Soliciting Input on Research and Development Priorities for Desirable Features of a Nationwide Public Safety Broadband Network, 56165-56167 [2011-23180]
Download as PDF
Federal Register / Vol. 76, No. 176 / Monday, September 12, 2011 / Notices
Comment 7: Name Corrections for Certain
Companies
[FR Doc. 2011–23278 Filed 9–9–11; 8:45 am]
BILLING CODE 3510–DS–P
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
[Docket No.: 110727437–1433–01]
Soliciting Input on Research and
Development Priorities for Desirable
Features of a Nationwide Public Safety
Broadband Network
National Institute of Standards
and Technology, Department of
Commerce.
ACTION: Notice and request for comment.
AGENCY:
The U.S. Department of
Commerce’s (DoC) National Institute of
Standards and Technology (NIST) is
seeking input on various possible
features of a new nationwide
interoperable public safety broadband
network. This input will be used by
NIST to help determine research and
development priorities in anticipation
of the President’s Wireless Innovation
(WIN) Fund to help drive innovation of
next-generation network technologies.
DATES: Comments are requested by 5
p.m. EDT on October 12, 2011.
ADDRESSES: Comments should be sent to
Dereck Orr, dereck.orr@nist.gov.
FOR FURTHER INFORMATION CONTACT:
Dereck Orr, Office of Law Enforcement
Standards, National Institute of
Standards and Technology, 325
Broadway, Boulder, Colorado 80305,
telephone number (303) 497–5400. Mr.
Orr’s e-mail address is
dereck.orr@nist.gov.
SUMMARY:
The
public safety community (law
enforcement, fire, and emergency
medical service) is experiencing a
generational shift in technology that
will revolutionize the way it
communicates. Traditionally,
emergency responders have used land
mobile radio technology. This
technology has limited data capabilities
and suffers from a large installed base of
thousands of stand-alone proprietary
systems with non-contiguous spectrum
assignments. As a result, public safety
has long struggled with effective crossagency/jurisdiction communications
and lags far behind the commercial
sector in data capability. Congressional
legislation has made broadband
spectrum that was cleared by the
transition from analog to digital
broadcast television (referred to as the
mstockstill on DSK4VPTVN1PROD with NOTICES
SUPPLEMENTARY INFORMATION:
VerDate Mar<15>2010
16:36 Sep 09, 2011
Jkt 223001
Digital Television (DTV) Transition)
available to public safety for broadband
communications. The newly available
spectrum will allow for a unified system
operating on common spectrum bands,
fostering nationwide roaming,
interoperability, and access to
broadband data. However, public safety
has several unique requirements that are
not currently reflected in broadband
technology.
In August 2010, the U.S. Department
of Justice Community Oriented Policing
Services (COPS) office held the National
Forum on Public Safety Broadband
Needs. More than 20 public safety
practitioners identified the following 15
operational requirements, each of which
relate to at least four overarching themes
(resiliency, availability and reliability,
security, and affordability/commercial
alignment):
(1) A dedicated high-quality network
connection always available for sending
and receiving continual data streams to
support monitoring and resource
tracking;
(2) At a minimum, access to initial
and updated basic incident information
(voice- and text-based incident data);
(3) An infrastructure that is hardened
and secure, providing a high level of
system availability;
(4) When voice is converged for
normal operations and in the event the
infrastructure is compromised, public
safety communications must remain
stable and with clear voice
communications;
• Infrastructure-less communications,
with talk-around for the ability to talk
one-to-one and one-to-many
• Optimal audio quality during
adverse field conditions
• No latency on mission critical voice
applications
(5) Geographic coverage that has no
limitations within the footprint of the
National Public Safety Broadband
Network;
(6) Dynamic management and control
of the network;
(7) Interoperability, including with
existing public safety-based systems;
(8) Ability to send and receive large
amounts of information;
(9) A non-proprietary network based
on industry standards;
(10) Single devices that support voice,
video, and data;
(11) Access to and from external
information sources;
(12) Easy integration with other
technologies;
(13) Automatic management and
control of the network;
(14) Current and future enhancements
available to commercial consumers are
provided to public safety with no
limitations; and
PO 00000
Frm 00025
Fmt 4703
Sfmt 4703
56165
(15) Ability to send, receive, and
process information from the public
(citizens and media).
The COPS report is available at:
https://www.cops.usdoj.gov/files/RIC/
Publications/e021111338-broadbandforum.pdf.
Since then, the Obama
Administration has announced its
support for legislation that would create
a not-for-profit Public Safety Broadband
Corporation to oversee the deployment
of a nationwide network that meets the
needs of local, state, Tribal, and Federal
public safety communities.1 The
Administration has also proposed a $3
billion WIN Fund to help drive
innovation through research,
experimentation, testbeds, and applied
development. Of the $3 billion, $500
million will be devoted to research and
development (R&D) for the new public
safety broadband network.2 The Public
Safety Innovation Fund (PSIF), NIST’s
component of the proposed WIN Fund,
helps spur the development of cuttingedge wireless technologies. NIST is
working with industry, its Federal
partners and public safety organizations
to conduct R&D to support new
standards, technologies and
applications to advance public safety
communications. Core components of
this program include documenting
public safety requirements and driving
the adoption of those requirements into
the appropriate standards; developing
the capability for communications
between currently deployed public
safety narrowband systems and the
future nationwide broadband network;
and establishing a roadmap that seeks to
capture and address public safety’s
needs beyond what can be provided by
the current generation of broadband
technology and driving technological
progress in that direction. Through precompetitive research, development,
reference applications, and
demonstration projects, NIST will
accomplish these goals.
In pursuit of these goals, NIST seeks
comments on the following possible
features of the nationwide public safety
broadband network. These more
1 Comments of the National Telecommunications
and Information Administration before the Federal
Communications Commission in the matter of
Service Rules for the 698–747, 747–762 and 777–
792 Band (WT Docket No. 06–150); Implementing
a Nationwide, Broadband, Interoperable Public
Safety Network in the 700 MHz Band (PS Docket
No. 06–229); Amendment of Part 90 of the
Commission’s Rules (WP Docket No. 07–100).
https://www.ntia.doc.gov/filings/2011/NTIA_
Public_Safety_Network_Comments_06102011.pdf.
2 President Obama Details Plan to Win the Future
through Expanded Wireless Access. https://
www.whitehouse.gov/the-press-office/2011/02/10/
president-obama-details-plan-win-future-throughexpanded-wireless-access.
E:\FR\FM\12SEN1.SGM
12SEN1
mstockstill on DSK4VPTVN1PROD with NOTICES
56166
Federal Register / Vol. 76, No. 176 / Monday, September 12, 2011 / Notices
technical features were identified by the
NIST Visiting Committee on Advanced
Technology with the input of public
safety and their identified operational
requirements. Among other things, NIST
seeks to understand the extent to which
these features and requirements can be
satisfied through existing commercially
available technology or though
technology that could become available
in the relative short-term, assuming
appropriate research and development.
Information obtained from this
solicitation will be used to inform the
potential use of grant funds to spur
innovation in those areas not currently
commercialized.
Feature List (organized around the
four overarching themes noted above):
To ensure resiliency in an emergency:
• Resiliency: The ability of operable
systems to recover from mishap, change,
misfortune, or variation in mission or
operating requirements.3
• Self-Organizing: Self-organizing
networks dynamically manage their
own configuration by automatically
making changes to ensure messages
reach their destinations.4
• Meshing (ad-hoc device-to-device
communication): A type of networking
where each node must not only capture
and disseminate its own data, but also
serve as a relay for other sensor nodes,
that is, it must collaborate to propagate
the data in the network.5
• Adaptability: The ability of the
network and/or device to modify/
change behavior based upon external
conditions.
To ensure reliability and availability:
• Prioritization: The ability to
prioritize network traffic based on
assigned priority schemes.
• Quality of Service (QoS): The set of
standards and mechanisms for ensuring
high-quality performance for critical
applications. By using QoS
mechanisms, network administrators
can use existing resources efficiently
and ensure the required level of service
without reactively expanding or overprovisioning their networks. The goal of
QoS is to provide preferential delivery
service for the applications that need it
by ensuring sufficient bandwidth,
controlling latency and jitter, and
reducing data loss.6
To enable security:
• Strong, Dynamic Access Control:
Access control lists can be configured to
3 https://publicsafety.fcc.gov/pshs/clearinghouse/
core-concepts/resiliency.htm.
4 https://www.wina.org/WireSol/Documents/
Whitepaper%20-%20Self%20Organizing%20
Networks%20for%20In-Plant%20Applications.pdf.
5 https://en.wikipedia.org/wiki/Mesh_networking.
6 https://technet.microsoft.com/en-us/library/
cc757120(WS.10).aspx.
VerDate Mar<15>2010
16:36 Sep 09, 2011
Jkt 223001
control both inbound and outbound
traffic on networks and authentication/
verification of users/devices on the
network.7 The level of access control
should be sufficient to allow for entree
into a broad set of systems and
databases needed by public safety (e.g.,
criminal history databases, medical
records, public work records, etc.).
To ensure affordability/commercial
alignment:
• Compatibility with Commercial
Infrastructure: The utilization of a
variety of commercial services when
public safety is in areas not covered by
the public safety broadband network.
• Network sharing: The shared use of
infrastructure between commercial and
public safety users.
• Multi-Modal: The ability of the
network to support voice, video, data,
and multimedia simultaneously.
• Scalability: The ability of a system,
network, or process to handle growing
amounts of work in a graceful manner
or its ability to be enlarged to
accommodate that growth.8 At the
design phase, this could include
requirements to ensure that scalability
can be achieved, to the extent possible,
by software enhancements and upgrades
as opposed to by hardware
replacements. Scalability also includes
the need, in the case of a large scale
event, to accommodate a rapid increase
in the number of users in a limited
geographic area.
• Power Awareness: The ability of
network/devices to control power
functions.
• Standardized Common Interfaces:
Protocols, Application Program
Interfaces, application platforms, radio
capabilities, etc. that allow for
competitive provisioning.
• Uniform, Universal Access: The
ability to access the network and data
anywhere at any time through any
device.
Request for Comments
For each feature listed above, NIST is
requesting input on the following:
• Your assessment of the importance
of the feature in relation to a
Nationwide Public Safety Broadband
Network;
• Current gaps that exist preventing
the realization of the full potential of the
feature;
• Possible research and development
that could take place to close any
technical gaps;
• Any challenges that public safety
could face in realizing the full potential
7 https://en.wikipedia.org/wiki/Access_
control_list.
8 https://en.wikipedia.org/wiki/Scalability.
PO 00000
Frm 00026
Fmt 4703
Sfmt 4703
of these features given currently
implemented solutions;
• Best practices from other industries
that could be leveraged to expedite
public safety’s realization of these key
features.
Additionally, NIST is requesting
input on the following further
considerations for the nationwide
public safety network:
• What is the importance of
employing open standards for the
nationwide public safety network?
• What is the need, if any, for
commonality of functions across the
system?
• What is the importance of a multivendor environment for the network
and what are the lessons learned in
deploying a multi-vendor environment
from the cellular and other industries?
• What can be done to ensure both
short- and long-term affordability of the
network for all types of public safety
agencies?
• In a recent report, the President’s
Council of Advisors on Science and
Technology suggested the need to
develop methods for implementing a
‘‘survivable core’’ of cyber-infrastructure
that would be relied upon to provide
truly essential services in the event of a
catastrophic cyber-attack.9 Please
comment on how NIST should pursue
this recommendation. Among other
things, commenters should address
whether the goal should be to design a
separate survivable core that is
integrated and interoperable with the
primary public safety network, or
instead to design the primary network
such that it can reconstitute rapidly—
following a catastrophic event—to
achieve some ‘‘core’’ level of service.
• What is the marginal cost of the
feature/functionality versus equipment
available today?
• What network features or
requirements have not been identified
above, the lack of which may impair the
network’s ability to adequately serve the
needs of public safety?
• How should NIST engage public
safety practitioners and technologists as
part of the planned R&D projects to
ensure proper prioritization of efforts
and effectiveness of developed
solutions?
This request for information coincides
with other work NIST is doing to
support the nationwide public safety
broadband network, including a
demonstration network from the Public
9 President’s Council of Advisors on Science and
Technology, Report to the President and Congress
(Dec. 2010) (https://www.whitehouse.gov/sites/
default/files/microsites/ostp/pcast-nitrd-report2010.pdf), pp. 55–56.
E:\FR\FM\12SEN1.SGM
12SEN1
Federal Register / Vol. 76, No. 176 / Monday, September 12, 2011 / Notices
Safety Communications Research
program in Boulder, Colorado.10
Dated: September 6, 2011.
Willie E. May,
Associate Director for Laboratory Programs.
[FR Doc. 2011–23180 Filed 9–9–11; 8:45 am]
BILLING CODE 3510–13–P
DEPARTMENT OF COMMERCE
National Oceanic and Atmospheric
Administration
RIN 0648–XA681
Marine Mammals; Pinniped Removal
Authority
National Marine Fisheries
Service (NMFS), National Oceanic and
Atmospheric Administration (NOAA),
Commerce.
ACTION: Notice; request for comments.
AGENCY:
NMFS received an
application under section 120 of the
Marine Mammal Protection Act
(MMPA) from the states of Idaho,
Oregon and Washington (states)
requesting authorization to intentionally
take, by lethal methods, individually
identifiable California sea lions
(Zalophus californianus) that prey on
Pacific salmon and steelhead
(Onchorhyncus spp.) listed as
threatened or endangered under the
Endangered Species Act (ESA) in the
Columbia River in Washington and
Oregon. This authorization is requested
as part of a larger effort to protect and
recover listed salmonid stocks in the
river. Pursuant to the MMPA, NMFS has
determined that the application
contains sufficient information to
warrant convening a Pinniped-Fishery
Interaction Task Force (Task Force),
which will occur after the close of the
public comment period. NMFS solicits
comments on the application and other
relevant information related to pinniped
predation at Bonneville Dam.
DATES: Comments and information must
be received by October 12, 2011.
ADDRESSES: You may submit comments,
identified by NOAA–NMFS–2011–0216,
by any of the following methods:
Electronic Submissions: Submit all
electronic public comments via the
Federal eRulemaking Portal https://
www.regulations.gov.
Mail: Comments on the application
should be addressed to: Assistant
Regional Administrator, Protected
Resources Division, NMFS, 1201 NE.
Lloyd Blvd., Suite 1100, Portland, OR
97232.
mstockstill on DSK4VPTVN1PROD with NOTICES
SUMMARY:
10 https://www.pscr.gov/projects/broadband/
700mhz_demo_net/700mhz_ps_demo_net.php.
VerDate Mar<15>2010
16:36 Sep 09, 2011
Jkt 223001
Instructions: All comments received
are a part of the public record and will
generally be posted to https://
www.regulations.gov without change.
All Personal Identifying Information (for
example, name, address, etc.)
voluntarily submitted by the commenter
may be publicly accessible. Do not
submit Confidential Business
Information or otherwise sensitive or
protected information.
NMFS will accept anonymous
comments (enter N/A in the required
fields, if you wish to remain
anonymous). You may submit
attachments to electronic comments in
Microsoft Word, Excel, or Adobe PDF
file formats only.
FOR FURTHER INFORMATION CONTACT:
Garth Griffin, (503) 231–2005 or Brent
Norberg (206) 526–6550 or Shannon
Bettridge, (301) 427–8402.
SUPPLEMENTARY INFORMATION:
Electronic Access
Further information is available via
the Internet, including the states’
application, background information on
pinniped predation on listed salmonids,
NMFS’ past authorizations of lethal
removal at Bonneville Dam,
descriptions of nonlethal efforts to
address the predation, NMFS’ 2008
Final Environmental Assessment, and
2011 Supplemental Information Report
to the 2008 Final Environmental
Assessment. The Internet address is:
https://www.nwr.noaa.gov/MarineMammals/Seals-and-Sea-Lions/Sec-120Authority.cfm
Statutory Authority
Section 120 of the MMPA (16 U.S.C.
1361, et seq.) allows the Secretary of
Commerce, acting through the Assistant
Administrator for Fisheries (Assistant
Administrator), NMFS, to authorize the
intentional lethal taking of individually
identifiable pinnipeds that are having a
significant negative impact on the
decline or recovery of salmonids that
are listed as threatened or endangered
under the ESA. The authorization
applies only to pinnipeds that are not
listed under the ESA, or designated as
a depleted or strategic stock under the
MMPA. Pursuant to section 120(b) and
(c), a state may request authorization to
lethally remove pinnipeds, and the
Assistant Administrator is required to:
(1) Review the application to determine
whether the applicant has produced
sufficient evidence to warrant
establishing a Task Force to address the
situation described in the application;
(2) Establish the Task Force and publish
a notice in the Federal Register
requesting public comment on the
PO 00000
Frm 00027
Fmt 4703
Sfmt 4703
56167
application if sufficient evidence has
been produced; (3) Consider any
recommendations made by the Task
Force in making a determination
whether to approve or deny the
application; and (4) If approved,
immediately takes steps to implement
the intentional lethal taking, which
shall be performed by Federal or state
agencies, or qualified individuals under
contract to such agencies.
The MMPA requires the Task Force be
composed of the following: (1) NMFS/
NOAA staff, (2) scientists who are
knowledgeable about the pinniped
interaction, (3) representatives of
affected conservation and fishing
community organizations, (4) treaty
Indian tribes, (5) the states, and (6) such
other organizations as NMFS deems
appropriate. The Task Force reviews the
application, other background
information, the factors contained in
section 120(d), and public comments
and, as required by section 120,
recommends to NMFS whether to
approve or deny the application. The
Task Force is also required to submit
with its recommendation a description
of the specific pinniped individual or
individuals; the proposed location,
time, and method of such taking; criteria
for evaluating the success of the action;
the duration of the intentional lethal
taking authority; and a suggestion for
non-lethal alternatives, if available and
practicable, including a recommended
course of action.
Background
In December 2006, NMFS received an
application co-signed by the
Washington Department of Fish and
Wildlife, the Oregon Department of Fish
and Wildlife, and the Idaho Department
of Fish and Game requesting
authorization to intentionally take, by
lethal methods, individually identifiable
California sea lions in the Columbia
River, which are having a significant
negative impact on the recovery of
threatened and endangered Pacific
salmon and steelhead. After deeming
the states’ application complete, NMFS
published a notice in the Federal
Register seeking public comment on the
application and also requested names of
potential members of the Task Force
(see 72 FR 4239, January 30, 2007). After
the close of the public comment period,
NMFS announced the formation of the
Task Force, which consisted of 18
members (72 FR 44833, August 9, 2007).
The notice also identified a list of
questions that NMFS considered
relevant to its section 120 decisionmaking process. The Task Force
completed and submitted its report to
NMFS on November 5, 2007. Of the 18
E:\FR\FM\12SEN1.SGM
12SEN1
Agencies
[Federal Register Volume 76, Number 176 (Monday, September 12, 2011)]
[Notices]
[Pages 56165-56167]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2011-23180]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket No.: 110727437-1433-01]
Soliciting Input on Research and Development Priorities for
Desirable Features of a Nationwide Public Safety Broadband Network
AGENCY: National Institute of Standards and Technology, Department of
Commerce.
ACTION: Notice and request for comment.
-----------------------------------------------------------------------
SUMMARY: The U.S. Department of Commerce's (DoC) National Institute of
Standards and Technology (NIST) is seeking input on various possible
features of a new nationwide interoperable public safety broadband
network. This input will be used by NIST to help determine research and
development priorities in anticipation of the President's Wireless
Innovation (WIN) Fund to help drive innovation of next-generation
network technologies.
DATES: Comments are requested by 5 p.m. EDT on October 12, 2011.
ADDRESSES: Comments should be sent to Dereck Orr, dereck.orr@nist.gov.
FOR FURTHER INFORMATION CONTACT: Dereck Orr, Office of Law Enforcement
Standards, National Institute of Standards and Technology, 325
Broadway, Boulder, Colorado 80305, telephone number (303) 497-5400. Mr.
Orr's e-mail address is dereck.orr@nist.gov.
SUPPLEMENTARY INFORMATION: The public safety community (law
enforcement, fire, and emergency medical service) is experiencing a
generational shift in technology that will revolutionize the way it
communicates. Traditionally, emergency responders have used land mobile
radio technology. This technology has limited data capabilities and
suffers from a large installed base of thousands of stand-alone
proprietary systems with non-contiguous spectrum assignments. As a
result, public safety has long struggled with effective cross-agency/
jurisdiction communications and lags far behind the commercial sector
in data capability. Congressional legislation has made broadband
spectrum that was cleared by the transition from analog to digital
broadcast television (referred to as the Digital Television (DTV)
Transition) available to public safety for broadband communications.
The newly available spectrum will allow for a unified system operating
on common spectrum bands, fostering nationwide roaming,
interoperability, and access to broadband data. However, public safety
has several unique requirements that are not currently reflected in
broadband technology.
In August 2010, the U.S. Department of Justice Community Oriented
Policing Services (COPS) office held the National Forum on Public
Safety Broadband Needs. More than 20 public safety practitioners
identified the following 15 operational requirements, each of which
relate to at least four overarching themes (resiliency, availability
and reliability, security, and affordability/commercial alignment):
(1) A dedicated high-quality network connection always available
for sending and receiving continual data streams to support monitoring
and resource tracking;
(2) At a minimum, access to initial and updated basic incident
information (voice- and text-based incident data);
(3) An infrastructure that is hardened and secure, providing a high
level of system availability;
(4) When voice is converged for normal operations and in the event
the infrastructure is compromised, public safety communications must
remain stable and with clear voice communications;
Infrastructure-less communications, with talk-around for
the ability to talk one-to-one and one-to-many
Optimal audio quality during adverse field conditions
No latency on mission critical voice applications
(5) Geographic coverage that has no limitations within the
footprint of the National Public Safety Broadband Network;
(6) Dynamic management and control of the network;
(7) Interoperability, including with existing public safety-based
systems;
(8) Ability to send and receive large amounts of information;
(9) A non-proprietary network based on industry standards;
(10) Single devices that support voice, video, and data;
(11) Access to and from external information sources;
(12) Easy integration with other technologies;
(13) Automatic management and control of the network;
(14) Current and future enhancements available to commercial
consumers are provided to public safety with no limitations; and
(15) Ability to send, receive, and process information from the
public (citizens and media).
The COPS report is available at: https://www.cops.usdoj.gov/files/RIC/Publications/e021111338-broadband-forum.pdf.
Since then, the Obama Administration has announced its support for
legislation that would create a not-for-profit Public Safety Broadband
Corporation to oversee the deployment of a nationwide network that
meets the needs of local, state, Tribal, and Federal public safety
communities.\1\ The Administration has also proposed a $3 billion WIN
Fund to help drive innovation through research, experimentation,
testbeds, and applied development. Of the $3 billion, $500 million will
be devoted to research and development (R&D) for the new public safety
broadband network.\2\ The Public Safety Innovation Fund (PSIF), NIST's
component of the proposed WIN Fund, helps spur the development of
cutting-edge wireless technologies. NIST is working with industry, its
Federal partners and public safety organizations to conduct R&D to
support new standards, technologies and applications to advance public
safety communications. Core components of this program include
documenting public safety requirements and driving the adoption of
those requirements into the appropriate standards; developing the
capability for communications between currently deployed public safety
narrowband systems and the future nationwide broadband network; and
establishing a roadmap that seeks to capture and address public
safety's needs beyond what can be provided by the current generation of
broadband technology and driving technological progress in that
direction. Through pre-competitive research, development, reference
applications, and demonstration projects, NIST will accomplish these
goals.
---------------------------------------------------------------------------
\1\ Comments of the National Telecommunications and Information
Administration before the Federal Communications Commission in the
matter of Service Rules for the 698-747, 747-762 and 777-792 Band
(WT Docket No. 06-150); Implementing a Nationwide, Broadband,
Interoperable Public Safety Network in the 700 MHz Band (PS Docket
No. 06-229); Amendment of Part 90 of the Commission's Rules (WP
Docket No. 07-100). https://www.ntia.doc.gov/filings/2011/NTIA_Public_Safety_Network_Comments_06102011.pdf.
\2\ President Obama Details Plan to Win the Future through
Expanded Wireless Access. https://www.whitehouse.gov/the-press-office/2011/02/10/president-obama-details-plan-win-future-through-expanded-wireless-access.
---------------------------------------------------------------------------
In pursuit of these goals, NIST seeks comments on the following
possible features of the nationwide public safety broadband network.
These more
[[Page 56166]]
technical features were identified by the NIST Visiting Committee on
Advanced Technology with the input of public safety and their
identified operational requirements. Among other things, NIST seeks to
understand the extent to which these features and requirements can be
satisfied through existing commercially available technology or though
technology that could become available in the relative short-term,
assuming appropriate research and development. Information obtained
from this solicitation will be used to inform the potential use of
grant funds to spur innovation in those areas not currently
commercialized.
Feature List (organized around the four overarching themes noted
above):
To ensure resiliency in an emergency:
Resiliency: The ability of operable systems to recover
from mishap, change, misfortune, or variation in mission or operating
requirements.\3\
---------------------------------------------------------------------------
\3\ https://publicsafety.fcc.gov/pshs/clearinghouse/core-concepts/resiliency.htm.
---------------------------------------------------------------------------
Self-Organizing: Self-organizing networks dynamically
manage their own configuration by automatically making changes to
ensure messages reach their destinations.\4\
---------------------------------------------------------------------------
\4\ https://www.wina.org/WireSol/Documents/Whitepaper%20-%20Self%20Organizing%20Networks%20for%20In-Plant%20Applications.pdf.
---------------------------------------------------------------------------
Meshing (ad-hoc device-to-device communication): A type of
networking where each node must not only capture and disseminate its
own data, but also serve as a relay for other sensor nodes, that is, it
must collaborate to propagate the data in the network.\5\
---------------------------------------------------------------------------
\5\ https://en.wikipedia.org/wiki/Mesh_networking.
---------------------------------------------------------------------------
Adaptability: The ability of the network and/or device to
modify/change behavior based upon external conditions.
To ensure reliability and availability:
Prioritization: The ability to prioritize network traffic
based on assigned priority schemes.
Quality of Service (QoS): The set of standards and
mechanisms for ensuring high-quality performance for critical
applications. By using QoS mechanisms, network administrators can use
existing resources efficiently and ensure the required level of service
without reactively expanding or over-provisioning their networks. The
goal of QoS is to provide preferential delivery service for the
applications that need it by ensuring sufficient bandwidth, controlling
latency and jitter, and reducing data loss.\6\
---------------------------------------------------------------------------
\6\ https://technet.microsoft.com/en-us/library/cc757120(WS.10).aspx.
---------------------------------------------------------------------------
To enable security:
Strong, Dynamic Access Control: Access control lists can
be configured to control both inbound and outbound traffic on networks
and authentication/verification of users/devices on the network.\7\ The
level of access control should be sufficient to allow for entree into a
broad set of systems and databases needed by public safety (e.g.,
criminal history databases, medical records, public work records,
etc.).
---------------------------------------------------------------------------
\7\ https://en.wikipedia.org/wiki/Access_control_list.
---------------------------------------------------------------------------
To ensure affordability/commercial alignment:
Compatibility with Commercial Infrastructure: The
utilization of a variety of commercial services when public safety is
in areas not covered by the public safety broadband network.
Network sharing: The shared use of infrastructure between
commercial and public safety users.
Multi-Modal: The ability of the network to support voice,
video, data, and multimedia simultaneously.
Scalability: The ability of a system, network, or process
to handle growing amounts of work in a graceful manner or its ability
to be enlarged to accommodate that growth.\8\ At the design phase, this
could include requirements to ensure that scalability can be achieved,
to the extent possible, by software enhancements and upgrades as
opposed to by hardware replacements. Scalability also includes the
need, in the case of a large scale event, to accommodate a rapid
increase in the number of users in a limited geographic area.
---------------------------------------------------------------------------
\8\ https://en.wikipedia.org/wiki/Scalability.
---------------------------------------------------------------------------
Power Awareness: The ability of network/devices to control
power functions.
Standardized Common Interfaces: Protocols, Application
Program Interfaces, application platforms, radio capabilities, etc.
that allow for competitive provisioning.
Uniform, Universal Access: The ability to access the
network and data anywhere at any time through any device.
Request for Comments
For each feature listed above, NIST is requesting input on the
following:
Your assessment of the importance of the feature in
relation to a Nationwide Public Safety Broadband Network;
Current gaps that exist preventing the realization of the
full potential of the feature;
Possible research and development that could take place to
close any technical gaps;
Any challenges that public safety could face in realizing
the full potential of these features given currently implemented
solutions;
Best practices from other industries that could be
leveraged to expedite public safety's realization of these key
features.
Additionally, NIST is requesting input on the following further
considerations for the nationwide public safety network:
What is the importance of employing open standards for the
nationwide public safety network?
What is the need, if any, for commonality of functions
across the system?
What is the importance of a multi-vendor environment for
the network and what are the lessons learned in deploying a multi-
vendor environment from the cellular and other industries?
What can be done to ensure both short- and long-term
affordability of the network for all types of public safety agencies?
In a recent report, the President's Council of Advisors on
Science and Technology suggested the need to develop methods for
implementing a ``survivable core'' of cyber-infrastructure that would
be relied upon to provide truly essential services in the event of a
catastrophic cyber-attack.\9\ Please comment on how NIST should pursue
this recommendation. Among other things, commenters should address
whether the goal should be to design a separate survivable core that is
integrated and interoperable with the primary public safety network, or
instead to design the primary network such that it can reconstitute
rapidly--following a catastrophic event--to achieve some ``core'' level
of service.
---------------------------------------------------------------------------
\9\ President's Council of Advisors on Science and Technology,
Report to the President and Congress (Dec. 2010) (https://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-nitrd-report-2010.pdf), pp. 55-56.
---------------------------------------------------------------------------
What is the marginal cost of the feature/functionality
versus equipment available today?
What network features or requirements have not been
identified above, the lack of which may impair the network's ability to
adequately serve the needs of public safety?
How should NIST engage public safety practitioners and
technologists as part of the planned R&D projects to ensure proper
prioritization of efforts and effectiveness of developed solutions?
This request for information coincides with other work NIST is
doing to support the nationwide public safety broadband network,
including a demonstration network from the Public
[[Page 56167]]
Safety Communications Research program in Boulder, Colorado.\10\
---------------------------------------------------------------------------
\10\ https://www.pscr.gov/projects/broadband/700mhz_demo_net/700mhz_ps_demo_net.php.
Dated: September 6, 2011.
Willie E. May,
Associate Director for Laboratory Programs.
[FR Doc. 2011-23180 Filed 9-9-11; 8:45 am]
BILLING CODE 3510-13-P