CN107124308A - A kind of tactical data link hierarchical topology method - Google Patents

A kind of tactical data link hierarchical topology method Download PDF

Info

Publication number
CN107124308A
CN107124308A CN201710293085.0A CN201710293085A CN107124308A CN 107124308 A CN107124308 A CN 107124308A CN 201710293085 A CN201710293085 A CN 201710293085A CN 107124308 A CN107124308 A CN 107124308A
Authority
CN
China
Prior art keywords
node
frequent
data link
frequency
hierarchical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710293085.0A
Other languages
Chinese (zh)
Other versions
CN107124308B (en
Inventor
李万春
扶彩霞
王斌
陈锐滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201710293085.0A priority Critical patent/CN107124308B/en
Publication of CN107124308A publication Critical patent/CN107124308A/en
Application granted granted Critical
Publication of CN107124308B publication Critical patent/CN107124308B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/142Network analysis or design using statistical or mathematical methods

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Algebra (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Pure & Applied Mathematics (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention belongs to communication technical field, a kind of tactical data link hierarchical topology method is particularly related to.It is an object of the invention to:For a class tactical data link of non-stop layer node, in the case of node random distribution, based on Apriori data relation analysis algorithm principles, propose a kind of tactical data link hierarchical topology method for digging, the hierarchical relationship between different nodes is excavated, the hierarchical relationship between different nodes in data link is disclosed.

Description

A kind of tactical data link hierarchical topology method
Technical field
The invention belongs to communication technical field, a kind of tactical data link hierarchical topology method for digging is particularly related to.
Background technology
Tactical data link is typical case application of the data communication in military aspect, and the link of combat data is transmitted with wireless channel Tactical data link tissue under referred to as tactical data link, battlefield surroundings forms one according to command relation and troop operation feature Hierarchical network, therefore, for hierarchical network, the research of topological model is the important foundation that Routing Protocol is assessed, It is to influence the key factor of networking efficiency.The research counted greatly absolutely at present about tactical data link network topology concentrates on movement certainly In networking (mobile ad hoc network, abbreviation MANET), it is a kind of independent of the wireless of any static infrastructure Network, there is larger difference compared with tactical data chain network, most all to use section on network topology in the document of network performance The mode of point random distribution, the characteristics of not embodying stratification, therefore the present invention propose a kind of based on " Apriori data correlations The generating algorithm of the tactical data link hierarchical topology excavation of analysis ", can embody battlefield surroundings lower node stratification feature, realize The hierarchical relationship and correlation degree between different nodes are excavated in the case of network node random distribution.
Apriori algorithm is a kind of frequent item set algorithm of Mining Association Rules, and wherein item destination aggregation (mda) is referred to as item collection, item Element number is concentrated to be referred to as the length of item collection, length is referred to as k- item collections for k item collection, and a support is not less than some threshold value Item collection is called frequent item set.The core concept of the algorithm is by candidate generation and closing downwards detects two stages to excavate Frequent item set finds out all frequency collection first, has been widely used the every field such as business, network security.Apriori Algorithm excavates the correlation degree between correlation degree and project between data using bulk information.Detectd for tactical data link Examine size of message big, the characteristics of node random distribution, on the basis of the basic priori of reconnaissance, excavate different nodes it Between correlation degree, disclose the hierarchical relationship between different nodes in data link.
The content of the invention
It is an object of the invention to:For a class tactical data link of non-stop layer node, in the situation of node random distribution Under, based on Apriori data relation analysis algorithm principles, it is proposed that a kind of tactical data link hierarchical topology method for digging, excavate The hierarchical relationship gone out between different nodes, discloses the hierarchical relationship between different nodes in data link.
Technical scheme comprises the following steps:
S1, in multi-layer network, be each node distribution time slot, and set minimum support and min confidence;
S2, each node of statistics send the frequency of message, and the node by frequency not less than minimum support constitutes frequent k-1 Item collection;
S3, the frequent k-1 centralized node set to acquisition are scanned counting, count each node set and send message Frequency, the node by frequency not less than minimum support constitutes frequent k-2 item collections;
S4, the method iteration according to step S2-S3, until obtaining k dimension Frequent Item Sets;
S5, Frequent Item Sets are tieed up according to the k of acquisition, calculate confidence level, subordinate between egress is obtained according to confidence level and is closed System, obtains the hierarchical relationship between different nodes.
Further, the specific method of the step S2 is:
The time slot of a node is selected from multiple nodes as the condition of separation, so that the transmission for counting each node disappears The frequency of breath, then the frequent k-1 item collections of node composition by frequency not less than minimum support.
Further, in addition to step:
After S6, the time slot of a node of selection are as separation condition, the section of minimum support is less than for those frequencies Point, it is impossible to excavate their hierarchical relationship with separation condition again, it is necessary to reduce the hierarchy levels of cut-point and remove ratio The high node of new spliting node level, goes out not determining subordinate relation node in step s 5 according to step S2-S3 method iteration Composition k dimension Frequent Item Sets, calculate confidence level and subordinate relation between egress;
S7, repeat step S6 are until draw the hierarchical relationship in whole network between all nodes.
Beneficial effects of the present invention are that the present invention can excavate the hierarchical relationship between the different nodes of topological network, take off Show the correlation degree between different nodes, method is simple, works well.
Brief description of the drawings
Fig. 1 is 8 node level relationship topology figures;
Fig. 2 ties up the schematic flow sheet of Frequent Item Sets for acquisition k;
Fig. 3 is node A message sequence;
Fig. 4 is the message time sequence figure of 8 nodes;
Fig. 5 is the support of each platform;
Fig. 6 is the frequent k-2 item collections support of candidate;
Fig. 7 is the frequent k-2 item collections confidence level of candidate;
Fig. 8 is platform B-H message time sequence figure;
Fig. 9 is platform B-H support;
Figure 10 is the frequent k-2 item collections support of candidate.
Embodiment
Below in conjunction with the accompanying drawings and example, technical scheme is described in detail:
The present invention mainly proposes that a kind of Data-Link hierarchical topology based on Apriori data relation analysis is excavated, in number Size of message is scouted according to chain greatly, in the case that Node distribution randomness is big, the priori obtained using Apriori algorithm thought and scouting Knowledge, excavates the hierarchical relationship between different nodes, discloses the correlation degree between different nodes.
By taking eight platforms in a certain operation cluster as an example:
Assuming that there is the hierarchical topology figure between hierarchical relationship, each node between eight platforms as shown in figure 1, agreement is used Tactical data link time slot allocation rule, using P responses, while the message of platform must be in the message transmission interval of upper platform Complete to exchange.
Assuming that I={ A, B, C, D, E, F, G, H } is platform numbering collection, carried out between each node according to network topology structure " answer-answering " formula is communicated, and the period of reception message is divided into isometric timeslice { t1、t2、t3......tm, each timeslice Size is δ, and m is the timeslice sum of data receipt time section;Define Ti={ i1、i2、i3......ikBe network in one Communication pattern, i.e., in timeslice tiMiddle generation communication behavior;
Theoretical according to Apriori algorithm, the model related definition and model used in the present invention is as follows:
Model related definition:
1) correlation rule between definition node
If minimum support is Support (R), min confidence is Confidence (R), when the message sequence between node The minimum support and min confidence of set are met:
Support(R)≥supmin
Confidence(R)≥confmin
Then there is certain subordinate relation between node.
2) frequent item set is defined
A) frequency that each node sends message is counted, frequency constitutes item collection as frequency not less than the node of minimum support Numerous k-1 item collections;
B) to second of scanning and counting of carry out of frequent k-1 centralized node set, statistics node sends the frequency of message Find frequent k-2 item collections;
C) (k-1) successively generated after search iteration according to the step of kth -1 ties up maximum Item Sets and produces k Wei Xuanxiangmuji, obtains Frequent Item Sets are tieed up to k;As shown in Figure 2;
D) obtain after target k dimension item collections, calculating confidence level obtains the subordinate relation between egress;
(2) model is described:
Assuming that in hierarchical topology figure (such as Fig. 1), being met in minimum support
Support(R)≥supmin
In the case of, finally determine association between node by calculating message sequence set frequent item set min confidence Degree, as shown in table 1:
Correlation degree between the frequent item set min confidence of table 1 and node
The final goal of model is that the hierarchical topology relation excavated between eight nodes is:
{A->B->C }, { A->B->D }, { C->E }, { C->F }, { D->G }, { D->H}
Based on model as shown in Figure 1, the side of the present invention is explained in further detail with reference to following real data Case
(1) parameter setting:P=0.8, supmin=0.6, confmin=0.6;
(2) according to tactical data link time slot allocation rule, to eight node distribution time slots.Node A message sequences obey pool Pine distribution, obtains node A message arrival time (such as Fig. 3) and 8 node messages timing diagrams (such as Fig. 4);
(3) node A-D hierarchical relationships;
A) frequent item set k-1 is found:The condition of separation is used as with the message of A nodes, it is possible to obtain following tables of data 2:
The tables of data that table 2 is obtained with the message of A nodes as the condition of separation
In table 2,1:Represent and send signal 0:Represent no signal;
The frequency of the transmission message of each node is counted, frequent k-1 item collections are obtained:{ { A }, { B }, { C }, { D } }.
B) frequent k-2 item collections are found:
There is { { AB }, { AC }, { AD }, { BC }, { BD }, { CD } } by (a) frequent k-2 item collections that candidate can be obtained, calculate them Support (such as Fig. 6) and confidence level (such as Fig. 7);Frequent Set is selected in the case where confidence level and support meet condition {{AB},{BC},{BD}}。
C) frequent k-3 item collections are found:
There are the frequent k-3 item collections of candidate { { ABC }, { ABD } } on the basis of (b).Calculate the support of the frequent k-3 item collections of candidate Degree and confidence level are as shown in table 3:
The support and confidence level of the frequent k-3 item collections of table 3
Because support and confidence level are all met:
Support(R)≥supmin
Confidence(R)≥confmin
So it is considered that having A- in the hierarchical topology of the Data-Link>B->C and A->B->D relation.
(4) node E-H hierarchical relationships:
Because level is unsatisfactory for than relatively low node in the case of using A time slots as cut-point:
Support(R)≥supmin
So now wanting to obtain the hierarchical relationship of { { E }, { F }, { G }, { H } }, it is necessary to make the hierarchy levels of cut-point Reduce and remove the node higher than new spliting node level.For example, the time slot of reselection B node is used as time slot dividing point, then It is accomplished by first removing the gap information of A nodes, it is to avoid the complexity of frequent item set is selected in increase.A gap information is first removed, with B time slot obtains the time series (such as Fig. 8) of remaining node as time slot dividing point:
A) frequent item set k-1 is found:
The frequency of the transmission message of each node is counted, frequent item set k-1 (such as Fig. 9) is obtained:{ B }, { C }, { D }, { E }, { F }, { G }, { H } };
B) frequent item set k-2 is found:
The support for knowing all platforms by (a) is all met in the requirement of minimum support, and first time solution procedure Node B and node CD relation are tried to achieve, so the relation of B node and node CD can not be sought during current iteration, is obtained Curve map (such as Fig. 9).As can be seen from Figure 9 { CE }, { CF }, { DG }, the support of { DH } meet condition so will { CE }, { CF }, { DG }, { DH } } it is used as the frequent k-2 item collections of candidate.Obtained confidence level such as table 4 below:
The frequent k-2 item collections confidence level of table 4
Subordinate relation Confidence level
{C->E} 0.6875
{C->F} 0.675
{D->G} 0.654
{D->H} 0.667
Because support and confidence level are all met:
Support(R)≥supmin
Confidence(R)≥confmin
Confidence level meets condition as can be seen from the table, that is, there is hierarchical relationship { C->E }, { C->F }, { D->G }, { D-> H}。
Verify whether result of calculation is correct:
It is strong and weak as shown in table 5 by calculating the subordinate relation between each node:
Subordinate relation between each node of table 5 is strong and weak
Subordinate relation Confidence level
{AB->C} 0.8682
{AB->D} 0.7984
{C->E} 0.6875
{C->F} 0.675
{D->G} 0.654
{D->H} 0.667
The residing level in hierarchical topology figure is substantially can be seen that from curve map 7 higher, k-1, k-2 item collection supports It is higher;More close two nodes (such as AB, BC) in hierarchical topology, confidence level is higher;Confidence level reflects correlation rule Power, confidence level is higher, and subordinate relation is more obvious.When two node astride hierarchies (such as:AC), confidence level declines and works as node on the contrary The networking under specific protocol, then message may downwards be transmitted along the side in topological diagram, forms belong to the collection in time The message sequence set of group, because response and the transmission of message have certain probability P, result in closest on hierarchical relationship Node correlation degree Support highests, the degree of association Support between level reduces therewith, and this also complies with actual operation Situation.

Claims (3)

1. a kind of tactical data link hierarchical topology method, comprises the following steps:
S1, in multi-layer network, be each node distribution time slot, and set minimum support;
S2, each node of statistics send the frequency of message, and the node by frequency not less than minimum support constitutes frequent k-1 Collection;
S3, the frequent k-1 centralized node set to acquisition are scanned counting, count the frequency that each node set sends message Rate, the node by frequency not less than minimum support constitutes frequent k-2 item collections;
S4, the method iteration according to step S2-S3, until obtaining k dimension Frequent Item Sets;
S5, according to the k of acquisition tie up Frequent Item Sets, calculate confidence level, the subordinate relation between egress is obtained according to confidence level, is obtained Obtain the hierarchical relationship between different nodes.
2. a kind of tactical data link hierarchical topology method according to claim 1, it is characterised in that the tool of the step S2 Body method is:
The time slot of a node is selected from multiple nodes as the condition of separation, so that count the transmission message of each node Frequency, then the frequent k-1 item collections of node composition by frequency not less than minimum support.
3. a kind of tactical data link hierarchical topology method according to claim 2, it is characterised in that also including step:
After S6, the time slot of a node of selection are as separation condition, the node of minimum support, nothing are less than for those frequencies Method excavates their hierarchical relationship with separation condition again, it is necessary to the hierarchy levels of cut-point is reduced and is removed than new segmentation The high node of node level, goes out not determining the composition k of subordinate relation node in step s 5 according to step S2-S3 method iteration Frequent Item Sets are tieed up, confidence level is calculated and obtains the subordinate relation between egress;
S7, repeat step S6 are until draw the hierarchical relationship in whole network between all nodes.
CN201710293085.0A 2017-04-28 2017-04-28 A kind of tactical data link hierarchical topology method for digging Active CN107124308B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710293085.0A CN107124308B (en) 2017-04-28 2017-04-28 A kind of tactical data link hierarchical topology method for digging

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710293085.0A CN107124308B (en) 2017-04-28 2017-04-28 A kind of tactical data link hierarchical topology method for digging

Publications (2)

Publication Number Publication Date
CN107124308A true CN107124308A (en) 2017-09-01
CN107124308B CN107124308B (en) 2019-09-13

Family

ID=59726449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710293085.0A Active CN107124308B (en) 2017-04-28 2017-04-28 A kind of tactical data link hierarchical topology method for digging

Country Status (1)

Country Link
CN (1) CN107124308B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110457540A (en) * 2019-06-28 2019-11-15 卓尔智联(武汉)研究院有限公司 Querying method, service platform, terminal device and the storage medium of data
CN115203480A (en) * 2022-05-10 2022-10-18 中国人民解放军91977部队 Target group formation membership mining method based on deep correlation analysis

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914528A (en) * 2014-03-28 2014-07-09 南京邮电大学 Parallelizing method of association analytical algorithm
CN104809665A (en) * 2015-05-14 2015-07-29 国家电网公司 Distribution network early-warning method based on improved Apriori algorithm
EP3273652A1 (en) * 2011-10-17 2018-01-24 Telcordia Technologies, Inc. Open communication method in a heterogeneous network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3273652A1 (en) * 2011-10-17 2018-01-24 Telcordia Technologies, Inc. Open communication method in a heterogeneous network
CN103914528A (en) * 2014-03-28 2014-07-09 南京邮电大学 Parallelizing method of association analytical algorithm
CN104809665A (en) * 2015-05-14 2015-07-29 国家电网公司 Distribution network early-warning method based on improved Apriori algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周发超等: "关联规则挖掘算法Apriori的研究改进", 《计算机科学与探索》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110457540A (en) * 2019-06-28 2019-11-15 卓尔智联(武汉)研究院有限公司 Querying method, service platform, terminal device and the storage medium of data
CN110457540B (en) * 2019-06-28 2020-07-14 卓尔智联(武汉)研究院有限公司 Data query method, service platform, terminal device and storage medium
CN115203480A (en) * 2022-05-10 2022-10-18 中国人民解放军91977部队 Target group formation membership mining method based on deep correlation analysis

Also Published As

Publication number Publication date
CN107124308B (en) 2019-09-13

Similar Documents

Publication Publication Date Title
Miyao et al. LTRT: An efficient and reliable topology control algorithm for ad-hoc networks
Nocetti et al. Connectivity based k-hop clustering in wireless networks
Wu et al. Constructing k-connected m-dominating sets in wireless sensor networks
Li et al. LocalCom: a community-based epidemic forwarding scheme in disruption-tolerant networks
CN103647714A (en) Social energy-based mobile social delay-tolerant network routing method
Voulkidis et al. Energy efficiency in wireless sensor networks: A game-theoretic approach based on coalition formation
CN113422695A (en) Optimization method for improving robustness of topological structure of Internet of things
CN107124308B (en) A kind of tactical data link hierarchical topology method for digging
CN109033636A (en) Link layer access mechanism analysis method based on the blind analysis of link layer bit stream
Ayinde et al. Differential evolution based deployment of wireless sensor networks
Qiu et al. Robustness Optimization for IoT Topology
Godi et al. Border Collie optimization algorithm‐based node clustering technique in vehicular ad hoc networks
Gupta et al. Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks
Zhang et al. K-barrier coverage in wireless sensor networks based on immune particle swarm optimisation
Hou et al. Novel routing algorithms in space information networks based on timeliness-aware data mining and time-space graph
Montemanni et al. Models and algorithms for the MPSCP: an overview
Ahmad et al. A reliability calculations model for large-scale MANETs
CN107257565A (en) Wireless sensor network reliability calculation method based on energy and transmission
Ortiz et al. Smart routing mechanism for green ZigBee-based wireless sensor networks
Tsianos et al. Multiscale gossip for efficient decentralized averaging in wireless packet networks
Huang et al. Efficient and robust query processing for mobile wireless sensor networks
Zhang et al. An efficient group partition prediction scheme for manets
Munadi et al. Location management cost reduction using fuzzy logic in cellular radio network
Yu-Tong Retracted: Research of Computer Network Data Transmission Routing Method
Pari et al. Requisite trust-based secure routing protocol for MANETs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant