ECRIT Basic Reqs draft-stastny-ecrit-requirements Richard Stastny Brian Rosen IETF62 Minneapolis.

Slides:



Advertisements
Similar presentations
Colombo, Sri Lanka, 7-10 April 2009 Preferential Telecommunications Service Access Networks Lakshmi Raman, Senior Staff Engineer Intellectual Ventures.
Advertisements

Communication Service Identifier Requirements on SIP draft-loreto-3gpp-ics-requirements.txt
Additional Data related to an Emergency Call draft-ietf-ecrit-additional-data-00.txt Hannes Tschofenig Brian Rosen.
Telecommunication Relay Service (TRS) Emergency Call Handling Federal Communications Commission Emergency Access Advisory Committee January 14, 2011.
The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999.
NENA Development Conference | October 2014 | Orlando, Florida NG9-1-1 PSAP Requirements and Standards Michael Smith, DSS Mike Vislocky, Network Orange.
August 2005IETF 63 VOIPEER1 Issues in Numbering, Naming and Addressing voipeer BoF IETF 63 – Paris, August 2005 Richard Stastny ÖFEG.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Origins of ECRIT IETF has been working on location since 2000 –Spatial BoF, eventually GEOPRIV chartered in 2001 GEOPRIV provides location information.
Prepare for the future  The de-perimeterised “road-warrior”  Paul Simmonds ICI Plc. & Jericho Forum Board.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Final (Part A) Presentation 31/10/04 Virtual Traffic Signal Presented by: Ron Herman Ofir Shentzer Instructor: Mr. Mony Orbach Technion – Israel Institute.
1 Enabling Secure Internet Access with ISA Server.
Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA.
Session-ID Requirements for IETF84 draft-ietf-insipid-session-id-reqts-00 1 August 2012 Paul Jones, Gonzalo Salgueiro, James Polk, Laura Liess, Hadriel.
SIP Action Referral Rifaat Shekh-Yusef Cullen Jennings Alan Johnston Francois Audet 1 IETF 80, SPLICES WG, Prague March 29, 2011.
Authorization architecture sketches draft-selander-core-access-control-02 draft-gerdes-core-dcaf-authorize-02 draft-seitz-ace-design-considerations-00.
1 RTCWEB interim Remote recording use case / requirements John Elwell.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Emergency calls related work done in IETF Gabor Bajko May 22, 2006.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
NG911 technology Henning Schulzrinne
AS Level ICT Mrs. Ghazaal. In the past, when a customer wanted to talk to someone in a company they would usually be able to telephone and be put through.
DEMIGUISE STORAGE An Anonymous File Storage System VIJAY KUMAR RAVI PRAGATHI SEGIREDDY COMP 512.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
NENA Next Generation Architecture
Lecturer: Ghadah Aldehim
Overview of SIP Forum Video Relay Service (VRS) Initiative Brian Rosen Task Group Chair Spencer Dawkins SIP Forum Technical Director.
HTTP HTTP stands for Hypertext Transfer Protocol. It is an TCP/IP based communication protocol which is used to deliver virtually all files and other.
ACTN Use Case for Multi Domain Data Center Transport Interconnect draft-fang-actn-multidomain-dci-00.txt Luyuan Fang, Microsoft ACTN BoF, IETF 90, July.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Status and Development of VoIP based emergency calls Alexander Mayrhofer, nic.at GmbH The 1st European Security and Safety Summit Brussels, June 2007.
Using Web Services to Create Events Web Services Explained And a Production Ready Example.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
1 Location Hiding Henning Schulzrinne Laura Liess Hannes Tschofenig.
Draft-polk-ecrit-mapping-events-00 James Polk March 21 st, 2006.
Introduction to SIP Larry Amiot Northwestern University Internet2 Commons Site Coordinator Training March 22, 2004 Indianapolis,
1January 2006Richard Stastny Developments around Infrastucture ENUM and their relevance on NGNs Workshop on NGN Interconnection and Numbering TRIS – TISPAN.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
November 2005IETF64 - ECRIT1 Emergency Service Identifiers draft-ietf-sipping-sos-01 draft-schulzrinne-sipping-service-01 Henning Schulzrinne Columbia.
Networking Components Michelle Vega Network System Administrations LTEC /026 Mr. West.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Greenstone Internals How to Build a Digital Library Ian H. Witten and David Bainbridge.
1 IETF 76 Hiroshima DISPATCH WG SIP Alert-Info URN draft-liess-dispatch-alert-info-urns-00 Denis Alexeitsev Laura Liess
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Page 1 IETF Speermint Working Group Speermint Requirements/Guidelines for SIP session peering draft-ietf-speermint-requirements-02 IETF 69 - Monday July.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
March 20, 2007BLISS BOF IETF-681 Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol.
Enumservice VOID draft-stastny-enum-void-00 Richard Stastny Lawrence Conroy IETF60 San Diego.
Diameter Parameter Query draft-winterbottom-dime-param-query-01.txt J. Winterbottom, H. Tschofenig, R. Bellis.
ECRIT requirements update draft-schulzrinne-ecrit-requirements-01 IETF 63 Aug 02, 2005 Roger Marshall
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
Revision Unit 1 – The Online World Online Services Online Documents Online Communication Cloud Computing The Internet Internet Infrastructure Internet.
The Internet Technological Background. Topic Objectives At the end of this topic, you should be able to do the following: Able to define the Internet.
SPEERMINT Architecture - Reinaldo Penno Juniper Networks SPEERMINT, IETF 70 Vancouver, Canada 2 December 2007.
ECRIT - IETF 62 (March 2005) - Minneapolis 1 Requirements for Emergency Calling draft-schulzrinne-sipping-emergency-req-01 draft-ietf-sipping-sos-01 Henning.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
IP Telephony (VoIP).
Enum dip indicator draft-stastny-iptel-tel-enumdi-00
Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol (SIP) draft-johnston-bliss-mla-req-00.
Unit 27: Network Operating Systems
IEEE Emergency Services
Trustworthy Location ECRIT WG IETF 80 Tuesday, March 29, 2011
Presentation transcript:

ECRIT Basic Reqs draft-stastny-ecrit-requirements Richard Stastny Brian Rosen IETF62 Minneapolis

IETF62 - March 2005Richard Stastny2 Abstract a short list of basic requirements for emergency services via the Internet High level synopsis of existing requirements

IETF62 - March 2005Richard Stastny3 THE basic requirement M1. From any with the Internet connected device it MUST be possible at any time to contact the ECC/PSAP responsible for the current location without dependency on a certain protocol infrastructure (e.g. SIP proxies) and with the most appropriate method for communication for the user, the device and the ECC/PSAP, e.g. voice, text and video.

IETF62 - March 2005Richard Stastny4 MUST M4. To achieve this, the device MUST be able to retrieve its current location from the access provider, from the infrastructure, via GPS,... or as a last resort, from the user itself. The service provider MUST not withhold this information. M5. The capability to locate the responsible ECC/PSAP by the device or UA must be available in the public Infrastructure (e.g. the DNS) without the additional need for a service provider. M2. The possibility to make contact to the proper ECC/PSAP has to be verified (checked) at the time of connection to the Internet and in periodic intervals and the result has to be indicated to the user and/or the User Agent. (Note: the result may also depend on national policy) M3. The communication may be established on user request or by external events. (delete: out-of-scope ?)

IETF62 - March 2005Richard Stastny5 M2. Indication M2. The possibility to make contact to the proper ECC/PSAP has to be verified (checked) at the time of connection to the Internet and in periodic intervals and the result has to be indicated to the user and/or the User Agent. The indication may have three states: –Emergency calls not possible –Emergency calls possible –Contact established, but emergency calls not allowed by national policy + reason (e.g identification or location required)

IETF62 - March 2005Richard Stastny6 MUST (new) New: The end-user must be able to use in addition to the tbd. default emergency URIs (e.g. and the internationally defined emergency numbers (911,112) also the locally defined emergency numbers and the numbers familiar from home. This information must also be available within the public Infrastructure (e.g. DNS) New: The fact that an emergency call is placed must be recognized by the device and by all involved equipment along the path to be able to take proper action (e.g. call handling, call routing, prioritizing, etc).

IETF62 - March 2005Richard Stastny7 Important, but out of scope? M6. For a transient time the device and the UA may use the help of servers (e.g. ESRP) to provide the connectivity to ECC, especially for ECC/PSAP not yet connected to the Internet.

IETF62 - March 2005Richard Stastny8 National differences Reading the other input drafts Some of the following SHOULDs may be required in some countries as a MUST.

IETF62 - March 2005Richard Stastny9 SHOULD S1. Transmission of the current location of the contacting device to the ECC/PSAP. If this transmission requires end-user permission or can be pulled by the ECC/PSAP may be a national policy matter. S2. Capability to hold the call and/or re-contact the contacting device from the ECC/PSAP in case of disruption or later query for a tbd. period of time. This should also be possible from conventional ECC/PSAP via temporary (virtual) E.164 numbers S3. Identification of the contacting person or device. The level of identification required may be a national policy matter. S4. Safeguards to protect the emergency infrastructure and ECC/PSAP facilities against malicious attacks, especially to prevent DoS attacks (needs work) S5. Provide all possible means of communication, not only speech, but also text (IM), Video, etc., (for disabled persons and better display of the situation) S6. Capabilities to contact ECC/PSAP by automatic means and for the transfer of additional information (alarm equipment, cars, buses, trucks with dangerous loads,...)