CN107124308A - A kind of tactical data link hierarchical topology method - Google Patents
A kind of tactical data link hierarchical topology method Download PDFInfo
- Publication number
- CN107124308A CN107124308A CN201710293085.0A CN201710293085A CN107124308A CN 107124308 A CN107124308 A CN 107124308A CN 201710293085 A CN201710293085 A CN 201710293085A CN 107124308 A CN107124308 A CN 107124308A
- Authority
- CN
- China
- Prior art keywords
- node
- frequent
- data link
- frequency
- hierarchical
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000000926 separation method Methods 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 6
- 239000000203 mixture Substances 0.000 claims description 4
- 230000011218 segmentation Effects 0.000 claims 1
- 238000004891 communication Methods 0.000 abstract description 5
- 238000004458 analytical method Methods 0.000 abstract description 4
- 230000006855 networking Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000013517 stratification Methods 0.000 description 2
- 235000008331 Pinus X rigitaeda Nutrition 0.000 description 1
- 235000011613 Pinus brutia Nutrition 0.000 description 1
- 241000018646 Pinus brutia Species 0.000 description 1
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000009412 basement excavation Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Tourism & Hospitality (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Algebra (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Pure & Applied Mathematics (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention belongs to communication technical field, a kind of tactical data link hierarchical topology method is particularly related to.It is an object of the invention to:For a class tactical data link of non-stop layer node, in the case of node random distribution, based on Apriori data relation analysis algorithm principles, propose a kind of tactical data link hierarchical topology method for digging, the hierarchical relationship between different nodes is excavated, the hierarchical relationship between different nodes in data link is disclosed.
Description
Technical field
The invention belongs to communication technical field, a kind of tactical data link hierarchical topology method for digging is particularly related to.
Background technology
Tactical data link is typical case application of the data communication in military aspect, and the link of combat data is transmitted with wireless channel
Tactical data link tissue under referred to as tactical data link, battlefield surroundings forms one according to command relation and troop operation feature
Hierarchical network, therefore, for hierarchical network, the research of topological model is the important foundation that Routing Protocol is assessed,
It is to influence the key factor of networking efficiency.The research counted greatly absolutely at present about tactical data link network topology concentrates on movement certainly
In networking (mobile ad hoc network, abbreviation MANET), it is a kind of independent of the wireless of any static infrastructure
Network, there is larger difference compared with tactical data chain network, most all to use section on network topology in the document of network performance
The mode of point random distribution, the characteristics of not embodying stratification, therefore the present invention propose a kind of based on " Apriori data correlations
The generating algorithm of the tactical data link hierarchical topology excavation of analysis ", can embody battlefield surroundings lower node stratification feature, realize
The hierarchical relationship and correlation degree between different nodes are excavated in the case of network node random distribution.
Apriori algorithm is a kind of frequent item set algorithm of Mining Association Rules, and wherein item destination aggregation (mda) is referred to as item collection, item
Element number is concentrated to be referred to as the length of item collection, length is referred to as k- item collections for k item collection, and a support is not less than some threshold value
Item collection is called frequent item set.The core concept of the algorithm is by candidate generation and closing downwards detects two stages to excavate
Frequent item set finds out all frequency collection first, has been widely used the every field such as business, network security.Apriori
Algorithm excavates the correlation degree between correlation degree and project between data using bulk information.Detectd for tactical data link
Examine size of message big, the characteristics of node random distribution, on the basis of the basic priori of reconnaissance, excavate different nodes it
Between correlation degree, disclose the hierarchical relationship between different nodes in data link.
The content of the invention
It is an object of the invention to:For a class tactical data link of non-stop layer node, in the situation of node random distribution
Under, based on Apriori data relation analysis algorithm principles, it is proposed that a kind of tactical data link hierarchical topology method for digging, excavate
The hierarchical relationship gone out between different nodes, discloses the hierarchical relationship between different nodes in data link.
Technical scheme comprises the following steps:
S1, in multi-layer network, be each node distribution time slot, and set minimum support and min confidence;
S2, each node of statistics send the frequency of message, and the node by frequency not less than minimum support constitutes frequent k-1
Item collection;
S3, the frequent k-1 centralized node set to acquisition are scanned counting, count each node set and send message
Frequency, the node by frequency not less than minimum support constitutes frequent k-2 item collections;
S4, the method iteration according to step S2-S3, until obtaining k dimension Frequent Item Sets;
S5, Frequent Item Sets are tieed up according to the k of acquisition, calculate confidence level, subordinate between egress is obtained according to confidence level and is closed
System, obtains the hierarchical relationship between different nodes.
Further, the specific method of the step S2 is:
The time slot of a node is selected from multiple nodes as the condition of separation, so that the transmission for counting each node disappears
The frequency of breath, then the frequent k-1 item collections of node composition by frequency not less than minimum support.
Further, in addition to step:
After S6, the time slot of a node of selection are as separation condition, the section of minimum support is less than for those frequencies
Point, it is impossible to excavate their hierarchical relationship with separation condition again, it is necessary to reduce the hierarchy levels of cut-point and remove ratio
The high node of new spliting node level, goes out not determining subordinate relation node in step s 5 according to step S2-S3 method iteration
Composition k dimension Frequent Item Sets, calculate confidence level and subordinate relation between egress;
S7, repeat step S6 are until draw the hierarchical relationship in whole network between all nodes.
Beneficial effects of the present invention are that the present invention can excavate the hierarchical relationship between the different nodes of topological network, take off
Show the correlation degree between different nodes, method is simple, works well.
Brief description of the drawings
Fig. 1 is 8 node level relationship topology figures;
Fig. 2 ties up the schematic flow sheet of Frequent Item Sets for acquisition k;
Fig. 3 is node A message sequence;
Fig. 4 is the message time sequence figure of 8 nodes;
Fig. 5 is the support of each platform;
Fig. 6 is the frequent k-2 item collections support of candidate;
Fig. 7 is the frequent k-2 item collections confidence level of candidate;
Fig. 8 is platform B-H message time sequence figure;
Fig. 9 is platform B-H support;
Figure 10 is the frequent k-2 item collections support of candidate.
Embodiment
Below in conjunction with the accompanying drawings and example, technical scheme is described in detail:
The present invention mainly proposes that a kind of Data-Link hierarchical topology based on Apriori data relation analysis is excavated, in number
Size of message is scouted according to chain greatly, in the case that Node distribution randomness is big, the priori obtained using Apriori algorithm thought and scouting
Knowledge, excavates the hierarchical relationship between different nodes, discloses the correlation degree between different nodes.
By taking eight platforms in a certain operation cluster as an example:
Assuming that there is the hierarchical topology figure between hierarchical relationship, each node between eight platforms as shown in figure 1, agreement is used
Tactical data link time slot allocation rule, using P responses, while the message of platform must be in the message transmission interval of upper platform
Complete to exchange.
Assuming that I={ A, B, C, D, E, F, G, H } is platform numbering collection, carried out between each node according to network topology structure
" answer-answering " formula is communicated, and the period of reception message is divided into isometric timeslice { t1、t2、t3......tm, each timeslice
Size is δ, and m is the timeslice sum of data receipt time section;Define Ti={ i1、i2、i3......ikBe network in one
Communication pattern, i.e., in timeslice tiMiddle generation communication behavior;
Theoretical according to Apriori algorithm, the model related definition and model used in the present invention is as follows:
Model related definition:
1) correlation rule between definition node
If minimum support is Support (R), min confidence is Confidence (R), when the message sequence between node
The minimum support and min confidence of set are met:
Support(R)≥supmin
Confidence(R)≥confmin
Then there is certain subordinate relation between node.
2) frequent item set is defined
A) frequency that each node sends message is counted, frequency constitutes item collection as frequency not less than the node of minimum support
Numerous k-1 item collections;
B) to second of scanning and counting of carry out of frequent k-1 centralized node set, statistics node sends the frequency of message
Find frequent k-2 item collections;
C) (k-1) successively generated after search iteration according to the step of kth -1 ties up maximum Item Sets and produces k Wei Xuanxiangmuji, obtains
Frequent Item Sets are tieed up to k;As shown in Figure 2;
D) obtain after target k dimension item collections, calculating confidence level obtains the subordinate relation between egress;
(2) model is described:
Assuming that in hierarchical topology figure (such as Fig. 1), being met in minimum support
Support(R)≥supmin
In the case of, finally determine association between node by calculating message sequence set frequent item set min confidence
Degree, as shown in table 1:
Correlation degree between the frequent item set min confidence of table 1 and node
The final goal of model is that the hierarchical topology relation excavated between eight nodes is:
{A->B->C }, { A->B->D }, { C->E }, { C->F }, { D->G }, { D->H}
Based on model as shown in Figure 1, the side of the present invention is explained in further detail with reference to following real data
Case
(1) parameter setting:P=0.8, supmin=0.6, confmin=0.6;
(2) according to tactical data link time slot allocation rule, to eight node distribution time slots.Node A message sequences obey pool
Pine distribution, obtains node A message arrival time (such as Fig. 3) and 8 node messages timing diagrams (such as Fig. 4);
(3) node A-D hierarchical relationships;
A) frequent item set k-1 is found:The condition of separation is used as with the message of A nodes, it is possible to obtain following tables of data 2:
The tables of data that table 2 is obtained with the message of A nodes as the condition of separation
In table 2,1:Represent and send signal 0:Represent no signal;
The frequency of the transmission message of each node is counted, frequent k-1 item collections are obtained:{ { A }, { B }, { C }, { D } }.
B) frequent k-2 item collections are found:
There is { { AB }, { AC }, { AD }, { BC }, { BD }, { CD } } by (a) frequent k-2 item collections that candidate can be obtained, calculate them
Support (such as Fig. 6) and confidence level (such as Fig. 7);Frequent Set is selected in the case where confidence level and support meet condition
{{AB},{BC},{BD}}。
C) frequent k-3 item collections are found:
There are the frequent k-3 item collections of candidate { { ABC }, { ABD } } on the basis of (b).Calculate the support of the frequent k-3 item collections of candidate
Degree and confidence level are as shown in table 3:
The support and confidence level of the frequent k-3 item collections of table 3
Because support and confidence level are all met:
Support(R)≥supmin
Confidence(R)≥confmin
So it is considered that having A- in the hierarchical topology of the Data-Link>B->C and A->B->D relation.
(4) node E-H hierarchical relationships:
Because level is unsatisfactory for than relatively low node in the case of using A time slots as cut-point:
Support(R)≥supmin
So now wanting to obtain the hierarchical relationship of { { E }, { F }, { G }, { H } }, it is necessary to make the hierarchy levels of cut-point
Reduce and remove the node higher than new spliting node level.For example, the time slot of reselection B node is used as time slot dividing point, then
It is accomplished by first removing the gap information of A nodes, it is to avoid the complexity of frequent item set is selected in increase.A gap information is first removed, with
B time slot obtains the time series (such as Fig. 8) of remaining node as time slot dividing point:
A) frequent item set k-1 is found:
The frequency of the transmission message of each node is counted, frequent item set k-1 (such as Fig. 9) is obtained:{ B }, { C }, { D }, { E },
{ F }, { G }, { H } };
B) frequent item set k-2 is found:
The support for knowing all platforms by (a) is all met in the requirement of minimum support, and first time solution procedure
Node B and node CD relation are tried to achieve, so the relation of B node and node CD can not be sought during current iteration, is obtained
Curve map (such as Fig. 9).As can be seen from Figure 9 { CE }, { CF }, { DG }, the support of { DH } meet condition so will { CE },
{ CF }, { DG }, { DH } } it is used as the frequent k-2 item collections of candidate.Obtained confidence level such as table 4 below:
The frequent k-2 item collections confidence level of table 4
Subordinate relation | Confidence level |
{C->E} | 0.6875 |
{C->F} | 0.675 |
{D->G} | 0.654 |
{D->H} | 0.667 |
Because support and confidence level are all met:
Support(R)≥supmin
Confidence(R)≥confmin
Confidence level meets condition as can be seen from the table, that is, there is hierarchical relationship { C->E }, { C->F }, { D->G }, { D->
H}。
Verify whether result of calculation is correct:
It is strong and weak as shown in table 5 by calculating the subordinate relation between each node:
Subordinate relation between each node of table 5 is strong and weak
Subordinate relation | Confidence level |
{AB->C} | 0.8682 |
{AB->D} | 0.7984 |
{C->E} | 0.6875 |
{C->F} | 0.675 |
{D->G} | 0.654 |
{D->H} | 0.667 |
The residing level in hierarchical topology figure is substantially can be seen that from curve map 7 higher, k-1, k-2 item collection supports
It is higher;More close two nodes (such as AB, BC) in hierarchical topology, confidence level is higher;Confidence level reflects correlation rule
Power, confidence level is higher, and subordinate relation is more obvious.When two node astride hierarchies (such as:AC), confidence level declines and works as node on the contrary
The networking under specific protocol, then message may downwards be transmitted along the side in topological diagram, forms belong to the collection in time
The message sequence set of group, because response and the transmission of message have certain probability P, result in closest on hierarchical relationship
Node correlation degree Support highests, the degree of association Support between level reduces therewith, and this also complies with actual operation
Situation.
Claims (3)
1. a kind of tactical data link hierarchical topology method, comprises the following steps:
S1, in multi-layer network, be each node distribution time slot, and set minimum support;
S2, each node of statistics send the frequency of message, and the node by frequency not less than minimum support constitutes frequent k-1
Collection;
S3, the frequent k-1 centralized node set to acquisition are scanned counting, count the frequency that each node set sends message
Rate, the node by frequency not less than minimum support constitutes frequent k-2 item collections;
S4, the method iteration according to step S2-S3, until obtaining k dimension Frequent Item Sets;
S5, according to the k of acquisition tie up Frequent Item Sets, calculate confidence level, the subordinate relation between egress is obtained according to confidence level, is obtained
Obtain the hierarchical relationship between different nodes.
2. a kind of tactical data link hierarchical topology method according to claim 1, it is characterised in that the tool of the step S2
Body method is:
The time slot of a node is selected from multiple nodes as the condition of separation, so that count the transmission message of each node
Frequency, then the frequent k-1 item collections of node composition by frequency not less than minimum support.
3. a kind of tactical data link hierarchical topology method according to claim 2, it is characterised in that also including step:
After S6, the time slot of a node of selection are as separation condition, the node of minimum support, nothing are less than for those frequencies
Method excavates their hierarchical relationship with separation condition again, it is necessary to the hierarchy levels of cut-point is reduced and is removed than new segmentation
The high node of node level, goes out not determining the composition k of subordinate relation node in step s 5 according to step S2-S3 method iteration
Frequent Item Sets are tieed up, confidence level is calculated and obtains the subordinate relation between egress;
S7, repeat step S6 are until draw the hierarchical relationship in whole network between all nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710293085.0A CN107124308B (en) | 2017-04-28 | 2017-04-28 | A kind of tactical data link hierarchical topology method for digging |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710293085.0A CN107124308B (en) | 2017-04-28 | 2017-04-28 | A kind of tactical data link hierarchical topology method for digging |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107124308A true CN107124308A (en) | 2017-09-01 |
CN107124308B CN107124308B (en) | 2019-09-13 |
Family
ID=59726449
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710293085.0A Active CN107124308B (en) | 2017-04-28 | 2017-04-28 | A kind of tactical data link hierarchical topology method for digging |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107124308B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110457540A (en) * | 2019-06-28 | 2019-11-15 | 卓尔智联(武汉)研究院有限公司 | Querying method, service platform, terminal device and the storage medium of data |
CN115203480A (en) * | 2022-05-10 | 2022-10-18 | 中国人民解放军91977部队 | Target group formation membership mining method based on deep correlation analysis |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103914528A (en) * | 2014-03-28 | 2014-07-09 | 南京邮电大学 | Parallelizing method of association analytical algorithm |
CN104809665A (en) * | 2015-05-14 | 2015-07-29 | 国家电网公司 | Distribution network early-warning method based on improved Apriori algorithm |
EP3273652A1 (en) * | 2011-10-17 | 2018-01-24 | Telcordia Technologies, Inc. | Open communication method in a heterogeneous network |
-
2017
- 2017-04-28 CN CN201710293085.0A patent/CN107124308B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3273652A1 (en) * | 2011-10-17 | 2018-01-24 | Telcordia Technologies, Inc. | Open communication method in a heterogeneous network |
CN103914528A (en) * | 2014-03-28 | 2014-07-09 | 南京邮电大学 | Parallelizing method of association analytical algorithm |
CN104809665A (en) * | 2015-05-14 | 2015-07-29 | 国家电网公司 | Distribution network early-warning method based on improved Apriori algorithm |
Non-Patent Citations (1)
Title |
---|
周发超等: "关联规则挖掘算法Apriori的研究改进", 《计算机科学与探索》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110457540A (en) * | 2019-06-28 | 2019-11-15 | 卓尔智联(武汉)研究院有限公司 | Querying method, service platform, terminal device and the storage medium of data |
CN110457540B (en) * | 2019-06-28 | 2020-07-14 | 卓尔智联(武汉)研究院有限公司 | Data query method, service platform, terminal device and storage medium |
CN115203480A (en) * | 2022-05-10 | 2022-10-18 | 中国人民解放军91977部队 | Target group formation membership mining method based on deep correlation analysis |
Also Published As
Publication number | Publication date |
---|---|
CN107124308B (en) | 2019-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Miyao et al. | LTRT: An efficient and reliable topology control algorithm for ad-hoc networks | |
Nocetti et al. | Connectivity based k-hop clustering in wireless networks | |
Wu et al. | Constructing k-connected m-dominating sets in wireless sensor networks | |
Li et al. | LocalCom: a community-based epidemic forwarding scheme in disruption-tolerant networks | |
CN103647714A (en) | Social energy-based mobile social delay-tolerant network routing method | |
Voulkidis et al. | Energy efficiency in wireless sensor networks: A game-theoretic approach based on coalition formation | |
CN113422695A (en) | Optimization method for improving robustness of topological structure of Internet of things | |
CN107124308B (en) | A kind of tactical data link hierarchical topology method for digging | |
CN109033636A (en) | Link layer access mechanism analysis method based on the blind analysis of link layer bit stream | |
Ayinde et al. | Differential evolution based deployment of wireless sensor networks | |
Qiu et al. | Robustness Optimization for IoT Topology | |
Godi et al. | Border Collie optimization algorithm‐based node clustering technique in vehicular ad hoc networks | |
Gupta et al. | Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks | |
Zhang et al. | K-barrier coverage in wireless sensor networks based on immune particle swarm optimisation | |
Hou et al. | Novel routing algorithms in space information networks based on timeliness-aware data mining and time-space graph | |
Montemanni et al. | Models and algorithms for the MPSCP: an overview | |
Ahmad et al. | A reliability calculations model for large-scale MANETs | |
CN107257565A (en) | Wireless sensor network reliability calculation method based on energy and transmission | |
Ortiz et al. | Smart routing mechanism for green ZigBee-based wireless sensor networks | |
Tsianos et al. | Multiscale gossip for efficient decentralized averaging in wireless packet networks | |
Huang et al. | Efficient and robust query processing for mobile wireless sensor networks | |
Zhang et al. | An efficient group partition prediction scheme for manets | |
Munadi et al. | Location management cost reduction using fuzzy logic in cellular radio network | |
Yu-Tong | Retracted: Research of Computer Network Data Transmission Routing Method | |
Pari et al. | Requisite trust-based secure routing protocol for MANETs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |