Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2017, Vol. 57 Issue (12) : 1239-1244     DOI: 10.16511/j.cnki.qhdxxb.2017.21.021
COMPUTER SCIENCE AND TECHNOLOGY |
Link on-off prediction based multipath transfer optimization for aircraft
JIANG Zhuo1,2, WU Qian2,3, LI Hewu2,3, WU Jianping1,2
1. Department of Computer Science and Technology, Tsinghua University, Beijing 100084, China;
2. Institute of Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China;
3. Tsinghua National Laboratory for Information Science and Technology, Tsinghua University, Beijing 100084, China
Download: PDF(1303 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  The two main technologies used for aircraft internet access are satellite and air-to-ground (ATG) communication systems. When an aircraft flies over areas with overlapping signals, communicating with multiple paths may greatly improve transmission performance. This paper presents an optimization scheme for multipath transmissions in such aircraft multiple access scenarios. The slow link state discovery rates and inefficient data scheduling are improved by a link on-off prediction based data scheduling algorithm. The severe out-of-order condition caused by a long link round trip time (RTT) and loss rate differences is improved by transmitting a data level negative acknowledgement with all subflows from the receiver so that the sender can quickly identify and retransmit lost packets. Simulations show that this method is better than existing mechanisms for both the aggregated bandwidth and the average number of out of order packets.
Keywords space and terrestrial integrated network      aircraft communication      air-to-ground      multipath transfer      data scheduling     
ZTFLH:  TP393.0  
Issue Date: 15 December 2017
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
JIANG Zhuo
WU Qian
LI Hewu
WU Jianping
Cite this article:   
JIANG Zhuo,WU Qian,LI Hewu, et al. Link on-off prediction based multipath transfer optimization for aircraft[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(12): 1239-1244.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2017.21.021     OR     http://jst.tsinghuajournals.com/EN/Y2017/V57/I12/1239
  
  
  
  
  
  
  
  
[1] 费满锋, 王杰令, 易克初, 等. 一种新颖的宽带地空通信系统方案[J]. 西安电子科技大学学报, 2008, 35(3):403-408.FEI Manfeng, WANG Jieling, YI Kechu, et al. Novel scheme for the wide band ground-air communication system[J]. Journal of XiDian University, 2008, 35(3):403-408. (in Chinese)
[2] McGrath G G. An optimization metric for air-to-ground network planning[J]. IEEE Transactions on Wireless Communications, 2009, 8(5):2336-2340.
[3] LI Ming, Lukyanenko A, Ou Z, et al. Multipath transmission for the Internet:A survey[J]. IEEE Communications Surveys & Tutorials, 2016, 18(4):2887-2925.
url: http://dx.doi.org/Communications Surveys
[4] LI Jie, GONG Erling, SUN Zhiqiang, et al. AeroMTP:A fountain code-based multipath transport protocol for airborne networks[J]. Chinese Journal of Aeronautics, 2015, 28(4):1147-1162.
[5] 孙力娟, 蔡冬, 肖甫, 等. 改进的卫星网络多路径并行传输算法[J]. 系统工程与电子技术, 2012, 34(3):582-587.SUN Lijuan, CAI Dong, XIAO Fu, et al. Improved algorithm of concurrent multi-path transfer for satellite networks[J]. Systems Engineering and Electronics, 2012, 34(3):582-587. (in Chinese)
[6] Shrader B, Pudlewski S, Herrera L, et al. A multipath routing overlay for networks with blockage[C]//12th Annual IEEE International Conference on Sensing, Communication, and Networking. Seattle, WA, USA:IEEE, 2015:283-291.
[7] Oh B H, Lee J. Feedback-based path failure detection and buffer blocking protection for MPTCP[J]. IEEE/ACM Transactions on Networking. 2016, 24(6):3450-3461.
[8] Lim Y S, Chen Y C, Nahum E M, et al. Cross-layer path management in multi-path transport protocol for mobile devices[C]//IEEE Conference on Computer Communications. Toronto, ON, Canada:IEEE, 2014:1815-1823.
[9] YANG Fan. Non-renegable Selective Acknowledgments and Scheduling for TCP and Multipath TCP[D]. Delaware:University of Delaware, 2015.
[10] Kuhn N, Lochin E, Mifdaoui A, et al. DAPS:Intelligent delay-aware packet scheduling for multipath transport[C]//2014 IEEE International Conference on Communications (ICC). Sydney, Australia:IEEE, 2014:1222-1227.
[11] NI Dan, XUE Kaiping, HONG Peilin, et al. Fine-grained forward prediction based dynamic packet scheduling mechanism for multipath TCP in lossy networks[C]//23rd International Conference on Computer Communication and Networks. Shanghai, China:IEEE, 2014:1-7.
[12] Ferlin S, Alay Ö, Mehani O, et al. BLEST:Blocking estimation-based MPTCP scheduler for heterogeneous networks[C]//IFIP Networking Conference (IFIP Networking) and Workshops. Vienna, Austria:IEEE, 2016:431-439.
[13] CUI Lin, Koh S J, Lee W J. Fast selective ACK scheme for through put enhancement of multi-homed SCTP hosts[J] IEEE Communications Letters, 2010, 14(6):587-589.
[14] 阳旺, 李贺武, 吴茜, 等. 基于最小反馈时延的多径应答路径选择算法[J]. 清华大学学报(自然科学版), 2011, 51(7):933-936.YANG Wang, LI Hewu, WU Qian, et al. Minimum feedback delay based ACK path selection algorithm for multipath transfer[J]. J Tsinghua Univ (Sci and Tech), 2011, 51(7):933-936. (in Chinese)
[15] Kurosaka T, Bandai M. Multipath TCP with multiple ACKs for heterogeneous communication links[C]//12th Annual IEEE Consumer Communications and Networking Conference (CCNC). Las Vegas, NV, USA:IEEE, 2015:613-614.
[16] Hwang J, Walid A, Yoo J. Fast coupled retransmission for multipath TCP in data center networks[J]. IEEE Systems Journal, 2016(99):1-4.
[17] Gangadhar S, Nguyen T A N, Umapathi G, et al. TCP Westwood (+) protocol implementation in NS-3[C]//Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques. Cannes, France:ICST, 2013:167-175.
[18] Sabetghadam K M. MMPTCP:A Novel Transport Protocol for Data Centre Networks[D]. East Sussex, UK:University of Sussex, 2016.
[1] XIA Zhuoqun, LI Wenhuan, JIANG Lalin, XU Ming. Path analysis attack prediction method for electric power CPS[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(2): 157-163.
[2] ZHAO Jun, BAO Congxiao, LI Xing. OpenFlow based software overlay router[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(2): 164-169.
[3] ZHANG Ting, WANG Yi, YANG Tong, LU Jianyuan, LIU Bin. Design and implementation of an evaluation platform for NDN name lookup algorithms[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(1): 1-7.
[4] XU Hongping, LIU Yang, YI Hang, YAN Xiaotao, KANG Jian, ZHANG Wenjin. Abnormal traffic flow identification for a measurement and control network for launch vehicles[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(1): 20-26,34.
[5] GAO Yang, MA Yangyang, ZHANG Liang, WANG Meilin, WANG Weiping. Synchronization control of cyber physical systems during malicious stochastic attacks[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(1): 14-19.
[6] ZHANG Yu, PAN Xiaoming, LIU Qingzhong, CAO Junkuo, LUO Ziqiang. APT attacks and defenses[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(11): 1127-1133.
[7] HAN Xinhui, WEI Shuang, YE Jiayi, ZHANG Chao, YE Zhiyuan. Detect use-after-free vulnerabilities in binaries[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(10): 1022-1029.
[8] CAO Laicheng, HE Wenwen, LIU Yufei, GUO Xian, FENG Tao. Cooperative dynamic data possession scheme across a cloud storage environment[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(10): 1048-1055.
[9] LIU Wu, WANG Yongke, SUN Donghong, REN Ping, LIU Ke. Login authentication vulnerability mining and improved login authentication method based on an open source intelligent terminal[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(9): 897-902.
[10] MA Rui, ZHU Tianbao, MA Ke, HU Changzhen, ZHAO Xiaolin. Single-witness-based distributed detection for node replication attack[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(9): 909-913,920.
[11] YAN Jianen, ZHANG Zhaoxin, XU Haiyan, ZHANG Hongli. Detection of IRC Botnet C&C channels using the instruction syntax[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(9): 914-920.
[12] CHEN Yu, WANG Na, WANG Jindong. An n-fold reduction of linguistic variables based on the triangular fuzzy numbers[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(8): 892-896.
[13] LI Yu, ZHAO Yong, GUO Xiaodong, LIU Guole. An assurance model for accesscontrol on cloud computing systems[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(4): 432-436.
[14] XU Mingwei, XIA Anqing, YANG Yuan, WANG Yuliang, SANG Meng. Intra-domain routing protocol OSPF+ for integrated terrestrial and space networks[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(1): 12-17.
[15] WANG Weiping, BAI Junyang, ZHANG Yuchan, WANG Jianxin. Dynamic taint tracking in JavaScript using revised code[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(9): 956-962,968.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd