Building a Wide Area Public Safety Network Technologies Used, Lessons Learned EMS Summit October 2, 2003 William E. Ott, MS, Paramedic.

Slides:



Advertisements
Similar presentations
ONE PLANET ONE NETWORK A MILLION POSSIBILITIES Barry Joseph Director, Offer and Product Management.
Advertisements

EMS Summit – Network Remote Access William E. Ott Friday August 25, – 1400 EDT VPN Solutions Voice over IP Secure .
1 Improving Efficiency, Reliability and Security in the Mobile Communications & Data Environment Coban User Group 2013, Rob Boback – Public Safety Sales.
CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Take your CMS to the cloud to lighten the load Brett Pollak Campus Web Office UC San Diego.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Chapter 5 Networks. Learning Objectives After reading this chapter the reader should be able to: Understand the importance of networks in the field of.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Prototyping the WAN Designing and Supporting Computer Networks – Chapter 8.
Virtual Private Network (VPN) Its Place in a Lottery’s Communication Portfolio Leslie Vang, Deputy Director IT, SCEL.
The Remote Workplace Designing, deploying, and supporting the remote workplace environment Presented by: John Milhoan Information Technology Cooperative,
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
IS Network and Telecommunications Risks
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 2: Teleworker Connectivity.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
INTERNET CONNECTIVITY Joe Muscarella Pentastar Communications.
Service Providers & Data Link & Physical layers Week 4 Lecture 1.
Data Centers and IP PBXs LAN Structures Private Clouds IP PBX Architecture IP PBX Hosting.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Computerized Networking of HIV Providers Networking Fundamentals Presented by: Tom Lang – LCG Technologies Corp. May 8, 2003.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
Windows XP Home Networking Scott Manchester Technical Evangelist Home Networking.
The Basics of Networking. Rick Graziani What is networking? Communication! An interconnection of computers and other devices: –Printers.
Established in 1974 Service Area of 1,200 Square Miles Population of 440,000 People We Answer 700,000 Calls for Service Each Year 3 rd Largest PSAP in.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
1 Networks and Telecommunications. 2 Applying Telecommunications in Business TELECOMMUNICATIONS – the transmission of data between devices in different.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Certain security vulnerabilities exist in every mode of wireless communications.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Office of Infrastructure Services Division of Communications Brad Watkins Director of Communications.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department INTRODUCTION TO COMPUTER NETWORKS Dr. Abdelhamid.
1.05a.  Local Area Networks (LANs) ◦ Small networks in a limited geographical area  Wide-Area Networks (WANs) ◦ Extensive networks that may span hundreds.
1 Next Generation Manitoba Provincial Data Network Scope Background Architecture Satellite Network.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
Higher Computing Networking. Networking – Local Area Networks.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science.
Networks The Big Picture. Three Great Leaps of Civilization.
IS3220 Information Technology Infrastructure Security
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
Networking Revision. Advantages:  Communication (remotely)  Sharing hardware (saves on cost, eg. Printers)  Sharing of data and info (eg. Databases.
Unit Communication Hardware
Network Infrastructure
Introduction to Computers
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Chapter 1: WAN Concepts Connecting Networks
Virtual Private Networks (VPN)
Private Networks.
Presentation transcript:

Building a Wide Area Public Safety Network Technologies Used, Lessons Learned EMS Summit October 2, 2003 William E. Ott, MS, Paramedic

Objectives Create a broadband communications system to link all public safety agencies and sites Allow for redundant capability from existing networks Provide improved incident command and tactical capabilities Provide redundant ‘detached’ EOC capability Provide voice and data capability

Participants in system County government City government County EMS City Fire Department County Fire Departments City Police Department County Sheriff Department City/County 911

Resources to share Multiple Microsoft SQL Servers –FD/EMS mirrored –FD/EMS replicated 911 AS400 system –Agency tie in to CAD info Public Safety only messaging system –Site to site –Site to vehicle –Vehicle to vehicle Bandwidth for contractors, vendors, media primarily during emergencies

Project Timeline Initial work on this project dates to 1995 with serious work on solutions starting in 1997 A variety of issues both technical and political caused stumbling blocks until 2002 when the project rapidly moved toward completion

Known Obstacles City and County governments that do not get along, work together, or agree on nearly anything City and county both with longstanding ideas on who and how connectivity will be provided

Connectivity Options Many changes since 1995 Dial-up Sneaker-Net Frame Relay Local wireless Vehicle wireless DSL, Cable, Satellite Metro Ethernet

Technical Issues Firewalls Intrusion Detection Virtual Private Networks –SSL –IPSec Bandwidth allocation and management Maintenance and support costs Policies and procedures

Technical Issues Committed Information Rate (CIR) –Varies by carrier –Varies by technology Price planning –Monthly or quarterly fees –Maintenance and support issues Provider management of VPNs versus self management

Network and Resource Topology IP based network Mostly cable modem based Three locations with DSL One location with satellite Two core sites share leased lines Several core locations share a redundant fiber optic ring

Remote Access Issues Require all remote access to be IPSec based VPN –Hardware –Software Determining appropriate personnel to have remote access Authentication issues for remote users –IP address –User name, password, shared secret Use of SSL based service such as GoToMyPC

Wireless (commercial) Issues CDPD, phased out soon, very slow Proprietary solutions were too expensive CDMA 2.5 / 3.0 generation services with Sprint and Verizon are working well and are affordable

Wireless local segments Utilizing some local wireless Must have IPSec VPN overlay –WEP is easily cracked –MAC filtering is easily spoofed Currently utilizing Sonicwall SOHO 3 TWZ and Netgear FVM318 firewalls with IPSec based wireless in locations needing wireless Wireless very useful but dangerous if not deployed properly

Lessons learned? Getting local players to cooperate was the biggest issue Technology is changing very, very fast What is reasonable now may be slow or overpriced in twelve months Avoid contracts with carriers longer than 12 months, 24 months at a maximum Need clear requirements up front

Lessons learned? Involve applications and database managers and vendors in the network processes to account for bandwidth needed for replication and mirroring issues Stay current with networking technologies in the trade press Press carriers for more bandwidth, lower prices, higher CIR