Application of a Fast-time Network Simulation to Air Traffic Flow Management Analysis
نویسندگان
چکیده
The Mid-Level Model (MLM) is a MITRE CAASD-developed fast-time network simulation of the U.S. National Airspace System (NAS) and other world regions. We present a brief overview of MLM and an example of an MLM application to Air Traffic Flow Management (TFM). TFM actions are commonly used to mitigate capacity/demand imbalances within the NAS. Modeling TFM events has proven challenging in the past, partly because of weather forecast uncertainty, and partly because of the complexity and unpredictability associated with highly-interrelated traffic patterns and distributed decision-making in the NAS. We present results of an MLM simulation of a NAS TFM event in which weather effects are relatively small. This facilitates interpretation of the similarities and differences between simulation results and the actual event in terms of NAS operations and decision making, with relatively small weather-related complications. We conclude that TFM modeling shows promise as a tool to aid post-event TFM analysis, but the complex operational factors impose limits on the predictability of outcomes in TFM events.
منابع مشابه
Behavioral Analysis of Traffic Flow for an Effective Network Traffic Identification
Fast and accurate network traffic identification is becoming essential for network management, high quality of service control and early detection of network traffic abnormalities. Techniques based on statistical features of packet flows have recently become popular for network classification due to the limitations of traditional port and payload based methods. In this paper, we propose a metho...
متن کاملFeature Extraction to Identify Network Traffic with Considering Packet Loss Effects
There are huge petitions of network traffic coming from various applications on Internet. In dealing with this volume of network traffic, network management plays a crucial rule. Traffic classification is a basic technique which is used by Internet service providers (ISP) to manage network resources and to guarantee Internet security. In addition, growing bandwidth usage, at one hand, and limit...
متن کاملThird-order Decentralized Safe Consensus Protocol for Inter-connected Heterogeneous Vehicular Platoons
In this paper, the stability analysis and control design of heterogeneous traffic flow is considered. It is assumed that the traffic flow consists of infinite number of cooperative non-identical vehicular platoons. Two different networks are investigated in stability analysis of heterogeneous traffic flow: 1) inter-platoon network which deals with the communication topology of lead vehicles and...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملOptimal Signal Control in Urban Road Networks with High Priority Congested Centers
Keeping the density of traffic flow and air pollution in an acceptable level and developing a good capacity for transit in the high priority areas of the city, is really a big deal in large and crowded cities. To address this problem, a new method of intersection signal optimization is presented in this paper. Based on network fundamental diagrams, an Internal–External Traffic Metering Strategy...
متن کامل