Ipswich, United Kingdom
Ipswich, United Kingdom

The British Telecom microwave network was a network of point-to-point microwave radio links in the United Kingdom, operated at first by the General Post Office, and subsequently by its successor BT plc. From the late 1950s to the 1980s it provided a large part of BT's trunk communications capacity, and carried telephone, television and radar signals and digital data, both civil and military. Its use of line-of-sight microwave transmission was particularly important during the Cold War for its resilience against nuclear attack. It was rendered obsolete, at least for normal civilian purposes, by the installation of a national optical fibre communication network with considerably higher reliability and vastly greater capacity.BT remains one of the largest owners of transmission and microwave towers in the UK. The most famous of these is the BT Tower in London, which was the tallest building in the UK from its construction in the 1960s until the early 1980s, and a major node in the BT microwave network. Wikipedia.


Time filter

Source Type

Patent
British Telecom | Date: 2017-02-08

In a system of wireless access point routing devices each creating a wireless network, a management server monitors the performance of the wireless networks to identify performance degradation. Device interoperability issues are identified according to trends in poor performance of devices connected to the wireless networks.


This invention provides a device and method of aligning a transmission frame in a Time Division Duplexing, TDD, network, wherein the transmission frame includes a sequence of units separated by transition points, wherein each unit includes one or more resource slots in a transmission direction, the method comprising the steps of: allocating a transmit power level to a plurality of resource slots in a unit, wherein a transmit power for a first resource slot of the plurality of resource slots is greater than the transmit power for a second resource slot of the plurality of resource slots; measuring the transmit power of a TDD transmission received from an external node to determine a peak transmit power of the received TDD transmission; and substantially aligning the first resource slot to coincide with the peak transmit power of the received TDD transmission.


Patent
British Telecom | Date: 2017-02-08

In a system of wireless access point routing devices each creating a wireless network, a management server monitors the performance of the wireless networks to identify performance degradation. Any wireless networks experiencing performance degradation are grouped by region to determine whether a common cause for the degradation is present.


Patent
British Telecom | Date: 2017-01-04

A malicious encrypted traffic detector connected to a computer network, the detector comprising: a Shannon entropy estimator; an entropy comparator; a store storing a reference measure of Shannon entropy of a portion of network traffic of a malicious encrypted network connection, wherein the estimator is adapted to estimate a measure of entropy for a corresponding portion of network traffic communicated over the computer network, and the entropy comparator is adapted to compare the estimated measure of entropy with the reference measure so as to determine if malicious encrypted network traffic is communicated over the network connection.


Patent
British Telecom | Date: 2017-01-11

A method, UE and basestation are provided, wherein the UE is configured to send battery status data to the basestation and, in response, the basestation is adapted to improve the Quality of Service for the UE.


Patent
British Telecom | Date: 2017-02-08

In a system formed of user devices, a home access point routing device connected to an Internet Service Provider, performance issues such as contention and interference on the home network can be determined. The home access point is arranged to monitor IP Flow information for data sessions between user devices and remote servers over a wireless or powerline Ethernet home network and performance issues are determined by the home access point or by a management server.


Patent
British Telecom | Date: 2017-01-11

An access controller for a resource in a computer system, the access controller comprising: a data store having stored therein: a challenge image including a user challenge; a mask image including a mask; a composite image generator adapted to superimpose the challenge image and the mask image as a dynamic composite image such that the user challenge is partially masked by the mask in the composite image; and a display adapted to displaying the dynamic composite image to a user; a user input receiver, wherein the access controller is adapted to grant access to the resource on receipt, via the user input receiver, of a correct response by a user of the computer system to the challenge, characterised in that the user challenge is at least 70% masked by the mask, wherein the user challenge is indistinguishable from the mask at boundaries between the user challenge and the mask in the composite image, and wherein the composite image is dynamic by the mask randomly moving in the composite image periodically.


Grant
Agency: European Commission | Branch: H2020 | Program: IA | Phase: DS-04-2015 | Award Amount: 5.00M | Year: 2016

C3ISP mission is to define a collaborative and confidential information sharing, analysis and protection framework as a service for cyber security management. C3ISP innovation is the possibility to share information in a flexible and controllable manner inside a collaborative multi-domain environment to improve detection of cyber threats and response capabilities, still preserving the confidentiality of the shared information. C3ISP paradigm is collect, analyse, inform, and react. In order to achieve the aforementioned goals, the project aims to create an efficient and flexible framework for secure data analytics where data access and data analytics operations are regulated by multi-stakeholders data sharing agreements. In particular, C3ISP will: facilitate the definition, analysis, management, enforcement and dissolution of data sharing agreements; going from high level descriptions (close to natural language) to system enforceable data usage policies; consider the most appropriate data protection techniques used in the analytics infrastructure, from data centric policy enforcement mechanisms to homomorphic encryption techniques that enable to work directly on encrypted data (considering also intermediate solutions as anonymization techniques); address key challenges for compliant sharing of cyber security related information. By taking a compliance by design approach, the project places an early emphasis on understanding and incorporating regulatory requirements into the data sharing agreements. validate the framework through four Pilots covering several relevant areas as enterprise security, governmental CERTS, Internet Service Providers (ISPs) and, in particular, for SMEs interested in holistic cyber protection solutions (including managed security services). The project Consortium combines strong industry players with research institutions that will deliver high quality innovation; it also includes SMEs and digital innovation promoters.


Grant
Agency: European Commission | Branch: H2020 | Program: RIA | Phase: ICT-06-2016 | Award Amount: 4.61M | Year: 2017

Large-scale computing systems are today built as distributed systems (for reasons of scale, heterogeneity, cost and energy efficiency) where components and services are distributed and accessed remotely through clients and devices. In some systems, in particular latency-sensitive or high availability systems, components are also placed closer to end-users (in, e.g., radio base stations and other systems on the edge of access networks) in order to increase reliability and reduce latency - a style of computing often referred to as edge or fog computing. However, while recent years have seen significant advances in system instrumentation as well as data centre energy efficiency and automation, computational resources and network capacity are often provisioned using best effort provisioning models and coarse-grained quality of service (QoS) mechanisms, even in state-of-the-art data centres. These limitations are seen as a major hindrance in the face of the coming evolution of(IoT and the networked society, and have even today manifested in, e.g., a limited cloud adoption of systems with high reliability requirements such as telecommunications infrastructure and emergency services systems. RECAP goes beyond the current state of the art and develop the next generation of cloud/edge/fog computing capacity provisioning via targeted research advances in cloud infrastructure optimization, simulation and automation. Building on advanced machine learning, optimization and simulation techniques. The overarching result of RECAP is the next generation of agile and optimized cloud computing systems. The outcomes of the project will pave the way for a radically novel concept in the provision of cloud services, where services are instantiated and provisioned close to the users that actually need them by self-configurable cloud computing systems.


Nesset D.,British Telecom
Journal of Lightwave Technology | Year: 2015

This paper provides a tutorial overview of the latest generation of passive optical network (PON) technology standards nearing completion in ITU-T. The system is termed NG-PON2 and offers a fiber capacity of 40 Gbit/s by exploiting multiple wavelengths at dense wavelength division multiplexing channel spacing and tunable transceiver technology in the subscriber terminals (ONUs). Here, the focus is on the requirements from network operators that are driving the standards developments and the technology selection prior to standardization. A prestandard view of the main physical layer optical specifications is also given, ahead of final ITU-T approval. © 2015 IEEE.

Loading British Telecom collaborators
Loading British Telecom collaborators