WIDER 3 WiFi in Disaster and Emergency Response Anders Bäck Muhammad Ali Beyhan Kochali Xin Bai David Tlahuetl WiFi in Disaster and Emergency Response.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

Dag Nielsen Ericsson Response ERICSSON RESPONSE Dag Nielsen Technology to the benefit of the Society.
Workshop on Telecommunications for Disaster Relief, February 2003, Geneva Dag Nielsen & Catherine Mulligan Ericsson Response WLAN in Disaster and.
Voice and Data Encryption over mobile networks July 2012 IN-NOVA TECNOLOGIC IN-ARG SA MESH VOIP.
Prepared By Naieem Khan & Ummiya Rahman Presentation On.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Nicolas FISCHBACH Senior Manager, IP Engineering/Security - COLT Telecom - version 1.0 Voice over IP (VoIP)
UMA (Unlicensed Mobile Access) El Ayoubi Ahmed Hjiaj Karim.
1 Improving Efficiency, Reliability and Security in the Mobile Communications & Data Environment Coban User Group 2013, Rob Boback – Public Safety Sales.
May 25, 2004 Final Presentation Communication Systems Design 2004 Ajeet Kumar Nankani Joakim Andersson Ning Zhou Rajkrishna Srinivasan Workshet Lamenew.
Rhodes University - Department of Computer Science 1 Project Project: Re-establishing and improving the experimental VoIP link with the University of Namibia:
Solutions for SIP The SIP enabler We enable SIP communication for business What the E-SBC can do for you.
WLAN In Disaster and Emergency Response (WIDER) Final Presentation.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Living the SIMPLE SIP way SIP 2003 Paris, January 2003 Jörgen Björkner VP Concept Development Chairman SIP Forum
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Cisco Systems IP Interoperability and Collaboration System (IPICS) Rick Santina.
Enterprise Infrastructure Solutions for SIP Trunking
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
ISVs and Technology 26% Banking and Finance 26% Travel and Consumer 22% Information and Media 14% Emerging Verticals 10% Company 1993 founded, US-based,
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
© Aastra – 2013 BluStar for iPad / iPhone September 2013 BluStar for iPad/iPhone.
Clinic Security and Policy Enforcement in Windows Server 2008.
Mobility And Anywhere Access Clancy Priest Technology Services Director City of Hayward.
Presenters :Deepak Yadav Voice Over Internet Protocol.
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Business Data Communications, Stallings 1 Chapter 1: Introduction William Stallings Business Data Communications 6 th Edition.
VoIP Citizen Decreasing Cost For Communication Voice over Internet Protocol Implement VoIP on your office Bona Simanjuntak, Mei 2004
MIMCom 2006: Deploying a campus area network for the University Teaching Hospital Lusaka – Zambia Midterm Presentation March 24th 2006 Project Team: Michael.
VoIP in Disaster & Emergency Response Voice over IP in Disaster and Emergency Response Team Members: Muhammad Ali Mansoor A. Siddiqui Carlos Loarca de.
To Build Context-Aware VoIP Support using Session Initiation Protocol By Prasad Vunnam Ritesh Reddy Gunna.
Ben-Gurion University of the Negev Analyzing the Integration of Innovative Telecommunication Technologies Project Number P Yossi Twizer Supervisor:
WSB / MobiHealth Hugo Geuverink MobiHealth WP3 meeting 12/13 November 2002, Madrid.
WLAN In Disaster and Emergency Response (WIDER) Final Presentation.
Peer to Peer Applications in Ad hoc Networks Author: Jesús Hijas Networking Laboratory Helsinki University of Technology Supervisor:
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
03/09/2003Helsinki University of Technology1 Overview of Thesis Topic Presented By: Zhao Xuetao.
| E. Marocco, G. Canal Lucent, 2006, 26 th October P2PSIP: Interworking Enrico Marocco Research Engineer
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
NuolSec VIspace Vientiane, Laos.
Appendix A UM in Microsoft® Exchange Server 2010.
MoVoIX CSD 2005 mozambique voice over ip and ix extension FINAL PRESENTATION.
A ISP free video conferencing application for mobile devices using wireless and VoIP Technology.
Evolution towards the Next Generation Network
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Teachers Name : Suman Sarker Telecommunication Technology Subject Name : Mobile & Wireless Communication-2 Subject Code : 9471 Semester :7th Department.
Implementing VoIP in a wireless world Herman Abel Product Manager Aculab (booth 402) Phone:
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
PTCL Training & Development
WLAN In Disaster and Emergency Response (WIDER) MidTerm Presentation.
VoIP in Disaster & Emergency Response Voice over IP In Disaster and Emergency Response Project Name:
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
WIDER 3 WiFi in Disaster and Emergency Response Anders Bäck Muhammed Ali Beyhan Kochali Xin Bai David Tlahuetl WiFi in Disaster and Emergency Response.
3/5/2016Faculty : Trần Thị Ngọc Hoa1 From Proxy Server To ISA 2006  Overview  History  Functions  Caching Process  Caching Types  How does it work.
Introduction Steven Johnson President Ingate Systems Inc.
DCS230 Centralized or Decentralized Data Transfer Prof. Nalini Venkatasubramanian -Myung Guk Lee -YunHo Huh -Abhinav.
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
0 What Does SIP Bring to Your Customer Experience ? Extend VoIP and IP Contact Center values through support of SIP o Media and location independent support.
Living With Your New IP PBX David M. Laurenson, VP Information Technology and CIO A. Finkl & Sons A.Finkl & Sons founded in 1879 HQ in Chicago World’s.
Jia Uddin Embedded System Lab.  MPLS  IMANET  IMANET network model  Proposed model of IMANET with MPLS  Conclusion.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NUR IZZATI BINTI AHMED AZMAN TSK 1.
NAME :WAN MUHAMMAD ASWAD BIN ZULKIFLI NO.MATRIK : CLASS : 2TSK2.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
5 G.
Providing Teleworker Services
Enterprise Infrastructure Solutions for SIP Trunking
Providing Teleworker Services
Helping to Achieve ROI Targets with SIP Trunking
Presentation transcript:

WIDER 3 WiFi in Disaster and Emergency Response Anders Bäck Muhammad Ali Beyhan Kochali Xin Bai David Tlahuetl WiFi in Disaster and Emergency Response

Agenda 1. Project Background & Goals 2. System Architecture 3. Wireless Research 4. System Enhancements 5. Future Work & Conclusions 6. Video WiFi in Disaster and Emergency Response

315,000 people perished in natural disasters in 2004 In 6 years, 0.5 million  5.5 million *Source: International Federation of Red Cross and Red Crescent Societies WiFi in Disaster and Emergency Response Disaster Statistics

Mission statement To improve the existing communication systems for relief organizations in disaster areas WiFi in Disaster and Emergency Response

Stakeholders Ericsson Response KTH Relief Organizations – United Nations – Red Cross and Red Crescent WiFi in Disaster and Emergency Response

Isolated Networks WiFi in Disaster and Emergency Response

Basic System Structure WiFi in Disaster and Emergency Response

Primary Goals Investigation of new wireless technologies – Improved coverage, reliability and robustness Adding GSM connectivity Internet connectivity – Caching server, firewall, NAT WiFi in Disaster and Emergency Response

Secondary Goals Improve the Quality of Service Implementation of advanced encryption, authentication technologies, and facilitation of management – PEAP – Central Database WiFi in Disaster and Emergency Response

System Architecture WiFi in Disaster and Emergency Response

Services Enhancements Operating System – SuSE Linux Professional 9.0 – SuSE Linux Entreprise Server 9.0 RADIUS Voice over IP (VoIP) WiFi in Disaster and Emergency Response

RADIUS Authentication Protocol – PEAP Protected Extensible Authentication Protocol Authentication model ---- User/Password WiFi in Disaster and Emergency Response

Voice Over IP (VoIP) Bi-directional Voice connection with PSTN Voice Conferencing – Sip Express Media Server (SEMS) – Integrated with SIP server WiFi in Disaster and Emergency Response

Wireless Part Point-to-Multipoint links WIDER3 solution Proposed Solution WiFi in Disaster and Emergency Response

Point-to-Multipoint links WiFi in Disaster and Emergency Response

WIDER3 wireless solution Access Points in the camps Point-to-Multipoint Open WiFi access near the central unit WiFi in Disaster and Emergency Response

Proposed wireless solution WiFi in Disaster and Emergency Response

New System Services Caching Server NAT & Firewall GSM Connectivity Central Database Management System WiFi in Disaster and Emergency Response

Caching Server Concept WiFi in Disaster and Emergency Response

Caching Server Operation WiFi in Disaster and Emergency Response

Caching Server Features Improvement of the response time for Internet objects Optimization of the satellite’s bandwidth usage Authentication for Internet access Bandwidth management Black list implementation Protection to the internal hosts by proxying the traffic WiFi in Disaster and Emergency Response

Caching Server Parameters Hit ratio from 30 to 60% Byte hit ratio from 20 to 50 % Number of users – The less users, the lower efficiency Type of traffic – Cacheable/Non cacheable – Traffic Likelihood Cache size – The bigger cache, the higher hit ratios WiFi in Disaster and Emergency Response

NAT WiFi in Disaster and Emergency Response

Firewall WiFi in Disaster and Emergency Response

GSM Connectivity WiFi in Disaster and Emergency Response SIP server – AXD 320 – Fully functional AXD 320 – MSC – MSC not configured. Outside project scope.

Central Database with LDAP WiFi in Disaster and Emergency Response Facilitation of user administration Services using Central Database for authentication – RADIUS (Network access) – Caching server (Internet access) – Instant Messaging server – FTP server Database searchable with MS Outlook

System Management SerWeb WebMin Adminstrator and User Front-end WiFi in Disaster and Emergency Response

Conclusions Goals Achieved All primary goals were fully achieved – Extensive Wireless technology report – GSM connectivity – Caching server, Firewall & NAT First secondary goals was fully achieved – PEAP, Central Database, Front-end Secondary secondary goal partially achieved – L3-switch QoS configuration WiFi in Disaster and Emergency Response

Future Work Implementation of new wireless technology – WiMax – Meshed Network Extensive system testing LDAP authentication for SIP server MMS/SMS WiFi in Disaster and Emergency Response

Lessons Learned WiFi in Disaster and Emergency Response Enterprise level system integration Hi-end device and services configuration Project management & Efficient team work Communication skills

Project Video WiFi in Disaster and Emergency Response

Questions & Comments Thank you !! WiFi in Disaster and Emergency Response