A Community-Based Construct Method for an Inter-Satellite Communication Network of Satellite Swarm

An inter-satellite communication network of satellite swarm (ICNS) is created if the members of a satellite swarm communicate with each other via inter-satellite links (ISLs). ICNS can be constructed using the theory of complex networks. A link community is defined as two satellites between which the ISL has been established. The satellite swarm, whose members have not established ISLs, is modeled as a pre-link network (PLN). The edge of a PLN is described as a candidate for the link community. Consequently, an ICNS can be constructed by collecting combinations of candidates for link communities (CCLC) based on PLN and then by selecting one of these. An algorithm is designed to take a sample of all CCLCs. A new structural entropy of networks is developed to evaluate a CCLC. The CCLC with a maximum structural entropy in the CCLC sample will be selected to become the edge set of the ICNS. An improvement method was proposed to ensure that the ICNS remains a dynamic connected network by preventing each satellite from establishing an ISL with the same satellite. The simulations demonstrated that the proposed method outperformed the benchmark methods, and it is necessary to adopt the improvement method.


Introduction
Many satellites are supposed to be organized as a satellite swarm to complete space tasks because the swarm intelligence will emerge with multiple autonomous satellite clustering. The members of the satellite swarm, i.e., the satellites, must communicate with each other via inter-satellite links (ISLs), which is the precondition for the satellite swarm's operations. The satellite swarm creates an inter-satellite communication network of satellite swarm (ICNS) when its members are connected by ISLs.
An ICNS is a type of satellite network that treats satellites as its nodes and ISLs as its edges. Related work on the construction of a satellite network always focuses on transforming it into an optimization problem concerning ISL assignment or topology design. Ren et al. [1] modeled the ISL assignment problem as the decision optimization of the ISL selection action sequence, in which reinforcement learning is suitable for obtaining the solution. Yan et al. [2] transformed the ISL assignment scheduling problem in global navigation satellite systems (GNSS) into a multi-objective optimization problem and solved it using nondominated sorting genetic algorithm II. Sun et al. [3] proposed assignment algorithms of time synchronization links based on satellite layers and ranging links combining satellite selection and weighting. Yan et al. [4] modeled the ISL assignment problem in GNSS as an integer programming problem and designed a rolling weight-matching method (RWM) and a rolling weight-matching method with weight enhancement (RWMWE) to solve it. Liu et al. [5] used a multi-objective simulated annealing algorithm and a two-step algorithm to assign laser ISL and radio ISL, respectively. Yan et al. [6] applied integer linear programming to solve the topology design problem in the context of GNSS, considering both ranging and communication performance. Zeng et al. [7] proposed multi-objective discrete binary particle swarm optimization to optimize the topology of optical inter-satellite links in GNSS. These studies prefer to apply intelligent optimization methods, which has produced many positive results, yet there are also some noteworthy features in these studies, such as the dependence of prior data, a large amount of calculation, and a high number of experiments.
Meanwhile, a satellite network belongs to the complex network, which is well-known for its complexity of nodes, structures, and evolution [8]. Some studies exist that have researched satellite networks through the theory of complex networks. Wang et al. [9] investigated the networking feasibility of quantum key distribution constellation networks. Sun et al. [10] selected the super satellite nodes according to the important coefficient of the satellite node. Liu et al. [11] presented a method based on a space-time evolving graph to estimate the required wavelengths in a dynamic optical satellite network. Lu et al. [12] designed a framework based on topological dynamics to evaluate the structural performance of satellite networks. Chen et al. [13] proposed a topological dynamics shielding method for LEO satellite networks by establishing a static virtual network. These studies employed the theory of complex networks to analyze the functions or performances of satellite networks, but they ignored the construction of these satellite networks.
It is obvious that combining the construction of a satellite network and the theory of complex networks has attracted less attention, to date. In fact, a satellite network deserves to be constructed with the theory of complex networks because it is actually a type of complex network. The method to construct a satellite network using the theory of complex networks has the following three advantages:

1.
There is no limit on the type of satellites or constellations, so it is highly adaptable, which will help standardize a set of norms in the satellite network model; 2.
It is based on the interaction of nodes, i.e., satellites, which can describe clearly how the structure of a satellite network affects its properties, behaviors, and performance; 3.
It is able to interpret satellite networks in the way of systems or systems-of-systems and to reveal the nonlinearity of satellite networks.
Therefore, this paper aimed to apply the method mentioned above to study ICNS and offers a new course of research on satellite networks and the satellite swarm.
ICNS was the subject of this study, and the remainder of this paper is structured as follows: In Section 2, we described the process of modeling a satellite swarm as a complex network through the theory of complex networks and the necessity of this method. In Section 3, we introduced the method to construct an ICNS, which is based on the community structure and the structural entropy of complex networks. In Section 4, we put forward an optimization method to ensure that the ICNS remains as a dynamic connected network constantly. In Section 5, we designed some simulations to test and verify the performance of these proposed methods and analyzed their outcomes.

Introduction of Slots
The communication task of a satellite swarm, such as transmitting data and orders, are always time-sensitive, which means there is a task time interval during which the task must be fulfilled. It is unnecessary to worry about which ISLs are established in the satellite swarm every second because there is a better way to cope with the establishment of ISLs during the task time interval. That method is the finite state automata (FSA) [14,15], which can save computing and storage resources and improve the management simplicity of link planning [2]. As Figure 1 shows, the task time interval is divided into Φ equal parts (Φ ∈ N + ), which are called state periods; then, each state period is further divided into Γ equal parts (1 ≤ k ≤ Γ), which are called slots. Each slot corresponds to an FSA state indicating which ISLs are established. As each slot will occur in the cycle, we only need to focus on these Γ FSA states. The topology of an ICNS is believed to remain unchanged in each slot. need to focus on these Γ FSA states. The topology of an ICNS is believed to remain unchanged in each slot. The length of a slot is denoted by slot ΔT . All temporal concepts were counted by the slot in this paper unless there is a special explanation.

Introduction of ICNS
The members of a satellite swarm are denoted by need to establish ISL within slot k , two conditions must be met throughout this slot: 1 The distance between the Earth's core and the line from i v to j v ( OD in Figure 2) is greater than the sum of the Earth's radius j v ( OE in Figure 2) and the height of the ionosphere( EF in Figure 2), as is shown in Equation (1): The elevation angle from i v to j v ( OIJ ∠ in Figure 2) is in the onboard antenna scanning range of i v ( i γ in Figure 2); meanwhile, the elevation angle from j v to Figure 2) is in the onboard antenna scanning range of j v ( j γ in Figure 2), as is shown in Equation (2): The length of a slot is denoted by ∆T slot . All temporal concepts were counted by the slot in this paper unless there is a special explanation.

Introduction of ICNS
The members of a satellite swarm are denoted by V = {v i }, where v i represents the i-th satellite. The cardinality of V is designated by Θ (i.e., |V|= Θ ). If v i and v j need to establish ISL within slot k, two conditions must be met throughout this slot: 1 The distance between the Earth's core and the line from v i to v j (|OD| in Figure 2) is greater than the sum of the Earth's radius v j (|OE| in Figure 2) and the height of the ionosphere(|EF| in Figure 2), as is shown in Equation (1): The elevation angle from v i to v j (∠OI J in Figure 2) is in the onboard antenna scanning range of v i (γ i in Figure 2); meanwhile, the elevation angle from v j to v i (∠OJ I in Figure 2) is in the onboard antenna scanning range of v j (γ j in Figure 2), as is shown in Equation (2): (2) need to focus on these Γ FSA states. The topology of an ICNS is believed to remain unchanged in each slot. The length of a slot is denoted by slot ΔT . All temporal concepts were counted by the slot in this paper unless there is a special explanation.

Introduction of ICNS
The members of a satellite swarm are denoted by need to establish ISL within slot k , two conditions must be met throughout this slot: 1 The distance between the Earth's core and the line from i v to j v ( OD in Figure 2) is greater than the sum of the Earth's radius j v ( OE in Figure 2) and the height of the ionosphere( EF in Figure 2), as is shown in Equation (1): The elevation angle from i v to j v ( OIJ ∠ in Figure 2) is in the onboard antenna scanning range of i v ( i γ in Figure 2); meanwhile, the elevation angle from j v to Figure 2) is in the onboard antenna scanning range of j v ( j γ in Figure 2), as is shown in Equation (2): Once ISLs are established in a satellite swarm, an ICNS is created. According to the notation of the graph theory, the ICNS that is created during slot k can be modeled as a graph G k = (V k , E k ), where V k = {v i } is the node set and E k = e ij v i , v j ∈ V, i < j is the edge set. Herein, nodes are equivalent to satellites and edges are equivalent to ISLs. Thus, v i is not only the i-th satellite but also the i-th node. Furthermore, e ij is not only the edge connecting the i-th node and the j-th node but also the ISL between the i-th satellite and the j-th satellite.
In this paper, e ij does not indicate the direction of ISL but only means that there is an ISL between v i and v j . The satellite with a smaller number v i is called the left satellite while the satellite with a bigger number v j is called the right satellite. An ICNS is not an undirected graph, and it is not a simple directed graph. In fact, there is two-way alternate communication between two satellites connected with an ISL, that is, the direction of ISL is from the left satellite to the right satellite during the former half slot and from right the satellite to the left satellite during the former half slot. Thus, the ICNS is a special directed graph whose edges have changeable directions.
The edge set E k is also a set of ISLs that are established during slot k. As a satellite is only allowed to establish one ISL with another satellite within a slot [6], E k has 1 2 Θ elements at most. The difference between these ICNSs for various slots only concerns ISLs rather than satellites, according to [12]. Therefore, the ICNS for slot k can be further denoted by G k = (V, E k ). As a result, the construction of ICNS can be reducible to the construction of the edge set of the ICNS for each slot. Since each satellite establishes at most one ISL in any slot, no two edges in an ICNS have a vertex in common. Hence, the ICNS is a disconnected graph at any time.

Pre-Link Network
If there is no ISL to establish in a satellite swarm, the ICNS will not be created. Under the circumstances, the satellite swarm can be modeled as a pre-link network (PLN). The PLN is an imaginary network that plays a vital role in constructing an ICNS. The PLN modeled to construct G k is denoted by The edge e ij means the couple of v i and v j between which an ISL can be established during slot k rather than a real ISL. In additionrather than a real ISL. In addition, there is | E k | ≤ Θ 2 .
Although the satellite swarm actually creates an ICNS by establishing some ISLs, we can give a new explanation for the construction of an ICNS, which is based on the theory of complex networks: we first tease out all satellite pairs that meet the condition for establishing ISLs and create a PLN through them; then, we convert the PLN, which has more edges, into an ICNS, which has fewer edges, by selecting some particular edges.

Link Community
Communities in networks are groups of nodes. There are dense connections in the communities and sparser connections between the communities [16]. As a satellite is only allowed to establish one ISL with another satellite within a slot, an ICNS is composed of multiple satellite pairs, within which there are ISLs yet between which there are no ISLs. These satellite pairs can be treated as communities, which are called link communities. The link community has two essential features: (1) one link community contains two and only two nodes, and (2) there is no edge between any two link communities. We propose that the link community is equivalent to the ISL, so the link community that consists of v i and v j is also denoted by e ij . The edge e ij in the PLN represents a candidate for the link community (CLC) e ij accordingly.
In fact, the ICNS is a network that is composed of θ link communities if there are θ satellite pairs that have established ISLs (θ ≤ 1 2 Θ). The combination of candidates for link communities (CCLC) is defined as a special subset of the edge set of a PLN in which no two members, i.e., candidates for link communities, have a node in common. Hence, G k can be constructed by collecting CCLCs based on G k and by choosing one of them to become E k . We then introduced three fundamental matrices of G k , which are vital to construct ICNS. They are the adjacency matrix The element d [k] ij of D k is defined by Equation (4).
The element w ij of W k is defined by Equation (5).
There are two steps to obtain W k . Firstly, we establish a distance matrix R = (r ij is defined by (6).
Secondly, we normalizes r ij as (7), so that w ij is obtained.
In this paper, d [k] ii denotes the degree of v i in G k and w [k] ij denotes the weight of e ij in G k .

Algorithm to Sample a CCLC
A CCLC is a matching of a PLN according to graph theory, since the CCLC is a set of edges in the PLN that are pairwise disjointed. If the cardinality of a CCLC is 1 2 Θ, the CCLC is a perfect matching of the PLN. As the enumeration problem for perfect matchings in general graphs is NP-hard [17], it is almost impossible to count the number of all CCLCs. In addition, if there were a large number of satellites, the number of accessible available CCLCs must be astronomical. Consequently, the enumeration of CCLCs is unavailable.
Therefore, we attempted to collect a sample of all CCLCs. The sample was required to cover all of E k , which ensured the representativeness of the sample. The sample of all CCLCs that was used to construct G k is designated by  Not all CCLCs in M k obtained by Algorithm 1 must have θ elements, so M k needs to be modified. If θ = 1 2 Θ, the CCLCs that are less than 1 2 Θ should be removed from M k . If θ < 1 2 Θ, the CCLCs whose cardinalities are not equal to θ should be removed from M k ; however, the subsets with θ elements of the CCLCs whose cardinalities are more than θ should be added into M k . We can apply the Tutte theorem [18] to determine the existence of a perfect matching in a PLN; if a perfect matching exists, θ should be 1 2 Θ to maximize the number of ISLs.

Method of Selecting a CCLC According to Structural Entropy
Now that M k has been obtained by Algorithm 1, the next step is to select a suitable CCLC from M k . We will introduce a method of selecting CCLC according to structural entropy in this section.
The structural entropy is a type of network entropy [19], which is a measure of the network's heterogeneity [20]. The weaker the heterogeneity, the greater the entropy value [21]. A weaker heterogeneity means there are fewer differences between nodes of the network [22]. Nowadays, there are many kinds of structural entropies in the field of complex networks [19]. We borrowed the idea from the authors in [23], that is, considering both nodes and edges to define a new structural entropy.
We treat each CLC of M k (ε) as a node. We state that if e ij is the ι-th CLC in M k (ε), e ij can be denoted by c ι . We define the degree d [ι] c of c ι as the normalized number of links incident to nodes in c ι : We define the weight w [ι] c of c ι as the weight of e ij , i.e., w ij . Then, we define the importance coefficient U ι of c ι as the weighted sum of d [ι] c and w [ι] c : where α and β are weights and α + β = 1. U ι needs to be normalized as follows: We believe that d [ι] c is as important as w c , i.e., α = β. Thus, (10) is transformed into Finally, we give the formula of the structural entropy H ICNS should have lower heterogeneity to help satellites make full use of their autonomy, which will promote the decentralization and swarm intelligence of a satellite swarm. Therefore, the maximum structural-entropy CCLC (MSE-CCLC) should be selected to become E k , as shown in Equation (13):

ICNS for One State Period
Although the lengths of ISLs in the ICNS for one single slot (ICNS-OSS) will change over time, the type and number of ISLs remains stable throughout the slot. Thus, the ICNS for a single slot cannot be treated as a dynamic network. However, the ICNS for multiple slots is a typical dynamic network, in which both lengths and existences of the edges change over time. Obviously, an edge exists during some slots due to the establishment of the corresponding ISL, and it disappears during another slot due to the disconnection of the ISL. This section focuses on the ICNS for one state period (ICNS-OSP) and its optimization. An ICNS-OSP can be represented by a link matrix X = (x ik ) Θ×Γ . The element x ki of X is defined as shown in Equation (14).
Some important sets with respect to the ICNS-OSP are defined as follows: 4. The set of selected CCLCs S = M k 1 ≤ k ≤ Γ . The element M k of S denotes the CCLC that is selected to become E k . S is equivalent to X for they both represent the relationship between ISLs and slots in an ICNS-OSP.

5.
The set of all ISLsÊ = E 1 ∪ · · · ∪ E Γ .Ê contains all the ISLs that have been established within one state period. The ISLs that are established within different slots but include the same satellites are the same.

Dynamic-Connected and Dynamic Paths
PLNs for different slots may have the same adjacency matrices and degree matrices, which may lead to the same sets of CCLCs. Although different slots can result in different weight matrices, it is possible to select the same CCLC according to structural entropy, that is, the MSE-CCLCs for different slots may be the same. In this situation, each satellite would keep establishing the ISL with the same satellite. As there is no edge between any two link communities, an ICNS-OSS must be non-connected. Consequently, if all satellites do not change their link objects over time, the ICNS-OSP will remain disconnected throughout the state period. In order to ensure effective communication in the satellite swarm, the ICNS-OSP must be dynamically connected, which requires that the dynamic paths between any two satellites are always available.
A dynamic path in ICNS is a space-time sequence of nodes that begins with the source node and ends with the destination node. The space-time sequence indicates that a dynamic path has both temporal length and spatial length. The temporal length is the number of slots that a dynamic path spans. The spatial length is the number of edges that are constituted of two neighboring nodes in a dynamic path. We define an S&D (the abbreviation of "source and destination") as the ordered pair (v i , v j ) that contains the source node v i and the destination node v j . The dynamic path for an S&D (v i , v j ) is written as follows: where v [k] i represents v i during slot k, and so on. There are two important parameters in (15): k is the slot in which the dynamic path is planned and it is called the plan slot (1 ≤ k ≤ Γ), and k + p is the slot in which the dynamic path finishes and it is called the finish slot (p ≥ 0). Consequently, p + 1 represents the temporal length of DP(v i , v j , k).
A dynamic path can be planned by the method of finding the earliest route from a source satellite to all the other satellites [24]. Given the slot k, if every S&D (v i , v j ) has an existent DP(v i , v j , k), the ICNS is believed to be dynamically connected from slot k to slot k + p. Under the circumstances, the maximum temporal length of all dynamic paths can be defined by dynamic connect duration (DCD), which means how long it takes an ICNS to achieve dynamic connectivity from slot k. However, if some S&D does not have a dynamic path, the ICNS will never be dynamically connected until the state period ends, so it is necessary to optimize the construction of the ICNS.
We can prove that there is no plan to make ICNS dynamically connected during any slot. The binary tree in Figure 3 shows all dynamic paths that are from v i . Nodes of this binary tree represent satellites. A parent node's left child node is itself, and its right child node is the satellite with which it establishes an ISL during the corresponding slot. Satellites in different black rectangles are also different (their numbers are fictitious), which means each satellite cannot establish an ISL with satellites that it has connected with and their link objects. Under the circumstances, the binary tree can cover all |V| satellites when it has had log 2 |V| levels, which means the maximum temporal length of dynamic paths from v i is log 2 |V|. Nevertheless, the link plan in Figure 3 is highly impracticable because it does not consider those dynamic paths from another satellite. If some satellites established an ISL with one of the link objects of its link objects, the maximum temporal length of dynamic paths from v i may increase to at least 1 + log 2 |V|. Therefore, log 2 |V| is the ideal minimum of the maximum temporal length of dynamic paths. Hence, the ICNS will spend at least log 2 |V| slots dynamically connected to slot k, no matter what k is. How-Entropy 2023, 25, 121 9 of 17 ever, if k > Γ − log 2 |V|, certain dynamic paths will not finish before the state period ends, which means that the ICNS will never be dynamically connected from slot k to the last slot of the state period.
established an ISL with one of the link objects of its link objects, the maxim length of dynamic paths from i v may increase to at least + 2 1 log | V 2 log | | V is the ideal minimum of the maximum temporal length of d fore the state period ends, which means that the ICNS will never be dy nected from slot k to the last slot of the state period.

Dynamic-Connectivity-Oriented Construction Method of ICNS
The dynamic-connectivity-oriented construction method of ICNS is illustrated in Algorithm 2, which is also the process of constructing an ICNS in this study.
We employed the Jaccard distance and the blacklist in Algorithm 2. The Jaccard distance is a measure of the similarity of two sets. For two non-empty finite sets, Y and Z, their Jaccard coefficient is the ratio of the cardinality of their intersection to the cardinality of their union [25], as shown in Equation (16): The greater J(Y, Z) is, the more similar Y and Z are. The blacklist is the set shown in Equation (17): where κ is the maximum number of times that one CLC is permitted to repeat. The blacklist collects those CLCs that have occurred frequently in selected CCLCs. Any CCLC with even one element of the blacklist should be removed from the subset of all CCLCs M k obtained by Algorithm 1.

Input:
y ετ ; sort the sequence from small to large, which creates the new sequence: There are two ways to avoid a satellite from constantly establishing the ISL with the same satellite in Algorithm 2. The first is to modify three fundamental matrices of G k and to forbid those selected CLCs from being selected again, as line 6-11 introduces; it is able to make satellites establish ISLs with different satellites during different slots. The second is to select the CCLC that is most dissimilar to those selected CCLCs and does not have any element of the blacklist, as line 12-23 introduces; it allows satellites to establish ISLs with their previous link objects but the numbers of repeats cannot exceed the limit in the blacklist, i.e., κ in (17). If | O i | ≥ Γ, the first method is applied; otherwise, both methods are used.

Simulation Analyses for the Construction of an ICNS
The satellite swarm consists of 30 satellites [26]: Three geosynchronous orbit satellites are at an altitude of 35,786 km and longitude of 80 • E, 110.5 • E, and 140 • E, respectively, and they are numbered from 1 to 3; 9.
Three inclined geosynchronous orbit satellites are spaced with 120 • phase intervals at an attitude of 35,786 km and inclination of 55 • , and they are numbered from 4 to 6; 10. Twenty-four medium earth orbit satellites constitute a 24/3/1 walker constellation with an altitude of 21,528 km and an inclination of 55 • , and they are numbered from 7 to 30.
The satellite constellation above is also used in [2][3][4][5][6][7]. The length of the task time interval was set as 4 min from 17:17:00 to 17:21:00 on 16 August 2015. The state period could be set to 1 min or 2 min according to the visibility between satellites during the task time interval. Each slot lasted for 3 s, which is the rule of thumb introduced by the authors in [27]. Therefore, we designed four simulation groups, as shown in Table 1. Simulation group 2 and simulation group 4 used the method in Section 3, which did not improve the construction of ICNS. On the contrary, simulation group 1 and simulation group 3 used the method in Section 4 to improve the construction of the ICNS. The proposed methods were implemented in Java. The ICNSs that were constructed in four simulation groups in Table 1 are illustrated in Figure 4. As the PLN for each slot in each simulation group had a perfect matching, there was θ = 1 2 Θ = 15 in the ICNS for each slot. As Figure 4b,d show, each satellite in the ICNSs without improvement had an established ISL with the same satellite during the entire state period. These terrible situations have never happened in ICNSs with improvements, as is shown in Figure 4a,c. We only analyzed the results of simulation group 1 and simulation group 3, as the results of simulation group 2 and simulation group 4 were quite disappointing.
The structural entropies of CCLCs that were selected to become edge sets of ICNSs are illustrated in Figure 5. The CCLC for each one of the first 20 slots in simulation group 3 had the same structural entropy as the CCLC for the corresponding slot in simulation group 1. As Figure 4b shows, there was M k ∈ S from slot 2 to slot 24, and consequently, these CCLCs were selected using the first method of Algorithm 2. There was a downtrend in the structural entropies of these CCLCs. As more and more CLCs are selected over time and they cannot be selected anymore, CCLCs become less available. There was even one CCLC in M ′ k that was obtained by line 8 of Algorithm 2, and its structural entropy was minimal.
There was M ′ k = ∅ from slot 25 to slot 40, during which CCLCs were selected using the second method of Algorithm 2. Under the circumstance, the structural entropy could not be used as a selection criterion so the structural entropies of these CCLCs fluctuated within a wider range.
There were 300 ISLs established during 20 slots in simulation group 1 and 412 ISLs established during 40 slots in simulation group 3. The general degrees and the numbers of potential link objects of all satellites are shown in Figure 6. In simulation group 1, every satellite's general degree equaled the number of slots. In simulation group 3, there were 28 satellites whose difference between numbers of potential link objects and general degree was zero, with 2 satellites whose difference was 1. Obviously, our method fully exploited ISL resources to construct an ICNS.

Simulation Analyses of Dynamic Connection of ICNS
We designed simulations on the dynamic connection of ICNS, which was based on the results of simulation group 1 and simulation group 3 in Section 5.1. We planned dynamic paths from each satellite to all other satellites during each slot, that is, there was a simulation case of DP(v i , v j , k) for each possible combination of a source node v i ∈ V, a destination node v j ∈ V (v i ̸ = v j ), and a plan slot k (1 ≤ k ≤ Γ). Then, we computed DCD for each slot according to the results of planning dynamic paths. If DP(v i , v j , k) did not exist, DCD for slot k was 0.
there was = = 1 15 2 θ Θ in the ICNS for each slot. As Figure 4b,d show, each satellite in the ICNSs without improvement had an established ISL with the same satellite during the entire state period. These terrible situations have never happened in ICNSs with improvements, as is shown in Figure 4a,c. We only analyzed the results of simulation group 1 and simulation group 3, as the results of simulation group 2 and simulation group 4 were quite disappointing. The structural entropies of CCLCs that were selected to become edge sets of ICNSs are illustrated in Figure 5. The CCLC for each one of the first 20 slots in simulation group 3 had the same structural entropy as the CCLC for the corresponding slot in simulation group 1. As Figure 4b shows, there was ∈  k M from slot 2 to slot 24, and consequently, these CCLCs were selected using the first method of Algorithm 2. There was a downtrend in the structural entropies of these CCLCs. As more and more CLCs are selected over time and they cannot be selected anymore, CCLCs become less available. There was even one  There were 300 ISLs established during 20 slots in simulation group 1 and 4 established during 40 slots in simulation group 3. The general degrees and the n of potential link objects of all satellites are shown in Figure 6. In simulation group satellite's general degree equaled the number of slots. In simulation group 3, the established during 40 slots in simulation group 3. The general degrees and the n of potential link objects of all satellites are shown in Figure 6. In simulation group satellite's general degree equaled the number of slots. In simulation group 3, the 28 satellites whose difference between numbers of potential link objects and gen gree was zero, with 2 satellites whose difference was 1. Obviously, our method f ploited ISL resources to construct an ICNS.

Simulation Analyses of Dynamic Connection of ICNS
We designed simulations on the dynamic connection of ICNS, which was b the results of simulation group 1 and simulation group 3 in Section 5.1. We plan namic paths from each satellite to all other satellites during each slot, that is, ther simulation case of ( , , )  The results of simulation group 1 are shown in Figure 7. As the blue, grey, and green lines in Figure 7 show, DCDs for the same slot period 1, state period 2, and state period 3 were the same. However, in state p some S&Ds did not have available dynamic paths from slot 14 to slot 20, and corre ingly, the ICNSs were not able to be dynamically connected from slot 14 onwar reason for this phenomenon was that a dynamic path whose plan slot was at the a state period may have finished until the next state period. For S&Ds that had p dynamic paths from slot 14, if they were in the first three state periods, their d paths may have finished in the next state period, which is still within the task tim val; nevertheless, if they were in the last state period, their dynamic paths may n finished at the end of task time interval, so these dynamic paths are believed to ha non-existent in the task time interval. The results of simulation group 3 are shown ure 8, which are similar to simulation group 1 and will not be introduced in this p As the blue, grey, and green lines in Figure 7 show, DCDs for the same slot in state period 1, state period 2, and state period 3 were the same. However, in state period 4, some S&Ds did not have available dynamic paths from slot 14 to slot 20, and correspondingly, the ICNSs were not able to be dynamically connected from slot 14 onwards. The reason for this phenomenon was that a dynamic path whose plan slot was at the back of a state period may have finished until the next state period. For S&Ds that had planned dynamic paths from slot 14, if they were in the first three state periods, their dynamic paths may have finished in the next state period, which is still within the task time interval; nevertheless, if they were in the last state period, their dynamic paths may not have finished at the end of task time interval, so these dynamic paths are believed to have been non-existent in the task time interval. The results of simulation group 3 are shown in Figure 8, which are similar to simulation group 1 and will not be introduced in this paper.

Impact of k-Value on ICNS
We let κ = 2 in (17), in order to conduct simulations in Section 5.1, which meant those CLCs that occurred more than two times in selected CCLCs needed to be added to the blacklist. The impact of κ-values on ICNS is studied in this section. As Figure 5 shows, only the first method of Algorithm 2 was adopted to select the CCLC in simulation group 1, which did not need the blacklist; thus, we focused on simulation group 3. dynamic paths from slot 14, if they were in the first three state periods, their dyna paths may have finished in the next state period, which is still within the task time in val; nevertheless, if they were in the last state period, their dynamic paths may not h finished at the end of task time interval, so these dynamic paths are believed to have b non-existent in the task time interval. The results of simulation group 3 are shown in ure 8, which are similar to simulation group 1 and will not be introduced in this pape

Impact of k-Value on ICNS
We let = 2 κ in (17), in order to conduct simulations in Section 5.1, which m those CLCs that occurred more than two times in selected CCLCs needed to be adde the blacklist. The impact of κ-values on ICNS is studied in this section. As Figure 5 sho only the first method of Algorithm 2 was adopted to select the CCLC in simulation gr 1, which did not need the blacklist; thus, we focused on simulation group 3.
Firstly, we constructed ICNSs through Algorithm 2 with different κ-values. ondly, we conducted simulations on the dynamic connectivity of these ICNSs, as deta in Section 5.  Firstly, we constructed ICNSs through Algorithm 2 with different κ-values. Secondly, we conducted simulations on the dynamic connectivity of these ICNSs, as detailed in Section 5.2. Finally, we analyzed the simulation results. The range of κ-values was set to [0, 5].
We did not demonstrate the constructed ICNSs, as shown in Figure 4, due to limited space, while we adopted structural entropies to show the corresponding CCLCs, as shown in Figure 9. We can draw the following three conclusions: The result of κ = 0 was the worst. No new CCLC was obtained by Algorithm 2 from slot 25 onwards (CCLCs from slot 25 to slot 40 were all the same as the CCLC for slot 24 in Figure 9), which means that the ICNS cannot be dynamically connected from slot 25. Moreover, κ = 0 means that any two satellites have to establish an ISL only once. A satellite will have no available satellite to establish an ISL with if the number of the slot is not smaller than the number of its potential link objects.
If κ ≥ 2, the CCLCs for the same slot are identical, even though they are under different κ-values. Therefore, different κ-values may not lead to different ICNSs and it is pointless to set a greater κ-value.
If κ ≥ 1, the CCLCs for each one of the first 31 slots under different κ-values are identical. Thus, not all CCLCs that are selected using the second method of Algorithm 2 are affected by κ-values.
Entropy 2023, 25, x FOR PEER REVIEW 15 We did not demonstrate the constructed ICNSs, as shown in Figure 4, due to lim space, while we adopted structural entropies to show the corresponding CCLCs, as sh in Figure 9. We can draw the following three conclusions: The result of = 0 κ was the worst. No new CCLC was obtained by Algorithm 2 f slot 25 onwards (CCLCs from slot 25 to slot 40 were all the same as the CCLC for slo in Figure 9), which means that the ICNS cannot be dynamically connected from slo Moreover, = 0 κ means that any two satellites have to establish an ISL only once. A ellite will have no available satellite to establish an ISL with if the number of the slot is smaller than the number of its potential link objects.
If ≥ 2 κ , the CCLCs for the same slot are identical, even though they are under ferent κ-values. Therefore, different κ-values may not lead to different ICNSs and pointless to set a greater κ-value.
If ≥ 1 κ , the CCLCs for each one of the first 31 slots under different κ-values identical. Thus, not all CCLCs that are selected using the second method of Algorith are affected by κ-values. Then, we compared and analyzed several properties with respect to the dyna connection of ICNSs for = 1 κ and = 2 κ . Figure 10 shows the general degree of all satellites under these two κ-values. T were 25 satellites whose general degree equaled the number of potential link objec = 1 κ , which was less than 28 if 2 κ = . Then, we compared and analyzed several properties with respect to the dynamicconnection of ICNSs for κ = 1 and κ = 2. Figure 10 shows the general degree of all satellites under these two κ-values. There were 25 satellites whose general degree equaled the number of potential link objects if κ = 1, which was less than 28 if κ = 2. Then, we compared and analyzed several properties with respect to the dyna connection of ICNSs for = 1 κ and = 2 κ . Figure 10 shows the general degree of all satellites under these two κ-values. T were 25 satellites whose general degree equaled the number of potential link obje = 1 κ , which was less than 28 if 2 κ = .  κ , and that is why we adopted = 2 κ in Section 5.1  Table 2 illustrates other dynamic connectivity properties. Since ICNS could not remain dynamically connected during the whole state period 2, we only introduced the results of state period 1. Obviously, ICNS under κ = 2 had better dynamic connectivity properties than ICNS under κ = 1, and that is why we adopted κ = 2 in Section 5.1.

Comparisons with the Benchmark Methods
In this section, the performance of the proposed method was compared with three benchmark methods proposed by the authors in [4,28,29]. In order to assign the ISLs in GNSS, the authors in [28] used the discrete differential evolution (DDE); the authors in [29] used the genetic algorithm (GA); and the authors in [4] used RWM and RWMWE, as mentioned in Section 1. As these benchmark methods concentrate on GNSS, not all of the indicators used were fit for our study. There were two available indicators. One was the average number of ISLs for all satellites among all slots in the state period; the other was the average path temporal length (APTL). The satellites that are invisible to the ground station were defined as overseas satellites, and the others were called domestic satellites. APTL is the average value for all overseas satellites in all state periods, which can be obtained by: (18) where PTL ik is equivalent to the length temporal of the shortest dynamic path from an overseas satellite i at slot k to any domestic satellite at subsequent slots [4]; S o is the number of overseas satellites; and k is the number of slots.
As the satellite constellation introduced in Section 5.1 was identical to the simulated satellite constellations in [4,28,29], we just needed to execute a simulation with the same parameters. The main parameters of the simulation setup are shown in Table 3.  Table 4 illustrates the comparison results of the proposed method and three benchmark methods for 10,080 state periods. The average number of ISLs were calculated for all satellites and 10,080 state periods. The proposed method obtained the minimum average number of ISLs, which was 19.91. The APTL of the proposed method was 1.33, which was the second smallest APTL.

Conclusions
This paper describes how a satellite swarm creates an ICNS with the theory of complex networks. We proposed the community-based construct method of ICNS and its improvement method. The results regarding constructing ICNSs have proven that it is necessary to improve the construct method of an ICNS, which helps an ICNS to maintain dynamic connectivity continuously. The results of dynamic connectivity simulations of an ICNS indicate that an ICNS cannot be dynamically connected in the last few slots of the last state period. Therefore, a satellite swarm should fulfill its task as soon as possible; otherwise, poor communication may occur at the end of the task time interval.
The proposed method is capable of constructing an ICNS with a good dynamic connection quickly. It has many advantages, such as being a simple model, and has good flexibility, adaptability, and expansibility. In fact, the ICNS constructed by our method can be further improved with some intelligent optimization methods and reinforced learning algorithms in order to achieve a certain object.
Besides community, path, and connectivity, other concepts and properties of complex networks may also be adopted in an ICNS, such as invulnerability, synchronization, and traffic dynamics, which will be the subject of our future work.