Feeds

How much bandwidth will next gen airports need?

Help airports offload data - opt for an enhanced patdown

The essential guide to IT transformation

“Could we have a single wired and wireless infrastructure with a batch of base stations. Add a new service, just add a new box.”

The system has to be scalable, secure, and upgradeable.

The bandwidth figures were cooked up a couple of years back, following lots of simulating on how people move around airports, and modelling situations such as planes arriving. But according to one of the team, Cambridge's Professor Richard Penty, they're still about right.

Example imagery produced by AIT millimetre wave airport scanner. Credit: TSA

“Biometric data for identifying people hasn't taken off as much as we thought,” he says though conceding that “its very hard to extract traffic data from operators so we can't be sure”.

Breakthroughs by TINA include determining new algorithms for addressing and routing in combined wired and wireless environments. White points out that with one million or more RFID tags around, each having an address, it presents a major switching and routing challenge. “Ethernet is limited in way it can address such huge numbers without requiring a lot of switching,” he says.

The team have developed a modified Ethernet system, called Moose (multi-layer origin-organised scalable ethernet), to simplify the routing.

Also it has designed a new form of wireless signal distribution network where multi service antenna units cooperate, not only to provide communication but also ID and location services. Radio over fibre systems have been developed to allow such signal distribution at RF frequencies while being agnostic to the exact radio service in the single unified infrastructure.

Penty says the distributed antenna system approach for comms “requires about 25 per cent, we believe, of the system power than single antenna solutions for similar levels of coverage. “

The TINA project hasn't yet agreed a trial but are in discussions with airport operators and other sectors, as well.

Other developments since the project started include an ongoing /discussion about the use of mobile phones as passenger boarding cards via a 2D bar code sent to the phone. Penty says some implementations are about to happen, but “of course not everyone has a phone or would want to provide their number or be able to display the bar code. So there's some fragmentation in approach here.” ®

Boost IT visibility and business value

More from The Register

next story
Pay to play: The hidden cost of software defined everything
Enter credit card details if you want that system you bought to actually be useful
Shoot-em-up: Sony Online Entertainment hit by 'large scale DDoS attack'
Games disrupted as firm struggles to control network
HP busts out new ProLiant Gen9 servers
Think those are cool? Wait till you get a load of our racks
Silicon Valley jolted by magnitude 6.1 quake – its biggest in 25 years
Did the earth move for you at VMworld – oh, OK. It just did. A lot
VMware's high-wire balancing act: EVO might drag us ALL down
Get it right, EMC, or there'll be STORAGE CIVIL WAR. Mark my words
Forrester says it's time to give up on physical storage arrays
The physical/virtual storage tipping point may just have arrived
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.