Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-cnmwb Total loading time: 0 Render date: 2024-07-23T02:02:03.820Z Has data issue: false hasContentIssue false

11 - Privacy for MACNET

Published online by Cambridge University Press:  05 May 2013

M. Warner
Affiliation:
Telecom Australia Research Laboratory
Get access

Summary

This paper examines the security of the MACNET shared fibre access network. The major threats to security are identified, and an encryption and key management scheme is proposed which is shown to bring the security to a similar level as that provided by dedicated fibre access. The robustness of the scheme to transmission errors, as well as the ease of implementation are also considered.

Introduction

The Customer Access Network (CAN) is that part of the telecommunications network located between the local exchange and the customer's premises. Traditionally, a star network architecture based on twisted copper pairs has been used; however, this is unable to meet the requirements of future broadband services. Due to the number of premises connected, the CAN represents a substantial proportion of the total capital investment in the Australian telecommunications network. To prevent the need for subsequent upgrading, it is desirable to ‘future-proof’ any alterations to the CAN by providing a transmission medium capable of meeting future needs.

Over the next few years, optical fibre will be progressively introduced into the CAN, providing broadband access to the customer. Current costs associated with optical equipment make the cost of a dedicated fibre CAN (ie a simple star architecture) prohibitive. One of the most promising schemes for early introduction of fibre to the CAN is the Multiple Access Customer Network (MACNET) [5,6,7].

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 1990

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Privacy for MACNET
    • By M. Warner, Telecom Australia Research Laboratory
  • J. H. Loxton
  • Book: Number Theory and Cryptography
  • Online publication: 05 May 2013
  • Chapter DOI: https://doi.org/10.1017/CBO9781107325838.012
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Privacy for MACNET
    • By M. Warner, Telecom Australia Research Laboratory
  • J. H. Loxton
  • Book: Number Theory and Cryptography
  • Online publication: 05 May 2013
  • Chapter DOI: https://doi.org/10.1017/CBO9781107325838.012
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Privacy for MACNET
    • By M. Warner, Telecom Australia Research Laboratory
  • J. H. Loxton
  • Book: Number Theory and Cryptography
  • Online publication: 05 May 2013
  • Chapter DOI: https://doi.org/10.1017/CBO9781107325838.012
Available formats
×