Message Process/Flow

 

The illustrations below give an over-view of the messaging process used between the MDC workstation and the MDC Controller.  They also show, where the MDC Controller passes message transactions to the Crimestar Message Switch Gateway (MSG) product that those messages are also encrypted and an additional layer of device and user verification are performed before any transactions is submitted out to the state/NCIC systems.



Where Message output from either the MDC Workstation or MDC controller utilizes either the TCP or UDP protocols all messages could be routed thru the tunnel of a Virtual Private Network (VPN) for an additional layer of message security.

The MDC Controller performs device and user security verification on each message processed and performs either CAD or RMS (or Both) inquiries and transactions against the Crimestar Database.  In addition to local Crimestar RMS query transactions, if both device and user security authorization exists, query requests can be re-encrypted and forwarded to the Crimestar Message Switch Gateway (MSG) system (Licensed Separately) to submit those respective transactions to State/NCIC systems.

 

FOR OFFICIAL USE ONLY

 

See Also : RMS Entity Diagram
  E911 Network Communications
  MSG Hardware Installation Diagram w/o MDC
  MSG Hardware Installation Diagram + MDC
  MSG Secure Communications