PALMETTO VISION Presentation prepared by: Earth Technology Integration 30568 Ganado Drive Rancho Palos Verdes CA, 90275 This goal of this presentation.

Slides:



Advertisements
Similar presentations
The Enterprise Guide to Video Conferencing Created using iThoughts [...] [...]
Advertisements

SECAM Systems Product Presentation SECAM Systems © 2010.
Voice over IP Skype.
GTRI_B-1 FalconView for First Responders 2010 FalconView Symposium David Millard & Steve Cuzzort Georgia Tech Research Institute (GTRI) 24 August 2010.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Remote Desktop Connection Techniques Wireless Communication Networks.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
+ Architecture, Firewalls and Proxy Servers Networks.
The StarNet Analyzer. Contact SNA Department x172
DVG-N5402SP.
Computer Network (MASQ/NAT/PROXY)
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Boris Tshibangu. What is a proxy server? A proxy server is a server (a computer system or an application) that acts as an intermediary for requests from.
1 Enabling Secure Internet Access with ISA Server.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Sharing Geographic Content
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Configuring the MagicInfo Pro Display
Chapter 7: Using Windows Servers to Share Information.
NV V5.7 Product Presentation. Brand New Professional GUI  Multiple User Interface for different look and feel  Audio indicator on camera (play audio.
Trimble Connected Community
Customized cloud platform for computing on your terms !
Design for Senior Project December 05, 2007 Raytheon_Design_Review.ppt 1 of 19 Raytheon – Google Earth Roy Daniels, Marc Maciel, Rifina Pierre Department.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
The 2000 Decennial Census School District Project: Using Census Data for the School District Mapping System **** Development and Implementation Tai A.
GIS On The Web: An Overview of ArcIMS. *The easy flow of geographic data can offer real-life solutions in many societal sectors, including municipal government,
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Computer Emergency Notification System (CENS)
Avira Endpoint Security. Introduction of Avira Management Center (AMC)
1 Welcome to CSC 301 Web Programming Charles Frank.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
CoBrow Collaborative Browsing A Virtual Presence Service RE 1003 RE 4003.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Online Emergency Management Tool Richer communication for emergency management APHA Annual Meeting November 11, 2009.
The Intranet.
Integrating and Troubleshooting Citrix Access Gateway.
Flashback: A Peer-to-Peer Web Server for Flash Crowds Presented by Tom Batkiewicz CS 587x Fall ‘07.
WELCOME PALMETTO VISION The goal of this effort is a county-centric Emergency Management Common Operating Picture (EM-COP) framework that provides ESF.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
WELCOME PALMETTO VISION The goal of this effort is a county-centric Emergency Management Common Operating Picture (EM-COP) framework that provides ESF.
WELCOME PALMETTO VISION (Integrating UICDS, IPAWS and vUSA) The goal of this effort is a county-centric Emergency Management Common Operating Picture (EM-COP)
WELCOME PALMETTO VISION The functions inherent in planning and response - and the users of the needed tools - span all phases of an emergency. The goal.
Department of Geography
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Module 10: Windows Firewall and Caching Fundamentals.
ERDAS TITAN: Rapid, Secure & Versatile GIS Data Sharing Eddie Pickle & Angela Miele November 6, 2008.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Part A. Remote Viewing IP Surveillance Camera Application Guide.
Remote Access Using a Netgear DG834 Router 1http://
Getting Started Telligent or SharePoint (or Hybrid)?
Module 3: Enabling Access to Internet Resources
The Intranet.
CONNECTING TO THE INTERNET
Welcome To : Group 1 VC Presentation
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
The Internet and Electronic mail
Presentation transcript:

PALMETTO VISION Presentation prepared by: Earth Technology Integration Ganado Drive Rancho Palos Verdes CA, This goal of this presentation is to inform each participating county: the changes to the system architecture, server installation recommendations, and how beta testing will be conducted. WELCOME

S YSTEM O VERVIEW The system’s framework now consist of UICDS, IPAWS and South Carolina Geographic Information Systems (SC GIS). SC GIS provides a common space for users to discover information. Each county will have the ability to share data A URL to either a file or a streaming web service hosted on a county server. Dynamic, event-specific, data can also be made available

In order to have minimal impact on the IT department we recommend: Placing the server on the DMZ and creating a Virtual Local Area Network (VLAN) of 1 ETI will provide a firewall to go between the VLAN and the Internet. We’ll manage the firewall and handle all server software updates and maintenance The county will need to assign the server an external and internal IP address Server should be installed somewhere where EMD personnel would have day-to-day access to the server. Server needs to be left turned on 24 hours a day UDP needs to have port forwarding enabled. Several features, e.g. downloading a satellite image and video conferencing, require some bandwidth these features are optional to use. If a significant event occurs then the day-to-day bandwidth should drop off opening up enough space to all these features to be utilized. In either case, the decision is at the discretion of the County EMD operators C ONFIGURING THE SERVER AT EACH COUNTY

N EO R OUTER V IRTUAL P RIVATE N ETWORK (VPN) NeoRouter is a cross-platform zero-configuration Virtual Private Network (VPN) solution that securely connects computers at any locations into a virtual Local Area Network (LAN). It gracefully integrates remote access, file sharing, user and access management. NeoRouter employs a hybrid Peer-to-Peer (P2P) design. Each NeoRouter domain consists of one server at the SCEMD and multiple clients distributed out to the CEOC’s. The server is responsible for authenticating users and client computers, as well as mediating direct P2P connections between clients.

A DDITIONAL S YSTEM SOFTWARE NIMS Incident Resource Inventory System (IRIS)is a tool to assist emergency responders with inventorying resources GeoServer is an Open Source server that allows users to share and edit geospatial data. GeoWebCache acts as a proxy between the Common Operating Picture and GeoServer. GeoWebCache saves (caches) map images, or tiles, as they are requested by the COP.

C ORE -T O -C ORE C ONNECTIVITY B ETA T EST Test 2: ETI sample message displayed within viewers 1.ETI sample message is sent to a CEOC Core 2.Google Earth and ESRI Flex adaptors translated & display message by the SCEMD COP and each CEOC node that has already been installed Test 1: When each CEOC server is installed a simple message passed between Core’s (A in image below). ETI created a simple interface that will place a message onto the CEOC server and if the message is passed from the CEOC Core to the SCEMD Core the test will be considered passed

C ORE, V USA, G EO TIFF B ETA T EST 1.A satellite image is sent down to the Eagle Vision satellite dish, image converted into a GeoTIFF. 2.Image is sent to SCEMD server via microwave link 3.URL to the image is uploaded to vUSA. 4.CEOC Core is notified of new data in vUSA via SCEMD Core 5.CEOC Core sends EM-COP viewers notification that new data is available 6.CEOC users logs into server clicks on URL from vUSA and imports GeoTIFF from SCEMD server to CEOC server 7.CEOC users loads GeoTIFF image into GeoServer and then have GeoWebCache generate a KML file. Utilizing GeoServer and GeoWebCache the image is tiled and cached, which prevents the front end application from taking a performance hit. 8.The image is then displayed, via a KML link, within the Common Operating Picture.

V IDEO C ONFERENCING B ETA T EST LEGEND 1.Login 2.Web cam images 3.GE Map Each server will have a web conferencing video capability. Here are the steps to follow when a county would like to hold a web conference: 1.Load the KML file into the conference web application 2.Send participating personnel the URL 3.Each person will need to log into the hosting county’s web conferencing site 4.Hold conference The application is in the process of moving from prototype to beta testing. After the notification has been sent out that the software is ready for testing, we would ask that each county tries the tool out and then give us feedback on any problems encountered

While these symbols do not include all emergency management features, they provide an initial framework for emergency management and first responder mapping and communication. V ISUAL S TANDARDIZATION The Federal Geographic Data Committee (FGDC) Homeland Security Working Group (HWSG) has been tasked to develop a standard set of symbols for use by the Emergency Management and First Responder communities at all levels of need (i.e. National, State, Local and Incident).

The symbols are designed to be distinctive in either a color or a black and white environment. While a colored symbol frame can be used to denote the level of damage or operational status, the pattern of this frame also denotes the status. Operational level & Damage Assessment The goal of using standardized icons is when a county shares out infrastructure information it will provide immediate understanding of the situation.