| List of Figures |
|
xiii | |
| List of Tables |
|
xvii | |
| List of Contributors |
|
xix | |
| Preface |
|
xxi | |
| Acknowledgments |
|
xxv | |
| Acronyms |
|
xxvii | |
| 1 Introduction |
|
1 | (10) |
|
|
|
1 | (4) |
|
|
|
5 | (3) |
|
|
|
8 | (3) |
|
1.3.1 Recognizing Emergency Calls |
|
|
8 | (1) |
|
1.3.2 Obtaining and Conveying Location Information |
|
|
9 | (1) |
|
1.3.3 Routing Emergency Calls |
|
|
9 | (2) |
| 2 Location: Formats, Encoding and Protocols |
|
11 | (92) |
|
2.1 Applying the PIDF-LO civicAddress Type to US Addresses |
|
|
14 | (17) |
|
2.1.1 Introduction: The Context and Purpose of PIDF-LO and CLDXF |
|
|
15 | (2) |
|
|
|
17 | (13) |
|
|
|
30 | (1) |
|
2.2 DHCP as a Location Configuration Protocol (LCP) |
|
|
31 | (6) |
|
2.2.1 What's New in RFC 6225? |
|
|
32 | (1) |
|
2.2.2 DHCPv4 and DHCPv6 Option Formats |
|
|
32 | (3) |
|
|
|
35 | (1) |
|
2.2.4 Latitude and Longitude Fields |
|
|
36 | (1) |
|
|
|
36 | (1) |
|
|
|
37 | (1) |
|
2.3 Geography Markup Language (GML) |
|
|
37 | (10) |
|
|
|
37 | (1) |
|
2.3.2 Overview of the OGC |
|
|
38 | (1) |
|
2.3.3 The OGC Geography Markup Language (GML) |
|
|
38 | (9) |
|
|
|
47 | (1) |
|
2.4 A Taxonomy of the IETF HELD Protocol |
|
|
47 | (25) |
|
|
|
48 | (1) |
|
|
|
48 | (5) |
|
|
|
53 | (6) |
|
2.4.4 HELD Target Identities and Third-Party Requests |
|
|
59 | (3) |
|
|
|
62 | (2) |
|
2.4.6 HELD as a Dereference Protocol |
|
|
64 | (2) |
|
|
|
66 | (3) |
|
2.4.8 HELD Device Capabilities |
|
|
69 | (3) |
|
2.5 OMA Enablers and Emergency Services |
|
|
72 | (20) |
|
|
|
73 | (11) |
|
|
|
84 | (1) |
|
|
|
85 | (4) |
|
|
|
89 | (3) |
|
2.6 3GPP Location Protocols |
|
|
92 | (11) |
|
|
|
92 | (1) |
|
2.6.2 Location Technology in 3GPP Networks |
|
|
93 | (7) |
|
2.6.3 Emergency Location Information in 3GPP CS Domain, Control Plane |
|
|
100 | (1) |
|
2.6.4 Emergency Location Information in the IMS |
|
|
100 | (3) |
| 3 Architectures |
|
103 | (90) |
|
|
|
104 | (15) |
|
|
|
104 | (1) |
|
3.1.2 The i2 Architecture |
|
|
105 | (12) |
|
3.1.3 Regulatory Situation and Deployment Status |
|
|
117 | (2) |
|
|
|
119 | (7) |
|
|
|
119 | (1) |
|
3.2.2 Emergency Services IP Networks |
|
|
120 | (1) |
|
3.2.3 Signaling and Routing IP-Originated Calls |
|
|
121 | (1) |
|
3.2.4 Legacy Wireline and Wireless Origination |
|
|
122 | (1) |
|
|
|
123 | (1) |
|
3.2.6 Routing Calls Within the ESInet |
|
|
123 | (1) |
|
3.2.7 Provisioning the ECRF |
|
|
124 | (1) |
|
|
|
125 | (1) |
|
|
|
126 | (1) |
|
3.3 IETF Emergency Services for Internet Multimedia |
|
|
126 | (13) |
|
|
|
126 | (2) |
|
3.3.2 Recognizing Emergency Calls |
|
|
128 | (1) |
|
3.3.3 Obtaining and Conveying Location Information |
|
|
128 | (1) |
|
3.3.4 Routing Emergency Calls |
|
|
129 | (1) |
|
|
|
130 | (2) |
|
3.3.6 LoST Mapping Architecture |
|
|
132 | (3) |
|
3.3.7 Steps Toward an IETF Emergency Services Architecture |
|
|
135 | (3) |
|
|
|
138 | (1) |
|
3.4 Emergency Services Support in WiFi Networks |
|
|
139 | (3) |
|
|
|
139 | (1) |
|
3.4.2 Location Configuration |
|
|
140 | (1) |
|
3.4.3 Support for Emergency Services |
|
|
141 | (1) |
|
3.4.4 Support for Emergency Alert Systems |
|
|
142 | (1) |
|
|
|
142 | (21) |
|
3.5.1 The WiMAX Network Architecture |
|
|
143 | (5) |
|
3.5.2 Network Architecture for Emergency Services Support |
|
|
148 | (2) |
|
3.5.3 The Fundamental Building Blocks |
|
|
150 | (2) |
|
3.5.4 Roaming Considerations and Network Entry |
|
|
152 | (2) |
|
|
|
154 | (3) |
|
3.5.6 Location Support in WiMAX |
|
|
157 | (6) |
|
|
|
163 | (1) |
|
|
|
163 | (30) |
|
|
|
163 | (1) |
|
|
|
164 | (5) |
|
3.6.3 Emergency Calls in the CS Domain |
|
|
169 | (7) |
|
3.6.4 Emergency Calls in PS Domain |
|
|
176 | (13) |
|
3.6.5 Identified Overload Problems |
|
|
189 | (4) |
| 4 Deployment Examples |
|
193 | (44) |
|
4.1 Emergency Calling in Sweden |
|
|
195 | (14) |
|
|
|
195 | (1) |
|
|
|
196 | (2) |
|
4.1.3 Protocols for PSAP Interconnection |
|
|
198 | (2) |
|
|
|
200 | (1) |
|
|
|
201 | (1) |
|
4.1.6 Emergency Call Routing |
|
|
201 | (1) |
|
|
|
201 | (1) |
|
|
|
201 | (8) |
|
4.2 UK Specification for Locating VoIP Callers |
|
|
209 | (7) |
|
|
|
209 | (1) |
|
4.2.2 The Regulatory Environment |
|
|
209 | (1) |
|
4.2.3 Standards Development |
|
|
210 | (1) |
|
4.2.4 The Current UK Emergency Services Structure |
|
|
210 | (1) |
|
4.2.5 Principles Driving the Specification |
|
|
211 | (2) |
|
4.2.6 Putting It All Together |
|
|
213 | (2) |
|
4.2.7 Implications for Access Network Providers |
|
|
215 | (1) |
|
4.3 Implementation of Vo1P 9-1-1 Services in Canada |
|
|
216 | (14) |
|
4.3.1 Regulatory Framework (About the CRTC) |
|
|
217 | (1) |
|
4.3.2 Canada's Telecom Profile |
|
|
217 | (3) |
|
4.3.3 Interim Solution for Nomadic and Fixed/Non-Native VoIP |
|
|
220 | (2) |
|
4.3.4 The (Defunct) Canadian i2 Proposal |
|
|
222 | (5) |
|
4.3.5 VoIP Regulatory Processes, Decisions and Milestones |
|
|
227 | (2) |
|
|
|
229 | (1) |
|
|
|
230 | (1) |
|
4.4 US/Indiana Wireless Direct Network Project |
|
|
230 | (7) |
|
4.4.1 Background and History of the IWDN |
|
|
231 | (1) |
|
4.4.2 The IWDN Crossroads Project |
|
|
231 | (1) |
|
4.4.3 The IN911 IP Network |
|
|
232 | (3) |
|
|
|
235 | (2) |
| 5 Security for IP-Based Emergency Services |
|
237 | (16) |
|
|
|
237 | (1) |
|
|
|
238 | (2) |
|
5.3 Adversary Models and Security Threats |
|
|
240 | (1) |
|
|
|
241 | (7) |
|
5.4.1 Denial-of-Service Attacks |
|
|
242 | (1) |
|
5.4.2 Attacks Involving the Emergency Identifier |
|
|
242 | (1) |
|
5.4.3 Attacks Against the Mapping System |
|
|
243 | (1) |
|
5.4.4 Attacks Against the Location Information Server |
|
|
244 | (1) |
|
|
|
245 | (1) |
|
5.4.6 Attacks to Prevent a Specific Individual From Receiving Aid |
|
|
246 | (1) |
|
5.4.7 Attacks to Gain Information About an Emergency |
|
|
246 | (1) |
|
5.4.8 Interfering With the US and LoST Server Discovery Procedure |
|
|
246 | (1) |
|
5.4.9 Call Identity Spoofing |
|
|
247 | (1) |
|
|
|
248 | (5) |
|
|
|
248 | (2) |
|
5.5.2 Secure Session Setup and Caller Identity |
|
|
250 | (1) |
|
|
|
251 | (1) |
|
5.5.4 Mapping Database Security |
|
|
251 | (2) |
| 6 Emergency Services for Persons With Disabilities |
|
253 | (8) |
|
6.1 What Is Specific with Communication for People with Disabilities? |
|
|
253 | (2) |
|
6.1.1 Important Characteristics of Regular Voice Telephony |
|
|
253 | (1) |
|
6.1.2 Important Characteristics of Accessible Conversational Services Suitable for People with Disabilities |
|
|
254 | (1) |
|
|
|
255 | (1) |
|
6.3 Interpretation of the Term "Equivalent Service" |
|
|
255 | (1) |
|
|
|
256 | (1) |
|
6.5 Policy and Regulation Support |
|
|
256 | (2) |
|
6.5.1 UN Convention on the Rights of Persons with Disabilities |
|
|
256 | (1) |
|
6.5.2 The European Union Universal Service Directive |
|
|
257 | (1) |
|
6.5.3 The Telecom Act and Public Procurement Act in the United States |
|
|
257 | (1) |
|
6.5.4 Americans With Disability Act |
|
|
257 | (1) |
|
6.5.5 Relay Service Regulation in the United States |
|
|
258 | (1) |
|
6.6 Good Opportunities in IP-Based Services |
|
|
258 | (2) |
|
6.7 Implementation Experience |
|
|
260 | (1) |
| 7 Regulatory Situation |
|
261 | (18) |
|
7.1 Regulatory Aspects of Emergency Services in the United States |
|
|
262 | (4) |
|
|
|
262 | (1) |
|
|
|
262 | (1) |
|
7.1.3 E9-1-1 Requirements |
|
|
263 | (3) |
|
7.2 Regulatory Aspects of Emergency Services in the European Union |
|
|
266 | (13) |
|
|
|
266 | (1) |
|
7.2.2 Regulatory Development of Emergency Services Under EU Law |
|
|
267 | (1) |
|
7.2.3 Current Legal Framework |
|
|
267 | (7) |
|
7.2.4 New Legal Framework |
|
|
274 | (2) |
|
7.2.5 Emergency Regulation Outside of the EU Telecom Regulatory Framework |
|
|
276 | (1) |
|
|
|
276 | (3) |
| 8 Research Projects and Pilots |
|
279 | (42) |
|
8.1 REACH 112: Responding to All Citizens Needing Help |
|
|
280 | (8) |
|
|
|
280 | (2) |
|
8.1.2 Emergency Service Access |
|
|
282 | (2) |
|
|
|
284 | (4) |
|
|
|
288 | (1) |
|
8.2 PEACE: IP-Based Emergency Applications and Services for Next-Generation Networks |
|
|
288 | (10) |
|
|
|
288 | (1) |
|
|
|
289 | (2) |
|
|
|
291 | (7) |
|
8.3 US Department of Transportation's NG 9-1-1 Pilot Project |
|
|
298 | (23) |
|
|
|
298 | (2) |
|
8.3.2 Proof-of-Concept Description |
|
|
300 | (13) |
|
|
|
313 | (4) |
|
|
|
317 | (4) |
| 9 Organizations |
|
321 | (20) |
|
|
|
322 | (4) |
|
9.1.1 Purpose of ETSI Special Committee EMTEL (Emergency Communications) |
|
|
322 | (1) |
|
9.1.2 Main Features of EMTEL |
|
|
322 | (1) |
|
9.1.3 Scope of ETSI SC EMTEL Work |
|
|
323 | (1) |
|
9.1.4 Operation and Activities of SC EMTEL |
|
|
324 | (1) |
|
9.1.5 EMTEL Evolution and Strategy |
|
|
324 | (1) |
|
9.1.6 Vision for Future Emergency Services |
|
|
325 | (1) |
|
|
|
326 | (1) |
|
|
|
327 | (3) |
|
|
|
327 | (1) |
|
|
|
327 | (1) |
|
9.3.3 What Are the EENA Memberships? |
|
|
328 | (2) |
|
|
|
330 | (2) |
|
|
|
330 | (1) |
|
9.4.2 Ecma Technical Committee TC32 |
|
|
331 | (1) |
|
9.4.3 ECMA TR/101, Next Generation Corporate Networks (NGCN)-Emergency Calls |
|
|
331 | (1) |
|
|
|
332 | (4) |
|
9.5.1 Emergency Services Interconnection Forum (ESIF) |
|
|
332 | (1) |
|
9.5.2 Next-Generation Emergency Services (NGES) Subcommittee |
|
|
333 | (1) |
|
9.5.3 Example ESIF Issues |
|
|
334 | (2) |
|
|
|
336 | (1) |
|
9.6 The NG9-1-1 Caucus and the NG9-1-1 Institute |
|
|
336 | (2) |
|
|
|
338 | (3) |
| 10 Conclusion and Outlook |
|
341 | (8) |
|
|
|
341 | (1) |
|
|
|
342 | (1) |
|
|
|
343 | (1) |
|
10.4 Security and Privacy |
|
|
344 | (1) |
|
10.5 Emergency Services for Persons with Disabilities |
|
|
344 | (1) |
|
|
|
345 | (1) |
|
10.7 Research Projects and Pilots |
|
|
345 | (1) |
|
|
|
346 | (3) |
| References |
|
349 | (14) |
| Index |
|
363 | |