Supporting Emergency- Response by Retasking Network Infrastructures Presented by: Michael LeMay Carl A. Gunter.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Colombo, Sri Lanka, 7-10 April 2009 Preferential Telecommunications Service Access Networks Lakshmi Raman, Senior Staff Engineer Intellectual Ventures.
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Security in Mobile Ad Hoc Networks
Performance Analysis Lab,
Wide Area Wi-Fi Sam Bhoot. Wide Area Wi-Fi  Definition: Wi-Fi (Wireless Fidelity) n. – popular term for high frequency wireless local area networks operating.
David Grochocki et al.  Lures Potential attackers  Smartmeters do two way communication  Millions of Meters has to be replaced  Serious damages just.
Page 1 / 14 The Mesh Comparison PLANET’s Layer 3 MAP products v.s. 3 rd ’s Layer 2 Mesh.
CSE 6590 Department of Computer Science & Engineering York University 1 Introduction to Wireless Ad-hoc Networking 5/4/2015 2:17 PM.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Emerging Technologies in Wireless LANs. Replacement for traditional Ethernet LANs Several Municipalities Portland, OR Philadelphia, PA San Francisco,
Arsitektur Jaringan Terkini
1 On Handling QoS Traffic in Wireless Sensor Networks 吳勇慶.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Quality of service for wireless Ad Hoc Sensor Networks Nicolás E. Ortiz Hernández Dr. Rajan Shankaran.
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
Advanced Metering Infrastructure
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
BUILDING SECURITY ALARM SYSTEM. BUILDING SECURITY ALARM SYSTEM Any electrical or mechanical device which is designed or used for the detection of an unauthorized.
David Rogers, Stu Andrzejewski, Kelly Desmond, Brad Garrod.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
By Daniel Nanghaka Founder – ILICIT Africa, and EWERDIMA Platform Early Warning Early.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols.
Project Introduction 이 상 신 Korea Electronics Technology Institute.
Performance analysis and prediction of physically mobile systems Point view: Computational devices including Mobile phones are expanding. Different infrastructure.
Common Devices Used In Computer Networks
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
Presented by: Chaitanya K. Sambhara Paper by: Karl Mayer and Wolfgang Fritsche IABG mbH Germany - Instructor : Dr Yingshu Li.
Req1 - Separability Old: –An RO scheme MUST have the ability to be bypassed by traffic types that desire to use bidirectional tunnels through an HA. New:
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Test-Bed for testing scenarios of new DTN architecture AsiaFI 2008 August, 2008 Multimedia and Mobile Communication Lab.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Gürkan RAKANOĞLU. Outline Overview of Wireless Mesh Networks Video Streaming over Wireless Networks Applications of Video over Wireless Networks.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
Project CHORIST - PSCE '07, May 07 - Patrice SIMONpage: 1 Project CHORIST CHORIST = Integrating Communications for enHanced envirOnmental RISk management.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Page 1 Unclassified _NB_Next Steps.ppt Phillip E. Paulsen Space Communications Office NASA Glenn Research Center (GRC) Cleveland, Ohio 6 November.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Components of wireless LAN & Its connection to the Internet
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Ad Hoc Network.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Name Of The College & Dept
Doc.: IEEE /0598r0 Submission May 2004 Tyan-Shu Jou, et al., Janusys NetworksSlide 1 Is Spanning Tree Protocol Right for ESS Mesh? Tyan-Shu Jou,
“End to End VoIP“ The Challenges of VoIP Access to the Enterprise Charles Rutledge VP Marketing Quintum Technologies
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Leveraging SDN for The 5G Networks: Trends, Prospects and Challenges ADVISOR: 林甫俊教授 Presenter: Jimmy DATE: 2016/3/21 1.
Virtual Disaster Management Information Repository Based on Linked Open Data Yi-Lung Chen 1, Jyun-You Lin 1, Tsung-Hsien Chu 1, Jane Win-Shih Liu 2, IEEE.
NT1210 Introduction to Networking
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
ZigBee
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Presented by Edith Ngai MPhil Term 3 Presentation
Chapter 9 Optimizing Network Performance
Overview of Wireless Networks:
Overview of ETS in Committee T1
Presentation transcript:

Supporting Emergency- Response by Retasking Network Infrastructures Presented by: Michael LeMay Carl A. Gunter

Outline Introduction Emergencies and Hazards to Networks Networking Requirements During Emergencies Traditional Emergency-Response Network Topology and Application Trends Emergency-Response with Retaskable Networks Discussion

Introduction Networks face various hazards during emergencies, and may cease to function as a result Additional networking requirements may also arise during emergencies Network availability during emergencies could be improved by allowing users to route communications over robust network infrastructures that managed to survive

Emergencies and Hazards to Networks Katrina: Only significant operational network in downtown was wireless mesh for surveillance cameras –Hazards: Flooding, high winds 9/11: Disrupted many networks routed through WTC –Hazards: Terrorist bombing Kobe earthquake: ERNs could have helped prevent misdirection of recovery resources

Special Network Requirements During Emergencies Distress signaling from victims to rescuers Messaging (text, voice, or perhaps video) between and among victims and rescuers Command and control for rescuers

Traditional Emergency Response Dedicated ERNs: Often government- funded –Limited in scope according to budget Ad-hoc mobile nodes deployed on an as-needed basis –May not penetrate to central parts of hazardous disaster zones Manual retasking of existing networks (e.g. Katrina surveillance camera mesh) –Only utilizes a small portion of infrastructure elements, may not support necessary ERN application-level protocols

Network Topology and Application Trends Self-healing mesh networks being used in increasingly-practical applications: –Advanced electric meters –Building and home automation systems –Parking garage monitoring –Surveillance cameras –Municipal wireless May not be necessary for their original intended purpose when disaster occurs, so could support recovery efforts instead

Emergency-Response with Retaskable Networks Proposal: Retask robust networks that survive a disaster to be used for emergency-response applications Three primary challenges: –Emergency detection mechanisms and policies –Platform support –Topological readiness planning and assessment

Emergency Detection Mechanisms and Policies Mechanisms: –Emergency declarations from central authorities –Sensor inputs (e.g. power outage detection on meters) –Human inputs (e.g. panic button on programmable communicating thermostat [PCT]) Reasonable policy: –Digitally-signed indications from central authorities trusted absolutely –Sensor and human inputs weighted and compared to a threshold value

Hardware Platform Support Network compatibility: All communicating devices must use compatible network protocols, or appropriate gateways/bridges must be available –Not yet widely available for all interesting protocols Network availability: A sufficient subset of network devices and linkages must be operational to support ERN services Device availability: Devices must be adequately protected against prevalent hazards in the deployment zone, and equipped with sufficient power reserves

Platform Support Examples Wired networks GSM Gateway ZigBee Gateway ZigBee Meters Rescuer Communicator w/ ZigBee Interface GSM Mobile Phone ZigBee Programmable Communicating Thermostat with ERN Enhancements

Software Platform Support Software support must be provided for all desired ERN services Potential approaches: –Software extensibility: Make network elements reconfigurable, so they can load any software components required for ERN services dynamically –Protocol standardization: Standardize simple protocols for ERN services that will have longevity due to their simplicity

Proposed Software Platform Support IP tunneling over all network types –Challenging due to the packet size limitations of and other popular networks –Routing is complicated due to redundant paths Simple text, voice, and video messaging services for victims and rescuers Emergency alert broadcast service –Useful for warnings of tornadoes, fires, biohazards, etc.

Security Challenges ERN functionality of retaskable networks must not negatively affect the network during normal operating conditions –Malicious users must not be able to trick network into falsely believing an emergency has occurred, to steal service Network should provide best QoS to those who are at the highest risk in the emergency and those best equipped to assist them

ERN Topology Planning ERNs must provide reliable connectivity in the presence of hazards prevalent in the area under consideration A comprehensive ERN planning methodology must be developed, that accounts for dedicated, re-taskable, and ad-hoc infrastructure elements The resulting network must support the bandwidth demands of its expected users, and potentially have redundancy

ERN Topology Planning Challenge: Varying capabilities of different types of networks (bandwidth, etc.), and unpredictable mobile nodes Current topology optimization algorithms can potentially be adapted to ERN planning problems We investigate the non-uniform buy-at- bulk approximation algorithm proposed by C. Chekuri, et. al. and adapt it to ERN planning

Adaptation of ERN Planning Algorithm Rather than optimizing strictly for financial cost of resulting network, use artificial cost that prefers network links that are: –Robust against the particular hazards prevalent in the area under consideration –Financially inexpensive; particularly favorable for existing, retaskable infrastructure –Low latency Provisional links that might be installed are included.

Example Topology 250kbps 100Mbps 11Mbps 1.Every node requires 50kbps bw. to every other node except the central ZigBee routers and A 2.Every node requires 100kbps bw. to gateway A

Future Research Application-level protocols suitable for emergency-response Security and QoS protocols for ERNs Routing on dynamic networks with redundancy

Concluding Remarks Robust networks are being deployed in practical applications By retasking such networks after a disaster, emergency-response can be aided There are significant problems to be overcome in: –Emergency detection –Hardware platform support for emergency- response –Software platform support for emergency- response

Questions? Michael LeMay: Carl A. Gunter: Parent project page: