SlideShare a Scribd company logo
1 of 14
Download to read offline
Using a Cloud Computing Model to Establish
Net-Enabled Emergency Response (NEER) Core Services
            NCOIC Cloud Computing Workshop
                      September 21, 2009
                           presented by
                  MG Stephen Gross USAFR
                          NEER IPT Chair
                          Deputy Director
           Deloitte & Touche Center for Cyber Innovation
Recommendations for effectively
establishing NEER core services

 We will begin with our concluding recommendations
 Produce operational, capability and technical patterns for a
  network-of-networks based on nationally defined, locally
  implemented cloud computing storefronts hosting NEER
  core services interfaced to local mesh networks
   – Subscribe and Publish architecture
      • Information is both “pushed”                     AHAW             Logistics
        and “pulled”                                     alerts                            Digital
                                             Geo-                                          Rights
           – Get the right information      Spatial
                                                                      SECURE,
                                                                                         Management
                                                                   CLOUD-BASED
             to the right people             Data                   DISTRIBUTED
             at the right time                                     STOREFRONTS
                                                                                                  Shared
             up and down all                            for NETWORK CENTRIC OPERATIONS

             chains of command
                                                            SUPPORTING PUBLIC SAFETY            Directories
                                       Identity          and EMERGENCY RESPONSE CORE
                                                                   SERVICES
   – Focus on responder             Management
                                                                                           Access
     communities                                         Mesh
                                                                                           Control
                                                       Networks
   – Focus on victims                                 Integration       Broadband
                                                                        Backbones
   – “Everything Over IP”
                                         Mobile
     is fundamental
                                       Responders             Fixed
   – Security as required                                    Agencies
     at all levels                                                                                            2
Challenges to effectively
establishing NEER core services

 Balkanized control of emergency IT
   – 120,000 ER jurisdictions in the
                                               Public Safety/Emergency Responder
     US alone, mostly small
                                                  COI (Non-Military) in the USA*
   – Nearly as many in the EU/NATO/
     allied European countries         20000
                                       18000
 Lack of coordinated national,
                                       16000                               EOCs
  provincial/state leadership                                              Urgent Care
                                       14000
 Stove pipe agency consumer           12000
                                                                           Hospitals
  solutions                                                                PSAPs
                                       10000
   – Dominance by vendors; land                                            Public Health
                                        8000                               EMS
     mobile radios prevalent
                                        6000                               Fire
 >$100 Billion in legacy systems
                                        4000                               Law
  rarely designed to interoperate
                                        2000
   – >$1 Trillion worldwide
                                           0
 Lack of widely available broadband            Number of Agencies
  infrastructure for emergency                  Source:        and

  responder COI                                                                        3
Challenges to effectively
establishing NEER core services (continued)



 Wisconsin State Patrol Chairman Casey Perry
  attributed a great deal of his problems to
  squabbles among states, counties and
  municipalities. He said more federal grant
  money needs to be conditional to
  hold state and local governments
  accountable for creating interoperable
  networks
 "Each entity resists losing their share of
  control," Perry said. "This is the underlying
  root of the problems we face today."




                                                  4
Common requirements from multiple COI
not being effectively addressed today

 Standardized communications from and to any device, source
 Intelligence about people
   – Responders and victims
   – Secure when necessary
 Access to special resources
   – People, e.g., interpreters, neurosurgeons,
     mental health professionals, officials,
     telecomm manager
   – Things, e.g., hospital beds, specialized
     vehicles, shelters, bulldozers, ambulances,
     generators, cell sites
   – Decision Support, e.g., predictive algorithms, geospatial
     information, protocols, incident map, matching people to
     shelters, directories
 Effectively addressing these requirements will require a national
  establishment of NEER core services implemented nationally,
  regionally and locally
                                                                      5
What are NEER core services?



   NEER core services are those services necessary for full
    information interoperability of the emergency responder
    communities of interest for both day-to-day operations and
    for response to complex humanitarian disasters




                                                                 6
Agency locator

 Registration of all responders
   – Identify who each emergency
     responder is
   – Identify each emergency
     responder’s organization
   – Describe organization type
       • role-based access
   – Define the incident types about
     which each responder needs to
     be alerted
       • Jurisdiction based and/or
         geographically based
       • Help needed/wanted
       • Just interested
   – Define in advance where and to what devices each responder
     wants calls and data sent
   – Define in advance each responder’s radio frequencies, gateways,
     CODECs, etc

                                                                       7
Identity management
and access control

 Identify each information recipient
   – Individual user and/or
     organization
 How is each recipient represented
  (Identifiers)
   – Username, Log-in (Password,
     PINs, Smartcards, Biometrics, etc
 Define how each recipient is to
  be authenticated
   – Validation of identifiers
 Describe what each recipient can
  do when authenticated
  (Authorization)
   – What functions can be performed
   – What data can be accessed
   – Role-based – tied to identifiers – user and organization
 Define how each recipient will know the information
  exchange is working properly
  (Auditing)                                                    8
Digital rights management


 Classification of data
   – By data element, data
     segment, entire record
 Granting of access rights
  (informed consent)
   – Permissions - what grantee is
     allowed to do by action (access,
     print, update, change, distribute,
     etc.)
   – Constraints - restrictions on the
     permissions (i.e. cannot redistribute,
     access granted only if tied to an
     emergency, etc.)
   – Obligations - what grantee has to
     do/provide/accept
   – Rights Holders - who is entitled to what




                                                9
All hazards – all warnings
   (AHAW) alerting

 Provide a practical, pragmatic methodology for efficient and
  timely generation, authentication or confirmation and
  distribution of emergency alerts and warnings
   – Nationally mandated, integrated at the regional, state
     and local levels
   – Based on the latest version of the Common Alerting
     Protocol (CAP) Standard from the Organization for
     the Advancement of Structured Information
     Standards (OASIS)
   – Positions the use of CAP in a global system of
     systems, network of networks, using a SOA which
     will be reused in multiple NEER patterns
       • The SOA which supports this set of patterns is based on the
         Reference Model for SOA (SOA-RM)[RD/05], an OASIS standard
         developed by the SOA-Reference Model Technical Committee (SOA-
         RM TC) approved in March 2005

                                                                          10
Examples of standards required for
NEER core services establishment

 Examples of NEER core services standards
                                                   MECI Demo / Sample Architectural Elements
  (not an exhaustive list)
      •   SIP
      •
                                                                                                                                 Portable WiMax C2 appliances


          CAP
      •   EDXL-DE, other emerging EDXL standards                                                   Cellular Comms Emergency
                                                                                                               Kit



      •   Directory Services – EPAD                           Wireless and
                                                           Terrestrial Systems
                                                                                                                SATCOM Gateway
                                                                                                                 IP Connectivity
                                                                                                               (Voice, Video, Data)




      •   Wireless Mesh Networks – 802.11, 802.16
      •   Wireless Local Area Networks (LAN) – 802.11                            Broken Links




      •   Connectionless Networking – IPv6                                                                Restored link

                                                                                                IP Back-bone
                                                                                                                                      Software Defined Radio
                                                                                                                                              JTRS




      •   Connectionless Transport – UDP                                                                                                   Sub-nets




      •   Connection-Oriented Transport – TCP, SCTP
      •   3G cellular, both UMTS and CDMA2000
      •   Communications Security – IPSec, TLS, SCIP
      •   Satellite Communications – L band, Ku band

                                                                                                                                                                11
Recommendations for effectively
establishing NEER core services

 Produce operational, capability and technical patterns for a
  network-of-networks based on nationally defined, locally
  implemented cloud computing storefronts hosting NEER
  core services interfaced to local mesh networks
   – Subscribe and Publish architecture
      • Information is both “pushed”
                                                                          Logistics
        and “pulled”                                     AHAW
                                                         alerts                            Digital
            – Get the right information       Geo-                                         Rights
              to the right people           Spatial
                                                                        SECURE
                                                                                         Management
                                                                     CLOUD-BASED
              at the right time               Data                    DISTRIBUTED
              up and down all                                        STOREFRONTS
                                                                                                  Shared
                                                        for NETWORK CENTRIC OPERATIONS
              chains of command                              SUPPORTING PUBLIC SAFETY           Directories
   –   Focus on responder              Identity               and EMERGENCY RESPONSE
                                                                    CORE SERVICES
       communities                  Management
                                                                                           Access
                                                         Mesh
   – Focus on victims                                  Networks
                                                                                           Control
                                                                        Broadband
   – “Everything Over IP”                             Integration
                                                                        Backbones
     is fundamental                       Mobile
   – Security as required               Responders            Fixed
     at all levels                                           Agencies
                                                                                                          12
NEER core services
  reference model

 Information                                        Services
   – Facilitate knowledge                              – Enable KD&D through an
     discovery and display (KD&D)                        open standards based service
     by making information from                          oriented architecture that is
     all core services storefronts                         • Secure as needed
       •   Accessible                                      • Highly scalable
       •   Understandable      KD&D CORE SERVICES          • Highly distributed
       •   Trustable                                       • >99.9% available
                                AGENCY LOCATOR
       •   Interoperable                                        – No single points of failure
       •   Manageable                                      • Decentralized for administration
                             IDENTITY MANAGEMENT


                              RIGHTS & PERMISSIONS


                            ALL HAZARDS ALL WARNINGS


                               CLOUD STOREFRONTS


                                   STANDARDS


                               TRUSTED NETWORKS
                                                                                                13
NEER Contacts


 Please direct all inquiries regarding the NCOIC
  Net-Enabled Emergency Response initiative to:
   – Stephen Gross
     NEER IPT Chair
     +1.202.879.5678
     stgross@deloitte.com
   Please copy:
   – Paul Mangione,
     Senior Technical Staff
     +1.253.839.3395
     paul.mangione@ncoic.org




                                                    14

More Related Content

What's hot

The role of Smartphones And Citizens in Improving Situational Awareness of Fi...
The role of Smartphones And Citizens in Improving Situational Awareness of Fi...The role of Smartphones And Citizens in Improving Situational Awareness of Fi...
The role of Smartphones And Citizens in Improving Situational Awareness of Fi...Bala2212
 
IMT Lecture ICT Multimedia+IMS Part01.MM-Biztel 04 Nov09v1.1
IMT Lecture ICT Multimedia+IMS Part01.MM-Biztel 04 Nov09v1.1IMT Lecture ICT Multimedia+IMS Part01.MM-Biztel 04 Nov09v1.1
IMT Lecture ICT Multimedia+IMS Part01.MM-Biztel 04 Nov09v1.1gueste2f09df
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management ServicesMarlabs
 
Microsoft Word Solving The Han Firmware Distribution Problem
Microsoft Word   Solving The Han Firmware Distribution ProblemMicrosoft Word   Solving The Han Firmware Distribution Problem
Microsoft Word Solving The Han Firmware Distribution Problemimpodgirl
 
MedPort White Paper
MedPort White PaperMedPort White Paper
MedPort White PaperJohn Bowling
 
Widyatama.lecture.applied networking.iv-week-08-multimedia+ims
Widyatama.lecture.applied networking.iv-week-08-multimedia+imsWidyatama.lecture.applied networking.iv-week-08-multimedia+ims
Widyatama.lecture.applied networking.iv-week-08-multimedia+imsDjadja Sardjana
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2fphart
 
A case study on Network Rail’s Fault Management System (FMS) made safe and si...
A case study on Network Rail’s Fault Management System (FMS) made safe and si...A case study on Network Rail’s Fault Management System (FMS) made safe and si...
A case study on Network Rail’s Fault Management System (FMS) made safe and si...CGI
 
Mmu marketing mobile_money
Mmu marketing mobile_moneyMmu marketing mobile_money
Mmu marketing mobile_moneyCamilo Tellez
 
From Knowledge Economy to Inclusive Information Society. Experiences from Ind...
From Knowledge Economy to Inclusive Information Society. Experiences from Ind...From Knowledge Economy to Inclusive Information Society. Experiences from Ind...
From Knowledge Economy to Inclusive Information Society. Experiences from Ind...USAID CEED II Project Moldova
 

What's hot (14)

The role of Smartphones And Citizens in Improving Situational Awareness of Fi...
The role of Smartphones And Citizens in Improving Situational Awareness of Fi...The role of Smartphones And Citizens in Improving Situational Awareness of Fi...
The role of Smartphones And Citizens in Improving Situational Awareness of Fi...
 
IMT Lecture ICT Multimedia+IMS Part01.MM-Biztel 04 Nov09v1.1
IMT Lecture ICT Multimedia+IMS Part01.MM-Biztel 04 Nov09v1.1IMT Lecture ICT Multimedia+IMS Part01.MM-Biztel 04 Nov09v1.1
IMT Lecture ICT Multimedia+IMS Part01.MM-Biztel 04 Nov09v1.1
 
Cyber Threat Management Services
Cyber Threat Management ServicesCyber Threat Management Services
Cyber Threat Management Services
 
Microsoft Word Solving The Han Firmware Distribution Problem
Microsoft Word   Solving The Han Firmware Distribution ProblemMicrosoft Word   Solving The Han Firmware Distribution Problem
Microsoft Word Solving The Han Firmware Distribution Problem
 
MedPort White Paper
MedPort White PaperMedPort White Paper
MedPort White Paper
 
Widyatama.lecture.applied networking.iv-week-08-multimedia+ims
Widyatama.lecture.applied networking.iv-week-08-multimedia+imsWidyatama.lecture.applied networking.iv-week-08-multimedia+ims
Widyatama.lecture.applied networking.iv-week-08-multimedia+ims
 
CPScom2012_mwijnants
CPScom2012_mwijnantsCPScom2012_mwijnants
CPScom2012_mwijnants
 
Smarter Planet
Smarter PlanetSmarter Planet
Smarter Planet
 
Vol13 no2
Vol13 no2Vol13 no2
Vol13 no2
 
A case study on Network Rail’s Fault Management System (FMS) made safe and si...
A case study on Network Rail’s Fault Management System (FMS) made safe and si...A case study on Network Rail’s Fault Management System (FMS) made safe and si...
A case study on Network Rail’s Fault Management System (FMS) made safe and si...
 
Mmu marketing mobile_money
Mmu marketing mobile_moneyMmu marketing mobile_money
Mmu marketing mobile_money
 
Iw2415551560
Iw2415551560Iw2415551560
Iw2415551560
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
From Knowledge Economy to Inclusive Information Society. Experiences from Ind...
From Knowledge Economy to Inclusive Information Society. Experiences from Ind...From Knowledge Economy to Inclusive Information Society. Experiences from Ind...
From Knowledge Economy to Inclusive Information Society. Experiences from Ind...
 

Viewers also liked

Cloud IBM IaaS - SoftLayer e PaaS - BlueMix
Cloud IBM IaaS - SoftLayer e PaaS - BlueMixCloud IBM IaaS - SoftLayer e PaaS - BlueMix
Cloud IBM IaaS - SoftLayer e PaaS - BlueMixThiago Viola
 
How will you outthink and re-invent with IBM Cloud?
How will you outthink and re-invent with IBM Cloud?How will you outthink and re-invent with IBM Cloud?
How will you outthink and re-invent with IBM Cloud?LaurenWendler
 
Greg Boss Ibm Cloud Computing June 2008
Greg Boss Ibm Cloud Computing June 2008Greg Boss Ibm Cloud Computing June 2008
Greg Boss Ibm Cloud Computing June 2008GovCloud Network
 
Discover - Mapping Your Hybrid Cloud Journey
Discover - Mapping Your Hybrid Cloud JourneyDiscover - Mapping Your Hybrid Cloud Journey
Discover - Mapping Your Hybrid Cloud JourneyLaurenWendler
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services OverviewMichael Fork
 
IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016Atsumori Sasaki
 
SoftLayer Cloud Services
SoftLayer Cloud ServicesSoftLayer Cloud Services
SoftLayer Cloud ServicesAnna Landolfi
 

Viewers also liked (7)

Cloud IBM IaaS - SoftLayer e PaaS - BlueMix
Cloud IBM IaaS - SoftLayer e PaaS - BlueMixCloud IBM IaaS - SoftLayer e PaaS - BlueMix
Cloud IBM IaaS - SoftLayer e PaaS - BlueMix
 
How will you outthink and re-invent with IBM Cloud?
How will you outthink and re-invent with IBM Cloud?How will you outthink and re-invent with IBM Cloud?
How will you outthink and re-invent with IBM Cloud?
 
Greg Boss Ibm Cloud Computing June 2008
Greg Boss Ibm Cloud Computing June 2008Greg Boss Ibm Cloud Computing June 2008
Greg Boss Ibm Cloud Computing June 2008
 
Discover - Mapping Your Hybrid Cloud Journey
Discover - Mapping Your Hybrid Cloud JourneyDiscover - Mapping Your Hybrid Cloud Journey
Discover - Mapping Your Hybrid Cloud Journey
 
SoftLayer Storage Services Overview
SoftLayer Storage Services OverviewSoftLayer Storage Services Overview
SoftLayer Storage Services Overview
 
IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016
 
SoftLayer Cloud Services
SoftLayer Cloud ServicesSoftLayer Cloud Services
SoftLayer Cloud Services
 

Similar to Neer Core Services & Cloud Computing V4.5

Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011
Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011
Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011asalters
 
Top 10 Emergency Notification Predictions for 2011
Top 10 Emergency Notification Predictions for 2011Top 10 Emergency Notification Predictions for 2011
Top 10 Emergency Notification Predictions for 2011asalters
 
Martine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesMartine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesServiceWave 2010
 
Securing Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency ResponseSecuring Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency ResponseRakesh Bharania
 
Rethinking Technology Edge - Valgeo 2011
Rethinking Technology Edge - Valgeo 2011Rethinking Technology Edge - Valgeo 2011
Rethinking Technology Edge - Valgeo 2011Elena Rapisardi
 
Valgeo2011 rethinking tech edge
Valgeo2011 rethinking tech edgeValgeo2011 rethinking tech edge
Valgeo2011 rethinking tech edgeMassimo Lanfranco
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
Maximize uptime with_mobile_device_management
Maximize uptime with_mobile_device_managementMaximize uptime with_mobile_device_management
Maximize uptime with_mobile_device_managementSupply Chain Services
 
New ecosystems and innovation in m2m business - Luigi Cicchese
New ecosystems and innovation in m2m business - Luigi CiccheseNew ecosystems and innovation in m2m business - Luigi Cicchese
New ecosystems and innovation in m2m business - Luigi CiccheseGoWireless
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocAtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocAtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocAtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocAtHoc
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodClubHack
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYODstefriche0199
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112Sharon Rozov
 
The Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefThe Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefCisco Crisis Response
 

Similar to Neer Core Services & Cloud Computing V4.5 (20)

Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011
Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011
Everbridge Webinar: Top 10 Emergency Notification Predictions for 2011
 
Top 10 Emergency Notification Predictions for 2011
Top 10 Emergency Notification Predictions for 2011Top 10 Emergency Notification Predictions for 2011
Top 10 Emergency Notification Predictions for 2011
 
Martine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesMartine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resources
 
Securing Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency ResponseSecuring Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency Response
 
Rethinking Technology Edge - Valgeo 2011
Rethinking Technology Edge - Valgeo 2011Rethinking Technology Edge - Valgeo 2011
Rethinking Technology Edge - Valgeo 2011
 
Valgeo2011 rethinking tech edge
Valgeo2011 rethinking tech edgeValgeo2011 rethinking tech edge
Valgeo2011 rethinking tech edge
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Maximize uptime with_mobile_device_management
Maximize uptime with_mobile_device_managementMaximize uptime with_mobile_device_management
Maximize uptime with_mobile_device_management
 
New ecosystems and innovation in m2m business - Luigi Cicchese
New ecosystems and innovation in m2m business - Luigi CiccheseNew ecosystems and innovation in m2m business - Luigi Cicchese
New ecosystems and innovation in m2m business - Luigi Cicchese
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Department of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHocDepartment of Defense Data Sheet from AtHoc
Department of Defense Data Sheet from AtHoc
 
Smart Grid Security by Falgun Rathod
Smart Grid Security by Falgun RathodSmart Grid Security by Falgun Rathod
Smart Grid Security by Falgun Rathod
 
iPICS
iPICSiPICS
iPICS
 
Udi and juniper networks BYOD
Udi and juniper networks BYODUdi and juniper networks BYOD
Udi and juniper networks BYOD
 
Thesis Proposal
Thesis ProposalThesis Proposal
Thesis Proposal
 
Telecom trends 261112
Telecom trends 261112Telecom trends 261112
Telecom trends 261112
 
The Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefThe Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster Relief
 
Ams Oncor March 2010
Ams Oncor March 2010Ams Oncor March 2010
Ams Oncor March 2010
 

More from GovCloud Network

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmarkGovCloud Network
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for meGovCloud Network
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeGovCloud Network
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in CyberspaceGovCloud Network
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessGovCloud Network
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture GovCloud Network
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin JacksonGovCloud Network
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSAGovCloud Network
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher PageGovCloud Network
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanGovCloud Network
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)GovCloud Network
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefGovCloud Network
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. JacksonGovCloud Network
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentGovCloud Network
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013GovCloud Network
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013GovCloud Network
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)GovCloud Network
 

More from GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Neer Core Services & Cloud Computing V4.5

  • 1. Using a Cloud Computing Model to Establish Net-Enabled Emergency Response (NEER) Core Services NCOIC Cloud Computing Workshop September 21, 2009 presented by MG Stephen Gross USAFR NEER IPT Chair Deputy Director Deloitte & Touche Center for Cyber Innovation
  • 2. Recommendations for effectively establishing NEER core services  We will begin with our concluding recommendations  Produce operational, capability and technical patterns for a network-of-networks based on nationally defined, locally implemented cloud computing storefronts hosting NEER core services interfaced to local mesh networks – Subscribe and Publish architecture • Information is both “pushed” AHAW Logistics and “pulled” alerts Digital Geo- Rights – Get the right information Spatial SECURE, Management CLOUD-BASED to the right people Data DISTRIBUTED at the right time STOREFRONTS Shared up and down all for NETWORK CENTRIC OPERATIONS chains of command SUPPORTING PUBLIC SAFETY Directories Identity and EMERGENCY RESPONSE CORE SERVICES – Focus on responder Management Access communities Mesh Control Networks – Focus on victims Integration Broadband Backbones – “Everything Over IP” Mobile is fundamental Responders Fixed – Security as required Agencies at all levels 2
  • 3. Challenges to effectively establishing NEER core services  Balkanized control of emergency IT – 120,000 ER jurisdictions in the Public Safety/Emergency Responder US alone, mostly small COI (Non-Military) in the USA* – Nearly as many in the EU/NATO/ allied European countries 20000 18000  Lack of coordinated national, 16000 EOCs provincial/state leadership Urgent Care 14000  Stove pipe agency consumer 12000 Hospitals solutions PSAPs 10000 – Dominance by vendors; land Public Health 8000 EMS mobile radios prevalent 6000 Fire  >$100 Billion in legacy systems 4000 Law rarely designed to interoperate 2000 – >$1 Trillion worldwide 0  Lack of widely available broadband Number of Agencies infrastructure for emergency Source: and responder COI 3
  • 4. Challenges to effectively establishing NEER core services (continued)  Wisconsin State Patrol Chairman Casey Perry attributed a great deal of his problems to squabbles among states, counties and municipalities. He said more federal grant money needs to be conditional to hold state and local governments accountable for creating interoperable networks  "Each entity resists losing their share of control," Perry said. "This is the underlying root of the problems we face today." 4
  • 5. Common requirements from multiple COI not being effectively addressed today  Standardized communications from and to any device, source  Intelligence about people – Responders and victims – Secure when necessary  Access to special resources – People, e.g., interpreters, neurosurgeons, mental health professionals, officials, telecomm manager – Things, e.g., hospital beds, specialized vehicles, shelters, bulldozers, ambulances, generators, cell sites – Decision Support, e.g., predictive algorithms, geospatial information, protocols, incident map, matching people to shelters, directories  Effectively addressing these requirements will require a national establishment of NEER core services implemented nationally, regionally and locally 5
  • 6. What are NEER core services?  NEER core services are those services necessary for full information interoperability of the emergency responder communities of interest for both day-to-day operations and for response to complex humanitarian disasters 6
  • 7. Agency locator  Registration of all responders – Identify who each emergency responder is – Identify each emergency responder’s organization – Describe organization type • role-based access – Define the incident types about which each responder needs to be alerted • Jurisdiction based and/or geographically based • Help needed/wanted • Just interested – Define in advance where and to what devices each responder wants calls and data sent – Define in advance each responder’s radio frequencies, gateways, CODECs, etc 7
  • 8. Identity management and access control  Identify each information recipient – Individual user and/or organization  How is each recipient represented (Identifiers) – Username, Log-in (Password, PINs, Smartcards, Biometrics, etc  Define how each recipient is to be authenticated – Validation of identifiers  Describe what each recipient can do when authenticated (Authorization) – What functions can be performed – What data can be accessed – Role-based – tied to identifiers – user and organization  Define how each recipient will know the information exchange is working properly (Auditing) 8
  • 9. Digital rights management  Classification of data – By data element, data segment, entire record  Granting of access rights (informed consent) – Permissions - what grantee is allowed to do by action (access, print, update, change, distribute, etc.) – Constraints - restrictions on the permissions (i.e. cannot redistribute, access granted only if tied to an emergency, etc.) – Obligations - what grantee has to do/provide/accept – Rights Holders - who is entitled to what 9
  • 10. All hazards – all warnings (AHAW) alerting  Provide a practical, pragmatic methodology for efficient and timely generation, authentication or confirmation and distribution of emergency alerts and warnings – Nationally mandated, integrated at the regional, state and local levels – Based on the latest version of the Common Alerting Protocol (CAP) Standard from the Organization for the Advancement of Structured Information Standards (OASIS) – Positions the use of CAP in a global system of systems, network of networks, using a SOA which will be reused in multiple NEER patterns • The SOA which supports this set of patterns is based on the Reference Model for SOA (SOA-RM)[RD/05], an OASIS standard developed by the SOA-Reference Model Technical Committee (SOA- RM TC) approved in March 2005 10
  • 11. Examples of standards required for NEER core services establishment  Examples of NEER core services standards MECI Demo / Sample Architectural Elements (not an exhaustive list) • SIP • Portable WiMax C2 appliances CAP • EDXL-DE, other emerging EDXL standards Cellular Comms Emergency Kit • Directory Services – EPAD Wireless and Terrestrial Systems SATCOM Gateway IP Connectivity (Voice, Video, Data) • Wireless Mesh Networks – 802.11, 802.16 • Wireless Local Area Networks (LAN) – 802.11 Broken Links • Connectionless Networking – IPv6 Restored link IP Back-bone Software Defined Radio JTRS • Connectionless Transport – UDP Sub-nets • Connection-Oriented Transport – TCP, SCTP • 3G cellular, both UMTS and CDMA2000 • Communications Security – IPSec, TLS, SCIP • Satellite Communications – L band, Ku band 11
  • 12. Recommendations for effectively establishing NEER core services  Produce operational, capability and technical patterns for a network-of-networks based on nationally defined, locally implemented cloud computing storefronts hosting NEER core services interfaced to local mesh networks – Subscribe and Publish architecture • Information is both “pushed” Logistics and “pulled” AHAW alerts Digital – Get the right information Geo- Rights to the right people Spatial SECURE Management CLOUD-BASED at the right time Data DISTRIBUTED up and down all STOREFRONTS Shared for NETWORK CENTRIC OPERATIONS chains of command SUPPORTING PUBLIC SAFETY Directories – Focus on responder Identity and EMERGENCY RESPONSE CORE SERVICES communities Management Access Mesh – Focus on victims Networks Control Broadband – “Everything Over IP” Integration Backbones is fundamental Mobile – Security as required Responders Fixed at all levels Agencies 12
  • 13. NEER core services reference model  Information  Services – Facilitate knowledge – Enable KD&D through an discovery and display (KD&D) open standards based service by making information from oriented architecture that is all core services storefronts • Secure as needed • Accessible • Highly scalable • Understandable KD&D CORE SERVICES • Highly distributed • Trustable • >99.9% available AGENCY LOCATOR • Interoperable – No single points of failure • Manageable • Decentralized for administration IDENTITY MANAGEMENT RIGHTS & PERMISSIONS ALL HAZARDS ALL WARNINGS CLOUD STOREFRONTS STANDARDS TRUSTED NETWORKS 13
  • 14. NEER Contacts  Please direct all inquiries regarding the NCOIC Net-Enabled Emergency Response initiative to: – Stephen Gross NEER IPT Chair +1.202.879.5678 stgross@deloitte.com Please copy: – Paul Mangione, Senior Technical Staff +1.253.839.3395 paul.mangione@ncoic.org 14