SlideShare a Scribd company logo
1 of 46
Facilitating Incident Management Response

     Public Safety in a Multimedia Era

            Information Draft




                 Jack Brown
                 Jan 11, 2008
Situational Awareness
When the first aircraft struck the World Trade Center, what were your thoughts? Did you
think about terrorists? Or, was your first thought something more like “How could that
happen?” The first crash left most people trying to figure out what human or mechanical
error could have caused the crash. However, a little over 15 minutes later – and the instant
Flight 175 came into view – we knew we were under attack. As the jet slammed into the
South Tower of the World Trade Center, our view changed and the response of police and
fire personnel to the WTC and the other incidents changed.

Our reaction changed because the additional information of the second aircraft altered our
perception of the first crash. Our perceptions moved closer to reality because more data
gave meaning to and enhanced our comprehension of what we were observing.

Situational awareness
“Situational awareness” was a term originally used to describe the tactical situation during
aerial combat . While the literal term doesn’t go back as far as World War I, the idea
surfaced then, when pilots first took to the sky in combat. At first, the term referred to the
pilot’s ability to know where he was in relation to the enemy and the other pilots of his flight.
In reality, that is only positional awareness. However, when pilots added their knowledge of
aircraft capabilities and known battle tactics with positional awareness, they were able to
interpret, comprehend and anticipate. The comprehension of observations is the essence of
situational awareness.
Public Safety in a Multimedia Era
Public safety agencies have made significant investments in CAD system, records-
management systems, GIS, crisis information management, and facility preplan
drawing and management systems. These are stand-alone systems and are
incapable of easily sharing data with other programs. Their proliferation has created
a series of data silos requiring service command or other response personnel to
perform “swivel chair” integration, rolling back and forth between the user interfaces
of several different systems or books to build a composite picture of the situation in
their minds.

The emergence of Internet standards for Web services and data integration now
makes it possible to weave these systems together by providing the connections and
data translations necessary to make each system's data understandable to the
others. This establishes a true information-sharing environment in which various
data sources can be brought together and woven into valuable information relevant
to the incident being responded to. New capabilities such as video surveillance, fixed
or mobile sensors, and plume modeling can be integrated easily in the future.
Another benefit is that public safety personnel can focus on being decision-makers
and not data-entry clerks.
Public Safety in a Multimedia Era


Public safety agencies work in a dynamic, complex and high-risk environment that
demands current and relevant situational awareness. Time is of the essence when
faced with saving lives, property and the environment. There is no time to copy
and send files, pictures, or diagrams. The best case is to have all relevant
information updated in real time to keep pace with the unfolding incident or
situation. Responders, incident commanders and emergency managers need to
be able to view the situation and collaborate in real time to communicate what is
happening at present.

With the systems tied together and the information flowing in real time, what is
needed next is to fuse the information together and present it in a visualization
environment that can be quickly understood and manipulated.
Public Safety in a Multimedia Era



Public safety and emergency management entities already operate in a
geospatial environment: How do I get there? Where is the incident? Where is
the fire? Where is the bad guy going? What and where are the exposures to this
fire? Where is my water supply? Where are my resources? How does our
coverage look for any other emergencies? Incident response organizations are
used to dealing with maps and locations, and thus a geospatial picture makes a
lot of sense as the primary visualization mechanism for incident data.

With a map-based operating picture that is updated in real time, the information
presented on that map can be adapted as appropriate to the roles and
responsibilities of the individual responders. This will facilitate rapid
comprehension and more effective decision-making for all disciplines that might
be required.
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Communication Network Trends …..Extending the IP
                Network Edge

• Network-based applications are increasingly important to transit operations
   More profitable, faster, safer operations is the goal

• Advances in Wireless technologies
  Increased reliability, lower prices, better coverage 802.11a/b/g/n, UMTS,
  GPRS, CDMA, WiMAX, Satellite

• Increased demand for Mobile Networking
  Real time access to information, increased productivity and lower costs,
  increased safety
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Public Safety in a Multimedia Era
Appendix
Cisco Design Overview
Cisco IPICS
The Cisco IPICS portfolio of products and applications provides Communications
interoperability between push-to-talk (PTT) radio systems and devices such as
mobile phones, IP phones, public switched telephone network (PSTN) phones,
and PC clients. Based on IP standards, Cisco IPICS takes advantage of IP
networks to extend the reach of traditional communications networks and also to
provide notification using email, pager notification, and Short Message Service
(SMS).

Using Cisco IPICS, public sector agencies and enterprises can intelligently apply
resources to streamline operations and rapidly respond to routine events as well
as emergencies.

Cisco IPICS can be deployed in mobile command vehicles and included in tactical
communications kits, connecting to IP or non-IP wired, wireless, or satellite
networks.
Cisco IPICS
Cisco IPICS
Cisco IPICS
Solutions components include the following:
Cisco IPICS Server: The core foundation for the Cisco IPICS solution, the
Cisco IPICS Server is a security-enhanced, Linux-based platform that provides
an administration console and resource management and hosts the optional
Cisco IPICS Policy Engine and Operational Views applications.

Cisco IPICS IP Phone Client: The Cisco IPICS IP Phone Client enables
personnel to use their Cisco Unified IP phones to collaborate with other
personnel on PTT channels.

Cisco IPICS PMC: The Cisco IPICS PMC is a Windows-based PC client
software package that enables personnel to use their PCs to collaborate with
other personnel on PTT channels.

Cisco IPICS Operational Views: Cisco IPICS Operational Views allows different
organizations to manage and share resources across ownership and
organizational boundaries.
Cisco IPICS
Cisco IPICS Policy Engine: The Cisco IPICS Policy Engine enables one-click
activation of predefined policies for notification and talk-group establishment, and
includes the ability to dial in and dial out to the PSTN.

Intelligent Networking
Cisco IPICS takes advantage of the Cisco Service-Oriented Network Architecture
(SONA), an architectural framework that enables organizations to maximize the
value of their network services and resources. The Cisco SONA framework makes
it possible to centrally manage all radio systems, other voice systems, and data
over a common, unified platform, increasing efficiency and the value of the
agency’s network assets while lowering capital and management costs.
Cisco Unified Contact Center


Cisco Unified Contact Center Enterprise uses an IP infrastructure to deliver skills-
based contact routing, voice self-service, computer telephony integration (CTI),
and multichannel contact management. By combining multichannel automatic-call-
distributor (ACD) functions with IP telephony in a unified solution, Cisco Unified
Contact Center helps deploy a distributed voice-over-IP (VoIP) contact center
infrastructure.

The Unified Contact Center segments customers, monitors resource availability,
and delivers each contact to the appropriate resource anywhere in the enterprise.
The software profiles each customer contact using related data such as dialed
number and calling line ID, caller entered digits, data submitted on a Web form,
and information obtained from a customer database lookup. Simultaneously, the
system monitors the resources available in the contact center including agent
skills and availability, interactive-voice-response (IVR) status, and queue lengths.
Cisco Unified Communications Manager



Unified Communications Solutions unify voice, video, data, and mobile applications on
fixed and mobile networks, delivering a media-rich collaboration experience across
business, government agency, and institutional workspaces. These applications use
the network as the platform to enhance comparative advantage by accelerating
decision time and reducing transaction time. The security, resilience, and scalability of
the network enable users in any workspace to connect anywhere, anytime, and
anyplace, using any media, device, or operating system.

A Unified Communications is part of a solution that includes network infrastructure,
security, wireless, management applications, lifecycle services, flexible deployment and
outsourced management options, and third-party applications.

The Cisco Unified Communications Manager (formerly known as Cisco Unified
CallManager) is the call-processing component of the Cisco Unified Communications
system.
Cisco Unified Communications Manager
Cisco Unified Communications Manager


IP voice call setup is initiated between the IP phone, IP videophone or gateway, and Cisco
Unified CallManager. Cisco Unified CallManager classifies a call based on parameters
such as application (voice or video) and Multilevel Precedence and Preemption (MLPP),
and signals to the Cisco RSVP Agent in the access router. Bandwidth pools are
preconfigured in the router on a per-application and per-interface basis. Using the
classification provided by Cisco Unified CallManager, the Cisco RSVP Agent attempts to
set up a call within the appropriate bandwidth pool and across the WAN to a far-end Cisco
RSVP Agent for the receiving party.

If RSVP bandwidth is secured, the Cisco RSVP Agent signals back to Cisco Unified
CallManager. Cisco Unified CallManager in turn signals to the IP phone, IP videophone, or
gateway and the call proceeds. The Cisco RSVP Agent can apply differentiated services
code point (DSCP) marking to media packets based on instruction from the Cisco Unified
CallManager. DSCP packet marking may be applied to place the RSVP secured media
stream into the router priority queue. If RSVP bandwidth cannot be secured, the Cisco
RSVP Agent signals back to Cisco Unified CallManager, which administers policies. The
call is either disallowed or allowed to proceed with a lower-priority DSCP packet marking
applied by the Cisco RSVP Agent as instructed by the Cisco Unified CallManager.
Cisco Unified Communications Manager


Mid-call policies may also be applied for handling of changes to the media stream such as
transfers during a call. Network design using the Cisco RSVP Agent allows voice and video
calls to proceed as part of a single unified network together with data. This setup allows for
support of meshed designs, multitiered designs, adjustment to dynamic link changes, and
redundant links. This single design helps reduce the costs for both infrastructure and
management. Because CAC is managed and secured and QoS is applied as a network
component, there is no reliance on end-user devices.

Cisco RSVP Agent functions independently of the call-signaling protocol, and hence, Session
Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP), H.323, and Media Gateway
Control Protocol (MGCP) are all supported. Figure 2 shows how the Cisco Unified CallManager
and Cisco RSVP Agent in the router work together to optimize the voice quality across the IP
network.

More Related Content

What's hot

MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...Cisco Service Provider Mobility
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challengesiosrjce
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsBHAVANA KONERU
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youGlobal Business Events
 
Dr Assem Abdel Hamied Moussa Statment
Dr Assem Abdel Hamied Moussa StatmentDr Assem Abdel Hamied Moussa Statment
Dr Assem Abdel Hamied Moussa StatmentAssem mousa
 
Truzzt box 3.2-en
Truzzt box 3.2-enTruzzt box 3.2-en
Truzzt box 3.2-enh-bauer2014
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
cloud of things paper
cloud of things papercloud of things paper
cloud of things paperAssem mousa
 
Mobile enterprise content management
Mobile enterprise content managementMobile enterprise content management
Mobile enterprise content managementAmplexor
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper Assem mousa
 
Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)Antonio Manzalini
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation HubsMestizo Enterprises
 

What's hot (19)

MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
MTC: When Machines Communicate (A New Hot Topic Taking Over the Industry) - a...
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
 
Ssmac15
Ssmac15Ssmac15
Ssmac15
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
The global cyber security market
The global cyber security marketThe global cyber security market
The global cyber security market
 
Trend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are youTrend micro - Your journey to the cloud, where are you
Trend micro - Your journey to the cloud, where are you
 
Dr Assem Abdel Hamied Moussa Statment
Dr Assem Abdel Hamied Moussa StatmentDr Assem Abdel Hamied Moussa Statment
Dr Assem Abdel Hamied Moussa Statment
 
Truzzt box 3.2-en
Truzzt box 3.2-enTruzzt box 3.2-en
Truzzt box 3.2-en
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
cloud of things paper
cloud of things papercloud of things paper
cloud of things paper
 
Mobile enterprise content management
Mobile enterprise content managementMobile enterprise content management
Mobile enterprise content management
 
Cloud computing Paper
Cloud computing Paper Cloud computing Paper
Cloud computing Paper
 
Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)Complexity in Future Networks (A. Manzalini)
Complexity in Future Networks (A. Manzalini)
 
21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs21st Century Airport Transportation Hubs
21st Century Airport Transportation Hubs
 

Viewers also liked

Migration to Unified Communications from Legacy Phone Systems
Migration to Unified Communications  from Legacy Phone SystemsMigration to Unified Communications  from Legacy Phone Systems
Migration to Unified Communications from Legacy Phone SystemsJack Brown
 
Moible Coupon Applications Sept 2009
Moible Coupon Applications Sept 2009Moible Coupon Applications Sept 2009
Moible Coupon Applications Sept 2009Jack Brown
 
Jack Brown Mobile Coupon Architecture Ver 1
Jack Brown Mobile Coupon Architecture Ver 1Jack Brown Mobile Coupon Architecture Ver 1
Jack Brown Mobile Coupon Architecture Ver 1Jack Brown
 
Открытые форматы и открытое ПО: достоинства и проблемы
Открытые форматы и открытое ПО: достоинства и проблемыОткрытые форматы и открытое ПО: достоинства и проблемы
Открытые форматы и открытое ПО: достоинства и проблемыNatasha Khramtsovsky
 
PROEXPOSURE photos: marathon
PROEXPOSURE photos: marathonPROEXPOSURE photos: marathon
PROEXPOSURE photos: marathonPROEXPOSURE CIC
 
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...Natasha Khramtsovsky
 
Zoomable Menu Mockup
Zoomable Menu MockupZoomable Menu Mockup
Zoomable Menu MockupNone None
 
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...Socius - steunpunt sociaal-cultureel werk
 
Стандартизация в сфере управления документами и информацией: что нового в Ро...
Стандартизация в сфере управления документами и информацией:  что нового в Ро...Стандартизация в сфере управления документами и информацией:  что нового в Ро...
Стандартизация в сфере управления документами и информацией: что нового в Ро...Natasha Khramtsovsky
 
Hamilton All About Me
Hamilton All About MeHamilton All About Me
Hamilton All About Mejaspang
 
PROEXPOSURE Photographer Ataklti Mulu and Adigrat
PROEXPOSURE Photographer Ataklti Mulu and AdigratPROEXPOSURE Photographer Ataklti Mulu and Adigrat
PROEXPOSURE Photographer Ataklti Mulu and AdigratPROEXPOSURE CIC
 
Внедрение ЭЦП в организации: с чего начинать?
Внедрение ЭЦП в организации:  с чего начинать?Внедрение ЭЦП в организации:  с чего начинать?
Внедрение ЭЦП в организации: с чего начинать?Natasha Khramtsovsky
 

Viewers also liked (20)

Migration to Unified Communications from Legacy Phone Systems
Migration to Unified Communications  from Legacy Phone SystemsMigration to Unified Communications  from Legacy Phone Systems
Migration to Unified Communications from Legacy Phone Systems
 
Moible Coupon Applications Sept 2009
Moible Coupon Applications Sept 2009Moible Coupon Applications Sept 2009
Moible Coupon Applications Sept 2009
 
Jack Brown Mobile Coupon Architecture Ver 1
Jack Brown Mobile Coupon Architecture Ver 1Jack Brown Mobile Coupon Architecture Ver 1
Jack Brown Mobile Coupon Architecture Ver 1
 
Открытые форматы и открытое ПО: достоинства и проблемы
Открытые форматы и открытое ПО: достоинства и проблемыОткрытые форматы и открытое ПО: достоинства и проблемы
Открытые форматы и открытое ПО: достоинства и проблемы
 
PROEXPOSURE photos: marathon
PROEXPOSURE photos: marathonPROEXPOSURE photos: marathon
PROEXPOSURE photos: marathon
 
Introductie internationale samenwerking
Introductie internationale samenwerkingIntroductie internationale samenwerking
Introductie internationale samenwerking
 
Laat mensen schitteren-Campagnerichtlijnen
Laat mensen schitteren-CampagnerichtlijnenLaat mensen schitteren-Campagnerichtlijnen
Laat mensen schitteren-Campagnerichtlijnen
 
二里頭
二里頭二里頭
二里頭
 
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
InterPARES 2: Система принципов для разработки политик, стратегий и стандарто...
 
Zoomable Menu Mockup
Zoomable Menu MockupZoomable Menu Mockup
Zoomable Menu Mockup
 
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
Growfunding als hefboom voor sociaal-culturele praktijken in de stad - Freder...
 
Стандартизация в сфере управления документами и информацией: что нового в Ро...
Стандартизация в сфере управления документами и информацией:  что нового в Ро...Стандартизация в сфере управления документами и информацией:  что нового в Ро...
Стандартизация в сфере управления документами и информацией: что нового в Ро...
 
Geocomposer manual
Geocomposer manualGeocomposer manual
Geocomposer manual
 
Jack Johnson - The Boxer
Jack Johnson - The BoxerJack Johnson - The Boxer
Jack Johnson - The Boxer
 
Hamilton All About Me
Hamilton All About MeHamilton All About Me
Hamilton All About Me
 
PROEXPOSURE Photographer Ataklti Mulu and Adigrat
PROEXPOSURE Photographer Ataklti Mulu and AdigratPROEXPOSURE Photographer Ataklti Mulu and Adigrat
PROEXPOSURE Photographer Ataklti Mulu and Adigrat
 
Personalia meijs en vermeulen
Personalia meijs en vermeulenPersonalia meijs en vermeulen
Personalia meijs en vermeulen
 
Vlamigrant In 9 Verhalen (Ingekort)
Vlamigrant In 9 Verhalen (Ingekort)Vlamigrant In 9 Verhalen (Ingekort)
Vlamigrant In 9 Verhalen (Ingekort)
 
Внедрение ЭЦП в организации: с чего начинать?
Внедрение ЭЦП в организации:  с чего начинать?Внедрение ЭЦП в организации:  с чего начинать?
Внедрение ЭЦП в организации: с чего начинать?
 
Workshop sociusonderzoek
Workshop sociusonderzoekWorkshop sociusonderzoek
Workshop sociusonderzoek
 

Similar to Facilitating Incident Response Through Situational Awareness

7x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 0427157x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 042715Destiny Heimbecker
 
NEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesNEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesInteractiveNEC
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfAsst.prof M.Gokilavani
 
Internet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile CommunicationsInternet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile CommunicationsReza Nourjou, Ph.D.
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...ieeepondy
 
Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11jcontestabile
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
Empires Idhs Red Cell White Paper
Empires Idhs Red Cell White PaperEmpires Idhs Red Cell White Paper
Empires Idhs Red Cell White Papermartindudziak
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)InteractiveNEC
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Ageglobal
 

Similar to Facilitating Incident Response Through Situational Awareness (20)

Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
7x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 0427157x24 Exchange Article (Spring 2015) 042715
7x24 Exchange Article (Spring 2015) 042715
 
NEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal AgenciesNEC Digital Platform - Touchless Technologies for Federal Agencies
NEC Digital Platform - Touchless Technologies for Federal Agencies
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
Internet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile CommunicationsInternet of Things for Next-Generation Public Safety Mobile Communications
Internet of Things for Next-Generation Public Safety Mobile Communications
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...
 
Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11Interop Concepts Dhs Preso Contestabile 09 27 11
Interop Concepts Dhs Preso Contestabile 09 27 11
 
Connect And Protect
Connect And ProtectConnect And Protect
Connect And Protect
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Empires Idhs Red Cell White Paper
Empires Idhs Red Cell White PaperEmpires Idhs Red Cell White Paper
Empires Idhs Red Cell White Paper
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)NEC’s Digital Platform for Federal Agencies (preview)
NEC’s Digital Platform for Federal Agencies (preview)
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 

More from Jack Brown

Medical Body Area Networks - MBAN
Medical Body Area Networks - MBANMedical Body Area Networks - MBAN
Medical Body Area Networks - MBANJack Brown
 
Machine 2 Machine - Internet of Things - Real World Internet
Machine 2 Machine  - Internet of Things  -  Real World InternetMachine 2 Machine  - Internet of Things  -  Real World Internet
Machine 2 Machine - Internet of Things - Real World InternetJack Brown
 
Roaming Analytics Platform V1.1
Roaming Analytics Platform V1.1Roaming Analytics Platform V1.1
Roaming Analytics Platform V1.1Jack Brown
 
Fmc Ver 1.3 June 27 2007
Fmc Ver 1.3 June 27 2007Fmc Ver 1.3 June 27 2007
Fmc Ver 1.3 June 27 2007Jack Brown
 
Location Application Protocol Trap Jack Brown
Location Application Protocol Trap Jack BrownLocation Application Protocol Trap Jack Brown
Location Application Protocol Trap Jack BrownJack Brown
 

More from Jack Brown (6)

Medical Body Area Networks - MBAN
Medical Body Area Networks - MBANMedical Body Area Networks - MBAN
Medical Body Area Networks - MBAN
 
Machine 2 Machine - Internet of Things - Real World Internet
Machine 2 Machine  - Internet of Things  -  Real World InternetMachine 2 Machine  - Internet of Things  -  Real World Internet
Machine 2 Machine - Internet of Things - Real World Internet
 
Roaming Analytics Platform V1.1
Roaming Analytics Platform V1.1Roaming Analytics Platform V1.1
Roaming Analytics Platform V1.1
 
Etv
EtvEtv
Etv
 
Fmc Ver 1.3 June 27 2007
Fmc Ver 1.3 June 27 2007Fmc Ver 1.3 June 27 2007
Fmc Ver 1.3 June 27 2007
 
Location Application Protocol Trap Jack Brown
Location Application Protocol Trap Jack BrownLocation Application Protocol Trap Jack Brown
Location Application Protocol Trap Jack Brown
 

Recently uploaded

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Recently uploaded (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Facilitating Incident Response Through Situational Awareness

  • 1. Facilitating Incident Management Response Public Safety in a Multimedia Era Information Draft Jack Brown Jan 11, 2008
  • 2. Situational Awareness When the first aircraft struck the World Trade Center, what were your thoughts? Did you think about terrorists? Or, was your first thought something more like “How could that happen?” The first crash left most people trying to figure out what human or mechanical error could have caused the crash. However, a little over 15 minutes later – and the instant Flight 175 came into view – we knew we were under attack. As the jet slammed into the South Tower of the World Trade Center, our view changed and the response of police and fire personnel to the WTC and the other incidents changed. Our reaction changed because the additional information of the second aircraft altered our perception of the first crash. Our perceptions moved closer to reality because more data gave meaning to and enhanced our comprehension of what we were observing. Situational awareness “Situational awareness” was a term originally used to describe the tactical situation during aerial combat . While the literal term doesn’t go back as far as World War I, the idea surfaced then, when pilots first took to the sky in combat. At first, the term referred to the pilot’s ability to know where he was in relation to the enemy and the other pilots of his flight. In reality, that is only positional awareness. However, when pilots added their knowledge of aircraft capabilities and known battle tactics with positional awareness, they were able to interpret, comprehend and anticipate. The comprehension of observations is the essence of situational awareness.
  • 3. Public Safety in a Multimedia Era Public safety agencies have made significant investments in CAD system, records- management systems, GIS, crisis information management, and facility preplan drawing and management systems. These are stand-alone systems and are incapable of easily sharing data with other programs. Their proliferation has created a series of data silos requiring service command or other response personnel to perform “swivel chair” integration, rolling back and forth between the user interfaces of several different systems or books to build a composite picture of the situation in their minds. The emergence of Internet standards for Web services and data integration now makes it possible to weave these systems together by providing the connections and data translations necessary to make each system's data understandable to the others. This establishes a true information-sharing environment in which various data sources can be brought together and woven into valuable information relevant to the incident being responded to. New capabilities such as video surveillance, fixed or mobile sensors, and plume modeling can be integrated easily in the future. Another benefit is that public safety personnel can focus on being decision-makers and not data-entry clerks.
  • 4. Public Safety in a Multimedia Era Public safety agencies work in a dynamic, complex and high-risk environment that demands current and relevant situational awareness. Time is of the essence when faced with saving lives, property and the environment. There is no time to copy and send files, pictures, or diagrams. The best case is to have all relevant information updated in real time to keep pace with the unfolding incident or situation. Responders, incident commanders and emergency managers need to be able to view the situation and collaborate in real time to communicate what is happening at present. With the systems tied together and the information flowing in real time, what is needed next is to fuse the information together and present it in a visualization environment that can be quickly understood and manipulated.
  • 5. Public Safety in a Multimedia Era Public safety and emergency management entities already operate in a geospatial environment: How do I get there? Where is the incident? Where is the fire? Where is the bad guy going? What and where are the exposures to this fire? Where is my water supply? Where are my resources? How does our coverage look for any other emergencies? Incident response organizations are used to dealing with maps and locations, and thus a geospatial picture makes a lot of sense as the primary visualization mechanism for incident data. With a map-based operating picture that is updated in real time, the information presented on that map can be adapted as appropriate to the roles and responsibilities of the individual responders. This will facilitate rapid comprehension and more effective decision-making for all disciplines that might be required.
  • 6. Public Safety in a Multimedia Era
  • 7. Public Safety in a Multimedia Era
  • 8. Public Safety in a Multimedia Era
  • 9. Public Safety in a Multimedia Era
  • 10. Public Safety in a Multimedia Era
  • 11. Public Safety in a Multimedia Era
  • 12. Public Safety in a Multimedia Era
  • 13. Public Safety in a Multimedia Era
  • 14. Public Safety in a Multimedia Era
  • 15. Communication Network Trends …..Extending the IP Network Edge • Network-based applications are increasingly important to transit operations More profitable, faster, safer operations is the goal • Advances in Wireless technologies Increased reliability, lower prices, better coverage 802.11a/b/g/n, UMTS, GPRS, CDMA, WiMAX, Satellite • Increased demand for Mobile Networking Real time access to information, increased productivity and lower costs, increased safety
  • 16. Public Safety in a Multimedia Era
  • 17. Public Safety in a Multimedia Era
  • 18. Public Safety in a Multimedia Era
  • 19. Public Safety in a Multimedia Era
  • 20. Public Safety in a Multimedia Era
  • 21. Public Safety in a Multimedia Era
  • 22. Public Safety in a Multimedia Era
  • 23. Public Safety in a Multimedia Era
  • 24. Public Safety in a Multimedia Era
  • 25. Public Safety in a Multimedia Era
  • 26. Public Safety in a Multimedia Era
  • 27. Public Safety in a Multimedia Era
  • 28. Public Safety in a Multimedia Era
  • 29. Public Safety in a Multimedia Era
  • 30. Public Safety in a Multimedia Era
  • 31. Public Safety in a Multimedia Era
  • 33.
  • 34.
  • 35.
  • 37. Cisco IPICS The Cisco IPICS portfolio of products and applications provides Communications interoperability between push-to-talk (PTT) radio systems and devices such as mobile phones, IP phones, public switched telephone network (PSTN) phones, and PC clients. Based on IP standards, Cisco IPICS takes advantage of IP networks to extend the reach of traditional communications networks and also to provide notification using email, pager notification, and Short Message Service (SMS). Using Cisco IPICS, public sector agencies and enterprises can intelligently apply resources to streamline operations and rapidly respond to routine events as well as emergencies. Cisco IPICS can be deployed in mobile command vehicles and included in tactical communications kits, connecting to IP or non-IP wired, wireless, or satellite networks.
  • 40. Cisco IPICS Solutions components include the following: Cisco IPICS Server: The core foundation for the Cisco IPICS solution, the Cisco IPICS Server is a security-enhanced, Linux-based platform that provides an administration console and resource management and hosts the optional Cisco IPICS Policy Engine and Operational Views applications. Cisco IPICS IP Phone Client: The Cisco IPICS IP Phone Client enables personnel to use their Cisco Unified IP phones to collaborate with other personnel on PTT channels. Cisco IPICS PMC: The Cisco IPICS PMC is a Windows-based PC client software package that enables personnel to use their PCs to collaborate with other personnel on PTT channels. Cisco IPICS Operational Views: Cisco IPICS Operational Views allows different organizations to manage and share resources across ownership and organizational boundaries.
  • 41. Cisco IPICS Cisco IPICS Policy Engine: The Cisco IPICS Policy Engine enables one-click activation of predefined policies for notification and talk-group establishment, and includes the ability to dial in and dial out to the PSTN. Intelligent Networking Cisco IPICS takes advantage of the Cisco Service-Oriented Network Architecture (SONA), an architectural framework that enables organizations to maximize the value of their network services and resources. The Cisco SONA framework makes it possible to centrally manage all radio systems, other voice systems, and data over a common, unified platform, increasing efficiency and the value of the agency’s network assets while lowering capital and management costs.
  • 42. Cisco Unified Contact Center Cisco Unified Contact Center Enterprise uses an IP infrastructure to deliver skills- based contact routing, voice self-service, computer telephony integration (CTI), and multichannel contact management. By combining multichannel automatic-call- distributor (ACD) functions with IP telephony in a unified solution, Cisco Unified Contact Center helps deploy a distributed voice-over-IP (VoIP) contact center infrastructure. The Unified Contact Center segments customers, monitors resource availability, and delivers each contact to the appropriate resource anywhere in the enterprise. The software profiles each customer contact using related data such as dialed number and calling line ID, caller entered digits, data submitted on a Web form, and information obtained from a customer database lookup. Simultaneously, the system monitors the resources available in the contact center including agent skills and availability, interactive-voice-response (IVR) status, and queue lengths.
  • 43. Cisco Unified Communications Manager Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, delivering a media-rich collaboration experience across business, government agency, and institutional workspaces. These applications use the network as the platform to enhance comparative advantage by accelerating decision time and reducing transaction time. The security, resilience, and scalability of the network enable users in any workspace to connect anywhere, anytime, and anyplace, using any media, device, or operating system. A Unified Communications is part of a solution that includes network infrastructure, security, wireless, management applications, lifecycle services, flexible deployment and outsourced management options, and third-party applications. The Cisco Unified Communications Manager (formerly known as Cisco Unified CallManager) is the call-processing component of the Cisco Unified Communications system.
  • 45. Cisco Unified Communications Manager IP voice call setup is initiated between the IP phone, IP videophone or gateway, and Cisco Unified CallManager. Cisco Unified CallManager classifies a call based on parameters such as application (voice or video) and Multilevel Precedence and Preemption (MLPP), and signals to the Cisco RSVP Agent in the access router. Bandwidth pools are preconfigured in the router on a per-application and per-interface basis. Using the classification provided by Cisco Unified CallManager, the Cisco RSVP Agent attempts to set up a call within the appropriate bandwidth pool and across the WAN to a far-end Cisco RSVP Agent for the receiving party. If RSVP bandwidth is secured, the Cisco RSVP Agent signals back to Cisco Unified CallManager. Cisco Unified CallManager in turn signals to the IP phone, IP videophone, or gateway and the call proceeds. The Cisco RSVP Agent can apply differentiated services code point (DSCP) marking to media packets based on instruction from the Cisco Unified CallManager. DSCP packet marking may be applied to place the RSVP secured media stream into the router priority queue. If RSVP bandwidth cannot be secured, the Cisco RSVP Agent signals back to Cisco Unified CallManager, which administers policies. The call is either disallowed or allowed to proceed with a lower-priority DSCP packet marking applied by the Cisco RSVP Agent as instructed by the Cisco Unified CallManager.
  • 46. Cisco Unified Communications Manager Mid-call policies may also be applied for handling of changes to the media stream such as transfers during a call. Network design using the Cisco RSVP Agent allows voice and video calls to proceed as part of a single unified network together with data. This setup allows for support of meshed designs, multitiered designs, adjustment to dynamic link changes, and redundant links. This single design helps reduce the costs for both infrastructure and management. Because CAC is managed and secured and QoS is applied as a network component, there is no reliance on end-user devices. Cisco RSVP Agent functions independently of the call-signaling protocol, and hence, Session Initiation Protocol (SIP), Skinny Client Control Protocol (SCCP), H.323, and Media Gateway Control Protocol (MGCP) are all supported. Figure 2 shows how the Cisco Unified CallManager and Cisco RSVP Agent in the router work together to optimize the voice quality across the IP network.