Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Cellular and Hybrid Networks

Submitted by: Muhammad Zubair

[2011]

Cellular and Hybrid Network


There Pivotal role in Machine to Machine
Solution
Muhammad Zubair, MS (Telecom and Networks),

Behria University, Islamabad Campus (Pakistan)

Abstract— This paper outlines the many network


considerations one must take into account when choosing to
deploy an M2M solution. It provides a summary of network
options and approaches that can be employed for supporting
M2M applications, taking into consideration performance,
cost, service, security, and other critical factors. Network
connectivity options are also addressed, including the role of
cellular, satellite, and a mesh network approach that involves
utilizing a combination of connectivity options.

TABLE OF CONTENTS
1. Solution Provider (M2M Defined)…….………………1
2. The Role of Network………………..………..………...1
2.1. Wireless Networks………….…..…….……….…2
2.2. Wide Area Wireless Networks…….……….……2
2.3. Connectivity Consideration...…..…..…… .....……3
2.4. Local Area Wireless Networks…..………………4
2.5. Wireless Personal Area Networks…..……..……4
2.6. Satellite Networks…………… …………..………4
Abstract: This paper outlines the many network considerations one must take
2.7. 4G Networks……....………….….…....…...………5
into account when choosing to deploy an M2M solution. It provides a summary
2.8. Hybrid Networks…………………………..………5
of network options and approaches that can be employed for supporting M2M
3. Network Evolution………………..…..…...……………6
applications, taking into consideration performance, cost, service, security, and
3.1. Planning ahead……………………...……………..6
other critical factors. Network connectivity options are also addressed,
3.1. Security…………………………...…....…………..7
including the role of cellular, satellite, and a mesh network approach that
3.1. Evolution……...…………………...…....…………..7
involves utilizing a combination of connectivity options.
4. Conclusions…………………………...………………..8
5. References…………………………...…………………9

1. M2M Defined
Machine-to-machine (M2M) is the process of connecting
people, devices, and technology systems.M2M involves
moving data from physical assets to a remote IT system and is
leveraged by just about every market segment in almost every
environment. It connects and net works machines and devices
that run applications to deliver up-to-the-minute data to and
from a wide variety of assets, including buildings, vehicles,
monitoring devices, digital signage, e-readers, and more.

Five primary technologies are universal to almost


MS(Telecom & Networks) every M2M deployment:
Behria University, Islamabad Campus
Pakistan 
1) A machine with embedded intelligence;
2) Hardware that ex tracts the data from the machine;
3) A communication net work;
4) Middleware that bridges the network and the IT system;
and
5) An enterprise application.
By networking machines to automate business
processes, enterprise organizations are reaping tremendous
benefits in a variety of areas. One key benefit is the reduction
costs by cutting down on maintenance and equipment
downtime.

Page No:
2. The Role of the Network
The primary role of the network would appear to be simple
when it comes to M2M: Transport small amounts of data from
many devices back to an application server. Cellular networks
have been specifically designed for this task and they are ideal
for applications that involve mobile assets such as vehicle
fleets. We’ll start by reviewing the different types of net works
that can be employed for M2M applications.
Ethernet LANs are a seminal example of M2M network
technology and are still utilized today for many factory-floor
solutions, including manufacturing execution systems. Public
wire line technologies, such as DSL, can operate as a basic net
work. A PSTN (public switched telephone net work) is
another option, which is used by many retail outlets to
transport credit card transactions. In the case of connecting
with devices
in remote locations, a satellite service may be deployed. The
most prevalent and by far the fastest growing M2M network
solution, is wireless. And then there’s a mesh approach, which
relies upon a combination of the aforementioned network
solutions operating together.

2
2.1. Wireless Network
Table 1
Working at a highest bandwidth of 11Mbps and
802.11b can be implementing with various products. This
Network Meter
technology focusing on frequency-hopping spread spectrum
and direct-sequence spread spectrum which have two Personal Area Network 0-10
approaches. DSSS transmit information by divided into small
pieces. It is also identified as a chipping code that transmits Local Area Network 0-100
the data according to a spreading ratio. It is also helpful for
signal resist interference and use can easily observe original Wide Area Network 0-10000
data and recover damage data while HSS use the bandwidth to
split into lots of probable broadcast frequencies. Its
performance is generally enhanced and more consistent. There Practical implementation of a Wide Area Wireless
are lots of benefits or wireless networking such as very fast network using Frame-Relay and wireless device Access point
and reliable having long range from 1,000 ft / 305 m and 250 using Packet tracer shown in figure (1) below. Which shows
to 400 ft / 76 to 122 m .You can also integrate it into any the wireless connectivity between PC0, PC3 and PC4 through

Page No:
existing wired-Ethernet networks. Wireless networks offering wireless device Access point, which is connected with Frame
very high speed of internet and compatible with peer-to-peer Replay making a Wide Are wireless network.
mode.

There are different functional parts of a wireless networking


such radios base stations and mobile networks are increasing
trends for wireless industries. UWB and Bluetooth can be used
as personal network. Wireless network now has been a
Broadband wireless with great invention of WiFi and WiMAX
networks Wireless networks are competent of offering
suppleness for an association. Wireless local area networks
offer consistent and effectual keys to a number of instant
applications therefore at present it is used under numerous
diverse platforms such as developed, health care, education,
finance, hospitality, airport, and retail.

2.2. Wide-Area wireless Network

A wireless network is the M2M solution of choice for Figure 1: Wide Area Wireless Network
various reasons; the single biggest being that both the business
and consumer markets have gone mobile and usage of smart Configuration Router1
mobile devices is increasing at an amazing rate. As of June Code:
Router>enable
2010, a variety y of reports has indicated that well over 170
Router#configure terminal
million smart phones were sold in 2009, up nearly 25% from
Router(config)#interface Serial2/0
2008.
Router(config-if)#encapsulation frame-
In addition, there are now cellular networks built for
relay
the sole purpose of high-speed data transmission. The number
Router(config-if)#ip address 10.0.0.1
of these nationwide networks is projected to increase
255.0.0.0
dramatically in the next two to three years — and the advent Router(config-if)#no shutdown
of 4G service, which is explained in greater detail later in this Router(config-if)#exit
paper is providing unprecedented data capabilities. Router(config)#interface FastEthernet0/0
In wide-area applications, communication costs are Router(config-if)#ip address 192.168.3.1
based on bandwidth — the more bandwidth you need, the 255.255.255.0
higher the tariff. Therefore, every M2M application should be Router(config-if)#exit
designed to only use the bandwidth necessary to fulfill its Router(config)#ip route 0.0.0.0 0.0.0.0
assigned duties. M2M applications are intrinsically efficient 10.0.0.2
because inmost cases they only send small burst of data in Router(config)#exit
regular interval. Unlike voice communication, there is no 3
charge for connection time so, device stay on line 24/7. Configuration Router2
The following table 1. shows the range those Code:
different types of wireless network covers. Router>enable
Router#configure terminal
Router(config)#interface Serial2/0 2.3. Connectivity Consideration
Router(config-if)#encapsulation frame-
relay One of the most important factors to consider when
Router(config-if)#ip address 10.0.0.2 developing an M2M solution is solution, and choosing a
255.0.0.0 connectivity type is one of the first steps in any project. There
Router(config-if)#no shutdown are a number of options; some of the major connectivity types
Router(config-if)#exit include Wi-Fi, cellular, wired Ethernet, ZigBee, satellite, and
Router(config)#interface FastEthernet0/0 the previously mentioned hybrid or mesh system that
Router(config-if)#ip address 192.168.2.1 leverages two or more of these options.
255.255.255.0 Cellular connectivity is an often-used option, due largely in
Router(config-if)#exit part to its reliability and ubiquitous presence. It can connect
Router(config)#ip route 0.0.0.0 0.0.0.0 devices and systems over long distances, plus the networks are
10.0.0.1 well established and growing every day. A cellular system
Router(config)#exit consists of three parts as shown iin figure 2.
 Mobile Unit: A mobile telephone unit
Configuration frame-relay contains a control unit a transited and a

Page No:
Antenna system.
The following list summarizes the configuration  Cell Site: Cell Site provides interface
Steps [4]. between the MTSO (Mobile Telephone
Step 1: Configure the physical interface to use Frame Relay Switching Office) and the Mobile unit. It has
encapsulation(encapsulation frame-relay interface control unit, radio cabinet, antennas, a
subcommand). power plant and data terminals.
Step 2: Configure an IP address on the interface or  MTSO: The switching office, the central
subinterface (ip address co-ordinate for all cell sites, cantains cellular
subcommand). processor and cellular switch. MTSO is the
Step 3: (Optional) Manually set the LMI type on each heart of a cellular system [1], as shown in
physical serial interface figure (2).
(frame-relay lmi-type interface subcommand).
Step 4: (Optional) Change from the default encapsulation of
cisco to ietf by
doing the following:
a. For all VCs on the interface, add the ietf keyword to the
encapsulation frame-relay interface subcommand.
b. For a single VC, add the ietf keyword to the frame-relay
interfacedlci
interface subcommand (point-to-point subinterfaces only) or
to
the frame-relay map command.
Step 5: (Optional) If you aren’t using the (default) Inverse
ARP to map the DLCI
to the next-hop router’s IP address, define static mapping
using the
frame-relay map ip dlci ip-address broadcast subinterface
subcommand.
Frame Relay Configuration and Verification 489
Step 6: On subinterfaces, associate one (point-to-point) or Figure 2: Cellular System
more (multipoint)
DLCIs with the subinterface in one of two ways:
a. Using the frame-relay interface-dlci dlci subinterface However, for some applications, Another connectivity type
subcommand may make more sense. For instance, Wi-Fi or ZigBee is often
b. As a side effect of static mapping using the frame-relay used in cases where devices only need to communicate over
map ip dlci short distances, for example,
ip-address broadcast subinterface subcommand Across a few thousand meters, as in the case of connected
The rest of this section shows examples of all these home products including connected cameras, Blu -ray players,
4
configuration steps, along with some or home security devices.
discussion about how to verify that the Frame Relay network Wired Ethernet solutions have traditionally been associated
is working correctly. with supervisory control and data acquisition (SCADA) and
plant-floor systems, where the necessary wired infrastructure
is already in place. In these systems, it may be easiest and
most cost-efficient to hardwire a solution. Additionally, if the
system will be in place for many years and is not likely to and data on individual energy consumption goes over a wide-
need updating, then the cost of running wire lines may not be area network to the utility company.
prohibitive. Meshed RF is a cost-effective, very robust way of
creating smart, local-area grids. If any link goes down, the
2.4. Local-Area Wireless Networks traffic takes another route around the network. Rerouting is an
intrinsic feature of meshed networking and smart algorithms
Local-area wireless networks employ unlicensed are used to ensure that data packets take the shortest route to
"spread spectrum" which has a limited range — something the destination address, i.e., the concentrator/gateway
that is offset by the fact that this air interface is free. We’ll combination that connects to a cellular network.
discuss several types of local-area wireless networks in this Radio-frequency identification (RFID) has been in
section. existence for more than 50 years. Originally developed by the
Bluetooth is a well-known, short-range technology, United States Department of Defense for use as a remote
but Bluetooth networks are limited to eight nodes, so this object identification technology, most applications today are
technology is not widely used to transport M2M data. in the private sector, where RFID tags are used to track
Wi-Fi offers another local-area network standard, everything from luggage to livestock, as well as in cashless
otherwise known as 8 02.11 net working. The 802.11 transaction processing technology. RFID tags are also used in

Page No:
designation comes from the Institute of Electrical and enterprise supply-chain management to improve the efficiency
Electronics Engineers (IEEE). of inventory Tracking and management other applications
A WiMAX solution provides a second-generation include public toll systems on roads and public transportation
protocol that allows for more efficient bandwidth use and is in buses and trains.
intended for higher data rates over longer distance such as
cities. Practical realization data rates of the WiFi, WiMAX, 2.5. Wireless Personal Area Networks
and LTE technologies depicted in Figure (3) , which shows
theoretical and practical realization data rates for a Varity of (WPANS)
technologies available today [2]. There are two current technologies for wireless personal
network Bluetooth and Infra Red. These technologies will
allow the connectivity of personal devices within an area of 30
feet. Infra Red requires a direct line and the range is less as
compared to Bluetooth technology.

2.6. Satellite Networks


Satellite communications also play an important role in the
M2M world. While not needed for the majority y of
applications, some M2M solutions require the wide
coverage offered by satellite. This is especially important in
applications where devices are deployed in rural or desert
areas, or in the ocean. Some vertical industries commonly
Employing this kind of system include oil and gas,
transportation, and Government/military.
Military solutions are among the most prevalent of M2M
applications using satellite communications due to the fact that
Figure 3: Data Rates of WiFi, WiMAX and LTE military equipment quite often requires connectivity y in
extremely remote areas. Often used in hybrid solutions, the
ZigBee is a low-cost, low-power, low-data rate process
networking standard where up to 255 nodes can be employed. typically involves using cellular communications as the
This short-range RF (radio frequency) technology enables the primary mode of connection, with automatic switching to
creation of general-purpose, inexpensive, self-organizing mesh satellite connectivity as a backup.
net works that can be used for industrial control, embedded 2.7. 4G Networks
sensing, medical data collection, smoke and intruder alerts,
building automation, home automation and more. By some estimates, more than 10 Million 4G M2M
ZigBee solutions can be self-contained, but the area cellular modules will ship in 2015. Sometimes talked about in
they cover is limited. This can be less of an issue for term of LTE(long-term evolution) or WiMax, 4G is the next
applications such as networked homes where ZigBee is generation of cellular technology that runs on a higher
bandwidth, capable of significantly faster upload and 5
heavily in use. However, coverage can be extended by
connecting the local meshed network to a gateway that download speeds. 4G deployment promises improved spectral
aggregate traffic and in turn connects to a cellular network. A efficiency and superior quality of service (QoS) from 3G and
typical application would be smart utility y meters where a advanced 3G services. While 3G has not necessarily reached
designated number of households are covered by a local mesh, ubiquity in the United States, iterations of 4G technology are
already being developed to accommodate QoS and data
transfer rate requirements for existing application that run on
3rd generation network. Many off the proposed improvements
and feature are as fallows shown below [3] in table 2.

Table 2

3G 4G
Back compatible to 2G Extend 3G capacity by one
order of magnitude.
Circuit and packet switched Entirely packet-switched
networks. networks.
Combination of existing and All network elements are
evolved equipment. digital.
Data rate(up to 2 Mbps) Higher bandwidth (up to 100
Mbps).

Page No:
For many M2M applications, 3G net works are
appropriate due to low data-transfer rate requirements. Figure 4: Electronic Monitoring
However, high-bandwidth applications, such as the connected
car, high-definition video surveillance in security, and hotspot To achieve this level of reporting, electronic
aggregation for the home, are just a few of the many monitoring systems leverage both GPS and assisted GPS,
increasing areas that will benefit from 4G. Applications which uses network cell tower-assisted location information.
requiring significant data in and out of a device, such as those Inside the actual tracking bracelet is a set of circuitry that uses
with rich display, analytical, or aggregation capabilities, are three or more separate signal fixes to find the bracelet (via cell
already on the market today with the ability to seamlessly tower or GPS signals) and than uses a cell modem to transmit
switch between 3G and 4G wherever it is available. information to a central station. This process creates a
ubiquitous solution that can truly present real time location
2.8. Hybrid Networks data.
Another example (Figure5: Meter Reading Example
A hybrid network is comprised of two or more net work types,
of a Hybrid Net work) of a hybrid net work approach is a
such as a radio frequency local-area mesh net work and a
system that helps vending machine owners get real-time data
wide-area cellular net work. The seamless integration of
on every unit they own. A piece of hardware within each
networks that are intrinsically different is not a simple task as
vending machine collects data, such as temperature, inventory,
significant networking competence and experience required.
and revenue, and sends it to a hub using RF signals. Once the
Hybrid networks are deployed for various reasons,
data from the various machines reaches the central hub, it’s
the most common being the need to minimize communications
passed along using a cellular network to a monitoring center
costs. If an M2M application only connects to a cellular net
for analysis and storage.
work directly, this requires a greater number of cellular-
enabled devices, each of which will be charged for bandwidth
usage with RF chips, on the other hand, only cost a few dollars
and the air interface is free, so using a local-area network to
aggregate traffic offers an attractive option.
Take, for example, (Figure 4: Electronic Monitoring)
people-tracking bracelet devices used by the justice system. In
early solutions an individual would wear an ankle bracelet that
plugged into a line modem and alerted authorities when that
individual stepped outside of a preset zone. Those solutions
presented many very obvious limitations. Today, technology
has progressed to where a GPS chip embedded into such
devices can send data regarding an of fender’s location, both
indoor and out door.

Figure 5: Meter Reading Example of Hybrid Network


A third example (Figure 6: Vending Machines) In this scenario, a key M2M business consideration is
comes in the form of receiving utility consumption and trend the recurring cost of transferring data which will have an
data via the automated reading of M2M utility meters. impact on ROI. Designing the M2M application so that the
This solution typically uses a combination of fixed line and amount of data transmitted is as small as possible can
mobile networks. In some cases, the use of a hybrid network is minimize cost, but using end-to-end encryption will introduce
related to redundancy issues and/or location of the meter that overhead. The amount charged by the net work operator may
need to be read. also vary with the desired data rate, and will almost certainly
vary based on the time of day.
Depending on your application, you will want to
consider transmitting data during less expensive, off-peak time
periods. For example, a utility company could elect to take
measurements every hour but aggregate them, e.g. use a
concentrator. Thus, instead of sending out a data stream the
information would go out as a large transaction file during off-
peak hours.

Page No:
3.1. Planning Ahead
Once organizations complete an initial M2M
deployment, they very often add additional M2M solutions to
their original application/network infrastructure. The need for
expansion capabilities makes towards thinking essential.
Typically, the original application infrastructure
serves the same function regardless of the specific nature of
additional new M2M applications. If, however, the application
that is introduced involves video, then data rates, latency, and
QoS become critically important parameters. Therefore, it is
advisable to think ahead and make sure the network selected
today will be able to meet tomorrow’s more demanding
Figure 6: Multiple Vending Machine requirements.
Location-based services are another relevant factor
when it comes to planning ahead. Cellular networks have the
3. Network Evaluation power to pinpoint the approximate location of all active
devices. The precise figure depends on the number of base
Most M2M applications transmit small amounts of data at stations in the area, so device location is quite accurate in city
regular intervals, which would seem to indicate that net work centers, and less so in rural environments. Because of this, it’s
parameters such as data rates, latency, and quality of service relatively easy for a net work operator to bring location-based
(QoS) are less relevant. Networks such as CDMA2000 applications into an existing M2M solution.
1XRTT and CDMA2000 EV-DO have very high data rates, To accomplish this, a GPS (global positioning
and since their introduction have gone through various that system) service is incorporated. This point is illustrated in an
lowered the early latency figure of 500 to 6 00 milliseconds — example at the end of this paper where both video and GPS
as a result improving the QoS. were added to an existing application — see the first use case
These networks are primarily used to download large in the "Two Proof points section".
files to laptops, which would lead a person to believe that
M2M data represents an incremental load. While this is 3.2. Security
technically true, it presents special challenges. An M2M
application may involve thousands or tens of thousands of The concept of security continues to be a source of concern
devices. And this creates a potential problem: network as more and more information streams through the air —
congestion tied to using a shared resource, air interfaces. especially given the current war on terrorism and the intense
Because of this, latency and QoS are, in fact, very important. focus on national security in countries around the world.
Net work congestion that’s caused by third-party Encryption technology must be well-promoted and
traffic can be lessened on the wire line portion of a network explained for both business and consumer customers to feel
via special routing. However, some believe the virtual private secure in having private data sent beyond a LAN. The topic of
network (VPN) will not improve congest ion over the air network security can be discussed in great length; however,
this paper will highlight several key points. 7
link. The same public infrastructure is used, but a secure end-
to-end tunnel is established and it is dedicated to that Security is an issue in any industry and it must be of
application. Security comes via various mechanisms, such as primary concern when considering the device, the air link, the
cryptographic tunneling protocols, IPSec, and transport layer carrier network (including all information systems),
security. connectivity outside the net work carrier, and the customers’
IT system inside the enterprise.
Looking at the entire M2M eco-system, many believe that SSID match between the two computers or networks then
the device is the most vulnerable link in the value chain. access is granted to each other.
Industry observers note this is the case because the device is
the only component in the architecture that the typical user has Media Access Control filtering (MAC Access Control)
any influence over. That potential vulnerability is why carriers
are most stringent on the testing and certification of a device A list of the MAC addresses of the client computers can be
and the standard protocols they have implemented. inputted into an Access point and only those computers are
Security is achieved via a combination of VPNs, fixed IP granted to give the access to the network. When a computer
addresses, and the fact that most applications involve devices makes a request, its MAC address is compared to the list of
performing relatively simple tasks on proprietary plat forms. the MAC addresses to the Access point and based on this
In addition, fixed IP addresses can help and enterprise to access permission granted to deny.
always locate the device. They can send a message to a This is a good security method but it is mainly involved in the
specific IP address to contact the decide, much like a phone small wireless networks because there is more manual work is
number. This makes it easier to create firewall with the correct involved of entering the MAC address into the Access point.
equipment and ensure that malicious code cannot be
downloaded.

Page No:
A different scenario emerges when modules employ 3.3. Evaluation
relatively powerful processors in order to perform more
complex tasks. In this case, an open plat form, such as Linux, Successful M2M applications rely on quality value-chain
is normally utilized. The more complex tasks these second- partnerships. Before choosing a provider, determine the
generation devices enable equates to more code that can be recurring and variable costs associated with service, and how
manipulated, leading to the potential for revealing valuable variable costs change if more data is sent than the allocated
information, devices and gadgets must be designed so that amount. The needs of every organization change quickly, so
hackers do not have access to corporate IT systems, yet are determine if there are charges for suspension or early
open to future design. termination.
Robust device security can only be realized when the
communications link is encrypted, i.e., when there are security As mentioned earlier, in selecting a provider, adopters
mechanisms on both the device and the server. Therefore, this should consider not only the service requirements they have
is an area that needs careful evaluation. Security can also be today, but also their growth potential in years to come.
provided by a holistic solution one that integrates all Ask hypothetical questions about possible scenarios to avoid
components—device, network, and application—into a single, getting stuck in a costly situation down the line.
secure entity. This approach indicates the transition of security For instance, what costs would be incurred if the adopter
from being product-centric to a service-centric approach. wants to suspend devices and their data transmissions? Also,
what can be expected if devices are taken and/or used across
The following different types of security methods are borders? Finally, what tools does the network provider offer
available in the wireless networking. its customers if unauthorized usage occurs?

Wired Equivalent Privacy (WEP) 4. Conclusions


The M2M market is challenging and rewarding; challenging
Wired Equivalent Privacy is intended to stop the interference because of the relative complexity of the value chain,
of radio frequency that is signaled by unauthorized users and rewarding because the benefits are significant. Costs are
this security measure is most suitable for the small networks. reduced and time is saved, which improve operational
There is not key management protocol and each key is entered efficiencies and boost bottom lines.
manually into the clients that’s why this is very time M2M has the proven ability to deliver these benefits, as
consuming administrative task. The WEP security method is evidenced by robust market growth during a time when the
based on the RC4 encryption algorithm. In the WEP all the economy was weak and investments were on hold. There are
client computers and Access points are configured with the numerous vertical sectors that have benefited from M2M, for
same encryption and decryption keys. example: automotive, building management, energy,
connected home, healthcare, industrial and infrastructure,
Service Set Identifier (SSID) transportation, retail, networks, and security.
In addition, the B2C side of the industry has taken of f,
Service Set Identifier (SSID) acts a simple password by fueled by the rapid uptake of smart phones and innovative
allowing WLAN network to be split up into different networks products like e-readers, which are transforming entire markets. 8
and each having a unique identifier. These identifiers are We are also witnessing groundbreaking services, such as
configured in the multiple access points. To access any of any augmented-reality navigation and assisted living in the home.
networks, a computer is configured in such a way that each is These are positive development, out as the number of
having a corresponding SSID identifier for that network. If the successful deployments continues to raise, the roll of the
communication network become more and more important.
Network traffic is growing and continues to do so in the future services to enable solution that track elderly and special needs
and the market will not accept performance issues due to individuals, among others.
congestion. Latency must be kept low and a high OoS Regarding offender monitoring, in particular, a
retained. number of different types of technologies come into play to
establish an effective program. It starts with an ankle bracelet
Two Proof Points that is equipped to an offender by an officer or retrial agency
(bondsman). This bracelet contains a fiber strap that in turn
Drivecam: The most advanced transportation Safety
contains a set of fiber-optic cables. Inside the unit is a set of
Company.
circuitry that triangulates and finds the bracelet using cell
DriveCam was founded 11 years ago as the pioneer of in-
towers or
vehicle video technology, used to capture risky driving
GPS signals, and then uses a cell modem to transmit
behavior and to provide evidence in the event of vehicle
information to a central station. Omnilink manages a set of
accidents. DriveCam reduces teen-driving collisions by 70%
redundant server centers that receive this information, which
and helps companies cut their fleet claims costs in half.
can be displayed via a secure web page to be access by the
Today, the company uses a device called an event recorder
officer.
that is installed in the vehicle. It has two imagers, one facing
When Omnilink first entered the market, the intent was to

Page No:
forward and one f acing inside the vehicle, as well as an audio
provide a cost-effective way to reduce the no of individuals
recorder. The event recorder has a DVR connected to an
being incarcerated, as well as help lower the cost of keeping
accelerometer that measures g-force. Any vehicle activity that
people in prison. Among the key considerations for Omnlink
exceeds an accepted range will trigger the event recorder and
was the ability to track offenders nationwide, both inside and
grab a video clip of the critical seconds prior to an event and
outside. The technology has progressed from a system that
the seconds after, looking both outside and inside the vehicle.
was plugged into a line modem, to bracelets that contained a
Early on, this technology was based on two transmission
separate GPS chip that recorded location data, which was
mechanisms. One was wired and the other one was Wi-Fi.
downloaded the next day by the officer. While this method
They both worked well for many years, but they had
made the officer aware of where that individual had been, the
limitations. Over time, DriveCam’s clients started to demand
tracking method was considered very passive, and in some
more, so the company needed a technology that would be
cases unsafe in cases where an offender was considered a
easier to deploy, easier to use and more secure.
thread.
Most of DriveCam’s customers are Fortune 500 companies, so
Addressing this problem of passive monitoring, Omnlink
they needed a company that could perform at a very high
certified a device on the network that used cell tower-assisted
level.
location information made commercially available from the
DriveCam has now realized its vision of transmitting video
carrier. This has upped the game for offender-monitoring
events virtually any where in the country, wirelessly. This is
solutions, as the ubiquitous, always-on network allows officers
an unrivaled competitive advantage, and the benefits for the
to know where an offender is 24/27.
clients are clear — the solution is easier to deploy, use, and
This system is now being applied beyond the realm of
maintain. There’s no need for onsite equipment, and there’s
offender monitoring, into cases of controlling truancy with
minimal impact on IT departments.
children who are skipping school, tracking so-called “gang-
Drivers don’t need to find a hot spot or return to a home
bangers” in the community on a probationary or pre-trial
base for video events to be uploaded; now those events can be
basis, and monitoring sexual predators, among others. The
accessed anytime, virtually any where. Additionally, this
system even plays a role with monitoring our loved ones, such
wireless technology is helping DriveCam expand their
as the case with the National Alzheimer Association, for
solution. Adding real-time GPS to the system allows
which Omnilink provides the system of record.
customers to manage their fleets better, which is made
possible.
DriveCam is a clear leader: they are the only company that 5. REFERENCES
transmits video events over a nationwide wireless net work. [1] Vikrant Vij, “Wireless Communication,” in University
As a result , they have saved countless lives and eliminated Science Press, 2010, pp.5
millions and millions of dollars worth of unnecessary [2] Jonthon Wells. "Multi-Gigabit Microwave Millimeter-
operating expenses. wave wireless communication", US Library of Congress,
2010 Artech House, pp.14.
Omnilink: Monitoring made easy [3] Rondall K.Nicholos.Panos C.Lekkas, "Wireless security",
Omnilink Systems has established itself as one of the Published by tata MCGraw-Hill, 2006, p.p.27.
leading providers of location-based services (LBS) for [4] Wendell Odom, "CCNA ICND2", Published by Cisco
government organizations, national associations, and other Press, 2008, p.p. 488-489.
groups across the country. It is started in 2004 with the 9
company initially offering electronic monitoring solutions to
track offenders and defendants in the criminal justice system,
using both GPS and an assisted GPS system. Through out the
year, Omnilink has a successful applied its software's and

You might also like