Skip to main content
Log in

Network virtualization as an integrated solution for emergency communication

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In this paper the Virtual Private Ad Hoc Networking (VPAN) platform is introduced as an integrated networking solution for many applications that require secure transparent continuous connectivity using heterogeneous devices and network technologies. This is done by creating a virtual logical self-organizing network on top of existing network technologies reducing complexity and maintaining session continuity right from the start. One of the most interesting applications relies in the field of emergency communication with its specific needs which will be discussed in this paper and matched in detail against the architecture and features of the VPAN platform. The concept and dynamics are demonstrated and evaluated with measurements done on real hardware.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Hamachi: Instant, zero-configuration vpn. https://secure.logmein.com/products/hamachi/vpn.asp.

  2. IBBT ADAMO Advanced Disaster Architecture with Mobility Optimizations. http://www.ibbt.be/en/project/adamo.

  3. IBBT GeoBIPS Geographical Broadband Integration for Public Services. http://www.ibbt.be/en/project/geobips.

  4. Ietf network mobility working group. http://www.ietf.org/html.charters/nemo-charter.html.

  5. iLab.t Technology Center @ IBBT. http://ilabt.ibbt.be.

  6. The iLab.t virtual wall. http://ilabt.ibbt.be/?p=page5.

  7. Leetnet: The true dynamic vpn. http://www.leetnet.org.

  8. PC Engines™ALIX system boards. http://www.pcengines.ch/alix.htm.

  9. Ubiquitous M2M, Service Networks (UseNet). http://usenet.erve.vtt.fi/.

  10. Vpn technologies: Definitions and requirements, white paper (2004). http://www.vpnc.org/vpn-technologies.html.

  11. Statement of Requirements for Public Safety Wireless Communication and Interoperability (2006). http://www.safecomprogram.gov/SAFECOM/library/technology/1258_statementof.htm.

  12. Abdulrahman, A. H., & Golden, R. G. (2004). Load-balanced routing through virtual paths: Highly adaptive and efficient routing scheme for ad hoc wireless networks. In H. Hassanein, R. Oliver, & G. Richard (Eds.), The 2004 IEEE international performance, computing, and communications conference (IPCCC) (pp. 407–413). New York: IEEE Press.

    Google Scholar 

  13. Anderson, T., Peterson, L., Shenker, S., & Turner, J. (2005). Overcoming the internet impasse through virtualization. Computer, 38(4), 34–41.

    Article  Google Scholar 

  14. Birman, K. P. (2000). The next-generation internet: Unsafe at any speed? Computer, 33(8), 54–60.

    Article  Google Scholar 

  15. Chiti, F., Fantacci, R., Maccari, L., Marabissi, D., & Tarchi, D. (2008). A broadband wireless communications system for emergency management. IEEE Wireless Communications, 15(3), 8–14.

    Article  Google Scholar 

  16. Couto, D. S. J. D., Aguayo, D., Bicket, J., & Morris, R. (2005). A high-throughput path metric for multi-hop wireless routing. Wireless Networks, 11(4), 419–434.

    Article  Google Scholar 

  17. Cox, M., Engelschall, R., Henson, S., Laurie, B. et al. (2002). The OpenSSL project.

  18. Daemen, J., & Rijmen, V. (2002). The design of Rijndael: AES–the Advanced Encryption Standard. Berlin: Springer.

    Book  Google Scholar 

  19. Dahlman, E., Parkvall, S., Skold, J., & Beming, P. (2008). 3G Evolution (2nd ed.). HSPA and LTE for Mobile Broadband. San Diego: Academic Press.

    Google Scholar 

  20. Dedecker, P., Hoebeke, J., Moerman, I., Moreau, J., & Demeester, P. (2009). Multipath routing issues in virtual private ad hoc networks. Personalized Networks, 2009. In IEEE CCNC ’09. Workshop on.

    Google Scholar 

  21. Dedecker, P., Hoebeke, J., Naudts, D., Moerman, I., Moreau, J., & Demeester, P. (2009). Fast and safe emergency communication through network virtualization. In International conference on communications and mobile computing (p. 4).

    Google Scholar 

  22. Doval, D., & O’Mahony, D. (2003). Overlay networks: A scalable alternative for p2p. IEEE Internet Computing, 7(4), 79–82.

    Article  Google Scholar 

  23. Ericsson: Keeping lifelines open: national security & public safety communication over mobile broadband (white paper) (2010). http://www.ericsson.com/article/nsps_20100216130134.

  24. Fantacci, R., Vanneschi, M., Bertolli, C., Mencagli, G., & Tarchi, D. (2009). Next generation grids and wireless communication networks: towards a novel integrated approach. Wireless Communications and Mobile Computing, 9(4), 445–467.

    Article  Google Scholar 

  25. Freeman, J., & Passmore, D. (1996). The virtual lan technology report.

  26. Hoebeke, J. (2007). Adaptive ad hoc routing and its application to virtual private ad hoc networks. Ph.D. thesis, Ghent University.

  27. Hoebeke, J., Holderbeke, G., Moerman, I., Dhoedt, B., & Demeester, P. (2006). Virtual private ad hoc networking. Wireless Personal Communications, 38, 125–141.

    Article  Google Scholar 

  28. Hoebeke, J., Steenhuyse, M., Ackaert, A., Moerman, I., Demeester, P., Jacobs, A., Veys, A., Verhoeve, P., & Piepers, B. (2008). A new concept towards secure personal healthcare platforms. In Proceedings of TTEC2008, the Tromso telemedicine and eHealth conference (pp. 25–26).

    Google Scholar 

  29. Iapichino, G., Bonnet, C., del Rio Herrero, O., Baudoin, C., & Buret, I. (2009). Combining mobility and heterogeneous networking for emergency management. New York: ACM Press.

    Google Scholar 

  30. Iapichino, G., Bonnet, C., Del Rio Herrero, O., Baudoin, C., & Buret, I. (2008). A mobile ad-hoc satellite and wireless mesh networking approach for public safety communications. In SPSC 2008, 10th IEEE international workshop on signal processing for space communications, October 6–8, 2008, Rhodes Island, Greece.

    Google Scholar 

  31. Johnson, D., & Perkins, C. (2004). J. Arkko, Mobility Support in IPv6. Tech. rep., RFC 3775, June 2004.

  32. Khanvilkar, S., & Khokhar, A. (2004). Virtual private networks: an overview with performance evaluation. IEEE Communications Magazine, 42(10), 146–154.

    Article  Google Scholar 

  33. Kohler, E. The click modular router project. http://www.read.cs.ucla.edu/click/.

  34. Lua, E. K., Crowcroft, J., Pias, M., Sharma, R., & Lim, S. (2005). A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials, 7(2), 72–93.

    Article  Google Scholar 

  35. Murthy, S., & Garcia-Luna-Aceves, J. J. (1996). An efficient routing protocol for wireless networks. Mobile Networks and Applications, 1(2), 183–197.

    Article  Google Scholar 

  36. National task force on interoperability (NTFI) and United States: why can’t we talk? Working together to bridge the communications gap to save lives: a guide for public officials-supplemental resources (2005).

  37. Naudts, D., Bouckaert, S., Bergs, J., Schoutteet, A., Blondia, C., Moerman, I., & Demeester, P. (2007). A wireless mesh monitoring and planning tool for emergency services. End-to-End Monitoring Techniques and Services, 2007. In E2EMON ’07. Workshop on (pp. 1–6).

    Google Scholar 

  38. Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (Experimental).

  39. Perkins, C. et al. (2002). IP mobility support for IPv4.

  40. Portmann, M., & Pirzada, A. (2008). Wireless mesh networks for public safety and crisis management applications. IEEE Internet Computing, 12(1), 18–25.

    Article  Google Scholar 

  41. Sánchez, L., Lanza, J., & Munoz, L. (2006). Experimental assessment of a cross-layer solution for TCP/IP traffic optimization on heterogeneous personal networking environments. In Lecture Notes in Computer Science (Vol. 4217, pp. 284).

    Google Scholar 

  42. Stavroulakis, P. (2007). TErrestrial trunked RAdio—TETRA: A global security tool. Berlin: Springer.

    Google Scholar 

  43. Triantafyllidou, D., & Agha, K. A. (2009). The impact of path-delay routing on TCP in ad hoc networks. In International conference on communications and mobile computing.

    Google Scholar 

  44. Viega, J., Messier, M., & Chandra, P. (2002). Network security with OpenSSL. Sebastopol: O’Reilly.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Peter Dedecker.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Dedecker, P., Hoebeke, J., Moerman, I. et al. Network virtualization as an integrated solution for emergency communication. Telecommun Syst 52, 1859–1876 (2013). https://doi.org/10.1007/s11235-011-9470-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9470-z

Keywords

Navigation