User:Telecom881/backup material

Summary
As described above, the solution to the so called "interoperability problem" in which "people cannot talk to each other" has many underlying requirements necessary to provide a complete solution. Below is a list of those requirements. Although the overall list may seem intimidating, upon careful examination of each item, all are required to provide a complete and effective solution.


 * 1) Maintain jurisdictional integrity through sovereign control of communications resources
 * 2) Compliant with DHS requirements as stated in the National Response Framework, National Response Plan, and National Incident Management System guidelines and requirements
 * 3) Allow the formulation of ad hoc collaboration groups to accommodate unforeseen resource combinations
 * 4) Allow the rapid establishment of collaboration session with pre-defined user groups
 * 5) Support multiple exclusive collaboration sessions
 * 6) Simple and fast movement of participants from one session to another
 * 7) Useful in a day-to-day use to improve normal communications and help insure user familiarity during high stress emergency situations
 * 8) Simple graphic user interface with drag and drop capabilities requiring minimal training of personnel
 * 9) Support fixed location, in field, and mobile establishment, monitoring, and control of collaboration sessions
 * 10) Support for both real time voice and video communications systems in a variety of analog and digital formats and protocols
 * 11) Accommodate legacy communications systems of varying protocols and capabilities
 * 12) Be independent of radio channel frequencies or FCC usage restrictions
 * 13) Support communications systems including:
 * 14) Land Mobile Radio (conventional and trunked system)
 * 15) Nextel™
 * 16) Cellular
 * 17) Push to Talk Cellular
 * 18) POTS and ISDN Telephone Service
 * 19) Intercom and Public Address Systems
 * 20) Analog Video
 * 21) Digital Video
 * 22) Support file and image sharing between endpoint devices and agencies
 * 23) Accommodate incremental expansion of entities
 * 24) Accommodate incremental expansion of communications sub-systems as they are added or changed
 * 25) Encrypted, authenticated, and authorized communications secure connects for among all components
 * 26) Peer-to-peer architecture to provide increased robustness and avoid network bottlenecks
 * 27) Support for wireline and wireless connectivity in any combination among endpoint devices
 * 28) Automatic discovery and availability of resources as they join the network
 * 29) Support for automatic backup of network connections with automatic restoration of active collaboration sessions
 * 30) Background continuous monitoring of communications to all end point devices to identify network or device degradation or failures