SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Observations from Rakesh Bharania
                   A Tactical Operations Support Engineer
                  For a Major Telecommunications Company




       Learning from Hurricane Sandy and the Waldo Canyon Fire:
             Considerations for Emergency Wi-Fi Networks

INTRODUCTION
In the 1980s, MIT Professor Nicholas Negroponte proposed an idea that became known as
the “Negroponte Switch,” the idea that technologies that were then wired (such as
telephone service) would become wireless, and that technologies that were then wireless
(such as television) would become wired. The growth in subsequent decades of mobile
phone service and cable television both are examples of how this switch has been realized.
Similarly in disaster response, we’ve seen a tremendous uptake in technology – PCs,
tablets, and smartphones. When I first started seeing computers used in disaster response
in the early part of the 2000s, wired Ethernet connections were the rule, as 802.11 wireless
networks were then in their infancy.

Today, of course, wireless networks tend to predominate the mobile, always-connected
world we now live in. Smartphones, tablets, and most computers have on-board wireless
networking, and the disadvantage of reduced speeds of modern wireless networks
compared to their wired counterparts is often more than made up for in user mobility and
ease of moves, adds and changes as new stations come online. Because of its ease of use
and support for most devices, Wi-Fi (802.11 a/b/g/n/ac) networks are considered an
integral part of the Hastily Formed Network (HFN) architecture.

In the rush of governments and NGOs alike to deploy emergency Wi-Fi networks after a
disaster, recent emergencies have shown that there are going to be increasingly significant
challenges for disaster responders to get the kind of quality of service they require. Solving
this may require us to reverse the Negroponte Switch (just a little bit) in order to
accommodate the Bring Your Own Device (BYOD) world.


CHALLENGES
Spectrum
The most common frequency space for 802.11 wireless networks is in the unlicensed 2.4
GHz space. Without going too deeply into frequency management, understand that there
are 14 channels designated within that space between 2.4 and 2.5 GHz. Now understand
that since it’s unlicensed spectrum, any number of other devices may also occupy that same
space, blasting away with their radiofrequency (RF) noise, including cordless telephones and
microwave ovens.
                                                          Waldo Canyon Fire
                                                          Starting on June, 23rd 2012, the
During the Waldo Canyon Fire in Colorado in 2012,
                                                          Waldo Canyon Fire burned 18,247
for example, our equipment detected more than 40          acres and destroyed 345 homes over
access points operating in the immediate area around      a 19 day period. For more
the Incident Command Post. Some of these belonged         information, read the Initial After-
to the local school, others to local residences, and      Action Report.
still others were portable “Mi-Fi” hotspots brought in
by responders themselves. Every responding agency seemed intent on bringing in their
own Wi-Fi network. When you put them all close together, you can easily see how those
limited numbers of channels suddenly had a lot of contention on them. Forty doesn’t divide
into fourteen so well…

From a wireless network standpoint, there was so much contention that most of these
networks were stomping on one another, jamming their users’ ability to get useful
connectivity. Technology exists to overcome such contention, but the equipment tends to
be pretty expensive enterprise-class stuff, not the consumer-level equipment often used by
smaller departments and most NGOs. In effect, it becomes a silent arms race between
wireless access points.

During Hurricane Sandy, the problems were different. The power was knocked out in the
Rockaways, so many of the otherwise competing access
points we ought to have seen were simply disabled by     More Notes from the Field from
the emergency itself. The problem then became that       Hurricane Sandy
many of the emergency services buildings we were         Read more about Rakesh’s Hurricane
                                                         Sandy experiences in Hurricane
asked to connect were of a type of construction that
                                                         Sandy and Disaster Networks: Key
significantly degraded wireless network signals.         Observations, Good Practices, and
                                                           Challenges
Education
In the United States, many incidents will have Communications Unit Leaders (COMLs) and
Communications Unit Technicians (COMTs) or individuals with similar skills managing
frequency allocation for the Land Mobile Radio (LMR) service that is supporting the
emergency. However, my experience to date has been that most communications staff do
not recognize how important data is to any successful emergency response, are not aware
of the contention and quality issues of Wi-Fi networking, and even in situations where they
are aware, they often lack the equipment and training (and perhaps even mandate) to
effectively deal with the issue.


RECOMMENDATIONS
Reversing the Negroponte Switch is OK
While most techs today think about how to deploy Wi-Fi networks in the early hours of an
emergency, I am recommending that network engineers, technology NGOs, and other
organizations deploying emergency networks should consider how to solve their connectivity
needs through wired networks first, and only then consider where Wi-Fi may be appropriate.
There is a cost to this: you need switches, spools of Ethernet cables, and staff equipped to
crimp cables in the field. But for mission critical connectivity, I would argue that the
benefits of avoiding contention in the Wi-Fi space, and the better quality of network
connectivity offered by wired networks is worth it.

Even in a situation with a lot of tablet use, community Wi-Fi hotspots, or other locations
where wired connections are not going to be practical, technical staff should consider having
a few wired computers available for use just in case the contention at the location becomes
too great.

Technology Teams Need to be Prepared to Deploy Wired Networks Early
Many technology NGO and government response teams in the early days of a response will
travel lightly, with a few devices and a Wi-Fi hotspot or two. Experience has told us that
while this maximizes portability, on-scene connectivity may not be anywhere near as good
as you’d hoped when you set out. Assume every other mutual aid responder coming to
your emergency is bringing similar kit. Anticipate the need for early wired networks.




                                             2
If You Must Use Wireless, Consider How to Move Off 2.4Gz
The worst of the contention problem occurs in the 2.4 GHz space. Can you move to the 5
GHz (802.a/n/ac) space, where there are more channels? Some clients don’t support 5 GHz
connections, so you need to consider compatibility issues. Public safety agencies who are
eligible for 4.9 GHz licenses should consider use of 802.11y networks.

Educate Emergency Communicators About the Challenges of Wireless Data
Networks
Many emergency communicators are still unaware of the challenges of non-LMR RF
spectrum management. These teams need to be trained, equipped and empowered to de-
conflict and manage all spectrum related issues related to the incident. This is obviously
non-trivial, but it needs to happen.


CONCLUSION
The popularity of Wi-Fi networks is not going to decrease in the foreseeable future. Most
modern communications technologies assume a wireless network connection – just try
finding the Ethernet jack on an iPad! – but this popularity also creates significant challenges
for disaster communicators, even as it opens up huge productivity benefits for disaster
responders themselves. While spectrum management equipment and process languishes,
the simplest tool that emergency communicators have today is the basic, boring wired
Ethernet connection. Communications teams need to be prepared to deploy wired Ethernet
early during the response, perhaps alongside of their wireless networks, in order to ensure
that mission critical communications is not disrupted or delayed due to spectrum
congestion, building attenuation or other radio challenges. Reversing the Negroponte
Switch (just a little bit) can go a long way to ensuring that communications stays up and
available in the middle of a tech-heavy disaster response.


DISCLAIMER
The views expressed in this document are those of the author and do not necessarily reflect those of
Lessons Learned Information Sharing.

Lessons Learned Information Sharing (LLIS.gov) is the Department of Homeland Security/Federal
Emergency Management Agency's national online network of lessons learned, best practices, and
innovative ideas for the emergency management and homeland security communities. The Web site
and its contents are provided for informational purposes only, without warranty or guarantee of any
kind, and do not represent the official positions of the Department of Homeland Security. For more
information on LLIS.gov, please email feedback@llis.dhs.gov or visit www.llis.gov.




                                                  3

Contenu connexe

Tendances

The Next IT: A Preview of Tomorrows Innovations and Challenges
The Next IT: A Preview of Tomorrows Innovations and ChallengesThe Next IT: A Preview of Tomorrows Innovations and Challenges
The Next IT: A Preview of Tomorrows Innovations and Challengesnbelarbi
 
Future Of Internet Presentation
Future Of Internet PresentationFuture Of Internet Presentation
Future Of Internet Presentationguestf0bdc63
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the InternetJon Lebkowsky
 
IWCE Conference: Mesh 101 Pres
IWCE Conference: Mesh 101 PresIWCE Conference: Mesh 101 Pres
IWCE Conference: Mesh 101 PresMartin Suter
 
Wimax and changing wireless eco system
Wimax and changing wireless eco systemWimax and changing wireless eco system
Wimax and changing wireless eco systemKartik Mehta
 
Garth naar - a complete guide to fiber optic internet
Garth naar -  a complete guide to fiber optic internetGarth naar -  a complete guide to fiber optic internet
Garth naar - a complete guide to fiber optic internetgarthnaar
 
Intersil Corp Strategy Case Study
Intersil Corp Strategy Case StudyIntersil Corp Strategy Case Study
Intersil Corp Strategy Case StudyJonathan Chizick
 
System Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video ConferencingSystem Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video ConferencingVideoguy
 
Community TV over ip
Community TV over ipCommunity TV over ip
Community TV over ipDavid Wilcox
 
Cybera - Regional Developments in Advanced Networks -BCNet
Cybera - Regional Developments in Advanced Networks -BCNetCybera - Regional Developments in Advanced Networks -BCNet
Cybera - Regional Developments in Advanced Networks -BCNetCybera Inc.
 
Living in a World of True Broadband
Living in a World of True BroadbandLiving in a World of True Broadband
Living in a World of True BroadbandLarry Smarr
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Calaveras Economic Summit
Calaveras Economic SummitCalaveras Economic Summit
Calaveras Economic SummitSharon Crost
 
2020 Vision: Twenty Years of Technology
2020 Vision: Twenty Years of Technology2020 Vision: Twenty Years of Technology
2020 Vision: Twenty Years of TechnologyWayne Caswell
 
IS4CWN 2013 Program - FINAL
IS4CWN 2013 Program - FINALIS4CWN 2013 Program - FINAL
IS4CWN 2013 Program - FINALAndrew Bolden
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 
Hundt letter re 5G
Hundt letter re 5GHundt letter re 5G
Hundt letter re 5GReed Hundt
 
The Present and Future of Fixed Broadband
The Present and Future of Fixed BroadbandThe Present and Future of Fixed Broadband
The Present and Future of Fixed BroadbandKevin Werbach
 

Tendances (20)

The Next IT: A Preview of Tomorrows Innovations and Challenges
The Next IT: A Preview of Tomorrows Innovations and ChallengesThe Next IT: A Preview of Tomorrows Innovations and Challenges
The Next IT: A Preview of Tomorrows Innovations and Challenges
 
Future Of Internet Presentation
Future Of Internet PresentationFuture Of Internet Presentation
Future Of Internet Presentation
 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internet
 
IWCE Conference: Mesh 101 Pres
IWCE Conference: Mesh 101 PresIWCE Conference: Mesh 101 Pres
IWCE Conference: Mesh 101 Pres
 
Wimax and changing wireless eco system
Wimax and changing wireless eco systemWimax and changing wireless eco system
Wimax and changing wireless eco system
 
Garth naar - a complete guide to fiber optic internet
Garth naar -  a complete guide to fiber optic internetGarth naar -  a complete guide to fiber optic internet
Garth naar - a complete guide to fiber optic internet
 
Intersil Corp Strategy Case Study
Intersil Corp Strategy Case StudyIntersil Corp Strategy Case Study
Intersil Corp Strategy Case Study
 
System Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video ConferencingSystem Support for Integrated Desktop Video Conferencing
System Support for Integrated Desktop Video Conferencing
 
Community TV over ip
Community TV over ipCommunity TV over ip
Community TV over ip
 
Cybera - Regional Developments in Advanced Networks -BCNet
Cybera - Regional Developments in Advanced Networks -BCNetCybera - Regional Developments in Advanced Networks -BCNet
Cybera - Regional Developments in Advanced Networks -BCNet
 
Living in a World of True Broadband
Living in a World of True BroadbandLiving in a World of True Broadband
Living in a World of True Broadband
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Calaveras Economic Summit
Calaveras Economic SummitCalaveras Economic Summit
Calaveras Economic Summit
 
2020 Vision: Twenty Years of Technology
2020 Vision: Twenty Years of Technology2020 Vision: Twenty Years of Technology
2020 Vision: Twenty Years of Technology
 
Noticias TIC mar2011
Noticias TIC mar2011Noticias TIC mar2011
Noticias TIC mar2011
 
IS4CWN 2013 Program - FINAL
IS4CWN 2013 Program - FINALIS4CWN 2013 Program - FINAL
IS4CWN 2013 Program - FINAL
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
L15 The Mobile Revolution
L15 The Mobile RevolutionL15 The Mobile Revolution
L15 The Mobile Revolution
 
Hundt letter re 5G
Hundt letter re 5GHundt letter re 5G
Hundt letter re 5G
 
The Present and Future of Fixed Broadband
The Present and Future of Fixed BroadbandThe Present and Future of Fixed Broadband
The Present and Future of Fixed Broadband
 

En vedette

Securing Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency ResponseSecuring Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency ResponseRakesh Bharania
 
Cisco ERT Cardiac Emergency Brownbag
Cisco ERT Cardiac Emergency BrownbagCisco ERT Cardiac Emergency Brownbag
Cisco ERT Cardiac Emergency BrownbagRakesh Bharania
 
Cisco ERT - Managing Difficult Scenes
Cisco ERT - Managing Difficult ScenesCisco ERT - Managing Difficult Scenes
Cisco ERT - Managing Difficult ScenesRakesh Bharania
 
Risk Triage and Prototyping In Information Security Engagements
Risk Triage and Prototyping In Information Security EngagementsRisk Triage and Prototyping In Information Security Engagements
Risk Triage and Prototyping In Information Security EngagementsRakesh Bharania
 
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireHastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireRakesh Bharania
 
Studying the scientific state of students using the adjusted residuals
 Studying the scientific state of students using the adjusted residuals Studying the scientific state of students using the adjusted residuals
Studying the scientific state of students using the adjusted residualsAlexander Decker
 
M. Dimitrijevic - Twisted Symmetry and Noncommutative Field Theory
M. Dimitrijevic - Twisted Symmetry and Noncommutative Field TheoryM. Dimitrijevic - Twisted Symmetry and Noncommutative Field Theory
M. Dimitrijevic - Twisted Symmetry and Noncommutative Field TheorySEENET-MTP
 
A survey on modifications for unstructured P2P in WMNs .
A survey on modifications for unstructured P2P in WMNs . A survey on modifications for unstructured P2P in WMNs .
A survey on modifications for unstructured P2P in WMNs . Save Manos
 
The Art & Science of Decision Making - Key Note Speech
The Art & Science of Decision Making - Key Note SpeechThe Art & Science of Decision Making - Key Note Speech
The Art & Science of Decision Making - Key Note SpeechSurya Chitra,PhD MBA
 

En vedette (11)

Securing Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency ResponseSecuring Hastily Formed Networks For Disaster Relief & Emergency Response
Securing Hastily Formed Networks For Disaster Relief & Emergency Response
 
Cisco ERT Cardiac Emergency Brownbag
Cisco ERT Cardiac Emergency BrownbagCisco ERT Cardiac Emergency Brownbag
Cisco ERT Cardiac Emergency Brownbag
 
Cisco ERT - Managing Difficult Scenes
Cisco ERT - Managing Difficult ScenesCisco ERT - Managing Difficult Scenes
Cisco ERT - Managing Difficult Scenes
 
Risk Triage and Prototyping In Information Security Engagements
Risk Triage and Prototyping In Information Security EngagementsRisk Triage and Prototyping In Information Security Engagements
Risk Triage and Prototyping In Information Security Engagements
 
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon FireHastily Formed Networks (HFN) at the Waldo Canyon Fire
Hastily Formed Networks (HFN) at the Waldo Canyon Fire
 
FLATS
FLATS FLATS
FLATS
 
Studying the scientific state of students using the adjusted residuals
 Studying the scientific state of students using the adjusted residuals Studying the scientific state of students using the adjusted residuals
Studying the scientific state of students using the adjusted residuals
 
M. Dimitrijevic - Twisted Symmetry and Noncommutative Field Theory
M. Dimitrijevic - Twisted Symmetry and Noncommutative Field TheoryM. Dimitrijevic - Twisted Symmetry and Noncommutative Field Theory
M. Dimitrijevic - Twisted Symmetry and Noncommutative Field Theory
 
A survey on modifications for unstructured P2P in WMNs .
A survey on modifications for unstructured P2P in WMNs . A survey on modifications for unstructured P2P in WMNs .
A survey on modifications for unstructured P2P in WMNs .
 
Cardiac emergencies
Cardiac emergenciesCardiac emergencies
Cardiac emergencies
 
The Art & Science of Decision Making - Key Note Speech
The Art & Science of Decision Making - Key Note SpeechThe Art & Science of Decision Making - Key Note Speech
The Art & Science of Decision Making - Key Note Speech
 

Similaire à Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks

The Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefThe Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefCisco Crisis Response
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfJOMan21
 
Netw 561 entire course wireless technology
Netw 561 entire course wireless technologyNetw 561 entire course wireless technology
Netw 561 entire course wireless technologyPatrickrasacs
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Swapnali Pawar
 
This Report Fulfills The Specific Requirement For...
This Report Fulfills The Specific Requirement For...This Report Fulfills The Specific Requirement For...
This Report Fulfills The Specific Requirement For...Michelle Love
 
Computers, Wifi And Tablets
Computers, Wifi And TabletsComputers, Wifi And Tablets
Computers, Wifi And TabletsMonica Carter
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...FaizanMahmood28
 
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHSECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHcscpconf
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approachcsandit
 
Ways Unifying Critical Communications can Help First Responders
Ways Unifying Critical Communications can Help First RespondersWays Unifying Critical Communications can Help First Responders
Ways Unifying Critical Communications can Help First Respondersmecarlhooper
 
1_Pengantar Komunikasi Data (9).pptx
1_Pengantar Komunikasi Data (9).pptx1_Pengantar Komunikasi Data (9).pptx
1_Pengantar Komunikasi Data (9).pptxzulhelmanz
 
Saving lives with public safety vehicle broadband
Saving lives with public safety vehicle broadbandSaving lives with public safety vehicle broadband
Saving lives with public safety vehicle broadbandJuhani Lehtonen
 
Comm scope anixter-vision nyc das combined
Comm scope anixter-vision nyc das combinedComm scope anixter-vision nyc das combined
Comm scope anixter-vision nyc das combinedVision_Tech_Inc
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectAnneilynLeal
 
Dwika Vision
Dwika VisionDwika Vision
Dwika Visionvideinc
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocolsiosrjce
 

Similaire à Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks (20)

Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
The Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster ReliefThe Evolution of Hastily Formed Networks For Disaster Relief
The Evolution of Hastily Formed Networks For Disaster Relief
 
biuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdfbiuld-small-wireless-lan.pdf
biuld-small-wireless-lan.pdf
 
Netw 561 entire course wireless technology
Netw 561 entire course wireless technologyNetw 561 entire course wireless technology
Netw 561 entire course wireless technology
 
Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514Unit 2 Design mobile computing architecture MC1514
Unit 2 Design mobile computing architecture MC1514
 
Manet overview
Manet overviewManet overview
Manet overview
 
This Report Fulfills The Specific Requirement For...
This Report Fulfills The Specific Requirement For...This Report Fulfills The Specific Requirement For...
This Report Fulfills The Specific Requirement For...
 
Computers, Wifi And Tablets
Computers, Wifi And TabletsComputers, Wifi And Tablets
Computers, Wifi And Tablets
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...
 
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACHSECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
SECURITY ISSUES AND SOLUTIONS IN VEHICULAR ADHOC NETWORK : A REVIEW APPROACH
 
Security issues and solutions in vehicular adhoc network a review approach
Security issues and solutions in vehicular adhoc network  a review approachSecurity issues and solutions in vehicular adhoc network  a review approach
Security issues and solutions in vehicular adhoc network a review approach
 
Ways Unifying Critical Communications can Help First Responders
Ways Unifying Critical Communications can Help First RespondersWays Unifying Critical Communications can Help First Responders
Ways Unifying Critical Communications can Help First Responders
 
1_Pengantar Komunikasi Data (9).pptx
1_Pengantar Komunikasi Data (9).pptx1_Pengantar Komunikasi Data (9).pptx
1_Pengantar Komunikasi Data (9).pptx
 
Saving lives with public safety vehicle broadband
Saving lives with public safety vehicle broadbandSaving lives with public safety vehicle broadband
Saving lives with public safety vehicle broadband
 
Comm scope anixter-vision nyc das combined
Comm scope anixter-vision nyc das combinedComm scope anixter-vision nyc das combined
Comm scope anixter-vision nyc das combined
 
Lanvisn™ Clouds
Lanvisn™ Clouds Lanvisn™ Clouds
Lanvisn™ Clouds
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
GPON Primer
GPON PrimerGPON Primer
GPON Primer
 
Dwika Vision
Dwika VisionDwika Vision
Dwika Vision
 
Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Hurricane Sandy / Waldo Canyon Fire - Considerations for WiFi Networks

  • 1. Observations from Rakesh Bharania A Tactical Operations Support Engineer For a Major Telecommunications Company Learning from Hurricane Sandy and the Waldo Canyon Fire: Considerations for Emergency Wi-Fi Networks INTRODUCTION In the 1980s, MIT Professor Nicholas Negroponte proposed an idea that became known as the “Negroponte Switch,” the idea that technologies that were then wired (such as telephone service) would become wireless, and that technologies that were then wireless (such as television) would become wired. The growth in subsequent decades of mobile phone service and cable television both are examples of how this switch has been realized. Similarly in disaster response, we’ve seen a tremendous uptake in technology – PCs, tablets, and smartphones. When I first started seeing computers used in disaster response in the early part of the 2000s, wired Ethernet connections were the rule, as 802.11 wireless networks were then in their infancy. Today, of course, wireless networks tend to predominate the mobile, always-connected world we now live in. Smartphones, tablets, and most computers have on-board wireless networking, and the disadvantage of reduced speeds of modern wireless networks compared to their wired counterparts is often more than made up for in user mobility and ease of moves, adds and changes as new stations come online. Because of its ease of use and support for most devices, Wi-Fi (802.11 a/b/g/n/ac) networks are considered an integral part of the Hastily Formed Network (HFN) architecture. In the rush of governments and NGOs alike to deploy emergency Wi-Fi networks after a disaster, recent emergencies have shown that there are going to be increasingly significant challenges for disaster responders to get the kind of quality of service they require. Solving this may require us to reverse the Negroponte Switch (just a little bit) in order to accommodate the Bring Your Own Device (BYOD) world. CHALLENGES Spectrum The most common frequency space for 802.11 wireless networks is in the unlicensed 2.4 GHz space. Without going too deeply into frequency management, understand that there are 14 channels designated within that space between 2.4 and 2.5 GHz. Now understand that since it’s unlicensed spectrum, any number of other devices may also occupy that same space, blasting away with their radiofrequency (RF) noise, including cordless telephones and microwave ovens. Waldo Canyon Fire Starting on June, 23rd 2012, the During the Waldo Canyon Fire in Colorado in 2012, Waldo Canyon Fire burned 18,247 for example, our equipment detected more than 40 acres and destroyed 345 homes over access points operating in the immediate area around a 19 day period. For more the Incident Command Post. Some of these belonged information, read the Initial After- to the local school, others to local residences, and Action Report. still others were portable “Mi-Fi” hotspots brought in
  • 2. by responders themselves. Every responding agency seemed intent on bringing in their own Wi-Fi network. When you put them all close together, you can easily see how those limited numbers of channels suddenly had a lot of contention on them. Forty doesn’t divide into fourteen so well… From a wireless network standpoint, there was so much contention that most of these networks were stomping on one another, jamming their users’ ability to get useful connectivity. Technology exists to overcome such contention, but the equipment tends to be pretty expensive enterprise-class stuff, not the consumer-level equipment often used by smaller departments and most NGOs. In effect, it becomes a silent arms race between wireless access points. During Hurricane Sandy, the problems were different. The power was knocked out in the Rockaways, so many of the otherwise competing access points we ought to have seen were simply disabled by More Notes from the Field from the emergency itself. The problem then became that Hurricane Sandy many of the emergency services buildings we were Read more about Rakesh’s Hurricane Sandy experiences in Hurricane asked to connect were of a type of construction that Sandy and Disaster Networks: Key significantly degraded wireless network signals. Observations, Good Practices, and Challenges Education In the United States, many incidents will have Communications Unit Leaders (COMLs) and Communications Unit Technicians (COMTs) or individuals with similar skills managing frequency allocation for the Land Mobile Radio (LMR) service that is supporting the emergency. However, my experience to date has been that most communications staff do not recognize how important data is to any successful emergency response, are not aware of the contention and quality issues of Wi-Fi networking, and even in situations where they are aware, they often lack the equipment and training (and perhaps even mandate) to effectively deal with the issue. RECOMMENDATIONS Reversing the Negroponte Switch is OK While most techs today think about how to deploy Wi-Fi networks in the early hours of an emergency, I am recommending that network engineers, technology NGOs, and other organizations deploying emergency networks should consider how to solve their connectivity needs through wired networks first, and only then consider where Wi-Fi may be appropriate. There is a cost to this: you need switches, spools of Ethernet cables, and staff equipped to crimp cables in the field. But for mission critical connectivity, I would argue that the benefits of avoiding contention in the Wi-Fi space, and the better quality of network connectivity offered by wired networks is worth it. Even in a situation with a lot of tablet use, community Wi-Fi hotspots, or other locations where wired connections are not going to be practical, technical staff should consider having a few wired computers available for use just in case the contention at the location becomes too great. Technology Teams Need to be Prepared to Deploy Wired Networks Early Many technology NGO and government response teams in the early days of a response will travel lightly, with a few devices and a Wi-Fi hotspot or two. Experience has told us that while this maximizes portability, on-scene connectivity may not be anywhere near as good as you’d hoped when you set out. Assume every other mutual aid responder coming to your emergency is bringing similar kit. Anticipate the need for early wired networks. 2
  • 3. If You Must Use Wireless, Consider How to Move Off 2.4Gz The worst of the contention problem occurs in the 2.4 GHz space. Can you move to the 5 GHz (802.a/n/ac) space, where there are more channels? Some clients don’t support 5 GHz connections, so you need to consider compatibility issues. Public safety agencies who are eligible for 4.9 GHz licenses should consider use of 802.11y networks. Educate Emergency Communicators About the Challenges of Wireless Data Networks Many emergency communicators are still unaware of the challenges of non-LMR RF spectrum management. These teams need to be trained, equipped and empowered to de- conflict and manage all spectrum related issues related to the incident. This is obviously non-trivial, but it needs to happen. CONCLUSION The popularity of Wi-Fi networks is not going to decrease in the foreseeable future. Most modern communications technologies assume a wireless network connection – just try finding the Ethernet jack on an iPad! – but this popularity also creates significant challenges for disaster communicators, even as it opens up huge productivity benefits for disaster responders themselves. While spectrum management equipment and process languishes, the simplest tool that emergency communicators have today is the basic, boring wired Ethernet connection. Communications teams need to be prepared to deploy wired Ethernet early during the response, perhaps alongside of their wireless networks, in order to ensure that mission critical communications is not disrupted or delayed due to spectrum congestion, building attenuation or other radio challenges. Reversing the Negroponte Switch (just a little bit) can go a long way to ensuring that communications stays up and available in the middle of a tech-heavy disaster response. DISCLAIMER The views expressed in this document are those of the author and do not necessarily reflect those of Lessons Learned Information Sharing. Lessons Learned Information Sharing (LLIS.gov) is the Department of Homeland Security/Federal Emergency Management Agency's national online network of lessons learned, best practices, and innovative ideas for the emergency management and homeland security communities. The Web site and its contents are provided for informational purposes only, without warranty or guarantee of any kind, and do not represent the official positions of the Department of Homeland Security. For more information on LLIS.gov, please email feedback@llis.dhs.gov or visit www.llis.gov. 3