Dynamic Service Definition in the future mixed Surveillance environment

Similar documents
Using Simulation to Define and allocate probabilistic Requirements

AMCP/4-WP/70. b) requirements and recommendations together with their rationale; and

Improving airports throughput

Token Allocation Strategy for Free-Flight Conflict Solving Track: Emerging Applications, Technology and Issues

Solving Large Aircraft Landing Problems on Multiple Runways by Applying a Constraint Programming Approach

European Mode S Station Surveillance Co-ordination Interface Control Document

D2.5 Data mediation. Project: ROADIDEA

TCT Detailed Design Document

INSPIRE 1 Quick Start Guide V1.0

: EUROCONTROL Specification. for Surveillance Data Exchange ASTERIX Part 29 Category 032 Miniplan Reports to an SDPS

SURVEILLANCE DATA EXCHANGE

SURVEILLANCE DATA EXCHANGE

Data update on the Public Portal by mid-2016

How to Use Passive Infrared Sensor Cameras

DOCUMENT CHANGE RECORD. The following table records the complete history of the successive editions of the present document.

Base of Aircraft Data (BADA) EUROCONTROL s Aircraft Performance Model

SURVEILLANCE DATA EXCHANGE

TELECOM & ENERGY «Collaborating to Power the Smart Grids for Digital Growth«

ARTAS. ATC surveillance Tracker And Server. Eurocontrol. Interface Specification. Application of ASTERIX (Version 6.1) A 2 A 3 A 1

Manage your SAS Drug Development environment

Switched Network Latency Problems Solved

Simulation and Analysis of an Earth Observation Mission Based on Agile Platform

SURVEILLANCE DATA EXCHANGE. Part 5 : Category 017. Mode S Surveillance Coordination Function Messages

European Aviation Safety Agency. European Technical Standard Order. ED Decision 2016/013/R Annex II

Large-Scale Flight Phase identification from ADS-B Data Using Machine Learning Methods

HIGH LEVEL REQUIREMENTS OF FAST SIMULATION AND MODELLING SUITE OF TOOLS FOR FUTURE SELF-HEALING DISTRIBUTION POWER SYSTEM

Remote Sensing Sensor Integration

Lecture (08, 09) Routing in Switched Networks

OPERATIONAL PROBLEM REPORTING. Network Operations Handbook

: EUROCONTROL Specification. Surveillance Data Exchange ASTERIX Part 12 Category 21 Appendix A Reserved Expansion Field

Final Project Report. Abstract. Document information

Vehicular Cloud Computing: A Survey. Lin Gu, Deze Zeng and Song Guo School of Computer Science and Engineering, The University of Aizu, Japan

Exam in TDT 4242 Software Requirements and Testing. Tuesday June 8, :00 am 1:00 pm

Introduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2

Network Code on Emergency and Restoration - Implementation Guide for the Communication Systems Requirements. Final VERSION

Circuit switched network

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

Time-Triggered Ethernet

Numerical Simulation of Dynamic Systems XXIV

EUROCONTROL Guidance Material for Short Term Conflict Alert Appendix C: Cost Framework for the Standardisation of STCA

Configuration Guideline for CANopen Networks

FAA/Industry Collaborative Weather Rerouting Workshop. ATC Focus Area Discussion Summaries April 10-11, 2001

DRAFT. Dual Time Scale in Factory & Energy Automation. White Paper about Industrial Time Synchronization. (IEEE 802.

Validation Tool Descriptions for ATN Applications

Condor Local File System Sandbox Requirements Document

Multi-agent Collaborative Flight Experiment. Karl Hedrick UC Berkeley

Impact of Wind, Touchdown, and Plate Lines on Wake Vortex Evolution in Ground Proximity

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Wightman DIGITAL TV. Quick Reference Guide

5/4/2016 ht.ttlms.com

Faster Simulations of the National Airspace System

Introduction and Simulation of Modified Left Algorithms to Attribute Orthogonal Codes in 3 rd Generation Systems

A MATLAB TOOL FOR DEVELOPMENT AND TESTING OF TRACK INITIATION AND MULTIPLE TARGET TRACKING ALGORITHMS

Wide area networks: packet switching and congestion

Concurrent activities in daily life. Real world exposed programs. Scheduling of programs. Tasks in engine system. Engine system

ETSI TS V8.2.0 ( )

ANIMS-Phase 2. IntuiLab Intactile DESIGN. Eurocontrol CARE INO II programme

UAVs Task and Motion Planning in the Presence of Obstacles and Prioritized Targets

Routing, Routing Algorithms & Protocols

A Challenge Problem for 2D/3D Imaging of Targets from a Volumetric Data Set in an Urban Environment

SURVEILLANCE DATA EXCHANGE. Part 16: Category 23

Introduction and Statement of the Problem

An object oriented application for corporate networks design

William Stallings Data and Computer Communications. Chapter 10 Packet Switching

A CAN-Based Architecture for Highly Reliable Communication Systems

CNS/ATM-1 Package Internet SARPs Validation Objectives

Constraint Technology for Solving Combinatorial Problems: Overview, Results, and Applications. Pierre Flener

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

Style-specific techniques to design product-line architectures

Cache Optimisation. sometime he thought that there must be a better way

Global Optimization based on Contractor Programming: an Overview of the IBEX library

Unit 2 Packet Switching Networks - II

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction

Shared Repository Pattern. Shared Repository Introduction

Design and Development of Unmanned Tilt T-Tri Rotor Aerial Vehicle

ROUTING TRAFFIC WITH SUBNETWORK PRIORITY 14 ON THE AMSS

Video AI Alerts An Artificial Intelligence-Based Approach to Anomaly Detection and Root Cause Analysis for OTT Video Publishers

Space for safe skies. ESA Iris Program. Satellite Communications for Air Traffic Management (ATM)

Remote Health Monitoring for an Embedded System

MINIMUM EQUIPMENT LIST REGISTRATION: SERIAL #:

G Robert Grimm New York University

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS

3. Quality of Service

TERMINOLOGY MANAGEMENT DURING TRANSLATION PROJECTS: PROFESSIONAL TESTIMONY

ISTA User instructions for the BMW Online Service System for BMW Service and MINI Service (OSS)

Information Security Policy

INSPIRE 1 Release Notes

Lessons learned: WakeScene Results of quantitative (Monte Carlo) simulation studies

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Distributed STDMA in Ad Hoc Networks

Incremental development A.Y. 2018/2019

InSitu Turbulence Detection Algorithm and Report Triggering Logic Interface Control Document Gregory Meymaris 1

MAC in /20/06

AMSC/CMSC 664 Final Presentation

ALGORITHMS FOR DETECTING DISORDERS OF THE BLDC MOTOR WITH DIRECT CONTROL

CH : 15 LOCAL AREA NETWORK OVERVIEW

Scope of Functions UNIGYR -VISONIK. PC Software

Simulation Studies of the Basic Packet Routing Problem

Introduction to Wireless Networking ECE 401WN Spring 2008

Two-Stage orders sequencing system for mixedmodel

Transcription:

Dynamic Service Definition in the future mixed Surveillance environment Dr. Christos M. Rekkas Jean-Marc Duflot Pieter van der Kraan Surveillance Unit EUROCONTROL Rue de la Fusée 96, Brussels 1130, Belgium Jean-Claude Rassou Surveillance Department Thomson-CSF ISR 3, rue mpère 91349 Massy Palaiseau jean-claude.rassou@isr.thomson-csf.com Christos.rekkas@eurocontrol.be bstract Multiple Sensor Management in an air traffic control application. The future ir Traffic Surveillance environment is expected to be heterogeneous and include new types of Data Sources capable of transmitting aircraft derived data directly extracted from the avionics. The Dynamic Service Definition function (DSD) has to establish contracts with the new data sources in order to serve air derived information to the ir Traffic Management user s depending on their current needs (required data, periodicity ) and on the capability of the new data sources to provide the requested information. The DSD dynamically manages the connected data sources and optimize their use in sharing the global sensor load. This resource allocation problem that has also to take into account the stability of the system and the continuity of the service - is an application of the use of t constraint programming techniques. Keywords: Sensor management, resource allocation, load sharing, optimization, constraint programming. 1 The European Civilian Surveillance System The RTS program (TM Surveillance Tracker and Server) has been developed by EuroControl in cooperation with industrial partners, in order to provide to European member states a Surveillance Tracker and Server capable of managing high density traffic areas and intersystem coordination. The future ir Traffic Surveillance environment, tackled by the RTS2 program, is expected to be heterogeneous and include new types of Data Sources, such as the Mode S, DS-Broadcast and DS-Contract, in addition to the classical radar sensors (primary or secondary radars). These new types of sensors are capable of transmitting aircraft derived data of high importance for the ir Traffic Management functions (such as the conflict detection and resolution tools, flight data processing etc.) which make use of Surveillance data. Mode S subnetwork DS subnetwork CC RTS PSR/SSR Mode S user a user b PSR MSSR user c Weather radar DS PRIM/SSR Regional Wide rea Network G/W WN PRIM/SSR Sensor Data ir Situation Picture TC users G/W Weather Data Processing RTS G/W RSS TC CONTROL CENTERE TEST / EVLUTION

2. The data sources The on-board information extracted by the data sources is contained in various data blocks that may vary from one sensor to the other. contract between a data source and an aircraft basically defines the data block that is to be extracted. Several kind of contracts are possible, such as: demand (the data is extracted once), periodical (the data is extracted every T seconds) on-event (the data block is extracted when a specific event occurs) Each contract consumes a certain amount of load for the corresponding data source and for the associated transmission links. This means that in some cases, the data source may not guarantee the requested services (the request could then be postponed several scans later). The following information may be extracted from an aircraft through a new data sources : 4D position, ground speed, track angle, rate of climb, selected altitude, trajectory intention, wind direction, temperature 4. The Dynamic Service Definition In the future heterogeneous Surveillance environment, a function which dynamically defines the services to be requested from the Surveillance Data Sources, in order to optimize the process, is of importance. This function was conceived in the context of the EUROCONTROL TM Surveillance Tracker and Server 2 (RTS 2) project and was called Dynamic Service Definition. The Dynamic Service Definition (DSD) function has a set of inputs, including sensor data, track data, geographical data - reflecting the current Traffic and Environment Situation -, as well as the requests from the Surveillance Users. On the basis of these inputs and defined operational criteria, the function dynamically defines the most appropriate set of contracts which will be requested from the Data Sources, in order to optimize the Traffic Situation Picture, satisfy the requests of the Users and share the global sensor load. The contracts will be requested in order to receive a user defined set of data items for a corresponding set of tracks at specified transmission characteristics. The role of the DSD is to reduce the data source load and the transmission load. This implies that the DSD - when selecting a data source for an extraction - may assess, from the current tracks positions and radar position, if there is a risk that the data source could or will be in an overloaded situation. s an example, the trajectory intention of the aircraft may extracted and sent to the Surveillance Tracker in order to anticipate a turn. 3. The user s requests Requests for air derived information are sent by users (operator s, ir Traffic Management functions, Tracker). User s defines their required on-flight data, the associated conditions, the periodicity and authorized delays. s an example, the Minimum Safe ltitude Warning function (MSW) may request the altitude of a given flight every seconds if the aircraft flies under an altitude threshold, the extracted information being not older than 10 seconds. The Tracker is also a user as the other functions, with its own needs in term of accuracy, refresh rate ll requests have to be fulfilled with their associated extracted aircraft information Figure 3 : the load increases in azimuthal sectors depending on the number of aircrafts and contracts in progress. Figure 2 : The user can defined his needs through a user request for air derived information. Each pairing line is a contract between a data source and an aircraft.

The DSD has to fulfil a maximum of user s requests and has to determine which on-flight data shall be extracted from which aircraft through which data source and at what periodicity. One complex issue is also the combination of requests among themselves in order to fulfil with one unique contract a set of user s requests. Two user s requesting the same information at different periodicity may be served with the data of one contract using the minimal periodicity. Two user s requesting at the same periodicity different information pertaining to the same data block may be served by the same contract. The complexity is induced by the management of decombinations in case of partial failures or inconsistencies. 4.1 The optimization issue Definition and analysis of the problematic The main feature of the DSD is the definition of the contracts (and thus the set of sensors and associated parameters ) that will fulfill all incoming requests. This paragraph analyses the data source allocation feature in a general way and shows that it can lead to a complicated algorithm. Figure 4 : The DSD has to dynamically define which data source will process a given request (the pairing line indicates that a contract is in progress between a data source and the corresponding track). This processing shares the load induced by the requests among the data sources One of the dynamic aspect of the DSD is that it has also to manage the failures (hand-over of a contract from one data source to another one) and the stability of the system (avoiding the switch from one data source to another one). The problem is to determine an adequate set of data sources -with the associated transmission characteristicsthat could fulfil the needs expressed by the requests. It can be basically seen as an allocation problem that is to affect p data sources to n requests. Request 1 Request 2 Request n Data source Data source B Data source Z Figure 6: allocation problem If no rules nor constraints are applied, there are thus p n possible solutions that can be represented by the following search tree: Request 1 Request 2 Request 3 B B B C C C Request 1 is affected to sensor and request 2 to sensor B and request 3 to sensor C. Figure7: the search tree Figure 5 : The DSD ensure the continuity of the services. The displayed trajectory is covered by no data source (in red), by a mode S station (in green) or by an DS station (yellow) depending on dynamic events (failures). Each node represents a request and each branch represents a possible data source allocation.

possible solution corresponds to a possible path from the root to an ending node. partial solution corresponds to a path from the root to an intermediate node. Searching for a solution While searching for a solution, some specific rules could be applied in order to eliminate inadequate solutions : the data source shall be operational (ON), the concerned track is within the data source coverage, the data source is generally able to provide the required data, the delays associated to the data source are compatible with the request, the data source is not overloaded. This is not sufficient to limit the number of possibilities as the choice of one data source could impact the solving of another request that will be processed afterwards. This problem is essentially due to the data source load and the maximum of contracts that can be handled. The search shall then be driven by a more complicated heuristic that should take into account the data source load. s an example, we could consider a given data source has : an on-going load, a sharable load, a non-sharable load. The heuristic could be of the following : compute the global effort than can be requested. if this effort is greater than the maximum then the sharable load shall be transferred. In the case of a simple problem, this heuristic is enough. However, for representative problem, this task is harder: in the following example, 4 data sources have to process 15 requests on 15 tracks. D 1 6 15 14 11 5 9 4 2 10 3 7 12 13 Figure 8 : example of a track /request distribution on a specific data source coverage (15 requests on 4 data sources). 8 B C Each data source is able to process a maximum number of 4 tracks. Potentially, this system is able to process 16 requests. Let s suppose that we have to process the requests by order (from 1 to 15) and that we apply the rules described here above. In that case, 1 is placed very easily. However there are no rules to place 2. Which source shall be thus selected, knowing that this selection will impact the final solution? The heuristic that will solve this problem entirely is not evident although it could be solved partially by the use of one of the simple heuristics defined here above. Furthermore changes in the initial problem directly impact the heuristic that is to be applied. In conclusion we could say that the algorithmic approach has to manage: a search domain to find a solution as no equation nor rules will give directly a possible solution, a partial set of solutions in case of impossibilities, the fact that it should be adapted to all the cases of the problematic. If we assume that a request would likely to be split on several data sources the problem is much more complex. The search described here above could also be driven with the supplementary aim of optimising some variables. In fact, the optimisation of the data source load, individually and globally, is the only way to increase the probability that a new request will always be processed. The proposed solution has also to take into account the system stability avoiding a request to be constantly allocated to a new data source each time an event occurs. In that case, the system will be unstable (because a contract would always change) and some computation time would be lost to reallocate the previous requests in another way. The optimisation of the size of the data can also be taken into account in order to lower the data flow. gain, a heuristic that will have to take that optimisation feature into account will not be easy to determine. Changing the optimisation parameters (e.g.: the variable that is to be optimised.) can also impact that heuristic dramatically. lthough it can be very easy to find a partial solution, it is much more complicated to determine a complete solution (i.e.: all the requests are fulfilled) or to give a good partial solution (i.e.: a great number of requests are fulfilled), even in cases where the number of data sources and requests are reasonable. Furthermore, the complexity increase if the DSD has to take into account the fact that some variables could be optimised. The use of classical programming to solve this combinatory problem was not recommended as it would have lead to a great amount of effort and line codes, would have been very heavy to maintain and not flexible enough to modify.

4.2 The algorithmic approach : the use of constraint programming. The resource allocation is dynamically done by inference cycles triggered on events (urgent request, buffer of new incoming requests, maximum elapsed time, data source failure ). This paragraph describe the two main steps of a cycle : Step 1 : the search In order to manage the search tree in a flexible way, the DSD prototype relies on a constraint programming tool (ILOG SOLVER). This constraint programming tool will propagate a constraint on each data source load while searching for a solution in the search tree. The algorithm will thus converge to a possible solution in a fast way by removing the unfeasible alternatives on the fly. The requests are sort by decreasing priority. Thus, the search will always place first the requests of higher priorities in order to ensure that - whatever complete (or partial) solution is proposed, the urgent requests will always be placed. t each cycle, the requests corresponding to on-going contracts are played against new one of higher priorities. The stability is managed through the notion of privileged data source : if an existing contract is allocated to a data source, this data source will be prioritized in the search in order to avoid contract cancellation and re-initialization with another data source. Step 2: the optimization task Once a first solution has been found, the constraint programming tool will be used to optimise the choice (in the remaining time and in relation with the cost function) by modifying the current solution and by dynamically set a new constraint which is that the cost of a solution shall be lower than the cost of the current one. Basically the cost function that is to be optimised takes into account: the number of request that are covered by a contract, the distribution of the load among the data sources, Some other parameters are taken into account and may be minimised such as: the delays between the arrival of the request and the arrival of the corresponding air derived information, the stability of the contracts. One of the problematic lies in the cost function that has to be relevant in order to avoid problems in the time processing: if the cost function has too many parameters, then the software has a lot of possibility (dimension) to modify the current solution and may consume a lot of CPU time to make the optimisation task. Therefore, when possible, the parameters will have to be taken into account in the search function and not in the cost function. The cost function and the associated response time also depend on the scaling aspects (how many requests at a given time for how many data sources?). 4.3 The DSD software The purpose of the DSD software is to analyse the most critical sub-function from an algorithm point of view. Therefore the search task and the optimisation task with the associated cost function have been implemented. In order to ensure that the DSD will take decision very rapidly, the ILOG SOLVER tools has been configured to stop the search after 10 seconds. One of the problem encountered in the different load scenarios (issued from real air traffic situations) and played with the DSD, is the problem of partial solutions. The DSD may not place all requests depending on the actual sensor configuration, number of requests and remaining time. During the search, each time the constraint programming tool backtracks in the search tree because it has detected inconsistency (one or several constraints on the load can not be respected), the current partial solution is stored only if the number of instantiated requests is greater than the number of instantiated requests in the last stored partial solution. The best partial solution explored is given back to the operator. One important question raised and still under study is the distance between this solution and the optimal one if it exists. Concerning the data sources load the following model have been used for DS data source : Load Load max cur NC = T FB av FB = Loadprev + T Load i chosen max where N c is a maximum number of contracts, T a processing period, FB av the average size of the data format held in N c, FB chosen is the chosen data block format size, T i the renewal period required in the contract.

For the mode S station a maximum of data block per sector was authorized. 5. Conclusion The results of this project were quite positive although the reaction time would not go under one second in case of complex situation (in that case the DSD can spend 10 seconds to find a partial solution ). The management of request for air derived information with constraint programming is feasible and robust to scaling aspects. However, the time allocated to the search and optimization task is defined by the programmer : the problem is in fact in the quality of a partial solution and its distance to the best one. One another problem that is to be tackled is the combination of requests (a simple combination has been implemented), the compression (and decompression) of requests is very complex in overloaded situations. Figure 9 : this diagram shows the global allocation of requests over time (in black), the allocation of request to one DS data source (in yellow) and three mode S station (in green). The stability of the contracts over time has to be monitored in order to avoid discontinuity in the delivery of on-board information. Furthermore, an unstable system generates more message than a stable system and thus the corresponding overloaded situation.