computer science case study: computer systems in …€¦ · • digital fi ngerprints • hand...

16
16 pages M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS For use in May 2010, November 2010, May 2011 and November 2011. COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN AIRPORTS INSTRUCTIONS TO CANDIDATES Case study booklet required for higher level paper 2 and standard level paper 2 computer science examinations. © International Baccalaureate Organization 2008

Upload: others

Post on 06-Oct-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

16 pages

M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

For use in May 2010, November 2010, May 2011 and November 2011.

COMPUTER SCIENCECASE STUDY: COMPUTER SYSTEMS IN AIRPORTS

INSTRUCTIONS TO CANDIDATES

• Case study booklet required for higher level paper 2 and standard level paper 2 computer science examinations.

© International Baccalaureate Organization 2008

Page 2: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–2– M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Contents

IntroductIon .................................................................................................................................................3

networks ......................................................................................................................................................3

IntegratIon ..............................................................................................................................................3

BrIef descrIptIon of each system ..........................................................................................................3

network securIty ...................................................................................................................................4

aIrport securIty ..........................................................................................................................................5

employees.................................................................................................................................................5

passengers ...............................................................................................................................................6

check-In ........................................................................................................................................................7

aIr traffIc control .....................................................................................................................................8

Baggage handlIng: software desIgn .........................................................................................................9

reservatIon systems ..................................................................................................................................10

passenger servIces .....................................................................................................................................11

dIsplays ..................................................................................................................................................11

announcements .....................................................................................................................................11

wI-fI .......................................................................................................................................................12

Is there an overdependence on computer systems? ...............................................................................13

appendIx I – aBBrevIatIons used In the case study ................................................................................14

appendIx II – BIBlIography .......................................................................................................................15

Page 3: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–3–

Turn over

M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Computer systems in airports

Introduction

Modernairportsarenowhighlyreliantoncomputerizedsystemsthatprovide thefacilitiesforsafeandefficient access to air travel, as well as making the airport a pleasant environment for passengers.Thiscasestudyexploressomeoftheareasthatmakeuseofsuchsystems.

Networks

IntegrationComputer systemshavenowbeendeveloped that integrate all areas of amodern airport. These areas(ormodules)arelinkedviaanetworktopowerfulservers(seediagrambelow).

Airtrafficcontrol

Flightschedules

Billingsystem

Centraldatabase

Groundservices

FIDS

Arrivals

Handlingagents

Staffinformation

Baggagesystem

GulfAirQantas

$Brief description of each system

Airtrafficcontrol Controlstheairspacearoundtheairportincludinglandingandtakeoff.

Baggagesystem Movementofbaggagearoundairport.

Billingsystem Calculatesfeesfortheairlines.

FIDS Flightinformationdisplaysystems.

Flightschedules Flightdetailsforeachairline.

Groundservices Catering,useofbuses,refueling, etc.

Handlingagents Airlinecheck-inandotherservices.

Staffinformation Airportstaffinformation.

Integrated airport system

Page 4: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–4– M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

ThecomplexityofthecomputernetworksthatmanagemodernairportscanbeseenbylookingatsomeofthetechnicaldetailsforLondonHeathrow’sTerminal5(T5),whichopenedatthebeginningof2008,andwhichwasdesignedtohandleupto30millionpassengerseachyear.

Thehighbandwidthbackboneoftheterminal’snetworkcontainsover2500kmofcablewhichconnecttwocentraldatacentresand66secondarycommunicationcentres.Over9000differentdevicesareconnectedtothenetworkwhichusesinternetprotocol(IP)tocarryvoiceanddatasystems.1

AnewcontrolcentreforthewholeairportisalsobasedatT5.Thismanagesthemovementofaircrafttoandfromtheairport,communicationswiththeairplanes’crews,andthemovementofaircraftontheground.Thenewcontroltowerwasplannedtoruninparallelwiththeoldtowerforthreemonthsbeforemakingthefinalswitchover.2

All systemswere tested for the sixmonths preceeding the openingof the terminalwith 16000peoplerecruitedtoactas“passengers”.

Network securityFailuretosecurethenetworkfromeitheraccidentalordeliberateerrorscouldhaveadramaticeffectonthefunctioningofthenetwork.Ifthedifferentsystemsareintegratedintoonenetwork,thencaremustbetakenthatafailureinonesectiondoesnothavesimilareffectsinotherpartsofthenetwork.

Partsofthesystemaresafety-critical,suchasAirTrafficControl(seepage8).Evenafailureinsystemsthatarenotsafety-critical,suchasbaggagehandling,couldbringtheeffectivefunctioningoftheairporttoahalt.

Airport networksmust also be protected from potential dangers from the Internet, towhich itwill beconnectedthroughagateway.

Variousback-upsystemsmustbeconsidered. Forexample,someairports laymultiplefibre-opticlinksbetweentheserverroomandthecontroltowersothatthecontrollerswouldstayconnectedevenifonelinewascut.

1 http://www.pcw.co.uk/computing/analysis/2187576/pilots-t5-technical-systems2 http://www.airport-technology.com/features/feature916/

Page 5: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–5–

Turn over

M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Airport security

Airportsecuritycanbeseparatedintothreeareas:

• securingtheperimeteroftheairport • securityfortheairportitself • thesecurityofeachplane.

CCTVcamerasareusedextensivelywithinairports,tomonitorboththeperimeteroftheairportandtheairportitself.Imagesaremonitoredbysecuritypersonnel,andtheycanbestoreddigitally,andplayedbackatanytime.Somecamerascanswitchtoinfrared.Expertsystemshavebeendevelopedthatattempttorecognize“unusualbehaviour”withintheairportbuildings.

EmployeesEverypersonthatworkswithinanairport,whethertheyareairportstaff,employedbyoneofthemanyshopsorrestaurants,orairlinestaff,willrequireasecurityclearancetobeabletoenteranyareawithintheairport.Eachareacanbe“isolated”fromtherest,requiringsomekindofIDtobeabletopassfromoneareatoanother.Adevicesecuredbesidetheaccesspointordoorwillbeabletoverifytheidentityofanemployeeinasystem.

TheseIDscouldtaketheformofsmartcardslinkedtosometypeofbiometricidentificationsystem,suchas:

• irisidentification • digitalfingerprints • handgeometry • voicerecognition • facialrecognition • retinaeyepatterns • signatureidentification.

Eachsystemworksbydigitizingcertaincharacteristicsofthefeatureused,andstoringtheseasarecordforeachindividualonacomputersystem.Eachsecuritypointintheairportwillhaveabiometricdevicethatcouldbeastand-alonesystemthatcomparesthebiometricdataofthepersonwiththedataonthesmartcard.Alternatively,thedevicecouldbeconnectedtoacentraldatabase.

Fingerprint technology has been used for a long time and isconsequentlyquite sophisticated. There are, however,ways tocircumvent this system. Iris identification could offer a moresecure system in the future, as it is difficult to forge, and isregardedasonethemostaccurateofthebiometrictechnologies.Itworksbydividinganimageoftheirisintosectionsandturningthevariouspatternsintomathematicalexpressions.3

3 http://www.idlane.com/technology.htm

Fingerprint technology has been used for a long time and isconsequentlyquite sophisticated. There are, however,ways tocircumvent this system. Iris identification could offer a moresecure system in the future, as it is difficult to forge, and isregardedasonethemostaccurateofthebiometrictechnologies.Itworksbydividinganimageoftheirisintosectionsandturningthevariouspatternsintomathematicalexpressions.

Page 6: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–6– M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

PassengersPassengersarerequiredtocarryaformof identification(normallyapassport) inorder toboardplanes.Fortheairline,thismatchesthetravellerwithaparticularflightreservation.Forthesecurityorimmigrationservices,thisdetermineswhetherornotthepersonwillbeallowedtocontinuewiththeirjourney.Modernpassportsareabletobescanned,allowingthepassportdatatobematchedwithdataonthecentraldatabase.

Airports areconsideringaddinganother layerof securitywith regards to thepassengers. Consider thefollowingarticletakenfromThe Guardiannewspaper.

How tagging passengers could improve airport securityFriday13October,2006AlokJha,sciencecorrespondentforThe Guardian

Air travellers could soon be electronically tagged inside airports in a bid to improve security. Thetechnologywouldusewristbandsorboardingpassesembeddedwithcomputerchipsandallowauthoritiestotrackpassengermovementaroundterminalbuildings.

PaulBrennan, anelectronicengineer atUniversityCollegeLondonwho is leadingworkon theEU-fundedOptagsystem, said itwouldcombinehigh resolutionpanoramicvideo imagingwithradio frequency identification (RFID) tags to enhance airport security, safety and efficiency. “Itwouldwork if each passengerwere issuedwith a tag,which could allow location to aboutonemetre accuracy,” he said. “Thevideo and tagdata canbemerged togive a verypowerful surveillancecapability.”

RFIDtagsworkbyemittingashortradiomessagewheninterrogatedbyanelectronictagreader.DrBrennansaidthatOptagRFIDchipswouldnotstoreanypersonaldetails.

“TheyemitauniqueIDwhichisthencross-referencedtothepassengerinformationalreadyonthesystem–maybethenameandflightnumberofthepassenger.Perhapsinthefuturethatwouldbeextendedtothingslikebiometricdata.”ThetagswouldbelinkedtoanetworkofCCTVcameras,whichcouldbeusedtomonitormovementofpeoplearoundterminalbuildings.

DrBrennansaid:“Itcanallowprecisetrackingofcertainindividualsiftheyseemtobeasecurityriskofanysort.Itcanhelptoevacuatetheairport.Itcanproviderapidlocationoflostchildren.”

Optagcouldalsoensurethatpassengersgettoagateontimetoboardaircraft.DrBrennansaidthatflightdelaysduetolate-runningpassengerscostairlines€100mayearinEurope.4

TAG

RFID TAG READER ETHERNET PC / SERVER

4 The Guardiannewspaper,Friday13October,2006

Page 7: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–7–

Turn over

M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Check-in

Airlines are looking for ways of using computer systems to help speed up the check-in process.Severalairlinesallowpassengerstoprinttheirownboardingcardsathome,allowingthemtoby-passthenormalcheck-inprocessattheairport,iftheyonlyhavecarry-onluggage.

Others provide self-service check-in kiosks, offering a quick, easy and safe alternative to traditionalcheck-indesks.Theseself-servicedesksarecomputerterminalsthatarelinkedtotheairline’scomputersystem.Theyallowyoutochooseyourseatandprintyourboardingcard,orinsomecasesmakechangestoyourtravelschedule.

A self-service kiosk

[Source:Adaptedfromhttp://www.britishairways.com/travel/sscidemo7/public/en_gb]

Page 8: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–8– M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Air traffic control

“Air traffic control (ATC) is a service providedbyground-based controllerswhodirect aircraft on thegroundandintheair. Acontroller’sprimarytaskis toseparatecertainaircraft– toprevent themfromcomingtooclosetoeachother. Secondarytasksincludeensuringsafe,orderlyandexpeditiousflowoftrafficandprovidinginformationtopilots,suchasweatherandnavigationinformation.”5

ATCwillalsoupdatetheflightdetailsfilesinthemainserver,whichwillinturnupdateflightinformationdisplaysystemsaroundtheairport,andpossiblytriggerpassengerannouncements.

ATChasalsoseenthewidespreadintegrationofcomputersystems,primarilytoallowincreasedtrafficflow,whilstatthesametimemaintainingthesamehighlevelsofsafety.Thisprocess,however,hasraisedaninterestingquestion:canall(manual)systemsbesuccessfullycomputerized?

Airtrafficcontrollersworkincentresthatcontrolacertainareaofairspace.Theydealwithaircraftthatenter thatspacebymonitoringthepositionof theaircraftusingradar,andmaintainingcontactwiththepilotsbyradio.Wheneveranaircraftenterstheirairspace,acomputerprintsoffastripofpaperwhichcontainsdetailsofthataircraft(type,departure/arrivalairports,flightnumber,IDnumber,etc.)andtheirflightplans(speed,course,altitude,etc.).

Acontroller,onhearingtheprinter,willtakethisstripandplaceitinfrontofhimwithotherstripsrepresentingtheaircraftthatarehisresponsibility.Aseachaircraftpassesthroughthesector,thecontrollerwillregularlyannotateeachstripbyhand,indicating,forexample,changesofheight,controlpassedtoanothercentre,etc. Astripwilltypicallyendupwithmanyannotations,allmadebyhand.Hewillalsochangethepositionofthestripsgroupingtogetheraircraftthatareclosetooneanother,orarrangingthemingroupsdependinguponwhichsectortheyarein.Whenaircraftpassoutoftheircontrol(forexample,whentheyhavelanded),therelevantstripisremoved.

Anexampleofanannotatedflightstripisshownbelow:

[Source:http://perso.tls.cena.fr/chatty/biblio/CHI96/sc_txt.htm]

Agreatdealofmoneyhasbeenspentindevelopingsoftwarethatwouldreplacethepaperstrips,butmanycontrollersremainreluctanttochangeasystemthathasprovensoreliableinsuchasafety-criticalareaasflightcontrol.

“Airtrafficcontrollerslikepaperflightstrips.Theinterfaceisfamiliar,easy-to-use,helpscontrollersinstantlyunderstandthecurrentstateofthetrafficandletsthemcommunicatewithoutinterruptingeachother.”6

Inparticular,theyareconcernedthatmanipulatingacomputer-userinterfacewilldistractthemfromtheirtasks,andthatimportantdataautomaticallyupdatedonacomputerscreenwillgounnoticed.

5 en.wikipedia.org/wiki/Air_traffic_control6 WendyE.MacKay,UniversityofAarhus

Page 9: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–9–

Turn over

M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Baggage handling: Software design

The main function of a baggage handling system is to transport bags quickly from a baggage entrypoint (e.g. acheck-indesk) toapre-determinedoutputpoint (e.g. intoacontainer for loadingonto theaircraft).PartsofthesystemlifecycleforthedesignofthebaggagesystemforLondon’sHeathrowAirport(Terminal5)areoutlinedbelow.

Requirements specifi cationsSpecificationshad tobeagreedbetween the twomajor stakeholders, thecompany that runs theairport(BritishAirportsAuthority),andtheairlinethatwouldexclusivelyusethenewterminal(BritishAirways).

Betweenthebagenteringthesystemandarrivingat itsdestinationwithintheairport,severalprocessescouldbeappliedtothebags.Theseincludebagsbeing:

• automaticallyidentifiedbytheirbaglabel • screenedforexplosives(byautomaticin-lineholdbaggagescreeningmachines) • storedinanearlybagstore(ifpassengersaretooearlyfortheirflight) • manuallyencoded(forresolvingproblemswithbaginformation) • sortedtoflightallocatedloadingpositions(automatedsorting) • fasttracked(forlatebagsthatrequireurgentprocessing) • manuallyhandled(forlargebags;andloadingandunloadingsystems) • reconciled(checkedtoseeifbagsareauthorisedtoloadontoaircrafte.g.toavoidabag

travellingwithoutitsowner).7

Development problemsPotentialproblemsinvolved:

• theuseofmanydifferentsuppliers • theuseofacompletelynewdesign • thelengthoftheproject,whichhadalife-cycleof7years,whichmeantthatspecifications

couldchange.

TestingAsthesystemwillbeinoperationfor24hoursaday,itisessentialthatextensivetestingtakesplacebeforeinstallation.Thistestingincludestheuseof3Dvirtualrealitybaggagehandlingsimulators.

7 http://newsweaver.ie/qualtech/e_article000776781.cfm?x=b11

Page 10: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–10– M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Reservation systems

Whenacustomermakesaflightreservationaunique“passengernamerecord”(PNR)iscreated,whichcontainsflightinformationandpersonaldetailsofthepersonflying.Ifacarishiredorahotelisbookedatthesametime,thisinformationwillalsobestoredonthePNR.

Few airlines store these records on their own system, but instead subscribe to a “global distributionsystem”(GDS),whichisanorganizationthatstoresflightdetailsandPNRsforseveralairlinesonitsdatabases.At present, there are four major GDSs: Amadeus, Galileo, Sabre and Wordspan. Travel agents areconnectedtotheseGDSsthroughWideAreaNetworks.

GDS#1 GDS#2

Carhire

Hotels

Governments

TravelagentsOn-linebooking

These GDSs use a similar format for their records so that information can be passed between them.This allows computerized reservation systems to bookflights usingoneormore airlineswithminimaldelay.Inrecentyears,certaingovernmentshaverequestedthatmoredetailedpersonalinformationisaddedtoaPNR.Agreementhasbeenreached,tothealarmofhumanrightsorganizations,thattheinformationontheserecordscanbeaccessedbygovernmentsandusedtofightcertainseriouscrimes.

A PNR could, therefore, contain credit card details, addresses, phone numbers, emergency contacts,informationonpeoplewho travel together,personalpreferences (suchasmealchoices),detailsofmedicalconditionsandsoon.

Various sources contribute to a PNR record

Page 11: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–11–

Turn over

M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Passenger services

DisplaysInformationistransmittedtopassengerseitherviascreens(flightinformationdisplaysystems)orbymeansofpublicannouncements.

ARRIVALS Time:Date: Jul 29 11 : 38 : 00

FLIGHT No. TIME FROM FLIGHT INFORMATION

Mr Wallace meeting Mr Jones on Flight EZY 359 from GlasgowPlease go to the Airport Information Desk

GLASGOW

RHODESAMSTERDAM

PARIS

HAMBURGMALAGA

VALENCIA

BRUSSELS

EDINBURGH

DUBLINGUERNSEY

DELAYED

DELAYEDEXPECTED

EZY 179

KL 227

EZY 797

RE 311GR 067EZY 359FCA 101

AF 263

OL 863

SN 257

EZY 479

11:5012:1012:2212:5613:1213:2013:3513:4213:48

11:3011:35

12:55

13:43

EXPECTED

EXPECTED

LANDED

11:55

13:14

11:2811:35

12:28

LANDED

EXPECTED 13:20

Each flight is automatically categorised as either arrival or departure, and included on the appropriatesetofpageswithachoiceofarrivalsordeparturesoneachindividualpublicscreen.Displayedinformationincludes:flightnumber,airportname,scheduledtimeandexpectedtime,andstatus(on-time,expected,landed/departed).

FlightrecordsaresortedaccordingtothesamecriteriaastheATCdisplays(i.e.expectedmovementtime)andremovedfromthedisplayafewminutesaftertheflighthasbeenshownas“landed”or“departed”,whichoccurswhenATCenteranactualmovementtimefortheflight.

AnnouncementsTraditionally,airportannouncementsweremadeusingrecordingsofactualvoices.Thisinevitablyledtoawkwardsoundingmessages,asdifferentphraseswere“patched”together.Problemswouldoccurifnewairlinesornewdestinationsarose,asnewrecordingswouldhavetobemade(with,perhaps,differentvoices).Overthepastfewyears,companieshavebeendevelopingnewautomatedsystemsthatdonotrelyonactualvoicerecordings.

The systemdeveloped forHeathrowAirportworksbygenerating and storing the individual phonemes(sounds)thatmakeupaparticularlanguage.Thephonemesdepend,notonlyonthearrangementofletterswithin a syllable but also on the position of the words within a sentence, and the words appearingimmediatelybeforeandafterit.Theword“passenger”forexample,has36phonemesassociatedwithit.8Thesystemisbeinglinkedtotheflightinformationdisplaysystemattheairport,sothatannouncementscanbemadedynamicallyinrealtime.Thesystemwasintroducedintwophases.Thefirstdealtwithgeneralpassenger announcements in thedifferent terminals. The secondphasewas introducedat thedifferentboardinggates,andallowedindividualPCstogeneratelocalannouncements.

8 http://www.airport-int.com/categories/airport-terminal-announcements/its-phonemenal.asp

Page 12: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–12– M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Wi-FiMostairportsnowprovideWi-Fi“hotspots”whichallowusers toconnect their laptops to the Internet.Inordertoconnect,usershavetoentertheirusernameandpassword.Thesearegivenoncetheservicehasbeenpaidfor(usingvouchers,creditcards,etc.).

Wi-Fi originally used “wired equivalent privacy” (WEP), which is encryption technology designed tosecurethedatabeingtransferredbetweenthetransmitterandtheuser’slaptop.However,thistechnologywasshowntobeeasilybroken.Onemethodwasto“trick”theuser’slaptopintothinkingthatithadloggedontoasecurenetwork,whenithadnot.Itdidthisbyexploitingthebasichand-shakingsystem.

Animprovedsecuritysystem,“Wi-Fiprotectedaccess”(WPA2)isnowavailable,whichhasshownitselftobeverysecure.However,itisstillrecommendedthattheserviceprovidermakesuseofstrongpasswords.

Wi-Fiisaglobalsetofstandardsthatusearadiofrequencyof2.4GHz(thesameasmobilephones)witharangeupto100metres.Transferrates,by2008,hadreached11Mbits/s.

[Source:http://www.bbc.co.uk/news]

Page 13: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–13–

Turn over

M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Is there an overdependence on computer systems?

Thiscasestudyhasdemonstratedhowcomputersystemsarenowattheheartofallareasofamodernairport,andarehelpingtomakeairtravelsafer,moreefficient,andmorepleasantforthethousandsofpassengerswhopassthroughtheseairports.

Itis,perhaps,inevitable,thatastechnologydevelops,suchsystemsbecomemoreandmorecomplex,anditisthisverycomplexitywhichcan,attimes,causeproblems.

InAugust2007,thecomputersystemusedbytheUSCustomsandImmigrationServicemalfunctionedatLosAngelesInternationalAirport.Thisresultedinover20000passengersbeingstrandedattheairportforseveralhoursawaitingclearancetoenterthecountry.9

InJuly2008,afaultynetworkcardcausedtheUS$100millionradarsystematIreland’sDublinairporttomalfunction,causingdelaysforseveralthousandpassengers.10

Weoftenhearofsystemsbeingaffectedbyhackersorunhappyemployees,but theculpritsfor thetwoproblemsoutlinedabove(andformanyothers)werethesystemsthemselves.

Themorecomplexasystemis,themorewaysthereareforittogowrongandthelongeritwilltaketobefixed.Aswebecomemoreandmoredependentoncomputersystems,notjustinairportsbutinallareasofourlives,theconsequencesoffailurebecomeincreasinglysevere.

9 The New York Times,12September2007 10 http://www.irishtimes.com/newspaper/breaking/2008/0717/breaking73.htm

Page 14: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–14– M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Appendix I – Abbreviations used in the case study

3D – 3-dimensional

ATC – Airtrafficcontrol

CCTV – Closedcircuittelevision

EU – EuropeanUnion

FIDS – Flightinformationdisplaysystem

IP – Internetprotocol

T5 – Terminal5(LondonHeathrowAirport)

PNR – Personalnamerecord

RFID – Radiofrequencyidentificationdevice

WEP – Wiredequivalentprivacy

Wi-Fi – Wirelessfidelity

WPA – Wi-Fiprotectedaccess

Page 15: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–15–

Turn over

M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Appendix II – Bibliography Air traffic control.URL:http://en.wikipedia.org/wiki/Air_traffic_control

Airport Security. URL:http://www.saic.com/aviation/security.html

Banks,J.T5 – We Have the Technology.1February2007.URL:http://www.airport-technology.com/features/feature916/

The Brain in Spain.URL:http://www.airport-int.com/categories/artificial-announcement-systems/artificial-announcement-systems.asp

Derksen,R.vanderWouden,H.andHeath,P.Testing The Heathrow Terminal 5 Baggage Handling System – Before It Is Built.3April2007.URL:http://newsweaver.ie/qualtech/e_article000776781.cfm?x=b11,0,w

Duffy,J.The future of airport security.12November2003.URL:http://news.bbc.co.uk/2/hi/uk_news/magazine/3263343.stm

Faulty computer blamed for airport radar breakdown.17July2008.URL:http://www.irishtimes.com/newspaper/breaking/2008/0717/breaking73.htm

Friedlos,D.BA pilots T5 technical systems.12April2007.URL:http://www.pcw.co.uk/computing/analysis/2187576/pilots-t5-technical-systems

Gibbs,W.(September1994),“Software’sChronicCrisis”.Scientific American.271,pages72-81.URL:http://www.cis.gsu.edu/~mmoore/CIS3300/handouts/SciAmSept1994.html

Godin,J.It’s Phoneme-nal.URL:http://www.airport-int.com/categories/airport-terminal-announcements/its-phonemenal.asp

Hasbrouck,E.What’s in a Passenger Name Record (PNR)?URL:http://www.hasbrouck.org/articles/PNR.html

Jha,A.How tagging passengers could improve airport security.13October2006.URL:http://www.guardian.co.uk/business/2006/oct/13/theairlineindustry.terrorism

Leake,J.Chaos continues at Heathrow’s T5 as more flights are cancelled.29March2008.URL:http://www.timesonline.co.uk/tol/news/uk/article3645398.ece

Mackay, W. (2000), “Is Paper Safer? The Role of Paper Flight Strips in Air Traffic Control”.ACM/Transactions on Computer-Human Interaction.6 (4),pages311-340.

Passengers stuck in planes after computer fails.12August2007.URL:http://www.cnn.com/2007/US/08/12/LAXBackup.ap/index.html

Page 16: COMPUTER SCIENCE CASE STUDY: COMPUTER SYSTEMS IN …€¦ · • digital fi ngerprints • hand geometry • voice recognition • facial recognition • retina eye patterns • signature

–16– M&N10&11/5/COMSC/BP2/ENG/TZ0/XX/CS

Ranganathan,A.Fog and the air traffic chaos.27December2006.URL:http://www.thehindubusinessline.com/2006/12/27/stories/2006122700070900.htm

Schwartz,J.Who Needs Hackers?12September2007.URL:http://www.nytimes.com/2007/09/12/technology/techspecial/12threat.html

Stevens,T.The cost of privacy: biometrics at London Heathrow T5.24March2008.URL:http://www.computerweekly.com/blogs/the-data-trust-blog/2008/03/the-cost-of-privacy-biometrics.html

Technology.URL:http://www.idlane.com/technology.htm

Valdes,M.Alaska Airlines, Sea-Tac Airport look to streamline check-in.10August2007URL:http://seattletimes.nwsource.com/html/travel/2003830033_alaskaairweb10.html

Vancouver Airport.URL:http://www.alstec.com/Main/ALSTECGroup/AirportsLogistics/CaseStudies/VancouverAirport/

WiFi at the Airport.URL:http://www2.prg.aero/en/site/klient/sluzby_kontakty/komunikace/wifi.htm

Wi-Fi security system is “broken”.19October2007.URL:http://news.bbc.co.uk/2/hi/technology/7052223.stm