum transmission power P of nodemax, it is determined that node x, there is annexation between y;Otherwise, node x, Do not exist annexation between y;
(2c) each node u sets up local double bounce topology subgraph according to the annexation between double bounce neighborsWhereinNode set beLocal double bounce topology subgraphSide collection It is combined intoForIn any two node x and y, when between x and y required transimission power be less than its maximum transmitted work( During rate, the corresponding side E (x, y) of node x and y is assignedI.e.Wherein, { u } represents node u groups Into set.
4. the topology control method that k points are connected under two channel-connectivities based on structure according to claim 1, wherein step (5) built in and be locally generated subgraph S, carried out as follows:
The node set V (S) that each node u in (5a) network will be locally generated subgraph S is initialized to the connection of local k-1 points and opens up Flutter subgraph GuAll nodes, line set E (S) is initialized to empty set;
(5b) connects topological subgraph G according to local k-1 pointsu, minimum spanning tree T is built with minimal spanning tree algorithmu=(V (Tu),E(Tu)), and according to k-1 point connected subgraphs SNu, with FLSSkAlgorithm builds the k-1 points with minimum node degree and connects Spanning subgraph SNu'=(V (SNu'),E(SNu')), obtain single order spanning subgraph Su=(V (Su),E(Su)), renewal is locally generated Subgraph S, i.e.,Wherein, V (Tu) represent TuNode set, E (Tu) represent TuLine set, V (SNu') represent SNu' node set, E (SNu') represent SNu' line set, SuNode set beSu's Line set is
Each node u in (5c) network is according to single order spanning subgraph SuFind its adjoining point set PNuWith conflicting nodes set CNu, initialization logic conflict neighbors setAnd according to SuBuild second order spanning subgraph Su'=(V (Su′),E (Su')), renewal is locally generated subgraph S, i.e.,Wherein, V (Su') it is Su' node set, E (Su') it is Su' side Set;
(5d) is by neighbors set PNuIn node P of any two node on the k-1 paths in SvRecorded logic conflict adjacent Node set LCNuIn, i.e.,Node u is by way of flooding LCNuTopology information with E (S) is sent out Give all nodes in S.
5. the topology control method that k points are connected under two channel-connectivities based on structure according to claim 4, wherein step FLSS is used in (5b)kAlgorithm, topological subgraph SN is connected according to k-1 pointsuBuild the k-1 points connection generation with minimum node degree Subgraph SNu'=(V (SNu'),E(SNu')), carry out as follows:
(5b1) initialization k-1 point connection spanning subgraphsThat is SNu' line set E (SNu') it is E (SNu), node Set E (SNu') it is E (SNu);
(5b2) is by E (SNu') in side with link range weight wp(x, y) is link energy consumption weight wd(x, y) descending is arranged, by It is secondary by weight limit side E (x, y) from E (SNu') middle removal, i.e.,Simultaneously by the side right Reset zero;
(5b3) is with maximum-flow algorithm decision node x and y in SNu' in whether there is k-1 bars point uninterrelated path:If so, continuing Remove weight limit side, otherwise, side E (x, y) is re-added to k-1 points connection spanning subgraph SNu' in, i.e.,E (the SN in having traveled through line setu') all sides.
6. the topology control method that k points are connected under two channel-connectivities based on structure according to claim 4, wherein step (5c) node u is according to single order spanning subgraph SuBuild second order spanning subgraph Su', carry out as follows:
Each node u in (5c1) network is according to single order spanning subgraph SuIts physics neighbors and conflict neighbors are found, respectively Constitute neighbors set PNuWith conflict neighbors set CNu, and initialization logic conflict neighbors set LCNuWith conflict subgraph CSu=(V (CSu),E(CSu)), wherein,E(x, y)∈E(Gu), x, y ∈ CNu
(5c2) judges the neighbors set PN of uuIn any two node in conflict subgraph CSuIn with the presence or absence of k-1 bars point not phase Close path:
If so, then node u is in CSuUpper structure second order spanning subgraph Su'=(V (Su′),E(Su')), wherein V (Su') represent Su' Node set, E (Su') represent Su' line set;
Otherwise, the neighbors set PN of u is judgeduIn any two node in GuWhether there is k-1 bars point uninterrelated path in u: If so, node u is in GuSecond order spanning subgraph S is built on uu′;Otherwise, node u need to obtain h and jump neighborhood information, build part h Jump topological subgraphAndUpper structure second order spanning subgraph Su', wherein, GuU represent GuRemove The spanning subgraph of node u and its incidence edge,RepresentRemove the spanning subgraph of node u and its incidence edge.
7. the topology control method that k points are connected under two channel-connectivities based on structure according to claim 6, wherein step (5c2) interior joint u is in CSuUpper structure second order spanning subgraph Su', carry out as follows:
(5c2a) node u is by second order spanning subgraph Su' in point set be initialized as CSuIn all nodes, i.e.,Line set is initialized asWherein x, y ∈ V (Su'), E (x, y) ∈ E (CSu), Will node set V (Su') in any two points in conflict subgraph CSuIn corresponding side assign second order spanning subgraph Su' side collection Close E (Su'), node u is by CSuIn all sides, with link range weight wp (x, y) be link energy consumption weight wd (x, y) descending arrange Row;
(5c2b) node u rejects S successivelyu' line set E (Su') in weight limit side E (x, y), and by the side right reset zero, sentence The neighbors set PN of disconnected uuMiddle any two node is in Su' in whether there is k-1 bars point uninterrelated path:If so, continuing successively Reject Su' side, otherwise, E (x, y) is rejoined into E (Su'), until having traveled through all sides untill, obtain second order spanning subgraph Su'。
8. the topology control method that k points are connected under two channel-connectivities based on structure according to claim 6, wherein step Part h is built in (5c2) and jumps topological subgraphCarry out as follows:
(5c2c) initialization part h jumps topological subgraphNode set be GuAll nodes, line set is GuAll sides, I.e.
(5c2d) node u knows that h jumps the information of neighbors according to step (1) and step (2), and obtainsAll adjacent section PointUpdate part h and jump topological subgraphWith logic conflict neighbors set LCNuIn, will node's Neighbors w is added to point setWith logic conflict neighbors set LCNuIn, side E (c, w) is added toLine set In, i.e.,Wherein,And{ w } represents the set of node w compositions;
(5c2e) existsThe neighbors set PN of middle judgement uuWhether there is the uncorrelated road of k-1 bars point between middle any two node Footpath:If so, stopping updatingAnd carry outUpper structure second order spanning subgraph Su' operation, otherwise, node u continues to add Hop node is added until set PNuMiddle any two node local h in the updated jumps topological subgraphIn there is k-1 bars point not Introductory path, wherein,Represent and jump topological subgraph in local hIn delete son obtained by the side of node u and its association Figure.
9. the topology control method that k points are connected under two channel-connectivities based on structure according to claim 1, wherein step (9) channel distribution is carried out to each node u in the final full mesh topology that has built using greedy coloring algorithm in, by following step Suddenly carry out:
(9a) node u is to the adjacent set LCN of logic conflictuIn all nodes with maximum transmit power by way of flooding in public affairs Request distribution channel bag RAC is sent in control channel altogether;
(9b) logic conflict neighbors set LCNuIn node after RAC bags are received, the side for passing through unicast with maximum transmit power Feedback channels distribution bag AC is issued node u by formula, is informed and is had been chosen by channel;
(9c) node u collects all LCNuIn node feedback AC bags, and from also unappropriated channel select primary user account for With the channel that probability is minimum, as the available channel of oneself.
CN201611093640.7A 2016-12-02 2016-12-02 The topology control method being connected to based on k point under two channel-connectivities of building Active CN106792744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611093640.7A CN106792744B (en) 2016-12-02 2016-12-02 The topology control method being connected to based on k point under two channel-connectivities of building

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611093640.7A CN106792744B (en) 2016-12-02 2016-12-02 The topology control method being connected to based on k point under two channel-connectivities of building

Publications (2)

Publication Number Publication Date
CN106792744A true CN106792744A (en) 2017-05-31
CN106792744B CN106792744B (en) 2019-10-11

Family

ID=58882749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611093640.7A Active CN106792744B (en) 2016-12-02 2016-12-02 The topology control method being connected to based on k point under two channel-connectivities of building

Country Status (1)

Country Link
CN (1) CN106792744B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616893A (en) * 2018-03-21 2018-10-02 西安电子科技大学 A kind of topology control method of high energy efficiency
CN112184911A (en) * 2020-09-28 2021-01-05 嘉兴学院 Non-popular grid model slice processing method
CN114531701A (en) * 2022-02-25 2022-05-24 合肥工业大学 Collaborative optimization method for data transmission reliability and topological robustness of heterogeneous network in extra-high voltage direct current control protection system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507168A (en) * 2014-12-27 2015-04-08 西安电子科技大学 Distributed topology control method for cognitive Ad Hoc network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104507168A (en) * 2014-12-27 2015-04-08 西安电子科技大学 Distributed topology control method for cognitive Ad Hoc network

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
H.LIU: "Generalized-Bi-Connectivity for Fault Tolerant Cognitive Radio Networks", 《IEEE》 *
N.LI: "Localized fault-tolerant topology control in wireless ad hoc networks", 《IEEE》 *
X.WANG: "Achieving Bi-Channel-Connectivity with Topology Control in Cognitive Radio Networks", 《IEEE》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616893A (en) * 2018-03-21 2018-10-02 西安电子科技大学 A kind of topology control method of high energy efficiency
CN108616893B (en) * 2018-03-21 2021-09-28 西安电子科技大学 High-energy-efficiency topology control method
CN112184911A (en) * 2020-09-28 2021-01-05 嘉兴学院 Non-popular grid model slice processing method
CN112184911B (en) * 2020-09-28 2023-11-14 嘉兴学院 Non-popular grid model slicing processing method
CN114531701A (en) * 2022-02-25 2022-05-24 合肥工业大学 Collaborative optimization method for data transmission reliability and topological robustness of heterogeneous network in extra-high voltage direct current control protection system
CN114531701B (en) * 2022-02-25 2023-08-11 合肥工业大学 Cooperative optimization method for heterogeneous network in extra-high voltage direct current control protection system

Also Published As

Publication number Publication date
CN106792744B (en) 2019-10-11

Similar Documents

Publication Publication Date Title
Khan et al. Fuzzy-TOPSIS based cluster head selection in mobile wireless sensor networks
CN109673035B (en) Route establishing and maintaining method suitable for wireless self-organizing network
CN104507168B (en) Recognize the distribution topology control method of Ad Hoc networks
Mansourkiaie et al. Cooperative routing in wireless networks: A comprehensive survey
Arya et al. Performance analysis of deep learning-based routing protocol for an efficient data transmission in 5G WSN communication
Ding et al. Using partially overlapping channels to improve throughput in wireless mesh networks
Ishibashi et al. Topology and mobility considerations in mobile ad hoc networks
Chaudhry et al. Improving throughput and fairness by improved channel assignment using topology control based on power control for multi-radio multi-channel wireless mesh networks
El Hajji et al. Adaptive routing protocol for lifetime maximization in multi-constraint wireless sensor networks
CN106658523B (en) Recognize the distributed topology approach that K channel-connectivity is constructed in AdHoc network
Sampath et al. An ACO algorithm for effective cluster head selection
CN106792744B (en) The topology control method being connected to based on k point under two channel-connectivities of building
Hussain et al. Minimizing broadcast expenses in clustered ad-hoc networks
Wang et al. On channel assignment for multicast in multi-radio multi-channel wireless mesh networks: A survey
Beheshtifard et al. An adaptive channel assignment in wireless mesh network: the learning automata approach
Zhu et al. Dynamic interference minimization routing game for on-demand cognitive pilot channel
Mu et al. Performance analysis of the ZigBee networks in 5G environment and the nearest access routing for improvement
CN105636144A (en) Method for prolonging life period of zigbee network
Zhang et al. Less is more: Learning more with concurrent transmissions for energy-efficient flooding
CN114374721A (en) Power line and wireless communication fusion method and system for power internet of things
CN106131887B (en) Distribution topology control method based on serial interference elimination
Zheng et al. A reliable communication and load balancing scheme for resource-limited networks
CN106793117B (en) elastic virtual subnet mapping method in wireless mesh network
Chiang et al. A knowledge-based inference multicast protocol using adaptive fuzzy Petri nets
Chauhan Comparative study of clustering based algorithm in mobile ad-hoc network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant