Research Student Profile

Home People Profile...

Prof. Paul L Reynolds PhD

Brief biographical information

prof.reynolds@iee.org.uk
http://www.wattles.co.uk

Access thesis on-line

An Investigation into an Expert System for Telecommunication Network Design

Many telephone companies, especially in Eastern Europe and the 'third-world', are developing new telephone networks. In such situations the network design engineer needs computer based tools that not only supplement his own knowledge but also help him to cope with situations where not all the information necessary for the design is available. Often traditional network design tools are somewhat removed from the practical world for which they were developed. They often ignore the significant uncertain and statistical nature of the input data. They use data taken from a fixed point time to solve a time variable problem, and the cost formulae tend to be on an average per line or port rather than the specific case. Indeed, data is often not available or just plainly unreliable. The engineer has to rely on rules of thumb honed over many years of experience in designing networks and be able to cope with missing data.




The complexity of telecommunication networks and the rarity of specialists in this area often makes the network design process very difficult for a company. It is therefore an important area for the application of expert systems. Designs resulting from the use of expert systems will have a measure of uncertainty in their solution and adequate account must be made of the risk involved in implementing its design recommendations.




The PhD thesis reviews the status of expert systems as used for telecommunication network design. It further shows that such an expert system needs to reduce a large network problem into its component parts, use different modules to solve them and then combine these results to create a total solution. It shows how the various sub-division problems are integrated to solve the general network design problem. The thesis further presents details of such an expert system and the databases necessary for network design: three new algorithms are invented for traffic analysis, node locations and network design and these produce results that have close correlation with designs taken from BT Consultancy archives.




It was initially supposed that an efficient combination of existing techniques for dealing-with-uncertainty within expert systems would suffice for the basis of the new system. It became apparent, however, that to allow for the differing attributes of facts, rules and data and the varying degrees of importance or rank within each area, a new and radically different method would be needed.




Having investigated the existing uncertainty problem a new more rational method was found. The work involved the invention of the 'Uncertainty Window' technique and its testing on various aspects of network design, including demand forecast, network dimensioning, node and link system sizing, etc. using a selection of networks that have been design by BT Consultancy staff. From the results of the analysis, modifications to the technique have been incorporated with the aim of optimising the heuristics and procedures, so that the structure gives an accurate solution as early as possible. The essence of the process is one of associating the uncertainty windows with their relevant rules, data and facts, which results in providing the network designer with an insight into the uncertainties that have helped produce the overall investigation to improve upon the confidence of the overall design, The windowing technique works by virtue of its ability to retain the composition of the uncertainty and its associated values, assumption, etc. and allows for better solutions to be attained.

Prof. Paul L Reynolds

Director of studies: Prof Peter Sanders
Other supervisors: Dr Colin T Stockel

Journal papers

Co-operative user identity verification using an Authentication Aura
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Computers & Security, Volume 39, Part B, November, pp486–502, 2013
More details | External link available

Authentication Aura - A distributed approach to user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Journal of Information Assurance and Security, vol. 6 (2011), issue 2, pp149-156, ISSN 1554-1010, 2011
More details | External link available

A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
Rodwell PM, Furnell SM, Reynolds PL
Computers and Security, Volume 26, Issues 7-8, pp468-478, 2007
More details

The Effects of Audio and Video Correlation and Lip Synchronization
Mued L, Lines BL, Furnell SM, Reynolds PL
Campus Wide Information Systems, vol. 20, no. 4, pp. 159-166, 2003
More details | Download PDF

Keystroke Dynamics on a Mobile Handset: A Feasibility Study
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Information Management and Computer Secuirty, vol. 11, no. 4, pp161-166, 2003
More details | Download PDF

Enhancing Response in Intrusion Detection Systems
Papadaki M, Furnell SM, Lee SJ, Lines BL, Reynolds PL
Journal of Information Warfare, vol. 2, no. 1, pp90-102, 2002
More details | Download PDF

Acceptance of subscriber authentication methods for mobile telephony devices
Clarke NL, Furnell SM, Rodwell PM, Reynolds PL
Computers & Security, vol. 21, no.3, pp220-228, 2002
More details | Download PDF

Authentication and Supervision: A survey of user attitudes
Furnell SM, Dowland PS, Illingworth HM, Reynolds PL
Computers & Security, vol. 19, no. 6, pp529-539, 2000
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details | Download PDF

Computer Crime and Abuse: A Survey of Public Attitudes and Awareness
Dowland PS, Furnell SM, Illingworth HM, Reynolds PL
Computers & Security, vol. 18, no. 8, pp715-726, 1999
Please note: the electronic copy of the survey referred to in this paper is no longer available.
More details | Download PDF

Strategies for Content Migration on the World Wide Web
Evans MP, Phippen AD, Müller G, Furnell SM, Sanders P, Reynolds PL
Internet Research, vol.9, no.1, pp25-34, 1999
More details | Download PDF

Network Resource Adaptation in the DOLMEN Service Machine
Evans MP, Kettunen KT, Blackwell GK, Furnell SM, Phippen AD, Hope S, Reynolds PL
Intelligence in Services and Networks: Technology for Cooperative Competition, Mullery et al. (eds.), Springer, 1997
More details

An expert system approach to private telecommunications network design
Reynolds PL
BT Technology Journal, vol. 11, no. 4, pp44-53, October, 1993
More details

12 Journal papers

Conference papers

A preliminary investigation of distributed and cooperative user authentication
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 9th Australian Information Security Management Conference (secAU 2011), Perth, Australia, 5-7 December, 2011
More details

Optimising Quality of Service through the controlled aggregation of traffic
Culverhouse ME, Ghita BV, Reynolds PL, Wang XG
Proceedings of the fifth International Conference for Internet Technology and Secured Transactions (ICITST), 8-11 Nov, pp1-7, ISBN: 978-1-4244-8862-9, 2010
More details | External link available

A distributed and cooperative user authentication framework
Hocking C, Furnell SM, Clarke NL, Reynolds PL
Proceedings of the 6th International Confernece on Information Assurance and Security (IAS 2010), Atlanta, USA, 23-25 August, pp304-310, 2010
More details

Strong Authentication for Web Services using Smartcards
Stienne DS, Clarke NL, Reynolds PL
Proceedings of the 7th Australian Information Security Management Conference (SECAU 2009), 1-3 December, Perth, Australia, On-line proceedings only, 2009
More details | Download PDF | External link available

New Architecture for a Centralized Next Generation Profile Register in Future Mobile Telecommunication Networks
Diehl A, Soler J, Fuhrmann W, Bleimann U, Reynolds PL, Ghita BV
Proceedings of the Sixth International Network Conference (INC2006), Plymouth, UK, 11-14 July, pp307-314, 2006
More details | Download PDF

Architectural Framework for Wireless Mobile Ad hoc Networks (WMANETs)
Almomani I, Al-Akaidi M, Ivins J, Reynolds PL
Proceedings of the 6th IEE International Conference on 3G and Beyond, London, UK, 7 - 9 November, 2005
More details | Download PDF

Service Architecture for an Object-Oriented Next Generation Profile Register
Diehl A, Bleimann U, Fuhrmann W, Reynolds PL, Rupp S
Proceedings of Fifth International Network Conference (INC 2005), July 5-7, Samos, Greece, pp253-260, 2005
More details | Download PDF

Optimising Video Layers to the Available Bandwidth Based for Packet Networks
Thakur A, Lines BL, Reynolds PL, Knahl MH, Furnell SM
Proceedings of the Fourth International Network Conference (INC 2004), Plymouth, UK, 6-9 July 2004, CD-ROM, 2004
More details | Download PDF

Application of Keystroke Analysis to Mobile Text Messaging
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the 3rd Security Conference, Las Vegas, USA, 14-15 April, 2004
More details | Download PDF

Operational Characteristics of an Automated Intrusion Response System
Papadaki M, Furnell SM, Lines BL, Reynolds PL
Communications and Multmedia Security: Advanced Techniques for Network and Data Protection, pp65-75, 2003
More details

Network Handled Seamless IP Mobility for Vertical Handovers Between Cellular Networks and WLAN Hot Spots
Njedjou E, Bertin P, Reynolds PL
Proceedings of the WWRF, New York, USA, 27-28 October, 2003
More details | Download PDF

An Architectural Framework For A Carrier Class Mobile Internet
Reynolds PL
Proceedings of the IEE 3G 2003 Fourth International Conference on 3G Mobile Communication Technologies, London, UK, 25 - 27 June, 2003
More details | Download PDF

The Effects of Lip Synchronization in IP Conferencing
Mued L, Lines BL, Furnell SM, Reynolds PL
Proceedings of the International Conference on Visual Information Engineering ? VIE 2003, University of Surrey, UK, 7-9 July, 2003
More details | Download PDF

Using Keystroke Analysis as a mechanism for Subscriber Authentication on Mobile Handsets
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the IFIP SEC 2003 Conference, Athens, Greece, May, pp97-108, 2003
More details | Download PDF

An Architecture for a Distributed 3G Mobile Terminal
Constantinou A, Amery P, Reynolds PL
Proceedings of the IEE 3G 2002 Third International conference onn 3G mobile Communication Technologies, London, UK, 8 - 10 May, 2002
More details | Download PDF

Biometric Authentication for Mobile Devices
Clarke NL, Furnell SM, Reynolds PL
Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28-29 November 2002, pp61-69, 2002
More details | Download PDF

Investigating Interaction of Audio and Video Quality as Perceived in Low-Cost Multimedia Conferencing Systems
Mued L, Lines BL, Furnell SM, Reynolds PL
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July 2002, pp181-189, 2002
More details | Download PDF

Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics
Clarke NL, Furnell SM, Lines BL, Reynolds PL
Proceedings of the Third International Network Conference (INC 2002), Plymouth, UK, 16-18 July, pp347-355, 2002
More details | Download PDF

Advanced Subscriber Authentication Approaches For Third Generation Mobile Systems
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM
Proceedings of the Third International Conference on 3G Mobile Communication Technologies, London, UK, 8-10 May, 2002
More details | Download PDF

A Response-Oriented Taxonomy of IT System Intrusions
Papadaki M, Furnell SM, Lines BL, Reynolds PL
Proceedings of Euromedia 2002, Modena, Italy, 15-17 April, pp87-95, 2002
More details | Download PDF

Performance Evaluation of Desktop Videoconferencing
Mued L, Lines BL, Furnell SM, Reynolds PL
Proceedings of PG Net 2001 ? 2nd Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, pp13-17, 18-19 June, 2001
More details | Download PDF

A Conceptual Security Framework to support Continuous Subscriber Authentication in Third Generation Mobile Networks
Rodwell PM, Furnell SM, Reynolds PL
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

CORBA middleware services - Are they secure?
Joyce EM, Furnell SM, Reynolds PL, Sanders P
Proceedings of Euromedia 2001, Valencia, Spain, 18-20 April, 2001
More details | Download PDF

Non-intrusive security requirements for third generation mobile systems
Rodwell PM, Furnell SM, Reynolds PL
Proceedings of PG Net 2000 ? 1st Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK, pp7-12, 19-20 June, 2000
More details | Download PDF

A Hyper Graphics Markup Language for optimising WWW access in wireless networks
Reynolds PL, Furnell SM, Evans MP, Phippen AD
Proceedings of Euromedia 99, Munich, Germany, pp136-144, 25-28 April, 1999
More details

Content Migration on the World Wide Web
Evans MP, Phippen AD, Müller G, Furnell SM, Sanders P, Reynolds PL
Proceedings of the first International Network Conference 1998 (INC 98), Plymouth, UK, pp156-161, 6-9 July, 1998
More details | Download PDF

Mobility Considerations for integrated Telecommunications Service Environments
Evans MP, Furnell SM, Phippen AD, Reynolds PL
Proceedings of IEE Sixth International Conference on Telecommunications, Edinburgh, UK, 29 March-1 April, 1998
More details | Download PDF

A comprehensive authentication and supervision architecture for networked multimedia systems
Furnell SM, Illingworth HM, Katsikas SK, Reynolds PL, Sanders P
Proceedings of IFIP CMS 97, Athens, Greece, pp227-238, 22-23 September, 1997
More details | Download PDF

Resource Adaptation in the TINA Service Environment
Evans MP, Phippen AD, Furnell SM, Reynolds PL
Proceedings of Fourth Communications Networks Symposium, Manchester, UK, 7-8 July, 1997
More details

Addressing security in an Integrated Service Engineering environment
Joyce EM, Furnell SM, Reynolds PL, Sanders P
Proceedings of EUROMEDIA 96, London, UK, pp172-179, 19-21 December, 1996
More details

Non-Intrusive Security Arrangements to support Terminal and Personal Mobility
Furnell SM, Green M, Hope S, Morrissey JP, Reynolds PL
Proceedings of EUROMEDIA 96, London, UK, pp167-171, 19-21 December, 1996
More details | Download PDF

Integrated Services Engineering
Reynolds PL, Sanders P
Proceedings of IEE Telecommunications, London, UK, 26-29 March, pp297-301, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

An Engineering Platform for Multimedia Systems
Reynolds PL, Sanders P
Proceedings of MEDIACOMM 95 - International Conference on Multimedia Communications, Southampton, UK, 11-12 April, 1995
NB paper has been scanned from printed copy. We apologise for the screen quality of this paper.
More details | Download PDF

Uncertainty in telecommunications network planning
Reynolds PL, Sanders P, Stockel CT
Proceedings of the 1993 Summer Computer Simulation Conference, Boston, pp222-227, 19-21 July, 1993
More details

34 Conference papers

Patents filed

Determining identity data for a user
Rodwell PM, Reynolds PL
World Intellectual Property Organization, WO/2002/091310, 2002
Publication Date: 14.11.2002, International Filing Date: 03.05.2002, Chapter 2 Demand Filed: 03.12.2002
More details | External link available

1 Patents filed

Posters

Enhancing Intrusion Response in Networked System
Papadaki M, Furnell SM, Dowland PS, Lines BL, Reynolds PL
Poster presentation at Britain's Younger Engineers in 2002, House of Commons, London, 9 December, 2002
More details | Download PDF

Non-Intrusive Biometric Authentication for Mobile Devices
Clarke NL, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Biometrics 2002, Excel Center, London, UK, 6-8 November, 2002
Recipient of Best Student Prize
More details | Download PDF

Non-Intrusive Subscriber Authentication for 3G Mopbile System
Clarke NL, Dowland PS, Furnell SM, Reynolds PL, Rodwell PM
Poster presentation at Britain's Younger Engineers in 2001, House of Commons, London, 3 December, 2001
More details | Download PDF

Advanced Authentication and Intrusion Detection Technologies
Dowland PS, Furnell SM, Magklaras GB, Papadaki M, Reynolds PL, Rodwell PM, Singh H
Poster presentation at Britain's Younger Engineers in 2000, House of Commons, London, 4 December, 2000
More details | Download PDF

4 Posters

Internal publications

Novel Single Sign On Architecture Based on the Subscriber Identity Module for Web Services
Stienne DS, Clarke NL, Reynolds PL
Advances in Communications, Computing, Networks and Security 5, ISBN: 978-1-84102-257-4, pp152-161, 2008
Can be ordered on-line.
More details | Download PDF

New architecture for a centralized next generation profile register in future mobile telecommunication networks
Diehl A, Fuhrmann W, Bleimann U, Reynolds PL, Furnell SM
Proceedings of the Third Collaborative Research Symposium on Security, E-learning, Internet and Networking (SEIN 2007), Plymouth, UK, ISBN: 978-1-8410-2173-7, pp215-229, 2007
Can be ordered on-line.
More details | Download PDF

A Knowledge Based System to Support Customer Service Agents Remotely Faulting Advanced Mobile Terminals
Ramchurn R, Reynolds PL
Advances in Network & Communication Engineering 2, pp109-115, 2005
More details

Service Enforced Handover Algorithm
Murzeau B, Lines BL, Reynolds PL
Advances in Network & Communication Engineering, pp90-97, 2004
More details

4 Internal publications

55 publication(s) - all categories.