

Nications security, network topology, transmission protocols, reserve capacity, and transmission Issues dealing with implementing a communications network (e.g., bandwidth analysis, commu. Although the range of network-related technology Is conducive to rapid fault detection and repair. Rapid and reliable transmission of data, is resistant to compromise, is secure, has redundancy, and A properly functioning communication network ensures The ACC receives information from a range of sources and transmits information to designated The applications are transmitted, as well as the data center and related telecommunication rooms. Infrastructure considerations include the network on which all of Second, the underlying infrastructure on which the ACC operates is of equal importance to theĬommunication technology. Ponents, integrated to work in a concerted fashion to channel data into a central repository,Ĭonvert it into information, and provide outputs on which decisions can be made by airport A proper ACC IT system architecture will show many subsystem com. Ogy project and should be approached in that manner, with one exceptionâThe ACC, itself, An ACC is no different than any other technol. Lenges in producing a successful ACC project. In developing its ACC approach, the airport operator will have three primary considerations.įirst, choosing the proper technology or extending legacy technology is one of the biggest chal. It decided to proceed with an ACC project. Implementation of the technology necessary to achieve the goals of airport management when Although many decisions go into developing or expanding an ACC, noĭecision is likely to have as much of an effect on the success of the initiative as the selection and Has been developed specifically as a communications tool. Twenty-first century technology, which is at the heart of virtually all airport operations, inĪlmost every instance, either produces communication as a byproduct of its core function or Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages. Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book.
