Entity

Time filter

Source Type


Yeoh C.Y.,Tm Research And Development Sdn Bhd
Progress in Electromagnetics Research Symposium | Year: 2012

To offer the mobility to existing Fixed broadband customers, Telekom Malaysia (TM) has opted to deploy the WiFi hotspot using the 2.4 GHz ISM band. The WiFi hotspot is basically based on the IEEE 802.11 standard. 802.11 is an increasing popular standard that can be easily found in smart devices. Mobile service providers in Malaysia are also tried to o 2oad their mobile data from 3G to WiFi due to the tra±c growth. The common problem for WiFi deployment is site acquisition, a time-consuming and costly process. Usually, the suitable sites for WiFi deployment are public places, such as shopping malls, coffee shops, school, parks and etc. Technically, placing many Access Points (APs) within a site creates the interferences amongst the APs since there are only 3 non-overlapping channels in 2.4 GHz. Thus, a single AP which can allow more than one hotspot services is an interesting solution to the service provider. The service provider that owns the infrastructure can then "lease" it to other operators as well. In TM R&D, we have successfully found out a way to implement more than one hotspot services using one single embedded platform. This only requires the firmware update to the existing embedded platform either with 802.11 chipset or without 802.11 chipset. In this paper, we discuss the technical approach for providing multiple wireless hotspot services using one single embedded platform and also the experimental results. Source


Ab-Rahman M.S.,National University of Malaysia | Manaf Z.A.,Tm Research And Development Sdn Bhd
Advances in Natural and Applied Sciences | Year: 2011

Fiber-to-the-Home (FTTH) is an emerging access network technology for delivering high speed broadband to the customers by utilizing Passive Optical Network (PON) infrastructure. It is capable to provide a point to point (P2P) or point-to-multipoint (P2MP) architecture with cost effective implementation as compared to the legacy copper networking solution. Apparently this technology could be considered as a conducive platform for providing various types of services and applications since the bandwidth dependant medium is no longer an issue. In order to ensure network survivability and reliability, a study on the network protection and restoration issues and methods has been conducted. In this paper, a proposal focusing on the implementation of FTTH distribution side protection and restoration scheme is made. The solution will be utilizing the defined protection and restoration scheme together with a developed distribution and customer side module. Conceptually, on the distribution side, an Access Control System (ACS) module will be installed and connected to the last stage of optical splitter in that segment; functioning as the main controller for the solution. On the customer side, a Customer Access Protection Unit (CAPU) will be placed just before the Optical Network Unit (ONU). Together they will provide the desired protection and restoration solution for the FTTH-PON network. These modules are transparent to the FTTH system and will not interfere with the operation as well as communication process. With that in mind, this paper will provide an analysis on the splitting ratio and its effect to the modules, and the entire FTTH system in general. Ultimately, the proposed method and results will be presented and discussed in the following sections with the idea of providing the first of its kind of protection and restoration solution in the actual FTTH environment. Source


Salim F.,University of Technology Malaysia | Nor K.M.,University of Technology Malaysia | Said D.M.,University of Technology Malaysia | Rahman A.A.A.,Tm Research And Development Sdn Bhd
Conference Proceeding - 2014 IEEE International Conference on Power and Energy, PECon 2014 | Year: 2014

In this paper, a project initiated by the Energy Commission of Malaysia has been carried out to find the level of power quality in Malaysia as well as to estimate the cost associated with power quality. Normally, industry has a production target to be achieved yearly. To maintain the quality of production, several factors must be taken into account, such as labor quality, working environment and facilities. However, the quality of power supply is the most significant factor to ensure the continuous production. Nowadays, the power quality problems are increasing dramatically with the increasing use of non-linear load. Studies from other countries have shown that this problem can cause substantial issues. The impact of power quality problems, especially voltage sag on several industries in Malaysia and the costs incurred are discussed in this paper. The estimation of cost is calculated for a voltage sag events that has been captured from the optimum monitor locations. The estimation is made based on the size of the affected area and the number of large power consumer in that affected area. © 2014 IEEE. Source


Deraman M.,Tm Research And Development Sdn Bhd | Jalil Desa A.,Tm Research And Development Sdn Bhd | Othman Z.A.,National University of Malaysia
Conference on Data Mining and Optimization | Year: 2011

Network intrusion detection system (NIDS) commonly attributed to the task to mitigate network and security attacks that has potential to compromise the safety of a network resources and its information. Research in this area mainly focuses to improve the detection method in network traffic flow. Machine learning techniques had been widely used to analyze large datasets including network traffic. In order to develop a sound mechanism for NIDS detection tool, benchmark datasets is required to assist the data mining process. This paper presents the benchmark datasets available publicly for NIDS study such as KDDCup99, IES, pcapr and others. We use some popular machine learning tools to visualize the properties and characteristics of the benchmark datasets. © 2011 IEEE. Source


Derarnan M.,Tm Research And Development Sdn Bhd | Desa J.M.,Tm Research And Development Sdn Bhd | Othman Z.A.,National University of Malaysia
Proceedings 2010 International Symposium on Information Technology - Engineering Technology, ITSim'10 | Year: 2010

Network behaviour analysis (NBA) is a system that analyses the network data stream or packets characteristics. NBA commonly associated with network intrusion detection and prevention system (IDS/IPS), as the mechanism used in NBA is well known for its capability to discover the hidden information in network packets. Among popular methods empowered the NBA is misuse detection and anomaly detection techniques. Misuse detection is suitable for known attacks that already have list of actions to be taken based on historical events from past attacks. However, misuse detection is inefficient to deal with zero-day type of attack. This paper describes the concept of multilayer packet tagging approach that is possible to compliment the weaknesses found in misuse detection techniques in NBA system. © 2010 IEEE. Source

Discover hidden collaborations