CN101854693A - Method for calculating route stability applied to mobile ah hoc network - Google Patents

Method for calculating route stability applied to mobile ah hoc network Download PDF

Info

Publication number
CN101854693A
CN101854693A CN 201010179800 CN201010179800A CN101854693A CN 101854693 A CN101854693 A CN 101854693A CN 201010179800 CN201010179800 CN 201010179800 CN 201010179800 A CN201010179800 A CN 201010179800A CN 101854693 A CN101854693 A CN 101854693A
Authority
CN
China
Prior art keywords
stability
correlation
link
probability
incident
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201010179800
Other languages
Chinese (zh)
Inventor
张晖
杨龙祥
朱洪波
董育宁
赵海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Southeast University
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University, Nanjing Post and Telecommunication University filed Critical Southeast University
Priority to CN 201010179800 priority Critical patent/CN101854693A/en
Publication of CN101854693A publication Critical patent/CN101854693A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for calculating route stability which is applied to a mobile ah hoc network. The method comprises the following steps of: firstly, describing degree of correlation between adjacent links by introducing a related factor, exporting five basic properties which shall be met by the related factor by analyzing correlationship between stable events of the two adjacent links to define intension of the related factor correctly; secondly, decomposing the probability of combined stability of the two adjacent links, namely subpath stability, into the stable marginal probability of each link, namely a correlation structure between the stability of each link and the stable events of the two adjacent links similar to Copula function; thirdly, approximately estimating the related factor through improved Kendall related coefficient, so that occurrence of the related factor is obtained in a physical network by a method for counting a sample sequence; and finally, obtaining a calculation formula of the stability of a whole path. The method can calculate the route stability by combining the method for calculating the stability of any single link, so that the method has great universality.

Description

Be applied to the route stability computational methods of mobile ad-hoc network
Technical field
The invention belongs to the cordless communication network technical field, particularly the route stability computational methods of mobile ad-hoc network.
Background technology
Mobile Ad Hoc network (being mobile ad-hoc network) is a kind of special mobile radio networks, no center control nodes, communication between the node often needs the forwarding of intermediate node could realize (multi-hop route), and the mobile meeting of the quick random of node causes the frequent variations of network topology structure, thereby causes regular heavy-route operation.In Ad hoc network, select the route of stability high (longevity) to ensure it is crucial, can reduce various unnecessary cost (as time-delay, bandwidth, power etc.) that heavy-route number of times and heavy-route cause and the life period that increases route so effectively for the QoS that end-to-end communication is provided.In recent years, continue to bring out, become the focus of current research based on the QoS routing algorithm (stablizing routing algorithm) of stability.In various stable routing algorithm, it is the most basic foundation of Route Selection that the stability in path is estimated, and its accuracy depends on the stable validity of estimating of single link and the accuracy of path stability computational methods.The stability of single link can be estimated to draw from various existing mobility models.And path stability computational methods accurately whether, determined whether the stability of entire path accurate, will greatly influence the performance of routing algorithm.
Great majority all adopt the path stability computational methods of following two quasi-traditions based on the QoS routing algorithm of stability at present:
(1) based on the method for link independence assumption: promptly suppose in the path separately between each link, the form of taking advantage of by each link stability connection is calculated the stability of entire path.
(2) the most weak link criterion method: with the stability of the most weak in the path (stability minimum) link stability as this path.
Yet above two class computational methods are not all considered the correlation between the link, and differ far away with the network condition of reality, can not accurately reflect actual path stable case.In fact, whether the existence of each Radio Link has certain correlation in mobile Ad hoc network.For example, as node n a, n bBetween have under the situation of link node n a, n cBetween the existence of link make node n b, n cBetween exist link more likely.This is because node n b, n cAll at n aOne jump the scope that has limited two node random distribution in the neighborhood.Therefore, the computational methods of considering the link correlation have caused some concerns: if any method utilize the correlation between the link to draw the enclosed type expression formula of calculating the route availability; The method that has takes advantage of form to be similar to the real path of replacement stability with a connection that is similar to independence assumption, wherein joins the factor of taking advantage of and is converted to by iterative algorithm by each link stability.Yet above method is too complicated again and impracticable.
For this reason, the present invention proposes a kind of new path stability computational methods that are applied to mobile ad-hoc network.
Summary of the invention
Technical problem: the path stability computational methods that the objective of the invention is to propose a kind of new mobile ad-hoc network.This method had both been considered the correlation between the link, calculating path stability exactly, fairly simple and be suitable for application on mathematics again, solved the computational methods of current this respect or too simple and be not inconsistent preferably with the real network situation, otherwise too complicated and be difficult to practical difficult situation.And the present invention's calculating path stability that both can combine with any single link stability computational methods has very big versatility; Can easily be applied to arbitrary distance vector routing protocol again and select to stablize route, have good application prospects.
Technical scheme: as shown in Figure 1, (loop-free) path R in the mobile Ad hoc network is by m+1 node (n i, i=0,1 ..., m) (in order) m bar adjacent link (l of being linked to be in succession i, i=1,2 ..., m) form.And formed m-1 single sub path (r in succession with uplink i, i=1,2 ..., m-1).L wherein iCorresponding to node to (n I-1, n i), r iCorresponding to adjacent link (l i, l I+1).
If probability space (Ω, F, P), A i∈ F, i=1,2..., m.Wherein Ω is a sample space, and F is a field of events, and P is the probability measure on the F, A iExpression link l iStable incident, and its probability P i=P (A i) supposition known (can obtain by any link stability computational methods).Have only when all links of forming path R and stablize, path R could stablize.Therefore the stable representations of events of path R is
Figure GSA00000138294500021
Then its probability of stability can be expressed as:
P R = P ( Π i = 1 m A i ) = P ( A 1 ) × P ( A 2 / A 1 ) × P ( A 3 / A 1 A 2 ) . . . P ( A m / A 1 . . . A m - 1 ) - - - ( 1 )
In mobile Ad hoc network, that each node can be considered to independently is individual (speed, the direction of motion, position etc. that show as each node are separate).Therefore, two do not have the link of common points separate.It is relevant that two links of (common points is arranged) that the stable incident of arbitrary link only is adjacent in the R of path are stablized incident, has nothing to do and stablize incident with other link.Like this,
P R = P ( A 1 ) × P ( A 2 / A 1 ) × P ( A 3 / A 2 ) . . . P ( A m / A m - 1 )
= P 1 × P ( A 2 A 1 ) P 1 × P ( A 3 A 2 ) P 2 . . . P ( A m A m - 1 ) P m - 1 - - - ( 2 )
If under the separate assumed condition of link, the probability of stability of path R can be expressed as:
P R LIAM = P 1 × P 2 × . . . P m - - - ( 3 )
If adopt the most weak link criterion, the probability of stability of path R can be expressed as:
P R WLR = min { P i , i = 1,2 . . . m } - - - ( 4 )
By preceding definition as can be known, subpath r iStable incident is A iA I+1, its probability of stability is P (A iA I+1), and 0≤P (A iA I+1)≤min{P i, P I+1.For trying to achieve the probability of stability of subpath ri, first analysis incident A iAnd A I+1Correlation.Definition correlation factor ρ iRepresent the complementary degree of two incidents.By analyzing ρ as can be known iMust satisfy following fundamental property: 1) as P (A iA I+1)=min{P i, P I+1, i.e. the appearance of small probability event, then ρ are depended in the appearance of big probability event fully i=1.2) as P (A iA I+1)=P iP I+1, promptly two incidents are separate, then ρ i=0.3) as P (A iA I+1)=0, i.e. two incident objectionable intermingling, then ρ i=-1.4) as P (A iA I+1)>P iP I+1, ρ then i>0 i.e. appearance of the two incidents characteristic that is proportionate.5) as P (A iA I+1)<P iP I+1, ρ then i<0 i.e. appearance of two incidents is the negative correlation characteristic.Can get thus-1≤ρ i≤ 1.
For trying to achieve A iWith A I+1Joint probability, at first introducing Sklar theorem: H is a l dimension joint distribution function, F 1..., F lBe its marginal distribution function, must have a Copula function so, make:
H(z 1,…,z l)=C(F 1(z 1),…,F l(z l)) (5)
Wherein C () represents the Copula function.If marginal distribution function F 1..., F lBe continuous, C () is exactly unique so; If F 1..., F lBe not continuous entirely, C () is unique no longer just so.By the Sklar theorem as can be seen, continuous multivariate joint probability distribution function can be divided into one dimension marginal distribution function and multidimensional correlation structure two parts, and wherein correlation structure is represented by the Copula function.
Inspired by the Sklar theorem, with A iWith A I+1The probability of product event (subpath r iThe probability of stability) be divided into their marginal probability (probability of each incident) and the correlation structure (being similar to the Copula function) of two incidents.
P r i = P ( A i A i + 1 ) = f i ( ρ i ) × min { P ( A i ) , P ( A i + 1 ) } = f i ( ρ i ) × min { P i , P i + 1 } , - 1 ≤ ρ i ≤ 1 - - - ( 6 )
Wherein, 0≤f ii)≤1 presentation of events A iAnd A I+1Correlation structure.By ρ iFundamental property as can be known, f ii) (1,1) excessively, (0, max (P i, P I+1)) and (1,0) 3 points, and be ρ iMonotonically increasing function.Now provide f ii) be ρ iThe proof of monotonically increasing function as follows:
Be without loss of generality, establish P i≤ P I+1Therefore, min{P i, P I+1}=P iGet f by formula (6) ii)=P (A I+1/ A i).According to ρ iDefinition and fundamental property as can be known: as 0≤ρ i≤ 1 o'clock, ρ iIncrease and mean incident A iGeneration to incident A I+1The positive influences (positive correlation) that take place increase, then f ii)=P (A I+1/ A i) increase.As-1≤ρ i≤ 0 o'clock, ρ iIncrease and mean incident A iGeneration to incident A I+1The negative effect (negative correlation) that takes place reduces, then f ii)=P (A I+1/ A i) increase.And work as ρ i=0, f ii)=P I+1Getting unique value (is f ii) point (0, P I+1) continuously).Problem must be demonstrate,proved thus.
f ii) can obtain by interpolation method: according to existing condition and with various interpolation methods commonly used (as Lagrange, Newton, Hermits and cubic spline interpolation etc.) relatively, select simple hyperbolic function as interpolating function below:
f ii)=(a 1ρ i+a 2)/(a 3ρ i+1),-1≤ρ i≤1 (7)
With f ii) the each point substitution formula (7) of crossing, alignment equation group and finding the solution obtains: a 1=a 2=max{P i, P I+1, a 3=2 * max{P i, P I+1}-1.Can get thus,
f ii)=(max{P i,P i+1}×ρ i+max{P i,P i+1})/((2×max{P i,P i+1}-1)ρ i+1) (8)
This hyperbolic function has monotonically increasing character, and simple and unified form has satisfied f with one for it ii) every requirement.Providing its monotonically increasing below proves:
If-1≤ρ ' i<ρ " i≤ 1, and 0≤max{P i, P I+1}≤1 item
f i ( ρ i ′ ) - f i ( ρ i ′ ′ ) = 2 × max { P i , P i + 1 } ( 1 - max { P i , P u + 1 } ) ( ρ i ′ - ρ i ′ ′ ) ( ( 2 × max { P i , P i + 1 } - 1 ) ρ i ′ + 1 ) ( ( 2 × max { P i , P i + 1 } - 1 ) ρ i ′ ′ + 1 ) ≤ 0 .
Problem must be demonstrate,proved thus.
Yet for trying to achieve subpath r iThe probability of stability, also need obtain ρ iOccurrence.In fact, ρ iOccurrence and non-availability, now adopt a kind of coefficient correlation τ i(improved Kendall coefficient correlation) is similar to ρ iIf the stability on the F indicates stochastic variable X i, X I+1,
Figure GSA00000138294500041
Figure GSA00000138294500042
Obviously, X i, X I+1Correlation and incident A iAnd A I+1Correlation (ρ i) essential connection arranged.And the Kendall coefficient correlation can be described X well i, X I+1Between correlation.If (X i, X I+1) measured value (sample) sequence be (X i(k), X I+1(k)), 1≤k≤N, k represent different sampling times, and N is a total sample number.Make sign=(X i(k1)-X i(k2)) * (X I+1(k1)-X I+1(k2)), 1≤k1<k2≤N.If sign>0, then (X i(k1), X I+1(k1)), (X i(k2), X I+1(k2)) be positive correlation (harmony); If sign<0, then (X i(k1), X I+1(k1)), (X i(k2), X I+1(k2)) be negative correlation (discordant).Order
I k 1 , k 2 = 1 if sign > 0 0 if sign &le; 0 , I k 1 , k 2 &prime; = 1 if sign < 0 0 if sign &GreaterEqual; 0 , c = &Sigma; 1 &le; k 1 < k 2 &le; N I k 1 , k 2 , d = &Sigma; 1 &le; k 1 < k 2 &le; N I k 1 , k 2 &prime; .
Therefore, c represents harmonious with number, and d represents to be discord to number.Then define τ iFor:
&tau; i = c - d c + d - - - ( 9 )
In fact, τ iBe more or less the same with the definition of Kendall coefficient correlation, can regard improved Kendall coefficient correlation as.So τ iEqually X can be described well i, X I+1Between correlation, and then reflect incident A preferably iAnd A I+1Correlation (ρ i).Through proof as can be known, when total sample number N is tending towards infinite, τ iSatisfy correlation factor ρ fully iFundamental property.Therefore, τ in this case iWith ρ iBe of equal value.Its proof is as follows:
X i(k1), X i(k2) be X iSample value, so they can be considered to separate and and X iWith the stochastic variable that distributes.In like manner, X I+1(k1), X I+1(k2) can be considered to separate and and X I+1With the stochastic variable that distributes.Obviously, X i(k1) and X I+1(k2) be independently; X i(k2) and X I+1(k1) also be independently.By the front definition as can be known, if sign>0 then must be one of following situation: (i) X i(k1)=1, X i(k2)=0, X I+1(k1)=1, X I+1(k2)=0; (ii) X i(k1)=0, X i(k2)=1, X I+1(k1)=0, X I+1(k2)=1.If sign<0, then must be one of following situation: (iii) X i(k1)=1, X i(k2)=0, X I+1(k1)=0, X I+1(k2)=1; (iv) X i(k1)=0, X i(k2)=1, X I+1(k1)=1, X I+1(k2)=0.Therefore,
P ( sign > 0 ) = P ( X i ( k 1 ) ) = 1 , X i ( k 2 ) = 0 , X i + 1 ( k 1 ) = 1 , X i + 1 ( k 2 ) = 0 ) +
P ( X i ( k 1 ) ) = 0 , X i ( k 2 ) = 1 , X i + 1 ( k 1 ) = 0 , X i + 1 ( k 2 ) = 1 ) .
= 2 &times; P ( A &OverBar; i A &OverBar; i + 1 ) P ( A i A i + 1 )
In like manner,
Figure GSA000001382945000411
In addition, when certain incident total sample number is tending towards infinite,
The frequency that this incident occurs converges on its probability.Therefore can get:
Figure GSA00000138294500051
Figure GSA00000138294500052
N (N-1)/2 gets the sum (number that comprises sign=0) of various values for sign.Below according to ρ iFundamental property proved one by one.
Character 1) be without loss of generality, establish P i≤ P I+1As P (A iA I+1)=min{P i, P I+1The time, P (sign>0)=2 * P i* (1-P I+1)>0 (P i≠ 0, P I+1≠ 1), P (sign<0)=0.When total sample number N → ∞, c>>d, therefore
Figure GSA00000138294500053
Character 2) as P (A iA I+1)=P iP I+1The time, P (sign>0)=2 * P iP I+1(1-P i) (1-P I+1), in like manner, P (sign<0)=2 * P iP I+1(1-P i) (1-P I+1), so P (sign>0)=P (sign<0).When total sample number N → ∞, c=d, therefore
Figure GSA00000138294500054
Character 3) demonstration congeniality 1), can get lim N &RightArrow; &infin; c - d c + d = - 1 .
Character 4) with character 5) as P (A iA I+1) when increasing,
Figure GSA00000138294500056
Increase,
Figure GSA00000138294500057
With
Figure GSA00000138294500058
Reduce.Therefore, P (sign>0) increases, and P (sign<0) reduces.When total sample number N → ∞, c increases, and d reduces, therefore
Figure GSA00000138294500059
Increase promptly
Figure GSA000001382945000510
Be P (A iA I+1) monotonically increasing function.Demonstrate,proving in conjunction with the front can proper P (A iA I+1)>P (A i) P (A I+1),
Figure GSA000001382945000511
As P (A iA I+1)<P (A i) P (A I+1),
Figure GSA000001382945000512
Problem must be demonstrate,proved thus.
Yet actual central N can only get finite value.Therefore, ρ iCan only use τ iApproximate representation is promptly:
&rho; i &cong; &tau; i - - - ( 10 )
In conjunction with formula (2), formula (6), formula (8), formula (9) and formula (10), can try to achieve the probability of stability of entire path R.
P R = P 1 &times; f 1 ( &rho; 1 ) &times; min { P 1 , P 2 } P 1 . . . f m - 1 ( &rho; m - 1 ) &times; min { P m - 1 , P m } P m - 1 - - - ( 11 )
Innovative point of the present invention is as follows:
1) the present invention promptly is applied to the route stability computational methods of mobile ad-hoc network, its feature at first is to introduce correlation factor and describes degree of correlation between the adjacent link, and then the correlation structure between the structure link, obtain adjacent link and unite stable probability (subpath stability), thereby draw the stability of entire path.
2) according to any two link correlations in the mobile Ad hoc network, the entire path stability is decomposed into the stability of respectively forming subpath and the relational expression between the stability of respectively forming link, thereby has rationally simplified the complexity of path stability computing formula.
3), derive five fundamental propertys that correlation factor should satisfy, thereby accurately defined the intension of correlation factor by the dependency relation between the stable incident of analyzing adjacent two links.
4) according to the Sklar theorem, two links that the associating probability of stability of adjacent two links (subpath stability) is broken down into the stable marginal probability of each link (stability of each link) and is similar to the Copula function are stablized the correlation structure between the incident.According to the fundamental property of correlation factor, this correlation structure can obtain according to simple hyperbola interpolating function.
5) come the approximate evaluation correlation factor by improving the Kendall coefficient correlation, thereby can utilize the method for statistical sample sequence in real network, to obtain the occurrence of correlation factor.Improved Kendall coefficient correlation can reflect preferably that adjacent two links stablize the correlation between the incident; When total sample number was tending towards infinite, improved Kendall coefficient correlation satisfied the fundamental property of correlation factor fully.
Beneficial effect:
1) the present invention had both considered the correlation between the link, calculating path stability exactly, fairly simple and be suitable for application on mathematics again, solved the computational methods of current this respect or too simple and be not inconsistent preferably with the real network situation, otherwise too complicated and be difficult to practical difficult situation.
2) the present invention's calculating path stability that can combine with any single link stability computational methods has very big versatility.
3) the present invention can easily be applied to arbitrary distance vector routing protocol and selects to stablize route, has good application prospects.
Description of drawings
Fig. 1 is a path R schematic diagram.
Fig. 2 arrives destination node D route requests process schematic diagram for source node S.
Fig. 3 is the path stability computational methods flow chart that is applied to mobile ad-hoc network.
Embodiment
The first step: set up network topology, the initialization network environment.
Second step: select a certain link stability computational methods, utilize selected method, each node of network calculates the stability of forming link with neighbor node.For example, utilize histogram method, each network node can be jumped broadcast packet (as the hello message in the AODV agreement) statistics becomes link with other each groups of nodes life time and corresponding number of times by one.And calculate the link stability according to following formula:
Figure GSA00000138294500061
H wherein dFor its life time of a certain link is the d number of times of second, g is the current age of this link, and T=2s is set.
Need to prove that the embodiment of the invention just illustrates calculating the link stability with histogram method, but is not limited to this, also can adopt other link stability computational methods.
The 3rd step: each mobile node periodically sends one and jumps broadcast packet and receive the jumping broadcast packet that neighbor node sends.One jumps broadcast packet makes each node can add up the information that other node entered or left one jumping communication range in time, and then the stability of acquisition and respective nodes composition link indicates stochastic variable (X i) sample sequence.
The 4th step: as shown in Figure 2, if when source node S need calculate the stability of route of destination node D, S is just to all neighbor nodes broadcasting routing request packet (wrapping as the RREQ in the AODV agreement).Make routing request packet comprise following territory: sample sequence Samseq, current path stability Cpath, upstream link stability Clink.
The 5th step: when the first hop node A when source node S is received this routing request packet, the stability that at first Samseq is initialized as link S → A indicates the stochastic variable sample sequence, and, transmit this bag then with the stability that Cpath and Clink are initialized as link S → A.
The 6th step: when the second hop node B in downstream when node A receives routing request packet, at first utilize the stability sign stochastic variable sample sequence of node A and B and the Samseq in the routing request packet, and according to the improved Kendall coefficient correlation (τ of formula (9) calculating corresponding to subpath S → B i), calculate the stability of current path S → B and Cpath is updated to this stability according to formula (8), (10) and (11) then, the stability that then Samseq is updated to link A → B indicates the stochastic variable sample sequence, at last Clink is updated to the stability of link A → B and transmits this routing request packet.
The 7th step: after each hop node of downstream is received this routing request packet, six operations set by step.Finally, when destination node D receives routing request packet, just can calculate the stability of entire path S → D.
More than a kind of path stability computational methods that the embodiment of the invention provided are described in detail, for one of ordinary skill in the art, thought according to the embodiment of the invention, part in specific embodiments and applications all can change, in sum, this description should not be construed as limitation of the present invention.
The path stability computational methods flow chart that the present invention promptly is applied to mobile ad-hoc network as shown in Figure 3.

Claims (4)

1. path stability computational methods that are applied to mobile ad-hoc network, it is characterized in that: at first, introduce correlation factor and describe degree of correlation between the adjacent link, by the dependency relation between the stable incident of analyzing adjacent two links, derive five fundamental propertys that correlation factor should satisfy, thereby accurately defined the intension of correlation factor, secondly, according to the Sklar theorem, be that to be decomposed into the stable marginal probability of each link be that the stability of each link and two links that are similar to the Copula function are stablized the correlation structure between the incident to the subpath stability with the associating probability of stability of adjacent two links; Once more, come the approximate evaluation correlation factor, thereby can utilize the method for statistical sample sequence in real network, to obtain the occurrence of correlation factor by improved Kendall coefficient correlation; Finally, draw the stability computing formula of entire path R:
Figure FSA00000138294400011
Be specially:
According to any two link correlations in the mobile Ad hoc network, the entire path stability is decomposed into the stability of respectively forming subpath and the relational expression between the stability of respectively forming link, thereby rationally simplifies the complexity of path stability computing formula; In mobile Ad hoc network, it is individual that each node can be considered to independently, and the speed, the direction of motion, position etc. that promptly show as each node are separate, and therefore, two do not have the link of common points separate; It is relevant that two links with common points that the stable incident of arbitrary link only is adjacent in the R of path are stablized incident, has nothing to do and stablize incident with other link; Therefore, the stability with entire path can be expressed as:
Figure FSA00000138294400013
Wherein R represents a loop-free path, by m+1 node n i, the m bar adjacent link l that is linked to be in succession iForm l iCorresponding to node to (n I-1, n i), A iExpression link l iStable incident, A i∈ F, i=1,2..., m, F are field of events, P is the probability measure on the F, and P i=P (A i), i=1,2 ... m.
2. the path stability computational methods of mobile ad-hoc network according to claim 1, it is characterized in that described introducing correlation factor describes degree of correlation between the adjacent link, by the dependency relation between the stable incident of analyzing adjacent two links, derive five fundamental propertys that correlation factor should satisfy, thereby accurately defined the intension of correlation factor; If adjacent link (l i, l I+1) formed subpath r i, subpath r iStable incident is A iA I+1, its probability of stability is P (A iA I+1), and 0≤P (A iA I+1)≤min{P i, P I+1; For trying to achieve subpath r iThe probability of stability, first analysis incident A iAnd A I+1Correlation; Definition correlation factor ρ iRepresent the complementary degree of two incidents; ρ iMust satisfy following five fundamental propertys:
1) as P (A iA I+1)=min{P i, P I+1, i.e. the appearance of small probability event, then ρ are depended in the appearance of big probability event fully i=1;
2) as P (A iA I+1)=P iP I+1, promptly two incidents are separate, then ρ i=0;
3) as P (A iA I+1)=0, i.e. two incident objectionable intermingling, then ρ i=-1;
4) as P (A iA I+1)>P iP I+1, ρ then i>0 i.e. appearance of the two incidents characteristic that is proportionate;
5) as P (A iA I+1)<P iP I+1, ρ then i<0 i.e. appearance of two incidents is the negative correlation characteristic;
Can get thus-1≤ρ i≤ 1.
3. the path stability computational methods of mobile ad-hoc network according to claim 1, it is characterized in that the theorem according to Sklar, is that to be decomposed into the stable marginal probability of each link be that the stability of each link and two links that are similar to the Copula function are stablized the correlation structure between the incident to the subpath stability with the associating probability of stability of adjacent two links; According to the fundamental property of correlation factor, this correlation structure can obtain according to simple hyperbola interpolating function; Inspired by the Sklar theorem, with A iWith A I+1The probability of product event is subpath r iThe probability of stability marginal probability that is divided into them be the probability of each incident and the correlation structure that is similar to two incidents of Copula function;
Figure FSA00000138294400021
,-1≤ρ i≤ 1, wherein, 0≤f ii)≤1 presentation of events A iAnd A I+1Correlation structure; By ρ iFundamental property as can be known, f ii) (1,1) excessively, (0, max (P i, P I+1)) and (1,0) 3 points, and be ρ iMonotonically increasing function; Therefore, f ii) can obtain by interpolation method, select simple hyperbolic function as interpolating function: f ii)=(a 1ρ i+ a 2)/(a 3ρ i+ 1) ,-1≤ρ i≤ 1.With f ii) the each point substitution following formula of crossing, the alignment equation group is also found the solution and can be got f ii)=(max{P i, P I+1} * ρ i+ max{P i, P I+1)/((2 * max{P i, P I+1}-1) ρ i+ 1); This hyperbolic function has monotonically increasing character, and simple and unified form has satisfied f with one for it ii) every requirement.
4. the path stability computational methods of mobile ad-hoc network according to claim 1, it is characterized in that coming the approximate evaluation correlation factor, thereby can utilize the method for statistical sample sequence in real network, to obtain the occurrence of correlation factor by improved Kendall coefficient correlation; For trying to achieve subpath r iThe probability of stability, also need obtain ρ iOccurrence, in fact, ρ iOccurrence and non-availability, adopt a kind of improved Kendall coefficient correlation coefficient τ iApproximate ρ i, the stability of establishing on the F indicates stochastic variable
Figure FSA00000138294400022
Figure FSA00000138294400023
Obviously, X i, X I+1Correlation and incident A iAnd A I+1Correlation ρ iEssential connection is arranged, and X can be described well the Kendall coefficient correlation i, X I+1Between correlation; If (X i, X I+1) sample sequence be (X i(k), X I+1(k)), 1≤k≤N, k represent different sampling times, and N is a total sample number, make sign=(X i(k1)-X i(k2)) * (X I+1(k1)-X I+1(k2)), 1≤k1<k2≤N; If sign>0, then (X i(k1), X I+1(k1)), (X i(k2), X I+1(k2)) be harmonious; If sign<0, then (X i(k1), X I+1(k1)), (X i(k2), X I+1(k2)) be discordant, order
I k 1 , k 2 = 1 if sign > 0 0 if sign &le; 0 , I k 1 , k 2 &prime; = 1 if sign < 0 0 if sign &GreaterEqual; 0 , c = &Sigma; 1 &le; k 1 < k 2 &le; N I k 1 , k 2 , d = &Sigma; 1 &le; k 1 < k 2 &le; N I k 1 , k 2 &prime; ;
Therefore, c represents harmonious with number, and d represents to be discord to number.Then define τ iFor: In fact, τ iBe more or less the same with the definition of Kendall coefficient correlation, can regard improved Kendall coefficient correlation as, so τ iEqually X can be described well i, X I+1Between correlation, and then reflect incident A preferably iAnd A I+1Correlation ρ i, through proof as can be known, when total sample number N is tending towards infinite, τ iSatisfy correlation factor ρ fully iFundamental property, therefore, τ in this case iWith ρ iBe of equal value, yet actual central N can only get finite value, therefore, ρ iCan only use τ iApproximate representation is promptly:
Figure FSA00000138294400032
CN 201010179800 2010-05-21 2010-05-21 Method for calculating route stability applied to mobile ah hoc network Pending CN101854693A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201010179800 CN101854693A (en) 2010-05-21 2010-05-21 Method for calculating route stability applied to mobile ah hoc network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201010179800 CN101854693A (en) 2010-05-21 2010-05-21 Method for calculating route stability applied to mobile ah hoc network

Publications (1)

Publication Number Publication Date
CN101854693A true CN101854693A (en) 2010-10-06

Family

ID=42805894

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201010179800 Pending CN101854693A (en) 2010-05-21 2010-05-21 Method for calculating route stability applied to mobile ah hoc network

Country Status (1)

Country Link
CN (1) CN101854693A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102131269A (en) * 2011-04-29 2011-07-20 南京邮电大学 Geographical-position-based routing method in wireless mesh network
CN104869605A (en) * 2015-03-10 2015-08-26 重庆邮电大学 Emergency communication-based AODV route stability algorithm improvement method
CN105490939A (en) * 2014-10-02 2016-04-13 帕洛阿尔托研究中心公司 Routing in dependence of the application
CN105515881A (en) * 2016-01-29 2016-04-20 晏平 Routing analysis method
CN106775695A (en) * 2016-12-08 2017-05-31 北京航空航天大学 One kind is based on side instable software function change forecasting system and method
CN108763627A (en) * 2018-04-13 2018-11-06 西北工业大学 Structural mechanism failure probability sensitivity decomposition method, computational methods and application

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197748A (en) * 2007-11-30 2008-06-11 华南理工大学 Multi-jump wireless self-organizing network construction method based on partition tree
CN101286930A (en) * 2008-05-30 2008-10-15 华南理工大学 Self-adapting routing method for congestion of multi-hop wireless self-organizing network
CN101394352A (en) * 2008-10-31 2009-03-25 华南理工大学 Routing method for uni-directional wireless self-organizing network based on loop clustering

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197748A (en) * 2007-11-30 2008-06-11 华南理工大学 Multi-jump wireless self-organizing network construction method based on partition tree
CN101286930A (en) * 2008-05-30 2008-10-15 华南理工大学 Self-adapting routing method for congestion of multi-hop wireless self-organizing network
CN101394352A (en) * 2008-10-31 2009-03-25 华南理工大学 Routing method for uni-directional wireless self-organizing network based on loop clustering

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《IEEE SIGNAL PROCESSING LETTERS》 20071231 Hui Zhang et al A Novel Path Stability Computation Model for Wireless Ad Hoc Networks 第928-931页 1-4 第14卷, 第12期 2 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102131269A (en) * 2011-04-29 2011-07-20 南京邮电大学 Geographical-position-based routing method in wireless mesh network
CN105490939A (en) * 2014-10-02 2016-04-13 帕洛阿尔托研究中心公司 Routing in dependence of the application
CN105490939B (en) * 2014-10-02 2020-08-07 思科技术公司 Method, system and computer medium for routing in a mobile wireless network
CN104869605A (en) * 2015-03-10 2015-08-26 重庆邮电大学 Emergency communication-based AODV route stability algorithm improvement method
CN105515881A (en) * 2016-01-29 2016-04-20 晏平 Routing analysis method
CN106775695A (en) * 2016-12-08 2017-05-31 北京航空航天大学 One kind is based on side instable software function change forecasting system and method
CN106775695B (en) * 2016-12-08 2020-11-10 北京航空航天大学 Software function change prediction system and method based on edge instability
CN108763627A (en) * 2018-04-13 2018-11-06 西北工业大学 Structural mechanism failure probability sensitivity decomposition method, computational methods and application

Similar Documents

Publication Publication Date Title
CN101854693A (en) Method for calculating route stability applied to mobile ah hoc network
Xie et al. Transmission-efficient clustering method for wireless sensor networks using compressive sensing
Hassanabadi et al. Clustering in vehicular ad hoc networks using affinity propagation
Iyer et al. Performance analysis of wireless mesh routing protocols for smart utility networks
US8750100B2 (en) Avoiding broken links in smart meter networks for loop-free routing of packets
CN105580437B (en) Discovery routing is from source node to the method for sink nodes forwarding grouping in the wireless network
CN106604348A (en) Wireless ad hoc network routing method and device
Ben-Moshe et al. Centdian computation in cactus graphs
Gui et al. A new distributed topology control algorithm based on optimization of delay and energy in wireless networks
Gu et al. A social-aware routing protocol based on fuzzy logic in vehicular ad hoc networks
CN102917385B (en) Mobile perception clustering method based on statistical mobile scale
Kim et al. On QoS multicast routing algorithms using k-minimum Steiner trees
Iyer et al. Performance comparison of routing protocols over smart utility networks: A simulation study
Kim et al. Leader election on tree-based centrality in ad hoc networks
Wu et al. Routing algorithm based on social relations in opportunistic networks
Segal et al. On construction of minimum energy k-fault resistant topologies
CN110536309A (en) It is a kind of that network route method is understood based on the mobile agency of node liveness and capacity factor
Cui Data aggregation in wireless sensor networks
Yang et al. Efficient information dissemination in dynamic networks
Guo et al. A distributed algorithm for min-max tree and max-min cut problems in communication networks
Entezami et al. RCTP: An enhanced routing protocol based on collection tree protocol
CN104519543A (en) Wireless sensor network Sink node selection method and system
Meghanathan Link selection strategies based on network analysis to determine stable and energy-efficient data gathering trees for mobile sensor networks
Pozveh et al. Improving the AODV protocol to satisfy the required level of reliability for home area networks
CN108989224B (en) Multicast routing method of space DTN (delay tolerant network)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20101006