scope...•continuity risks •failures –how to deal with hardware and software failures...
TRANSCRIPT
![Page 1: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/1.jpg)
• Understand challenges for providing
reliable and secure TETRA network operation
• Choose relevant requirements for your
TETRA network
• Establish questions and criteria to evaluate
vendor expertise and solutions
• Mitigate risks for availability, security
and continuity
SCOPE
![Page 2: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/2.jpg)
• Functionality
• Performance
• Scalability - Capacity
• Availability - Reliability - Coverage
• Security
• Continuity
REQUIREMENTS
![Page 3: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/3.jpg)
• Definition of Availability• Availability in Time & Place (coverage)
• Availability versus Reliability• Availability calculation (MTBF, MTTR)
• Increase availability by…• System redundancy
• Link redundancy
• Component redundancy
• Coverage redundancy
• Local Site Fallback
• Direct Mode
AVAILABILITY
![Page 4: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/4.jpg)
• System redundancy• Synchronization, Activation, Recovery > Expected Outage
• Link redundancy• Physical links, Protocols > Expected Outage
AVAILABILITY
MainSwMI
StandbySwMI
BS2 BS4 BS6
BS3 BS5 BS7BS1
Ethernet
E1, DSL, Fiber, ...
Main path to BS4
Standby pathto BS4
![Page 5: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/5.jpg)
• Coverage• Coverage planning
• Drive tests
• Special Coverage Locations
• Continuous coverage reporting
AVAILABILITY
![Page 6: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/6.jpg)
• Security risks• Eavesdropping – Air interface, Fixed network, Control room
• Traffic analysis – Identities, Movements, …
• Denial of Service – Air interface, Fixed network
• Compromised base station – Sensitive key material
• False base station – Take control of valid users
• Unauthorized user access – Eavesdropping, Disinformation, Fraud
• System disruption – System or site unavailability
SECURITY
![Page 7: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/7.jpg)
• TETRA security• Class 2 Air Interface Encryption – SCK
• Class 3 Air Interface Encryption – DCK, CCK
• Class 3G Air Interface Encryption – GCK
• (Mutual) Authentication
• End-to-End Encryption
SECURITY
![Page 8: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/8.jpg)
• System security• System hardening –
Reduce “surface of vulnerability” (services, ports, …)
• Access security – Encryption and (two-factor) user authentication
• Security auditing – Logging of access and command execution
• Security patches – Resolve known vulnerabilities
SECURITY
![Page 9: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/9.jpg)
• Network security• Physical security – Fences, Access control, Alarms
• Cyber security –
Firewall, Intrusion detection, Virus & Malware interception
• Admin access – VPN, (two factor) User authentication
• Network access – VLAN, ACL, EAP
• Link encryption – IPsec, MACsec
• Security auditing – RADIUS, Syslog
SECURITY
![Page 10: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/10.jpg)
• Continuity risks• Failures – How to deal with hardware and software failures
• Complaints – How to pro-actively solve user complaints
• Expansion – How to ensure expansions within budget
• Support – How support can be provided securely and effectively
• Lifecycle – How to deal with hardware and software obsolescence
• Vendor – How to ensure long-term vendor relations
CONTINUITY
![Page 11: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/11.jpg)
• Failure mitigation• Component Failures – Spares, Repairs
• System Failures – Backup, Restore, Disaster recovery
• User Complaints – Logging, Statistics, Analysis, Reporting
CONTINUITY
![Page 12: SCOPE...•Continuity risks •Failures –How to deal with hardware and software failures •Complaints –How to pro-actively solve user complaints •Expansion –How to ensure](https://reader035.vdocuments.us/reader035/viewer/2022070107/6021991a5bbf970cb01d1088/html5/thumbnails/12.jpg)
• Business mitigation• Expansion – Scalability, Cost (Hardware, Licenses)
• Support – Ease of configuration, Remote support,
Service Level Agreements, Cost
• Lifecycle – Software releases, (Security) patches,
End-of-Life Notices, Escrow
• Vendor – Profitability, Strategy, Commitment
CONTINUITY