Technology_Guide_for_Communications_Interoperability+2006
Technology_Guide_for_Communications_Interoperability+2006
Department of Justice
Office of Community Oriented Policing Services
communications
Interoperability
A Guide for Interagency Communications Projects
Copyright © 2006 SEARCH Group, Incorporated. The U.S. Department of Justice
reserves a royalty-free, nonexclusive, and irrevocable license to reproduce, publish, or
otherwise use, and to authorize others to use, this book for Federal Government purposes.
This document may be freely distributed and used for noncommercial and educational
purposes. No part of this book may be reproduced in any form, by any means (including
electronic, photocopying, recording, or otherwise) for commercial purposes without the
prior permission of the U.S. Department of Justice or the author(s).
U.S. Department of Justice
Office of Community Oriented Policing Services
communications
Interoperability
A Guide for Interagency Communications Projects
By Dan Hawkins
Dear Colleague:
Collaboration is the key to successful interoperable communications. The same practices that pertain to planning,
purchasing, and managing traditional information technology systems apply to interoperable communications
systems. What makes interoperability projects inherently more difficult are the various needs, capabilities,
and operational practices of the participating agencies. Interagency collaboration is as important to achieving
interoperability as developing the appropriate technological infrastructure.
Having awarded millions of dollars to help metropolitan regions throughout the nation establish and enhance
their interoperable communications systems, the U.S. Department of Justices’ Office of Community Oriented
Policing Services (COPS Office) is keenly aware of the challenges that confront agencies working toward
interoperability. At the same time, through its work on the SAFECOM Program, the Office for Interoperability
and Compatibility (OIC) within the Department of Homeland Security has worked directly with emergency
responders from across the Nation to identify best practices in communications interoperability. It also
has provided the practitioner community with invaluable tools and information, such as the Statewide
Communications Interoperability Planning (SCIP) Methodology, to make the process of improving
interoperability more manageable.
This Tech Guide for Communications Interoperability: A Guide for Interagency Communications Projects shares what
we have learned and assists you with planning, procuring, and implementing your new communications system. This
publication is targeted at the entire emergency response community, not only the Law Enforcement community.
This guide is intended to provide you with practical information to support your effort to successfully establish
interagency, interdisciplinary, and inter-jurisdictional voice and data communications systems. By increasing
interoperability and information sharing among the nation’s emergency response communities, the safety of both
practitioners and the citizens they serve can be better secured.
We trust that you will find this guide helpful, and encourage you to visit www. cops.usdoj.gov and
www.safecomprogram.gov to learn more about the other numerous resources offered by the COPS Office
and the OIC.
Sincerely,
Contents
Acknowledgments .................................................................. xv
About the Author .................................................................. xvi
Part I: Chapter 1
What Is Communications Introduction—A Changing Environment ...................... 13
Interoperability? Public Expectations ................................................................ 13
Evolving Communications Needs........................................... 14
Developing Technologies........................................................ 15
The Interoperability Equation ................................................ 16
What Will Tomorrow Bring? .................................................. 18
Chapter 2
Key Challenges and Critical Elements ............................ 21
Recent Findings: Why Public Safety Can’t Talk ...................... 22
Incompatible and Aging Communications Equipment ..... 23
Limited and Fragmented Funding ..................................... 24
Limited and Fragmented Planning .................................... 25
Lack of Coordination and Cooperation............................. 25
Limited and Fragmented Radio Spectrum......................... 26
Critical Elements to Achieving Interoperability...................... 28
Governance ....................................................................... 28
Standard Operating Procedures ........................................ 28
viii
Chapter 3
Operability—Job #1 ....................................................... 35
A Proportional Perspective..................................................... 36
Extreme Operations—9/11 .................................................... 37
Important Conclusions...................................................... 38
National Incident Management System ................................. 39
Common Terminology ...................................................... 40
Integrated Communications.............................................. 40
Operational Building Blocks................................................... 41
Chapter 4
Interoperability in the Integrated Enterprise ................ 45
What is the “Enterprise”? ....................................................... 45
A Complex System of Systems ............................................... 46
The Call Arrives ................................................................. 46
The Call Is Dispatched....................................................... 46
First Responders Respond ................................................. 47
Service Is Delivered ........................................................... 47
Enterprise Integration ............................................................ 48
How Did Communicating Get so Complicated?................ 48
A Vision of Information Sharing............................................ 49
Information Sharing Concepts: SOA What?........................... 50
Common Terminology Aids Communication ................... 51
Stating Requirements for Information Sharing ...................... 53
The Good News on Stating Requirements......................... 54
Leadership Rules .................................................................... 54
See the Big Picture ............................................................. 55
ix
Chapter 6
Conduct a Needs Analysis............................................... 81
Needs Analysis 101: Assess Current Business
Processes .............................................................................. 83
Needs Analysis 102: Determine Stakeholder Needs ............... 89
The Goals .......................................................................... 89
Techniques ........................................................................ 90
Needs Analysis 103: Develop General System
Requirements....................................................................... 92
Describing Requirements .................................................. 92
Needs Analysis 104: Evaluate Buy-Versus-Build Options ........ 98
Chapter 7
Scope the Work To Be Done ......................................... 103
Commonly Contracted Services ........................................... 104
Project Management ....................................................... 104
System Design ................................................................. 104
Detailed Engineering Design ........................................... 104
System Installation and Optimization............................. 105
System Integration .......................................................... 105
Quality Assurance............................................................ 105
Acceptance Testing .......................................................... 105
Other Work To Be Done ....................................................... 106
Training ........................................................................... 106
Radio Site Development .................................................. 106
Frequency Coordination and Licensing ............................111
Assessing the Scope of Work To Be Done..............................113
What Are the Choices? .....................................................113
What Will You Handle Internally? ...................................113
Recommendations............................................................114
x
Chapter 8
Create a Project Plan .....................................................117
Project Planning 101: Set the Scope and Objectives...............118
Project Planning 102: Develop the Timeline......................... 123
Project Planning 103: Estimate and Deliver a Budget........... 123
Project Planning 104: Create a Risk Management Plan ........ 129
Project Planning 105: Communicate Plans and Progress...... 130
Communicating Across Agencies:
The Project Web Site ....................................................... 132
Graphically Communicating Roles: The RACI Matrix..... 134
Chapter 9
Acquire the System Components.................................. 137
System Acquisition 101: Groundwork .................................. 140
System Acquisition 102: The Art of Procurement ................ 145
System Acquisition 103: Create the Contract(s) ................... 148
Chapter 10
Implement the System.................................................. 155
Prologue to an Implementation............................................ 156
Further Define Roles........................................................ 156
Establish the Implementation Team................................ 158
Create the Implementation Plan........................................... 158
Implementation Plan Elements ....................................... 158
Sign, Seal, and Deliver!.................................................... 162
Manage Documentation....................................................... 162
Use Quality Assurance and Acceptance Tests ....................... 164
Testing ............................................................................. 165
Create Standard Operating Procedures and Train ................ 172
An Example .......................................................................... 173
Delta River County: As-Is ................................................ 173
Delta River County: To-Be ............................................... 175
Delta River County: The Implementation ....................... 176
Delta River County: Acceptance ...................................... 178
xi
Chapter 11
Transition to Long-Term Governance .......................... 183
A System of Systems ............................................................ 184
Project Closeout.................................................................... 185
Hold a Transition Meeting............................................... 185
Conduct an Open Review Meeting .................................. 185
Write a Final Report ........................................................ 186
Govern and Manage ............................................................. 186
Build Long-Term Governance Structures ........................ 186
Build a Sustainable Financial Structure ........................... 190
Create a Review Process ................................................... 193
Chapter 12
Develop Policies and Procedures ................................. 197
Integrate NIMS into SOPs .................................................... 198
Focus on Routine and Targeted Capabilities......................... 198
Targeted Capabilities ....................................................... 199
Establish and Use a Standard Method.................................. 200
Shared Systems in the Twin Cities ................................... 200
Shared Channels Under the Big Sky ................................ 201
Create Technical Policies and Procedures ............................. 201
Create Operational Policies and Procedures ......................... 202
ICS Communications Unit............................................... 202
Incident Dispatch Teams ................................................. 203
Emergency Traffic............................................................ 203
Channel Span of Control................................................. 204
Standard Language.......................................................... 205
Communications-Order Model ....................................... 205
Operational Unit Reporting............................................. 206
Build Incident Communications Plan Templates ................. 206
ICS 205 ............................................................................ 207
Tactical Interoperable Communications Plans ................ 209
xii
Chapter 13
Train and Exercise ........................................................ 213
Focus on Both Routine and Targeted Capabilities ................ 213
Train in Context.....................................................................214
Use Standardized Exercise and Evaluation Processes.............214
Discussion-Based Exercises.............................................. 215
Operations-Based Exercises ............................................. 215
Evaluations ...................................................................... 216
Chapter 14
Maintain the Technology ............................................. 219
Identify Responsibilities ....................................................... 219
Create a Technical Continuity of Operations Plan................ 220
Do Regular and Preventive Maintenance ............................. 220
Test at Least Monthly ...................................................... 221
Maintain System Security..................................................... 221
Prepare for System Changes ................................................. 222
Evaluate Potential System Upgrades................................ 222
Prepare for Regulatory Changes ...................................... 222
Chapter 15
Measuring Interoperability.......................................... 227
Why Measure Interoperability?............................................ 228
Cautious Measures .......................................................... 228
The Interoperability Assessment Scorecard ......................... 228
SAFECOM Interoperability Baseline Assessment............ 229
Conduct a Self-Assessment ................................................... 230
The Interoperability Self-assessment Scorecard .............. 230
Using the Self-Assessment Scorecard............................... 232
On the Horizon: Performance Measures .............................. 234
Measuring Effects, Not Capabilities ................................ 235
Performance Measurement Improves
Communications ............................................................. 236
Conclusion....................................................................... 237
xiii
Chapter 17
Data Communications.................................................. 285
Common Protocols and Standards....................................... 285
The Internetworking Effect.............................................. 285
XML—Universal Language of the Internet ..................... 287
Building Blocks for Interoperability ................................ 292
Wired Data Networks........................................................... 292
A Whole Lotta *AN Going On! ....................................... 292
Data Networking Evolution ............................................. 294
Wired Networks Keep On Keeping On ............................ 296
Wireless Data Networks ....................................................... 296
Common Principles......................................................... 297
Private Radio Technologies.............................................. 298
Commercial Radio Technologies ..................................... 299
Wireless Local Area Networks ......................................... 302
Rent or Own?................................................................... 309
xiv
Security................................................................................. 312
FBI Criminal Justice Information Systems
Security Policy ................................................................. 313
Securing Data Networks .................................................. 316
On The Horizon.................................................................... 319
Wireless Metropolitan Area Networks ............................ 319
Broadband Wireless Access for Public Safety .................. 320
Wideband Wireless Standards for Public Safety ............. 321
Project MESA .................................................................. 322
Standards: A Necessary, But Insufficient Condition........ 323
Acknowledgments
This publication was prepared by SEARCH, The National Consortium for Justice
Information and Statistics, Francis X. (Paco) Aumand III, chair, and Ronald P. Hawley,
executive director. The project director was Kelly J. Harris, deputy executive director
of programs. Dan Hawkins, director of public safety programs, wrote this publication.
Twyla R. Putt, manager, corporate communications, and Linda Townsdin, senior writer/
editor, edited this publication. Jane L. Bassett, publishing specialist, provided layout
and design. Chris Roebuck, webmaster, provided web site coordination. The federal
project manager was Debra Cohen, Ph.D., of the U.S. Department of Justice Office of
Community Oriented Policing Services (COPS).
Suggested Citation
Dan M. Hawkins, Law Enforcement Tech Guide for Communications Interoperability: A Guide
for Interagency Communications Projects, Washington, D.C.: U.S. Department of Justice
Office of Community Oriented Policing Services, 2006.
About Us
SEARCH, The National Consortium for Justice Information and Statistics, is dedicated
to improving the quality of justice and public safety through the use, management, and
exchange of information; application of new technologies, and responsible law and
policy, while safeguarding security and privacy.
We assist local, tribal, county, regional, and state agencies and organizations—including
law enforcement and public safety; first responders; prosecution; defense; adjudication;
detention; corrections and probation; and other disciplines, such as transportation,
drivers’ licensing, vehicle registration, public health, and social services—through a
broad array of activities, resources, and products. Our focus is on criminal history
systems, integrated justice information systems, information technology (planning,
purchasing, managing), and cybercrime investigation. Our services include in-house and
on-site technical assistance and training, resource development (web sites, publications,
white papers, conferences, workshops), public policy assistance, and model development
xvi
(model legislation, standards and procedures, best practices) in these focus areas.
SEARCH online resources provide information on law enforcement IT, integrated justice,
justice software solutions, and IT acquisition at www.search.org.
Dan has 25 years of experience in the public safety field, most recently as
communications technology manager for the state of Montana, where he managed the
development of a statewide radio system. Prior to that, he served in several positions for
the state, including Information Technology Operations bureau chief for its Department
of Justice, manager of the state’s Public Safety Communications Program, and training
officer for its Criminal Justice Information Network. He served as the FBI information
security officer for Montana and as adjunct faculty for both the Montana Law
Enforcement Academy and Fire Services Training School. Dan began his public safety
career as a deputy sheriff in a rural Montana county.
Dan holds a bachelor’s degree in criminal justice from Montana State University and
has completed advanced management programs with the state of Montana and IBM’s
Advanced Business Institute. He has held basic and intermediate Peace Officer Standards
and Training certificates, as well as several other certifications from the Montana Law
Enforcement Academy.
xvii
Review Committee
SEARCH extends its deepest thanks and appreciation to the following members of the
Communications Interoperability Tech Guide Review Committee, who participated in an
advisory capacity during the preparation of this Guide.
We would also like to thank members of the following agencies for contributing their
time and expertise to a review of this Guide: the Bureau of Justice Assistance and U.S.
Department of Justice’s (DOJ) Global Justice Information Sharing Initiative; the DOJ’s
Office of the Chief Information Officer; the U.S. Department of Homeland Security’s
(DHS) Office of Grants and Training, Preparedness Directorate; and the DHS Science
and Technology Directorate’s Office for Interoperability and Compatibility’s SAFECOM
Program. We are grateful to their efforts toward providing a unified federal voice to
agencies across the country seeking guidance on interoperability.
About
the
Guide
A Library of Tech Guide Resources
This Tech Guide on interoperable communications projects is intended
to serve as a companion guide to Law Enforcement Tech Guide: How to plan,
purchase and manage technology (successfully!). The original Tech Guide was
published in 2002 by the U.S. Department of Justice Office of Community
Oriented Policing Services (COPS) and was developed as a step-by-step guide
to help law enforcement agencies as they implement new technologies.
This Tech Guide is one of a series of four topic-specific Tech Guides funded
by the COPS Office. The four companion Tech Guides that will form a
comprehensive library of technology resources, along with the original Tech
Guide, are:
n Law Enforcement Tech Guide for Small and Rural Police Agencies: A Guide
for Executives, Managers, and Technologists
n Law Enforcement Tech Guide for Creating Performance Measures that Work:
A Guide for Executives and Managers
n Law Enforcement Tech Guide for Communications Interoperability: A Guide
for Interagency Communications Projects
n Law Enforcement Tech Guide for Information Technology Security: How to
Assess Risk and Establish Effective Policies
See Page 8 for details on how to download or order your copy of the original
Tech Guide.
About the Guide
Communications interoperability is such a big issue; how do you get your arms around the topic?
In recent years the term has been used in a variety of ways to mean different things to different
people. Most important, what does it mean to your agency and how do you approach it practically
and systematically to best serve the public?
Well, whether you’re replacing your entire radio system, replacing bits and pieces, or just looking
to improve communications with other agencies without spending money, the basics are the same.
Interoperability is built on solid foundations of leadership, cooperation, and care in understanding
just what you’re trying to accomplish. No amount of money can build a system allowing police,
fire, and emergency medical services agencies across different jurisdictions to talk to each other if
operational plans and procedures don’t support it. Usually we end up talking together only as
well as we’ve planned to.
Communications projects can be big and costly. Too often, their complexity has forced agencies
to focus on internal needs without paying enough attention to how they will communicate with
others. It’s easy to fall into the trap of considering your new voice or data system to be an isolated
project, unaffected by other systems that your agency and neighbors use. The result is usually
a system that is integrated with the agency’s other internal information and communications
systems, but incapable of interoperating with cooperating neighbors.
This Guide is designed to give you, an agency executive or project manager, background on the
subject of communications interoperability and tools to carry out technology initiatives that make
this interoperability possible. It is intended as a companion to the Law Enforcement Tech Guide:
How to plan, purchase and manage technology (successfully!), A Guide for Executives, Managers and
Technologists.
Many references are made to the “original Tech Guide”; you may want to have it handy to refer
to. Better yet, read it first and get an understanding of how technology projects in general are
successfully carried out!
Assumptions…
… About You
This Guide is intended for staff of law enforcement or other public safety agencies
who are responsible for carrying out a successful radio project. A good team is made of
many players doing their own part.
If you’re a chief executive of the agency, welcome aboard! Your contribution to the
project is going to be critical. If you’re a technical services manager, we’re happy to
have your expertise in both the business of your agency and how technology is aligned
with its goals. Since your daily responsibility is to ensure that all systems work together,
understanding the added complexities of interagency communications is vital. And if
you’re a technical expert who gets the calls in the middle of the night to fix the pieces
that have taken an unexpected holiday, we empathize! Your interest in these systems
over their lifecycles hits right at home, doesn’t it?
Maybe you’re the officer or communications manager who has been assigned
responsibility within your agency to oversee a new voice or data radio system that
must be compatible with other agencies with which you work. Every bit of project
management experience you’ve gathered will probably be put to work to make sure
these critical and often expensive systems come together on time, within budget, and
offering the capabilities everyone expects. You’ll need a broad understanding of how
your agency uses radio communications to provide services, how technology is chosen
to support them, and why the efforts of a cross section of people in your agency are
needed to bring about a successful project.
Or maybe you’re the project manager dedicated solely to this effort. If so,
congratulations! Not many folks get to concentrate on a single project. More likely, your
skills are valued elsewhere in the agency, too, and you have no shortage of projects on
your desk. This may be only one of several technology initiatives you’re working on that
demands your skills in combination with a decent understanding of the technologies
involved, business practices affected, and common pitfalls others have faced.
You might think that your agency is too small or your project too tightly funded to have
a full-time project manager. That certainly might be the case and if you’re managing
FYI:
We tell you how to
projects in such an agency, you’re most likely to have other routine duties—and maybe
get your own copy even other projects. This Guide is especially useful to you because it provides a how-to
of the original Tech guide with tips, checklists, and recommendations for your efforts—large or small!
Guide on Page 8. This Guide will provide important background for all team members on how
interoperability in communications systems is achieved. Its companion Law
Enforcement Tech Guide will also be indispensable in your efforts. Get your own copy!
About the Guide
… About Your Project
We assume that you already have voice radio capabilities in your agency and are either
replacing systems nearing the end of their useful lives or carrying out a project to
improve communications between existing systems. Maybe you’re implementing a
data radio system to augment voice communications and add new field capabilities
or provide direct access to important computer systems. While this Guide doesn’t
address mobile data or computer systems in depth, it does address important aspects
of the radio environment for both voice and data projects. Its central focus is on how to
improve interagency communications across your jurisdiction.
However you approach it, please take time at some point to read the entire Guide. You
will find useful background for current, as well as future, projects.
The Guide concludes with an important appendix and fold-out with the Department of
Homeland Security SAFECOM Program’s Interoperability Continuum. This tool provides
a standard set of success elements for interoperability. It also provides a snapshot of
how progress is made from limited to highly interoperable public safety services. These
elements are addressed from a project perspective throughout this Guide.
Our hope is to provide tools to help with your project. Icons are used in the margins
as they were in the original Law Enforcement Tech Guide, to highlight areas of specific
interest to particular project team members. Executive sponsors, for example, should
keep an eye out for the shield icon shown below that is used to mark key points for
project champions. Elsewhere, you will also find tips, checklists, and definitions along
the way that will be useful in your quest to improve communications interoperability.
In appendixes at the end of this Guide, we have included a glossary, resource materials,
and sample documents.
Definition of Icons
Executive Sponsors
Executive sponsors are the project spokespersons, decision makers, and leaders of
the agencies involved in the interoperability effort. Generally, they are the highest
ranking decision makers within their organization. This icon is used to highlight
recommendations and advice directed particularly at them.
Operational Experts
Operational experts are those communications users who understand the business
processes of their respective agencies and how operations are conducted with others.
Typically, these persons are senior line supervisors with experience in interagency
operations. They should keep an eye out for this icon in the margins.
Technical Experts
Technical expertise is critical for analysis of the current communications technology
environment and evaluation of the technical aspects of proposed solutions. This icon is
used to draw attention to material that will benefit technical experts.
Project Manager
Since the project manager has such a pivotal role, we could have used this icon on every
page of the Guide. We have limited ourselves to using it to highlight aspects most
commonly handled by the project manager.
About the Guide
Stop Sign
Every technology project is challenged to navigate in a veritable minefield of
obstacles. When you see this icon, carefully read about pitfalls that we are hoping you
will avoid.
Grant Requirements
This icon is used to draw your attention to interoperability aspects that may be
affected by requirements of the grants funding your project. Even if your project is
funded by other means, one of your neighbors is probably relying on grants for some
part of its system and you will want to learn how grant requirements are shaping its
interagency communications plans.
Regional
Multijurisdictional, regional efforts bring the highest level of communications
interoperability. This icon is used to draw your attention to advice and
recommendations on how to make those efforts most successful.
Tips
This Guide is full of tips, but some need particular attention. We’ll use this icon for
ideas you might find immediately useful.
Checklists
We all need lists to organize a collection of thoughts or tasks. Part II of this Guide has
a number of checklists to help you keep track of the recommendations that we have
provided.
Interoperability Continuum
As mentioned, the SAFECOM Interoperability Continuum is an important and useful
tool for understanding how communications systems evolve from minimal to optimal
levels of interoperability. It is included in this Guide as a back cover foldout preceded
by an appendix describing its elements in depth. This icon is used to highlight those
elements as they are addressed throughout the Guide.
TECH GUIDE
Original Tech Guide Reference
ORIGINAL
The parent Tech Guide contains many useful tools, charts, and instructions for
conducting various tasks. When you see this icon, you will be directed to a specific
s
page, or range of pages, in the original Tech Guide.
About the Guide
If you’re with a fire, emergency medical services, or other nonpolice agency, don’t get
hung up on the “Law Enforcement” part of the Tech Guide’s title. It was produced for
that audience, but the principles and practices provided are applicable across public
safety technology, generally. It has been used as a textbook by the U.S. Department
of Justice and U.S. Department of Homeland Security to train dozens of jurisdictions
from around the country in managing their interagency projects.
There it is broken down into its separate parts as Portable Document Format (PDF) files
so you can download or read one at a time.
And finally, hard copy versions are distributed by the COPS Office. To request one,
contact the COPS Office Response Center at 800.421.6770 or e-mail
[email protected].
Part I:
What is
Communications
Interoperability?
CHAPTEr 1
InTrODUCTIOn—
A CHAnGInG EnvIrOnmEnT
Chapter 1:
Introduction—
A Changing Environment
In recent years, dramatic criminal, terrorist, and natural disasters—and seemingly
endless post-incident inquiries—have seared into the public mind the importance
of seamless emergency services. Today more than ever, the public expects those
services will be delivered regardless of long histories of turf battles between agencies
and jurisdictions. Public safety as an entity—the collective of police, fire, emergency
medical services (EMS), and supporting agencies—is challenged to integrate services
across these boundaries to serve a public that’s not easily separated by administrative
Interoperability
lines or simple classifications of calls.
is the ability of
agencies to work
together toward Interoperability is the ability of agencies to work together toward common ends. It
common ends. depends on a common vision of what those “ends” are and how separate capabilities
are combined to serve them. As with most government services provided in this
day and age, public safety response to emergencies is enabled by technology.
Telecommunications and information services, more specifically, are key enablers to
effective emergency services.
Public Expectations
What does the public expect? That’s not an easy question, but when Mrs. Smith calls
9-1-1, she doesn’t want to hear about turf issues and technological incompatibilities.
She expects that services will be delivered promptly and effectively to address her
emergency. No amount of explanation of jurisdictions, policies, or radio failures will
matter (or be acceptable) in time of need.
The public expects that emergency responders are able to communicate with one
another. Expected outcomes of that ability, in management terms, include:
• Responder accountability – That those brave souls who “face the elephant”
aren’t lost in the fog of battles.
• Coordinated incident management – That response to incidents isn’t “sliced
and diced” by administrative, operational, or jurisdictional boundaries.
1 Part I: What Is Communications Interoperability?
One challenge that follows is simply how to provide radio coverage. It’s an
unfortunate, but inescapable, fact of today’s public safety environment that the more
widely dispersed the responders, the more difficult it is to provide them with reliable,
high-quality voice and data network services. Officers in shopping malls, firefighters
in large office buildings, and mountain rescuers alike are too often in the unreliable
margins of radio networks where any information exchange is difficult. Increasingly,
we rely on the lowly handheld radio to connect responders, making coverage an even
greater challenge.
Public safety agency managers have to work hard to assure that field personnel are
reliably connected for safety purposes and for management of operations. While
Communications
interoperability
first responders are ideally always connected to the organizational infrastructure
is critical for that supports their supply of and demand for information, the emergency
information environment doesn’t always cooperate. Dense urban canyons, tunnels, and ever-
sharing. rising electronic noise are just a few examples of modern life that increasingly affect
the radio environment.
Information powers the modern police officer, firefighter, and EMS provider. Whether
working individually or in tandem with others during a response, first responders
have to receive timely information about the incident, including location, scope,
Chapter 1: Introduction—A Changing Environment
1
who else is responding, and tactical plans. Likewise, the information they provide in
response can mean the difference between life and death for citizens, not the least of
whom are the responders themselves.
Developing Technologies
Radio communications is a venerable staple in the arsenal of public safety tools. It has
only become more so in modern times.
How times have changed! While the Figure 1-1: Detroit Police Department
melodious sounds of today’s dispatches Station KOP (1928)
Cooperators:
Any agency,
are hardly entertainment, our radio
organization, systems have come far from those one-way days. Gone is the time when radio simply
or person that served to connect responders and dispatch. Today, modern police, fire, and EMS
operates jointly agencies around the country rely on voice and data networks that share information
or cooperates wirelessly in all directions: vertically among levels of command, horizontally between
with your agency functional subdivisions, and further yet across jurisdictional boundaries.
and with which
you need to
communicate by
Science and industry regularly improve our ability to make different technologies work
radio. together. Indeed, it’s getting more difficult to distinguish radios from computers and
wireless networks from wired pieces strung among them. Technological interoperability
first achieved through integration of internal voice and data capabilities now allows us
to connect similarly integrated systems with external cooperators.
1 Part I: What Is Communications Interoperability?
Elsewhere, developing technology has given us the means to get more users on
a frequency, more data through channels, and the ability to assign “talkgroups”
dynamically based on the needs of the moment. Technology has evolved so that
we can now link disparate radio systems, allowing users on one type of network to
talk with those on another across their shared operational areas. And it has given us
the ability to leverage the capabilities of wireless data to reduce demand for critical
voice channels.
1
See http://www.safecomprogram.gov.
Chapter 1: Introduction—A Changing Environment
1
This ability to talk is the sum total of interagency operational plans, common
procedures, and enabling technologies, multiplied by the effects of training and
exercises. The best interagency plans and procedures are a complex function of
standardized incident management systems and common terminologies. Funding
and other resource limitations are often confounding factors in efforts to solve
this equation.
Further federal and state efforts are helping with this bit of algebra. The U.S.
Department of Justice, through its Office of Community Oriented Policing Services
(COPS), and the DHS, through the Federal Emergency Management Agency (FEMA),
have cooperatively granted hundreds of millions of dollars to local agencies since the
terrorist attacks of September 11, 2001, to improve communications interoperability.
In addition, the DHS Office of Grants and Training has distributed billions of dollars
to public safety agencies through State Homeland Security and Urban Area Security
Initiative (UASI) grants, much going to improve communications in response to
terrorist events. Even funds provided through pre-existing federal grant programs
are in large share today being used to update and enhance the country’s public safety
communications infrastructure.
Efforts to solve the interoperability equation are probably affecting your work,
whether you’ve been aware of it or not.
2
See Washington’s SIEC web site at http://isb.wa.gov/committees/siec/.
3
See Virginia’s interoperability web site at
http://www.interoperability.publicsafety.virginia.gov/.
1 Part I: What Is Communications Interoperability?
Well, it’s easy, if sad, to imagine that emergencies and disasters capturing national
attention will continue to occur. Communications needs will evolve as our response
capabilities become more complex and sophisticated. Technology will surely continue
to offer opportunities for greater interagency communications and challenge our
ability to employ it without disrupting what’s already been achieved. And our
collective efforts will help solve the interoperability equation.
NTFI reported out five key reasons why public safety can’t talk.4 From a policy and
operation perspectives, they are as follows:
• Incompatible and aging communications
equipment
• Limited and fragmented funding
• Limited and fragmented planning
• Lack of coordination and cooperation
• Limited and fragmented radio spectrum.
We’ll get into how these challenges can be addressed in Part II of this Guide, How
is Interoperability Achieved? Let’s take a look here at how these challenges have
developed into national problems.
4
Why Can’t We Talk? Working Together to Bridge the Communications Gap to Save Lives, National Task
Force on Interoperability, February 2003. Available at
http://www.ojp.usdoj.gov/nij/topics/commtech/ntfi_guide.pdf.
Chapter 2: Key Challenges and Critical Elements
23
Incompatible and Aging Communications Equipment
The lifecycle for radio systems has traditionally been very long, sometimes
exceeding 20 and even 30 years. Equipment used in these systems is customarily
expected to have an 8-to-10-year service life, yet more than one-half of agencies
currently exceed that.
A survey of 1,334 state and local law enforcement agencies conducted in 1998 by
the National Law Enforcement and Corrections Technology Center for NIJ showed a
60 percent of
direct correlation between the age of systems and respondents’ assessment of their
state and local
law enforcement
radio communications effectiveness.5 Sixty percent reported aging equipment to be
agencies report a moderate to major problem. Local law enforcement systems averaged 9 years in
that aging radio service, while state systems averaged even longer—15 years. According to reports
communications issued by Public Safety Wireless Network (PSWN), a joint initiative of the U.S.
equipment is a Departments of Justice and Treasury that is now part of SAFECOM, local fire and
problem. emergency medical services (EMS) systems average 10 years.6
When characters Roy Desoto and Johnny Gage showed us (well, at least some of us)
just how exciting communications could be during the 1970s hit television show
“Emergency!”, radio technology choices were few and compatibility was high. Their
call sign, KMG365, was and still is assigned to a VHF (Very High Frequency)-high
band, analog FM (frequency modulated) base station. The call sign and station
are still in use by Los Angeles County, although probably with equipment of more
recent vintage!
Unfortunately, some agencies are still using radios purchased new when “Emergency!”
Options for police,
debuted. The simple fact that the radios still work is amazing. It says something
fire, and EmS radio
have blossomed about the quality of equipment manufactured for lengthy public safety use, but more
in relatively recent about historically limited technology choices that lead (or force) agencies to upgrade.
history. Options for police, fire, and EMS radio have blossomed in relatively recent history,
much as we’ve seen wireless technologies explode in the consumer sector.
5
Taylor, Mary J., et al., State and Local Law Enforcement Wireless Communications and
Interoperability: A Quantitative Analysis, NCJ 168961 (Washington, D.C.: U.S. Department of Justice,
Office of Justice Programs, National Institute of Justice, January 1998). Available at
http://www.ncjrs.org/pdffiles1/168961.pdf.
6
PSWN Program Analysis of Fire and EMS Communications Interoperability, Public Safety Wireless
Network Program Management Office, prepared by Booz, Allen & Hamilton Inc., April 1999.
Available at http://permanent.access.gpo.gov/websites/safecomprogramgov/www.
safecomprogram.gov/admin/librarydocs9/fireems_interop_study.pdf.
2 Part I: What Is Communications Interoperability?
Regional incompatibilities have grown as agencies have upgraded one by one to meet
pressing internal needs. Because lifecycle needs vary, separate agencies within a single
jurisdiction often end up replacing systems at different times, making needed changes
that result in additional interoperability challenges. The costs of supporting old
equipment and technologies dropped by manufacturers have led agencies across the
country to upgrade systems. In many cases, their partners and neighbors were unable
to do likewise.
The result today is that we have, for example, rural fire departments using radio
technologies pioneered more than half a century ago while larger, neighboring
jurisdictions have migrated to higher frequency bands, digital channels, and trunked
systems. Incompatibility is the result.
There has never been a national strategy for funding public safety radio costs.
Local radio systems for police, fire, and EMS are funded by every means available
to government, from general appropriations and bonds to grants and bake sales.
Local, tribal, and state systems, alike, are most often funded as one-time projects.
Their ongoing costs—including maintenance, licensing, network services, training,
replacements, and other operating expenses—are annually shoehorned into tight
budgets. By contrast, basic and enhanced 9-1-1 services around the country are
funded similarly from state to state. Recent congressional action will standardize 9-1-1
The value of
funding further.
America’s public
safety radio It’s no wonder such fragmented funding for public safety radio has evolved over time.
infrastructure is The value of America’s investment in it is staggering. In 1998, it was estimated to be
staggering. worth $18.3 billion7—and that’s just for equipment and fixed infrastructure. This
7
LMR Replacement Cost Study Report, Public Safety Wireless Network, prepared by Booz, Allen &
Hamilton Inc., June 1998. This report and figure is currently the most comprehensive available for
the replacement costs of land mobile radio (LMR) equipment owned by local, state, and federal
governments. Available at http://www.safecomprogram.gov/NR/rdonlyres/B69361FA-9AC6-
4126-B971-83DF30FED932/0/lmr_coststudy.pdf.
Chapter 2: Key Challenges and Critical Elements
2
commonly cited figure does not include system installation, testing, training, or other
implementation costs. Complete replacement of existing public safety radio systems,
with all associated costs, would total two or more times this figure.
The net effect of limited and fragmented funding for public safety radio systems is
great diversity between systems and long replacement cycles across the country.
We’ll have more to say about the importance of operational planning and
coordination shortly.
2 Part I: What Is Communications Interoperability?
History and operational needs have crowded users to the lower ends of the spectrum.
more than half of all The vast majority of public safety radio systems—both voice and data—operate
agencies operate in in four of the lower bands. More than half of the agencies in the country operate
vHF-high band. their primary voice systems in a single one: VHF-high band.8 Additional channels in
current bands are virtually unattainable in many parts of the country.
8
VHF-high band for local and state agencies runs from 150 to 174 megahertz (MHz). According to
supporting documents for PSWN’s LMR Replacement Cost Study, almost 57 percent of agencies make
primary use of it, while fewer than 6 percent used 800 MHz. See footnote 7, page 24.
Chapter 2: Key Challenges and Critical Elements
2
When an agency moves its radio communications to a “new” band, the technological
divide of operating across bands brings fresh challenges to talking directly with
previous cooperators. Other technologies, such as console patches, have been used for
years to link agencies on different bands, but these bring their own limitations and
require additional planning. Remember the planning challenge? Such approaches
to resolving the effects of fragmented spectrum are, to put it simply, just patches.
They’re less than ideal, but unfortunately necessary.
“Location, location, location,” they say in the world of real estate. Location in the
wireless world is equally critical, but here we’re not just talking about geography.
We are also referring to where a system operates within the radio spectrum! Each of
the 10 bands is best suited for different purposes and the highest ones are entirely
unsuited for unit-to-unit voice systems as we know them today; they’re used for
microwave links. And needs vary across the country. For example, urban areas
have great demand for channels in the higher bands offering the best building
penetration. By contrast, wide-area systems necessary in rural and statewide
jurisdictions are most economical in the lower bands where range is greatest.
Remember the funding challenge?
The highest
frequency bands The net effect is best described as increasing fragmentation that reduces
are unsuited for interoperability. The NTFI report also noted that public safety has a growing need
voice systems as for wireless services beyond traditional voice operations. Mobile data, automatic
we know them vehicle location, and other types of systems increase demands on a finite public
today. safety spectrum. Beyond that, growing commercial and private demands for wireless
services brings intense competition for limited resources that otherwise might be used
for public safety.
They have also identified stages along each element, recognizing that interoperability
isn’t an either/or proposition—it’s a matter of degree. Interoperability improves as
agencies progress with each of these elements. SAFECOM’s Interoperability Continuum,
found here as the foldout rear cover, depicts these elements and stages. Briefly, these
ideas are summarized here and incorporated throughout this Guide.
Governance
As noted by NTFI, limited coordination and collaboration between agencies is a
key reason why we can’t talk. Regular collaboration between key staff members of
agencies and across disciplines improves this situation, but formal committees serving
regional needs and working with statewide efforts are best.
Frequency of Use
Interoperability improves as agencies use their adopted techniques, procedures,
and technologies more frequently and broadly. A minimal, but important, level is
reached as those methods and means are used for planned multiagency events. It is
further improved by common use during localized emergencies and further yet as
incorporated into regional incident management systems. Optimal levels are reached
as they are used on a daily basis throughout the region.
Technology
There are five identifiable technological means of interagency communications,
particularly by radio:
1. Swapping radios.
2. Using gateways between independent systems.
3. Sharing channels.
4. Sharing proprietary systems.
5. Sharing standards-based systems.
Higher levels of interoperability are reached as the predominant means progresses
toward shared systems.
It’s important to note that the steps from minimal to optimal levels of interoperability
along each element in SAFECOM’s Interoperability Continuum are progressive. That is,
they build on one another and don’t necessarily exclude preceding steps. For example,
individual agency communications SOPs are still important when joint or regional
ones are in place. Ideally, the two closely mesh. Likewise, in-service orientations on
equipment are still important, even when regular, comprehensive regional training is
in place.
If it isn’t already apparent, planning and coordination between agencies are basic
principles behind the Interoperability Continuum’s critical elements.
Planning for interagency operations, generally, varies greatly from one part of the
no communications country to another and between levels of government. Where inadequate operational
system can make plans exist, communications suffer tremendously and interoperability is practically
up for inadequate impossible. Poor communications can and unfortunately often do hinder operations,
operational plans. but no communications system or set of interoperable systems can make up for
inadequate operational plans.
Throughout this Guide, we refer to the events of September 11, 2001 and after-action
reports to highlight issues of interagency communications. The sheer magnitude
of those events provides a powerful microscope for examining not only internal
operational demands on agencies under such extraordinary circumstances, but also
interoperability needs.
We all owe a huge debt of gratitude to the agencies rich with experience and history
that hardly volunteered, but valiantly responded, that day and now share their lessons
learned. We use those lessons here not critically, but to share the benefit of quality
analyses arising from the World Trade Center and Pentagon maelstroms.
Though the magnitude of those events and scale of response, we hope, are beyond what
any jurisdiction will face in the future, our belief is that lessons highlighted here apply
to public safety operations at all scales.
3 Part I: What Is Communications Interoperability?
A Proportional Perspective
In trying to understand what communications interoperability is and how it relates
to daily requirements, it’s important to note that radio is first and foremost used for
delivering services day-by-day to Mrs. Smith. Her emergency services are primarily
provided by local agencies—usually by a single one for any given call. Consequently,
the lion’s share of public safety radio communications take place internally between
units of individual local agencies.
In terms of sheer volume, communications demands across all types of public safety
response stack up like this:
1. Internal communications within individual local agencies.
2. Interagency communications between like agencies from adjoining
jurisdictions, such as between city police and county sheriff or between
neighboring fire companies.
3. Interagency communications between different types of responders, such as
police and fire, in the same jurisdiction.
Chapter 3: Operability—Job #1
3
4. Interagency communications between different types of responders in
neighboring or distant jurisdictions.
Extreme Operations—9/11
A great deal has been written about emergency response in New York City during
the World Trade Center attacks of September 11. In the year following the attacks,
the New York Police Department (NYPD) and the Fire Department of New York
(FDNY) collaborated with McKinsey & Company, business and organizational
performance consultants, to produce reports on improving the agencies’
preparedness. Though the reports contain much information on response during
the incidents and detailed recommendations, we just want to touch on operational
communications aspects they addressed.
3 Part I: What Is Communications Interoperability?
At the time of the attacks, the NYPD was operating with a new radio system that
offered great capacity and resiliency over its previous systems. The police system
also was significantly more modern than the FDNY’s, which had been struggling to
implement a new one of its own.
According to McKinsey & Company, the police department’s radio infrastructure did
not fail on 9/11. Less than 15 percent of responding officers reported experiencing
“dead air” failures. On the other hand, radio traffic was “cluttered” early in the
incident. Fewer than half of the officers reported being able to clearly decipher traffic
early on.
One of six critical recommendations made to the NYPD focused on its radio
communications. It recommended adoption of radio procedures that optimized
information flow, producing a radio discipline that would minimize demand for
channels and provide a capability to push critical information ahead of other traffic.9
Important Conclusions
Two important conclusions can be drawn from these findings:
Conclusion #1: An agency’s internal operational capacity to receive, digest,
disseminate, and act on information can be overwhelmed, even if technically its
communications systems aren’t. Operability is directly affected by nontechnical pieces
of response systems that define, among other things, rules for moving information
around and what constitutes a manageable span of control. Technology can deliver
information overload as well as it can solve problems.
Conclusion #2: The great bulk of information sharing needs between first
responders—and thus communications capacity of one form or another—are
internal.
9
Improving NYPD Emergency Preparedness and Response, McKinsey & Company, August 19, 2002.
Available at http://www.nyc.gov/html/nypd/pdf/nypdemergency.pdf.
10
Increasing FDNY’s Preparedness, Executive Summary, McKinsey & Company, August 19, 2002.
Available at http://www.nyc.gov/html/fdny/html/mck_report/toc.shtml.
Chapter 3: Operability—Job #1
39
Judging from these reports, communications operability was a greater
problem in New York City on 9/11 than interoperability. We believe this would
be true in most any jurisdiction under comparably taxing circumstances, mainly
because the agencies’ own management needs become critical as they struggle to
maintain a manageable span of control and accountability of responders.
But when large-scale emergencies and disasters occur, response and communications
systems are stressed. Informal incident management systems dissolve.
The NIMS Incident Command System (ICS) is built from 30 years of experience with
large-scale emergencies. Based on military models, early incident command systems
emerged in the public safety world through efforts of California firefighting and
emergency management agencies to deal with devastating wildfires. It broadened and
evolved over the years to serve emergencies and disasters of all types.
Two key ICS management characteristics are particularly notable when it comes to
communications interoperability. NIMS ICS is based on:
0 Part I: What Is Communications Interoperability?
Common Terminology
Common terminology is clearly important in interagency communications since it’s
not much use to talk to your cooperating neighbors if you can’t understand them! But
the concept goes much further.
We deal with practical and important aspects of common terminology in Chapter 12,
Develop Policies and Procedures.
Integrated Communications
How we play at Under ICS, communications and incident action plans have to be integrated to
the occasional capture management goals and operational objectives. This notion of integration is
“big one” will be more than just lip service, too. Since responder safety and effectiveness are usually
determined mostly closely related to how well communications supports them, the capacity of the
by how we play at
communications systems to support operations is continuously taken into account
the frequent little
ones that occur in action planning. A separate communications unit is often established early in
every day in our multiagency and large-scale responses managed under ICS to support the integration
local place. effort. This is to bring all communications functions close to incident management,
— Fire Command rather than having them managed far from pressing operational considerations.
Chief Alan
Brunacini, Communications plans and technology can be used to reinforce the command
Phoenix (Arizona) structures and operating principles embodied in incident management systems.
Fire Department
Use of a NIMS-compliant incident command system is critical in large-scale response.
It can be equally important during smaller emergencies that provide the opportunity
11
National Incident Management System, U.S. Department of Homeland Security, March 2004.
Available at http://www.fema.gov/pdf/nims/nims_doc_full.pdf.
Chapter 3: Operability—Job #1
1
to perfect response. Common terminologies and principles of communications
integration take root in routine response. They provide the building blocks of
interoperability through better operability.
While operations come first, interoperations are inevitable. Building command and
communications systems for interoperability across jurisdictions and disciplines is
just good business.
12
U.S. Government Accountability Office, Homeland Security: Federal Leadership and
Intergovernmental Cooperation Required to Achieve First Responder Interoperable Communications, GAO-
04-740 (Washington, D.C.: July 2004) p. 8.
Part I: What Is Communications Interoperability?
FACTS:
Service is Delivered
Response is well underway, with a great deal of technology enabling it. A transporting
ambulance may have been dispatched by this point and street maintenance alerted
to divert traffic around the accident. Medical control may have been established
through a nearby hospital and its emergency room notified of the impending arrival
of patients. More systems are tied in. Eventually patients are delivered, cars towed,
accident and run reports filed, and responders returned to routine duties.
The hapless victims of our hypothetical accident don’t know—and probably don’t
care at the time—about all that goes into delivering emergency services to them. All
they know is that they need help. All the policies, procedures, skills, and technologies
that are involved in delivering effective emergency response need to come together at
that moment, and at that spot.
Part I: What Is Communications Interoperability?
Enterprise Integration
This example provides a snapshot of the public safety enterprise. It shows the
complexity of technologies used to support emergency operations generally, and
interagency operations in particular. Information flowing across wired and wireless
networks, through computers and voice systems, allows interagency services to be
delivered seamlessly. It allows them to be integrated across the public safety enterprise.
Information is moved from place to place through different systems and modes of
sharing. For example, the location of this hypothetical incident most likely would
have initially been reported by voice over the telephone. Nearly simultaneously,
the call-taker received an idea of the general vicinity of the accident from the
caller’s location information retrieved digitally with the call. That street address
was displayed textually and later, perhaps, also graphically for the dispatcher. More
and more commonly these days, a precise location may have been automatically
transmitted wirelessly via satellite by one of the involved vehicles, and then relayed
via telephone to dispatch by a telematics operator, such as OnStar.® In our example,
the incident location was subsequently passed wirelessly to the field using both voice
and data.
Perhaps you have already faced the challenge of integrating systems to deliver
information so complexly. If so, you’re one step up on the broader challenge of
When providing communications interoperability. You understand that a lot more than
communications technology goes into making systems talk to one another. And if you’ve been
break down, who
responsible for connecting services across agencies, you probably already recognize
are you going to
call? 9-1-1?
that no amount of interoperable technology will bring responders together when
their operations are fragmented. All the king’s horses and all the king’s men can’t
make one response out of many if procedurally agencies aren’t “interoperational”
already. This, quite frankly, has nothing to do with technology.
Recent events and disasters have highlighted greater needs for sharing information
and coordinating incident management across all emergency services. This requires
communications interoperability. Ultimately, an enterprise view of services integrated
across procedures and technology is necessary to satisfy these needs.
In the public sector, some of the greatest advancements in information sharing have
occurred through the U.S. Department of Justice’s Office of Justice Programs and
its Global Justice Information Sharing Initiative—generally referred to simply as
“Global.” The Global Advisory Committee (GAC) has served as an advisory body to
the U.S. Attorney General since 1998. Its mission is to support broad exchange of
justice information across jurisdictions and levels of government. It “seeks to improve
the administration of justice and protect the nation’s public by promoting practices
and technologies for the secure sharing of justice information.” 13
Since September 11, Global’s scope of advice has expanded to the broader public
safety enterprise. For example, the Global Justice XML Data Model14 has had a
significant impact on how CAD and RMS are being designed for information sharing.
Information-sharing concepts have evolved greatly through efforts to integrate justice
systems. Global has provided a simple vision of information sharing that is very
applicable to communications interoperability.
13
Global Justice Information Sharing Initiative Advisory Committee Charter, October 15, 2002.
14
For further information on the Global Justice XML Data Model, see the U.S. Department of
Justice, Office of Justice Programs web site at http://it.ojp.gov/jxdm/.
0 Part I: What Is Communications Interoperability?
Such a vision would be followed by more specific goals laying out how the project will
improve procedures and systems to ensure that the needed information is shared.
The Global Infrastructure/Standards Working Group has established requirements
for justice information sharing16 that are equally applicable to interoperable
communications systems:
• The architecture must recognize innumerable independent agencies and
funding bodies from local, state, tribal, and federal governments.
• Information sharing must occur across agencies that represent divergent
disciplines, branches of government, and operating assumptions.
• The infrastructure must be able to accommodate an infinite range of scales,
from small operations with few participants in a rural county to national
processes that reach across local, state, tribal, federal, and even international
boundaries.
• Information sharing must occur among data sources that differ widely in
software, hardware, structure, and design. [And uniforms worn, we might add.
– Ed.]
• Public-sector technology investment must reflect and incorporate the lessons
and developments of the private sector.
• The infrastructure design must be dynamic, capable of evolving as the
information sharing requirements change and the technology is transformed.
These are worthy strategic goals for all communications interoperability projects.
15
Adapted from A Framework for Justice Information Sharing: Service-Oriented Architecture (SOA),
Global Infrastructure/Standards Working Group, December 9, 2004. Available at
http://it.ojp.gov/documents/20041209_SOA_Report.pdf.
16
Ibid., pp. 2–7.
Chapter 4: Interoperability in the Integrated Enterprise
1
For example, work conducted by SEARCH in recent years in the field of justice
information exchange modeling has produced a conceptual framework for
understanding the flow of information between agencies, a methodology for
analyzing and reengineering processes, and tools for modeling information
exchanges. Work is now underway using these means for characterizing, classifying,
and quantifying first responder interagency communications.17
The importance of these terms and concepts is not so much that they bring some
great revelation of how we might share information, but rather in providing a
common terminology useful for stating requirements in a standardized manner
through which a system of systems can be designed. For example, we may require that
17
SEARCH has undertaken two projects to develop information exchange package documentation
for tribal, law enforcement, and other first responders. These projects were funded by the COPS
Office under Cooperative Agreements #2002CKWXK006 and #2002CKWXK047. For a description,
see http://www.search.org/programs/info/xml-iep.asp.
18
Roberts, David J., Integration in the Context of Justice Information Systems: A Common Understanding
(Sacramento, Ca.: SEARCH, The National Consortium for Justice Information and Statistics,
updated 2004). Available at http://www.search.org/files/pdf/Integration.pdf.
2 Part I: What Is Communications Interoperability?
stolen vehicle information is pushed to an officer whenever a traffic stop is made. That
tells a business process analyst or system designer that certain exchanges are required
without further, overt action by the officer. However the information is ultimately
provided—whether it is wrapped in standard operating procedures by voice from
dispatch or encoded in the rules of a mobile data system—is a subsequent matter of
design, and is probably influenced by additional requirements.
SOA means a great deal more in the design of integrated systems than is addressed
here, but its influence on developing enterprise information systems is important.
Public safety information and communications systems will increasingly be built
upon SOA, as broader governmental systems are today. The integrated enterprise
increasingly relies on this architectural framework.
They can help us understand information sharing needs across a complex enterprise
to achieve interoperability.
19
See http://www.doj.state.wi.us/les/TIME/eTIME.htm.
Chapter 4: Interoperability in the Integrated Enterprise
3
Stating Requirements for Information Sharing
Our success in creating communications interoperability is directly related to our
ability to describe operational requirements for interagency exchange of information.
Projects to improve interoperability may be well-guided from the start with a broad
vision statement, such as that presented above, but they have to develop operational and
When information functional requirements to yield communications systems that meet day-to-day needs.
sharing works, it is
Unfortunately, system procurement documents often focus on technical requirements
a powerful tool.
rather than operational needs, which limits proposed solutions and forces acceptance
—The 9/11
merely based on technological measures.
Commission report
(Page 419)
In seeking to improve interoperability, we talk about police department ‘A’
needing to talk to fire department ‘B’ or something similarly broad. Left with no
better description of the processes, events, conditions, and content of the needed
communications, system designers get a one-dimensional picture of what’s needed.
Interoperable systems design is driven much more by operational requirements when,
for example, the need is described as follows:
During a barricaded suspect operation, the police tactical team leader notifies the fire
interior attack crew leader that suppression efforts are needed within a secured portion
of the building.
It may seem obvious that the need would be satisfied by a common radio channel
or talkgroup readily available for a voice exchange between portable radios.
Our success
in creating That may be the most common way to carry the exchange today, but it may be
communications equally well accomplished by status and location data burst across a network
interoperability established just for the incident. Over-specification of how needs are met ends up
is directly related limiting options and is often used as a substitute for a clear statement of business
to our ability practices. The point is that the “how” should come long after operational and
to describe the functional requirements are established.
operational
requirements
for interagency It may also seem that describing interagency communications needs in such detail
exchange of could be painfully tedious. Frankly, it can be. Unfortunately, the likely alternative is
information. acquiring systems that are designed based on gross and largely unshared assumptions
of the “who, what, when, why, and how often” aspects of interoperability. If
procedures don’t exist to describe how police operations communicate a need for
help when a diversionary device ignites a fire, then the presence of the technological
capability to talk is unlikely to be used effectively.
20
U.S. Department of Homeland Security, SAFECOM Program, Statement of Requirements
for Public Safety Wireless Communications and Interoperability (Washington, D.C.: Version 1.1,
January 26, 2006). Available at http://www.safecomprogram.gov/SAFECOM/library/
technology/1258_statementof.htm.
Chapter 4: Interoperability in the Integrated Enterprise
Corporations and other large organizations with clear visions of their missions
have long grappled with the problem of technology growing to be an end in itself.
They’ve established the roles of chief information officer (CIO) and chief technology
officer (CTO) as upper-management positions with responsibility for ensuring that
technology directly and measurably serves the mission. Those positions bear the
responsibility of understanding the business so well that no effort is wasted in putting
technology to work.
It’s rare in public safety to see the CIO or CTO role formally designated by name.
Whether so titled or not, the role of the chief officer responsible for information
technology, including the inseparable communications that make information
sharing possible, is simple. First, it is to be focused on the organization’s mission.
If that officer succumbs to the siren songs of technology wizards and vendors,
focus is lost.
Chapter 15,
Measuring If only you could spec, buy, and install a system that ran indefinitely with a minimum
Interoperability, of care and feeding, life would be simpler. Or at least work would be simpler. By their
delves into very nature, complex systems used for sharing information within and between public
performance safety agencies are increasingly evolutionary. That is, they grow, changing over time.
measures.
Understanding your needs is key to success.
TECH GUIDE
See the Big Picture
Chapter 4 of the Law Enforcement Tech Guide is devoted entirely to assessing current
ORIGINAL
67
business processes for all technology projects. In Chapter 6 of this Communications
s Interoperability Tech Guide, Conduct a Needs Analysis, we will provide tools
specifically targeted for planning communications interoperability projects.
If all this business about integration, enterprise, and architecture seems a bit
abstract when all you came to do was make sure your police, fire, and EMS
agencies can talk together—well, okay, it is a bit. But consider how complex these
systems can be, especially when you start lashing them together (see Figure 4-1 on
page 58). And consider that many big, well-funded projects have become lost in a
forest of technologies because the ultimate requirements were forgotten or never
even recorded.
Out of respect for our colleagues around the country, we’re not going to name
names—and we promise the same to you! Just don’t forget the big picture. In the
following chapters, we’ll get into just how this elephant can be eaten one piece at a
time . Step by step, interoperability can be achieved if it is built on a solid foundation.
Part I: What Is Communications Interoperability?
of the burn area in efforts to save the critical Satellite links to the Internet enabled the
watershed. A U.S. Forest Service employee was wireless transfer of field and planning data.
implicated and later pled guilty to arson for starting the fire.
*note: The author of this Guide was lead GIS specialist for 2 weeks on the Hayman Fire.
Chapter 4: Interoperability in the Integrated Enterprise
INCIDENT
Landline calls with automatic location information (ALI)
PAGING
SYSTEM
FIRE
PAGED
COMPUTER
ALERT
AIDED REMOTE
DISPATCH RUN CARD
(CAD) PRINTING
SYSTEM
VOICE RADIO
SYSTEM
CALL-TAKING
SYSTEM CALL
REGIONAL, STATE, AND ACKNOWLEDGEMENT
NATIONAL INFORMATION
SYSTEMS
RESPONSE
ANOTHER VOICE RADIO COORDINATION
AGENCY SYSTEM
CAD
RECORDS MOBILE
MANAGEMENT DATA MDT
GEOGRAPHIC SYSTEM SYSTEM
INFORMATION (RMS) AUTOMATIC
SYSTEM VEHICLE LOCATION
(GIS) (AVL)
DATA DISPATCH
CRIME MAPPING
RECORDS QUERY
SYSTEM
What Communications interoperability projects and initiatives are like houses built for an
extended family. They have to be built on a solid foundation. Your foundation will
be poured in the form of a decision-making structure, project management, and a
charter for shaping partnerships.
As with building a home, the stability and longevity of your initiative depends on a
Why foundation of leadership, cooperation, management, and consensus, which must be
built from the start.
Who Agency executives and senior managers build these foundations. Only they can
provide the leadership necessary to articulate a vision and carry out the project. They
have the responsibility to set agency or jurisdiction goals and the authority to commit
human and financial resources.
When Immediately, before disaster strikes or money is spent to solve an ill-defined problem.
Delaying this strategic step endangers all other parts of the project.
Part II of this Guide is intended to provide a step-by-step process and tools for
your interoperability project. This and the following five chapters mirror parts of
the original Law Enforcement Tech Guide with a specific focus on the special, often
challenging, aspects of interagency communications projects. The final chapter
of Part II offers ideas and current best practices for measuring communications
interoperability that you will find useful in gauging progress toward making sure radio
is an enabling, rather than disabling, technology for public safety.
Before this analogy causes you to run screaming away from your interoperability
project, think what a challenge building that house would be. Think about the
interagency communications challenges (and successes!) that you have today, how
hard it will be to improve interoperability without partnerships and some serious
planning, and the level of cooperation necessary to keep that household together long
after it’s built.
Interoperability is
co-operating.
Interoperability is the ability to work together. It is conducting effective joint
operations. It is co-operating.
We use the term “decision-making structure” here specifically for projects that have an
identifiable beginning and end. Governance bodies generally serve ongoing initiatives or
oversee management of multiagency systems after implementation.
We’ll explain later in this chapter how to wrap up all the details of these steps into a
document—the project charter—to record everything for posterity and make it easy to
share these keys to success with others.
Step 1
Identify Executive Sponsorship
Start your project by identifying the top champion (or champions) for the initiative.
This person(s) defines what the project will achieve. You may be reading this Guide
because you will be that champion. Or you may be in a steering function for your own
agency, but know the project will need higher leadership to bring other agencies and
jurisdictions to the table. Or maybe you’ve already been assigned to manage the project
and recognize the importance of building this part of the foundation.
Part II: How Is Interoperability Achieved?
Ideally, sponsorship is provided by three or fewer executives. The fewer, the better,
from the perspective of leadership and decision-making. With too many sponsors,
political factions are more likely to arise: city versus county, police versus fire, etc.
There’s always a risk of parochial decision-making, of course, but the more people
involved, the easier it is to duck responsibility for decisions. Accountability is key
for sponsorship.
Identify three or
fewer sponsors.
This begs the question of who, exactly, are the core stakeholders? There’s no
easy answer to that. You’ll have to make that decision. Remember this: There’s a
difference between sponsorship and the project’s Steering Committee, which
will have broader representation.
Find sponsors with sufficient stake in the outcome to be able to lead from a position
of authority, yet with the skill to draw others together. For example, we’re familiar
with one major city whose director of homeland security oversees both the police
and fire departments, has responsibility for emergency management, and has
considerable interest in EMS. This person is a strong and natural executive sponsor
for that city’s interoperability initiatives.
This vision is captured in the project charter. We’ll have more to say about the vision
statement of your project charter near the end of this chapter.
Chapter 5: Build an Interagency Foundation
INTEROPERABILITY SUMMIT
In early may 2005, the U.S. Department of Justice (DOJ) convened a summit
on communications interoperability. representatives from major projects and
initiatives around the country came together for 2 days in Seattle to share
lessons learned. Through discussion and consensus, some best practices
were developed.
Sponsorship
3 Get the right project sponsors by showing the public policy and political
impact of problems to be solved.
(See http://www.cops.usdoj.gov/Default.asp?Item=1495.)
Step 2
Identify Stakeholders
The process of identifying executive sponsorship leads directly into the next step:
Identify stakeholders in this effort to improve interagency communications.
TECH GUIDE
The Law Enforcement Tech Guide provides a discussion of the internal and external
ORIGINAL
24
stakeholders common to technology projects of all sorts—law enforcement and
s otherwise. Take a look in that Guide for some you may not have thought of!
Your early efforts to identify stakeholders and consider their role in the project will pay
dividends long after switches are flipped to warm the airwaves. Some have a central role
in steering the project, some define critical requirements, and others decide whether
the initiative thrives or dies on the vine. This is your first step in figuring out how to
keep stakeholders informed and engaged from their respective realms of interest.
These last two groups are increasingly identified as stakeholders. The profile and
cost of radio projects, in general, has grown dramatically and public attention
Plan to to interoperability problems is at an all-time high since September 11. Critical
communicate with
the public and
media attention is increasingly drawn to costly public technology failures, further
media. influencing public perceptions. Less commonly recognized is growing opposition
to new radio towers. The first time you plan to erect a new one in a residential
neighborhood, you’ll learn about new stakeholders!
Including the media and public in plans to honestly communicate the project’s
If two men agree goals, successes, and even failures is important to any high-profile project. Consider
on everything, you
including representatives of each as ex officio members of your committees.
may be sure that
one of them is
doing the thinking.
—lyndon B.
Johnson
Chapter 5: Build an Interagency Foundation
9
Step 3
Create the Structure
The time has come to formalize your project’s decision-making structure.
Doing so and making it widely known ensures all involved will know where
responsibility and authority falls. Leadership and accountability roles are made
clear, as are reporting roles.
TECH GUIDE
ORIGINAL
28
Figure 5-1 on page 70 is a typical structure for multiagency, multijurisdictional efforts.
s
The different elements are discussed in detail in the Law Enforcement Tech Guide, but
we’ll cover some twists common to communications interoperability projects.
29
Committee and the Technical Committee—and perhaps several topic-focused work
s groups that will be created to address particular tasks and dissolved when they’re no
longer needed.
The User (or operational) Committee is made up of stakeholders familiar with the
business and operations of the agencies they represent. Some of the most effective
Users know committee members are line supervisors and managers of field resources. A shift
best. sergeant or fire company commander is generally better in tune with intra- and
interagency radio communications needs of their organization than anyone else. In
some cases, individual officers, firefighters, and paramedics may have to translate
their own experience to broader operational needs.
The Technical Committee is charged with taking the project’s vision, folding in
operational needs, and analyzing the current technical environment. Potential
solutions may be examined to craft technical requirements for eventual procurement.
Here, most of all, “requirements tunnel vision” has to be avoided because it can easily
produce restrictive requirements that slip through into procurement documents,
leading to bid protests about foregone conclusions.
0 Part II: How Is Interoperability Achieved?
We’ll discuss how to focus working committees and further flesh out their roles in
Avoid attention
Chapter 6, Conduct a Needs Analysis, and Chapter 7, Create a Project Plan.
creep!
A caveat: Remember that each element of the decision-making structure has its
own role, expertise, and responsibilities. Resist the idea that, for example, the
Steering Committee collectively knows more about operations and technology than
the working committees formed to address those issues. Use the decision-making
structure to delegate responsibility and concentrate each group’s attention on its
A classic sign of
own role.
attention creep
in radio projects
is technology
debates in the User ExECUTIVE SPONSORS
Committee—or Ultimate decision-making authority
worse yet, in
Provide leadership and accountability
the Steering
Committee. The
former body
should be focused STEERING COMMITTEE
on defining Provides leadership
the project’s Adopts a shared vision
operational and removes obstacles
business needs,
and the latter on
PROjECT MANAGER
executing a shared
vision, committing responsible for all project-related
tasks and deliverables
resources, and top-
down management. Directs working committees
INTEROPERABILITY SUMMIT
More notes from the U.S. DOJ Interoperability Summit
Decision-Making Structure
3 Ensure committee members have authority to speak for their agencies.
3 Get buy-in from labor unions and ask them to recommend their own
representatives.
3 Manage competing stakeholder demands between larger and smaller agencies by
creating a balanced decision-making structure with documented conflict-resolution
processes.
Step
Involve Other Subject Matter Experts
Outside subject matter experts can be involved in your decision-making structure at
several levels. Some ideas:
• Bring in organizational and strategic management experts early on to sit down
with your Steering Committee and get it started on the right foot.
• Ask representatives from outside projects or interoperability initiatives to
address steering and working committee meetings.
• Rely on legal and procurement expertise within your agencies or elsewhere in
government to keep your project out of trouble.
• Have incident management specialists work with your User Committee to
define interagency communications needs in terms consistent with the National
Incident Management System and its Incident Command System (ICS).
• Use technology experts to help your Technical Committee frame available
opportunities to use or extend existing infrastructure.
Consider the range of expertise that may be brought to bear on your project. You
may have to hire new staff in some areas, but will likely find internal staff nearby
Use free technical who are involved in related projects and available to assist with yours. For example,
assistance organizational and project management expertise might be available within
resources. your stakeholder agencies or others outside of the project, such as other units of
government. Help might also be available at no cost through federal assistance
programs for public safety agencies.
2 Part II: How Is Interoperability Achieved?
Nationally, both the U.S. Departments of Justice and Homeland Security maintain
assistance programs that can be tapped at no cost. If your project will receive grant
funding, talk with your assigned grant specialist for guidance on assistance that may
be specifically available under the funding program.
Some of these programs bring peers together for training. Whether you’re in a
project sponsorship, management, or technical role, recognize that the opportunity
to network with your peers can be tremendously valuable. There are others who may
have faced and overcome challenges you’re up against right now. Some of the best
network
and least expensive subject-matter expertise available to your project can come from
with peers.
peers in other jurisdictions. Take advantage of this broad and inexpensive resource.
Consider asking them to address your committee meetings and share experiences.
Step
Conduct Effective Meetings
TECH GUIDE Meetings are inevitable, so you might as well make them effective. “Fun” meetings are
something of an oxymoron, but there are ways to make them less dreadful. Food and
ORIGINAL
35
refreshments always work, as do pleasant surroundings with plenty of space and good
s acoustics so people don’t struggle or become uncomfortable while helping the project
move forward.
The key to good meetings is organization and brevity. People resent their time being
wasted and know intuitively when it’s happening. Consider using a trained meeting
Use a trained facilitator during initial group meetings to get them started on the right foot. If you’re
facilitator early on. the project manager, work carefully with the facilitator so he or she knows your goals,
process, and group dynamics. Observe carefully and learn what you can do to make
future meetings effective.
The Law Enforcement Tech Guide provides some great tips for keeping your project on
track by making the most of the inevitable meetings that most everyone dreads. These
are rules that can be used in projects of all types.
Step
Decide on Project Staffing
TECH GUIDE The last step in establishing your project’s decision-making structure is one of the
toughest: Decide how the project will be staffed and where resources are going
ORIGINAL
37
to come from. Once again, the Law Enforcement Tech Guide provides most of
s what you need to know about staffing your technology project—whether it’s for
communications interoperability, voice or data, or even for technology far outside the
law enforcement business.
Chapter 5: Build an Interagency Foundation
3
The bottom line is this: Don’t handicap your project—or worse—by ignoring
the fact that managing an interoperability project of most any size is a lot of
work! Multimillion-dollar communications projects are becoming increasingly
common. One large, populous western state is considering building a multiagency
communications system estimated to cost $5 billion. Project staffing for such a project
would be immense!
Plan accordingly. Staff the project appropriately. Resist the temptation to save that 10
percent for more radios, sacrificing good management of all resources in the process.
Good project managers make things happen, but don’t usurp the roles of others in the
decision-making structure.
TECH GUIDE
The project manager’s responsibilities, skills, and personal attributes are well
ORIGINAL
43
addressed in the Law Enforcement Tech Guide. Use that Guide as a practical
s tool regarding all the project manager’s responsibilities in a public safety
technology project.
Part II: How Is Interoperability Achieved?
51
going to re-create that wheel here, but we do want to touch on a couple of high points,
s with special applicability to interagency and communications projects.
Chapter 5: Build an Interagency Foundation
The Law Enforcement Tech Guide provides a 12-step program for creating the charter.
The steps are:
1. Write the Vision Statement.
2. Give the Project a Name.
3. Get the Big Picture, Conduct an Environmental Scan.
4. Build the Business Case.
5. Include Background or Historical Information, if Relevant.
6. Establish the Project Scope.
7. Establish Preliminary Project Objectives.
8. Note Major Project Assumptions and Constraints.
9. Develop Initial Timelines and Preliminary Budget.
10. Include Project Planning Methodology.
11. Provide Project Team Organizational Chart and Membership Roster.
12. Sign, Seal, and Deliver.
Interoperability
is all about The vision statement may be crafted entirely from scratch, or it may be provided to
relationships and the Steering Committee by the executive sponsors or even by some larger planning
working toward a process outside this project. For example, the vision may come from a homeland
common vision. security or technology strategic plan describing the need for the project. It may come
Perhaps the first from legislation, decree, or interoperability coordination bodies at the regional or
step in ‘breaking state level.
the ice’ might be
to collectively
develop a catchy Adoption of a project name is an opportunity to develop some teamwork within the
acronym, such Steering Committee. A simple, descriptive name provides an easy way to identify the
as DIRT (Disaster initiative. This provides a “brand” inside and outside the project. Some have even had
Interoperable a bit of fun with it.
Response Techno
communications). The environment scan is a process more unfamiliar in name than practice to folks
—Chief Charles outside of the project management business. We’ve touched on the fact that your
Werner project is probably affected by others going on in nearby jurisdictions. Your project
Charlottesville
will be planned and executed in context with other technology, interoperability,
(virginia)
Fire Department management, and operational changes taking place around you. For example, your
jurisdiction may have a related project underway to build a microwave backbone to
carry all forms of information for agencies, including audio and control signaling for
radio systems. You should be aware of that initiative in your own initial planning.
Plan in
context. Building the business case is often difficult for public safety practitioners
unaccustomed to marketing ideas and products. It’s easy to describe the need for new
technology in dire terms of apocalyptic proportions. Or conversely, to promise World
Part II: How Is Interoperability Achieved?
Peace and Eternal Harmony among police, fire, and EMS agencies. That sounds a lot
Explain the
operational benefits more like a charity pitch than a business case. Resist if you find yourself writing, “If
to be achieved in it saves one life, it’s worth the millions of dollars.” While a worthy sentiment, such
specific terms. hyperbole doesn’t help explain why this project and that amount of money will make
a difference.
Explain the operational benefits to be achieved in specific terms. For example, “A new
shared radio system will support consolidated incident action planning necessary
during events involving six or more police, fire, and EMS units, as well as avoid
estimated replacement costs of $13 million for each of the three separate radio
systems over the next 5 years.”
In creating the charter, the team has its first opportunity to establish the project
scope. It’s fairly general at this point, but should clearly define what’s in and what’s
Scope: out of the project. For radio systems, relevant factors to describe are involved
What’s in, what’s agencies, whether the project replaces existing capabilities and/or provides new ones,
out? and the geographic area to be affected. We’ll have more to say on scope planning in
Chapter 7, Create a Project Plan.
Project objectives have to be specific and measurable, so take time with the Steering
Committee and User Committee, if it’s in place, to identify key objectives that can be
Focus on quantified and measured for completion. As with the business case, remember these
operational
are being written with others in mind—both internal and external stakeholders. Since
outcomes, not
technology. you’re planning to improve communications interoperability, take time to describe
the “who, when, where, and what” of new interagency capabilities. Be specific. Focus
on operational outcomes—not technology. For example, “Provide all police officers
across the county with a communications channel that is immediately available for
coordinating pursuits at all times.” There are many ways to meet this objective, but
the “how” is left for later determination.
Everyone wants Initial timelines and preliminary budgets are specific, central assumptions and
to know how long constraints placed on the project. Unlike the preceding section, these may be mainly a
it’s going to take matter of choice between participants. Take the opportunity to put a stake in the sand
and how much it’s to describe these key components of project management.
going to cost.
The project organizational chart and roster find their first formal home in this
document. Accept that they will change over time and commit to keeping this portion
of the charter up-to-date.
The final step is to sign, seal, and deliver the charter. Typically, sponsors and
Steering Committee members sign the charter. Don’t be shy about distributing the
finished charter to stakeholders everywhere.
Footings on Bedrock
Follow these steps and your interagency project will have a foundation with footings
on bedrock. You’ll have a decision-making structure that reinforces roles and
responsibilities while accommodating the variety of needs brought to the table. Your
A good home project manager—maybe you—will have the necessary room to work and resources
must be made, not
to accomplish this most important task. A project charter captures all these initial
bought.
operating details and much more.
—Joyce maynard
Altogether, this foundation will provide much more than just the basis for a successful
project: It may be the foundation for better interagency communications well beyond.
The extended family may not be ready to move in yet, but you know they’re coming!
CHAPTEr 6
COnDUCT A nEEDS AnAlySIS
Chapter :
Conduct a Needs Analysis
Who The project manager is primarily responsible for needs analysis. The User and
Technical Committees define operational needs and the current technological
environment.
Chapters 4 through 7 of the Law Enforcement Tech Guide deal with needs
analysis for technology projects in general.
2 Part II: How Is Interoperability Achieved?
Public safety agencies don’t need radios. They need the operational capabilities
generally and historically supported through wireless communications. This might
seem like a play on words, but too often a focus on the means of meeting a functional
need puts requirements, themselves, out of focus. This is a common pitfall in using
technology of all sorts, not just radio.
The need for interoperability is widely recognized today. Unfortunately, once past the
sound bites and impassioned speeches, agency leaders are left with the more difficult
task of coming up with more than just interoper-ability: They need interoperations.
needs analysis Since emergency response is the business of public safety, the business case for
details what has to interoperability today describes why police, fire, EMS, and other agencies have to
be accomplished communicate with one another and what the “costs” are when it’s done poorly. A
to achieve needs analysis details what is necessary to meet the project charter’s business case. It
interoperability.
describes exactly what has to be accomplished for interoperability to be achieved.
Working committees are key to completing a good assessment. Both User and
Technical Committees have reams of information to provide from their respective
perspectives that has to be captured. The results of their work feed the next phases of
Working needs analysis—and the project well beyond.
committees are
key to a good
assessment. Keep the committees focused on their roles. The User Committee represents
operational expertise. It must define the business processes that make interoperability
so critical. Don’t let it stray into the realm of technology—the Technical Committee’s
specific area of expertise. Resist the temptation to see interoperability as primarily
a technical problem; it isn’t. The User Committee must have ownership of the
operational needs and requirements for interoperability.
Your business process assessment will be an iterative process. That is, draft reports
will generate further important information that should be incorporated. Not only
will new bits of information arise step by step, but mistakes will be discovered that
need to be corrected. Conduct the assessment accordingly, keeping draft reports,
diagrams, charts, and maps in front of the project decision-making structure for the
very purpose of getting details accurate and complete.
Assess
Interoperability
Baseline
Fix
Obvious
Problems!
Figure 6-1: Business Process Assessment Steps
Part II: How Is Interoperability Achieved?
Step 0
Assess the Interoperability Baseline
As the project manager, you can get started with real needs analysis by assessing the
existing state of interoperability among project partners. This interoperability baseline
assessment provides a snapshot for future comparison. It’s an entirely optional step
that can serve as a useful tool to start subsequent conversations.
Step 1
Define Interagency Business Processes
The first formal step in analyzing needs is to define regular, authorized, planned,
or otherwise existing interagency response processes that are already in place.
Start by collecting interagency standard operating procedures (SOP) that describe
how partners plan to or already work together. These describe interagency
business processes.
With existing SOPs in hand, it’s time to convene the User Committee and have it
define processes requiring communications between agencies. If interagency SOP
pickings are slim, the User Committee may be the only place you’ll find out just what
interoperations are currently being enabled by communications. We’ll talk about
techniques for collecting stakeholder needs shortly. Some detective work may be
necessary to discover business processes that must be supported by current and future
communications systems—particularly undocumented ones.
For example, there may be a general, but unwritten, practice that police units respond
Unwritten business to structure fires of a certain size for traffic control. Or, quick response units from two
processes are jurisdictions are automatically dispatched to injury accidents on a bridge spanning
important to
them. These are interagency processes, perhaps coordinated through a mutual
document.
dispatch channel or common tactical talkgroup.
Chapter 6: Conduct a Needs Analysis
Even if unofficial, existing business processes must be documented.
The project manager is responsible for producing this report. Plan to release one or
more complete drafts and distribute across all stakeholders. Seeing conversations
rolled up into a summary report intended to describe all relevant business
Use diagrams to
processes will certainly produce comments and corrections. It’s important to have
make work models
clear. a draft report complete enough to be readable and understandable, but make sure
everyone knows it is a draft. Emphasize that this is an iterative process and feedback
will be incorporated.
Use diagrams to make work processes more understandable. They are key to depicting
work. Two types of diagrams are particularly useful:
TECH GUIDE
ORIGINAL
69 • Sequence work models show processes, subprocesses, and activities. The Law
Enforcement Tech Guide uses sequence work models for report filing and suspect
s
booking processes.
• Flow work models show information flows from person to person, organization
TECH GUIDE
to organization, or function to function. For example, the Law Enforcement
ORIGINAL
71 Tech Guide uses such a model to depict information flowing from dispatch to a
sergeant and on to several officers.
s
Not only do these work models graphically depict business processes for needs
analysis, they will be useful later in your project for describing functional
requirements, creating acceptance tests, developing training and exercises, and for
assessing the effects of system outages. Design, implementation, operations, and
maintenance stages of your project all benefit from accurate assessment and depiction
of work models.
Part II: How Is Interoperability Achieved?
Step 2
Define the Current Technology Environment
Draft business process materials will be useful in the next step: Defining the technical
radio communications environment that enables interagency work. Typically, the
Technical Committee is charged with collecting the variety of information about
technology currently in use. The project manager is again responsible for collecting
the information and presenting it in a form suitable for distribution.
This collection of information is not only important for your needs analysis, but
also will be invaluable in the likely event that your project leads to procurement of
additional technology.
Remember that “how” questions can be answered in varying levels of detail. Provide
Simple explanations the simplest one first. Again, use diagrams and charts to make information more
of “how” are understandable. Because of the geographic nature of radio systems, maps are an
indispensable. effective means of getting much of this information across, too.
Step 3
Fix the (Newly) Obvious Problems
As mentioned, developing a better understanding of business processes often
Take advantage
suggests immediate fixes that could be made. They may be fixes to processes and
of quick fixes for
momentum.
procedures or simply to use some existing technology more fully. Take advantage of
these opportunities for improvement, but keep up the momentum with your needs
analysis. Properly done, quick fixes can actually help generate enthusiasm for the
next steps.
More often than not, multiple stakeholders will have an interest in even these
relatively painless quick fixes. Be sure to include them in a discussion of
recommendations. If the Steering Committee expects to approve such changes,
be prepared when presenting recommendations to request and justify resources
necessary to make the changes.
Upon completion of these quick fixes, initiate the practice of celebrating milestones
along your path to communications interoperability. This is a great time to start a
habit of taking advantage of visible steps of progress. A small ceremony of thanks to
key participants and even press releases to claim your project’s success more publicly
are good moves that help to boost morale and build momentum.
Step
Describe How Current Technology Is Used to
Accomplish Work
With the technology baseline in hand and quick fixes complete, the business process
baseline can now be finalized. Get the Technical Committee’s assistance to take
descriptions of interagency processes and add simple “how” statements. For example:
“Midland City FD and Stillwater RFD have an automatic aid agreement for structure
fires in the Norwalk Subdivision. This typically requires one channel of common
communications for command coordination and another between the command post and
staging areas. VHF-high band shared channels are used directly between responders.”
“Midland City PD and State Highway Patrol units are jointly dispatched to injury
accidents on I-5 within the city limits. The PD uses a dedicated channel on its UHF
conventional system to talk to SHP on its Division 1 operations channel—a 150 MHz
conventional repeater—connected by a permanent gateway operated by the city.”
Depending on your governance structure, the Steering Committee may wish to review
the report before adopting it as final. It’s great to have that level of support, but make
sure to take into account the added time needed for review, changes, and approval
when creating the project plan.
Chapter 6: Conduct a Needs Analysis
9
Needs Analysis 102:
Determine Stakeholder Needs
You have the as-is. Now you can move on to the to-be. Project buy-in hinges on how
well stakeholder needs are determined. The project manager guides this process,
A human being has meeting with stakeholders at all levels, across all agencies.
a natural desire
to have more of a
Start the process of collecting needs shortly after documenting business processes
good thing than he
needs. and the technology environment. This takes advantage of any momentum created
and captures ideas that arose in discussing things the way they are.
—mark Twain
While baseline assessments can be conducted relatively quickly through efforts of the
working committees, collecting information on stakeholder needs requires that time
be spent with a lot more people across essentially all agencies—and probably among
various groups within each.
The Goals
There are several goals to be achieved in collecting stakeholder needs. The obvious
Goal #1:
one is to obtain a better understanding of interagency communications needs. Often
Capture operational these needs are camouflaged behind ideas about how best to resolve them. While the
needs. solution to a given problem may revolve around new or innovative uses of technology,
technology isn’t ever the need. Work to capture the interagency operational needs to
assure success and the ability to accurately recognize those needs.
The fact that your project is progressing proves agencies are willing to move beyond
organizational dysfunctions, if they ever existed. The best way to pave over those
potholes is to focus on the operational or functional needs of participating agencies.
Get input not only on how they can communicate better with partners, but also how
organizational change will flow from better interagency communications.
90 Part II: How Is Interoperability Achieved?
Goal #3: The final goal is to get all stakeholders involved in the process and invested in creating
Get invested solutions. This occurs when they’re involved in defining requirements and recognize
stakeholders.
that the outcomes will address their operational needs.
Techniques
As we’re alluding to, the project manager or other facilitator’s challenge in collecting
needs often amounts to digging through surface layers to reach underlying needs.
It’s really not all that hard to do. What’s tough is doing it without losing stakeholder
confidence and buy-in along the way! The project manager’s communications skills—
and we don’t mean radio—are going to make or break this share of the project.
Objectivity is one of the project manager’s sharpest tools at this point. It yields the
credibility necessary to elicit honest statements of need and facilitate discussion. If
you’re in that role, recognize that your preconceived notions will be picked up far
away. Guard your credibility by remaining objective!
The business process baseline often highlights a number of these and commonly
draws attention to neglected or unnecessary ones. Other likely sources include the
following:
• Existing strategic plans, both business and technology, establishing
requirements that agencies have to meet
• Debriefings and after-action reports on incidents, particularly multiagency
incidents
• Evaluations of tabletop and full-scale exercises.
Make written or mental notes of needs and requirements apparent in these sources
that otherwise may not surface during interviews or focus groups. Use them to elicit
discussion, perhaps validating or tempering issues raised.
Chapter 6: Conduct a Needs Analysis
91
n Be Prepared: Collect Scenarios
Emergency response scenarios used in planning, training, and exercises provide a
ready-made source of examples that can be presented during interviews and focus
group sessions. With any luck, agencies involved in your project already regularly
conduct multijurisdictional exercises. Those scenarios can be tapped. Emergency
management officials can provide other suitable ones.
Other good sources include the SAFECOM Statement of Requirements21 and the
Department of Homeland Security’s National Planning Scenarios. Both are rich
sources of examples of everything from natural disasters to improvised nuclear
devices. Check with your local or state emergency management offices for details of
the National Planning Scenarios.
A ready supply of scenarios provides fertile ground for eliciting needs while talking
with stakeholders.
n The Product
By the completion of interviews, the needs analysis process will have produced an
abundance of information. This Guide has concentrated heavily on data collection
so far; next, we’ll turn to distilling all that has been collected into general system
requirements to be included in design documents.
21
U.S. Department of Homeland Security, SAFECOM Program, Statement of Requirements for Public
Safety Wireless Communications and Interoperability (Washington, D.C.: Version 1.1, January 26,
2006). Available at http://www.safecomprogram.gov/SAFECOM/library/technology/1258_
statementof.htm.
92 Part II: How Is Interoperability Achieved?
These requirements are used in a conceptual design that incorporates action plans
for organizational and operational change, as well as in technology procurement
and implementation documents. The iterative process of collecting baseline (as-
is) information, assembling needs across stakeholders, and generating system
requirements (to-be) requires repeated participation, review, and comment by
working committees—both operational and technical.
Describing Requirements
Understanding and articulating your requirements is key not only to any successful
procurement of technology, but also to organizational and operational changes
necessary for improved interoperability. Requirements have to be described in terms
directly linked to the interagency business processes to be supported. Operational
requirements are best stated in simple terms, avoiding constraining definitions of
how requirements will be met.
Describe requirements using consistent terms and categories that help make sense
of what otherwise might be a confusing jumble of data. Fortunately, common
terminology and basic categories have evolved in recent years. SAFECOM’s
Statement of Requirements provides some of the most useful standardized
descriptions specifying with whom, for what purpose, and under which special
conditions a series of typical communications may occur. While forward-looking to
future development of technologies, the document uses a complete and consistent
style of description. We’ve used elements in business process examples above that
would roll into requirements documents.
Operational Mode
Routine
Planned Events
Large Emergencies
Note that these ways of describing communications aren’t mutually exclusive and, in
fact, definitions are bound to vary across jurisdictions and disciplines.
9 Part II: How Is Interoperability Achieved?
Step 1
Define General Functional Requirements
Requirements are next defined in functional terms and compiled into a report
presenting them along with a conceptual design that illustrates how they fit together.
The first step in pulling together that report is to compile requirements from
preceding work. Functional requirements are defined in terms of just how the “system
of systems” will work to accomplish your project’s goals and meet its vision.
Don’t allow preconceived “solutions” to slip into your requirements. The price to pay
in noncompetitive bids that are challenged is just too high—and you may not get the
best solution for your operational needs. The project manager bears the responsibility
for identifying conclusions that may have slipped in under the guise of requirements.
n Organizational
Interoperability needs analysis generally produces a number of requirements for
organizational change or development. Some examples include needs to create the
following: memoranda of understanding for sharing costs, mutual aid agreements
for sharing resources, policies for incident management during multijurisdictional
emergencies, and procedures for interagency operations. Requirements may also
include standard practices for lifecycle funding of systems, minimum staffing of
deployable communications resources, security, and standard training on interagency
communications across all partners.
The project’s executive sponsors and Steering Committee bear the responsibility for
preparing their organizations for changes necessary to improve interoperability. Most
organizational requirements that arise will require changes only possible through
their leadership.
Give some thought to what has been documented through the process up to this
point. Separate those requirements that have been expressed that can best be
addressed by management. They’ll be used in the conceptual design.
n Operational
Collect the processes and needs that have been expressed in operational terms. If you
followed our advice in completing the business process baseline, you’re well on your
way. Additional operational requirements arising from interviews and focus groups
must be folded in, but they should be obvious if you focused on operational outcomes
of interoperability.
Chapter 6: Conduct a Needs Analysis
9
Beware of operational needs that extend the scope of your project. The primary
reason for establishing scope early in the project under the direction of the
Steering Committee is to draw some boundaries around what specifically is to be
accomplished. One hopes that you were able to use the project scope to keep the needs
analysis focused, but in case some discussions veered off track, now is the time to start
paring back.
Remember: It’s all about interoperability. Operational outcomes are the whole reason
why your project was undertaken. Take the business process descriptions and needs
that have been developed and massage them into statements of requirements that
describe how the pieces must function together.
n Technical
Technical aspects of functional requirements address how operational needs are
to be met through technology. Don’t confuse them with the technical details of
existing systems that went into the baseline reports and will go into requirements
for interfacing or integrating those systems with any new technology. Because
few agencies maintain communications engineering staff, consultants are often
hired in radio projects to examine the technical environment, document technical
requirements, and then define interface and integration requirements described in the
next step.
The Technical Committee may not have defined its needs using these terms, but
Use terms of quality we’re certain the terms were touched on in principle. Use these qualities to further
to state technical
categorize technical requirements. State them in ways that can be tested and validated
requirements.
by system users.
9 Part II: How Is Interoperability Achieved?
While a simple idea, stating requirements in functional terms takes work. It’s
tempting to adopt specifications as requirements, and then be forced into using
technical performance measures for acceptance. Within your project, work to
assure you understand operational requirements well enough to decide whether any
proposed solution—technological or otherwise—meets needs.
The Technical Committee may have expressed needs to meet federal and other
regulatory regulatory mandates. For example, the Federal Communications Commission (FCC)
mandates often
spur system
has recently released rules regarding rebanding (moving existing channels within a
upgrades and band to reduce interference)22 and narrowbanding (reducing the amount of radio
replacements. spectrum used for a given channel).23 The committee may also have identified limited
radio spectrum as constraining expansion of systems to meet other needs.
These types of mandates provide the primary impetus for many radio system
upgrades and replacements. Note that, properly speaking, they don’t represent
requirements for your interoperable systems, but rather are part of the
environment in which realistic solutions have to be implemented. For example,
there is a difference between a requirement to meet FCC narrowbanding regulations
and a conclusion to migrate systems to the 800 MHz frequency band. While that
might be the eventual solution, there’s a difference between making it a possibility
and making it a requirement.
22
In August 2004, the FCC initiated the process of relocating most public safety 800 MHz users
within the band to reduce interference suffered from commercial wireless systems.
23
In December 2004, the FCC released long-awaited rules that will force eventual changes to all
radio systems operating below 512 MHz—all the commonly-used public safety bands below 700 and
800 MHz. By January 1, 2013, all radio channels used by these systems must be reduced in width by
half or be capable of passing at least two voice conversations in the same amount of radio spectrum.
Chapter 6: Conduct a Needs Analysis
9
Step 2
Define General Interface and Integration
Requirements
All systems have geographic, functional, and technical boundaries that have to be
bridged and every interoperability project has internal points of interface between
communications systems and subsystems. Very few projects are initiated to uproot
all communications components for all agencies—from voice radios, to backbone
networks, to consoles and beyond—so integration of the old with the new is
generally inevitable.
Your own project probably encompasses components that won’t be replaced in this
effort to improve interagency communications. Ideally, they can all be integrated to
the extent they can honestly be called a “system of systems.”
This step in defining requirements establishes what parts of existing systems will
stay and which may go. It defines required points of interface between those that stay
and any new technology that may be implemented. This is the place to document
specifications that will shape proposed technology solutions.
Start by describing the core systems and subsystems that exist and will be built
upon. Establish provisional requirements for using them in concert with any new
interagency communications capabilities.
For example, consider the popular gateway devices that connect audio between
different radio systems, effectively patching two or more channels together. In
some areas of the country, these are critical resources for enabling interagency
communications. Many have been placed in fixed locations and have limited
capacity for expansion, either because of some inherent limitation on the number of
channels that can be interconnected or because the radio site is otherwise congested.
Requirements for connecting the gateway into any new means of interagency
communications should be spelled out.
Now is the time to establish any requirements on integrating other systems through
these and other resources. By nature, interface and integration requirements are very
technical. Internal or contract engineering expertise can be put to work in defining
these requirements.
Step 3
Create a Conceptual Design
The final step in developing general system requirements is production of a
conceptual design. This document illustrates how interoperability goals are to be
realized through both technical and nontechnical means. It demonstrates a vision
incorporating major assumptions and constraints, highlighting functional outcomes
of your project.
Create the conceptual design from the requirements statements you’ve assembled.
While much of the document will be essentially a narrative of what your needs
This is your to-be
report.
analysis produced, don’t forsake the pictures! Maps and diagrams are particularly
important components to include because they capture a great deal of information
in one place and show relations difficult to explain without a lot of verbiage. Use
sequence and flow work models from the business process baseline assessment to
illustrate what exactly will be supported by any new systems to be implemented.
Once again, the project manager is responsible for this product, but don’t feel bad if
the whole needs analysis process has left you exhausted! It’s not uncommon for it to
be contracted out. Some of the best work we’ve seen in this regard has been done by
system integrators strong on business process reengineering and less interested in
communications systems engineering.
An important choice about joining shared radio systems may also be in your cards.
These regional or statewide systems are being built to take advantage of economies of
Shared systems
bring high levels scale, gain strength through numbers with vendors, make use of otherwise duplicated
of technological system components, and improve technological compatibility that can lead to better
compatibility. interoperability. In many ways, they offer a good compromise between buying and
building new radio systems.
This completes your needs analysis. The products will have been presented in large
part to stakeholders and accepted as formal project documents. Now is the time to
complete a project plan.
CHAPTEr 7
SCOPE THE WOrK TO BE DOnE
Chapter :
Scope the Work To Be Done
What A scoping exercise examines the extent of organizational and technological work to
be done through procurement and implementation. It concludes with the decision of
what work to contract out and what to complete in house.
Why Voice and data communications projects include work that you may wish to undertake
directly or contract out. Understanding the work involved allows a choice of what
will be included in the procurement process and who will be responsible for different
aspects of the system.
Who The project manager needs to understand both the work to be done and internal
resources available to complete it. The Steering Committee ultimately has to decide
what will be done internally and what will be procured externally.
When Following the needs analysis, the work to be done should be examined and decisions
made on what services and equipment will be procured.
We left the needs analysis phase of your project with a conceptual design in hand and
a “buy or build” decision on how to improve communications interoperability. The
conceptual design described at a high level how the various system components—
technological and otherwise—will fit together for interagency operations. In
preparing a project plan, look at the scope of work to be accomplished and decide
who will accomplish what.
In order to best make that decision, it’s useful to understand what has to be
accomplished, particularly tasks that are most commonly contracted out.
10 Part II: How Is Interoperability Achieved?
Project Management
Obviously, there has been and remains plenty of project management work yet to
be done. This whole book and the original Law Enforcement Tech Guide are dedicated
to helping with that work. Project management probably seems like more and more
work as you read along!
Keeping with prior assumptions, we’ll continue to assume you are reading this
as the designated or soon-to-be project manager. In moving toward system
implementation, you have to work ahead to create a project plan, develop teams,
carry out a procurement, lead contract negotiations, and build an implementation
plan. You’ll need help, but we’ll assume the job of project management will be held
pretty close to home.
System Design
Do you need further You may already be facing a conundrum that many others developing complex
system design at systems have grappled with: Do you need further system design before proceeding
this point? to procurement?
Many projects proceed to procurement with little more than a conceptual design,
functional specifications, and some boilerplate language. This is done to leave the field
open for innovative vendor proposals. Other projects proceed through an engineering
design that yields very detailed specifications for bid.
Don’t limit your For interoperability projects, our recommendation tends more toward the former
choices by over- approach than the latter. Interoperability projects involve many existing systems and
designing technical complex needs that may best be addressed by technologies you haven’t anticipated, so
elements. it’s best to remain flexible.
System Integration
The role of a systems integrator is to take the variety of electrical, electronic, and
physical system components and (surprise!) integrate them into a coherent whole.
Integrators often also serve in system design, acceptance testing, and quality
assurance roles.
Turnkey This is a role you may choose to handle with project staff, contract independently, or
procurement: leave up to a system vendor as a turnkey procurement. A turnkey procurement is one
One in which in which a general system vendor or equipment manufacturer serves as the system
a general
designer, integrator, and equipment provider.
system vendor
or equipment
manufacturer We’ll provide recommendations on how to proceed with these particular choices near
designs and the end of this chapter.
integrates the
system, and
provides the
Quality Assurance
equipment. Often used to refer to a broad range of acceptance testing (see below), quality
assurance is defined as a systematic process for assuring that a project meets its
objectives. Quality management is formally part of project management and is most
commonly seen in large system implementations.
Independent quality assurance contractors are occasionally used for radio projects.
For example, the Illinois State Police hired a quality assurance consultant to evaluate
proposals for a statewide system for the state police and other state and local agencies.
Acceptance Testing
In implementing technology, acceptance tests are planned and conducted to
Acceptance testing determine whether specifications and performance requirements are being met.
is dealt with The larger the project, the greater the effort involved in acceptance testing. Complex
in more detail
measures of performance, such as radio coverage, may be included in the acceptance
in Chapter 10,
Implement the process.
System.
While it’s always valuable for the customer to be involved in acceptance testing, part
or all of the effort is occasionally contracted out to an independent party due to the
work involved.
10 Part II: How Is Interoperability Achieved?
Let’s take a look at each of the areas in some depth to provide more background for
your choices in delegating or contracting project work.
Training
Training will be the key to your successful system of systems. Anticipate that
Training is the key several types and levels of training will be necessary. Consider what may best be
to your successful
system of systems.
done in house, what can be contracted from your system vendors, or even solicited
independently from training companies and organizations.
n Technical Training
Your radio equipment vendors can be expected (under contract!) to provide training
on the technical operation and maintenance of equipment. This is appropriately
provided to agency radio technicians. Ongoing training should be anticipated for new
staff members and to maintain the skills of existing staff.
n Dispatcher Training
Dispatchers are Many means of improving communications interoperability will rely on that central
professional resource for most emergency response: the public safety communicator or dispatcher.
systems The dispatcher’s role requires his or her own personal integration of so many
integrators. communications systems that you shouldn’t underestimate the need for carefully
designed and executed dispatcher training.
n User Training
no technology is so Last, but not least, first responders who will use the system to communicate across
simple that training agencies and jurisdictions need training. Plan a comprehensive program for all
is unnecessary agencies planning to use the system that provides initial training of existing staffs,
for people who basic training of new staffs, and coordinated interagency exercises. Consider that such
will use it during training won’t appropriately come from system vendors, but from your own agencies’
emergencies.
staffs or even specially contracted assistance.
Include staff on If you anticipate much radio site development in your project, make sure to include
the Technical people on the Technical Committee who have the knowledge and background of
Committee who what’s currently in use. There’s usually a lot of history behind why a particular site is
know what’s in used and why a better one is unavailable. This sort of “corporate knowledge” is the
use—and why. type that you don’t want to pay a contractor or consultant to rediscover.
Basically, radio sites are real estate. The three most important aspects of their
selection are location, location, and location (we’re sure you’ve heard this before about
residential real estate!). If your project requires site work or development, you’re faced
with using current system sites as-is or with improving, buying, or leasing access to
other existing sites, or developing entirely new ones.
The overriding The overriding consideration for radio sites is the coverage they will provide. This is
consideration affected by physical location relative to the involved jurisdictions, height relative to
for sites is the the area to be covered, surrounding natural or man-made clutter that will block radio
coverage they will waves, and other electromagnetic factors. While there are always compromises to be
provide. made, coverage is king.
Buying or leasing real estate. For government agencies, this inevitably requires a
lot of legal and financial consideration by staff elsewhere in the affected jurisdictions.
If you hadn’t included suitable expertise in an ad hoc working group, you will want to
add it if you plan to acquire new site real estate.
Zoning and variances. You may run into zoning issues for a given location that
require navigating the thorny path of property use variances. Even if a formal
Chapter 7: Scope the Work to Be Done
109
Construction permits. It should come as no surprise that all the work going into a
new site generally requires studious attention to obtaining building permits. As public
agencies are often under great scrutiny, your partners will expect that all necessary
and appropriate permissions are received before construction begins. This needn’t be
a difficult process, but it does take time and often affects site design.
Increasing use
of “mesh” radio
Tower size. A tower’s height above ground or above the average terrain surrounding
networks for data
requires many a site dramatically affects the coverage of radios in all frequency bands. While there
more sites, though are technical design trade-offs—too much height, too much coverage, the effects
generally simpler of distant interference aggravated by being in “too good” of a location, and general
ones. practical construction considerations—greater height for antennas is generally
preferred to maximize the coverage.
Building new sites brings up additional engineering considerations before real estate
is ever purchased. Tall towers require guy wires that run to ground anchors well away
from the towers, necessitating larger sites and additional construction, including
security fencing. In 2004, a Florida jurisdiction suffered a dramatic and dangerous
tower collapse when a service truck backed into guy wires at one of its sites. Such total
loss of a site can have a dramatic effect on system capabilities.
FAA permits. Radio towers and antennas can be serious aviation hazards. The FAA
has strict regulations regarding their location, size, painting, and lighting. Don’t plan
on putting up new towers without scheduling time for the FAA permitting process.
Antennas or mounting structures that don’t extend more than 20 feet above existing
structures don’t require additional approval, but when it is necessary, plan on 6 to 8
weeks for completion of permitting.
110 Part II: How Is Interoperability Achieved?
Site inspections are important and typically required by vendors when existing sites
vendors look
for adherence will be used for new or extended systems. Inspections may be conducted by a joint
to commercial team of your project’s technical members and the vendors, or it may be stipulated
and public safety in contracts as being done by a third party. Commonly, vendors look for adherence
standards in to commercial or public safety standards before accepting sites offered by agencies
evaluating existing for use. Conversely, you may have nontechnical requirements for sites identified by
sites. vendors, such as access for maintenance and physical security.
Site design is a separate, but important task. For new construction, it starts with
layout of the tower, shelter, guy wires, grounding systems, utilities, access, and
For new or existing security. For new or existing sites, floor plans have to be developed and documented
sites, adequate
to assure adequate space for equipment and its proper identification later on.
floor space has
to be available Similarly, equipment rack layouts are an important part of site design. Radio
for expected sites are dependent on adequate, quality electrical service that typically has to be
equipment. converted from the utility company’s alternating current (AC) to direct current
(DC). An electrical design is needed that accounts for AC service to some pieces
of equipment, DC to others, and backup power when commercial service is lost.
24
The National Association of Tower Erectors (NATE) works with federal agencies and standards
organizations to establish tower safety practices. See http://www.natehome.com.
Chapter 7: Scope the Work to Be Done
111
Proper documentation of all these site design elements is a critical deliverable during
implementation, too.
Whether new frequencies will be required or existing ones used in new ways, the
FCC requires frequency coordination and licensing. The application process itself
is alien to most agencies and uncomfortable even for most technicians. Many
agencies have technical staff adept at preparing applications and navigating
the frequency coordination process. Both activities have become more complex
in recent years, however, and agencies are increasingly outsourcing the whole
process in systems acquisitions.
25
The Occupational Safety and Health Administration (OSHA) and National Institute for
Occupational Safety and Health (NIOSH) have increasingly stringent standards affecting tower
construction and antenna system installations. See NIOSH Publication No. 2001-156,
http://www.cdc.gov/niosh/2001156.html.
26
SAFECOM has produced a publication addressing the subject, Public Safety Radio Spectrum: A
Vital Resource for Saving Lives and Protecting Property. See http://www.safecomprogram.gov/
SAFECOM/library/spectrum/1102_publicsafety.htm.
112 Part II: How Is Interoperability Achieved?
For purposes of planning, be aware that the cost of license application preparation
can range from a couple hundred dollars to several thousand for larger, more complex
systems. The FCC doesn’t charge fees for licensing by public safety agencies of their
A couple of certified
land mobile radio systems,27 so no cost is to be anticipated there. It does, however,
coordinators use
local advisors, allow certified frequency coordinators to charge for their services.
people within the
state or region who Frequency coordination is the process of selecting appropriate frequencies for the
typically work in a applicant agency, while balancing the needs of other eligible users and minimizing
technical capacity interference between all.28 Since practically all licensing that public safety agencies do
for a public safety requires frequency coordination, you can anticipate using the services of a certified
agency that
coordinator. The FCC maintains a list of coordinators and contact information on its
volunteers their
time. web site.29
Check with the FCC-certified frequency coordinators on what additional licensing will
be required for transmitters connected to your gateway.
27
Land mobile radio (LMR) is a particular classification of radio systems that includes common
dispatch, car-to-car, and portable communications used by public safety agencies. License fees are
required for other types of wireless systems, such as microwave links.
28
The Association of Public-Safety Communications Officials – International, Inc., provides
an explanation of frequency coordination on its web site. See: http://www.apcointl.org/
frequency/WhatisFC1.html.
29
See http://wireless.fcc.gov/publicsafety/coord.html.
Chapter 7: Scope the Work to Be Done
113
Assessing the Scope of Work to Be Done
You have reached a decision point. Just how big is the project and how much of it
do you want to take on? That might seem like a philosophical question (particularly
if you were, well, assigned to manage the project), but from a more practical and
less personal standpoint, there’s a consideration. Do your agencies want to have the
fine-grained control over all system acquisition and implementation activities that
yields the most customized and highest performance system, or are you comfortable
handing off some or all of that responsibility for manageability?
At the other end of the scale, some agencies proceed with large systems design
and acquisition by being the general contractor, so to speak, themselves. They take
Consulting for
on all responsibility for engineering design, construction, acceptance testing, and
major systems
design and
integration of the diverse subsystems that make up modern communications systems.
implementation What they can’t do in house, they contract out piece by piece. The advantage is better
can be expensive needs-based design and project accountability. The disadvantage is that it can be a
because there’s huge amount of work.
a lot of work
involved. In between these extremes is the rest of the world. Few agencies have the internal
resources to take on all these duties, so they usually end up contracting out some or all
of the tasks that have to be accomplished in a big system implementation. The trade-
off is in finding the right contractors to take them on. And, of course, every project is
going to have a different combination of the required tasks.
Of course, major system vendors are very willing and usually quite interested in
taking care of all your needs. While this comes at a cost, don’t forget there is a good
reason for this: Vendors will undertake tasks that you may not have adequate or
appropriate resources to do. As you proceed, consider which roles are best managed
closely for your project and with your resources.
11 Part II: How Is Interoperability Achieved?
Recommendations
Our recommendations on proceeding through procurement to implementation are
based on the scope of the project as reflected in its anticipated cost.
Independent For systems expected to cost less than $500,000, plan to act as your own general
integrators can contractor. Rely on either internal engineering expertise or contract for it. Little site
be more objective development is expected for projects this size, so engineering is reduced. For projects
in advising
of this size and smaller, agencies often rely on regional radio service companies with
you of needed
organizational,
whom they have existing contracts.
operational, and
management For systems up to a few million dollars, consider using a turnkey procurement where
changes. the winning vendor will take care of all the system design and implementation
work. Projects of this size are generally larger than what agencies can comfortably
take on themselves and small enough to make contracting for the parts separately
unnecessarily time-consuming and costly. A project management or quality assurance
consultant may be a good investment to improve your project’s odds of success.
Our recommendation for systems costing more than a few million dollars is to hire
a systems integrator separate from the primary technology vendor or vendors. This
gives you more direct management control of the project. Good integrators can help
not only in moving your project from conceptual design through implementation
and on to full operations, but also by bringing a wealth of experience in dealing with
technology vendors. Their reputations are built on assuring project quality for their
customer—your agencies—by getting the most for your dollars.
With the consensus of the User and Technical Committees, seek Steering Committee
approval to move forward with further project planning and procurement based on
the agreed-upon scope of work.
With that approval in hand, you’re ready to create the project plan!
CHAPTEr 8
CrEATE A PrOJECT PlAn
Chapter :
Create a Project Plan
What The project plan is a document that guides the entire design, procurement,
implementation, and future operation of an interoperable system. It provides
the detail necessary to manage each phase of the project and the multitude
of activities involved in each. It includes components for controlling the
critical Scope-Budget-Timeline relationship,30 as well as managing risks and
communicating about the project with stakeholders. This document will evolve
over the life of your project.
The project manager and the User and Technical Committees are involved in
Who discussions, decisions, and research. The project manager should be responsible
for project plan documentation. The Steering Committee and executive sponsor
must endorse and sign the plan.
Project planning is the focus of Part III of the Law Enforcement Tech
Guide. The topics of scope, timelines, budgets, risk management,
TECH GUIDE
and project communications are dealt with in depth through its six
ORIGINAL
chapters. This chapter draws heavily from them, while emphasizing key
s
aspects for interoperability projects.
30
As mentioned in the original Tech Guide, throughout your project, you will need to constantly
balance the constraints of time (length of time the project takes to complete), scope, and cost.
Should any one of the three “triangle” components grow, there is a direct effect on the other
“corners” of the triangle. Thus, as scope grows, so does the project costs and its scheduled
completion time.
11 Part II: How Is Interoperability Achieved?
“Planning” is such a painful word in some public safety circles that the thought of
creating another plan—or set of plans—may not be particularly appealing in your
The project plan current quest to improve communications interoperability. On the other hand, few
is a working of us would dream of sending carpenters, plumbers, and electricians out to build
document. us a new house without an agreed-upon set of blueprints in the general contractor’s
hands. Properly done, your project plan won’t be one of those documents that are
quickly shelved—it will be a dynamic, evolving document that is continuously used to
manage the project.
Before getting started with creating a project plan, recognize that multiagency
technology efforts are particularly at risk of failure. Institutionalized barriers to
communications across organizations affect our ability to jointly manage projects,
requiring careful and practical definition of the scope of projects, timelines, budgets,
and how risks typical to technology projects will be managed. Obviously, these
barriers contribute to the very “first responder” interoperability issues you’re working
to resolve.
The project planning process, itself, improves the odds of success by bringing
Project planning stakeholders to a common agreement on details. It produces a detailed, actionable
improves odds of plan to achieve the project’s objectives. A plan developed by the project manager with
success. input from working groups and accepted by the project’s Steering Committee is a
powerful tool to manage the complexity of interagency initiatives.
Throughout the following, we are assuming you are or will be the project manager.
Your project plan will establish the scope of what will be accomplished, set a timeline
and budget, and include subplans for managing project risks and communicating
project activities and statuses. The cyclical process of creating and maintaining one
throughout the life of a project makes assumptions explicit and decisions binding.
The three pieces of a good project plan that deal with scope are as follows:
1. Scope statement
2. Project objectives
3. Scope management plan.
Chapter 8: Create a Project Plan
119
Step 1
Draft a Scope Statement
As project manager, your first scope-planning task is to assemble a draft statement
with definitions of what’s in and out of the project, supporting detail for the project’s
business case, and the assumptions and constraints that will shape its outcomes. Be
sure to include any grant requirements that you already know about. They will have a
definite effect on the project.
The scope statement serves in this form as an incomplete working document for the
next steps. Add an initial work breakdown structure31 to describe the phases and
individual activities in sequence that will take the project from conception through
design and implementation to ongoing operations (see Figure 8-1). At this point, focus
more on what the activities will be, their interdependencies, and how they proceed in
sequence than on how much time they will take. Your timeline will be set a bit later on.
31
Work breakdown structure is a “deliverable-oriented grouping of project elements that organizes
and defines the total work scope of the project. Each descending level represents an increasingly
detailed definition of the project work,” according to the Project Management Institute. It is
typically represented as a timeline of related activities, in sequence, and showing visible outcomes
(deliverables). A Guide to the Project Management Book of Knowledge, 2000.
120 Part II: How Is Interoperability Achieved?
INTEROPERABILITY PROjECT
Project Management
System Design
Equipment Procurement
Equipment Installation
Responder Training
Tabletop Exercises
Full-function Exercises
TECH GUIDE
The Law Enforcement Tech Guide includes further advice on defining practical, yet
ORIGINAL
124 measurable project objectives. For the example project above, objectives might include
the following:
s
3 Communications between responders for command purposes should be possible at any
location within the county that is otherwise suitable for an incident command post.
3 Communications should be possible within a 1-mile radius of an incident command
post.
3 The interagency command channel should be available to responders without
requiring the intervention of other personnel.
With draft objectives in hand, the project manager and User Committee can draft the
final part: A plan for managing the scope. Ultimate approval for scope changes should
be left to the project’s executive sponsors to make sure that the original vision isn’t
being compromised.
TECH GUIDE
The Law Enforcement Tech Guide provides details on the issues to be addressed in a
ORIGINAL
125 scope management plan. Relevant statements for our example above include:
s 3 Project scope changes must be approved by the city police and fire chiefs, as well as the
county EMS director.
3 Proposed limitations to the geographic availability of the command channel will
be evaluated by the Technical Committee. Recommendations with estimates of
cost for overcoming the limitations will be provided to the Steering Committee for
consideration and comment before submittal to the police chief, the fire chief, and the
EMS director.
Scope changes will occur. Project participants learn more as the project proceeds,
affecting their ideas about what’s possible. Agency needs may shift, affecting the very
real definitions of what has to be made “interoperable”; or market changes may bring
new technological options to meeting needs.
122 Part II: How Is Interoperability Achieved?
PERFORMANCE MEASURES
For interoperability projects, performance measures may include such things as the
availability of interagency channels, the speed with which gateways are activated or
deployed, the required coverage of systems linked together, and much more.
Your ability to identify when the project scope is changing, how it will be dealt with,
and who has authority to approve changes is critical to project success.
Step 3
Get a Technical Reality Check
Your Technical Committee should review the scope statement and project objectives
at this point. The committee will have valuable input to assure that technological
barriers, such as unachievable levels of radio coverage, haven’t been inadvertently
inserted into the project. The purpose of working the draft through the User
Committee first is to focus objectives on operational measures of success.
This doesn’t mean there aren’t important technical aspects to scoping your project.
Because your interoperability project will most likely involve adding new technology,
the Technical Committee will have particularly valuable input on the work breakdown
structure defining implementation activities and their sequence. Have the committee
help establish meaningful milestones in the implementation phase to include as
deliverables in vendor contracts that can be used for incremental payments.
Step
Get it Approved!
The final step in scoping the project is getting sign-off from the Steering Committee
and, finally, the executive sponsors. Because this key piece of the project plan puts
meat on the sponsors’ strategic skeleton and defines what everyone will follow, their
formal approval is important.
Use the occasion of presenting the scope statement, project objectives, and
management plan to the Steering Committee and executive sponsors as an internal
milestone to rightfully mark its importance in moving from planning to action. Note
Chapter 8: Create a Project Plan
123
the intent to require executive sponsor or designee approval of any scope changes to
keep the project focused.
129
s The Law Enforcement Tech Guide dedicates a chapter to this project-planning step and
the material doesn’t need to be duplicated here. Remember that the timeline includes
not only the sequence and the amount of time individual tasks will take, but also how
they’re grouped into meaningful phases and further demarked by milestones and
deliverables. Sound project management practices require clearly identifiable points
of progress. This is most practically, often graphically, depicted in a project timeline.
Keep in mind that interagency projects of any type are notoriously “delicate,” often
depending on the leadership of key individuals and a regular supply of goodwill.
Broken schedules and overdue projects strain the tightest project teams. Stakeholder
frustration and skepticism can boil over when unrealistic expectations inevitably
crash into reality.
Actually, some project managers are excited by the money aspect of their projects.
There’s some vicarious pleasure to be had in spending large amounts of money
effectively to help public safety responders. Nevertheless, it can be challenging to be
a responsible steward of taxpayers’ hard-earned money. The budget portion of your
Costs are initial and project plan can be completed once the scope is defined and your timeline in place.
recurring, internal
and external. Technology projects of almost any size face initial and recurring costs, incurred both
within the participating agencies and through external procurements. Initial costs are
12 Part II: How Is Interoperability Achieved?
Cost estimation along these two dimensions is key to a sound project budget. You will
probably begin by focusing on initial external expenses. As the costs of outsourcing
everything from project management to radio installation start to add up, look for costs
that may be covered and managed most effectively within the participating agencies.
Don’t make the mistake of assuming that internal costs—initial or recurring—will
be covered without documenting and quantifying those assumptions. From a project
manager’s perspective, that’s a good way to get shortchanged when you turn to project
partners and find they have no means of carrying their share of internal costs.
Begin by identifying the costs of which you are aware. Use a chart to categorize them
according to when they’ll come about and where they arise (see example in Figure 8-3).
$ COST SOURCE
COST
INTERNAL ExTERNAL
Project workspace Property
Project management labor Radio site infrastructure
Remodeling of central facilities Network infrastructure electronics
New intranet drops User radios
INITIAL
Step 1
Gather Internal and External Cost Data
Pull together cost estimates for each of the items you have identified. Often it’s
difficult to quantify all these costs because details are embedded in budgets
spread across multiple agencies. Still, estimates are important to show
contributions by all project participants even if they’re made in the form of costs
most grant avoided. For example, significant initial and recurring costs for radio sites and
programs being tower space can be avoided at times through sharing of existing facilities owned
tapped today for
communications
by one project participant or another.
interoperability
projects require External cost estimation is more art than science. Obviously, you’re in the earliest
that local funds stages of defining your project at this point and have few ideas of what will ultimately
be used for have to be purchased. Most agencies are in regular conversation with their current
property, towers, communications vendors and can get budgetary estimates without running afoul of
and permanent
procurement rules, but check with your own purchasing officials before doing so.
construction.
remember that
many grant funding Alternately, you can turn to other agencies, issue a formal request for information
programs for (RFI), and even hire consultants regularly working in the field to help create budgetary
technology will estimates. The original Law Enforcement Tech Guide provides more information on
pay for up-front these options.
start-up costs, but
will not pay for
recurring costs. Step 2
Protect your budget Create a Project Budget of Initial Costs
by thoroughly
Your budget of initial costs will necessarily include many figures, small and large,
understanding all
grant limitations! spread across the project timeline. While detail will be important later on, recognize
that estimates are bound to be rough at this point. Don’t create an artificial level of
budget detail by including costs down to the last nut and bolt. You may know the
average height of antennas above ground level at your radio sites and the going rate
of feedline, but there is no sense in detailing that cost when the variance in major cost
TECH GUIDE
categories will be orders of magnitude greater than anything spent to connect radios
ORIGINAL
141 to antennas.
s
Use a spreadsheet with low and high cost estimates for each of the budget categories
you choose to use. Budget detail beyond first and second levels will become important
in later, updated versions of the project plan, but this should be sufficient to move
forward with your initial version.
Common first- and second-level budget categories for initial costs may be categorized
as shown in Figure 8-4.
Chapter 8: Create a Project Plan
12
Figure 8-4: Common First- and Second-Level Budget Categories for Initial Costs
12 Part II: How Is Interoperability Achieved?
A BUNDLE OF COSTS
Large radio system vendors will prefer to act as your systems integrator, bringing all
the complex pieces of a modern radio system together. They’re very capable of doing so
and generally can better guarantee that their own products will perform if they do. The
downside is that the service doesn’t come free and you’ll probably pay a premium for
commodity items that you could buy “off the shelf.”
Prepare yourself to be a good consumer. Take the time early in your budgetary planning
to break out cost estimates for services and subsystems. This will give you needed
detail later on for the procurement process and beyond to contract negotiations.
Step 3
Estimate Recurring Costs
Recurring costs for your project will be highly dependent on the amount and cost
of new technology implemented. Today, radio systems are priced much more
like computer systems, with maintenance packages offered by vendors that cover
incremental software upgrades and even remote monitoring. Hardware upgrades may
be necessary for certain software upgrades, much as they are with computers. If your
system is as successful as you hope, recurring internal and external costs may actually
be greater than initial costs.
The rule of thumb for estimating annual software and hardware maintenance
contracts is 10 percent of the original purchase price. Other recurring costs, such
as internal technical support, training, and site leases, can be significant, too. For
example, monthly site leases for prime radio tower real estate are $1,000 a month and
more. One Virginia county had been quoted $13,000 per month for three commercial
radio sites that its vendor had chosen. It’s important to have a sense early in this stage
of your project if such recurring costs will be faced.
Step
Plan for Ongoing Budget Updates
Just like the other part of the project plan, your budget needs to be maintained
TECH GUIDE
throughout the project lifecycle. The Law Enforcement Tech Guide points out that the
ORIGINAL
145
entire project team needs to understand that a budget is a projection. Through regular
s updates, the project manager communicates this reality while providing current best
estimates. As the project proceeds, adjustments will be offered and adopted or altered
by the Steering Committee to ensure that its goals are met.
Chapter 8: Create a Project Plan
129
Project Planning 10:
Create a Risk Management Plan
The term risk management is common enough in modern parlance, but the
formal process of a plan to deal with risks in technology projects is unfortunately
uncommon. Proactive identification and evaluation of risks is a proven means of
keeping projects on track when the inevitable happens. Think of it as an insurance
policy to deal with contingencies.
Risk management isn’t a one-time effort, though. It starts once the project scope is
defined and continues through the life of the project as phases are completed and
milestones met. It’s of such importance that the entire decision-making structure
should be involved in creating and ultimately accepting the plan.
TECH GUIDE A four-step process for creating a risk management plan is presented in the Law
Enforcement Tech Guide. The process of identifying risks, categorizing and quantifying
ORIGINAL
150
them, determining your tolerance level, and creating a response plan is the same in
s
communications interoperability projects as it is in others dealing with technology. It
comes down to understanding and preparing for problems that may arise. (Figure 8-5)
Loss of funding
Given the expense of communications projects, several funding
sources usually have to come together to make them
possible. Loss of a key funding stream or the inability to
match a grant can require huge scope changes.
Bid protests
In a competitive field for high-stakes contracts, vendors
are often willing to play hard for business. Bid protests can
result in significant time delays.
Construction delays
Any number of events can delay necessary building. Given narrow funding windows, delays can put
funding at risk.
Public protests
There’s nothing like a new radio tower going up in someone’s backyard to cause public protests.
Every project will have a different set of risks, likelihoods, and impact areas, just as
every project team will have a different assessment of the severity of the risks and its
own tolerance for them. For example, of two jurisdictions facing difficulties obtaining
radio channels, one might choose to proceed with work that can still be done, while
another might temporarily halt the project to avoid putting more money at risk.
Risk evaluation and management decisions should involve the whole team.
The last piece of your project plan is a formal plan for how you as the project manager
will report in various directions to all stakeholders—internal and external.
The Law Enforcement Tech Guide provides an example chart showing how the variety
of stakeholders can be kept appropriately informed. It describes by team member
TECH GUIDE
what information is needed, the amount of detail required, the frequency of
ORIGINAL
161 communications, and the methods of delivery. Appropriately, you will have been
doing a good bit of communicating along these lines by the time this part of your
s
project plan is in place, but now’s the time to formalize it.
Chapter 8: Create a Project Plan
131
Focus your communications plan on getting accurate and complete, yet succinct,
information to stakeholders at all levels. Each group represented in the project team
and outside of it will want different information. Plans and the progress being made
to achieve them will be of general interest, but from different angles. For example,
upper management is much more interested in budgetary details and personnel
assignments than the general public will be.
Think like a The different messages have to be communicated in the form best suited to the
wise man but audience, focused on their areas of interest, and in appropriate terminology. Focus
communicate in general information on the operational outcomes of the project and practical matters
the language of the of progress, such as phases and milestones, making spare use of technical terms and
people. jargon.
—William Butler
yeats We’re convinced that traditional oral and written reports are still invaluable. Well-
delivered in person, they persuade and assure like no e-mail or other electronic
process can. Make the most out of your opportunities as project manager to present
the project in person.
INTEROPERABILITY SUMMIT
More notes from the U.S. DOJ Interoperability Summit
Communications
3 Establish a communication plan that creates a reporting structure with and between
committees and uses graphic depictions to show reporting responsibilities.
3 Use daily briefings between key project team members to manage information flow.
3 Keep agency public information officers informed about the project.
3 Limit who communicates with vendors.
132 Part II: How Is Interoperability Achieved?
Because of this, we’ve been encouraged in recent years to see growth in the use
of project web sites to communicate with stakeholders, including the general
public. One good example that can’t be done justice on the printed page is the
Louisville (Kentucky) MetroSafe web site (Figure 8-6). Louisville Metro, the area’s
consolidated city and county government, uses the site to provide information on
its communications projects.32
Elsewhere, the state of Hawaii has found that web technologies can be used to create
an internal network (“intranet”) portal where employees can collaborate, create their
own web pages, and otherwise share information. It’s particularly interesting in that
32
See http://www.louisvilleky.gov/MetroSafe/.
Chapter 8: Create a Project Plan
133
it’s built from freely available software components. The Hawaii Information and
Communication Services Division offers a short video demonstrating the portal.33
Commercial products drive most project portals that we’ve come across, however.
Microsoft SharePoint® web collaboration software is popular in agencies that use the
company’s office productivity and server applications. SharePoint is easily integrated
with those other applications, intuitive, and well supported by an army of value-
added resellers. There are even interagency collaboration tools for incident response
Hosted web sites built on the platform.
can be cost-
effective and simple As with any open source or commercial software of this complexity, initial setup
to manage. of web portals and system administration requires trained IT specialists. On the
other hand, there are an increasing number of portal hosting services. These online
businesses will provide World Wide Web access to your project web site hosted on
their computers.
Portal-hosting companies typically provide all the services you would have with
similar software purchased and installed on your own systems and networks,
although they can’t easily take advantage of any internal e-mail, calendaring, and
other office productivity services your agency has in place. This isn’t a critical factor in
choosing to use hosted portal services for interoperability project participants spread
across multiple jurisdictions. Costs are reasonable, too. Hosted SharePoint services,
for example, currently run from $20 to $75 and higher per month, depending on the
amount of document storage and network bandwidth needed.
Freely available Portals of any type still take considerable time to configure and manage—hosted
web services or otherwise. If that’s beyond your interest, skills, or available time, there are still
can help with options. At least one agency is using the popular web service Yahoo!® and its “groups”
interagency project feature for its multijurisdictional project to create a shared e-mail and chat services,
communications. file storage space, calendar, and even poll-taking capabilities.
If you need a few more project management capabilities, check out the simple hosted
services34 at Basecamp™. A single project for an unlimited number of participants can
be set up at no cost. Messaging, to-do lists, task assignments, and milestone calendars
are available, but you will have to pay a modest fee to get file exchange capabilities,
encrypted network access, and multiple project support.
33
See http://www2.hawaii.gov/dags/icsd/content/video/higovdemo_250k.asf. The state
of Hawaii portal is built on the freely available open source products COREblog™, Zope®, and
ZWiki™.
34
See http://www.basecamphq.com/.
13 Part II: How Is Interoperability Achieved?
With these
C Consulted Who has information needed to do the work?
five pieces in
place—the scope I Informed Who needs to be notified of the results?
statement,
timeline,
budget, risk The work roles may be shared and an individual may have more than one. For
management, and example, the Steering Committee is broadly accountable for most project activities,
communications but in some cases also has to be consulted in depth for further information on a
plans—your subject. Implicit in the chart is that anyone accountable or consulted on work is also
project plan is informed of results.
complete…for
now! While it will
surely be a good Procurement Staff
Project Manager
User Committee
Agency Legal
Agency Grant
elements, a great
Committee
Committee
Managers
Executive
Technical
Sponsors
Agency
is up to date.
Staff
Activity
Create a decision-making structure A R
Create a project charter I A R I
Assess current business processes A, R C I C
Determine stakeholder needs A A, R C C C
Develop general system requirements I A, C R C I I
Evaluate buy versus build options I A, R C C
Set the project scope A C R C C
Develop the timeline A, C R C C I
Estimate and deliver a budget I A, C A, R C C C I C
Create a risk management plan A A, C A, R C C I
Communicate plans and progress I A R I I I I I
What The structured, iterative process for acquiring the services and physical components
to create an interagency communications system, whether voice or data.
Who The project manager is at the center of system acquisition. Members of the Steering
Committee serve in additional roles, as do members of the working committees.
Special ad hoc teams are often necessary for legal, community relations, and
procurement assistance.
When Acquisition occurs once needs are defined and the initial project plan
is created. It proceeds through design and functional specifications to
procurement and contracting.
There’s a direct correlation between how rigorously this phase of your interoperability
project is approached and its chances of success. Even if a large share of the
technology to improve interoperability between agencies will be purchased
from a single vendor, a solid process of defining, designing, specifying, and
buying the system is needed to manage both the project and the vendor.
One key way to manage such complexity is through iterative steps of design,
procurement, and implementation. Through a process of decomposing the work to be
done, more detail about the “system” is developed. All stakeholders learn more about
the components of the system and how they fit together. This progressive process
allows the project to be broken down into manageable pieces—some may be executed
entirely by the participating agencies and others through the help of communications
systems vendors and service providers.
Assumptions: We have to make some assumptions about your project. Not all
interoperability initiatives require massive system changes or new radio purchases.
Your project may be focused on the simple process of swapping radios between
agencies during an incident so each may talk to the other. It may be to program
channels commonly available between agencies in everyone’s radios. Here we’re
looking primarily at projects that eventually require that some additional or new
technology infrastructure be put into place.
Both voice and data systems follow the processes described here, though with data
systems there’s also an additional effort to find and implement software applications.
The process diagram (Figure 9-1) depicts the steps that have been recommended
that would lead your project up to this point. It shows the progressive process of
system development.
Chapter 9: Acquire the System Components
139
Conception
Foundation Vision
Building Charter
Interoperability
Baseline Needs Analysis
Assessment
Technical
Operational
Interface &
Organizational Integration
Functional
Requirements
Requirements
Process
Buy services
or
Build a system?
Build
Hire an Acquire an
Turnkey? No Yes
integrator? integrator
Buy
No
Engineering
Construction
Design and
Yes Implementation engineer
Acquire the
Quality Assurance
services and
Acquisition Acceptance Testing design products
Process
Develop functional specifications
for procurement
Procure the
technology
If they didn’t seem so before, the processes have to seem daunting now! Don’t worry.
We will break down the work needed to get from beginning to end into steps and
decisions to be made along the way.
It’s tempting to turn the checkbook over to the first vendor who offers big promises
to solve your interoperability problems. Don’t do it! As we’ve been saying all along,
interoperability isn’t primarily a technology problem. There are many organizational,
operational, and technical function changes to be made to improve interagency
communications in most regions of the country.
A final note before we get down to it: Improved interoperability results from improved
communications (in both technical and nontechnical senses) and cooperation. It
truly requires a system of related technical and nontechnical systems. The system
definition and acquisition phase of your project is one requiring particular attention
to managing relationships—not only between your operational partners, but also
with the communities being served by and paying for this initiative, as well as the
equipment and professional services vendors you’ll need as partners.
Manage the relationships. Don’t let the new system of systems ever become a divisive
influence, which happens when participants lose sight of the goals.
Generally, you move into the acquisition phase of your project by first understanding
relevant procurement and contracting rules and how the project teams will be
structured and staffed. Through these steps, you’ll move from a conceptual design to
procurement and contracting.
Step 1
Research the Rules
Moving into any procurement, project decision-makers need to be aware of the rules
that govern it. The project manager bears particular responsibility. This can be quite a
challenge in large interoperability projects that span organizations, jurisdictions, and
Chapter 9: Acquire the System Components
11
Don’t work yourself sometimes even state boundaries. They are increasingly funded through a complex
into an acquisition mix of grants, tax revenues, and fees that bring special challenges to management
corner by failing of the project budget. Not only do funding stipulations limit what can be purchased,
to understand under which processes, and in particular timeframes, but they also limit how
your agency’s
purchasing and
ownership can be shared across organizations. It’s easy to imagine how difficult
contracting rules, agreements between jurisdictions can be when joint or equitable ownership of shared
as well as those of system components for interoperability is impossible.
your partners.
There is a way to deal with the complexity: Get help!
We’ll touch on the array of teams that may be needed in a moment, but you can start
Today’s competitive by creating an ad hoc team of financial advisors from purchasing staff in each of
procurements are the key involved agencies. With their help, create a broad plan on how to meet all
so technologically agencies’ rules or, alternately, the project’s goals and objectives through financially
and administratively
complex that they
discrete procurements. For example, it may be clear that one set of rules applies
require advice from across the partners or that a couple key participants in the initiative can take on all
a multiplicity of purchasing responsibility.
sources, including
legal counsel and Before deciding how to proceed with system acquisition, consider that large
financial advisors. procurements can rack up significant internal costs—up to 5 percent of the
There are very
system cost.
real costs for this,
too—as much as
five percent of the Step 2
procurement, in our
experience. Form the Teams
With an idea of the amount of work involved and what share will be accomplished
—Steve Proctor
Executive Director internally, create the teams to carry it out. Consider and select members from
Utah across the participating agencies as broadly as you can. This requires knowledge of
Communications individuals and their abilities that you, the project manager, may not have. Turn to
Agency network Steering Committee members to help find talent from among their agencies. Talking
with them also provides the opportunity to get their agreement to commit staff time
to the project.
A suitable proposal All or none of these teams may be necessary, depending on the size and scope of
evaluation team your project. Keep in mind that project participants can wear multiple hats—if
for a turnkey they’re not already!
procurement would
comprise the same Two working teams are particularly useful at this point: The procurement and
members, but policies/procedures teams.
include fewer of
them.
n Procurement Team
Presuming there will be some purchase of services or technology for your project,
create a procurement team that will take responsibility for shepherding the process
12 Part II: How Is Interoperability Achieved?
Select members who have some background with purchasing. The ins and the outs
of navigating a significant procurement aren’t skills most people are born with; they
come from experience. Ideally, that comes with real operational experience of using
radios as emergency responders, too.
n Policies/Procedures Team
The second team that can be kicked off right away is one to collect and meld
policies and procedures between partnering agencies. Start this process early
How agencies will because the learning process involved can well affect functional specifications for
work together any procurement. For example, if the agencies have or want a policy stating that
drives many a dispatcher must always be at the control point for connecting agency channels
procurement
physically or logically through a gateway device, that establishes a functional need to
functional
specifications. be specified. Alternately, if they would require that a communications technician, as
defined under the Incident Command System (ICS),35 be deployed during incidents
of a particular size or larger, a transportable gateway may eventually be chosen in
response to that functional requirement.
35
The Incident Command System, a key part of the National Incident Management System
(NIMS), will be discussed further in Chapter 12, Develop Policies and Procedures.
Chapter 9: Acquire the System Components
13
Other teams may be necessary through the acquisition process. Set these into motion
depending on what work you choose to take on internally and what you intend to
contract out.
n Engineering Team
Whether or not you contract for system design engineering, consider establishing an
engineering team, typically comprising those involved in the Technical Committee.
These people will either be responsible for or guide the engineering necessary for
radio projects much larger than a single voice repeater or wireless data access point.
Even in projects making new or additional use of existing systems, there is often an
engineering and optimization aspect involved that requires technical steering. In the
procurement process, the engineering team plays an important role in establishing
technical specifications, eliminating those that unnecessarily limit choice, and serving
later in the evaluation process.
n Construction Team
As you might guess, a team to deal with the peculiar design, procurement, and
implementation aspects of new physical radio facilities isn’t necessary in all projects.
look elsewhere in When it is, the skills of members are distinct. We’ll touch on the civil engineering
the participating aspects of some radio projects in the next section, but not every interior designer is
jurisdictions for qualified to excavate for a foundation or frame up a house.
civil engineering
and construction In addition to Technical Committee members who will have your best institutional
expertise.
knowledge of currently used and other potential radio facilities, look to your
jurisdiction’s construction and building divisions for additional expertise. In
many cases, the construction team has to oversee the work of contractors selected
specifically for radio site development, permitting, and navigating zoning mazes.
1 Part II: How Is Interoperability Achieved?
Turn to individuals within participating agencies who already serve this function.
It requires another distinct skill set and persons already doing the work no doubt
already have contacts and procedures for dealing with a multitude of community
relations issues. Your Steering Committee members may also be in management
positions suitable to help in this regard.
n Acceptance Team
We’re all looking for acceptance, right? Well, maybe so, but in the acquisition and
Use key members implementation phases, acceptance is the process of using mutually predetermined
of other project measures between contracting agencies and contractors to determine when work has
teams for the
been successfully completed. While this is naturally seen as an activity taking place
acceptance
process.
well into the process of building systems, there are at least two reasons for setting an
acceptance or quality assurance team into motion early on.
quality Second, the acceptance team can be seen as providing a quality assurance function.
management In the world of technology project management, quality assurance is the recurring
is a distinct process of guaranteeing in each phase that a project’s objectives are being followed
responsibility of and incremental measures of quality are being met. Ultimately, given the tools
project managers
developed through early project definition, conceptual design, detailed design, and
and is sometimes
outsourced in large functional specification, the acceptance team also functions in this role.
projects.
Chapter 9: Acquire the System Components
1
Manage the project’s timeline by carefully having these teams work in parallel to
one another. Clearly, the amount of overlap between members is going to affect
how much can be accomplished by them, but good project managers compress
timelines by having work done in parallel as much as possible.
The original Law Enforcement Tech Guide provides a veritable tour de force on the
subjects of procurement and contracting. Guidance there is entirely applicable to
radio systems and interoperability. We will step through its guidance in the following,
referencing specific locations for your broader review.
If your project is large or complex, you may have already chosen to contract out
some services. Systems design, integration and management services, and site
development can account for half or more of some systems, but for most projects, the
largest procurement effort is for equipment. Costs include its purchase, installation,
optimization, training, and initial operations.
1 Part II: How Is Interoperability Achieved?
The procurement process proceeds through four steps: Selecting the right
procurement tool, developing functional specifications, building criteria for
evaluation of expected vendor responses, and executing the process.
Step 1
Select the Tool
TECH GUIDE The most common procurement tool used for radio systems is the request for
proposals (RFP). The tool under one name or another is available to all jurisdictions.
ORIGINAL
176
It allows you to state requirements and functional specifications, and then allows
s
interested parties to propose solutions. The RFP is distinguished from an invitation
for bid (IFB) in the flexibility it allows vendors to propose solutions for evaluation and
the agency’s ability to negotiate costs based on what they learn.
The request for information (RFI) is occasionally used by agencies in radio systems
procurement, particularly to learn about technologies that can be considered.
The RFI process is less formal and time-consuming than an RFP because they
aren’t complete replacements for one another. An RFI may lead into a negotiated
procurement, but is most appropriately used to collect information for the more
formal process. In the rare cases where the RFI yields enough information to
conclude there is a single, suitable approach, your procurement rules may allow you
move to actual procurement.
Step 2
Develop Functional Specifications
We have talked about the need for functional specifications for acquiring
interoperable systems. In the procurement phase, these specifications are put to paper
in a form that will encourage thoughtful, often innovative proposals, yet allow you to
evaluate whether the proposed solutions will meet your needs.
TECH GUIDE
The degree of specification will hinge on how you’ve chosen to proceed with the
project. If you’ve chosen to go for a turnkey system, then functional specifications
ORIGINAL
179
will be limited to operational aspects of how the system will be used and managed.
s If you’ve chosen to bring in a systems integrator independent of equipment
manufacturers, you will have a standard set of specifications from the integrator to
work through and select from.
SOLE-SOURCE PROCUREMENT
While it’s often tempting to go straight to a single source based on what you already
know about radio systems, recognize that there’s great value in maintaining competition
and options in any procurement. Use them to your advantage. Don’t rely on expected
goodwill alone to deliver your agencies the best options at the best prices. Recognize
that grants place significant additional procurement burdens on any sole-source
purchases they are used for. See the original Law Enforcement Tech Guide, Page 178,
and/or the Law Enforcement Tech Guide for Small and Rural Police Agencies: A Guide
for Executives, Managers, and Technologists, Chapter 5, Understanding Procurement
and Contracting http://www.search.org/files/pdf/SmallRuralTechGuide.pdf.
Step 3
Build Evaluation Criteria
Criteria for evaluating proposals and selecting the winner likewise flow from your
specifications. They also arise from the value your agencies place on other factors.
For example, your functional specifications may not have anything to say about the
vendor’s qualifications, but experience, stability, and record of success are key criteria
for evaluating radio system vendors that will provide critical technology for your
interagency communications needs.
You hope that the operational needs you’ve outlined and the functional specifications
you’ve stated will lead to evaluation criteria that are carefully aligned with your
agencies’ standard operating procedures (SOP) and incident response plans. For
example, your policies/procedures team may have brought requirements to the
table as to how the system has to work. They may have brought specific functional
requirements for how a piece of equipment works, its electrical characteristics (such
as “Intrinsically Safe” portable radios for use in potentially explosive atmospheres), or
other physical characteristics. It’s also possible that your agencies have performance
standards for particular work, such as the amount of time and effort required of
dispatch to set up a patch between two channels.
TECH GUIDE These SOPs and elements of response plans should guide evaluation criteria. Other
ORIGINAL
181 examples of appropriate criteria and how they are presented are included in the Law
Enforcement Tech Guide. These criteria are carried into a weighted evaluation process
s
where particular, predetermined factors are accorded greater value than others based
on your own sense of what is important.
1 Part II: How Is Interoperability Achieved?
Step
Carry Out the Process
Whew! With all this work out of the way, it’s actually time to carry out the
procurement! Unless you’ve been involved in similar projects before, the amount
of work involved in getting to this point may have come as a surprise. Trust that it’s
all important to get you where you want to be: better interagency communications
through your voice and data systems.
TECH GUIDE
Your jurisdiction’s procurement rules, those of partnering agencies, and those
ORIGINAL
182
brought as conditions of other funding sources determine the actual steps taken to
s release the procurement, await responses, collect proposals, step through evaluations,
and make a selection.
Cost is bound to be one of your greatest considerations, of course, although RFP rules
for most jurisdictions don’t require that it is necessarily the predominant factor in
making a selection. As a matter of fact, that’s a key reason why you created detailed
evaluation criteria. It’s not uncommon for cost to be half of the total points accorded
proposals for radio systems.
Recognize that prices can be brought down 5 percent, 10 percent, and even more
through negotiations, which we will talk about next. Through a formal and detailed
procurement process, you will get sufficient information in responses to your RFP
to decide how to proceed, even if the total proposed cost is well beyond what you
expected. Believe us, it happens!
Though you may have to go through a process known as “best and final offers” to
further winnow out the selection, eventually you get to the point of identifying an
apparently successful proposal. This will lead to negotiation of one or more contracts.
187 entirely applicable to your interoperability project. We’re not going to repeat its good
lessons here, although we do have a few tips to pass on when it comes to dealing with
s
these specific types of projects.
Know your vendor. More than other types of information technology, radio systems
are dominated by relatively few vendors. While this limits your options in some
cases, it does provide better opportunities for understanding them. This provides for
both better management of the project on your part and negotiation of contracts, in
general.
Find out all you can about their marketing and sales cycles. All have particular
Know your vendors’ strategies for product lifecycles and managing sales. These strategies affect how you
marketing and sales will deal with the vendor, one hopes to your advantage. Since they will most certainly
cycles. affect the cost and capabilities of your system over time, it pays (literally!) to know
about them at this point in your project.
In real estate, there are “motivated” buyers and sellers. From the contract negotiation
standpoint, it’s invaluable to know your vendors’ “motivations.” The sales staff
assigned to your procurement will undoubtedly be paid in part on commission. The
amount of your contract has a significant impact on what they, personally, take home
through the contract.
In the process of managing the project, any situation that requires invocation of
bonding clauses and collection on the agencies’ part ultimately removes the ability
of the respective agency and vendor project managers to negotiate. Do all you can in
managing the project to avoid ending up in this circumstance.
10 Part II: How Is Interoperability Achieved?
The best deals Use your knowledge of the vendor’s sales cycles to negotiate the best deal.
can be negotiated Typically, better deals can be made if you time the proposal release, evaluation, and
in December. award cycle to mesh with the calendar year. Contracts signed in December often
Equipment prices yield the best prices because vendors and sales people are nearing the end of the tax,
can vary by 5
corporate reporting, and sales commission year. They are typically more motivated to
percent based on
the time of year.
sell at the end of calendar quarters, especially the end of the year.
Recognize that vendors do not want to come back to the bid table multiple times if
they can include more under a larger procurement. Some large systems’ vendors pay
commissions based on “tonnage”—the total cost of the procurement. They also have
more pricing flexibility on soft costs. It may seem odd, but the cost of the system and
its profitability to the vendor are only loosely related. The effect is that in negotiation,
you may be able to get concessions on more profitable items in exchange for ones with
less “markup” as long as the bottom line isn’t greatly affected.
Recognize how quotes are assembled. Look for costs that are added as extras or
vendor-provided
that could potentially be done by someone else. An example is training. There is often
training can be very
expensive—check flexibility built into these cost quotes and the potential for good profitability on the
quotes carefully. vendor’s part. Consider if you really need their particular training for all proposed
aspects and be prepared with the costs of alternatives when you go into negotiations.
Similarly, look for costs that are split out separately, but couldn’t possibly be
contracted separately. Our favorite example is system installation, configuration, and
optimization. While it’s logical to use these as separate milestones for payment, for
most radio systems it’s hard to separate them out as independent tasks that could be
accepted or rejected in the contract negotiations process.
Recognize your vendors’ internal processes. For better or worse, large commercial
organizations have a lot of bureaucracy. Sometimes this can work to your advantage.
First, so much of contract negotiations has to do with the vendors’ and the agencies’
internal rules of procurement that there’s a lot of work to be done between
contracting professionals and legal counsel. Don’t use a lot of your procurement
team’s time and energy in that process; break it out as separate work in actual
negotiations.
Chapter 9: Acquire the System Components
11
Second, recognize that the vendor’s bottom line profitability on your project may
not be affected by concessions their project manager is able to make. For example,
at least one manufacturer of equipment has a standard markup on portable radios
of approximately 10 times. That is, the retail cost will be approximately 10 times the
cost of manufacture. During the project, the vendor’s project managers are afforded
the ability to bring additional equipment to the customer to compensate for delays,
disputes, and the other typically unpleasant details of projects.
To avoid invocation It’s particularly valuable for you to know if your vendor accounts for this cost in
of penalty clauses, the project’s bottom line at retail or at the cost of manufacture. At least one large
vendors may manufacturer accounts for it at the cost of manufacture and without significant
provide additional impact to the project. This provides the vendor’s project manager great flexibility in
equipment at cost.
avoiding penalties that may be built into the contract.
With any luck, you will get through negotiations with an agreement that keeps both
your project and the vendor’s interests intact. The contract will be the basis for much
work yet to come, so make sure it serves your purposes and gives you the project
management leverage you need to succeed in successive steps.
CHAPTEr 10
ImPlEmEnT THE SySTEm
Chapter 10:
Implement the System
What System implementation is the process of installing, integrating, testing, and accepting
procured technology. Training users and support personnel is key to integrating
technology into agency response procedures.
Why A formal implementation process provides all project participants, including vendors,
a clear blueprint for building an interoperable system of systems. Failure to follow
an implementation plan leaves the procurement and entire project at risk of failure
through miscommunications and divergent expectations.
Who The implementation plan is created by the project manager in cooperation with the
vendor’s project team and through further effort from working groups. The Steering
Committee reviews, approves, and submits the plan to executive sponsors for final
approval before implementation begins.
When Formal implementation starts as soon as a contract has been negotiated and project
teams are in place.
Implementation is the most exciting time for project managers. Many plans and much
work comes together during implementation to actually improve communications.
Up to this point, there has been a lot of envisioning, but few tangible results outside
of paper. Implementation is the time when technological and operational pieces come
together to create systems.
1 Part II: How Is Interoperability Achieved?
Prologue to an Implementation
Implementation of the system of systems we have described requires that you,
your vendors, and your project teams all work together toward well-defined ends.
In the implementation phase, definition of those ends requires clear roles and
responsibilities, an implementation plan, detailed documentation, and an acceptance
test plan. Because the value of any system is directly related to how well it is used,
training according to established or newly created procedures is a critical part of
implementation.
n Your Roles
As the project manager, consider yourself the CWO (chief wellness officer). You’re
vendors become responsible for assuring the project is well-founded, well-defined, well-planned, well-
stakeholders once communicated, and now well-implemented. Consider that in this phase you have new
contracts are
signed.
stakeholders: Your vendors. Obviously, their stake in the project is clear, but like other
stakeholders, they depend on your success in carrying out these responsibilities.
Your implementation plan details how the project’s work is going to get done. That
requires a number of decisions about who takes care of what. While you may be tired
of plans by now, rest assured that most of the work for the implementation plan is
already complete. We will talk further about creating the plan in the next section.
Chapter 10: Implement the System
1
Documentation should be planned and managed throughout a project. In the
implementation phase, documentation created by vendors and your project teams
will serve project goals long after the system is up and running. Your added project
management role during this phase is to oversee its completion.
Acceptance testing is the process of verifying that components and the system, as
a whole, function as specified. You may have considered requiring an acceptance test
plan as part of the request for and evaluation of proposals. We didn’t recommend it
earlier because most procurements for communications systems proceed as requests
for proposals (RFP), which implies that a good deal of flexibility in proposed solutions
is allowed. Acceptance plans may be very different across solutions offered, making
them difficult to comparatively evaluate.
n Vendor Roles
Your vendor or vendors will appropriately participate in creating the implementation
plan. Their roles will have been made very clear through execution of contracts, but
Details of vendor
work will be set
further details of work will be left until now to establish. There are further tasks to
primarily by your define, activities to coordinate, and resources to schedule.
contracts.
Of course, the central vendor role is to install, customize, and activate the technology
it is providing. Since you may have contracted for other vendor services, such as
engineering and quality assurance, roles between vendors are important to define in
the implementation plan.
TECH GUIDE
Establish the Implementation Team
As discussed in the Law Enforcement Tech Guide, the implementation team consists of
ORIGINAL
207
both your project manager and those of the selected vendors. In effect, they have their
s own projects that now intersect with yours. Remind the team, if necessary, that there
is one central project—yours.
Other teams may be needed for different parts of the implementation. Common ones
include policies and procedures, construction, training, and acceptance. Depending
on your project, these and other working teams may be needed to focus work where
specific expertise is needed.
There’s no need to create separate teams just for the sake of creating teams. Do so
to maintain a reasonable span of control. Management texts stress that, as a rule of
thumb, one manager can oversee three to six direct reports. As project manager, you
have demanding communications roles in all directions, so don’t make the mistake of
failing to delegate work through teams when needed.
Your Steering Committee and executive sponsors are ultimately part of the
implementation team. The Steering Committee should play an active role in reviewing
the implementation plan and evaluating contractor performance. Executive sponsors
must approve this very critical plan and make the final acceptance. In most agencies,
final signoff on incremental payments for large contracts will be required of agency
chief executives.
207 fully useful for voice and data interoperability projects. It suggests organizing
the plan into four chapters that summarize the project, laying out its
s
organization, the implementation management process, and then details of
work, schedule, and budgets.
n Project Summary
This first chapter of your implementation plan includes a simple overview
paragraph, definitions of key terms that could be misinterpreted, and a list of
deliverables taken from your contracts. The overview and definitions could be taken
from your procurement documents as well, if you previously fleshed out an RFP or a
request for information (RFI) in that level of detail. Include an audit trail block at the
beginning of this chapter to log changes to this document over its lifetime.
n Project Organization
The second chapter details the plan approval process. Address how it is approved
initially and how changes will be managed through implementation, with a statement
of authorities and responsibilities. The approval process can be lifted largely from
your project plan.
Address how project changes will be requested and approved. Clearly describe the
approval process for change orders! Unmanaged, changes can creep into projects,
Clearly describe the
approval process distorting your original plans. One of our favorite project managers refers to change
for change orders! orders as ka-ching orders—as in the sound of a cash register racking up another sale.
You’ll want to carefully manage project changes during implementation because they
will have an impact on its timeline and/or cost.
Remember that you have new players who will also need to know your project
structure. Provide them with your organizational structure for this phase, adapted
from the project plan. Request and include the vendors’ organizational charts for the
project as well.
10 Part II: How Is Interoperability Achieved?
n Management Process
Use the third chapter to document details of how the project—and this phase—will
further be managed. Pull the objectives from your project plan for inclusion here.
They serve to inform others in the team about what is being accomplished through
this implementation of technology.
Also include assumptions and constraints from your project plan with any changes
that have arisen through the procurement process. For example, the proposed system
design may have required compromises on coverage in order to remain within the
project’s budget. This would lead to constraints on original objectives that will change
acceptance tests.
If you’ve followed our recommendations, you will be able to insert an up-to-date risk
management plan in this chapter from your broader project plan. It’s fair to advise
all team members, including contractors, what you have considered as potential risks
to the project, how serious you consider them, and what your strategy is for dealing
with them. Include appropriate information out of your contracts on any penalties
clauses and dispute resolution processes.
The final piece of this chapter is a staffing plan. Include information consistent
with your project organization chart that shows who will be assigned to various tasks
during different periods. Because the timing of your personnel resources for meeting
with contractors, escorting them to radio sites, conducting acceptance tests, and such
will be heavily dependent on vendor timelines, you will need firm ones from them
before being able to document your own commitments.
Chapter 10: Implement the System
11
n Work, Schedule, and Budget Tools
The final chapter of the implementation plan is dedicated to the details of work to be
accomplished. If your contract is with an established vendor and the project is of any
significant size, this detail will have been negotiated prior to signing contracts.
Budget Tip: The
Final Payment Include here select contract exhibits, such as the initial project schedule, the budget
Contractors will and payment schedules, and an outline of the acceptance testing process. Keep in
appropriately mind that not all members of the implementation team will have ready reference to
expect to be paid actual contracts, so it is useful to include these items in the guide that they’ll be using.
for labor and
materials as parts
Since acceptance testing can be a very detailed process as we discuss in the next
of the system
are accepted.
section, an outline here will serve to describe it for the general understanding of all
Part of your duty team members.
during contract
negotiations was Unless you are proceeding with a turnkey implementation, use this opportunity to
to arrange fair define the process of handoff of responsibilities between vendors. Add milestones
compensation in your project schedule describing these events. For example, a consultant hired to
for work while
prepare an engineering design will go through a draft, review, and finalization process
protecting the
agencies from with you before the design is handed off to contractors to build the systems.
paying for an
incomplete Conclude this chapter and the implementation plan by addressing logistical
product. Payment considerations that will be faced. Large voice and data projects can involve a lot
milestones should of equipment that needs to be shipped to various sites. The logistics of who, when,
be linked to and where equipment is received, inventoried, stored, and eventually staged for
acceptance and at
installation are important details for a smooth-running project. Take the time to deal
least 10 percent of
the contract should with these details now before you get behind the curve.
be held until after
final acceptance.
This prevents BudgEt tip: BEnEficial usE
implementations
from dragging on Contractors will also appropriately expect to be paid when you put the technology
when there is only to the work it was intended for. This doctrine—probably a contractual element—of
a bit more work beneficial use is used to trigger payment milestones, as well as to start the warranty
necessary to have a and maintenance cycle clocks ticking. The trouble is that it’s rare with complex systems
functional system, to just “flip a switch” and make everything come live.
as specified by the
contract.
Implementation more often proceeds in fits and starts. Some functionality exists before
the complete system you contracted for is available. Obviously, you don’t want warranty
clocks ticking for 100 percent of your equipment when only 10 percent of it is in use.
Use of multiple
vendors requires Careful definition of “beneficial use” during contract negotiations
additional hand-off will provide leverage during implementation and better value from
milestones in the your equipment.
project timeline.
12 Part II: How Is Interoperability Achieved?
Manage Documentation
The volume of documentation that can be generated with technology projects is
amazing. You’ve probably already had to buy a new bookshelf just to hold the project
planning documents! It’s only just begun, though, because documentation is critical in
the implementation phase to assure both its proper management and your agencies’
ability to use the system over its lifecycle.
n Project
It probably comes as no surprise that project documentation would be mentioned
here first. The implementation plan is the central piece from this phase. Since you can
expect it to change during implementation—that’s inevitable!—anticipate capturing
the details of changes proposed, accepted, or rejected in the audit trail of your plan.
n As-built
Depending on your project, as-built documentation includes engineering diagrams,
site plans, shelter floor plans, equipment rack layouts, and other depictions of
technical aspects of your system. Narrative and other textual information is
usually combined with a multitude of diagrams to literally draw pictures of what
your system looks like, as built. While much of this information may have been
developed during system engineering, its completion during implementation is an
important deliverable.
n System
System documentation is related to as-built, but focuses on the system’s technical
aspects more broadly. It may include the following:
— Logical system diagrams and process flow charts
— Backbone connectivity diagrams
— Disaster recovery procedures
— Maps of sites relative to the involved jurisdictions
— Documentation of predicted and measured radio coverage
— Installation and maintenance standards
— Electrical power service procedures and contingencies
— Location of and procedures for using spare equipment
— Logical mapping of channels and talkgroups
— User radio programming and channel assignments
— Other hardware and software configuration and tuning parameters
— Site permits and frequency licensing information.
n Equipment
Vendor documentation of all equipment procured and used in the system should
be collected, cataloged, and distributed as needed. Quick reference materials either
available from the vendor or created by the project team fall into this category.
Original equipment specifications, warranties, and installation information can be
kept as separate pieces of the broader system documentation.
Portable and mobile radios often arrive en masse, are unpacked, inspected,
inventoried, and prepared for installation or distribution. Collect user guides from
end-user equipment to distribute during training.
n Procedures
Both technical and operational procedures are included in implementation
SOP development documentation. On the technical side, equipment installation and programming
and management is procedures are important, as are preventative maintenance schedules and procedures.
covered in
Chapter 12. Standard operating procedures (SOP) for both technical and operational use
of the technology are an important part of documentation. We will discuss
development of operational use of procedures in more detail in Chapter 12,
Develop Policies and Procedures.
1 Part II: How Is Interoperability Achieved?
n Training
If training is the key to your successful implementation, then you have to expect
rely on the to document up front what is to be done and what has been done. Training plans
project working
encompassing technician, dispatcher, and field user needs are often outlined in
committees
for training procurement documents and further detailed during implementation. Your training
documentation. documentation during the implementation phase should also include all materials
used by vendors in their contracted training.
Rely on your User and Technical Committees to create training plans and organize
ongoing documentation. Documentation of who received what training, and when, is
important for all emergency services skills, including communications.
213
terms of its contract. The Law Enforcement Tech Guide provides a chapter dealing
s with developing QA tests that evaluate vendor and product performance. Acceptance
testing is the process of assuring that quality measures have been met through
discrete tests of hardware, software, subsystems, and ultimately the system as a
whole.
make acceptance Establish creation of acceptance plans as early vendor deliverables. While most
plans as early testing and all acceptance is your responsibility, of course, you may be able to adapt
vendor deliverables.
standard test plans that your vendor provides.
Evaluate the standard plan, then take the time to develop these plans further by
removing any elements unrelated to your implementation. Add others central to your
Adapt canned functional specifications. Through an iterative effort, you will be able to establish
test plans to your an acceptance test plan that meets your needs and provides project QA. A good test
project. plan adequately and accurately tests the technology as proposed by the vendor and as
contracted for.
In large projects, it makes sense to refine acceptance tests through multiple phases.
For example, an early phase of a wireless local area network (WLAN) implementation
may target the central facilities of the involved agencies, while leaving outlying
stations for later. Development and use of the acceptance plan in the first phase will
likely lead to changes for subsequent phases. If you choose that option, make note of
it in your implementation plan. Remember: the more money involved, the more is
riding on the acceptance process, and the more planning that is needed.
Chapter 10: Implement the System
1
Testing
In conducting the acceptance tests, user involvement is important for successful
implementation—and a successful project. Your acceptance team will probably be
composed of some project participants who have been involved from the beginning.
It should include members of the User and Technical Committees who will be
responsible for verifying that the project’s requirements are met.
TECH GUIDE
As discussed in the Law Enforcement Tech Guide, there are three common benchmarks
ORIGINAL
214
for testing technology: Functionality, reliability, and performance. Systems
s implemented for communications interoperability that make use of radio technology
also usually include special performance testing for coverage.
n Functional Testing
Functional tests are designed to ensure that the equipment and subsystems work
as advertised and proposed. It may take place when the system is staged, after it
Staged testing is installed, or both. Large system implementations commonly require that the
helps minimize equipment vendor stage, or assemble, equipment at the vendor’s facilities where it is
costs for large then tested for functionality. This provides some integrated testing of the vendor’s
systems.
offerings. Staged testing helps minimize costs for large systems by providing a
controlled environment where subsystems are immediately accessible—as opposed to
being on a mountaintop somewhere!
Final functional testing takes place once equipment is installed. The vendor
repeats the tests performed in staging and conducts additional tests arising from
the equipment’s integration into its physical location and other systems. For
example, radio systems are very much dependent on their antenna subsystems.
Functionality of some aspects of the radios can only be adequately tested once
the equipment is in place, antenna systems installed in their final locations, and
other subsystems integrated.
n Reliability Testing
Reliability testing typically requires some sort of simulation. As discussed in the
Law Enforcement Tech Guide, software can be tested for reliability through use of
special applications designed for this very purpose. With hardware, including radio
equipment, time is the only reliable reliability test.
Systems, as we’ve discussed them here, are a complex of software, hardware, and
human aspects. The inanimate parts form their own subsystems that can be tested
by simulating “faults” between components. For example, a shared mobile data
system with a single mobile server, but multiple agency CAD and RMS connections,
could be tested for reliability as the connections to the agencies’ information
systems are broken. This would show how other parts of the system perform under
less-than-ideal conditions.
1 Part II: How Is Interoperability Achieved?
n Performance Testing
The third stage of acceptance testing involves getting right down to measuring how
well the technology meets the operational requirements driving its procurement.
Subsystems, such as backbone networks connecting radio sites and other fixed
facilities, can be incrementally tested for performance. On the other hand, final
performance testing requires that all subsystems be installed, configured, optimized,
and integrated.
n Coverage Testing
A type of performance testing peculiar to radio systems is coverage testing. Radio
coverage testing involves field measurements of signal strength and a healthy dose
of science mixed with probability statistics. Without getting into the heavy details,36
radio coverage varies greatly based on distance and intervening obstacles between the
transmitter and receiver. Obstacles can be everything from buildings to the human
body. It also varies over time at any given spot. Radio system designers work to
account for these variations in predicting coverage.
36
The accepted standards for coverage testing are defined in the Telecommunications Industry
Association (TIA) Telecommunications Systems Bulletin TSB-88, “Wireless Communications
Systems, Performance in Noise- and Interference-Limited Situations, Recommended Methods for
Technology-Independent Modeling, Simulation, and Verification.” Note that this is not a formal
standard, but an accepted technical methodology. For more information, see
http://www.tiaonline.org/.
Chapter 10: Implement the System
1
Typically, public safety agencies specify coverage requirement as a percentage of a
geographic area under certain conditions and to a certain level of audio quality, such
as the following:
95 percent coverage of the city is required for a Delivered Audio Quality (DAQ ) of 3.4
with portable radios carried outdoors at the hip, for both transmit and receive.
It’s not a matter Obviously, coverage testing during implementation to verify this is going to take some
of simply driving technology, statistics, and work. It’s not a matter of simply driving around saying,
around saying,
“Can you hear me now?”
“Can you hear me
now?”
If your project requires it, coverage testing is not something to be taken lightly! It’s
one of those areas of implementing technology for which you should hire qualified
assistance if you don’t have the expertise internally.
1 Part II: How Is Interoperability Achieved?
As each test was successfully completed, team representatives from the agency and the
vendor signed off on it with any additional notes memorializing the test.
Site Trunking
Feature Description Test
When a site goes into site trunking, Step 1. Place Site 1 into the site trunking mode.
radios with talkgroup call capability Step 2. Initiate a talkgroup call with RADIO-1 on Test TG 1 at Site 1.
Talkgroup Call
Site Trunking
Figure 10-2: Excerpts from City of Mesa (Arizona) Acceptance Test Plan
Chapter 10: Implement the System
19
Wide Area Trunking
Feature Description Test
Radios with talkgroup call capabil Step 1. Initiate a wide area call with RADIO-1 in Test TG 1.
ity will be able to communicate Step 2. Observe that only RADIO-2 will be able to monitor and respond to
with other members of the same the call.
talkgroup. This provides the
Step 3. Initiate a wide area call with RADIO-3 in Test TG 2.
effect of a private channel down
Talkgroup Call
to the talkgroup level. This test Step 4. Observe that only RADIO-4 will be able to monitor and respond to
will demonstrate that a talkgroup the call.
transmission initiated by a radio
user will only be heard by system
users who have the same talkgroup
selected. As with other types of
calls, talkgroup calls can take place
from anywhere in the system.
Digital encryption is used to Step 1. Initiate a secure wide area call with RADIO-1 on Test TG 1. Keep
scramble a transmission so only this call in progress until instructed to end the call.
properly equipped radios can Step 2. Observe that RADIO-2 will be able to monitor and respond to the
Secure Operations
alert will sound an alert tone. As incoming call alert that was sent but RADIO-3 does not.
with other types of calls, call alerts Step 5. Verify that RADIO-1 gets an audible indication that the call alert
can take place from anywhere in was successfully received at the target radio.
the system. Step 6. Turn off RADIO-2. Send a call alert from RADIO-1 to RADIO-2.
Step 7. Verify that the RADIO-1 user receives audible indication that the
call alert was sent.
Step 8. Verify that RADIO-1 receives an indication that the call alert was
not successfully received at the target radio.
Console
Feature Description Test
Dispatchers with talkgroup call Step 1. Initiate a wide area call from any operator position on Test TG 1.
capability will be able to com
Talkgroup Selection and Call
Step 2. Observe that RADIO-1 and RADIO-3 will be able to monitor the
municate with other members of call. De-key the console and have either radio respond to the call.
the same talkgroup. This provides
Step 3. Observe that all consoles with Test TG 1 can monitor both sides of
the effect of an assigned channel
the conversation.
down to the talkgroup level. When
a talkgroup call is initiated from a Step 4. Initiate a wide area call from any operator position on Test TG 2.
subscriber unit, the call is indicated Step 5. Observe that RADIO-2 and RADIO-4 will be able to monitor the
on each dispatch operator position call. De-key the console and have either radio respond to the call.
that has a channel control resource Step 6. Observe that all consoles with Test TG 2 can monitor both sides of
associated with the unit’s chan the conversation.
nel/talkgroup.
Talkgroup patch allows a dis Step 1. Select an operator position for testing which contains Test TG 1
patcher to merge several talkgroups and Test TG 2.
together on one voice channel to Step 2. At the desired operator position, select the patch tab in the patch
participate in a single conversation.window.
This can be used for situations
Step 3. Click the button on the patch that allows an operator to set up and
involving two or more channels or
edit a patch (note patch window turns blue).
talkgroups that need to communi
cate with each other. Step 4. Add Test TG 1 and Test TG 2 to the patch by selecting each
resource tile.
Talkgroup Patch
Using the patch feature, the Step 5. Once the talkgroups are added, click the patch setup button again
console operator can talk and listen to complete the patch setup.
to all of the selected talkgroups Step 6. Initiate several talkgroup calls between radios.
grouped; in addition, the members
Step 7. Observe that all radios are able to communicate with one another.
of the individual talkgroups can
Also via subsystem viewer screen, observe that only one station is
also talk or listen to members
assigned at each of the two sites.
of other talkgroups. Patched
talkgroups can communicate with Step 8. Initiate a call from the operator position using the patch transmit
the console dispatcher and other button and observe that all radios are able to receive the call and only one
members of different talkgroups station is assigned at each of the two sites.
because of the “supergroup” nature Step 9. Remove Test TG 1 and Test TG 2 from the patch.
of the patch feature.
These reports provide assistance Step 4. Using the left mouse button, click on the view button.
with system management, resource Step 5. Observe a window opens, allowing a user to enter report
planning, usage allocation, and parameters.
monitoring. All reports are prefor Step 6. Enter all desired data for the report and generate report.
matted and summarize air traffic
Step 7. Observe a window appears showing the requested report.
activity for a configured time span.
Step 8. Close the report window.
Step 9. Run the following reports during testing: Talkgroup at Subsystem
Summary; Radio User at Subsystem Summary; Site Summary.
System Reliability
This test verifies the essential Step 1. Power down one of the control channel capable stations at the
site operation within a simulcast non-essential site and note that configuration software shows the channel
system. An essential simulcast is disabled at all the other sites.
remote site is one that must have Step 2. Repeat Step 1 for each of the other control channel capable
at least one control channel and
Simulcast Essential Site Operation
ers programmed for base sta Step 2. Set up the service monitor to receive the frequency of the
tion identification at every site identification channel for the particular site.
broadcasts the FCC identifier every
Step 3. Monitor the service monitor until the system ID is broadcast.
30 minutes. To accomplish this, a
service monitor will be set up to
monitor the identification channel
of a random site and note that the
Morse code is heard.
Your next step is to develop training programs using your own internal operational
Initial training may expertise as to how the system should be used. In large projects, training development
be contracted out. and execution is contracted out because it can be a huge undertaking. Again, look for
operational expertise, not necessarily technical, in developing training for end users.
Use train-the If the system will rely on dispatchers to activate resources or use the technology,
trainer courses include special training for all dispatch agencies involved. Consider building internal
to build self- expertise within dispatch agencies involved in your project through train-the-trainer
sustaining courses contracted with either a commercial training company or through peer
expertise.
agencies elsewhere in the country that have been successful with similar projects.
We’ll have more to say about training methods in the next chapter on maintaining
your system and processes.
With an implementation plan in place, acceptance tests lined out, and training
of end users and support personnel planned, your project is well-positioned for a
successful implementation.
An Example
The process of moving from needs analysis through implementation has been
described in detail. To finish up this chapter, which is intended to guide you to an
operational system, let’s use an example to make the implementation process a bit
more tangible.
The example is a hypothetical case used to capture a composite mix of activities, but
based on very real initiatives going on around the country. It captures the mixture of
responsibilities across the project team and your vendor showing how they need to be
timed and communications shared.
Three small cities and a county have joined in an interoperability initiative to improve
communications interoperability. Alphaville, Bravotown, and Charlieport are
independent municipalities in Delta River County.
37
A repeater is a radio typically permanently fixed with an antenna well situated on a tower or other
high spot in the jurisdiction that receives radio communications on one frequency and retransmits
them on another frequency within the same band. See Chapter 16, Pages 252-253, for more detail
and a diagram.
1 Part II: How Is Interoperability Achieved?
on scene since they aren’t repeated. APD uses mobile data computers in patrol
cars to receive routine dispatches; run wants, warrants, and motor vehicle
checks; and for some car-to-car messaging.
• Bravotown shares a conventional voice radio system on VHF-high band with
Delta River County. Dispatch of the county sheriff, volunteer fire departments,
the Bravotown Police Department (BPD), and the Bravotown Fire Department
(BFD) is all handled by a consolidated dispatch center over the same set of
four repeaters spread around the county, although there are separate law
enforcement and fire channels. The repeaters are linked together so they
simultaneously transmit the best received signal on the channel anywhere in the
county.38 The volunteer fire departments have a shared tactical channel between
them for unit-to-unit communications, as do each of the law enforcement
agencies for their intra-agency use. All of the VHF-high band users have five
state-designated mutual aid channels installed in their mobile and portable
radios that are useful for direct communications. EMS services are provided
by fire department quick response units and a commercial ambulance service,
which are all dispatched on the same fire channel.
• Charlieport has a relatively new 800 MHz trunked radio system39 for
voice communications. All municipal users are on the system. Portable
and mobile radios are also programmed with five state-designated mutual
aid channels, which also happen to be nationally standardized. These are
typically used to communicate unit-to-unit with state police and highway
maintenance responders that use a similar statewide system. The Charlieport
Police Department (CPD) and the Charlieport Fire Department (CFD) use
a common mobile computer system with wireless services provided by a
commercial carrier.
While this is a hypothetical scenario, it is very realistic and exists in similar form all
around the country. In our example, all these agencies have joined in a countywide
initiative to improve interagency communications for first responders. Let’s take a
look at the system of systems they chose and what’s involved in implementing it.
38
This is known as a simulcast system with receiver voting. For practical purposes, the system can
be thought of as a single repeater with the wide, composite coverage provided by all the separate
sites. The effect is a single channel that covers a wide expanse, which can be good at times and bad
at others, depending on whether distant communications are needed or only interfering with more
pressing, shorter-range ones.
39
A trunked radio system uses repeaters, too, but computers in the radios and at the heart
of the system automatically assign their use to individual conversations between groups
of users, or talkgroups. This makes channels defined functionally, rather than defined
electronically or geographically.
Chapter 10: Implement the System
1
Delta River County: To-Be
Through a needs analysis and conceptual design, the agencies decided to use
a combination of approaches to improve their interoperability. The Steering
Committee concluded early on that both voice and data communications were
important. Jointly, the agencies first issued an invitation for bid (IFB) and hired
a systems integrator, then followed up with an RFP to procure the technology.
Functional specifications were created around their requirements and the conceptual
design. They called for the following:
• A cache of 16 VHF-high band portable radios programmed for all the county’s
channels and five state mutual aid channels in the band. These will be used for a
command net during extended interagency incidents.
• One new channel added to the county’s conventional system for interagency use
and one new site in Charlieport to improve the system’s coverage in the denser
downtown area.
• A fixed gateway device in Charlieport capable of interconnecting an existing
CPD/CFD command talkgroup to the new county interagency repeated channel
and Alphaville direct command channels. The gateway will be controlled by
Charlieport central dispatch.
• A mobile gateway device to be housed, maintained, and fielded by AFD. It will
be used to interconnect Charlieport mutual aid responders outside of the range
of their system to other responders using direct 800 MHz, county VHF-high
band, and Alphaville UHF mutual aid channels. Similarly, it will bring AFD
and APD direct channels into interconnected groups outside the range of the
Alphaville primary system. In effect, this device will serve as a mobile crossband
repeater for linking channels around an incident site.
• An intersystem message switch for connecting the Alphaville and Charlieport
mobile data systems together to allow car-to-car and dispatch-to-dispatch
messaging. The system’s primary use for interagency communications will be
for messaging between dispatch centers, incident command posts, emergency
operations centers (EOC), and evacuation centers. Fixed terminal access to
the Charlieport system will be established in the Delta River Central Dispatch
and EOC.
Through the RFP, the partners made multiple awards. The first went to a nearby radio
communications service shop for the cache radios, programming, and packaging in
a deployable case. The second went to a large radio systems vendor for most of the
other work, except for the mobile data system interconnect, which went to a third
company. Training of users and technicians was included as a task under all three
contracts.
TECH GUIDE
Following the Law Enforcement Tech Guide, The Delta River project manager pulled
ORIGINAL
208
together a draft implementation plan from materials in the original project plan and
s new contracts. He had the systems integrator draft an acceptance plan in cooperation
with the other contractors while the implementation plan was being put together.
Initiate changes A policies/procedures team was brought together from key members of the User
to policies, Committee. It was charged with again reviewing all the agencies’ relevant policies,
procedures, and SOPs, and mutual aid agreements that went into a business process baseline report.
agreements early The team was further charged with drafting needed new policies and procedures for
on.
use of their new capabilities.
The earlier needs analysis process had turned up some procedural holes in the
countywide emergency operations plan, particularly as it defined the command
structure for interagency response. While the Incident Command System (ICS) was
commonly expected to be used, few agencies in the county regularly used it.
With funding being increasingly tied to use of the National Interagency Management
System (NIMS), the policies/procedures team found this was a good time to define
Integrate expected how agencies in the county would use NIMS-based ICS for interagency operations.
changes to incident Working through their agencies and the project User Committee, the team came up
response into the with new draft procedures describing interagency command processes and worked
new system of
them through the Steering Committee for approval. The project’s executive sponsors
systems.
carried the new operating procedures and their communications counterparts
through the Local Emergency Planning Committee (LEPC) required by state and
federal legislation.
Chapter 10: Implement the System
1
Elsewhere in the project, a construction team was assembled with the Steering
Use outside Committee’s approval to guide the development of the new Charlieport radio site. The
resources for help team consisted of the Charlieport facilities director, a county zoning officer, a CFD
managing project captain who served on the city’s earlier steering committee for its 800 MHz system,
construction. and a CPD technical services manager responsible for daily operations of the system,
who also chaired the initiative’s Technical Committee. The team’s charge was to select
an appropriate site with the guidance and eventual concurrence of the system vendor
that provided adequate coverage, was affordable and acceptable, and ideally was on
city- or county-owned property.
The acceptance team built a series of tests for each of the system’s technology
components that would lead them to acceptance of the pieces and eventually the
system as a whole. A previously planned LEPC tabletop exercise provided a good
venue for testing the radio cache when it was delivered. Tests turned up needed
programming changes and suggestions for additional battery packs, which was
outside the contract, but negotiated through a change order with the vendor after the
Steering Committee approved doing so.
Acceptance testing of the fixed and mobile gateways proceeded through three steps:
Functional, Functional, reliability, and performance testing. Functional testing was performed
reliability, and by the team with additional help from members of the Technical Committee. It
performance tests followed a script calling for separate radios from each of the agencies to be brought to
were conducted.
Charlieport, activation of the gateway, and then testing transmissions sent back and
forth. The mobile gateway was similarly tested in Alphaville.
Reliability testing of the gateways was conducted over the period of a month with
reliability testing daily activations of the devices and weekly testing of actual transmissions between
takes time. agencies. Performance QA tests were conducted during all the functional and
reliability tests. They consisted of minimum setup and breakdown times for the
devices themselves, as well as individual connections between channels. Audio quality
Adapt existing tests and induced delay tests were also performed to see if the gateways materially affected
from other agencies communications. Most important, functional tests allowed the partners to look for
and sources. negative tests the gateways had on their existing systems, such as connecting repeated
systems in a loop.
TECH GUIDE
The intersystem message switch between Alphaville and Charlieport mobile data
systems was similarly tested on all three levels. The acceptance team contacted agency
ORIGINAL
216
references provided by the radio system vendor and adapted their test plans from a
s similar implementation. They also made use of sample language provided in the Law
Enforcement Tech Guide, further customized to include tests across both jurisdictions’
dispatch points, the new EOC installations, and directly between responders.
1 Part II: How Is Interoperability Achieved?
Anticipate that Further training continued as various parts of the system were put into place. It was
training will be a timed so that, if the schedule went as planned, there would be no more than 6 weeks
perpetual process. between hands-on training and final acceptance.
Final acceptance was contingent on a full-scale exercise that was planned and
scheduled by the acceptance team through the LEPC starting early in the project.
The exercise brought out police, fire, EMS, and emergency management personnel
from across the county in a tornado scenario. Since the county had regularly used
such scenarios for emergency planning in the past, it provided a good opportunity to
stress-test the new system of systems—complete through all technology elements,
Use exercises policies and procedures, and training.
for performance
testing. The exercise pointed out needed adjustments in procedures for activation of the fixed
gateway and coordination of its use with technicians deploying the mobile gateway
in order to reduce any future interference between the two. These adjustments
were entirely the responsibility of the project team, so didn’t affect final acceptance
and payment to the vendor. A error in the mobile data interconnect configuration
that prevented direct messaging between the Charlieport and Alphaville EOCs was
Use successful
identified as out of specifications, though, and that vendor was able to quickly fix the
final tests to
congratulate the problem.
team and set the
stage for future A small ceremony and press conference was held the morning following the exercise
interagency by the project’s executive sponsors. They used media attention to the exercise—and
collaboration. successful testing—to announce that the project had been successfully completed.
Chapter 10: Implement the System
19
The system Separately, they met with the vendors’ representatives and formally accepted all the
of systems is remaining contractual elements, releasing the final 10 percent of payment.
the functional
collection of
The project was completed on time and budget (of course!). Training was a key part
people, technology,
and business of its success, starting with the tabletop exercises for functional testing, to traditional
processes. “train-the-trainer” methods, and on to training in the real context of how the system
will be used. This focus on training means the collection of technologies, policies,
procedures, and people will work as a single system.
CHAPTEr 11
TrAnSITIOn TO lOnG-TErm
GOvErnAnCE
Chapter 11:
Transition to Long-Term
Governance
What The ongoing work to keep technology and organizational processes working toward
interoperability goals over the lifecycle of the system.
Why In a word, because of entropy. All systems, natural and manmade, deteriorate over
time if left unattended. Communications interoperability isn’t a one-shot proposition.
When Immediately after implementation, the project has to be closed out and the
maintenance phase begun.
TECH GUIDE
Chapters 18 and 19 of the Law Enforcement Tech Guide cover project
ORIGINAL
A System of Systems
We’ve used the term “system of systems” throughout this Guide. Your
communications interoperability system, for better or worse, richer or poorer, is the
collection of policies, procedures, and technologies, as well as training and exercises
that tie it all together. As we’ve said, all systems have geographic, technical, and
functional boundaries. They also have administrative boundaries where jurisdictions
participating in your system of systems have to work with “outsiders.”
This lifecycle maintenance encompasses not only the technology that you’ve just
implemented, but the governance and management structures that drive the
system, the policies and procedures that define it for all practical purposes,
and the training and exercises that make it real.
40
U.S. Government Accountability Office, Homeland Security: Federal Leadership and
Intergovernmental Cooperation Required to Achieve First Responder Interoperable Communications, GAO-
04-740 (Washington, D.C.: July 2004) p. 54.
Chapter 11: Transition to Long-Term Governance
1
Project Closeout
Before moving on to the long-term, recurring processes of maintenance, we have a
few loose ends with the project to wrap up. Through the following steps, the project
is completed.
A final transition meeting is useful to get everyone in one room to hand over the
keys to the technological components of your new system. Proceed involving
project management and vendor staff, as well as the technicians and all
stakeholders who will be charged with maintaining the hardware, software, and
other physical components of the system. Follow the transition meeting with a
larger, open meeting for broad attendance.
Recognizing that there are processes that will continue on for weeks and months to
come, find a natural breakpoint to hold an open review meeting. Conduct a review
where executive sponsors, the Steering Committee, and the rest of the project team
can sit down to examine the project from start to finish. Honestly evaluate how
well the project’s objectives were met and how the process to achieve them varied
from original expectations. Ask the simple question of what participants would do
differently if they were to undertake the same project again.
Use the open review meeting to celebrate the successful completion of your project.
Use the opportunity The completion of the meeting is a great time for the executive sponsors to issue press
to publicly declare
releases and otherwise publicly announce the project’s completion and its success.
success.
With large projects, use a public forum afterward to present the project, problems
faced, and hurdles overcome.
Carefully document all discussions, as they will be useful in your last job as project
manager: The final report.
1 Part II: How Is Interoperability Achieved?
The report documents the final project timeline and costs. It also documents how the
Contribute lessons project’s objectives were met and what performance measures were used to assure
learned in your quality. A final budget and cost accounting is critical for both understanding and
final report for the justifying costs. Your past work to keep the project and implementation plans up-to-
benefit of others. date will simplify this task!
The report will be of most use to future readers from your agencies and perhaps
others if it includes a succinct statement of lessons learned during the project. These
are likely to be organizational, management, and operational lessons as much as they
are to be technical ones.
In our work with jurisdictions across the country that are striving to improve
communications interoperability, we find the most meaningful lessons coming from
other agencies that have been down similar paths. Contribute your lessons learned as
a special section of your final report.
In addition, many representatives who would insist on being part of the Steering
Committee will now be comfortable stepping back from regular meetings and
delegating ongoing oversight to joint representatives. This may be a process that takes
a while, but will occur over time.
Your structure will vary, as did your project governance, based on the scope of your
Adapt your project initiative. Whether the project is large or small, ongoing oversight can be provided
governance by a similar, but smaller group. Large initiatives for widely shared systems face
structure for difficult choices between models, such as creating independent governmental or
ongoing needs. quasigovernmental organizations or partnering with private companies. Regional
projects, on the other hand, typically act as consortia of independent jurisdictions
operating under mutual agreement.
REGIONAL
INTEROPERABILITY BOARD
ExECUTIVE
COMMITTEE
STATEWIDE
INTEROPERABILITY SYSTEM MANAGER(S)
COMMITTEE
Seriously consider limiting the size of the board. Any body that has more than 10
members needs an executive committee of fewer people to get work done between
meetings. All participating jurisdictions can and should be represented, although they
don’t necessarily need a seat on the board.
STATEWIDE INTEROPERABILITY
COMMITTEE RESOURCES
Federal Communications Commission (FCC):
http://wireless.fcc.gov/publicsafety/700MHz/interop.html
Appendix A includes example agreements for simple and more complex sharing
projects. Any agreement covering all aspects of system sharing, including
governance, basic use procedures, and maintenance responsibilities, will be an
extensive document.
Adapt the project communications plan for the new board or council.
gOVErnancE rEsOurcEs
To find more information on governance structures for large, shared systems,
see the supplemental resources that were produced by the National Task Force
on Interoperability (NTFI):
http://www.justnet.org/pdffiles/ntfi_supplemental.pdf (~3.0 MB)
190 Part II: How Is Interoperability Achieved?
“Where do we get The sources are many and varied, ranging from the public agency equivalent of
the money?” passing the hat (asking participants to provide some share of costs out of their own
budgets), to grants, and perhaps new forms of recurring review, such as taxes and
fees. We’re aware of jurisdictions that have turned to the private sector for grants and
donations, although these typically provide only a small share of what are often costly
projects.
TECH GUIDE
Grant funding is traditionally sought for technology initiatives. The Law Enforcement
ORIGINAL
235
Tech Guide provides a whole chapter on grant management and compliance that you
s will find invaluable if you have received a grant.
Interoperability is a national concern and need. Federal grant programs can only fund
a share of a small number of needed initiatives across the country.
Modern voice radio systems have an expected lifespan of about 10 years. Though user
Estimate a 10 and infrastructure radios have traditionally been kept in service two or three times
year lifecycle for that long, today’s sophisticated systems are increasingly computer-controlled and
modern voice radio become obsolete much more rapidly. Manufacturers establish technology lifecycles,
technology. which affect upgrade needs and, eventually, replacement.
Data communications systems are in an even greater state of flux as more and more
agencies move from low-tech systems they owned, operating essentially as did their
voice radios, to higher bandwidth systems, both governmental and commercially
operated. A major manufacturer of equipment recommends using a 3- to 5-year
WlAn lifecycles are
estimated as 3 to 5 period for calculating the TCO of wireless local area networks (WLAN).41 Consumer-
years. grade technology tends toward the lower end of that time range, while that built for
military and public safety purposes can physically be expected to last much longer,
perhaps beyond its useful life. For planning purposes, figure that the technology
lifecycle for data communications radio technology is closer to 5 years.
The good news is that your agencies are probably already paying a portion of that cost
in the form of maintenance and support personnel. You’ll have to determine if there
will be added staff and training costs in the future based on the scope of your project
and the agencies’ willingness to share maintenance responsibilities.
41
“Wireless LANS – Total Cost of Ownership,” Cisco Systems, Inc., 2004. See http://www.cisco.
com/application/pdf/en/us/guest/products/ps4076/c1244/cdccont_0900aecd801bb7d4.
pdf.
192 Part II: How Is Interoperability Achieved?
A funding model consists of project costs, funding sources, and policies for cost
sharing. Create 5- and 10-year projections of expenses and revenues. A 5-year plan is
sufficient to account for budget cycles and the expiration of initial warranties. A 10-
year plan has to take into account the system lifecycle and the planning costs, at least,
for the system’s replacement.
Use 5- and 10-year Long-Term funding models are as varied as the initial systems and their funding
projections. sources. The simplest are based on a handshake agreement. More complex initiatives,
such as those making use of shared systems for both their intra- and interagency
communications, often make use of monthly service fees to pay at least ongoing costs.
Observed monthly costs range from $20 to $60 per end-user radio.
Adapted from Wake County (North Carolina) Interlocal Agreement for its 800 MHz
trunked radio and CAD systems
Chapter 11: Transition to Long-Term Governance
193
The pursuit Create a Review Process
of perfection As the final piece of setting up governance and management, create a process for
often impedes
periodic review of all aspects of the initiative—from the governance structure and
improvement.
its membership to the financial structure. Focus particularly on the system policies
—George Will
and procedures that fuel communications interoperability. Reviews bring out
needed updates and validate those parts that don’t need changes. They provide a
means of continuous improvement without participants becoming lost in a pursuit
Periodically review of perfection.
the governance and
financial structures, Annual reviews are usually sufficient. Stagger individual reviews throughout the year
as well as policies to make them less of a chore, sharing ongoing work across participants. For example,
and procedures. January is a good time for strategic reviews to capture the enthusiasm of the new year
during a slower period for most agencies. The financial structure and budgets may be
reviewed shortly before the end of the participants’ fiscal year—presuming they are
similar—to identify needs that might be met through year-end funding and to prepare
a budget, if needed.
Have a wish list for
surprise year-end Policies and procedures should also be reviewed on a rotating schedule throughout
opportunities.
the year to spread the work. The User and Technical Committees appropriately
bear the bulk of the effort, with the Board, in whole or part, annually reviewing
management policies and procedures.
Spread reviews
through the year
and responsibility
across the
participants.
CHAPTEr 12
DEvElOP POlICIES AnD PrOCEDUrES
Chapter 12:
Develop Policies and Procedures
What Formalized interagency agreements on how the system will be maintained and used,
integrating the National Incident Management System (NIMS).
Who The system governance board approves acceptable policies and procedures developed
by the User and Technical Committees.
When Starting early in the project and carried on through a process of continuous
improvements after implementation.
In Chapter 10, we briefly touched on the creation of policies and standard operating
procedures (SOP). We noted that they evolve from SOPs existing within or,
potentially, already between partnering agencies that influenced your project needs
statements. During implementation, some are ideally further defined and executed
through initial system training. The bulk, however, are likely to grow as the system is
used more and more.
We refer here to policies as proscriptive rules and procedures as practical guidance for
how something is done. Policies may make procedures mandatory, but SOPs aren’t
necessarily so.
19 Part II: How Is Interoperability Achieved?
Central to NIMS integration into policies and procedures is the Incident Command
System (ICS). Policies and procedures based on ICS, incorporating its structure,
conventions, and operational principles, bring commonality to the way different
agencies work.
Create policies and procedures for routine and targeted capabilities using a standard
nImS-integrated
SOPs lead to model adopted by the governing body. Address technical and operational aspects
interoperability. of the system, integrating NIMS throughout. This approach assures the greatest
communications interoperability, plus compatibility with neighbors far and wide.
National Priorities:
Focus on Routine and Targeted Capabilities
–nImS Policies and procedures for communications systems, first and foremost, provide for
–Information agencies’ day-to-day operational needs. Procedures that are used regularly become
sharing part of a responder’s natural reactions. All emergency response disciplines recognize
–Communications that, under the stress, people perform as trained—for better and worse. The classic, if
interoperability tragic, story in law enforcement is of the officer found shot with empty cartridge cases
in his pocket, having spent hours on the shooting range practicing “procedures” that
had nothing to do with—and were counterproductive to—surviving a shootout.
People perform as
During the stress of emergencies, responders will most reliably perform the tactics
trained—for better
and worse.
they have learned, exercised, and used daily. Interagency communications procedures
are only effective if used. They are most likely to be used if they are part of daily or, at
least, very regular practice.
Tactics and tools
used daily will Lay the groundwork for automatic behaviors during emergencies by establishing
be most reliable routine interagency procedures. Make the less common ones memorable by making
during unusual them simple, by creating “cheat sheets” for easy reference, and by practicing them
emergencies. during exercises. Don’t presume that every proscriptive policy and each procedure
established will immediately become part of every responder’s repertoire.
42
See Chapter 3, Operability—Job #1.
Chapter 12: Develop Policies and Procedures
199
Targeted Capabilities
In late 2003, Homeland Security Presidential Directive 8 (HSPD-8), “National
Preparedness,” was released.43 Its purpose was to strengthen preparedness
capabilities of all levels of government to terrorist attacks, major disasters, and other
emergencies. It required development of a national preparedness goal44 that included
readiness metrics and full implementation of a closely coordinated interagency grant
process for first responder preparedness assistance by the end of federal Fiscal Year
2005 (September 30, 2005). The directive noted that, “[t]o the extent permitted by
law, Federal preparedness assistance will be predicated on adoption of Statewide
comprehensive all-hazards preparedness strategies.”
Three of the seven national priorities articulated in the National Preparedness Goal
(NPG) are particularly relevant here: Implementation of NIMS, strengthening
of information sharing and collaboration capabilities, and strengthening
communications interoperability. The NPG relies on an approach called Capabilities-
based Planning to reach the goal, with 15 standardized National Planning Scenarios,
a Universal Task List to reference tasks performed by all levels of government and
different disciplines during incidents, and a Target Capabilities List identifying
capabilities needed to perform the tasks.
The National Response Plan provides a concept of operations to which state and local
Emergency emergency operations plans are intended to be aligned. Emergency operations plans
operations plans are supported by or built upon SOPs that are intended to be consistent with NIMS
are to be built upon guidelines, standards, and protocols.45 Emergency planners are expected to identify
SOPs consistent tasks from the Universal Task List that their organizations need to perform based on
with nImS. their assigned roles and mission. The Target Capabilities List (TCL) descriptions are
used to determine the capabilities needed to accomplish these tasks, variously by
different response elements.
Interoperable
communications Currently, there are 36 capabilities in the list, of which 32 are grouped into four
is one of four
mission areas: Prevent, protect, respond, and recover. The remaining four are
capabilities
common to all capabilities common to all mission areas. Interoperable communications is second
mission areas. among the four common capabilities.
43
See http://www.whitehouse.gov/news/releases/2003/12/20031217-6.html.
44
See http://www.ojp.usdoj.gov/odp/assessments/hspd8.htm.
45
The National Response Plan and National Incident Management System were established
by Homeland Security Presidential Directive 5: Management of Domestic Incidents (HSPD-5). See
http://www.whitehouse.gov/news/releases/2003/02/20030228-9.html.
200 Part II: How Is Interoperability Achieved?
Work is under way to define conditions and standards for each task, as well as
performance measures and metrics to assess capabilities. Measuring communications
interoperability is addressed in Chapter 15, Measuring Interoperability.
Specific information on the National Response Plan tasks and capabilities can be
found in the U.S. Department of Homeland Security’s Lessons Learned Information
Sharing web site.46
46
The Lessons Learned Information Sharing web site is only available to emergency response
providers and homeland security officials. Registration is required and eligibility is verified. See
https://www.llis.dhs.gov .
47
System governance is being transferred to the Metropolitan Emergency Services Board and
the system is becoming part of the larger, statewide system. The document is currently available
through the Statewide Radio Board at http://www.armer.state.mn.us/.
Chapter 12: Develop Policies and Procedures
201
— An operational context statement addressing when it is appropriate
— A recommended protocol/standard statement addressing related criteria that
qualify use of the one being established
— The recommended procedure, itself, describing how the task is performed,
including individual steps and locations of reference documents
— A management statement describing who is responsible for supervising or
managing this procedure.
Appendix B contains an example from the MRB document that addresses patching of
shared channels in the region to the system.
The Montana shared channels plan demonstrates a standardized method for creating
policies and procedures, coupled with practical demonstrations of use.
48
Montana Mutual Aid and Common Frequencies, State of Montana, 1990-2005. The most current
version is a minor update to the 1994 edition written by this author. See http://itsd.mt.gov/
techmt/publicsafety/mutal_aid_manual/2005_mutual_aid_book_2005_web_final.pdf.
202 Part II: How Is Interoperability Achieved?
Many technical SOPs can be developed over time, shaped by your system and needs.
Some of the more common ones include:
— Equipment management and deployment
— Standard equipment configurations
— Maintenance of radio caches
— Gateway configuration, maintenance, deployment, and use
— Outage responsibilities and standards for repairs
— Availability of spare equipment
— Preventive maintenance
— Notification of maintenance activities.
Technical maintenance needs are addressed in Chapter 14, Maintain the Technology,
which discusses some specific activities where technical SOPs may be necessary.
The highest levels of interoperability are achieved through integration of the NIMS
into procedures used regionally across participating jurisdictions.
49
ICS uses standardized forms. The Incident Communications Plan, described further in this
chapter, is based on form ICS 205. See http://www.nimsonline.com/nims_3_04/examples_
of_ics_forms.htm#205.
50
Adapted from current editions of National Wildfire Coordinating Group task books. Available at
http://www.nwcg.gov/pms/taskbook/logistics/logistic.htm.
Chapter 12: Develop Policies and Procedures
203
The The Communications Unit is composed of four different positions, as needed: The
Communications unit leader, technicians, radio operators, and ICC managers. These positions are only
Unit includes a filled when needed. Appendix C provides tasks lists from NIMS-compliant source
leader, technicians,
material for each of these positions.
radio operators,
and ICC managers.
Integrated communications is an original, fundamental tenet of ICS. Policies and
procedures for use of the ICS Communications Unit during larger emergencies are
important for communications interoperability.
By either name, incident dispatchers and their supervisors would staff the ICS radio
operator and ICC manager positions, respectively, in a NIMS-based response. During
large emergencies, an on-scene communications center is crucial.
Consider establishing policies and procedures for incident dispatch teams as part of
your Communications Unit.
Communications channels of declaring it or accepting an announcement from another user. They are in
often becomes charge of controlling the network, in effect, and opening it back up for regular traffic.
the ‘fall guy’ for
organizational Procedures are also needed for emergency traffic on channels that dispatchers
problems. An
don’t manage. Tactical channels used on scene are in equally high need of
excessive number
of responders procedural definition of who declares “emergency traffic,” who controls the
attempting to talk to channel, and how it’s cleared. Typically, the highest-ranking ICS position on the
the IC* (generally channel bears the responsibility.
all at once),
compressed time,
getting behind and
Channel Span of Control
chasing the incident Very similar to the ICS principle of maintaining a manageable span of control in
problem, playing supervision, channel span of control procedures are important. The history of
‘catch up,’ and emergency response is replete with stories of responders in dire circumstances who
general operational couldn’t get access to a channel because of too much traffic. One of the most tragic
confusion can occurred in Hackensack, New Jersey.
quickly beat up and
overwhelm any
incident commo
In its 135-year history, nine Hackensack firefighters made the ultimate sacrifice. Four
[communications] have died in motor vehicle accidents. Five perished during one fire on July 1, 1988.
plan/system. … Two firefighters—who initially survived the collapse of a bowstring truss ceiling
Any part of the that claimed the lives of the others—were trapped inside where they were unable to
system operating communicate their situation due, in part, to the channel being overloaded with other
beyond their tactical, command, and dispatch traffic.
effective span of
control (five to
six) will almost Maintenance of a manageable span of control on a radio channel enforces the more
instantly develop general ICS management principle. Use of tactical channels removes some share of
commo problems. other incident traffic from broader dispatch and response channels. Ideally, only a
The way to fix the single supervisor and subordinates would operate on a single channel. Any more than
commo problem is that and responders have to decipher traffic not intended for them, risk mixed orders,
to fix the span-of and compete for the channel when they have emergency traffic. The volume of traffic
control problem,
on overloaded channels has caused more than one responder to turn the volume
and (bingo!) the
commo settles down or radio off in order to have a moment to think or converse with others.
down and becomes
normal. Operations with extremely compressed timeframes, such as SWAT incidents,
—Fire Command advanced life support, and most firefighting require simple, direct, and immediate
Chief Alan communications capabilities. This can only be provided by maintaining a manageable
Brunacini, channel span of control.
Phoenix (Arizona)
Fire Department Create policies and procedures that move incident traffic from cluttered channels
to operational and tactical channels organized in a manner similar to the incident
* Incident
Commander organizational structure.
Chapter 12: Develop Policies and Procedures
20
Common Standard Language
terminology,
Much of what passes as poor communications is actually miscommunications. NIMS
resources
definitions, and ICS and its predecessors identify as its first management characteristic the use of
plain language common terminology for organizational elements, position titles, resources, and
are crucial for facilities. One of the most important policies that can be established for interagency
communications communications is common terminology to be used by responders, further reinforced
interoperability. through procedures.
Last, the most important language policy that can be adopted to improve interagency
communications is the use of plain language—eliminating codes and jargon. This is
a simple idea, but every vocation and avocation has its own terminology. When these
diverge across agencies and disciplines, responders don’t communicate.
Communications-Order Model
Another communications best practice that has proven effective is a communications-
order model that provides positive message acknowledgement. This is a basic process
that can work with any medium, voice or data, but is most clearly seen with first
responder push-to-talk radio communications. It’s simple and we do it in our daily
lives when we’re communicating best.
Some jurisdictions reverse the order of whose “name” goes first. A standard
convention is most important, though there’s bound to be those border issues where
one convention butts into the other, confusing everyone who doesn’t recognize the
callers’ voices and is trying to figure out what’s going on. While there is no definitive
standard, we suggest the sequence above. It’s used by many public safety agencies, the
U.S. Army, and air traffic controllers, which is good enough for us!
Positive message The keys to the communications-order model are convention and positive message
acknowledgment acknowledgment. The sender knows the message was received as intended. With
is good practice, it can be done efficiently, with a fraction of the airtime necessary for
communications. repeated and missed messages.
Development of A simple example is the transmission of location and status by reporting units—
unit reporting typically those in the field—once during a sequence of transmissions. While modern
procedures gets
trunked radio and automatic vehicle location (AVL) systems capture some of this
operations folks
talking about information, nothing is so simple and effective for all participants as a simple voice
operational needs transmission. Not every one who “needs to know” will be near a CAD display or
and uses of the using AVL-enabled radios (essentially only mobiles). A simple “Available at staging”
system. statement says a lot.
Operational unit reporting procedures across agencies are powerful tools to flesh out
the system of systems by getting field operations staff talking about what they need to
talk about.
Templates are Plans do have to be customized by a Communications Unit during larger emergencies,
useful, but however. What constitutes a large emergency is jurisdiction-dependent. Basically,
communications any response requiring more than a couple dozen responders needs an on-scene,
plans have to be
incident communications center of some form—and a communications plan tweaked
customized for
large events.
somewhat to fit the incident.
Consider an example. The “Law Enforcement Branch” director and each of the team
Branch directors,
group supervisors,
leaders and group supervisors are connected by a common line, or channel, of some
and team leaders form. The communications plan has to identify how that connection is made. Typically,
are standard ICS some radio channel would be assigned for “Law Enforcement Branch Command,” which
position titles. is represented by that line. The ICS 205 for this scenario would, figuratively, describe
how each of those interconnecting lines is supported with communications.
51
The National Wildfire Coordinating Group, a long-organized group of government agencies
with wildland firefighting responsibilities, has standardized the ICS 205 and other ICS forms. See
http://www.nwcg.gov.
20 Part II: How Is Interoperability Achieved?
The experienced responder will notice that the chart in Figure 12-1 stops at a certain
level of detail and doesn’t depict the tactical channels that would be used within
many of the indicated operational elements. The diagram is simplified for the sake
of discussion, whereas an actual incident response with those operational elements
would likely involve more than a hundred responders. The ICS 205 for the scenario—
whether as a template or an actual incident plan—would identify all communications
resources to be used to support the response.
Tactical Federal guidance for these plans suggested including the following elements:
interoperable — Background, describing the urban area and how tactical interoperable
communications communications would be governed in the region
plans are a
requirement of — An equipment and capabilities inventory, including points of contact for
some homeland activating and supporting resources
security grant — Tactical interoperable communications policies and procedures
funding.
— Incident communications plans matching resource to response structures
— NIMS-compliant training planned for Communications Unit leaders
— Appendixes that further document details.
These topical areas outline well the information needed for incident communications
planning.
52
See http://www.ojp.usdoj.gov/odp/docs/fy05hsgp.pdf.
CHAPTEr 13
TrAIn AnD ExErCISE
Chapter 13:
Train and Exercise
What The process of instilling skills and improving performance for achieving
communications interoperability.
Why As part of the system of systems for interoperability, users have to be prepared for
routine and targeted capabilities in the context that skills will actually be used.
Who The User and Technical Committees are responsible for guiding development of
training and exercises for interagency systems.
When Start training and doing realistic exercises during implementation, continuing in a
process of continuous improvement through the system’s lifecycle.
Not every difficult All the policies and procedures created to improve interagency communications are
and dangerous useless unless they are put to work. Training and its practical counterpart, exercises,
thing is suitable are required for any system of systems to work during routine events, special task
for training, but force operations, or large-scale emergencies.
only that which
is conducive
to success in Focus on Both Routine and Targeted
achieving the object
of our effort. Capabilities
—Epictetus As noted previously, the most well-executed tactics are those used and practiced on
a daily basis. Communications interoperability is achieved, foremost, through the
regular use of interagency capabilities on a routine basis.
Instill the best practices for response during emergencies large and small by building
A good plan today them into basic training and in-service programs, as well as into exercises that give
is better than responders even greater ability to use the communications capabilities during realistic
a perfect plan circumstances. Meld the target capabilities of the National Response Plan into
tomorrow. training for both routine and extraordinary events, to assure agencies involved in your
—General George initiative can leverage what they do daily for even larger emergencies. Recognizing
S. Patton that many capabilities will grow over time, use a process of continual improvement to
chart progress.
21 Part II: How Is Interoperability Achieved?
Train in Context
The most effective method of training adults in practical skills is by doing it within the
context of how the skills will actually be used. For example, the training mentioned
previously that led police officers to pocket empty cartridge cases has given way to
realistic, tactical training in which officers are required to seek cover, distinguish
threatening from nonthreatening targets, and shoot effectively under added
I hear and I distractions. This training in the context of how skills will be used is very effective and
forget. I see and I applicable in communications training.
remember. I do and
I understand.
In effect, end users aren’t trained to use radios—they’re trained to communicate while
—Confucius
doing their jobs. That may seem like a subtle distinction, but in practice it means
that communications training is most effective when it is embedded within other
training—not conducted in isolation.
Exercises provide From the perspective of communications interoperability, exercises provide an ideal
the means to opportunity to stress test the entire system, including the hardware, the software,
stress-test the and the “liveware.” A standardized exercise program includes a progressive set of
entire system of exercises that are each appropriately evaluated, with results incorporated back into
systems.
the program for further training.
53
See the HSEEP at http://www.ojp.usdoj.gov/odp/docs/hseep.htm.
Chapter 13: Train and Exercise
21
Discussion-Based Exercises
HSEEP addresses four types of discussion-based exercises: Seminars, workshops,
tabletop exercises, and games. Seminars and workshops are familiar to most
people, while tabletop exercises and games are less so. According to HSEEP,
operational simulation games are an increasingly sophisticated and useful component
of exercise programs. They seem to currently offer little in the way of communications
training suitable for first responders, however.
Tabletop exercises
provide the means Tabletop exercises are probably more familiar in emergency training to most than
to master script for games or other automated simulations. Tabletops offer an opportunity to first
operations-based introduce new policies and procedures, identify disconnects as they are tested through
exercises. discussion, and then master scripts that might be further tested operationally.
Operations-Based Exercises
As the name and distinction implies, operations-based exercises take participants to
Operations-based the field for actual training and practice. They provide the means to validate policies
exercises provide and procedures, while testing the technology as well. Three types of operations-based
training in context. exercises are identified by HSEEP: Drills, functional exercises, and full-scale
exercises.
Drills are limited in scope, testing one part of the system in isolation, although
as realistically as possible. An example for communications may be a drill of a
technician team responsible for deployment of field gateways. Procedures that could
Drills are limited only have been discussed during a tabletop exercise can be tested in more realistic
exercises. circumstances, although still in isolation from a larger response system. This allows
system managers and planners an opportunity to evaluate the procedures—as well as
the drill design—for subsequent improvements.
A functional exercise along the same lines might bring a special operations team and
the technicians to the field with a mobile command post to test not only deployment
and setup, but also further use. The exercise is still limited in scope and evaluation
is key to the process of continuous improvement. HSEEP notes that functional
exercises are generally designed to exercise the direction and control of resources,
rather than systems. In our example, the gateway would not be thoroughly tested for
functionality, capacity, and coverage, but rather for its appropriate deployment and
operational command.
Full-scale exercises are, by definition, multijurisdictional exercises that bring out a full
Full-scale exercises response system. Communications is tested as a part of a larger effort. This provides
stress-test entire realism that exercises the communications interoperability system of systems, as a
systems.
whole, in the context of how it’s used during near-real operations. Full-scale exercises
are intended to stress-test systems under realistic circumstance and timeframes.
21 Part II: How Is Interoperability Achieved?
Evaluations
As noted, exercise evaluations are crucial. They are appropriately designed, planned,
Exercise and carried out with as much attention to detail as the rest of the exercise. HSEEP
evaluations provides an entire volume addressing the process.54 Key elements include the use of a
are necessary
debriefing for planners, facilitators, controllers, and evaluators and a “hot wash” for
for a process
of continuous all others. The hot wash follows the exercise immediately while multiple debriefings
improvement. may be necessary to capture observations and document details from multiple sites.
Debriefs and hot washes are used in evaluation of both discussion- and operations-
based exercises.
An After-action Analysis and Report (AAR) captures details more broadly for the record
and recommends improvements. Under HSEEP, they are prepared for all exercises
except workshops and seminars, where a summary report suffices.
54
Homeland Security Exercise and Evaluation Program, Volume II: Exercise Evaluation and Improvement,
U.S. Department of Homeland Security. Available at
http://www.ojp.usdoj.gov/odp/docs/hseep.htm.
CHAPTEr 14
mAInTAIn THE TECHnOlOGy
Chapter 1:
Maintain the Technology
What The ongoing work to keep technical components of the system operational over its
lifecycle.
Who Ultimately, the system’s governing body is responsible for identifying which agency,
agencies, or vendors will maintain different technical components of the system.
When Starting from the day the technology is installed, throughout the system’s lifecycle.
Identify Responsibilities
Start the maintenance process by identifying responsibilities for each technological
component of the system and each job that has to be done. Your implementation plan
provides a good starting point for this effort. Address the roles and responsibilities of
each participating agency’s technical staff, equipment installers (if independent), local
radio shops that are to be used, and other network maintainers. This last category
includes maintenance functions of leased telecommunications circuits, if you have
used them.
The equipment still needs maintenance, however. Both electronics and physical
structures need to be inspected, tested for proper functioning, and adjusted. As much
as modern radios are driven by embedded computers, they still have other internal
components that occasionally need to be tuned. Likewise, physical components, such
as towers, shelter HVAC (heating, ventilation, air conditioning), and power systems,
need to be inspected and maintained. Just one lighting violation notice from the
Federal Aviation Administration (FAA) due to a failed tower strobe can ruin a system
manager’s day!
Testing and maintenance records are important to keep. Prior work on equipment is
always useful for technicians to have at hand and may be necessary for documenting
equipment failure trends.
System infrastructure is tuned for optimal performance. Radio signal and line levels
are adjusted for optimum performance, as are data network components. Records
establishing a baseline for measurements and allowing tracking over time are
invaluable for system maintenance. Some tuning measurements show seasonal shifts,
Chapter 14: Maintain the Technology
221
!
One large jurisdiction with a P25 trunked radio system had to replace all of
its new portable radios, numbering many thousands, not once, but twice.
Technicians first found the radios unacceptably susceptible to other nearby
portable transmissions, rendering them effectively deaf to the much weaker
system signals from towers.
After the portables had been replaced with great effort, another design problem was
found in the push-to-talk (PTT) switches, which weakened over time, causing multiple
erroneous system requests each time the button was pressed. These problems were
discovered through agency testing and documented to prove the problem.
The los Angeles while others show variance due to system load and component aging. Documentation
Tactical radio of routine maintenance measurements is necessary for identifying and fixing
Communications problems.
System (lArTCS)
is a joint effort of
city, county, and
Test at Least Monthly
state agencies in Regular testing is important for assurance that the system will be available when
los Angeles County. needed. Schedule monthly tests, at least, to verify that system components are
It is tested by user functioning as anticipated. The type and degree of testing should be established as a
agencies twice a week. matter of policy and procedure.
lArTCS connects
together different
End-user testing on a regular basis is a good means to assure that the system is
radio systems through
a gateway. See:
operational. Technical testing needs to also be conducted to detect problems before
http://www.lartcs.org they affect operations.
Monitoring systems allow system managers to keep track of both physical access
222 Part II: How Is Interoperability Achieved?
Intrusion detection to communications facilities and logical access by, for example, remote computers
and prevention for system configurations. Some components of voice radio systems, evermore
systems can be computerized, can be reactively monitored by intrusion detection systems (IDS) and
used with central
proactively secured by intrusion prevention systems (IPS). In effect, these systems
parts of digital
radio systems. watch for unusual activity and either provide notification and/or take action to
mitigate impacts.
Other proactive measures, such as encryption key management, are necessary to keep
systems operating at expected levels of security. Key management is a serious and
necessarily rigorous process for agencies using encrypted radio systems. We touch on
it for both voice and data technologies, in the Part III – Exploring the Technologies.
The most significant regulatory issues on the horizon are 800 MHz rebanding,
release of 700 MHz spectrum, and narrowbanding of public safety frequencies
below 512 MHz. These changes affect pretty much all public safety radio users.
n Rebanding
Rebanding of 800 MHz is necessary to move public safety users in that band away
from harmful interference they are receiving from commercial radio services.
rebanding of 800
The move offers the opportunity to consolidate public safety spectrum, leading
mHz is expected to
cost $2.5 billion. to improved management of systems and technological opportunities. The cost,
estimated at $2.5 billion, is being borne by Nextel, whose facilities have interfered
most with public safety operations.
Rebanding will take place during a 3-year period and is expected to be complete by
mid-2008. The United States is split geographically into four zones. Four “waves” of
transitions are defined. Licensees in affected portions of the 800 MHz band that have
to be relocated will be contacted by a “transition administrator” to plan and schedule
the transition.
n Narrowbanding
The majority of public safety agencies in the country operate in VHF-high and lower
narrowbanding will UHF bands. This spectrum, between 150 and 512 MHz, has been the subject of
affect the majority intense debate for years between federal regulatory and public safety agencies. In
of public safety an effort to make more efficient use of the bands, allowing more channels, the FCC
agencies in the released an order in late 2004.
country over the
next 5 to 7 years.
The order sets a deadline of January 1, 2011, for the manufacture and importation
of equipment capable of wider band (25 kHz) channels. Applications for wider band
22 Part II: How Is Interoperability Achieved?
channels also will be accepted until that 2011 deadline. All public safety voice
operations between 150 and 512 MHz are to be moved to narrowband (12.5 kHz)
channels by January 1, 2013.
REGULATORY RESOURCES
The 800 MHz rebanding is addressed in detail on the FCC web site: http://wireless.
fcc.gov/publicsafety/800MHz/bandreconfiguration/index2.html.
The FCC has designated a “transition administrator” to manage the tremendous change
and cost associated with relocating 800 MHz users within the band. The transition
administration web site is: http://www.800ta.org/.
The FCC’s web site on 700 MHz spectrum contains the most up-to-date information on
efforts across the country to put this spectrum to use:
http://wireless.fcc.gov/publicsafety/700MHz/.
Efforts to “refarm” spectrum use below 512 MHz have been under way since 1992.
The most recent regulations require reductions in the amount of spectral space used,
referred to as “narrowbanding.” See the FCC web site:
http://wireless.fcc.gov/services/plmrs/refarming/.
CHAPTEr 15
mEASUrInG InTErOPErABIlITy
Chapter 1:
Measuring Interoperability
Why Plot your current position and heading, with midcourse corrections, to verify that
you are on track to achieving interoperability.
Who The governing body of the interagency initiative or project is in the best position
to complete the assessment itself, or to direct a more thorough assessment across
participating agencies.
When Measure the state of interoperability early and repeat the assessment at least
annually.
The measures chosen must accurately and adequately reflect the desired goal, being
both accepted as relevant and measurable. Recognize that measures, objectives,
measures reflect and goals are progressive. Achieving interoperability between public safety
objectives on
communications systems is only a step to achieving the greater goal of interoperations.
course to achieving
goals. Ultimately, the measure of interagency communications is its yeoman service,
unobtrusively and effectively supporting public safety responders working across
disciplines, jurisdictions, and levels of government to serve the public.
Cautious Measures
A strong conviction A point of note before proceeding: Interoperability has become an important rallying
that something cry, but has come to mean widely different things to different people. To some, it is
must be done is the the willingness of agencies to work together. To others, it is merely having compatible
parent of many bad technologies. To most, it is a term that has grown in importance in the past decade
measures. following national tragedies and responder cries for better communications.
—Daniel Webster
The basic measures of communications interoperability addressed in this chapter
have been carefully crafted by the public safety response community. While basic,
they are not simplistic, nor are they particularly simple to achieve. They are,
however, the common elements that are broadly recognized as key to this elusive
quality called interoperability.
leadership
Decision-making Groups
Governance Agreements
Interoperability Funding
Strategic Planning
Policy, Practices, and Procedures
Standard Operating Procedures
Command and Control
Approaches
Technology Implementation
maintenance and Support
Operator Training
Training and Exercises
Exercises
Usage Frequency of Use and Familiarity
55
As this Guide goes to print, the baseline assessment has just been released. The author is a
member of the SAFECOM Advisory and the Baseline Working Groups.
230 Part II: How Is Interoperability Achieved?
Conduct a Self-Assessment
Understanding that you may have picked up this Guide for a variety of reasons,
a baseline is always useful. You may be preparing for a multiagency initiative to
improve interoperability, in the midst of a project as we’ve discussed throughout this
Guide, or even proceeding to sustain a long-term effort. A baseline—and the earlier,
the better—establishes a multidimensional picture of where the agency, project,
or initiative is at that point in time. Subsequent self-assessments can be used to
determine if progress is being made across the continuum. Annual assessments as
part of a continuous improvement program can help link progress with programs.
The SAFECOM baseline assessment presents one or more questions for each of
the 13 subelements and asks respondents to indicate separately across disciplines,
jurisdictions, and levels of government whether one of four statements—
corresponding to early, moderate, full, or advanced stages of development—best
describes their situation.
The Scorecard uses the assessment tool’s questions and measures, but collects a
singular assessment of each subelement across disciplines and jurisdictions in a
matrix for presentation. It presents the four statements and asks for a subjective
assessment of the current stage of development across cooperators or project
participants using further prompts both from the assessment methodology and
baseline measurement tool.
Chapter 15: Measuring Interoperability
231
ExAMPLE
Consider the question and how
Governance: Strategic Planning this measure varies across
organizations, then choose one of
Strategic Planning these stages of development
How would you best describe the
planning efforts to make decisions, Early Development
take actions, and create processes that
no interoperability
ensure interoperability?
strategic plan or strategy
- no interoperability strategic in place
plan in place; some preliminary
planning may have begun
Moderate Development
- Strategic planning process
in place and plan under Strategic planning process
in place and plan under
development
development
- Strategic plan in place and
accepted by all participating
organizations Full Development
This assessment is necessarily subjective. While you may (and should!) strive to
be objective in assessing your agency, jurisdiction, or region’s communications
interoperability, it’s still based on personal observations and conclusions. Its primary
importance is in establishing a baseline against which subsequent, equivalent
assessments can be compared and in communicating objective elements of success in
achieving communications interoperability.
232 Part II: How Is Interoperability Achieved?
Step 1
Find a Suitable Venue
Use the Scorecard as either a standalone survey distributed to your project committees,
system oversight board, or any other group with a shared interest in communications
interoperability. Or during a meeting, present the subelements interactively. Ask
the group through a showing of hands or something more imaginative how their
organization rates the current state of affairs.
Step 2
Collect and Compile Responses
Collect and compile the results in some graphic format to depict the distribution
of responses for “analysis.” Another Scorecard, as shown in Figure 15-3,
serves well to collect all the responses. Whether through a distributed survey
or interactive poll, again remember that the results are simply a subjective
assessment of a limited audience.
Decision-making
3 33333 333 3
Groups
Governance Agreements 333333 333 3
Interoperability
333333333 3
Funding
Strategic Planning 333333 33 33
Policy, Practices,
Standard 3333 3333 33
and Procedures
Operating
Procedures Command and
333 333 333 3
Control
Approaches 33333 333 3 3
Frequency of Use
Usage 3333 3333 33
and Familiarity
Step 3
Analyze the Results
There’s not much “analysis” to do, but watch out for a couple of potentially odd results.
First, without getting into statistical theory, any survey or poll of more than just a few
people is going to show a distribution of responses. If the audience is at all diverse
(most likely so with interoperability initiatives!), there will be a response or two well
outside the others. While there’s no wrong answer in this survey, it’s unlikely that
a single agency is much more or less interoperable than its neighbors. For example
in the Scorecard above, “Approaches” drew one response far from the median. For
purposes of finding some consensus measure, it can be ignored.
Step
Present the Results
Carefully present the Scorecard results. They can be misinterpreted or misconstrued if
presented outside the context of the questions asked and measures used, so explain
the results in terms of the stages of development. For example, the “Frequency of
Use and Familiarity” results tabulated in Figure 15-3, examined in comparison to
development definitions included with the Scorecard (Figure 15-4), are fairly clear.
They could be reasonably understood to suggest respondents collectively concluded
that the agencies use solutions during planned events and somewhat regularly during
emergencies, but rarely for routine communications. Without the context of these
definitions, the stages of development may be understood too broadly to be useful.
n An Example
An example may be useful. Radio gateways play an important role in linking
separate networks. They are notorious, however, for causing problems when
misused—a very real potential with many implementations. By linking two
channels, they potentially double the amount of traffic on each, tripling it with
three channels, and so on. If the mere presence of a gateway is factored as a
measure of interoperability, the measure may neglect the more important factor
of how the gateway is used; that is, whether in fact it actually improves or reduces
communications capabilities and operational performance.
The choice for agency administrators and project managers will be to show the needed
performance benefit of improved interagency communications and why technology is
needed to accomplish it.
Part III:
Exploring the
Technologies
The term type acceptance is commonly used in the radio world. It refers to the FCC’s
formal process of evaluating and approving technologies. Individual manufacturer
The FCC radio models must receive FCC-type acceptance before they can be made
distinguishes radio commercially available. It’s not uncommon to hear manufacturer representatives
types and services. speak of new models and note they are awaiting type acceptance before they will
be mass-manufactured and sold.
While several of the radio services listed above are probably recognizable to readers,
The FCC classifies others may be confusing. Most public safety radio networks are regulated by the FCC
most public safety as private radio systems. Where common carrier systems are made commercially
radio systems as available for general public use, those built and operated for private use are
private radio. considered private systems. In this case, “private” refers to how they’re used, rather
than owned.
Many commercial industries have their own private radio systems. A few are actually
more than 300 shared with public safety agencies, but the vast majority of police, fire, and EMS
agencies in South voice radio communications takes place over systems owned and operated by the
Carolina use the agencies themselves. Most of these systems require FCC licensing. Unlicensed radio
Palmetto 800 technologies, such as those that might be used for wireless local area networks
System, an 800
(WLAN), are regulated separately.
mHz system shared
with power utility
companies. Whether licensed or unlicensed, private or common carrier, radio technologies are
For further broadly subject to FCC regulations. Rely on your radio technicians, vendor
information, see: representatives, frequency coordinators, and professional associations to help you
http://www.cio. sort out details if you intend to be heavily involved in radio technology.
sc.gov/cioContent.
asp?pageID=756&
menuID=411. Analog and Digital Radio Technologies
For the first century of radio, analog radio technologies predominated. Those
technologies include amplitude modulated (AM) and frequency modulated (FM) radios
that we’re all familiar with from broadcast radio services. Others exist, but all analog
technologies are based on use of audio tones (frequencies) being superimposed on
radio frequencies (RF) in a standardized manner.
n Channel Bandwidth
FM is by far the most common analog radio mode today. It is also the compatibility or
legacy mode for digital radios. However, transmitters and receivers not only have to
use common means of putting information on the RF signal (i.e., modulating it), they
also have to use compatible channel widths and operate in the same frequency band,
such as VHF, UHF, or 800 MHz.
Chapter 16: Voice Communications
2
Frequency bands for common public safety voice purposes are typically described in
Public safety
millions of radio wave cycles per second, or megahertz (MHz) (Figure 16-2). They are
frequency
bands for voice occupied by channels of a certain bandwidth. That is, they take up a specific amount
communications of the frequency band.
are typically
described in Channel bandwidths are described in thousands of cycles per second (kilohertz
megahertz, while is abbreviated as kHz). A channel is a slice of some part of the radio frequency
channel bandwidths spectrum. That is, we talk about a traditional 25 kHz voice channel in the 450 MHz
are described in
public safety frequency band. A traditional voice channel in that band has been
kilohertz.
allotted 25 kHz of RF spectrum.
n Narrowband Channels
Narrowbanding, as discussed in Chapter 14 (Page 223), is an FCC regulatory effort
that will affect all analog radio users. Its goal is to reduce the amount of RF spectrum
occupied by a single channel to increase the number of channels that can fit in a given
band. This is not the first time the FCC has split channels for this purpose and we can
expect it to happen again.
The FM radio channel has existed for decades as nominally 25 kHz in width. We say
“nominally” because channel width is more an absolute under regulations than under
the laws of physics. It actually varies in width according to transmitter adjustments
The FCC requires and characteristics of the audio being carried. In addition, the transmitted power isn’t
that public safety all contained within the defined channel; a progressively smaller fraction exists farther
operations move to and farther away from the channel center.
12.5 kHz channels
or the equivalent by
January 1, 2013. FCC rules will have all public safety voice operations between 150 and 512 MHz
moved to narrowband (12.5 kHz) channels by January 1, 2013. Technically, the
requirement is that a channel can occupy no more than 12.5 kHz or the effective
2 Part III: Exploring the Technologies
equivalent. This last clause can be a bit confusing. There are proprietary techniques to
interweave two separate conversations, both using the whole 25 kHz, but splitting use
of the channel second by second. Most commonly, the narrowband channel will be
used wholly for a single communications path.
One net effect of this transition is that narrowband analog transmitters will have
less spectral space to put RF energy, thus reducing the power and range of an analog
channel relative to the wider band channel. Just how much is the subject of debate,
but recognize that the range of a narrowband transmitter will be less than that of its
wider band cousin.
While digital uses of these radio bands are similarly affected, existing digital
technologies already use 12.5 kHz channels or allow multiple voice conversations to
occur within a traditional 25 kHz channel. Narrowbanding is thus leading to wider
adoption of digital techniques.
n Digital Radio
Digital radios use many of the same components as their analog relatives. For voice
radio purposes, microphone audio frequencies are first converted into bits by the voice
A vocoder converts encoder or vocoder. This is a particularly important part of the digital radio system; not
analog sound to all vocoders are created equally. For public safety purposes, great work has gone into
digital bits.
testing and choosing vocoders that efficiently produce a digital stream to make most
use of the radio channel, while still faithfully representing it.
The process of creating digitized audio, transmitting it over the largely inhospitable
The P25 vocoder airwaves, and decoding it on receivers is fraught with danger for the lowly voice bit.
standard carefully Project 25,57 which produced the national standard for public safety digital voice radio
balances efficiency, systems, took on the challenge. It undertook a significant effort to find a vocoder
robustness, and sufficiently efficient, yet producing resiliently encoded audio for the most critical
fidelity. missions, in some of the most difficult radio environments. The Project 25 vocoder
standard was selected as a careful balance of efficiency, robustness, and fidelity.
Digital radio standards for public safety don’t stop at speech encoding, however. As a
matter of fact, the vocoder is just a small part of the technology that takes audio,
57
Initiated by the Association of Public-Safety Communications Officials – International (APCO),
in cooperation with the National Association of State Telecommunications Directors (NASTD)
and with support of other public safety organizations like the International Association of Chiefs
of Police (IACP). Project 25 received its name following APCO’s tradition of numbering its
broad initiatives to affect the public safety communications world. P25, as it is also commonly
known, is the association’s best-known project. The specifications have been codified by standards
development organizations. For further information, see http://www.project25.org.
Chapter 16: Voice Communications
29
radio encodes it, packages it up, inserts it aboard the radio channel train, and assures it can
transmissions are be unpackaged successfully on the other end.
weakened over
distance and by the Another key piece of the Project 25 standard is its Common Air Interface (CAI).
environment. Without going into depth, the CAI provides the standardized means for receiving
radios to recognize what is coming over the airwaves and extract an intelligible signal.
Any digital receiver has to know how to decode the audio bit stream once received and
passed to internal microprocessors, and then convert it back to audio frequencies that
The P25 Common can be heard through speakers. That’s not all, though. Receiving radios also have to
Air Interface is know when and where a package of bits begins and ends, how to deal with inevitably
the public safety missing or erroneous bits, how to recognize other embedded codes, and more. Project
standard for digital,
25’s CAI is the standard for how that’s done with public safety digital voice radios.
rF transmissions.
It’s a hostile environment. Received radio signals may be millions and millions
of times weaker than they were at their source. Not only do signals diminish
geometrically as a function of distance, they also are weakened or attenuated by the
environment over and through which they pass. Manmade and natural obstructions
both tend to absorb radio waves. Similarly, each time a radio wave is reflected or
diffracted (which is often!), it scatters and loses a bit more energy. Add to this the
additional challenges imposed by relatively rapidly moving transmitters and receivers
and it’s nothing short of fundamental magic that any intelligence can be extracted
from distant transmissions!
Anyone who has listened to an FM broadcast recognizes the sound of a station fading
in and out. If you’ve listened carefully in areas where FM broadcast stations overlap
on the same frequency, you’ve also heard the effects of two roughly equal signals
competing in your receiver. “Roughly” in the radio world is measured in factors of
tens and hundreds. A signal that is 100 times or stronger than competing signals will
generally be the only one heard on a channel. In the radio environment, signals can
vary by a factor of a hundred within the distance of a few feet.
Overlapping radio
signals cause FM has something called the capture effect whereby once a receiver is locked on to
interference in a given signal, it rejects a competing one up to a point. As the new signal becomes
receivers. increasingly stronger, the receiver finally gives up on the first and locks onto the
20 Part III: Exploring the Technologies
second. In between, distorted and mixed audio is heard. Portable and mobile radio
users of two-way FM channels quickly learn to recognize the signs of one user
“walking on” another through overlapping transmissions.
The term bit error rate (BER) is used to describe the percentage of received bits in a
digital stream that are “broken.”
While public safety radio
technologies can recover nearly
original audio with bit error rates in
the vicinity of 2 percent, recovered
Digital
audio starts to degrade as error rates Signal
Audio quality
While the human ear and brain has a remarkable ability to recover intelligent audio
in the presence of relatively high noise levels, digital radio receivers are more limited.
At some point they have to stop trying lest they start making up sounds that weren’t
originally there. By comparison, intelligible audio can be discerned by the human ear
58
Vanderau, John M., Delivered Audio Quality Measurements on Project 25 Land Mobile
Radios, NTIA Report 99-358 (Washington, D.C.: U.S. Department of Commerce, Institute for
Telecommunications Science, 1998). A BER of 2 percent corresponds to a Delivered Audio Quality
(DAQ ) measure of 3.4. See http://www.its.bldrdoc.gov/pub/ntia-rpt/99-358/.
Chapter 16: Voice Communications
21
through an FM or other analog receiver at a lower signal level than a digital receiver
can use. On the other hand, a digital receiver can recreate the identical audio signal
that was sent, while the received analog signal gains increasing background noise as it
gets weaker.
Let’s move on to the different types of systems that put analog and digital radio
technologies to work.
The common term for this form of communications is simplex. In radio usage, the
term carries further meaning. Simplex radio channels carry conversations conducted
on a single frequency where participant radios transmit (Tx) and receive (Rx) on the
same frequency. In Figure 16-4, “Frequency 1” (F1) is used for all transmissions.
This approach to radio communications works well and is the simplest, most resilient
form of coverage when all radio users are within range of one another. It becomes
problematic, though, when radio end users move out of range of each other.
In all two-way voice systems, from the simplest to most complex, radio coverage is,
well, a two-way street. It’s relatively easy to increase the transmission range of a base
station by increasing its power, but that doesn’t help users of mobile and portable
radios, which are comparatively weaker, talk back to the base. Radio engineers work
to balance the “talk-in” and “talk-out” of systems.
Figure 16-5 shows how frequencies are split between the repeater and its users. Note
that the repeater’s frequency pairing is the reverse of the other radios. Field users,
including those at the station, transmit on Frequency 1 (F1) but receive on Frequency 2
(F2)—the repeater’s transmission frequency. The repeater does the reverse.
Radio system design is hugely affected by whether primary coverage is sought for
portable or mobile radio use. Two-way radio networks, voice and data alike, are built
to take into account differences between fixed and mobile devices on the network.
It’s possible with conventional systems to simultaneously transmit the same signal
from multiple locations. This is referred to as simulcasting. It requires careful
synchronization of the individual transmitters and a healthy backbone of microwave
or some other form of dedicated telecommunications circuit to deliver the outbound
signal to all sites simultaneously.
In the example shown in Figure 16-6, audio to be transmitted from all sites
simultaneously originates from the central facility—a dispatch center, for example.
While simulcasting reduces the need for users to manually “steer” their radios by
the channel selector knob as they move around a geographic area, it adds system
complexity and a reliance on the circuits connecting to remotely operated base
stations. It also brings a need for the system to deal with the common situation of two
or more sites receiving a transmission from a field user. Just as a field user’s radio will
likely receive a transmission simultaneously from multiple sites, it will also likely be
heard by multiple ones when it’s transmitting.
Chapter 16: Voice Communications
2
Additional electronics are added to the heart of the system to select the best signal
received by the sites. In the example shown in Figure 16-6, two sites might receive
decent signals from a user, while the third site receives a weak signal. Central
electronics pick out the best signal and pass it to users at the fixed facility.
This is known as a simulcast system with receiver voting. For practical purposes, the
system can be thought of as a single base station with the wide, composite coverage
provided by all the separate sites. The effect is a single channel that covers a wide
expanse. While useful in low-traffic, routine operations, such wide-area, blanket
coverage can be a problem during periods of high demand when the load across all
sites can overwhelm a single channel.
Figure 16-7 depicts a repeater system with additional remote receivers. Sites labeled
“Rx Only” are simply receivers that send back received signals to the central site
where a voter can pick out the best received signal. Remote receivers are often used to
2 Part III: Exploring the Technologies
accommodate portable radios that can “hear” the more powerful and well-situated
fixed transmitter sites, but are unable to “talk” back to them due to the distance or
terrain.
remote receivers
allow weaker
signals to get into
the system.
In this example, some possible receive and transmit paths have been omitted for the
sake of clarity. It depicts a circumstance where Repeater A can be heard by User 1, but
that user can only be heard by Repeater B. Repeater B can be heard by both users, but
User 2 can only be heard by Repeater C and one of the remote receivers.
Radio systems can be constructed to operate the same way. The primary value of
The primary value trunking is channel efficiency. That is, rather than having sets of users occupy a
of trunking is channel fixed by frequency, leaving the channel empty at times and overloaded
channel efficiency. at others, the trunked system takes multiple channels and assigns them to sets of
users as needed. This also enables groups of users that could never have a separate
conventional channel to have a trunked one for private use.
With a conventional system, three repeaters at a single site might have served police,
Trunking
fire, and EMS, individually, with all users from one of the disciplines operating on
provides multiple
virtual channels a single channel. With these three repeaters trunked, a nearly limitless number
for separate of virtual channels can be assigned and used without interference between users.
conversations. However, the number of simultaneous conversations is still limited to the total number
of talk repeaters at the site.
This brings up an important point: Most public safety trunking systems reserve
one repeater at each site for the system or control channel. This is the channel of
communications over which the radios talk among themselves behind the scenes
to coordinate who goes to which frequency, at which site and what time, to become
part of a conversation. This system traffic goes on nearly continuously as portable
and mobile users move around between sites and change their channel selectors to
become part of a different conversation.
Any individual user radio can be part of many talkgroups. The user may, depending
on agency policy and radio programming, choose to scan multiple talkgroups during
normal operations, just as they may have scanned multiple conventional channels
with an earlier system. In a trunked system, the user radio literally notifies the system
that it wants to be part of any conversations occurring among the selected talkgroups.
Still limited by the fact that the radio can only receive one transmission at a time,
2 Part III: Exploring the Technologies
the user also has to select a single talkgroup on which to transmit using the radio’s
channel selector knob.
Because trunked talk channels are set up and torn down as needed, end-user radios
rely on the system to tell them when a talkgroup is coming active and to get directions
on where to tune. This takes place over the control channel, normally in a fraction
of a second. As soon as an open repeater is available, which may actually be multiple
repeaters if the network spans more than one site, the transmitting radio is allowed
to talk and all other radios in the talkgroup automatically tune to the transmission
frequency(s).
Trunked systems can also be managed on the fly by dispatchers and system
Trunked channels administrators to collapse multiple talkgroups into a single one. This has a strong
(talkgroups) can be implication for interoperability. Where several talkgroups may be operating
collapsed into one independently from one another during an incident, and thus unable to communicate
to bring otherwise between their various users, a dispatcher appropriately authorized can combine the
separate users talkgroups into one. All users of the affected talkgroups can effectively be moved to a
together.
common one. While increasing interoperability, this also has the effect of increasing
traffic on the newly combined channel.
n Area Solutions
The most basic technique used to improve communications in buildings and tunnels
is to put additional system sites in denser urban areas. This increases the fixed station
(base or repeater) signal into nearby buildings and provides it a somewhat stronger
signal from the field unit. Because the greatest weakness is usually the fixed station’s
ability to “hear” the portable transmission, a more advanced technique is not to add
entire fixed stations (transmitters and receivers), but more receivers strategically
placed. This allows the relatively weak portable signal to “get into the system” from
more places.
While basic, this approach can be satisfactory in some locales and reduce
requirements for specialized technology and the additional expense of in-building
systems. System managers face an ongoing challenge in assuring that new
construction in and around the areas of interest doesn’t reduce coverage or otherwise
interfere with the balance achieved.
n Point Solutions
More and more often, peripheral technology is being used. This requires placement
of special repeating equipment within buildings, tunnels, and other signal-
challenged areas.
Bi-directional Amplifiers (BDA) are placed within the building to, as the name implies,
improve signals both inbound and outbound. Internal and external antennas are
linked by the BDA to capture weaker signals from within and retransmit them
beyond, and vice versa. Large structures may require a more elaborate, distributed
system of internal coverage antennas connected together, then linked to the outside
world through a single “donor” antenna.
Some areas, such as tunnels, are well suited to use of a special type of distributed
antenna system built from radiating coaxial cable. Traditionally, coaxial cable (coax)
of various forms is used to connect radios to their antennas. Properly speaking, the
cable is part of the antenna system, but is intended to quietly move signals from each
end to the other.
Radiating cable, on the other hand, is constructed to “leak” signals in and out along
its length. This can be a very effective sort of distributed antenna, although, as might
be expected, some careful engineering is needed for systems of this sort. Figure 16-8
shows an example of a BDA.
Chapter 16: Voice Communications
21
Donor Coverage
Antenna Antenna
Bi-Directional Subscriber
Amplifier (BDA) Unit
A 2002 report by PSWN on the topic concluded that such ordinances “have no
noticeable impact on interoperability between public safety organizations.”59
Satellite Communications
Recent natural disasters have brought increased interest in satellite
communications to overcome the damaged and destroyed land-based radio
systems. Hurricane Katrina, which ravaged the United States Gulf Coast late in
August 2005, widely disrupted radio systems. Not only was cellular telephone
infrastructure damaged and nonexistent in many places, but public safety radio
systems were disabled in many locations (Figure 16-9). Whenever basic agency
radio systems are damaged, interagency communications suffer.
59
Public Safety In-Building/In-Tunnel Ordinances and Their Benefits to Interoperability
Report, Public Safety Wireless Network Program, November 2002, p. 14. See http://www.
safecomprogram.gov/SAFECOM/library/technology/1032_PublicSafety.htm.
22 Part III: Exploring the Technologies
Figure 16-9: Plaquemines Parish (Louisiana) Radio Tower – August 29, 2005
Source: Plaquemines Parish web site, http://www.plaqueminesparish.com
Satellite services are available from a variety of vendors. Some are provided by way of
geosynchronous satellites that appear to the user to be fixed at a spot in the sky. At an
altitude of 22,241 miles, such satellites orbit at the same rate the earth rotates. Similar
to direct broadcast satellite (DBS) television, these services require a fixed antenna
that is pointed at the satellite or one that is electronically steered to keep itself so.
Other services are provided through low earth orbit (LEO) or medium earth orbit
(MEO) satellites that are relatively much closer, though still far distant compared to
cellular and terrestrial public safety radio infrastructure. LEO satellites orbit in a band
from a few to several hundred miles above the earth. This distance still challenges the
portable communications needs of first responders.
Chapter 16: Voice Communications
23
Despite their value for disaster telephone and data services, satellites are not a
complete replacement for terrestrial voice radio systems used by public safety for
several reasons:
• One-to-many communications are inadequate. Voice communications
as most commonly used via space is limited to telephone-like services where
a user can dial up another telephone user—whether on the public switched
telephone network or elsewhere on a satellite system. Satellites do not offer
the immediate, one-to-many sort of radio conversations needed by public
safety responders.
• Coverage is inadequate. First responders moving about with portable radios
need coverage in all areas. Less penetrating than even cellular telephone signals,
satellite signals don’t reach far inside buildings or into dense vegetation.
Public safety radio systems are engineered to provide coverage far beyond what
satellite systems provide.
• Portable capabilities are inadequate. Even LEO satellites are many times
farther away in distance than traditional land mobile radio infrastructure. Since
both use radio frequencies to communicate, satellite signals are reduced in
strength even more across the distance, requiring bulkier antennas and higher
power. Even with adaptive power modes that reduce battery demand, satellite
handsets require more battery power than a responder’s standard portable
radio transmitting a much shorter distance. The demanding emergency
response environment leads to greater power consumption as users move in
and out of clear view of the sky.
• Capacity is inadequate. Communications between emergency responders
on scene during events is frequent. Many channels are needed for larger
events, such as those that would take out terrestrial infrastructure, and near-
instantaneous communications is needed in most cases. A single responder
often needs to communicate instantly with dozens of others. Satellites don’t
provide this ad hoc broadcast capability.
This isn’t an effect of VoIP, per se, but rather of digital networks being slowed due to
demand or disruptions. IP-based networks traditionally used for data will dynamically
adapt to such factors and are designed to trade speed for certainty of delivery. That is,
the network will try and try again to get a packet that has been lost or damaged so it
can package them reliably and deliver the complete lot at once.
Transmission of voice and other audio over IP-based data networks has rapidly
become a critical, underlying means of connecting agencies for interoperability. VoIP
is used to interconnect private telephone systems, dispatcher consoles, and parts of
the radio infrastructure. For practical purposes, it is an underlying protocol rather
than an end-user application, though.
Chapter 16: Voice Communications
2
For example, dispatch consoles have been connected for decades to remote base
stations through dedicated telephone circuits—typically analog ones much like plain
old telephone service (POTS—seriously). As telecommunications infrastructure has
moved to digital from analog, lines that tie one fixed point with another have also
migrated. VoIP is increasingly used in this case to move the dispatcher’s voice to the
radio transmitter and the user’s voice back from the receiver.
n A Fundamental Tool
VoIP is growing as a fundamental tool connecting pieces of public safety
voIP is a communications systems. Unfortunately, it has been subject to a lot of
fundamental tool, interoperability hype. While it may today and in the future be an underlying protocol
but not a silver for connecting systems at an audio level, it doesn’t solve the problems posed by any
bullet. gateway between disparate radio systems, as described further in the next section,
Approaches to Interoperability.
VoIP is the current, logical choice for connecting pieces of a system where
dedicated telephone circuits may have been used in the past. As any higher level
communications protocol, it relies on underlying network infrastructure to carry
data. VoIP offers the possibility of passing voice over networks used for other data
communications, but in the process naturally puts those packets in contention with
other traffic on the network.
Critical systems The state of the art in VoIP telephone systems is to use dedicated data networks—
need dedicated physical or virtual—to reduce that contention and assure acceptable service. Critical
network services. public safety systems need high-quality service, as well.60
Without getting deep into theory,61 data being transmitted using Internet Protocol
can pass over many different physical mediums, both wired and wireless. Voice, as
60
Several years ago, the Public Safety Wireless Network Program released an assessment of VoIP for
public safety radio systems. See Software-Enabled Wireless Interoperability Assessment Report – Voice-
Over-Internet Protocol Technology, December 2001, http://www.safecomprogram.gov/SAFECOM/
library/technology/1171_softwareenabledwireless.htm.
61
The Open Systems Interconnection (OSI) model is fundamental in telecommunications
theory, having originated in 1977. It describes systems in terms of a layered stack and defines
interoperability between layers. Radio is a low, physical layer, while Internet Protocol is in
the middle. Voice as an application of a system would be at the top of the model. For further
information, see http://en.wikipedia.org/wiki/Open_Systems_Interconnect. htm.
2 Part III: Exploring the Technologies
an application, runs over IP and other protocols, then over one or more mediums en
route to one or more final destinations. “Radio over IP” is backwards.
In addition, modern radio systems use VoIP to move voice and other audio, such
as signaling tones, across their infrastructure. They don’t, however, use it over the
airwaves. Land mobile radio systems reassemble the voice packets and transmit them
over the air using the system’s fundamental operating mode—whether analog or
digital, as in P25. This is analogous to what a receiver does with digital music before it
sends it to its speakers in a classic stereo system.
Approaches to Interoperability
Communications interoperability has been hindered in the past due to the simple
lack of a common vocabulary for discussing the topic. SAFECOM’s Interoperability
Continuum has improved the situation greatly through practitioners’ definition of five
critical dimensions of interoperability. It also provides simple measures for assessing
relative stages of development. Of the five dimensions, technology in particular is
the subject of only one. Proportionally, this continuum effectively represents the fact
that the great majority of work in achieving interoperability is in the human aspects of
governance, procedures, training, and familiarity through frequent use.62
62
SAFECOM’s Interoperability Continuum is included in this Guide as Appendix G.
Chapter 16: Voice Communications
2
Technology Approach: Swap Radios
As noted in the SAFECOM description, agencies have swapped radios to enable
communications among themselves since the earliest days of public safety radio
usage. To this day, agencies exchange spare radios with key cooperators on incident
Swapping radios or scenes for the sake of interoperability. In some cases, they do so even though their
maintaining a cache respective systems are otherwise technologically compatible. For example, this may
of standby radios is occur because the users either don’t have common channels programmed into their
an age-old solution radios or they use different channel naming and naming conventions. Whether due to
that provides technological incompatibilities or a lack of prior planning, the end result is the same:
results but is often
A conclusion that this, the most basic means of interoperability, is necessary.
time-consuming,
management-
intensive, During incidents when agencies respond with incompatible equipment—using
expensive, and may different frequency bands, for example—swapping radios provides responders with
only provide limited the ability to talk to the other agency via that other agency’s system. Obviously, while
results due to this can and does work for very simple operations, it becomes unworkable as more
channel availability. and more agencies arrive.
—SAFECOm
Interoperability
A common use of this technique is in deployment of radio caches. A radio cache
Continuum
is simply a supply of radios, typically portables, held aside for larger incidents.
The cache may include spare batteries, antennas, and carrying cases to simplify
deployment. Typically, the cache is left stored away until a request is made for
its deployment.
The use of radio caches is, unfortunately, fraught with pitfalls. Common troubles
include the following:
• Unknown or nonexistent procedures for request and deployment
• Inadequate maintenance of the equipment, particularly batteries that can be
damaged from both too little and too much charging
• Poorly documented channel programming, leading to inadequate usage
• Lack of training on the equipment, its available channels, and their
appropriate use.
When joint task force operations involving many law enforcement agencies ensued,
the new radio system was activated and the new radios distributed to provide
interagency communications. In effect, cached equipment was used to provide a
common communications environment, much as is done in the West during remote
wildfires. Outside agencies used their own communications capabilities as well as they
could considering varying coverage limitations, but the distribution of Montgomery
County radios to cooperating responders and investigators provided simple, but
much needed communications interoperability.
63
For more information on the NIICD, see http://www.fs.fed.us/fire/niicd/.
Chapter 16: Voice Communications
29
Technology Approach: Gateways
Response to the Beltway sniper incidents involved another approach to
interoperability: Connecting different systems or channels through a gateway. In order
to provide communications between users of its old and new systems during the
Gateways (or unanticipated activation, Montgomery County linked channels together across the
audio bridges) two. The effect was to provide a common channel shared across each.
retransmit across
multiple frequency The term “gateway” is used for any of a number of means of patching transmitted
bands, providing and received audio from one source to another. Technically, it is a bit more complex,
an interim
requiring controlling circuitry to initiate transmission on one side of the equation
interoperability
solution as
when something is received on the other. Whether involving radio channels,
agencies move telephone calls, or another source of audio, channel patching is another age-old
toward shared approach to connecting users from one system to those on another.
systems. However,
gateways are In its earliest form and still practiced today, a dispatcher at a communications console
inefficient in that can literally patch the audio from one channel to another despite the fact that there
they require twice
might be huge technological differences between the individual systems. This is the
as much spectrum
because each same approach, technically speaking, that a dispatcher would use to patch a telephone
participating agency call to a radio channel and vice versa. The effect is that the two communications
must use at least channels are collapsed into one using bridges or gateways between different
one channel in each telecommunications systems.
band per common
talk path and they Modern technology has made it possible to do this not only in increasingly complex
are tailored for
ways from the dispatch console, but also via remotely operated gateways. The simplest
communications
within the gateway devices are no larger than a pack of cigarettes, limited in size physically more
geographic by the space needed for connecting cables than by the complexity of their internal
coverage area electronics. This sort of portability allows for devices that can be fielded to patch
common to all together first responder channels. Though most commonly used to bridge radio
participating channels in different frequency bands, many of the devices can also be used to link
systems. “push-to-talk” radios64 to other two-way audio sources, such as landline, cellular, and
—SAFECOm satellite telephones.
Interoperability
Continuum
Increasingly sophisticated networking technology allows gateways to be connected
between dispatch consoles and other audio sources across data networks. Audio is
digitized, addressed, and routed across networks just like any other form of data.
Gateways patch
transmitted and
received audio
64
“Push-to-talk” radios are the standard type of radios used by public safety agencies. Whether
from one source to portable, mobile, or installed at a fixed location, they’re distinguished from other forms of radios
another. by the fact that some sort of switch is manually or electronically actuated to initiate transmissions
from the radio. The term “push-to-talk” has been used to distinguish the familiar two-way radio from
other types of portable communications devices, such as cellular telephones.
20 Part III: Exploring the Technologies
voIP is being used As mentioned previously, Voice over Internet Protocol (VoIP) can be used for
to connect systems moving audio across data networks between radio systems. Those networks can
across data
even connect a gateway on one radio system to another that is geographically
networks using
gateways.
distant, providing radio end-users at either location with a means to talk to each
other. This isn’t 21st century James Bond wizardry, though. Amateur radio operators
have been using the technology since the late 1990s and now have a worldwide
network of more than a thousand Internet-connected radio nodes serving every
continent, including Antarctica.
When two actively used channels are linked, the amount of traffic on each will
increase significantly. Popular gateway devices allow many more than two channels
to be linked, potentially multiplying the amount of traffic on each by the number of
connected channels.
Obviously, any moderately used channel can be heavily taxed by patching together
other, similarly used channels. This can result in serious contention for access to the
channels, not to mention an increased level of traffic that may not be relevant to the
original channel users.
Back in the field, first responders often struggle to catch transmissions relevant to their
jobs during incidents as radio transmissions multiply many times over. The challenge of
too much information, of the signal being lost among “noise,” is equally as disabling as
not getting enough information.
Conversely, and somewhat perversely, linked systems can lead to too much, yet
inadequate, coverage. For example, linking together Systems A, B, and C depicted
in Figure 16-10 means that users of System C will be heard across the range of all
systems, but still can’t talk to any other system user when traveling outside of the
range of their own. This can and does lead to systems interfering with others beyond
their normal coverage areas. More critically, it also leads to communications failures
in areas where responders were previously heard, but can’t talk from once they get
there.
Basically, FCC licenses are required for practically all radio transmitters used in
public safety communications systems. Each portable, mobile, and fixed station
most transmitters radio is covered under a license that specifies, among other things, an area of
are licensed for
operation—the area in which the radio can transmit. Most classes of fixed stations,
a limited area of
operations. such as base stations and repeaters, are licensed for a particular physical location,
height above ground, and maximum power. Typically, end-user radios are licensed
for operations only across the agency’s jurisdiction or within a given distance from a
fixed point.
Mutual aid and other types of interagency operations are often conducted outside
of one or another agency’s jurisdiction—by definition. While the visiting agency’s
radio system may provide incidental coverage outside its jurisdiction, it is illegal for
end users to use any system outside of its licensed area of operation. This is done to
protect other legitimate use of the licensed radio frequencies and to allow reuse of
spectrum elsewhere.
rely on FCC- When gateways are used to interconnect systems, the potential arises for radios to be
certified frequency
coordinators
operated outside their licensed area of operation. In addition, a portable or mobile
for guidance on radio connected to a gateway becomes a different class of radio station. In essence,
gateway licensing. it’s no longer legally an end-user radio, but rather a type of fixed station. While the
FCC can grant “Special Temporary Authority”65 under emergency circumstances to
operate an unlicensed transmitter, nothing beats preplanning and licensing.
The FCC-certified public safety frequency coordinators66 are the best source
of guidance in navigating the complexities of licensing transmitters used to
interconnect radio systems through gateways.
65
The FCC maintains a web page describing the procedure for obtaining Special Temporary
Authority for a station. See http://wireless.fcc.gov/publicsafety/sta.html.
66
For more information on FCC-certified frequency coordinators, see
http://wireless.fcc.gov/publicsafety/coord.html.
Chapter 16: Voice Communications
23
FCC rules and regulations governing public safety radio systems (Part 90 – Private
Land Mobile Radio Services) provide latitude for alternate use of licensed radio stations
during emergencies that have disrupted communications facilities.
One technical complexity that has been described is referred to as the “ping pong”
effect. It occurs when a gateway is used to connect users through two or more
repeaters—fixed radio stations that receive transmissions from portable, mobile, or
other fixed stations and repeat them for other radio users to hear more widely and
clearly. Without careful tuning, gateways connecting repeaters can endlessly cause the
other to transmit.
67
CommTech was previously the Advanced Generation of Interoperability for Law Enforcement
(AGILE) Program. Further information about the program can be found on its web site. See
http://www.ojp.usdoj.gov/nij/topics/commtech/.
2 Part III: Exploring the Technologies
DUELING RADIOS
“By far the most challenging technical aspect of the deployment of the
[gateway] was in interfacing with the repeater systems of the participating
agencies. In systems in which a radio interfaced to the [gateway] is
transmitting to a receiver site through a repeater, due to the length of
the squelch tail, a repeater could stay up long enough to bring the radio
connected to the [gateway] back up before the repeater goes down. Then
because the radio is back up, the repeater could come back up, bringing the
radio back up; and so on. This effect is referred to as the ‘ping pong’ effect.”
Despite the issues described here, gateways play an important part in many
interagency communications systems today. They offer the portability and flexibility
necessary to link various radio systems, frequency bands, and protocols existing
across public safety agencies. Well used, they provide an important technological
approach to interoperability.
Interoperability is
promoted when
agencies share a Technology Approach: Shared Channels
common frequency Historically, the most common means of interagency communications by radio has
band and are
been through the use of shared or common channels. As noted in the Interoperability
able to agree on
common channels.
Continuum excerpt, users of the same frequency band have the added option to
However, the share channels for interoperability. These channels may be for direct or unit-to-unit
general frequency conversations within a limited range on scene or through repeaters programmed into
congestion that their respective radios for greater range.
exists across the
United States Although fragmented radio spectrum use reduces the potential, shared channels
typically places
provide a low-cost and effective means of interagency communications in locales
severe restrictions
on the number
where users have the benefit of a common frequency band between their agencies.
of independent Commonly shared or formally designated interoperability channels now exist
interoperability across all major public safety bands. In some jurisdictions, gateways are used to link
talk paths that are designated shared channels between different bands, combining the use of multiple
possible. approaches to interoperability at the cost of duplicating transmissions across
—SAFECOm multiple channels.
Interoperability
Continuum
Chapter 16: Voice Communications
2
Objectives:
a) Ensure the integrity of the Palmetto 800 System
b) Provide interoperability options
c) Manage system loading
d) Establish a guideline for the use of interconnects.
Benefits:
a) Improve safety
b) Reduce interference and interconnect technical problems
c) Provide alternate 800 MHz service for special events and
emergencies.
Putting Shared
Channels to Work
Use your radio FCC Designation of Shared Channels
technical resources In addition to any specific frequency (or pair of frequencies for a repeater) adopted
and frequency by convention by agencies for shared use, FCC rules and regulations designate specific
coordinators to frequencies for interagency communications. The number and availability of these
learn if there are frequencies vary considerably by band, as well as location.
FCC-designated
shared channels
available for use.
Five VHF-high band (150 to 174 MHz) frequencies, ten UHF (450 to 470 MHz)
There may be frequency pairs, and five 800 MHz frequency pairs have been designated for more
existing shared than a decade for interagency use. However, the VHF and UHF frequencies have been
channel plans incorporated into interagency communications plans differently across the country,
that you can and often not at all. In many cases, the frequencies have been assigned for specific
take advantage agency use. The 800 MHz pairs were designated solely for interagency use and provide
of, but know
key shared channels capability where this band68 is well used.
the limitations
and licensing
requirements 68
The FCC created the National Public Safety Planning Advisory Committee (NPSPAC) in the
before putting them 1980s to guide rules for a segment of the 800 MHz band dedicated to public safety use. This
to use. spectrum is commonly referred to as the “NPSPAC band” or “800 MHz NPSPAC.”
2 Part III: Exploring the Technologies
FCC narrowbanding rules and regulations split out additional channels from the
traditional, 25 kHz ones, though they won’t be wholly available until operations on
adjacent channels migrate to narrowband. In 2000, the FCC designated five additional
VHF frequencies and four UHF frequency pairs for interoperability use. These are
Regional shared
narrowband (12.5 kHz) channels. Since January 1, 2005 their use under FCC rules for
systems are the interagency communications has taken precedence over other licensed uses.
optimal solution
to interoperability. Many more channels specifically designated for interagency use are available in the
While proprietary 700 MHz band for regions of the country where this spectrum is clear of television
systems limit broadcasters. As public safety systems are built in this frequency band, agencies will
the user’s choice
have access to more than 100 shared channels whose use is governed by state-level
of product and
manufacturer,
decision making bodies.69
standards-
based shared Technology Approach: Shared Systems
systems promote The growing complexity and cost of radio systems have combined with serious
competitive
needs for improved interoperability to push public safety agencies toward sharing of
procurement and
a wide selection systems. Whether built of proprietary technology or based on accepted standards,
of products to shared radio systems offer economies of scale, less redundancy, and inherent
meet specific user interoperability of the chosen technologies. While sharing a radio system doesn’t
needs. With proper alone provide agencies with communications interoperability, it does provide core
planning of the talk parts of the technical foundation.
group architecture,
interoperability
is provided as
Radio systems have been shared as long as public safety has been using the
a byproduct of technology. In relatively recent history, however, technical innovation has followed
system design, their need to manage rising costs, crowded radio spectrum, and difficulties
creating an communicating with other agencies migrating to other frequency bands and
optimal technology technology. System sharing has come as a natural solution to each of these needs.
solution.
—SAFECOm n Proprietary Shared Systems
Interoperability
Trunking, as previously discussed, has been adopted as the primary means of
Continuum
sharing limited radio channels while still providing individual users with privacy and
autonomy. The earliest trunked radio systems were built of proprietary technology,
limiting the choice of system components and generally increasing costs through
reduced competition and vendor lock-in. Many such systems are still in use today,
both in single agency and shared use.
69
The FCC maintains a web page explaining use of 700 MHz interoperability spectrum in greater
detail. See http://wireless.fcc.gov/publicsafety/700MHz/interop.html.
Chapter 16: Voice Communications
2
Proprietary or not, shared systems provide the technological compatibility necessary
Shared systems
offer economies
for interoperability between their users.
of scale, less
redundancy, n Standards-Based Shared Systems
and inherent The simplest shared system is where one or more channels is used conventionally
technological (i.e., not trunked), either analog or P25 digital, between agencies. There is no
compatibility.
proprietary aspect of such an approach and radios from various manufacturers
can be mixed and matched to create the system. While channel efficiency of
conventional systems can’t approach that of trunked ones, they are a cost-effective
option and provide opportunities for sharing of system infrastructure and
backbone networks. Individual channels can be dedicated by agency with others
shared for interagency communications.
P25 is the public
safety standard for
digital radio. Because channel demand has overwhelmed available public safety spectrum, trunked
systems provide the only alternative for shared systems in many areas of the country.
As mentioned, trunking provides the means for many virtual channels, used privately
between defined users, from a relatively few radio frequencies. This allows multiple
agencies to come together on a shared system, use common channels (talkgroups),
and still have private channels.
As public safety radio use migrated toward digital and trunked radio systems, the
community saw a need—and an opportunity—to escape proprietary systems by
setting future standards. Project 25 began in 1989 as a joint effort of the Association
of Public-Safety Communications Officials – International (APCO) and the National
Association of State Telecommunications Directors (NASTD) to ensure that public
safety agencies would have an open, standards-based alternative for digital radio
systems. Today, P25 provides that standard and is being extended to eliminate the
lock-in that proprietary trunked systems face.
Security
The security of public infrastructure, including information and communications
systems, is of critical importance today. Security covers a much broader expanse than
can be covered here, but we want to note issues that an interagency communications
project manager may face. Particularly, there is a delicate balance between security
and availability, which affects interoperability.
Traditional information technology (IT) systems have long been guided by formal,
All radio system well-defined security practices. Radio system managers increasingly face the same
managers should
threats as their traditional IT counterparts. For example, denial of service attacks can
follow established
IT security affect and spread to all IP-based systems. The very flexibility that drives greater use of
practices. VoIP also increases vulnerabilities. All radio system managers seeking to secure their
systems should follow established IT security practices.
The National Institute of Standards and Technology (NIST) within the U.S.
Department of Commerce has published a series of documents on generally accepted
security principles and practices,70 recommended controls for securing federal IT
systems,71 and further principles addressing the subject from a systems perspective.72
These documents describe the means of building a suitable foundation for secure
voice radio systems.
SEArCH received
funding from
the COPS Office
NIST addresses security throughout phases of the system lifecycle:
to produce a 1. Project initiation.
companion
2. Development and acquisition.
Tech Guide, Law
Enforcement 3. Implementation.
Tech Guide on 4. Operations and maintenance.
Information
Technology 5. Disposition of systems.
Security: How to
Assess Risk and
Establish Effective
Policies. This 70
Swanson, Marianne, and Barbara Guttman, Generally Accepted Principles and Practices for Security
guide provides
Information Technology Systems (Washington, D.C.: U.S. Department of Commerce, National
more information
Institute of Standards and Technology, September 1996). See
on nIST security
http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf.
processes.
71
Ross, Ron, et al., Recommended Security Controls for Federal Information Systems, NIST SP
800-53 (Washington, D.C.: U.S. Department of Commerce, National Institute of Standards and
Technology, February 2005, including updates to June 17, 2005). See
http://csrc.nist.gov/publications/nistpubs/800-53/SP800-53.pdf.
72
Stoneburner, Gary, Clark Hayden, and Alexis Feringa, Engineering Principles for Information
Technology Security (A Baseline for Achieving Security), NIST SP 800-27 (Washington, D.C.: U.S.
Department of Commerce, National Institute of Standards and Technology, June 2001). See
http://csrc.nist.gov/publications/nistpubs/800-27/sp800-27.pdf.
Chapter 16: Voice Communications
29
nIST points out The first four of these five phases of a system lifecycle should be familiar to the reader
that security is built from Part II of this book. NIST principles point out that technology security isn’t
into systems from added onto systems, but rather built into them from the foundation up.
the ground up.
Trunked radio systems control access to channels centrally, so offer an inherent ability
to reject rogue radios with just a little effort on the system administrator’s part. Better
yet, modern radio systems, both conventional and trunked, offer the ability to disable
modern radio the lost, stolen, or otherwise misappropriated radio remotely. That prevents the radio
systems allow from requesting system access—or even transmitting at all!
radios to be
disabled remotely.
While physical security is understandable as a fundamental to securing all systems,
securing the information the system is built to transport is another matter.
The great majority of public safety voice communications don’t require great
confidentiality. From an interoperability perspective, encryption brings additional
challenges. Not only do all users that are expected to talk together on secure channels
have to use the same encryption means and methods, but they must have current
keys to lock and unlock transmissions. In effect, encryption adds technological
junction points where interagency communications can be fractured. For example,
most gateway approaches, such as console patches and other common audio bridges,
require special care when moving traffic from one secure channel to another. There
is the risk of originally encrypted traffic on one channel being decrypted at a gateway
and broadcast unexpectedly on another channel unencrypted. Alternately, the
encrypted traffic may be moved through a gateway to users of other channels who are
unable to decrypt and use it, resulting in added noise and confusion for those users.
Encrypted
interagency Despite these difficulties, the confidentiality and integrity of certain voice
communications communications is of high value—high enough that availability risks are
require greater acceptable. Where needed, encrypted communications between multiple agencies
efforts to ensure require additional attention to technical compatibilities and their maintenance, to
interoperability. ensure interoperability.
n Key Management
The big trick in dealing with encryption is managing the keys. Since encryption
creates virtual private networks within the radio system, access to the keys allows
users to be part of the network. There may be multiple sets of keys for different sets
of users to limit access to only those with a predefined need for the “private” channel.
Like any other encryption system, those for radio are only as strong as their weakest
link. That’s usually the keys. Many an encryption system has been compromised
because the secret decoder ring was stolen. Thankfully, this isn’t a frequent occurrence
with public safety radio systems, but all it takes is one radio to be lost or stolen for all
others sharing the same keys to need re-keying.
Chapter 16: Voice Communications
21
First responder mobility challenges key management. If all users of an
encrypted channel were in the same room, it would be easy to keep the keys up-
OTAR is over-the
to-date, switching them out as necessary to maintain security. Unfortunately
air re-keying, or
updating encryption
for the radio system manager, users are rarely so easily contained. The need
keys wirelessly. for “over-the-air re-keying” (OTAR) becomes apparent if you consider just the
logistical challenge of maintaining encryption keys for potentially thousands
of users on a large, modern radio system. OTAR is simply the process of
encryption keys being passed from the system control point to affected radios,
and then activated simultaneously.
OTAR makes it possible to load keys on the fly wherever the radios are, and then
switch to the new set when they are all prepared.
73
Introduction to Encryption Key Management for Public Safety Radio Systems, Public Safety Wireless
Network Program, October 2001. See http://www.safecomprogram.gov/SAFECOM/library/
security/1113_securityissues.htm.
74
Key Management Plan Template for Public Safety Land Mobile Radio Systems, Public Safety Wireless
Network Program, February 2002. See http://www.safecomprogram.gov/SAFECOM/library/
security/1114_keymanagement.htm.
22 Part III: Exploring the Technologies
Thirty years ago, public safety radios were limited to just a few frequencies spread over
a narrow slice of RF spectrum. Twenty years ago, early “programmable” radios were in
use that allowed frequencies available in the radio to be changed electronically, rather
than by substituting internal hardware. These radios also allowed use of a greater range
of frequencies.
During the past 20 years, more and more radio functionality has been moved from
hardware to software. Software defined radios are the next evolution that will allow even
greater agility not only across bands, but also with varying channel bandwidths and
across different modes of transmission. For example, the U.S. Department of Defense
is developing the Joint Tactical Radio System that will operate across multiple bands,
use various analog and digital transmission modes, and provide a combined platform to
eliminate a plethora of different systems.
For public safety interoperability, the technology promises greater ability to span the
chasm between different frequency bands in use. Today, radios using VHF aren’t able
to communicate with those using 800 MHz. In the future, this fundamental technical
challenge to interoperability will be overcome.
Similarly, different means of getting information through radio channels will become
more flexible. Narrow and wider bandwidths will be accommodated through software, as
will analog and a variety of digital transmission modes.
Today, Project 25 radios provide analog and digital, narrow and wider band capabilities
largely through software. SDR technologies will gradually be integrated into mainstream
public safety radios, eliminating some of the technological barriers preventing direct
interagency communications.
Much like artificial intelligence in computer systems, SDR techniques will be embedded
in technology and largely unobserved by the end user. The effects will be significant,
however.
Technology marches on, bringing new capabilities and overcoming the old.
CHAPTEr 17
DATA COmmUnICATIOnS
Chapter 1:
Data Communications
Voice communications over radio is accepted as the central interoperability
challenge, but it’s increasingly difficult to separate voice from data and
wired from wireless networks. Data networks tie together public safety
communications systems from beginning to end. From the automatic number
identification/automatic location identification (ANI/ALI) data arriving
SAFECOM
with an initial 9-1-1 call for services through the responder’s final status code
Technology Library
The SAFECOm transmission from a mobile data computer, data systems connect responders
technology library to the public they serve and beyond. Even at the core of modern radio systems,
is a prime source wired and wireless data networks connect dispatch consoles to central
for information electronics banks, link complex subsystems in the radio room, and carry audio
about data widely between distant transmitters.
communications
systems. It includes
Since the World Wide Web surfaced from the primordial Internet barely more
documents from
multiple sources, than a decade ago, data networks have come to pervade our homes, our offices,
including the past and even our automobiles. In this chapter, we look first at the protocols and
Public Safety standards that fueled this explosive growth and then into the technologies
Wireless network of both wired and wireless data networks. We’ll wrap up the chapter with an
(PSWn) Program. examination of how data networks are secured and close with a look at data
See http://www. communications developments on the horizon.
safecomprogram.
gov/SAFECOM/
library/technology/. Common Protocols and Standards
Common protocols and standards are the building blocks for interoperability,
technologically or otherwise. At technical and social levels, alike, the Internet has
influenced the world of information sharing greatly, from civic and commercial
realms, to government. Just as the World Wide Web evolved as the model of
information sharing globally, the common protocols on which it was built have
Common protocols become the foundation for nearly all data communications.
and standards are
the building blocks
of interoperability. The Internetworking Effect
What suite of protocols powers the Internet and every private network that has
arisen from it?
If the following section title didn’t give it away, you might be surprised to know it’s
the Transmission Control Protocol/Internet Protocol best known as TCP/IP. Lest the
term “suite” strike you as pretty fancy for just two protocols, understand that TCP/
IP is commonly used to refer to dozens of protocols that lace the Internet together.
2 Part III: Exploring the Technologies
The Internet has become so ubiquitous and part of our daily lives that we may forget
at times that it’s a minor miracle that we can transfer a wide assortment of data
around the world with little worry about how it happens. Electronic mail, files, video,
music, and now voice telephony speed from point to point across increasingly faster
and faster networks upon an amazingly standardized set of protocols.
Other key Internet protocols that have found their way into the heart of public safety
communications include the following:
• File Transfer Protocol (FTP) – A venerable graybeard of the earliest days of
internetworking and today underlying data transfer between many criminal
records and other information sharing systems.
• Simple Mail Transfer Protocol (SMTP) and Post Office Protocol Version
3 (POP3) – Key pieces of today’s e-mail, as well as automated fingerprint
identification systems.
• User Datagram Protocol (UDP) – TCP’s alter ego and the foundation for
Voice over IP (VoIP) networking, including systems for interconnecting radios
over data networks.
• Session Initiation Protocol (SIP) and Real-time Transport Protocol
(RTP) – Doing yeoman’s work for networking services as varied as peer-to-peer
music sharing systems and VoIP telephony, beyond to the instant messaging
capabilities of the Capital Wireless Integrated Network (CapWIN) around
Washington, D.C.
75
The IETF is an international community of industry, academia, and government. See
http://www.ietf.org/.
Chapter 17: Data Communications
2
• Lightweight Directory Access Protocol (LDAP) – Serving at the core of
NASA’s Integrated Services Environment just as it serves user authentication
information to encryption engines securing Kansas’ innovative Criminal Justice
Information System.
• Simple Network Management Protocol (SNMP) – Giving technical staff a
view into the core of the Internet, as well as the supervisory control and data
acquisition systems of modern trunked radio systems.
These and many more standardized protocols have brought about a Golden Age for
data sharing at a technical level, whether those data packets are carrying criminal
history records, voice dispatch communications, or fingerprint images. As much as
they contribute, these networking protocols alone don’t make the data intelligible,
though. It takes higher level application protocols and standards to transform data
into information.
XML actually had its origin before widespread use of the Internet in something called
Standardized General Markup Language (SGML). A markup language is basically
simple, textual conventions for describing associated data and providing further
details on how the data are used. SGML is actually an international standard; XML is
a simplified subset of it.
XML’s magic is in its extensibility—its innate capacity to describe and extend itself
for wrapping data into ever more useful packages. It is structured text, making it both
human and computer readable, but XML can wrap up and describe data of all types.
Software capable of processing XML documents—packages of XML text and data
payloads—are able to “learn” of the structure of the document, including associated
nontextual data.
There’s no shortage The U.S. Department of Justice (DOJ) Office of Justice Programs (OJP) released the
of acronyms in the GJXDM in early 2004 as the first comprehensive product to wrap together a data
world of Internet dictionary, a data model, and an XML schema.
protocols—even
ones with others A data dictionary is a set of standardized descriptions of data to provide a common
embedded!
definition and means of describing, for example, a person’s name. A data model
expands on a data dictionary by establishing how different data elements relate to
each other. For example, a person has a birth date, height, and weight, while a vehicle
has a make, model, and style. An XML schema defines how data elements make up
documents and how documents are related to each other. Remember that in the
worldwide web of information protocols and standards, XML documents can range
from very simple to very complex sets of information.
GJXDM provides its own rich set of definitions that can be used outside the justice
world. It and the use of XML, more broadly, are becoming requirements for
public safety information systems funded with federal dollars in order to ensure
interoperability between systems. In fact, the COPS Office now encourages police
agencies engaged in technology projects to use XML whenever possible. For example,
the Baltimore City Police Department was encouraged to use the GJXDM while
working on a regional crime analysis project funded by a COPS Office grant. The
department committed to incorporating GJXDM-compatible functionality into the
regional database used in its Regional Crime Analysis Program and Regional Crime
Analysis Geographic Information System. In doing so, the department has greatly
enhanced the ability of police agencies participating in the Regional Crime Analysis
System organization to share information about crimes and offenders.76
76
Source: Baltimore City Police Department Progress Report, December 2005, submitted to the
COPS Office.
Chapter 17: Data Communications
29
77
The workshop report is available online at http://www.search.org/files/pdf/gjxdm-iep.pdf.
Documentation reports, such as Field Interview Report, Charging Document, Sentence Order, and
Incident Report, are freely available from SEARCH at http://www.search.org/programs/info/
xml-iep.asp.
78
Elsewhere in federal grant programs, recipients of grants from the U.S. DOJ’s Office of Justice
Programs that are implementing XML are required to use GJXDM. See http://it.ojp.gov/topic.
jsp?topic_id=138. Also, Fiscal Year 2005 grant guidelines from the Department of Homeland
Security (DHS) required use of GJXDM specifications and guidelines regarding use of XML
to support intersystem exchanges of information. “Fiscal Year 2005 Homeland Security Grant
Program – Program Guidelines and Application Kit.” See http://www.ojp.usdoj.gov/odp/docs/
fy05hsgp.pdf.
290 Part III: Exploring the Technologies
The emergency management world is also seeing rapid growth of information sharing
standards built around XML. For example, the Emergency Data Exchange Language
(EDXL) is an effort to advance interoperability between data systems. EDXL is
being developed through a practitioner-driven, public/private partnership between
industry and the DHS’s Disaster Management (DM) E-Gov (electronic government)
initiative to advance U.S. disaster management response capabilities. One standard
established before DM involvement was the Common Alerting Protocol (CAP). EDXL
is a broad suite of draft standards to provide tools for information sharing, while CAP
is a specific, standardized protocol for alerting and event notification.79
The Disaster
management CAP has seen use in both government-funded and commercial applications. Disaster
Interoperability Management Interoperability Services (DMIS),80 an interoperability software toolset
Services (DmIS) providing real-time, secure sharing of incident information for public safety agencies,
are part of a is an example of the former. DHS funded development of it as part of the Disaster
Presidential
Management initiative. DMIS uses the CAP standard, as well as other XML-based
e-government
initiative to advance exchanges, to move information between users of either a no-cost DMIS client
U.S. disaster application or with other applications capable of using the protocol. The DMIS client
management application provides basic functionality using standard, web-based services to create,
response view, and exchange incident information.
capabilities.
Commercially, crisis information management systems (CIMS) are a rapidly
developing breed of application built for information sharing. They commonly
use XML to push data to and pull it from other information systems. Distinct
from traditional RMS and CAD systems used by responder agencies, CIMS
implementations are designed specifically to collect, distribute, and display
79
For further information, see the web site of the Organization for the Advancement of Structured
Information Standards (OASIS) at http://www.oasis-open.org. OASIS is a not-for-profit
consortium of vendors and users developing guidelines for interoperable systems. For information
on EDXL, see http://xml.coverpages.org/edxl.html.
80
See the Disaster Management Interoperability Services web site at
http://www.cmi-services.org/.
Chapter 17: Data Communications
291
information from various sources—both from humans and machines. For example,
popular commercial products allow integration of information from CAD and
geographic information systems (GIS), while providing document sharing, video
conferencing, and other collaboration tools.
Commercial CIMS products with XML capabilities are finding popular adoption
among emergency management officials for noncrisis events, too. For example:
• Football Championship Game – Jacksonville, Florida
In February 2005, the Jacksonville Sheriff ’s Office used a commercial, web-
based collaboration product to help it and dozens of other agencies manage
information flowing in all directions. It was found to be particularly useful in
maintaining situational awareness, executing Incident Command System (ICS)
incident action plans, and producing situation reports.
• Presidential Inauguration – Washington, D.C.
A month earlier, the Metropolitan Police Department in Washington, D.C.,
made use of a different CIMS to push information to other homeland security
and law enforcement information systems. It also helped the department
document activities for subsequent federal reimbursement of expenses.
• National Political Convention – Boston, Massachusetts
Boston was the site for a national political convention late in the summer
of 2004. The Boston Emergency Management Agency implemented yet a
different commercial CIMS for hundreds of users across dozens of agencies and
organizations. It was used for incident information sharing between the agency
and the U.S. Environmental Protection Agency during the convention.
There is great room for XML and similar technologies to advance interoperability
of data communications. An October 2004 report on CIMS interoperability by
Dartmouth College81 noted the need to create a common vocabulary of technical
terms, define data elements, promote public/private partnerships to advance
standards, and overcome “cultural issues” affecting information sharing. Similarly,
standards for open messaging between RMS and CAD systems are in their infancy.
81
Institute for Security Technology Studies, Crisis Information Management Software (CIMS)
Interoperability: A Status Report, (Hanover, New Hampshire: Dartmouth College, October 2004). See
http://www.ists.dartmouth.edu/TAG/cims1004.pdf.
292 Part III: Exploring the Technologies
Challenges notwithstanding, the future looks bright for greater and greater technical
capabilities to share data, make it intelligible, and, ultimately, make it into actionable
information. Information sharing is the true measure of interoperability.
***
It’s becoming
increasingly difficult Common protocols and standards arising in conjunction with the Internet depend on
to separate wired
physical networks to move data about. Increasingly, interagency communications
and wireless modes
of communications. capabilities are evolving simultaneously on both wired and wireless networks. In
truth, it’s becoming increasingly difficult to separate the two modes of
communications. For the sake of discussing data communications technologies that
use the protocols and standards mentioned, we’ll take a look at wired and wireless
networks separately.
Well, yes they do. Thanks for asking! Just as common terminology is a key factor for
interoperability, the design and operation of interagency communications systems is
furthered by common use and understanding of terms. Data networking is easier to
understand with a common, consistent vocabulary for network types.
Chapter 17: Data Communications
293
n Standard Network Types
Local area networks are typically constrained to an office or building environment.
There are physical wiring limitations that have given rise to the term, but generally a
LAN is considered a geographically and functionally constrained network connecting
personal computers, and perhaps, servers and printers.
Multiple LANs may coexist in a single location to segregate use for functional or
security purposes. For example, it’s not uncommon in dispatch centers for separate
connections to the state data network and to the city or county LAN to exist side-by-
side—often connecting separate computers. The state connection provides access to
the FBI’s National Crime Information Center (NCIC), the National Law Enforcement
Telecommunications System (NLETS), and state systems, while the other provides
access to local applications and data.
Statewide networks
connect local,
From an end user’s point of view, CANs, MANs, and WANs may appear to be
campus, and
metropolitan area largely arbitrary distinctions in the geographic extent of data communications
networks to create systems. To a large extent, that’s true. Data networks are categorized in these
the technical basis geographic terms more for the sake of convenience in discussion rather than
for law enforcement inherent technical limitations.
information
sharing. Groupings of networks to create the successively larger ones are defined at a technical
level, of course, but widespread adoption of TCP/IP for data communications often
makes them seem all as part of a larger whole. With the right agreements, technicians,
and overarching applications—such as the Internet—they can easily serve as the
technical means of data communications interoperability.
For example, the FBI’s Criminal Justice Information Systems (CJIS) WAN connects to
each state and some larger cities, providing the backbone for a wide array of NCIC,
The FBI’s CJIS criminal history, and automated fingerprint identification services to agencies
WAn connects nationwide. Specialized networking equipment and circuits connect each of these
law enforcement
agencies
pieces. And a whole lot of tuning and configuration makes it possible to pass data
nationwide. from one end to the other, but at the network level, there is interoperability.
In the process of examining intra- and interagency needs, different type of networks
were defined to address differing needs for high-speed data exchange. These aren’t
necessarily independent networks and may, indeed, be built of similar technology.
Each amounts to a separate functional type of network.
The first is a personal area network (PAN). In public safety response, this is the
networking environment that surrounds the individual responder. It may be
short-range wireless means for microphones, location monitoring devices, and
How many environmental sensors to be connected to a personal hub. From that hub, information
acronyms can fit on may be made available to the individual responder, as it may be shared with team
the head of a PAn? members, incident commanders, and beyond. The PAN will carry both data and voice
communications within close proximity to the first responder.
Beyond individual incidents, the jurisdiction area network (JAN) describes functional
and even technical networking requirements that span the general operational
environment of one or more agencies. In essence, it serves to connect both widely
dispersed resources and concentrated “hotspots.”
The final networking type described by Project MESA is the extended area network
(EAN). Multiple sub-networks linked across broad geographic expanses are most
commonly known as WANs or extranets. The idea is that through use of common
technical protocols, application-level interoperability, and shared security measures,
data communications can span individual agency and jurisdictional networks.
Today, LANs are commonly built to transfer billions of bits per second (gigabits/sec
or Gbps). Long-haul fiber optic circuits forming the backbones of modern WANs are
measured in hundreds of Mbps, while even home access to the Internet is more often
than not measured in broadband terms of megabits per second. In 2005, 60 percent
of home Internet access in the U.S. was via broadband connections. 82
n Intelligent Networks
“The days of the fat, dumb pipe, are over.”
Network intelligence has gradually come to the public safety world. Ten years ago
essentially all access to NLETS and NCIC occurred over circuit-switched connections
using specialized network protocols. Today, the majority occurs over packet-switched
circuits, most typically using TCP/IP at the core. While private virtual circuits are
used to protect traffic from prying, the circuits are still “virtual”; that is, they’re
passing through a larger cloud of intermingled bits and bytes.
82
Source: http://www.websiteoptimization.com/bw/0509/.
83
Erlanger, Leon, “Building the intelligent network,” InfoWorld, July 18, 2005. See
http://www.infoworld.com/reports/29SRintelnet.html.
29 Part III: Exploring the Technologies
Digitized and packetized audio from telephones or radios that is being sent and
received in real time demands fast networks. Delays measured in fractions of a second
can disable simultaneous two-way (duplex) voice communications, as we’re used to
with telephones.
And fast isn’t the same as big, though the two have been intertwined since the
earliest days of networking. That big, fat networking pipe connecting two points
might, like a railroad, be capable of carrying huge amounts of data, but it can be
slow to get up to speed and equally slow to decelerate, like a train. In the networking
world—wired or wireless—delays between transmission and receipt of bits and
bytes is referred to as latency.
Have you ever noticed how hard it can be to carry on a cellular telephone
network latency conversation when there are network delays between you and the other party?
affects duplex
(simultaneous
Estimates are that delays of more than a quarter of a second (250 milliseconds)
two-way) disrupt the normal flow of human conversations. Even that tiny amount of time
communications. serves as a cue for the wetware between our ears to switch from “receiving” to
“transmitting” in a two-way conversation.
Wired data networks are more easily managed to maintain a set QoS level than are
wireless networks.
The greater challenges probably come from too much connectivity, which brings security
concerns, fosters the spread of viruses and other network pestilence, and generally
threatens the manageability of segmented networks. We will address security issues and
technologies associated with data communications later in this chapter.
We’ll conclude this section with a look at how to evaluate options for building your
own wireless data networks versus buying services from commercial providers.
Common Principles
In your own considerations of wireless data communications
technology, work to avoid “Silver Bulletitis”—an affliction
leading to the belief that there’s a single, ideal technology
awaiting discovery or deployment that will provide
interoperability. Keep in mind a few common principles
demonstrating the practical realities and tradeoffs facing
network architects.
84
Ethernet is the popular name given to wired networking technology that has grown dominant
during the past 30 years. Technically, it is standardized by the Institute of Electrical and Electronic
Engineers (IEEE) as IEEE 802.3. It has evolved in speed over the years, with good backwards
compatibility.
29 Part III: Exploring the Technologies
Wireless WANs that depend on few fixed access points for bringing mobile users back
home are relatively limited in capacity and speed. This applies to satellite networks,
as well. Satellite data networking also demonstrates that the mere distance between
users and central network components limits speed and capacity. That is, nature
decrees that electromagnetic radiation is going to take a fixed amount of time to travel
a given distance. Wireless networks of a few hundred feet in radius are faster and offer
the potential for greater capacity than those connecting hundreds or thousands of
miles into space.
Wideband As a matter of fact, the technologies for these systems operated in standard voice
standards for public channels, encoding data as sounds just like a telephone modem does. Technological
safety use are advancements allowed data speeds to double and then double again, but the result
rapidly developing.
We’ll take a look
was still a network that ran a poor second compared to dial-up. Did we mention the
at the prognosis data channel was shared by multiple users?
for them in the
final section of this Slow technologies are still in wide use. The most common mobile data technologies in
chapter, “On the public safety use today still only run at 19.2 Kbps. And digital voice radios don’t offer
Horizon.” any immediate improvement. Project 25 (P25) radios, capable of passing voice and
data digitally, have a maximum rate of 9.6 Kbps and effective throughput of half that.
Chapter 17: Data Communications
299
MICROWAVE SUBSYSTEMS
Many public safety voice and data systems have private microwave backbones
linking together facilities and radio sites. While unlicensed microwave technology is
widely available, most agencies prefer to build backbone networks using microwave
channels assigned by certified frequency coordinators and licensed through the Federal
Communications Commission (FCC). As with voice frequencies, coordination and FCC
licensing offers much better assurances that agencies won’t suddenly find other users
interfering with their operations.
Microwave backbone networks are popular because they offer high-speed, high-
bandwidth connections without requirements for intervening infrastructure or recurring
payments to network carriers for leased lines. Properly engineered, they are also
considered more resilient to accidental and intentional disruptions.
(More than one public safety network has been subject to “backhoe fade,” the tongue
in-cheek term for accidental breaks of buried wire and fiber circuits. Anyone involved
in telecommunications for long has a horror story to tell of losing network access,
receiving a call from a network carrier, and eventually gasping in awe at the sight of
thousands of wires ripped apart by an errant backhoe operator.)
Shared microwave backbones are increasingly popular among public safety agencies
looking to leverage funds and take advantage of the tremendous capacity of today’s
microwave systems. They are a natural adjunct to other shared systems, offering
great potential to interconnect parts of participating agencies’ data, voice radio, and
telephone systems.
Mobile data systems built to operate across voice channels are inevitably constrained
by the channel width of those frequencies. Greater bandwidth yields greater speed.
Data systems built upon the narrow bandwidth of existing voice channels are limited
to low speeds.
At the time of this writing, second and third generation services—2G and 3G,
respectively, in short—are being offered.
A brief taxonomy and short chronology of commercial wireless services may be useful.85
• 1G – Defined only in retrospect, first generation wireless services included early
analog cellular telephones and overlay data services, such as Cellular Digital
Packet Data (CDPD). CDPD was popular among police and fire agencies as a
commercial networking alternative. It ran at 19.2 kilobits/second (Kbps).
• 2G – Digital cellular telephone systems are considered the second generation.
Second generation systems include GSM, iDEN, and cdmaOne. Data rates for
these technologies are around 20 Kbps.
• 2.5G – Services running in the range of a few dozen to few hundred Kbps are
considered to be in this transitional ground from dial-up speeds to wideband,
3G services. Examples include GPRS, 1xRTT, and EDGE technologies.
• 3G – High-speed technologies that can compete with wired services, ranging in
speed from a few hundred Kbps to more than 1 Mbps. Examples include EvDO
and UMTS.
Figure 17-1 depicts real-world data throughput of different wireless technologies and
likely dates for broad availability.
85
The world of wireless data networking is full of acronyms. See Appendix F for a glossary of
terms.
86
Signorini, Eugene, 3G Represents an Inflection Point for Enterprise Mobility (Boston, Massachusetts:
Yankee Group Research, Inc., 2004).
Chapter 17: Data Communications
301
1440
1320
1200
real-world throughput range in Kbps
1080
960
840
720 Mobile
Fixed WiMax
600 WiMax (802.16c)
480 Wi-Fi (802.16d)/
(802.11) OFDM
360 EVDO HSDPA
240
120 EDGE
0 GPRS 1xRTT
Satellite Services Technologically, public safety tends to trail, but track, private data networking trends.
Commercial We can look at those broader trends to project where public safety wireless is headed.
satellite services
are the only means
A late 2005 reader survey by MissionCritical Communications87 showed that slightly
for U.S. public
safety agencies to more than half of respondents said that traditional, private radio networks were the
gain the advantages primary means of wireless data access for their agencies’ responders, while more than
of space-based a third relied on commercial networks. Significantly, about half as many respondent
communications. agencies relied on high-speed wireless LAN (WLAN) technologies as relied on
As addressed in commercial services—16 percent versus 34 percent.
Chapter 16, Voice
Communications,
The use of popular WLAN technologies is an interesting parallel of public safety and
satellites have
a definite niche private sector uses. The cited survey also indicated that 75 percent of respondent
for emergency agencies planned to deploy WLANs at their facilities before the end of 2007. Of
response. They also course, there’s a difference between using the technology at facilities, such as offices
have technical and and parking garages, and covering the wide, deep emergency response environ. Due
cost drawbacks that to limited range of WLANs, most agencies using them rely on traditional private or
keep terrestrial data commercial networks for more general coverage.
networks as the
first choice, where
available.
87
“Public Safety Report: Snapshot Survey – Wireless Networking,” MissionCritical Communications,
September 2005, p. 64.
302 Part III: Exploring the Technologies
n WLAN Technologies
As a matter of background, wireless LAN technologies are most often described
in terms of the standards they use. The most common is the IEEE 802.11 family of
standards,88 which define wireless networks very similar to Ethernet (IEEE 802.3) in
the wired world.
Standardization has been key to WLAN growth. However, it wasn’t until the thorny
The Wi-Fi Alliance issue of interoperability was taken up that manufacturers adopted a common
brought a standard
implementation of the standards, fueling an explosion in growth. The Wi-Fi Alliance,
implementation to
802.11 wireless a nonprofit trade association established late in the 1990s, brought that common
networks. implementation well known today as Wireless Fidelity or Wi-Fi.89 The term Wi-Fi has
become such a standard part of the international wireless lexicon that it’s well to
remember it has a formal meaning.
88
For further technical information on the IEEE 802.11 series of standards, see
http://www.ieee802.org/11/.
89
Wi-Fi® is a registered trademark of the Wi-Fi Alliance. Wi-Fi CERTIFIED™ equipment is the
implementation standard for the vast majority of WLANs. See http://www.wi-fi.org.
Chapter 17: Data Communications
303
Both 802.11a and b technologies operate in the FCC’s unlicensed frequency bands at
802.11a networks 5.8 and 2.4 GHz, respectively. While use of these bands is unlicensed, it is regulated
use 5.8 GHz
and every WLAN device has to comply. Antenna and power emission regulations
frequencies, while
802.11b networks
limit what can be done with the devices.
use 2.4 GHz.
Largely due to the more limited range of the frequencies used, 802.11a has not been as
widely adopted as 802.11b, despite its higher data rates. As a matter of fact, common
reference to Wi-Fi hotspots—local access points or base stations with broader
network connections—in public transit areas and cyber cafés is usually referring to
the slower, lower frequency equipment. Less range means that more access points
are needed to cover the same area, leading to higher costs and greater complexity in
linking all the devices to a common backbone.
Offering the lower frequency (2.4 GHz) and high data rates (up to 54 Mbps), 802.11g
is a later standard now growing in popularity. It is also backwardly compatible to
802.11b. Real throughput is still less than half of the raw data rate and just like
802.11a and b, this latest Wi-Fi technology throttles itself back when faced with
interference or weak signals in order to maintain connections.
Outside these factors, 802.11a, b, g networks are very similar in operation. Each uses a
very few wideband channels in their respective bands. They move bits of data around
the wide channel in a predetermined sequence to improve throughput and resistance
to certain types of interference. This process of direct-sequence spread spectrum (DSSS)
is common to Wi-Fi technologies.
By contrast, the basic 802.11 standard also provides for frequency hopping spread
spectrum (FHSS) techniques that operate at lower data rates (1 or 2 Mbps), but
which in application offer greater resistance to signal jamming and interference,
unintentional or otherwise. Wireless network technologies using 802.11 FHSS are
available for public safety use, though are eclipsed by the Wi-Fi juggernaut.
802.11 – The ubiquitous wireless LAN standards. Wi-Fi equipment and networks
are a particular, popular implementation of the IEEE 802.11 standards. Actual TCP/IP
throughput is about half of the raw channel rate, which itself is stepped down to
maintain connections in weaker coverage areas.
• 802.11a – Operating at 5.8 GHz, offering up to 54 Mbps raw data rates
• 802.11b – Operating at 2.4 GHz, offering up to 11 Mbps raw data rates
• 802.11g – Operating at 2.4 GHz, offering up to 54 Mbps raw data rates and
backwardly compatible with 802.11b.
Some public safety WLAN needs can and have been met by no more sophisticated
equipment than used by the average cyber café surfer. For example, “parking lot
LANs” have been created and police vehicles suitably equipped so that reports,
virus software updates, and other sizeable packages of data can be transferred in a
reasonable amount of time when the officer gets within range of the station hotspot.
n WLAN Weaknesses
The beauty of 802.11 wireless LANs is that the technology is readily available and
highly developed due to its popularity. However, the technology does have a number
of weaknesses.
• Popularity. Yep, the strength is also a weakness. Wi-Fi (IEEE 802.11b) hotspots
today all compete for the same few slices of 2.4 GHz radio spectrum. Separate
networks can operate in the same slice and over the same territory, but physics
dictates that they will interfere with one another.
• Use of unlicensed spectrum. Popularity is one thing, but unlicensed
use of the spectrum makes the WLAN ecosystem a bit of a jungle. Other
widespread public, commercial, and industrial use of both 2.4 and 5.8 GHz
unlicensed spectrum reduces its suitability for public safety purposes. For
example, Wi-Fi networks share the band with cordless phones, microwave
ovens, and nanny cams.
• Security. Wi-Fi networks have gotten a bit of a black eye for their hack-ability.
While this has led public safety agencies toward proprietary adaptations of
802.11 standards, it seemingly hasn’t dampened general enthusiasm elsewhere.
Network security experts point out that all shared-medium networks, such as
basic Ethernet and Wi-Fi, are inherently more vulnerable. Encryption and other
security measures have been used for years with wired and wireless networks,
alike, to at least protect the privacy of their communications.
• Mobility. The 802.11 standard suite wasn’t designed for mobile devices that
may be moving rapidly in and out of optimal coverage or in and out of range
of different network access points. In essence, each Wi-Fi cell is a separate LAN
unto itself, using separate network addresses. Even if the WLAN could manage
30 Part III: Exploring the Technologies
breaking and making connections each time a user moved from one cell to
another, IP-based networks and applications don’t deal well with addresses
being switched on the fly, potentially several times a minute or more when
users operate at cell boundaries. Proprietary extensions to 802.11 standards
reduce this to a degree by making the access points “dumb” and moving most
intelligence for managing mobility back to the network core. This comes at the
cost of less standardization and, somewhat as a result, less interoperability.
Spokane, newark, Large cities are not the only ones building wireless LAN systems. Police and other
and many other emergency agencies across the country are already making use of the technology, if
jurisdictions at smaller scales, to connect field staff to information. Examples include Spokane,
across the country
Washington, which has built a dual-use network with separate segments for public
are using WlAn
technologies to
access and emergency agency use. The system covers a 100-block section of the
provide broadband downtown area, providing access for police and fire uses. Across the country, the
data to emergency Newark (New Jersey) Police Department is using a COPS Office Interoperable
responders. Communications Technology Program grant to install a broadband wireless network
linking multiple policing partners and hospitals around the area.
90
The Wireless Philadelphia web site has further information. See
http://www.phila.gov/wireless.
91
The San Francisco TechConnect web site has further information. See
http://www.sfgov.org/site/tech_connect_page.asp?id=33899.
Chapter 17: Data Communications
30
multiagency Wi-Fi In essence and practice, these are standards-based, shared systems. Widely
networks provide available and compatible technology provides agencies using Wi-Fi networks with
standards-based, a competitive market to keep prices down and service quality up. Broad use outside
shared data the public safety market brings innovation and further economies of scale through
communications sharing of infrastructure. Police, fire, and EMS agencies are leveraging the commercial
systems.
popularity of Wi-Fi technology.
A mesh network The term “mesh network” has come to be used rather loosely in recent years, but
is made up of properly refers to a network of many nodes, each of which communicates with two
many nodes, each
or more of its neighboring nodes. End-user network devices, such as a mobile data
communicating
with two or more
computer, can access a mesh network and thereby become part of it, but rarely are
others. designed to be part of the mesh fabric itself.
Figure 17-2 depicts a simple mesh network of four access points (AP) that
communicate with each other and mobile computers. Each AP maintains a line of
communications with all other APs. Traffic received at one AP is passed to the station
and, potentially, on to a WAN either directly or through another access point.
92
“Mesh Network Market May See Tenfold Growth in Five Years,” ABI Research press release,
November 16, 2005. See also http://www.abiresearch.com/abiprdisplay.jsp?pressid=556.
30 Part III: Exploring the Technologies
Wired or wireless links separate from the WLAN channels provide alternative paths
for the traffic to follow. This helps in balancing traffic on the mesh links and provides
resiliency in case one of the intermediate APs is lost. Circuits or links that carry
masses of traffic from one point to another are referred to as backbone links.
This is a classic, full mesh network. If the individual APs weren’t connected to
all others, it would be considered a partial mesh. If each was linked directly back
to the station, it wouldn’t properly be called a mesh, but rather would be said to
have a star network topology.
Tempe is building Mesh networking is becoming the rule rather than the exception when multitudes of
an expansive mesh WLAN access points are used in concert across a jurisdiction. For example, the City
network to cover of Tempe (Arizona) is building tandem Wi-Fi mesh networks over a 40-square-mile
more than 40 area to serve the public and municipal agencies, independently. Approximately 400
square miles using access points will be used to communicate with mobile wireless devices, as well as to
approximately 400 route network traffic to backbone networks. Emergency responder vehicles capable of
access points.
operating on either the mesh network or the city’s pre-existing mobile data network
will use in-vehicle routers to dynamically choose the optimal network path back to
agency servers.
Rent or Own?
WLAN technology is one of several choices available for interagency data
communications. Where public safety agencies had only one practical means
of connecting mobile users to data sources—building their own networks—an
explosion in commercial services has provided viable alternatives for many. With the
popularization of consumer wireless data technologies, agencies now have a third,
hybrid alternative to build their own networks from technology broadly available
outside of the public safety environment.
We’ve heard heated debates about why one approach to wireless data for public safety
agencies is preferable. There are many strong points to be made on either side, but
ultimately, the best decision is made by agencies that put technological debates to
simmer on the back burner while letting their own business needs drive the decision.
Those needs and all compromises made will only then properly include consideration
of system lifecycle costs, security needs, and operational priorities.
The following chart (Figure 17-3) will be useful in balancing needs. Three alternatives
are examined:
1. Build Using Specialized Public Safety Technologies – Traditionally, wireless
data networks used by public safety agencies have been built by the agencies
themselves, using niche technologies. Broad consumer and business use of the
technologies never existed. Traditional, low-speed mobile data networks are
included in this category.
2. Lease Commercial Services – Data network services are leased through a
wireless carrier.
3. Build Using Broadly Available Technologies – Use of widespread wireless
data technologies brings a hybrid option to build agency-owned networks
from commonly available parts. Wireless LAN technologies are included in
this category.
Pros and cons for decision factors and alternatives are provided. The “ratings”
indicators include a minus sign (-) for detracting factors, a plus sign (+) for attractive
factors, and a check mark (3) for acceptable compromises.
310 Part III: Exploring the Technologies
$
Cost factors vary by
implementation. Initial and
ongoing costs should be
evaluated over comparable system
lifecycles and assessed based
on requirements met. Absolute
dependence on any one or
more requirements may lead to
acceptance of higher costs.
312 Part III: Exploring the Technologies
You’ll note that the third alternative, building agency-owned networks from widely
used technologies, is considered here a good compromise across the board. It is
an increasingly attractive alternative buoyed by a boom in wireless data usage by
consumers, business, and industry. Public safety usage was once a large share of
the wireless data market, but today is miniscule by comparison. The advantages of
long product lifecycles and security through obscurity of traditional mobile data
technologies are fading.
Security
Security for data communications networks, wired and wireless alike, necessarily
evolves at least as rapidly as the connecting technologies themselves. Threats have
grown in direct proportion to the capacity and extent of networks stretching across
the globe and deep into societies worldwide. Not only has access to networks by
those with malicious and criminal intent grown tremendously, but every insecure
networked computer can serve as a naïve accomplice in attacks. Growth in high-
speed, always-on connections to homes and small businesses has magnified the risk.
Chapter 17: Data Communications
313
It’s easy to maintain secure data communications. Just lock up all computers
networked together into a single room, building, or compound, secured
electromagnetically to TEMPEST standards,93 and then control physical access by
their users. It’s done all the time. It just isn’t very practical for the public safety
environment, particularly where interagency collaboration is the rule rather than
the exception.
Police, fire, and EMS agencies maintaining their own physical or logical networks
within or connected to others necessarily have security interests that must be
Interoperability maintained. Some, such as the FBI’s Criminal Justice Information Systems (CJIS)
requires the Security Policy, are conditions of connecting to other networks. The boundaries
technical between networks, physical and logical, are secured to control access, determine
capability to share
authorities, and provide means of auditing use. Interoperability requires the technical
information within
the legitimate
capability to share information within the legitimate constraints of each partner’s
constraints of each security needs.
partner’s security
needs. Whether to guard against criminal, terrorist, or nuisance attacks, network security
tools continue to grow in sophistication and availability. We will examine some of
those tools and their relations to interoperability in a moment. First, let’s take a look
at a key federal policy shaping law enforcement information systems.
93
TEMPEST is a national standard defining limits of unintentional electromagnetic emissions from
electronics for security purposes. Endorsed TEMPEST products are required for the most secure
telecommunications networks, but are rarely specified for public safety purposes. See also
http://www.nsa.gov/ia/government/index.cfm.
31 Part III: Exploring the Technologies
n Scope
Established in 1999, the CJIS Security Policy affects all agencies using FBI systems
The CJIS Security managed by its Criminal Justice Information Services (CJIS) Division. Because the
Policy affects all policy is considered Sensitive But Unclassified, we’ll only cite a couple of elements
agencies using FBI
in passing. State and local agency systems connected to CJIS Division systems are
systems managed
by its CJIS Division. required to adhere to the policy, so affected agencies should have ready access to it
through official channels.
Most law enforcement agencies access NCIC and other similar systems through
state-level proxies. CJIS System Agencies are those agencies with direct connections
to CJIS Division systems. Most operate both as primary users of the systems and
intermediaries. For example, a state police computer center may be the termination
point for a CJIS Division network circuit and, from a relative perspective, the start of a
statewide data network for access by its own users and those of other agencies.
For both network and information security purposes, the CJIS Security Policy applies
to all users of CJIS Division systems and information from them. Systems and
networks not connected to the FBI aren’t subject to the policy, but combined networks
carrying CJIS, CAD, internal records, and radio system control traffic are increasingly
common in law enforcement agencies.
A full treatment of these subjects is beyond the scope of this Guide; CJIS Security
Policy, itself, is the definitive statement. The FBI CJIS Division and each CJIS System
Agency has a designated Information Security Officer (ISO). Check with the ISO
Chapter 17: Data Communications
31
responsible for your agency with questions about requirements for data networks
carrying CJIS Division information.
In essence, the distinction between secure and nonsecure locations and networks
revolves around management control. Systems and networks entirely under the
control of a criminal justice agency are considered secure. General governmental
networks, the Internet, and telephone dial-up access are all examples of nonsecure
networks presumed more susceptible to compromise by unauthorized individuals.
n Interoperability
New connections between, for example, two local agency systems already subject
to the policy don’t necessarily bring added security requirements. However,
interconnections made across networks managed by others likely do need additional
security measures.
For example, consider a county sheriff ’s office and a municipal police department that
are independent users of a state criminal justice network that provides their NCIC
access. Each is subject to relevant parts of the CJIS Security Policy. If the two agencies
chose to connect their internal, secure networks to share CJIS information over a
general-use municipal or county government network, that connection would be
subject to the same CJIS security requirements. This might occur if the two agencies
wanted to exchange calls for service between their respective CAD systems that
contain NCIC records information. The solution would be to secure the connection
across the noncriminal justice network according to CJIS Security Policy, for example,
by using a virtual private network (VPN) “tunnel” between the agencies.
31 Part III: Exploring the Technologies
Wireless data networks are given special treatment by the policy due to the ease by
which RF signals can be intercepted. While encryption and security requirements
Wireless data are significant and must be observed on wireless networks of affected agencies,
networks are given the practical effect of the policy on interagency data communications is the same,
special treatment whether wired or wireless. This is because the interconnection of two wireless
by the CJIS
networks operated under the policy is handled just like the example above. Similarly,
Security Policy.
a single wireless network shared by multiple agencies, some CJIS users and some not
(e.g., by police, fire, and EMS), must have its CJIS traffic encrypted and authenticated
just as it would have to be over the Internet or other common-use network—say
through the use of a VPN.
Securing The process of operating interagency data networks brings challenges due, in large
interagency data part, to the added coordination needed between agencies for common management
networks is more of encryption and advanced authentication. It’s simply harder for multiple agencies to
of a management coordinate management of the complex technologies, sharing control and authority.
than a technical This is true in any multiagency security process; it’s not a unique effect of the CJIS
challenge.
Security Policy.
***
If information sharing is the product of interoperability, then FBI CJIS Division
systems are a cornerstone of the process. From a data communications standpoint,
the common need of criminal justice agencies nationwide to uphold the CJIS
Security Policy means its provisions are a de facto standard. The FBI’s longstanding
Advisory Policy Board (APB) guides policy, assuring it meets federal, state, and local
security requirements.
Fortunately, the CJIS Security Policy is maintained and managed in part to provide
this very coordination.
Advanced authentication techniques are generally used with VPNs. The techniques
assure that the VPN only gets connected for authenticated users. Typically, a
combination of a password and encryption certificate stored on the computer or
in a device that can be connected to the computer serve to prove that a legitimate
access attempt is being made. As with the VPN software, hardware configurations,
and system permissions, user authentication has to be managed to provide
interoperability across jointly connected data networks. The alternatives are
undesirable: Either no access or networks with big security holes in them.
n Firewalls
The device at each network border depicted in Figure 17-4 is a firewall. A firewall
is simply a device that sits at the junction point between two or more networks.
This diagram is a bit of a simplification because there is typically more networking
equipment, but recognize that the firewalls are the means to control traffic crossing
network borders.
Firewalls can
vary greatly in
complexity and The simplest firewall is a small computer with two network interfaces and software
cost. They also controlling what passes in which direction. Firewalls grow in complexity, up to
can provide an enterprise-grade devices that may have dozens of physical networks attached and
end point for vPn allow tens of thousands of individually encrypted VPN sessions.
connections.
And this brings us back to the point of interoperability. For purposes of interagency
communications, firewalls can be an impediment. Most assuredly, they are a basic
building block for secure data networks, but they can and do impede interagency
communications if not managed to provide the capability.
Before being activated, firewalls are loaded with rules defining what data may pass
Firewalls are in which direction. For security purposes, they are typically configured to deny
typically configured everything by default from the “untrusted” outside network to the “trusted” network
to deny all traffic inside. Akin to Mikey in a classic breakfast cereal commercial, they don’t like anything
passing from the
and refuse to pass it. One-by-one, specific rules are added to customize the firewall.
“untrusted” outside
network to the As may be imagined, the firewall has to be configured accordingly to provide the
“trusted” inside. needed interagency communications, in our case, without opening up the connected
networks to all forms of virulence and pestilence.
Chapter 17: Data Communications
319
Obviously, this takes coordination between network uses on either side, and a degree
of trust. It’s not uncommon for two secure networks to be connected with firewalls
back-to-back—one being managed by each of the agencies and likely sharing similar
security profiles and traffic rules (in reverse). While this may seem like a waste of a
good firewall, the fact of the matter is that it allows each party in the arrangement to
control its own border, just like nations do with their own physical borders.
Any network subsystem that has the potential to shut down communications has an
Security has to be interoperability dimension. Whether through the security of VPNs, firewalls, or other
carefully managed
subsystems, the intended communications can only proceed reliably if agency needs
to avoid it acting
as a barrier to
are clearly identified, articulated, and documented to assure the technology serves
interoperability. its purposes. Security doesn’t need to be compromised to allow agencies to share
information, but it has to be carefully managed to avoid it acting as a barrier.
On The Horizon
Rapidly developing technologies and standards mean that public safety agencies have
greater and greater data networking capabilities to look forward to. The most exciting
developments (and interest) has been in wireless networking.
94
For further information, see http://www.ieee802.org/16/.
320 Part III: Exploring the Technologies
The first WimAx The first WMAN standards released defined how fixed points are linked together
standard is for with compliant technology. Others in the series that are under development provide
fixed point-to-point definition for mobile uses, particularly intending to overcome Wi-Fi limitations.
wireless networks.
In 2001, the WiMAX Forum was created by interested industry parties to bring
common implementations of the diverse set of options within 802.16 standards,
commonly known today as WiMAX.95
WlAns in the In practice, 802.11a-based WLANs require much more infrastructure, such as wireless
4.9 GHz band access points, than do 802.11b/g ones. This is due to the transmission characteristics
will require more of the different frequency bands used—5.8 versus 2.4 GHz.
access points for
the same coverage
How much of a difference in coverage is there? Studies show that the lower frequency
as 802.11b Wi-Fi
networks.
signals are 100 to 1,000 times stronger in foliage, 10 to 100 times stronger through
common building materials, and 5 to 10 times stronger filling in gaps in the open
95
The WiMAX Forum is a nonprofit association formed by manufacturers to ensure
interoperability of IEEE 802.16-compliant equipment and networks. See
http://www.wimaxforum.org.
96
For further information on the FCC’s actions, see “Public Safety’s New Allocation – Answering
Users’ Questions on the 4.9 Gigahertz Band,” available from SAFECOM at http://www.
safecomprogram.gov/SAFECOM/library/spectrum/1088_publicsafetys.htm.
Chapter 17: Data Communications
321
beyond the line-of-site of transmitters.97 Optimistic estimates are that twice as
many access points are needed at the higher frequencies to provide the same level of
coverage, while less optimistic ones suggest 5 to 10 times as many are needed
Public safety agencies will build jurisdiction area networks (JANs) in the 4.9 GHz
band using mesh and other networking topologies, but it’s likely the technology will
be used mostly for campus and incident area networks in the near term.
Tests have shown the potential of high-speed technologies built specifically for public
The TIA-902
standard has been
safety use. Technologies used in a 2001 experimental pilot conducted by Pinellas
recommended for County, Florida yielded raw data rates pushing 460 Kbps in 150 kHz channels.100
adoption by the Following these tests, the Telecommunications Industry Association (TIA) published
FCC for use on the TIA-902, a standard since recommended to the FCC by its Public Safety National
700 mHz wideband Coordination Committee (NCC) and the National Public Safety Telecommunications
interoperability Council (NPSTC).
channels.
At the time of this writing (late 2005), FCC action on recommended standards
for wideband use of 700 MHz channels was pending and considered imminent.
A decision was anxiously awaited because FCC rules prevent licensing and use of
wideband interoperability channels until it has adopted a standard for their use.
97
Dobkin, Daniel M., RF Engineering for Wireless Networks: Hardware, Antennas, and Propagation
(Burlington, MA: Newnes, 2004).
98
47 CFR Chapter I, § 90.533(c).
99
The FCC maintains a web page addressing public safety 700 MHz public safety spectrum and the
regional planning process. See http://wireless.fcc.gov/publicsafety/700MHz/.
100
See the Public Safety Wireless Network report available from SAFECOM, http://www.
safecomprogram.gov/SAFECOM/library/technology/1033_GreenhouseProject.htm.
322 Part III: Exploring the Technologies
Project MESA
Project MESA, also known as the Public Safety Partnership, began as another in the
Association of Public-Safety Communications Officials – International, Inc.’s (APCO)
respected series of projects shaping the world of public safety communications.
As Project 25 proceeded to define the standard for public safety digital voice
Project mESA
communications, an ambitious project to do the same for data began life as APCO
seeks to address Project 34 in 1995. Interest in the effort grew, eventually becoming international in
both operability scope. During a series of meetings in Mesa, Arizona it was adopted as a joint project
and interoperability of the North American-based TIA and the European Telecommunications Standards
aspects of Institute (ETSI). It has been known as Project MESA since.101
broadband wireless
data for public
Project MESA seeks to address both operability and interoperability aspects of
safety.
broadband wireless data for public safety. That is, much like Project 25, resultant
standards will affect communications within and between agencies. It will most likely
not result in the production of new types of electronics and low-level engineering
protocols as did P25.
Where public safety makes up a sizeable share of the two-way wireless voice world, its
use of wireless data is increasingly insubstantial as a share of the total. Public safety
agencies will increasingly use more generalized commercial technologies for wireless
data networking due to relatively gigantic leaps in capabilities being made available
and dramatically dropping costs of equipment sold in great volumes. Broadband
public safety networks will be built of generally commercialized electronics,
customized at high network protocol layers for its unique needs.
Project MESA will most likely provide standard implementation profiles for public
safety use of commercially available broadband wireless technology, much as the Wi-
Fi Alliance and WiMAX Forum serve, rather than technology standards.
101
See http://www.projectmesa.org.
Chapter 17: Data Communications
323
Standards: A Necessary, But Insufficient Condition
Late into this Guide, it probably comes as no surprise that we’re advocates
of standards for everything from training to technology. The wireless
communications world has demonstrated particularly well how standards—
particularly complex technological standards—are the first step toward
rich technical interoperability. However, we’ve learned with Project 25, as well as the broader
standards provide world has learned through WLAN implementations, that the plethora of options
enough options available under reasonable standards leads to divergent implementations of the
that divergent technologies—and a lack of interoperability.
implementations
can preclude
The Wi-Fi Alliance and WiMAX Forum previously mentioned were formed expressly
interoperability.
to bring interoperability for implementations of IEEE 802.11 and 802.16 standard
technologies, respectively. Early WLAN products operating well within IEEE 802.11
standards were not interoperable between manufacturers.
The WLAN market didn’t take off until the Wi-Fi Alliance created a “meta-standard”
Wireless lAns
narrowing the range of implementation options for 802.11 technologies and a process
didn’t take off until
a subset of 802.11 to certify Wi-Fi compatible products. As expected, this process brought critical mass
standards was to the market. Today, Wi-Fi, with all its compromises that reduce options across a
settled on. well-considered standard, is being used around the world from coffee shop hotspots
to public safety mesh networks.
In the public safety arena, debate continues in the digital voice realm about which
P25 (TIA/EIA-102) elements of the broad set of standards known as P25 (TIA/EIA-102) must be
is a rich set of implemented for interoperability. And because P25 is frequency-band agnostic, even
standards that can use of its fundamental standard—the Common Air Interface—doesn’t guarantee that
be interpreted and
implemented in
radios can talk to each other if they’re operating in different bands. We expect similar
different ways. interoperability questions to be raised in implementation of TIA-902 wideband
standards for public safety data communications. Development of conformance tests
is key to the practical use of both voice and data standards.
This important debate can’t be done adequate justice here, but suffice it to say that
broad standards alone are not sufficient to guarantee interoperability in the technical
realm. Further implementation standards are inevitable.
32
Epilogue
Through wired and wireless networks, carrying voice and data, communications
interoperability is built as a complex system of systems. While technology is an
inescapable piece of the interoperability puzzle, it alone cannot solve the problem, for
it will be forever impossible to build a complete system without human management,
operations, and procedural subsystems being integrated far in advance.
SEARCH has been privileged to work with agencies large and small across the
country under U.S. Departments of Justice and Homeland Security programs that
provide assistance to improve interagency communications among first responders.
We’ve seen great need for resources—human, financial, and technological—to solve
this puzzle, but we’ve also seen growing cooperation among responders from all
disciplines and levels of government.
Our intention in creating this Communications Interoperability Tech Guide was to share
best practices in project planning, procurement, and implementation, as we’ve come
to understand them through agencies making a difference in their own jurisdictions.
We’re confident that the best practices in this Guide will improve the odds of your
project’s success.
And, if you need help along the way, we’ll be there to support you with technical
assistance resources.
Appendix A:
Sample
Agreements
These sample agreements are provided here courtesy of
n The north Central Texas Council of Governments
n The los Angeles (California) regional Tactical
Communications System
n The new Orleans (louisiana) maritime
Intercommunications Committee
Appendix A:
Sample Agreements
Whereas, the Agencies all utilize, and/or plan to utilize, trunked radio systems using
technology from a common equipment manufacturer, and/or plan to implement specialized
3rd party equipment designed to provide interoperability between systems from different
manufacturers,
Whereas, each of the Agencies desires to improve the quality and timeliness of inter-
agency communications during mutual aid operations,
Whereas, each of the Agencies desires to provide other Agencies with direct access to
their individual trunked public safety radio system, for the express purpose of cooperation
and coordination with neighboring law enforcement agencies,
4. Direct access is reserved for emergency, priority or other incidents where its use creates a
significant advantage to public safety, including felony pursuits, officer needs emergency
assistance, lookouts for incidents near political boundaries, perimeter search operations,
task force operations, and mutual aid fire scenes. Direct access may also be used to provide
communications for pre-arranged activities, such as funeral escorts or parades through two or
more jurisdictions.
5. Direct access during “priority” or “emergency” incidents is encouraged. The Agencies are
encouraged to develop guidelines that permit field users to directly access neighboring
trunked systems in a timely manner by notifying their dispatcher prior to switching.
Telephone coordination between dispatch centers is not necessary.
6. In cases where two Agencies share a common border, it is recommended that the Agencies
share the appropriate “dispatch” and “primary tactical” talkgroup used in the adjacent
jurisdictions and/or “districts”, “patrol areas” or “beats”.
7. Plain English shall be used for all mutual aid communications. “10codes”, “signals”, jargon,
and slang phrases shall not be used.
8. Field units shall identify themselves by stating their agency name and unit designator.
Examples:
“DFW Airport unit 131”
“Arlington Unit Three Forty Four”
“Fort Worth Three Adam Eighty One”
“Grand Prairie Unit 367”
“Collin County unit Three Ten Baker”
“Grapevine Baker 211”
“Carrollton Unit One Twenty Four”
9. When communicating with field units from neighboring jurisdictions, dispatch center
personnel shall identify themselves by stating their agency name.
10. In the case of “short term”, “priority”, “emergency”, and “notification” communications, once
the need to communicate directly with a neighboring jurisdiction has been established, the
field user shall inform their home dispatcher of their intention to switch, and only make the
switch after dispatcher acknowledgement and clearance. If possible, the field user shall leave
a radio on their home channel, in case their dispatcher or other units need to establish contact
with them.
11. When calling a neighboring jurisdiction, the field user shall state their unit identification as
described above, the word “to”, and the name of the agency that they are calling. The field
user shall then wait for the dispatcher to respond before giving any additional information.
Example:
“Arlington Three Adam Eighty One to City of Ft. Worth.”
Sample Agreements
329
12. Provided that the channel is not currently in use, the neighboring jurisdiction’s dispatcher
should respond immediately. If the channel is in use, the dispatcher will ask that the calling
user stand by. Example:
“City of Ft. Worth to Arlington Three Adam Eighty One, go ahead.”
13. After their call is acknowledged, the calling user shall state the reason that they are calling and
what, if any action the neighboring agency needs to take. Example:
“We have a bank robbery that just occurred in Arlington on I-20 just east of the city line.
The direction of travel was westbound on I-20 into Ft. Worth. I have lookout information
when you are ready to copy.”
“I am on the scene of an accident with injury that just occurred on I-30, just west of
border between Arlington and Ft. Worth. I need one of your units to respond to this
location, and start rescue for one patient with minor injuries.”
14. Once initial contact has been established and the reason given for the call, the communication
shall proceed in a normal fashion until complete. Before returning to their home radio
system and channel, the calling user shall state their unit designator and inform the neighbor
dispatcher that they are switching back to their normal channel. Example:
“Arlington Three Adam Eighty One, I have no further traffic. I am switching back to
Arlington PD Channel 1.”
15. In the case of “long term” and “static” events where mutual aid assistance is requested by
an Agency of another Agency, a supervisor shall contact the neighboring Agency or cause
the neighboring Agency to be contacted, and a formal request shall be made for mutual aid
assistance in accordance with existing mutual aid agreements. If approved, the assisting
Agency shall be provided with the specific type of assistance required (K-9, helicopter,
ambulance, etc.) by the requesting Agency. The assisting Agency shall be provided with
the talkgroup or channel where communications for the mutual aid operation are being
conducted by the requesting Agency. The assisting agency shall determine appropriate unit(s)
to respond to the mutual aid event, and provide the above information to the responding
unit(s) at time of dispatch. Once all information is received, the responding unit(s) shall
switch to the designated talkgroup on the requesting Agency’s trunked radio system and
initiate contact as outlined in Paragraphs 10-13 above.
16. Complaints of abuse or unauthorized operation by users from neighboring jurisdictions are
encouraged to be resolved at the field supervisor level as soon as possible after an alleged
problem occurs. If the complaint cannot be resolved at this level or if the severity warrants,
a complaint in writing can be made to the jurisdiction involved. Written complaints shall
include the date and time of the offense, the nature of the complaint, the six-digit radio
identification number, the name of the person who witnessed the offense, and, if available,
any audio recording of the offense. Complaints of abuse or unauthorized operation shall
be resolved using established internal procedures, and a written response detailing the
action taken shall be sent to the complaining Agency within 30 working days of the initial
complaint.
330 Appendix A
17. New law enforcement or Fire/EMS agencies may be added by amendment to this
Memorandum from time to time, subject to the approval of the Agencies.
18. Nothing in this Memorandum shall be construed as to prohibit any individual Agency from
entering into mutual aid communications agreements with separate law enforcement or fire/
EMS entities not included in this Memorandum. Under no circumstances shall any Agency
disseminate another Agency’s programming parameters to any third party without express
written approval from the other Agency.
19. Each Agency shall assume full responsibility for all costs associated with programming their
radios for direct access.
20. During times of law enforcement or fire mutual aid operation, each Agency shall make
every reasonable effort to provide the same level of communications support to units from
neighboring Agencies as they would to their own units.
21. Each Agency shall designate a representative to serve on a NCTCOG Mutual Aid
Communications Committee. On an annual basis, the chair of this committee will be rotated
through all member agencies, by alphabetical order. These representatives shall meet on a
quarterly basis, or more frequently as required, to identify and resolve any issues that arise
during mutual aid or direct access. In the event that an Agency’s representative is no longer
available due to reassignment, the Agency shall appoint a new representative and inform the
committee Chairperson in writing.
Sample Agreements
331
Los Angeles Regional
Tactical Communications System
Memorandum of Understanding
This Memorandum of Understanding (MOU) between participating Local, State, Federal, and
Military agencies, and the Los Angeles Regional Tactical Communications System Executive
Committee, establishes policy and procedures for the activation, use, and deactivation of an
interoperability communication system. This system will be known as the Regional Tactical
Communications System (LARTCS).
PURPOSE
The purpose of the LARTCS is to allow direct voice communication between participating
agencies in dealing with both short term (felony pursuits, fires, hazmat, etc.) and long term
incidents (major disaster, large scale fires and floods, civil disturbances, terrorist incidents,
etc.). The LARTCS cross-connects different radio channels over various radio frequency
bands, throughout the Los Angeles region. This will enhance the safety of participating
agencies through real time, field unit-to-unit, direct voice communication interoperability.
SCOPE
A “participating agency” shall be defined as any local, state, federal, or military agency that
has read, agreed, signed, and will abide by this MOU.
POLICY
A. Any supervisor of a participating agency may request the activation of the LARTCS.
These personnel shall be held accountable for radio discipline by their respective
agencies.
B. Each communications center will assign the appropriate access channel for their agency
that will be linked to the LARTCS. For agencies participating in specific incidents, each
affected communications center shall monitor the LARTCS to ensure requested resources
are provided, as well as compliance with this agreement and other policies.
These priorities conform to the State Office of Emergency Services (OES) CLEMARS mutual
aid plan. Priority 4 level communications (single agency secondary communications) are not
covered by this MOU, and are not to be used on the LARTCS.
H. A request to participate in the LARTCS is not a request to transfer responsibility of an
incident.
I. The LARTCS could be used for Homeland Security or other related incidents. It shall be the
policy of the LARTCS for the participants not to release the radio frequencies, CTCSS/CDCSS
codes, channel plan, and other information related to the system. No system information
shall be released to the media or other entities, public or private. Exception: anyone involved
with the direct maintenance or repair of the participating agency’s radio equipment. This
information shall be provided to service technicians on a “need to know” basis only. Failure to
safeguard the LARTCS information may be cause for suspension or cancellation of this MOU
with the offending agency.
Los Angeles Regional Tactical Communications System Memorandum of Understanding
10/28/2004
Sample Agreements
333
PROCEDURES
As previously stated in this document, the LARTCS is intended for use when immediate
information will enhance the safety or effectiveness of personnel dealing with an incident. It is not
to be used to deliver mundane information. The LARTCS may be requested, if needed, to allow
voice communications between each agency’s command personnel dealing with the incident.
Specific procedures will be defined in the LARTCS Operations Manual.
MAINTENANCE
Each participating agency is responsible for the maintenance of the involved hardware and
software for their agency. All participating agencies shall be responsible for their own connection
maintenance costs, if any. The Los Angeles County Sheriff ’s Communications Bureau shall
maintain the infrastructure of the LARTCS.
It is understood that radio reprogramming and maintenance will be required on an ongoing basis,
and system configuration changes will occur as the system grows. Participating agencies agree to
promptly reprogram their radio equipment as necessary, in order to maintain continuity of the
system.
For uniformity of identification in radio displays, radio frequencies in each band will be labeled as
specified in the LARTCS Operations Manual.
CONTROL
A. There is an Executive Committee representing all participating agencies.
B. The Commander of the Los Angeles County Sheriff ’s Department, Communications and
Fleet Management Bureau, will assume the duties of System Coordinator for the LARTCS.
The System Coordinator will coordinate and maintain copies of original Memorandums
of Understanding for this system and the associated communications agreements for the
LARTCS. The System Coordinator can be reached at Communications and Fleet Management
Bureau, 1277 North Eastern Avenue, Los Angeles 90063. (323) 267-2501.
C. The System Coordinator will forward any complaints, concerns, or proposed changes to the
Executive Committee, for review and appropriate action.
REVISIONS
This MOU may be revised or amended at any time by mutual agreement of participating agencies.
Any participating agency may terminate their participation by giving written notice to the
System Coordinator. The System Coordinator will notify all other participating agencies of the
withdrawal.
DESIGNEE SIGNATURE
Rev. 8/24/03
Controlling a) NOMIC shall act as the sole controlling authority for the program and provide
authority
updated information to all agency participants as changes dictate. Furthermore
the committee shall coordinate necessary upgrades or repairs with each
participating agency.
b) The New Orleans Fire Department communications facility shall house the
ACU-1000 audio matrix switch and act as the primary Network Control Station
(NECOS) executing requested patches as necessary.
c) Where situations preclude the primary NECOS from performing requested
functions, U.S. Coast Guard Group New Orleans shall act as secondary
NECOS.
Operational Guidelines
Operational Operational notification to the NOMIC is required for the following situations
Notification
involving communications equipment.
♦Modifications
♦Removal
♦Installations
♦Changes in capabilities
•Changing frequencies
•Other modifications which would alter the mode or method on which
the equipment was designed to operate.
Communications Equipment Includes (And Not limited To)
♦ACU-1000 Switch or equipment
♦Transmitters
♦Receivers
♦Transceivers
♦Telephones (both land line and cellular)
♦Other telecommunications equipment
♦Antennas and Cables
♦Accessories
Sample Agreements
33
Operational Guidelines
Equipment
Failure Any agency detecting equipment failures, whether their own or another agency,
must notify the primary and secondary NECOS points of contacts via voice and
e-mail at the addresses provided in the POC enclosure to this document.
Step Action
1 Identify the failure
2 Notify NECOS units
3 Your Agency: Notify your appropriate maintenance entity
Other Agency: Notify point of contact per POC enclosure
4 Notify NECOS units of repair personnel & arrival time for access
and possible estimate time of repair (ETR).
Testing &
Training The NOMIC shall coordinate all testing and training. Individual agency training
is encouraged but the NOMIC members should be notified in advance of non-
scheduled training between agencies.
Testing and training should be coordinated and scheduled by the NOMIC for all
participating agencies.
Testing and training will be scheduled during the last week of each month.
OPERATIONAL COMMUNICATIONS
Guidelines
a) NECOS shall never be requested to coordinate between the requesting and
receiving agencies.
b) A single agency’s participation on multiple patched circuits can only be
accomplished by having more than one radio attached to the ACU-1000 audio
matrix switch. Since all participating agencies only have one radio attached,
any agency can only participate in one interoperability patch at a time.
3 DRAFT
33 Appendix A
Operational Guidelines
Voice Call Agencies will always identify themselves by agency name and number.
Signs
Communications personnel shall provide mobile units with appropriate call
signs of other government agency units as obtained from other communications
watch personnel.
In example: NOPD vehicle 728 has requested communications with FBI 455.
NOPD will coordinate through FBI Comm. Center and request NOPD 728 to
call “FBI 455” on the designated working frequency.
Acronyms &
brevity codes To reduce confusion or misinterpretations between agencies, the use of
agency specific acronyms and brevity codes should not be used. Common
acronyms are acceptable if it is reasonably sure definitions are universal from
agency to agency (i.e. roger for yes or affirmative). Use clear text when
possible.
System
Purpose “Official Use Only” Special incidents. Not to be used as a “talk channel”.
ACU-1000 The audio switch used to allow interoperability between agencies with
disparate radio systems.
Incident
Commander (I/C) The individual directly responsible for command and control of any given
incident.
NOMIC Patch: The joining of one agency’s radio system to another agency’s radio system,
using the ACU-1000.
Requesting
Agent The individual(s) or agency requesting to have their communications channel
added to an in-progress incidents communications path.
Request for
NOMIC Patch: This is made by individual or agency wishing to be added into the
communications. The request is made to the incident commander.
Authority to
Patch: Authority to add any agency to an existing incident communications is granted
to the Incident Commander.
Sample Agreements
339
Standard Operating Procedure
Request for Once an agent or agency has been relieved and no longer wishes to be part of
Release the Incident Communications Path, the agent or agency will notify NECOS to
remove his/her agency from the patch.
Contact
Person to The I/C shall contact the NECOS to authorize NOMIC patches. The I/C has the
Initiate a authority to request that any agency be removed from a particular Incident
Patch: Communications Path.
Authority of an The I/C is the individual directly responsible for command and control of any
Incident given incident. The I/C will authorize any interoperability patches as needed to
effectively command and control a given incident.
Request for The agency requesting to be patched into an ongoing incident should contact
Inclusion into the I/C for authorization. The I/C should be contacted by contacting the I/C’s
a Patch communications center. The I/C should send his request through his
communications center. The requesting agency shall notify their dispatch of the
intended patch and obtain clearance from their agency for the patch.
Contact Point
for NECOS The contact point to establish patches within the New Orleans area is NECOS.
**REFER TO POC DOCUMENT FOR NAMES AND NUMBERS** A log will be
kept, with the following: Date, Time, and Agencies on a given patch, and I/C’s
name and agency.
Release from
a NOMIC The agency requiring release from the NOMIC patch should contact the
Patch NECOS upon conclusion of that agency’s participation in the incident. The I/C
may elect to disengage any agency he deems appropriate during the incident.
NECOS will log who requested the release and the date and time of the
release. Any agency participating in a patch may choose at any time to stop
participating in a patch without any additional authority. If a participating
agency wants to be released from a patch, the agency should notify the I/C.
Pre-planning
of likely Any agency participating in the MOU can request a pre-plan of a likely incident.
Incidents This agency should identify who the agency would like to be able to
communicate with during a given incident and those patches can be preset.
The preplanned patches would then be authorized by the I/C of an incident.
Each agency in the preplan would authorize his agency’s participation.
Appendix B:
SOP Example
Appendix B:
SOP Example
Courtesy of the Metropolitan Emergency Services Board, St. Paul, Minnesota.
http://www.metro9-1-1board-mn.org
INTERIM INTERIM
1. Purpose or Objective:
Establish procedures for use of patched regional 800 MHz to Metro Emergency UHF (MET-
EMRG-UHF) channel interoperability radio facilities for interagency communications when
coordination is required between law enforcement users of UHF radio systems and law
enforcement users of the regional 800 MHz trunked radio system.
2. Technical Background:
Capabilities
A UHF radio system covering the City of St. Paul, the University of Minnesota and Minneapolis-St.
Paul International Airport is available for use by personnel of government entities using UHF radio
systems that need interagency communications to coordinate activity with personnel of entities that
use the new regional 800 MHz trunked radio system. This UHF interoperability radio system
includes an UHF infrastructure on the State of Minnesota Metro Emergency UHF radio channel that
can be hard patched to a regional 800 MHz trunked radio system talk group.
Constraints
One regional 800 MHz talk group can only be in one patch.
3. Operational Context:
The patch between the Metro Emergency UHF channel and the corresponding regional
800 MHz radio system talk group should only be used when there is a significant need for
communications to support coordinated activities between personnel of entities that are on UHF
radio systems and personnel of entities that are users of the regional 800 MHz radio system.
The Metro Emergency channel and the associated patched regional 800 MHz talk group may be
used for short-term high intensity events, and for long-term extraordinary events.
INTERIM INTERIM
The Metro Emergency UHF channel patched to a regional 800 MHz talk group should be used
only if other suitable means for interagency communicating are unavailable or if the other
available means for coordination communications are insufficient for the needs. Other means
may include use of radio to radio cross band repeaters (See Interoperability Guidelines
Subsection 3.3c) between tactical channels at the scene, and radio console soft patching of a
preauthorized agency UHF tactical channel to a RF control station on a talk group on the
regional 800 MHz radio system (See Interoperability Guidelines Subsection 3.3b).
The regional 800 MHz METEMERG talk group shall not be part of any multi-group.
No personnel in any dispatch center shall soft patch the UHF metro emergency channel to a RF
control station on a regional 800 MHz trunked talk group (See Section 3.3b RF Control Stations
and Portables).
It is recommended that the regional 800 MHz METEMERG talk group be included in scan lists
of all law enforcement radios on the regional 800 MHz radio system.
The METEMERG talk group on the regional 800 MHz radio system shall be recorded (See
Section 3.1h).
5. Recommended Procedure:
Most of the time, an event that requires interagency coordination will begin on a main dispatch radio
channel of one of the public safety dispatch centers. When it becomes apparent that interagency
coordination of law enforcement agencies will be needed (and possibly fire and EMS), and
coordinating participants are on UHF and on the regional 800 MHz systems, a dispatch center
operator should advise the UHF radio users to switch to the Metro Emergency UHF channel.
Dispatch center operator support, and the decision to use the Metro Emergency UHF channel patch
to the METEMERG talk group, shall be performed by a dispatch center operator in the center
responsible for the agency that started the event.
6. Management:
The dispatch center managers for agencies on the regional 800 MHz radio system shall insure
that there is a procedure for use of the Metro Emergency UHF channel to METEMERG talk
group patch in the dispatch center for which they are responsible.
Dispatch center operators shall receive initial and continuing training on the use of this
procedure.
Responsibility for monitoring performance and for modifying this procedure shall be a function
of the Technical Operations Committee of the Metropolitan Emergency Services Board.
The development of and the management of statewide rules for use of the Metro Emergency
UHF radio channel shall continue to be the responsibility of the Metro Emergency Channel
Users Committee. All users of the Metro Emergency Channel and the regional 800 MHz radio
system METEMERG talk group shall comply with the Metro Emergency Channel operation
rules; and with the MINSEF rules when the Metro Emergency channel is patched to the
MINSEF VHF frequency.
The National Wildfire Coordinating Group (NWCG) has created task books formalizing
responsibilities of Incident Command System (ICS) positions. Though NWCG task books
serve to prepare individuals for roles during wildfire response, they also define responsibilities
applicable to ICS-oriented response more generally. They provide the most comprehensive
list of duties available at this time for describing communications responsibilities during
weapons of mass destruction incidents. Included below are those specific to these
communications functions.1
1
The following has been adapted from current editions of National Wildfire Coordinating Group task books.
Available at http://www.nwcg.gov/pms/taskbook/logistics/logistic.htm.
30 Appendix C
leadership
Decision-making Groups
Governance Agreements
Interoperability Funding
Strategic Planning
Policy, Practices, and Procedures
Standard Operating Procedures
Command and Control
Approaches
Technology Implementation
maintenance and Support
Operator Training
Training and Exercises
Exercises
Usage Frequency of Use and Familiarity
The process presents one or more questions about the element with sample
response statements corresponding to early, moderate, full, and advanced stages
of development. It further asks respondents to indicate the stage of development
across disciplines, political entities, and levels of government, as appropriate.
30 Appendix D
In completing the assessment, consider all three aspects and answer each question for
the predominating influence. For example, if regular, National Incident Management
System NIMS-based exercises are planned and conducted with full participation
across disciplines, but not between jurisdictions, choose a stage of development best
reflecting the impact of that aspect. Use the scorecard below while stepping through
each of the subelement descriptions to record choices in one spot.
Chapter 15, Measuring Interoperability, provides further suggestions for using the
Self-Assessment Scorecard.
Stage of Development
Element Subelement Early moderate Full Advanced
leadership
Decision-making
Groups
Governance Agreements
Interoperability
Funding
Strategic Planning
Policy, Practices,
Standard and Procedures
Operating
Procedures Command and
Control
Approaches
Implementation
Technology
maintenance and
Support
Self-Assessment Scorecard
Interoperability Self-Assessment Scorecard
31
Governance: Leadership
Consider the questions to the left
Public Safety Leadership and how this measure varies across
How would you best describe the fiscal and organizations, then choose one of
political support that public safety leaders provide these stages of development
to improve your organization’s interoperability?
- The leadership within your public safety Early Development
organization may understand the importance Government leaders are
of interoperability and its role, but has not yet aware of interoperability
taken any political or fiscal action needs to support
- The leadership within your public safety protection of citizens and
safety of first responders
organization has begun to seek political or
fiscal support for interoperability
- The leadership within your public safety Moderate Development
organization pursues multiple avenues of
political and fiscal support for interoperability Government leaders
and makes it an organization priority understand the importance
of interoperability and
- The leadership within your public safety provide some political and
organization has successfully ingrained fiscal support
interoperability as an organizational value
such that future leaders are expected to be
champions for interoperability support Full Development
Government leaders
demonstrate that
Political Leadership interoperability is a
How would you best describe the fiscal and political and fiscal priority
political influence that political leaders have and begin to coordinate
across jurisdictions
on the progress of public safety organizations’
interoperability?
- Political leader(s) have not yet provided Advanced Development
political or fiscal support for interoperability
Government leaders
- Political leader(s) have begun to provide serve as interoperability
political support (e.g., attending discussions advocates and act to
and/or summits on interoperability, including ensure long-term political
it on the platform) or fiscal support and fiscal support
- Political leader(s) have demonstrated that
interoperability is a political and fiscal priority
by taking concrete actions (e.g., establishing
funding mechanisms, regional or statewide
planning efforts) to improve interoperability
- Political leader(s) act to ensure that
interoperability remains a priority across
future administrations (e.g., legislation,
dedicated appropriations)
32 Appendix D
Full Development
All necessary agreements
(e.g., mOU/mOA/mAA,
Ordinance, Executive
Order, IGA, and
legislation) in place to
address multi-organization
communications
Advanced Development
Institutionalized processes
to develop and review
agreements at least
every 3-5 years and after
significant events and
upgrades
3 Appendix D
Full Development
Funding for Operating Costs Acquisition of long
How would you best describe how well your term funding for
funding meets needs for operating costs that multi-organization
support interoperability? communications
Full Development
Formal strategic plan in
place and accepted by all
participating stakeholders
Advanced Development
Institutionalized processes
to review strategic plans
on an annual basis and
after significant events or
upgrades
3 Appendix D
Advanced Development
Annual review of
command and control
policies to assure
continued compliance with
nImS and evaluation of
command and control after
significant events
3 Appendix D
Technology: Approaches
Consider the questions to the left
Approaches and how this measure varies across
How would you best describe the solutions first organizations, then choose one of
responders employ for interoperability? these stages of development
- Portable, mobile, or temporary solutions
developed in the field by first responders Early Development
using resources/equipment on hand (e.g., Implementation of
radio swaps) portable, mobile, or
- Planned solution(s) are readily deployable, temporary solutions (ad
but do not employ mutually accepted hoc or COTS)
equipment standards (e.g., communications
vehicle)
- Permanent infrastructure-based solution(s) Moderate Development
using mutually accepted equipment
standards (e.g., shared system) Communications
requirements exceed ad
- Continuous technical improvements are hoc capabilities, steps
planned that will develop networks that are being taken toward
completely transparent to responders permanent solutions
Full Development
Permanent infrastructure-
based solutions using
mutually accepted
standards
Advanced Development
Strategic, coordinated
communications plans in
place to guide technical
improvements that lead to
seamless networks
Interoperability Self-Assessment Scorecard
39
Technology: Implementation
Consider the questions to the left
Implementation and how this measure varies across
How would you best describe the methods used by organizations, then choose one of
first responders to achieve interoperability? these stages of development
- no consistent approach to solutions; first
responders must improvise a solution Early Development
- Planned solution(s) require human Ad hoc solutions
intervention by someone other than first
responders (e.g., must get patch through
dispatcher)
- Solution(s) available to all first responders as
authorized, without any intervention
- Piloting of advanced solution(s), Moderate Development
technologies, and processes
Planned solutions that
require human intervention
Full Development
Solutions available 24x7
without any intervention
Advanced Development
research and testing
of advanced solutions,
technologies, and
processes
30 Appendix D
Full Development
multiple organizations’
staff share maintenance
and equipment support
roles for jointly funded
infrastructure through
formal agreements
Advanced Development
near-term and long-term
system lifecycle planning
(e.g., planning, acquisition,
implementation) and
staffing
Interoperability Self-Assessment Scorecard
31
Training and Exercises: Operator Training
Consider the questions to the left
Training for Support Personnel and how this measure varies across
How would you best describe the nature of the organizations, then choose one of
education given to support personnel regarding these stages of development
interoperability?
- Support personnel (e.g., administrators, Early Development
dispatchers, maintenance personnel) may no formal training in
have some awareness of interoperability, and achieving interoperability
some may have received informal education
or training. Informal training has no lesson
plans, may be on-the-job, and provides no
assessment of student performance/change
of behavior
Moderate Development
- Some support personnel have received
formal interoperability training (uses a Some organizations
lesson plan in a classroom or OJT setting, train regularly in using
and includes an assessment of student equipment and applying
performance/change of behavior either at the policies, practices, and
procedures
time of training or shortly thereafter)
- Substantially all support personnel have
received formal interoperability training (as
defined above)
Full Development
- Organizations evaluate after-action reports,
along with the changing operational All necessary organizations
environment, to adapt future training to participate in planned,
address gaps and needs regular training using
equipment, policies,
practices, and procedures,
Training for Field Personnel command and control, and
nImS
How would you best describe the nature of the
education given to field personnel regarding
interoperability? Advanced Development
- Field personnel (e.g., law enforcement Organizations evaluate
officers, firefighters, EmTs) may have some training after-action
awareness of interoperability, and some may reports and the changing
have received informal education or training. operational environment
Informal training has no lesson plans, may be to adapt future training to
on-the-job, and provides no assessment of address gaps and needs
student performance/change of behavior
- Some field personnel have received formal
interoperability training (uses a lesson plan in a classroom or OJT setting, and includes an
assessment of student performance/change of behavior either at the time of training or shortly
thereafter)
- Substantially all field personnel have received formal interoperability training (as defined
above)
- Organizations evaluate after-action reports, along with the changing operational environment,
to adapt future training to address gaps and needs
32 Appendix D
Advanced Development
Organizations evaluate
after-action reports from
the exercises and the
changing operational
environment to adapt
exercises to address gaps
and operational needs
Interoperability Self-Assessment Scorecard
33
Usage: Frequency of Use and Familiarity
Consider the questions to the left
Frequency of Use and Familiarity and how this measure varies across
How would you best describe how frequently and organizations, then choose one of
easily your first responders use interoperability? these stages of development
- First responders seldom use interoperability
solutions, except for events that can be Early Development
planned ahead of time First responders seldom
- First responders use solutions regularly for use solutions unless
emergency events and to a limited extent for advanced planning is
day-to-day communications possible (e.g., special
event)
- First responders use solutions regularly
and easily for all day-to-day, task force, and
mutual aid events Moderate Development
- regular use of completely transparent
First responders use
solutions has expanded to all potentially solutions regularly for
involved responders emergency events, and in a
limited fashion for day-to
day communications
Full Development
First responders use
solutions regularly and
easily for all day-to-day,
task force, and mutual aid
events
Advanced Development
regular use of seamless
solutions has expanded to
include state, federal, and
private responders
Appendix E:
Bibliography
and
Resources
Appendix E:
Bibliography and Resources
ABI Research press release, “Mesh Network Market May See Tenfold Growth in Five Years,”
November 16, 2005. See http://www.abiresearch.com/abiprdisplay.jsp?pressid=556.
Arlington County, Virginia, After-Action Report on the Response to the September 11 Terrorist
Attack on the Pentagon, prepared by Titan Systems Corp. (Arlington, Virginia: no publication
date). See http://www.arlingtonva.us/departments/Fire/edu/about/docs/after_
report.pdf.
Cisco Systems, Inc., white paper, “Wireless LANS – Total Cost of Ownership,” 2004. See
http://www.cisco.com/application/pdf/en/us/guest/products/ps4076/c1244/
cdccont_0900aecd801bb7d4.pdf.
Dobkin, Daniel M., RF Engineering for Wireless Networks: Hardware, Antennas, and Propagation
(Burlington, Massachusetts: Newnes, 2004).
Erlanger, Leon, “Building the intelligent network,” InfoWorld, July 18, 2005. See
http://www.infoworld.com/reports/29SRintelnet.html.
Federal Communications Commission, 700 MHz Interoperability Spectrum web site. See
http://wireless.fcc.gov/publicsafety/700MHz/interop.html.
Global Justice Information Sharing Initiative Advisory Committee, “Charter,” October 15, 2002.
See http://it.ojp.gov/documents/GAC_Charter_2002.pdf.
Harris, Kelly J., and William H. Romesburg, Law Enforcement Tech Guide: How to plan, purchase and
manage technology (successfully!), A Guide for Executives, Managers and Technologists (Washington,
D.C.: U.S. Department of Justice Office of Community Oriented Policing Services, 2002). See
http://www.cops.usdoj.gov/default.asp?Item=512.
Institute for Policy Research, Northwestern University, Policing Smarter Through IT: Lessons in
Enterprise Implementation (Washington, D.C.: U.S. Department of Justice Office of Community
Oriented Policing Services, September 2004). See http://www.cops.usdoj.gov/default.
asp?Item=1331.
Institute for Security Technology Studies, Crisis Information Management Software (CIMS)
Interoperability: A Status Report (Hanover, New Hampshire: Dartmouth College, October 2004). See
http://www.ists.dartmouth.edu/TAG/cims1004.pdf.
McKinsey & Company, Improving NYPD Emergency Preparedness and Response, August 19, 2002. See
http://www.nyc.gov/html/nypd/pdf/nypdemergency.pdf.
McKinsey & Company, Increasing FDNY’s Preparedness, Executive Summary, August 19, 2002. See
http://www.nyc.gov/html/fdny/html/mck_report/toc.shtml.
Metropolitan Emergency Services Board, St. Paul, Minnesota, “800 MHz Trunked Regional Public
Safety Radio System Standards, Protocols, Procedures” (interim).
National Commission on Terrorist Attacks Upon the United States, The 9/11 Commission Report:
Final Report of the National Commission on Terrorist Attacks Upon the United States (Washington,
D.C.: U.S. Government Printing Office, July 2004). See http://www.9-11commission.gov.
Bibliography and Resources
39
National Emergency Number Association, NENA Master Glossary of 9-1-1 Terminology, NENA-01-
002 (Arlington, Virginia: November 29, 2005). See http://www.nena.org/9-1-1TechStandards/
Standards_PDF/Master%20Glossary11_29_05.pdf.
National Institute for Occupational Safety and Health (NIOSH), U.S. Department of Health and
Human Services, NIOSH Alert: Preventing Injuries and Death from Falls during Construction and
Maintenance of Telecommunication Towers, NIOSH Publication No. 2001-156 (Cincinnati, Ohio: July
2001). See http://www.cdc.gov/niosh/2001156.html.
National Task Force on Interoperability, Why Can’t We Talk? Working Together to Bridge the
Communications Gap to Save Lives, A Guide for Public Officials, February 2003. See
http://www.ojp.usdoj.gov/nij/topics/commtech/ntfi_guide.pdf.
Project Management Institute, A Guide to the Project Management Book of Knowledge, Third Edition
(Newtown Square, Pennsylvania: 2000).
Public Safety Wireless Advisory Committee, Final Report, presented to the Federal
Communications Commission and the National Telecommunications and Information
Administration, September 11, 1996. See http://pswac.ntia.doc.gov/pubsafe/publications/
PSWAC_AL.PDF.
Public Safety Wireless Network, LMR Replacement Cost Study Report, prepared by Booz, Allen &
Hamilton Inc., June 1998. See http://www.safecomprogram.gov/NR/rdonlyres/B69361FA-
9AC6-4126-B971-83DF30FED932/0/lmr_coststudy.pdf.
Public Safety Wireless Network, Public Safety Radio Spectrum: A Vital Resource for Saving Lives and
Protecting Property (no date). See http://www.safecomprogram.gov/SAFECOM/library/
spectrum/1102_publicsafety.htm.
Public Safety Wireless Network Program, Embedded Communications Broker (ECB) Technology, white
paper, October 2001. See http://permanent.access.gpo.gov/websites/safecomprogramgov/
www.safecomprogram.gov/admin/librarydocs9/jill_ecb.pdf.
Public Safety Wireless Network Program, Greenhouse Project Wideband Data Technology, white
paper, September 2001. See http://www.safecomprogram.gov/SAFECOM/library/
technology/1033_GreenhouseProject.htm.
30 Appendix E
Public Safety Wireless Network Program, Public Safety In-Building/In-Tunnel Ordinances and Their
Benefits to Interoperability Report, November 2002. See http://www.safecomprogram.gov/
SAFECOM/library/technology/1032_PublicSafety.htm.
Public Safety Wireless Network Program Management Office, PSWN Program Analysis of Fire and
EMS Communications Interoperability, prepared by Booz, Allen & Hamilton Inc., April 1999. See
http://permanent.access.gpo.gov/websites/safecomprogramgov/www.safecomprogram.
gov/admin/librarydocs9/fireems_interop_study.pdf.
Roberts, David J., Integration in the Context of Justice Information Systems: A Common Understanding
(Sacramento, California: SEARCH Group, Incorporated, updated 2004). See
http://www.search.org/files/pdf/Integration.pdf.
Roberts, David J., Law Enforcement Tech Guide for Creating Performance Measures that Work: A
Guide for Executives and Managers (publication pending by U.S. Department of Justice Office of
Community Oriented Policing Services, 2006).
Romesburg, William H., Law Enforcement Tech Guide for Small and Rural Police Agencies: A Guide
for Executives, Managers, and Technologists (Washington, D.C.: U.S. Department of Justice Office
of Community Oriented Policing Services, 2005). See http://www.search.org/files/pdf/
SmallRuralTechGuide.pdf.
Ross, Ron, et al., Recommended Security Controls for Federal Information Systems, NIST SP 800-
53 (Washington, D.C.: U.S. Department of Commerce, National Institute of Standards and
Technology, February 2005, including updates to June 17, 2005). See http://csrc.nist.gov/
publications/nistpubs/800-53/SP800-53.pdf.
Signorini, Eugene, 3G Represents an Inflection Point for Enterprise Mobility (Boston, Massachusetts:
Yankee Group Research, Inc., 2004).
South Carolina Budget and Control Board, Division of the State Chief Information Officer,
“Trunked 800 MHz System Interconnect Guidelines.” See http://www.cio.sc.gov/cioContent.
asp?pageID=772.
Stoneburner, Gary, Clark Hayden, and Alexis Feringa, Engineering Principles for Information
Technology Security (A Baseline for Achieving Security), NIST SP 800-27 (Washington, D.C.: U.S.
Department of Commerce, National Institute of Standards and Technology, June 2001). See
http://csrc.nist.gov/publications/nistpubs/800-27/sp800-27.pdf.
Bibliography and Resources
31
Swanson, Marianne, and Barbara Guttman, Generally Accepted Principles and Practices for Security
Information Technology Systems (Washington, D.C.: U.S. Department of Commerce, National
Institute of Standards and Technology, September 1996). See
http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf.
Taylor, Mary J., et al., State and Local Law Enforcement Wireless Communications and Interoperability:
A Quantitative Analysis, NCJ 168961 (Washington, D.C.: U.S. Department of Justice, Office of
Justice Programs, National Institute of Justice, January 1998). See
http://www.ncjrs.org/pdffiles1/168961.pdf.
U.S. Department of Homeland Security, National Incident Management System, March 1, 2004. See
http://www.fema.gov/pdf/nims/nims_doc_full.pdf.
U.S. Department of Homeland Security, Office of Grants and Training, “HSPD-8 Overview.” See
http://www.ojp.usdoj.gov/odp/assessments/hspd8.htm.
U.S. Department of Homeland Security, Office of State and Local Government Coordination
and Preparedness, Office for Domestic Preparedness, Fiscal Year 2005 Homeland Security Grant
Program: Program Guidelines and Application Kit, version 2 (Washington, D.C.: December 22,
2004). See http://www.ojp.usdoj.gov/odp/docs/fy05hsgp.pdf.
U.S. Department of Homeland Security, SAFECOM Program, Statement of Requirements for Public
Safety Wireless Communications and Interoperability (Washington, DC: Version 1.1, January 26,
2006). See http://www.safecomprogram.gov/SAFECOM/library/technology/1258_
statementof.htm.
U.S. Department of Justice, National Institute of Justice, “What’s New from CommTech.” See
http://www.ojp.usdoj.gov/nij/topics/commtech/.
Vandereau, John M., Delivered Audio Quality Measurements on Project 25 Land Mobile Radios,
NTIA Report 99-358 (Washington, D.C.: U.S. Department of Commerce, Institute for
Telecommunications Science, 1998). See http://www.its.bldrdoc.gov/pub/ntia-rpt/99-358/.
WebSite Optimization.com, “US Broadband Breaks 60% among Active Internet Users, but growth
slows,” September 2005. See http://www.websiteoptimization.com/bw/0509.
Additional Resources
800 MHz Transition Administrator. See http://www.800ta.org/.
Cover Pages (hosted by OASIS), Emergency Data Exchange Language (EDXL). See
http://xml.coverpages.org/edxl.html.
Federal Communications Commission (FCC), 700 MHz Public Safety Spectrum page. See
http://wireless.fcc.gov/publicsafety/700MHz/.
Global Justice XML Data Model (GJXDM) Introduction page. See http://it.ojp.gov/jxdm/.
Institute of Electrical and Electronics Engineers (IEEE) 802.11 series of standards. See
http://www.ieee802.org/11/.
Minnesota Department of Public Safety, Allied Radio Matrix for Emergency Response (ARMER).
See http://www.armer.state.mn.us/.
National Security Agency, Central Security Service, Information Assurance Directorate page on
TEMPEST. See http://www.nsa.gov/ia/government/index.cfm.
National Task Force on Interoperability, Supplemental Resources to “Why Can’t We Talk? Working
Together to Bridge the Communications Gap To Save Lives,” February 2003. See
http://www.justnet.org/pdffiles/ntfi_supplemental.pdf (~3.0 MB).
SEARCH Group, Incorporated and U.S. Department of Justice, Bureau of Justice Assistance,
Building Exchange Content Using the Global Justice XML Data Model: A User Guide for Practitioners
and Developers, June 2005. See http://it.ojp.gov/documents/GJXDMUserGuide.pdf.
U.S. Department of Homeland Security, Lessons Learned Information Sharing site (requires
registration). See https://www.llis.dhs.gov.
U.S. Department of Homeland Security, Office for Domestic Preparedness, Homeland Security
Exercise and Evaluation Program (HSEEP). See
http://www.ojp.usdoj.gov/odp/docs/hseep.htm.
U.S. Department of Homeland Security, Office for Domestic Preparedness, Homeland Security
Exercise and Evaluation Program, Volume II: Exercise Evaluation and Improvement, NCJ 202198
(Washington, D.C.: October 2003). See http://www.ojp.usdoj.gov/odp/docs/HSEEPv2.pdf.
U.S. Department of Homeland Security, SAFECOM Program, Public Safety Wireless Network,
Comparisons of Conventional and Trunked Systems, May 1999. See http://www.safecomprogram.
gov/SAFECOM/library/technology/1179_conventionaland.htm.
U.S. Department of Homeland Security, SAFECOM Program, Public Safety Wireless Network
Program, How 2 Guide for Establishing and Managing Talkgroups, no publication date. See
http://www.safecomprogram.gov/SAFECOM/library/systems/1047_HowTo.htm.
U.S. Department of Homeland Security, SAFECOM Program, Public Safety Wireless Network
Program, Introduction to Encryption Key Management for Public Safety Radio Systems, October 2001.
See http://www.safecomprogram.gov/SAFECOM/library/security/1113_securityissues.
htm.
U.S. Department of Homeland Security, SAFECOM Program, Public Safety Wireless Network
Program, Key Management Plan Template for Public Safety Land Mobile Radio Systems, February
2002. See http://www.safecomprogram.gov/SAFECOM/library/security/1114_
keymanagement.htm.
3 Appendix E
U.S. Department of Homeland Security, SAFECOM Program, Public Safety Wireless Network
Program, Operational Best Practices for Managing Trunked Land Mobile Radio Systems, May
2003. See http://www.safecomprogram.gov/SAFECOM/library/systems/1049_
OperationalBest.htm.
U.S. Department of Homeland Security, SAFECOM Program, Public Safety Wireless Network
Program, “Public Safety’s New Allocation—Answering Users’ Questions on the 4.9 Gigahertz
Band,” no date of publication. See http://www.safecomprogram.gov/SAFECOM/library/
spectrum/1088_publicsafetys.htm.
U.S. Department of Homeland Security, SAFECOM Program, Public Safety Wireless Network
Program, Software-Enabled Wireless Interoperability Assessment Report – Voice-Over-Internet Protocol
Technology, December 2001. See http://www.safecomprogram.gov/SAFECOM/library/
technology/1171_softwareenabledwireless.htm.
Sources:
Many of the terms in this glossary have been taken from one of the followoing sources. As
applicable, the source is indicated in parenthesis following the term.
n COPS Office, Law Enforcement Tech Guide: How to plan, purchase and manage
technology (successfully!), 2002
(http://www.cops.usdoj.gov/default.asp?Item=512)
n National Task Force on Interoperability (NTFI), Why Can’t We Talk? Working Together
to Bridge the Communications Gap to Save Lives, A Guide for Public Officials, February
2003 (http://www.ojp.usdoj.gov/nij/topics/commtech/ntfi_guide.pdf).
n Federal Communications Commission (FCC), A Glossary of Telecommunications
Terms, 1998 http://web.archive.org/web/19980524230851/http://www.fcc.
gov/Consumers/glossary.html.
n FCC Public Safety Wireless Advisory Committee (PSWAC), Final Report of the Public
Safety Wireless Advisory Committee, September 11, 1996
(http://pswac.ntia.doc.gov/pubsafe/publications/PSWAC_AL.PDF).
n National Emergency Number Association (NENA), NENA Master Glossary of 9-1-1
Terminology, November 29, 2005 (http://www.nena.org/9-1-1TechStandards/
Standards_PDF/Master%20Glossary11_29_05.pdf)
1xEv-DO
Formally, CDMA2000 1xEv-DO (Evolution – Data Optimized), a CDMA2000
technology. The “1x” refers to use of a single pair of 1.25 MHz radio channels. Carrier
reported data rates are in the 300 Kbps to 1.2 Mbps range. Considered to be a 3G
wireless service. Also known as “EvDO.”
1xRTT
Formally, CDMA2000 1xRTT (Radio Transmission Technology), a CDMA2000
technology. The “1x” refers to use of a single pair of 1.25 MHz radio channels. Carrier
reported data rates are in the 50 to 200 Kbps range. Considered to be a 2.5G wireless
service.
390 Appendix F
3GSM
See Universal Mobile Telecommunications System (UMTS).
ALI
See Automatic Location Identification.
ANI
See Automatic Number Identification.
Automatic Vehicle Location (AVL) software (COPS Law Enforcement Tech Guide)
Used by law enforcement agencies to remotely track the location of agency units via
satellite global positioning systems (GPS). AVL combines GPS technology, wireless
communications, street-level mapping, and a user interface.
Bluetooth
An open standard for short range, low-speed wireless networking intended to be used in
computing and telecommunications equipment to replace cabling. It has an application in
personal area networks (PAN) and is used popularly with wireless telephone headsets.
CDMA
Code Division Multiple Access. A method of multiple access to a digital communications
channel. In the wireless telephony environment, data bits from multiple voice channels are
spread across a wide radio channel simultaneously.
cdmaOne
The first CDMA technology for mobile digital telephony based on the TIA/EIA-95 standard,
previously known as Interim Standard 95 (IS-95). cdmaOne™ is a trademark of the CDMA
Development Group, Inc. Considered to be a 2G wireless service.
CDMA2000
A CDMA technology for mobile digital telephony and data based on the TIA Interim
Standard 2000 (IS-2000). The term encompasses multiple CDMA data technologies,
including 1xRTT and EVDO (See 1xEv-DO entry). CDMA2000® is a registered trademark of
the Telecommunications Industry Association (TIA).
EDGE
Enhanced Data Rates for GSM Evolution. A digital wireless technology providing high-speed
data on GSM and other Time Division Multiple Access (TDMA) networks. EDGE services
are designed to complement general packet radio systems (see GPRS). Carrier reported data
rates are in the 50 to 200 Kbps range. Currently considered to be a 2.5G wireless service, but
capable of being extended to higher speeds.
EvDO
See 1xEv-DO.
GPRS
General Packet Radio System. A digital wireless technology providing high-speed data on
GSM and other TDMA networks. Carrier reported data rates are in the 30 to 80 Kbps range.
Considered to be a 2.5G wireless service.
GSM
Global System for Mobile Communications. A worldwide standard for mobile digital
telephony using TDMA channel access means for eight voice channels across wide (200
kHz) radio channels. Considered to be a 2G wireless service.
Gateway
In general telecommunications, a gateway is a device that connects two or more different
networks. The term has come to mean more in land mobile radio communications where
it is used in reference to several means of achieving technical interoperability in which
independent systems are connected together so traffic on one channel, typically, of an
Glossary
39
agency’s system is duplicated on another agency’s channel. This is commonly done by
electronic patching of transmit and receive audio of one channel to another, either at a
dispatch console, separate radio sites, or in a mobile communications vehicle.
Gigabits/second (Gbps)
A measure of data transfer rates equal to one thousand megabits or one billion bits
per second.
GJXDM
Global Justice XML Data Model. A data reference model for use with XML-based
information exchange in justice and public safety applications.
Hotspot
In data networking usage, a wireless local area network (WLAN) access point offering
network connections beyond.
ICS
See Incident Command System.
iDEN
Integrated Digital Enhanced Network. A mobile digital telephony system first introduced
in 1994, which uses TDMA channel access means to provide up to six voice channels across
25 kHz radio channels. Considered to be a 2G wireless service. iDEN™ is a trademark of
Motorola, Inc.
Integration
The ability to access and exchange critical information at key decision points throughout
the enterprise.
Interconnects
See Gateway.
Glossary
399
Intergovernmental Agreement (IGA)
A written agreement entered into between two or more public agencies that may be more
or less formal depending on legal requirements on the agencies. Also known as an interlocal
agreement (ILA) and used in some regions synonymously with the terms memorandum of
agreement (MOA) or understanding (MOU).
Interoperability
The ability of public safety responders to share information via voice and data
communications systems on demand, in real time, when needed, and as authorized.
Megabits/second (Mbps)
A measure of data transfer rates equal to one thousand kilobits or one million bits per
second.
Mesh network
A communications network in which nodes connect to two or more other nodes. A node
may be an end-user device, such as a computer, or a junction point between other pieces of
the network. Mesh networks are used for redundancy, resiliency, and traffic balancing. They
can be wired or wireless.
NEPA
The National Environmental Policy Act. This federal law enacted in 1969 applies to
programs and projects licensed/permitted or funded, including grants in aid, by the
federal government that might have a significant impact on the quality of the human
environment. Major federal actions affecting the human environment require completion
of an environmental impact statement (EIS) or possibly an environmental assessment (EA).
Radio communications projects financed in whole or part by federal funds are often subject
to NEPA, particularly if any building or tower construction is involved.
Public Safety Wireless Advisory Committee (PSWAC) (NTFI Guide – Glossary of Terms)
A joint advisory committee of the FCC and NTIA that provided recommendations on the
specific wireless communications requirements of public safety agencies through 2010.
Shared channels
One of several means of achieving technical interoperability in which cooperating agencies
designate specific, often dedicated, radio channels for interagency use. Most public safety
radio bands have designated shared frequencies that are often used, though the term applies
generally to any channels adopted for interagency communications.
TCP/IP
See Transmission Control Protocol and Internet Protocol.
UMTS
Universal Mobile Telecommunications System. A wideband CDMA technology for mobile
digital telephony and data intended as the successor for GSM networks. It promises data
rates approaching 2 Mbps. Also known as 3GSM.
VoIP
Voice over Internet Protocol. A protocol for voice telephony over common data networks.
WiDEN
Wide Integrated Digital Enhanced Network. An enhanced version of iDEN combining
four standard channels to create 100 kHz radio channels for moderate speed data
communications. Considered to be a 2.5G wireless service. iDEN™ is a trademark of
Motorola, Inc.
Wi-Fi
The interoperable standard for IEEE 802.11 wireless local area network implementations.
Conformance testing is carried out by the Wi-Fi Alliance, an industry group. Wi-Fi® is a
registered trademark of the Wi-Fi Alliance.
WiMAX
The interoperable standard for IEEE 802.16 wireless metropolitan area network (MAN)
implementations. Conformance testing is carried out by the WiMAX Forum, an industry
group.
Overview
The Interoperability Continuum is designed to help the public safety community and local,
tribal, state, and federal policy makers address critical elements for success as they plan and
implement interoperability solutions. The five elements of the continuum are the following:
1. Governance.
2. Standard operating procedures (SOPs).
3. Technology.
4. Training and exercises.
5. Frequency of use of interoperable communications.
Communications interoperability refers to the ability of public safety agencies to talk across
disciplines and jurisdictions via radio communications systems, exchanging voice and/or data
with one another on demand, in real time, when needed, and as authorized.
Making progress in all aspects of interoperability is essential, since the elements are
interdependent. Therefore, to gain a true picture of a region’s interoperability, progress along
all five elements of the continuum must be considered together. For example, when a region
procures new equipment, that region should plan training and conduct exercises to make the
best use of that equipment.
1 Appendix G
To drive progress along the five elements of the continuum and improve interoperability,
public safety practitioners should observe the following principles:
• Gain leadership commitment from all disciplines (Emergency Medical Services (EMS),
Fire, Law Enforcement)
• Foster collaboration across disciplines through leadership support
• Interface with policy makers to gain leadership commitment and resource support
• Use interoperability solutions on a regular basis
• Plan and budget for ongoing updates to systems, procedures, and documentation
• Ensure collaboration and coordination across all elements (Governance, SOPs,
Technology, Training/Exercises, Usage).
Sustainability
Communications interoperability is an ongoing process, not a one-time investment. Once a
governing body is set up, it must be prepared to meet on a regular basis, drawing on operational
and technical expertise to plan and budget for continual updates to systems, procedures, and
training and exercise programs. If regions expect first responders to use interoperable equipment
on a daily basis, supporting documentation and the installed technology must be well-maintained
with a long-term commitment to upgrades and eventual replacement of equipment.
Lastly, an interoperability program should include both short- and long-term solutions. Early
successes can help motivate regions to tackle more time-consuming and difficult challenges. It is
critical, however, that short-term solutions not inappropriately drive the planning process, but
function in support of longer-term improvements.
Interoperability Continuum
1
Interoperability Continuum Elements
Governance
A common governing structure for solving interoperability issues will improve the policies,
processes, and procedures of any major project by enhancing communication, coordination,
and cooperation, establishing guidelines and principles, and reducing any internal jurisdictional
conflicts. This group should consist of local, tribal, state, and federal entities, as well as
representatives from all pertinent public safety disciplines within the identified region. A formal
governance structure is critical to the success of interoperability planning.
Individual Agencies Working Independently – A lack of coordination among
responding organizations.
Informal Coordination Between Agencies – Loose line-level or agency agreements that
provide minimal incident interoperability.
Key Multidiscipline Staff Collaboration on a Regular Basis – A number of agencies and
disciplines working together in a local area to promote interoperability.
Regional Committee Working with a Statewide Interoperability Committee
– Multidisciplinary agencies working together across a region pursuant to formal written
agreements as defined within the larger scope of a state plan. Such an arrangement promotes
optimal interoperability.
Technology
Although technology is a critical tool for improving interoperability, it is not the sole driver
of an optimal solution. Success in each of the other elements is essential to its proper use and
implementation, and should drive technology procurement.
Technology is highly dependent upon existing infrastructure within a region. Multiple technology
solutions may be required to support large events.
Swap Radios – Swapping radios, or maintaining a cache of standby radios, is an age-old
solution that is time-consuming, management-intensive, and may only provide limited results
due to channel availability.
Gateway – Gateways retransmit across multiple frequency bands, providing an interim
interoperability solution as agencies move toward shared systems. However, gateways are
inefficient in that they require twice as much spectrum because each participating agency must
use at least one channel in each band per common talk path, and because they are tailored for
communications within the geographic coverage area common to all participating systems.
Shared Channels – Interoperability is promoted when agencies share a common frequency
band, air interface (analog or digital), and are able to agree on common channels. However, the
general frequency congestion that exists across the United States can place severe restrictions
on the number of independent interoperability talk paths available in some bands.
Proprietary Shared Systems and Standards-based Shared Systems – Regional shared
systems are the optimal solution to interoperability. While proprietary systems limit the user’s
choice of product with regard to manufacturer and competitive procurement, standards-based
shared systems promote competitive procurement and a wide selection of products to meet
specific user needs. With proper planning of the talk group architecture, interoperability is
provided as a byproduct of system design, creating an optimal technology solution.
Usage
Usage refers to how often interoperable communications technologies are used. Success in
this element is contingent upon progress and interplay among the other four elements on the
Interoperability Continuum.
Planned Events – Events for which the date and time are known. Examples include athletic
events and large conferences/conventions that involve multiple responding agencies.
Localized Emergency Incidents – Emergency events that involve multiple
intrajurisdictional responding agencies. A vehicle collision on an interstate highway is an
example of this type of incident.
Regional Incident Management – Routine coordination of responses across a region that
include automatic aid fire response, as well as response to natural and manmade disasters.
Daily Use Throughout Region – Interoperability systems that are used every day for
managing routine and emergency incidents. In this optimal solution, users are familiar with the
operation of the system and routinely work in concert with one another.
1 Appendix G
Interoperability Continuum
19
For More InForMatIon: