1 / 21

Public Safety Mobile Computing Trends and Opportunities

Public Safety Mobile Computing Trends and Opportunities. Paul Wormeli Executive Director IJIS Institute Paul.wormeli@ijis.org. February 25, 2005. Status of Mobile Computing. Current applications Simple query/response Messaging based On-board Applications

Download Presentation

Public Safety Mobile Computing Trends and Opportunities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Public Safety Mobile Computing Trends and Opportunities Paul Wormeli Executive Director IJIS Institute Paul.wormeli@ijis.org February 25, 2005

  2. Status of Mobile Computing • Current applications • Simple query/response • Messaging based • On-board Applications • Limited field reporting deployment • Constraints • Limited bandwidth • Difficult and costly interfaces

  3. Changing the face of mobile technology • The effect of re-farming the spectrum • 700 MHz channel allocations • Introduction of the 4.9GHz channels • New Technology • Mesh Networks • Wi-Max • The Nextel conversion =Removing the bandwidth barrier

  4. The Challenge: Can wireless broadband work here?

  5. Wireless Broadband Access Previously: • Public broadband access (Wi-fi) available at hot spots • Public 802.11b systems have very limited range, often insecure • No mobility or automated roaming between hot spots Coming: • 802.11e (Wi-Max) with 2-30 mile range • Mesh Technology

  6. Commercial wireless LAN Unlicensed 2.4 / 5GHz frequencies Mesh Technology 4.9 licensed Public Safety • Self-healing ad-hoc and mesh networks • Coverage and capacity expansion to meet demand • Higher Availability and Reliability • Licensed 4.9 GHz frequencies • Improved range and security Improving Wireless Broadband for Public Safety 802.11a/b/g Motorola has expanded the capabilities of 802.11 with Mesh technology to meet the mission critical needs of public safety users

  7. MESH Technology

  8. Spectrum Considerations • Why 4.9GHz spectrum?

  9. Advantages of 4.9 GHz? • FCC Licensed Spectrum Dedicated to Public Safety, so interference is known and controlled • Dedicated/Organized band avoids channel interference, which will increase throughput • Lower adjacent channel interference due to tighter emissions mask at higher power (anything > 100mW) • Excellent Complement to Wide Area Data System • 50MHz of Spectrum per jurisdictional area

  10. Spectrum Considerations - 4.9GHz Details • How can it be used ? • Mobile connectivity • Point to multipoint • Point to point (Requires special license) • What rules govern coverage area of this frequency ? • Granted on a jurisdictional basis for full 50MHz • FCC has not implemented specific rules for protected area by PS agencies • Local RPC (Regional Planning Committee) will create general guidelines for use • RPC can only influence use • RPC can not govern use • Disputes of use fall to individual agencies that are in dispute

  11. Section (3) Data Rate With the appropriate system design MeshNetworks technology will enable the use of these data applications Applications Browser Multimedia Text Based Video Mobile Messaging CAD Status Database Queries Add In: Report Writing Image Transfer Vehicle Location Limited Intranet/Internet Add In: Unlimited Intranet Unlimited Internet Low Bandwidth Video Add In: Office Applications Multimedia Real Time Video Remote Video 10 Kbps 100 Kbps 230+Kbps Mbps Low Bandwidth High Bandwidth

  12. When broadband is a reality • Moving from 19.2 Kbps to 1-3 Mbps • No more constraints on how much data can be delivered over wireless networks • The SafeCom vision • www.safecomprogram.gov Statement of Requirements • Wide-band infrastructure support

  13. Emerging standards • Interoperability standards for data • Global Justice XML Data Model • Emerging emergency management protocols • Web services, SOAP, and SOA • Networking and technical standards • TCP/IP, XML, SAML • National program standards • National Intelligence Plan • CAD/RMS Functional standards

  14. Mobile Computing Law Enforcement Functions The future is now

  15. Basic messaging capability • Instant messaging • Unit to unit (Internal and External) • Unit to dispatch • Group call • Supervisor to squad • E-Mail • Voice over IP

  16. Inquiry and response—external databases • Queries on people, vehicles, guns, property to state justice/DMV and NCIC data bases • Queries to local or county RMS or warrant repositories • Queries to local or county, or commercial supporting systems—permits, hazmat, tax, finance, personnel • Queries to licensing and registration systems. • De-confliction • Support for NCIC 2000 concepts

  17. Knowledge Management • Localized data on contacts, businesses, resources, schools, universities, military installations • Crime mapping and analysis • Premise information including hazards • Support for problem oriented policing • Floor Plans • Policy and Procedures, Legal and other reference material

  18. CAD Interaction • Receive call information and updates • Send acknowledgement and status changes • Post call information into reports • Handle external data base queries (may not go through CAD) • Submit call status change and closure • Access to CFS history • Resource Scheduling and Calendar • Electronic Roll-Call • GIS Real-Time Mapping Display • Field Dispatching Capability • Voice Activated Commands

  19. Information Acquisition • Preparation and submission of incident, accident, citation, preliminary arrest and other reports • Transmission of reports to RMS • 2-Way link and transmission of video, images, fingerprints • External ID Devices, e.g. Card Reader, Bar Coding

  20. Mitigating risks of obsolescence • Technology independent visions • Adherence to open standards • Effective project management • The service oriented architecture

  21. For further information • www.ijis.org • www.it.ojp.gov • www.publicsafetywins.gov • www.search.org • http://www.leitsc.org.

More Related