+31(0)851119111 info@theipcompany.nl
WHAT’S UP, The IP Company

What’UP Damage control

What’UP is an automated self discovering damage control system. The What’UP damage control regulates, processes and analyses the impact of all selected operational functions and assesses any function suffering outages. Based on predefined scenarios What’UP effectively distributes tasks, alarms and warnings. It also controls messages to the responsible staff. Effective business continuity after a disaster is guaranteed with the What’UP messaging system. This is made possible by the automatic replication of the fail-over systems.

Impact scenarios

Impact scenarios form the basis of the What’UP messaging procedural recovery plans and damage reporting. What’UP stores automatic damage reporting procedures and disturbances in small disaster follow-up procedures (workflow). Small scale problems are  parental owners to large disasters.

A typical impact scenario like a (small) fire will most likely encompass some critical operational functions, resulting in the worst potential outcome from such a potential threat. Damage control and procedures to attack such disturbances are critical to ensure proper business operations. What’UP’s extensive inter-operability ensures the communication between different operational systems. The secure fault tolerant and resilient, fail-over operation of What’UP ensures that operational systems are kept up to date to counter any disturbance and/or emergency.

WHAT’S UP, The IP Company

WCMS PBX Application

The WCMS system is built on a Linux CentOS operating system using open source Asterisk software. Asterisk is a feature rich telecommunications platform (PBX), which serves as the basis for an enterprise-grade IP PBX. This platform provides tested reliability of critical functions and features and can be tailored for specific applications. The WCMS system builds on this platform to add naval functions.

Fortinet Wireless Network

The wireless network is based upon Fortinet equipment and software. The Fortinet system consists of a Virtual Controller and Access Points to create a virtualized wireless LAN, which connects the handhelds and other wireless hardware for seamless mobility. The Fortinet controller will manage the Access Points in such a way that the handheld device will only connect to one virtual Access Point. Normally when a device is out of range of a fixed Access Point, it will need to connect to another Access Point and all connections will need to be restarted during the handover. This takes time and resources and is inconvenient for streaming applications such as a phone conversation. With the Fortinet Access Point system all connections are moved seamlessly from one Access Point to another in range, meaning that the handheld user will not even realize that the handheld’s association was moved to another Access Point.

End station users such as handhelds, laptops, tablet PC’s and/or other similar devices are able to connect via the Access Points based on 802.11g, 802.11n or 802.11ac. The Fortinet controller software. It is also possible to create a virtual LAN (VLAN) for data to be exchanged with hardware such as tablets.

Specifications

The basic function of the Fortinet controller is a single point of configuration for the entire wireless network. The Access Points are controlled and configured by the Fortinet Controller. During the session lifetime of a wireless device, the Fortinet controller will define upon which Access Point the session will exist.  The virtual server needs the following minimum specifications: 3 x 3 GHz AMD or Intel x86 quad core processor, 2 GB memory and 2 GB disk space (min 150 IOPS).

General Description

The virtual machines come on an external hard drive. After installation the configuration can be imported into the system. The Fortinet Controller is the heart of the WCMS system and controls every connection to a wireless device on the Ship. The Fortinet Network solution utilises virtualisation technology to create an intelligent and self-monitoring wireless network. Where normal handover or roaming occurs with wireless communication, the Fortinet Controller defines when a device is transferred from one Access Point to another without the need for handover or roaming. The Fortinet Controller executes load balancing. For example: five users are connected to one Access Point and four users are busy on a phone conversation. If user number five then starts a phone call, the Fortinet Controller can move two users to another Access Point.

WHAT’S UP, The IP Company

Wi-Fi

The Fortinet Network provides single channel Wi-Fi architecture. This means that all Access Points (AP) are on the same channel, making Radio Frequency configuration and management easier. Furthermore, since one ‘network’ resides on one channel, you can actually layer multiple channels or networks to improve throughput and capacity, as well as separate applications and/or users on different physical networks/channels. By using this logic the Fortinet Controller defines when a device is transferred to another AP and not the client, because the client ‘thinks’ that there is only one AP. Since the client only sees one big access point, it will never be triggered to roam. The roaming decision is no longer taken by one component in the network, but by the controller which has the complete overview of the network. Roaming decisions are thus based upon AP load, AP throughput, number of clients, client signal strength, packet error and packet retries. The roaming itself happens in less than 2.5ms, regardless of the type of security used. This means that it is seamless for the client and guarantees overall seamless use over the network of voice, streaming video and real-time data.

 

Redundancy

There are two Fortinet Controllers necessary for redundancy and both are hosted in the network. The Fortinet Controllers will failover if one Fortinet Controller goes offline or is unusable, ensuring uninterrupted service. The rest of the Fortinet Controller equipment consists of access points.

Security

The Wireless Communication System is implemented with Wireless Access Points granting access to users the RADIUS protocol (remote user authentication and accounting). A separate virtual port is created for each device on the network. From a system administrator perspective, the Fortinet Controller is configurable from a single point. Instead of configuring all devices all over the Ship, one configuration is created and all devices are attached to that configuration. The Fortinet Controller uses the data link Layer 2 to communicate with the devices. No IP addresses are used in this protocol and the Fortinet AP will sign up with every Fortinet Controller they find in the network. The Fortinet Controller will apply RADIUS based MAC filtering, whereby device MAC addresses are set up and managed by a remote RADIUS Server. When a new device attempts to join the network, the Fortinet Controller queries the RADIUS server with the MAC address to determine whether the client is permitted or not.

A Wireless Voice over IP industry standard solution with secure Wi-Fi transmission between devices

What’s-Up

An adaptive, open messaging and workflow solution enabling tailor made structure

Security

·       Fault Tolerant
·       Conferencing
·       Push To Talk
·       ACD / IVR
·       Office telephony
·       Scalable
·       Voice recognition
·       Extensive Messaging

 

·       Ruggedized 
·       Resilient 
·       Radio Silence enabled 
·       Failover
·       Secure login
·       Automatic clean
·       Backup / restore
·       Easy roll-out 
·       Online management

 

·       Secure Warning and Alert Messaging
·       Task Workflow and escalation
·       High Available and Failover 
·       Scalable, interoperable secure interfacing with other systems*
·       Secure Monitoring and recording
·       Disaster and business continuity 

 

·       RF Barrier (Shielded Secure Environment)*
·       Radio Silence Enabled
·       Device “white list” Enabled
·       Secure Data Protection Enabled*
·       Online Device Properties management

 

The What’s-up messaging and communication platform enables full capabilities on telephone conversations like peer-to-peer dialing, name dialing, number dialing, conference calls, queues, ACD/IVR menu’s, outside dialing through GSM, Inmarsat, Iridium, HF channels, wall connections. Push To Talk is supported on every channel. Messaging – for example warnings and alerts based on functions, named users, qualifications and groups with ad hoc voice communication – gives the users of the system a quick win in communication while attending emergency situations or stressful operational tasks. Enabling ad hoc information retrieval from internal information systems connected to the system as an intranet with technical information or procedural information attending to an emergency / operational request. Tasks are added to the communication on the job, ensuring proper handling and a To-do list while attending to the day-to-day operations. The What’s-up (Warning, Host, Alert, Task, Support) system makes it possible to attend every situation with the right procedure and the skill, materials and requirements needed to attend to such diverse job circumstances. Enabling better results, higher quality and less costs with less crew members. The What’s-up management interface enables easy maintenance of the system and lower costs of ownership.

Industry standard solution with secure Wi-Fi transmission between devices. Handheld devices can be based on Windows Mobile and Google Open Source Android. Java driven technology for Mobile clients.

Handhelds have been selected based on the impact of industrial environments running Android OS being cheaper than normal Windows based handheld extensions. The Handheld has a big screen and is therefore easy to address and operate for choosing the right communication channels. It is enabled with a ruggedized headset. Auto provisioning makes it possible to enroll new devices and to update the handhelds without touching the handheld; making it easy to maintain the handheld from a centralized location. The handheld is optionally automatically cleaned when disconnected to the system. SIM card, data storage is disabled on the device for security reasons. WIFI connection is established based on WPA2, Radius and device fingerprinting enabling only connectivity to the system from permitted devices.

Delivery of Warnings, Alerts, Tasks and operational back-end connectivity support. Through a resilient network. What’s-up incorporates Service Level Agreements on messages, events and tasks. Extensive support for tailor made self-developed interfacing through specific Agents to ensure realization of your specific needs

What’s-up. The centralized messaging system enables the users to chat, voice, automatically message and register tasks; so communication flow is better handled with less people and less costs of ownership of a normal operating vessel. What’s-up scalability and open interconnectivity makes it possible to interact with Platform Management Systems (PMS), Combat Management Systems (CMS), Business Information systems (BIS) and other proprietary systems based on XML and/or secure connections. What’s-up logs every operation on the systems and location based services (locating the users in the vessel). These services are supported through the What’s-up interface.

Enabled by roaming profile on mobile devices. Easy to implement and maintain. Secured self-destructing data technology when a device is lost.

Based on the usage in the defence industry, high attention has been given to the security in the air and devices used. Voice is encrypted over the air, secure connections based on fingerprinting and radius have been implemented, MAC spoofing, DoS (Denial of Services) are detected and managed, usage is recorded and usage profiles and interaction based bandwidth are implemented to ensure proper security and proper normal usage. Peer-to-peer file transfers, Bluetooth and other “open” connectivity is blocked for usage. Clean sweep of handheld devices which are not connected, offline device management, MAC address, Whitelist and theft control are implemented in the security layer of the system. Enabling the highest security measurements possible for the industry.