• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Toronto Airport Case Study Wireless Applications

Extracts from this document...


Toronto Airport Case Study – Wireless Applications



In 1994, the Greater Toronto Airports Authority (GTAA) began planning to rebuild Terminal 1 at the Toronto Pearson airport.  The GTAA is a not-for-profit authority that was appointed to operate the airport under agreement with the government of Canada. As part of this effort, the GTAA intended to shift to a new model of infrastructure – common use(Briody 2004).

 Traditionally, in most North American airports, the gates have been “dedicated” to the use of a single carrier.  That is, the airline usually has an exclusive lease and exclusive use of specific gates in the airport terminals.  The airline installs its own data network, its own voice system, and its own proprietary computer terminals.  The implications are that the “owning” carrier essentially locks out any other airline from utilizing that particular gate even if it is idle.

With the common use approach, airlines do not have exclusive use of specific gates and airline proprietary IT systems are not used.  Instead, the airport infrastructure is set up to support the flexible reconfiguration of gates, check-in counters, security, and baggage systems to different airlines on an as-needed basis.  It is intended to aid in the flexible movement of passengers and planes around the airport to match the demands at a given point in time.  This flexibility is intended to increase airport efficiency by sharing space and resources more effectively(ARUP 2004).  This also has the advantage of letting the airlines focus on their core competencies rather than having to be IT experts.

The $4.4 billion terminal and its supporting common use infrastructure were put into service in April 2004(Rosencrance 2004).

Business Problems

This approach has a significant impact on the IT infrastructure within the airport terminal.  With a common use approach, the airport authority installs and manages the IT infrastructure including:

Data Network

...read more.


MTTR – 2 hours

Capacity to handle multiple data video data streams while maintaining video quality

Capacity – 22 video streams

Latency/Delay – 200ms

Security Communication

Must be available at all times of airport operations

Availability – 5 nine’s

MTTR – 2 hours

Voice over IP communications must be maintained under all network loads

Capacity – 20 simultaneous

Latency/Delay – < 150ms



Must be available at all times of airport operations.

Availability – 5 nine’s

Minimize customer wait times

Response Time – 30 seconds

Throughput – 2000 tph

Public WLAN Access

Provide an engineered level of service for Public usage (lower priority than other core services)

Throughput – 100 mbps

Capacity – 40 simultaneous users

Utilization – 50%

Do not impact core wireless operational services

% Traffic dropped – 20%

Role Based Access Control

Must be available at all times of airport operations as all other wireless applications depend on this

Availability – 5 nine’s

MTTR – 2 hours

Do not impact response time of other applications

Capacity – 5000 users in DB

Throughput – 2000 tph

Delay – 100 ms

Ranking of importance of Services/Applications

The following table summarizes the relative importance of each of the applications that was identified in the previous subsection.  These start with the most important.





Core Network

Core IP network (which is not the direct target of this case study) would have to be operational to support all of the applications


Role Based Access Control

This application is required to insure that access from the wireless network is control based on the role of the user.  If this is not available, it is not safe to allow anyone to access any of the applications supported by the wireless network.


Security Communication

The security personnel in the airport cannot afford to lose their voice communications.  In the event of some kind of incident, they must be able to communicate with each other irrespective of any IT related outages.  Safety/Security issue.


Video Surveillance

Same reason as above.   While voice communications for the security personnel is more important, video surveillance is very close in importance.  Safety/Security issue.


Baggage Reconciliation

...read more.


Core IP Network

Applications that utilize the wired network

Wireless Infrastructure

Applications that utilize the wireless infrastructure and wired network


The scope of this business continuity plan covers the last two items associated with the wireless infrastructure.  Because of the reliance of the new airport terminal on this new technology, it is important that the continuity of this infrastructure be addressed to meet the needs of GTAA, the Canadian department of transportation, and the users of this airport.

Key Elements of the Plan

The plan identifies the services that are dependent on the wireless infrastructure and continuity objectives for each of the applications associated with those services.  Those services are:

Baggage Handling – Baggage Tracking and Baggage Reconciliation

Security Services – Video Surveillance and Security Communication

Customer Services – Kiosk Check-in and Public WLAN Access

The plan then describes and prioritizes the Single Points of Failure in the wireless infrastructure.  The relationship to those single points of failure and services and applications is also established.

Recommendations are then made to improve the business continuity of the wireless infrastructure.  These recommendations include appropriate redundancy to insure continuity of the appropriate services.  All recommendations identify potential losses and cost to implement the recommendation.  All recommendations have a positive ROI and should be implemented.

Special attention should be paid to the recommendation on power facilities for the wireless infrastructure.  Given that security communications is reliant on the wireless infrastructure, an 8-hour battery backup is recommended to insure that security can be maintained even in the face of a catastrophic power failure such as the blackout that was seen recently in the northeast section of the United States and Canada.  Even though airport operations will be disrupted in such an event, it is important that security retains the ability to communicate during the event.

Note that the data backup and recovery procedures are not covered in this business continuity plan but are contained in the corresponding continuity plan that covers the non-wireless infrastructure.

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Fifthly we have Appointment Details, this identifies when a client books an appointment which is processed by PVVS. Sixthly again we have Appointment Details, this identifies when a client's appointment has been processed and then this information is then sent out to the client.

  2. Examine the many micro operations and their activities in Brussels airport.

    Take, for example, a restaurant in the departure area. Its inputs are things like, raw materials, equipment and skills, the transformations include cooking and presenting. The outputs are various dishes that have value to customers. Due to the nature of an airport, there are many different types of transformation processes in Brussels2.

  1. Implementation of Path Finding Techniques in Homeland Security Robots

    Simplified memory-bounded A* proceeds just like A* expanding the best leaf until memory is full. When it finds that it cannot add a new node to the search tree without dropping an old one, SMA* drops the worst leaf node which is the one with the highest f-value.

  2. Implementation Issues: Implementation of Enterprise Systems

    * One Disk used by Sun Cluster 2.1 (mandatory). * Two Disks used by SAP Central Instance Logical Host. * Remaining 53 discs used for Oracle 8.0.4 database. * All storage is mirrored using the Veritas Volume Manager. This is a mandatory requirement for Sun Cluster 2.1. * The storage is striped (Software RAID 0)

  1. Develop a Puzzle Website for users of three different age groups, Kids, Teenagers and ...

    Access Protocol that let the user save messages in a server mailbox and download them periodically from the server. In other words, users typically use a program that uses SMTP for sending e-mail and either POP3 or IMAP for receiving messages that have been received for them at their local server.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    Function Number of clock cycles (� 106) Computation time with a CPU of 600 MHz ( ms) Image Copy 1.8 2.8 Defragmentation 4.7 7.5 Resizing Quad Gen 10.8 17.28 File Mapping 0.3 0.48 Reprocess Image 12.5 20 Template Matching 4.4 7 Process Image 21.6 34.4 Total 56.1 89.46 Table 5.5

  1. MAKING WAP COMPETE WITH WWW : An Approach To Bring Web Services To Mobile ...

    Others say that higher bitrate technologies, like GPRS and 3G will take away the need for WAP in the future and also the use of PHP (Hypertext Preprocessor) [3]. In this project I have decided to focus on bringing the different web services available in wired platform to the wireless

  2. Precise analysis about The legal or illegal utilization of Internet cookies

    In this regard, Bennett even notices that "cookie technology might be the tracking device of the past" (cited in Palmer 2005, Paras 3). Synthesizing their ideas, I reach a conclusion that use of cookies involves the capability of electronic commerce to enter the user's computer and get data about them

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work