IEPREP (Internet Emergency Preparedness) By: Jeffery Pelletier.

Slides:



Advertisements
Similar presentations
Colombo, Sri Lanka, 7-10 April 2009 Preferential Telecommunications Service Access Networks Lakshmi Raman, Senior Staff Engineer Intellectual Ventures.
Advertisements

VoIP PRESENTATION BY HÜSEYİN SAVRAN OUTLINE PSTN an brief history of telephone.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
v3.1 CIS151 Module 2 JEOPARDY K. MartinG. Valencia.
Introduction© Dr. Ayman Abdel-Hamid, CS4254 Spring CS4254 Computer Network Architecture and Programming Dr. Ayman A. Abdel-Hamid Computer Science.
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
Networking Basics: A Review Carey Williamson iCORE Chair and Professor Department of Computer Science University of Calgary.
Network Layer. The Network layer, or OSI Layer 3, provides services to exchange the individual pieces of data over the network between identified end.
1 Network Layer: Host-to-Host Communication. 2 Network Layer: Motivation Can we built a global network such as Internet by extending LAN segments using.
Using Prices to Allocate Resources at Access Points Jimmy Shih, Randy Katz, Anthony Joseph One Administrative Domain Access Point A Access Point B Network.
Review on Networking Technologies Linda Wu (CMPT )
12 July 2015 Requirements for prioritized access to PSTN resources Henning Schulzrinne Columbia University superset of draft-schulzrinne-ieprep-resource-req-00.
1 Networking Basics: A Review Carey Williamson iCORE Professor Department of Computer Science University of Calgary.
Mid-America Regulatory Conference June 9, 2003 Kenneth Moran FCC-OET Director Defense and Security TSP WPS GETS.
Chapter 2 TCP/ IP PROTOCOL STACK. TCP/IP Protocol Suite Describes a set of general design guidelines and implementations of specific networking protocols.
IEEE Emergency Services DCN: Title: call flow for Layer 2 support for unauthenticated requests Date.
Voice & Data Convergence Network Services January 11, 2001.
Lecture 1, 1Spring 2003, COM1337/3501Computer Communication Networks Rajmohan Rajaraman COM1337/3501 Textbook: Computer Networks: A Systems Approach, L.
1: Introduction1 Part I: Introduction Goal: r get context, overview, “feel” of networking r more depth, detail later in course r approach: m descriptive.
Saumil Shah IEOR 190G 3/19/08.  Vonage is a VoIP(voice over IP) company that provides telephone service via a broadband connection.  In order to use.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
Internet, Part 2 1) Session Initiating Protocol (SIP) 2) Quality of Service (QoS) support 3) Mobility aspects (terminal vs. personal mobility) 4) Mobile.
Comparing modem and other technologies
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
CS 447 Networks and Data Communication
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
Application-Layer Mobility Using SIP Henning Schulzrinne, Elin Wedlund Mobile Computing and Communications Review, Volume 4, Number 3 Presenter: 許啟裕 Date:
1 Which Standards are needed toward Future Wireline and Wireless IP Network ? Hee Chang Chung, Jun Kyun Choi
Internet Emergency Preparedness WG (ieprep) Agenda Monday, August 1, ============================== Chair(s): Scott Bradner Kimberly King AGENDA:
Chapter 1 Introduction Circuit/Packet Switching Protocols Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley,
Beyond Best-Effort Service Advanced Multimedia University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot November 2010 November.
UNDERSTANDING THE HOST-TO-HOST COMMUNICATIONS MODEL - OSI LAYER & TCP/IP MODEL 1.
Future Emergency Telecommunication Scenarios over the Internet Dr. Ken Carlberg Emergency Telecommunications Workshop 26’th-27’th,
Voice over IP by Rahul varikuti course instructor: Vicky Hsu.
ﺑﺴﻢﺍﷲﺍﻠﺭﺣﻣﻥﺍﻠﺭﺣﻳﻡ. Group Members Nadia Malik01 Malik Fawad03.
Telecommunications, the Internet, and Wireless Technology.
Convergence Technology. Ch 01 Telecom Overview  Define communications and telecommunications  Components of a communications system  Difference between.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Exploring the Enterprise Network Infrastructure Introducing Routing and Switching.
GSM – formerly: Groupe Spéciale Mobile (founded 1982) – now: Global System for Mobile Communication – Pan-European standard (ETSI, European Telecommunications.
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
Packet switching network Data is divided into packets. Transfer of information as payload in data packets Packets undergo random delays & possible loss.
DHS/NCS Priority Services By An Nguyen. Introduction: National Security/Emergency Preparedness (NS/EP) users rely heavily on public telecommunications.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
1 Chapter 4. Protocols and the TCP/IP Suite Wen-Shyang Hwang KUAS EE.
Networking Components Siby Abraham LTEC Purpose of the presentation  This presentation will cover how certain network components function, when.
THE NETWORKS Theo Chakkapark. Open System Interconnection  The tower of power!  The source of this power comes from the model’s flexibility.
17 February 2016 SIPPING - IEPREP Joint Meeting Fred Baker - IEPREP co-chair Rohan Mahy - SIPPING co-chair.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
Voice over Internet Protocol Presenter: Devesh Patidar Arunjay Singh August 2, 2009.
Lecture 1: Introduction to WAN
CCNA1 v3 Module 2 v3 CCNA 1 Module 2 JEOPARDY K. Martin.
D Janet Gunn, CSC Dennis Berg, CSC Pat McGregor, Nyquetek Richard Kaczmarek,
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
PART1: NETWORK COMPONENTS AND TRANSMISSION MEDIUM Wired and Wireless network management 1.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 3 Omar Meqdadi Department of Computer Science and Software Engineering.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Voice Over Internet Protocol Nelson Kattula Computer Science, Masters.
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts.
Distributed Systems.
MLEF Without Capacity Admission Does Not Satisfy MLPP Requirements
Network Core and QoS.
Gary Thom President, Delta Information Systems, Inc.
TDR authentication requirements
Network Core and QoS.
Presentation transcript:

IEPREP (Internet Emergency Preparedness) By: Jeffery Pelletier

Outline Explanation of IEPREP (Internet Emergency Preparedness) Some major threats to an network (ie. Examples) RFC 3487 RFC 3690 RFC 3523 RFC 3689 RFC 4190 RFC 4375 Statistics from 9/11

IEPREP Created for times of emergency and/or disasters. – Access to any public telecommunications at hand Conventional phone Internet Access PDAs Cell Phone IP Telephones The objectives: – Create Network that will not get over congested in the time of an emergency. – Have uninterrupted communication between emergency personal. – Have proper authorization given to certain individuals.

Potential Threats to a Network Natural Disasters – Hurricanes – Floods – Tornados – Tsunamis – Fires – Earthquakes Man-Made Threats – Terrorist Attacks – Plane Crashes – Hackers

RFC 3487 Session Initiation Protocol (SIP) – In times of emergencies, there needs to be access to circuit switched networks by emergency personal. – SIP contain large handling capabilities – Limited though due to network capacities. Network Topologies: – IP end-to-end – IP to CSN Network Models: – Pre-configured for ETS Can modify behavior of certain protocols – Transparent Model Transfer valid IP packets but has no control over protocols – SIP/RTP transparent User is in control of incoming/outgoing calls – Restricted SIP Cannot add certain SIP protocols

RFC 3690 IP telephony requirements Mapping used to distinguish PSTN lines – Regular traffic vs. emergency traffic Exists in Application layer – To keep track of billing – To keep track of authorized usage. (abuse of service)

RFC 3523 Describes topology naming conventions for IEPREP phone calls Four topologies: – IP bridging IP core between two circuit-switched networks – IP at the start An IP phone makes a call to a circuit switched phone – IP at the end A circuit switched phone makes a call to an IP phone – End-to-End IP There are no circuit switched network phones and IP phones are used at both ends

RFC 3689 Emergency Telecommunications System (ETS) – Network setup for use in the times of emergencies Explains labeling – Numeric – Alphanumeric – String of bits Emergency Standards – T1.631 = Used in accordance with the GETS system. – E.106 = Guide to PSTN phone lines in the times of an emergency. – F.706 = Extends E.106 into Multimedia type applications. – H and I = Multi-level label mechanism for emergency communications. Four Requirements – IF Signaling = Fact that there is an emergency present. – Labels = Method to determine content of traffic. – Policy = Determines explanation of a specific characteristic. – Network Functionality = Probabilities vs. Guarantees.

RFC 4190 Emergency system other than the norm – 911 system in US – 999 system in England Need for a system that extends national boundaries. Governmental Emergency Telecommunications Systems (GETS) – United States Emergency System – First overseen by National Communication System – Post 9/11, now overseen by newly formed Department of Homeland Security. – Given priority over regular phone traffic. – Credit card like approach used for authorization. – Service guarantee (certain amount of packets get through no-matter what) Agencies Included in GETS development and advancement: – Federal Emergency Agency (FEMA) – NASA – Department of Transportation

RFC 4375 ETS – Single administrative Domain 4 examples – Resource Domain = Router or a host and the physical media used connect the two. – Administrative Domain = Collection of resources under one single authority. – Transmit Domain = Transmits data from one domain to another. – Stub Domain = Administrative domain that deals with the source of destination of an IP packet.

Statistics from 9/11 AT&T had call numbers of 430 million – Up from 100 million from the previous day. Verizon Wireless had a 100 percent call increase from the previous day. Increase of 100 percent of Washington DC phone usage. Increase of 1000 percent of New Jersey phone usage.

QUESTION???????