Operations support systems for mission critical public safety communication networks

2011 ◽  
Vol 16 (3) ◽  
pp. 151-162 ◽  
Author(s):  
Reinhard Rader
Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5790
Author(s):  
Salwa Saafi ◽  
Jiri Hosek ◽  
Aneta Kolackova

Public safety agencies have been working on the modernization of their communication networks and the enhancement of their mission-critical capabilities with novel technologies and applications. As part of these efforts, migrating from traditional land mobile radio (LMR) systems toward cellular-enabled, next-generation, mission-critical networks is at the top of these agencies’ agendas. In this paper, we provide an overview of cellular technologies ratified by the 3rd Generation Partnership Project (3GPP) to enable next-generation public safety networks. On top of using wireless communication technologies, emergency first responders need to be equipped with advanced devices to develop situational awareness. Therefore, we introduce the concept of the Internet of Life-Saving Things (IoLST) and focus on the role of wearable devices—more precisely, cellular-enabled wearables, in creating new solutions for enhanced public safety operations. Finally, we conduct a performance evaluation of wearable-based, mission-critical applications. So far, most of the mission-critical service evaluations target latency performance without taking into account reliability requirements. In our evaluation, we examine the impact of device- and application-related parameters on the latency and the reliability performance. We also identify major future considerations for better support of the studied requirements in next-generation public safety networks.


2019 ◽  
Vol 2019 ◽  
pp. 1-17
Author(s):  
Aizaz U. Chaudhry ◽  
Roshdy H. M. Hafez

This paper presents a concise overview of current public safety communication networks known as LMR (Land Mobile Radio) and emerging LTE- (Long-Term Evolution-) based broadband public safety networks to be deployed in the 700 MHz band. A broadband nationwide network for public safety based on LTE is inevitable where shared or dedicated types of LTE-based public safety networks are possible. Current LTE services do not meet mission-critical requirements and several enhancements have been defined by 3GPP to address this in Releases 12 and 13. First responders are familiar with LMR and consider it to be a reliable technology with massive deployment everywhere. Therefore, it is expected that LMR will continue to exist alongside any new LTE-based broadband public safety network. Recent LTE releases (particularly Release 15) addressed the LMR-LTE interoperability issue and described comprehensive interworking facilities. New and upcoming features and services of LTE in Releases 14 and 15, such as mission-critical data, mission-critical video, and aerial user equipments, are also directly applicable to public safety. The paper endeavours to provide a quick yet meaningful review of all these issues. It also offers a look ahead at the new and rapidly advancing virtualization technologies, such as software-defined radio access network, and radio access network slicing, as enablers for future public safety networks.


2021 ◽  
Vol 21 (6) ◽  
pp. 53-61
Author(s):  
Sangjik Lee ◽  
Sung-Geon Park ◽  
Chang-Min Ki ◽  
Jihong Park ◽  
Hyoun-Jung Jo

This study provides information for developing the domestic standard operating procedure (SOP) to CMMI level 3 or higher by presenting the SOP education and training model development process that systematically utilize the PS-LTE-based disaster safety communication network. The survey was conducted with 113 domestic SOP experts. Results revealed that four strategies can minimize the damage to people's lives and property in a national disaster and develop the domestic SOP level to CMMI level 3 or higher-establishment of governance for the SOPs for disaster safety communication networks; training on SOP once a year; establishment of SOP according to the guidelines; and improvement in the technical field. In the future, if SOP develops to CMMI level 3 or higher, it will contribute to the protection of public safety and property from disasters.


2021 ◽  
Author(s):  
Le Li ◽  
Zhihui Zhang ◽  
Chao Gao ◽  
Fei Zhou ◽  
Guangqiang Ma

Abstract With the development of digital instrument and control technology for nuclear power plants in recent decades, communication networks have become an important part of safety digital control systems, which takes charge in data exchange between the various sub-systems, and extremely impact on the reliability and safety of the entire I&C system. Traditional communication systems where some special features, such as reliability, safety, real-time, certainty, and independence are not strictly required are various illustrated. However, how to implement a communication system in a safety I&C system is rarely stated in current research. In this research, a reliable safety communication system applied in nuclear power plants is designed and analyzed. The five key characteristics of nuclear safety communication networks are explained, followed by explanation of how to achieve these characteristics. The analysis and verification of the designed system are also stated in this paper, which contributes to proving that the designed nuclear safety communication system could applied in the nuclear power plants.


2021 ◽  
Author(s):  
Richard Rouil ◽  
Antonio Izquierdo Manzanares ◽  
Chunmei Liu ◽  
Wesley Garey

2011 ◽  
Vol 16 (3) ◽  
pp. 133-149 ◽  
Author(s):  
Kenneth C. Budka ◽  
Thomas Chu ◽  
Tewfik L. Doumi ◽  
Wim Brouwer ◽  
Phil Lamoureux ◽  
...  

2021 ◽  
pp. 41-57
Author(s):  
Gregory Falco ◽  
Eric Rosenbach

The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.


Sign in / Sign up

Export Citation Format

Share Document