200 likes | 218 Views
Ohio State Highway Patrol Secure Mobile Networking Demonstration. A Technical Overview of the Network and Data Flow (Dave Stewart, Terry Bell and Will Ivancic). Mobile-Router Advantages. Share wireless and network resources with other organizations $$$ savings Set and forget
E N D
Ohio State Highway PatrolSecure Mobile Networking Demonstration A Technical Overview of the Network and Data Flow (Dave Stewart, Terry Bell and Will Ivancic)
Mobile-Router Advantages • Share wireless and network resources with other organizations • $$$ savings • Set and forget • No onsite expertise required • However, you still have to engineer the network • Continuous Connectivity • (May or may not be important to your organization) • Robust • Dynamic (Secondary) Home Agent
Scenario • Mobile command center deployed at hostage situation. • Satellite connectivity needed for reachback to Internet from mobile command center.
Network Concept • OSHP Bus is remote control center during emergency situations • Reachback to the Internet can be provided in a number of ways including satellite, rapidly installed land lines (T-1) or G3/G4 Cellular • Demonstration Room in Patrol Academy represents OSHP Headquarters • Patrol Cars are the mobile networks
Requirements • Rapidly Deployable – no onsite expertise required • Contact between patrol cars and remote command center are of greatest importance. • Desire to have voice, data, and – given sufficient bandwidth – video between the patrol cars and the bus and/or headquarters. • Desire to monitor and control sensors and cameras remotely from the remote command center or headquarters.
Full Scale Deployment • Data would NOT flow from the mobile command center to Headquarters via a private 802.11 link. • Instead, encrypted data would come into Headquarters via the Internet.
INTERNET Z Z Hostage House Full Scale Deployment Z X Foreign Agent HQ Home Agent Z
Demonstration Caveats • To ease demonstration setup and configurations, all data from the mobile networks passes through the wireless encryptor. • No encrypted data flows from the Internet directly to Headquarters • To ease configurations, mobile units communicate to each other via Headquarters (probably via the remote control center in a real deployment).
INTERNET Z Hostage House Demonstation Deployment Z X Foreign Agent HQ Home Agent Z Z
Nomenclature • Clear Text • Protected LAN • “Red” Network • Encrypted Text • Open Network • “Black” Network • Note! Red and Black NEVER mix.
Satellite (Ku Band) 802.11b “Red” Cellular CDMA 1xRTT INTERNET 802.11b “Black” Hostage House Wireless Links Z Foreign Agent HQ Home Agent Z Z
INTERNET Hostage House Cruser to Command Center when in conntact via 802.11 Z Foreign Agent HQ Home Agent Z Z
INTERNET Hostage House Cruser to Command Center when NOT contact via 802.11 Z Foreign Agent HQ Home Agent Z Z
INTERNET Hostage House Cruser to Headquarters when in conntact via 802.11 Z Foreign Agent HQ Home Agent Z Z
INTERNET Hostage House Cruser to Host on Internet when in conntact via 802.11 Z Foreign Agent HQ Home Agent Z Z
INTERNET Hostage House Request from Headquarters to Cruser when NO contact via 802.11 Z Foreign Agent HQ Home Agent Z Z Remote Command Center
INTERNET Hostage House Reply from Cruser to Headquarters when NO contact via 802.11 Z Foreign Agent HQ Home Agent Z Z Remote Command Center
Papers and Presentations http://roland.grc.nasa.gov/~ivancic/papers_presentations/papers.html or http://roland.grc.nasa.gov/~ivancic/ and pick “Papers and Presentations”