Presentation Material ● PAR ● 5 Criteria ● ✔ Problem tutorial ● ✔ Why VoIP doesn't work today ● ✔ What is needed to fix it ● ✔ Working with ECRIT should.

Slides:



Advertisements
Similar presentations
Submissions November 2007 Stephen McCann, NSNSlide 1 IEEE 802 Emergency Services (ES) Call for Interest (CFI) Date: Stephen McCann
Advertisements

Ecrit-unauthenticated-access IETF 75, Stockholm July 29, 2009 Hannes Tschofenig (attending virtually) Dirk Kroeselberg.
VoIP - Australian Regulatory Practice and Directions Duncan MacAuslan Task Coordinator - VoIP ITP Training September 2006.
IETF ECRIT SDO Emergency Services Coordination Workshop 5 & 6 Oct 2006 – New York Alain Van Gaever DG Information Society & Media European Commission.
What is voice over IP The future of Voice over IP How Voice over IP will affect 911 calls How Voice over IP can be used to assist the 911 Dispatch Centers.
Brian Rosen Chair, Long Term Definition WG.  i1 = document older strategies for VoIP into  i2 = standard way to support VoIP on current E9-1-1.
IPv4 to IPv6 Migration strategies. What is IPv4  Second revision in development of internet protocol  First version to be widely implied.  Connection.
Emergency Services IAB Tech Chat 28 th February 2007 Hannes Tschofenig.
Voice Over Internet Protocol “VoIP” Muayyed Al Kadhem Abdulkhaleq Al Musaleem.
Trustworthy Location Information draft-tschofenig-ecrit-trustworthy- location draft-tschofenig-ecrit-trustworthy- location Hannes Tschofenig, Henning Schulzrinne.
Long Term Definition Because the VoIP world is SO different from the current environment, we have to go back to basic requirements: –Identify a call as.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 14 Introduction to Networks and the Internet.
Networking Components Chad Benedict – LTEC
IEEE Emergency Services DCN: Title: call flow for Layer 2 support for unauthenticated requests Date.
Ernst Langmantel Technical Director, Austrian Regulatory Authority for Broadcasting and Telecommunication (RTR GmbH) The opinions expressed in this presentation.
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
ESW – May 2010 UK Architecture for VoIP 999/112s John Medland – BT 999/112 Policy Manager.
January 2005Rudolf, Kwak, Worstell1 VoIP in WLANs and E911 support Marian Rudolf, Joe Kwak, InterDigital; Harry Worstell, AT&T doc: IEEE /0014r0.
Basics of IP Telephony Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Access Control List ACL. Access Control List ACL.
1 CALEA and VoIP: The Internet is not the PSTN Steven M. Bellovin
Status and Development of VoIP based emergency calls Alexander Mayrhofer, nic.at GmbH The 1st European Security and Safety Summit Brussels, June 2007.
Applied Communications Technology Voice Over IP (VOIP) nas1, April 2012 How does VOIP work? Why are we interested? What components does it have? What standards.
Practical Considerations for supporting Emergency Calls Brian Rosen Emergicom.
IEEE “Green Book” This set of slides is a collection of presentations, motions and other material that has come before the Working Group.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
ENUM Presentation to Large Business User Panel 26 September 2001 Justin Moore.
Chapter 17 Internetworking: Concepts, Architecture, and Protocols
Response to Call Back questions IETF 77 – Anaheim Stephen McCann, RIM.
Mm/dd/yyyy802 Emergency Services Tutorial 2/4/2010 Con Call output This version is Geoff's edits as taken in the conference call. It includes implementation.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
1 “ ” Multiservice networking is emerging as a strategically important issue for enterprise and public service provider infrastructures alike.The proposition.
Rethinking Telephone Operations at UVA-Wise Oscar Raile, MBA Director for Policy and Planning UVa’s College at Wise.
Technical and Policy Considerations for Unified European Emergency Services Presented at EENA Brussels, 6.7 June, 2007.
Enhance Security of IP Network using New Architecture of Address Validation Xiaodong Duan China Mobile.
Doc.: IEEE /843r0 Submission Cheng Hong, Tan Pek-Yew, Panasonic Slide 1 November 2003 Interworking – WLAN Control Cheng Hong & Tan Pek Yew Panasonic.
Next Generation Networks Australian Communications Industry Forum (ACIF) ITU-T NGN Workshop, July 2003 Peter Darling Manager, ACIF NGN Project.
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
TUTORIAL (1) Why 802 needs an Emergency Services Project and what we think it should look like. Geoff Thompson/InterDigital Scott Henderson/RIM Others.
Presentation Material ● PAR ● 5 Criteria ● ✔ Problem tutorial ● ✔ Problem statement (2-6) ● ✔ Why VoIP doesn't work today (7-8) ● ✔ What ECRIT has done.
Networks – Network Fundamentals
9/29/2010 Con Call output This version is Geoff's rough edits as taken in the conference call. It includes Real time edits Further editing instructions.
Virtual Private Networks
IP Telephony (VoIP).
Mobile IP.
Authors – Johannes Krupp, Michael Backes, and Christian Rossow(2016)
Switching and High-Speed Networks
Outline Basics of network security Definitions Sample attacks
IEEE 802 wide project on Emergency Services
Henning Schulzrinne Stephen McCann Gabor Bajko Hannes Tschofenig
Using MIS Part 4 Information Systems Management 10th Edition
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Looking for Technical Support We happy helping our clients Call Now Toll-Free Get 24x7 Technical Support Netgear Router Care Service for Fix Netgear Router.
thrilling applications that will drive usage of 5G networks
Chapter 20 Network Layer: Internet Protocol
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
VPN What, where, who, why when?.
ENGR 475 – Telecommunications
WG11 response to Proposed 802 PAR - March Orlando Plenary
Feedback on New WG PARs from WG11 for July Plenary
Motivation, Terminology, Layered systems (and other random stuff)
Comments on PAR and 5C Date: Authors: March 2010
Communication Networks NETW 501 Tutorial 4
IEEE Emergency Services
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Protocol Layering - Introduction
Outline Basics of network security Definitions Sample attacks
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Chapter 8 – Data switching and routing
Presentation transcript:

Presentation Material ● PAR ● 5 Criteria ● ✔ Problem tutorial ● ✔ Why VoIP doesn't work today ● ✔ What is needed to fix it ● ✔ Working with ECRIT should be at least an 80% solution ● Possible technical concepts

TUTORIAL (1) Why 802 needs an Emergency Services Project and what we think it should look like. Geoff Thompson/InterDigital Scott Henderson/RIM 802 ES-ECSG

TUTORIAL (2) SUPPORT OF EMERGENCY SERVICES and THEIR (present and future) REGULATORY REQUIREMENTS FOR PACKET NETWORKS IS A HUGE, COMPLEX PROBLEM FOR WHICH THE PROBLEM ITSELF IS NOT YET FULLY DEFINED.

TUTORIAL (3) There are pieces of the ES problem that: ● Are well defined today ● Have existing regulatory requirements ● Are not addressed across 802.

TUTORIAL (4) The biggest piece: ● 802 originated (and VoIP originated) “calls” to the PSTN don't carry the information required for emergency calls (e.g. 911 calls) (There are proprietary exceptions) ● There are existing regulatory requirements for these calls that are not being met.

TUTORIAL (5) The IETF – ECRIT group has taken on the task of solving this problem for the upper layers 802 needs to work with ECRIT to provide a complete solution. The solution should look the same to ECRIT without regard to which 802 technology is in use.

TUTORIAL (6) Regulatory Requirements: ● Call request directed to the correct PSAP ● Provide calling party location ● Non-subscriber access to network ● PSAP can call back ● Very high priority ● Call integrity (no drop, spoof-proof)

TUTORIAL (7) What does ECRIT need from 802 to meet these requirements? ● Provide better location than just the router ● Emergency calls should be given network priority ● Callback is currently a problem ● Spoofing and security are issues ● Provide LOCAL connection (e.g. bypass various tunneling schemes) ● Provide service to unauthenticated user

TUTORIAL (8) Why VoIP doesn't work today: ● The Internet was designed to be “location neutral”. ● Traditional “911” was designed around and serviced by a localized static wired infrastructure (end office circuit switched systems) ● VoIP services are highly decentralized and often cross national boundaries (regulatory problem)

TUTORIAL (9) Why VoIP doesn't work today (cont'd): ● Today, the VoIP service provider has no knowledge of the callers location within the Internet (almost true) ● A PSAP has no prior knowledge that a caller is within their service area. ● Therefore associating caller and proper PSAP is a big problem ● VoIP service provider are not yet fully regulated, there are significant technical, geopolitical and legal jurisdiction problems involved.