CN107018080A - A kind of delay-tolerant network topology method for considering node energy - Google Patents

A kind of delay-tolerant network topology method for considering node energy Download PDF

Info

Publication number
CN107018080A
CN107018080A CN201710174046.9A CN201710174046A CN107018080A CN 107018080 A CN107018080 A CN 107018080A CN 201710174046 A CN201710174046 A CN 201710174046A CN 107018080 A CN107018080 A CN 107018080A
Authority
CN
China
Prior art keywords
node
dimension
network topology
packet
energy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710174046.9A
Other languages
Chinese (zh)
Other versions
CN107018080B (en
Inventor
贾建鑫
韩德志
刘广钟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Maritime University
Original Assignee
Shanghai Maritime University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Maritime University filed Critical Shanghai Maritime University
Priority to CN201710174046.9A priority Critical patent/CN107018080B/en
Publication of CN107018080A publication Critical patent/CN107018080A/en
Application granted granted Critical
Publication of CN107018080B publication Critical patent/CN107018080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/126Shortest path evaluation minimising geographical or physical path length
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/12Shortest path evaluation
    • H04L45/121Shortest path evaluation by minimising delays

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of delay-tolerant network topology method for considering node energy, according to nodes self-characteristic and the abstract egress relevant dimension of local environment and definition node dimension weight factor matrix, to each node j in matrix, ask any node i beyond it and it all arrange before number of dimensions count [i] in s grades, if count [i] is more than threshold value θ, node i is then added to node j " relative quiescent Local network topology ", and met in setting time section T by node and exchange routing iinformation and expand and improve the network topology of node itself;In the network topology of node, gain matrix is set up according to the energy of two associated nodes of every connection and Nash Equilibrium Solution is obtained, simplified node binary network topology is obtained according to Nash Equilibrium Solution, node is obtained further according to binary network topology and sends the shortest path of packet and optimal forward node set, sends packet and meshed network topology is updated according to node change dynamic.

Description

A kind of delay-tolerant network topology method for considering node energy
Technical field
The present invention is more particularly directed to a kind of delay-tolerant network topology method for considering node energy.
Background technology
Currently, effective routing algorithm turns into delay-tolerant network (Delay Tolerant Network, abbreviation DTN) Academia and industrial circle focus of attention.By the Some features that delay-tolerant network possesses cause traditional Routing Protocol race It can not be applicable.Topmost reason is that traditional network has a stable network topology structure, and Routing Protocol is base It is designed in this stable network topology structure.And a stable network topology is not present in delay-tolerant network Structure, causes network topology structure to be in the state being continually changing, in addition often because the mobility and discontinuity of node are connected The energy of individual node is also limited, it is therefore desirable to which the research that looks for another way is adapted to the method for routing of delay-tolerant network.Early in Sushant Jain in 2004 et al. just once pointed out that routing issue was the key problem in delay-tolerant network research, and to DTN The subject matter of middle route has carried out clear and definite elaboration, and DTN routing issues are substantially how the topology in a dynamic change Make fast and effectively to communicate between node in figure.
Existing routing algorithm can be divided into single copy routing algorithm, and many copy routing algorithms, probability routing algorithm is social Routing algorithm etc..Single copy routing algorithm is not replicated in message process to message, and the message is only existed in network Single copy, cause that the transmission hit rate of message is relatively low, transmission delay is higher.Many copy routing algorithms are in message process In message is replicated, therefore can have multiple copies in a network, cause Metric higher.Probability routing algorithm according to The historical information of node is predicted come the route to future, because historical information often only considers meeting time between node in the past Number, causes the hit rate that message transmission is relatively low.Social routing algorithm is route using the social of node, due to only considering It is social, cause the hit rate that message transmission is relatively low.How effectively to be route in delay-tolerant network, it is especially this The rare document report of binary system topology method considered based on node energy.
The content of the invention
It is an object of the invention to provide a kind of delay-tolerant network topology method for considering node energy, by carrying out Effective Route Selection, improves the hit rate of data transfer, and reduces data transfer delay and route energy consumption.
In order to realize the above object the present invention is achieved by the following technical solutions:
A kind of delay-tolerant network topology method for considering node energy, is characterized in, this method includes following step Suddenly:
S1, the dimension related to node is taken out according to the characteristic and residing environment of delay-tolerant network interior joint itself Degree;
S2, defines k × n dimension weight factor matrix and represents importance of each dimension to node, matrix k rows are represented There is k node, n row, which represent each node, n dimension;
S3, according to different criterions to each dimension carry out grade classification and according to node own characteristic to node not Rank is carried out with dimension;
Node i and node j come the number of preceding s dimension and are put into count [i] beyond S4, statistical matrix interior joint j In, while correspondence dimension mark is added in dimension logo collection A [i], judge whether count [i] is more than threshold value θ, if It is then to add node i in node j relative quiescent Local network topology;
S5, judges whether the relative quiescent Local network topology of all nodes in dimension weight factor matrix has all been asked, if It is then to carry out step S6, otherwise more new node j enters step S4;
S6, integrated definition meshed network Topology connection weights;
S7, in setting time section T, meets exchange routing iinformation to expand and improve each node itself by node Network topology;
Two node energies according to associated by connection are each connected in S8, network topology, gain matrix is set up and obtains Nash Equilibrium Solution, and described network topology is simplified;
S9, it is binary one that the flag bit each connected in each node static network topology is marked according to Nash Equilibrium Solution Or 0,1 represents that this is connected with energy and sends packet, 0 contrast;
S10, according to after simplification network topology topology and obtain send packet shortest path and optimal forward node Set;
S11, sends packet, updates binary network topology, sends new packet.
In described step S1, each mobile node is identified with a n-dimensional vector, each value of n-dimensional vector is Integer, the i.e. node residing grade, and being expressed as any node a n-dimensional vector in each dimension:
HVa=[Ha1 Ha2 … Hap … Han] (1)。
Each dimension changes over time to the importance of node in described step S2, wherein dimension weight factor Matrix is expressed as:
The calculation of each value is in dimension weight factor matrix in formula (2):
H in formula (3)p minRepresent minimum level value, H in pth dimensionp maxGreatest level value in pth dimension is represented, a is k Any one in individual node.
Described step 3 middle grade is divided need to be divided into s grade to each dimension, and r is highest ranking, grade r-s+1 S grade before being highest to grade r.
Connection weight is divided into single connection weight computing and multi-link weight computing in described step S6, as follows:
When the contact between dimension is separate, described single connection weight computing formula is:
Formula (4) is the single connection weight computing formula between node a and node f, and wherein they come in β dimension Preceding s grades;
Fol-lowing values are the inverse of weight factor wherein in formula (4):
When being influenced each other between dimension, described single connection weight computing formula is:
Wherein in formula (7):
Wherein in formula (7):
Wherein Last,Lfst,Lasp,LfspNode a and node f are represented respectively in translational speed dimension and residence time dimension Grade rank value, i.e., meet number of times this dimension between having node in β dimension, and translational speed dimension and residence time dimension Not in preceding s grades, described constraints is:
Lat∈Dt∩Lat≥r-s+1Lft∈Dt∩Lft≥r-s+1
Last< r-s+1, Lfst< r-s+1, Lasp< r-s+1, Lfsp< r-s+1
Described multi-link weight computing formula is:
Waw=Waea×Weaw+Waka×Wkaw+Wawa×Wwaw (10)
In formula (10), exemplified by the multi-link weights between any two node a and w, its interior joint ea, node Ka, node wa are node a and node w three common friends nodes, WaeaFor the single connection weights between node a and node ea, WeawFor the single connection weights between node ea and node w, WakaFor the single connection weights between node a and node ka, WkawFor section Single connection weights between point ka and node w, WawaFor the single connection weights between node a and node wa, WwawFor node wa and Single connection weights between node w, according to multiplication of probability and addition rule, obtain the multi-link power between node a and node w Value.
Meet exchange routing iinformation to expand and improve each node network of itself by node in described step S7 Topology is specially:The local topology information of itself is issued into mutually other side when node meets, node is according to the other side's received Topology information, different parts is incorporated to the network topology of itself.
Gain matrix is in described step S8:Matrix in game theory to ask Nash Equilibrium Solution to be set up;
Described node energy, which includes node, is ready the ability of received data packet, is ready to forward the ability of packet and has Forward the ability of packet;
To each connection in topologyTwo node is and j according to associated by connection are set up gain matrix and obtained Nash Equilibrium Solution;
Described gain matrix is:
Wherein (Ui,Uj) in UiThe total revenue of packet, U are forwarded and sent for node ijForwarded for node j and send data The total revenue of bag, (Vi,Vj) in ViThe total revenue of packet, V are forwarded and sent for node ijFor node j transmission packets but not The front nodal point of forwarding sends the total revenue of packet, (Wi,Wj) in WiSame Ui, WjRepresent that node j neither forwards packet nor sent out Send the total revenue of packet, (Xi,Xj) in XiRepresent that node i sends the packet of itself but do not forward the node data before The total revenue of bag, XjSame Uj, (Yi,Yj) in YiSame Xi, YjSame Vj, (Zi,Zj) in ZiSame Xi, ZjSame Wj, (Oi,Oj) in OiRepresent section The total revenue for the packet that the front nodal point that point i sends packet but do not forwarded is sent, OjSame Xj, (Pi,Pj) in PiSame Oi, PjSame Vj, (Qi,Qj) in QiSame Oi, QjSame Wj
Network topology is reduced in described step S8:
If there is energy deficiency or data pack buffer queue in any one node in two nodes related to connection It is full, then the connection flag bit is 0;
If there is not above-mentioned situation, then do following judgement, according to each of two nodes associated with the connection From energy parameter set up game theory gain matrix and Nash Equilibrium Solution between two nodes obtained with this, if Nash Equilibrium Solution Equal to (Ui,Uj), wherein UiRepresenting node i has energy to forward the packet sent of predecessor node and has energy oneself to send number According to bag, UjThe same U of explanationi, then the flag bit of the connection is equal to 1, otherwise equal to 0.
If the Nash Equilibrium Solution of formula (11) gain matrix is equal to (Ui,Uj), then the flag bit of the connection is 1, is otherwise 0;Receive Assorted equilibrium solution (Ui,Uj) namely node i and node j be involved in the transmission and forwarding of packet.
The present invention compared with prior art, with advantages below:
1st, the hit rate of data transfer is improved.Dynamically selected by some similitudes between node in multiple dimensions Select the node configuration node topology of itself, so between node weights definition it is more accurate, therefore improve data transfer Hit rate.
2nd, the average transmission delay of data is reduced.Each final binary system topology of node is to be based on existing with other nodes The similitude of multiple dimensions is built, therefore topological diagram is metastable, so use shortest path based on binary system topology The optimum data transmission set that footpath algorithm is obtained is accurate, therefore reduces the average transmission delay of data.
3rd, route energy consumption is reduced.Each the binary system topology of node itself is drawn according to Nash Equilibrium Solution, so Carry out avoiding some unnecessary energy consumptions when packet transmission and forwarding between node, therefore save total route energy consumption.
Brief description of the drawings
Fig. 1 is a kind of flow chart for the delay-tolerant network topology method for considering node energy of the present invention;
Fig. 2 is node a relative quiescent local topology;
Fig. 3 is the topology of elapsed time T posterior nodal point a formation;
Fig. 4 is the first binary system topology by simplifying posterior nodal point a formation;
Fig. 5 is second of binary system topology by simplifying posterior nodal point a formation;
Fig. 6 is the third binary system topology by simplifying posterior nodal point a formation;
Fig. 7 is the 4th kind of binary system topology by simplifying posterior nodal point a formation;
Fig. 8 is the 5th kind of binary system topology by simplifying posterior nodal point a formation.
Embodiment
Below in conjunction with accompanying drawing, by describing a preferably specific embodiment in detail, the present invention is further elaborated.
As shown in figure 1, a kind of delay-tolerant network topology method for considering node energy is included:
Step 1, taken out according to the characteristic and residing environment of delay-tolerant network interior joint itself it is related to node Dimension;
The delay-tolerant network (Delay Tolerant Network, abbreviation DTN) is a kind of new network, and it is with passing The characteristics of system network has different, it is continuous mobile so that node has interruption between nodes resource-constrained, nodes Property connection, network topology is dynamic change.In DTN networks, node has k, wherein k >=1;
Some characteristics that the relevant dimension node with node embodies, these characteristics represent with dimension, such as mankind In the DTN of the node composition of carrying, geographical position of these features including node, translational speed, stopping in some specific region Time, hobby are stayed, social hierarchy, the past number of times that meets of node, whether belongs to the same family, whether belong to age-grade Whether section, the professional whether identical, economic setting learnt are mutually equal.In DTN, nodes have n, wherein n >=2;
Step 2, one k × n dimension weight factor matrix of definition represent importance of each dimension to node, matrix k rows Representative has k node, and n row, which represent each node, n dimension;
Described dimension weight factor refers to, the importance factors of certain dimension and all dimension importance factors of the node Ratio;
Step 3, according to different criterions to each dimension carry out grade classification and according to node own characteristic to it Different dimensions carry out rank;
The criterion refers to, is determined by the attribute of dimension, and the translational speed dimension of such as node is according to speed The size of value carries out grade classification, and the geography dimension of node is divided with the distance of object of reference.
It is described rank is carried out in dimension to it according to node own characteristic to refer to, within a period of time, Mei Gejie Each dimension of point all ranges the grade of a determination;
Node i and node j come the number of preceding s dimension and are put into count beyond step 4, statistical matrix interior joint j In [i], while correspondence dimension mark is added in dimension logo collection A [i], judge whether count [i] is more than threshold value θ, such as Fruit is then to add node i in node j " relative quiescent Local network topology ";
The dimension logo collection A [i] refers to, deposits node i and node j comes all dimensions mark of preceding s grades Set, i.e. dimension sequence number set;
Described threshold value θ refers to, preceding s grades are come required for " the relative quiescent Local network topology " of addition node Minimum number of dimensions;
Described " relative quiescent Local network topology " refer to, the network topology of a period interior nodes, because DTN nets Network interior joint network topology is dynamic change, and the network topology of a period interior nodes geo-stationary can only be taken to be ground Study carefully;
Step 5, judge whether " the relative quiescent Local network topology " of all nodes in dimension weight factor matrix is all asked It is completeIf then carrying out step 6, otherwise more new node j enters step 4;
Step 6, integrated definition meshed network Topology connection weights, i.e., by grade rank value of the node in relevant dimension, Contact definition between dimension weight factor and dimension;
Step 7, setting time section T in, by node meet exchange routing iinformation come expand and improve each node from The network topology of body;
It is described by meet exchange routing iinformation refer to expand and improve network topology, when node meets by itself Local topology figure information issues mutually other side, and different parts is incorporated to itself by node according to the topology information of the other side received Network topology;
Two node energies according to associated by connection are each connected in step 8, network, gain matrix is set up and obtains and receive Assorted equilibrium solution, and described network topology is simplified;
Described gain matrix refers to, the matrix in game theory to ask Nash Equilibrium Solution to be set up;
Described node energy refers to that the ability of node for data forwarding bag, including node are ready received data packet, are ready to turn Packet is sent out, and there are the factors such as forwarding packet ability;
Step 9, the flag bit that is each connected in each node static network topology is marked according to Nash Equilibrium Solution enter for two System 1 or 0,1 represents that this is connected with energy and sends packet, 0 contrast;
Step 10, according to simplified binary system topology obtain send packet shortest path and optimal forward node collection Close;
Step 11, transmission packet, update binary network topology, send new packet;
Described renewal binary network topology refers to, when sending packet, because node energy changes, network Topology is also occurring caused by dynamic change.
It is described to refer to send by this to connecting the interdependent node primary power that flag bit is 1 in topology and being updated, The certain energy of these node costs, so to be updated to residual energy value;
Described is that 1 clearing refers to the connection flag bit clear 0 to depleted of energy to connection flag bit in topology, sends pointer The next packet for pointing to transmit queue is prepared for the transmission of next packet;
In step 1, to each mobile node, it is identified with a n-dimensional vector, each value of n-dimensional vector is whole Number, the i.e. node residing grade in each dimension, such as any node a n-dimensional vector are expressed as:
HVa=[Ha1 Ha2 … Hap … Han] (1)
In step 2, each dimension changes over time to the importance of node, wherein dimension weight factor matrix table It is shown as:
The calculation of each value is in dimension weight factor matrix in formula (2):
H in formula (3)p minRepresent minimum level value, H in pth dimensionp maxRepresent greatest level value in pth dimension.A is k Any one in individual node.
In step 3, described grade classification need to be divided into s grade to each dimension, and r is highest ranking, grade r-s+1 S grade before being highest to grade r;
In step 4, the statistics dimension logo collection A [i] related to node i simultaneously calculates dimension counting array element count [i], by taking any node a as an example, related algorithm 1 is:
Algorithm 1:Dimension is counted, and algorithm parameter is sky
The first step:Its initial value is made to be 1 if i is node ID variable, sequence number variable makes its initial value be 1 if j is dimension.
Second step:Since i=1 (i.e. the node of serial number 1), the work started such as the 3rd step is done.
3rd step:Since j=1 (i.e. the dimension of serial number 1), the work started such as the 4th step is done.
4th step:If ranking grade points of the node a in dimension j is more than or equal to r-s+1 and node i is in dimension j Ranking grade point is also greater than equal to r-s+1, then dimension is counted into array element (count [i]) and Jia 1, and by dimension j sequence number Add dimension logo collection A [i].Dimension sequence number variable j adds 1, turns the 5th step.If with there is a node in node i in node a Ranking grade in dimension j is less than r-s+1, then dimension counts that array element count [i] is constant and dimension logo collection A [i] is also constant, and dimension sequence number variable j adds 1, turns the 5th step.
5th step:If now j is less than or equal to n (i.e. n dimension altogether), then continue to do the 4th step, if j is more than n (i.e. node a is counted in n dimension with node i and finished), then turn the 6th step.
6th step:Node ID i adds 1 (i.e. node a is counted with next node), if i is less than or equal to k-1 (i.e. Also have k-1 node in addition to node a), then do the work stated since the 3rd step to the 5th step.If i is more than k-1 (i.e. node a and other k-1 node are all counted and finished), then turn the 7th step.
7th step:Terminate.
The current node a for performing algorithm relatively determines whether node i adds itself according to count's [i] and threshold value θ Local topology, related algorithm 2 is:
Algorithm 2:Node a local topology is built, and algorithm parameter is count [i]
The first step:Gating limit value is θ (being constant), makes its initial value be 1 if i is node ID variable.
Second step:Since i=1 (i.e. the node of serial number 1), the work started such as the 3rd step is done.
3rd step:If count [i] is more than or equal to θ, in the topological Tpa that point i is added to node a, i adds 1, turns the 4th Step.If count [i] is less than θ, ignore current i-node, i adds 1, turn the 4th step.
4th step:If i is less than k-1 (also having k-1 node i.e. in addition to a), then do since second step to the 3rd step The work stated.If i is more than k-1 (i.e. the count [i] of node a and other k-1 nodes, which is counted, to be finished), then turn 5th step.
5th step:Terminate.
In step 6, the weight computing of each connection is divided into single connection situation and multi-link situation in topological diagram;
Described single connection is to refer to the connection for there was only a paths between 2 points;
The described multi-link connection for referring to have mulitpath between 2 points;
Contact between described dimension, including it is separate and influence each other two kinds;
When the contact between dimension is separate, described single connection weight computing formula is:
Formula (4) is the single connection weight computing formula between node a and node f, and wherein they come in β dimension Preceding s grades;
Fol-lowing values are the inverse of weight factor wherein in formula (4):
When being influenced each other between dimension, described single connection weight computing formula is:
Wherein in formula (7):
Wherein in formula (7):
Wherein Last,Lfst,Lasp,LfspNode a and node f are represented respectively in translational speed dimension and residence time dimension Grade rank value, i.e., meet number of times this dimension between having node in β dimension, and translational speed dimension and residence time dimension Not in preceding s grades, described constraints is:
Lat∈Dt∩Lat≥r-s+1Lft∈Dt∩Lft≥r-s+1
Last< r-s+1, Lfst< r-s+1, Lasp< r-s+1, Lfsp< r-s+1
Described multi-link weight computing formula is:
Waw=Waea×Weaw+Waka×Wkaw+Wawa×Wwaw (10)
In formula (10), exemplified by the multi-link weights between any two node a and w, its interior joint ea, node Ka, node wa are node a and node w three common friends nodes.WaeaFor the single connection weights between node a and node ea, WeawFor the single connection weights between node ea and node w, WakaFor the single connection weights between node a and node ka, WkawFor section Single connection weights between point ka and node w, WawaFor the single connection weights between node a and node wa, WwawFor node wa and Single connection weights between node w, according to multiplication of probability and addition rule, obtain the multi-link power between node a and node w Value.
In step 7, after each node receives the topological diagram of other nodes, same principle is gone to be incorporated into itself according to asking different Topological diagram, so that node a meets node w as an example, related algorithm 3 is:
Algorithm 3:The expansion of node a local topologies, algorithm parameter is node a topological Tpa, node w topological Tpw
The first step:Topological Tpa is issued node w, the topological Tpw that node a receiving nodes w is sent by node a.
Second step:In Tpa altogetherBar connection (For constant), common δ bars connection (δ is constant) in Tpw, if node a's opens up Flutterring the counting variable connected in figure Tpa isIt is 1 to make its initial value, if the counting variable connected in node w topological diagram Tpw is § It is 1 to make its initial value.
3rd step:To in Tpa fromThe work that the 4th step starts is done in the connection of beginning.
4th step:To the work in Tpw since the 5th step is done in the connection §=1.
5th step:If connectionThere is common node with being connected §, then will connectionIt is connected with being connected §, § adds 1 (i.e. in Tpw Next connection), if § is less than or equal to δ (i.e. in Tpw δ bars connect do not circulated also), then continue to do what the 5th step started Work.If § is more than δ, turn the 6th step.
6th step:Plus 1 (i.e. next connection in Tpa), ifIt is less than or equal toSo do since the 4th step The work stated to the 5th step.IfIt is more thanThen turn the 7th step.
7th step:Terminate.
In step 8, sent according to present node and the destination that the packet of pointer sensing is identified is sent in data queue Location does following simplification to topology, to each connection in topologyTwo node is and j according to associated by connection set up income Matrix simultaneously obtains Nash Equilibrium Solution;
Described gain matrix is:
Wherein (Ui,Uj) in UiThe total revenue of packet, U are forwarded and sent for node ijForwarded for node j and send data The total revenue of bag, (Vi,Vj) in ViThe total revenue of packet, V are forwarded and sent for node ijFor node j transmission packets but not The front nodal point of forwarding sends the total revenue of packet, (Wi,Wj) in WiSame Ui, WjRepresent that node j neither forwards packet nor sent out Send the total revenue of packet, (Xi,Xj) in XiRepresent that node i sends the packet of itself but do not forward the node data before The total revenue of bag, XjSame Uj, (Yi,Yj) in YiSame Xi, YjSame Vj, (Zi,Zj) in ZiSame Xi, ZjSame Wj, (Oi,Oj) in OiRepresent section The total revenue for the packet that the front nodal point that point i sends packet but do not forwarded is sent, OjSame Xj, (Pi,Pj) in PiSame Oi, PjSame Vj, (Qi,Qj) in QiSame Oi, QjSame Wj
By taking node a topological Tpa as an example, node i and node j are connected with TpaTwo related nodes, it is assumed that this Shi Jiedian a send out packet to node f, and network topology is simplified:If any one in two nodes related to connection There is energy deficiency in node or data pack buffer queue is full, then the connection flag bit is 0;
If there is not above-mentioned situation, then do following judgement, according to each of two nodes associated with the connection From energy parameter set up game theory gain matrix and Nash Equilibrium Solution between two nodes obtained with this, if Nash Equilibrium Solution Equal to (Ui,Uj), wherein UiRepresenting node i has energy to forward the packet sent of predecessor node and has energy oneself to send number According to bag, UjThe same U of explanationi, then the flag bit of the connection is equal to 1, otherwise equal to 0;Above-mentioned topological Simplification algorithm 4 is:
Algorithm 4:Topology after node a expansions is simplified, and algorithm parameter is Tpa
The first step:In Tpa altogetherBar connection (For constant), if the connection count variable in Tpa isAnd make its initial It is worth for 1.
Second step:To in Tpa fromThe each connection started, does the work that the 3rd step starts.
3rd step:If with being connectedThere is some (or two) node energy occur not in two related node is and j Foot or received data packet queue are full, then connectionFlag bit be equal to 0,Plus 1 (judgement for continuing next connection), IfIt is less thanThen continue the work stated since the 3rd step to the 5th step.IfIt is more thanI.e.Bar is connected all Handle), then turn the 6th step.
4th step:The game theory income as shown in formula (11) is set up based on node i and node j correlation energy parameter Matrix simultaneously obtains Nash Equilibrium Solution, if Nash Equilibrium Solution is equal to (Ui,Uj) (i.e. node i and j have energy to forward forerunner's node Packet and oneself send packet), then connectionFlag bit 1, otherwise connectFlag bit be equal to 0.Turn the 5th Step.
5th step:Plus 1 (judgement for continuing next connection), ifIt is less thanThen continue since the 3rd step to The work that five steps are stated.IfIt is more thanI.e.Bar connection has all been handled), then turn the 6th step.
6th step:Terminate.
If the Nash Equilibrium Solution of formula (11) gain matrix is equal to (Ui,Uj) the then connection flag bit be 1, be otherwise 0;Receive Assorted equilibrium solution (Ui,Uj) namely node i and node j be involved in the transmission and forwarding of packet, afterwards according to the binary system after simplification Topology obtains the shortest path and optimal forward node set set for sending packetops
So that node a sends out packet to node f as an example, after the topological Simplification of algorithm 4, shortest path and optimal forwarding section are asked Point set setopsAlgorithm 5 be:
Algorithm 5:Shortest path and optimal forwarding set are asked, algorithm parameter is node a topological Tpa
The first step:If node a forms tree structure or section to all flag bits on node f path for 1 connection Point a forms rectilinear structure to all flag bits on node f path for 1 connection, then optimal forward node set setops For the set of all node compositions related to flag bit is 1 connection on node a to node f path.Otherwise second step is turned.
Second step:Shortest path first is run by source node of destination node f selects node to enter shortest path successively, will Those appear in the node addition optimal node forwarding set before node a in the algorithm.
3rd step:Terminate.
Interdependent node dump energy in binary network topology is updated, to the connection flag bit of depleted of energy by 1 clear 0 and new packet is sent, its process includes algorithm 6, algorithm 7 and algorithm 8;
The algorithm 6 that the optimal forward node set interior joint dump energy updates is:(algorithm 6 can pass through step Mode is describedIf it can, asking inventor to supplement the flow of specific steps, it thanks)
Algorithm 6:Optimal forward node set interior joint dump energy updates, and algorithm parameter is optimal forward node set setops
The first step:IfFor optimal forward node set setopsIn node ID counting variable and make its initial value be 1.Node forwarding set setopsIn common ě node (ě is constant).IfFor nodePrimary power,To send one The energy of packet consumption,The energy consumed for one packet of forwarding,To send the income of a packet, To forward the income of a packet.
Second step:From optimal forward node set setopsInNode (i.e. first node) start, do the 3rd step The work of beginning.
3rd step: (i.e. optimal forward node set set of plus 1opsIn it is next Node), ifLess than or equal to ě, then continue to do the work that the 3rd step starts, otherwise turn the 4th step.
4th step:Terminate.
By taking node a topological Tpa as an example, the connection that the flag bit is 1 resets algorithm 7 for (algorithm 7 can be by step Mode describeIf it can, asking inventor to supplement the flow of specific steps, it thanks):
Algorithm 7:Connect flag bit to reset, algorithm parameter is optimal forward node set setops
The first step:Node forwarding set setopsIn common ě node (ě is constant), ifFor optimal forward node set setopsIn node counts variable and make its initial value be 1.
Second step:To from setopsInThe node that (i.e. first) starts, does the work since the 3rd step.
3rd step:Observation is after algorithm 6Whether 0 (i.e. depleted of energy) is equal to, if equal to 0, then with node The flag bit clear 0 of related connection, turns the 4th step.If being not equal to 0, turn the 4th step.
4th step:Plus 1, ifLess than or equal to ě, then turn the 3rd step, otherwise turn the 5th step.
5th step:Terminate.
By taking node a as an example, it can to sum up obtain, it is considered to which the delay-tolerant network topology algorithm 8 of node energy is:
Algorithm 8:Consider the delay-tolerant network topology method of node energy, algorithm parameter is node a topology Tpa, a transmit queue Qa
The first step:Send data packet queue QaIn common p packet.If y is transmit queue QaCounting variable and at the beginning of making it Initial value is 1 (first packet i.e. in transmit queue).
Second step:To QaIn each packet Py, do the work that the 3rd step starts.
3rd step:If Py.TTL it is equal to 0 (i.e. packet PyLife cycle exhaust), then packet discard Py, otherwise do Work since the 4th step.
4th step:Operation 4 couples of topology Tpa of algorithm first simplify, and then run algorithm 5 and obtain optimal forward node collection Close setops.If belonging to set with the node a nodes metopsAnd packet P is confiscated before the node that meetsy, then by data Wrap PyThe node that meets is sent to, otherwise retains PyWatch for a better chance.Run the optimal forward node set set of 6 pairs of algorithmopsIn The energy of node is updated, the related connection flag bit clear 0 of node of the operation algorithm 7 to depleted of energy.Y adds 1, if y is small In equal to p (also having packet i.e. in transmit queue), then do the work stated since the 3rd step to the 4th step.If y More than p, then turn the 5th step.
5th step:Terminate.
Below this method is illustrated with an example;
The concept of physics and mathematically usually said Spatial Dimension is come from general theory of relativity.For two on a piece of paper For two ants of diagonal line endpoints, the distance between they are distant, because ant can only perceive the sky of bidimensional Between, but if by paper doubling once, along two end points to the third dimension height that folds, then distance is just very between them It is near.So for distance, first having to place it in some dimension to discuss, because far in a dimension Distance may be very close in another dimension.This method with reference to the concept of dimension, not be general theory of relativity certainly The dimension of middle strict difinition.When node carries mobile by the mankind, the characteristics of inevitably embodying related to people, because Behaviour is in different dimensions, and node can be also in different dimensions, and these different dimensions include the geography residing for node Position, node motion speed, the residence time in some specific region, the number of times that meets of past and other nodes are (with other sections Point meets and successfully carries out data transfer), social hierarchy's positioning (the such as mayor, teacher, student etc.), common hobby (such as Read, play basketball) in addition to common economic setting, whether be same age bracket, whether be one family, whether learn Same specialty etc..In a word, all dimensions that can be imagined can be defined.It is to be mutually related between some dimensions, for section The number of times dimension of meeting in the past of point is with hobby dimension and with this node in some place residence time dimension and its shifting Dynamic speed dimension is all related.Because hobby is often embodied in the geographical position that node occurs.For example, like for two The people of motion may often meet in some gymnasium, but the two people's Encounter Times have how long depend on them at this The residence time of gymnasium and their translational speed.It is separate between some dimensions, such as social hierarchy ties up Degree and node motion speed dimension.Over time, influence of the dimension to node is different, defines the weight of dimension Coefficient is weighed.For simple example, this dimension of household and range dimension are same even if being separated by long and arduous journey with household The people of family will not would rather also exchange with far away from more exchange of household thousands of miles away with strange neighbours close at hand, institute Whether it is being just to become very near in one family this dimension with, distance now, and this dimension seems in geographical position Become not working.
For example to a mobile node a, it is identified with 5 dimensional vectors, 5 dimensions are respectively:Translational speed, some The residence time in place, social hierarchy, whether it is relatives, social hierarchy, age bracket.Each value of 5 dimensional vectors is one whole Number, this integer value namely its residing grade in each dimension, 5 dimensions are all identified with being beneficial to grade point will Measurement is unified, gating limit value θ=3, s=6.
For node in this dimension of the residence time in some place, according to node the residence time of corresponding location length The short division for carrying out grade.
For the translational speed of node this dimension, translational speed and the grade of node are inversely proportional, node motion speed Degree is faster, then its lower grade.
, can be with according to whether being lineal relative, if be collaterals, be not for whether being relatives this dimension Relatives but familiar, stranger etc. carries out the division of grade.
, can be according to principal, director, teacher, if in a school for this dimension of social hierarchy The division for carrying out grade such as raw.
, can be with according to whether being contemporary for age bracket this dimension, if the age differs 5 years or 10 years etc. To carry out grade classification.
Assuming that the relative quiescent topology that node a is set up is illustrated in fig. 2 shown below.
The letter of Fig. 2 interior joints represents the ID of node.Numerical value in figure in connection represents the weights of connection, according to weights meter Formula is calculated to draw.Before all nodes and node a come in more than 3 dimensions of threshold value in figure in 6 grades, by figure For node a and node ea, 6 grades before they all come in more than 3 dimensions of threshold value.Ideally, if node a With node ea 6 grades before each dimension comes in 5 dimensions, then count [ea]=5, wherein dimension sum n perseverances are more than Equal to threshold value θ.
After if elapsed time T meets with other nodes, the topology of node a formation is illustrated in fig. 3 shown below.
Ellipsis in Fig. 3 is represented to also have behind topological diagram and connected, in figure connection be marked with node b in weights, figure by , temporarily without public intermediary node, split in other nodes so causing temporary transient topological diagram.But with node and its Its node meets, always so that than larger probability, in the presence of some node that meets, node in its topological diagram is by the portion of segmentation Divide and connect.
Finally, due to all have selected in each dimension in the local topology figure of structure node 6 etc. before top ranked Level, and be then to take their inverse when calculating every weights connected, then corresponding 6 numbers for reforming into minimum.Assuming that Currently transmitted pointer points to the packet for being sent to node sp in node a, according to the dump energy of current each node in Fig. 3, often Individual node sends the energy consumption of an its data bag, and each node is sent to the energy consumption of sp packet, by every company Connect and set up rights and interests Matrix Calculating Nash Equilibrium Solution to simplify topology, after simplification, five kinds shown in Fig. 4-Fig. 8 can be produced Binary system topology;
After simplification, all flag bits form linear structure for 1 connection, as shown in Figure 4.
Such as Fig. 5, blueness and red value represent the flag bit of connection, and the numerical value of black is flag bit in connection weight, Fig. 4 Linear structure is constituted for 1, is not required to run shortest path first, can obtain the shortest path that node a is sent to node sp Footpath and optimal forward node set setops={ a, k, o, s, sp };
After simplification, all flag bits form tree structure for 1 connection, as shown in Figure 5.
As flag bit constitutes tree structure for 1 in Fig. 5, it is not required to run shortest path first, section can be obtained Point a is sent to node sp shortest path and optimal forward node set setops={ a, k, o, s, sp };
After simplification, all flag bits form graphic structure for 1 connection, as shown in Figure 6.
As flag bit constitutes graphic structure for 1 in Fig. 6, shortest path calculation is run by source node of node sp Method, can obtain shortest path and optimal forward node set set that node a is sent to node spops
After simplification, the flag bit of all connections is all 1 in figure, as shown in Figure 7.
Flag bit such as all connections in Fig. 7 is 1, and shortest path first is run by source node of node sp, can be obtained Node a is sent to node sp shortest path and optimal forward node set setops
After simplification, the flag bit of all connections is all 0 in figure, is illustrated in fig. 8 shown below.
Flag bit such as all connections in Fig. 8 is 0, and this is will to consider other plans in a kind of special circumstances, future work The forwarding of packet is slightly carried out, for example, shortest path and optimal forward node set are obtained to the incentives strategy of node setops
In summary, a kind of delay-tolerant network topology method for considering node energy of the present invention, by being had The Route Selection of effect, improves the hit rate of data transfer, and reduces data transfer delay and route energy consumption.
Although present disclosure is discussed in detail by above preferred embodiment, but it should be appreciated that above-mentioned Description is not considered as limitation of the present invention.After those skilled in the art have read the above, for the present invention's A variety of modifications and substitutions all will be apparent.Therefore, protection scope of the present invention should be limited to the appended claims.

Claims (9)

1. a kind of delay-tolerant network topology method for considering node energy, it is characterised in that this method includes following step Suddenly:
S1, the dimension related to node is taken out according to the characteristic and residing environment of delay-tolerant network interior joint itself;
S2, defines k × n dimension weight factor matrix and represents importance of each dimension to node, matrix k rows, which are represented, k Individual node, n row, which represent each node, n dimension;
S3, grade classification is carried out to each dimension and according to different dimensional of the node own characteristic to node according to different criterions Degree carries out rank;
Node i and node j come the number of preceding s dimension and are put into count [i] beyond S4, statistical matrix interior joint j, Correspondence dimension mark is added in dimension logo collection A [i] simultaneously, judges whether count [i] is more than threshold value θ, if it is In the relative quiescent Local network topology that node i is added to node j;
S5, judges whether the relative quiescent Local network topology of all nodes in dimension weight factor matrix has all been asked, if then Step S6 is carried out, otherwise more new node j enters step S4;
S6, integrated definition meshed network Topology connection weights;
S7, in setting time section T, meets exchange routing iinformation to expand and improve each node network of itself by node Topology;
Two node energies according to associated by connection are each connected in S8, network topology, set up gain matrix and obtaining receive it is assorted Equilibrium solution, and described network topology is simplified;
S9, it is binary one or 0,1 that the flag bit each connected in each node static network topology is marked according to Nash Equilibrium Solution Represent that this is connected with energy and sends packet, 0 contrast;
S10, according to after simplification network topology topology and obtain send packet shortest path and optimal forward node set;
S11, sends packet, updates binary network topology, sends new packet.
2. the delay-tolerant network topology method of node energy is considered as claimed in claim 1, it is characterised in that described Step S1 in, each mobile node is identified with a n-dimensional vector, each value of n-dimensional vector is integer, i.e. the node Residing grade, and being expressed as any node a n-dimensional vector in each dimension:
HVa=[Ha1 Ha2 … Hap … Han] (1)。
3. the delay-tolerant network topology method of node energy is considered as claimed in claim 1, it is characterised in that described Step S2 in each dimension the importance of node is changed over time, wherein dimension weight factor matrix is expressed as:
The calculation of each value is in dimension weight factor matrix in formula (2):
H in formula (3)p minRepresent minimum level value, H in pth dimensionp maxGreatest level value in pth dimension is represented, a is k section Point in any one.
4. the delay-tolerant network topology method of node energy is considered as claimed in claim 1, it is characterised in that described Step 3 middle grade divide and need to be divided into s grade to each dimension, r is highest ranking, and grade r-s+1 to grade r is highest Preceding s grade.
5. the delay-tolerant network topology method of node energy is considered as claimed in claim 1, it is characterised in that described Step S6 in connection weight be divided into single connection weight computing and multi-link weight computing, it is as follows:
When the contact between dimension is separate, described single connection weight computing formula is:
Formula (4) is single connection weight computing formula between node a and node f, wherein they come in β dimension before s Grade;
Fol-lowing values are the inverse of weight factor wherein in formula (4):
When being influenced each other between dimension, described single connection weight computing formula is:
Wherein in formula (7):
Wherein in formula (7):
Wherein Last,Lfst,Lasp,LfspNode a and node f are represented respectively in translational speed dimension and the grade of residence time dimension Rank value, i.e., meet number of times this dimension between having node in β dimension, and translational speed dimension and residence time dimension do not exist During preceding s grades, described constraints is:
Lat∈Dt∩Lat≥r-s+1Lft∈Dt∩Lft≥r-s+1
Last< r-s+1, Lfst< r-s+1, Lasp< r-s+1, Lfsp< r-s+1
Described multi-link weight computing formula is:
Waw=Waea×Weaw+Waka×Wkaw+Wawa×Wwaw (10)
In formula (10), exemplified by the multi-link weights between any two node a and w, its interior joint ea, node ka, section Point wa is node a and node w three common friends nodes, WaeaFor the single connection weights between node a and node ea, WeawFor Single connection weights between node ea and node w, WakaFor the single connection weights between node a and node ka, WkawFor node ka Single connection weights between node w, WawaFor the single connection weights between node a and node wa, WwawFor node wa and node w Between single connection weights, according to multiplication of probability and addition rule, obtain the multi-link weights between node a and node w.
6. the delay-tolerant network topology method of node energy is considered as claimed in claim 1, it is characterised in that described Step S7 in exchange routing iinformation met by node be specially to expand and improve each node network topology of itself:When The local topology information of itself is issued into mutually other side when node meets, node, will not according to the topology information of the other side received Same part is incorporated to the network topology of itself.
7. the delay-tolerant network topology method of node energy is considered as claimed in claim 1, it is characterised in that described Step S8 in gain matrix be:Matrix in game theory to ask Nash Equilibrium Solution to be set up;
Described node energy, which includes node, is ready the ability of received data packet, is ready to forward the ability of packet and has forwarding The ability of packet;
To each connection in topologyTwo node is and j according to associated by connection set up gain matrix and obtain Na Shijun Weighing apparatus solution;
Described gain matrix is:
node j
Wherein (Ui,Uj) in UiThe total revenue of packet, U are forwarded and sent for node ijForwarded for node j and send packet Total revenue, (Vi,Vj) in ViThe total revenue of packet, V are forwarded and sent for node ijPacket is sent for node j but is not forwarded Front nodal point send the total revenue of packet, (Wi,Wj) in WiSame Ui, WjRepresent that node j neither forwards packet nor sends number According to the total revenue of bag, (Xi,Xj) in XiRepresent that node i sends the packet of itself but do not forwarded from node data bag before Total revenue, XjSame Uj, (Yi,Yj) in YiSame Xi, YjSame Vj, (Zi,Zj) in ZiSame Xi, ZjSame Wj, (Oi,Oj) in OiRepresent node i The total revenue for the packet that the front nodal point for sending packet but not forwarding is sent, OjSame Xj, (Pi,Pj) in PiSame Oi, PjSame Vj, (Qi,Qj) in QiSame Oi, QjSame Wj
8. the delay-tolerant network topology method of node energy is considered as claimed in claim 7, it is characterised in that described Step S8 in network topology is reduced to:
If there is energy deficiency in any one node in two nodes related to connection or data pack buffer queue is full, So the connection flag bit is 0;
If there is not above-mentioned situation, then do following judgement, according to the respective of two nodes associated with the connection Energy parameter sets up game theory gain matrix and obtains Nash Equilibrium Solution between two nodes with this, if Nash Equilibrium Solution is equal to (Ui,Uj), wherein UiRepresenting node i has energy to forward the packet sent of predecessor node and has energy oneself to send packet, UjThe same U of explanationi, then the flag bit of the connection is equal to 1, otherwise equal to 0.
9. the delay-tolerant network topology method of node energy is considered as claimed in claim 7, it is characterised in that if formula (11) Nash Equilibrium Solution of gain matrix is equal to (Ui,Uj), then the flag bit of the connection is 1, is otherwise 0;Nash Equilibrium Solution (Ui, Uj) namely node i and node j be involved in the transmission and forwarding of packet.
CN201710174046.9A 2017-03-22 2017-03-22 Delay tolerant network topology routing method considering node energy Active CN107018080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710174046.9A CN107018080B (en) 2017-03-22 2017-03-22 Delay tolerant network topology routing method considering node energy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710174046.9A CN107018080B (en) 2017-03-22 2017-03-22 Delay tolerant network topology routing method considering node energy

Publications (2)

Publication Number Publication Date
CN107018080A true CN107018080A (en) 2017-08-04
CN107018080B CN107018080B (en) 2020-04-07

Family

ID=59440844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710174046.9A Active CN107018080B (en) 2017-03-22 2017-03-22 Delay tolerant network topology routing method considering node energy

Country Status (1)

Country Link
CN (1) CN107018080B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063214A (en) * 2018-10-08 2018-12-21 海南大学 The resource hiding method that the typing data and its figure of value driving indicate
US20230012210A1 (en) * 2020-07-08 2023-01-12 Eci Telecom Ltd. Systems and methods for configuring a communications network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5280607A (en) * 1991-06-28 1994-01-18 International Business Machines Corporation Method and apparatus for tolerating faults in mesh architectures
CN102014068A (en) * 2010-12-16 2011-04-13 北京航空航天大学 Noncooperative-game-based delay tolerant network (DTN) opportunistic routing cooperative encouragement method
CN104753644A (en) * 2015-04-10 2015-07-01 北京航空航天大学 Delay-tolerant and disruption-tolerant network transmission system on basis of network coding
CN106304243A (en) * 2015-05-26 2017-01-04 桂林市华智信息科技有限公司 A kind of wireless sensor network topology control method based on gesture game

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5280607A (en) * 1991-06-28 1994-01-18 International Business Machines Corporation Method and apparatus for tolerating faults in mesh architectures
CN102014068A (en) * 2010-12-16 2011-04-13 北京航空航天大学 Noncooperative-game-based delay tolerant network (DTN) opportunistic routing cooperative encouragement method
CN104753644A (en) * 2015-04-10 2015-07-01 北京航空航天大学 Delay-tolerant and disruption-tolerant network transmission system on basis of network coding
CN106304243A (en) * 2015-05-26 2017-01-04 桂林市华智信息科技有限公司 A kind of wireless sensor network topology control method based on gesture game

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
贾建鑫: "《DTN中基于动态多维度组合的拓扑图路由算法》", 《计算机工程》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063214A (en) * 2018-10-08 2018-12-21 海南大学 The resource hiding method that the typing data and its figure of value driving indicate
CN109063214B (en) * 2018-10-08 2019-08-30 海南大学 The resource hiding method that the typing data and its figure of value driving indicate
US20230012210A1 (en) * 2020-07-08 2023-01-12 Eci Telecom Ltd. Systems and methods for configuring a communications network
US11736387B2 (en) * 2020-07-08 2023-08-22 Eci Telecom Ltd. Systems and methods for configuring a communications network

Also Published As

Publication number Publication date
CN107018080B (en) 2020-04-07

Similar Documents

Publication Publication Date Title
Murugaanandam et al. Reliability-based cluster head selection methodology using fuzzy logic for performance improvement in WSNs
CN102984779B (en) Routing method for delay tolerant network forwarded on basis of multiple social attributes
CN108112049B (en) A kind of wireless sensor network efficiency optimization cluster-dividing method based on whale group algorithm
CN104579957B (en) The Delay Tolerant Network method for routing forwarded based on cohesion and time-constrain
CN107529201A (en) A kind of wireless sensor network data transmission method based on LEACH agreements
CN103052130B (en) A kind of wireless multimedia sensor network data fusion method based on rough set
Verma et al. Integrated routing protocol for opportunistic networks
Mahajan et al. LCIPA: Lightweight clustering protocol for industry 4.0 enabled precision agriculture
CN109962774B (en) Quantum cipher network key relay dynamic routing method
CN103117957A (en) Cache management method based on numbers of message replications and comprehensive effectiveness in opportunistic network
CN107483248A (en) A kind of constraint minimum spanning tree Topology Control Algorithm based on wireless sensor network
CN107018080A (en) A kind of delay-tolerant network topology method for considering node energy
CN102299854A (en) Opportunistic network environment-oriented multi-object routing decision making system
Han et al. QMIX aided routing in social-based delay-tolerant networks
Gu et al. A social-aware routing protocol based on fuzzy logic in vehicular ad hoc networks
CN101854693A (en) Method for calculating route stability applied to mobile ah hoc network
Shi et al. Hierarchical star: a new two level interconnection network
CN104009916A (en) Delay tolerant network energy-efficient routing scheme based on social attribute forwarding
Zhu et al. Rethinking routing information in mobile social networks: location-based or social-based?
Layuan et al. A routing protocol for dynamic and large computer networks with clustering topology
CN110536309A (en) It is a kind of that network route method is understood based on the mobile agency of node liveness and capacity factor
Singh et al. Reinforcement learning-based real time search algorithm for routing optimisation in wireless sensor networks using fuzzy link cost estimation
CN104185241A (en) Routing method suitable for restricted satellite network
Jain et al. COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS
CN110048948A (en) DTN network data based on initial social networks predicts retransmission method, equipment, medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant