• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Toronto Airport Case Study Wireless Applications

Extracts from this document...

Introduction

Toronto Airport Case Study – Wireless Applications

Introduction:

Overview

In 1994, the Greater Toronto Airports Authority (GTAA) began planning to rebuild Terminal 1 at the Toronto Pearson airport.  The GTAA is a not-for-profit authority that was appointed to operate the airport under agreement with the government of Canada. As part of this effort, the GTAA intended to shift to a new model of infrastructure – common use(Briody 2004).

 Traditionally, in most North American airports, the gates have been “dedicated” to the use of a single carrier.  That is, the airline usually has an exclusive lease and exclusive use of specific gates in the airport terminals.  The airline installs its own data network, its own voice system, and its own proprietary computer terminals.  The implications are that the “owning” carrier essentially locks out any other airline from utilizing that particular gate even if it is idle.

With the common use approach, airlines do not have exclusive use of specific gates and airline proprietary IT systems are not used.  Instead, the airport infrastructure is set up to support the flexible reconfiguration of gates, check-in counters, security, and baggage systems to different airlines on an as-needed basis.  It is intended to aid in the flexible movement of passengers and planes around the airport to match the demands at a given point in time.  This flexibility is intended to increase airport efficiency by sharing space and resources more effectively(ARUP 2004).  This also has the advantage of letting the airlines focus on their core competencies rather than having to be IT experts.

The $4.4 billion terminal and its supporting common use infrastructure were put into service in April 2004(Rosencrance 2004).

Business Problems

This approach has a significant impact on the IT infrastructure within the airport terminal.  With a common use approach, the airport authority installs and manages the IT infrastructure including:

Data Network

...read more.

Middle

MTTR – 2 hours

Capacity to handle multiple data video data streams while maintaining video quality

Capacity – 22 video streams

Latency/Delay – 200ms

Security Communication

Must be available at all times of airport operations

Availability – 5 nine’s

MTTR – 2 hours

Voice over IP communications must be maintained under all network loads

Capacity – 20 simultaneous

Latency/Delay – < 150ms

Kiosk

Check-ins

Must be available at all times of airport operations.

Availability – 5 nine’s

Minimize customer wait times

Response Time – 30 seconds

Throughput – 2000 tph

Public WLAN Access

Provide an engineered level of service for Public usage (lower priority than other core services)

Throughput – 100 mbps

Capacity – 40 simultaneous users

Utilization – 50%

Do not impact core wireless operational services

% Traffic dropped – 20%

Role Based Access Control

Must be available at all times of airport operations as all other wireless applications depend on this

Availability – 5 nine’s

MTTR – 2 hours

Do not impact response time of other applications

Capacity – 5000 users in DB

Throughput – 2000 tph

Delay – 100 ms

Ranking of importance of Services/Applications

The following table summarizes the relative importance of each of the applications that was identified in the previous subsection.  These start with the most important.

Rank

Application

Justification

1

Core Network

Core IP network (which is not the direct target of this case study) would have to be operational to support all of the applications

2

Role Based Access Control

This application is required to insure that access from the wireless network is control based on the role of the user.  If this is not available, it is not safe to allow anyone to access any of the applications supported by the wireless network.

3

Security Communication

The security personnel in the airport cannot afford to lose their voice communications.  In the event of some kind of incident, they must be able to communicate with each other irrespective of any IT related outages.  Safety/Security issue.

4

Video Surveillance

Same reason as above.   While voice communications for the security personnel is more important, video surveillance is very close in importance.  Safety/Security issue.

5

Baggage Reconciliation

...read more.

Conclusion

Core IP Network

Applications that utilize the wired network

Wireless Infrastructure

Applications that utilize the wireless infrastructure and wired network

Motivation

The scope of this business continuity plan covers the last two items associated with the wireless infrastructure.  Because of the reliance of the new airport terminal on this new technology, it is important that the continuity of this infrastructure be addressed to meet the needs of GTAA, the Canadian department of transportation, and the users of this airport.

Key Elements of the Plan

The plan identifies the services that are dependent on the wireless infrastructure and continuity objectives for each of the applications associated with those services.  Those services are:

Baggage Handling – Baggage Tracking and Baggage Reconciliation

Security Services – Video Surveillance and Security Communication

Customer Services – Kiosk Check-in and Public WLAN Access

The plan then describes and prioritizes the Single Points of Failure in the wireless infrastructure.  The relationship to those single points of failure and services and applications is also established.

Recommendations are then made to improve the business continuity of the wireless infrastructure.  These recommendations include appropriate redundancy to insure continuity of the appropriate services.  All recommendations identify potential losses and cost to implement the recommendation.  All recommendations have a positive ROI and should be implemented.

Special attention should be paid to the recommendation on power facilities for the wireless infrastructure.  Given that security communications is reliant on the wireless infrastructure, an 8-hour battery backup is recommended to insure that security can be maintained even in the face of a catastrophic power failure such as the blackout that was seen recently in the northeast section of the United States and Canada.  Even though airport operations will be disrupted in such an event, it is important that security retains the ability to communicate during the event.

Note that the data backup and recovery procedures are not covered in this business continuity plan but are contained in the corresponding continuity plan that covers the non-wireless infrastructure.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    the listed treatments administered to the pet back to the branch after the pets appointment.

  2. Examine the many micro operations and their activities in Brussels airport.

    Take, for example, a restaurant in the departure area. Its inputs are things like, raw materials, equipment and skills, the transformations include cooking and presenting. The outputs are various dishes that have value to customers. Due to the nature of an airport, there are many different types of transformation processes in Brussels2.

  1. Implementation Issues: Implementation of Enterprise Systems

    isolates media failures during backup; SAP supported and documented backup process Cons Does not eliminate media failures, Does not address CPU/Memory/Cluster failures; Logshipping - new process to GSK; More problematic Sun storage. Option Risk Implementation - Low (slightly higher than Option 1 - introduction of Oracle on the Backup server);

  2. Develop a Puzzle Website for users of three different age groups, Kids, Teenagers and ...

    Most exchanges are text-only. However, some services allow attachments. In order for IMing to work, both users (who must subscribe to the service) must be online at the same time, and the intended recipient must be willing to accept instant messages. (It is possible to set your software to reject messages.)

  1. The project explains various algorithms that are exercised to recognize the characters present on ...

    4) O3 - Additional to all above optimization, file level optimization is performed. From all the above four level of optimization and considering the tradeoff between memory usage and speed, O1 level was used as compiler optimization for this project. 5.5.4 Optimization Results and Summary After applying all these optimization techniques

  2. MAKING WAP COMPETE WITH WWW : An Approach To Bring Web Services To Mobile ...

    platform and making it easy to access as it was in the wired platform like WWW. I have planned to use WAP as a platform to implement the application development in WAP enabled mobile devices. .NET is considered to be an opted package to develop this application.

  1. Precise analysis about The legal or illegal utilization of Internet cookies

    In recent years it also has raised concerns in internet users about their privacy (Palmer 2005, p. 271). As stated by Lin and Loui (1998, p. 47), some uses of cookies are morally allowed and cannot be a serious

  2. Computer Health and Safety

    viii A stable and adjustable document holder should be used if documents are being referred to during typing. The document holder should be at the same distance from the eye and the screen. This will prevent constant change of focus and also enable exchanging glances from the document folder and the screen without frequent movement of the neck and back.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work