https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

content


Harnessing commercial systems

Harnessing commercial systems

Traditionally, public-safety agencies have relied on private networks for communications during emergencies. Industry standards have greatly facilitated
  • Written by Urgent Communications Administrator
  • 1st September 2004

Traditionally, public-safety agencies have relied on private networks for communications during emergencies. Industry standards have greatly facilitated the development and deployment of networks that meet the stringent availability, reliability and security requirements expected of emergency communication systems.

For example, Project 25, a standard supported by the Association of Public-Safety Communications Officials, provides a reliable and secure network for public-safety applications. Networks based on the Terrestrial Trunk Radio (TETRA) standard have been deployed by public-safety agencies in several European countries to provide reliable and secure communications to first responders and other emergency workers.

However, public-safety officials recently have expressed increasing concern about the limitations of such aging technologies to meet the growing demands of emergency communication services. After Sept. 11, 2001, a great sense of urgency developed for different public-safety agencies to collaborate and coordinate their activities in emergencies.

These agencies often use disparate networks with proprietary systems and devices that do not interoperate, thus making collaboration difficult, if not impossible.

Furthermore, most of these systems are designed primarily for voice communications and lack other capabilities such as high-speed data communications that can be used to send text or images. Compounding the issue is the concern that there is not enough vendor support and innovation and, thus, such technologies are becoming capacity-limited and expensive to deploy.

These concerns are causing public-safety agencies to look at alternative technologies, specifically those being deployed in commercial wireless communication systems. Based on widely adopted standards, commercial technologies such as CDMA and GSM offer several advantages.

In addition to addressing the interoperability issues, such technologies offer high-speed data capabilities — 1X EV-DO in CDMA networks and GPRS and EDGE in GSM networks — that are being used for a range of enhanced services such as text messaging and push-to-talk, as well as the transmission of images and video.

Combined with location-identification technologies, such services offer a compelling value proposition to a wide variety of applications, including public safety. Internet protocol-based wireless networks that use commercial off-the-shelf (COTS) components, such as 802.11 technologies, are gaining significant traction in commercial local and metro networks and are attracting attention from public-safety agencies.

While there may be a role for commercial technologies in critical applications such as public safety, some issues must first be addressed. For instance, communication systems based on commercial technologies must meet strict service availability requirements of mission-critical applications before they are used in any significant deployment. Most mission-critical applications require system uptime of 99.999% (downtime of less than five minutes per year) or better (Figure 1). Public safety, for example, falls into a subcategory of applications that dictate even more stringent requirements for on-demand, continuous operation.

To ensure continuous operation and uninterrupted service, system designers must identify all potential single points of failure in the service path and implement ways to eliminate them.

A comprehensive approach to designing such highly available systems encompasses the following elements.

  • Establish key availability and performance requirements up front

  • Define a system architecture that supports key build-vs.-buy decisions and leverages COTS elements

  • Place special focus on key high-availability attributes.

For example, to support continuous service in a wireless network, recovery from any failure must be executed in less than 50 milliseconds. Restoring a system to an operational state following a failure is a multistage process that involves fault detection, diagnosis, isolation, recovery, repair and reconfiguration. Consequently, in a wireless network each of these stages must be allocated appropriate performance budgets so that failure recovery occurs in less than 50 milliseconds.

Similarly, to support an uninterrupted wireless communication service, the messaging system must support anywhere from 10,000 to 50,000 real-time messages per second depending on the message size. Such performance requirements often demand that an efficient in-memory data-store is used in the system for storage and retrieval of real-time information.

In the 1990s the computer industry made an important transition in that it went from vertically integrated systems — primarily offered by individual system vendors — to modular systems that enabled end users to purchase COTS components (hardware, operating system and middleware) from different vendors to put together an operational system with relatively small effort. The telecom industry is just beginning a similar transition, aided by the development of specifications intended to facilitate the portability of middleware and applications across multiple platforms.

The proliferation of such standards provides designers the flexibility to build systems by combining a set of interoperable COTS building blocks such as hardware platform, operating system and middleware from a variety of competing vendors (Figure 2). This enables the equipment vendors to minimize the cost and effort involved in building a system, while allowing them to focus their precious resources on their core competencies — communication applications.

Despite this flexibility, the building of systems intended to deliver uninterrupted service availability for critical applications — such as public safety — is a daunting task that involves complex hardware and software, and critical implementation decisions along the way. Experience shows that such systems evolve over multiple releases to a point at which they are able to meet the most stringent service availability requirements.

Some of the most critical attributes that characterize such highly available systems include the following: the ability to thoroughly model the system and its resources, comprehensive high-availability services and an efficient messaging engine.

These attributes combined with effective system management can yield a system that can ensure uninterrupted service availability.

System modeling provides a mechanism to represent physical and logical resources that comprise the overall system. It also defines the relationships and dependencies among such resources in a hierarchical network of managed objects. These objects have states and attributes that represent the actual and desired state of the corresponding physical resource, such as hardware elements, software modules and nodes in a cluster.

The system model has the capability to group sets of like objects into service groups and then define respective recovery policies for each group that are executed in the event of a failure. Any change in the state of the objects that can affect service availability — such as a failed application, a hardware error or planned downtime — causes an update to the system model that in turn triggers the appropriate recovery action to maintain the overall service availability.

High-availability services are used to manage resource failures without interrupting service. Such services are responsible for providing seamless switchover among redundant components, shielding the end user from any faults or resulting failures.

High-availability services must support a large number of nodes in a cluster, with the ability to collect, preserve and distribute application state information for stateful, seamless failover between the nodes in the cluster. Key functions provided by high-availability services include:

  • Creating and maintaining availability management information

  • Providing the availability engine that applies policies to proactively manage the system for high availability, often 99.999% or better

  • Management of various parts of the system, such as nodes in a cluster and redundant components

  • Providing checkpointing services to applications and other components.

Finally, a messaging engine is designed to address the need for communication between system elements. Such an engine provides an efficient mechanism for communicating a wide variety of information, such as application state information, event-and-error notification, and fault management information. A messaging service also provides an effective way for distributed components to efficiently communicate and coordinate their activities. Instead of requiring each resource to manage its various communication complexities, the messaging service does it for them.

A messaging service must be flexible, scalable and reliable. Flexibility requires that the messaging service is independent of the applications to which it provides services, so that the communication responsibilities can be offloaded from the applications. Scalability ensures that the messaging service is designed to support change and growth in the system components, and to support increased messaging activities. Applications do not need to be modified as the system and message volume changes or grows. Lastly, the messaging service must be reliable to ensure message delivery, even in the event of failures in the primary network connection.

Dr. Asif Naseem is currently senior vice president and CTO for GoAhead Software. He has more than 18 years of experience in the computer and communications industries. Previously he served in senior-level positions at Motorola, where he established and managed a mobile applications business, and most recently at Iospan Wireless, a broadband wireless company that was acquired by Intel and L3. He started his career with AT&T Bell Laboratories where he held a variety of technical and management positions, and has an M.S. in electrical engineering and a Ph.D. in computer engineering from Michigan State University.

Defining high availability

Figure 1:
Number of 9s Downtime/Year Typical Application
99.9% ~9 hrs Typical Desktop or Server
99.99% ~1 hr Enterprise Server
99.999% ~5 mins Carrier-Class Server
99.9999% ~31 secs Carrier Switch Equipment

Anatomy of a Commercial Off-the-Shelf System

Figure 2:
Applications
Application Interface (e.g., SAF AIS)
COTS High-Availability and Management Middleware Other Middleware
Platform Interface (e.g., HPI)
Operating Systems — (e.g., CGL)
Platform Hardware — (e.g., cPCI, ATCA)
Tags: content Operations Wireless Networks

Most Recent


  • Microsoft Outlook vulnerability could be 2023's 'It' bug
    Microsoft recently patched a zero-day vulnerability under active exploit in Microsoft Outlook, identified as CVE-2023-23397, which could enable an attacker to perform a privilege escalation, accessing the victim’s Net-NTLMv2 challenge-response authentication hash and impersonating the user. Now it’s becoming clear that CVE-2023-23397 is dangerous enough to become the most far-reaching bug of the year, security researchers are […]
  • Getting to know the how—and why—of the telecom cloud
    A funny thing happened during the pandemic: The giant cloud hyperscalers burst into the telecom industry. And now it’s time for everyone to get acquainted with them. Why? Well, it seems increasingly inevitable that a certain percentage – ranging from “a little” to “most” – of telecom operators’ network functions are going to run in […]
  • Zipline delivery drone docks, charges by itself
    Zipline has unveiled its new autonomous drone platform, designed to provide accurate everyday delivery to homes in the U.S., including in busy residential areas. Zipline’s previous delivery system worked by parachuting parcels into a specified area. Now the new drone, dubbed Platform 2 or P2 Zip, sends its goods down to customers via a tether […]
  • State and local leaders can alleviate the burden on public-safety personnel by tackling three workforce trends
    Government officials and public safety leaders wear many different hats. They serve as sounding boards for constituent complaints and for new ideas that need vetting. They are change agents charged with improving the lives of citizens and colleagues and are tasked with keeping order. Their most daunting responsibility, however, is keeping members of their community […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • The battle over connected cars drags on
  • U.S. must redefine critical infrastructure for the digital era
  • AI energizes remote monitoring of patients, fuels bidirectional health care
  • Prioritizing rapid restore leads to stronger ransomware-attack recovery

Commentary


Updated: How ‘sidelink’ peer-to-peer communications can enhance public-safety operations

  • 1
27th February 2023

NG911 needed to secure our communities and nation

24th February 2023

How 5G is making cities safer, smarter, and more efficient

26th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

State and local leaders can alleviate the burden on public-safety personnel by tackling three workforce trends dlvr.it/SlBH89

20th March 2023
UrgentComm

6G is shaping up to disappoint, and the industry can blame itself dlvr.it/Sl918J

20th March 2023
UrgentComm

Change is coming to the network detection and response (NDR) market dlvr.it/Sl4cts

18th March 2023
UrgentComm

Telcos need to build businesses, as well as networks dlvr.it/Sl4cRR

18th March 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.